Search results for: identity based cryptography
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 28429

Search results for: identity based cryptography

28309 Software Quality Assurance in Network Security using Cryptographic Techniques

Authors: Sidra Shabbir, Ayesha Manzoor, Mehreen Sirshar

Abstract:

The use of the network communication has imposed serious threats to the security of assets over the network. Network security is getting more prone to active and passive attacks which may result in serious consequences to data integrity, confidentiality and availability. Various cryptographic techniques have been proposed in the past few years to combat with the concerned problem by ensuring quality but in order to have a fully secured network; a framework of new cryptosystem was needed. This paper discusses certain cryptographic techniques which have shown far better improvement in the network security with enhanced quality assurance. The scope of this research paper is to cover the security pitfalls in the current systems and their possible solutions based on the new cryptosystems. The development of new cryptosystem framework has paved a new way to the widespread network communications with enhanced quality in network security.

Keywords: cryptography, network security, encryption, decryption, integrity, confidentiality, security algorithms, elliptic curve cryptography

Procedia PDF Downloads 702
28308 Analyzing the Factors That Influence Students' Professional Identity Using Hierarchical Regression Analysis to Ease Higher Education Transition

Authors: Alba Barbara-i-Molinero, Rosalia Cascon Pereira, Ana Beatriz Hernandez Lara

Abstract:

Our general motivation in undertaking this study is to propose alternative measures to lighten students experienced tensions during the transitions from high school to higher education based on the concept of professional identity strength. In order to do so, we measured the influence that three different factors external motivational conditionals, educational experience conditionals and personal motivation conditionals exerted over students’ professional identity strength and proposed the measures considering the obtained results. By using hierarchical regression analysis we addressed this issue, across disciplines and bachelor degrees, allowing us to gain also deeper insight into first-year university students PID. Our findings suggest that students’ from the different disciplines are influenced by personal motivational conditionals; while students from sciences are also influenced by external motivational conditionals. Based on the obtained results we propose three different alternative educational and recruitment strategies which aim to increase students’ professional identity strength and reduce the tensions generated during high school-university transitions. From this study theoretical contributions regarding the differences in the influence of these factors on students from different bachelor degrees arise; and practical implications for universities, derived from the proposed strategies.

Keywords: professional identity, transitions, higher education, strategies

Procedia PDF Downloads 148
28307 Cultural Identity in Environmental Protection Areas of Nova Friburgo: Heritage, Tourism, and Traditions

Authors: Camila Dazzi, Crisitiane Passos de Mattos, Thiago Leite

Abstract:

The paper discusses the cultural identity of the communities located in Environmental Protection Area (APAs), in the mountainous region of Rio de Janeiro, constituted almost entirely by descendants of Swiss immigrants who arrived in Brazil in the nineteenth century. The communication is the result of an extension project named "Cultural Identity in Environmental Protection Areas of Nova Friburgo." The objectives of this project were framed in the identification of local history, cultural demonstrations, crafts, religious events, festivals, the "know-how" and traditions. While an extension project, developed by students and teachers of a Bachelor of Tourism Management program, the work provided a more practical action: awareness the communities that inhabit the APAs on the possible implementation of the cultural community-based tourism, a sustainable alternative for economic development, involving local people as propagators of local culture, and tourism as a way of valuing and safeguarding of Intangible Heritage.

Keywords: tourism and cultural heritage, tourism and cultural impacts, tourism and cultural change, cultural identity

Procedia PDF Downloads 506
28306 Integrating the Modbus SCADA Communication Protocol with Elliptic Curve Cryptography

Authors: Despoina Chochtoula, Aristidis Ilias, Yannis Stamatiou

Abstract:

Modbus is a protocol that enables the communication among devices which are connected to the same network. This protocol is, often, deployed in connecting sensor and monitoring units to central supervisory servers in Supervisory Control and Data Acquisition, or SCADA, systems. These systems monitor critical infrastructures, such as factories, power generation stations, nuclear power reactors etc. in order to detect malfunctions and ignite alerts and corrective actions. However, due to their criticality, SCADA systems are vulnerable to attacks that range from simple eavesdropping on operation parameters, exchanged messages, and valuable infrastructure information to malicious modification of vital infrastructure data towards infliction of damage. Thus, the SCADA research community has been active over strengthening SCADA systems with suitable data protection mechanisms based, to a large extend, on cryptographic methods for data encryption, device authentication, and message integrity protection. However, due to the limited computation power of many SCADA sensor and embedded devices, the usual public key cryptographic methods are not appropriate due to their high computational requirements. As an alternative, Elliptic Curve Cryptography has been proposed, which requires smaller key sizes and, thus, less demanding cryptographic operations. Until now, however, no such implementation has been proposed in the SCADA literature, to the best of our knowledge. In order to fill this gap, our methodology was focused on integrating Modbus, a frequently used SCADA communication protocol, with Elliptic Curve based cryptography and develop a server/client application to demonstrate the proof of concept. For the implementation we deployed two C language libraries, which were suitably modify in order to be successfully integrated: libmodbus (https://github.com/stephane/libmodbus) and ecc-lib https://www.ceid.upatras.gr/webpages/faculty/zaro/software/ecc-lib/). The first library provides a C implementation of the Modbus/TCP protocol while the second one offers the functionality to develop cryptographic protocols based on Elliptic Curve Cryptography. These two libraries were combined, after suitable modifications and enhancements, in order to give a modified version of the Modbus/TCP protocol focusing on the security of the data exchanged among the devices and the supervisory servers. The mechanisms we implemented include key generation, key exchange/sharing, message authentication, data integrity check, and encryption/decryption of data. The key generation and key exchange protocols were implemented with the use of Elliptic Curve Cryptography primitives. The keys established by each device are saved in their local memory and are retained during the whole communication session and are used in encrypting and decrypting exchanged messages as well as certifying entities and the integrity of the messages. Finally, the modified library was compiled for the Android environment in order to run the server application as an Android app. The client program runs on a regular computer. The communication between these two entities is an example of the successful establishment of an Elliptic Curve Cryptography based, secure Modbus wireless communication session between a portable device acting as a supervisor station and a monitoring computer. Our first performance measurements are, also, very promising and demonstrate the feasibility of embedding Elliptic Curve Cryptography into SCADA systems, filling in a gap in the relevant scientific literature.

Keywords: elliptic curve cryptography, ICT security, modbus protocol, SCADA, TCP/IP protocol

Procedia PDF Downloads 227
28305 From Tionghoa to Tjina: Historical Tracing on the Identity Politics in Demonization of Ethnic Chinese in Indonesia

Authors: Michael J. Kristiono

Abstract:

This paper attempts to investigate the reasons behind the negative sentiments directed towards Chinese Indonesians from International Relations (IR) perspective. By tracing back the treatment of the New Order government towards ethnic Chinese, it was found that such demonization initially happened due to two politically motivated reasons. Firstly, as part of de-Soekarnoization done by the New Order, the Chinese were outcast because Chinese identity does not conform to the 'Indonesian identity', which was in essence, the Javanese identity. Secondly, the condition reflected the change in Indonesian foreign policy which drifted apart from People’s Republic of China (PRC) as the latter was suspected to be involved in September 30 Movement. Then, this paper argues that due to those reasons, coupled by blatant maltreatment from the New Order Government, Chinese Indonesians were constructed as the Others, that is, as non-Indonesians. Such construct has been deeply embedded such that reconciliation attempts done by the Reformation Era government were not sufficient enough to stop ethnic discrimination towards Chinese Indonesians from happening even until the present.

Keywords: Chinese Indonesians, ethnic discrimination, identity, New Order

Procedia PDF Downloads 306
28304 Examining the Influences of Exchange Programmes on Youths' National Identity: A Hong Kong Case Study

Authors: Annie Y. N. Cheng

Abstract:

Since the handover of Hong Kong to China, 'National Identity' has become a vital focus promoted by the HKSAR government. According to the poll by the University of Hong Kong’s Public Opinion Programme (2010 – 2015), young people aged between 18 and 29 have the least and decreasing recognition, an average 5.5%, of their Chinese identity. Past research has shown that student participation in exchange programmes and study tours provides the possibility of new formulations of national identity. Since the Policy Address 2008, the HKSAR government has been actively expanding and exploring the feasibility of Mainland exchange programmes to enhance our youths’ understanding of Chineseness and to strengthen their national identity. Schools have been sponsored or subsidized with the costs of Mainland exchange activities through various grants and channels. Considering the significantly increasing number of Hong Kong youths who have participated in these Mainland exchange programmes and study tours, however, the effectiveness of these activities is understudied. At present, there is the lack of systematic research on the impacts of these activities and the ways in which they influence our students’ perceptions of national identity. Using case study approach, this study aims to examine students’ perceptions of their national identity; and evaluate whether the Mainland exchange programmes or study tours have influences on students’ perceptions of national identity. Results show that the influences on national identity varied which were dependent on the objectives and destinations of the programmes. The findings of this study can provide significant feedback for schools to organize meaningful Mainland exchange activities or study tours and inform policy makers how to formulate effective strategies for promoting such exchange activities.

Keywords: Hong Kong youth, mainland exchange programme, national identity, study tours

Procedia PDF Downloads 363
28303 Wasif Jawharriyeh and the Identity-Forming Spaces of Late Ottoman Jerusalem

Authors: Feyza Daloglu

Abstract:

This paper scrutinizes the Ottoman years of Wasif Jawharriyeh’s memoir, The Storyteller of Jerusalem, within the framework of citadinite, employed by the Open Jerusalem Project. Open Jerusalem Project uses the term citadinite to describe “the dynamic identity relationship city dwellers have with each other and their urban environment.” While Jerusalem and Jerusalemite identity have usually been analyzed within religious, national, or colonial frameworks, citadinite offers a fresh perspective by turning its lens to the urban identity of its citizens in the 19th and 20th centuries to overcome the shortcomings of usual frameworks. Wasif Jawharriyeh is a proud Jerusalemite and a Greek Orthodox Arab, who spent his childhood and teenage years under the Ottoman Empire. His memoir reveals a great deal of urbanity and a strong sense of Jerusalemite identity which appears to be favored over other forms of identities - Arab, Christian - in the late empire years. Through citadinite, this paper aims to discuss aspects of Jerusalemite identity and key points of urban life in the late Ottoman holy city with the guidance of a very lively and social Ottoman citizen and at that time a young musician, Wasif Jawharriyeh.

Keywords: arab memoir, cityscape, jerusalem identity, ottoman city, urban life

Procedia PDF Downloads 90
28302 A Location-based Authentication and Key Management Scheme for Border Surveillance Wireless Sensor Networks

Authors: Walid Abdallah, Noureddine Boudriga

Abstract:

Wireless sensor networks have shown their effectiveness in the deployment of many critical applications especially in the military domain. Border surveillance is one of these applications where a set of wireless sensors are deployed along a country border line to detect illegal intrusion attempts to the national territory and report this to a control center to undergo the necessary measures. Regarding its nature, this wireless sensor network can be the target of many security attacks trying to compromise its normal operation. Particularly, in this application the deployment and location of sensor nodes are of great importance for detecting and tracking intruders. This paper proposes a location-based authentication and key distribution mechanism to secure wireless sensor networks intended for border surveillance where the key establishment is performed using elliptic curve cryptography and identity-based public key scheme. In this scheme, the public key of each sensor node will be authenticated by keys that depend on its position in the monitored area. Before establishing a pairwise key between two nodes, each one of them must verify the neighborhood location of the other node using a message authentication code (MAC) calculated on the corresponding public key and keys derived from encrypted beacon messages broadcast by anchor nodes. We show that our proposed public key authentication and key distribution scheme is more resilient to node capture and node replication attacks than currently available schemes. Also, the achievement of the key distribution between nodes in our scheme generates less communication overhead and hence increases network performances.

Keywords: wireless sensor networks, border surveillance, security, key distribution, location-based

Procedia PDF Downloads 634
28301 Towards an Eastern Philosophy of Religion: on the Contradictory Identity of Philosophy and Religion

Authors: Carlo Cogliati

Abstract:

The study of the relationship of philosophical reason with the religious domain has been very much a concern for many of the Western philosophical and theological traditions. In this essay, I will suggest a proposal for an Eastern philosophy of religion based on Nishida’s contradictory identity of the two: philosophy soku hi (is, and yes is not) religion. This will pose a challenge to the traditional Western contents and methods of the discipline. This paper aims to serve three purposes. First, I will critically assess Charlesworth’s typology of the relation between philosophy and religion in the West: philosophy as/for/against/about/after religion. I will also engage Harrison’s call for a global philosophy of religion(s) and argue that, although it expands the scope and the range of the questions to address, it is still Western in its method. Second, I will present Nishida’s logic of absolutely contradictory self-identity as the instrument to transcend the dichotomous pair of identity and contradiction: ‘A is A’ and ‘A is not A’. I will then explain how this ‘concrete’ logic of the East, as opposed to the ‘formal’ logic of the West, exhibits at best the bilateral dynamic relation between philosophy and religion. Even as Nishida argues for the non-separability of the two, he is also aware and committed to their mutual non-reducibility. Finally, I will outline the resulting new relation between God and creatures. Nishida in his philosophy soku hi religion replaces the traditional Western dualistic concept of God with the Eastern non-dualistic understanding of God as “neither transcendent nor immanent, and at the same time both transcendent and immanent.” God is therefore a self-identity of contradiction, nowhere and yet everywhere present in the world of creatures. God as absolute being is also absolute nothingness: the world of creatures is the expression of God’s absolute self-negation. The overreaching goal of this essay is to offer an alternative to traditional Western approaches to philosophy of religion based on Nishida’s logic of absolutely contradictory self-identity, as an example of philosophical and religious counter(influence). The resulting relationship between philosophy and religion calls for a revision of traditional concepts and methods. The outcome is not to reformulate the Eastern predilection to not sharply distinguish philosophical thought from religious enlightenment rather to bring together philosophy and religion in the place of identity and difference.

Keywords: basho, Nishida Kitaro, shukyotetsugaku, soku hi, zettai mujunteki jikodoitsu no ronri

Procedia PDF Downloads 162
28300 The Greek Diaspora in Australia: Identity and Transnational Identity

Authors: Panayiota Romios

Abstract:

As the use of 'diaspora' has proliferated in the last decade, its meaning has been stretched in various directions. Current diaspora frames of identity representation do not adequately capture the complexities of everyday lived experiences of transnational individuals and groups. This paper presents the findings of a qualitative research project conducted in Melbourne, Australia with second generation Greek Australians. It analyses the forms of intercultural identities of the second generation Greek Australians returning to Australia post-2008, after living in Greece for an extended period of time. The discussion highlights key characteristics in relation to diaspora-homeland ties, seeking to denaturalise the commonplace assumptions and imaginations about the cultures and identities of Greek Australian diaspora communities and probe the relevance of identity markers such a country of origin, nationality, ethnicity, ethnic origin, language and mother tongue. The definition of diaspora experienced in this transnational lexicon is interestingly quite distinct from original articulations and also from others returning ‘home’.

Keywords: diaspora, identity, migration, displacement

Procedia PDF Downloads 325
28299 Walkability and Urban Social Identity

Authors: Reihaneh Rafiemanzelat

Abstract:

One of the most recent fields of investigation in urban issues focuses on the walkability in urban spaces. The paper aims to establish the theoretical relationship between the people's link with definite urban public spaces and the social identity processes derived from the relation with these places. The theoretical aspects which are examined for this purpose are: the concept of walkability and its developments and the social identity theories derived from walkable spaces. In fact, the paper presents the main results obtained from an empirical investigation which concern to the genesis of urban social identity in particular street as one of the main elements of public spaces in cities. İsmet İnönü Blvd which known as Salamis Street in Famagusta, North Cyprus is one of the main street in city whit high level of physical and social activities all the time. The urban social identity of users was analyzed, focusing on three main factors: walkability of space, social identification, and image of the space. These three factors were analyzed in relation to a series of items in the initial questionnaire, evaluation of existing natural resources, and environmental attitudes.

Keywords: walkability, urban public space, pedestrian, social activity, social identity

Procedia PDF Downloads 403
28298 A Comparative Study on the Identity Formation among Pre-Teens Exposed to the Different Types of Parental Regulation on Social Media Use

Authors: Jehnyne Lalaine Bautista, Marquise Baldemor, Ciara Mendoza

Abstract:

This study is an attempt to investigate the extent to which pre-teens engage in social media, the effects of social media use on the different facets of their identity development such as physical, social, cognitive, aspirations, and personality, as well as the effects of parental regulation on their identity formation. Twelve Filipino children, ages from 9-12 years old and are either regulated, semi-regulated, or unregulated on social media use, participated in this study along with their parent or guardian. The data were gathered through in-depth interviews with the participants and were analyzed through the use of thematic analysis. Results show that despite accessing similar social media applications, the effects of these on children from different types of parental regulation vary since they have different levels of exposure to social media content. Those who have parents with high parental regulation on the use of social media tend to perform better in school, to find time for extracurricular activities, and to develop positive identity formation. The results of this study suggest that parental regulation on social media use has the positive influence on the identity development of children while there are dangers to unregulated use of social media.

Keywords: identity formation, parental regulation, pre-teens, social media

Procedia PDF Downloads 360
28297 Captives on the Frontier: An Exploration of National Identity in Argentine Literature and Art

Authors: Carlos Riobo

Abstract:

This paper analyzes literature and art in Argentina from the nineteenth to the twenty-first centuries as these media used the figure of the white female captive to define a developing national identity. This identity excluded the Indians whose lands the whites were taking and who appeared as the aggressors and captors in writing and paintings. The paper identifies the complicit relationship between art and history in crafting national memory. It also identifies a movement toward purity (as defined by separation of entities) and away from mestizaje (racial and cultural mixtures).

Keywords: Argentina, borders, captives, literature, painting

Procedia PDF Downloads 127
28296 Enhancing Visual Corporate Identity on Festive Money Packets Design with Cultural Symbolisms

Authors: Noranis Ismail, Shamsul H. A. Rahman

Abstract:

The objective of this research is to accentuate the importance of Visual Corporate Identity by utilizing Malay motifs amalgamated with Malay proverbs to enhance the corporate brand of The Design School (TDS) of Taylor’s University. The researchers aim to manipulate festive money packet as a mean to communicate to the audience by using non-verbal visual cues such as colour, languages, and symbols that reflect styles and cultural heritage. The paper concluded that it is possible to utilize Hari Raya packet as a medium for creative expressions by creating high-impact design through the symbolism of selected Malay proverbs and traditional Malay motifs to enhance TDS corporate visual identity. It also provides a vital contribution to other organizations to understand an integral part of corporate visual identity in heightening corporate brand by communicating indirectly to its stakeholders using visual mnemonic and cultural heritage.

Keywords: corporate branding, cultural cues, Malay culture, visual identity

Procedia PDF Downloads 397
28295 Place, Space and Asian/Hawaiian Identities in Gary Pak's My Friend Kammy and Ishmael Reed or Me

Authors: Jaroslav Kušnír

Abstract:

Hawaiian literature in English has been researched more intensively in the past decades, mostly in the context of Asian American literature. In his collection of stories Language of the Gecko's and Other Stories, Hawaiian author Gary Pak explores complex relationships between Asian, Native Hawaiian, and American characters living mostly in Hawaii. Through a depiction of these complex relationships, Pak also explores the interaction between different cultures in Hawaii as well as the formation of Asian/Hawaiian identity in the modern world. Based on a comparative approach and close analysis method, this paper will explore the role of place and its historical and cultural background in the formation of modern Asian/Hawaiian cultural identity as manifested in Pak's stories My Friend Kammy and Ishmael Reed or Me. At the same time, through the use of Bill Ashcroft´s concept of transnation, the author of this paper will analyze Pak's depiction of the formation of the cultural identity of characters from Gary Pak's stories My Friend Kammy and Ishmael Reed or Me, which are, in the author of this paper´s view, the characters close to the concept of Ashcroft's transnation which makes them different from traditional cosmopolitan or diasporic characters.

Keywords: culture, cultural identity, Hawaiian identity, Hawaiian literature, place, transnation

Procedia PDF Downloads 40
28294 The Way Digitized Lectures and Film Presence Coaching Impact Academic Identity: An Expert Facilitated Participatory Action Research Case Study

Authors: Amanda Burrell, Tonia Gary, David Wright, Kumara Ward

Abstract:

This paper explores the concept of academic identity as it relates to the lecture, in particular, the digitized lecture delivered to a camera, in the absence of a student audience. Many academics have the performance aspect of the role thrust upon them with little or no training. For the purpose of this study, we look at the performance of the academic identity and examine tailored film presence coaching for its contributions toward academic identity, specifically in relation to feelings of self-confidence and diminishment of discomfort or stage fright. The case is articulated through the lens of scholar-practitioners, using expert facilitated participatory action research. It demonstrates in our sample of experienced academics, all reported some feelings of uncertainty about presenting lectures to camera prior to coaching. We share how power poses and reframing fear, produced improvements in the ease and competency of all participants. We share exactly how this insight could be adapted for self-coaching by any academic when called to present to a camera and consider the relationship between this and academic identity.

Keywords: academic identity, digitized lecture, embodied learning, performance coaching

Procedia PDF Downloads 312
28293 Database Playlists: Croatia's Popular Music in the Mirror of Collective Memory

Authors: Diana Grguric, Robert Svetlacic, Vladimir Simovic

Abstract:

Scientific research analytically explores database playlists by studying the memory culture through Croatian popular radio music. The research is based on the scientific analysis of databases developed on the basis of the playlist of ten Croatian radio stations. The most recent Croatian song on Statehood Day 2008-2013 is analyzed in order to gain insight into their (memory) potential in terms of storing, interpreting and presenting a national identity. The research starts with the general assumption that popular music is an efficient identifier, transmitter, and promoter of national identity. The aim of the scientific research of the database was to analytically reveal specific titles of Croatian popular songs that participate in marking memories and analyzing their symbolic capital to gain insight into the popular music experience of the past and to develop a new method of scientifically based analysis of specific databases.

Keywords: specific databases, popular radio music, collective memory, national identity

Procedia PDF Downloads 328
28292 The Influence of Superordinate Identity and Group Size on Group Decision Making through Discussion

Authors: Lin Peng, Jin Zhang, Yuanyuan Miao, Quanquan Zheng

Abstract:

Group discussion and group decision-making have long been a topic of research interest. Traditional research on group decision making typically focuses on the strategies or functional models of combining members’ preferences to reach an optimal consensus. In this research, we want to explore natural process group decision making through discussion and examine relevant, influential factors--common superordinate identity shared by group and size of the groups. We manipulated the social identity of the groups into either a shared superordinate identity or different subgroup identities. We also manipulated the size to make it either a big (6-8 person) group or small group (3-person group). Using experimental methods, we found members of a superordinate identity group tend to modify more of their own opinions through the discussion, compared to those only identifying with their subgroups. Besides, members of superordinate identity groups also formed stronger identification with group decision--the results of group discussion than their subgroup peers. We also found higher member modification in bigger groups compared to smaller groups. Evaluations of decisions before and after discussion as well as group decisions are strongly linked to group identity, as members of superordinate group feel more confident and satisfied with both the results and decision-making process. Members’ opinions are more similar and homogeneous in smaller groups compared to bigger groups. This research have many implications for further research and applied behaviors in organizations.

Keywords: group decision making, group size, identification, modification, superordinate identity

Procedia PDF Downloads 282
28291 Social Identification among Employees: A System Dynamic Approach

Authors: Muhammad Abdullah, Salman Iqbal, Mamoona Rasheed

Abstract:

Social identity among people is an important source of pride and self-esteem, consequently, people struggle to preserve a positive perception of their groups and collectives. The purpose of this paper is to explain the process of social identification and to highlight the underlying causal factors of social identity among employees. There is a little research about how the social identity of employees is shaped in Pakistan’s organizational culture. This study is based on social identity theory. This study uses Systems’ approach as a research methodology. The feedback loop approach is applied to explain the underlying key elements of employee behavior that collectively form social identity among social groups in corporate arena. The findings of this study reveal that effective, evaluative and cognitive components of an individual’s personality are associated with the social identification. The system dynamic feedback loop approach has revealed the underlying structure that is associated with social identity, social group formation, and effective component proved to be the most associated factor. This may also enable to understand how social groups become stable and individuals act according to the group requirements. The value of this paper lies in the understanding gained about the underlying key factors that play a crucial role in social group formation in organizations. It may help to understand the rationale behind how employees socially categorize themselves within organizations. It may also help to design effective and more cohesive teams for better operations and long-term results. This may help to share knowledge among employees as well. The underlying structure behind the social identification is highlighted with the help of system modeling.

Keywords: affective commitment, cognitive commitment, evaluated commitment, system thinking

Procedia PDF Downloads 110
28290 Torn Between the Lines of Border: The Pakhtuns of Pakistan and Afghanistan in Search of Identity

Authors: Priyanka Dutta Chowdhury

Abstract:

A globalized connected world, calling loud for a composite culture, was still not able to erase the pain of a desired nationalism based on cultural identity. In the South Asian region, the random drawing of the boundaries without taking the ethnic aspect into consideration have always challenged the very basis of the existence of certain groups. The urge to reunify with the fellow brothers on both sides of the border have always called for a chaos and schism in the countries of this region. Sometimes this became a tool to bargain with the state and find a favorable position in the power structure on the basis of cultural identity. In Pakistan and Afghanistan, the Pakhtuns who are divided across the border of the two countries, from the inception of creation of Pakistan have posed various challenges and hampered the growth of a consolidated nation. The Pakhtuns or Pashtuns of both Pakistan and Afghanistan have a strong cultural affinity which blurs their physical distancing and calls for a nationalism based on this ethnic affiliation. Both the sides wanted to create Pakhtunistan unifying all the Pakhtuns of the region. For long, this group have denied to accept the Durand line separating the two. This was an area of concern especially for the Pakhtuns of Pakistan torn between the decision either to join Afghanistan, create a nation of their own or be a part of Pakistan. This ethnic issue became a bone of contention between the two countries. Later, though well absorbed and recognized in the respective countries, they have fought for their identity and claimed for a dominant position in the politics of the nations. Because of the porous borders often influx of refugees was seen especially during Afghan Wars and later many extremists’ groups were born from them especially the Taliban. In the recent string of events, when the Taliban, who are mostly Pakhtuns ethnically, came in power in Afghanistan, a wave of sympathy arose in Pakistan. This gave a strengthening position to the religious Pakhtuns across the border. It is to be noted here that a fragmented Pakhtun identity between the religious and seculars were clearly visible, voicing for their place in the political hierarchy of the country with a vision distinct from each other especially in Pakistan. In this context the paper tries to evaluate the reasons for this cultural turmoil between the countries and this ethnic group. It also aims to analyze the concept of how the identity politics still holds its relevance in the contemporary world. Additionally, the recent trend of fragmented identity points towards instrumentalization of this ethnic groups, who are engaged in the bargaining process with the state for a robust position in the power structure. In the end, the paper aims to deduct from the theoretical conditions of identity politics, whether this is a primordial or a situational tool to have a visibility in the power structure of the contemporary world.

Keywords: cultural identity, identity politics, instrumentalization of identity pakhtuns, power structure

Procedia PDF Downloads 65
28289 A Queer Approach to the National Irish Identity during 'The Troubles' in Belfast in Paul Mcveigh's 'The Good Son'

Authors: Eduardo Garcia Agustin

Abstract:

This paper focuses on how Mickey – the 10-year-old main character and narrator in Paul McVeigh’s novel The Good Son (2015) – becomes aware of his own queerness and its implications in a conflicting place and time such as Belfast during ‘The Troubles’ in the 1980s. Queer theory allows a comparative reading of identity issues such as national and gender discourses. As opposed to some other excluding social constructs that classify identities in an Us-Others binomial, queer has become a sort of umbrella term where there is room for more identities other than LGTBQ. Therefore, it offers some relevant tools to read this highly awarded novel by focusing on the intersectional construction of Mickey’s identity in progress within the social and familiar realms. The aim of this paper is to offer a queer reading of the The Good Son, which was awarded with the Polari First Book Prize in 2016, by showing the key role of Mickey’s conflictive realization of his own queerness in the polarized society of Northern Ireland in the 1980s, where there is no shade of grey. Within such a polarized context, Mickey’s perception of his own internal and external identity conflicts he is exposed to will show how necessary a certain touch of pink is as a potential escape to those conflicts.

Keywords: conflict, national identity, Northern Ireland, queer identity

Procedia PDF Downloads 501
28288 Moral Identity and Moral Attentiveness as Predictors of Ethical Leadership in Financial Sector

Authors: Pilar Gamarra Gamarra, Michele Girotto

Abstract:

In the expanding field of leaders’ ethical behavior research, little attention has been paid to the association between finance leaders’ ethical traits (beyond personality) and ethical leadership, and more importantly, how these ethical characteristics can be predictors of ethical behavior at the leadership level in the financial sector. In this study, we tested a theoretical model based on uponsocial cognitive theory (Bandura, 1986) and the cognitive-developmental model (Piaget, 1932) to examine leaders’ moral identity and moral attentiveness as antecedents of ethical leadership. After the 2008 economic crisis, the marketplace has awakened to the potential dangers of unethical behavior. The unethical behavior of the leaders of the financial sector was identified as guilty of this economic catastrophe. For that reason, it seems increasingly prudent for organizations to have leaders who are cognitively inclined toward ethical behavior. This evidence suggests that moral attentiveness and moral identity is perhaps one way of identifying those kinds of leaders. For leaders who are morally attentive and have a high moral identity, themes of ethics interventions are consistent with their way of seeing the word. As a result, these leaders could become critical components of change in organizations and could provide the energy and skills necessary for these efforts to be successful. Ethical behavior of leader from the financial sector and marketing sectors must be joined to manage the change. In this study, a leader’s moral identity, leader’s moral attentiveness, and self-importance of Ethical Leadership are measured for financial and marketing leaders to be compared to determine the relationship between the three variables in each sector. Other conclusion related to gender, educational level or generation are obtained.

Keywords: ethical leadership, moral identity, moral attentiveness, financial leaders, marketing leaders, ethical behavior

Procedia PDF Downloads 146
28287 Childhood Trauma and Identity in Adulthood

Authors: Aakriti Lohiya

Abstract:

This study examines the commonly recognised childhood trauma that can have a significant and enduring effect on a person's cognitive and psychological health. The purpose of this study was to look at the intricate interactions that exist between negative self-identity, cognitive distortions, and early trauma. For the study, a sample of (200 women were taken, who were socially active) was gathered. Standardised measures were utilised to evaluate the participants' experiences of childhood trauma, and validated psychological tools were employed to assess negative self-identity and cognitive distortions. The links and predicting correlations between childhood trauma, negative self-identity, and cognitive distortions were investigated using statistical techniques, such as correlation analysis and multiple regression modelling. The results demonstrated that there is no correlation between the degree of early trauma and the emergence of a negative self-identity and cognitive distortions. It examines whether cognitive distortion and events in childhood have any relationship with negative self-identity using various scales. Participants completed the Childhood Trauma Questionnaire, which assessed retrospective accounts of childhood trauma; the Cognitive Distortions Scale, which measured internal attributions and perceptions of controllability; and the attachment style questionnaire, which assessed the attachment attribute of their daily life, which will lead negative. The implications for therapy were also considered.

Keywords: cognitive distortion, therapy, childhood trauma, attachment

Procedia PDF Downloads 40
28286 The Relationship between Romantic Relationship Beliefs and Ego Identity Process

Authors: Betül Demirbağ, Nesrin Demir

Abstract:

As a developmental period, early adulthood has a vital role in romantic relationships in young adult's life. lt's known that in this period, satisfaction of individual needs such as affiliation is essential for well-functioning and to be succeeded in sequent developmental task. Romantic relationships have an expected association with attachment style. But it's needed to get more information about indicators of romantic relationships in different cultural backgrounds. in this research it's aimed to investigate whether there is a relationship between romantic relationship beliefs and Ego identity status and also other possible indicators such as gender, age, socioeconomic status. Participants were undergraduate students training in various programs in Education Faculty in Adiyaman University. As data collection tool, Romantic Relationship Beliefs scale and Ego Identity Process Questionnaire which was adapted into Turkish were used. Results were discussed in the relevant literature.

Keywords: ego identity, romantic relationships, university counseling

Procedia PDF Downloads 528
28285 Manifestation of Hybridity in Marie Jones’s "Stones in His Pockets"

Authors: Mahsa Mahjoub Laleh, Nasser Dasht Peyma

Abstract:

This paper explores Marie Jones’s Stones in His Pockets in the light of the postcolonial notion of hybridity. The play is a tragicomedy about a small village in Ireland where many of the locales are extras in a Hollywood film. The actions of the play revolve around a local teenager named Sean who has been vilipended by a famous film star. The Sean character commits suicide by drowning himself with stones in his pockets. This paper explored how the attempts to gain cultural identity is manifested in Marie Jones’s play and how authority causes a change in the culture and destiny of people. Apparently, the play demonstrates that the political, economic and social realities directly affect people’s destiny and identity.

Keywords: cultural identity, hybridity, identity, postcolonial

Procedia PDF Downloads 407
28284 Woman, House, Identity: The Study of the Role of House in Constructing the Contemporary Dong Minority Woman’s Identity

Authors: Sze Wai Veera Fung, Peter W. Ferretto

Abstract:

Similar to most ethnic groups in China, men of the Dong minority hold the primary position in policymaking, moral authority, social values, and the control of the property. As the spatial embodiment of the patriarchal ideals, the house plays a significant role in producing and reproducing the distinctive gender status within the Dong society. Nevertheless, Dong women do not see their home as a cage of confinement, nor do they see themselves as a victim of oppression. For these women with reference to their productive identity, a house is a dwelling place with manifold meanings, including a proof of identity, an economic instrument, and a public resource operating on the community level. This paper examines the role of the house as a central site for identity construction and maintenance for the southern dialect Dong minority women in Hunan, China. Drawing on recent interviews with the Dong women, this study argues that women as productive individuals have a strong influence on the form of their house and the immediate environment, regardless of the male-dominated social construct of the Dong society. The aim of this study is not to produce a definitive relationship between women, house, and identity. Rather, it seeks to offer an alternative lens into the complexity and diversity of gender dynamics operating in and beyond the boundary of the house in the context of contemporary rural China.

Keywords: conception of home, Dong minority, house, rural China, woman’s identity

Procedia PDF Downloads 102
28283 Urban Art as an Identity Branding of Kampong Ketandan Surabaya

Authors: R. A. Retno Hastijanti, David Agus Sagita, Arum Lintang Cahyani, Tectona Radike, Andreas Suluh Putra

Abstract:

Surabaya, is one of the oldest cities in Indonesia. Most of the old quarter city of Surabaya is an ancient Kampong. Ketandan is one ancient Kampong in the center of Surabaya, surrounded by a thriving trade area. These conditions make Kampong vulnerably degraded of environmental quality and tended to lose their cultural identity. Norms and values eroded by the rapid development of its local surroundings. Through Kampong conservation programs, Surabaya city government established Ketandan as one of the urban heritage. To achieve the ideal condition of urban heritage, public participation is required. One thing that can generate a motivation for Kampong Ketandan community participation is to rediscover the identity of Kampong Ketandan. This research aims to explore the appropriate method to rediscover the identity of Kampong Ketandan. Through qualitative research methods, based on observations and focus group discussions, it was concluded that mural mentoring program was the best method that can be accepted by the Kampong community to rediscover their identity. Mural as one of the urban art form, able to motivate Kampong community to express their self and bring an icon to their Kampong. The benefits of this research are to provide input to the city government and the private sector to preserve urban heritage, moreover, to transform an urban heritage into a productive space in urban areas in order to enhance city revenues.

Keywords: Kampong, Kampong Ketandan, mural, Surabaya, urban, urban heritage, urban art

Procedia PDF Downloads 303
28282 The Internet of Things Ecosystem: Survey of the Current Landscape, Identity Relationship Management, Multifactor Authentication Mechanisms, and Underlying Protocols

Authors: Nazli W. Hardy

Abstract:

A critical component in the Internet of Things (IoT) ecosystem is the need for secure and appropriate transmission, processing, and storage of the data. Our current forms of authentication, and identity and access management do not suffice because they are not designed to service cohesive, integrated, interconnected devices, and service applications. The seemingly endless opportunities of IoT are in fact circumscribed on multiple levels by concerns such as trust, privacy, security, loss of control, and related issues. This paper considers multi-factor authentication (MFA) mechanisms and cohesive identity relationship management (IRM) standards. It also surveys messaging protocols that are appropriate for the IoT ecosystem.

Keywords: identity relation management, multifactor authentication, protocols, survey of internet of things ecosystem

Procedia PDF Downloads 325
28281 Neo-Filipino: A Study on the Impact of Internet and Mobile Technology on the Identity Formation of Selected Filipino Third Culture Kids (TCKs)

Authors: Erika Mae L. Valencia

Abstract:

Third Culture Kids (TCKs) are children who experienced a cross-cultural upbringing – being raised and lived outside their parents’ culture. As a result, TCKs experience the difficulty of building and attaining a concrete cultural identity. However, in the context of globalization and the emergence of ICTs, the internet, and mobile technology creates better ways of constructing cultural identities. This study investigates the social and cultural impacts of the internet and mobile technology on the multi-cultural identity development among selected Filipino TCKs. Moreover, this research seeks to understand how the Filipino TCKs form their identity and address their complex issue of belonging with the use of different internet platforms and mobile technology. To explore the lived experiences of Filipino TCKs, this research employs a transcendental phenomenological design. Also, this study uses purposive and snowball sampling and conduct in-depth interviews through Skype, phone call, or face-to-face. This study utilizes Pierre Bourdieu’s social capital as a theoretical lens to gain understanding of the TCKs’ identity formation process in relation to the said ICTs. This research argues that the internet and mobile technology play a significant role in facilitating multi-cultural identity formation of Filipino TCKs, as well as potentially broadening their social network through its various technological platforms.

Keywords: identity, internet, third culture kids, mobile technology

Procedia PDF Downloads 273
28280 Turkey’s Ideological and Identity Politics towards Iran in the Arab Uprising: The Case of Syrian Civil War

Authors: Cangul Altundas Akcay

Abstract:

With the beginning of the mass movement called as the Arab Uprising, Middle Eastern politics has demonstrated an influential shift which has been threatening the existence of the ruling regimes. In this environment, in particular, regional powers have desired to control regional politics, and to expand their regional influence. Bearing that in mind, Turkey and Iran, two significant regional powers, have engaged in competition so as to affect the shifted regional geopolitics. In this context, this paper aims to investigate how regional powers, especially non-Arab ones, have viewed each other in the Arab Uprising, whereby focusing on Turkish perspectives towards Iran. In other words, it will shed light on how Turkey has conducted foreign policy towards Iran during the Arab Uprising. To analyse this, Turkey’s ideological and identity politics towards Iran will be examined as one of its foreign policy approaches. The question is thus that how ideological and identity politics have determined Turkish foreign policy towards Iran in the Arab Uprising. To answer that, the Syrian civil war will be analysed as the case study in this qualitative study, hypothesising that Turkey, which has both Turkish identity and Sunni sect, has competed with Iran, which has both Farsi identity and Shia sect, over the Syrian civil war.

Keywords: Arab uprising, ideological and identity politics, Iran, Turkey, Syrian civil war

Procedia PDF Downloads 277