Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 69

Full-Text Articles in Social and Behavioral Sciences

Public Key Authenticated Encryption With Designated Equality Test And Its Applications In Diagnostic Related Groups, Yuanhao Wang, Qiong Huang, Hongbo Li, Jianye Huang, Guomin Yang, Willy Susilo Jan 2019

Public Key Authenticated Encryption With Designated Equality Test And Its Applications In Diagnostic Related Groups, Yuanhao Wang, Qiong Huang, Hongbo Li, Jianye Huang, Guomin Yang, Willy Susilo

Faculty of Engineering and Information Sciences - Papers: Part B

Due to the massive growth of data and security concerns, data of patients would be encrypted and outsourced to the cloud server for feature matching in various medical scenarios, such as personal health record systems, actuarial judgements and diagnostic related groups. Public key encryption with equality test (PKEET) is a useful utility for encrypted feature matching. Authorized tester could perform data matching on encrypted data without decrypting. Unfortunately, due to the limited terminology in medicine, people within institutions may illegally use data, trying to obtain information through traversal methods. In this paper we propose a new PKEET notion, called public-key ...


Embedding External Referencing Of Standards In Higher Education: Collaborative Relationships Are The Key, Lesley Sefcik, Simon Bernard Bedford, Peter Czech, Judith Smith, John Yorke Jan 2018

Embedding External Referencing Of Standards In Higher Education: Collaborative Relationships Are The Key, Lesley Sefcik, Simon Bernard Bedford, Peter Czech, Judith Smith, John Yorke

Senior Deputy Vice-Chancellor and Deputy Vice-Chancellor (Education) - Papers

External referencing of assessment and students’ achievement standards is a growing priority area within higher education, which is being pressured by government requirements to evidence outcome attainment. External referencing benefits stakeholders connected to higher education by helping to assure that assessments and standards within courses are appropriate and comparable among institutions. External referencing takes many forms, which have different resourcing requirements, outcomes, and operational strengths and challenges. This paper describes the External Referencing of Standards (ERoS) approach developed, tested and adopted by a university consortium. ERoS draws on the strengths of existing methodologies to produce an evolved model that is ...


Public Cloud Data Auditing With Practical Key Update And Zero Knowledge Privacy, Yong Yu, Yannan Li, Man Ho Au, Willy Susilo, Kim-Kwang Raymond Choo, Xinpeng Zhang Jan 2016

Public Cloud Data Auditing With Practical Key Update And Zero Knowledge Privacy, Yong Yu, Yannan Li, Man Ho Au, Willy Susilo, Kim-Kwang Raymond Choo, Xinpeng Zhang

Faculty of Engineering and Information Sciences - Papers: Part A

Data integrity is extremely important for cloud based storage services, where cloud users no longer have physical possession of their outsourced files. A number of data auditing mechanisms have been proposed to solve this problem. However, how to update a cloud user's private auditing key (as well as the authenticators those keys are associated with) without the user's re-possession of the data remains an open problem. In this paper, we propose a key-updating and authenticator-evolving mechanism with zero-knowledge privacy of the stored files for secure cloud data auditing, which incorporates zero knowledge proof systems, proxy re-signatures and homomorphic ...


Relations Between Robustness And Rka Security Under Public-Key Encryption, Hui Cui, Yi Mu, Man Ho Au Jan 2016

Relations Between Robustness And Rka Security Under Public-Key Encryption, Hui Cui, Yi Mu, Man Ho Au

Faculty of Engineering and Information Sciences - Papers: Part A

We revisit the notions of robustness introduced by Abdalla, Bellare and Neven (TCC 2010), and related-key attack (RKA) security raised by Bellare, Cash and Miller (ASIACRYPT 2011). In the setting of public-key encryption (PKE), robustness means that it is hard to produce a ciphertext that is valid for two different users, while RKA security means that a PKE scheme is still secure even when an attacker can induce modifications in a decryption key, and subsequently observe the outcome of this PKE scheme under this modified key. In this paper, we explore the relationship between RKA security and various notions of ...


Young Children's Identity Formation In The Context Of Open Adoption In Nsw: Summary And Key Findings, Marc De Rosnay, Betty Luu, Amy Conley Wright Jan 2016

Young Children's Identity Formation In The Context Of Open Adoption In Nsw: Summary And Key Findings, Marc De Rosnay, Betty Luu, Amy Conley Wright

Faculty of Social Sciences - Papers

A review into how open adoption can support developmental outcomes and establish healthy identity formation of children was commissioned by Barnardos Australia. The focus is on children who are up to 5 years of age in out-of-home care (OOHC) for whom there is no realistic chance of restoration to their birth family or kinship care. The options facing such children, according to recent amendments in late 2014 to the Children and Young Persons (Care and Protection) Act 1998, are either for adoption or parental responsibility of the Minister (i.e., foster care) until they are 18 years of age. Healthy ...


Reducing Unwarranted Variation In Healthcare Service Delivery Systems: Key Issues, Research Challenges And Potential Solutions, Nagesh Shukla, Senevi Kiridena, Nishikant Mishra Apr 2015

Reducing Unwarranted Variation In Healthcare Service Delivery Systems: Key Issues, Research Challenges And Potential Solutions, Nagesh Shukla, Senevi Kiridena, Nishikant Mishra

Nagesh Shukla

There is a growing need worldwide to increase the quality and productivity of healthcare services delivery. To this end, analysing and reducing unwarranted variations in healthcare has attracted much attention in recent times. However, current modelling and simulation approaches to reduce unwarranted variations suffer from numerous limitations. Consequently, service improvement efforts have often failed to deliver expected results. This paper discusses the key issues associated with reducing unwarranted variations in hospital service delivery systems, and proposes a research framework that aims at overcoming these issues. In doing so, it highlights the need for: accurately and efficiently modelling complex service delivery ...


Exposure Perception As A Key Indicator Of Risk Perception And Acceptance Of Sources Of Radio Frequency Electromagnetic Fields, Frederik Freudenstein, Peter M. Wiedemann, Tim Brown Jan 2015

Exposure Perception As A Key Indicator Of Risk Perception And Acceptance Of Sources Of Radio Frequency Electromagnetic Fields, Frederik Freudenstein, Peter M. Wiedemann, Tim Brown

Faculty of Social Sciences - Papers

The presented survey was conducted in six European countries as an online study. A total of 2454 subjects participated. Two main research questions were investigated: firstly, how does the cognitive, moral, and affective framing of radio frequency electromagnetic field (RF EMF) exposure perception influence RF EMF risk perception? Secondly, can the deployment of mobile phone base stations have greater acceptance with RF EMF exposure reduction? The findings with respect to the first question clearly indicated that the cognitive framed exposure perception is the main determinant of RF EMF risk perception. The concomitant sensitivity to exposure strength offers an opportunity to ...


Leakage Resilient Authenticated Key Exchange Secure In The Auxiliary Input Model, Guomin Yang, Yi Mu, Willy Susilo, Duncan S. Wong Mar 2014

Leakage Resilient Authenticated Key Exchange Secure In The Auxiliary Input Model, Guomin Yang, Yi Mu, Willy Susilo, Duncan S. Wong

Professor Willy Susilo

Authenticated key exchange (AKE) protocols allow two parties communicating over an insecure network to establish a common secret key. They are among the most widely used cryptographic protocols in practice. In order to resist key-leakage attacks, several leakage resilient AKE protocols have been proposed recently in the bounded leakage model. In this paper, we initiate the study on leakage resilient AKE in the auxiliary input model. A promising way to construct such a protocol is to use a digital signature scheme that is entropically-unforgeable under chosen message and auxiliary input attacks. However, to date we are not aware of any ...


(Strong) Multi-Designated Verifiers Signatures Secure Against Rogue Key Attack, Yunmei Zhang, Man Ho Allen Au, Guomin Yang, Willy Susilo Mar 2014

(Strong) Multi-Designated Verifiers Signatures Secure Against Rogue Key Attack, Yunmei Zhang, Man Ho Allen Au, Guomin Yang, Willy Susilo

Professor Willy Susilo

Designated verifier signatures (DVS) allow a signer to create a signature whose validity can only be verified by a specific entity chosen by the signer. In addition, the chosen entity, known as the designated verifier, cannot convince any body that the signature is created by the signer. Multi-designated verifiers signatures (MDVS) are a natural extension of DVS in which the signer can choose multiple designated verifiers. DVS and MDVS are useful primitives in electronic voting and contract signing. In this paper, we investigate various aspects of MDVS and make two contributions. Firstly, we revisit the notion of unforgeability under rogue ...


Public Key Encryption With Keyword Search Secure Against Keyword Guessing Attacks Without Random Oracle, Liming Fang, Willy Susilo, Chunpeng Ge, Jiandong Wang Mar 2014

Public Key Encryption With Keyword Search Secure Against Keyword Guessing Attacks Without Random Oracle, Liming Fang, Willy Susilo, Chunpeng Ge, Jiandong Wang

Professor Willy Susilo

The notion of public key encryption with keyword search (PEKS) was put forth by Boneh et al. to enable a server to search from a collection of encrypted emails given a “trapdoor” (i.e., an encrypted keyword) provided by the receiver. The nice property in this scheme allows the server to search for a keyword, given the trapdoor. Hence, the verifier can merely use an untrusted server, which makes this notion very practical. Following Boneh et al.’s work, there have been subsequent works that have been proposed to enhance this notion. Two important notions include the so-called keyword guessing ...


Cross-Domain Password-Based Authenticated Key Exchange Revisited, Liqun Chen, Hoon Wei Lim, Guomin Yang Jan 2014

Cross-Domain Password-Based Authenticated Key Exchange Revisited, Liqun Chen, Hoon Wei Lim, Guomin Yang

Faculty of Engineering and Information Sciences - Papers: Part A

We revisit the problem of secure cross-domain communication between two users belonging to different security domains within an open and distributed environment. Existing approaches presuppose that either the users are in possession of public key certificates issued by a trusted certificate authority (CA), or the associated domain authentication servers share a long-term secret key. In this article, we propose a generic framework for designing four-party password-based authenticated key exchange (4PAKE) protocols. Our framework takes a different approach from previous work. The users are not required to have public key certificates, but they simply reuse their login passwords, which they share ...


Identity-Based Chameleon Hashing And Signatures Without Key Exposure, Xiaofeng Xiaofeng Chen, Fangguo Zhang, Willy Susilo, Haibo Tian, Jin Li, Kwangjo Kim Jan 2014

Identity-Based Chameleon Hashing And Signatures Without Key Exposure, Xiaofeng Xiaofeng Chen, Fangguo Zhang, Willy Susilo, Haibo Tian, Jin Li, Kwangjo Kim

Faculty of Engineering and Information Sciences - Papers: Part A

The notion of chameleon hash function without key exposure plays an important role in designing secure chameleon signatures. However, all of the existing key-exposure free chameleon hash schemes are presented in the setting of certificate-based systems. In 2004, Ateniese and de Medeiros questioned whether there is an efficient construction for identity-based chameleon hashing without key exposure. In this paper, we propose the first identity-based chameleon hash scheme without key exposure based on the three-trapdoor mechanism, which provides an affirmative answer to the open problem. Moreover, we use the proposed chameleon hash scheme to design an identity-based chameleon signature scheme, which ...


(Strong) Multidesignated Verifiers Signatures Secure Against Rogue Key Attack, Man Ho Au, Guomin Yang, Willy Susilo, Yunmei Zhang Jan 2014

(Strong) Multidesignated Verifiers Signatures Secure Against Rogue Key Attack, Man Ho Au, Guomin Yang, Willy Susilo, Yunmei Zhang

Faculty of Engineering and Information Sciences - Papers: Part A

Designated verifier signatures (DVS) allow a signer to create a signature whose validity can only be verified by a specific entity chosen by the signer. In addition, the chosen entity, known as the designated verifier, cannot convince any body that the signature is created by the signer. Multidesignated verifiers signatures (MDVS) are a natural extension of DVS in which the signer can choose multiple designated verifiers. DVS and MDVS are useful primitives in electronic voting and contract signing. In this paper, we investigate various aspects of MDVS and make two contributions. Firstly, we revisit the notion of unforgeability under rogue ...


Optimistic Fair Exchange In The Enhanced Chosen-Key Model, Yang Wang, Man Ho Au, Willy Susilo Jan 2014

Optimistic Fair Exchange In The Enhanced Chosen-Key Model, Yang Wang, Man Ho Au, Willy Susilo

Faculty of Engineering and Information Sciences - Papers: Part A

Optimistic fair exchange (OFE) is a kind of protocol to guarantee fairness for the parties involved in an exchange with the help of an arbitrator. A fundamental work of optimistic fair exchange is to define security models capturing realistic attacks and design schemes secure in practical models. The security models are very essential to ensure that they capture practical situation, which will ensure that the protocols can be adopted in practice. The contributions of this paper are three fold. First, we observe that the existing OFE models do not capture realistic situation, where the adversary can actually observe the full ...


Disinvestment Policy And The Public Funding Of Assisted Reproductive Technologies: Outcomes Of Deliberative Engagements With Three Key Stakeholder Groups, Katherine Hodgetts, Janet E. Hiller, Jackie M. Street, D Carter, Annette J. Braunack-Mayer, Amber M. Watt, John R. Moss, Adam Elshaug Jan 2014

Disinvestment Policy And The Public Funding Of Assisted Reproductive Technologies: Outcomes Of Deliberative Engagements With Three Key Stakeholder Groups, Katherine Hodgetts, Janet E. Hiller, Jackie M. Street, D Carter, Annette J. Braunack-Mayer, Amber M. Watt, John R. Moss, Adam Elshaug

Faculty of Social Sciences - Papers

Background

Measures to improve the quality and sustainability of healthcare practice and provision have become a policy concern. In addition, the involvement of stakeholders in health policy decision-making has been advocated, as complex questions arise around the structure of funding arrangements in a context of limited resources. Using a case study of assisted reproductive technologies (ART), deliberative engagements with a range of stakeholder groups were held on the topic of how best to structure the distribution of Australian public funding in this domain.

Methods

Deliberative engagements were carried out with groups of ART consumers, clinicians and community members. The forums ...


Nutrition And Pregnancy - Key Issues For Midwives, Heather Yeatman, Moira Williamson, E Nohr Jan 2014

Nutrition And Pregnancy - Key Issues For Midwives, Heather Yeatman, Moira Williamson, E Nohr

Faculty of Social Sciences - Papers

Abstract of symposium presented at the ICM 30th Triennial Congress - Midwives: Improving Women's Health Globally, 1-5 June 2014, Prague, Czech Republic


Key Considerations For Developing An Effective Alcohol Media Literacy Program: Findings From A Systematic Literature Review, Chloe Gordon, Sandra C. Jones, Lisa Kervin Jan 2014

Key Considerations For Developing An Effective Alcohol Media Literacy Program: Findings From A Systematic Literature Review, Chloe Gordon, Sandra C. Jones, Lisa Kervin

Faculty of Social Sciences - Papers

Abstract presented at the Australasian Professional Society on Alcohol and other Drugs Conference 2014, 9-12 November 2014, Adelaide, Australia


Institutional Wide Implementation Of Key Advice For Socially Inclusive Teaching In Higher Education. A Practice Report, Lisa Thomas, Jennifer Heath Jan 2014

Institutional Wide Implementation Of Key Advice For Socially Inclusive Teaching In Higher Education. A Practice Report, Lisa Thomas, Jennifer Heath

Senior Deputy Vice-Chancellor and Deputy Vice-Chancellor (Education) - Papers

Government policy and institutional initiatives have influenced increases in enrolment of non-traditional students to Australian universities. For these students, university culture is often incongruent with their own, making it difficult to understand the tacit requirements for participation and success. Academic teaching staff are important in creating socially inclusive learning experiences, particularly in first year subjects. This paper presents an institution-wide approach to enhancing socially inclusive teaching at one Australian university. Underpinned by a framework of "bridging social-incongruity" the initiative was guided by six principles of socially inclusive teaching to support practice as proposed in the 2012 "Effective support of students ...


(Strong) Multi-Designated Verifiers Signatures Secure Against Rogue Key Attack, Yunmei Zhang, Man Ho Allen Au, Guomin Yang, Willy Susilo Jun 2013

(Strong) Multi-Designated Verifiers Signatures Secure Against Rogue Key Attack, Yunmei Zhang, Man Ho Allen Au, Guomin Yang, Willy Susilo

Dr Guomin Yang

Designated verifier signatures (DVS) allow a signer to create a signature whose validity can only be verified by a specific entity chosen by the signer. In addition, the chosen entity, known as the designated verifier, cannot convince any body that the signature is created by the signer. Multi-designated verifiers signatures (MDVS) are a natural extension of DVS in which the signer can choose multiple designated verifiers. DVS and MDVS are useful primitives in electronic voting and contract signing. In this paper, we investigate various aspects of MDVS and make two contributions. Firstly, we revisit the notion of unforgeability under rogue ...


Violence Against Women: A Key Determinant Of Health And Wellbeing, Michael Flood, L Walker, K Webster Feb 2013

Violence Against Women: A Key Determinant Of Health And Wellbeing, Michael Flood, L Walker, K Webster

Michael G Flood

No abstract provided.


Food Synergy: The Key To A Healthy Diet, David R. Jacobs Jr, Linda C. Tapsell Jan 2013

Food Synergy: The Key To A Healthy Diet, David R. Jacobs Jr, Linda C. Tapsell

Faculty of Science, Medicine and Health - Papers: part A

Food synergy is the concept that the non-random mixture of food constituents operates in concert for the life of the organism eaten and presumably for the life of the eater. Isolated nutrients have been extensively studied in well-designed, long-term, large randomised clinical trials, typically with null and sometimes with harmful effects. Therefore, although nutrient deficiency is a known phenomenon, serious for the sufferer, and curable by taking the isolated nutrient, the effect of isolated nutrients or other chemicals derived from food on chronic disease, when that chemical is not deficient, may not have the same beneficial effect. It appears that ...


Social Systems In Habitat-Specialist Reef Fishes: Key Concepts In Evolutionary Ecology, Marian Y.L Wong, Peter M. Buston Jan 2013

Social Systems In Habitat-Specialist Reef Fishes: Key Concepts In Evolutionary Ecology, Marian Y.L Wong, Peter M. Buston

Faculty of Science, Medicine and Health - Papers: part A

A major focus in evolutionary ecology lies in explaining the evolution and maintenance of social systems. Although most theoretical formulations of social system evolution were initially inspired by studies of birds, mammals, and insects, incorporating a wider taxonomic perspective is important for testing deeply entrenched theory. Here, we review the contribution of studies of habitat-specialist coral reef fishes to our understanding of the evolutionary ecology of animal social systems. These fishes are ecologically similar but display remarkable variation in mating systems, social organization, and sex allocation strategies. By reviewing recent research, we demonstrate their amenability for experimental testing of key ...


Relations Among Privacy Notions For Signcryption And Key Invisible "Sign-Then-Encrypt", Yang Wang, Mark Manulis, Man Ho Allen Au, Willy Susilo Jan 2013

Relations Among Privacy Notions For Signcryption And Key Invisible "Sign-Then-Encrypt", Yang Wang, Mark Manulis, Man Ho Allen Au, Willy Susilo

Faculty of Engineering and Information Sciences - Papers: Part A

Signcryption simultaneously offers authentication through unforgeability and confidentiality through indistinguishability against chosen ciphertext attacks by combining the functionality of digital signatures and public-key encryption into a single operation. Libert and Quisquater (PKC 2004) extended this set of basic requirements with the notions of ciphertext anonymity (or key privacy) and key invisibility to protect the identities of signcryption users and were able to prove that key invisibility implies ciphertext anonymity by imposing certain conditions on the underlying signcryption scheme.

This paper revisits the relationship amongst privacy notions for signcryption. We prove that key invisibility implies ciphertext anonymity without any additional restrictions ...


Cil Security Proof For A Password-Based Key Exchange, Cristian Ene, Clementine Gritti, Yassine Lakhnech Jan 2013

Cil Security Proof For A Password-Based Key Exchange, Cristian Ene, Clementine Gritti, Yassine Lakhnech

Faculty of Engineering and Information Sciences - Papers: Part A

Computational Indistinguishability Logic (CIL) is a logic for reasoning about cryptographic primitives in computational model. It is sound for standard model, but also supports reasoning in the random oracle and other idealized models. We illustrate the benefits of CIL by formally proving the security of a Password-Based Key Exchange (PBKE) scheme, which is designed to provide entities communicating over a public network and sharing a short password, under a session key.


Anonymous Signcryption Against Linear Related-Key Attacks, Hui Cui, Yi Mu, Man Ho Au Jan 2013

Anonymous Signcryption Against Linear Related-Key Attacks, Hui Cui, Yi Mu, Man Ho Au

Faculty of Engineering and Information Sciences - Papers: Part A

A related-key attack (RKA) occurs when an adversary tampers the private key stored in a cryptographic hardware device and observes the result of the cryptographic primitive under this modified private key. In this paper, we concentrate on the security of anonymous signcryption schemes under related-key attacks, in the sense that a signcryption system should contain no information that identifies the sender of the signcryption and the receiver of the message, and yet be decipherable by the targeted receiver. To achieve this, we consider our anonymous signcryption scheme being semantically secure against chosen ciphertext and related-key attacks (CC-RKA), existentially unforgeable against ...


Public Key Encryption With Keyword Search Secure Against Keyword Guessing Attacks Without Random Oracle, Liming Fang, Willy Susilo, Chunpeng Ge, Jiandong Wang Jan 2013

Public Key Encryption With Keyword Search Secure Against Keyword Guessing Attacks Without Random Oracle, Liming Fang, Willy Susilo, Chunpeng Ge, Jiandong Wang

Faculty of Engineering and Information Sciences - Papers: Part A

The notion of public key encryption with keyword search (PEKS) was put forth by Boneh et al. to enable a server to search from a collection of encrypted emails given a “trapdoor” (i.e., an encrypted keyword) provided by the receiver. The nice property in this scheme allows the server to search for a keyword, given the trapdoor. Hence, the verifier can merely use an untrusted server, which makes this notion very practical. Following Boneh et al.’s work, there have been subsequent works that have been proposed to enhance this notion. Two important notions include the so-called keyword guessing ...


Leakage Resilient Authenticated Key Exchange Secure In The Auxiliary Input Model, Guomin Yang, Yi Mu, Willy Susilo, Duncan S. Wong Jan 2013

Leakage Resilient Authenticated Key Exchange Secure In The Auxiliary Input Model, Guomin Yang, Yi Mu, Willy Susilo, Duncan S. Wong

Faculty of Engineering and Information Sciences - Papers: Part A

Authenticated key exchange (AKE) protocols allow two parties communicating over an insecure network to establish a common secret key. They are among the most widely used cryptographic protocols in practice. In order to resist key-leakage attacks, several leakage resilient AKE protocols have been proposed recently in the bounded leakage model. In this paper, we initiate the study on leakage resilient AKE in the auxiliary input model. A promising way to construct such a protocol is to use a digital signature scheme that is entropically-unforgeable under chosen message and auxiliary input attacks. However, to date we are not aware of any ...


Public-Key Encryption Resilient To Linear Related-Key Attacks, Hui Cui, Yi Mu, Man Ho Au Jan 2013

Public-Key Encryption Resilient To Linear Related-Key Attacks, Hui Cui, Yi Mu, Man Ho Au

Faculty of Engineering and Information Sciences - Papers: Part A

In this paper, we consider the security of public-key encryption schemes under linear related-key attacks, where an adversary is allowed to tamper the private key stored in a hardware device, and subsequently observe the outcome of a public-key encryption system under this modified private key. Following the existing work done in recent years, we define the security model for related-key attack (RKA) secure public-key encryption schemes as chosen-ciphertext and related-key attack (CC-RKA) security, in which we allow an adversary to issue queries to the decryption oracle on the linear shifts of the private keys. On the basis of the adaptive ...


Efficient And Dynamic Key Management For Multiple Identities In Identity-Based Systems, Hua Guo, Chang Xu, Zhoujun Li, Yanqing Yao, Yi Mu Jan 2013

Efficient And Dynamic Key Management For Multiple Identities In Identity-Based Systems, Hua Guo, Chang Xu, Zhoujun Li, Yanqing Yao, Yi Mu

Faculty of Engineering and Information Sciences - Papers: Part A

The traditional identity-based cryptography requires a user, who holds multiple identities, to hold multiple private keys, where each private key is associated with an identity. Managing multiple private/public keys is a heavy burden to a user due to key management and storage. The recent advancement of identity-based cryptography allow a single private key to map multiple public keys (identities); therefore the private key management is simplified. Unfortunately, the existing schemes capturing this feature do not allow dynamic changes of identities and have a large data size proportional to the number of the associated identities. To overcome these problems, in ...


Key Issues Effecting Field Researcher Safety: A Reflexive Commentary, Michael Roguski, Juan M. Tauri Jan 2013

Key Issues Effecting Field Researcher Safety: A Reflexive Commentary, Michael Roguski, Juan M. Tauri

Faculty of Social Sciences - Papers

This article raises concerns about the, arguably, obscure position the issue of field researcher safety holds in our training curricula, supervision processes and across our research communities. A variety of discursive tensions are discussed as preventing a full realisation of researcher safety as a significant issue for social research practitioners. These tensions include the impact of privileging violence over the wide range of risks inherent in researching the social context, the ideological construction of the intrepid researcher as someone who bravely enters the field, often without an understanding of the environment or cognisant of potential risks; thus relying on a ...