796 resultados para Transsexuals - Identity


Relevância:

20.00% 20.00%

Publicador:

Resumo:

We construct two efficient Identity-Based Encryption (IBE) systems that admit selective-identity security reductions without random oracles in groups equipped with a bilinear map. Selective-identity secure IBE is a slightly weaker security model than the standard security model for IBE. In this model the adversary must commit ahead of time to the identity that it intends to attack, whereas in an adaptive-identity attack the adversary is allowed to choose this identity adaptively. Our first system—BB1—is based on the well studied decisional bilinear Diffie–Hellman assumption, and extends naturally to systems with hierarchical identities, or HIBE. Our second system—BB2—is based on a stronger assumption which we call the Bilinear Diffie–Hellman Inversion assumption and provides another approach to building IBE systems. Our first system, BB1, is very versatile and well suited for practical applications: the basic hierarchical construction can be efficiently secured against chosen-ciphertext attacks, and further extended to support efficient non-interactive threshold decryption, among others, all without using random oracles. Both systems, BB1 and BB2, can be modified generically to provide “full” IBE security (i.e., against adaptive-identity attacks), either using random oracles, or in the standard model at the expense of a non-polynomial but easy-to-compensate security reduction.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper surveys the practical benefits and drawbacks of several identity-based encryption schemes based on bilinear pairings. After providing some background on identity-based cryptography, we classify the known constructions into a handful of general approaches. We then describe efficient and fully secure IBE and IBKEM instantiations of each approach, with reducibility to practice as the main design parameter. Finally, we catalogue the strengths and weaknesses of each construction according to a few theoretical and many applied comparison criteria.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Guitar technology underwent significant changes in the 20th century in the move from acoustic to electric instruments. In the first part of the 21st century, the guitar continues to develop through its interaction with digital technologies. Such changes in guitar technology are usually grounded in what we might call the "cultural identity" of the instrument: that is, the various ways that the guitar is used to enact, influence and challenge sociocultural and musical discourses. Often, these different uses of the guitar can be seen to reflect a conflict between the changing concepts of "noise" and "musical sound."

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Review(s) of: Settling the Pop Score: Pop Texts and Identity Politics, Stan Hawkins, Aldershot, Hants. : Ashgate, 2002, ISBN 0 7546 0352 0; pb, 234pp, ill, music exx, bibl. , discog. , index. The scholarly study of popular music has its origins in sociology and cultural studies, disciplinary areas in which musical meaning is often attributed to aspects of economical and sociological function. Against this tradition, recent writers have offered what is now referred to as ‘popular musicology’: a method or approach that tends towards a specific engagement with ‘pop texts’ on aesthetic, and perhaps even ‘musical’ terms. Stan Hawkins uses the term popular musicology ‘at his own peril,’ clearly recognising the implicit scholarly danger in his approach, whereby ‘formalist questions of musical analysis’ are dealt with ‘alongside the more intertextual discursive theorisations of musical expression’ (p. xii). In other words, popular musicologists dare to tread that fine line between text and context. As editor of the journal Popular Musicology Online, Hawkins is a leading advocate of this practice, specifically in the application of music-analytical techniques to popular music. His methodology attests to the influence of other leading figures in the area, notably Richard Middleton, Allan F. Moore and Derek Scott (general editor of the Ashgate Popular and Folk Music Series in which this book is published).

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Objective To understand how the formal curriculum experience of an Australian undergraduate pharmacy program supports students’ professional identity formation. Methods A qualitative ethnographic study was conducted over four weeks using participant observation and examined the ‘typical’ student experience from the perspective of a pharmacist. A one-week period of observation was undertaken with each of the four year groups (that is, for years one to four) comprising the undergraduate curriculum. Data were collected through observation of the formal curriculum experience using field notes, a reflective journal and informal interviews with 38 pharmacy students. Data were analyzed thematically using an a priori analytical framework. Results Our findings showed that the observed curriculum was a conventional curricular experience which focused on the provision of technical knowledge and provided some opportunities for practical engagement. There were some opportunities for students to imagine themselves as pharmacists, for example, when the lecture content related to practice or teaching staff described their approach to practice problems. However, there were limited opportunities for students to observe pharmacist role models, experiment with being a pharmacist or evaluate their professional identities. While curricular learning activities were available for students to develop as pharmacists e.g. patient counseling, there was no contact with patients and pharmacist academic staff tended to role model as educators with little evidence of their pharmacist selves. Conclusion These findings suggest that the current conventional approach to the curriculum design may not be fully enabling learning experiences which support students in successfully negotiating their professional identities. Instead it appeared to reinforce their identities as students with a naïve understanding of professional practice, making their future transition to professional practice challenging.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The notion of identity-based IB cryptography was proposed by Shamir [177] as a specialization of public key PK cryptography which dispensed with the need for cumbersome directories, certificates, and revocation lists.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Enterprises, both public and private, have rapidly commenced using the benefits of enterprise resource planning (ERP) combined with business analytics and “open data sets” which are often outside the control of the enterprise to gain further efficiencies, build new service operations and increase business activity. In many cases, these business activities are based around relevant software systems hosted in a “cloud computing” environment. “Garbage in, garbage out”, or “GIGO”, is a term long used to describe problems in unqualified dependency on information systems, dating from the 1960s. However, a more pertinent variation arose sometime later, namely “garbage in, gospel out” signifying that with large scale information systems, such as ERP and usage of open datasets in a cloud environment, the ability to verify the authenticity of those data sets used may be almost impossible, resulting in dependence upon questionable results. Illicit data set “impersonation” becomes a reality. At the same time the ability to audit such results may be an important requirement, particularly in the public sector. This paper discusses the need for enhancement of identity, reliability, authenticity and audit services, including naming and addressing services, in this emerging environment and analyses some current technologies that are offered and which may be appropriate. However, severe limitations to addressing these requirements have been identified and the paper proposes further research work in the area.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

An accumulator based on bilinear pairings was proposed at CT-RSA'05. Here, it is first demonstrated that the security model proposed by Lan Nguyen does lead to a cryptographic accumulator that is not collision resistant. Secondly, it is shown that collision-resistance can be provided by updating the adversary model appropriately. Finally, an improvement on Nguyen's identity escrow scheme, with membership revocation based on the accumulator, by removing the trusted third party is proposed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Studies of place construction in the rural studies literature have largely privileged the role of professionals over that of local lay actors. This paper contributes to redressing this imbalance through a critical case-study of lay postcard production in a rural shire. Drawing on original, qualitative research conducted in the Shire of Ravensthorpe, Western Australia, including in-depth interviews with key participants, the analysis focuses on this lay production—undertaken in the main by women—as cultural work. By emphasising the work of making the postcards along with the cultural work these postcards achieve, this examination foregrounds intersections of material and imagined ruralities. In the process, this study highlights the complexity and importance of this lay contribution to place identity, particularly as positioned within what may be considered rural cultural work.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Local representations of the significance of Albany, Western Australia, in the first world war and of the city's part in the birth of Anzac register substantial points of departure from national histories. While both the Anzac mythos and official renderings of Australia's wars are vigorously contested, Albany's reformulation offers a clear example of the ways in which communities actively inflect national narratives to create expressions of differentiated local identity. This article explores the relationship between the national and the local by focusing on the local narrative of the massing and departure of'The Great Anzac Convoy' in King George Sound in 1914. Particular attention is given to the way Albany has been able to appropriate and localise this event and the origins of Anzac, consequently promoting itself as an important element of the national identity, from which it nevertheless remains distinct. This localisation of an important element of national identity confers cultural standing and a potentially empowered position in relation to this national identity.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

There is no doubt that place branding is a powerful and ubiquitous practice deployed around the globe. Parallel to its acceptance and development as a distinct discipline is an understanding that place branding as responsible practice offers the means to achieve widespread economic, social and cultural benefits. Drawing on work around place and identity in cultural geography and cultural studies, this paper engages critically with this vision. Specifically, it challenges the widely-held assumption that the relationship between place branding and place identity is fundamentally reflective, arguing instead that this relationship is inherently generative. This shift in perspective, explored in relation to current responsible place branding practice, is central to the realisation of place branding as a force for good.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The aim of this study was to explore two of the mechanisms by which transformational leaders have a positive influence on followers. It examined the mediating role of follower’s leader and group identification on the associations among different transformational leader behaviours and follower job satisfaction and supervisor-rated job performance. One hundred and seventy-nine healthcare employees and 44 supervisors participated in the study. The results from multilevel structural equation modelling provided results that partially supported the predicted model. Identification with the leader significantly mediated the positive associations between supportive leadership, intellectual stimulation, personal recognition, in the prediction of job satisfaction and job performance. Leader identification also mediated the relationship between supportive leadership, intellectual stimulation, personal recognition, and group identification. However, group identification did not mediate the associations between vision leadership and inspirational communication, in the prediction of job satisfaction and job performance. The results highlight the role of individualized forms of leadership and leader identification in enhancing follower outcomes.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Transactive memory system (TMS) theory explains how expertise is recognized and coordinated in teams. Extending current TMS research from a group information-processing perspective, our article presents a theoretical model that considers TMS development from a social identity perspective. We discuss how two features of communication (quantity and quality) important to TMS development are linked to TMS through the group identification mechanism of a shared common team identity. Informed by social identity theory, we also differentiate between intragroup and intergroup contexts and outline how, in multidisciplinary teams, professional identification and perceived equality of status among professional subgroups have a role to play in TMS development. We provide a theoretical discussion of future research directions aimed at testing and extending our model.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This study examines the process by which newly recruited nuclear engineering and technical staff came to understand, define, think, feel and behave within a distinct group that has a direct contribution to the organization's overall emphasis on a culture of reliability and system safety. In the field of organizational behavior the interactive model of social identity formation has been recently proposed to explain the process by which the internalization of shared norms and values occurs, an element critical in identity formation. Using this rich model of organizational behavior we analyzed multiple sources of data from nine new hires over a period of three years. This was done from the time they were employed to investigate the construction of social identity by new entrants entering into a complex organizational setting reflected in the context of a nuclear facility. Informed by our data analyses, we found support for the interactive model of social identity development and report the unexpected finding that a newly appointed member's age and level of experience appears to influence the manner in which they adapt, and assimilate into their surroundings. This study represents an important contribution to the safety and reliability literature as it provides a rich insight into the way newly recruited employees enact the process by which their identities are formed and hence act, particularly under conditions of duress or significant organizational disruption in complex organizational settings.