Search results for: identity management systems
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 17929

Search results for: identity management systems

17929 Comparison of Blockchain Ecosystem for Identity Management

Authors: K. S. Suganya, R. Nedunchezhian

Abstract:

In recent years, blockchain technology has been found to be the most significant discovery in this digital era, after the discovery of the Internet and Cloud Computing. Blockchain is a simple, distributed public ledger that contains all the user’s transaction details in a block. The global copy of the block is then shared among all its peer-peer network users after validation by the Blockchain miners. Once a block is validated and accepted, it cannot be altered by any users making it a trust-free transaction. It also resolves the problem of double-spending by using traditional cryptographic methods. Since the advent of bitcoin, blockchain has been the backbone for all its transactions. But in recent years, it has found its roots and uses in many fields like Smart Contracts, Smart City management, healthcare, etc. Identity management against digital identity theft has become a major concern among financial and other organizations. To solve this digital identity theft, blockchain technology can be employed with existing identity management systems, which maintain a distributed public ledger containing details of an individual’s identity containing information such as Digital birth certificates, Citizenship number, Bank details, voter details, driving license in the form of blocks verified on the blockchain becomes time-stamped, unforgeable and publicly visible for any legitimate users. The main challenge in using blockchain technology to prevent digital identity theft is ensuring the pseudo-anonymity and privacy of the users. This survey paper will exert to study the blockchain concepts, consensus protocols, and various blockchain-based Digital Identity Management systems with their research scope. This paper also discusses the role of Blockchain in COVID-19 pandemic management by self-sovereign identity and supply chain management.

Keywords: blockchain, consensus protocols, bitcoin, identity theft, digital identity management, pandemic, COVID-19, self-sovereign identity

Procedia PDF Downloads 91
17928 Central African Republic Government Recruitment Agency Based on Identity Management and Public Key Encryption

Authors: Koyangbo Guere Monguia Michel Alex Emmanuel

Abstract:

In e-government and especially recruitment, many researches have been conducted to build a trustworthy and reliable online or application system capable to process users or job applicant files. In this research (Government Recruitment Agency), cloud computing, identity management and public key encryption have been used to management domains, access control authorization mechanism and to secure data exchange between entities for reliable procedure of processing files.

Keywords: cloud computing network, identity management systems, public key encryption, access control and authorization

Procedia PDF Downloads 323
17927 Who Am I at Work: Work Identity Formation

Authors: Carol Belle-Hallsworth

Abstract:

Human interaction at work evolves over time and, with it, work identity. The social identity is built upon the development of its underpinning and preceding stages. Work identity can be viewed in the same way and will shift based on changes in the work environment and challenges to the work identity (threats to the four stages). This paper provides an analysis of how the stages of trust, autonomy, industry and initiative are related to the employee identity at work. Describing how they are related to each other and the development of identity. It has become common to notice changes in employee behavior during and after major operational changes in an organization. Previous studies suggest that there are emotional triggers that result in the new behaviors displayed. This study seeks to test a theoretical model by testing the relationship between the first four Erikson stages as constructs. A randomized sample of participants undertook a self-administered survey to capture information on trust, autonomy, initiative, and industry.

Keywords: work identity, change management, organizational management, technology implementation

Procedia PDF Downloads 262
17926 The Internet of Things Ecosystem: Survey of the Current Landscape, Identity Relationship Management, Multifactor Authentication Mechanisms, and Underlying Protocols

Authors: Nazli W. Hardy

Abstract:

A critical component in the Internet of Things (IoT) ecosystem is the need for secure and appropriate transmission, processing, and storage of the data. Our current forms of authentication, and identity and access management do not suffice because they are not designed to service cohesive, integrated, interconnected devices, and service applications. The seemingly endless opportunities of IoT are in fact circumscribed on multiple levels by concerns such as trust, privacy, security, loss of control, and related issues. This paper considers multi-factor authentication (MFA) mechanisms and cohesive identity relationship management (IRM) standards. It also surveys messaging protocols that are appropriate for the IoT ecosystem.

Keywords: identity relation management, multifactor authentication, protocols, survey of internet of things ecosystem

Procedia PDF Downloads 324
17925 Design of Collaborative Web System: Based on Case Study of PBL Support Systems

Authors: Kawai Nobuaki

Abstract:

This paper describes the design and implementation of web system for continuable and viable collaboration. This study proposes the improvement of the system based on a result of a certain practice. As contemporary higher education information environments transform, this study highlights the significance of university identity and college identity that are formed continuously through independent activities of the students. Based on these discussions, the present study proposes a practical media environment design which facilitates the processes of organizational identity formation based on a continuous and cyclical model. Even if users change by this system, the communication system continues operation and cooperation. The activity becomes the archive and produces new activity. Based on the result, this study elaborates a plan with a re-design by a system from the viewpoint of second-order cybernetics. Systems theory is a theoretical foundation for our study.

Keywords: collaborative work, learning management system, second-order cybernetics, systems theory, user generated contents, viable system model

Procedia PDF Downloads 179
17924 The Impact of Type Two Diabetes and Comorbid Conditions on Self-Identity and Self-Management Practices

Authors: Virginia Maskill, Philippa Seaton, Marie Crowe, Maree Inder

Abstract:

A diagnosis of a chronic condition, including Type 2 diabetes can significantly impact an individual’s self-identity which in turn can have considerable implications on how they adapt to, and self-manage their condition. This paper reports on the findings from a qualitative PhD study of forty participants diagnosed with Type 2 diabetes mellitus and comorbid conditions. The primary objective of the study explored the impact conditions had on self-identity and the relationship with self-management practices. Participants were recruited from a larger study which explored the effectiveness of a therapeutic intervention on glycemic control. Interviews were audio-recorded, transcribed verbatim and analysed utilising a narrative thematic analysis methodological approach including a transitional conceptual framework. The majority of participants experienced a loss of their normal self and struggled to integrate diabetes and comorbid conditions into their self-identity. Acceptance, knowledge and integration of conditions were often found to directly influence self-management practices with individuals commonly experiencing four transitional phases from the onset of diagnosis. Successful negotiation of these four phases was influenced by a range of variables which also impacted on an individual’s self-identity and in turn their self-management practices.

Keywords: comorbidity, type two diabetes, self-identity, self-management

Procedia PDF Downloads 296
17923 Design and Application of NFC-Based Identity and Access Management in Cloud Services

Authors: Shin-Jer Yang, Kai-Tai Yang

Abstract:

In response to a changing world and the fast growth of the Internet, more and more enterprises are replacing web-based services with cloud-based ones. Multi-tenancy technology is becoming more important especially with Software as a Service (SaaS). This in turn leads to a greater focus on the application of Identity and Access Management (IAM). Conventional Near-Field Communication (NFC) based verification relies on a computer browser and a card reader to access an NFC tag. This type of verification does not support mobile device login and user-based access management functions. This study designs an NFC-based third-party cloud identity and access management scheme (NFC-IAM) addressing this shortcoming. Data from simulation tests analyzed with Key Performance Indicators (KPIs) suggest that the NFC-IAM not only takes less time in identity identification but also cuts time by 80% in terms of two-factor authentication and improves verification accuracy to 99.9% or better. In functional performance analyses, NFC-IAM performed better in salability and portability. The NFC-IAM App (Application Software) and back-end system to be developed and deployed in mobile device are to support IAM features and also offers users a more user-friendly experience and stronger security protection. In the future, our NFC-IAM can be employed to different environments including identification for mobile payment systems, permission management for remote equipment monitoring, among other applications.

Keywords: cloud service, multi-tenancy, NFC, IAM, mobile device

Procedia PDF Downloads 401
17922 Autopoietic Socio-technical Systems: A New Lens for Understanding Anticipation

Authors: Gregory Vigneaux

Abstract:

The capacity to anticipate future events across varying time scales is integral to the effective operation of both emergency management and emergency services organizations. This paper provides fresh insight into anticipation by first offering a novel conceptualization of organizations in both fields by twisting together socio-technical systems and autopoietic theory. The result of this intertwining of theory is a view of emergency management and emergency services organizations as self-reproducing systems driven by socio-technical processes contingent upon both inflows and outflows across a boundary produced by the system’s own activity. Flowing from this perspective is an approach to anticipation that extends from a system’s intent of continuing to reproduce its identity over a dynamic landscape. This discussion takes a pragmatic turn through Maturana and Verden-Zöller’s domains of structural change, classifying anticipated events and connecting them with types of responses involving inflows, outflows, and socio-technical processes.

Keywords: risk, anticipation, organizations, planning, transformation, identity

Procedia PDF Downloads 85
17921 Visual Identity Components of Tourist Destination

Authors: Petra Barisic, Zrinka Blazevic

Abstract:

In the world of modern communications, visual identity has predominant influence on the overall success of tourist destinations, but despite of these, the problem of designing thriving tourist destination visual identity and their components are hardly addressed. This study highlights the importance of building and managing the visual identity of tourist destination, and based on the empirical study of well-known Mediterranean destination of Croatia analyses three main components of tourist destination visual identity; name, slogan, and logo. Moreover, the paper shows how respondents perceive each component of Croatia’s visual identity. According to study, logo is the most important, followed by the name and slogan. Research also reveals that Croatian economy lags behind developed countries in understanding the importance of visual identity, and its influence on marketing goal achievements.

Keywords: components of visual identity, Croatia, tourist destination, visual identity

Procedia PDF Downloads 1008
17920 The Impact of Personal Identity on Self-Esteem among Muslim Adolescents

Authors: Nadia Ayub

Abstract:

The purpose of the study was to explore the impact of personal identity on self-esteem among adolescents. Two hypotheses were tested in the study, i.e., personal identity effects on self-esteem; and gender difference in the variables of personal identity and self-esteem. The total of 300 (150 female; 150 male) adolescents participated in the study. Personal identity scale (Ayub, N., In Press), and self-esteem scale (Rosenberg, 1985) were administered. The findings of the study suggest that positive personal identity impact on self-esteem and gender difference was found on the variables of personal identity and self-esteem. In conclusion, the results of the study are beneficial for researchers, policymakers, psychologists. The strong positive personal identity and self-esteem help in healthy mental development not only in adolescence but throughout the life of individuals.

Keywords: personal identity, self-esteem, adolescents, positive psychology

Procedia PDF Downloads 366
17919 The Disposable Identities; Enabling Trust-by-Design to Build Sustainable Data-Driven Value

Authors: Lorna Goulden, Kai M. Hermsen, Jari Isohanni, Mirko Ross, Jef Vanbockryck

Abstract:

This article introduces disposable identities, with reference use cases and explores possible technical approaches. The proposed approach, when fully developed as an open-source toolkit, enables developers of mobile or web apps to employ a self-sovereign identity and data privacy framework, in order to rebuild trust in digital services by providing greater transparency, decentralized control, and GDPR compliance. With a user interface for the management of self-sovereign identity, digital authorizations, and associated data-driven transactions, the advantage of Disposable Identities is that they may also contain verifiable data such as the owner’s photograph, official or even biometric identifiers for more proactive prevention of identity abuse. These Disposable Identities designed for decentralized privacy management can also be time, purpose and context-bound through a secure digital contract; with verification functionalities based on tamper-proof technology.

Keywords: dentity, trust, self-sovereign, disposable identity, privacy toolkit, decentralised identity, verifiable credential, cybersecurity, data driven business, PETs, GDPRdentity, trust, self-sovereign, disposable identity, privacy toolkit, decentralised identity, verifiable credential, cybersecurity, data driven business, PETs, GDPRI

Procedia PDF Downloads 185
17918 Explore Customers' Perceptions of U.K. Fast Fashion Retailers' Identities

Authors: Ranis Cheng

Abstract:

Corporate identity is an asset of a company that is unique, valuable and provides a source of competitive advantage. This research taking a holistic view to explore all dimensions of corporate identity and influence of each on customers’ shopping experience in the fast fashion retail sector in the U.K. Unfortunately these issues have not been explored sufficiently in the extant literature, especially in the area of the identity gap. To date, there is still a lack of empirical research on corporate identity, especially in the retail sector despite the importance of the concept to all organisations. Furthermore, although customer group is one of the essential audiences of organisations and the importance of customers in corporate identity management cannot be ignored, to date limited studies have been conducted in order to understand how customers interpret and perceive corporate identity (perceived identity). Therefore, this research investigates customers’ perceptions of corporate identity in the fast fashion retail sector. 1) To explore customers’ perceptions of fast fashion retailers’ corporate identities; 2) To uncover the important constructs of corporate identity which contribute to the U.K. fast fashion retail sector. 40 semi-structured interviews with the fast fashion consumers have been carried out to identify their perceptions of fast fashion retailers' corporate identities. Secondary research on retailers' websites and press releases have been evaluated to identify their desired corporate identities. The findings have revealed that there are significant gaps between how fast fashion retailers present their identities and how their consumers perceive them. This has posed customers' negative perceptions towards the retailers and their shopping experience as a whole. This study has studied how the corporate identity constructs could be applied in the fashion context and has helped retailers to shed lights on how to minimise the gap between desired and perceived identity.

Keywords: corporate identity, fast fashion, fashion retailing, identity gap

Procedia PDF Downloads 244
17917 A Cloud-Based Federated Identity Management in Europe

Authors: Jesus Carretero, Mario Vasile, Guillermo Izquierdo, Javier Garcia-Blas

Abstract:

Currently, there is a so called ‘identity crisis’ in cybersecurity caused by the substantial security, privacy and usability shortcomings encountered in existing systems for identity management. Federated Identity Management (FIM) could be solution for this crisis, as it is a method that facilitates management of identity processes and policies among collaborating entities without enforcing a global consistency, that is difficult to achieve when there are ID legacy systems. To cope with this problem, the Connecting Europe Facility (CEF) initiative proposed in 2014 a federated solution in anticipation of the adoption of the Regulation (EU) N°910/2014, the so-called eIDAS Regulation. At present, a network of eIDAS Nodes is being deployed at European level to allow that every citizen recognized by a member state is to be recognized within the trust network at European level, enabling the consumption of services in other member states that, until now were not allowed, or whose concession was tedious. This is a very ambitious approach, since it tends to enable cross-border authentication of Member States citizens without the need to unify the authentication method (eID Scheme) of the member state in question. However, this federation is currently managed by member states and it is initially applied only to citizens and public organizations. The goal of this paper is to present the results of a European Project, named eID@Cloud, that focuses on the integration of eID in 5 cloud platforms belonging to authentication service providers of different EU Member States to act as Service Providers (SP) for private entities. We propose an initiative based on a private eID Scheme both for natural and legal persons. The methodology followed in the eID@Cloud project is that each Identity Provider (IdP) is subscribed to an eIDAS Node Connector, requesting for authentication, that is subscribed to an eIDAS Node Proxy Service, issuing authentication assertions. To cope with high loads, load balancing is supported in the eIDAS Node. The eID@Cloud project is still going on, but we already have some important outcomes. First, we have deployed the federation identity nodes and tested it from the security and performance point of view. The pilot prototype has shown the feasibility of deploying this kind of systems, ensuring good performance due to the replication of the eIDAS nodes and the load balance mechanism. Second, our solution avoids the propagation of identity data out of the native domain of the user or entity being identified, which avoids problems well known in cybersecurity due to network interception, man in the middle attack, etc. Last, but not least, this system allows to connect any country or collectivity easily, providing incremental development of the network and avoiding difficult political negotiations to agree on a single authentication format (which would be a major stopper).

Keywords: cybersecurity, identity federation, trust, user authentication

Procedia PDF Downloads 136
17916 The Entrepreneurial Journey of Students: An Identity Perspective

Authors: J. Marchand

Abstract:

While university dropout entrepreneurs are celebrated in the practitioner literature, students’ intentions of becoming entrepreneurs have increasingly been the focus of student entrepreneur studies. However, students who are already running a business have rarely been examined. The experience of these students is a phenomenon that requires further research. Entrepreneurial identity represents a gap in the organisational studies literature. This paper utilises studentpreneurs’ self-narratives of their entrepreneurial journey. More specifically, the aim is to answer the following question: what are the types of identity work that individuals go through to build their entrepreneurial identity during that journey? Through long interviews, this paper studies the lived experience of 14 studentpreneurs who have achieved $54,000 in income and who participated publicly in entrepreneurial competitions. A general inductive analysis is performed on their narrative. With its focus on the journey, this paper makes a contribution to the literature on identity work and the entrepreneurial journey. A key contribution is the study of identity work on the journey to becoming an (established) entrepreneur in contrast to routine identity work.

Keywords: entrepreneurial identity, student entrepreneur, identity work, student entrepreneurship

Procedia PDF Downloads 630
17915 Migration and Identity Erosion: An Exploratory Study of First Generation Nigerian-Americans

Authors: Lolade Siyonbola

Abstract:

Nigerians are often celebrated as being the most educated cultural group in America. The cultural values and history that have led to this reality are particular to a generation that came of age post colonialism. Many of these cultural values have been passed down from post-colonial parent to millennial child, but most have not. This study, based on interviews and surveys of Nigerian millennials and their parents in the United States, explores the degree to which identity has been eroded in the millennial generation due to a lack of imparted cultural values and knowledge from the previous generation. Most of the subjects do not speak their native language or identify with their cultural heritage sufficiently to build ties with their native land. Most are experiencing some degree of identity crisis, and therefore limited self-actualization, with little to no support; as there are few successful tools available to this population. If governmental programs to reverse these trends are not implemented within this generation, the implications to the individual, family and home nation (Nigeria), will be felt for generations to come.

Keywords: identity, culture, self-actualization, social identity theory, migration, transnationalism, value systems

Procedia PDF Downloads 342
17914 The Role of Organizational Identity in Disaster Response, Recovery and Prevention: A Case Study of an Italian Multi-Utility Company

Authors: Shanshan Zhou, Massimo Battaglia

Abstract:

Identity plays a critical role when an organization faces disasters. Individuals reflect on their working identities and identify themselves with the group and the organization, which facilitate collective sensemaking under crisis situations and enable coordinated actions to respond to and recover from disasters. In addition, an organization’s identity links it to its regional community, which fosters the mobilization of resources and contributes to rapid recovery. However, identity is also problematic for disaster prevention because of its persistence. An organization’s ego-defenses system prohibits the rethink of its identity and a rigid identity obstructs disaster prevention. This research aims to tackle the ‘problem’ of identity by study in-depth a case of an Italian multi–utility which experienced the 2012 Northern Italy earthquakes. Collecting data from 11 interviews with top managers and key players in the local community and archived materials, we find that the earthquakes triggered the rethink of the organization’s identity, which got reinforced afterward. This research highlighted the importance of identity in disaster response and recovery. More importantly, it explored the solution of overcoming the barrier of ego-defense that is to transform the organization into a learning organization which constantly rethinks its identity.

Keywords: community identity, disaster, identity, organizational learning

Procedia PDF Downloads 692
17913 The Potential of Walkability in Evoking People’s Perception of Place Identity

Authors: Ibrahim Shinbira

Abstract:

In urban design, much has been discussed on the significance of the physical qualities in creating the place identity; however, the role of walkability as a physical quality that can evokes people's perception of place identity has not been adequately explored. This paper is based on the part findings of a doctoral research examining place identity in the city centre of Misurata, Libya. A number of 176 questionnaire and 23 face-to-face interviews were conducted with residents of the city to investigate physical qualities of place identity that evoked resident's perception. The finding demonstrates that walkability within the city centre is strong and it influences the users’ perception on the place identity. These were regarded as very important in sustaining the socio-cultural values, enjoyment, options, vitality and comfort. The paper concludes by establishing that walkability has a substantial contribution to the place identity, therefore should be considered in the design of urban places specifically the redevelopment one.

Keywords: perception, walkability, physical environment, place identity, residents

Procedia PDF Downloads 594
17912 The Story of a Spoiled Identity: Blogging on Disability and Feminity

Authors: Anna Ślebioda

Abstract:

The paper discusses intersections between disability and femininity. Their imbrication may impede negotiation of identity. The analysis of a blog of a women with disability aims to prove this hypothesis. It involves 724 entries written in the span of six years. The conceptual framework for the considerations constitute the concepts of stigma and spoiled identity, and overlapping elements of femininity and disability. The empirical part comprises content analysis. It allows to locate the narrative on femininity and disability within the dimensions of imbricated categories described in the theoretical part. The results demonstrate aspects to consider in further research on identity in women with disabilities.

Keywords: disability, femininity, spoiled identity, stigma

Procedia PDF Downloads 629
17911 The Mediating Effect of Resilience on the Relationship between Cultural Identity and Self-Concordance among Tibetan, Han and Hui Students

Authors: Chunhua Ma

Abstract:

Background: There is a relationship between cultural identity and psychological health. Resilience is an important factor of psychological health, and cultural identity will protect the resilience. The research showed that the cultural identity, resilience, and self-concordance of students from different cultures. It should be a theoretical basis to improve mental health of different nationalities students. And the role of resilience factors for adults’ cultural identity and self-concordance was deserve studied. Aims: The current study aimed to examine the relationship between cultural identity and self-concordance among Chinese academician from 3 minorities, postulating mediating by resilience. Methods: This study used cross-sectional and correlational design. Participants were 328 Chinese aged between 18 and 25 years. Data was collected via self-reports including both closed and opened questions. Results: Linear regression analysis controlling for age, gender, the result showed that: (a) Cultural identity was related to self-concordance, resilience was related to self-concordance and cultural identity was related to resilience, (b) Resilience mediated the link between cultural identity and self-concordance, respectively. Discussion: Our findings suggested that resilience and cultural identity are important factors in self-concordance. If minority college students realized the heterogeneous culture, it would alleviate their psychological conflict, stimulate their strength potential and improve their self-concordance.

Keywords: cultural identity, resilience, self-concordance, mediating effect

Procedia PDF Downloads 376
17910 Multiple Identity Construction among Multilingual Minorities: A Quantitative Sociolinguistic Case Study

Authors: Stefanie Siebenhütter

Abstract:

This paper aims to reveal criterions involved in the process of identity-forming among multilingual minority language speakers in Northeastern Thailand and in the capital Bangkok. Using sociolinguistic interviews and questionnaires, it is asked which factors are important for speakers and how they define their identity by their interactions socially as well as linguistically. One key question to answer is how sociolinguistic factors may force or diminish the process of forming social identity of multilingual minority speakers. However, the motivation for specific language use is rarely overt to the speaker’s themselves as well as to others. Therefore, identifying the intentions included in the process of identity construction is to approach by scrutinizing speaker’s behavior and attitudes. Combining methods used in sociolinguistics and social psychology allows uncovering the tools for identity construction that ethnic Kui uses to range themselves within a multilingual setting. By giving an overview of minority speaker’s language use in context of the specific border near multilingual situation and asking how speakers construe identity within this spatial context, the results exhibit some of the subtle and mostly unconscious criterions involved in the ongoing process of identity construction.

Keywords: social identity, identity construction, minority language, multilingualism, social networks, social boundaries

Procedia PDF Downloads 230
17909 A Review: Artificial Intelligence (AI) Driven User Access Management and Identity Governance

Authors: Rupan Preet Kaur

Abstract:

This article reviewed the potential of artificial intelligence in the field of identity and access management (IAM) and identity governance and administration (IGA), the most critical pillars of any organization. The power of leveraging AI in the most complex and huge user base environment was outlined by simplifying and streamlining the user access approvals and re-certifications without any impact on the user productivity and at the same time strengthening the overall compliance of IAM landscape. Certain challenges encountered in the current state were detailed where majority of organizations are still lacking maturity in the data integrity aspect. Finally, this paper concluded that within the realm of possibility, users and application owners can reap the benefits of unified approach provided by AI to improve the user experience, improve overall efficiency, and strengthen the risk posture.

Keywords: artificial intelligence, machine learning, user access review, access approval

Procedia PDF Downloads 58
17908 Illuminating Regional Identity: An Interdisciplinary Exploration in Saskatchewan

Authors: Anne Gibbons

Abstract:

Both inside and outside of academia, people have sought to understand the “sense of place” of various regions, many times over and for many different reasons. The concept of regional identity is highly complex and surrounded by considerable contention. There are multiple bodies of research on regional identity theory in many different disciplines and even across sub-disciplinary classifications. Each discipline takes a slightly different angle or perspective on regional identity, resulting in a fragmented body of work on this topic overall. There is a need to consolidate this body of increasingly fragmented theory through interdisciplinary integration. For the purpose of this study, the province of Saskatchewan will serve as an exemplar for exploring regional identity in a concrete context. Saskatchewan can be thought of as a ‘functional region,’ with clear boundaries and clear residency, from which regional identity can be studied. This thesis shares the outcomes of a qualitative study grounded in a series of group interviews with askatchewan residents, from which it is concluded that the use of interdisciplinary theory is an appropriate approach to the study of regional identity. Regional identity cannot be compartmentalized; it is a web of characteristics, attributes, and feelings that are inextricably linked. The thesis thus concludes by offering lessons learned about how we might better understand regional identity, as illuminated through both interdisciplinary theory and the lived experiences and imaginations of people living in the region of Saskatchewan.

Keywords: interdisciplinary, regional identity, Saskatchewan, tourism studies

Procedia PDF Downloads 497
17907 A Factor-Analytical Approach on Identities in Environmentally Significant Behavior

Authors: Alina M. Udall, Judith de Groot, Simon de Jong, Avi Shankar

Abstract:

There are many ways in which environmentally significant behavior can be explained. Dominant psychological theories, namely, the theory of planned behavior, the norm-activation theory, its extension, the value-belief-norm theory, and the theory of habit do not explain large parts of environmentally significant behaviors. A new and rapidly growing approach is to focus on how consumer’s identities predict environmentally significant behavior. Identity may be relevant because consumers have many identities that are assumed to guide their behavior. Therefore, we assume that many identities will guide environmentally significant behavior. Many identities can be relevant for environmentally significant behavior. In reviewing the literature, over 200 identities have been studied making it difficult to establish the key identities for explaining environmentally significant behavior. Therefore, this paper first aims to establish the key identities previously used for explaining environmentally significant behavior. Second, the aim is to test which key identities explain environmentally significant behavior. To address the aims, an online survey study (n = 578) is conducted. First, the exploratory factor analysis reveals 15 identity factors. The identity factors are namely, environmentally concerned identity, anti-environmental self-identity, environmental place identity, connectedness with nature identity, green space visitor identity, active ethical identity, carbon off-setter identity, thoughtful self-identity, close community identity, anti-carbon off-setter identity, environmental group member identity, national identity, identification with developed countries, cyclist identity, and thoughtful organisation identity. Furthermore, to help researchers understand and operationalize the identities, the article provides theoretical definitions for each of the identities, in line with identity theory, social identity theory, and place identity theory. Second, the hierarchical regression shows only 10 factors significantly uniquely explain the variance in environmentally significant behavior. In order of predictive power the identities are namely, environmentally concerned identity, anti-environmental self-identity, thoughtful self-identity, environmental group member identity, anti-carbon off-setter identity, carbon off-setter identity, connectedness with nature identity, national identity, and green space visitor identity. The identities explain over 60% of the variance in environmentally significant behavior, a large effect size. Based on this finding, the article reveals a new, theoretical framework showing the key identities explaining environmentally significant behavior, to help improve and align the field.

Keywords: environmentally significant behavior, factor analysis, place identity, social identity

Procedia PDF Downloads 414
17906 A New Protocol Ensuring Users' Privacy in Pervasive Environment

Authors: Mohammed Nadir Djedid, Abdallah Chouarfia

Abstract:

Transparency of the system and its integration into the natural environment of the user are some of the important features of pervasive computing. But these characteristics that are considered as the strongest points of pervasive systems are also their weak points in terms of the user’s privacy. The privacy in pervasive systems involves more than the confidentiality of communications and concealing the identity of virtual users. The physical presence and behavior of the user in the pervasive space cannot be completely hidden and can reveal the secret of his/her identity and affect his/her privacy. This paper shows that the application of major techniques for protecting the user’s privacy still insufficient. A new solution named Shadow Protocol is proposed, which allows the users to authenticate and interact with the surrounding devices within an ubiquitous computing environment while preserving their privacy.

Keywords: pervasive systems, identification, authentication, privacy

Procedia PDF Downloads 443
17905 Exploring the Relationship between Organisational Identity and Value Systems: Reflecting on the Values-Crafting Process in a Multi-National Organisation within the Entertainment Industry

Authors: Dieter Veldsman, Theo Heyns Veldsman

Abstract:

The knowledge economy demands an organisation that is flexible, adaptable and able to navigate the ever-changing environment. This fast-paced environment has however resulted in an organizational landscape that battles to engage employees, retain top talent and create meaningful work for its members. In the knowledge economy, the concept of organizational identity has become an important consideration as organisations aim to create a compelling and inviting narrative for all stakeholders across the business value chain. Values are often seen as the behavioural framework that informs organisational culture, yet often values are perceived to be inauthentic and misaligned with the true character or identity of the organisation and how it is perceived by different role players. This paper focuses on exploring the relationship between organisational identity and value systems by focusing on a case study within a multi-national organisation within South Africa. The paper evaluates the implementation of mixed methods OD approach that gathered collaborative inputs of more than 4500 employees who participated in crafting the newly established values system post a retrenchment process. The paper will evaluate the relationship between the newly crafted value system and the identity of the organisation as described by various internal and external stakeholders in order to explore potential alignment, dissonance and key insights into understanding the relationship between organisational identity and values. The case study will be reported from the perspective of an OD consultant who supported the transformation process over a period of 8 months and aims to provide key insights into values and identity alignment within knowledge economy organisations. From a practical perspective, the paper provides insights into how values are created, perceived and lived within organisations and the impact on employee engagement and culture.

Keywords: culture, organisational development, organisational identity, values

Procedia PDF Downloads 278
17904 Identity Management in Virtual Worlds Based on Biometrics Watermarking

Authors: S. Bader, N. Essoukri Ben Amara

Abstract:

With the technological development and rise of virtual worlds, these spaces are becoming more and more attractive for cybercriminals, hidden behind avatars and fictitious identities. Since access to these spaces is not restricted or controlled, some impostors take advantage of gaining unauthorized access and practicing cyber criminality. This paper proposes an identity management approach for securing access to virtual worlds. The major purpose of the suggested solution is to install a strong security mechanism to protect virtual identities represented by avatars. Thus, only legitimate users, through their corresponding avatars, are allowed to access the platform resources. Access is controlled by integrating an authentication process based on biometrics. In the request process for registration, a user fingerprint is enrolled and then encrypted into a watermark utilizing a cancelable and non-invertible algorithm for its protection. After a user personalizes their representative character, the biometric mark is embedded into the avatar through a watermarking procedure. The authenticity of the avatar identity is verified when it requests authorization for access. We have evaluated the proposed approach on a dataset of avatars from various virtual worlds, and we have registered promising performance results in terms of authentication accuracy, acceptation and rejection rates.

Keywords: identity management, security, biometrics authentication and authorization, avatar, virtual world

Procedia PDF Downloads 236
17903 The Georgians’ Discourses of National Identity in the Context of Europeanisation

Authors: Lia Tsuladze

Abstract:

The paper discusses the Georgians’ online discourses of national identity in the context of Europeanisation focusing on two periods - initialing of the EU-Georgia Association Agreement in November 2013 and signing it in June 2014. Discussing how the Georgians’ aspiration to integrate with the EU is combined with their perception of Europeanisation as a threat to the national identity, the author explores how the national sentiment is expressed in the above discourses while performed for the local vs. international audiences.

Keywords: Europeanisation, frontstage, backstage discourses, Georgia, national identity

Procedia PDF Downloads 468
17902 Role of Physical Appearance in Associating People with a Group Identity

Authors: Gurleen Kaur

Abstract:

Being tall-short, fat-thin, black-white, etc. is an inevitable part of how people perceive you. This association of people with your external appearance carves out an identity for you. This paper will look at the reasons why people relate a person to a particular categorization on the basis of his/her physical appearance. The paper delves into reasons for this categorization into groups: Subconscious grouping, personal gain, ease of relating to the group, and social acceptance. Development of certain unique physical features also leads to a person relating himself to a collective identity. Thus, this paper will support the fact that physical appearance plays a crucial role in categorization of people into groups and hence forming a group identity for them. This paper is divided into three parts. The first part will discuss what physical appearance is and how is it linked to our daily lives. The second part will talk about why it works i.e. why this factor of external appearance is important in formation of identity. The last part will talk about the factors which lead to categorization of identity because of physical appearance.

Keywords: group identity, physical appearance, subconscious grouping, collective identity

Procedia PDF Downloads 392
17901 Trimma: Trimming Metadata Storage and Latency for Hybrid Memory Systems

Authors: Yiwei Li, Boyu Tian, Mingyu Gao

Abstract:

Hybrid main memory systems combine both performance and capacity advantages from heterogeneous memory technologies. With larger capacities, higher associativities, and finer granularities, hybrid memory systems currently exhibit significant metadata storage and lookup overheads for flexibly remapping data blocks between the two memory tiers. To alleviate the inefficiencies of existing designs, we propose Trimma, the combination of a multi-level metadata structure and an efficient metadata cache design. Trimma uses a multilevel metadata table to only track truly necessary address remap entries. The saved memory space is effectively utilized as extra DRAM cache capacity to improve performance. Trimma also uses separate formats to store the entries with non-identity and identity mappings. This improves the overall remap cache hit rate, further boosting the performance. Trimma is transparent to software and compatible with various types of hybrid memory systems. When evaluated on a representative DDR4 + NVM hybrid memory system, Trimma achieves up to 2.4× and on average 58.1% speedup benefits, compared with a state-of-the-art design that only leverages the unallocated fast memory space for caching. Trimma addresses metadata management overheads and targets future scalable large-scale hybrid memory architectures.

Keywords: memory system, data cache, hybrid memory, non-volatile memory

Procedia PDF Downloads 22
17900 Re-Reading the Impossibility of Identity: Modeling Gender Pluralism in Curriculum and Instruction

Authors: A. K. O’Loughlin

Abstract:

Identity doesn’t exist in discrete categories as it is defined. Kevin Kumashiro reveals the phrase 'an impossibility of identity' in Troubling Education (2000), an investigation of the intersections of culture and gender and the impact of erasure for queer POC identity. This underscores the essentiality of an insider or an outsider identity and the appearance of 'contradiction' or impossibility of these identities. The contradictions between us as subject in our own stories and in the stories of others are often silenced. This silencing of complex, 'contradicting' identity has unmissable implications in the classroom; the developing student in question is done a serious disservice, from which they may never recover. There is no more important point of contact than the teacher, for willingness to encounter a developing person as they are, not as we already think they are, or 'know' them to be, or think they should be. To decide how to regard them based on our own unilateral identity and its associated exhortations and injunctions is, as Hannah Arendt writes in The Origins of Totalitarianism (1951), to sell off our ability to rise, human-like, to the challenge of investigating things as they are. A re-reading of Kumashiro’s impossibility of identity becomes possible through the investigation of pluralism. Identities become possible and un-paradoxical by the notion that contradictions are not problems that an individual is not unilateral, but plural. In this paper, we investigate how philosophies of pluralism can inform our understanding of impossibility of identity in classroom curriculum and pedagogy.

Keywords: identity, gender, culture, pluralism, education, philosophy of education, queer theory, philosophy of mind, adolescent development

Procedia PDF Downloads 259