首页 > 最新文献

International Journal of Cooperative Information Systems最新文献

英文 中文
PEC - An Alternate and More Efficient Public Key Cryptosystem PEC——一个替代的和更有效的公钥密码系统
IF 1.5 4区 计算机科学 Q3 Computer Science Pub Date : 2018-01-01 DOI: 10.5121/ijcis.2018.8101
R. Krishnan
In an increasingly connected world, security is a top concern for Internet of Things (IoT). These IoT devices have to be inexpensive implying that they will be constrained in storage and computing resources. In order to secure such devices, highly efficient public key cryptosystems (PKC) are critical. Elliptic Curve Cryptography (ECC) is the most commonly implemented PKC in use today. In this paper, an alternate and a more efficient PKC, called the PEC (Pells Equation Cryptography) has been proposed based on Pells equation: x−D ∗y ≡ 1 (mod p). It is shown that scalar multiplication in PEC is significantly more efficient compared to ECC. It is also shown that the Discrete Logarithm Problem computing the private key from the public key in PEC is at least as hard as that of ECC.
在一个日益互联的世界中,安全是物联网(IoT)的首要关注点。这些物联网设备必须价格低廉,这意味着它们将受到存储和计算资源的限制。为了确保这些设备的安全,高效的公钥密码系统(PKC)至关重要。椭圆曲线加密(ECC)是目前使用的最常见的PKC实现。在本文中,基于Pells方程:x−D∗y≡1 (mod p),提出了一种替代且更有效的PKC,称为PEC (Pells Equation Cryptography)。结果表明,PEC中的标量乘法比ECC更有效。研究还表明,PEC中从公钥计算私钥的离散对数问题至少与ECC一样困难。
{"title":"PEC - An Alternate and More Efficient Public Key Cryptosystem","authors":"R. Krishnan","doi":"10.5121/ijcis.2018.8101","DOIUrl":"https://doi.org/10.5121/ijcis.2018.8101","url":null,"abstract":"In an increasingly connected world, security is a top concern for Internet of Things (IoT). These IoT devices have to be inexpensive implying that they will be constrained in storage and computing resources. In order to secure such devices, highly efficient public key cryptosystems (PKC) are critical. Elliptic Curve Cryptography (ECC) is the most commonly implemented PKC in use today. In this paper, an alternate and a more efficient PKC, called the PEC (Pells Equation Cryptography) has been proposed based on Pells equation: x−D ∗y ≡ 1 (mod p). It is shown that scalar multiplication in PEC is significantly more efficient compared to ECC. It is also shown that the Discrete Logarithm Problem computing the private key from the public key in PEC is at least as hard as that of ECC.","PeriodicalId":54966,"journal":{"name":"International Journal of Cooperative Information Systems","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2018-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70619928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dynamic Service Provisioning and Selection for Satisfying Cloud Applications and Cloud Providers in Hybrid Cloud 混合云中满足云应用和云提供商的动态服务供应和选择
IF 1.5 4区 计算机科学 Q3 Computer Science Pub Date : 2017-11-14 DOI: 10.1142/S0218843017500058
Xu Lijun, L. Chunlin
The paper presents a hybrid cloud service provisioning and selection optimization scheme, and proposes a hybrid cloud model which consists of hybrid cloud users, private cloud and public cloud. This scheme aims to effectively provide cloud service and allocate cloud resources, such that the system utility can be maximized subject to public cloud resource constraints and hybrid cloud users constraints. The paper makes use of a utility-driven approach to solve interaction among private cloud user, hybrid cloud service provider and public cloud provider in hybrid cloud environment. The paper presents hybrid cloud service provisioning and selection algorithm in hybrid cloud. The hybrid cloud market consists of hybrid cloud user agent, hybrid cloud service agent and hybrid cloud agent, which represent the interests of different roles. The experiments are designed to compare the performance of proposed algorithm with the other related work.
提出了一种混合云服务提供和选择优化方案,提出了一种由混合云用户、私有云和公共云组成的混合云模型。该方案旨在有效地提供云服务和分配云资源,在公共云资源约束和混合云用户约束的前提下,实现系统效用最大化。本文利用效用驱动的方法解决混合云环境下私有云用户、混合云服务提供商和公共云提供商之间的交互问题。提出了混合云服务的提供和选择算法。混合云市场由混合云用户代理、混合云服务代理和混合云代理组成,代表着不同角色的利益。设计了实验来比较该算法与其他相关工作的性能。
{"title":"Dynamic Service Provisioning and Selection for Satisfying Cloud Applications and Cloud Providers in Hybrid Cloud","authors":"Xu Lijun, L. Chunlin","doi":"10.1142/S0218843017500058","DOIUrl":"https://doi.org/10.1142/S0218843017500058","url":null,"abstract":"The paper presents a hybrid cloud service provisioning and selection optimization scheme, and proposes a hybrid cloud model which consists of hybrid cloud users, private cloud and public cloud. This scheme aims to effectively provide cloud service and allocate cloud resources, such that the system utility can be maximized subject to public cloud resource constraints and hybrid cloud users constraints. The paper makes use of a utility-driven approach to solve interaction among private cloud user, hybrid cloud service provider and public cloud provider in hybrid cloud environment. The paper presents hybrid cloud service provisioning and selection algorithm in hybrid cloud. The hybrid cloud market consists of hybrid cloud user agent, hybrid cloud service agent and hybrid cloud agent, which represent the interests of different roles. The experiments are designed to compare the performance of proposed algorithm with the other related work.","PeriodicalId":54966,"journal":{"name":"International Journal of Cooperative Information Systems","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2017-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1142/S0218843017500058","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"64252709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Cryptanalysis And Enhancement Of Password Authentication Scheme For Smart Card 智能卡密码认证方案的密码分析与增强
IF 1.5 4区 计算机科学 Q3 Computer Science Pub Date : 2017-09-30 DOI: 10.5281/ZENODO.1161879
Raphael Nyirongo, Solomon Kuonga, Patrick Ali, L. Eneya, Hyunsung Kim
ABSTRACTPassword authentication with smart card is one of the simplest and efficient authentication mechanisms to ensure secure communication over insecure network environments. Recently, Tsai et al. proposed an improved password authentication scheme for smart card. Their scheme is more secure than the other previous schemes. In this paper, we show Tsai et al.’s scheme is vulnerable to password guessing attack and has computational overhead. Furthermore, we propose an enhanced password authentication scheme to eliminate the security vulnerability and enhance the overhead. By presenting concrete analysis of security and performance, we show that the proposed scheme cannot only resist various well known attacks, but also is more efficient than the other related works, and thus is feasible for practical applications.
ABSTRACT智能卡密码身份验证是最简单有效的身份验证机制之一,可确保在不安全的网络环境中进行安全通信。最近,Tsai等人提出了一种改进的智能卡密码认证方案。他们的方案比以前的其他方案更安全。在本文中,我们证明了Tsai等人的方案容易受到密码猜测攻击,并且有计算开销。此外,我们提出了一种增强的密码认证方案,以消除安全漏洞并提高开销。通过对安全性和性能的具体分析,我们表明所提出的方案不仅能够抵抗各种众所周知的攻击,而且比其他相关工作更有效,因此在实际应用中是可行的。
{"title":"Cryptanalysis And Enhancement Of Password Authentication Scheme For Smart Card","authors":"Raphael Nyirongo, Solomon Kuonga, Patrick Ali, L. Eneya, Hyunsung Kim","doi":"10.5281/ZENODO.1161879","DOIUrl":"https://doi.org/10.5281/ZENODO.1161879","url":null,"abstract":"ABSTRACT\u0000\u0000Password authentication with smart card is one of the simplest and efficient authentication mechanisms to ensure secure communication over insecure network environments. Recently, Tsai et al. proposed an improved password authentication scheme for smart card. Their scheme is more secure than the other previous schemes. In this paper, we show Tsai et al.’s scheme is vulnerable to password guessing attack and has computational overhead. Furthermore, we propose an enhanced password authentication scheme to eliminate the security vulnerability and enhance the overhead. By presenting concrete analysis of security and performance, we show that the proposed scheme cannot only resist various well known attacks, but also is more efficient than the other related works, and thus is feasible for practical applications.","PeriodicalId":54966,"journal":{"name":"International Journal of Cooperative Information Systems","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2017-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49210063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Hardware Trojan Identification and Detection 硬件木马识别和检测
IF 1.5 4区 计算机科学 Q3 Computer Science Pub Date : 2017-06-30 DOI: 10.5121/IJCIS.2017.7201
Samer Moein, F. Gebali, T. Gulliver, A. Alkandari
{"title":"Hardware Trojan Identification and Detection","authors":"Samer Moein, F. Gebali, T. Gulliver, A. Alkandari","doi":"10.5121/IJCIS.2017.7201","DOIUrl":"https://doi.org/10.5121/IJCIS.2017.7201","url":null,"abstract":"","PeriodicalId":54966,"journal":{"name":"International Journal of Cooperative Information Systems","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2017-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44315053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Randomization Based Block Cipher with Key Mapped S-Box Selection 基于密钥映射s盒选择的随机分组密码
IF 1.5 4区 计算机科学 Q3 Computer Science Pub Date : 2017-03-31 DOI: 10.5121/IJCIS.2017.7101
Krishna Prasad Nandeti, Anshuman Singh, M. Yousef
This paper proposes a new system of Substitution-Permutation network along with Randomization Expansion of 240 bits of input data. System uses 16 S-Boxes which are selected randomly based on the subkey values throughout 64 rounds of substitution steps. 64 sub-keys are generated during the SubstitutionPermutation process. The middletext is transposed based on decimal value of the sub-key generated during the each round. A CBC mode is the best associated with this system.
本文提出了一种新的替换置换网络系统,并对240位输入数据进行了随机化扩展。系统使用16个S盒,这些S盒是在64轮替换步骤中基于子密钥值随机选择的。在替换置换过程中生成64个子密钥。中间文本根据每轮生成的子键的十进制值进行转置。CBC模式是与该系统相关联的最佳模式。
{"title":"Randomization Based Block Cipher with Key Mapped S-Box Selection","authors":"Krishna Prasad Nandeti, Anshuman Singh, M. Yousef","doi":"10.5121/IJCIS.2017.7101","DOIUrl":"https://doi.org/10.5121/IJCIS.2017.7101","url":null,"abstract":"This paper proposes a new system of Substitution-Permutation network along with Randomization Expansion of 240 bits of input data. System uses 16 S-Boxes which are selected randomly based on the subkey values throughout 64 rounds of substitution steps. 64 sub-keys are generated during the SubstitutionPermutation process. The middletext is transposed based on decimal value of the sub-key generated during the each round. A CBC mode is the best associated with this system.","PeriodicalId":54966,"journal":{"name":"International Journal of Cooperative Information Systems","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2017-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41686923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hardware Attack Mitigation Techniques Analysis 硬件攻击缓解技术分析
IF 1.5 4区 计算机科学 Q3 Computer Science Pub Date : 2017-03-31 DOI: 10.5121/IJCIS.2017.7102
Samer Moein, T. Gulliver, F. Gebali, A. Alkandari
The goal of a hardware attack is to physically access a digital system to obtain secret information or modify the system behavior. These attacks can be classified as covert or overt based on the awareness of the attack. Each hardware attack has capabilities as well as objectives. Some employ hardware trojans, which are inserted during, manufacture, while others monitor system emissions. Once a hardware attack has been identified, mitigation techniques should be employed to protect the system. There are now a wide variety of techniques, which can be used against hardware attacks. In this paper, a comprehensive survey of hardware attack mitigation techniques is presented. These techniques are matched to the hardware attacks and attack criteria they can counter, which helps security personnel choose appropriate mitigation techniques to protect their systems against hardware attacks. An example is presented to illustrate the choice of appropriate countermeasures.
硬件攻击的目标是物理访问数字系统以获取机密信息或修改系统行为。根据对攻击的认识,这些攻击可以分为隐蔽攻击或公开攻击。每种硬件攻击都有其功能和目标。一些使用硬件特洛伊木马,在制造过程中插入,而另一些则监控系统排放。一旦发现硬件攻击,应采用缓解技术来保护系统。现在有各种各样的技术可以用来对付硬件攻击。本文对硬件攻击缓解技术进行了全面的综述。这些技术与他们可以对抗的硬件攻击和攻击标准相匹配,这有助于安全人员选择适当的缓解技术来保护他们的系统免受硬件攻击。文中举例说明如何选择适当的对策。
{"title":"Hardware Attack Mitigation Techniques Analysis","authors":"Samer Moein, T. Gulliver, F. Gebali, A. Alkandari","doi":"10.5121/IJCIS.2017.7102","DOIUrl":"https://doi.org/10.5121/IJCIS.2017.7102","url":null,"abstract":"The goal of a hardware attack is to physically access a digital system to obtain secret information or modify the system behavior. These attacks can be classified as covert or overt based on the awareness of the attack. Each hardware attack has capabilities as well as objectives. Some employ hardware trojans, which are inserted during, manufacture, while others monitor system emissions. Once a hardware attack has been identified, mitigation techniques should be employed to protect the system. There are now a wide variety of techniques, which can be used against hardware attacks. In this paper, a comprehensive survey of hardware attack mitigation techniques is presented. These techniques are matched to the hardware attacks and attack criteria they can counter, which helps security personnel choose appropriate mitigation techniques to protect their systems against hardware attacks. An example is presented to illustrate the choice of appropriate countermeasures.","PeriodicalId":54966,"journal":{"name":"International Journal of Cooperative Information Systems","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2017-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47989575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Talking the language to death 把语言说得死去活来
IF 1.5 4区 计算机科学 Q3 Computer Science Pub Date : 2017-01-01 DOI: 10.5204/IJCIS.V10I1.148
Diane D. Johnson, Keao NeSmith
In the late 19th century, when the United States began its illegal occupation of the Hawaiian Kingdom, the teaching of languages was dominated by an approach— grammar translation—that has been associated with elitism and cultural dominance. Since then, there have been major developments in language teaching. Among these has been the development of “communicative language teaching” (CLT), an approach intended to encourage learners to use the target language for genuine communication in culturally appropriate contexts. However, analysis of a sample of Hawaiian language lessons taught in the second decade of the 20th century revealed little evidence of any of these. Instead, an approach reminiscent of aspects of grammar translation was very much in evidence, with teacher talk, often in English, occupying over half of the lesson in each case, and with considerable evidence of confusion, frustration and minimal participation on the part of many of the students. What this suggests is the need for a comprehensive review of all those factors that have an impact on the teaching and learning of Hawaiian, including, in particular, curriculum design and teacher ISSN 1837-0144 © International Journal of Critical Indigenous Studies 2 training. It is no longer possible to accept that while language teachers talk, often in the language/s of colonisers, language death continues to stalk those indigenous languages that have so far failed to succumb.
19世纪末,当美国开始非法占领夏威夷王国时,语言教学被一种与精英主义和文化优势有关的方法——语法翻译——所主导。从那时起,语言教学有了重大发展。其中包括“交际语言教学”(CLT)的发展,这是一种旨在鼓励学习者在文化上适当的语境中使用目的语进行真正交流的方法。然而,对20世纪第二个十年的夏威夷语课程样本的分析显示,这些证据都很少。相反,一种让人想起语法翻译方面的方法非常明显,老师的谈话,通常是英语,每次都占据了一半以上的课程,而且有相当多的证据表明,许多学生感到困惑、沮丧和很少参与。这表明需要对所有影响夏威夷语教学的因素进行全面审查,特别是课程设计和教师ISSN 1837-0144©国际批判性土著研究杂志2培训。当语言教师常常用殖民者的语言讲课时,语言死亡继续尾随那些迄今尚未消亡的土著语言,这已不再是可能接受的事实。
{"title":"Talking the language to death","authors":"Diane D. Johnson, Keao NeSmith","doi":"10.5204/IJCIS.V10I1.148","DOIUrl":"https://doi.org/10.5204/IJCIS.V10I1.148","url":null,"abstract":"In the late 19th century, when the United States began its illegal occupation of the Hawaiian Kingdom, the teaching of languages was dominated by an approach— grammar translation—that has been associated with elitism and cultural dominance. Since then, there have been major developments in language teaching. Among these has been the development of “communicative language teaching” (CLT), an approach intended to encourage learners to use the target language for genuine communication in culturally appropriate contexts. However, analysis of a sample of Hawaiian language lessons taught in the second decade of the 20th century revealed little evidence of any of these. Instead, an approach reminiscent of aspects of grammar translation was very much in evidence, with teacher talk, often in English, occupying over half of the lesson in each case, and with considerable evidence of confusion, frustration and minimal participation on the part of many of the students. What this suggests is the need for a comprehensive review of all those factors that have an impact on the teaching and learning of Hawaiian, including, in particular, curriculum design and teacher ISSN 1837-0144 © International Journal of Critical Indigenous Studies 2 training. It is no longer possible to accept that while language teachers talk, often in the language/s of colonisers, language death continues to stalk those indigenous languages that have so far failed to succumb.","PeriodicalId":54966,"journal":{"name":"International Journal of Cooperative Information Systems","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70653029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Respecting and recognising Indigenous rights when challenged by commercial activities 在受到商业活动挑战时,尊重和承认土著居民的权利
IF 1.5 4区 计算机科学 Q3 Computer Science Pub Date : 2017-01-01 DOI: 10.5204/IJCIS.V10I1.147
Valmaine Toki
The United Nations Declaration on the Rights of Indigenous Peoples was hailed as a triumph among Indigenous peoples, signalling a long-awaited recognition of their fundamental human rights. Despite this, many violations of these basic rights continue, particularly in relation to extractive industries and business activities. In response, a business reference guide seeks to inform industries of their responsibilities. This article examines the tenuous relationship between Indigenous rights, state responsibilities and business expectations.
《联合国土著人民权利宣言》被誉为土著人民的胜利,标志着他们的基本人权得到了期待已久的承认。尽管如此,许多侵犯这些基本权利的行为仍在继续,特别是在采掘工业和商业活动方面。作为回应,商业参考指南试图告知行业他们的责任。本文探讨了原住民权利、国家责任和商业期望之间的微妙关系。
{"title":"Respecting and recognising Indigenous rights when challenged by commercial activities","authors":"Valmaine Toki","doi":"10.5204/IJCIS.V10I1.147","DOIUrl":"https://doi.org/10.5204/IJCIS.V10I1.147","url":null,"abstract":"The United Nations Declaration on the Rights of Indigenous Peoples was hailed as a triumph among Indigenous peoples, signalling a long-awaited recognition of their fundamental human rights. Despite this, many violations of these basic rights continue, particularly in relation to extractive industries and business activities. In response, a business reference guide seeks to inform industries of their responsibilities. This article examines the tenuous relationship between Indigenous rights, state responsibilities and business expectations.","PeriodicalId":54966,"journal":{"name":"International Journal of Cooperative Information Systems","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70653316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
“And There'll Be NO Dancing”. Perspectives on Policies Impacting Indigenous Australia Since 2007 “不会有舞蹈”。2007年以来影响澳大利亚土著居民的政策观点
IF 1.5 4区 计算机科学 Q3 Computer Science Pub Date : 2017-01-01 DOI: 10.5204/IJCIS.V10I1.150
O. Haag
“Sexual abuse of children is inexcusable. So why is there such a fuss about a state intervention? Should we shut up and do nothing just because there is racism? No child or woman must be molested, irrespective of who the perpetrator is!” Thus my recollection of what one of my Scottish colleagues said in an informal conversation about the 2007 Northern Territory Intervention, a set of legal and political measures intended to curtail domestic violence in Indigenous Australian communities. “Yes”, I replied, “race should not be an issue when talking about crime”. Not least because domestic violence happens everywhere, including Scotland. I would not have heard anyone talking about a specifically Scottish, White or European propensity for domestic violence. Yet there is abundant talk about Black violence. Generalisation is the hallmark of racialisation. Blackness is scripted as inherently violent—a tenacious trope deriving from colonial concepts of ferocious animalism (e.g. Eze 2000; Nederveen-Pieterse 1990).
“对儿童的性虐待是不可原谅的。那么,为什么对国家干预如此大惊小怪呢?就因为存在种族主义,我们就应该闭嘴什么都不做吗?无论施暴者是谁,都不能猥亵儿童或妇女!”因此,我想起了我的一位苏格兰同事在一次非正式谈话中所说的2007年北领地干预,这是一套旨在减少澳大利亚土著社区家庭暴力的法律和政治措施。“是的,”我回答说,“在谈论犯罪时,种族不应该成为一个问题。”尤其是因为家庭暴力无处不在,包括苏格兰。我不会听到有人说苏格兰人、白人或欧洲人有家庭暴力倾向。然而,关于黑人暴力的讨论比比皆是。普遍化是种族化的标志。黑色本质上是暴力的,这是一种源自殖民时期凶残动物主义概念的顽固修辞(例如Eze 2000;Nederveen-Pieterse 1990)。
{"title":"“And There'll Be NO Dancing”. Perspectives on Policies Impacting Indigenous Australia Since 2007","authors":"O. Haag","doi":"10.5204/IJCIS.V10I1.150","DOIUrl":"https://doi.org/10.5204/IJCIS.V10I1.150","url":null,"abstract":"“Sexual abuse of children is inexcusable. So why is there such a fuss about a state intervention? Should we shut up and do nothing just because there is racism? No child or woman must be molested, irrespective of who the perpetrator is!” Thus my recollection of what one of my Scottish colleagues said in an informal conversation about the 2007 Northern Territory Intervention, a set of legal and political measures intended to curtail domestic violence in Indigenous Australian communities. “Yes”, I replied, “race should not be an issue when talking about crime”. Not least because domestic violence happens everywhere, including Scotland. I would not have heard anyone talking about a specifically Scottish, White or European propensity for domestic violence. Yet there is abundant talk about Black violence. Generalisation is the hallmark of racialisation. Blackness is scripted as inherently violent—a tenacious trope deriving from colonial concepts of ferocious animalism (e.g. Eze 2000; Nederveen-Pieterse 1990).","PeriodicalId":54966,"journal":{"name":"International Journal of Cooperative Information Systems","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70653669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Textbooks for the teaching of te reo Māori 教材用于教学reo Māori
IF 1.5 4区 计算机科学 Q3 Computer Science Pub Date : 2017-01-01 DOI: 10.5204/IJCIS.V10I1.149
Sophie Nock
As part of a recent study of the teaching and learning of te reo Māori (the Māori language) in English-medium secondary schools in Aotearoa/New Zealand, I asked a sample of teachers which textbooks they used. I then analysed some of those textbooks that were referred to most often, using focus points derived from a review of literature on the design of textbooks for the teaching of additional languages. What I found was that the textbooks analysed were inconsistent with the relevant curriculum guidelines document and were also problematic in a number of other ways. This article discusses a number of the problematic concerns and outlines what would be involved in designing more effective textbooks for Indigenous languages, and textbooks that are in line with current research findings.
作为最近在新西兰奥特罗阿(Aotearoa/New Zealand)以英语为媒介的中学中reo Māori (Māori语言)教学研究的一部分,我询问了一些教师他们使用的教科书。然后,我分析了其中一些最常被提及的教科书,使用了从关于额外语言教学教科书设计的文献综述中得出的重点。我发现,所分析的教科书与相关的课程指导文件不一致,而且在许多其他方面也存在问题。本文讨论了一些有问题的问题,并概述了如何设计更有效的土著语言教科书,以及如何设计符合当前研究结果的教科书。
{"title":"Textbooks for the teaching of te reo Māori","authors":"Sophie Nock","doi":"10.5204/IJCIS.V10I1.149","DOIUrl":"https://doi.org/10.5204/IJCIS.V10I1.149","url":null,"abstract":"As part of a recent study of the teaching and learning of te reo Māori (the Māori language) in English-medium secondary schools in Aotearoa/New Zealand, I asked a sample of teachers which textbooks they used. I then analysed some of those textbooks that were referred to most often, using focus points derived from a review of literature on the design of textbooks for the teaching of additional languages. What I found was that the textbooks analysed were inconsistent with the relevant curriculum guidelines document and were also problematic in a number of other ways. This article discusses a number of the problematic concerns and outlines what would be involved in designing more effective textbooks for Indigenous languages, and textbooks that are in line with current research findings.","PeriodicalId":54966,"journal":{"name":"International Journal of Cooperative Information Systems","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70653598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Cooperative Information Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1