90 research outputs found

    Knowledge management: a dilemma

    No full text

    Transformed Practice in a Pedagogy of Multiliteracies

    Get PDF
    Global communication is being transformed by new forms of meaning-making in a culturally diverse world. This article concerns these shifts, releasing key findings of a critical ethnography that investigated how a teacher implemented the multiliteracies pedagogy. The study documented a series of media-based lessons with a teacher's culturally and linguistically diverse Year 6 class (students ages 11-12 years). The reporting of this research is timely because teaching multiliteracies is a key feature of Australian educational policy initiatives and syllabus requirements. This article moves the field of literacy research forward by examining the intersection of pedagogy for multimodal textual practices and issues of equity. The important findings concern the differing degrees to which learners utilised the affordances of media for specific cultural purposes through a pedagogy of multiliteracies. Some students reproduced existing designs whereas others applied their knowledge of texts with substantial innovation and creativity. Comparisons are made between the learning demonstrated by students who were of the dominant Anglo-Australian, middle-class culture and by those who were not. Recommendations are given for applying the multiliteracies pedagogy to enable meaningful designing

    Housing and Economic Development Debate Revisited: Economic Significance of Housing in Developing Countries

    No full text
    Should housing improvement be part of economic development strategies? Must housing improvement wait until high-economic growth is attained? How much priority should be given to housing in view of the limited resources in less-developed countries? What are housing benefits in economic development vis-à-vis other economic investments? These questions have generated heated debates, both in the literature on development problems and in planning and practice in the 1950s and 1960s. This paper draws on the accumulated body of knowledge resulting from past experiences in research and policy to revisit the earlier debates, survey the main lines of argument and reassess the economic potential of housing. It then attempts to generate broad policy considerations. The main contention of this paper is that in light of past and present evidence, the housing sector needs to be given serious consideration in economic growth strategies

    The Cloaked-Centroid protocol: location privacy protection for a group of users of location-based services

    No full text
    Several techniques have been recently proposed to protect user location privacy while accessing location-based services (LBSs). However, applying these techniques to protect location privacy for a group of users would lead to user privacy leakage and query inefficiency. In this paper, we propose a two-phase protocol, we name Cloaked-Centroid, which is designed specifically to protect location privacy for a group of users. We identify location privacy issues for a group of users who may ask an LBS for a meeting place that is closest to the group centroid. Our protocol relies on spatial cloaking, an anonymous veto network and a conference key establishment protocol. In the first phase, member locations are cloaked into a single region based on their privacy profiles, and then, a single query is submitted to an LBS. In the second phase, a special secure multiparty computation extracts the meeting point result from the received answer set. Our protocol is resource aware, taking into account the LBS overhead and the communication cost, i.e., the number of nearest neighbor queries sent to a service provider and the number of returned points of interests. Regarding privacy, Cloaked-Centroid protects the location privacy of each group member from those in the group and from anyone outside the group, including the LBS. Moreover, our protocol provides result-set anonymity, which prevents LBS providers and other possible attackers from learning the meeting place location. Extensive experiments show that the proposed protocol is efficient in terms of computation and communication costs. A security analysis shows the resistance of the protocol against collusion, disruption and background knowledge attacks in a malicious model
    corecore