2 resultados para service users

em AMS Tesi di Laurea - Alm@DL - Università di Bologna


Relevância:

60.00% 60.00%

Publicador:

Resumo:

Interpreter profession is currently changing: migration flows, the economic crisis and the fast development of ICTs brought unexpected changes in our societies and in traditional interpreting services all over. Remote interpreting (RI), which entails new methods such as videoconference interpreting and telephone interpreting (TI), has greatly developed and now sees interpreters working remotely and being connected to service users via videoconference set up or telephone calls. This dissertation aims at studying and analyzing the relevant aspects of interpreter-mediated telephone calls, describing the consequences for the interpreters in this new working field, as well as defining new strategies and techniques interpreters must develop in order to adjust to the new working context. For these purposes, the objectives of this dissertation are the following: to describe the settings in which RI is mostly used, to study the prominent consequences on interpreters and analyze real interpreter-mediated conversations. The dissertation deals with issues studied by the Shift project, a European project which aims at creating teaching materials for remote interpreting; the project started in 2015 and the University of Bologna and in particular the DIT - Department of Interpreting and Translation is the coordinating unit and promoting partner. This dissertation is divided into five chapters. Chapter 1 contains an outline of the major research related to RI and videoconference interpreting as well as a description of its main settings: healthcare, law, business economics and institution. Chapter 2 focuses on the physiological and psychological implications for interpreters working on RI. The concepts of absence, presence and remoteness are discussed; some opinions of professional interpreters and legal practitioners (LPs) concerning remote interpreting are offered as well. In chapter 3, telephone interpreting is presented; basic concepts of conversational analysis and prominent traits of interpreter-mediated calls are also explored. Chapter 4 presents the materials and methodology used for the analysis of data. The results, discussed in Chapter 5, show that telephone interpreting may be suitable for some specific contexts; however, it is clear that interpreters must get appropriate training before working in any form of RI. The dissertation finally offers suggestions for the implementation of training in RI for future interpreting students.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The cybernetics revolution of the last years improved a lot our lives, having an immediate access to services and a huge amount of information over the Internet. Nowadays the user is increasingly asked to insert his sensitive information on the Internet, leaving its traces everywhere. But there are some categories of people that cannot risk to reveal their identities on the Internet. Even if born to protect U.S. intelligence communications online, nowadays Tor is the most famous low-latency network, that guarantees both anonymity and privacy of its users. The aim of this thesis project is to well understand how the Tor protocol works, not only studying its theory, but also implementing those concepts in practice, having a particular attention for security topics. In order to run a Tor private network, that emulates the real one, a virtual testing environment has been configured. This behavior allows to conduct experiments without putting at risk anonymity and privacy of real users. We used a Tor patch, that stores TLS and circuit keys, to be given as inputs to a Tor dissector for Wireshark, in order to obtain decrypted and decoded traffic. Observing clear traffic allowed us to well check the protocol outline and to have a proof of the format of each cell. Besides, these tools allowed to identify a traffic pattern, used to conduct a traffic correlation attack to passively deanonymize hidden service clients. The attacker, controlling two nodes of the Tor network, is able to link a request for a given hidden server to the client who did it, deanonymizing him. The robustness of the traffic pattern and the statistics, such as the true positive rate, and the false positive rate, of the attack are object of a potential future work.