52 resultados para ”we” identity


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Satanism in the Finnish Youth Culture of the 1990s The aim of this study was to investigate Satanism among Finnish youth in the 1990s. Thematic interviews of young Finnish Satanists are the basic material of this study. The research employs a theoretical framework derived from narrative psychology and the role-theoretical thinking of Dan P. McAdams. The young Satanists in Finland have been divided into two different groups: the criminal and drug using "devil-worshipping gangs"; and the more educated and philosophically oriented "Satanists" (Heino 1993). What can we say about this division? In the 1990s around Finland, there were young people calling themselves as devil- worshippers (either singular or in groups). They were strongly committed to a mythical devilish and cosmic battle, which they believed was going on in this world. They had problems with their mental health, also in their family socialization and peer groups. In their personal attitudes they were either active fighters or passive tramps. There were also rationally oriented young Satanists, that were ritually active and mainly atheistic. They strongly expressed their personal experiences of being individual and of being different than others. In their personal attitudes they were critical fighters and active survivors. They saw their lives through the satanistic 'finding-oneself experience'. They understood themselves as a "postmodern tribe" (Michel Maffesoli's sosiocultural concept): their sense of themselves was that of a dynamic collectivity which is social, dynamic, nonlocal and mythically historical. Death and black metal culture in the 1990s formed a common space for youth culture, where young individuals could work out their feelings and express their attitudes to life using dark satanic themes and symbols. The sense of "otherness" (also other than satanic) and collective demands for authenticity were essential tools that were used for identity work here. Personal disengagement from satanic/satanistic groups were observed to be gradual or quite rapid. Religious conversions back-and-forth also accured. At the end of the 1990s all off satanism in Finland bore a negative devil-worshipping stigma. Ritual homicide in South-Finland (Kerava/Hyvinkää) was connected to Satanism, which then became unpopular both in the personal life stories and alternative youth cultural circles at the beginning of the 2000s.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Previous scholarship has often maintained that the Gospel of Philip is a collection of Valentinian teachings. In the present study, however, the text is read as a whole and placed into a broader context by searching for parallels from other early Christian texts. Although the Valentinian Christian identity of the Gospel of Philip is not questioned, it is read alongside those texts traditionally labelled as "mainstream Christian". It is obvious from the account of Irenaeus that the boundaries between the Valentinians and other Christians were not as clear or fixed as he probably would have hoped. This study analyzes the Valentinian Christian Gospel of Philip from two points of view: how the text constructs the Christian identity and what kind of Christianity it exemplifies. Firstly, it is observed how the author of the Gospel of Philip places himself and his Christian readers among the early Christianities of the period by emphasizing the common history and Christian features but building especially on particular texts and traditions. Secondly, it is noted how the Christian nature of an individual develops according to the Gospel of Philip. The identity of an individual is built and strengthened through rituals, experiences and teaching. Thirdly, the categorizations, attributes, beliefs and behaviour associated on the one hand with the "insiders", the true Christians, and, on the other, with outsiders in the Gospel of Philip, are analyzed using social identity theory the insiders and outsiders are described through stereotyping in the text. Overall, the study implies that the Gospel of Philip strongly emphasizes spiritual progress and transformation. Rather than depicting the Valentinians as the perfect Christians, it underlines their need for constant change and improvement. Although the author seeks to clearly distinguish the insiders from the outsiders, the boundaries of the categories are in fact fluid in the Gospel of Philip. Outsiders can become insiders and the insiders are also in danger of falling out again.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

National identity signifies and makes state s defence- and foreign policy behaviour meaningful. National consciousness is narrated into existence by narratives upon one s own exceptionalism and Otherness of the other nations. While national identity may be understood merely as a self-image of a nation, defence identity refers to the borders of Otherness and issues that have been considered as worth defending for. As national identities and all the world order models are human constructions, they may be changed by the human efforts as well; states and nations may deliberately promote communitarian or even cosmopolitan equality and tolerance without borders of Otherness. The main research question of the thesis is: How does Poland constitute herself as a nation and a state agent in the current world order and to what extent have contextual foreign and defence policy interactions changed the Polish defence identity during the post-Cold War era? The main empirical argument of the thesis is: Poland is a narrated idea of a Christian Catholic nation-state, which the Polish State, the Catholic Church of Poland, the Armed Forces of Poland as well as a majority of the Polish nation share. Polish defence identity has been almost impenetrable to contextual foreign and defence policy interactions during the post-Cold War era. While Christian religious ontology binds corporate Poland together, allowing her to survive any number of military and political catastrophes, it simultaneously brings her closer to the USA, raises tensions in the infidel EU-context, and restrains corporate Poland s pursuit of communitarian, or even cosmopolitan, global equality and tolerance. It is not the case that corporate Poland s foreign and defence policy orientation is instinctively Atlanticist by nature, as has been argued. Rather, it has been the State s rational project to overcome a habituated and reified fear of becoming geopolitically sandwiched between Russian and German Others by leaning on the USA; among the Polish nation, support for the USA has been declining since 2004. It is not corporate Poland either that has turned into a constructive European , as has been argued, but rather the Polish nation that has, at least partly, managed to emancipate itself from its habituation to a betrayal by Europe narrative, since it favours the EU as much as it favours NATO. It seems that in the Polish case a truly common European CFSP vis-à-vis Russia may offer a solution that will emancipate the Polish State from its habituated EU-sceptic role identity and corporate Poland from its narrated borders of Otherness towards Russia and Germany, but even then one cannot be sure whether any other perspective than the Polish one on a common stand towards Russia would satisfy the Poles themselves.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Eukaryotic cells are characterized by having a subset of internal membrane compartments, each one with a specifi c identity, structure and function. Proteins destined to be targeted to the exterior of the cell need to enter and progress through the secretory pathway. Transport of secretory proteins from the endoplasmic reticulum (ER) to the Golgi takes place by the selective packaging of proteins into COPII-coated vesicles at the ER membrane. Taking advantage of the extensive genetic tools available for S. cerevisiae we found that Hsp150, a yeast secretory glycoprotein, selectively exited the ER in the absence of any of the three Sec24p family members. Sec24p has been thought to be an essential component of the COPII coat and thus indispensable for exocytic membrane traffic. Next we analyzed the ability of Hsp150 to be secreted in mutants, where post-Golgi transport is temperature sensitive. We found that Hsp150 could be selectively secreted under conditions where the exocyst component Sec15p is defective. Analysis of the secretory vesicles revealed that Hsp150 was packaged into a subset of known secretory vesicles as well as in a novel pool of secretory vesicles at the level of the Golgi. Secretion of Hsp150 in the absence of Sec15p function was dependent of Mso1p, a protein capable of interacting with vesicles intended to fuse with the plasma membrane, with the SNARE machinery and with Sec1p. This work demonstrated that Hsp150 is capable of using alternative secretory pathways in ER-to-Golgi and Golgi-to-plasma membrane traffi c. The sorting signals, used at both stages of the secretory pathway, for secretion of Hsp150 were different, revealing the highly dynamic nature and spatial organization of the secretory pathway. Foreign proteins usually misfold in the yeast ER. We used Hsp150 as a carrier to assist folding and transport of heterologous proteins though the secretory pathway to the culture medium in both S. cerevisiae and P. pastoris. Using this technique we expressed Hsp150Δ-HRP and developed a staining procedure, which allowed the visualization of the organelles of the secretory pathway of S. cerevisiae.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This thesis work focuses on the role of TGF-beta family antagonists during the development of mouse dentition. Tooth develops through an interaction between the dental epithelium and underlying neural crest derived mesenchyme. The reciprocal signaling between these tissues is mediated by soluble signaling molecules and the balance between activatory and inhibitory signals appears to be essential for the pattern formation. We showed the importance of Sostdc1 in the regulation of tooth shape and number. The absence of Sostdc1 altered the molar cusp patterning and led to supernumerary tooth formation both in the molar and incisor region. We showed that initially, Sostdc1 expression is in the mesenchyme, suggesting that dental mesenchyme may limit supernumerary tooth induction. We tested this in wild-type incisors by minimizing the amount of mesenchymal tissue surrounding the incisor tooth germs prior to culture in vitro. The cultured teeth phenocopied the extra incisor phenotype of the Sostdc1-deficient mice. Furthermore, we showed that minimizing the amount of dental mesenchyme in cultured Sostdc1-deficient incisors caused the formation of additional de novo incisors that resembled the successional incisor development resulting from activated Wnt signaling. Sostdc1 seemed to be able to inhibit both mesenchymal BMP4 and epithelial canonical Wnt signaling, which thus allows Sostdc1 to restrict the enamel knot size and regulate the tooth shape and number. Our work emphasizes the dual role for the tooth mesenchyme as a suppressor as well as an activator during tooth development. We found that the placode, forming the thick mouse incisor, is prone to disintegration during initiation of tooth development. The balance between two mesenchymal TGF-beta family signals, BMP4 and Activin is essential in this regulation. The inhibition of BMP4 or increase in Activin signaling led to the splitting of the large incisor placode into two smaller placodes resulting in thin incisors. These two signals appeared to have different effects on tooth epithelium and the analysis of the double null mutant mice lacking Sostdc1 and Follistatin indicated that these TGF-beta inhibitors regulate the mutual balance of BMP and Activin in vivo. In addition, this work provides an alternative explanation for the issue of incisor identity published in Science by Tucker et al. in 1998 and proposes that the molar like morphology that can be obtained by inhibiting BMP signaling is due to partial splitting of the incisor placodes and not due to change in tooth identity from the incisor to the molar. This thesis work presents possible molecular mechanisms that may have modified the mouse dental pattern during evolution leading to the typical rodent dentition of modern mouse. The rodent dentition is specialized for gnawing and consists of two large continuously growing incisors and toothless diastema region separating the molars and incisors. The ancestors of rodents had higher number of more slender incisors together with canines and premolars. Additionally, murine rodents, which include the mouse, have lost their ability for tooth replacement. This work has revealed that the inhibitory molecules appear to play a role in the tooth number suppression by delineating the spatial and temporal action of the inductive signals. The results suggest that Sostdc1 plays an essential role in several stages of tooth development through the regulation of both the BMP and Wnt pathway. The work shows a dormant sequential tooth forming potential present in wild type mouse incisor region and gives a new perspective on tooth suppression by dental mesenchyme. It reveals as well a novel mechanism to create a large mouse incisor through the regulation of mesenchymal balance between inductive and inhibitory signals.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Angiosperms represent a huge diversity in floral structures. Thus, they provide an attractive target for comparative developmental genetics studies. Research on flower development has focused on few main model plants, and studies on these species have revealed the importance of transcription factors, such as MADS-box and TCP genes, for regulating the floral form. The MADS-box genes determine floral organ identities, whereas the TCP genes are known to regulate flower shape and the number of floral organs. In this study, I have concentrated on these two gene families and their role in regulating flower development in Gerbera hybrida, a species belonging to the large sunflower family (Asteraceae). The Gerbera inflorescence is comprised of hundreds of tightly clustered flowers that differ in their size, shape and function according to their position in the inflorescence. The presence of distinct flower types tells Gerbera apart from the common model species that bear only single kinds of flowers in their inflorescences. The marginally located ray flowers have large bilaterally symmetrical petals and non-functional stamens. The centrally located disc flowers are smaller, have less pronounced bilateral symmetry and carry functional stamens. Early stages of flower development were studied in Gerbera to understand the differentiation of flower types better. After morphological analysis, we compared gene expression between ray and disc flowers to reveal transcriptional differences in flower types. Interestingly, MADS-box genes showed differential expression, suggesting that they might take part in defining flower types by forming flower-type-specific regulatory complexes. Functional analysis of a CYCLOIDEA-like TCP gene GhCYC2 provided evidence that TCP transcription factors are involved in flower type differentiation in Gerbera. The expression of GhCYC2 is ray-flower-specific at early stages of development and activated only later in disc flowers. Overexpression of GhCYC2 in transgenic Gerbera-lines causes disc flowers to obtain ray-flower-like characters, such as elongated petals and disrupted stamen development. The expression pattern and transgenic phenotypes further suggest that GhCYC2 may shape ray flowers by promoting organ fusion. Cooperation of GhCYC2 with other Gerbera CYC-like TCP genes is most likely needed for proper flower type specification, and by this means for shaping the elaborate inflorescence structure. Gerbera flower development was also approached by characterizing B class MADS-box genes, which in the main model plants are known regulators of petal and stamen identity. The four Gerbera B class genes were phylogenetically grouped into three clades; GGLO1 into the PI/GLO clade, GDEF2 and GDEF3 into the euAP3 clade and GDEF1 into the TM6 clade. Putative orthologs for GDEF2 and GDEF3 were identified in other Asteraceae species, which suggests that they appeared through an Asteraceae-specific duplication. Functional analyses indicated that GGLO1 and GDEF2 perform conventional B-function as they determine petal and stamen identities. Our studies on GDEF1 represent the first functional analysis of a TM6-like gene outside the Solanaceae lineage and provide further evidence for the role of TM6 clade members in specifying stamen development. Overall, the Gerbera B class genes showed both commonalities and diversifications with the conventional B-function described in the main model plants.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Although immensely complex, speech is also a very efficient means of communication between humans. Understanding how we acquire the skills necessary for perceiving and producing speech remains an intriguing goal for research. However, while learning is likely to begin as soon as we start hearing speech, the tools for studying the language acquisition strategies in the earliest stages of development remain scarce. One prospective strategy is statistical learning. In order to investigate its role in language development, we designed a new research method. The method was tested in adults using magnetoencephalography (MEG) as a measure of cortical activity. Neonatal brain activity was measured with electroencephalography (EEG). Additionally, we developed a method for assessing the integration of seen and heard syllables in the developing brain as well as a method for assessing the role of visual speech when learning phoneme categories. The MEG study showed that adults learn statistical properties of speech during passive listening of syllables. The amplitude of the N400m component of the event-related magnetic fields (ERFs) reflected the location of syllables within pseudowords. The amplitude was also enhanced for syllables in a statistically unexpected position. The results suggest a role for the N400m component in statistical learning studies in adults. Using the same research design with sleeping newborn infants, the auditory event-related potentials (ERPs) measured with EEG reflected the location of syllables within pseudowords. The results were successfully replicated in another group of infants. The results show that even newborn infants have a powerful mechanism for automatic extraction of statistical characteristics from speech. We also found that 5-month-old infants integrate some auditory and visual syllables into a fused percept, whereas other syllable combinations are not fully integrated. Auditory syllables were paired with visual syllables possessing a different phonetic identity, and the ERPs for these artificial syllable combinations were compared with the ERPs for normal syllables. For congruent auditory-visual syllable combinations, the ERPs did not differ from those for normal syllables. However, for incongruent auditory-visual syllable combinations, we observed a mismatch response in the ERPs. The results show an early ability to perceive speech cross-modally. Finally, we exposed two groups of 6-month-old infants to artificially created auditory syllables located between two stereotypical English syllables in the formant space. The auditory syllables followed, equally for both groups, a unimodal statistical distribution, suggestive of a single phoneme category. The visual syllables combined with the auditory syllables, however, were different for the two groups, one group receiving visual stimuli suggestive of two separate phoneme categories, the other receiving visual stimuli suggestive of only one phoneme category. After a short exposure, we observed different learning outcomes for the two groups of infants. The results thus show that visual speech can influence learning of phoneme categories. Altogether, the results demonstrate that complex language learning skills exist from birth. They also suggest a role for the visual component of speech in the learning of phoneme categories.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The study in its entirety focused on factors related to adolescents decisions concerning drug use. The term drug use is taken here to include the use of tobacco products, alcohol, narcotics, and other addictive substances. First, the reasons given for drug use (attributions) were investigated. Secondly, the influence of personal goals, the beliefs involved in decision making, psychosocial adjustment including body image and involvement with peers, and parental relationships on drug use were studied. Two cohorts participated in the study. In 1984, a questionnaire on reasons for drug use was administered to a sample of adolescents aged 14-16 (N=396). A further questionnaire was administered to another sample of adolescents aged 14-16 (N=488) in 1999. The results for both cohorts were analyzed in Articles I and II. In Articles III and IV further analysis was carried out on the second cohort (N=488). The research report presented here provides a synthesis of all four articles, together with material from a further analysis. In a comparison of the two cohorts it was found that the attributions for drug use had changed considerably over the intervening fifteen-year period. In relation to alcohol and narcotics use an increase was found in reasons involving inner subjective experiences, with mention of the good feeling and fun resulting from alcohol and narcotics use. In addition, the goals of alcohol consumption were increasingly perceived as drinking to get drunk, and for its own sake. The attributions for the adolescents own smoking behavior were quite different from the attributions for smoking by others. The attributions were only weakly influenced by the participants gender or by their smoking habits, either in 1984 or 1999. In relation to participants own smoking, the later questionnaire elicited more mention of inner subjective experiences involving "good feeling. In relation to the perceived reasons for other people s smoking, it elicited more responses connected with the notion of "belonging. In the second sample, the results indicated that the levels of body satisfaction among adolescent girls are lower than those among adolescent boys. Overall, dissatisfaction with one's physical appearance seemed to relate to drug use. Girls were also found to engage in more discussions than boys; this applied to (i) discussion with peers (concerning both intimate and general matters), and (ii) discussion with parents (concerning general matters). However, more than a quarter of the boys (out of the entire population) reported only low intimacy with both parents and peers. If both drinking and smoking were considered, it seemed that girls in particular who reported drinking and smoking also reported high intimacy with parents and peers. Boys who reported drinking and smoking reported only medium intimacy with parents and peers. In addition, having an intimate relationship with one's peers was associated with a greater tendency to drink purely in order to get drunk. Overall, the results seemed to suggest that drug use is connected with a close relationship with peers and (surprisingly) with a close relationship with parents. Nevertheless, there were also indications that to some extent peer relationships can also protect adolescents from smoking and alcohol use. The results, which underline the complexity of adolescent drug use, are taken up in the Discussion section. It may be that body image and/or other identity factors play a more prominent role in all drug use than has previously been acknowledged. It does appear that in the course of planning support campaigns for adolescents at risk of drug use, we should focus more closely on individuals and their inner world. More research on this field is clearly needed, and therefore some ideas for future research are also presented.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

”Does the community really count? – identity process and social capital as elements in surviving in insecurity and uncertainty” is a combination of five articles. The aim of this study is to answer the question: how or in which ways is it possible to find the role of identity process and social capital in surviving in insecurity and uncertainty? In the introduction part the concepts of community and social capital are examined. Then I will study the articles and try to find out what kinds of elements of identity process and social capital in them can be found in order to survive in the societal change. The study consists of the introduction part and the articles. The articles are: 1. “Is Becoming a Researcher Some Kind of Role-playing” - Roles of the Researcher in the Process of Forming the Identity 2. What Composes Collective Identity in the Polytechnic Community? 3. Opportunities to Succeed or Fear of Failure? -Entrepreneurship from the Youngsters` Point of View 4. Learning Risk-taking Competences 5. “Bricolage”, or Just Putting Things Together? The starting point for the study is the feeling of insecurity that surrounds a person living in the present society: you cannot be sure with whom you are going to co-operate tomorrow. In the “Good Old Days” the harmonious communities “protected” their members and worked strongly toward common aims. Nowadays, partly because of urbanisation, we are so busy that we only have time to take care of ourselves, or rather to say: just of myself. As Bauman (2001) puts it: people turn to communities in which they feel like home. They still long for communality. For Mead (1962) the group and the communality plays a big role: a person needs others to become the whole ”Self.” In acting with others a person can gain much more than working alone (Field 2003). But, as Day (2006) puts it, the reality of community as discovered by empirical reserach is a great deal messier than the abstract and idealized versions used by theorists. Keywords: uncertainty, insecurity, communality, identity process, social capital, significant groups, survival.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The goal of the study is to build an image of deafness and of the lives of the deaf from their own per-spectives. The lives of deaf sign language users are analysed through the concept of identity. The start-ing point for the study is the idea that identities are moulded and structured in action and interaction and are, therefore, continuous processes. The terminology and ideas used in the present study are mostly based on Erving Goffman s (1971, 1986) work in which he sees identity as a representation of self. Via our language and our actions we build and present an image of ourselves to others and to ourselves alike. The research aims at answering the following questions concerning the lives of deaf sign language users: how do deaf people build an image of themselves as deaf people, what kind of meanings does deafness acquire in their lives, and what opportunities do they have to be perceived by others as they feel they are, i.e. to present their true self . In order to answer these questions, the narratives provided by eighteen deaf young adults, aged 25 35, in narrative interviews carried out in sign language, have been analysed. The methodology used is that of a data-based, qualitative analysis and narrative analy-sis. The study follows the lines of prior qualitative research carried out in the field of sociology of health and in the study of everyday life. The subjects are divided into three groups according to the linguistic environment dominant in the family: 1) a deaf child in a deaf family, 2) a deaf child in a hearing family using sign language, and 3) a deaf child in a hearing family where sign language was not used. The childhood family has great significance in the way a child constructs his or her identity as a deaf person. The process of construct-ing an identity in the first group can be defined as being automatic or inherited, in the second group the process can be described as being a collective/joint identity-building process, whereas in the third group the process is ambivalent and delayed. The opportunities the deaf have in building their identi-ties as deaf people have been examined through the concept of a collective story reservoir. Research shows that the deaf have, at least partly, a different collective story reservoir that they can rely on from the one the hearing have. Interaction with other deaf people and access to the collective story reservoir is important, because it enables the deaf to form an idea of their own deafness and the life of a deaf person. Three different ways of understanding deafness can be conceptualized from the narratives of the inter-viewed deaf people. In the outdated counter-narrative and the reductive narrative of deafness as an abnormality, the subjects are not capable of seeing themselves as forming part of the narratives or identifying themselves with the ways the deaf are depicted. Yet, the characterizations prevalent in them are the ones that the deaf constantly come across in their day-to-day lives. The narrative through which the subjects depict themselves and their lives can be defined as a pluralistic narrative. The plu-ralistic narrative consists of three elements: the coexistence of the world of the deaf and that of the hearing, the orientation to sign language, and the replacement of local networks with global networks. Although modern Finnish society and its varied social services and subsidy systems enable the realiza-tion of the kind of life described in the pluralistic narrative, the issues of power and inequality still frequently emerge in the narratives in which the deaf young adults described themselves and their lives. Two kinds of power mechanisms can be perceived in the descriptions: belittling and excluding power. These considerably diminish the opportunities of sign language users to create the kind of life that would reflect their personalities while limiting the chances for presenting the self to others.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this thesis I examine the U.S. foreign policy discussion that followed the war between Russia and Georgia in August 2008. In the politically charged setting that preceded the presidential elections, the subject of the debate was not only Washington's response to the crisis in the Caucasus but, more generally, the direction of U.S. foreign policy after the presidency of George W. Bush. As of November 2010, the reasons for and consequences of the Russia-Georgia war continue to be contested. My thesis demonstrates that there were already a number of different stories about the conflict immediately after the outbreak of hostilities. I want to argue that among these stories one can discern a “neoconservative narrative” that described the war as a confrontation between the East and the West and considered it as a test for Washington’s global leadership. I draw on the theory of securitization, particularly on a framework introduced by Holger Stritzel. Accordingly, I consider statements about the conflict as “threat texts” and analyze these based on the existing discursive context, the performative force of the threat texts and the positional power of the actors presenting them. My thesis suggests that a notion of narrativity can complement Stritzel’s securitization framework and take it further. Threat texts are established as narratives by attaching causal connections, meaning and actorship to the discourse. By focusing on this process I want to shed light on the relationship between the text and the context, capture the time dimension of a speech act articulation and help to explain how some interpretations of the conflict are privileged and others marginalized. I develop the theoretical discussion through an empirical analysis of the neoconservative narrative. Drawing on Stritzel’s framework, I argue that the internal logic of the narrative which was presented as self-evident can be analyzed in its historicity. Asking what was perceived to be at stake in the conflict, how the narrative was formed and what purposes it served also reveals the possibility for alternative explanations. My main source material consists of transcripts of think tank seminars organized in Washington, D.C. in August 2008. In addition, I resort to the foreign policy discussion in the mainstream media.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

As the virtual world grows more complex, finding a standard way for storing data becomes increasingly important. Ideally, each data item would be brought into the computer system only once. References for data items need to be cryptographically verifiable, so the data can maintain its identity while being passed around. This way there will be only one copy of the users family photo album, while the user can use multiple tools to show or manipulate the album. Copies of users data could be stored on some of his family members computer, some of his computers, but also at some online services which he uses. When all actors operate over one replicated copy of the data, the system automatically avoids a single point of failure. Thus the data will not disappear with one computer breaking, or one service provider going out of business. One shared copy also makes it possible to delete a piece of data from all systems at once, on users request. In our research we tried to find a model that would make data manageable to users, and make it possible to have the same data stored at various locations. We studied three systems, Persona, Freenet, and GNUnet, that suggest different models for protecting user data. The main application areas of the systems studied include securing online social networks, providing anonymous web, and preventing censorship in file-sharing. Each of the systems studied store user data on machines belonging to third parties. The systems differ in measures they take to protect their users from data loss, forged information, censorship, and being monitored. All of the systems use cryptography to secure names used for the content, and to protect the data from outsiders. Based on the gained knowledge, we built a prototype platform called Peerscape, which stores user data in a synchronized, protected database. Data items themselves are protected with cryptography against forgery, but not encrypted as the focus has been disseminating the data directly among family and friends instead of letting third parties store the information. We turned the synchronizing database into peer-to-peer web by revealing its contents through an integrated http server. The REST-like http API supports development of applications in javascript. To evaluate the platform’s suitability for application development we wrote some simple applications, including a public chat room, bittorrent site, and a flower growing game. During our early tests we came to the conclusion that using the platform for simple applications works well. As web standards develop further, writing applications for the platform should become easier. Any system this complex will have its problems, and we are not expecting our platform to replace the existing web, but are fairly impressed with the results and consider our work important from the perspective of managing user data.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

As the virtual world grows more complex, finding a standard way for storing data becomes increasingly important. Ideally, each data item would be brought into the computer system only once. References for data items need to be cryptographically verifiable, so the data can maintain its identity while being passed around. This way there will be only one copy of the users family photo album, while the user can use multiple tools to show or manipulate the album. Copies of users data could be stored on some of his family members computer, some of his computers, but also at some online services which he uses. When all actors operate over one replicated copy of the data, the system automatically avoids a single point of failure. Thus the data will not disappear with one computer breaking, or one service provider going out of business. One shared copy also makes it possible to delete a piece of data from all systems at once, on users request. In our research we tried to find a model that would make data manageable to users, and make it possible to have the same data stored at various locations. We studied three systems, Persona, Freenet, and GNUnet, that suggest different models for protecting user data. The main application areas of the systems studied include securing online social networks, providing anonymous web, and preventing censorship in file-sharing. Each of the systems studied store user data on machines belonging to third parties. The systems differ in measures they take to protect their users from data loss, forged information, censorship, and being monitored. All of the systems use cryptography to secure names used for the content, and to protect the data from outsiders. Based on the gained knowledge, we built a prototype platform called Peerscape, which stores user data in a synchronized, protected database. Data items themselves are protected with cryptography against forgery, but not encrypted as the focus has been disseminating the data directly among family and friends instead of letting third parties store the information. We turned the synchronizing database into peer-to-peer web by revealing its contents through an integrated http server. The REST-like http API supports development of applications in javascript. To evaluate the platform s suitability for application development we wrote some simple applications, including a public chat room, bittorrent site, and a flower growing game. During our early tests we came to the conclusion that using the platform for simple applications works well. As web standards develop further, writing applications for the platform should become easier. Any system this complex will have its problems, and we are not expecting our platform to replace the existing web, but are fairly impressed with the results and consider our work important from the perspective of managing user data.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this study of symbolic power relations in a transnational merger, we suggest that the popular media can provide a significant arena for (re)constructing national identities and power in this kind of dramatic industrial restructuring, and are an under-utilized source of empirical data in research studies. Focusing on the press coverage of a recent Swedish-Finnish merger, we specify and illustrate a particular feature of discursive (re)construction of asymmetric power relations; superior (Swedish) and inferior (Finnish) national identities, which, we argue, are embedded in the history of colonization and domination between the two nations. The findings of the present study lead us to suggest that a lens taken from post-colonial theory is particularly useful in understanding the wider symbolic power implications of international industrial restructuring.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This article focuses on cultural identity-building in the cross-border merger context. To provide an alternative to the dominant essentialist analyses of cultures and cultural differences, cultural identitybuilding is conceptualized as a metaphoric process. The focus is on two processes inherent in the cross-border merger context: construction of images of Us and Them and construction of images of a Common Future. Based on an analysis of a special metaphor exercise carried out in a recent Finnish–Swedish merger, the article illustrates how the metaphoric perspective reveals specific cognitive, emotional and political aspects of cultural identity-building that easily remain ‘hidden’ in the case of more traditional approaches.