Search results for: identity based encryption
29169 Lesbian Stereotype Representation in Cinema in Turkey
Authors: Hasan Gürkan, Rengin Ozan
Abstract:
Cinema, as a popular mass media tool, affects the general perception of the society against sexual identity. By establishing on interaction relationship with cinema and social reality, the study also tries to answer what the importance of lesbian identity in social life in films in Turkey is. This article focus on representing the description of the women characters who call their selves lesbian in Turkey cinema. The study tries to answer these three questions: First, how the lesbian characters are represented in films in Turkey? Second, what is the reality of the lesbian sexual identity in the films? Third, what are the differences and similarities between the lesbian characters in films in Turkey before 2000s and after 2000s? The films are analysed by the sociological film interpretation in this study. When comparing the films before 2000 and after 2000, it is possible to say that there have been no lesbian characters in many films. Especially almost all of the films (Haremde Dört Kadın, Ver Elini İstanbul, Dul Bir Kadın, Gramofon Avrat, Lola and Billidikid), during 1960s, just threw looks indirect the lesbian sex identity. Just in the films Düş Gezginleri, İki Genç Kız and Nar, the women character (also called them as lesbian) are the leading role and the plot of the films is progressing over these characters.Keywords: cinema in Turkey, lesbian identity, representation, stereotype
Procedia PDF Downloads 33829168 A Unique Professional Development of Teacher Educators: Teaching Colleagues
Authors: Naomi Weiner-Levy
Abstract:
The Mofet Institute of Research, established a School of Professional Development, the only one of its kind in Israel and throughout the world. It offers specialized programs for teacher educators, providing them with the professional knowledge and skills. The studies aim at updating teachers about rapidly changing knowledge and skills. Teacher educators are conceptualized as shifting from first order practitioners (school teachers) to second order practitioners. Those who train teachers are referred to as third order practitioners. The instructors in the School of Professional Development are third-order practitioners – teacher educators specializing in teaching their colleagues. Collegial guidance by teachers’ college staff members is no simple task: Tutors must be expert in their field of specialization, as well as in instruction. Moreover, although colleagues, they have to position themselves within the group as authoritative figures in terms of instruction and knowledge. To date, the role and professional identity of these third-order practitioners, has not been studied. To understand the nature and development of professional identity, a qualitative study was conducted in which 12 tutors of various subjects were interviewed. These were analyzed by categorical content analysis. The findings, assessed professional identity through a post-modern prism, while examining the interplay among events that tutors experienced, the knowledge they acquired and the structuring of their professional identity. The Tutors’ identity transformed through negotiating with ‘self’ and ‘other’ in the class, and constructed by their mutual experiences as tutors and learners. Understanding the function and identity of tutors facilitates comprehension of this unique training process for teacher educators.Keywords: professional development, professional identity, teacher education, tutoring
Procedia PDF Downloads 22129167 Main Chaos-Based Image Encryption Algorithm
Authors: Ibtissem Talbi
Abstract:
During the last decade, a variety of chaos-based cryptosystems have been investigated. Most of them are based on the structure of Fridrich, which is based on the traditional confusion-diffusion architecture proposed by Shannon. Compared with traditional cryptosystems (DES, 3DES, AES, etc.), the chaos-based cryptosystems are more flexible, more modular and easier to be implemented, which make them suitable for large scale-data encyption, such as images and videos. The heart of any chaos-based cryptosystem is the chaotic generator and so, a part of the efficiency (robustness, speed) of the system depends greatly on it. In this talk, we give an overview of the state of the art of chaos-based block ciphers and we describe some of our schemes already proposed. Also we will focus on the essential characteristics of the digital chaotic generator, The needed performance of a chaos-based block cipher in terms of security level and speed of calculus depends on the considered application. There is a compromise between the security and the speed of the calculation. The security of these block block ciphers will be analyzed.Keywords: chaos-based cryptosystems, chaotic generator, security analysis, structure of Fridrich
Procedia PDF Downloads 68329166 Security Analysis of Mod. S Transponder Technology and Attack Examples
Authors: M. Rutkowski, J. Cwiklak, M. Grzegorzewski, M. Adamski
Abstract:
All class A Airplanes have to be equipped with Mod. S transponder for ATC surveillance purposes. This technology was designed to provide a robust and dependable solution to localize, identify and exchange data with the airplane. The purpose of this paper is to analyze potential hazards that are a result of lack of any security or encryption on a design level. Secondary Surveillance Radars rely on an active response from an airplane. SSR radar installation is broadcasting a directional interrogation signal to the planes in range on 1030MHz frequency with DPSK modulation. If the interrogation is correctly received by the transponder located on the plane, a proper answer is sent on 1090MHz with PPM modulation containing plane’s SQUAWK, barometric altitude, GPS coordinates and 24bit unique address code. This technology does not use any kind of encryption. All of the specifications from the previous chapter can be found easily on the internet. Since there is no encryption or security measure to ensure the credibility of the sender and message, it is highly hazardous to use such technology to ensure the safety of the air traffic. The only thing that identifies the airplane is the 24-bit unique address. Most of the planes have been sniffed by aviation enthusiasts and cataloged in web databases. In the moment of writing this article, The PoFung Technologies has announced that they are planning to release all band SDR transceiver – this device would be more than enough to build your own Mod. S Transponder. With fake transponder, a potential terrorist can identify as a different airplane. By replacing the transponder in a poorly controlled airspace, hijackers can enter another airspace identifying themselves as another plane and land in the desired area.Keywords: flight safety, hijack, mod S transponder, security analysis
Procedia PDF Downloads 29329165 Exploring the Illness Experience of Fibromyalgia Patients Using Identity Boxes
Authors: Nicole Brown
Abstract:
This study considers the illness experience of fibromyalgia patients by using identity boxes. The results improve health care professionals' understanding of patient experiences. Additionally, the concept of the identity boxes may offer a practical solution for helping patients accept the diagnosis of fibromyalgia. Fibromyalgia research traditionally refers to pain experiences and relies on questionnaires, surveys, interviews and some narrative analysis. However, due to the variability in symptoms, symptom levels, and locations, these methods may not be best suited to provide an insight into the patient experience. On the other hand, lengthy interview processes are not easily accessible for sufferers of fibromyalgia. In addition to timelines and diary extracts, this study uses identity boxes as its main data collection method. Participants are asked to find items in response to specific questions and to arrange them in their box. The objects represent the patients' experiences holistically. Participants provide photographs of their identity box at each stage of the process and explain their chosen items. The photographs of the identity boxes and the patients' explanations of their objects and their boxes are subjected to interpretative phenomenological analysis. Despite the unique forms of the completed boxes, common experiences are described: the need for comfort, the role of spirituality and the impact of fibromyalgia on everyday life, that it plays a significant role but those patients are determined not to let it rule their lives. The work with the identity boxes has shown beneficial impact due to the reflective nature involved in the tasks. Further investigations will be needed to identify the long-term impact of identity work using such boxes.Keywords: biographical disruption, fibromyalgia, illness experience, illness narrative
Procedia PDF Downloads 23429164 Towards a Non-Cohesive Self Metamodernist Literature as Case Study
Authors: Ali Oublal
Abstract:
If any period in history seems appropriate for the study of identity, it is a period of greater mobility; the 21st century. Margaret Wetherill (2009) is thus right while asking who we can be in this age. New biographies of people, their trajectories and new locations appear on the ground; how people do make sense of the self becomes the central question not only for social scientists, and cultural theorists but also for literary critics. New-fangled technologies have resulted in the substitution of stable identities by multiple, fragmented and more uncertain identities. A liquid sense of the self as well as unstable and dynamic forms of life does not fail to inspire novelists who have given robust sense of identities attributed to their characters. The following account comes to snapshot features of identity as being presented by meta-modernist novels: the sympathizer, sisters and a girl is a half formed thing. It is a stance that refutes the claim of Elliott‘s who still adheres the stable state of identity in meta-modernist age while reconciling the two paradigms modernity and postmodernity.Keywords: identity, metamodernism, fragmantation, stability, literature
Procedia PDF Downloads 10529163 Implementation and Performance Analysis of Data Encryption Standard and RSA Algorithm with Image Steganography and Audio Steganography
Authors: S. C. Sharma, Ankit Gambhir, Rajeev Arya
Abstract:
In today’s era data security is an important concern and most demanding issues because it is essential for people using online banking, e-shopping, reservations etc. The two major techniques that are used for secure communication are Cryptography and Steganography. Cryptographic algorithms scramble the data so that intruder will not able to retrieve it; however steganography covers that data in some cover file so that presence of communication is hidden. This paper presents the implementation of Ron Rivest, Adi Shamir, and Leonard Adleman (RSA) Algorithm with Image and Audio Steganography and Data Encryption Standard (DES) Algorithm with Image and Audio Steganography. The coding for both the algorithms have been done using MATLAB and its observed that these techniques performed better than individual techniques. The risk of unauthorized access is alleviated up to a certain extent by using these techniques. These techniques could be used in Banks, RAW agencies etc, where highly confidential data is transferred. Finally, the comparisons of such two techniques are also given in tabular forms.Keywords: audio steganography, data security, DES, image steganography, intruder, RSA, steganography
Procedia PDF Downloads 28729162 Transforming Healthcare Data Privacy: Integrating Blockchain with Zero-Knowledge Proofs and Cryptographic Security
Authors: Kenneth Harper
Abstract:
Blockchain technology presents solutions for managing healthcare data, addressing critical challenges in privacy, integrity, and access. This paper explores how privacy-preserving technologies, such as zero-knowledge proofs (ZKPs) and homomorphic encryption (HE), enhance decentralized healthcare platforms by enabling secure computations and patient data protection. An examination of the mathematical foundations of these methods, their practical applications, and how they meet the evolving demands of healthcare data security is unveiled. Using real-world examples, this research highlights industry-leading implementations and offers a roadmap for future applications in secure, decentralized healthcare ecosystems.Keywords: blockchain, cryptography, data privacy, decentralized data management, differential privacy, healthcare, healthcare data security, homomorphic encryption, privacy-preserving technologies, secure computations, zero-knowledge proofs
Procedia PDF Downloads 1729161 Redefining Identity of People with Disabilities Based on Content Analysis of Instagram Accounts
Authors: Grzegorz Kubinski
Abstract:
The proposed paper is focused on forms of identity expression in people with disabilities (PWD) in the social networks like Instagram. Theoretical analysis widely proposes using the new media as an assistive tool for improving wellbeing and labour activities of PWD. This kind of use is definitely important and plays a key role in all social inclusion processes. However, Instagram is not a place where PWD only express their own problems, but in the opposite, allows them to construct a new definition of disability. In the paper, the problem how this different than a classical approach to disability is created by PWD will be discussed. This issue will be scrutinized mainly in two points. Firstly, the question of how disability is changed by other everyday activities, like fashion or sport, will be described. Secondly, and this could be seen as more important, the point how PWD redefining their bodies creating a different form of aesthetic will be presented. The paper is based on content analysis of Instagram accounts. About 20 accounts created by PWD were analyzed for 6 month period, taking into account elements like photos, comments and discussions. All those information were studied in relation to 'everyday life' category and 'aesthetic' category. Works by T. Siebers, L. J. Davis or R. McRuer were used as theoretical background. Conclusions and interpretations presented in the proposed paper show that the Internet can be used by PWD not only as prosthetic and assistive tools. PWD willingly use them as modes of expression their independence, agency and identity. The paper proposes that in further research this way of using the Internet communication by PWD should be taken into account as an important part of the understanding of disability.Keywords: body, disability, identity, new media
Procedia PDF Downloads 13729160 The Quest for Identity among African Americans: Life History of Imahkus Nzinga
Authors: Felicia Masenu
Abstract:
Identity formation remains central to diaspora populations as they are known to have multiple attachments to places, including the 'ancestral homeland.' This paper emphasizes the potency of the ancestral homeland in the imagination of diaspora populations and a 'yearning' for an eventual return. This has led to the repatriation and visits of many Diasporan Africans to Africa. What have also been highlighted are the motivations, experiences, and challenges associated with the return of African Americans to Africa, as well as some of the idealistic expectations that Diasporan Africans have regarding the ancestral homeland. When Diasporan Africans visit Africa, they are faced with different kinds of situations that are challenging. Yet, the number of visits to Africa by Diasporan Africans, particularly, African Americans, keep increasing. This paper draws on the life history of Imahkus Nzinga, an African American who repatriated to Ghana in the 1990s, as a case study of African Americans’ relentless quest to pursue the ancestral homeland, despite the challenges involved. The paper argues that the quest for identity construction remains the overriding motivation for African Americans in their decision to repatriate to Africa, and discusses how in this case, Imahkus Nzinga attempts to reconcile what is called in this paper 'identity struggle.'Keywords: African Americans, Diaspora, identity formation, identity struggle, repatriation
Procedia PDF Downloads 32529159 Integrated Model for Enhancing Data Security Performance in Cloud Computing
Authors: Amani A. Saad, Ahmed A. El-Farag, El-Sayed A. Helali
Abstract:
Cloud computing is an important and promising field in the recent decade. Cloud computing allows sharing resources, services and information among the people of the whole world. Although the advantages of using clouds are great, but there are many risks in a cloud. The data security is the most important and critical problem of cloud computing. In this research a new security model for cloud computing is proposed for ensuring secure communication system, hiding information from other users and saving the user's times. In this proposed model Blowfish encryption algorithm is used for exchanging information or data, and SHA-2 cryptographic hash algorithm is used for data integrity. For user authentication process a user-name and password is used, the password uses SHA-2 for one way encryption. The proposed system shows an improvement of the processing time of uploading and downloading files on the cloud in secure form.Keywords: cloud Ccomputing, data security, SAAS, PAAS, IAAS, Blowfish
Procedia PDF Downloads 47529158 Identity Verification Using k-NN Classifiers and Autistic Genetic Data
Authors: Fuad M. Alkoot
Abstract:
DNA data have been used in forensics for decades. However, current research looks at using the DNA as a biometric identity verification modality. The goal is to improve the speed of identification. We aim at using gene data that was initially used for autism detection to find if and how accurate is this data for identification applications. Mainly our goal is to find if our data preprocessing technique yields data useful as a biometric identification tool. We experiment with using the nearest neighbor classifier to identify subjects. Results show that optimal classification rate is achieved when the test set is corrupted by normally distributed noise with zero mean and standard deviation of 1. The classification rate is close to optimal at higher noise standard deviation reaching 3. This shows that the data can be used for identity verification with high accuracy using a simple classifier such as the k-nearest neighbor (k-NN).Keywords: biometrics, genetic data, identity verification, k nearest neighbor
Procedia PDF Downloads 25329157 Place, Female and Latino Identities in Kali Fajardo-Anstine’s Short Story Collection Sabrina and Corina
Authors: Jaroslav Kusnir
Abstract:
In her short story collection, Sabrina & Corina, Kali Fajardo-Anstine depicts mostly Latina characters of indigenous background living and travelling in the American West and the Southwest. In all the stories, place and the environment plays an important role in the construction of cultural identity of these characters that is influenced by their indigenous background, a specificity of the American West, its culture and environment, as well as a contemporary (modern) American culture, position of women and gender roles in a Latino community in the USA. This paper will analyze Fajardo-Anstine´s depiction of a specificity of place, especially of the American West and its role in a construction of Latino/a cultural identity in a modern American society as manifested especially in Fajardo-Anstine´s stories Any Further West and Sabrina & Corina. At the same time, the paper will point out Fajardo-Anstine´s construction of cultural identity of female characters and their gender roles in both Latino and a contemporary American societies. The research results show that the formation of Latina cultural identity is closely connected with both place, that is the American West and the Soutwest as well as with Latina and contemporary American cultures.Keywords: American culture, american west, cultural identity, female identity, latina identity, place
Procedia PDF Downloads 8629156 Puerto Rico and Pittsburg: A Social Psychology Perspective on How Perceived Infringement on Job and Cultural Identity Unite Racially Different Working-Class Groups
Authors: Reagan Rodriguez
Abstract:
With a growing divide between political echo chambers in the United States, exacerbated by race and income inequality, it might seem to be unfathomable to draw connections that tie working class in an industrial city and a U.S. territory. Yet, in regions where either the economy has been hit due to dwindling job infrastructure or natural disasters have left indelible marks on an island already once marked by colonial imperialism, a larger social shared identity is at play. Fracking has long been an intergenerational and stable work opportunity for many in the Pittsburg PA, yet the rising severity of global climate change may soon impact the policy and even presidential elections which could result in the reduction of jobs in the industry. Cock-fighting, considered a cultural mainstay within the island of Puerto Rico, has already had legislation banning activity and thus cutting out one of the most lucrative aspects of a severely injured economy. Insecurity, infringement, and isolation while being tied to a working-class bracket with no other opportunities in proximity have left both groups expressing similar frustration and while another larger shared identity politic is giving little other options to develop social mobility. This paper utilizes a thematic analysis and compares convergent and divergent themes on internet forums amongst unionized fracking workers in Pittsburg and cockfighters in Puerto Rico. This research examines how group identity in relation to job and cultural identity is most strong and at which points its most malleable; when intergenerational job identity becomes a part of one’s cultural identity, its override may be strongest when it is perceived as threatened. Final findings and limitations were comprehensively outlined.Keywords: identity threat, social psychology, group identity, culture and social mobility
Procedia PDF Downloads 14929155 Utilizing Federated Learning for Accurate Prediction of COVID-19 from CT Scan Images
Authors: Jinil Patel, Sarthak Patel, Sarthak Thakkar, Deepti Saraswat
Abstract:
Recently, the COVID-19 outbreak has spread across the world, leading the World Health Organization to classify it as a global pandemic. To save the patient’s life, the COVID-19 symptoms have to be identified. But using an AI (Artificial Intelligence) model to identify COVID-19 symptoms within the allotted time was challenging. The RT-PCR test was found to be inadequate in determining the COVID status of a patient. To determine if the patient has COVID-19 or not, a Computed Tomography Scan (CT scan) of patient is a better alternative. It will be challenging to compile and store all the data from various hospitals on the server, though. Federated learning, therefore, aids in resolving this problem. Certain deep learning models help to classify Covid-19. This paper will have detailed work of certain deep learning models like VGG19, ResNet50, MobileNEtv2, and Deep Learning Aggregation (DLA) along with maintaining privacy with encryption.Keywords: federated learning, COVID-19, CT-scan, homomorphic encryption, ResNet50, VGG-19, MobileNetv2, DLA
Procedia PDF Downloads 7129154 Post-Structural Study of Gender in Shakespearean Othello from Butlerian Perspective
Authors: Muhammad Shakeel Rehman Hissam
Abstract:
This study aims at analyzing gender in Othello by applying Judith Butler’s Post-Structural theory of gender and gender performance. The analysis of the play provides us context by which we can examine what kinds of effects the drama have on understanding of the researchers regarding gender identity. The study sets out to examine that, is there any evidence or ground in Shakespearean selected work which leads to challenge the patriarchal taken for granted prescribed roles of gender? This would be the focal point in study of Othello that actions and performances of characters determine their gender identity rather than their sexuality. It argues that gender of Shakespearean characters has no constant, fixed and structural impression. On the contrary, they undergo consistent variations in their behavior and performance which impart fluidity and volatility to them. The focal point of the present study is Butler’s prominent work; Gender Trouble: Feminism and subversion of Identity and her post structural theory of Gender performativity as the theoretical underpinning of the text. It analyzes the selected play in Post-Structural gender perspective. The gender-centric plot of the play is riddled with fluidity of gender. The most fascinating aspect of the play is the transformations of genders on the basis of performances by different characters and through these transformations; gender identity is revealed and determined. The study reconstructs the accepted gender norms by challenging the traditional concept of gender that is based on sexual differences of characters.Keywords: post structural, gender, performativity, socio-cultural gender norms, binaries, Othello, Butler, identity
Procedia PDF Downloads 37129153 Language Factor in the Formation of National and Cultural Identity of Kazakhstan
Authors: Andabayeva Dina, Avakova Raushangul, Kortabayeva Gulzhamal, Rakhymbay Bauyrzhan
Abstract:
This article attempts to give an overview of the language situation and language planning in Kazakhstan. Statistical data is given and excursion to history of languages in Kazakhstan is done. Particular emphasis is placed on the national- cultural component of the Kazakh people, namely the impact of the specificity of the Kazakh language on ethnic identity. Language is one of the basic aspects of national identity. Recently, in the Republic of Kazakhstan purposeful work on language development has been conducted. Optimal solution of language problems is a factor of interethnic relations harmonization, strengthening and consolidation of the peoples and public consent. Development of languages - one of the important directions of the state policy in the Republic of Kazakhstan. The problem of the state language, as part of national (civil) identification play a huge role in the successful integration process of Kazakh society. And quite rightly assume that one of the foundations of a new civic identity is knowing Kazakh language by all citizens of Kazakhstan. The article is an analysis of the language situation in Kazakhstan in close connection with the peculiarities of cultural identity.Keywords: Kazakhstan, mentality, language policy, ethnolinguistics, language planning, language personality
Procedia PDF Downloads 63429152 The Tourist Satisfaction on Brand Identity Design of Creative Agriculture Community Enterprise, Bang Khonthi District, Samut Songkhram Province
Authors: Panupong Chanplin, Kathaleeya Chanda., Wilailuk Mepracha
Abstract:
The aims of this research were twofold: 1) to brand identity design of Creative Agriculture Community Enterprise, Bang Khonthi District, Samut Songkhram Province and 2) to study the level of tourist satisfaction towards brand identity design of Creative Agriculture Community Enterprise, Bang Khonthi District, Samut Songkhram Province. tourist satisfaction was measured using six criteria: clear brand positioning, likeable brand personality, memorable logo, attractive color palette, professional typography and on-brand supporting graphics. The researcher utilized a probability sampling method via simple random sampling. The sample consisted of 30 tourists in the Creative Agriculture Community Enterprise. Statistics utilized for data analysis were percentage, mean, and standard deviation. The results suggest that tourist had high levels of satisfaction towards all six criteria of the brand identity design that was designed to target them. This study proposes that specifically brand identity designed of Creative Agriculture Community Enterprise could also be implemented with other real media already available on the market.Keywords: satisfaction, brand identity, logo, creative agriculture community enterprise
Procedia PDF Downloads 24029151 Decoding the Construction of Identity and Struggle for Self-Assertion in Toni Morrison and Selected Indian Authors
Authors: Madhuri Goswami
Abstract:
The matrix of power establishes the hegemonic dominance and supremacy of one group through exercising repression and relegation upon the other. However, the injustice done to any race, ethnicity, or caste has instigated the protest and resistance through various modes -social campaigns, political movements, literary expression and so on. Consequently, the search for identity, the means of claiming it and strive for recognition have evolved as the persistent phenomena all through the world. In the discourse of protest and minority literature, these two discourses -African American and Indian Dalit- surprisingly, share wrath and anger, hope and aspiration, and quest for identity and struggle for self-assertion. African American and Indian Dalit are two geographically and culturally apart communities that stand together on a single platform. This paper has sought to comprehend the form and investigate the formation of identity in general and in the literary work of Toni Morrison and Indian Dalit writing, particular, i.e., Black identity and Dalit identity. The study has speculated two types of identity, namely, individual or self and social or collective identity in the literary province of these marginalized literature. Morrison’s work outsources that self-identity is not merely a reflection of an inner essence; it is constructed through social circumstances and relations. Likewise, Dalit writings too have a fair record of discovery of self-hood and formation of identity, which connects to the realization of self-assertion and worthiness of their culture among Dalit writers. Bama, Pawar, Limbale, Pawde, and Kamble investigate their true self concealed amid societal alienation. The study has found that the struggle for recognition is, in fact, the striving to become the definer, instead of just being defined; and, this striving eventually, leads to the introspection among them. To conclude, Morrison as well as Indian marginalized authors, despite being set quite distant, communicate the relation between individual and community in the context of self-consciousness, self-identification and (self) introspection. This research opens a scope for further research to find out similar phenomena and trace an analogy in other world literatures.Keywords: identity, introspection, self-access, struggle for recognition
Procedia PDF Downloads 15129150 Me and My Selfie: Identity Building Through Self Representation in Social Media
Authors: Revytia Tanera
Abstract:
This research is a pilot study to examine the rise of selfie trend in dealing with individual self representation and identity building in social media. The symbolic interactionism theory is used as the concept of the desired self image, and Cooley’s looking glass-self concept is used to analyze the mechanical reflection of ourselves; how do people perform their “digital self” in social media. In-depth interviews were conducted in the study with a non-random sample who owns a smartphone with a front camera feature and are active in social media. This research is trying to find out whether the selfie trend brings any influence on identity building on each individual. Through analysis of interview results, it can be concluded that people take selfie photos in order to express themselves and to boost their confidence. This study suggests a follow up and more in depth analysis on identity and self representation from various age groups.Keywords: self representation, selfie, social media, symbolic interaction, looking glass-self
Procedia PDF Downloads 29729149 Iranian Intellectuals, Localism, Globalization and the Challenge of Rebuilding National Identity
Authors: Mohammad Afghari
Abstract:
Since the inception of intellectual movements in Iran, Iranian thinkers have perennially found themselves at the crossroads of indigenous traditionalism and Western orientation. On the one hand, supporters of indigenous thinking have emphasized the defense of cultural, national, and religious values. On the other hand, Western-leaning intellectuals, often derogatorily labeled as ‘Westoxication’ by their indigenous counterparts, have been inclined towards embracing non-indigenous ideas and ideologies, primarily of Western origin. In this historical context, the dualistic nature of Iranian intellectuals, evolving amidst the era of globalization and its swift advancements in communication, has not only retained its inherent character but has evolved into a broader duality that can identified as ‘Iranian-Cosmopolitan’. In this duality, both in its classical form of indigenous-Western and its contemporary manifestation as Iranian-Cosmopolitan, the Iranian national identity has consistently been a significant part of intellectual discussions. While critically examining this dualism through a historical lens and drawing upon the theories of Anthony Smith, a historical sociologist and British theorist of nationalism, this article delves into the importance of aligning national identity with the prevailing societal transformations, especially globalization. It underscores that Iranian intellectuals, to national identity reconstruction in the present age, will find no solution other than discarding this dualism and reconstructing national identity within a global framework.Keywords: Iran, Iranian intellectuals, globalization, localism, national identity, cosmopolitan
Procedia PDF Downloads 4829148 Transgenerational Entrepreneurship in Chinese Family Businesses: Proposal for a Model of Work-Life Synergy
Authors: Jenny Oliveros Lao Phillips, Arturo E. Osorio, José Alves
Abstract:
Family business are the dominant form of business in the world, and Chinese family business (CFB) is a unique type of family business that relies on collective action to survive. This paper argues that in CFBs, entrepreneurial actions are transgenerational collective endeavors, and successors are groomed as stewards of the family legacy. Work-life relationship in CFBs is about synergy and not balance because the family identity is the business identity, and vice-versa. Using five in-depth case studies, this research introduces an alternative understanding of CFBs and proposes a model of work-life synergy in transgenerational entrepreneurship based on discussion of five theory-based propositions. This model explains that through emphasizing on the business family’s shared value and entrepreneurial legacy, elements of trust, shared identity and stewardship of family members are enhanced which leads to collective action and goal of the business family, resulting in transgenerational entrepreneurship. Limitations and future research are presented.Keywords: Chinese family business, family legacy, stewardship, transgenerational entrepreneurship, work-life synergy
Procedia PDF Downloads 29829147 The Whole Is Greater than ‘Them’ and ‘Us’: The Effect of a Shared Workplace of Israeli-Jews and Non-Israeli Palestinians Physicians on Mutual Attitudes
Authors: Idit Miller
Abstract:
This paper examines the effect of a common organizational identity on intergroup relations of Israeli-Jews and non-Israeli Palestinians medical interns who are employed together within the Israeli hospitals, while asymmetrical relationships and ongoing conflict between the two groups still exist. Using mixed theory, which included the Intergroup contact, Othering, and the Common social identity theories, the study examines the intra-organizational identities dynamic involved within the hospital department and its effects on intergroup relations. In-depth, semi-structured interviews with the Palestinian and Jews physicians were conducted. Findings show three social identity responses are being constructed during the shared employment: Them vs. Us construction, Them vs. Us deconstruction, and an 'Organizational Us' reconstruction. Despite the inequality inherent within the intergroup relations, by holding a universal identity and using a deconstruction pattern, positive emotions are demonstrated by both sides. The adoption of a shared professional super-identity is found as an essential component for fostering and maintaining positive attitudes between the parties. This finding strengthens the significance of a long-term continuous intergroup contact inside the organization and especially between two polarized groups.Keywords: common social identity theory, intergroup contact theory, inequality, intergroup conflict, othering theory
Procedia PDF Downloads 15029146 The Relationships Between Citizenship Acquisition and Ethnic Identity of Immigrant Women in Taiwan
Authors: Yuan-Yu Chiang, Yu-Han Tseng, Chin-Chen Wen
Abstract:
Many southeast-Asia women migrate to Taiwan by marriage, and it usually takes 4 to 8 years for them to acquire Taiwanese citizenship. This study investigates the relationships between their citizenship acquisition and whether they develop Taiwanese identities. One hundred and ninety-two immigrant women were measured using Multigroup Ethnic Identity Measure-Revised and a global 10-point ethnic identity question. Correlation tests and hierarchical regression were performed to explore whether acquiring citizenship would help immigrant women to develop Taiwanese identities. The results revealed that citizenship acquisition does help immigrant women to identify with Taiwanese society symbolically. However, the results also indicated that acquiring citizenship would not help these immigrant women become involved in deeper cultural exploration of Taiwan nor would it encourage them to make commitments to the host society.Keywords: immigrants, international marriage, ethnic identity, Taiwan
Procedia PDF Downloads 41629145 Integrated Model for Enhancing Data Security Processing Time in Cloud Computing
Authors: Amani A. Saad, Ahmed A. El-Farag, El-Sayed A. Helali
Abstract:
Cloud computing is an important and promising field in the recent decade. Cloud computing allows sharing resources, services and information among the people of the whole world. Although the advantages of using clouds are great, but there are many risks in a cloud. The data security is the most important and critical problem of cloud computing. In this research a new security model for cloud computing is proposed for ensuring secure communication system, hiding information from other users and saving the user's times. In this proposed model Blowfish encryption algorithm is used for exchanging information or data, and SHA-2 cryptographic hash algorithm is used for data integrity. For user authentication process a simple user-name and password is used, the password uses SHA-2 for one way encryption. The proposed system shows an improvement of the processing time of uploading and downloading files on the cloud in secure form.Keywords: cloud computing, data security, SAAS, PAAS, IAAS, Blowfish
Procedia PDF Downloads 35629144 Paradigm Shift of the World Is Globalization: Identity Crisis, Violence and Cultural War
Authors: Shahla Bukhtair
Abstract:
A paradigm presents a consensus view of a particular or collective community, accepted into by the members of that community, either consciously pronounced or, more likely, simply assumed and not intentionally acknowledged but is articulated. Paradigm shift is based on the behavioral attitude of the community. Change is inexorable. The world is suffering with the innovative creation of globalization. Media boosted this paradigm shift all over the world. Globalization is a vigorous process which impacts differentially on various cultures around the world. The outcome of the globalization is permeates cultural boundaries and in the process results in the spread of Western ideologies and values across the world. The term flourished in 20th century. Globalization is regarded as having substantial impact on such crises through its encouragement of conflicts rather than conciliation; through opportunities of expression, various groups get benefit with it. Identity crisis refers to inflexible mechanism i.e. cultural and political conflicts among polarized groups, which struggle with each other over the definition of a national identity. Violence is not only a kind of physical but it also psychological as well. Due to identity crisis, a person is having an issue of fear, anxiety, and lack of security. Everything has negative and positive aspects. Newspaper columns, magazine articles, films, made-for-TV movies, television special reports, and talk shows are all public arenas where images of political agenda of their own interest are constructed, debated, and reproduced. From these resources, individuals construct their own conceptions of what is normal and acceptable. This bias affects images in the media, and in turn has a negative effect on public development in a society. This paper investigates the relationship between globalization and cultural war, identity crisis and the role of violence. Objectives: - To determine which type of media plays an important role in shaping perceptions and attitudes of public negatively; - To analyze the impact of globalization on identity crisis, violence and global culture (positive and negative).Keywords: paradigm shift, globalization, identity crisis, cultural war
Procedia PDF Downloads 36629143 The Role of Identity Politics in the 2023 General Election in Nigeria: An Overview
Authors: Adekunle Saheed Ajisebiyawo
Abstract:
This paper examines the influence of identity politics on the development of electoral democracy in Nigeria. The paper was anchored on a theory of African democracy adopted the qualitative methodology and deployed data from secondary sources to evaluate the 2023 presidential election, and found that ethnicity, religion, and regional sentiments played a major role in the election. The practical implications of this paper are that while Nigeria’s democracy is tending towards consolidation, if the unexpected does not happen, e.g., military takeover, religious and ethnic identities can mar the country’s development as competent candidates that have good policies will be voted out based on religious and ethnic sentiments. Thus, there is a need to de-emphasize religion and ethnicity in the Nigerian polity. Candidates and parties that campaign based on racial or religious narratives should be barred from contesting elective positions. The paper concluded that identity politics is inimical to Nigeria’s democratization process as well as efforts aimed at uniting and integrating the country; it, therefore, recommended that to establish a sound electoral democracy and a strong united country, the menace of ethnic, religious, and regional cleavages should be addressed. To achieve this, efforts should be intensified towards providing a set of principles for nation-building which should be included in the constitution. In addition, the paper urges the media to support the formation of an inclusive government, cutting across tribes and religions in the country to reduce the negative impact of ethnicity and religion in the country.Keywords: cleavages, democracy, ethnicity, election, identity politics, religion
Procedia PDF Downloads 5929142 A Qualitative South African Study on Exploration of the Moral Identity of Nurses
Authors: Yolanda Havenga
Abstract:
Being a competent nurse requires clinical, general, and moral competencies. Moral competence is a culmination of moral perceptions, moral judgment, moral behaviour, and moral identity. Moral identity is the values, images, and fundamental principles held in the collective minds and memories of nurses about what it means to be a ‘good nurse’. It is important to explore and describe South African nurses’ moral identities and excavate the post-colonial counter-narrative to nurses moral identities as a better understanding of these identities will enable means to positively address nurses’ moral behaviours. This study explored the moral identity of nurses within the South African context. A qualitative approach was followed triangulating with phenomenological and narrative designs with the same purposively sampled group of professional nurses. In-depth interviews were conducted until saturation of data occurred about the sampled nurses lived experiences of being a nurse in South Africa. They were probed about their core personal-, social-, and professional values. Data were analysed based on the steps used by Colaizzi. These nurses were then asked to write a narrative telling a personal story that portrayed a significant time in their professional career that defines their identity as a nurse. This data were analysed using a critical narrative approach and findings of the two sets of data were merged. Ethical approval was obtained and approval from all relevant gate keepers. In the findings, themes emerged related to personal, social and professional values, images and fundamental principles of being a nurse within the South African context. The findings of this study will inform a future national study including a representative sample of South African nurses.Keywords: moral behaviour, moral identity, nurses, qualitative research
Procedia PDF Downloads 27929141 Performing Marginality and Contestation of Ethnic Identity: Dynamics of Identity Politics in Assam, India
Authors: Hare Krishna Doley
Abstract:
Drawing upon empirical data, this paper tries to examine how ethnic groups like Ahom, Moran, Motok, and Chutia creates and recreates ethnic boundaries while making claims for recognition as Scheduled Tribes (STs) under the Sixth Schedule of the Constitution of India, in the state of Assam. Underlying such claim is the distinct identity consciousness amongst these groups as they assert themselves originally as tribe drawing upon primordial elements. For them, tribal identity promises social justice and give credence to their claims of indigeneity while preserving their exclusivity within the multifarious society of Assam. Having complex inter-group relationships, these groups under study displays distinct as well as overlapping identities, which demonstrate fluidity of identities across groups while making claims for recognition. In this process, the binary of ‘us’ and ‘them’ are often constructed amongst these groups, which are in turn difficult to grasp as they share common historical linkages. This paper attempts to grapple with such complex relationships the studied groups and their assertion as distinct cultural entities while making ethnic boundaries on the basis of socio-cultural identities. Such claims also involve frequent negotiation with the Sate as well as with other ethnic groups, which further creates strife among indigenous groups for tribal identity. The paper argues that identity consciousnesses amongst groups have persisted since the introduction of resource distribution on ethnic lines; therefore, issues of exclusive ethnic identity in the state of Assam can be contextualised within the colonial and post-colonial politics of redrawing ethnic and spatial boundaries. Narrative of the ethnic leaders who are in the forefront of struggle for ST status revealed that it is not merely to secure preferential treatment, but it also encompasses entitlement to land and their socio-cultural identity as aboriginal. While noting the genesis of struggle by the ethnic associations for ST status, this paper will also delineate the interactions among ethnic groups and how the identity of tribe is being performed by them to be included in the official categories of ST.Keywords: ethnic, identity, sixth schedule, tribe
Procedia PDF Downloads 19929140 Gender Moderates the Association Between Symbolization Trait (But Not Internalization Trait) and Smoking Behaviour
Authors: Kuay Hue San, Muaz Haqim Shaharum, Nasir Yusoff
Abstract:
Gender plays a big role in psychosocial development. This study aimed to investigate whether gender moderates the relationship between moral identity (internalization and symbolization) and risk-smoking behavior. An online cross-sectional study was carried out on 388 (61% female) youths who fulfilled the study’s inclusion and exclusion criteria. While viewing images of smoking behavior, participants rated their emotional state, which ranged from unpleasant to pleasant. Participants were also asked to fill out the eight-item Moral Identity Scale and provide their socio-demographic information. Gender significantly moderated the relationship between symbolization and smoking behavior. However, the moderation effect was not shown by internalization Finding highlights the implication of gender on moral identity and smoking behavior and the importance of considering this in the public health intervention and program.Keywords: smoking behaviour, gender, emotion, moral identity
Procedia PDF Downloads 107