620 resultados para ”we” identity
Resumo:
"It’s late in the night. And after a long day at work, you have a splitting headache. You rattle around in the bottom drawer of the bathroom vanity to find a packet of paracetamol tablets you know are hiding there. Phew, relief is at hand! Then you turn the packet over and discover that the crumpled box of pills actually expired two years ago..."--http://theconversation.com/explainer-do-we-need-to-follow-medication-use-by-dates-4329
Resumo:
There is no doubt that social engineering plays a vital role in compromising most security defenses, and in attacks on people, organizations, companies, or even governments. It is the art of deceiving and tricking people to reveal critical information or to perform an action that benefits the attacker in some way. Fraudulent and deceptive people have been using social engineering traps and tactics using information technology such as e-mails, social networks, web sites, and applications to trick victims into obeying them, accepting threats, and falling victim to various crimes and attacks such as phishing, sexual abuse, financial abuse, identity theft, impersonation, physical crime, and many other forms of attack. Although organizations, researchers, practitioners, and lawyers recognize the severe risk of social engineering-based threats, there is a severe lack of understanding and controlling of such threats. One side of the problem is perhaps the unclear concept of social engineering as well as the complexity of understand human behaviors in behaving toward, approaching, accepting, and failing to recognize threats or the deception behind them. The aim of this paper is to explain the definition of social engineering based on the related theories of the many related disciplines such as psychology, sociology, information technology, marketing, and behaviourism. We hope, by this work, to help researchers, practitioners, lawyers, and other decision makers to get a fuller picture of social engineering and, therefore, to open new directions of collaboration toward detecting and controlling it.
Resumo:
Personal identity and intimacy levels change over time and this can influence the way consumers buy and use goods and services. This thesis examined how levels of personal identity and intimacy influence the use of social media by consumers of different ages. A survey of 208 users of facebook demonstrated that consumers with weak levels of personal identity use social media to increase their identity and popularity, while consumers with strong levels of personal identity use social media for self-expression. Consumers with high intimacy levels use social media for socian connection and social investigation.
Resumo:
The majority of academic research has attempted to explain the effectiveness of sponsorship activities by focusing on individual outcomes (Cornwell, Weeks, & Roy, 2005). The current research builds upon the limited empirical studies that examine sponsorship outcomes using group behaviour theories (Cornwell & Coote, 2005; Gwinner & Swanson, 2003; Madrigal, 2000, 2001). Specifically, this study closely examines tenets of social identity theory (Brewer, 1991; Tajfel & Turner, 1979) within the context of sports sponsorship to test effects of team identification on attitudes toward associated sponsor brands. 1,840 unique surveys were collected from fans of the Queensland Maroons and New South Wales Blues rugby clubs over four timepoints during the 2012 State of Origin series. The results suggest that social identity effects were present regarding ingroup bias toward sponsor brands. Local sponsors were rated higher than non-local sponsors, suggesting that local brands may benefit more from sponsorship.
Resumo:
This chapter contributes to the existing body of knowledge on fan fiction by reporting the findings from a quantitative and qualitative study on fan fiction in a Swedish context. The authors contextualize the fan fiction phenomenon as a part of a larger transformation of the media sphere and the society in general where media consumers’ role as collaborative cultural producers grows ever stronger. They explore what kind of stories inspire the writers and conclude that as in many other parts of the entertainment industry, fan fiction is dominated by a small number of international media brands. The authors show how fan fiction can play an important role in the development of adolescents’ literacies and identities and how their pastime works as a vehicle for personal growth.
Resumo:
Identity orientation provides a means to understand the social motivations of organisational relationships and organisational policy and practices. This study uses identity orientation to understand the highly marketised context of independent ‘elite’ schools in Australia and how they relate to stakeholders to straddle their roles as social institutions that are increasingly required to operate in a corporate manner. Interviews with managers in quite new school roles such as marketing communication and business management were conducted in non-government schools to understand the schools' external orientations, coveted internal member traits, and frames of reference. The study shows that, in contrast to existing literature on the rhetoric of schools as focusing on ‘the child’, there was a strong emphasis on individualistic orientations in schools that saw stakeholders in instrumental terms of resources and connections, saw teachers as providing an innovative and leading edge, and used other prestigious schools as their frame of reference. To a lesser extent, schools would also be interested in the relationships with families, teachers, and the community for their own means. There were very few instances where the identity orientation was contributing to society, instead, focusing on university and network outcomes for pupils. Using identity orientation provides a theoretical lens to connect organisational governance to stakeholder engagement by providing insights into an organisation's identity including practices and behaviours, in relation to others.
Resumo:
A significant minority of young job-seekers remain unemployed for many months, and are at risk of developing depression. Both empirical studies and theoretical models suggest that cognitive, behavioural and social isolation factors interact to increase this risk. Thus, interventions that reduce or prevent depression in young unemployed job-seekers by boosting their resilience are required. Mobile phones may be an effective medium to deliver resilience-boosting support to young unemployed people by using SMS messages to interrupt the feedback loop of depression and social isolation. Three focus groups were conducted to explore young unemployed job-seekers’ attitudes to receiving and requesting regular SMS messages that would help them to feel supported and motivated while job-seeking. Participants reacted favourably to this proposal, and thought that it would be useful to continue to receive and request SMS messages for a few months after commencing employment as well.
Resumo:
In recent decades, the governance of food safety, food quality, on-farm environmental management and animal welfare has been shifting from the realm of 'the government' to that of the private sector. Corporate entities, especially the large supermarkets, have responded to neoliberal forms of governance and the resultant 'hollowed-out' state by instituting private standards for food, backed by processes of certification and policed through systems of third party auditing. Today's food regime is one in which supermarkets impose 'private standards' along the food supply chain to ensure compliance with a range of food safety goals-often above and beyond those prescribed by government. By examining regulatory governance in Australia, Norway and the United Kingdom we highlight emerging trajectories of food governance. We argue that the imposition of the new private forms of monitoring and compliance continue the project of agricultural restructuring that began with government support for structural adjustment schemes in agriculture and that these are most evident in the UK and Australia where neoliberalism is an entrenched philosophy. However, despite Norway's identity as a social democracy, we also identify neoliberal 'creep' into the system of food governance. Small-scale producers in all three nations are finding themselves increasingly subject to governance through private, market-based mechanisms that, to varying degrees, are dominated by major supermarket chains. The result is agricultural restructuring not through the traditional avenues of elected governments, but via non-elected market operatives.
Resumo:
Olfactory ensheathing cells, the glial cells of the olfactory nervous system, exhibit unique growth-promoting and migratory properties that make them interesting candidates for cell therapies targeting neuronal injuries such as spinal cord injury. Transplantation of olfactory cells is feasible and safe in humans; however, functional outcomes are highly variable with some studies showing dramatic improvements and some no improvements at all. We propose that the reason for this is that the identity and purity of the cells is different in each individual study. We have shown that olfactory ensheathing cells are not a uniform cell population and that individual subpopulations of OECs are present in different regions of the olfactory nervous system, with strikingly different behaviors. Furthermore, the presence of fibroblasts and other cell types in the transplant can dramatically alter the behavior of the transplanted glial cells. Thus, a thorough characterization of the differences between olfactory ensheathing cell subpopulations and how the behavior of these cells is affected by the presence of other cell types is highly warranted.
Resumo:
The term ‘‘new media’’ has been in play for decades now, and one might be forgiven for wondering how much longer digital forms and platforms can really be called ‘‘new,’’ or even what the scholarship of new media contributes to knowledge. Is it possible to say new things about new media? We think so. This Companion not only demonstrates the variety, salience, and importance of new media studies but also proposes a distinctive approach to the topic : an approach we call ‘‘new media dynamics.’’ In this view, what’s interesting about ‘‘new media’’ is not novelty as such but dynamism. Capitalism, technology, social networks, and media all evolve and change, sometimes to our delight, sometimes our dismay. This incessant process of disruption, renewal, and eventual (if often partial) replacement is now one of humanity’s central experiences. This cutting-edge collection brings together a stellar array of the world’s top researchers, cultural entrepreneurs, and emerging scholars to give the dynamics of new media their first full-length, multidisciplinary, historical, and critical treatment. Across 34 chapters, an international line-up of the very best authors reflects on the historical, technical, cultural, and political changes that underlie the emergence of new media, as existing patterns and assumptions are challenged by the forces of ‘‘creative destruction’’ and innovation, both economic and cultural. At the same time they show that familiar themes and problems carry through from ‘‘old’’media – questions of identity, sexuality, politics, relationships, and meaning.
Resumo:
Proxy re-encryption (PRE) is a highly useful cryptographic primitive whereby Alice and Bob can endow a proxy with the capacity to change ciphertext recipients from Alice to Bob, without the proxy itself being able to decrypt, thereby providing delegation of decryption authority. Key-private PRE (KP-PRE) specifies an additional level of confidentiality, requiring pseudo-random proxy keys that leak no information on the identity of the delegators and delegatees. In this paper, we propose a CPA-secure PK-PRE scheme in the standard model (which we then transform into a CCA-secure scheme in the random oracle model). Both schemes enjoy highly desirable properties such as uni-directionality and multi-hop delegation. Unlike (the few) prior constructions of PRE and KP-PRE that typically rely on bilinear maps under ad hoc assumptions, security of our construction is based on the hardness of the standard Learning-With-Errors (LWE) problem, itself reducible from worst-case lattice hard problems that are conjectured immune to quantum cryptanalysis, or “post-quantum”. Of independent interest, we further examine the practical hardness of the LWE assumption, using Kannan’s exhaustive search algorithm coupling with pruning techniques. This leads to state-of-the-art parameters not only for our scheme, but also for a number of other primitives based on LWE published the literature.
Resumo:
Nitrogen dioxide is used as a "radical scavenger" to probe the position of carbon-centered radicals within complex radical ions in the gas phase. As with analogous neutral radical reactions, this addition results in formation of an \[M + NO2](+) adduct, but the structural identity of this species remains ambiguous. Specifically, the question remains: do such adducts have a nitro-(RNO2) or nitrosoxy-(RONO) moiety, or are both isomers present in the adduct population? In order to elucidate the products of such reactions, we have prepared and isolated three distonic phenyl radical cations and observed their reactions with nitrogen dioxide in the gas phase by ion-trap mass spectrometry. In each case, stabilized \[M + NO2](+) adduct ions are observed and isolated. The structure of these adducts is probed by collision-induced dissociation and ultraviolet photodissociation action spectroscopy and a comparison made to the analogous spectra of authentic nitro-and nitrosoxy-benzenes. We demonstrate unequivocally that for the phenyl radical cations studied here, all stabilized \[M + NO2](+) adducts are exclusively nitrobenzenes. Electronic structure calculations support these mass spectrometric observations and suggest that, under low-pressure conditions, the nitrosoxy-isomer is unlikely to be isolated from the reaction of an alkyl or aryl radical with NO2. The combined experimental and theoretical results lead to the prediction that stabilization of the nitrosoxy-isomer will only be possible for systems wherein the energy required for dissociation of the RO-NO bond (or other low energy fragmentation channels) rises close to, or above, the energy of the separated reactants.
Resumo:
Gas phase peroxyl radicals are central to our chemical understanding of combustion and atmospheric processes and are typically characterized by strong absorption in the UV (lambda(max) approximate to 240 nm). The analogous maximum absorption feature for arylperoxyl radicals is predicted to shift to the visible but has not previously been characterized nor have any photoproducts arising from this transition been identified. Here we describe the controlled synthesis and isolation in vacuo of an array of charge-substituted phenylperoxyl radicals at room temperature, including the 4-(N,N,N-trimethylammonium)methyl phenylperoxyl radical cation (4-Me3N[+]CH2-C6H4OO center dot), using linear ion-trap mass spectrometry. Photodissociation mass spectra obtained at wavelengths ranging from 310 to 500 nm reveal two major photoproduct channels corresponding to homolysis of aryl-OO and arylO-O bonds resulting in loss of O-2 and O, respectively. Combining the photodissociation yields across this spectral window produces a broad (FWHM approximate to 60 nm) but clearly resolved feature centered at lambda(max) = 403 nm (3.08 eV). The influence of the charge-tag identity and its proximity to the radical site are investigated and demonstrate no effect on the identity of the two dominant photoproduct channels. Electronic structure calculations have located the vertical (B) over tilde <- (X) over tilde transition of these substituted phenylperoxyl radicals within the experimental uncertainty and further predict the analogous transition for unsubstituted phenylperoxyl radical (C6H5OO center dot) to be 457 nm (2.71 eV), nearly 45 nm shorter than previous estimates and in good agreement with recent computational values.