Search results for: ego identity
886 Debunking Sexual Myths in Bangladesh through an Intervention on the Internet
Authors: E. Rommes, Els Toonen, Rahil Roodsaz, Suborna Camellia, Farhana Alam, Saad Khan, Jhalok Ranjon Talukder, Tanveer Hassan, Syeda Farjana Ahmed, Sabina Faiz Rashid
Abstract:
In Bangladesh, a country in which adults (both parents and teachers) find it particularly hard to speak with youth about sexuality, adolescents seem to struggle with various insecurities about their sexual feelings, thoughts, behavior and physical characteristics. On the basis of a large number of interviews and focus groups with rural and urban Bangla adolescent girls and boys of lower and middle class as part of the large-scale three-year project ‘Breaking the Shame’, we have identified ten sexual themes or ‘myths’ that youth struggle with most. These encompass amongst others beliefs and insecurities on masturbation, discharge, same-sex behavior and feelings, the effects of watching porn and gender norms. We argue that the Internet is a particularly suitable medium to ‘debunk’ those myths, as youth can consult it anonymously and privately and so avoid social shame. Moreover, amongst the myths, we have identified two kinds which may need different debunking techniques. One kind of myth concerns scientifically uncontested, generally biological related information, such as the effects of having sex with a pregnant woman, questions on the effects of a penile or vaginal discharge or questions on the effects of masturbation. The second kind of myths concerns more diverse information sources and deals with e.g. religious or culturally specific norms, such as on the meaning and existence of homosexuality or gender appropriate norms of behavior in Bangladesh. For addressing both kinds of myths, expert information including a wealth of references to information resources needs to be provided, which the Internet is very suitable for. For the second kind of myths, adolescents also need to learn how to deal with sometimes conflicting norms and information sources, and they need to develop and reflect on their own opinions as part of their identity formation. On the basis of a literature review, we thus distinguish general information needs from identity formation needs, which includes the need to be able to relate information and opinions to one’s own opinions and situation. Hence, we argue that youth not only need abstract expert information to be able to debunk sexual myths, but also the option to discuss this information with other adolescents and compare their own situation and opinions with other peers, who in that way serve as ‘warm experts’ for each other. In this paper, we will describe the outcomes of our qualitative study above. In addition, we will present our findings of an intervention by presenting youth with general, uncontested information on the Internet with additional peer discussion options to compare the debunking effects on different kinds of myths.Keywords: peer discussion, intervention, sexual myths, shame
Procedia PDF Downloads 216885 Commercialization of Film Festivals: An Autobiographical Analysis
Authors: Önder M. Özdem
Abstract:
Producing and circulating films of professional standards have become technically easier with the development and widespread use of digital recording and distribution technologies. Additionally, film festivals on common platforms have rapidly increased in numbers and diversity. On the one hand, no-charge applications result in excessive submissions; thus, it complicates the evaluation and selection process. On the other hand, festival’s high submission fees may make the distribution of films with a limited budget very difficult. Inspired by the author’s engagement with the film industry as both a pre-jury member of an international film festival and an applicant to many festivals, this study discusses the causes and consequences of the increasing commercialization of film festivals. The author’s double identity, both as a jury and an applicant, provides a comparative perspective through which one can unfold the different dimensions and dynamics in the film production and distribution processes.Keywords: commercialization, film distribution, film festivals, film production
Procedia PDF Downloads 77884 Act East Policy and the Politics of the Non-Recognized Thai-Indian Diasporic Community in Thailand
Authors: Ruchi Agarwal
Abstract:
The Indian diaspora in Thailand is as ethnically diverse as any other country. Although a relatively small community, the Indian diaspora has long established its roots, some with their fifth generation now living in Thailand. The community has a solid social and economic standing recognized by the host country but lacks connections with its ethnic roots in the home country. The biggest dilemma faced by the younger generation of the Indian diasporic community is the identity crisis. Regardless of being born and brought up in Thailand and possessing Thai citizenship, they do not get recognition as Thais by their Thai counterparts. However, with the Act Asia Policy of the Indian government, there has been an increase in social and political activities organized by old and new Indian associations, bringing new hopes of recognizing the Thai-Indian diasporic community.Keywords: Indian, Thailand, diaspora, Act East Policy, Thai
Procedia PDF Downloads 152883 Topological Language for Classifying Linear Chord Diagrams via Intersection Graphs
Authors: Michela Quadrini
Abstract:
Chord diagrams occur in mathematics, from the study of RNA to knot theory. They are widely used in theory of knots and links for studying the finite type invariants, whereas in molecular biology one important motivation to study chord diagrams is to deal with the problem of RNA structure prediction. An RNA molecule is a linear polymer, referred to as the backbone, that consists of four types of nucleotides. Each nucleotide is represented by a point, whereas each chord of the diagram stands for one interaction for Watson-Crick base pairs between two nonconsecutive nucleotides. A chord diagram is an oriented circle with a set of n pairs of distinct points, considered up to orientation preserving diffeomorphisms of the circle. A linear chord diagram (LCD) is a special kind of graph obtained cutting the oriented circle of a chord diagram. It consists of a line segment, called its backbone, to which are attached a number of chords with distinct endpoints. There is a natural fattening on any linear chord diagram; the backbone lies on the real axis, while all the chords are in the upper half-plane. Each linear chord diagram has a natural genus of its associated surface. To each chord diagram and linear chord diagram, it is possible to associate the intersection graph. It consists of a graph whose vertices correspond to the chords of the diagram, whereas the chord intersections are represented by a connection between the vertices. Such intersection graph carries a lot of information about the diagram. Our goal is to define an LCD equivalence class in terms of identity of intersection graphs, from which many chord diagram invariants depend. For studying these invariants, we introduce a new representation of Linear Chord Diagrams based on a set of appropriate topological operators that permits to model LCD in terms of the relations among chords. Such set is composed of: crossing, nesting, and concatenations. The crossing operator is able to generate the whole space of linear chord diagrams, and a multiple context free grammar able to uniquely generate each LDC starting from a linear chord diagram adding a chord for each production of the grammar is defined. In other words, it allows to associate a unique algebraic term to each linear chord diagram, while the remaining operators allow to rewrite the term throughout a set of appropriate rewriting rules. Such rules define an LCD equivalence class in terms of the identity of intersection graphs. Starting from a modelled RNA molecule and the linear chord, some authors proposed a topological classification and folding. Our LCD equivalence class could contribute to the RNA folding problem leading to the definition of an algorithm that calculates the free energy of the molecule more accurately respect to the existing ones. Such LCD equivalence class could be useful to obtain a more accurate estimate of link between the crossing number and the topological genus and to study the relation among other invariants.Keywords: chord diagrams, linear chord diagram, equivalence class, topological language
Procedia PDF Downloads 201882 Secure E-Pay System Using Steganography and Visual Cryptography
Authors: K. Suganya Devi, P. Srinivasan, M. P. Vaishnave, G. Arutperumjothi
Abstract:
Today’s internet world is highly prone to various online attacks, of which the most harmful attack is phishing. The attackers host the fake websites which are very similar and look alike. We propose an image based authentication using steganography and visual cryptography to prevent phishing. This paper presents a secure steganographic technique for true color (RGB) images and uses Discrete Cosine Transform to compress the images. The proposed method hides the secret data inside the cover image. The use of visual cryptography is to preserve the privacy of an image by decomposing the original image into two shares. Original image can be identified only when both qualified shares are simultaneously available. Individual share does not reveal the identity of the original image. Thus, the existence of the secret message is hard to be detected by the RS steganalysis.Keywords: image security, random LSB, steganography, visual cryptography
Procedia PDF Downloads 330881 Formation of Physicalist and Mental Consciousness from a Continuous Four-Dimensional Continuum
Authors: Nick Alex
Abstract:
Consciousness is inseparably connected with energy. Based on panpsychism, consciousness is a fundamental substance that emerged with the birth of the Universe from a continuous four-dimensional continuum. It consists of a physicalist form of consciousness characteristic of all matter and a mental form characteristic of neural networks. Due to the physicalist form of consciousness, metabolic processes were formed, and life in the form of living matter emerged. It is the same for all living matter. Mental consciousness began to develop 3000 million years after the birth of the Universe due to the physicalist form of consciousness, with the emergence of neural networks. Mental consciousness is individualized in contrast to physicalist consciousness. It is characterized by cognitive abilities, self-identity, and the ability to influence the world around us. Each level of consciousness is in its own homeostasis environment.Keywords: continuum, physicalism, neurons, metabolism
Procedia PDF Downloads 28880 Teacher Professional Development with Collaborative Action Research: Teachers' Responses to Research
Authors: Sumaya Saqr
Abstract:
Although many teachers regard academic research as the inclusive domain of academic researchers, teachers should contribute to the body of research guiding their own practice. Drawing on the qualitative analysis of 20 teachers’ reflection journals and interviews, this case study sheds light on the personal and professional benefits of teachers’ applications of collaborative action research in English language teaching context. The findings reveal that several aspects of teacher identity and classroom practice were changed. The present paper aspires to reveal the way in which collaborative action research process, as a learner-centered approach to staff development, would help teachers to become more independent and professionally autonomous and hence effecting change that is far greater than its initial purpose.Keywords: change, collaborative action research, personal and professional benefits, professional development
Procedia PDF Downloads 179879 Results and Insights from a Developmental Psychology Study on the Presentation of Juvenility in Punk Fanzines
Authors: Marc Dietrich
Abstract:
Youth cultures like Punk as much as media relevant to the specific scenes associated with them offer ample opportunity for young people or juvenile adults to construct their personal identities. However, developmental psychology has largely neglected such identity construction processes during the last decades. Such was not always the case: Early developmental psychologists intensely studied youth cultures and their meaningful objects and media in the early 20th century but lost interest when cultural studies and the social sciences occupied the field after World War II. Our project Constructions of Juvenility and Generation(ality), funded by the German Federal Ministry for Education and Research, reintegrates the study of youth cultures and their meaningful objects and media in a developmental psychology perspective. We present an empirical study of the ways in which youth, juvenility, and generation (ality) are constructed and negotiated in underground media like punk fanzines (a portmanteau of fan and magazine), including both semantic and aesthetic aspects of these construction processes within punk culture. The fanzine sample was accessed by the theoretical sampling strategy typical for GTM studies. Acknowledging fanzines as artful self-produced media by scene members for scene members, we conceptualize them as authentic documents of scene norms and values. Drawing on an analysis of both text and (cover) images in Punk fanzines published in Germany (and within a sample dating from 1981 until 2015) using a novel Visual Grounded Theory approach, we found that: a) Juvenility is a highly contested concept in punk culture. Its semantic quality and valuation varies with the perspectives present within the culture (e.g. embryo punks versus older punks); b) Juvenility is constructed as having energy and being socio-critical that does not depend on biological age; c) Juvenility is regarded not an ideal per se in German Punk culture; Punk culture constructs old age in a largely positive way (e.g., as marker of being real and a historical innovator); d) Juvenility is constructed as a habit that should be kept for life as it is constantly adapted to individual biographical trajectories like specific job situations or having a family. Consequently, identity negotiation as documented in the zines attempts to balance subculturally driven perspectives on life and society with the pragmatic requirements of a bourgeois life. The proposed paper will present the main results of this large-scale study of punk fanzines and show how developmental psychology perspectives as represented in the novel methodology applied in it can advance the study of youth cultures.Keywords: construction of juvenility, developmental psychology, visual GTM, youth culture, fanzines
Procedia PDF Downloads 292878 'Naming, Blaming, Shaming': Sexual Assault Survivors' Perceptions of the Practice of Shaming
Authors: Anat Peleg, Hadar Dancig-Rosenberg
Abstract:
This interdisciplinary study, to our knowledge the first in this field, is located on the intersection of victimology-law and society-and media literature, and it corresponds both with feminist writing and with cyber literature which explores the techno-social sphere. It depicts the multifaceted dimensions of shaming in the eyes of the survivors through the following research questions: What are the motivations of sexual-assault survivors to publicize the assailants' identity or to refrain from this practice? Is shaming on Facebook perceived by sexual–assault victims as a substitute for the CJS or as a new form of social activism? What positive and negative consequences do survivors experience as a result of shaming their assailants online? The study draws on in-depth semi-structured interviews which we have conducted between 2016-2018 with 20 sexual-assaults survivors who exposed themselves on Facebook. They were sexually attacked in various forms: six participants reported that they had been raped when they were minors; eight women reported that they had been raped as adults; three reported that they had been victims of an indecent act and three reported that they had been harassed either in their workplace or in the public sphere. Most of our interviewees (12) reported to the police and were involved in criminal procedures. More than half of the survivors (11) disclosed the identity of their attackers online. The vocabularies of motives that have emerged from the thematic analysis of the interviews with the survivors consist of both social and personal motivations for using the practice of shaming online. Some survivors maintain that the use of shaming derives from the decline in the public trust in the criminal justice system. It reflects demand for accountability and justice and serves also as a practice of warning other potential victims of the assailants. Other survivors assert that shaming people in a position of privilege is meant to fulfill the public right to know who these privileged men really are. However, these aforementioned moral and practical justifications of the practice of shaming are often mitigated by fear from the attackers' physical or legal actions in response to their allegations. Some interviewees who are feminist activists argue that the practice of shaming perpetuates the social ancient tendency to define women by labels linking them to the men who attacked them, instead of being defined by their own life complexities. The variety of motivations to adopt or resent the practice of shaming by sexual assault victims presented in our study appear to refute the prevailing intuitive stereotype that shaming is an irrational act of revenge, and denote its rationality. The role of social media as an arena for seeking informal justice raises questions about the new power relations created between victims, assailants, the community and the State, outside the formal criminal justice system. At the same time, the survivors' narratives also uncover the risks and pitfalls embedded within the online sphere for sexual assault survivors.Keywords: criminal justice, gender, Facebook, sexual-assaults
Procedia PDF Downloads 112877 Meeting the Challanges of Regulating Artificial Intelligence
Authors: Abdulrahman S. Shryan Aldossary
Abstract:
Globally, artificial intelligence (AI) is already performing legitimate tasks on behalf of humans. In Saudi Arabia, large-scale national projects, primarily based on AI technologies and receiving billions of dollars of funding, are projected for completion by 2030. However, the legal aspect of these projects is seriously vulnerable, given AI’s unprecedented ability to self-learn and act independently. This paper, therefore, identifies the critical legal aspects of AI that authorities and policymakers should be aware of, specifically whether AI can possess identity and be liable for the risk of public harm. The article begins by identifying the problematic characteristics of AI and what should be considered by legal experts when dealing with it. Also discussed are the possible competent institutions that could regulate AI in Saudi Arabia. Finally, a procedural proposal is presented for controlling AI, focused on Saudi Arabia but potentially of interest to other jurisdictions facing similar concerns about AI safety.Keywords: regulation, artificial intelligence, tech law, automated systems
Procedia PDF Downloads 175876 Management Workspaces to Create Value
Authors: Nevruz Zogu, Shpetim Rezniqi
Abstract:
It is very important that a new environment where work shall be constructed in such a strong record to be creative and eligible for workers, can not have success in the workplace. But, is it possible to design the inner-inspire to create and collaborate? By watching and analyzing examples of creativity in business, construction managers can learn ways on how to encourage their imagination inside buildings. We struggle to find and retain talented employees and skilled labor environment is becoming more and always an important tool for recruiting and retaining employees. Managers who recognize the importance are gaining an edge over their competitors. The physical work environment is as important as its quality is often used as a recruiting tool and even to companies with The relationship between the company and the employees between strategy and behavior, between the product and the customer can reincorporated under the light of symbolic mediation of space, as instrument and interpreter of the core values and identity of the organization.Keywords: strategy, business, quality, productivity, space, offices, assets
Procedia PDF Downloads 389875 The Names of the Traditional Motif of Batik Solo
Authors: Annisa D. Febryandini
Abstract:
Batik is a unique cultural heritage that strongly linked with its community. As a product of current culture in Solo, Batik Solo not only has a specific design and color to represent the cultural identity, cultural values, and spirituality of the community, but also has some specific names given by its community which are not arbitrary. This qualitative research paper uses the primary data by interview method as well as the secondary data to support it. Based on the data, this paper concludes that the names consist of a word or words taken from a current name of things in Javanese language. They indicate the cultural meaning such as a specific event, a hope, and the social status of the people who use the motif. Different from the other research, this paper takes a look at the names of traditional motif of Batik Solo which analyzed linguistically to reveal the cultural meaning.Keywords: traditional motif, Batik, solo, anthropological linguistics
Procedia PDF Downloads 277874 Cryptanalysis of ID-Based Deniable Authentication Protocol Based On Diffie-Hellman Problem on Elliptic Curve
Authors: Eun-Jun Yoon
Abstract:
Deniable authentication protocol is a new security authentication mechanism which can enable a receiver to identify the true source of a given message, but not to prove the identity of the sender to a third party. In 2013, Kar proposed a secure ID-based deniable authentication protocol whose security is based on computational infeasibility of solving Elliptic Curve Diffie-Hellman Problem (ECDHP). Kar claimed that the proposed protocol achieves properties of deniable authentication, mutual authentication, and message confidentiality. However, this paper points out that Kar's protocol still suffers from sender spoofing attack and message modification attack unlike its claims.Keywords: deniable authentication, elliptic curve cryptography, Diffie-Hellman problem, cryptanalysis
Procedia PDF Downloads 332873 Establishment of Thuja Label: Development Prospects for the Marketing Practices of the Handicraft of Essaouira's Marquetry
Authors: Fatima El Kandoussi, Lamiae El Hdiddioui, Mustapha Bouragba
Abstract:
The woodwork of thuja in Essaouira is one of the main crafts in Morocco. Certainly, marquetry reflects both cultural and artistic identity of the city, considering the talent and ancestral knowledge of craftsman working in marquetry. Yet, the production units encounter a considerable number of difficulties among which insufficiencies within marketing practices. Consequently, it is obvious that major improvements are needed, and supportive solutions must be provided in order to improve the Essaouira’s marquetry, as a symbol of the entire province. Thus, the establishment of Thuja Label is a necessary measure that would be the key to ensuring sustainability of this vital craft. The main purpose of this paper is to study marketing practices’ current state of the production units in the marquetry of Essaouira, therefore to recommend remedial actions likely to raise them up to the required functional level.Keywords: craft, marketing practices, marquetry, thuja label
Procedia PDF Downloads 198872 Problems and Prospects of Protection of Historical Building as a Corner Stone of Cultural Policy for International Collaboration in New Era: A Study of Fars Province, Iran
Authors: Kiyanoush Ghalavand, Ali Ferydooni
Abstract:
Fars province Fārs or Pārs is a vast land located in the southwest of Iran. All over the province, you can see and feel the glory of Ancient Iranian culture and civilization. There are many monuments from pre-historical to the Islamic era within this province. The existence of ancient cultural and historical monuments in Fars province including the historical complex of Persepolis, the tombs of Persian poets Hafez and Saadi, and dozens of other valuable cultural and historical works of this province as a symbol of Iranian national identity and the manifestation of transcendent cultural values of this national identity. Fars province is quintessentially Persian. Its name is the modern version of ancient Parsa, the homeland, if not the place of origin, of the Persians, one of the great powers of antiquity. From here, the Persian Empire ruled much of Western and Central Asia, receiving ambassadors and messengers at Persepolis. It was here that the Persian kings were buried, both in the mountain behind Persepolis and in the rock face of nearby Naqsh-e Rustam. We have a complex paradox in Persian and Islamic ideology in the age of technology in Iran. The main purpose of the present article is to identify and describe the problems and prospects of origin and development of the modern approach to the conservation and restoration of ancient monuments and historic buildings, the influence that this development has had on international collaboration in the protection and conservation of cultural heritage, and the present consequences worldwide. The definition of objects and structures of the past as heritage, and the policies related to their protection, restoration, and conservation, have evolved together with modernity, and are currently recognized as an essential part of the responsibilities of modern society. Since the eighteenth century, the goal of this protection has been defined as the cultural heritage of humanity; gradually this has included not only ancient monuments and past works of art but even entire territories for a variety of new values generated in recent decades. In its medium-term program of 1989, UNESCO defined the full scope of such heritage. The cultural heritage may be defined as the entire corpus of material signs either artistic or symbolic handed on by the past to each culture and, therefore, to the whole of humankind. As a constituent part of the affirmation and enrichment of cultural identities, as a legacy belonging to all humankind, the cultural heritage gives each particular place its recognizable features and is the storehouse of human experience. The preservation and the presentation of the cultural heritage are therefore a corner-stone of any cultural policy. The process, from which these concepts and policies have emerged, has been identified as the ‘modern conservation movement’.Keywords: tradition, modern, heritage, historical building, protection, cultural policy, fars province
Procedia PDF Downloads 163871 Urban Conservation Methodology for Heritage Areas Case Study "Qabel Street, Old Jeddah"
Authors: Hossam Elborombaly, Nader Y. Azab
Abstract:
The Middle East region is rich with its architecture and urban settings. This makes it viable for exploring and applying different strategies that deal with conservation. Current context characterized by pollution, socioeconomic issues, behavioral problems, etc. affects architectural and urban heritage –literally- in all Middle Eastern countries. Although there have been numerous strategies in place to preserve and/ or rehabilitate heritage, all has been designed and implemented following political more than technical or methodical processes. This only resulted in more deterioration of the targeted areas. This paper explores different approaches in some selected Arab countries and relies on comparative analysis with some successful European experiences. The aim is to establish some solid basis for dealing with heritage areas; an approach that respects heritage and traditions without compromising sustainability or socioeconomic opportunities.Keywords: conservation, heritage, identity, urban conservation methodology,
Procedia PDF Downloads 393870 Queer Anti-Urbanism: An Exploration of Queer Space Through Design
Authors: William Creighton, Jan Smitheram
Abstract:
Queer discourse has been tied to a middle-class, urban-centric, white approach to the discussion of queerness. In doing so, the multilayeredness of queer existence has been washed away in favour of palatable queer occupation. This paper uses design to explore a queer anti-urbanist approach to facilitate a more egalitarian architectural occupancy. Scott Herring’s work on queer anti-urbanism is key to this approach. Herring redeploys anti-urbanism from its historical understanding of open hostility, rejection and desire to destroy the city towards a mode of queer critique that counters normative ideals of homonormative metronormative gay lifestyles. He questions how queer identity has been closed down into a more diminutive frame where those who do not fit within this frame are subjected to persecution or silenced through their absence. We extend these ideas through design to ask how a queer anti-urbanist approach facilitates a more egalitarian architectural occupancy. Following a “design as research” methodology, the design outputs allow a vehicle to ask how we might live, otherwise, in architectural space. A design as research methodologically is a process of questioning, designing and reflecting – in a non-linear, iterative approach – establishes itself through three projects, each increasing in scale and complexity. Each of the three scales tackled a different body relationship. The project began exploring the relations between body to body, body to known others, and body to unknown others. Moving through increasing scales was not to privilege the objective, the public and the large scale; instead, ‘intra-scaling’ acts as a tool to re-think how scale reproduces normative ideas of the identity of space. There was a queering of scale. Through this approach, the results were an installation that brings two people together to co-author space where the installation distorts the sensory experience and forces a more intimate and interconnected experience challenging our socialized proxemics: knees might touch. To queer the home, the installation was used as a drawing device, a tool to study and challenge spatial perception, drawing convention, and as a way to process practical information about the site and existing house – the device became a tool to embrace the spontaneous. The final design proposal operates as a multi-scalar boundary-crossing through “private” and “public” to support kinship through communal labour, queer relationality and mooring. The resulting design works to set adrift bodies in a sea of sensations through a mix of pleasure programmes. To conclude, through three design proposals, this design research creates a relationship between queer anti-urbanism and design. It asserts that queering the design process and outcome allows a more inclusive way to consider place, space and belonging. The projects lend to a queer relationality and interdependence by making spaces that support the unsettled, out-of-place, but is it queer enough?Keywords: queer, queer anti-urbanism, design as research, design
Procedia PDF Downloads 176869 Behavioral Experiments of Small Societies in Social Media: Facebook Expressions of Anchored Relationships
Authors: Nuran Öze
Abstract:
Communities and societies have been changing towards computer mediated communication. This paper explores online and offline identities and how relationships are formed and negotiated within internet environments which offer opportunities for people who know each other offline and move into relationships online. The expectations and norms of behavior within everyday life cause people to be embodied self. According to the age categories of Turkish Cypriots, their measurements of attitudes in Facebook will be investigated. Face-to-face field research and semi-structured interview methods are used in the study. Face-to-face interview has been done with Turkish Cypriots who are using Facebook already. According to the study, in constructing a linkage between real and virtual identities mostly affected from societal relations serves as a societal grooming tool for Turkish Cypriots.Keywords: facebook, identity, social media, virtual reality
Procedia PDF Downloads 302868 Trapped in Hegemonic Binaries: Performing the Body
Authors: Bitopi Dutta
Abstract:
This paper attempts to understand the constructs of binaries while taking into account the politics of the body. It delves into how these constructs get fashioned and recreated while performing the same across normative and non-normative discourses. While it may be almost mundane and commonplace to see the performance of body within binary constructs across the normative discourses, this is to a great extent also true for those queer discourses that have challenged the conventional/normative. With a queer feminist perspective, the paper challenges this performativity while simultaneously engaging with the subtle nuances of blurring the borders of gender markers. The problem with this polarization within binary constructs is that there remains a tendency to reinstate patriarchy within queerness. To substantiate this argument further, the paper will draw from narratives and accounts of identities with alternate sexualities and genders. The paper concludes with problematising this hegemony within queer discourses locating the question of acceptance and visibility of fluidities.Keywords: binary, body, gender, identity, performativity, queer
Procedia PDF Downloads 291867 Biometric Recognition Techniques: A Survey
Authors: Shabir Ahmad Sofi, Shubham Aggarwal, Sanyam Singhal, Roohie Naaz
Abstract:
Biometric recognition refers to an automatic recognition of individuals based on a feature vector(s) derived from their physiological and/or behavioral characteristic. Biometric recognition systems should provide a reliable personal recognition schemes to either confirm or determine the identity of an individual. These features are used to provide an authentication for computer based security systems. Applications of such a system include computer systems security, secure electronic banking, mobile phones, credit cards, secure access to buildings, health and social services. By using biometrics a person could be identified based on 'who she/he is' rather than 'what she/he has' (card, token, key) or 'what she/he knows' (password, PIN). In this paper, a brief overview of biometric methods, both unimodal and multimodal and their advantages and disadvantages, will be presented.Keywords: biometric, DNA, fingerprint, ear, face, retina scan, gait, iris, voice recognition, unimodal biometric, multimodal biometric
Procedia PDF Downloads 756866 Clicking Based Graphical Password Scheme Resistant to Spyware
Authors: Bandar Alahmadi
Abstract:
The fact that people tend to remember pictures better than texts, motivates researchers to develop graphical passwords as an alternative to textual passwords. Graphical passwords as such were introduced as a possible alternative to traditional text passwords, in which users prove their identity by clicking on pictures rather than typing alphanumerical text. In this paper, we present a scheme for graphical passwords that are resistant to shoulder surfing attacks and spyware attacks. The proposed scheme introduces a clicking technique to chosen images. First, the users choose a set of images, the images are then included in a grid where users can click in the cells around each image, the location of the click and the number of clicks are saved. As a result, the proposed scheme can be safe from shoulder surface and spyware attacks.Keywords: security, password, authentication, attack, applications
Procedia PDF Downloads 165865 Features Valuation of Intellectual Capital in the Organization
Authors: H. M. Avanesyan
Abstract:
Economists have been discussing the importance of intangible assets for the success of organization for many years. The term intellectual capital was popularized in the 1990s by Thomas Stewart. “Intellectual capital is the knowledge, applied experience, enterprise processes and technology customer relationship and professional skills which are valuable assets to an organization.” Human capital – includes employee brainpower, competence, skills, experience and knowledge. Customer capital – includes relations and networks with partners, suppliers, distributors, and customers. The objective of the article is to assess one of the key components of organizational culture – organizational values. The focus of the survey was on assessing how intellectual capital presented in these values of the organization. In the conclusion section the article refers to underestimation of intellectual capital by the organization management and the various possible negative effects of the latter.Keywords: human capital, intellectual capital, organizational culture, management, social identity, organization
Procedia PDF Downloads 466864 Parallels Between Indian Art Music and Western Art Music: The Suppression of the Notion of the 'Melody'
Authors: Kedarnath Awati
Abstract:
Some parallels between Indian Art Music and Western Art Music, such as the identity of the basic heptatonic scale structure, are quite obvious and need no further discussion. Other parallels are far less obvious, and it is one of them that the author is interested in. Specifically, the author would like to make a serious claim that in both types of music, there is an unspoken dependence on melody. Yes, it is true that the techniques that the two systems use for elaboration are very, very different: Western music uses the techniques of harmony, counterpoint, orchestration and motivic variation, while the Indian systems, both the Hindustani and the Carnatic traditions use the technique of raagdaari. The reason that this point is barely spoken about is that both in the West as well as in India, artists tend to think of melody as something elementary or as something 'given'. The Indian musicians would much rather dwell upon this or that meend or taan or other technical device, while the West thinks that melody is passé and would rather discuss the merits and demerits of spectralism and perhaps serialism. The author would like to explore this theme further in his paper.Keywords: Indian art music, Western art music, melody, raagdaari, motivic variation.
Procedia PDF Downloads 64863 Cultural Heritage Impact Assessments and the Negotiation of Identity in South Africa
Authors: Rosabelle Boswell
Abstract:
South Africa, a country with experience of both colonial rule and apartheid is now more than 25 years past its first democratic elections. However, and as noted in this article, South Africa is still experiencing the legacies of racial segregation and is concerned to address inequality by attracting investment for socioeconomic development. The paper offered considers five cultural heritage impact assessments conducted in South Africa for offshore oil and gas exploration and development. The results of the research, from more than 20 towns and cities in southern Africa, indicate a rich intangible cultural heritage in South Africa and Namibia, and the potential impacts on investor engagements for more inclusive and sustainable coastal development practices. The discussion advances critical heritage studies, taking into account socioeconomic realities and aboriginal concepts of nature and nature management.Keywords: cultural heritage impact assessments, intangible cultural heritage, South Africa, ocean philosophies
Procedia PDF Downloads 157862 A Cultural-Sensitive Approach to Counseling a Samoan Sex Offender
Authors: Byron Malaela Sotiata Seiuli
Abstract:
Sexual violation is any form of sexual violence, including rape, child molestation, incest, and similar forms of non-consensual sexual contact. Much of these acts of violation are perpetuated, but not entirely, by men against women and children. Moetolo is a Samoan term that is used to describe a person who sexually violates another while they or their family are asleep. This paper presents and discusses sexual abuse from a Samoan viewpoint. Insights are drawn from the authors’ counseling engagement with a Samoan sex offender as part of his probation review process. Relevant literature is also engaged to inform and provide interpretation to the therapeutic work carried out. This article seeks to contribute new understanding to patterned responses of some Samoan people to sexual abuse behaviors, and steps to remedy arising concerns with perpetrators seeking reintegration back into their communities.Keywords: Fa'asamoa, Samoan identity, sexual abuse counseling, Uputaua therapeutic approach
Procedia PDF Downloads 301861 Cultural Resources Management of the Early Hospitals in Jordan between: 1890-1950
Authors: Jawdat Goussous, Samer Abu Ghazaleh
Abstract:
Heritage is closely linked with the national identity and because Jordan is a rich country of heritage where many civilizations had lived from early beginning of history ,therefore the conservation of this heritage is national task that gives many benefits as correlation between local inhabitance and enhance the linked with spirit of place . This study takes into account the most important concentration on some of old hospitals in Jordan ,which were constructed between 1890-1950 ,looking in their historical and architectural heritage values gained by their architectural distinguished ,longevity and their linked with events that happened in the region. then Focus on the study and analysis of some of them in terms of conservation methodology that have been followed to conserve the early hospitals such as preservation ,maintenance ,adaptive reuse , And their positive effects on these buildings, emphasize the importance of these buildings because of their historical and architectural values.Keywords: evangelical missionary, early hospitals, medical services, renovation
Procedia PDF Downloads 455860 Team Members' Perception of Team Leader's Effectiveness in Biotechnology Industry in India
Authors: Keerthana Gonella, Kamesh Apparaju
Abstract:
Teams are all pervasive and team leadership is a much discussed topic in managing projects that characterize the modern work environment. Biotechnology industry in India is an area of research interest for scholars on leadership, especially, team leadership. The present paper examines the perception of team members on the effectiveness of their team leaders in the biotechnology industry in India. This is an empirical study in which the data was collected by administering the closed-ended questionnaire to the respondents from across India. The effectiveness of the team leader is dependent upon his goal orientation that creates a collaborative climate. Leaders with technical know-how inspire teamwork with trust. They build confidence, mitigate the differences and expand team capabilities through teamwork. Effective leaders also create team identity making the most of the differences with a vision.Keywords: collaboration, perception, team, team capabilities, team leadership
Procedia PDF Downloads 308859 Cultural Identity of Mainland Chinese, Hongkonger and Taiwanese: A Glimpse from Hollywood Film Title Translation
Authors: Ling Yu Debbie Tsoi
Abstract:
After China has just exceeded the USA as the top Hollywood film market in 2018, Hollywood studios have been adapting the taste, preference, casting and even film title translation to resonate with the Chinese audience. Due to the huge foreign demands, Hollywood film directors are paying closer attention to the translation of their products, as film titles are entry gates to the film and serve advertising, informative, aesthetic functions. Other than film directors and studios, comments over quality film title translation also appear on various online clip viewing platforms, online media, and magazines. In particular, netizens in mainland China, Hong Kong, and Taiwan seems to defend film titles in their own region while despising the other two regions. In view of the endless debates and lack of systematic analysis on film title translation in Greater China, the study aims at investigating the translation of Hollywood film titles (from English to Chinese) across Greater China based on Venuti’s (1991; 1995; 1998; 2001) concept of domestication and foreignization. To offer a comparison over time, a mini-corpus was built comprised of the top 70 most popular Hollywood film titles in 1987- 1988, 1997- 1998, 2007- 2008 and 2017- 2018 of Greater China respectively. Altogether, 560 source texts and 1680 target texts of mainland China, Hong Kong, and Taiwan were compared against each other. The three regions are found to have a distinctive style and patterns of translation. For instance, a sizable number of film titles are foreignized in mainland China by adopting literal translation and transliteration, whereas Hong Kong and Taiwan prefer domestication. Hong Kong tends to adopt a more vulgar style by using colloquial Cantonese slangs and even swear words, associating characters with negative connotations. Also, English is used as a form of domestication in Hong Kong from 1987 till 2018. Use of English as a strategy of domestication was never found in mainland nor Taiwan. On the contrary, Taiwanese target texts tend to adopt a cute and child-like style by using repetitive words and positive connotations. Even if English was used, it was used as foreignization. As film titles represent cultural products of popular culture, it is suspected that Hongkongers would like to develop cultural identity via adopting style distinctive from mainland China by vulgarization and negativity. Hongkongers also identify themselves as international cosmopolitan, leading to their identification with English. It is also suspected that due to former colonial rule of Japan, Taiwan adopts a popular culture similar to Japan, with cute and childlike expressions.Keywords: cultural identification, ethnic identification, Greater China, film title translation
Procedia PDF Downloads 151858 Living the Religious of the Virgin Mary (RVM) Educational Mission: A Grounded Theory Approach
Authors: Violeta Juanico
Abstract:
While there was a statement made by the RVM Education Ministry Commission that its strength is its Ignacian identity, shaped by the Ignacian spirituality that permeates the school community leading to a more defined RVM school culture, there has been no empirical study made in terms of a clear and convincing conceptual framework on how the RVM Educational mission is lived in the Religious of the Virgin Mary (RVM) learning institutions to the best of author’s knowledge. This dissertation is an attempt to come up with a substantive theory that supports and explains the stakeholders’ experiences with the RVM educational mission in the Philippines. Participants that represent the different stakeholders ranging from students to administrators were interviewed. The expressions and thoughts of the participants were initially coded and analyzed using the Barney Glaser’s original grounded theory methodology to find out how the RVM mission is lived in the field of education.Keywords: catholic education, grounded theory, lived experience, RVM educational mission
Procedia PDF Downloads 468857 Geospatial Technologies in Support of Civic Engagement and Cultural Heritage: Lessons Learned from Three Participatory Planning Workshops for Involving Local Communities in the Development of Sustainable Tourism Practices in Latiano, Brindisi
Authors: Mark Opmeer
Abstract:
The fruitful relationship between cultural heritage and digital technology is evident. Due to the development of user-friendly software, an increasing amount of heritage scholars use ict for their research activities. As a result, the implementation of information technology for heritage planning has become a research objective in itself. During the last decades, we have witnessed a growing debate and literature about the importance of computer technologies for the field of cultural heritage and ecotourism. Indeed, implementing digital technology in support of these domains can be very fruitful for one’s research practice. However, due to the rapid development of new software scholars may find it challenging to use these innovations in an appropriate way. As such, this contribution seeks to explore the interplay between geospatial technologies (geo-ict), civic engagement and cultural heritage and tourism. In this article, we discuss our findings on the use of geo-ict in support of civic participation, cultural heritage and sustainable tourism development in the southern Italian district of Brindisi. In the city of Latiano, three workshops were organized that involved local members of the community to distinguish and discuss interesting points of interests (POI’s) which represent the cultural significance and identity of the area. During the first workshop, a so called mappa della comunità was created on a touch table with collaborative mapping software, that allowed the participators to highlight potential destinations for tourist purposes. Furthermore, two heritage-based itineraries along a selection of identified POI’s was created to make the region attractive for recreants and tourists. These heritage-based itineraries reflect the communities’ ideas about the cultural identity of the region. Both trails were subsequently implemented in a dedicated mobile application (app) and was evaluated using a mixed-method approach with the members of the community during the second workshop. In the final workshop, the findings of the collaboration, the heritage trails and the app was evaluated with all participants. Based on our conclusions, we argue that geospatial technologies have a significant potential for involving local communities in heritage planning and tourism development. The participants of the workshops found it increasingly engaging to share their ideas and knowledge using the digital map of the touch table. Secondly, the use of a mobile application as instrument to test the heritage-based itineraries in the field was broadly considered as fun and beneficial for enhancing community awareness and participation in local heritage. The app furthermore stimulated the communities’ awareness of the added value of geospatial technologies for sustainable tourism development in the area. We conclude this article with a number of recommendations in order to provide a best practice for organizing heritage workshops with similar objectives.Keywords: civic engagement, geospatial technologies, tourism development, cultural heritage
Procedia PDF Downloads 287