Search results for: identity authentication
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1736

Search results for: identity authentication

1616 Wasif Jawharriyeh and the Identity-Forming Spaces of Late Ottoman Jerusalem

Authors: Feyza Daloglu

Abstract:

This paper scrutinizes the Ottoman years of Wasif Jawharriyeh’s memoir, The Storyteller of Jerusalem, within the framework of citadinite, employed by the Open Jerusalem Project. Open Jerusalem Project uses the term citadinite to describe “the dynamic identity relationship city dwellers have with each other and their urban environment.” While Jerusalem and Jerusalemite identity have usually been analyzed within religious, national, or colonial frameworks, citadinite offers a fresh perspective by turning its lens to the urban identity of its citizens in the 19th and 20th centuries to overcome the shortcomings of usual frameworks. Wasif Jawharriyeh is a proud Jerusalemite and a Greek Orthodox Arab, who spent his childhood and teenage years under the Ottoman Empire. His memoir reveals a great deal of urbanity and a strong sense of Jerusalemite identity which appears to be favored over other forms of identities - Arab, Christian - in the late empire years. Through citadinite, this paper aims to discuss aspects of Jerusalemite identity and key points of urban life in the late Ottoman holy city with the guidance of a very lively and social Ottoman citizen and at that time a young musician, Wasif Jawharriyeh.

Keywords: arab memoir, cityscape, jerusalem identity, ottoman city, urban life

Procedia PDF Downloads 90
1615 Security in Cyberspace: A Comprehensive Review of COVID-19 Continued Effects on Security Threats and Solutions in 2021 and the Trajectory of Cybersecurity Going into 2022

Authors: Mojtaba Fayaz, Richard Hallal

Abstract:

This study examines the various types of dangers that our virtual environment is vulnerable to, including how it can be attacked and how to avoid/secure our data. The terrain of cyberspace is never completely safe, and Covid- 19 has added to the confusion, necessitating daily periodic checks and evaluations. Cybercriminals have been able to enact with greater skill and undertake more conspicuous and sophisticated attacks while keeping a higher level of finesse by operating from home. Different types of cyberattacks, such as operation-based attacks, authentication-based attacks, and software-based attacks, are constantly evolving, but research suggests that software-based threats, such as Ransomware, are becoming more popular, with attacks expected to increase by 93 percent by 2020. The effectiveness of cyber frameworks has shifted dramatically as the pandemic has forced work and private life to become intertwined, destabilising security overall and creating a new front of cyber protection for security analysis and personal. The high-rise formats in which cybercrimes are carried out, as well as the types of cybercrimes that exist, such as phishing, identity theft, malware, and DDoS attacks, have created a new front of cyber protection for security analysis and personal safety. The overall strategy for 2022 will be the introduction of frameworks that address many of the issues associated with offsite working, as well as education that provides better information about commercialised software that does not provide the highest level of security for home users, allowing businesses to plan better security around their systems.

Keywords: cyber security, authentication, software, hardware, malware, COVID-19, threat actors, awareness, home users, confidentiality, integrity, availability, attacks

Procedia PDF Downloads 93
1614 Modernization Causing Loss of Cultural Identity: A Case Study of Maheshkhali, Bangladesh

Authors: Sarika Siraj

Abstract:

Nothing talks more about the identity of a place than its cultural heritage. More often than ever, it is the architecture of the place that embodies its cultural heritage. With these thoughts in mind, this paper looks closely into the present scene of earthen architecture of Bangladesh and the changes it has been going through due to modernity. Along with the gradual erasure of this sustainable practice, a loss of cultural identity can be observed in present times. This paper intends to examine the loss along with the reasons, taking the village of Maheshkhali, located in south east Bangladesh, as a case study for this research. Based on the empirical findings, this paper will contextualize sustainability as well as discuss western development as a creator of new cultural identities in eastern countries.

Keywords: cultural identity, sustainability, architecture, heritage

Procedia PDF Downloads 51
1613 The Relationship between the Feeling of Distributive Justice and National Identity of the Youth

Authors: Leila Batmany

Abstract:

This research studies the relationship between the feeling of distributive justice and national identity of the youth. The present analysis intends to experimentally investigate the various dimensions of the justice feeling and its effect on the national identity components. The study has taken justice into consideration from four different points of view on the basis of availability of valuable social sources such as power, wealth, knowledge and status in the political, economic, and cultural and status justice respectively. Furthermore, the national identity has been considered as the feeling of honour, attachment and commitment towards national society and its seven components i.e. history, language, culture, political system, religion, geographical territory and society. The 'field study' has been used as the method for the research with the individual as unit, taking 368 young between the age of 18 and 29 living in Tehran, chosen randomly according to Cochran formula. The individual samples have been randomly chosen among five districts in north, south, west, east, and centre of Tehran, based on the multistage cluster sampling. The data collection has been performed with the use of questionnaire and interview. The most important results are as follows: i) The feeling of economic justice is the weakest one among the youth. ii) The strongest and the weakest dimensions of the national identity are, respectively, the historical and the social dimension. iii) There is a positive and meaningful relationship between the feeling political and statues justice and then national identity, whereas no meaningful relationship exists between the economic and cultural justice and the national identity. iv) There is a positive and meaningful relationship between the feeling of justice in all dimensions and legitimacy of the political system. There is also such a relationship between the legitimacy of the political system and national identity. v) Generally, there is a positive and meaningful relationship between the feeling of distributive justice and national identity among the youth. vi) It is through the legitimacy of the political system that justice feeling can have an influence on the national identity.

Keywords: distributive justice, national identity, legitimacy of political system, Cochran formula, multistage cluster sampling

Procedia PDF Downloads 101
1612 The Greek Diaspora in Australia: Identity and Transnational Identity

Authors: Panayiota Romios

Abstract:

As the use of 'diaspora' has proliferated in the last decade, its meaning has been stretched in various directions. Current diaspora frames of identity representation do not adequately capture the complexities of everyday lived experiences of transnational individuals and groups. This paper presents the findings of a qualitative research project conducted in Melbourne, Australia with second generation Greek Australians. It analyses the forms of intercultural identities of the second generation Greek Australians returning to Australia post-2008, after living in Greece for an extended period of time. The discussion highlights key characteristics in relation to diaspora-homeland ties, seeking to denaturalise the commonplace assumptions and imaginations about the cultures and identities of Greek Australian diaspora communities and probe the relevance of identity markers such a country of origin, nationality, ethnicity, ethnic origin, language and mother tongue. The definition of diaspora experienced in this transnational lexicon is interestingly quite distinct from original articulations and also from others returning ‘home’.

Keywords: diaspora, identity, migration, displacement

Procedia PDF Downloads 326
1611 Walkability and Urban Social Identity

Authors: Reihaneh Rafiemanzelat

Abstract:

One of the most recent fields of investigation in urban issues focuses on the walkability in urban spaces. The paper aims to establish the theoretical relationship between the people's link with definite urban public spaces and the social identity processes derived from the relation with these places. The theoretical aspects which are examined for this purpose are: the concept of walkability and its developments and the social identity theories derived from walkable spaces. In fact, the paper presents the main results obtained from an empirical investigation which concern to the genesis of urban social identity in particular street as one of the main elements of public spaces in cities. İsmet İnönü Blvd which known as Salamis Street in Famagusta, North Cyprus is one of the main street in city whit high level of physical and social activities all the time. The urban social identity of users was analyzed, focusing on three main factors: walkability of space, social identification, and image of the space. These three factors were analyzed in relation to a series of items in the initial questionnaire, evaluation of existing natural resources, and environmental attitudes.

Keywords: walkability, urban public space, pedestrian, social activity, social identity

Procedia PDF Downloads 403
1610 A Comparative Study on the Identity Formation among Pre-Teens Exposed to the Different Types of Parental Regulation on Social Media Use

Authors: Jehnyne Lalaine Bautista, Marquise Baldemor, Ciara Mendoza

Abstract:

This study is an attempt to investigate the extent to which pre-teens engage in social media, the effects of social media use on the different facets of their identity development such as physical, social, cognitive, aspirations, and personality, as well as the effects of parental regulation on their identity formation. Twelve Filipino children, ages from 9-12 years old and are either regulated, semi-regulated, or unregulated on social media use, participated in this study along with their parent or guardian. The data were gathered through in-depth interviews with the participants and were analyzed through the use of thematic analysis. Results show that despite accessing similar social media applications, the effects of these on children from different types of parental regulation vary since they have different levels of exposure to social media content. Those who have parents with high parental regulation on the use of social media tend to perform better in school, to find time for extracurricular activities, and to develop positive identity formation. The results of this study suggest that parental regulation on social media use has the positive influence on the identity development of children while there are dangers to unregulated use of social media.

Keywords: identity formation, parental regulation, pre-teens, social media

Procedia PDF Downloads 360
1609 Captives on the Frontier: An Exploration of National Identity in Argentine Literature and Art

Authors: Carlos Riobo

Abstract:

This paper analyzes literature and art in Argentina from the nineteenth to the twenty-first centuries as these media used the figure of the white female captive to define a developing national identity. This identity excluded the Indians whose lands the whites were taking and who appeared as the aggressors and captors in writing and paintings. The paper identifies the complicit relationship between art and history in crafting national memory. It also identifies a movement toward purity (as defined by separation of entities) and away from mestizaje (racial and cultural mixtures).

Keywords: Argentina, borders, captives, literature, painting

Procedia PDF Downloads 127
1608 Enhancement of Transaction's Authentication for the Europay, MasterCard, and Visa Contactless Card Payments

Authors: Ossama Al-Maliki

Abstract:

Europay, MasterCard, and Visa (EMV) is one of the most popular payment protocol in the world. The EMV protocol supports Chip and PIN Transactions, Chip and Signature transactions, and Contactless transactions. This protocol suffers from tens of £ millions of lost per year due to many fraudulent payments. This is due to several reported vulnerable points in the protocols used for such payments that allow skimming, replay, cloning, Mole Point of Sale (POS), relay, and other attacks to be conducted. In this paper, we are focusing on the EMV contactless specification and we have proposed two proposal solutions to the addition of a localization factor to enhance the payment authentication of such transactions designed to prevent relay, cloning, and Mole-POS attacks. Our proposed solution is a back-end localization scheme to help the Issuer-Bank compare the location of the genuine cardholder in relation to the used POS. Our scheme uses 'something you have' which is the Cardholder Smartphone (CSP) to provide the location of the cardholder at the time of the transaction and without impacting the contactless payment time/protocol. The Issuer-bank obtain the CSP Location using tried and tested localization techniques, and independently of the cardholder. Both of our proposal solutions do not require infrastructure changes, and it uses existing EMV/SP protocol messages to communicate our scheme information.

Keywords: NFC, RFID, contactless card, authentication, location, EMV

Procedia PDF Downloads 217
1607 Exploring the Formation of High School Students’ Science Identity: A Qualitative Study

Authors: Sitong. Chen, Bing Wei

Abstract:

As a sociocultural concept, identity has increasingly gained attention in educational research, and the notion of students’ science identity has been widely discussed in the field of science education. Science identity was proved to be a key indicator of students’ learning engagement, persistence, and career intentions in science-related and STEM fields. Thus, a great deal of educational effort has been made to promote students’ science identity in former studies. However, most of this research was focused on students’ identity development during undergraduate and graduate periods, except for a few studies exploring high school students’ identity formation. High school has been argued as a crucial period for promoting science identity. This study applied a qualitative method to explore how high school students have come to form their science identities in previous learning and living experiences. Semi-structured interviews were conducted with 8 newly enrolled undergraduate students majoring in science-related fields. As suggested by the narrative data from interviews, students’ formation of science identities was driven by their five interrelated experiences: growing self-recognition as a science person, achieving success in learning science, getting recognized by influential others, being interested in science subjects, and informal science experiences in various contexts. Specifically, students’ success and achievement in science learning could facilitate their interest in science subjects and others’ recognition. And their informal experiences could enhance their interest and performance in formal science learning. Furthermore, students’ success and interest in science, as well as recognition from others together, contribute to their self-recognition. Based on the results of this study, some practical implications were provided for science teachers and researchers in enhancing high school students’ science identities.

Keywords: high school students, identity formation, learning experiences, living experiences, science identity

Procedia PDF Downloads 22
1606 The Disposable Identities; Enabling Trust-by-Design to Build Sustainable Data-Driven Value

Authors: Lorna Goulden, Kai M. Hermsen, Jari Isohanni, Mirko Ross, Jef Vanbockryck

Abstract:

This article introduces disposable identities, with reference use cases and explores possible technical approaches. The proposed approach, when fully developed as an open-source toolkit, enables developers of mobile or web apps to employ a self-sovereign identity and data privacy framework, in order to rebuild trust in digital services by providing greater transparency, decentralized control, and GDPR compliance. With a user interface for the management of self-sovereign identity, digital authorizations, and associated data-driven transactions, the advantage of Disposable Identities is that they may also contain verifiable data such as the owner’s photograph, official or even biometric identifiers for more proactive prevention of identity abuse. These Disposable Identities designed for decentralized privacy management can also be time, purpose and context-bound through a secure digital contract; with verification functionalities based on tamper-proof technology.

Keywords: dentity, trust, self-sovereign, disposable identity, privacy toolkit, decentralised identity, verifiable credential, cybersecurity, data driven business, PETs, GDPRdentity, trust, self-sovereign, disposable identity, privacy toolkit, decentralised identity, verifiable credential, cybersecurity, data driven business, PETs, GDPRI

Procedia PDF Downloads 192
1605 Enhancing Visual Corporate Identity on Festive Money Packets Design with Cultural Symbolisms

Authors: Noranis Ismail, Shamsul H. A. Rahman

Abstract:

The objective of this research is to accentuate the importance of Visual Corporate Identity by utilizing Malay motifs amalgamated with Malay proverbs to enhance the corporate brand of The Design School (TDS) of Taylor’s University. The researchers aim to manipulate festive money packet as a mean to communicate to the audience by using non-verbal visual cues such as colour, languages, and symbols that reflect styles and cultural heritage. The paper concluded that it is possible to utilize Hari Raya packet as a medium for creative expressions by creating high-impact design through the symbolism of selected Malay proverbs and traditional Malay motifs to enhance TDS corporate visual identity. It also provides a vital contribution to other organizations to understand an integral part of corporate visual identity in heightening corporate brand by communicating indirectly to its stakeholders using visual mnemonic and cultural heritage.

Keywords: corporate branding, cultural cues, Malay culture, visual identity

Procedia PDF Downloads 398
1604 The Way Digitized Lectures and Film Presence Coaching Impact Academic Identity: An Expert Facilitated Participatory Action Research Case Study

Authors: Amanda Burrell, Tonia Gary, David Wright, Kumara Ward

Abstract:

This paper explores the concept of academic identity as it relates to the lecture, in particular, the digitized lecture delivered to a camera, in the absence of a student audience. Many academics have the performance aspect of the role thrust upon them with little or no training. For the purpose of this study, we look at the performance of the academic identity and examine tailored film presence coaching for its contributions toward academic identity, specifically in relation to feelings of self-confidence and diminishment of discomfort or stage fright. The case is articulated through the lens of scholar-practitioners, using expert facilitated participatory action research. It demonstrates in our sample of experienced academics, all reported some feelings of uncertainty about presenting lectures to camera prior to coaching. We share how power poses and reframing fear, produced improvements in the ease and competency of all participants. We share exactly how this insight could be adapted for self-coaching by any academic when called to present to a camera and consider the relationship between this and academic identity.

Keywords: academic identity, digitized lecture, embodied learning, performance coaching

Procedia PDF Downloads 312
1603 Addressing the Oracle Problem: Decentralized Authentication in Blockchain-Based Green Hydrogen Certification

Authors: Volker Wannack

Abstract:

The aim of this paper is to present a concept for addressing the Oracle Problem in the context of hydrogen production using renewable energy sources. The proposed approach relies on the authentication of the electricity used for hydrogen production by multiple surrounding actors with similar electricity generation facilities, which attest to the authenticity of the electricity production. The concept introduces an Authenticity Score assigned to each certificate, as well as a Trust Score assigned to each witness. Each certificate must be attested by different actors with a sufficient Trust Score to achieve an Authenticity Score above a predefined threshold, thereby demonstrating that the produced hydrogen is indeed "green."

Keywords: hydrogen, blockchain, sustainability, structural change

Procedia PDF Downloads 32
1602 Secure Transfer of Medical Images Using Hybrid Encryption

Authors: Boukhatem Mohamed Belkaid, Lahdi Mourad

Abstract:

In this paper, we propose a new encryption system for security issues medical images. The hybrid encryption scheme is based on AES and RSA algorithms to validate the three security services are authentication, integrity, and confidentiality. Privacy is ensured by AES, authenticity is ensured by the RSA algorithm. Integrity is assured by the basic function of the correlation between adjacent pixels. Our system generates a unique password every new session of encryption, that will be used to encrypt each frame of the medical image basis to strengthen and ensure his safety. Several metrics have been used for various tests of our analysis. For the integrity test, we noticed the efficiencies of our system and how the imprint cryptographic changes at reception if a change affects the image in the transmission channel.

Keywords: AES, RSA, integrity, confidentiality, authentication, medical images, encryption, decryption, key, correlation

Procedia PDF Downloads 407
1601 The Influence of Superordinate Identity and Group Size on Group Decision Making through Discussion

Authors: Lin Peng, Jin Zhang, Yuanyuan Miao, Quanquan Zheng

Abstract:

Group discussion and group decision-making have long been a topic of research interest. Traditional research on group decision making typically focuses on the strategies or functional models of combining members’ preferences to reach an optimal consensus. In this research, we want to explore natural process group decision making through discussion and examine relevant, influential factors--common superordinate identity shared by group and size of the groups. We manipulated the social identity of the groups into either a shared superordinate identity or different subgroup identities. We also manipulated the size to make it either a big (6-8 person) group or small group (3-person group). Using experimental methods, we found members of a superordinate identity group tend to modify more of their own opinions through the discussion, compared to those only identifying with their subgroups. Besides, members of superordinate identity groups also formed stronger identification with group decision--the results of group discussion than their subgroup peers. We also found higher member modification in bigger groups compared to smaller groups. Evaluations of decisions before and after discussion as well as group decisions are strongly linked to group identity, as members of superordinate group feel more confident and satisfied with both the results and decision-making process. Members’ opinions are more similar and homogeneous in smaller groups compared to bigger groups. This research have many implications for further research and applied behaviors in organizations.

Keywords: group decision making, group size, identification, modification, superordinate identity

Procedia PDF Downloads 283
1600 Secure Content Centric Network

Authors: Syed Umair Aziz, Muhammad Faheem, Sameer Hussain, Faraz Idris

Abstract:

Content centric network is the network based on the mechanism of sending and receiving the data based on the interest and data request to the specified node (which has cached data). In this network, the security is bind with the content not with the host hence making it host independent and secure. In this network security is applied by taking content’s MAC (message authentication code) and encrypting it with the public key of the receiver. On the receiver end, the message is first verified and after verification message is saved and decrypted using the receiver's private key.

Keywords: content centric network, client-server, host security threats, message authentication code, named data network, network caching, peer-to-peer

Procedia PDF Downloads 613
1599 Quick Response(QR) Code for Vehicle Registration and Identification

Authors: S. Malarvizhi, S. Sadiq Basha, M. Santhosh Kumar, K. Saravanan, R. Sasikumar, R. Satheesh

Abstract:

This is a web based application which provides authorization for the vehicle identification and registration. It also provides mutual authentication between the police and users in order to avoid misusage. The QR code generation in this application overcomes the difficulty in the manual registration of the vehicle documents. This generated QR code is placed in the number plates of the vehicles. The QR code is scanned using the QR Reader installed in the smart devices. The police officials can check the vehicle details and file cases on accidents, theft and traffic rules violations using QR code. In addition to vehicle insurance payments and renewals, the renewal alert is sent to the vehicle owner about payment deadline. The non-permitted vehicles can be blocked in the next check-post by sending the alert messages.

Keywords: QR code, QR reader, registration, authentication, idenfication

Procedia PDF Downloads 454
1598 A Queer Approach to the National Irish Identity during 'The Troubles' in Belfast in Paul Mcveigh's 'The Good Son'

Authors: Eduardo Garcia Agustin

Abstract:

This paper focuses on how Mickey – the 10-year-old main character and narrator in Paul McVeigh’s novel The Good Son (2015) – becomes aware of his own queerness and its implications in a conflicting place and time such as Belfast during ‘The Troubles’ in the 1980s. Queer theory allows a comparative reading of identity issues such as national and gender discourses. As opposed to some other excluding social constructs that classify identities in an Us-Others binomial, queer has become a sort of umbrella term where there is room for more identities other than LGTBQ. Therefore, it offers some relevant tools to read this highly awarded novel by focusing on the intersectional construction of Mickey’s identity in progress within the social and familiar realms. The aim of this paper is to offer a queer reading of the The Good Son, which was awarded with the Polari First Book Prize in 2016, by showing the key role of Mickey’s conflictive realization of his own queerness in the polarized society of Northern Ireland in the 1980s, where there is no shade of grey. Within such a polarized context, Mickey’s perception of his own internal and external identity conflicts he is exposed to will show how necessary a certain touch of pink is as a potential escape to those conflicts.

Keywords: conflict, national identity, Northern Ireland, queer identity

Procedia PDF Downloads 501
1597 Childhood Trauma and Identity in Adulthood

Authors: Aakriti Lohiya

Abstract:

This study examines the commonly recognised childhood trauma that can have a significant and enduring effect on a person's cognitive and psychological health. The purpose of this study was to look at the intricate interactions that exist between negative self-identity, cognitive distortions, and early trauma. For the study, a sample of (200 women were taken, who were socially active) was gathered. Standardised measures were utilised to evaluate the participants' experiences of childhood trauma, and validated psychological tools were employed to assess negative self-identity and cognitive distortions. The links and predicting correlations between childhood trauma, negative self-identity, and cognitive distortions were investigated using statistical techniques, such as correlation analysis and multiple regression modelling. The results demonstrated that there is no correlation between the degree of early trauma and the emergence of a negative self-identity and cognitive distortions. It examines whether cognitive distortion and events in childhood have any relationship with negative self-identity using various scales. Participants completed the Childhood Trauma Questionnaire, which assessed retrospective accounts of childhood trauma; the Cognitive Distortions Scale, which measured internal attributions and perceptions of controllability; and the attachment style questionnaire, which assessed the attachment attribute of their daily life, which will lead negative. The implications for therapy were also considered.

Keywords: cognitive distortion, therapy, childhood trauma, attachment

Procedia PDF Downloads 40
1596 Detection of Intentional Attacks in Images Based on Watermarking

Authors: Hazem Munawer Al-Otum

Abstract:

In this work, an efficient watermarking technique is proposed and can be used for detecting intentional attacks in RGB color images. The proposed technique can be implemented for image authentication and exhibits high robustness against unintentional common image processing attacks. It deploys two measures to discern between intentional and unintentional attacks based on using a quantization-based technique in a modified 2D multi-pyramidal DWT transform. Simulations have shown high accuracy in detecting intentionally attacked regions while exhibiting high robustness under moderate to severe common image processing attacks.

Keywords: image authentication, copyright protection, semi-fragile watermarking, tamper detection

Procedia PDF Downloads 225
1595 The Competing Roles of Educator, Music Teacher, and Musician in Professional Identity Development: A Longitudinal Autoethnography

Authors: Thomas LaRocca

Abstract:

This study explores the development of a public-school music teacher’s professional identity within three domains: as an educator in the profession at large, as a music teacher in a school, and as a professional musician. An autoethnographic method is employed by calling upon undergraduate student teaching reflections, graduate writing assignments and presentations, cover letters for employment, professional correspondence, and reflective memos. These artifacts provide a reference for phenomenological insights into the values, hopes, and criticisms within each domain over time –all of which provide a window into the overall ontological perspective of one’s professional life at different moments in their career. While the topic of music teacher identity has been examined using autoethnographical methods before, by accessing materials over the course of ten years, the study is able to investigate the ‘how’ of identity development in a temporal context; from undergraduate student to established professional. Additionally, while the field offers a considerable amount of work surrounding the child and adolescent identity development, there are unmined opportunities to examine identity development in the adult years, especially surrounding adult professional life. Employing a postpositivist approach with social constructionism as a backdrop, this study examines adult identity formation and the contradictions, resonances, and priorities within each domain, between each domain, and perceived expectations of the professional community. What is revealed is a journey of self-improvement motivated by failure and success, marked by negotiation and sacrifice; as each domain competes for mental and temporal resources, identity is viewed as not just who one is, but also as what one leaves behind. These insights offer a window into the ontology of identity of a music educator and may provide considerations for differentiating professional development based on what stage educators are at in their careers.

Keywords: identity, longitudinal autoethnography, music teacher education, music teacher ontology

Procedia PDF Downloads 107
1594 The Relationship between Romantic Relationship Beliefs and Ego Identity Process

Authors: Betül Demirbağ, Nesrin Demir

Abstract:

As a developmental period, early adulthood has a vital role in romantic relationships in young adult's life. lt's known that in this period, satisfaction of individual needs such as affiliation is essential for well-functioning and to be succeeded in sequent developmental task. Romantic relationships have an expected association with attachment style. But it's needed to get more information about indicators of romantic relationships in different cultural backgrounds. in this research it's aimed to investigate whether there is a relationship between romantic relationship beliefs and Ego identity status and also other possible indicators such as gender, age, socioeconomic status. Participants were undergraduate students training in various programs in Education Faculty in Adiyaman University. As data collection tool, Romantic Relationship Beliefs scale and Ego Identity Process Questionnaire which was adapted into Turkish were used. Results were discussed in the relevant literature.

Keywords: ego identity, romantic relationships, university counseling

Procedia PDF Downloads 529
1593 Manifestation of Hybridity in Marie Jones’s "Stones in His Pockets"

Authors: Mahsa Mahjoub Laleh, Nasser Dasht Peyma

Abstract:

This paper explores Marie Jones’s Stones in His Pockets in the light of the postcolonial notion of hybridity. The play is a tragicomedy about a small village in Ireland where many of the locales are extras in a Hollywood film. The actions of the play revolve around a local teenager named Sean who has been vilipended by a famous film star. The Sean character commits suicide by drowning himself with stones in his pockets. This paper explored how the attempts to gain cultural identity is manifested in Marie Jones’s play and how authority causes a change in the culture and destiny of people. Apparently, the play demonstrates that the political, economic and social realities directly affect people’s destiny and identity.

Keywords: cultural identity, hybridity, identity, postcolonial

Procedia PDF Downloads 409
1592 Woman, House, Identity: The Study of the Role of House in Constructing the Contemporary Dong Minority Woman’s Identity

Authors: Sze Wai Veera Fung, Peter W. Ferretto

Abstract:

Similar to most ethnic groups in China, men of the Dong minority hold the primary position in policymaking, moral authority, social values, and the control of the property. As the spatial embodiment of the patriarchal ideals, the house plays a significant role in producing and reproducing the distinctive gender status within the Dong society. Nevertheless, Dong women do not see their home as a cage of confinement, nor do they see themselves as a victim of oppression. For these women with reference to their productive identity, a house is a dwelling place with manifold meanings, including a proof of identity, an economic instrument, and a public resource operating on the community level. This paper examines the role of the house as a central site for identity construction and maintenance for the southern dialect Dong minority women in Hunan, China. Drawing on recent interviews with the Dong women, this study argues that women as productive individuals have a strong influence on the form of their house and the immediate environment, regardless of the male-dominated social construct of the Dong society. The aim of this study is not to produce a definitive relationship between women, house, and identity. Rather, it seeks to offer an alternative lens into the complexity and diversity of gender dynamics operating in and beyond the boundary of the house in the context of contemporary rural China.

Keywords: conception of home, Dong minority, house, rural China, woman’s identity

Procedia PDF Downloads 103
1591 Secure E-Pay System Using Steganography and Visual Cryptography

Authors: K. Suganya Devi, P. Srinivasan, M. P. Vaishnave, G. Arutperumjothi

Abstract:

Today’s internet world is highly prone to various online attacks, of which the most harmful attack is phishing. The attackers host the fake websites which are very similar and look alike. We propose an image based authentication using steganography and visual cryptography to prevent phishing. This paper presents a secure steganographic technique for true color (RGB) images and uses Discrete Cosine Transform to compress the images. The proposed method hides the secret data inside the cover image. The use of visual cryptography is to preserve the privacy of an image by decomposing the original image into two shares. Original image can be identified only when both qualified shares are simultaneously available. Individual share does not reveal the identity of the original image. Thus, the existence of the secret message is hard to be detected by the RS steganalysis.

Keywords: image security, random LSB, steganography, visual cryptography

Procedia PDF Downloads 306
1590 Influences on Occupational Identity through Trans and Gender Diverse Identity: A Qualitative Study about Work Experiences of Trans and Gender Diverse Individuals

Authors: Robin C. Ladwig

Abstract:

Work experiences and satisfaction as well as the feeling of belonging has been narrowly explored from the perspective of trans and gender diverse individuals. Hence, the study investigates the relationship of values, attitudes, and norms of occupational environments and the working identity of trans and gender diverse people of the Australian workforce. Based on 22 semi-structured interviews with trans and gender diverse individuals regarding their work and career experiences, a first insight about their feeling of belonging through commonality in the workplace could be established. Communality between the values, attitudes and norms of a trans and gender diverse individuals working identities and profession, organization and working environment could increase the feeling of belonging. Further reflection and evaluation of trans and gender diverse identities in the workplace need to be considered to create an equitable and inclusive workplace of the future. Consequently, an essential development step for the future of work and its fundamental values of diversity, inclusion, and belonging will consist of the acknowledgement and inclusion of trans and gender diverse people as part of a broader social identity of the workplace.

Keywords: belonging, future of work, working identity, trans and gender diverse identity

Procedia PDF Downloads 98
1589 A Review of Ultralightweight Mutual Authentication Protocols

Authors: Umar Mujahid, Greatzel Unabia, Hongsik Choi, Binh Tran

Abstract:

Radio Frequency Identification (RFID) is one of the most commonly used technologies in IoTs and Wireless Sensor Networks which makes the devices identification and tracking extremely easy to manage. Since RFID uses wireless channel for communication, which is open for all types of adversaries, researchers have proposed many Ultralightweight Mutual Authentication Protocols (UMAPs) to ensure security and privacy in a cost-effective manner. These UMAPs involve simple bitwise logical operators such as XOR, AND, OR & Rot, etc., to design the protocol messages. However, most of these UMAPs were later reported to be vulnerable against many malicious attacks. In this paper, we have presented a detailed overview of some eminent UMAPs and also discussed the many security attacks on them. Finally, some recommendations and suggestions have been discussed, which can improve the design of the UMAPs.

Keywords: RFID, Ultralightweight, UMAP, SASI

Procedia PDF Downloads 116
1588 Neo-Filipino: A Study on the Impact of Internet and Mobile Technology on the Identity Formation of Selected Filipino Third Culture Kids (TCKs)

Authors: Erika Mae L. Valencia

Abstract:

Third Culture Kids (TCKs) are children who experienced a cross-cultural upbringing – being raised and lived outside their parents’ culture. As a result, TCKs experience the difficulty of building and attaining a concrete cultural identity. However, in the context of globalization and the emergence of ICTs, the internet, and mobile technology creates better ways of constructing cultural identities. This study investigates the social and cultural impacts of the internet and mobile technology on the multi-cultural identity development among selected Filipino TCKs. Moreover, this research seeks to understand how the Filipino TCKs form their identity and address their complex issue of belonging with the use of different internet platforms and mobile technology. To explore the lived experiences of Filipino TCKs, this research employs a transcendental phenomenological design. Also, this study uses purposive and snowball sampling and conduct in-depth interviews through Skype, phone call, or face-to-face. This study utilizes Pierre Bourdieu’s social capital as a theoretical lens to gain understanding of the TCKs’ identity formation process in relation to the said ICTs. This research argues that the internet and mobile technology play a significant role in facilitating multi-cultural identity formation of Filipino TCKs, as well as potentially broadening their social network through its various technological platforms.

Keywords: identity, internet, third culture kids, mobile technology

Procedia PDF Downloads 274
1587 On the Design of a Secure Two-Party Authentication Scheme for Internet of Things Using Cancelable Biometrics and Physically Unclonable Functions

Authors: Behnam Zahednejad, Saeed Kosari

Abstract:

Widespread deployment of Internet of Things (IoT) has raised security and privacy issues in this environment. Designing a secure two-factor authentication scheme between the user and server is still a challenging task. In this paper, we focus on Cancelable Biometric (CB) as an authentication factor in IoT. We show that previous CB-based scheme fail to provide real two-factor security, Perfect Forward Secrecy (PFS) and suffer database attacks and traceability of the user. Then we propose our improved scheme based on CB and Physically Unclonable Functions (PUF), which can provide real two-factor security, PFS, user’s unlinkability, and resistance to database attack. In addition, Key Compromise Impersonation (KCI) resilience is achieved in our scheme. We also prove the security of our proposed scheme formally using both Real-Or-Random (RoR) model and the ProVerif analysis tool. For the usability of our scheme, we conducted a performance analysis and showed that our scheme has the least communication cost compared to the previous CB-based scheme. The computational cost of our scheme is also acceptable for the IoT environment.

Keywords: IoT, two-factor security, cancelable biometric, key compromise impersonation resilience, perfect forward secrecy, database attack, real-or-random model, ProVerif

Procedia PDF Downloads 73