Search results for: Roma identity
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 309

Search results for: Roma identity

249 Identification of Author and Reviewer from Single and Double Blind Paper

Authors: Jatinderkumar R. Saini, Nikita R. Sonthalia, Khushbu A. Dodiya

Abstract:

Research leads to the development of science and technology and hence it leads to the betterment of humankind also. Journals and Conferences provide a platform to receive large number of research papers for publications and presentations before the expert and peer-level scientific community. In order to assure quality of such papers, they are also sent to reviewers for their comments. In order to maintain good ethical standards, the research papers are sent to reviewers in such a way authors and reviewers do not know each other’s identity. This technique is called Double-blind Review Process. It is called Single-blind Review Process, if identity of any one party, generally authors’, is disclosed to the other. This paper presents the techniques by which identity of author as well as reviewer could be found even through Double-blind Review process. It is proposed that the characteristics and techniques presented here will help journals and conferences in assuring intentional or un-intentional disclosure of identity revealing information by the either party. 

Keywords: Author, Conference, Double Blind Paper, Journal, Reviewer, Single Blind Paper.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2447
248 De-Securitizing Identity: Narrative (In)Consistency in Periods of Transition

Authors: Katerina Antoniou

Abstract:

When examining conflicts around the world, it is evident that the majority of intractable conflicts are steeped in identity. Identity seems to be not only a causal variable for conflict, but also a catalytic parameter for the process of reconciliation that follows ceasefire. This paper focuses on the process of identity securitization that occurs between rival groups of heterogeneous collective identities – ethnic, national or religious – as well as on the relationship between identity securitization and the ability of the groups involved to reconcile. Are securitized identities obstacles to the process of reconciliation, able to hinder any prospects of peace? If the level to which an identity is securitized is catalytic to a conflict’s discourse and settlement, then which factors act as indicators of identity de-securitization? The level of an in-group’s identity securitization can be estimated through a number of indicators, one of which is narrative. The stories, views and stances each in-group adopts in relation to its history of conflict and relation with their rival out-group can clarify whether that specific in-group feels victimized and threatened or safe and ready to reconcile. Accordingly, this study discusses identity securitization through narrative in relation to intractable conflicts. Are there conflicts around the world that, despite having been identified as intractable, stagnated or insoluble, show signs of identity de-securitization through narrative? This inquiry uses the case of the Cyprus conflict and its partitioned societies to present official narratives from the two communities and assess whether these narratives have transformed, indicating a less securitized in-group identity for the Greek and Turkish Cypriots. Specifically, the study compares the official historical overviews presented by each community’s Ministry of Foreign Affairs website and discusses the extent to which the two official narratives present a securitized collective identity. In addition, the study will observe whether official stances by the two communities – as adopted by community leaders – have transformed to depict less securitization over time. Additionally, the leaders’ reflection of popular opinion is evaluated through recent opinion polls from each community. Cyprus is currently experiencing renewed optimism for reunification, with the leaders of its two communities engaging in rigorous negotiations, and with rumors calling for a potential referendum for reunification to be taking place even as early as within 2016. Although leaders’ have shown a shift in their rhetoric and have moved away from narratives of victimization, this is not the case for the official narratives used by their respective ministries of foreign affairs. The study’s findings explore whether this narrative inconsistency proves that Cyprus is transitioning towards reunification, or whether the leaders are risking sending a securitized population to the polls to reject a potential reunification. More broadly, this study suggests that in the event that intractable conflicts might be moving towards viable peace, in-group narratives--official narratives in particular--can act as indicators of the extent to which rival entities have managed to reconcile.

Keywords: Conflict, Identity, Narrative, Reconciliation.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1537
247 Study on the Influence of Cladding and Finishing Materials of Apartment Buildings on the Architectural Identity of Amman, Jordan

Authors: Asil Y. Zureigat, Ayat A. Oudat

Abstract:

Analyzing the old and bringing in the new is an ever-ongoing process in driving innovations in architecture. This paper looks at the excessive use of stone in apartment buildings in Amman and speculates on the existing possibilities of changing the cladding material. By looking at architectural exceptions present in Amman, the paper seeks to make the exception the rule, by adding new materials to the architectural library of Amman and in turn, project a series of possible new identities to the existing stone scape. Through distributing a survey, conducting a photographic study on exceptional buildings and shedding light on the historical narrative of stone, the paper highlights the ways in which new finishing materials such as plaster, paint and stone variations could be introduced in an attempt to project a new architectural identity to Amman.

Keywords: Architectural city identity, cladding materials, façade architecture, image of the city.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 587
246 Venice 17th Century: The Greek Ethnic Identity in Danger

Authors: T. Roussopoulos

Abstract:

At the end of the 17th Century the Greek orthodox Archbishop in Venice -Meletios Typaldos- decided to turn the doctrine of the orthodox Greeks into Catholicism. More than 5.000 Greeks were living in Venice then. Their leadership -the Greek confraternity- fought against Meletios. Participants in this conflict were the Pope, the ecumenical Patriarch in Constantinople and Peter the Great of Russia. All the play according to my opinion -which is followed by evidence and theoretical support is a strong conflict between the two actors -the Archbishop and the Confraternity- and the object of conflict is the change of the Greek orthodox beliefs to Catholicism. Ethnicity especially for Greeks of the era is identified with orthodoxy. So this was a conflict of identity. The results of that conflict were of tremendous importance to the Greeks in Venice and affected them for long.

Keywords: Greek ethnic identity, Meletios Typaldos, Confraternity, Venice Pope, Patriarch Constantinople Peter the Great Russia.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2544
245 Identity Management in Virtual Worlds Based on Biometrics Watermarking

Authors: S. Bader, N. Essoukri Ben Amara

Abstract:

With the technological development and rise of virtual worlds, these spaces are becoming more and more attractive for cybercriminals, hidden behind avatars and fictitious identities. Since access to these spaces is not restricted or controlled, some impostors take advantage of gaining unauthorized access and practicing cyber criminality. This paper proposes an identity management approach for securing access to virtual worlds. The major purpose of the suggested solution is to install a strong security mechanism to protect virtual identities represented by avatars. Thus, only legitimate users, through their corresponding avatars, are allowed to access the platform resources. Access is controlled by integrating an authentication process based on biometrics. In the request process for registration, a user fingerprint is enrolled and then encrypted into a watermark utilizing a cancelable and non-invertible algorithm for its protection. After a user personalizes their representative character, the biometric mark is embedded into the avatar through a watermarking procedure. The authenticity of the avatar identity is verified when it requests authorization for access. We have evaluated the proposed approach on a dataset of avatars from various virtual worlds, and we have registered promising performance results in terms of authentication accuracy, acceptation and rejection rates.

Keywords: Identity management, security, biometrics authentication and authorization, avatar, virtual world.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1656
244 The Innovation of English Materials to Communicate the Identity of Bangpoo, Samut Prakan Province, for Ecotourism

Authors: Kitda Praraththajariya

Abstract:

The main purpose of this research was to study how to communicate the identity of the Bangpoo, Samu tPrakan province for ecotourism. The qualitative data was collected through studying related materials, exploring the area, in-depth interviews with three groups of people: three directly responsible officers who were key informants of the district, twenty foreign tourists and five Thai tourist guides. A content analysis was used to analyze the qualitative data. The two main findings of the study were as follows:

  1. The identity of Bangpoo, Samut Prakan province. This establishment was near the Mouth of the Gulf of Thailand for normal people and tourists, consisting of rest accommodations. There are restaurants where food and drinks are served, rich mangrove forests, Banpoo seaside resort and mangrove trees. Bangpoo seaside resort is characterized by muddy beacheswhere the greatest number of seagulls can be seen from March to May each year.
  2. The communication of the identity of Bangpoo, Samut Prakan province which the researcher could find and design to present in English materials can be summed up in 3 items: 1) The history of Bangpoo, Samut Prakan province 2) The Learning center of Ecotourism: Seagulls and Mangrove forest 3) How to keep Banpoo, Samut Prakran province for ecotourism.

Keywords: Foreigner tourists, signified, semiotics, ecotourism.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1905
243 Providing a Secure, Reliable and Decentralized Document Management Solution Using Blockchain by a Virtual Identity Card

Authors: Meet Shah, Ankita Aditya, Dhruv Bindra, V. S. Omkar, Aashruti Seervi

Abstract:

In today's world, we need documents everywhere for a smooth workflow in the identification process or any other security aspects. The current system and techniques which are used for identification need one thing, that is ‘proof of existence’, which involves valid documents, for example, educational, financial, etc. The main issue with the current identity access management system and digital identification process is that the system is centralized in their network, which makes it inefficient. The paper presents the system which resolves all these cited issues. It is based on ‘blockchain’ technology, which is a 'decentralized system'. It allows transactions in a decentralized and immutable manner. The primary notion of the model is to ‘have everything with nothing’. It involves inter-linking required documents of a person with a single identity card so that a person can go anywhere without having the required documents with him/her. The person just needs to be physically present at a place wherein documents are necessary, and using a fingerprint impression and an iris scan print, the rest of the verification will progress. Furthermore, some technical overheads and advancements are listed. This paper also aims to layout its far-vision scenario of blockchain and its impact on future trends.

Keywords: Blockchain, decentralized system, fingerprint impression, identity management, iris scan.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1303
242 The Design of English Materials to Communicate the Identity of Mueang District, Samut Songkram for Ecotourism

Authors: Kitda Praraththajariya

Abstract:

The main purpose of this research was to study how to communicate the identity of the Mueang district, SamutSongkram province for ecotourism. The qualitative data was collected through studying related materials, exploring the area, in-depth interviews with three groups of people: three directly responsible officers who were key informants of the district, twenty foreign tourists and five Thai tourist guides. A content analysis was used to analyze the qualitative data. The two main findings of the study were as follows: 1. The identity of Amphur (District) Mueang, SamutSongkram province. This establishment was near the Mouth of Maekong River for normal people and tourists, consisting of rest accommodations. There are restaurants where food and drinks are served, rich mangrove forests, Hoy Lod (Razor Clam) and mangrove trees. Don Hoy Lod, is characterized by muddy beaches, is a coastal wetland for Ramsar Site. It is at 1099th ranging where the greatest number of Hoy Lod (Razor Clam) can be seen from March to May each year. 2. The communication of the identity of AmphurMueang, SamutSongkram province which the researcher could find and design to present in English materials can be summed up in 4 items: 1) The history of AmphurMueang, SamutSongkram province 2) WatPhetSamutWorrawihan 3) The Learning source of Ecotourism: Don Hoy Lod and Mangrove forest 4) How to keep AmphurMueang, SamutSongkram province for ecotourism.

Keywords: Foreigner tourists, signified, semiotics, ecotourism.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1849
241 Institutionalising Corporate Social Responsibility: A Study on the CSR Statements on Corporate Websites of Malaysian and Singapore Corporations

Authors: Shahrina Md Nordin, Zulhamri Abdullah, Yuhanis Abdul Aziz

Abstract:

The purpose of this paper is to examine the current state of corporate social responsibility statements on corporate websites of Malaysian and Singaporean corporations and analyze how the CSR statements contribute in building a unique corporate identity of corporations. Content analysis is employed to examine the websites of Malaysian and Singaporean consumer corporations. It is believed that generally most companies tend to publish and communicate their CSR statements visibly to general stakeholders. However, there is a significantly different outcome of the articulation of CSR on practices on websites between Malaysian and Singaporean consumer corporations. A number of Singaporean organizations were found less concerned with CSR practices as compared to Malaysian organizations. The findings indicate a need for corporations in Malaysia and Singapore to orchestrate their core competence of CSR activities in order to develop a unique corporate identity in a global business environment.

Keywords: Corporate identity, Corporate Social Responsibility, Asian country.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2572
240 A Note on Negative Hypergeometric Distribution and Its Approximation

Authors: S. B. Mansuri

Abstract:

In this paper, at first we explain about negative hypergeometric distribution and its properties. Then we use the w-function and the Stein identity to give a result on the poisson approximation to the negative hypergeometric distribution in terms of the total variation distance between the negative hypergeometric and poisson distributions and its upper bound.

Keywords: Negative hypergeometric distribution, Poisson distribution, Poisson approximation, Stein-Chen identity, w-function.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3087
239 A Textual Analysis of Prospective Teachers’ Social Justice Identity Development and LGBTQ Advocacy

Authors: Mi Ok Kang

Abstract:

This study examined the influences of including LGBTQ-related content in a multicultural teacher education course on the development of prospective teachers’ social justice identities. Appling a content analysis to 53 reflection texts written by participating prospective teachers in response to the relevant course content, this study deduced the stages of social justice identity development (naïve, acceptance, resistance, redefinition, and internalization) that participants reached during the course. The analysis demonstrated that the participants reached various stages in the social identity development model and none of the participants remained at the naïve stage during/after class. The majority (53%) of the participants reached the internalization stage during the coursework and became conscious about the heterosexual privileges they have had and aware of possible impacts of such privilege on their future LGBTQ students. Also the participants had begun to develop pedagogic action plans and devised applicable teaching strategies for their future students based on the new understanding of heteronormativity. We expect this study will benefit teacher educators and educational administrators who want to address LGBTQ-related issues in their multicultural education programs and/or revisit the goals, directions, and implications of their approach.

Keywords: LGBTQ, heteronormativity, social justice identity, teacher education, multicultural education, content analysis.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1409
238 Design of Collaborative Web System: Based on Case Study of PBL Support Systems

Authors: Kawai Nobuaki

Abstract:

This paper describes the design and implementation of web system for continuable and viable collaboration. This study proposes the improvement of the system based on a result of a certain practice. As contemporary higher education information environments transform, this study highlights the significance of university identity and college identity that are formed continuously through independent activities of the students. Based on these discussions, the present study proposes a practical media environment design which facilitates the processes of organizational identity formation based on a continuous and cyclical model. Even if users change by this system, the communication system continues operation and cooperation. The activity becomes the archive and produces new activity. Based on the result, this study elaborates a plan with a re-design by a system from the viewpoint of second-order cybernetics. Systems theory is a theoretical foundation for our study.

Keywords: Collaborative work, learning management system, second-order cybernetics, systems theory, user generated contents, viable system model.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 903
237 Measuring Principal and Teacher Cultural Competency: A Needs Assessment of Three Proximate PreK-5 Schools

Authors: Teresa Caswell

Abstract:

Throughout the United States and within a myriad of demographic contexts, students of color experience the results of systemic inequities as an academic outcome. These disparities continue despite the increased resources provided to students and ongoing instruction-focused professional learning received by teachers. We postulated that lower levels of educator cultural competency are an underlying factor of why resource and instructional interventions are less effective than desired. Before implementing any type of intervention, however, cultural competency needed to be confirmed as a factor in schools demonstrating academic disparities between racial subgroups. A needs assessment was designed to measure levels of individual beliefs, including cultural competency, in both principals and teachers at three neighboring schools verified to have academic disparities. The resulting mixed method study utilized the Optimal Theory Applied to Identity Development (OTAID) model to measure cultural competency quantitatively, through self-identity inventory survey items, with teachers and qualitatively, through one-on-one interviews, with each school’s principal. A joint display was utilized to see combined data within and across school contexts. Each school was confirmed to have misalignments between principal and teacher levels of cultural competency beliefs while also indicating that a number of participants in the self-identity inventory survey may have intentionally skipped items referencing the term oppression. Additional use of the OTAID model and self-identity inventory in future research and across contexts is needed to determine transferability and dependability as cultural competency measures.

Keywords: Cultural competency, identity development, mixed method analysis, needs assessment.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 177
236 The Design of English Materials to communication the Identity of Amphawa District, Samut Songkram Province, for Sustainable Tourism

Authors: K. Praraththajariya

Abstract:

The main purpose of this research was to study how to communicate the identity of the Amphawa district, Samut Songkram province for sustainable tourism. The qualitative data was collected through studying related materials, exploring the area, in-depth interviews with three groups of people: three directly responsible officers who were key informants of the district, twenty foreign tourists and five Thai tourist guides. A content analysis was used to analyze the qualitative data. The two main findings of the study were as follows: 1. The identity of the Amphawa District, Samut Songkram province is the area controlled by Amphawa sub district (submunicipality). The working unit which runs and looks after Amphawa sub district administration is known as the Amphawa mayor. This establishment was built to be a resort for normal people and tourists visiting the Amphawa district near the Maekong River consisting of rest accommodations. Along the river there is a restaurant where food and drinks are served, rich mangrove forests, a learning center, fireflies and cork trees. The Amphawa district was built to honor and commemorate King Rama II and is where the greatest number of fireflies and cork trees can be seen in Thailand from May to October each year. 2. The communication of the identity of Amphawa District, Samut Songkram Province which the researcher could find and design to present in English materials can be summed up in 5 items: 1) The history of the Amphawa District, Samut Songkram province 2) The history of King Rama II Memorial Park 3) The identity of Amphawa Floating Market 4) The Learning center of Ecosystem: Fireflies and Cork Trees 5) How to keep Amphawa District, Samut Songkram Province for sustainable tourism.

Keywords: Foreigner tourists, signified, semiotics, sustainable tourism.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1790
235 Design and Application of NFC-Based Identity and Access Management in Cloud Services

Authors: Shin-Jer Yang, Kai-Tai Yang

Abstract:

In response to a changing world and the fast growth of the Internet, more and more enterprises are replacing web-based services with cloud-based ones. Multi-tenancy technology is becoming more important especially with Software as a Service (SaaS). This in turn leads to a greater focus on the application of Identity and Access Management (IAM). Conventional Near-Field Communication (NFC) based verification relies on a computer browser and a card reader to access an NFC tag. This type of verification does not support mobile device login and user-based access management functions. This study designs an NFC-based third-party cloud identity and access management scheme (NFC-IAM) addressing this shortcoming. Data from simulation tests analyzed with Key Performance Indicators (KPIs) suggest that the NFC-IAM not only takes less time in identity identification but also cuts time by 80% in terms of two-factor authentication and improves verification accuracy to 99.9% or better. In functional performance analyses, NFC-IAM performed better in salability and portability. The NFC-IAM App (Application Software) and back-end system to be developed and deployed in mobile device are to support IAM features and also offers users a more user-friendly experience and stronger security protection. In the future, our NFC-IAM can be employed to different environments including identification for mobile payment systems, permission management for remote equipment monitoring, among other applications.

Keywords: Cloud service, multi-tenancy, NFC, IAM, mobile device.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1118
234 Acceptance of Health Information Application in Smart National Identity Card (SNIC) Using a New I-P Framework

Authors: Ismail Bile Hassan, Masrah Azrifah Azmi Murad

Abstract:

This study discovers a novel framework of individual level technology adoption known as I-P (Individual- Privacy) towards health information application in Smart National Identity Card. Many countries introduced smart national identity card (SNIC) with various applications such as health information application embedded inside it. However, the degree to which citizens accept and use some of the embedded applications in smart national identity remains unknown to many governments and application providers as well. Moreover, the factors of trust, perceived risk, Privacy concern and perceived credibility need to be incorporated into more comprehensive models such as extended Unified Theory of Acceptance and Use of Technology known as UTAUT2. UTAUT2 is a mainly widespread and leading theory up to now. This research identifies factors affecting the citizens’ behavioural intention to use health information application embedded in SNIC and extends better understanding on the relevant factors that the government and the application providers would need to consider in predicting citizens’ new technology acceptance in the future. We propose a conceptual framework by combining the UTAUT2 and Privacy Calculus Model constructs and also adding perceived credibility as a new variable. The proposed framework may provide assistance to any government planning, decision, and policy makers involving e-government projects. Empirical study may be conducted in the future to provide proof and empirically validate this I-P framework.

Keywords: Unified Theory of Acceptance and Use of Technology (UTAUT) model, UTAUT2 model, Smart National Identity Card (SNIC), Health information application, Privacy Calculus Model (PCM).

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3011
233 Identity of Cultural Food: A Case Study of Traditional Mon Cuisine in Bangkok, Thailand

Authors: S. Nitiworakarn

Abstract:

This research aims to identify traditional Mon cuisines as well as gather and classify traditional cuisines of Mon communities in Bangkok. The studying of this research is used by methodology of the quantitative research. Using the questionnaire as the method in collecting information from sampling totally amount of 450 persons analyzed via frequency, percentage and mean value. The results showed that a variety of traditional Mon cuisines of Bangkok could split into 6 categories of meat diet with 54 items and 6 categories of desserts with 19 items.

Keywords: Cultural identity, traditional food, Mon cuisine, Thailand.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3139
232 Preparation a Study on the Use of the Resident Registration Number and Alternatives for RRN

Authors: Hyejin Pak, Changsoo Kim, Healahng Choi

Abstract:

The resident registration number was adopted for the purposes of enhanced services for resident convenience and effective performance of governmental administrative affairs. However, it has been used for identification purposes customarily and irrationally in line with the development and spread of the Internet. In response to the growing concern about the leakage of collected RRNs and possible abuses of stolen RRNs, e.g. identity theft, for crimes, the Korean Communications Commission began to take legal/regulatory actions in 2011 to minimize the online collection and use of resident registration numbers. As the use of the RRN was limited after the revision of the Act on Promotion of Information and Communications Network Utilization and Information Protection, etc., online business providers were required to have alternatives to the RRN for the purpose of identifying the user's identity and age, in compliance with the law, and settling disputes with customers. This paper presents means of verifying the personal identity by taking advantage of the commonly used infrastructure and simply replacing personal information entered and stored, without requiring users to enter their RRNs.

Keywords: Resident Registration Numbers(RRNs), Alternative identification for RRNs.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1909
231 The Name of Thai Muslim Students: The Reflection of Value and Identity of Thai Muslim

Authors: Apichaya Kaewuthai

Abstract:

To study the meaning of Muslim name in order to analyze the underlining value and identity from first year to forth year Muslim students at Prince of Songkla University, Hatyai Campus. The questionnaires are employed as a main analytical tool to acquire the names from 80 Muslim students in four study years. The meanings of obtained names are subsequently analyzed and summarized base upon related documents to uncover the beneath value. The study reveals that name of male is derived from the name of prophet; Nabi Muhammad, merit, dignity, origins, leadership and the faith in Islam. For female, on the other hand, their names are related to virtue and beauty, cleanliness and peace, hope and flowers which comply with their characteristics. One of the reasons contribute to the principle of naming is the regulation of Ministry of Culture which states that the name should represent one’s nature and characters. The given name reflects value and identity of Muslim which can be classified into three categories including 1) Value related to belief in Islam 2) value related to relationship among families and relatives 3) value about relationship with nature and environment. All the above mentioned reflect Muslim value and identity vividly.    The name of Muslim students allows the researcher to perceive the perspective, belief and value in giving the name of Thai Muslim. Besides, it reveals social condition and their culture. It can also be the fundamental of studying the meaning of name in other races.

Keywords: The naming, Thai Muslim.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1297
230 Aspects of Semiotics in Contemporary Design: A Case Study on Dice Brand

Authors: Laila Zahran Mohammed Alsibani

Abstract:

The aim of the research is to understand the aspects of semiotics in contemporary designs by redesigning an Omani donut brand with localized cultural identity. To do so, visual identity samples of Dice brand of donuts in Oman has been selected to be a case study. This study conducted based on semiotic theory by using mixed method research tools which are: documentation analysis, interview and survey. The literature review concentrates on key areas of semiotics in visual elements used in the brand designs. Also, it spotlights on the categories of semiotics in visual design. In addition, this research explores the visual cues in brand identity. The objectives of the research are to investigate the aspects of semiotics in providing meaning to visual cues and to identify visual cues for each visual element. It is hoped that this study will have the contribution to a better understanding of the different ways of using semiotics in contemporary designs. Moreover, this research can be a reference for further studies in understanding and explaining current and future design trends. Future research can also focus on how brand-related signs are perceived by consumers.

Keywords: Brands, semiotics, visual arts, visual communication.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 181
229 Development of Personal and Social Identity in Immigrant Deaf Adolescents

Authors: Marialuisa Gennari, Giancarlo Tamanza, Ilaria Montanari

Abstract:

Identity development in adolescence is characterized by many risks and challenges, and becomes even more complex by the situation of migration and deafness. In particular, the condition of the second generation of migrant adolescents involves the comparison between the family context in which everybody speaks a language and deals with a specific culture (usually parents’ and relatives’ original culture), the social context (school, peer groups, sports groups), where a foreign language is spoken and a new culture is faced, and finally in the context of the “deaf” world. It is a dialectic involving unsolved differences that have to be treated in a discontinuous process, which will give complex outcomes and chances depending on the process of elaboration of the themes of growth and development, culture and deafness. This paper aims to underline the problems and opportunities for each issue which immigrant deaf adolescents must deal with. In particular, it will highlight the importance of a multifactorial approach for the analysis of personal resources (both intra-psychic and relational); the level of integration of the family of origin in the migration context; the elaboration of the migration event, and finally, the tractability of the condition of deafness. Some psycho-educational support objectives will be also highlighted for the identity development of deaf immigrant adolescents, with particular emphasis on the construction of the adolescents’ useful abilities to decode complex emotions, to develop self-esteem and to get critical thoughts about the inevitable attempts to build their identity. Remarkably, and of importance, the construction of flexible settings which support adolescents in a supple, “decentralized” way in order to avoid the regressive defenses that do not allow for the development of an authentic self.

Keywords: Immigrant deaf adolescents, identity development, personal and social challenges, psycho-educational support.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1540
228 A Book Cover as an Expression of Conceptualization and a Tool of Social Identity Construction: The Interpretation Based on the Example of G. Ritzer's book McDonaldization of Society

Authors: Jiří Pavelka

Abstract:

The study is based on the assumption that media products are appropriate subjects for the exploration of social and cultural identities as a keystone of value orientations of their authors, producers and target audiences. The research object of the study is the title page of the book cover of a professional publication that serves as a medium of marketing, scientific and intercultural communication, which is the result of semiotic and intercultural transfer. The study aims to answer the question whether the book cover is an expression of conceptualization and tool for social identity construction. It attempts to determine what value orientations and what concepts of social and cultural identities are hidden in the narrative structures of the book cover of the Czech translation of the book by G. Ritzer The McDonaldization of Society (1993), issued after the fall of the iron curtain in 1996 in the Czech Republic.

Keywords: Social and cultural identity, book cover, marketing communication, semiotic and intercultural transfer, narrative structure, the McDonaldisation of Society.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1891
227 The Political Biographies of Social Workers: A Qualitative Study of the Political Lives of Social Workers

Authors: Hefin Gwilym

Abstract:

This paper will explore the political biographies of social workers in a neoliberal era. The findings are based on a research project for a successfully completed professional doctorate in social work. The methodology deployed for the research is a combination of constructivist grounded theory and biographical inquiry. The paper will present findings from 14 biographical interviews and will focus on one case study of a participant whose life story is richly informed by political social work. The 14 participants reflect different genders, ethnic identities, cultural and linguistic identities, age and length of social work careers. The participants also reflect different forms of political engagement, such as, as political activists and members of political parties, including parliamentarians. The findings demonstrate how deeply ingrained the social work identity is amongst the participants and how their political identity has remained strongly social democratic in nature despite the many changes in the social work profession since the rise of neoliberalism as a thought collective and policy package. The individual case study will explore the early roots of political identity in the childhood and nurturing years and the interface with subsequent social work and political careers. It will also explore the evolution of the participant’s political identity in the social work career. The case study will also present findings on how the participant has contributed to the political field with policy involvement and initiatives. The presentation will conclude with a discussion on how this particular group of social workers can best contribute to the future direction of the social work profession.

Keywords: Political social work, political biographies, neoliberal, grounded theory.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 897
226 Borderline Personality Organization and the Interpersonal Components of Perfectionism: A Review of Two Overlapping Personality Pathologies

Authors: Heather M. Roxborough, Paul L. Hewitt, Gordon L. Flett, Jasmin Abizadeh

Abstract:

This work represents the first review paper to explore the relationship between perfectionistic personality and borderline personality organization. The developmental origins, identity diffusion, interpersonal difficulties, and defense mechanisms that are common to both borderline personality and the interpersonal components of perfectionism are explored, and existing research on perfectionism and borderline personality is reviewed. The importance of the link between perfectionism and borderline features is discussed in terms of its contribution to the conceptual understanding of personality pathology as well as to applied clinical practices.

Keywords: Borderline personality organization, defenses, identity, interpersonal problems, perfectionism.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3604
225 Enhancing Security in Resource Sharing Using Key Holding Mechanism

Authors: M. Victor Jose, V. Seenivasagam

Abstract:

This paper describes a logical method to enhance security on the grid computing to restrict the misuse of the grid resources. This method is an economic and efficient one to avoid the usage of the special devices. The security issues, techniques and solutions needed to provide a secure grid computing environment are described. A well defined process for security management among the resource accesses and key holding algorithm is also proposed. In this method, the identity management, access control and authorization and authentication are effectively handled.

Keywords: Grid security, Irregular binary series, Key holding mechanism, Resource identity, Secure resource access.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1725
224 Disidentification of Historical City Centers: A Comparative Study of the Old and New Settlements of Mardin, Turkey

Authors: Fatma Kürüm Varolgüneş, Fatih Canan

Abstract:

Mardin is one of the unique cities in Turkey with its rich cultural and historical heritage. Mardin’s traditional dwellings have been affected both by natural data such as climate and topography and by cultural data like lifestyle and belief. However, in the new settlements, housing is formed with modern approaches and unsuitable forms clashing with Mardin’s culture and environment. While the city is expanding, traditional textures are ignored. Thus, traditional settlements are losing their identity and are vanishing because of the rapid change and transformation. The main aim of this paper is to determine the physical and social data needed to define the characteristic features of Mardin’s old and new settlements. In this context, based on social and cultural data, old and new settlement formations of Mardin have been investigated from various aspects. During this research, the following methods have been utilized: observations, interviews, public surveys, literature review, as well as site examination via maps, photographs and questionnaire methodology. In conclusion, this paper focuses on how changes in the physical forms of cities affect the typology and the identity of cities, as in the case of Mardin.

Keywords: Urban and local identity, historical city center, traditional settlements, Mardin, Turkey.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1042
223 Student Records Management System Using Smart Cards and Biometric Technology for Educational Institutions

Authors: Patrick O. Bobbie, Prince S. Attrams

Abstract:

In recent times, the rapid change in new technologies has spurred up the way and manner records are handled in educational institutions. Also, there is a need for reliable access and ease-of use to these records, resulting in increased productivity in organizations. In academic institutions, such benefits help in quality assessments, institutional performance, and assessments of teaching and evaluation methods. Students in educational institutions benefit the most when advanced technologies are deployed in accessing records. This research paper discusses the use of biometric technologies coupled with smartcard technologies to provide a unique way of identifying students and matching their data to financial records to grant them access to restricted areas such as examination halls. The system developed in this paper, has an identity verification component as part of its main functionalities. A systematic software development cycle of analysis, design, coding, testing and support was used. The system provides a secured way of verifying student’s identity and real time verification of financial records. An advanced prototype version of the system has been developed for testing purposes.

Keywords: Biometrics, fingerprints, identity-verification, smartcards.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2052
222 Transgenerational Entrepreneurship in Chinese Family Businesses: Proposal for a Model of Work-Life Synergy

Authors: Jenny Oliveros Lao Phillips, Arturo E. Osorio, José Alves

Abstract:

Family business are the dominant form of business in the world, and Chinese family business (CFB) is a unique type of family business that relies on collective action to survive. This paper argues that in CFBs, entrepreneurial actions are transgenerational collective endeavors, and successors are groomed as stewards of the family legacy. Work-life relationship in CFBs is about synergy and not balance because the family identity is the business identity, and vice-versa. Using five in-depth case studies, this research introduces an alternative understanding of CFBs and proposes a model of work-life synergy in transgenerational entrepreneurship based on discussion of five theory-based propositions. This model explains that through emphasizing on the business family’s shared value and entrepreneurial legacy, elements of trust, shared identity and stewardship of family members are enhanced which leads to collective action and goal of the business family, resulting in transgenerational entrepreneurship. Limitations and future research are presented.

Keywords: Chinese family business, family legacy, stewardship, transgenerational entrepreneurship, work-life synergy.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 948
221 Nationalist Approach to the Music Culture in Early Republican Period in Turkey

Authors: Hilmi Yazici

Abstract:

The more homogenized population taken over by the Republic immediately after the Ottoman was being canalized towards the goal of national identity and the historical and cultural structure of the nation was being readdressed and redefined. Modernization and Westernization history of the new Turkey, which started with Ottoman reforms and took its final form with the Kemalist nation-state, politically resulted in transformation from a multinational empire to a “nation-state” and adopted reaching to the level of Western civilizations as a sociology ideal. This objective of change will be achieved, on the one hand, by finding the Turkish culture which was preserved only by the society and by instilling Western civilization to national culture, on the other hand.  In line with this, it is seen that in musical considerations while Turkish folk music was accepted and adopted as an indispensible part of Turkish identity, Turkish classical music was refused on the ground that it was not a part of Turkish identity. Again in this period, it is seen that with the notion of cultural reform, which is a part of “nation building”, the desire to create a national music to be performed with Western techniques brought along deliberate interventions to folk music.

Keywords: Folk song, Nationalism, National music, nation-state, Turkish music.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1995
220 EUDIS-An Encryption Scheme for User-Data Security in Public Networks

Authors: S. Balaji, M. Rajaram

Abstract:

The method of introducing the proxy interpretation for sending and receiving requests increase the capability of the server and our approach UDIV (User-Data Identity Security) to solve the data and user authentication without extending size of the data makes better than hybrid IDS (Intrusion Detection System). And at the same time all the security stages we have framed have to pass through less through that minimize the response time of the request. Even though an anomaly detected, before rejecting it the proxy extracts its identity to prevent it to enter into system. In case of false anomalies, the request will be reshaped and transformed into legitimate request for further response. Finally we are holding the normal and abnormal requests in two different queues with own priorities.

Keywords: IDS, Data & User authentication, UDIS.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1854