209 resultados para Identity Theft
Resumo:
Countless studies have stressed the importance of social identity, particularly its role in various organizational outcomes, yet questions remain as to how identities initially develop, shift and change based on the configuration of multiple, pluralistic relationships grounded in an organizational setting. The interactive model of social identity formation has been proposed recently to explain the internalization of shared norms and values – critical in identity formation – has not received empirical examination. We analyzed multiple sources of data from nine nuclear professionals over three years to understand the construction of social identity in new entrants entering an organization. Informed by our data analyses, we found support for the interactive model and that age and level of experience influenced whether they undertook an inductive or deductive route of the group norm and value internalization. This study represents an important contribution to the study of social identity and the process by which identities are formed, particularly under conditions of duress or significant organizational disruption.
Resumo:
The notion of plaintext awareness ( PA ) has many applications in public key cryptography: it offers unique, stand-alone security guarantees for public key encryption schemes, has been used as a sufficient condition for proving indistinguishability against adaptive chosen-ciphertext attacks ( IND-CCA ), and can be used to construct privacy-preserving protocols such as deniable authentication. Unlike many other security notions, plaintext awareness is very fragile when it comes to differences between the random oracle and standard models; for example, many implications involving PA in the random oracle model are not valid in the standard model and vice versa. Similarly, strategies for proving PA of schemes in one model cannot be adapted to the other model. Existing research addresses PA in detail only in the public key setting. This paper gives the first formal exploration of plaintext awareness in the identity-based setting and, as initial work, proceeds in the random oracle model. The focus is laid mainly on identity-based key encapsulation mechanisms (IB-KEMs), for which the paper presents the first definitions of plaintext awareness, highlights the role of PA in proof strategies of IND-CCA security, and explores relationships between PA and other security properties. On the practical side, our work offers the first, highly efficient, general approach for building IB-KEMs that are simultaneously plaintext-aware and IND-CCA -secure. Our construction is inspired by the Fujisaki-Okamoto (FO) transform, but demands weaker and more natural properties of its building blocks. This result comes from a new look at the notion of γ -uniformity that was inherent in the original FO transform. We show that for IB-KEMs (and PK-KEMs), this assumption can be replaced with a weaker computational notion, which is in fact implied by one-wayness. Finally, we give the first concrete IB-KEM scheme that is PA and IND-CCA -secure by applying our construction to a popular IB-KEM and optimizing it for better performance.
Resumo:
This thesis examined the influence of mobile digital technology on the brand identity of luxury brands. Specifically it focused on the use of mobile applications by automobile, hotel and beauty brands and compared the perceptions of marketing managers with consumers on how mobile applications influenced luxury brand identity and image. Outcomes of this research included a model to depict the ongoing process between mobile-mediated luxury brand identity and image, and a typology of luxury brand mobile applications listing key features of mobile-mediated luxemosphere. Overall findings suggest that the influence of mobile applications on luxury brand identity has been negative, as their brand image appeared to be degraded, resulting in diminishing the brand identity.
Resumo:
Networked identity work is the conscious negotiation or co-creation of identity, enacted by speaking and listening across differences among multiple publics, including those real and imagined, familiar and unknown, on and offline, present and future. It is a concept I explore extensively in research with queer Digital Storytellers who share their personal stories in public places to catalyse social change (Vivienne 2013). In this article I consider distinctions between ‘story’ and ‘identity’; ‘networking’ and ‘networked identity work’ and argue that the two concepts may be usefully employed in development of co-creative community projects. Finally I consider how variable definitions of co-creativity influence project development.
Resumo:
Personal identity and intimacy levels change over time and this can influence the way consumers buy and use goods and services. This thesis examined how levels of personal identity and intimacy influence the use of social media by consumers of different ages. A survey of 208 users of facebook demonstrated that consumers with weak levels of personal identity use social media to increase their identity and popularity, while consumers with strong levels of personal identity use social media for self-expression. Consumers with high intimacy levels use social media for socian connection and social investigation.
Resumo:
The majority of academic research has attempted to explain the effectiveness of sponsorship activities by focusing on individual outcomes (Cornwell, Weeks, & Roy, 2005). The current research builds upon the limited empirical studies that examine sponsorship outcomes using group behaviour theories (Cornwell & Coote, 2005; Gwinner & Swanson, 2003; Madrigal, 2000, 2001). Specifically, this study closely examines tenets of social identity theory (Brewer, 1991; Tajfel & Turner, 1979) within the context of sports sponsorship to test effects of team identification on attitudes toward associated sponsor brands. 1,840 unique surveys were collected from fans of the Queensland Maroons and New South Wales Blues rugby clubs over four timepoints during the 2012 State of Origin series. The results suggest that social identity effects were present regarding ingroup bias toward sponsor brands. Local sponsors were rated higher than non-local sponsors, suggesting that local brands may benefit more from sponsorship.
Resumo:
This chapter contributes to the existing body of knowledge on fan fiction by reporting the findings from a quantitative and qualitative study on fan fiction in a Swedish context. The authors contextualize the fan fiction phenomenon as a part of a larger transformation of the media sphere and the society in general where media consumers’ role as collaborative cultural producers grows ever stronger. They explore what kind of stories inspire the writers and conclude that as in many other parts of the entertainment industry, fan fiction is dominated by a small number of international media brands. The authors show how fan fiction can play an important role in the development of adolescents’ literacies and identities and how their pastime works as a vehicle for personal growth.
Resumo:
Identity orientation provides a means to understand the social motivations of organisational relationships and organisational policy and practices. This study uses identity orientation to understand the highly marketised context of independent ‘elite’ schools in Australia and how they relate to stakeholders to straddle their roles as social institutions that are increasingly required to operate in a corporate manner. Interviews with managers in quite new school roles such as marketing communication and business management were conducted in non-government schools to understand the schools' external orientations, coveted internal member traits, and frames of reference. The study shows that, in contrast to existing literature on the rhetoric of schools as focusing on ‘the child’, there was a strong emphasis on individualistic orientations in schools that saw stakeholders in instrumental terms of resources and connections, saw teachers as providing an innovative and leading edge, and used other prestigious schools as their frame of reference. To a lesser extent, schools would also be interested in the relationships with families, teachers, and the community for their own means. There were very few instances where the identity orientation was contributing to society, instead, focusing on university and network outcomes for pupils. Using identity orientation provides a theoretical lens to connect organisational governance to stakeholder engagement by providing insights into an organisation's identity including practices and behaviours, in relation to others.
Resumo:
This research contributes new understandings about the development of the professional identity of child care practitioners and how professional identity changes during the transition from student to practitioner. Self-authorship theory was used as the framework to investigate the development of professional identity through exploration of beliefs about practice, sense of self, and capabilities for collaborative engagement. Students recruited for this research were completing their qualifications to work with young children in child care settings. Data from initial and follow-up interviews were analysed to understand change over time in professional identity. Findings indicated a need for training institutions and workplaces to move beyond competency-based training approaches to include more critically reflective learning opportunities. Such a focus on critical reflection has implications for improving the skills, status, and recognition of child care practitioners as educators.
Resumo:
We construct two efficient Identity-Based Encryption (IBE) systems that admit selective-identity security reductions without random oracles in groups equipped with a bilinear map. Selective-identity secure IBE is a slightly weaker security model than the standard security model for IBE. In this model the adversary must commit ahead of time to the identity that it intends to attack, whereas in an adaptive-identity attack the adversary is allowed to choose this identity adaptively. Our first system—BB1—is based on the well studied decisional bilinear Diffie–Hellman assumption, and extends naturally to systems with hierarchical identities, or HIBE. Our second system—BB2—is based on a stronger assumption which we call the Bilinear Diffie–Hellman Inversion assumption and provides another approach to building IBE systems. Our first system, BB1, is very versatile and well suited for practical applications: the basic hierarchical construction can be efficiently secured against chosen-ciphertext attacks, and further extended to support efficient non-interactive threshold decryption, among others, all without using random oracles. Both systems, BB1 and BB2, can be modified generically to provide “full” IBE security (i.e., against adaptive-identity attacks), either using random oracles, or in the standard model at the expense of a non-polynomial but easy-to-compensate security reduction.
Resumo:
This paper surveys the practical benefits and drawbacks of several identity-based encryption schemes based on bilinear pairings. After providing some background on identity-based cryptography, we classify the known constructions into a handful of general approaches. We then describe efficient and fully secure IBE and IBKEM instantiations of each approach, with reducibility to practice as the main design parameter. Finally, we catalogue the strengths and weaknesses of each construction according to a few theoretical and many applied comparison criteria.
Resumo:
Guitar technology underwent significant changes in the 20th century in the move from acoustic to electric instruments. In the first part of the 21st century, the guitar continues to develop through its interaction with digital technologies. Such changes in guitar technology are usually grounded in what we might call the "cultural identity" of the instrument: that is, the various ways that the guitar is used to enact, influence and challenge sociocultural and musical discourses. Often, these different uses of the guitar can be seen to reflect a conflict between the changing concepts of "noise" and "musical sound."
Resumo:
Review(s) of: Settling the Pop Score: Pop Texts and Identity Politics, Stan Hawkins, Aldershot, Hants. : Ashgate, 2002, ISBN 0 7546 0352 0; pb, 234pp, ill, music exx, bibl. , discog. , index. The scholarly study of popular music has its origins in sociology and cultural studies, disciplinary areas in which musical meaning is often attributed to aspects of economical and sociological function. Against this tradition, recent writers have offered what is now referred to as ‘popular musicology’: a method or approach that tends towards a specific engagement with ‘pop texts’ on aesthetic, and perhaps even ‘musical’ terms. Stan Hawkins uses the term popular musicology ‘at his own peril,’ clearly recognising the implicit scholarly danger in his approach, whereby ‘formalist questions of musical analysis’ are dealt with ‘alongside the more intertextual discursive theorisations of musical expression’ (p. xii). In other words, popular musicologists dare to tread that fine line between text and context. As editor of the journal Popular Musicology Online, Hawkins is a leading advocate of this practice, specifically in the application of music-analytical techniques to popular music. His methodology attests to the influence of other leading figures in the area, notably Richard Middleton, Allan F. Moore and Derek Scott (general editor of the Ashgate Popular and Folk Music Series in which this book is published).