Search results for: identity authentication
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1736

Search results for: identity authentication

1496 Examining Kokugaku as a Pattern of Defining Identity in Global Comparison

Authors: Mária Ildikó Farkas

Abstract:

Kokugaku of the Edo period can be seen as a key factor of defining cultural (and national) identity in the 18th and early 19th century based on Japanese cultural heritage. Kokugaku focused on Japanese classics, on exploring, studying and reviving (or even inventing) ancient Japanese language, literature, myths, history and also political ideology. ‘Japanese culture’ as such was distinguished from Chinese (and all other) cultures, ‘Japanese identity’ was thus defined. Meiji scholars used kokugaku conceptions of Japan to construct a modern national identity based on the premodern and culturalist conceptions of community. The Japanese cultural movement of the 18-19th centuries (kokugaku) of defining cultural and national identity before modernization can be compared not to the development of Western Europe (where national identity strongly attached to modern nation states) or other parts of Asia (where these emerged after the Western colonization), but rather with the ‘national awakening’ movements of the peoples of East Central Europe, a comparison which have not been dealt with in the secondary literature yet. The role of a common language, culture, history and myths in the process of defining cultural identity – following mainly Miroslav Hroch’s comparative and interdisciplinary theory of national development – can be examined compared to the movements of defining identity of the peoples of East Central Europe (18th-19th c). In the shadow of a cultural and/or political ‘monolith’ (China for Japan and Germany for Central Europe), before modernity, ethnic groups or communities started to evolve their own identities with cultural movements focusing on their own language and culture, thus creating their cultural identity, and in the end, a new sense of community, the nation. Comparing actual texts (‘narratives’) of the kokugaku scholars and Central European writers of the nation building period (18th and early 19th centuries) can reveal the similarities of the discourses of deliberate searches for identity. Similar motives of argument can be identified in these narratives: ‘language’ as the primary bearer of collective identity, the role of language in culture, ‘culture’ as the main common attribute of the community; and similar aspirations to explore, search and develop native language, ‘genuine’ culture, ‘original’ traditions. This comparative research offering ‘development patterns’ for interpretation can help us understand processes that may be ambiguously considered ‘backward’ or even ‘deleterious’ (e.g. cultural nationalism) or just ‘unique’. ‘Cultural identity’ played a very important role in the formation of national identity during modernization especially in the case of non-Western communities, who had to face the danger of losing their identities in the course of ‘Westernization’ accompanying modernization.

Keywords: cultural identity, Japanese modernization, kokugaku, national awakening

Procedia PDF Downloads 236
1495 PUF-Based Lightweight Iot Secure Authentication Chip Design

Authors: Wenxuan Li, Lei Li, Jin Li, Yuanhang He

Abstract:

This paper designed a secure chip for IoT communication security integrated with the PUF-based firmware protection scheme. Then, the Xilinx Kintex-7 and STM-32 were used for the prototype verification. Firmware protection worked well on FPGA and embedded platforms. For the ASIC implementation of the PUF module, contact PUF is chosen. The post-processing method and its improvement are analyzed with emphasis. This paper proposed a more efficient post-processing method for contact PUF named SXOR, which has practical value for realizing lightweight security modules in IoT devices. The analysis was carried out under the hypothesis that the contact holes are independent and combine the existing data in the open literature. The post-processing effects of SXOR and XOR are basically the same under the condition that the proposed post-processing circuit occupies only 50.6% of the area of XOR. The average Hamming weight of the PUF output bit sequence obtained by the proposed post-processing method is 0.499735, and the average Hamming weight obtained by the XOR-based post-processing method is 0.499999.

Keywords: PUF, IoT, authentication, secure communication, encryption, XOR

Procedia PDF Downloads 101
1494 Tourist’s Perception and Identification of Landscape Elements of Traditional Village

Authors: Mengxin Feng, Feng Xu, Zhiyong Lai

Abstract:

As a typical representative of the countryside, traditional Chinese villages are rich in cultural landscape resources and historical information, but they are still in continuous decline. The problems of people's weak protection awareness and low cultural recognition are still serious, and the protection of cultural heritage is imminent. At the same time, with the rapid development of rural tourism, its cultural value has been explored and paid attention to again. From the perspective of tourists, this study aimed to explore people's perception and identity of cultural landscape resources under the current cultural tourism development background. We selected eleven typical landscape elements of Lingshui Village, a traditional village in Beijing, as research objects and conducted a questionnaire survey with two scales of perception and identity to explore the characteristics of people's perception and identification of landscape elements. We found that there was a strong positive correlation between the perception and identity of each element and that geographical location influenced visitors' overall perception. The perception dimensions scored the highest in location, and the lowest in history and culture, and the identity dimensions scored the highest in meaning and lowest in emotion. We analyzed the impact of visitors' backgrounds on people's perception and identity characteristics and found that age and education were two important factors. The elderly had a higher degree of perceived identity, as the familiarity effect increased their attention. Highly educated tourists had more stringent criteria for perception and identification. The above findings suggest strategies for conserving and optimizing landscape elements in the traditional village to improve the acceptance and recognition of cultural information in traditional villages, which will inject new vitality into the development of traditional villages.

Keywords: traditional village, tourist perception, landscape elements, perception and identity

Procedia PDF Downloads 104
1493 Place, Space and Asian/Hawaiian Identities in Gary Pak's My Friend Kammy and Ishmael Reed or Me

Authors: Jaroslav Kušnír

Abstract:

Hawaiian literature in English has been researched more intensively in the past decades, mostly in the context of Asian American literature. In his collection of stories Language of the Gecko's and Other Stories, Hawaiian author Gary Pak explores complex relationships between Asian, Native Hawaiian, and American characters living mostly in Hawaii. Through a depiction of these complex relationships, Pak also explores the interaction between different cultures in Hawaii as well as the formation of Asian/Hawaiian identity in the modern world. Based on a comparative approach and close analysis method, this paper will explore the role of place and its historical and cultural background in the formation of modern Asian/Hawaiian cultural identity as manifested in Pak's stories My Friend Kammy and Ishmael Reed or Me. At the same time, through the use of Bill Ashcroft´s concept of transnation, the author of this paper will analyze Pak's depiction of the formation of the cultural identity of characters from Gary Pak's stories My Friend Kammy and Ishmael Reed or Me, which are, in the author of this paper´s view, the characters close to the concept of Ashcroft's transnation which makes them different from traditional cosmopolitan or diasporic characters.

Keywords: culture, cultural identity, Hawaiian identity, Hawaiian literature, place, transnation

Procedia PDF Downloads 41
1492 Nation Branding: Guidelines for Identity Development and Image Perception of Thailand Brand in Health and Wellness Tourism

Authors: Jiraporn Prommaha

Abstract:

The purpose of this research is to study the development of Thailand Brand Identity and the perception of its image in order to find any guidelines for the identity development and the image perception of Thailand Brand in Health and Wellness Tourism. The paper is conducted through mixed methods research, both the qualitative and quantitative researches. The qualitative focuses on the in-depth interview of executive administrations from public and private sectors involved scholars and experts in identity and image issue, main 11 people. The quantitative research was done by the questionnaires to collect data from foreign tourists 800; Chinese tourists 400 and UK tourists 400. The technique used for this was the Exploratory Factor Analysis (EFA), this was to determine the relation between the structures of the variables by categorizing the variables into group by applying the Varimax rotation technique. This technique showed recognition the Thailand brand image related to the 2 countries, China and UK. The results found that guidelines for brand identity development and image perception of health and wellness tourism in Thailand; as following (1) Develop communication in order to understanding of the meaning of the word 'Health and beauty tourism' throughout the country, (2) Develop human resources as a national agenda, (3) Develop awareness rising in the conservation and preservation of natural resources of the country, (4) Develop the cooperation of all stakeholders in Health and Wellness Businesses, (5) Develop digital communication throughout the country and (6) Develop safety in Tourism.

Keywords: brand identity, image perception, nation branding, health and wellness tourism, mixed methods research

Procedia PDF Downloads 171
1491 Social Identification among Employees: A System Dynamic Approach

Authors: Muhammad Abdullah, Salman Iqbal, Mamoona Rasheed

Abstract:

Social identity among people is an important source of pride and self-esteem, consequently, people struggle to preserve a positive perception of their groups and collectives. The purpose of this paper is to explain the process of social identification and to highlight the underlying causal factors of social identity among employees. There is a little research about how the social identity of employees is shaped in Pakistan’s organizational culture. This study is based on social identity theory. This study uses Systems’ approach as a research methodology. The feedback loop approach is applied to explain the underlying key elements of employee behavior that collectively form social identity among social groups in corporate arena. The findings of this study reveal that effective, evaluative and cognitive components of an individual’s personality are associated with the social identification. The system dynamic feedback loop approach has revealed the underlying structure that is associated with social identity, social group formation, and effective component proved to be the most associated factor. This may also enable to understand how social groups become stable and individuals act according to the group requirements. The value of this paper lies in the understanding gained about the underlying key factors that play a crucial role in social group formation in organizations. It may help to understand the rationale behind how employees socially categorize themselves within organizations. It may also help to design effective and more cohesive teams for better operations and long-term results. This may help to share knowledge among employees as well. The underlying structure behind the social identification is highlighted with the help of system modeling.

Keywords: affective commitment, cognitive commitment, evaluated commitment, system thinking

Procedia PDF Downloads 110
1490 The Religious Economic Behavior of People in Dusit Province

Authors: Sivilai Jayankura

Abstract:

This research aims to study the religious economic behavior that effect the lifestyle of the people in Dusit area. The result shows that religious identity salience makes people increase contributions to public goods. Most of the Buddhism decrease contributions to public goods, expect others to contribute less to public goods, and become less risk averse. We find no evidence of religious identity salience effects on disutility of work effort, discount rates or generosity in life spending. Mostly the people like to make merit in the temple during special day of religion. The atmosphere in the temple leads the people like to travel and merit at the temple near their home.

Keywords: Dusit province, identity, lifestyle, religious economic behavior

Procedia PDF Downloads 291
1489 Identification of Three Strategies to Enhance University Students’ Professional Identity, Using Hierarchical Regression Analysis

Authors: Alba Barbara-i-Molinero, Rosalia Cascon-Pereira, Ana Beatriz Hernandez

Abstract:

Students’ transitions from high school to the university have been challenged by the lack of continuity between both contexts. This mismatch directly affects students by generating feelings of anxiety and uncertainty, which increases the dropout rates and reduces students’ academic success. This discontinuity emanates because ‘transitions concern a restructuring of what the person does and who the person perceives him or herself to be’. Hence, identity becomes essential in these transitions. Generally, identity is the answer to questions such as who am I? or who are we? This is integrated by personal identity, and as many social identities as groups, the individual feels he/she is a part. A case in point to construct a social identity is the identification with a profession. For this reason, a way to lighten the generated tension during transitions is applying strategies orientated to enhance students’ professional identity in their point of entry to the higher education institution. That would create a sense of continuity between high school and higher education contexts, increasing their Professional Identity Strength. To develop the strategies oriented to enhance students Professional Identity, it is important to analyze what influences it. There exist several influencing factors that influence Professional Identity (e.g., professional status, the recommendation of family and peers, the academic environment, or the chosen bachelor degree). There is a gap in the literature analyzing the impact of these factors on more than one bachelor degree. In this regards, our study takes an additional step with the aim of evaluating the influence of several factors on Professional Identity using a cohort of university students from multiple degrees between the ages of 17-19 years. To do so, we used hierarchical regression analyses to assess the impact of the following factors: External Motivation Conditionals (EMC), Educational Experience Conditionals (EEC) and Personal Motivational Conditional (PMP). After conducting the analyses, we found that the assessed factors influenced students’ professional identity differently according to their bachelor degree and discipline. For example, PMC and EMC positively affected science students, while architecture, law and economics and engineering students were just influenced by PMC. Basing on that influences, we proposed three different strategies aimed to enhance students’ professional identity, in the short and long term. These strategies are: to enhance students’ professional identity before the incorporation to university through campuses and icebreaker activities; to apply recruitment strategies aimed to provide realistic information of the bachelor degree; and to incorporate different activities, such as in-vitro, in situ and self-directed activities aimed to enhance longitudinally students’ professional identity from the university. From these results, theoretical contributions and practical implications arise. First, we contribute to the literature by identifying which factors influence students from different bachelor degrees since there is still no evidence. And, second, using as a benchmark the obtained results, we contribute from a practical perspective, by proposing several alternative strategies to increase students’ professional identity strength aiming to lighten their transition from high school to higher education.

Keywords: professional identity, higher education, educational strategies , students

Procedia PDF Downloads 116
1488 Moral Identity and Moral Attentiveness as Predictors of Ethical Leadership in Financial Sector

Authors: Pilar Gamarra Gamarra, Michele Girotto

Abstract:

In the expanding field of leaders’ ethical behavior research, little attention has been paid to the association between finance leaders’ ethical traits (beyond personality) and ethical leadership, and more importantly, how these ethical characteristics can be predictors of ethical behavior at the leadership level in the financial sector. In this study, we tested a theoretical model based on uponsocial cognitive theory (Bandura, 1986) and the cognitive-developmental model (Piaget, 1932) to examine leaders’ moral identity and moral attentiveness as antecedents of ethical leadership. After the 2008 economic crisis, the marketplace has awakened to the potential dangers of unethical behavior. The unethical behavior of the leaders of the financial sector was identified as guilty of this economic catastrophe. For that reason, it seems increasingly prudent for organizations to have leaders who are cognitively inclined toward ethical behavior. This evidence suggests that moral attentiveness and moral identity is perhaps one way of identifying those kinds of leaders. For leaders who are morally attentive and have a high moral identity, themes of ethics interventions are consistent with their way of seeing the word. As a result, these leaders could become critical components of change in organizations and could provide the energy and skills necessary for these efforts to be successful. Ethical behavior of leader from the financial sector and marketing sectors must be joined to manage the change. In this study, a leader’s moral identity, leader’s moral attentiveness, and self-importance of Ethical Leadership are measured for financial and marketing leaders to be compared to determine the relationship between the three variables in each sector. Other conclusion related to gender, educational level or generation are obtained.

Keywords: ethical leadership, moral identity, moral attentiveness, financial leaders, marketing leaders, ethical behavior

Procedia PDF Downloads 147
1487 Application of PSK Modulation in ADS-B 1090 Extended Squitter Authentication

Authors: A-Q. Nguyen. A. Amrhar, J. Zambrano, G. Brown, O.A. Yeste-Ojeda, R. Jr. Landry

Abstract:

Since the presence of Next Generation Air Transportation System (NextGen), Automatic Dependent Surveillance-Broadcast (ADS-B) has raised specific concerns related to the privacy and security, due to its vulnerable, low-level of security and limited payload. In this paper, the authors introduce and analyze the combination of Pulse Amplitude Modulation (PAM) and Phase Shift Keying (PSK) Modulation in conventional ADS-B, forming Secure ADS-B (SADS-B) avionics. In order to demonstrate the potential of this combination, Hardware-in-the-loop (HIL) simulation was used. The tests' results show that, on the one hand, SADS-B can offer five times the payload as its predecessor. This additional payload of SADS-B can be used in various applications, therefore enhancing the ability and efficiency of the current ADS-B. On the other hand, by using the extra phase modulated bits as a digital signature to authenticate ADS-B messages, SADS-B can increase the security of ADS-B, thus ensure a more secure aviation as well. More importantly, SADS-B is compatible with the current ADS-B In and Out. Hence, no significant modifications will be needed to implement this idea. As a result, SADS-B can be considered the most promising approach to enhance the capability and security of ADS-B.

Keywords: ADS-B authentication, ADS-B security, NextGen ADS-B, PSK signature, secure ADS-B

Procedia PDF Downloads 291
1486 A Psycho-Education Strategy as a Method for Reconstructing Identity in the Context of Family Violence

Authors: Charlene Petersen, Herman Grobler, Karel Botha

Abstract:

Restorative intervention with adolescents from a family violence context is a much needed resource given the limited access to mental health services in South Africa. In this research article the qualitative component which formed part of a mixed methods design of an overall research study, is discussed. A qualitative case study design was used. This article explores a psycho-education strategy, using a visual creative medium as a method for reconstructing identity in the context of family violence. The aim of this psycho-education strategy was to move away from interventions based on the biomedical model, but focused more on meaning-making about violent traumatic events adolescents have experienced, and to develop more positive, adaptive views about themselves in the present, and experience hope about the future. The research question that was asked was how the meaning, that adolescents from a specific community in South Africa give to family violence, contribute to defining their identity? Twelve participants were purposively selected for the study and included both male and female adolescents with ages ranging from 15 to 18 years from three secondary schools. The strategy was applied over five sessions with the intention to bring about awareness of different selves, identifying and naming the selves, and becoming aware of the configuration of identity that could lead to a redefined identity. The data were thematically and visually analyzed. Through the process of tailoring which forms the basis for reconstruction process, participants could identify the different selves, become aware of how they configure in the field. Through the process of tailoring the different self-parts, the sense of self became more self-cohesive and allowed the individual to become aware of the role of certain. Through identifying and naming the future self and resilient self the participants were able to accomplish some order and meaning in their lives. It provided them with a sense of predictability and an optimistic and hopefulness towards the future. The research findings indicated that this strategy can be used as a method for reconstructing identity in the context of family violence.

Keywords: identity, family violence, self-configuration, reconstructing identity, psycho-education strategy

Procedia PDF Downloads 350
1485 Identity Formation of Mixed-Race Children in Japan

Authors: Shuko Takeshita

Abstract:

This study investigates the identity formation of mixed-race children in Japan. From the latter half of the 1980s to the mid-2000s, Japan experienced an 'intermarriage boom,' which was soon followed by a fairly significant number of children born to these unions. These children are now coming of age. Among mixed-race children, some embraced both cultural traditions, while others chose a monocultural path despite exposure to two cultural traditions as they grew up. What factors are involved in shaping the identity of mixed-race children? How does identity formation actually occur in these children? This study addresses these questions through an interview survey of 139 cross-cultural families since 1999, including 23 Pakistani-Japanese families, 20 Turkish-Japanese families, 26 families comprising other international Muslim husbands and Japanese wives, 33 Filipino-Japanese families, and 37 Brazilian-Japanese families. The results of this two-decade-long study reveal that in cases where one cannot tell at first glance that children are mixed race, there is a tendency for them to hide their mixed background due to fear of bullying at school, as well as for their parents to encourage them to do this. To pass as a Japanese is one strategy for avoiding discrimination and prejudice, and it can provide a measure of ethnic security or a way of coping with social intolerance. Certainly, among my informants, there are some children who were bullied or teased at school, and as a result, they stopped attending or transferred to other schools. But the mixed-race experience is not always a negative thing in Japan. There is clearly a double standard involved in that mixed-race children of a Caucasian parent are more readily accepted by society than those of a non-Caucasian parent. The perceived social status of mixed-race individuals is usually understood in relation to the hierarchical positionings of monoracial groups. Mixed-race children could be guaranteed the right to enjoy the benefit of maintaining and developing an identity as a Japanese, in addition to one more identity. We need to encourage a new awareness of the children as agents for a transition from a monocultural system to a multicultural system in Japanese society.

Keywords: identity formation, intermarriage, mixed race, multicultural children

Procedia PDF Downloads 171
1484 Uniqueness of Fingerprint Biometrics to Human Dynasty: A Review

Authors: Siddharatha Sharma

Abstract:

With the advent of technology and machines, the role of biometrics in society is taking an important place for secured living. Security issues are the major concern in today’s world and continue to grow in intensity and complexity. Biometrics based recognition, which involves precise measurement of the characteristics of living beings, is not a new method. Fingerprints are being used for several years by law enforcement and forensic agencies to identify the culprits and apprehend them. Biometrics is based on four basic principles i.e. (i) uniqueness, (ii) accuracy, (iii) permanency and (iv) peculiarity. In today’s world fingerprints are the most popular and unique biometrics method claiming a social benefit in the government sponsored programs. A remarkable example of the same is UIDAI (Unique Identification Authority of India) in India. In case of fingerprint biometrics the matching accuracy is very high. It has been observed empirically that even the identical twins also do not have similar prints. With the passage of time there has been an immense progress in the techniques of sensing computational speed, operating environment and the storage capabilities and it has become more user convenient. Only a small fraction of the population may be unsuitable for automatic identification because of genetic factors, aging, environmental or occupational reasons for example workers who have cuts and bruises on their hands which keep fingerprints changing. Fingerprints are limited to human beings only because of the presence of volar skin with corrugated ridges which are unique to this species. Fingerprint biometrics has proved to be a high level authentication system for identification of the human beings. Though it has limitations, for example it may be inefficient and ineffective if ridges of finger(s) or palm are moist authentication becomes difficult. This paper would focus on uniqueness of fingerprints to the human beings in comparison to other living beings and review the advancement in emerging technologies and their limitations.

Keywords: fingerprinting, biometrics, human beings, authentication

Procedia PDF Downloads 283
1483 Brand Identity Creation for Thai Halal Brands

Authors: Pibool Waijittragum

Abstract:

The purpose of this paper is to synthesize the research result of brand Identities of Thai Halal brands which related to the way of life for Thai Muslims. The results will be transforming to Thai Halal Brands packaging and label design. The expected benefit is an alternative of marketing strategy for brand building process for Halal products in Thailand. Four elements of marketing strategies which necessary for the brand identity creation is the research framework: consists of Attributes, Benefits, Values and Personality. The research methodology was applied using qualitative and quantitative; 19 marketing experts with dynamic roles in Thai consumer products were interviewed. In addition, a field survey of 122 Thai Muslims selected from 175 Muslim communities in Bangkok was studied. Data analysis will be according to 5 categories of Thai Halal product: 1) Meat 2) Vegetable and Fruits 3) Instant foods and Garnishing ingredient 4) Beverages, Desserts and Snacks 5) Hygienic daily products. The results will explain some suitable approach for brand Identities of Thai Halal brands as are: 1) Benefit approach as the characteristics of the product with its benefit. The brand identity created transform to the packaging design should be clear and display a fresh product 2) Value approach as the value of products that affect to consumers’ perception. The brand identity created transform to the packaging design should be simply look and using a trustful image 3) Personality approach as the reflection of consumers thought. The brand identity created transform to the packaging design should be sincere, enjoyable, merry, flamboyant look and using a humoristic image.

Keywords: marketing strategies, brand identity, packaging and label design, Thai Halal products

Procedia PDF Downloads 406
1482 A Comprehensive Framework to Ensure Data Security in Cloud Computing: Analysis, Solutions, and Approaches

Authors: Loh Fu Quan, Fong Zi Heng, Burra Venkata Durga Kumar

Abstract:

Cloud computing has completely transformed the way many businesses operate. Traditionally, confidential data of a business is stored in computers located within the premise of the business. Therefore, a lot of business capital is put towards maintaining computing resources and hiring IT teams to manage them. The advent of cloud computing changes everything. Instead of purchasing and managing their infrastructure, many businesses have started to shift towards working with the cloud with the help of a cloud service provider (CSP), leading to cost savings. However, it also introduces security risks. This research paper focuses on the security risks that arise during data migration and user authentication in cloud computing. To overcome this problem, this paper provides a comprehensive framework that includes Transport Layer Security (TLS), user authentication, security tokens and multi-level data encryption. This framework aims to prevent authorized access to cloud resources and data leakage, ensuring the confidentiality of sensitive information. This framework can be used by cloud service providers to strengthen the security of their cloud and instil confidence in their users.

Keywords: Cloud computing, Cloud security, Cloud security issues, Cloud security framework

Procedia PDF Downloads 74
1481 Zhou Enlai’s Impact to the Foreign Folicy of China

Authors: Nazira B. Boldurukova

Abstract:

The main aim of this article is to give the information about life and social and diplomatic work of Zhou Enlai, to prove his identity in his impact to the history of the world; to show his place in the organization of internal and foreign policy and in the peaceful international relationships of China with other countries.

Keywords: China, foreign policy of China, identity, politician, diplomacy, Zhou Enlai

Procedia PDF Downloads 527
1480 Urban Art as an Identity Branding of Kampong Ketandan Surabaya

Authors: R. A. Retno Hastijanti, David Agus Sagita, Arum Lintang Cahyani, Tectona Radike, Andreas Suluh Putra

Abstract:

Surabaya, is one of the oldest cities in Indonesia. Most of the old quarter city of Surabaya is an ancient Kampong. Ketandan is one ancient Kampong in the center of Surabaya, surrounded by a thriving trade area. These conditions make Kampong vulnerably degraded of environmental quality and tended to lose their cultural identity. Norms and values eroded by the rapid development of its local surroundings. Through Kampong conservation programs, Surabaya city government established Ketandan as one of the urban heritage. To achieve the ideal condition of urban heritage, public participation is required. One thing that can generate a motivation for Kampong Ketandan community participation is to rediscover the identity of Kampong Ketandan. This research aims to explore the appropriate method to rediscover the identity of Kampong Ketandan. Through qualitative research methods, based on observations and focus group discussions, it was concluded that mural mentoring program was the best method that can be accepted by the Kampong community to rediscover their identity. Mural as one of the urban art form, able to motivate Kampong community to express their self and bring an icon to their Kampong. The benefits of this research are to provide input to the city government and the private sector to preserve urban heritage, moreover, to transform an urban heritage into a productive space in urban areas in order to enhance city revenues.

Keywords: Kampong, Kampong Ketandan, mural, Surabaya, urban, urban heritage, urban art

Procedia PDF Downloads 305
1479 Performance Analysis of Elliptic Curve Cryptography Using Onion Routing to Enhance the Privacy and Anonymity in Grid Computing

Authors: H. Parveen Begam, M. A. Maluk Mohamed

Abstract:

Grid computing is an environment that allows sharing and coordinated use of diverse resources in dynamic, heterogeneous and distributed environment using Virtual Organization (VO). Security is a critical issue due to the open nature of the wireless channels in the grid computing which requires three fundamental services: authentication, authorization, and encryption. The privacy and anonymity are considered as an important factor while communicating over publicly spanned network like web. To ensure a high level of security we explored an extension of onion routing, which has been used with dynamic token exchange along with protection of privacy and anonymity of individual identity. To improve the performance of encrypting the layers, the elliptic curve cryptography is used. Compared to traditional cryptosystems like RSA (Rivest-Shamir-Adelman), ECC (Elliptic Curve Cryptosystem) offers equivalent security with smaller key sizes which result in faster computations, lower power consumption, as well as memory and bandwidth savings. This paper presents the estimation of the performance improvements of onion routing using ECC as well as the comparison graph between performance level of RSA and ECC.

Keywords: grid computing, privacy, anonymity, onion routing, ECC, RSA

Procedia PDF Downloads 372
1478 Mapping Identity: Algerian Diasporic Voices in Literature

Authors: Salma Kaouthar Letaief

Abstract:

This article investigates the experience of diaspora in the writings of Algerian diasporic writers, namely: Leila Sebbar’s Silence on the Shores (2000), Keltoum Staali’ December’s Mimosa (2012). The study discusses the collective trauma of violence in Algeria and overseas. The experience of displacement of the characters to an alien territory compel their journey with issues related to nostalgia, identity crisis, alienation, racism, and in-betweeness. The focus in this research is, thus, on Algerian immigrants’ experience in the host country and their psychological conflicts. The theories Multiculturalism and Psychoanalysis are used to analyse the novels in this paper. While Multiculturalism examines how characters negotiate and navigate their identities in multicultural settings, Psychoanalysis enables the analysis of how characters in diasporic novels grapple with issues of identity, belonging, and self-discovery. Hence, interweaving multiculturalism and psychoanalysis provides an interdisciplinary framework that addresses both the socio-cultural and psychological aspects of the diasporic experience. Accordingly, this paper is an attempt to examine the diasporic experience and cultural dialectics.

Keywords: diaspora, algerian diasporic writers, trauma, algeria, displacement, identity crisis, cultural dialects

Procedia PDF Downloads 280
1477 A Review: Artificial Intelligence (AI) Driven User Access Management and Identity Governance

Authors: Rupan Preet Kaur

Abstract:

This article reviewed the potential of artificial intelligence in the field of identity and access management (IAM) and identity governance and administration (IGA), the most critical pillars of any organization. The power of leveraging AI in the most complex and huge user base environment was outlined by simplifying and streamlining the user access approvals and re-certifications without any impact on the user productivity and at the same time strengthening the overall compliance of IAM landscape. Certain challenges encountered in the current state were detailed where majority of organizations are still lacking maturity in the data integrity aspect. Finally, this paper concluded that within the realm of possibility, users and application owners can reap the benefits of unified approach provided by AI to improve the user experience, improve overall efficiency, and strengthen the risk posture.

Keywords: artificial intelligence, machine learning, user access review, access approval

Procedia PDF Downloads 60
1476 Variation of Lexical Choice and Changing Need of Identity Expression

Authors: Thapasya J., Rajesh Kumar

Abstract:

Language plays complex roles in society. The previous studies on language and society explain their interconnected, complementary and complex interactions and, those studies were primarily focused on the variations in the language. Variation being the fundamental nature of languages, the question of personal and social identity navigated through language variation and established that there is an interconnection between language variation and identity. This paper analyses the sociolinguistic variation in language at the lexical level and how the lexical choice of the speaker(s) affects in shaping their identity. It obtains primary data from the lexicon of the Mappila dialect of Malayalam spoken by the members of Mappila (Muslim) community of Kerala. The variation in the lexical choice is analysed by collecting data from the speech samples of 15 minutes from four different age groups of Mappila dialect speakers. Various contexts were analysed and the frequency of borrowed words in each instance is calculated to reach a conclusion on how the variation is happening in the speech community. The paper shows how the lexical choice of the speakers could be socially motivated and involve in shaping and changing identities. Lexical items or vocabulary clearly signal the group identity and personal identity. Mappila dialect of Malayalam was rich in frequent use of borrowed words from Arabic, Persian and Urdu. There was a deliberate attempt to show their identity as a Mappila community member, which was derived from the socio-political situation during those days. This made a clear variation between the Mappila dialect and other dialects of Malayalam at the surface level, which was motivated to create and establish the identity of a person as the member of Mappila community. Historically, these kinds of linguistic variation were highly motivated because of the socio-political factors and, intertwined with the historical facts about the origin and spread of Islamism in the region; people from the Mappila community highly motivated to project their identity as a Mappila because of the social insecurities they had to face before accepting that religion. Thus the deliberate inclusion of Arabic, Persian and Urdu words in their speech helped in showing their identity. However, the socio-political situations and factors at the origin of Mappila community have been changed over a period of time. The social motivation for indicating their identity as a Mappila no longer exist and thus the frequency of borrowed words from Arabic, Persian and Urdu have been reduced from their speech. Apart from the religious terms, the borrowed words from these languages are very few at present. The analysis is carried out by the changes in the language of the people according to their age and found to have significant variations between generations and literacy plays a major role in this variation process. The need of projecting a specific identity of an individual would vary according to the change in the socio-political scenario and a variation in language can shape the identity in order to go with the varying socio-political situation in any language.

Keywords: borrowings, dialect, identity, lexical choice, literacy, variation

Procedia PDF Downloads 211
1475 A Semiotic Approach to the Construction of Classical Identity in Indian Classical Music Videos

Authors: Jayakrishnan Narayanan, Sengamalam Periyasamy Dhanavel

Abstract:

Indian classical (Karnatik) music videos across various media platforms have followed an audio-visual pattern that conforms to its socio-cultural and quasi-religious identity. The present paper analyzes the semiotic variations between ‘pure Karnatik music videos’ and ‘independent/contemporary-collaborative music videos’ posted on social media by young professional Karnatik musicians. The paper analyzes these media texts by comparing their various structural sememes namely, the title, artists, music, narrative schemata, visuals, lighting, sound, and costumes. The paper argues that the pure Karnatik music videos are marked by the presence of certain recurring mythological or third level signifiers and that these signifiers and codes are marked by their conspicuous absence in the independent music videos produced by the same musicians. While the music and the musical instruments used in both these sets of music videos remain similar, the meaning that is abducted by the beholder in each case is entirely different. The paper also attempts to study the identity conflicts that are projected through these music videos and the extent to which the cultural connotations of Karnatik music govern the production of its music videos.

Keywords: abduction, identity, media semiotics, music video

Procedia PDF Downloads 195
1474 A Desire to be ‘Recognizable and Reformed’: Natives’ Identity in Walcott’s “Dream on Monkey Mountain”

Authors: S. Khurram, N. Mubashar

Abstract:

The paper examines, through the lens of Postcolonial Theory, how natives resist and react in Derrek Walcott’s “Dream on Monkey Mountain”. It aims at how natives, for being ‘recognized and reformed’, mimic and adapt the white’s ways of living. It also focuses how Walcott expresses natives’ reaction when they cannot construct their identity. Moreover, the paper exploits the Homi. K Bhaba’s concept of Mimicry and Berry’s concepts of Hybridity to explain Caribbean native’s plight. Furthermore, it bring forth Walcott’s deep insight into the psychology of the Caribbean natives. He digs deep into the colonial discourse to reconstruct post-colonial identity and he, as a post-colonial writer, does so by deconstructing colonial ideology of racism by resisting against it.

Keywords: postcolonial theory, mimicry, hybridity, reaction

Procedia PDF Downloads 142
1473 Exploiting Identity Grievances: Al-Shabaab Propaganda Targeting Individuals Abroad

Authors: Mustafa Mabruk

Abstract:

Groups such as Al-Shabaab have managed to radicalize many individuals abroad, including the first American citizen to ever be radicalized. Yet the pathways of radicalization for these foreign individuals are understudied. Moreover, current measures to prevent foreign radicalization are ineffective, with privacy, screening and profiling implications that render current counter-radicalization efforts counterproductive. Such measures exhibit strictness, political bias, and harshness. As confirmed by recent studies, such counter-radicalization issues exacerbate existing grievances and channel fresh recruits to Al-Shabaab. Addressing these challenges is paramount, requiring alternative strategies to effectively reduce radicalization without triggering further harm. The development of counter-narratives emerges as a potential measure with minimal risk of exacerbating grievances, yet the development of such counter-narratives necessitates a thorough understanding of the radicalization pathways of foreign individuals that are understudied. This study investigates the success of Al-Shabaab in recruiting individuals abroad by analyzing their propaganda in conjunction with analyzing identity-focused theories of radicalization, including Framing Theory and Social Identity Theory. Qualitative content analysis is used to analyze various propaganda material, including tweets, speeches, and webpages. The analysis reveals that issues of identity are of major significance in the radicalization patterns identified and that grievances of Muslims worldwide are used to exploit identity-related grievances. Based on these findings, the paper argues that such evidence enhances our understanding of potential deradicalization pathways and present counter-narratives based on Islamic scripture.

Keywords: counter-narratives, foreign radicalization, identity grievances, propaganda analysis

Procedia PDF Downloads 9
1472 Leadership Development for Nurses as Educators

Authors: Abeer Alhazmi

Abstract:

Introduction: Clinical education is considered a significant part of the learning process for nurses and nursing students. However, recruiting high- caliber individuals to train them to be tomorrow’s educators/teachers has been a recurrent challenge. One of the troubling challenges in this field is the absent of proper training programmes to train educators to be future education professionals and leaders. Aim: To explore the impact of a stage 1 and stage 2 clinical instructor courses on developing leadership skills for nurses as educators.Theoretical Framework: Informed by a symbolic interactionist framework, this research explored the Impact of stage 1 and stage 2 clinical instructor courses on nurses' knowledge, attitudes, and leadership skills. Method: Using Glaserian grounded theory method the data were derived from 3 focus groups and 15 in-depth interviews with nurse educators/clinical instructors and nurses who attended stage 1 and stage 2 clinical instructor courses at King Abdu-Aziz University Hospital (KAUH). Findings: The findings of the research are represented in the core category exploring new identity as educator and its two constituent categories Accepting change, and constructing educator identity. The core and sub- categories were generated through a theoretical exploration of the development of educator’s identity throughout stage 1 and stage 2 clinical instructor courses. Conclusion: The social identity of the nurse educators was developed and changed during and after attending stage 1 and stage 2 clinical instructor courses. In light of an increased understanding of the development process of educators identity and role, the research presents implications and recommendations that may contribute to the development of nursing educators in general and in Saudi Arabia in specific.

Keywords: clinical instructor course, educators, identity work, clinical nursing

Procedia PDF Downloads 386
1471 Data Security: An Enhancement of E-mail Security Algorithm to Secure Data Across State Owned Agencies

Authors: Lindelwa Mngomezulu, Tonderai Muchenje

Abstract:

Over the decades, E-mails provide easy, fast and timely communication enabling businesses and state owned agencies to communicate with their stakeholders and with their own employees in real-time. Moreover, since the launch of Microsoft office 365 and many other clouds based E-mail services, many businesses have been migrating from the on premises E-mail services to the cloud and more precisely since the beginning of the Covid-19 pandemic, there has been a significant increase of E-mails utilization, which then leads to the increase of cyber-attacks. In that regard, E-mail security has become very important in the E-mail transportation to ensure that the E-mail gets to the recipient without the data integrity being compromised. The classification of the features to enhance E-mail security for further from the enhanced cyber-attacks as we are aware that since the technology is advancing so at the cyber-attacks. Therefore, in order to maximize the data integrity we need to also maximize security of the E-mails such as enhanced E-mail authentication. The successful enhancement of E-mail security in the future may lessen the frequency of information thefts via E-mails, resulting in the data of South African State-owned agencies not being compromised.

Keywords: e-mail security, cyber-attacks, data integrity, authentication

Procedia PDF Downloads 104
1470 Deconstruction of Gender Stereotypes through Fashion

Authors: Nihan Akdemir

Abstract:

This research aims to investigate the role of fashion in the context of the deconstruction of gender stereotypes. Expectation of society and culture related to the biological structure of the individual corresponds to the gender. At this point there are some unseen rules which are given to person even from his/her childhoods according to the sex and gender, are called stereotypes. With basic example, girls should wear pink, and the boys should wear blue. Or boys do not wear skirt and the woman must behave like a woman. There are also many many stereotypes like them. But the clothing style the individual uses to express his or her gender identity may not match the expectations of the community and society. In the context of big role of the clothing, these stereotypes could be deconstructed because clothes are the visible expression of gender identity of the person. And fashion is a big part of this structure because fashion is a pioneer of what people wear in other words fashion tells to people what should they wear this season. Nowadays fashion has also meant about expressing identity independent of whether you were born male or female. Many fashion brands prepare their collections in the concept of ‘gender fluid’ by deconstructions. It means that fashion is opening the roads for being more free about the gender identity. The representations of gender fluidity through fashion help bring a sense of normality to people who are trying to find the self-confidence to express who they want to be. Maybe the voice of the streets carries this point to the catwalks firstly, and then it becomes a trend. All these items have been explained with visual images and supported by the literature investigations. And the results are showed that the numbers of collections about it are increasing and fashion sector takes this issue into consideration. And this new approach reached to the streets.

Keywords: fashion, gender identity, gender stereotypes, trend

Procedia PDF Downloads 438
1469 Africatown Ancestors’ Discourse Analysis: Unveiling Narratives of Identity Heritage

Authors: Maxime Vignon

Abstract:

This study delves into the discourse surrounding Africatown ancestors’ will, through a rigorous discourse analysis, to reveal the intricate narratives shaping heritage and identity within this unique community. Situated near Mobile, Alabama, Africatown traces its origins to the Clotilda, the last known slave ship to bring captives from Africa to the United States. Through a meticulous examination of Africatown ancestors posthumous will, this analysis aims to uncover the spiritual linguistic nuances which will contribute to the preservation of Africatown's ancestral heritage and the construction of individual self and collective empowerment. This research will be grounded in Michel Foucault discourse. In its attempt to analyze the four core elements of discourse, this study explores the role of rituals and spiritual discourses within the will of Africatown ancestors. Additionally, it delves into the descendants’ public appearance scrutinizing the use of ancestral names and identities. Ultimately, this discourse analysis contributes to a nuanced understanding of how language and narrative from the ancestors would shape unity, a valuable insight into the complexities of identity formation and the enduring impact of the transatlantic slave trade on this resilient community.

Keywords: applied linguistics, culture, discourse analysis, identity, spirituality, transatlantic slave trade

Procedia PDF Downloads 26
1468 A Critical Discourse Study of Gender Identity Issues in Daniyal Mueenuddin’s Short Story “Saleema”

Authors: Zafar Ali

Abstract:

The aim of this research is to highlight problems that are faced by women at the hands of men. Males in Pakistani society have power and use this power for the exploitation of women. Further, the purpose of the study is to make societies like Pakistan and especially the young generation, aware and enable them to resist such issues, and the role of discourse in this regard is to minimize its political and social repercussions. The study finds out different discursive techniques and manipulative language used in the short story to construct gender identity. The study also investigates socio-economic roles in the construction of gender identity. This study has been completed with the help of Critical Discourse Analysis (CDA) principles. CDA principles have been applied to the text of the selected short story Saleema from Daniyal Mueenuddin’s collection In Other Rooms, Other Wonders. Related passages, structures, expressions, and text are analyzed from the point of view of CDA, especially Norman Fairclough’s CDA approach. It was found from the analysis that women have no identity of their own in patriarchal societies like Pakistan. Further, it was found women are mistreated, and they have a very limited and defined role in Pakistan. They cannot go beyond the limit defined to them by men.

Keywords: gender issues, resourceful groups, CDA, exploitation

Procedia PDF Downloads 100
1467 The Influence of Interest, Beliefs, and Identity with Mathematics on Achievement

Authors: Asma Alzahrani, Elizabeth Stojanovski

Abstract:

This study investigated factors that influence mathematics achievement based on a sample of ninth-grade students (N  =  21,444) from the High School Longitudinal Study of 2009 (HSLS09). Key aspects studied included efficacy in mathematics, interest and enjoyment of mathematics, identity with mathematics and future utility beliefs and how these influence mathematics achievement. The predictability of mathematics achievement based on these factors was assessed using correlation coefficients and multiple linear regression. Spearman rank correlations and multiple regression analyses indicated positive and statistically significant relationships between the explanatory variables: mathematics efficacy, identity with mathematics, interest in and future utility beliefs with the response variable, achievement in mathematics.

Keywords: Mathematics achievement, math efficacy, mathematics interest, factors influence

Procedia PDF Downloads 122