23 research outputs found

    Disrupting colonial discourses in the Geography curriculum during the introduction of British Values policy in schools

    Get PDF
    The main purpose of this article is to expose and disrupt discourses dominating global development in an English school geography textbook chapter. The study was prompted by a teacher’s encounter with cultural difference in a geography lesson in South Korea. I investigate the issues raised through the lens of a new curriculum policy in English schools called ‘Promoting Fundamental British Values’ which forms part of England’s education-securitisation agenda, a topic of international attention. Following contextualisation across research fields and in recent curriculum and assessment policy reform, I bring together theoretical perspectives from curriculum studies and Continental philosophy that do not usually speak to each other, to construct a new analytical approach. I identify three key themes, each informed by colonial logic: ‘development’, ‘numerical indicators’ and ‘learning to divide the world’. The inquiry appears to expose a tension between the knowledge of the textbook chapter and the purported aims of the British Values curriculum policy, but further investigation reveals the two to be connected through common colonial values. The findings are relevant to teachers, publishers, textbook authors, policy makers and curriculum researchers. I recommend a refreshed curriculum agenda with the politics of knowledge and ethical global relations at its centre

    Crypto Blunders (v. 1.1)

    No full text
    Abstract: Cryptography has emerged as an enormously important component of the networked world. People are hesitant to trust the World Wide Web and eCommerce without the protections crypto provides. As companies build Virtual Private Networks, demand secure communications and require stronger authentication techniques, more and more applications are built with crypto as core components. Many cryptographic algorithms are almost unbreakable... if used properly. If applied incorrectly, it doesn't matter how strong an algorithm or key is, the tools of crypto will provide no protection. This paper will describe some of the blunders people have made over the years in their use of cryptography. Some of these mistakes made headlines, some did not. Some might even be a little humorous-- to those not involved. If nothing else, readers will learn what not to do in their products

    Intended Category: Standards track

    Get PDF
    This document is an Internet-Draft and is in full conformance with all provisions of Section 10 of RFC2026. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and its working groups. Note that other groups may also distribute working documents as Internet-Drafts. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or made obsolete by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as work in progress. The list of current Internet-Drafts may be found a
    corecore