209 resultados para Anonymity


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Este estudo investiga a presença e a importância do anônimo e do cotidiano para a história e para o jornalismo brasileiro, no sentido de democratização de vozes que propicia um melhor entendimento da realidade social do momento abordado. Para isso, recorro a conceitos importantes que melhor explicam a realidade em que vivemos como o de complexidade e transdisciplinaridade, enfocando três áreas: História, Literatura e Antropologia. Desde o século XX, o anônimo tem sido visto com olhar diferenciado pelos historiadores no sentido de realização de uma história social. No jornalismo, a importância dada ao protagonista do cotidiano , como me refiro neste trabalho, tem sido pequena, segundo entendo. Apesar disso, algumas iniciativas jornalísticas mais avançadas procuram resgatar o espaço dessas vozes anônimas na vida social. Meu estudo versa sobre uma delas, a revista piauí.(AU)

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A presente dissertação analisa como o Partido Social Cristão (PSC), ao longo do tempo, se apropriou da identidade religiosa de seus atores políticos que na sua maioria são membros da Frente Parlamentar Evangélica, os quais defendem no espaço público a “família tradicional”, em detrimento da pluralidade de arranjos familiares na contemporaneidade. Para explicitar o objeto - “família tradicional” e PSC -, foi necessário retroceder no tempo e investigar na historiografia os primórdios da inserção dos evangélicos na política brasileira. Em vista disso, analisamos a participação dos evangélicos nos respectivos períodos do Brasil: Colônia, Império e República. A dificuldade da entrada de evangélicos na política partidária, dentre outros fatores, se deve àinfluência do catolicismo no Estado. Assim sendo, averiguamos em todas as Constituições (1824, 1891, 1934, 1937, 1946, 1967, 1969 e 1988) o que a mesma diz no que tange a proibição e a liberdade religiosa no país. Logo, verificamos entre as Eras Vargas e República Populista, que ocorreu com intensidade a transição do apoliticismo para o politicismo entre os evangélicos brasileiros, porém, eles não recebiam o apoio formal de suas igrejas. Em seguida, a participação dos evangélicos na arena política durante a ditadura militar foi investigada com destaque para o posicionamento de vanguarda da IECLB, através do Manifesto de Curitiba e, também com a presença de parlamentares evangélicos no Congresso Nacional. A politização pentecostal é ressaltada em nosso trabalho, através do pioneirismo de Manoel de Mello e, depois na Redemocratização quando as instituições evangélicas se organizaram para eleger seus candidatos à Assembleia Nacional Constituinte. E, com o fim do regime militar, o PSC surge como partido “nanico”, contudo, deixa o anonimato e ganha visibilidade midiática quando o pastor e deputado, Marco Feliciano, assume a presidência da Comissão de Direitos Humanos e Minorias, em 2013. Esse é o pano de fundo histórico que projetou o PSC e seus atores no pleito de 2014 com o mote “família tradicional”.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We assessed the feasibility of developing a virtual diabetes clinic for young people, using the Internet. The proposed content of the site would be based on self-efficacy theory, aiming to develop confidence in self-management of diabetes. A questionnaire about the proposed Website was delivered to 72 patients who attended a young person’s outpatient clinic in a district hospital. Thirty-nine replies were received, a response rate of 54%. The mean age of the respondents was 13 years. A positive attitude to the potential clinic was reported by 95% of respondents. The items rated as most useful were: quick and easy access to up-todate information about diabetes; the opportunity to ask an expert; good graphics; easy navigation; interactivity. Responses to open questions indicated that 24-hour access and anonymity in asking questions were also valued. A virtual clinic appears to be a possible method of health-care delivery to young people with diabetes.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Purpose: This paper sets out to contribute to the advancement of knowledge, particularly with regard to the processes of implementation and the role of managers engaged in such high commitment strategies and work practices. Design/methodology/approach: This study is part of a research project investigating the extent to which employee involvement predicts job performance (as well as job satisfaction, wellbeing and organisational commitment) in the NHS, using both quantitative and qualitative methods. The main focus of this paper is to present evidence from four of the 20 case studies to show the barriers to implementing employee involvement as well as highlighting the techniques and practices that have proven to be most successful. Findings: Employee involvement is used successfully by management and has enabled frontline staff to contribute their knowledge to their work. Research limitations/implications: The ethical issues of confidentiality and anonymity permeated the research process throughout. Practical implications: The link between "high commitment" strategies and organisational performance is of great interest to academics and practitioners alike. One of these "high commitment" strategies, namely employee involvement, has been an important HR strategy for the NHS in the UK. Originality/value: Other organisations can learn from the findings by implementing the successful parts. © Emerald Group Publishing Limited.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The advent of personal communication systems within the last decade has depended upon the utilization of advanced digital schemes for source and channel coding and for modulation. The inherent digital nature of the communications processing has allowed the convenient incorporation of cryptographic techniques to implement security in these communications systems. There are various security requirements, of both the service provider and the mobile subscriber, which may be provided for in a personal communications system. Such security provisions include the privacy of user data, the authentication of communicating parties, the provision for data integrity, and the provision for both location confidentiality and party anonymity. This thesis is concerned with an investigation of the private-key and public-key cryptographic techniques pertinent to the security requirements of personal communication systems and an analysis of the security provisions of Second-Generation personal communication systems is presented. Particular attention has been paid to the properties of the cryptographic protocols which have been employed in current Second-Generation systems. It has been found that certain security-related protocols implemented in the Second-Generation systems have specific weaknesses. A theoretical evaluation of these protocols has been performed using formal analysis techniques and certain assumptions made during the development of the systems are shown to contribute to the security weaknesses. Various attack scenarios which exploit these protocol weaknesses are presented. The Fiat-Sharmir zero-knowledge cryptosystem is presented as an example of how asymmetric algorithm cryptography may be employed as part of an improved security solution. Various modifications to this cryptosystem have been evaluated and their critical parameters are shown to be capable of being optimized to suit a particular applications. The implementation of such a system using current smart card technology has been evaluated.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This article discusses the emergence of cyberstalking as a means of victimising individuals and minority groups. However, rather than focusing on the activities of far-right groups, we discuss how technology can encourage individuals to harass others. The central argument made is that technology both enables and invites participation in criminal or antisocial behaviour from individuals who would not normally take part in such activities. One way in which this can be explained is by suggesting that some of the social and technological characteristics of the Internet act together in order to lower inhibitions and establish new norms. For instance, the anonymity offered by the Internet enables people to participate in activities such as encouraging violence against others with little fear of retaliation. In addition, by allowing a cyberstalker to harm another person at a distance, the victim is effectively depersonalised. In this way it can be argued that some of those who sympathise with the goals of far-right organisations may be reluctant to act in the offline world but more willing to act in the online world.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This article explores the settings and practices of translation at three types of political institutions, i.e. national, supranational, and non-governmental organisations. The three institutions are the translation service of the German Foreign Office, the translation department of the European Central Bank, and translation provision by the non-governmental organisation Amnesty International. The three case studies describe the specific translation practices in place at these institutions and illustrate some characteristic translation strategies. In this way, we reflect on how different translation practices can impact on translation agency and how these practices in turn are influenced by the type of institution and its organisational structure. The article also aims to explore to which extent the characteristics of collectivity, anonymity and standardisation, and of institutional translation as self-translation are applicable to the institutions under discussion.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Trust is a critical component of successful e-Commerce. Given the impersonality, anonymity, and automation of transactions, online vendor trustworthiness cannot be assessed by means of body language and other environmental cues that consumers typically use when deciding to trust offline retailers. It is therefore essential that the design of e-Commerce websites compensate by incorporating circumstantial cues in the form of appropriate trust triggers. This paper presents and discusses the results of a study which took an initial look at whether consumers with different personality types (a) are generally more trusting and (b) rely on different trust cues during their assessment of first impression vendor trustworthiness in B2C e-Commerce.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The popularity of online social media platforms provides an unprecedented opportunity to study real-world complex networks of interactions. However, releasing this data to researchers and the public comes at the cost of potentially exposing private and sensitive user information. It has been shown that a naive anonymization of a network by removing the identity of the nodes is not sufficient to preserve users’ privacy. In order to deal with malicious attacks, k -anonymity solutions have been proposed to partially obfuscate topological information that can be used to infer nodes’ identity. In this paper, we study the problem of ensuring k anonymity in time-varying graphs, i.e., graphs with a structure that changes over time, and multi-layer graphs, i.e., graphs with multiple types of links. More specifically, we examine the case in which the attacker has access to the degree of the nodes. The goal is to generate a new graph where, given the degree of a node in each (temporal) layer of the graph, such a node remains indistinguishable from other k-1 nodes in the graph. In order to achieve this, we find the optimal partitioning of the graph nodes such that the cost of anonymizing the degree information within each group is minimum. We show that this reduces to a special case of a Generalized Assignment Problem, and we propose a simple yet effective algorithm to solve it. Finally, we introduce an iterated linear programming approach to enforce the realizability of the anonymized degree sequences. The efficacy of the method is assessed through an extensive set of experiments on synthetic and real-world graphs.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper looks at the issue of privacy and anonymity through the prism of Scott's concept of legibility i.e. the desire of the state to obtain an ever more accurate mapping of its domain and the actors in its domain. We argue that privacy was absent in village life in the past, and it has arisen as a temporary phenomenon arising from the lack of appropriate technology to make all life in the city legible. Cities have been the loci of creativity for the major part of human civilisation. There is something specific about the illegibility of cities which facilitates creativity and innovation. By providing the technology to catalogue and classify all objects and ideas around us, this leads to a consideration of semantic web technologies, Linked Data and the Internet of Things as unwittingly furthering this ever greater legibility. There is a danger that the over description of a domain will lead to a loss in creativity and innovation. We conclude by arguing that our prime concern must be to preserve illegibility because the survival of some form, any form, of civilisation depends upon it.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The paper attempts to develop a suitable accessibility index for networks where each link has a value such that a smaller number is preferred like distance, cost, or travel time. A measure called distance sum is characterized by three independent properties: anonymity, an appropriately chosen independence axiom, and dominance preservation, which requires that a node not far to any other is at least as accessible. We argue for the need of eliminating the independence property in certain applications. Therefore generalized distance sum, a family of accessibility indices, will be suggested. It is linear, considers the accessibility of vertices besides their distances and depends on a parameter in order to control its deviation from distance sum. Generalized distance sum is anonymous and satisfies dominance preservation if its parameter meets a sufficient condition. Two detailed examples demonstrate its ability to reflect the vulnerability of accessibility to link disruptions.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Business angels are natural persons who provide equity financing for young enterprises and gain ownership in them. They are usually anonym investors and they operate in the background of the companies. Their important feature is that over the funding of the enterprises based on their business experiences they can contribute to the success of the companies with their special expertise and with strategic support. As a result of the asymmetric information between the angels and the companies their matching is difficult (Becsky-Nagy – Fazekas 2015), and the fact, that angel investors prefer anonymity makes it harder for entrepreneurs to obtain informal venture capital. The primary aim of the different type of business angel organizations and networks is to alleviate this matching process with intermediation between the two parties. The role of these organizations is increasing in the informal venture capital market compared to the individually operating angels. The recognition of their economic importance led many governments to support them. There were also public initiations that aimed the establishment of these intermediary organizations that led to the institutionalization of business angels. This study via the characterization of business angels focuses on the progress of these informational intermediaries and their ways of development with regards to the international trends and the current situation of Hungarian business angels and angel networks.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

One of the main factors that makes the poetry of the Argentine Alberto Girri (1919–1991) a whole world of its own is my argument that in a fragmentary world like the present, poets search for a formal integrity which in the act of reading creates not only their own inner world but also the readers'. It is important to insist on this turning point in which most of the Symbolist work is circumscribed. Later, this would be of capital importance for the avant-garde as well as for the post-avant-garde: Mallarmé's Un coup de dés jamais n'abolira le hasard would make poetry something absolutely modern. An original distribution of the white and black opened a new space for the text, shifting the then dominant phonocentrism. My close reading of this author as well as the given theoretical frame avoids the failure into an instrumental use either of the page or of the writing but ignoring physical reciprocity. What follows is, that this “shift” privileged heightened vision over audition of the “musical score”. Thus, an intense materialization of the language is achieved that increases the anonymity of the text. ^ Following this new arrangement of words, so to speak, Girri's poetic work now drives deeply inside words in order to lend them dignity from meaning. I conclude that the best way to “render” this poetry with religious aim (L. “re-ligare” to bind the fragmented) is by way of the philosophy of language. I also propose that Girri's task as a translator, mainly from English poetry, represented—with Jorge Luis Borges—a paradigmatic shift in the Spanish American horizon which had been under “logocentric” French rule since the time of Independence. This seismic change of perspective in late Modernism and post-Modernism is represented by a radical screening of Romance rhetoric, it was a shift not only over the inherited mother tongue but over his own work which was increasingly moving towards transcendent and/or metaphysical poetry. ^ Therefore, I did find that Girri's poem was constructed as a mirror closely related to that which was represented in the angelological tradition. ^

Relevância:

10.00% 10.00%

Publicador:

Resumo:

From the research and awareness of literary work, this thesis discusses aspects related to the study of homoeroticism and lifestyles in the works Dancer from the Dance (2001) by Andrew Holleran and Pela noite (2010) by Brazilian author Caio Fernando Abreu. Whereas issues about beauty, desire and lifestyle shape cutouts important to the narrative, I propose a discussion by examining the works that mark from the first moments of sexual release party in New York with the peculiarities of their own styles that characterized the Andrew Holleran characters rostificadas by an ethos that he composed during this time opening for freedom of sexual deviant sexualities. In Pela noite, we reiterate a continuation of opening moment in Brazil for gay characters Caio , assuming the early 1980s for those characters is the first " shadows " of AIDS and knowledge of self , in which his characters living with fear, anonymity and reminiscences of homophobia as a backdrop to the discussions that are triggered off by the author . To compose a theoretical framework to subsidize this work , we selected the works of Michel Foucault (2007 , 2010a , 2010b ) , Eve Kosofsky Sedgwick (2008 ) , Didier Eribon (2008 ) , David Cartier (2004 ) , David Eisenbach (2006 ) and other contributions that were undoubtedly essential to this endeavor

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Traditional classrooms have been often regarded as closed spaces within which experimentation, discussion and exploration of ideas occur. Professors have been used to being able to express ideas frankly, and occasionally rashly while discussions are ephemeral and conventional student work is submitted, graded and often shredded. However, digital tools have transformed the nature of privacy. As we move towards the creation of life-long archives of our personal learning, we collect material created in various 'classrooms'. Some of these are public, and open, but others were created within 'circles of trust' with expectations of privacy and anonymity by learners. Taking the Creative Commons license as a starting point, this paper looks at what rights and expectations of privacy exist in learning environments? What methods might we use to define a 'privacy license' for learning? How should the privacy rights of learners be balanced with the need to encourage open learning and with the creation of eportfolios as evidence of learning? How might we define different learning spaces and the privacy rights associated with them? Which class activities are 'private' and closed to the class, which are open and what lies between? A limited set of set of metrics or zones is proposed, along the axes of private-public, anonymous-attributable and non-commercial-commercial to define learning spaces and the digital footprints created within them. The application of these not only to the artefacts which reflect learning, but to the learning spaces, and indeed to digital media more broadly are explored. The possibility that these might inform not only teaching practice but also grading rubrics in disciplines where public engagement is required will also be explored, along with the need for consideration by educational institutions of the data rights of students.