904 resultados para Identity based encryption
Resumo:
Developing the social identity theory of leadership (e.g., [Hogg, M. A. (2001). A social identity theory of leadership. Personality and Social Psychology Review, 5, 184-200]), an experiment (N=257) tested the hypothesis that as group members identify more strongly with their group (salience) their evaluations of leadership effectiveness become more strongly influenced by the extent to which their demographic stereotype-based impressions of their leader match the norm of the group (prototypicality). Participants, with more or less traditional gender attitudes (orientation), were members, under high or low group salience conditions (salience), of non-interactive laboratory groups that had instrumental or expressive group norms (norm), and a male or female leader (leader gender). As predicted, these four variables interacted significantly to affect perceptions of leadership effectiveness. Reconfiguration of the eight conditions formed by orientation, norm and leader gender produced a single prototypicality variable. Irrespective of participant gender, prototypical leaders were considered more effective in high then low salience groups, and in high salience groups prototypical leaders were more effective than less prototypical leaders. Alternative explanations based on status characteristics and role incongruity theory do not account well for the findings. Implications of these results for the glass ceiling effect and for a wider social identity analysis of the impact of demographic group membership on leadership in small groups are discussed. (c) 2006 Elsevier Inc. All rights reserved.
Resumo:
Online multimedia data needs to be encrypted for access control. To be capable of working on mobile devices such as pocket PC and mobile phones, lightweight video encryption algorithms should be proposed. The two major problems in these algorithms are that they are either not fast enough or unable to work on highly compressed data stream. In this paper, we proposed a new lightweight encryption algorithm based on Huffman error diffusion. It is a selective algorithm working on compressed data. By carefully choosing the most significant parts (MSP), high performance is achieved with proper security. Experimental results has proved the algorithm to be fast. secure: and compression-compatible.
Resumo:
Streaming video application requires high security as well as high computational performance. In video encryption, traditional selective algorithms have been used to partially encrypt the relatively important data in order to satisfy the streaming performance requirement. Most video selective encryption algorithms are inherited from still image encryption algorithms, the encryption on motion vector data is not considered. The assumption is that motion vector data are not as important as pixel image data. Unfortunately, in some cases, motion vector itself may be sufficient enough to leak out useful video information. Normally motion vector data consume over half of the whole video stream bandwidth, neglecting their security may be unwise. In this paper, we target this security problem and illustrate attacks at two different levels that can restore useful video information using motion vectors only. Further, an information analysis is made and a motion vector information model is built. Based on this model, we describe a new motion vector encryption algorithm called MVEA. We show the experimental results of MVEA. The security strength and performance of the algorithm are also evaluated.
Resumo:
This Study examines whether cultural identity has an impact on perceptions of foreign management practices and perceptions of organisational climate. Based on social identity theory as a conceptual framework, it is assumed that the salience of cultural identity leads to in-group bias in interpreting organisational events. This study also examines whether managers' accommodative communication behaviour mediates these relationships. In a multinational organisation, employees see the foreign company as a symbol, and the person that deals with them in everyday working relationships in the organisation is their direct leader. It is argued that the salience of cultural identity wiU depend on employees' perceptions of the way managers attach meaning to foreign managerial practices and communicate it to them. Interaction with managers who create a distance with their employees and who fail to Usten to what employees need may be a socially appropriate way to invoke the salience of cultural identity in the working relationship. The participants were 206 Indonesian employees from three multinational organisations. Using a questionnaire, this study shows that participants with strong cultural identity had more negative perceptions of foreign management practices and organisational climate. Furthermore, this study indicates that managers' accommodative communication behaviour mediated these relationships.
Resumo:
This paper draws on Appadurai's (1996) concept of ethnoscapes — the global flow of people or what has become increasingly popularized as the global flow of talent. Singapore has initiated a foreign talent policy to compete for a global pool of talent to make up for its shortfall of indigenous work-force. The rationale for recruiting foreign talent is informed by a nationalist competitive ideology to sustain Singapore in the new knowledge-based economy. This paper examines the competing and dissenting discourses surrounding the foreign talent policy. It argues that the mobility of migratory flow has transformative and disruptive effects at the level of culture and the identity landscape of Singapore, where its discursive cultural boundaries are drawn according to a nationalist framework. Drawing on theories and concepts of ‘diaspora’, ‘hybridity’, and ‘third space’, these are the political and cultural issues that this paper attempts to tease out. [ABSTRACT FROM AUTHOR]
Resumo:
In this thesis we present an overview of sparse approximations of grey level images. The sparse representations are realized by classic, Matching Pursuit (MP) based, greedy selection strategies. One such technique, termed Orthogonal Matching Pursuit (OMP), is shown to be suitable for producing sparse approximations of images, if they are processed in small blocks. When the blocks are enlarged, the proposed Self Projected Matching Pursuit (SPMP) algorithm, successfully renders equivalent results to OMP. A simple coding algorithm is then proposed to store these sparse approximations. This is shown, under certain conditions, to be competitive with JPEG2000 image compression standard. An application termed image folding, which partially secures the approximated images is then proposed. This is extended to produce a self contained folded image, containing all the information required to perform image recovery. Finally a modified OMP selection technique is applied to produce sparse approximations of Red Green Blue (RGB) images. These RGB approximations are then folded with the self contained approach.
Resumo:
This thesis studies the links between language, migration and integration in the context of the 'new migrant' group of Latin Americans in London. It reviews the many ways in which language impacts the integration processes of migrants by influencing people's access to jobs, services, social contacts and information. By focusing on migrants' experiences this research also investigates the ways in which language and identity articulate, as well as the affective variables that are at play in the acquisition of the local language. With a large sector trapped in a cycle of poor command of English and labour market disadvantage, many Latin Americans experience exclusion and poverty. In reaction to this, a sector of the community is campaigning for ethnic minority recognition. This work reviews the debates for recognition and the strategy of organising around ethnicity, paying special attention to the role language plays in the process. The study is based on over two and half years of qualitative research, which included interviews, surveys, and long-term participant observation within a community organisation and a recognition campaign. Its interdisciplinary perspective allows the recognition of both the intimate links between language and identity, as well as the social and structural forces that influence migrants' linguistic integration. It unveils the practical and symbolic value that the mother tongue has for Latin American migrants and provides a broader account of their experiences. This research calls attention to the need for a more comprehensive approach to the study of language and migration in order to acknowledge the affective and social factors involved in the linguistic practices of migrants. By studying the community's struggles for recognition, this work evidences both the importance of visibility for minority groups in London and the intrinsic methodological limitations of monitoring through ethnic categorisation.
Resumo:
We have been investigating the cryptographical properties of in nite families of simple graphs of large girth with the special colouring of vertices during the last 10 years. Such families can be used for the development of cryptographical algorithms (on symmetric or public key modes) and turbocodes in error correction theory. Only few families of simple graphs of large unbounded girth and arbitrarily large degree are known. The paper is devoted to the more general theory of directed graphs of large girth and their cryptographical applications. It contains new explicit algebraic constructions of in finite families of such graphs. We show that they can be used for the implementation of secure and very fast symmetric encryption algorithms. The symbolic computations technique allow us to create a public key mode for the encryption scheme based on algebraic graphs.
Resumo:
This paper advances a philosophically informed rationale for the broader, reflexive and practical application of arts-based methods to benefit research, practice and pedagogy. It addresses the complexity and diversity of learning and knowing, foregrounding a cohabitative position and recognition of a plurality of research approaches, tailored and responsive to context. Appreciation of art and aesthetic experience is situated in the everyday, underpinned by multi-layered exemplars of pragmatic visual-arts narrative inquiry undertaken in the third, creative and communications sectors. Discussion considers semi-guided use of arts-based methods as a conduit for topic engagement, reflection and intersubjective agreement; alongside observation and interpretation of organically employed approaches used by participants within daily norms. Techniques span handcrafted (drawing), digital (photography), hybrid (cartooning), performance dimensions (improvised installations) and music (metaphor and structure). The process of creation, the artefact/outcome produced and experiences of consummation are all significant, with specific reflexivity impacts. Exploring methodology and epistemology, both the "doing" and its interpretation are explicated to inform method selection, replication, utility, evaluation and development of cross-media skills literacy. Approaches are found engaging, accessible and empowering, with nuanced capabilities to alter relationships with phenomena, experiences and people. By building a discursive space that reduces barriers; emancipation, interaction, polyphony, letting-go and the progressive unfolding of thoughts are supported, benefiting ways of knowing, narrative (re)construction, sensory perception and capacities to act. This can also present underexplored researcher risks in respect to emotion work, self-disclosure, identity and agenda. The paper therefore elucidates complex, intricate relationships between form and content, the represented and the representation or performance, researcher and participant, and the self and other. This benefits understanding of phenomena including personal experience, sensitive issues, empowerment, identity, transition and liminality. Observations are relevant to qualitative and mixed methods researchers and a multidisciplinary audience, with explicit identification of challenges, opportunities and implications.
Resumo:
* Work is partially supported by the Lithuanian State Science and Studies Foundation.
Resumo:
Purpose – This paper aims to apply the business-to-business (B2B) Service Brand Identity (SBI) scale to empirically assess the influence of service brand identity on brand performance for the first time. Design/methodology/approach – Based on data collected from 421 senior marketing executives, this paper applies the B2B SBI and structural equation modeling to fulfill the above purpose. Findings – Brand personality and human resource initiatives have a positive and significant influence on brand performance. Corporate visual identity, in addition to an employee and client focus, has an insignificant impact on performance. Consistent communications have a negative and significant influence on brand performance. Research limitations/implications – Data were only collected from executives in the UK. This research would benefit from replicative studies. Practical implications – This research empirically establishes the brand management activities that drive brand performance. Originality/value – This is the first empirical study to assess the influence service brand identity has on brand performance.
Resumo:
With the advent of GPS enabled smartphones, an increasing number of users is actively sharing their location through a variety of applications and services. Along with the continuing growth of Location-Based Social Networks (LBSNs), security experts have increasingly warned the public of the dangers of exposing sensitive information such as personal location data. Most importantly, in addition to the geographical coordinates of the user’s location, LBSNs allow easy access to an additional set of characteristics of that location, such as the venue type or popularity. In this paper, we investigate the role of location semantics in the identification of LBSN users. We simulate a scenario in which the attacker’s goal is to reveal the identity of a set of LBSN users by observing their check-in activity. We then propose to answer the following question: what are the types of venues that a malicious user has to monitor to maximize the probability of success? Conversely, when should a user decide whether to make his/her check-in to a location public or not? We perform our study on more than 1 million check-ins distributed over 17 urban regions of the United States. Our analysis shows that different types of venues display different discriminative power in terms of user identity, with most of the venues in the “Residence” category providing the highest re-identification success across the urban regions. Interestingly, we also find that users with a high entropy of their check-ins distribution are not necessarily the hardest to identify, suggesting that it is the collective behaviour of the users’ population that determines the complexity of the identification task, rather than the individual behaviour.
Resumo:
Based on extensive quantitative and qualitative analyses of a corpus of American presidential speeches that includes all inaugural addresses and State of the Union messages from 1789 to 2008, as well as major foreign and security policy speeches after 1945, this research monograph analyzes the various forms and functions of intertextual references found in the discourse of American presidents. Working within an original, interdisciplinary theoretical framework established by theories of intertextuality, discourse analysis, and presidential studies, the book discusses five different types of presidential intertextuality, all of which contribute jointly to creating a set of carefully manipulated and politically powerful images of both the American nation and the American presidency. The book is intended for scholars and students in political and presidential studies, communications, American cultural studies, and linguistics, as well as anyone interested in the American presidency in general.
Resumo:
We describe an approach for recovering the plaintext in block ciphers having a design structure similar to the Data Encryption Standard but with improperly constructed S-boxes. The experiments with a backtracking search algorithm performing this kind of attack against modified DES/Triple-DES in ECB mode show that the unknown plaintext can be recovered with a small amount of uncertainty and this algorithm is highly efficient both in time and memory costs for plaintext sources with relatively low entropy. Our investigations demonstrate once again that modifications resulting to S-boxes which still satisfy some design criteria may lead to very weak ciphers. ACM Computing Classification System (1998): E.3, I.2.7, I.2.8.
Resumo:
Jelen cikk célja a multikulturális szervezet fogalmának újraértelmezése, amelyet a következő lépések mentén valósít meg: (1) a releváns tudományterületek azonosítása – szervezeti kultúra és munkahelyi diverzitás – és komplementáris jellegük bizonyítása (ki)alakulásuk történeti ívének párhuzamos bemutatása révén, (2) a tudományterületek történeti alakulását hűen megragadni képes, rendszerező elméleti keret kiválasztása és bemutatása, (3) a multikulturális szervezet főbb dimenzióinak azonosítása, valamint (4) a multikulturális szervezeti kontextus meghatározása a fentiekben meghatározott dimenzióknak az elméleti keretben való értelmezése révén. ______ The aim of this article is to redefine the multicultural organizational concept, which is going to be accomplished along the following steps: (1) identifying the relevant disciplines – organizational culture and workplace diversity – and demonstrate their complementary character through a brief review of their roots and development, (2) presenting the organizing theoretical, which helps me to capture the development of the above mentioned literatures (3) identifying the main dimensions of the multicultural organization and (4) defining the multicultural organizational context based on the delineation of the above recognized dimensions within the organizing theoretical frame.