首页 > 最新文献

International Journal of Cooperative Information Systems最新文献

英文 中文
A New Era of Cryptography : Quantum Cryptography 密码学新时代:量子密码学
IF 1.5 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2016-12-30 DOI: 10.5121/IJCIS.2016.6403
S. Bhandari
Security is the first priority in today digital world for secure communication between sender and receiver. Various Cryptography techniques are developed time to time for secure communication. Quantum Cryptography is one of the latest and advanced cryptography technique, it is different from all other cryptography technique and more secure. It based on the Quantum of physics since its name which make it more secure from all other cryptography and UN breakable. In this paper about quantum cryptography i.e working, limitation and advantages discussed.
在当今的数字世界中,安全是发送方和接收方之间安全通信的首要任务。为了保证通信的安全,各种加密技术不断被开发出来。量子密码技术是一种最新的、先进的密码技术,它区别于其他所有的密码技术,具有更高的安全性。它基于物理学的量子,因为它的名字,使它更安全,从所有其他密码和联合国可破。本文讨论了量子密码的工作原理、局限性和优点。
{"title":"A New Era of Cryptography : Quantum Cryptography","authors":"S. Bhandari","doi":"10.5121/IJCIS.2016.6403","DOIUrl":"https://doi.org/10.5121/IJCIS.2016.6403","url":null,"abstract":"Security is the first priority in today digital world for secure communication between sender and receiver. Various Cryptography techniques are developed time to time for secure communication. Quantum Cryptography is one of the latest and advanced cryptography technique, it is different from all other cryptography technique and more secure. It based on the Quantum of physics since its name which make it more secure from all other cryptography and UN breakable. In this paper about quantum cryptography i.e working, limitation and advantages discussed.","PeriodicalId":54966,"journal":{"name":"International Journal of Cooperative Information Systems","volume":"6 1","pages":"31-37"},"PeriodicalIF":1.5,"publicationDate":"2016-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70619682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multimodal Biometric Authentication : Secured Encryption of IRIS Using Fingerprint ID 多模态生物识别认证:使用指纹ID的IRIS安全加密
IF 1.5 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2016-12-30 DOI: 10.5121/ijcis.2016.6404
S. Sheena, S. Mathew
Securing data storage using biometrics is the current trend. Different physiological as well as behavioral biometrics like face, fingerprint, iris, Gait, voice etc.. is used in providing security to the data. The proposed work explains about the biometric encryption technology which will securely generate a digital key using two biometric modalities. Iris is encrypted using Fingerprint ID of 32-bit as the key in this work. For encryption Blowfish algorithm is used and the encrypted template is stored in the database and one is given to the user. During the authentication time user input the template and the fingerprint. This template is then decrypted and verified with the original template taken from the database to check whether the user is genuine or an imposter. Hamming distance is used to measure the matching of the templates. CASIA Iris database is used for experimentation and fingerprint images read through the R303 fingerprint reader.
使用生物识别技术保护数据存储是当前的趋势。不同的生理和行为生物特征,如面部、指纹、虹膜、步态、声音等。用于为数据提供安全性。提出的工作解释了生物特征加密技术,该技术将使用两种生物特征模式安全地生成数字密钥。本文使用32位的Fingerprint ID作为密钥对虹膜进行加密。加密采用Blowfish算法,加密后的模板存储在数据库中,并提供给用户一个。认证过程中,用户输入模板和指纹。然后对该模板进行解密,并使用从数据库中获取的原始模板进行验证,以检查用户是真实的还是冒名顶替的。汉明距离用来衡量模板的匹配程度。实验使用CASIA虹膜数据库,指纹图像通过R303指纹识别器读取。
{"title":"Multimodal Biometric Authentication : Secured Encryption of IRIS Using Fingerprint ID","authors":"S. Sheena, S. Mathew","doi":"10.5121/ijcis.2016.6404","DOIUrl":"https://doi.org/10.5121/ijcis.2016.6404","url":null,"abstract":"Securing data storage using biometrics is the current trend. Different physiological as well as behavioral biometrics like face, fingerprint, iris, Gait, voice etc.. is used in providing security to the data. The proposed work explains about the biometric encryption technology which will securely generate a digital key using two biometric modalities. Iris is encrypted using Fingerprint ID of 32-bit as the key in this work. For encryption Blowfish algorithm is used and the encrypted template is stored in the database and one is given to the user. During the authentication time user input the template and the fingerprint. This template is then decrypted and verified with the original template taken from the database to check whether the user is genuine or an imposter. Hamming distance is used to measure the matching of the templates. CASIA Iris database is used for experimentation and fingerprint images read through the R303 fingerprint reader.","PeriodicalId":54966,"journal":{"name":"International Journal of Cooperative Information Systems","volume":"6 1","pages":"39-46"},"PeriodicalIF":1.5,"publicationDate":"2016-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70619818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
New Algorithm for Wireless Network Communication Security 无线网络通信安全的新算法
IF 1.5 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2016-12-30 DOI: 10.5121/IJCIS.2016.6401
S. Ahmed, M. Nader
This paper evaluates the security of wireless communication network based on the fuzzy logic in Mat lab. A new algorithm is proposed and evaluated which is the hybrid algorithm. We highlight the valuable assets in designing of wireless network communication system based on network simulator (NS2), which is crucial to protect security of the systems. Block cipher algorithms are evaluated by using fuzzy logics and a hybrid algorithm is proposed. Both algorithms are evaluated in term of the security level. Logic (AND) is used in the rules of modelling and Mamdani Style is used for the evaluations
本文基于模糊逻辑对无线通信网络的安全性进行了评估。提出并评价了一种新的混合算法。重点介绍了基于网络模拟器(NS2)的无线网络通信系统的设计中所具有的宝贵价值,这对保障系统的安全至关重要。利用模糊逻辑对分组密码算法进行了评估,并提出了一种混合算法。这两种算法都是根据安全级别进行评估的。在建模规则中使用逻辑(AND),在评估中使用Mamdani风格
{"title":"New Algorithm for Wireless Network Communication Security","authors":"S. Ahmed, M. Nader","doi":"10.5121/IJCIS.2016.6401","DOIUrl":"https://doi.org/10.5121/IJCIS.2016.6401","url":null,"abstract":"This paper evaluates the security of wireless communication network based on the fuzzy logic in Mat lab. A new algorithm is proposed and evaluated which is the hybrid algorithm. We highlight the valuable assets in designing of wireless network communication system based on network simulator (NS2), which is crucial to protect security of the systems. Block cipher algorithms are evaluated by using fuzzy logics and a hybrid algorithm is proposed. Both algorithms are evaluated in term of the security level. Logic (AND) is used in the rules of modelling and Mamdani Style is used for the evaluations","PeriodicalId":54966,"journal":{"name":"International Journal of Cooperative Information Systems","volume":"6 1","pages":"01-08"},"PeriodicalIF":1.5,"publicationDate":"2016-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70619179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Algebraic Degree Estimation of Block Ciphers Using Randomized Algorithm; Upper-Bound Integral Distinguisher 基于随机化算法的分组密码代数度估计上界积分区分符
IF 1.5 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2016-12-30 DOI: 10.5121/IJCIS.2016.6402
Haruhisa Kosuge, Hidema Tanaka
Integral attack is a powerful method to recover the secret key of block cipher by exploiting a characteristic that a set of outputs after several rounds encryption has ( integral distinguisher). Recently, Todo proposed a new algorithm to construct integral distinguisher with division property. However, the existence of integral distinguisher which holds in additional rounds can not be denied by the algorithm. On the contrary, we take an approach to obtain the number of rounds which integral distinguisher does not hold ( upper-bound integral distinguisher). The approach is based on algebraic degree estimation. We execute a random search for a term which has a degree equals the number of all inputted variables. We propose an algorithm and apply it to PRESENT and RECTANGLE. Then, we confirm that there exists no 8-round integral distinguisher in PRESENT and no 9-round integral distinguisher in RECTANGLE. From the facts, integral attack for more than 11-round and 13-round of PRESENT and RECTANGLE is infeasible, respectively.
积分攻击是利用分组密码经过几轮加密后的一组输出所具有的特征(积分区分符)来恢复分组密码密钥的一种有效方法。最近,Todo提出了一种构造具有除法性质的积分区分符的新算法。然而,该算法不能否认在附加轮中存在整数区分符。相反,我们采用了一种方法来获得不存在积分区分符的轮数(上界积分区分符)。该方法基于代数度估计。我们执行一个随机搜索,它的度数等于所有输入变量的个数。我们提出了一种算法,并将其应用于PRESENT和RECTANGLE。然后,我们证实了在PRESENT中不存在8轮积分区分符,在RECTANGLE中不存在9轮积分区分符。从事实来看,积分攻击对于11轮以上的PRESENT和13轮以上的RECTANGLE都是不可行的。
{"title":"Algebraic Degree Estimation of Block Ciphers Using Randomized Algorithm; Upper-Bound Integral Distinguisher","authors":"Haruhisa Kosuge, Hidema Tanaka","doi":"10.5121/IJCIS.2016.6402","DOIUrl":"https://doi.org/10.5121/IJCIS.2016.6402","url":null,"abstract":"Integral attack is a powerful method to recover the secret key of block cipher by exploiting a characteristic that a set of outputs after several rounds encryption has ( integral distinguisher). Recently, Todo proposed a new algorithm to construct integral distinguisher with division property. However, the existence of integral distinguisher which holds in additional rounds can not be denied by the algorithm. On the contrary, we take an approach to obtain the number of rounds which integral distinguisher does not hold ( upper-bound integral distinguisher). The approach is based on algebraic degree estimation. We execute a random search for a term which has a degree equals the number of all inputted variables. We propose an algorithm and apply it to PRESENT and RECTANGLE. Then, we confirm that there exists no 8-round integral distinguisher in PRESENT and no 9-round integral distinguisher in RECTANGLE. From the facts, integral attack for more than 11-round and 13-round of PRESENT and RECTANGLE is infeasible, respectively.","PeriodicalId":54966,"journal":{"name":"International Journal of Cooperative Information Systems","volume":"6 1","pages":"09-29"},"PeriodicalIF":1.5,"publicationDate":"2016-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70619252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Compact Coding Using Multi-Photon Tolerant Quantum Protocols For Quantum Communication 基于多光子容忍量子协议的量子通信压缩编码
IF 1.5 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2016-06-30 DOI: 10.5121/ijcis.2016.6202
Rasha El Hajj, P. Verma, K. W. Chan
This paper presents a new encryption scheme called Compact Coding that encodes information in time, phase, and intensity domains, simultaneously. While these approaches have previously been used one at a time, the proposed scheme brings to bear for the first time their strengths simultaneously leading to an increase in the secure information transfer rate. The proposed scheme is applicable to both optical fibers and free space optics, and can be considered as an alternative to polarization coding. This paper applies the proposed compact coding scheme to multi-photon tolerant quantum protocols in order to produce quantum-level security during information transfer. We present the structure of the proposed coding scheme in a multi-photon environment and address its operation.
本文提出了一种新的加密方案,称为紧凑编码,它可以同时在时间域、相位域和强度域对信息进行编码。虽然这些方法以前都是一次使用一种,但该方案首次同时发挥了它们的优势,从而提高了安全信息传输速率。该方案适用于光纤和自由空间光学,可作为偏振编码的替代方案。本文将所提出的压缩编码方案应用于多光子容忍量子协议,以在信息传输过程中产生量子级安全性。我们提出了在多光子环境下所提出的编码方案的结构,并讨论了其操作。
{"title":"Compact Coding Using Multi-Photon Tolerant Quantum Protocols For Quantum Communication","authors":"Rasha El Hajj, P. Verma, K. W. Chan","doi":"10.5121/ijcis.2016.6202","DOIUrl":"https://doi.org/10.5121/ijcis.2016.6202","url":null,"abstract":"This paper presents a new encryption scheme called Compact Coding that encodes information in time, phase, and intensity domains, simultaneously. While these approaches have previously been used one at a time, the proposed scheme brings to bear for the first time their strengths simultaneously leading to an increase in the secure information transfer rate. The proposed scheme is applicable to both optical fibers and free space optics, and can be considered as an alternative to polarization coding. This paper applies the proposed compact coding scheme to multi-photon tolerant quantum protocols in order to produce quantum-level security during information transfer. We present the structure of the proposed coding scheme in a multi-photon environment and address its operation.","PeriodicalId":54966,"journal":{"name":"International Journal of Cooperative Information Systems","volume":"6 1","pages":"23-40"},"PeriodicalIF":1.5,"publicationDate":"2016-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70619166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improvement of Search Algorithm for Integral Distinguisher in Subblock-Based Block Cipher 基于子块的块密码中积分区分符搜索算法的改进
IF 1.5 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2016-06-30 DOI: 10.5121/IJCIS.2016.6203
Haruhisa Kosuge, Hidema Tanaka
Integral distinguisher is the main factor of integral attack. Conventionally, higher order integral distinguisher is obtained as an extension of first order integral (conventional algorithm). The algorithm was applied to many subblock-based block ciphers, however, the conventional algorithm has some problems. We find other integral distinguisher of two sub block-based block ciphers, TWINE and LBlock, which are different from the conventional evaluations. As a solution, we propose a new algorithm to search for higher order integral distinguisher. The point of a proposal algorithm is exploitation of bijective and injective components of cipher functions. Applying the proposal algorithm to TWINE and LBlock, we confirm the results of the proposal algorithm are consistent with the results which are calculated from computer experiment. The results are the optimal distinguisher and the most advantageous one for the attackers. Our proposal algorithm contributes to development of stronger block ciphers by obtaining such integral distinguisher.
积分区分符是积分攻击的主要因素。传统上,高阶积分区分符是一阶积分(传统算法)的推广。该算法已应用于许多基于子块的分组密码中,但传统算法存在一些问题。我们发现了TWINE和LBlock两个基于子块的分组密码的其他积分区分符,它们与传统的评估不同。为了解决这一问题,我们提出了一种新的搜索高阶积分区分符的算法。该算法的重点是利用密码函数的双射和单射分量。将提议算法应用于TWINE和LBlock,验证了提议算法的结果与计算机实验结果一致。结果是对攻击者最优和最有利的区分。我们提出的算法通过获得这样的积分区分符,有助于开发更强的分组密码。
{"title":"Improvement of Search Algorithm for Integral Distinguisher in Subblock-Based Block Cipher","authors":"Haruhisa Kosuge, Hidema Tanaka","doi":"10.5121/IJCIS.2016.6203","DOIUrl":"https://doi.org/10.5121/IJCIS.2016.6203","url":null,"abstract":"Integral distinguisher is the main factor of integral attack. Conventionally, higher order integral distinguisher is obtained as an extension of first order integral (conventional algorithm). The algorithm was applied to many subblock-based block ciphers, however, the conventional algorithm has some problems. We find other integral distinguisher of two sub block-based block ciphers, TWINE and LBlock, which are different from the conventional evaluations. As a solution, we propose a new algorithm to search for higher order integral distinguisher. The point of a proposal algorithm is exploitation of bijective and injective components of cipher functions. Applying the proposal algorithm to TWINE and LBlock, we confirm the results of the proposal algorithm are consistent with the results which are calculated from computer experiment. The results are the optimal distinguisher and the most advantageous one for the attackers. Our proposal algorithm contributes to development of stronger block ciphers by obtaining such integral distinguisher.","PeriodicalId":54966,"journal":{"name":"International Journal of Cooperative Information Systems","volume":"6 1","pages":"41-62"},"PeriodicalIF":1.5,"publicationDate":"2016-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70619586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Vision led = vision fed 视觉引导=视觉供给
IF 1.5 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2016-06-01 DOI: 10.5204/ijcis.v9i2.137
K. Martin
As the National Indigenous Knowledges and Research Network (NIRAKN) reaches its completion as an entity in 2016, this paper takes up the invitation to its members to write about the key learnings, benefits and challenges experienced as a member of NIRAKN’s Indigenous Sociology, Indigenous Knowledge and Technology node. The author discusses the role of NIRAKN in progressing the scholarship of Aboriginal early childhood education through its collaborative research program, raising the bar regarding Aboriginal knowledges in higher education through its network connections and aspects for holding ground in Aboriginal research capacity building, particularly in the area of qualitative research methodologies. These discussions serve to highlight that, as the NIRAKN model has been led by a strong vision, it has fed change and achieved its visions.
随着国家原住民知识与研究网络(NIRAKN)于2016年正式成立,本文接受邀请,撰写作为NIRAKN原住民社会学、原住民知识与技术节点成员的主要学习、利益和挑战。作者讨论了NIRAKN在通过其合作研究项目推进土著儿童早期教育奖学金方面的作用,通过其网络联系提高高等教育中土著知识的门槛,以及在土著研究能力建设方面的立场,特别是在定性研究方法领域。这些讨论突出表明,由于NIRAKN模式是由一个强大的愿景领导的,因此它促进了变革并实现了愿景。
{"title":"Vision led = vision fed","authors":"K. Martin","doi":"10.5204/ijcis.v9i2.137","DOIUrl":"https://doi.org/10.5204/ijcis.v9i2.137","url":null,"abstract":"As the National Indigenous Knowledges and Research Network (NIRAKN) reaches its completion as an entity in 2016, this paper takes up the invitation to its members to write about the key learnings, benefits and challenges experienced as a member of NIRAKN’s Indigenous Sociology, Indigenous Knowledge and Technology node. The author discusses the role of NIRAKN in progressing the scholarship of Aboriginal early childhood education through its collaborative research program, raising the bar regarding Aboriginal knowledges in higher education through its network connections and aspects for holding ground in Aboriginal research capacity building, particularly in the area of qualitative research methodologies. These discussions serve to highlight that, as the NIRAKN model has been led by a strong vision, it has fed change and achieved its visions.","PeriodicalId":54966,"journal":{"name":"International Journal of Cooperative Information Systems","volume":"9 1","pages":"1-14"},"PeriodicalIF":1.5,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70655952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mapping the journey of an Aboriginal research academic 描绘一位土著研究学者的旅程
IF 1.5 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2016-06-01 DOI: 10.5204/IJCIS.V9I2.138
R. Bainbridge
Most universities implement academic, professional development opportunities to enhance knowledge, practice appropriately to their environments and support the career progression of staff. These opportunities, however, do not cater for the specific professional development needs of Aboriginal research academics. The aim of this paper is to map the professional journey of an Aboriginal research academic during the time of her participation in the National Indigenous Researchers and Knowledges Network (NIRAKN) 2012 to 2016. The author uses an autoethnographic approach to examine what worked for her, under what conditions, through what strategies and with what consequences in her development as an Aboriginal research leader. The author suggests that the unique ‘Indigenous space’ and Aboriginal mentorship provided by NIRAKN was critical in her successful transition to a research leadership position.
大多数大学都实施学术和专业发展机会,以增强知识,根据环境进行适当的实践,并支持员工的职业发展。然而,这些机会不能满足土著研究学者的具体专业发展需要。本文的目的是描绘一位原住民研究学者在2012年至2016年参与全国原住民研究人员和知识网络(NIRAKN)期间的职业旅程。作者使用了一种自我民族志的方法来研究在她作为土著研究领导者的发展过程中,什么对她起了作用,在什么条件下,通过什么策略以及产生了什么后果。作者认为,NIRAKN提供的独特的“土著空间”和土著指导对她成功过渡到研究领导职位至关重要。
{"title":"Mapping the journey of an Aboriginal research academic","authors":"R. Bainbridge","doi":"10.5204/IJCIS.V9I2.138","DOIUrl":"https://doi.org/10.5204/IJCIS.V9I2.138","url":null,"abstract":"Most universities implement academic, professional development opportunities to enhance knowledge, practice appropriately to their environments and support the career progression of staff. These opportunities, however, do not cater for the specific professional development needs of Aboriginal research academics. The aim of this paper is to map the professional journey of an Aboriginal research academic during the time of her participation in the National Indigenous Researchers and Knowledges Network (NIRAKN) 2012 to 2016. The author uses an autoethnographic approach to examine what worked for her, under what conditions, through what strategies and with what consequences in her development as an Aboriginal research leader. The author suggests that the unique ‘Indigenous space’ and Aboriginal mentorship provided by NIRAKN was critical in her successful transition to a research leadership position.","PeriodicalId":54966,"journal":{"name":"International Journal of Cooperative Information Systems","volume":"9 1","pages":"1-10"},"PeriodicalIF":1.5,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70655963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Collaborating for community-engaged scholarship in health and wellbeing: A co-autoethnographic study of Indigenous self-determined researcher development 合作促进社区参与的健康和福祉奖学金:土著自主研究人员发展的共同民族志研究
IF 1.5 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2016-06-01 DOI: 10.5204/IJCIS.V9I2.136
R. Bainbridge, B. Fredericks, K. Clapham, C. Anderson, R. Ball, Marlene Longbottom, D. Bessarab, L. Collard, Mick Adams, Y. Roe, Ngare Wilkinson, C. Daniels
In this article, we provide an emic perspective of being uniquely positioned as part of Australia’s only multidisciplinary Indigenous research network, the National Indigenous Research and Knowledges Network (NIRAKN). We used collaborative autoethnography and reflection in our practices and experiences. Our purpose was to better understand and improve the functionality of our research network and practice, and to offer some direction for the growth and sustainability of NIRAKN and similar networks. Our narratives strongly demonstrate that mainstream models of support for Indigenous researchers have major limitations for professional development and cultural safety, and do not meet our needs and realities. The significant message is that we need appropriately resourced exclusive spaces and must lead, develop and define the theoretical and cultural specifications and applications of Indigenous researcher support models in higher education institutions. The model should be cross-disciplinary, have national and international reach and be characterised by connectedness, cultural safety and self-determination, and be located in a resource-rich environment.
在这篇文章中,我们提供了一个独特的视角,作为澳大利亚唯一的多学科土著研究网络的一部分,国家土著研究和知识网络(NIRAKN)。我们在实践和经验中使用协作式的自我民族志和反思。我们的目的是为了更好地理解和改进我们的研究网络和实践的功能,并为NIRAKN和类似网络的发展和可持续性提供一些方向。我们的叙述有力地表明,支持土著研究人员的主流模式在专业发展和文化安全方面存在重大限制,而且不符合我们的需求和现实。重要的信息是,我们需要适当资源的专属空间,必须在高等教育机构中领导、发展和定义土著研究人员支持模式的理论和文化规范和应用。该模式应该是跨学科的,具有国内和国际影响,具有连通性、文化安全和自决的特点,并位于资源丰富的环境中。
{"title":"Collaborating for community-engaged scholarship in health and wellbeing: A co-autoethnographic study of Indigenous self-determined researcher development","authors":"R. Bainbridge, B. Fredericks, K. Clapham, C. Anderson, R. Ball, Marlene Longbottom, D. Bessarab, L. Collard, Mick Adams, Y. Roe, Ngare Wilkinson, C. Daniels","doi":"10.5204/IJCIS.V9I2.136","DOIUrl":"https://doi.org/10.5204/IJCIS.V9I2.136","url":null,"abstract":"In this article, we provide an emic perspective of being uniquely positioned as part of Australia’s only multidisciplinary Indigenous research network, the National Indigenous Research and Knowledges Network (NIRAKN). We used collaborative autoethnography and reflection in our practices and experiences. Our purpose was to better understand and improve the functionality of our research network and practice, and to offer some direction for the growth and sustainability of NIRAKN and similar networks. Our narratives strongly demonstrate that mainstream models of support for Indigenous researchers have major limitations for professional development and cultural safety, and do not meet our needs and realities. The significant message is that we need appropriately resourced exclusive spaces and must lead, develop and define the theoretical and cultural specifications and applications of Indigenous researcher support models in higher education institutions. The model should be cross-disciplinary, have national and international reach and be characterised by connectedness, cultural safety and self-determination, and be located in a resource-rich environment.","PeriodicalId":54966,"journal":{"name":"International Journal of Cooperative Information Systems","volume":"9 1","pages":"1-19"},"PeriodicalIF":1.5,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70655890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The Last Blank Spaces 最后的空白
IF 1.5 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2016-06-01 DOI: 10.5204/IJCIS.V9I2.139
Greg Blyton
Quality research, innovative and provocative. American historian Dane Kennedy’s The Last Blank Spaces: Exploring Africa and Australia delivers a carefully written comparative history of British exploration that challenges romantic conceptualisations of explorer and Indigenous relations in the nineteenth century. The very title ‘The Last Blank Spaces’ conjures up images of terra nullius. The final frontiers in British exploration of two vast continents, an emptiness “to advance imperial agendas, to pre-empt political rivals, to inspire patriotic pride, to discover natural resources, to promote commercial interests and further humanitarian objectives” (p. 60). The Last Blank Spaces fits into a genre of Indigenous, colonial ethnography when the British explorer is the central character and the Indigenous person is a support, but the book differs from conventional Western accounts. Kennedy writes that it is a book that “traces the development of exploration from an idea to a practice, from a practice to an outcome, and from an outcome to a myth” (p. 23).
优质研究,创新进取。美国历史学家戴恩·肯尼迪的《最后的空白:探索非洲和澳大利亚》为我们提供了一部精心撰写的英国探险历史比较书,挑战了19世纪探险家和土著关系的浪漫概念。《最后的空白》这个标题本身就会让人联想到无主之地的景象。这是英国探索两大大陆的最后疆界,一个“推进帝国议程,先发制人的政治对手,激发爱国自豪感,发现自然资源,促进商业利益和进一步的人道主义目标”的空虚(第60页)。《最后的空白》符合土著、殖民民族志的一种类型,英国探险家是中心人物,土著人是配角,但这本书与传统的西方叙述不同。肯尼迪写道,这本书“追溯了探索的发展,从一个想法到一个实践,从一个实践到一个结果,从一个结果到一个神话”(第23页)。
{"title":"The Last Blank Spaces","authors":"Greg Blyton","doi":"10.5204/IJCIS.V9I2.139","DOIUrl":"https://doi.org/10.5204/IJCIS.V9I2.139","url":null,"abstract":"Quality research, innovative and provocative. American historian Dane Kennedy’s The Last Blank Spaces: Exploring Africa and Australia delivers a carefully written comparative history of British exploration that challenges romantic conceptualisations of explorer and Indigenous relations in the nineteenth century. The very title ‘The Last Blank Spaces’ conjures up images of terra nullius. The final frontiers in British exploration of two vast continents, an emptiness “to advance imperial agendas, to pre-empt political rivals, to inspire patriotic pride, to discover natural resources, to promote commercial interests and further humanitarian objectives” (p. 60). The Last Blank Spaces fits into a genre of Indigenous, colonial ethnography when the British explorer is the central character and the Indigenous person is a support, but the book differs from conventional Western accounts. Kennedy writes that it is a book that “traces the development of exploration from an idea to a practice, from a practice to an outcome, and from an outcome to a myth” (p. 23).","PeriodicalId":54966,"journal":{"name":"International Journal of Cooperative Information Systems","volume":"9 1","pages":"1-3"},"PeriodicalIF":1.5,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70656094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
International Journal of Cooperative Information Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1