Search results for: illuminating human identity
9326 International Conference on Comparative Religion and Mythology
Authors: Mara Varelaki
Abstract:
In response to the challenge of the environmental crisis the discipline of environmental ethics examines the relation of human beings towards the environment and the value of the non-human constituents of the surrounding world. In the face of this crisis, assumptions regarding human and nature relations ought to be traced and reexamined because they can cause difficulties in diagnosing problematic attitudes towards the environment and non-human animals. This paper presents the claims that European and the Judea-Christian cosmogonic myths place the human figure in the core of the creation of the cosmos, thus verifying a hierarchical structure where humans occupy the top, and they establish a perception of nature as a non-human other. By doing so, these narratives provide some justification to the notion of the human-nature dichotomy and the human domination over other life forms and ecosystems. These anthropocentric assumptions evolved into what Hilde Lindemann terms master narratives and their influence extents to ecocentric ethical theories which attempt, and often fail, to shed the anthropocentrism of the western ethical tradition. The goal of this paper is (1) to trace the anthropocentric assumptions embedded in western thought and (2) articulate how they maintain their grip on our contemporary understanding of the human relation to and position within the environment, thus showing the need for a method of detecting and bracketing anthropocentric assumptions in social narratives and ethical frameworks.Keywords: cosmogonies, anthropocentrism, human/nature dichotomy, master narratives, ecocentrism
Procedia PDF Downloads 1079325 Association of Southeast Asian Nations Caught in between International and Regional Human Rights Frameworks: The Myanmar Rohingya Crisis
Authors: Lynamata Chhun
Abstract:
Human Rights enforcement in the newly independent countries like Asian and African has always been penetrating issues. In spite, the existing of the Universal Declaration of Human Rights (UDHR), regions like Africa and Asia where values and cultural norms far differ from the concept had formed their own Human Rights instruments to tackle Human Rights issues in their regions instead of embracing the concept of UDHR completely. ASEAN Human Rights Declaration is one of the examples. This paper aims to examine the enforcement of Human Rights in South East Asia in the context of ASEAN regional integration. Precisely, the author attempts to analyse the effectiveness in undertaking Human Rights issues in the region by applying both the existing international and regional frameworks using the Myanmar Rohingya Crisis as the case study. The methodology of the paper is qualitative analysis where cross-impact analysis is employed to examine the case study. It is anticipated that the main findings of this paper will illuminate how applicable the international instruments are in comparison to the regional instruments in apprehending the human rights issues and will shed light on how ASEAN and dialogue partners should cooperate in the future regarding with the challenging issues of Human Rights in the region.Keywords: ASEAN Human Rights Declaration, ASEAN integration, ASEAN way, international and regional instruments, Universal Declaration of Human Rights
Procedia PDF Downloads 2549324 Teacher’s Role in the Process of Identity Construction in Language Learners
Authors: Gaston Bacquet
Abstract:
The purpose of this research is to explore how language and culture shape a learner’s identity as they immerse themselves in the world of second language learning and how teachers can assist in the process of identity construction within a classroom setting. The study will be conducted as an in-classroom ethnography, using a qualitative methods approach and analyzing students’ experiences as language learners, their degree of investment, inclusion/exclusion, and attitudes, both towards themselves and their social context; the research question the study will attempt to answer is: What kind of pedagogical interventions are needed to help language learners in the process of identity construction so they can offset unequal conditions of power and gain further social inclusion? The following methods will be used for data collection: i) Questionnaires to investigate learners’ attitudes and feelings in different areas divided into four strands: themselves, their classroom, learning English and their social context. ii) Participant observations, conducted in a naturalistic manner. iii) Journals, which will be used in two different ways: on the one hand, learners will keep semi-structured, solicited diaries to record specific events as requested by the researcher (event-contingent). On the other, the researcher will keep his journal to maintain a record of events and situations as they happen to reduce the risk of inaccuracies. iv) Person-centered interviews, which will be conducted at the end of the study to unearth data that might have been occluded or be unclear from the methods above. The interviews will aim at gaining further data on experiences, behaviors, values, opinions, feelings, knowledge and sensory, background and demographic information. This research seeks to understand issues of socio-cultural identities and thus make a significant contribution to knowledge in this area by investigating the type of pedagogical interventions needed to assist language learners in the process of identity construction to achieve further social inclusion. It will also have applied relevance for those working with diverse student groups, especially taking our present social context into consideration: we live in a highly mobile world, with migrants relocating to wealthier, more developed countries that pose their own particular set of challenges for these communities. This point is relevant because an individual’s insight and understanding of their own identity shape their relationship with the world and their ability to continue constructing this relationship. At the same time, because a relationship is influenced by power, the goal of this study is to help learners feel and become more empowered by increasing their linguistic capital, which we hope might result in a greater ability to integrate themselves socially. Exactly how this help will be provided will vary as data is unearthed through questionnaires, focus groups and the actual participant observations being carried out.Keywords: identity construction, second-language learning, investment, second-language culture, social inclusion
Procedia PDF Downloads 1039323 Virtual Life: Fashion, Expression, and Identity in the Digital World
Authors: Elizabeth Bourgeois
Abstract:
During social distancing, fashion and self-expression have been pushed further into virtual environments. In VR spaces, identities can be curated easily, untethered from the necessities of life and work. Personal styles reach a wider audience and follow new rules. Digital platforms leave some, but not all, 'real world' clothing constraints behind. Virtual aesthetics are set by the user and the software. Gen Z is a native user, applying face filters on Instagram and Snapchat and styling outfits and skins in apps like Gacha Life, Roblox, and Fortnite. These games cultivate space for community and personal style. Loosely tied to human forms, each app has physical aesthetics, with clear vernacular dress defining it. There are ecosystems of makers, consumers, and critics. Designer-modelers create original assets, brands, and luxury items. Fashion and beauty are ephemeral but always reflect the idealization of form and self. Online communities have already established new beauty ideals that impact live fashion trends. Fashion houses develop AR filters, gaming hairstyles challenge real-world colorists, and musicians perform virtual concerts in their avatar forms. In these times, social media and gaming communities promote the expression of public identity. The online dress is no longer tied to 'real' bodies or cloth. In virtual worlds, there are still tribes, status symbols, gender identities, and roles, but free of fabric, form, and static social structure, there is room for fantastic invention.Keywords: virtual reality, fashion, Gen Z, social media, gaming
Procedia PDF Downloads 1359322 Critical Discourse Analysis of Xenophobia in UK Political Party Blogs
Authors: Nourah Almulhim
Abstract:
This paper takes a critical discourse analysis (CDA) approach to investigate discourse and ideology in political blogs, focusing in particular on the Conservative Home blog from the UK’s current governing party. The Conservative party member’s discourse strategies as the blogger, alongside the discourse used by members of the public who reply to the blog in the below-the-lines comments, will be examined. The blog discourse reflects the writer's political identity and authorial voice. The analysis of the below-the-lines comments enables members of the public to engage in creating adversative positions, introducing different language users who bring their own individual and collective identities. These language users can play the role of news reporters, political analysts, protesters or supporters of a specific agenda and current socio-political topics or events. This study takes a qualitative approach to analyze the discriminatory context towards Islam/Muslims in ' The Conservative Home' blog. A cognitive approach is adopted and an analysis of dominant discourses in the blog text and the below-the-line comments is used. The focus of the study is, firstly, on the construction of self/ collective national identity in comparison to Muslim identity, highlighting the in-group and out-group construction. Second, the type of attitudes, whether feelings or judgments, related to these social actors as they are explicated to draw on the social values. Third, the role of discursive strategies in justifying and legitimizing those Islamophobic discriminatory practices. Therefore, the analysis is based on the systematic analysis of social actors drawing on actors, actions, and arguments to explicate identity construction and its development in the different discourses. A socio-semantic categorization of social actors is implemented to draw on the discursive strategies in addition to using literature to understand these strategies. An appraisal analysis is further used to classify attitudes and elaborate on core values in both genres. Finally, the grammar of othering is applied to explain how discriminatory dichotomies of 'Us' Vs. ''Them' actions are carried in discourse. Some of the key findings of the analysis can be summarized in two main points. First, the discursive practice used to represent Muslims/Islam as different from ‘Us’ are different in both genres as the blogger uses a covert voice while the commenters generally use an overt voice. This is to say that the blogger uses a mitigated strategy to represent the Muslim identity, for example, using the noun phrase ‘British Muslim’ but then representing them as ‘radical’ and ‘terrorists'. Contrary to this is in below the lines comments, where a direct strategy with an active declarative voice is used to negatively represent the Muslim identity as ‘oppressors’ and ‘terrorists’ with no inclusion of the noun phrase ‘British Muslims’. Second, the negotiation of the ‘British’ identity and values, such as culture and democracy, are prominent in the comment section as being unique and under threat by Muslims, while in the article, these standpoints are not represented.Keywords: xenophobia, blogs, identity, critical discourse analysis
Procedia PDF Downloads 929321 Digital Self-Identity and the Role of Interactivity in Psychiatric Assessment and Treatment
Authors: Kevin William Taylor
Abstract:
This work draws upon research in the fields of games development and mental health treatments to assess the influence that interactive entertainment has on the populous, and the potential of technology to affect areas of psychiatric assessment and treatment. It will use studies to establish the evolving direction of interactive media in the development of ‘digital self-identity,’ and how this can be incorporated into treatment to the benefit of psychiatry. It will determine that this approach will require collaborative production between developers and psychiatrists in order to ensure precise goals are met, improving the success of serious gaming for psychiatric assessment and treatment. Analysis documents the reach of video games across a growing global community of gamers, highlighting cases of the positives and negatives of video game usage. The games industry is largely oblivious to the psychological negatives, with psychiatrists encountering new conditions such as gaming addiction, which is now recognized by the World Health Organization. With an increasing amount of gamers worldwide, and an additional time per day invested in online gaming and character development, the concept of virtual identity as a means of expressing the id needs further study to ensure successful treatment. In conclusion, the assessment and treatment of game-related conditions are currently reactionary, and while some mental health professionals have begun utilizing interactive technologies to assist with the assessment and treatment of conditions, this study will determine how the success of these products can be enhanced. This will include collaboration between software developers and psychiatrists, allowing new avenues of skill-sharing in interactive design and development. Outlining how to innovate approaches to engagement will reap greater rewards in future interactive products developed for psychiatric assessment and treatment.Keywords: virtual reality, virtual identity, interactivity, psychiatry
Procedia PDF Downloads 1469320 The Sufi Madad in Arabic Literature and Translation
Authors: Riham Debian
Abstract:
This paper deals with the translational mystic in Arabic aesthetics and their linguistic and narrative revelation and mediation across textual spaces. The paper particularly engages with the nature of the Egyptian Sufi Madad, its relation to spaces/places, its intergenerational and intertextual manifestations, and its intersection with questions of identity—the historical spaces and geographical places one inhabits and embodies. Opening a repertoire between contextualized stylistics and poetics semiology (Boise-Bier2011; Jackobson 1960), the paper reads in al-Ghitany’s Kitab al-Tagiliat (The Book of Revelation1983), Bassiouny’s Sabil Al-Ghareq (2018) and its translation (Fountain of the Drowning2022). The paper examines the stylistic and poetical encoding and recoding of the Sufi Madads from Ghitany to Bassiouny and their entanglement in the question of Egyptian identity-politics through the embodiment of historical places and geographical spaces. The paper argues for the intergenerational intertextuality of Arabic aesthetics that stylistically and poetically enacts the mysticism of Sufi Madad through historical and geographical semioticization of the Egyptian character continuity across time and space. Both Ghitany and Bassiouny engage with the historical novel as a form of delivery of their Egyptian mystical relation with time and place. Both novelist-historians are involved with the question of place and the life-worlds that spaces generate across time and gender.Keywords: intertextuality, interdiscusivity, madad, egyptian identity
Procedia PDF Downloads 969319 Human-Tiger Conflict in Chitwan National Park, Nepal
Authors: Abishek Poudel
Abstract:
Human-tiger conflicts are serious issues of conflicts between local people and park authority and the conflicting situation potentially play negative role in park management. The study aimed (1) To determine the trend and nature of human-tiger conflicts (2) To understand people's perception and mitigation measures towards tiger conservation. Both primary and secondary information were used to determine human- tiger conflicts in Chitwan National Park. Systematic random sampling with 5% intensity was done to collect the perception of the villagers regarding human-tiger conflicts. The study sites were selected based on frequencies of incidences of human attacks and livestock depredation viz. Rajahar and Ayodhyapuri VDCs respectively. The trend of human casualties by tiger has increased in last five year whereas the trend of livestock has decreased. Reportedly, between 2008 and 2012, tigers killed 22 people, injured 10 and killed at least 213 livestock. Conflict was less common in the park and more intense in the sub-optimal habitats of Buffer Zone. Goat was the most vulnerable livestock followed by cattle. The livestock grazing and human intrusion into tiger habitat were the causes of conflicts. Developing local stewardship and support for tiger conservation, livestock insurance, and compensation policy simplification may help reduce human-tiger conflicts.Keywords: livestock depredation, sub optimal habitat, human-tiger, local stewardship
Procedia PDF Downloads 4639318 Saudi Human Awareness Needs: A Survey in How Human Causes Errors and Mistakes Leads to Leak Confidential Data with Proposed Solutions in Saudi Arabia
Authors: Amal Hussain Alkhaiwani, Ghadah Abdullah Almalki
Abstract:
Recently human errors have increasingly become a very high factor in security breaches that may affect confidential data, and most of the cyber data breaches are caused by human errors. With one individual mistake, the attacker will gain access to the entire network and bypass the implemented access controls without any immediate detection. Unaware employees will be vulnerable to any social engineering cyber-attacks. Providing security awareness to People is part of the company protection process; the cyber risks cannot be reduced by just implementing technology; the human awareness of security will significantly reduce the risks, which encourage changes in staff cyber-awareness. In this paper, we will focus on Human Awareness, human needs to continue the required security education level; we will review human errors and introduce a proposed solution to avoid the breach from occurring again. Recently Saudi Arabia faced many attacks with different methods of social engineering. As Saudi Arabia has become a target to many countries and individuals, we needed to initiate a defense mechanism that begins with awareness to keep our privacy and protect the confidential data against possible intended attacks.Keywords: cybersecurity, human aspects, human errors, human mistakes, security awareness, Saudi Arabia, security program, security education, social engineering
Procedia PDF Downloads 1609317 Interwoven Realms: The Relationship Between Textiles, Fashion, and Architecture
Authors: Toktam mehrabani
Abstract:
Textiles, fashion, and architecture, though seemingly disparate fields, share a deep and evolving relationship. This paper explores the intersection of these disciplines, examining how the tactile, structural, and aesthetic qualities of textiles have influenced both fashion and architecture over time. By investigating historical and contemporary examples, this paper seeks to unravel the ways in which textiles and fashion have not only shaped architectural design but have also acted as a bridge between functionality, art, and human experience in the built environment.Textiles have been integral to human culture since the dawn of civilization. Their presence transcends mere functionality, serving as a medium for artistic expression, cultural identity, and social commentary. Fashion, derived from textiles, has long been associated with personal identity and societal trends, while architecture reflects human needs, environmental context, and cultural values. This paper posits that the relationship between textiles, fashion, and architecture is more interconnected than often perceived, with each influencing and inspiring the other across time. Textiles in Architectural Design: From ancient draperies in temples to tapestries in castles, textiles have adorned structures, softening rigid spaces and adding layers of warmth and luxury. Fabric screens and curtains have also served functional purposes, such as controlling light, acoustics, and temperature. Fashion as Architectural Expression: Renaissance and Baroque fashion used exaggerated forms, corsetry, and layers to mirror the grandiosity of architectural styles of the time. Clothing acted as wearable architecture, with structured garments mirroring the strong lines and curves of buildings..Structural Textiles in Architecture: In the 21st century, textiles are no longer just decorative; they have become integral to architectural innovation. Materials like tensile fabrics and smart textiles are used in creating flexible, lightweight structures. Iconic examples include Frei Otto’s work with tensile membranes, seen in the Munich Olympic Stadium.Technological advancements have drastically transformed the relationship between textiles, fashion, and architecture. Digital tools like 3D printing and laser cutting allow designers in both fields to push the limits of form and structure. Smart textiles that react to environmental stimuli are being explored for use in both wearable technology and adaptable architecture, such as facades that change in response to weather conditions. Textiles, fashion, and architecture are inextricably linked through their shared exploration of form, structure, and expression. This interdisciplinary relationship continues to evolve, driven by technological advancements and a growing emphasis on sustainability. As fashion becomes more architectural in its construction and architecture more fluid in its forms, the lines between these disciplines blur, offering new possibilities for creativity and functionality in both wearable and built environments.Keywords: textiles in architecture, fashion and architecture, textile architecture, structural textiles, wearable architecture, architectural fashion
Procedia PDF Downloads 309316 The Role of Human Capital in Rural Development: A Critical Look at Ethiopian Education Policy
Authors: Blen Telayneh Melese
Abstract:
Rural development, the unending quest of a developing country, cannot be succeeded in deprived of human capital development. Human capital, the economic pillars of a country's development, appeals a policy-based supports while fulfilling what is expected. Ethiopia, one of the rural countries with untouched and forgotten land and human force, owes historical experiences of educational policy intending for mobilization of its citizen for the advancement of the overall economy. Rural Ethiopia as well has been the focus of those educational policies, considering the economic resources entrenched with in. In this literature review paper, Ethiopian educational policy and its contribution to human capital development, as well as its role in generating quality human labor force, is assessed concisely. The author argues that the foundation of rural development such as technology, knowledge, infrastructure, market chain, communication and etc., can only be achieved through enhanced education policy that conciliates the existing reality of rural communities. Ethiopia still needs an education policy that enables it to generate a human capital that is oriented with the rural areas economic opportunities and challenges.Keywords: Ethiopia, rural development, human capital development, education policy
Procedia PDF Downloads 3609315 The Power of Symbol in the Powerful Symbol: Case Study of Symbol Visualization Change in the Form of Pelinggih in Bali
Authors: I Nyoman Larry Julianto, Pribadi Widodo
Abstract:
The phenomenon of cultural change is the result of the process of shifting, reducing and adding elements of cultural systems because of the process of interaction with the environment. Interestingly in the temple area in Bali, there is a phenomenon of symbol visualization change in the form of pelinggih, which is in the shaped of the car. As a result of the sacralization process of the symbol, the function of its essence is remained as a place of worship. Hindu communities in Bali can accept that phenomenon in their religious life as a process of today's cultural acculturation. Through an interpretive ethnographic study, it is tried to understand the 'creative concept’of that symbol materialization in its interaction process. The result of the research stated that the interaction value of the symbol visualization change is constructed from the application of 'value' and 'meaning' of the previous pelinggih. The ritual procession and the reinforcement of the mythical mind, make the 'value' of the visualization change of the pelinggih leads to a sacred, religious conception. In the future, the development of the human mind is more functional, but it does not eliminate the mythological value due to the interaction with the surrounding social environment, so the visualization of the symbol in the form of pelinggih which is in the shape of the car will be the identity of a new cultural heritage. The understanding of the influence of mental representation of human being in an effort toward his spiritual awareness will be able to be the advanced research.Keywords: the power of symbol, visual change, pelinggih, Bali
Procedia PDF Downloads 1659314 Reclaiming the Lost Jewish Identity of a Second Generation Holocaust Survivor Raised as a Christian: The Role of Art and Art Therapy
Authors: Bambi Ward
Abstract:
Children of Holocaust survivors have been described as inheriting their parents’ trauma as a result of ‘vicarious memory’. The term refers to a process whereby second generation Holocaust survivors subconsciously remember aspects of Holocaust trauma, despite not having directly experienced it. This can occur even when there has been a conspiracy of silence in which survivors chose not to discuss the Holocaust with their children. There are still people born in various parts of the world such as Poland, Hungary, other parts of Europe, USA, Canada and Australia, who have only learnt of their Jewish roots as adults. This discovery may occur during a parent’s deathbed confession, or when an adult child is sorting through the personal belongings of a deceased family member. Some Holocaust survivors chose to deny their Jewish heritage and raise their children as Christians. Reasons for this decision include the trauma experienced during the Holocaust for simply being Jewish, the existence of anti-Semitism, and the desire to protect one’s self and one’s family. Although there has been considerable literature written about the transgenerational impact of trauma on children of Holocaust survivors, there has been little scholarly investigation into the effects of a hidden Jewish identity on these children. This paper presents a case study of an adult child of Hungarian Holocaust survivors who was raised as a Christian. At the age of eight she was told about her family’s Jewish background, but her parents insisted that she keep this a secret, even if asked directly. She honoured their request until she turned forty. By that time she had started the challenging process of reclaiming her Jewish identity. The paper outlines the tension between family loyalty and individual freedom, and discusses the role that art and art therapy played in assisting the subject of the case study to reclaim her Jewish identity and commence writing a memoir about her spiritual journey. The main methodology used in this case study is creative practice-led research. Particular attention is paid to the utilisation of an autoethnographic approach. The autoethnographic tools used include reflective journals of the subject of the case study. These journals reflect on the subject’s collection of autobiographical data relating to her family history, and include memories, drawings, products of art therapy, diaries, letters, photographs, home movies, objects, and oral history interviews with her mother. The case study illustrates how art and art therapy benefitted a second generation Holocaust survivor who was brought up having to suppress her Jewish identity. The process allowed her to express subconscious thoughts and feelings about her identity and free herself from the burden of the long term secret she had been carrying. The process described may also be of assistance to other traumatised people who have been trying to break the silence and who are seeking to express themselves in a positive and healing way.Keywords: art, hidden identity, holocaust, silence
Procedia PDF Downloads 2399313 Folk Media and Political Movement: A Case Study on the Bodos of North East India
Authors: Faguna Barmahalia
Abstract:
Politics of ethnic identity in the north-east India is well-known phenomenon. The ethnic assertion in this region is mostly linguistic and cultural in nature. Most of the ethnic groups in the north-east region have been demanding either autonomous or separate state to maintain their socio-cultural identity. After the Indian Independence, the ethnic groups of people think that they have not developed till. Despite having many natural resources, North East India remained backward in terms of economic, education as well as politics. In this scenario, many educated and middle-class elite people have involved in working for the all-round development of their community. The Bodos are one of the major tribes in North Eeast India. In Assam, the Bodos are assumed by themselves to be exploited and suppressed by the Assamese Hindu society. Consequently, the socio-cultural identity movement has emerged among the Bodos.The main aims of my study are: i. to focus on how the Bodos of Assam are using the folk media in their political movement and iii. To analyse the role of folklore towards serving the ethnic unity and nationalism among the Bodos. Methodology: The study is based on the primary and secondary sources. Interview and observation method was conducted for collecting the primary data. For secondary source, some printed books, magazines and others materials published by the distinguished publishers and websites have been used.Keywords: media, culture, nationalism, politics
Procedia PDF Downloads 2229312 BAN Logic Proof of E-passport Authentication Protocol
Authors: Safa Saoudi, Souheib Yousfi, Riadh Robbana
Abstract:
E-passport is a relatively new electronic document which maintains the passport features and provides better security. It deploys new technologies such as biometrics and Radio Frequency identification (RFID). The international civil aviation organization (ICAO) and the European union define mechanisms and protocols to provide security but their solutions present many threats. In this paper, a new mechanism is presented to strengthen e-passport security and authentication process. We propose a new protocol based on Elliptic curve, identity based encryption and shared secret between entities. Authentication in our contribution is formally proved with BAN Logic verification language. This proposal aims to provide a secure data storage and authentication.Keywords: e-passport, elliptic curve cryptography, identity based encryption, shared secret, BAN Logic
Procedia PDF Downloads 4359311 The Onus of Human to Society in Accordance with Constitution and Traditions
Authors: Qamar Raza
Abstract:
This paper deals with the human concern and onus which every person should provide to his/her society. Especially the rules and regulations described in constitution or traditions which we have inherited from ancestors should be followed, and also our lives should be led in accordance with them. The main concern of paper would be personal behavior with others in a good manner especially what he/she should exercise for society’s welfare. As human beings are the fundamental organ of society, who play a crucial role in reforming the society, they should try their best to develop it as well as maintain harmony, peace, we-feeling and mutual contact in the society. Focusing on how the modern society and its elements keep society successful. Regulations of our constitution and tradition are essential for reforming the society. In a nutshell, a human has to mingle in his society and keep mutual respect and understand the value of others as well as for himself.Keywords: constitution, human beings, society, traditions
Procedia PDF Downloads 2239310 “Waving High the Delicate Mistress”: on Feminist Geography and American Identity in the Valley of the Moon
Authors: Yangyang Zhang
Abstract:
In The Valley of the Moon, Jack London implicitly presents the connection between the city and the male, the country and the female, constructing a gender space where the city and the countryside are opposed. But meanwhile, London is constantly dismantling the gender space through the reversed travel map so as to highlight the fluidity and productivity of female space. Under such circumstance, the original gender space has to be reorganized. Through the construction of gendered urban and rural spaces, Jack London presents the national crisis in the process of urbanization of the American West in the late 19th century, while the female-led reversed travel map reproduces the original contribution of the American West to the construction of nationality. In the end, the reorganized neutral space “valley of the moon” reflects the “garden” motif in American national imagination and plays an important role in rebuilding national identity. This research studies the feminist geography and cartography in Jack London's novel The Valley of the Moon and analyzes the gender-politics attribution in the literary geography writing in London's novel on this basis. The research returns to the American historical context at the end of the 19th century, focusing on how London’s feminist geography embodies his sense of nationality and investigating how female-dominated literary cartography reconstructs American identity. This paper takes Literary Cartography, and feminist geography as the ideological guide combines with the discourse of gender politics. comprehensively uses various literary criticism methods such as deconstructionist literary criticism, and new historicism literary criticism, etc., Through the study of Jack London's work, the paper aims to analyse how London constructs a national image by literary geography.Keywords: American identity, American west, feminist geography, garden motif, the valley of the moon
Procedia PDF Downloads 1269309 Existential Affordances and Psychopathology: A Gibsonian Analysis of Dissociative Identity Disorder
Authors: S. Alina Wang
Abstract:
A Gibsonian approach is used to understand the existential dimensions of the human ecological niche. Then, this existential-Gibsonian framework is applied to rethinking Hacking’s historical analysis of multiple personality disorder. This research culminates in a generalized account of psychiatric illness from an enactivist lens. In conclusion, reflections on the implications of this account on approaches to psychiatric treatment are mentioned. J.J. Gibson’s theory of affordances centered on affordances of sensorimotor varieties, which guide basic behaviors relative to organisms’ vital needs and physiological capacities (1979). Later theorists, notably Neisser (1988) and Rietveld (2014), expanded on the theory of affordances to account for uniquely human activities relative to the emotional, intersubjective, cultural, and narrative aspects of the human ecological niche. This research shows that these affordances are structured by what Haugeland (1998) calls existential commitments, which draws on Heidegger’s notion of dasein (1927) and Merleau-Ponty’s account of existential freedom (1945). These commitments organize the existential affordances that fill an individual’s environment and guide their thoughts, emotions, and behaviors. This system of a priori existential commitments and a posteriori affordances is called existential enactivism. For humans, affordances do not only elicit motor responses and appear as objects with instrumental significance. Affordances also, and possibly primarily, determine so-called affective and cognitive activities and structure the wide range of kinds (e.g., instrumental, aesthetic, ethical) of significances of objects found in the world. Then existential enactivism is applied to understanding the psychiatric phenomenon of multiple personality disorder (precursor of the current diagnosis of dissociative identity disorder). A reinterpretation of Hacking’s (1998) insights into the history of this particular disorder and his generalizations on the constructed nature of most psychiatric illness is taken on. Enactivist approaches sensitive to existential phenomenology can provide a deeper understanding of these matters. Conceptualizing psychiatric illness as strictly a disorder in the head (whether parsed as a disorder of brain chemicals or meaning-making capacities encoded in psychological modules) is incomplete. Rather, psychiatric illness must also be understood as a disorder in the world, or in the interconnected networks of existential affordances that regulate one’s emotional, intersubjective, and narrative capacities. All of this suggests that an adequate account of psychiatric illness must involve (1) the affordances that are the sources of existential hindrance, (2) the existential commitments structuring these affordances, and (3) the conditions of these existential commitments. Approaches to treatment of psychiatric illness would be more effective by centering on the interruption of normalized behaviors corresponding to affordances targeted as sources of hindrance, the development of new existential commitments, and the practice of new behaviors that erect affordances relative to these reformed commitments.Keywords: affordance, enaction, phenomenology, psychiatry, psychopathology
Procedia PDF Downloads 1379308 Understanding the Human Element in Cybersecurity: A Literature Review and Recommendations
Authors: Sadiq Nasir
Abstract:
The need for strong cybersecurity measures has been brought to light by society's growing reliance on technology. Cybersecurity breaches continue, with the human aspect playing a crucial role, despite the availability of technology remedies. By analyzing the most recent findings in this area of research on awareness, attitudes, and behaviour, this literature review seeks to comprehend the human element in cybersecurity. A thorough overview of the most recent studies and gaps in the body of knowledge will be determined through a systematic examination of the literature. The paper indicates that in order to address the human component in cybersecurity, a socio-technical strategy is required, and it advocates for additional study in order to fully comprehend the consequences of various interventions. The findings of this study will increase our understanding of cybersecurity and have useful ramifications for companies wanting to strengthen their cybersecurity posture.Keywords: cybersecurity, cybersecurity awareness, human factor in security, human security
Procedia PDF Downloads 869307 Data, Digital Identity and Antitrust Law: An Exploratory Study of Facebook’s Novi Digital Wallet
Authors: Wanjiku Karanja
Abstract:
Facebook has monopoly power in the social networking market. It has grown and entrenched its monopoly power through the capture of its users’ data value chains. However, antitrust law’s consumer welfare roots have prevented it from effectively addressing the role of data capture in Facebook’s market dominance. These regulatory blind spots are augmented in Facebook’s proposed Diem cryptocurrency project and its Novi Digital wallet. Novi, which is Diem’s digital identity component, shall enable Facebook to collect an unprecedented volume of consumer data. Consequently, Novi has seismic implications on internet identity as the network effects of Facebook’s large user base could establish it as the de facto internet identity layer. Moreover, the large tracts of data Facebook shall collect through Novi shall further entrench Facebook's market power. As such, the attendant lock-in effects of this project shall be very difficult to reverse. Urgent regulatory action is therefore required to prevent this expansion of Facebook’s data resources and monopoly power. This research thus highlights the importance of data capture to competition and market health in the social networking industry. It utilizes interviews with key experts to empirically interrogate the impact of Facebook’s data capture and control of its users’ data value chains on its market power. This inquiry is contextualized against Novi’s expansive effect on Facebook’s data value chains. It thus addresses the novel antitrust issues arising at the nexus of Facebook’s monopoly power and the privacy of its users’ data. It also explores the impact of platform design principles, specifically data portability and data portability, in mitigating Facebook’s anti-competitive practices. As such, this study finds that Facebook is a powerful monopoly that dominates the social media industry to the detriment of potential competitors. Facebook derives its power from its size, annexure of the consumer data value chain, and control of its users’ social graphs. Additionally, the platform design principles of data interoperability and data portability are not a panacea to restoring competition in the social networking market. Their success depends on the establishment of robust technical standards and regulatory frameworks.Keywords: antitrust law, data protection law, data portability, data interoperability, digital identity, Facebook
Procedia PDF Downloads 1239306 ECG Based Reliable User Identification Using Deep Learning
Authors: R. N. Begum, Ambalika Sharma, G. K. Singh
Abstract:
Identity theft has serious ramifications beyond data and personal information loss. This necessitates the implementation of robust and efficient user identification systems. Therefore, automatic biometric recognition systems are the need of the hour, and ECG-based systems are unquestionably the best choice due to their appealing inherent characteristics. The CNNs are the recent state-of-the-art techniques for ECG-based user identification systems. However, the results obtained are significantly below standards, and the situation worsens as the number of users and types of heartbeats in the dataset grows. As a result, this study proposes a highly accurate and resilient ECG-based person identification system using CNN's dense learning framework. The proposed research explores explicitly the calibre of dense CNNs in the field of ECG-based human recognition. The study tests four different configurations of dense CNN which are trained on a dataset of recordings collected from eight popular ECG databases. With the highest FAR of 0.04 percent and the highest FRR of 5%, the best performing network achieved an identification accuracy of 99.94 percent. The best network is also tested with various train/test split ratios. The findings show that DenseNets are not only extremely reliable but also highly efficient. Thus, they might also be implemented in real-time ECG-based human recognition systems.Keywords: Biometrics, Dense Networks, Identification Rate, Train/Test split ratio
Procedia PDF Downloads 1619305 Patriotic Education through Private/Everyday Narratives: What We Can Learn from Young People
Authors: Yijie Wang, Hanwei Cheng
Abstract:
Under the Chinese educational context, the materials for patriotic education typically take the form of grand narratives. However, in post-modern times the younger members of society tend to welcome elements of more micro and personal nature. It is therefore important to explore how patriotism can be integrated into an ‘everyday’, private narrative that holds more attraction for the young. Based on semi-structured interviews of eight Chinese graduate students, this research examines how Chinese young people draw materials to establish national identity and develop love for the country from everyday-life details, as well as how they perceive, interpret and articulate their patriotism through private narratives. And implications for patriotic education are proposed accordingly. Several conclusions are drawn from the pre-interviews. Firstly, sensory experiences that remind people of their country—such as the taste of Chinese delicacies and the sound of a traditional instrument—are a major source of patriotic feelings. Secondly, the love for the country often stems from and is continued to be mediated by the emotional attachment with other people, typically significant others, and patriotism is articulated (or acknowledged) by the young as a kind of ‘sentiment’ rather than ‘faith’ or ‘belief’. Thirdly, for young people who are currently studying abroad, their birth country represents a kind of familiar, well-accustomed life or lifestyle, and any nostalgic realization of it leads to increased national belonging and sense of identity. Fourthly, the awareness of the country’s transformations—positive ones and neutral ones alike—triggers young people affections towards the country, and even negative transformations may result in promoted sense of self-involvement and therefore consolidate national identity. Implications for patriotic education can be drawn accordingly, and although the research is conducted under the Chinese context, it will hopefully contribute to the understanding of relevant fields.Keywords: national identity, patriotic education, private narrative, young people
Procedia PDF Downloads 1949304 The Evolution of the Human Brain from the Hind Brain to the Fore Brain: Dialectics from the African Perspective in Understanding Stunted Development in Science and Technology
Authors: Philemon Wokoma Iyagba, Obey Onenee Christie
Abstract:
From the hindbrain, which is responsible for motor activities, to the forebrain, responsible for processing information related to complex cognitive activities, the human brain has continued to evolve over the years. This evolution- has been progressive, leading to advancements in science and technology. However, the development of science and technology in Africa, where ancient civilization arguably began, has been retrogressive. Dialectics was done by dissecting different opinions on the reason behind the stunted development of science and technology in Africa. The researchers proposed that the inability to sustain the technological advancements made by early Africans is due to poor or lack of replicability of the African knowledge-based system, almost no or poor documentation of adopted procedures and the approval-seeking mentality that cheaply paved the way for westernization which also led to the adulteration of the African way of life and education without making room for incorporating her identity and proper alignment of her rich cultural heritage in education and her enormous achievements before and during the middle age. This article discussed conceptual issues, with its positions based on established facts, the discussion was based on relevant literature and recommendations were made accordingly.Keywords: forebrain, hindbrain, dialectics from African perspective, development in science and technology
Procedia PDF Downloads 779303 Oath Taking-An Approach to Combating Criminality: Challenges and Implication to the Victim Centered Approach in Human Trafficking
Authors: Faith G. Ehiemua, Chandra E. Ulinfun
Abstract:
This work presents two approaches that use competing models to combat criminality in human trafficking. It argues that oath-taking is an approach used to combat and repress crime by natives of African descent. Therefore, certain value choices reflected explicitly or implicitly in its habitual functioning are features of crime control, a model of the criminal process used to repress and prevent crime. By pitting the approaches against each other, the work examines the utility of the purpose of each approach with the aim of assessing moral worthiness. The approaches adopted are descriptive, normative, and theoretical. The findings reveal that oath-taking is effective in human trafficking mainly because Africans believe that the African traditional system is efficient. However, the utilitarian ethical theory applied to the use of oath-taking in human trafficking shows oath-taking as protecting the interest of human traffickers against the general good of society.Keywords: human rights, human trafficking, oath taking, utilitarianism, victim-centered approach
Procedia PDF Downloads 2169302 Human Rights in Islam: A Critique on Critiques
Authors: Miftahuddin Khilji
Abstract:
The concept of human right is not alien to Islam. The Shari‘ah requires all its followers the sense of responsibility to perform their duties first and then claim their rights. This eventually guarantees the protection of human rights and ensures a peaceful society. The ultimate goal of Shari‘ah is to preserve five basic necessities which are also known as Maqasid ul Shari‘ah or Objectives of Islamic Law. This goal ensures for the members of society their rights without harming public welfare. Despite of the fact that human rights have been fully guaranteed by Islam and their compliance is required by Allah Almighty; not by any legislative body or other sovereign such as kings etc. However, many western writers, organizations and so called liberal thinkers try to create concerns, doubts and misconceptions in minds of the society members. A number of issues are pointed out and people are misguided about the concept of human rights in Islam. This paper aims to discuss main the concept of human rights in the light of perfect and balanced system of laws and principles of Shari‘ah and address those misconceptions and doubts by analyzing them and answering to questions raised about the subject. It would be an effort to prove that human rights are much more significant to Shari‘ah more than any other national or international legislative body.Keywords: human rights, Islamic law, law, Shariah
Procedia PDF Downloads 5509301 Cultural Identity and Self-Censorship in Social Media: A Qualitative Case Study
Authors: Nastaran Khoshsabk
Abstract:
The evolution of communication through the Internet has influenced shaping and reshaping the self-presentation of social media users. Online communities both connect people and give voice to the voiceless allowing them to present themselves nationally and globally. People all around the world are experiencing censorship in different aspects of their life. Censorship can be externally imposed because of the political situations, or it can be self-imposed. Social media users choose the content they want to share and decide about the online audiences with whom they want to share this content. Most social media networks, such as Facebook, enable their users to be selective about the shared content and its availability to other people. However, sometimes instead of targeting a specific audience, users self-censor themselves or decide not to share various forms of information. These decisions are of particular importance in countries such as Iran where Internet is not the arena of free self-presentation and people are encouraged to stay away from political participation in the country and acting against the Islamic values. Facebook and some other social media tools are blocked in countries such as Iran. This project investigates the importance of social media in the life of Iranians to explore how they present themselves and construct their digital selves. The notion of cultural identity is applied in this research to explore the educational and informative role of social media in the identity formation and cultural representation of Facebook users. This study explores the self-censorship of Iranian adult Facebook users through their online self-representation and communication on the Internet. The data in this qualitative multiple case study have been collected through individual synchronous online interviews with the researcher’s Facebook friends and through the analysis of the participants’ Facebook profiles and activities over a period of six months. The data is analysed with an emphasis on the identity formation of participants through the recognition of the underlying themes. The exploration of online interviews is on the basis of participants’ personal accounts of self-censorship and cultural understanding through using social media. The driven codes and themes have been categorised considering censorship and place of culture on representation of self. Participants were asked to explain their views about censorship and conservatism through using social media. They reported their thoughts about deciding which content to share on Facebook and which to self-censor and their reasons behind these decisions. The codes and themes have been categorised considering censorship and its role in representation of idealised self. The ‘actual self’ showed to be hidden by an individual for different reasons such as its influence on their social status, academic achievements and job opportunities. It is hoped that this research will have implications for education contexts in countries that are experiencing social media filtering by offering an increased understanding of the importance of online communities; which can provide an educational environment to talk and learn about social taboos and constructing adults’ identity in virtual environment and through cultural self-presentation.Keywords: cultural identity, identity formation, online communities, self-censorship
Procedia PDF Downloads 2379300 Human Motion Capture: New Innovations in the Field of Computer Vision
Authors: Najm Alotaibi
Abstract:
Human motion capture has become one of the major area of interest in the field of computer vision. Some of the major application areas that have been rapidly evolving include the advanced human interfaces, virtual reality and security/surveillance systems. This study provides a brief overview of the techniques and applications used for the markerless human motion capture, which deals with analyzing the human motion in the form of mathematical formulations. The major contribution of this research is that it classifies the computer vision based techniques of human motion capture based on the taxonomy, and then breaks its down into four systematically different categories of tracking, initialization, pose estimation and recognition. The detailed descriptions and the relationships descriptions are given for the techniques of tracking and pose estimation. The subcategories of each process are further described. Various hypotheses have been used by the researchers in this domain are surveyed and the evolution of these techniques have been explained. It has been concluded in the survey that most researchers have focused on using the mathematical body models for the markerless motion capture.Keywords: human motion capture, computer vision, vision-based, tracking
Procedia PDF Downloads 3209299 Effects of Irregular Migration from Different Aspects of Security
Authors: Muzaffer Topgul, Hasan Atac
Abstract:
In case of explaining the migration concept, although it is not a new phenomenon, it is easy to understand that communities have migrated for variety of reasons such as natural disasters, famine, wars, economic problems, and several theories have been put forth to define and find solution for migration within its changing nature. Examining of migration theories denotes that the circumstances under which they appear reflect political, social, and economic conditions of the age they appear. In this day and time, security is considered not only from military perspective but also from economic, political, sociological dimensions. Based on the changing security environment new impacts of migration has occurred; the migration is proceed to be conferred as a type of war, qualified as a transnational crime because of its outcomes and interpreted in a different dimension owing to its effects on the health and education areas. Social security dimension in the context of expanding concept of security; when dealing with the safety of people and social groups with the assumption that national unity and identity are threatened, it sees immigrants as a source of threat. The human security assesses the safety of individuals in terms of survival and quality of life. Changes in the standard of living under the influence of immigrants and possible terrorist acts can be seen as a threat source in this type of security. Economic security of the individuals and the regional changes at the micro level created by the immigrants are covered issues of economic security. Due to the factors such as terrorism and civil war, the increasing numbers of displaced people who have taken refugee status affect the countries, whether it is near or far to the crisis areas, in the new and different dimensions of security day by day. In this study, the term of immigration through the eyes of national and international law will be evaluated, the place of the irregular and illegal immigration in the changing security sphere will be revealed and the effects of the irregular migration to short-term, mid-term and long-term security issues will be assessed through human and social security aspects. In order to analyze the threats for the human security; the parameters such as living conditions of the immigrants, the ratio of the genders, birth rate occasions, the education circumstances of the immigrant children and the effects of the illegal passing on the public order will be evaluated. The outcomes of the problem areas for the human security and the demographic alteration resulting from the human flow of displaced people will be discussed thorough social security extent. The fizzling economic diversity, which has shown up by irregular migration, will be presented within the scope of economic dimension of security.Keywords: irregular migration, the changing dimensions of security, human security, social security
Procedia PDF Downloads 3369298 The Diversity in the Concept of Existence from Kierkegaard to Sartre
Authors: Mohammad Motiee
Abstract:
From Kierkegaard to Sartre, the concept of 'being' was debated over various angles in the philosophy of being. Then, the futility, nothingness and absurdity of human condition in the world were all justified and led to a kind of solution by different approaches like Christianity, loss of faith, authentic existence and responsibility. In an extreme concern, the human condition in the world was pondered in different ways and the philosophy of thought tried to render an awareness of such condition for human beings. The present study aims at illustration of some approaches presented by prominent existentialists to justify the controversies in the concept of existence in human life.Keywords: existence, existentialism, alienation, being
Procedia PDF Downloads 5609297 Malaysian Students' Identity in Seminars by Observing, Interviewing and Conducting Focus Group Discussion
Authors: Zurina Khairuddin
Abstract:
The objective of this study is to explore the identities constructed and negotiated by Malaysian students in the UK and Malaysia when they interact in seminars. The study utilised classroom observation, interview and focus group discussion to collect the data. The participants of this study are the first year Malaysian students studying in the UK and Malaysia. The data collected was analysed utilising a combination of Conversation Analysis and framework. This study postulates that Malaysian students in the UK construct and negotiate flexible and different identities depending on the contexts they were in. It also shows that most Malaysian students in the UK and Malaysia are similar in the identities they construct and negotiate. This study suggests implications and recommendations for Malaysian students in the UK and Malaysia, and other stakeholders such as UK and Malaysian academic community.Keywords: conversation analysis, interaction patterns, Malaysian students, students' identity
Procedia PDF Downloads 182