Search results for: identity authentication
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1736

Search results for: identity authentication

1586 Using Motives of Sports Consumption to Explain Team Identity: A Comparison between Football Fans across the Pond

Authors: G. Scremin, I. Y. Suh, S. Doukas

Abstract:

Spectators follow their favorite sports teams for different reasons. While some attend a sporting event simply for its entertainment value, others do so because of the personal sense of achievement and accomplishment their connection with a sports team creates. Moreover, the level of identity spectators feel toward their favorite sports team falls in a broad continuum. Some are mere spectators. For those spectators, their association to a sports team has little impact on their self-image. Others are die-hard fans who are proud of their association with their team and whose connection with that team is an important reflection of who they are. Several motives for sports consumption can be used to explain the level of spectator support in a variety of sports. Those motives can also be used to explain the variance in the identification, attachment, and loyalty spectators feel toward their favorite sports team. Motives for sports consumption can be used to discriminate the degree of identification spectators have with their favorite sports team. In this study, motives for sports consumption was used to discriminate the level of identity spectators feel toward their sports team. It was hypothesized that spectators with a strong level of team identity would report higher rates of interest in player, interest in sports, and interest in team than spectators with a low level of team identity. And spectators with a low level of team identity would report higher rates for entertainment value, bonding with friends or family, and wholesome environment. Football spectators in the United States and England were surveyed about their motives for football consumption and their level of identification with their favorite football team. To assess if the motives of sports fans differed by level of team identity and allegiance to an American or English football team, a Multivariate Analysis of Variance (MANOVA) under the General Linear Model (GLM) procedure found in SPSS was performed. The independent variables were level of team identity and allegiance to an American or English football team, and the dependent variables were the sport fan motives. A tripartite split (low, moderate, high) was used on a composite measure for team identity. Preliminary results show that effect of team identity is statistically significant (p < .001) for at least nine of the 17 motives for sports consumption assessed in this investigation. These results indicate that the motives of spectators with a strong level of team identity differ significantly from spectators with a low level of team identity. Those differences can be used to discriminate the degree of identification spectators have with their favorite sports team. Sports marketers can use these methods and results to develop identity profiles of spectators and create marketing strategies specifically designed to attract those spectators based on their unique motives for consumption and their level of team identification.

Keywords: fan identification, market segmentation of sports fans, motives for sports consumption, team identity

Procedia PDF Downloads 139
1585 Turkey’s Ideological and Identity Politics towards Iran in the Arab Uprising: The Case of Syrian Civil War

Authors: Cangul Altundas Akcay

Abstract:

With the beginning of the mass movement called as the Arab Uprising, Middle Eastern politics has demonstrated an influential shift which has been threatening the existence of the ruling regimes. In this environment, in particular, regional powers have desired to control regional politics, and to expand their regional influence. Bearing that in mind, Turkey and Iran, two significant regional powers, have engaged in competition so as to affect the shifted regional geopolitics. In this context, this paper aims to investigate how regional powers, especially non-Arab ones, have viewed each other in the Arab Uprising, whereby focusing on Turkish perspectives towards Iran. In other words, it will shed light on how Turkey has conducted foreign policy towards Iran during the Arab Uprising. To analyse this, Turkey’s ideological and identity politics towards Iran will be examined as one of its foreign policy approaches. The question is thus that how ideological and identity politics have determined Turkish foreign policy towards Iran in the Arab Uprising. To answer that, the Syrian civil war will be analysed as the case study in this qualitative study, hypothesising that Turkey, which has both Turkish identity and Sunni sect, has competed with Iran, which has both Farsi identity and Shia sect, over the Syrian civil war.

Keywords: Arab uprising, ideological and identity politics, Iran, Turkey, Syrian civil war

Procedia PDF Downloads 277
1584 Data Confidentiality in Public Cloud: A Method for Inclusion of ID-PKC Schemes in OpenStack Cloud

Authors: N. Nalini, Bhanu Prakash Gopularam

Abstract:

The term data security refers to the degree of resistance or protection given to information from unintended or unauthorized access. The core principles of information security are the confidentiality, integrity and availability, also referred as CIA triad. Cloud computing services are classified as SaaS, IaaS and PaaS services. With cloud adoption the confidential enterprise data are moved from organization premises to untrusted public network and due to this the attack surface has increased manifold. Several cloud computing platforms like OpenStack, Eucalyptus, Amazon EC2 offer users to build and configure public, hybrid and private clouds. While the traditional encryption based on PKI infrastructure still works in cloud scenario, the management of public-private keys and trust certificates is difficult. The Identity based Public Key Cryptography (also referred as ID-PKC) overcomes this problem by using publicly identifiable information for generating the keys and works well with decentralized systems. The users can exchange information securely without having to manage any trust information. Another advantage is that access control (role based access control policy) information can be embedded into data unlike in PKI where it is handled by separate component or system. In OpenStack cloud platform the keystone service acts as identity service for authentication and authorization and has support for public key infrastructure for auto services. In this paper, we explain OpenStack security architecture and evaluate the PKI infrastructure piece for data confidentiality. We provide method to integrate ID-PKC schemes for securing data while in transit and stored and explain the key measures for safe guarding data against security attacks. The proposed approach uses JPBC crypto library for key-pair generation based on IEEE P1636.3 standard and secure communication to other cloud services.

Keywords: data confidentiality, identity based cryptography, secure communication, open stack key stone, token scoping

Procedia PDF Downloads 348
1583 Identity and Citizenship Crises of Rohingya from the Perspective of Diaspora Communities

Authors: Mufizur Rahman

Abstract:

This thesis argues that by the citizenship policies of the Myanmar government, the rights of Rohingya have been taken away and the identity of Rohingya has been marginalized. An emphasis is made on the history, ancestors, homeland, and ideal when an individual seeks recognition for ethnic identity. Ethnic groups hold on to their unique culture, cultural heritage, language, homeland, and historical past not only to act in solidarity but also to reinforce the consciousness of national identity. Rohingya ethnic group in Rakhine state (formerly Arakan state) is in seek for identity and citizenship rights in the country. Even though Rohingya people have been living in Arakan for centuries, they are being marginalized and have been deprived of their rights by the 1982 citizenship law, which was created by the authoritarian leader after the military coup in 1962. This study elaborated marginalized and persecuted life of Rohingyas for decades by the Government of Myanmar (GOM) in their homeland and after the enactment of the 1982 Citizenship Law and citizenship policies enforced by the government. Thereby, every right was deprived systematically from the Rohingya by the GOM. By this circumstance of the country, many Rohingyas have fled from the country and sought asylum in other countries. This study primarily used the qualitative research data of in-depth personal interviews by conducting 18 Rohingya participants from the diaspora community, including male and female participants. The study examined the narrative of the Rohingya identity and citizenship policies of their homeland from the personal experience of the diaspora community.

Keywords: Rohingya, identity, citizenship policies, Diaspora community, homeland, Myanmar

Procedia PDF Downloads 58
1582 MSG Image Encryption Based on AES and RSA Algorithms "MSG Image Security"

Authors: Boukhatem Mohammed Belkaid, Lahdir Mourad

Abstract:

In this paper, we propose a new encryption system for security issues meteorological images from Meteosat Second Generation (MSG), which generates 12 images every 15 minutes. The hybrid encryption scheme is based on AES and RSA algorithms to validate the three security services are authentication, integrity and confidentiality. Privacy is ensured by AES, authenticity is ensured by the RSA algorithm. Integrity is assured by the basic function of the correlation between adjacent pixels. Our system generates a unique password every 15 minutes that will be used to encrypt each frame of the MSG meteorological basis to strengthen and ensure his safety. Several metrics have been used for various tests of our analysis. For the integrity test, we noticed the efficiencies of our system and how the imprint cryptographic changes at reception if a change affects the image in the transmission channel.

Keywords: AES, RSA, integrity, confidentiality, authentication, satellite MSG, encryption, decryption, key, correlation

Procedia PDF Downloads 353
1581 Biometric Recognition Techniques: A Survey

Authors: Shabir Ahmad Sofi, Shubham Aggarwal, Sanyam Singhal, Roohie Naaz

Abstract:

Biometric recognition refers to an automatic recognition of individuals based on a feature vector(s) derived from their physiological and/or behavioral characteristic. Biometric recognition systems should provide a reliable personal recognition schemes to either confirm or determine the identity of an individual. These features are used to provide an authentication for computer based security systems. Applications of such a system include computer systems security, secure electronic banking, mobile phones, credit cards, secure access to buildings, health and social services. By using biometrics a person could be identified based on 'who she/he is' rather than 'what she/he has' (card, token, key) or 'what she/he knows' (password, PIN). In this paper, a brief overview of biometric methods, both unimodal and multimodal and their advantages and disadvantages, will be presented.

Keywords: biometric, DNA, fingerprint, ear, face, retina scan, gait, iris, voice recognition, unimodal biometric, multimodal biometric

Procedia PDF Downloads 730
1580 Like a Bridge over Troubled Waters: The Value of Joint Learning Programs in Intergroup Identity-Based Conflict in Israel

Authors: Rachelly Ashwall, Ephraim Tabory

Abstract:

In an attempt to reduce the level of a major identity-based conflict in Israel between Ultra-orthodox and secular Jews, several initiatives in recent years have tried to bring members of the two societies together in facilitated joint discussion forums. Our study analyzes the impact of two types of such programs: joint mediation training classes and confrontation-based learning programs that are designed to facilitate discussions over controversial issues. These issues include claims about an unequal shouldering of national obligations such as military service, laws requiring public observance of the Sabbath, and discrimination against women, among others. The study examines the factors that enabled the two groups to reduce their social distance, and increase their understanding of each other, and develop a recognition and tolerance of the other group's particular social identity. The research conducted over a course of two years involved observations of the activities of the groups, interviews with the participants, and analysis of the social media used by the groups. The findings demonstrate the progression from a mutual initial lack of knowledge about habits, norms, and attitudes of the out-group to an increasing desire to know, understand and more readily accept the identity of a previously rejected outsider. Participants manifested more respect, concern for and even affection for those whose identity initially led them to reject them out of hand. We discuss the implications for seemingly intractable identity-based conflict in fragile societies.

Keywords: identity-based conflict, intergroup relations, joint mediation learning, out-group recognition, social identity

Procedia PDF Downloads 223
1579 Secure Network Coding-Based Named Data Network Mutual Anonymity Transfer Protocol

Authors: Tao Feng, Fei Xing, Ye Lu, Jun Li Fang

Abstract:

NDN is a kind of future Internet architecture. Due to the NDN design introduces four privacy challenges,Many research institutions began to care about the privacy issues of naming data network(NDN).In this paper, we are in view of the major NDN’s privacy issues to investigate privacy protection,then put forwards more effectively anonymous transfer policy for NDN.Firstly,based on mutual anonymity communication for MP2P networks,we propose NDN mutual anonymity protocol.Secondly,we add interest package authentication mechanism in the protocol and encrypt the coding coefficient, security of this protocol is improved by this way.Finally, we proof the proposed anonymous transfer protocol security and anonymity.

Keywords: NDN, mutual anonymity, anonymous routing, network coding, authentication mechanism

Procedia PDF Downloads 417
1578 Investigating University Language Teacher’s Perception of Their Identities in the Algerian Multilingual Context

Authors: Yousra Drissi

Abstract:

This research explores language teacher identity in a multilingual context where both teachers and students come from different linguistic backgrounds. It seeks to understand how teachers perceive themselves as language teachers in this context in relation to different influencing factors, both internal and external. This study is being conducted due to the importance of language teacher identity (LTI) in the university context, which is being neglected in the present literature (in an attempt to address the gap in the present literature). The broader aim of this study is to bring attention to language teacher identity along with the different influencing elements which can either promote or hinder its development. In this research, we are using the sociocultural theory and post-structural theory. This research uses the mixed methods approach to collect and analyse relevant data. A structured survey was distributed to language teachers from different universities around Algeria, followed by in-depth interviews. Results are supposed to show the different points in self-perception that these teachers share or differ in. they will also help us identify the different internal and external factors that can be of influence. However, the results of this research can be used by institutions as well as decision-makers to better understand university teachers and help them improve their teaching practices by empowering their language teacher identity, starting from teacher education programs to continuous teacher development programs.

Keywords: identity, language teacher identity, multilingualism, university teacher

Procedia PDF Downloads 49
1577 Comparative Analysis of Identity Semiotics in Iran’s Modern and Traditional House Design

Authors: Maryam Ghasemi

Abstract:

One of the most significant components that provide comfort and protection is having a shelter called a house. Even if components and regions are changed or restored to meet new functions, the house's identity must be preserved. In the contemporary era, houses are increasingly being built regardless of cultural identity. This misunderstanding caused a sense of unease. This study analyses archaic and modern architecture to find semiotic areas and qualities in the latter, using the former as a reference. This study's technique used an exploratory assessment of architectural components from both periods. The Abbasid residence and the Ekbatan architectural complex were used as case studies. The identity of Iranian architecture does not correlate with current buildings. The other part is privacy, which is a missing link between traditional and modern Iranian architecture because it is directly related to the identities of homes based on the cultures of their residents.

Keywords: housing, traditional, contemporary, privacy, semiotic

Procedia PDF Downloads 76
1576 The Impact of Type Two Diabetes and Comorbid Conditions on Self-Identity and Self-Management Practices

Authors: Virginia Maskill, Philippa Seaton, Marie Crowe, Maree Inder

Abstract:

A diagnosis of a chronic condition, including Type 2 diabetes can significantly impact an individual’s self-identity which in turn can have considerable implications on how they adapt to, and self-manage their condition. This paper reports on the findings from a qualitative PhD study of forty participants diagnosed with Type 2 diabetes mellitus and comorbid conditions. The primary objective of the study explored the impact conditions had on self-identity and the relationship with self-management practices. Participants were recruited from a larger study which explored the effectiveness of a therapeutic intervention on glycemic control. Interviews were audio-recorded, transcribed verbatim and analysed utilising a narrative thematic analysis methodological approach including a transitional conceptual framework. The majority of participants experienced a loss of their normal self and struggled to integrate diabetes and comorbid conditions into their self-identity. Acceptance, knowledge and integration of conditions were often found to directly influence self-management practices with individuals commonly experiencing four transitional phases from the onset of diagnosis. Successful negotiation of these four phases was influenced by a range of variables which also impacted on an individual’s self-identity and in turn their self-management practices.

Keywords: comorbidity, type two diabetes, self-identity, self-management

Procedia PDF Downloads 300
1575 Historical Analysis of the Evolution of Swiss Identity and the Successful Integration of Multilingualism into the Swiss Concept of Nationhood

Authors: James Beringer

Abstract:

Switzerland’s ability to forge a strong national identity across linguistic barriers has long been of interest to nationalism scholars. This begs the question of how this has been achieved, given that traditional explanations of luck or exceptionalism appear highly reductionist. This paper evaluates the theory that successful Swiss management of linguistic diversity stems from the strong integration of multilingualism into Swiss national identity. Using archival analysis of Swiss government records, historical accounts of prominent Swiss citizens, as well as secondary literature concerning the fundamental aspects of Swiss national identity, this paper charts the historical evolution of Swiss national identity. It explains how multilingualism was deliberately and successfully integrated into Swiss national identity as a response to political fragmentation along linguistic lines during the First World War. Its primary conclusions are the following. Firstly, the earliest foundations of Swiss national identity were purposefully removed from any association with a single national language. This produced symbols, myths, and values -such as a strong commitment to communalism, the imagery of the Swiss natural landscape, and the use of Latin expressions, which can be adopted across Swiss linguistic groups. Secondly, the First World War triggered a turning point in the evolution of Swiss national identity. The fundamental building blocks proved insufficient in preventing political fractures amongst linguistic lines, as each Swiss linguistic group gravitated towards its linguistic neighbours within Europe. To avoid a repeat of such fragmentation, a deliberate effort was made to fully integrate multilingualism as a fundamental aspect of Swiss national identity. Existing natural symbols, such as the St Gotthard Mountains, were recontextualized in order to become associated with multilingualism. The education system was similarly reformed to reflect the unique multilingual nature of the Swiss nation. The successful result of this process can be readily observed in polls and surveys, with large segments of the Swiss population highlighting multilingualism as a uniquely Swiss characteristic, indicating the symbiotic connection between multilingualism and the Swiss nation.

Keywords: language's role in identity formation, multilingualism in nationalism, national identity formation, Swiss national identity history

Procedia PDF Downloads 152
1574 Lesbian Stereotype Representation in Cinema in Turkey

Authors: Hasan Gürkan, Rengin Ozan

Abstract:

Cinema, as a popular mass media tool, affects the general perception of the society against sexual identity. By establishing on interaction relationship with cinema and social reality, the study also tries to answer what the importance of lesbian identity in social life in films in Turkey is. This article focus on representing the description of the women characters who call their selves lesbian in Turkey cinema. The study tries to answer these three questions: First, how the lesbian characters are represented in films in Turkey? Second, what is the reality of the lesbian sexual identity in the films? Third, what are the differences and similarities between the lesbian characters in films in Turkey before 2000s and after 2000s? The films are analysed by the sociological film interpretation in this study. When comparing the films before 2000 and after 2000, it is possible to say that there have been no lesbian characters in many films. Especially almost all of the films (Haremde Dört Kadın, Ver Elini İstanbul, Dul Bir Kadın, Gramofon Avrat, Lola and Billidikid), during 1960s, just threw looks indirect the lesbian sex identity. Just in the films Düş Gezginleri, İki Genç Kız and Nar, the women character (also called them as lesbian) are the leading role and the plot of the films is progressing over these characters.

Keywords: cinema in Turkey, lesbian identity, representation, stereotype

Procedia PDF Downloads 303
1573 Constitutional Identity: The Connection between National Constitutions and EU Law

Authors: Norbert Tribl

Abstract:

European contemporary scientific public opinion considers the concept of constitutional identity as a highlighted issue. Some scholars interpret the matter as the manifestation of a conflict of Europe. Nevertheless, constitutional identity is a bridge between the Member States and the EU rather than a river that will wash away the achievements of the integration. In accordance with the opinion of the author, the main problem of constitutional identity in Europe is the undetermined nature: the exact concept of constitutional identity has not been defined until now. However, this should be the first step to understand and use identity as a legal institution. Having regard to this undetermined nature, the legal-theoretical examination of constitutional identity is the main purpose of this study. The concept of constitutional identity appears in the Anglo-Saxon legal systems by a different approach than in the supranational system of European Integration. While the interpretation of legal institutions in conformity with the constitution is understood under it, the European concept is applied when possible conflicts arise between the legal system of the European supranational space and certain provisions of the national constitutions of the member states. The European concept of constitutional identity intends to offer input in determining the nature of the relationship between the constitutional provisions of the member states and the legal acts of the EU integration. In the EU system of multilevel constitutionalism, a long-standing central debate on integration surrounds the conflict between EU legal acts and the constitutional provisions of the member states. In spite of the fact that the Court of Justice of the European Union stated in Costa v. E.N.E.L. that the member states cannot refer to the provisions of their respective national constitutions against the integration. Based on the experience of more than 50 years since the above decision, and also in light of the Treaty of Lisbon, we now can clearly see that EU law has itself identified an obligation for the EU to protect the fundamental constitutional features of the Member States under Article 4 (2) of Treaty on European Union, by respecting the national identities of member states. In other words, the European concept intends to offer input for the determination of the nature of the relationship between the constitutional provisions of the member states and the legal acts of the EU integration.

Keywords: constitutional identity, EU law, European Integration, supranationalism

Procedia PDF Downloads 117
1572 A Comparative Analysis of the Role, Representations and Architectural Identity of Public Space in Medieval and Contemporary Cairo

Authors: Muhammad Feteha

Abstract:

The socio-political Middle East scene has radically changed over the last decade, and one major contributor to this change was the Egyptian revolution of 2011. The massive impact of this revolution that originally started as a small protest in the Tahrir square has attracted more scholars to study the public space in Egypt, where it has become a necessity in order to understand and improve the socio-political conditions. The status of public space in Egypt has been deteriorating due to many reasons, including privatization and neglect. This paper studies one of the major problems of the contemporary public space in Cairo, which is the lack of identity. This takes place through a comparative analysis between selected case studies from both medieval and contemporary Cairo. The theoretical framework upon which the analysis is based views public space as a ‘container of social action’ and a ‘product of spatial practice’. Through the ‘deciphering of space’, differences in the socio-political role, symbolism, and identity of public spaces between both eras are shown. The paper aims to extract some lessons from public space in medieval Cairo, which was truly the ‘centerpiece of the public realm’ and a ‘fundamental expressions’ of the unique trans-dynastic architectural identity of Cairo. In addition, it suggests some strategies to revive the Cairene identity of public space instead of constructing new ones to be only ‘utilitarian spaces used for circulation’ and lack any identity.

Keywords: architectural identity, Cairene public space, Islamic architectural history, production of space

Procedia PDF Downloads 151
1571 A Unique Professional Development of Teacher Educators: Teaching Colleagues

Authors: Naomi Weiner-Levy

Abstract:

The Mofet Institute of Research, established a School of Professional Development, the only one of its kind in Israel and throughout the world. It offers specialized programs for teacher educators, providing them with the professional knowledge and skills. The studies aim at updating teachers about rapidly changing knowledge and skills. Teacher educators are conceptualized as shifting from first order practitioners (school teachers) to second order practitioners. Those who train teachers are referred to as third order practitioners. The instructors in the School of Professional Development are third-order practitioners – teacher educators specializing in teaching their colleagues. Collegial guidance by teachers’ college staff members is no simple task: Tutors must be expert in their field of specialization, as well as in instruction. Moreover, although colleagues, they have to position themselves within the group as authoritative figures in terms of instruction and knowledge. To date, the role and professional identity of these third-order practitioners, has not been studied. To understand the nature and development of professional identity, a qualitative study was conducted in which 12 tutors of various subjects were interviewed. These were analyzed by categorical content analysis. The findings, assessed professional identity through a post-modern prism, while examining the interplay among events that tutors experienced, the knowledge they acquired and the structuring of their professional identity. The Tutors’ identity transformed through negotiating with ‘self’ and ‘other’ in the class, and constructed by their mutual experiences as tutors and learners. Understanding the function and identity of tutors facilitates comprehension of this unique training process for teacher educators.

Keywords: professional development, professional identity, teacher education, tutoring

Procedia PDF Downloads 179
1570 Clicking Based Graphical Password Scheme Resistant to Spyware

Authors: Bandar Alahmadi

Abstract:

The fact that people tend to remember pictures better than texts, motivates researchers to develop graphical passwords as an alternative to textual passwords. Graphical passwords as such were introduced as a possible alternative to traditional text passwords, in which users prove their identity by clicking on pictures rather than typing alphanumerical text. In this paper, we present a scheme for graphical passwords that are resistant to shoulder surfing attacks and spyware attacks. The proposed scheme introduces a clicking technique to chosen images. First, the users choose a set of images, the images are then included in a grid where users can click in the cells around each image, the location of the click and the number of clicks are saved. As a result, the proposed scheme can be safe from shoulder surface and spyware attacks.

Keywords: security, password, authentication, attack, applications

Procedia PDF Downloads 139
1569 Exploring the Illness Experience of Fibromyalgia Patients Using Identity Boxes

Authors: Nicole Brown

Abstract:

This study considers the illness experience of fibromyalgia patients by using identity boxes. The results improve health care professionals' understanding of patient experiences. Additionally, the concept of the identity boxes may offer a practical solution for helping patients accept the diagnosis of fibromyalgia. Fibromyalgia research traditionally refers to pain experiences and relies on questionnaires, surveys, interviews and some narrative analysis. However, due to the variability in symptoms, symptom levels, and locations, these methods may not be best suited to provide an insight into the patient experience. On the other hand, lengthy interview processes are not easily accessible for sufferers of fibromyalgia. In addition to timelines and diary extracts, this study uses identity boxes as its main data collection method. Participants are asked to find items in response to specific questions and to arrange them in their box. The objects represent the patients' experiences holistically. Participants provide photographs of their identity box at each stage of the process and explain their chosen items. The photographs of the identity boxes and the patients' explanations of their objects and their boxes are subjected to interpretative phenomenological analysis. Despite the unique forms of the completed boxes, common experiences are described: the need for comfort, the role of spirituality and the impact of fibromyalgia on everyday life, that it plays a significant role but those patients are determined not to let it rule their lives. The work with the identity boxes has shown beneficial impact due to the reflective nature involved in the tasks. Further investigations will be needed to identify the long-term impact of identity work using such boxes.

Keywords: biographical disruption, fibromyalgia, illness experience, illness narrative

Procedia PDF Downloads 210
1568 Mental Illness on Youtube: Exploring Identity Performance in the Virtual Space

Authors: P. Saee, Baiju Gopal

Abstract:

YouTube has seen a surge in the recent years in the number of creators opening up about their mental illness on the video-sharing platform. In documenting their mental health, YouTubers perform an identity of their mental illness in the online world. Identity performance is a theory under identity research that has been readily applied to illness narratives and internet studies. Furthermore, in India, suffering from mental illnesses is regarded with stigma, making the act of taking mental health from a personal to a public space on YouTube a phenomenon worth exploring. Thus, the aim of this paper is to analyse the mental illness narratives of Indian YouTubers for understanding its performance in the virtual world. For this purpose, thematic narrative analysis on the interviews of four Indian YouTubers was conducted. This data was synthesized with analysis of the videos the YouTubers had uploaded on their channel sharing about their mental illness. The narratives of the participants shed light on two significant presentations that they engage in: (a) the identity of a survivor/fighter and (b) the identity of a silent sufferer. Further, the participants used metaphors to describe their illness, thereby co-constructing a corresponding identity based on their particular metaphors. Lastly, the process of bringing mental illness from back stage to front stage on YouTube involves a shift in the audience, from being rejecting and invalidating in real life to being supportive and encouraging in the virtual space. Limitations and implications for future research were outlined.

Keywords: cyber-psychology, internet, media, mental health, mental illness, technology

Procedia PDF Downloads 145
1567 Towards a Non-Cohesive Self Metamodernist Literature as Case Study

Authors: Ali Oublal

Abstract:

If any period in history seems appropriate for the study of identity, it is a period of greater mobility; the 21st century. Margaret Wetherill (2009) is thus right while asking who we can be in this age. New biographies of people, their trajectories and new locations appear on the ground; how people do make sense of the self becomes the central question not only for social scientists, and cultural theorists but also for literary critics. New-fangled technologies have resulted in the substitution of stable identities by multiple, fragmented and more uncertain identities. A liquid sense of the self as well as unstable and dynamic forms of life does not fail to inspire novelists who have given robust sense of identities attributed to their characters. The following account comes to snapshot features of identity as being presented by meta-modernist novels: the sympathizer, sisters and a girl is a half formed thing. It is a stance that refutes the claim of Elliott‘s who still adheres the stable state of identity in meta-modernist age while reconciling the two paradigms modernity and postmodernity.

Keywords: identity, metamodernism, fragmantation, stability, literature

Procedia PDF Downloads 66
1566 The Influence of English Learning on Ethnic Kazakh Minority Students’ Identity (Re)Construction at Chinese Universities

Authors: Sharapat Sharapat

Abstract:

English language is perceived as cultural capital in many non-native English-speaking countries, and minority groups in these social contexts seem to invest in the language to be empowered and reposition themselves from the imbalanced power relation with the dominant group. This study is devoted to explore how English learning influence minority Kazakh students’ identity (re)construction at Chinese universities from the scope of ‘imagined community, investment, and identity’ theory of Norton (2013). To this end the three research questions were designed as follows: 1) Kazakh minority students’ English learning experiences at Chinese universities; 2) Kazakh minority students’ views about benefits and opportunities of English learning; 3) the influence of English learning on Kazakh minority students’ identity (re)construction. The study employs an interview-based qualitative research method by interviewing nine Kazakh minority students in universities in Xinjiang and other inland cities in China. The findings suggest that through English learning, some students have reconstructed multiple identities as multicultural and global identities, which created ‘a third space’ to break limits of their ethnic and national identities and confused identity as someone in-between. Meanwhile, most minority students were empowered by the English language to resist inferior or marginalized positions and reconstruct imagined elite identity. However, English learning disempowered students who have little previous English education in school and placed them on unequal footing with other students, which further escalated the educational inequities.

Keywords: minority in China, identity construction, multilingual education, language empowerment

Procedia PDF Downloads 190
1565 The Quest for Identity among African Americans: Life History of Imahkus Nzinga

Authors: Felicia Masenu

Abstract:

Identity formation remains central to diaspora populations as they are known to have multiple attachments to places, including the 'ancestral homeland.' This paper emphasizes the potency of the ancestral homeland in the imagination of diaspora populations and a 'yearning' for an eventual return. This has led to the repatriation and visits of many Diasporan Africans to Africa. What have also been highlighted are the motivations, experiences, and challenges associated with the return of African Americans to Africa, as well as some of the idealistic expectations that Diasporan Africans have regarding the ancestral homeland. When Diasporan Africans visit Africa, they are faced with different kinds of situations that are challenging. Yet, the number of visits to Africa by Diasporan Africans, particularly, African Americans, keep increasing. This paper draws on the life history of Imahkus Nzinga, an African American who repatriated to Ghana in the 1990s, as a case study of African Americans’ relentless quest to pursue the ancestral homeland, despite the challenges involved. The paper argues that the quest for identity construction remains the overriding motivation for African Americans in their decision to repatriate to Africa, and discusses how in this case, Imahkus Nzinga attempts to reconcile what is called in this paper 'identity struggle.'

Keywords: African Americans, Diaspora, identity formation, identity struggle, repatriation

Procedia PDF Downloads 306
1564 Identity Verification Using k-NN Classifiers and Autistic Genetic Data

Authors: Fuad M. Alkoot

Abstract:

DNA data have been used in forensics for decades. However, current research looks at using the DNA as a biometric identity verification modality. The goal is to improve the speed of identification. We aim at using gene data that was initially used for autism detection to find if and how accurate is this data for identification applications. Mainly our goal is to find if our data preprocessing technique yields data useful as a biometric identification tool. We experiment with using the nearest neighbor classifier to identify subjects. Results show that optimal classification rate is achieved when the test set is corrupted by normally distributed noise with zero mean and standard deviation of 1. The classification rate is close to optimal at higher noise standard deviation reaching 3. This shows that the data can be used for identity verification with high accuracy using a simple classifier such as the k-nearest neighbor (k-NN). 

Keywords: biometrics, genetic data, identity verification, k nearest neighbor

Procedia PDF Downloads 225
1563 Place, Female and Latino Identities in Kali Fajardo-Anstine’s Short Story Collection Sabrina and Corina

Authors: Jaroslav Kusnir

Abstract:

In her short story collection, Sabrina & Corina, Kali Fajardo-Anstine depicts mostly Latina characters of indigenous background living and travelling in the American West and the Southwest. In all the stories, place and the environment plays an important role in the construction of cultural identity of these characters that is influenced by their indigenous background, a specificity of the American West, its culture and environment, as well as a contemporary (modern) American culture, position of women and gender roles in a Latino community in the USA. This paper will analyze Fajardo-Anstine´s depiction of a specificity of place, especially of the American West and its role in a construction of Latino/a cultural identity in a modern American society as manifested especially in Fajardo-Anstine´s stories Any Further West and Sabrina & Corina. At the same time, the paper will point out Fajardo-Anstine´s construction of cultural identity of female characters and their gender roles in both Latino and a contemporary American societies. The research results show that the formation of Latina cultural identity is closely connected with both place, that is the American West and the Soutwest as well as with Latina and contemporary American cultures.

Keywords: American culture, american west, cultural identity, female identity, latina identity, place

Procedia PDF Downloads 51
1562 A Survey on Smart Security Mechanism Using Graphical Passwords

Authors: Aboli Dhanavade, Shweta Bhimnath, Rutuja Jumale, Ajay Nadargi

Abstract:

Security to any of our personal thing is our most basic need. It is not possible to directly apply that standard Human-computer—interaction approaches. Important usability goal for authentication system is to support users in selecting best passwords. Users often select text-passwords that are easy to remember, but they are more open for attackers to guess. The human brain is good in remembering pictures rather than textual characters. So the best alternative is being designed that is Graphical passwords. However, Graphical passwords are still immature. Conventional password schemes are also vulnerable to Shoulder-surfing attacks, many shoulder-surfing resistant graphical passwords schemes have been proposed. Next, we have analyzed the security and usability of the proposed scheme, and show the resistance of the proposed scheme to shoulder-surfing and different accidental logins.

Keywords: shoulder-surfing, security, authentication, text-passwords

Procedia PDF Downloads 330
1561 Puerto Rico and Pittsburg: A Social Psychology Perspective on How Perceived Infringement on Job and Cultural Identity Unite Racially Different Working-Class Groups

Authors: Reagan Rodriguez

Abstract:

With a growing divide between political echo chambers in the United States, exacerbated by race and income inequality, it might seem to be unfathomable to draw connections that tie working class in an industrial city and a U.S. territory. Yet, in regions where either the economy has been hit due to dwindling job infrastructure or natural disasters have left indelible marks on an island already once marked by colonial imperialism, a larger social shared identity is at play. Fracking has long been an intergenerational and stable work opportunity for many in the Pittsburg PA, yet the rising severity of global climate change may soon impact the policy and even presidential elections which could result in the reduction of jobs in the industry. Cock-fighting, considered a cultural mainstay within the island of Puerto Rico, has already had legislation banning activity and thus cutting out one of the most lucrative aspects of a severely injured economy. Insecurity, infringement, and isolation while being tied to a working-class bracket with no other opportunities in proximity have left both groups expressing similar frustration and while another larger shared identity politic is giving little other options to develop social mobility. This paper utilizes a thematic analysis and compares convergent and divergent themes on internet forums amongst unionized fracking workers in Pittsburg and cockfighters in Puerto Rico. This research examines how group identity in relation to job and cultural identity is most strong and at which points its most malleable; when intergenerational job identity becomes a part of one’s cultural identity, its override may be strongest when it is perceived as threatened. Final findings and limitations were comprehensively outlined.

Keywords: identity threat, social psychology, group identity, culture and social mobility

Procedia PDF Downloads 127
1560 Language Factor in the Formation of National and Cultural Identity of Kazakhstan

Authors: Andabayeva Dina, Avakova Raushangul, Kortabayeva Gulzhamal, Rakhymbay Bauyrzhan

Abstract:

This article attempts to give an overview of the language situation and language planning in Kazakhstan. Statistical data is given and excursion to history of languages in Kazakhstan is done. Particular emphasis is placed on the national- cultural component of the Kazakh people, namely the impact of the specificity of the Kazakh language on ethnic identity. Language is one of the basic aspects of national identity. Recently, in the Republic of Kazakhstan purposeful work on language development has been conducted. Optimal solution of language problems is a factor of interethnic relations harmonization, strengthening and consolidation of the peoples and public consent. Development of languages - one of the important directions of the state policy in the Republic of Kazakhstan. The problem of the state language, as part of national (civil) identification play a huge role in the successful integration process of Kazakh society. And quite rightly assume that one of the foundations of a new civic identity is knowing Kazakh language by all citizens of Kazakhstan. The article is an analysis of the language situation in Kazakhstan in close connection with the peculiarities of cultural identity.

Keywords: Kazakhstan, mentality, language policy, ethnolinguistics, language planning, language personality

Procedia PDF Downloads 604
1559 Online Authenticity Verification of a Biometric Signature Using Dynamic Time Warping Method and Neural Networks

Authors: Gałka Aleksandra, Jelińska Justyna, Masiak Albert, Walentukiewicz Krzysztof

Abstract:

An offline signature is well-known however not the safest way to verify identity. Nowadays, to ensure proper authentication, i.e. in banking systems, multimodal verification is more widely used. In this paper the online signature analysis based on dynamic time warping (DTW) coupled with machine learning approaches has been presented. In our research signatures made with biometric pens were gathered. Signature features as well as their forgeries have been described. For verification of authenticity various methods were used including convolutional neural networks using DTW matrix and multilayer perceptron using sums of DTW matrix paths. System efficiency has been evaluated on signatures and signature forgeries collected on the same day. Results are presented and discussed in this paper.

Keywords: dynamic time warping, handwritten signature verification, feature-based recognition, online signature

Procedia PDF Downloads 134
1558 The Tourist Satisfaction on Brand Identity Design of Creative Agriculture Community Enterprise, Bang Khonthi District, Samut Songkhram Province

Authors: Panupong Chanplin, Kathaleeya Chanda., Wilailuk Mepracha

Abstract:

The aims of this research were twofold: 1) to brand identity design of Creative Agriculture Community Enterprise, Bang Khonthi District, Samut Songkhram Province and 2) to study the level of tourist satisfaction towards brand identity design of Creative Agriculture Community Enterprise, Bang Khonthi District, Samut Songkhram Province. tourist satisfaction was measured using six criteria: clear brand positioning, likeable brand personality, memorable logo, attractive color palette, professional typography and on-brand supporting graphics. The researcher utilized a probability sampling method via simple random sampling. The sample consisted of 30 tourists in the Creative Agriculture Community Enterprise. Statistics utilized for data analysis were percentage, mean, and standard deviation. The results suggest that tourist had high levels of satisfaction towards all six criteria of the brand identity design that was designed to target them. This study proposes that specifically brand identity designed of Creative Agriculture Community Enterprise could also be implemented with other real media already available on the market.

Keywords: satisfaction, brand identity, logo, creative agriculture community enterprise

Procedia PDF Downloads 215
1557 Decoding the Construction of Identity and Struggle for Self-Assertion in Toni Morrison and Selected Indian Authors

Authors: Madhuri Goswami

Abstract:

The matrix of power establishes the hegemonic dominance and supremacy of one group through exercising repression and relegation upon the other. However, the injustice done to any race, ethnicity, or caste has instigated the protest and resistance through various modes -social campaigns, political movements, literary expression and so on. Consequently, the search for identity, the means of claiming it and strive for recognition have evolved as the persistent phenomena all through the world. In the discourse of protest and minority literature, these two discourses -African American and Indian Dalit- surprisingly, share wrath and anger, hope and aspiration, and quest for identity and struggle for self-assertion. African American and Indian Dalit are two geographically and culturally apart communities that stand together on a single platform. This paper has sought to comprehend the form and investigate the formation of identity in general and in the literary work of Toni Morrison and Indian Dalit writing, particular, i.e., Black identity and Dalit identity. The study has speculated two types of identity, namely, individual or self and social or collective identity in the literary province of these marginalized literature. Morrison’s work outsources that self-identity is not merely a reflection of an inner essence; it is constructed through social circumstances and relations. Likewise, Dalit writings too have a fair record of discovery of self-hood and formation of identity, which connects to the realization of self-assertion and worthiness of their culture among Dalit writers. Bama, Pawar, Limbale, Pawde, and Kamble investigate their true self concealed amid societal alienation. The study has found that the struggle for recognition is, in fact, the striving to become the definer, instead of just being defined; and, this striving eventually, leads to the introspection among them. To conclude, Morrison as well as Indian marginalized authors, despite being set quite distant, communicate the relation between individual and community in the context of self-consciousness, self-identification and (self) introspection. This research opens a scope for further research to find out similar phenomena and trace an analogy in other world literatures.

Keywords: identity, introspection, self-access, struggle for recognition

Procedia PDF Downloads 122