Search results for: identity and access management
13535 Defending Motherhood: Strategic Comparisons and the Management of Moral Self-Worth among Ex-Offender Mothers
Authors: Geniece Mondé
Abstract:
This article examines how formerly incarcerated mothers deploy strategic comparisons to support their claims of moral self-worth. In depth interviews with 69 ex-offender mothers show that although women occupy a morally ambiguous space, they frame their roles as “good” mothers as independent of past illegal activity. In substantiating the “good” mother narrative women draw comparisons with two groups of women. Some respondents identify individuals perceived as morally disadvantaged and draw comparisons that illustrate their comparative strength in relation to mothers who fail to adequately meet the needs of their children. Women also compared themselves to morally advantaged mothers and expressed a desire to embody the ideals and values of women they viewed as superior mothers. Findings reveal that respondents’ use of strategic comparisons substantiates their framing of personal moral identity, as well as their goals for the future. The paper concludes by examining the theoretical implications of strategic comparisons for the study of morality and identity construction.Keywords: Ex-Offender, Rehabilitation, Incarceration, Motherhood
Procedia PDF Downloads 13913534 Exploring Data Stewardship in Fog Networking Using Blockchain Algorithm
Authors: Ruvaitha Banu, Amaladhithyan Krishnamoorthy
Abstract:
IoT networks today solve various consumer problems, from home automation systems to aiding in driving autonomous vehicles with the exploration of multiple devices. For example, in an autonomous vehicle environment, multiple sensors are available on roads to monitor weather and road conditions and interact with each other to aid the vehicle in reaching its destination safely and timely. IoT systems are predominantly dependent on the cloud environment for data storage, and computing needs that result in latency problems. With the advent of Fog networks, some of this storage and computing is pushed to the edge/fog nodes, saving the network bandwidth and reducing the latency proportionally. Managing the data stored in these fog nodes becomes crucial as it might also store sensitive information required for a certain application. Data management in fog nodes is strenuous because Fog networks are dynamic in terms of their availability and hardware capability. It becomes more challenging when the nodes in the network also live a short span, detaching and joining frequently. When an end-user or Fog Node wants to access, read, or write data stored in another Fog Node, then a new protocol becomes necessary to access/manage the data stored in the fog devices as a conventional static way of managing the data doesn’t work in Fog Networks. The proposed solution discusses a protocol that acts by defining sensitivity levels for the data being written and read. Additionally, a distinct data distribution and replication model among the Fog nodes is established to decentralize the access mechanism. In this paper, the proposed model implements stewardship towards the data stored in the Fog node using the application of Reinforcement Learning so that access to the data is determined dynamically based on the requests.Keywords: IoT, fog networks, data stewardship, dynamic access policy
Procedia PDF Downloads 5913533 BTG-BIBA: A Flexibility-Enhanced Biba Model Using BTG Strategies for Operating System
Authors: Gang Liu, Can Wang, Runnan Zhang, Quan Wang, Huimin Song, Shaomin Ji
Abstract:
Biba model can protect information integrity but might deny various non-malicious access requests of the subjects, thereby decreasing the availability in the system. Therefore, a mechanism that allows exceptional access control is needed. Break the Glass (BTG) strategies refer an efficient means for extending the access rights of users in exceptional cases. These strategies help to prevent a system from stagnation. An approach is presented in this work for integrating Break the Glass strategies into the Biba model. This research proposes a model, BTG-Biba, which provides both an original Biba model used in normal situations and a mechanism used in emergency situations. The proposed model is context aware, can implement a fine-grained type of access control and primarily solves cross-domain access problems. Finally, the flexibility and availability improvement with the use of the proposed model is illustrated.Keywords: Biba model, break the glass, context, cross-domain, fine-grained
Procedia PDF Downloads 54213532 AI-Based Information System for Hygiene and Safety Management of Shared Kitchens
Authors: Jongtae Rhee, Sangkwon Han, Seungbin Ji, Junhyeong Park, Byeonghun Kim, Taekyung Kim, Byeonghyeon Jeon, Jiwoo Yang
Abstract:
The shared kitchen is a concept that transfers the value of the sharing economy to the kitchen. It is a type of kitchen equipped with cooking facilities that allows multiple companies or chefs to share time and space and use it jointly. These shared kitchens provide economic benefits and convenience, such as reduced investment costs and rent, but also increase the risk of safety management, such as cross-contamination of food ingredients. Therefore, to manage the safety of food ingredients and finished products in a shared kitchen where several entities jointly use the kitchen and handle various types of food ingredients, it is critical to manage followings: the freshness of food ingredients, user hygiene and safety and cross-contamination of cooking equipment and facilities. In this study, it propose a machine learning-based system for hygiene safety and cross-contamination management, which are highly difficult to manage. User clothing management and user access management, which are most relevant to the hygiene and safety of shared kitchens, are solved through machine learning-based methodology, and cutting board usage management, which is most relevant to cross-contamination management, is implemented as an integrated safety management system based on artificial intelligence. First, to prevent cross-contamination of food ingredients, we use images collected through a real-time camera to determine whether the food ingredients match a given cutting board based on a real-time object detection model, YOLO v7. To manage the hygiene of user clothing, we use a camera-based facial recognition model to recognize the user, and real-time object detection model to determine whether a sanitary hat and mask are worn. In addition, to manage access for users qualified to enter the shared kitchen, we utilize machine learning based signature recognition module. By comparing the pairwise distance between the contract signature and the signature at the time of entrance to the shared kitchen, access permission is determined through a pre-trained signature verification model. These machine learning-based safety management tasks are integrated into a single information system, and each result is managed in an integrated database. Through this, users are warned of safety dangers through the tablet PC installed in the shared kitchen, and managers can track the cause of the sanitary and safety accidents. As a result of system integration analysis, real-time safety management services can be continuously provided by artificial intelligence, and machine learning-based methodologies are used for integrated safety management of shared kitchens that allows dynamic contracts among various users. By solving this problem, we were able to secure the feasibility and safety of the shared kitchen business.Keywords: artificial intelligence, food safety, information system, safety management, shared kitchen
Procedia PDF Downloads 6913531 E-Hailing Taxi Industry Management Mode Innovation Based on the Credit Evaluation
Authors: Yuan-lin Liu, Ye Li, Tian Xia
Abstract:
There are some shortcomings in Chinese existing taxi management modes. This paper suggests to establish the third-party comprehensive information management platform and put forward an evaluation model based on credit. Four indicators are used to evaluate the drivers’ credit, they are passengers’ evaluation score, driving behavior evaluation, drivers’ average bad record number, and personal credit score. A weighted clustering method is used to achieve credit level evaluation for taxi drivers. The management of taxi industry is based on the credit level, while the grade of the drivers is accorded to their credit rating. Credit rating determines the cost, income levels, the market access, useful period of license and the level of wage and bonus, as well as violation fine. These methods can make the credit evaluation effective. In conclusion, more credit data will help to set up a more accurate and detailed classification standard library.Keywords: credit, mobile internet, e-hailing taxi, management mode, weighted cluster
Procedia PDF Downloads 32513530 Channels Splitting Strategy for Optical Local Area Networks of Passive Star Topology
Authors: Peristera Baziana
Abstract:
In this paper, we present a network configuration for a WDM LANs of passive star topology that assume that the set of data WDM channels is split into two separate sets of channels, with different access rights over them. Especially, a synchronous transmission WDMA access algorithm is adopted in order to increase the probability of successful transmission over the data channels and consequently to reduce the probability of data packets transmission cancellation in order to avoid the data channels collisions. Thus, a control pre-transmission access scheme is followed over a separate control channel. An analytical Markovian model is studied and the average throughput is mathematically derived. The performance is studied for several numbers of data channels and various values of control phase duration.Keywords: access algorithm, channels division, collisions avoidance, wavelength division multiplexing
Procedia PDF Downloads 29613529 A New Bound on the Average Information Ratio of Perfect Secret-Sharing Schemes for Access Structures Based on Bipartite Graphs of Larger Girth
Authors: Hui-Chuan Lu
Abstract:
In a perfect secret-sharing scheme, a dealer distributes a secret among a set of participants in such a way that only qualified subsets of participants can recover the secret and the joint share of the participants in any unqualified subset is statistically independent of the secret. The access structure of the scheme refers to the collection of all qualified subsets. In a graph-based access structures, each vertex of a graph G represents a participant and each edge of G represents a minimal qualified subset. The average information ratio of a perfect secret-sharing scheme realizing a given access structure is the ratio of the average length of the shares given to the participants to the length of the secret. The infimum of the average information ratio of all possible perfect secret-sharing schemes realizing an access structure is called the optimal average information ratio of that access structure. We study the optimal average information ratio of the access structures based on bipartite graphs. Based on some previous results, we give a bound on the optimal average information ratio for all bipartite graphs of girth at least six. This bound is the best possible for some classes of bipartite graphs using our approach.Keywords: secret-sharing scheme, average information ratio, star covering, deduction, core cluster
Procedia PDF Downloads 36213528 "Black Book": Dutch Prototype or Jewish Outsider
Authors: Eyal Boers
Abstract:
This paper shall demonstrate how films can offer a valuable and innovative approach to the study of images, stereotypes, and national identity. "Black Book" ("Zwartboek", 2006), a World War Two film directed by Paul Verhoeven, tells the story of Rachel Stein, a young Jewish woman who becomes a member of a resistance group in the Netherlands. The main hypothesis in this paper maintains that Rachel's character possesses both features of the Dutch prototype (a white, secular, sexual, freedom-loving individualist who seems "Dutch" enough to be accepted into a Dutch resistance group and even infiltrate the local Nazi headquarters) and features which can be defined as specifically Jewish (a black-haired victim persecuted by the Nazis, transforming herself into a gentile, while remaining loyal to her fellow Jews and ultimately immigrating to Israel and becoming a Hebrew teacher in a Kibbutz). Finally, this paper claims that Rachel's "Dutchness" is symptomatic of Dutch nostalgia in the 21st century for the Jews as "others" who blend into dominant Dutch culture, while Rachel's "Jewish Otherness" reflects a transnational identity – one that is always shifting and traverses cultural and national boundaries. In this sense, a film about Dutch Jews in the Second World War reflects on issues of identity in the 21st Century.Keywords: Dutch, film, stereotypes, identity
Procedia PDF Downloads 12813527 Using LTE-Sim in New Hanover Decision Algorithm for 2-Tier Macrocell-Femtocell LTE Network
Authors: Umar D. M., Aminu A. M., Izaddeen K. Y.
Abstract:
Deployments of mini macrocell base stations also referred to as femtocells, improve the quality of service of indoor and outdoor users. Nevertheless, mobility management remains a key issue with regards to their deployment. This paper is leaned towards this issue, with an in-depth focus on the most important aspect of mobility management -handover. In handover management, making a handover decision in the LTE two-tier macrocell femtocell network is a crucial research area. Decision algorithms in this research are classified and comparatively analyzed according to received signal strength, user equipment speed, cost function, and interference. However, it was observed that most of the discussed decision algorithms fail to consider cell selection with hybrid access policy in a single macrocell multiple femtocell scenario, another observation was a majority of these algorithms lack the incorporation of user equipment residence parameter. Not including this parameter boosts the number of unnecessary handover occurrence. To deal with these issues, a sophisticated handover decision algorithm is proposed. The proposed algorithm considers the user’s velocity, received signal strength, residence time, as well as the femtocell base station’s access policy. Simulation results have shown that the proposed algorithm reduces the number of unnecessary handovers when compared to conventional received signal strength-based handover decision algorithm.Keywords: user-equipment, radio signal service, long term evolution, mobility management, handoff
Procedia PDF Downloads 12513526 An Intergenerational Study of Iranian Migrant Families in Australia: Exploring Language, Identity, and Acculturation
Authors: Alireza Fard Kashani
Abstract:
This study reports on the experiences and attitudes of six Iranian migrant families, from two groups of asylum seekers and skilled workers, with regard to their language, identity, and acculturation in Australia. The participants included first generation parents and 1.5-generation adolescents, who had lived in Australia for a minimum of three years. For this investigation, Mendoza’s (1984, 2016) acculturation model, as well as poststructuralist views of identity, were employed. The semi-structured interview results have highlighted that Iranian parents and adolescents face low degrees of intergenerational conflicts in most domains of their acculturation. However, the structural and lawful patterns in Australia have caused some internal conflicts for the parents, especially fathers (e.g., their power status within the family or their children’s freedom). Furthermore, while most participants reported ‘cultural eclecticism’ as their preferred acculturation orientation, female participants seemed to be more eclectic than their male counterparts who showed inclination towards keeping more aspects of their home culture. This finding, however, highlights a meaningful effort on the part of husbands that in order to make their married lives continue well in Australia they need to re-consider the traditional male-dominated customs they used to have in Iran. As for identity, not only the parents but also the adolescents proudly identified themselves as Persians. In addition, with respect to linguistic behaviour, almost all adolescents showed enthusiasm to retain the Persian language at home to be able to maintain contacts with their relatives and friends in Iran and to enjoy many other benefits the language may offer them in the future.Keywords: acculturation, asylum seekers, identity, intergenerational conflicts, language, skilled workers, 1.5 generation
Procedia PDF Downloads 23913525 Narrative Identity Predicts Borderline Personality Disorder Features in Inpatient Adolescents up to Six Months after Admission
Authors: Majse Lind, Carla Sharp, Salome Vanwoerden
Abstract:
Narrative identity is the dynamic and evolving story individuals create about their personal pasts, presents, and presumed futures. This storied sense of self develops in adolescence and is crucial for fostering a sense of self-unity and purpose in life. A growing body of work has shown that several characteristics of narrative identity are disturbed in adults suffering from borderline personality disorder (BPD). Very little research, however, has explored the stories told by adolescents with BPD features. Investigating narrative identity early in the lifespan and in relation to personality pathology is crucial; BPD is a developmental disorder with early signs appearing already in adolescence. In the current study, we examine narrative identity (focusing on themes of agency and communion) coded from self-defining memories derived from the child attachment interview in 174 inpatient adolescents (M = 15.12, SD = 1.52) at the time of admission. The adolescents’ social cognition was further assessed on the basis of their reactions to movie scenes (i.e., the MASC movie task). They also completed a trauma checklist and self-reported BPD features at three different time points (i.e., at admission, at discharge, and 6 months after admission). Preliminary results show that adolescents who told stories containing themes of agency and communion evinced better social cognition, and lower emotional abuse on the trauma checklist. In addition, adolescents who disclosed stories containing lower levels of agency and communion demonstrated more BPD symptoms at all three time points, even when controlling for the occurrence of traumatic life events. Surprisingly, social cognitive abilities were not significantly associated with BPD features. These preliminary results underscore the importance of narrative identity as an indicator, and potential cause, of incipient personality pathology. Thus, focusing on diminished themes of narrative-based agency and communion in early adolescence could be crucial in preventing the development of personality pathology over time.Keywords: borderline personality disorder, inpatient adolescents, narrative identity, follow-ups
Procedia PDF Downloads 15713524 ACBM: Attention-Based CNN and Bi-LSTM Model for Continuous Identity Authentication
Authors: Rui Mao, Heming Ji, Xiaoyu Wang
Abstract:
Keystroke dynamics are widely used in identity recognition. It has the advantage that the individual typing rhythm is difficult to imitate. It also supports continuous authentication through the keyboard without extra devices. The existing keystroke dynamics authentication methods based on machine learning have a drawback in supporting relatively complex scenarios with massive data. There are drawbacks to both feature extraction and model optimization in these methods. To overcome the above weakness, an authentication model of keystroke dynamics based on deep learning is proposed. The model uses feature vectors formed by keystroke content and keystroke time. It ensures efficient continuous authentication by cooperating attention mechanisms with the combination of CNN and Bi-LSTM. The model has been tested with Open Data Buffalo dataset, and the result shows that the FRR is 3.09%, FAR is 3.03%, and EER is 4.23%. This proves that the model is efficient and accurate on continuous authentication.Keywords: keystroke dynamics, identity authentication, deep learning, CNN, LSTM
Procedia PDF Downloads 15613523 Energy Saving as a Mean to Increase Energy Access in Sub-Saharan Africa
Authors: Joseph Levodo, Ndimbarafine Young Tobin, E. Messina, P. Edouma
Abstract:
Energy efficiency can contribute significantly towards increasing clean energy access to modern energy services. Many developing countries have largely focused on expanding energy access by increasing supply. This is due to the fact the links between energy efficiency and clean energy access are often unnoticed. Energy efficiency measures offer the promise of reducing energy use and saving money on electricity bills, as well as reducing negative environmental externalities associated with the production of electricity. This paper seeks to address the economic and effectiveness of reducing energy consumption by integrating energy efficiency as a priority to meet energy access examines the barriers to energy efficient in sub-Saharan African countries. The findings from this study reveal that an appropriate policy can promote the development of more energy-efficient buildings, products and strengthen incentives for consumers, businesses, and industrial customers to pursue cost-effective energy-efficiency measures and to make investments that will provide future energy-efficiency improvements.Keywords: barriers, Sub-Saharan Africa, cost effective, energy savings, clean energy
Procedia PDF Downloads 5113522 Digital Demands: Addressing the Digital Divide in Basic Education and Its Relation to Academic Performance and Aspirations
Authors: Jose Rodrigo Zubiri, Sofia Carmen Tomacruz
Abstract:
Amidst an increasingly digitalized society, information and communication technologies have been seamlessly integrated into the economic, social, and political life of individuals. Information has been regarded as a primary good, essential to the wellbeing and self-respect of individuals in society. The digital engagements of an individual play a key role in a variety of life outcomes ranging from academic performance to entrepreneurial success to health service uptake. As a result of varying degrees of access to the Internet and ICTs across populations and individuals, a digital divide emerges. Education, a sector pivotal to directing individual life trajectories, has been radically transformed with regards to the learning process and access to information and thus faces the implications of the digital divide, as new waves of inequalities are introduced in the classroom. As the period of basic education is critical to transitioning into civic life or higher education, digital inequalities are capable of aggravating pre-existing social inequalities. Through survey-questionnaires, conducted on 152 high school students from a Philippine public school, the study reveals the correlation of academic performance and aspirations (for their highest academic qualification) to access to digital technologies and the Internet, according to Van Dijk’s four measurements of digital poverty, namely: motivational access, material access, skills access, and usage access. The findings reveal a positive correlation for academic performance whereas no correlation was found between aspirations and digital access. In the study, significant correlational differences were also found between genders, specifically, in terms of skills access and academic performance.Keywords: digital divide, ICTs, inequality, education, life trajectories
Procedia PDF Downloads 26913521 Disclosing a Patriarchal Society: A Socio-Legal Study on the Indigenous Women's Involvement in Natural Resources Management in Kasepuhan Cirompang
Authors: Irena Lucy Ishimora, Eva Maria Putri Salsabila
Abstract:
The constellation on Indonesian Legal System that varies shows a structural injustice – as a result of patriarchy – exists from the biggest range as a country to the smallest such as a family. Women in their lives, carry out excessive responsibilities in the community. However, the unequal positions between men and women in the society restrain women to fulfill their constructed role. Therefore, increasing the chance for women to become the victim of structural injustice. The lack of authority given to women and its effects can be seen through a case study of the Cirompang Indigenous Women’s involvement in natural resources management. The decision to make the Mount Halimun-Salak as a National Park and the expansion itself did not involve nor consider the existence of indigenous people (Kasepuhan Ciromopang) – especially the women’s experience regarding natural resources management – has been significantly impacting the fulfillment of the indigenous women’s rights. Moreover, the adat law that still reflects patriarchy, made matters worse because women are restricted from expressing their opinion. The writers explored the experience of Cirompang indigenous women through in-depth interviews with them and analyzed it with several theories such as ecofeminism, woman’s access to land and legal pluralism. This paper is important to show how the decision and expansion of the National Park reduced the rights of access to land, natural resources, expressing an opinion, and participating in development. Reflecting on the Cirompang Indigenous Women’s conditions on natural resources management, this paper aims to present the implications of the regulations that do not acknowledge Indigenous women’s experience and the proposed solutions. First, there should be an integration between the law regarding indigenous people and traditional rights in a regulation to align the understanding of indigenous people and their rights. Secondly, Indonesia as a country that’s rich with diversity should ratify the ILO Convention no 169 to reaffirm the protection of Indigenous people’s rights. Last, considering the position of indigenous women that still experienced unjustness in the community, the government and NGOs must collaborate to provide adequate assistance for them.Keywords: Cirompang indigenous women, indigenous women’s rights, structural injustice, women access to land
Procedia PDF Downloads 21413520 Identify Users Behavior from Mobile Web Access Logs Using Automated Log Analyzer
Authors: Bharat P. Modi, Jayesh M. Patel
Abstract:
Mobile Internet is acting as a major source of data. As the number of web pages continues to grow the Mobile web provides the data miners with just the right ingredients for extracting information. In order to cater to this growing need, a special term called Mobile Web mining was coined. Mobile Web mining makes use of data mining techniques and deciphers potentially useful information from web data. Web Usage mining deals with understanding the behavior of users by making use of Mobile Web Access Logs that are generated on the server while the user is accessing the website. A Web access log comprises of various entries like the name of the user, his IP address, a number of bytes transferred time-stamp etc. A variety of Log Analyzer tools exists which help in analyzing various things like users navigational pattern, the part of the website the users are mostly interested in etc. The present paper makes use of such log analyzer tool called Mobile Web Log Expert for ascertaining the behavior of users who access an astrology website. It also provides a comparative study between a few log analyzer tools available.Keywords: mobile web access logs, web usage mining, web server, log analyzer
Procedia PDF Downloads 36213519 The Impact of Resettlement Challenges in Seeking Employment on the Mental Health and Well-Being of African Refugee Youth in South Australia
Authors: Elvis Munyoka
Abstract:
While the number of African refugees settling in Australia has significantly increased since the mid-1990s, the marginalisation and exclusion of young people from refugee backgrounds in employment remain a critical challenge. Unemployment or underemployment can negatively impact refugees in multiple areas, such as income, housing, life satisfaction, and social status. Higher rates of unemployment among refugees are linked in part to the intersection of pre-migration and daily challenges like trauma, racism, gender identity, and English language competency, all of which generate multiple employability disadvantages. However, the intersection of gender, race, social class, and age in impacting African refugee youth’s access to employment has received less attention. Using a qualitative case study approach, the presentation will explore how gender, race, social class, and age influence African refugee youth graduates’ access to employment in South Australia. The intersectionality theory and capability approach to social justice is used to explore intersecting factors impacting African refugee youth’s access to employment in South Australia. Participants were 16 African refugee graduates aged 18-30 living in South Australia who took part in the study for one year. Based on the trends in the data, the results suggest that long-term unemployment and underemployment, coupled with ongoing racism and marginalisation, have the potential to make refugees more vulnerable to several mental disorders such as depression, hopelessness, and suicidal thoughts. The analysis also reveals that resettlement challenges may limit refugees’ ability to recover from pre-migration trauma. The impact of resettlement challenges on refugee mental health highlights the need for comprehensive policy interventions to address the barriers refugees face in finding employment in resettlement communities. With African refugees constituting such an important part of Australian society, they should have equal access to meaningful employment, as decent work promotes good mental health, successful resettlement, hope, and self-sufficiency.Keywords: African refugees, employment, mental health, Australia, underemployment
Procedia PDF Downloads 10213518 The Impact of the Economic Crisis in the European Identity
Authors: Sofía Luna, Carla González Salamanca
Abstract:
The 2008 economic crisis had huge implications in Europe. In this continent, the repercussions of the crisis were not only economic but also political and institutional. The economic stress has generated changes in the perception of the citizens, their attitude and the confidence placed in the political organizations. The lost of confidence is not only present in the debtor countries but it is also present in the European economic powers like Germany and France. This research explains how the economic crisis had an impact in the identity, population’s attitude and how this generated the rise of extreme right parties. In addition, it defines the different types of attitudes and support that exist towards these political and economic institutions. The results of this investigation show that the depression beside of its economic implications, it caused institutional, social and political difficulties for the Union. Moreover, the support and attitudes of the population were severely strained because the confidence in the political organization decreased. Furthermore, a rise in the otherness sentiment was shown. In other words, the distinction between “us” and “them” increased causing repercussions in the collective European identity. Additionally, there was a spread in national identities that caused the rise of the extreme right wing parties. In conclusion, the 2008 economic crisis caused not only economic stress but also it generated a political, social and institutional crisis in Europe.Keywords: Europe, identity, economic crisis, otherness sentiment
Procedia PDF Downloads 49813517 Walls, Barriers, and Fences to Informal Political Economy of Land Resource Accesses: A Case of Banyabunagana Along with Uganda–Congo Border, South Western Uganda, Kisoro District
Authors: Niringiye Fred
Abstract:
Banyabunagana has always had access to land resources for grazing animals, sand mining, and farmland across the border in the Democratic Republic of Congo during the pre-colonial and colonial times, usually on an informal arrangement facilitated by kinship ties and rent transactions for these resources. However, in recent periods, the government of the Democratic Republic of the Congo (DRC) has been pursuing a policy of constructing barriers such as walls and fences so that Banyabunagana communities do not access the land on the DRC side of the border. This is happening in the background of increased and intensified demand for land use on the side of the Ugandan community. This paper will attempt to discuss the reasons behind the construction of walls, fences, and other barriers which deny access to land for Banyabunagana communities in Bunagana Parish, Muramba Sub-county- Kisoro district, Uganda. The research will attempt to answer the following main questions, among others, whether there are the factors that explain the construction of walls and fences which could limit or deny access to the informal use of land and other resources and whether policy options to ensure continued access to land and other resources for local communities.Keywords: border, walls, fences, land resource access
Procedia PDF Downloads 12613516 The Impact of Resettlement Challenges in Seeking Employment on the Mental Health and Well-Being of African Refugee Youth in South Australia
Authors: Elvis Munyoka
Abstract:
While the number of African refugees settling in Australia has significantly increased since the mid-1990s, the marginalisation and exclusion of young people from refugee backgrounds in employment remain a critical challenge. Unemployment or underemployment can negatively impact refugees in multiple areas, such as income, housing, life satisfaction, and social status. Higher rates of unemployment among refugees are linked in part to the intersection of pre-migration and daily challenges like trauma, racism, gender identity, and English language competency, all of which generate multiple employability disadvantages. However, the intersection of gender, race, social class, and age in impacting African refugee youth’s access to employment has received less attention. Using a qualitative case study approach, the paper will explore how gender, race, social class, and age influence African refugee youth graduates’ access to employment in South Australia. The intersectionality theory and capability approach to social justice is used to explore intersecting factors impacting African refugee youth’s access to employment in South Australia. Participants were 16 African refugee graduates aged 18-30 living in South Australia who took part in the study for one year. Based on the trends in the data, the results suggest that long-term unemployment and underemployment, coupled with ongoing racism and marginalisation, have the potential to make refugees more vulnerable to several mental disorders such as depression, hopelessness, and suicidal thoughts. The analysis also reveals that resettlement challenges may limit refugees’ ability to recover from pre-migration trauma. The impact of resettlement challenges on refugee mental health highlights the need for comprehensive policy interventions to address the barriers refugees face in finding employment in resettlement communities. With African refugees constituting such an important part of Australian society, they should have equal access to meaningful employment, as decent work promotes good mental health, successful resettlement, hope, and self-sufficiency.Keywords: African refugee youth, mental health, employment, resettlement, racism
Procedia PDF Downloads 6913515 The Innovation of English Materials to Communicate the Identity of Bangpoo, Samut Prakan Province, for Ecotourism
Authors: Kitda Praraththajariya
Abstract:
The main purpose of this research was to study how to communicate the identity of the Mueang district, SamutSongkram province for ecotourism. The qualitative data was collected through studying related materials, exploring the area, in-depth interviews with three groups of people: three directly responsible officers who were key informants of the district, twenty foreign tourists and five Thai tourist guides. A content analysis was used to analyze the qualitative data. The two main findings of the study were as follows: (1) The identity of Amphur (District) Mueang, SamutSongkram province. This establishment was near the Mouth of Maekong River for normal people and tourists, consisting of rest accommodations. There are restaurants where food and drinks are served, rich mangrove forests, Hoy Lod (Razor Clam) and mangrove trees. Don Hoy Lod, is characterized by muddy beaches, is a coastal wetland for Ramsar Site. It is at 1099th ranging where the greatest number of Hoy Lod (Razor Clam) can be seen from March to May each year. (2) The communication of the identity of AmphurMueang, SamutSongkram province which the researcher could find and design to present in English materials can be summed up in 4 items: 1) The history of AmphurMueang, SamutSongkram province 2) WatPhetSamutWorrawihan 3) The Learning source of Ecotourism: Don Hoy Lod and Mangrove forest 4) How to keep AmphurMueang, SamutSongkram province for ecotourism.Keywords: foreigner tourists, signified, semiotics, ecotourism
Procedia PDF Downloads 30413514 The Green Propaganda: Paradoxes of Costa Rica as the Poster Child for Sustainable Tourism
Authors: Maria Jose Ramos Villagra
Abstract:
Since the boom of tourism in the late 80s and 90s, Costa Rica is considered as one of the leading countries for tourism. The size and geography of its territory, its low population density, and its image of being one of the most stable Latin American democracies make Costa Rica an attractive and safe target for foreign investors. Land ownership by foreign investors has increased as the natural resources in rural communities have been exhausted. When nature becomes an instrument to increase profit, it loses its communal value contributing to local communities losing their sovereignty and access to basic resources. The rural regions in proximity to the most tourist areas are often the most marginalized. The purpose of this research is to use the case of the rural community Sardinal and its struggle to protect its aquifer to investigate the economic and cultural consequences of the tourism boom in Costa Rican rural communities. The process of reclaiming the access to and the preservation of the aquifer enabled individuals to redefine their political views and their political power. The case of Sardinal broke the stereotypes about rural individuals and their ability to politically educate themselves and organize. Sardinal´s conflict brought to light the necessity of questioning the role of modern tourism as part of Costa Rica’s national identity, and as a tool for developmentKeywords: Costa Rica, tourism, rural development, economy, ecotourism, environment, water, Sardinal
Procedia PDF Downloads 47313513 The Probability of Smallholder Broiler Chicken Farmers' Participation in the Mainstream Market within Maseru District in Lesotho
Authors: L. E. Mphahama, A. Mushunje, A. Taruvinga
Abstract:
Although broiler production does not generate any large incomes among the smallholder community, it represents the main source of livelihood and part of nutritional requirement. As a result, market for broiler meat is growing faster than that of any other meat products and is projected to continue growing in the coming decades. However, the implication is that a multitude of factors manipulates transformation of smallholder broiler farmers participating in the mainstream markets. From 217 smallholder broiler farmers, socio-economic and institutional factors in broiler farming were incorporated into Binary model to estimate the probability of broiler farmers’ participation in the mainstream markets within the Maseru district in Lesotho. Of the thirteen (13) predictor variables fitted into the model, six (6) variables (household size, number of years in broiler business, stock size, access to transport, access to extension services and access to market information) had significant coefficients while seven (7) variables (level of education, marital status, price of broilers, poultry association, access to contract, access to credit and access to storage) did not have a significant impact. It is recommended that smallholder broiler farmers organize themselves into cooperatives which will act as a vehicle through which they can access contracts and formal markets. These cooperatives will also enable easy training and workshops for broiler rearing and marketing/markets through extension visits.Keywords: broiler chicken, mainstream market, Maseru district, participation, smallholder farmers
Procedia PDF Downloads 15213512 What Is the Matter of Identity to Leadership Behavior: Leader-Subordinate Relational Identity and Paternalistic Leadership
Authors: Sung-Chun Tsai, Li-Fang Chou, Chun-Jung Tseng
Abstract:
How relational identity of leader-subordinate relationship affects behavior of both parties is getting more and more attentions in recent years. Different from past studies on leader-subordinate relationship taking viewpoint of self-concept or interaction between categories, we took perspective of social cognitive schema with special focus on the cognition structure and category content of the vertical leader-subordinate relationship. This study firstly clarified the dimensions and contents of cognitive structure of vertical leader-subordinate relationship. By using two dimensions of “equal/unequal” and “close/distant”, the contents of the leader-subordinate relational identity (LSRI) are classified into four categories: communal affection RI (equal and close), instrumental exchange RI (equal but distant), care-repay RI (unequal but close), and authority-obedience RI (unequal and distant). Furthermore, according to the four dimensions of leader-subordinate relational identity, we explored: (1) how a leader’s LSRI leads to paternalistic leadership; and (2) how paternalistic leadership affects subordinate’s LSRI. Using 59 work group as sample (59 leaders and 251 subordinates), the results of HLM and regression analysis showed: (1) leader’s LSRI significantly affects leadership behavior: instrumental exchange RI is positively relates to authoritarian leadership behavior, but significantly has negative relationship with benevolent leadership; care-repay RI has significantly positive relationship with authoritative leadership; authority-obedience RI has significantly positive relationship with authoritarian leadership; (2) paternalistic leadership is significantly related to subordinates’ LSRI: benevolent leadership is positively related to subordinate’s communal affection and care-repay RI; authoritative leadership has significantly positive relationship with care-repay and authority-obedience RI; authoritarian leadership has significantly positive relationship with subordinate’s instrumental exchange RI. Finally, the main findings, contributions and limits, future research directions, and implications were also discussed.Keywords: relational identity, leader-subordinate relational identity (LSRI), relational schema, paternalistic leadership
Procedia PDF Downloads 55213511 Transformation of the Institutionality of International Cooperation in Ecuador from 2007 to 2017: 2017: A Case of State Identity Affirmation through Role Performance
Authors: Natalia Carolina Encalada Castillo
Abstract:
As part of an intended radical policy change compared to former administrations in Ecuador, the transformation of the institutionality of international cooperation during the period of President Rafael Correa was considered as a key element for the construction of the state of 'Good Living'. This intention led to several regulatory changes in the reception of cooperation for development, and even the departure of some foreign cooperation agencies. Moreover, Ecuador launched the initiative to become a donor of cooperation towards other developing countries through the ‘South-South Cooperation’ approach. All these changes were institutionalized through the Ecuadorian System of International Cooperation as a new framework to establish rules and policies that guarantee a sovereign management of foreign aid. Therefore, this research project has been guided by two questions: What were the factors that motivated the transformation of the institutionality of international cooperation in Ecuador from 2007 to 2017? and, what were the implications of this transformation in terms of the international role of the country? This paper seeks to answer these questions through Role Theory within a Constructivist meta-theoretical perspective, considering that in this case, changes at the institutional level in the field of cooperation, responded not only to material motivations but also to interests built on the basis of a specific state identity. The latter was only possible to affirm through specific roles such as ‘sovereign recipient of cooperation’ as well as ‘donor of international cooperation’. However, the performance of these roles was problematic as they were not easily accepted by the other actors in the international arena or in the domestic level. In terms of methodology, these dynamics are analyzed in a qualitative way mainly through interpretive analysis of the discourse of high-level decision-makers from Ecuador and other cooperation actors. Complementary to this, document-based research of relevant information as well as interviews have been conducted. Finally, it is concluded that even if material factors such as infrastructure needs, trade and investment interests, as well as reinforcement of state control and monitoring of cooperation flows, motivated the institutional transformation of international cooperation in Ecuador; the essential basis of these changes was the search for a new identity for the country to be projected in the international arena. This identity started to be built but continues to be unstable. Therefore, it is important to potentiate the achievements of the new international cooperation policies, and review their weaknesses, so that non-reimbursable cooperation funds received as well as ‘South-South cooperation’ actions, contribute effectively to national objectives.Keywords: Ecuador, international cooperation, Role Theory, state identity
Procedia PDF Downloads 21313510 Academic Staff Identity and Emotional Labour: Exploring Pride, Motivation, and Relationships in Universities
Authors: Keith Schofield, Garry R. Prentice
Abstract:
The perceptions of the work an academic does, and the environment in which they do it, contributes to the professional identity of that academic. In turn, this has implications for the level of involvement they have in their job, their satisfaction, and their work product. This research explores academic identities in British and Irish institutions and considers the complex interplay between identity, practice, and participation. Theoretical assumptions made in this paper assert that meaningful work has positive effects on work pride, organisational commitment, organisational citizenship, and motivation; when employees participate enthusiastically they are likely to be more engaged, more successful, and more satisfied. Further examination is given to the context in which this participation happens; the nature of institutional process, management, and relationships with colleagues, team members, and students is considered. The present study follows a mixed-methods approach to explore work satisfaction constructs in a number of academic contexts in the UK and Ireland. The quantitative component of this research (Convenience Sample: 155 academics, and support/ administrative staff; 36.1% male, 63.9% female; 60.8% academic staff, 39.2% support/ administration staff; across a number of universities in the UK and Ireland) was based on an established emotional labour model and was tested across gender groups, job roles, and years of service. This was complimented by qualitative semi-structured interviews (Purposive Sample: 10 academics, and 5 support/ administrative staff across the same universities in the UK and Ireland) to examine various themes including values within academia, work conditions, professional development, and transmission of knowledge to students. Experiences from both academic and support perspectives were sought in order to gain a holistic view of academia and to provide an opportunity to explore the dynamic of the academic/administrator relationship within the broader institutional context. The quantitative emotional labour model, tested via a path analysis, provided a robust description of the relationships within the data. The significant relationships found within the quantitative emotional labour model included a link between non-expression of true feelings resulting in emotional labourious work and lower levels of intrinsic motivation and higher levels of extrinsic motivation. Higher levels of intrinsic motivation also linked positively to work pride. These findings were further explored in the qualitative elements of the research where themes emerged including the disconnection between faculty management and staff, personal fulfilment and the friction between the identities of teacher, researcher/ practitioner and administrator. The implications of the research findings from this study are combined and discussed in relation to possible identity-related and emotional labour management-related interventions. Further, suggestions are made to institutions concerning the application of these findings including the development of academic practices, with specific reference to the duality of identity required to service the combined teacher/ researcher role. Broader considerations of the paper include how individuals and institutions may engage with the changing nature of students-as-consumers as well as a recommendation to centralise personal fulfillment through the development of professional academic identities.Keywords: academic work, emotional labour, identity friction, mixed methods
Procedia PDF Downloads 27613509 Access to Natural Resources in the Cameroonian Part of the Logone Basin: A Driver and Mitigation Tool to Ethnical Conflicts
Authors: Bonguen Onouck Rolande Carole, Ndongo Barthelemy
Abstract:
The climate change effects on the Lake Chad, coupled with population growth, have pushed large masses of people of various origins towards the lower part of the lower Logonewatershed in search of the benefits of environmental services, causing pressure on the environment and its resources. Economic services are therefore threatened, and the decrease in resources contributes to the deterioration of the social wellbeing resulting to conflicts among/between local communities, immigrants, displaced people, and foreigners. This paper is an information contribution on ethnical conflicts drivers in the area and the provided local management mechanisms such can help mitigate present or future conflicts in similar areas. It also prints out the necessity to alleviate water access deficit and encourage good practices for the population wellbeing. In order to meet the objective, in 2018, through the interface of the World Bank-Cameroon project-PULCI, data were collected on the field directly by discussing with the population and visiting infrastructures, indirectly by a questionnaire survey. Two administrative divisions were chosen (Logoneet Chari, Mayo-Danay) in which targeted localities were Zina, Mazera, Lahai, Andirni near the Waza Park and Yagoua, Tekele, Pouss, respectively. Due to some sociocultural and religious reasons, some information were acquired through the traditional chiefs. A desk study analysis based on resources access and availability conflicts history, and management mechanism was done. As results, roots drivers of ethnical conflicts are struggles over natural resources access, and the possibility of conflicts increases as the scarcity and vulnerabilities persist, creating more sociocultural gaps and tensions. The mitigation mechanisms though fruitful, are limited. There is poor documentation on the topic, the resources management policies of this basin are unsuitable and ineffective for some. Therefore, the restoration of environmental and ecosystems, the mitigation of climate change effects, and food insecurity are the challenges that must be met to alleviate conflicts in these localities.Keywords: ethnic, communities, conflicts, mitigation mechanisms, natural resources, logone basin
Procedia PDF Downloads 11113508 Constructing a Grounded Theory of Parents' Musical Engagement with Their Premature Baby Contributing to Their Emerging Parental Identity in a Neonatal Unit
Authors: Elizabeth McLean, Katrina Skewes-McFerran, Grace Thompson
Abstract:
Scholarship highlights the need to further examine and better understand and foster the process of becoming a parent to a premature baby in the neonatal context to support the critical development of the parent-infant relationship. Music therapy research documents significant benefits of music therapy on neonatal physiological and neurodevelopmental function, reduced maternal anxiety and validating parents’ relationship with their premature baby, yet limited studies examine the role of music in supporting parental identity. This was a multi-site study, exploring parents’ musical engagement with their hospitalised baby and parental identity in a NU. In-depth interviews with nine parents of a premature baby across varying time points in their NU journey took place. Data collection and analysis was influenced by Constructive Grounded Theory methodology. Findings in the form of a substantive grounded theory illuminated the contribution of parents’ musical engagement on their sense of parental identity in the NU. Specifically, the significance of their baby’s level and type of response during musical interactions in influencing parents’ capacity to engage in musical dialogue with their baby emerged. Specific conditions that acted as both barriers and fosters in parents’ musical engagement across a high- risk pregnancy and NU admission also emerged. Recommendations for future research into the role of music and music therapy in supporting parental coping and transition to parenthood during a high-risk pregnancy and birth and beyond the NU will be discussed.Keywords: grounded theory, musical engagement, music therapy, parental identity
Procedia PDF Downloads 18113507 Towards Positive Identity Construction for Japanese Non-Native English Language Teachers
Authors: Yumi Okano
Abstract:
The low level of English proficiency among Japanese people has been a problem for a long time. Japanese non-native English language teachers, under social or ideological constraints, feel a gap between government policy and their language proficiency and cannot maintain high self-esteem. This paper focuses on current Japanese policies and the social context in which teachers are placed and examines the measures necessary for their positive identity formation from a macro-meso-micro perspective. Some suggestions for achieving this are: 1) Teachers should free themselves from the idea of native speakers and embrace local needs and accents, 2) Teachers should be involved in student discussions as facilitators and individuals so that they can be good role models for their students, and 3) Teachers should invest in their classrooms. 4) Guidelines and training should be provided to help teachers gain confidence. In addition to reducing the workload to make more time available, 5) expanding opportunities for investment outside the classroom into the real world is necessary.Keywords: language teacher identity, native speakers, government policy, critical pedagogy, investment
Procedia PDF Downloads 10413506 Territory and Well-Being: Qualitative Insights from the Morvan (Burgandy, France)
Authors: Gaël Brulé
Abstract:
The concept of territory seems to be largely absent from the literature on well-being. In the present study, the link between the territory and well-being is analyzed in the context of a rural area, the Morvan, in Burgundy (France). Through qualitative research-mostly interviews- this link is questioned and explored. The relationship between the territory and the actors inform us on several key-concepts often related to well-being: locus of control, mobility and identity. From an interactionist perspective, the relation between territory and actors seems to be a fertile ground to explore the latters’ well-being. The present paper advocates for more research on the field.Keywords: territory, well-being, identity, mobility
Procedia PDF Downloads 310