999 resultados para Identity document


Relevância:

30.00% 30.00%

Publicador:

Resumo:

A forensic intelligence process was conducted over cross-border seizures of false identity documents whose sources were partly known to be the same. Visual features of 300 counterfeit Portuguese and French identity cards seized in France and Switzerland were observed and integrated in a structured database developed to detect and analyze forensic links. Based on a few batches of documents known to come from common sources, the forensic profiling method could be validated and its performance evaluated. The method also proved efficient and complementary to conventional means of detecting connections between cases. Cross-border links were detected, highlighting the need for more collaboration. Forensic intelligence could be produced, uncovering the structure of counterfeits' illegal trade, the concentration of their sources and the evolution of their quality over time. In addition, two case examples illustrated how forensic profiling may support specific investigations. The forensic intelligence process and its results will underline the need to develop such approaches to support the fight against fraudulent documents and organized crime.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The important inflow of foreign population to western countries has boosted the study of acculturation processes among scholars in the last decades. By using the case of Catalonia, a receiver region of international and national migration since the fifties, this paper seeks to intersect a classic acculturation model and a newly reemerging literature in political science on contextual determinants on individual behavior. Does the context matters for understanding individual’s subjective national identity and, therefore, its voting behavior? Multilevel models show that environment matters. Percentage of Spain-born population in the town is statistically significant to account for variance in the subjective national identity and nationalist vote, even after controlling for age, sex, origin, language and left – right orientation and other contextual factors. This conclusion invites researchers not to underestimate the direct effect of the environment on individual outcomes such as feelings of belonging and vote orientation in contexts of rival identities.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

L'objectiu principal del projecte és l'estudi, la implementació d'algoritmes i protocols amb criptografia basada en la identitat. Aquesta o Identity Based Encryption (IBE) s'utilitza per simplificar el procés de comunicacions segures, com per exemple el correu electrònic. IBE permet a les polítiques de seguretat ser codificades directament sense la necessitat d'usar certificats. Aquests esquemes van ser proposats inicialment per A. Shamir a l'any 1984 i han estat objecte d'estudi per D. Boneh, S. Galbraith, etc. En aquest farem l'estudi dels emparellaments de Werl i Tate a través de l'algorisme de Miller, que ens permetrà implementar aquests emparellaments sobre corbes el·líptiques supersingulars.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The core objective of this research process was to design an operational tool for place brand analysis. By modelling the emotional significance and the deeper-lying symbols associated to a specific place identity I expected to create a semiotic tool that could be applied, mutatis mutandis, on other similar place brands. As a field case study to develop the instrument, my choice of the research arena was Barcelona city, the capital of Catalonia Autonomous Community, Spain. Barcelona brand identity was approached in the line of the Chicago Urban Anthropology School. The research methods were designed according to the prescriptions of the urban anthropology, namely qualitative methods: in-depth interviews and discourse analysis. The final research outcome was a model summarizing a range of specific emotional values that support a place brand to position in the collective mindset and to assume a positively valued status and identity in the world order.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper lays down some theoretical framework for further research to be made on the subject of how identity of young Slovenian and Catalan users is forming within the social networking website Facebook. The author pursues his interest based on observation of how communicationand thus interaction between users is changing and how this is reflected in everyday practices. In so doing he tries to identify the connections between the individual, society and technology, asthese are more and more interwoven, and we cannot think one without the other in thecontemporary globalised world.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The identity [r]evolution is happening. Who are you, who am I in the information society? In recent years, the convergence of several factors - technological, political, economic - has accelerated a fundamental change in our networked world. On a technological level, information becomes easier to gather, to store, to exchange and to process. The belief that more information brings more security has been a strong political driver to promote information gathering since September 11. Profiling intends to transform information into knowledge in order to anticipate one's behaviour, or needs, or preferences. It can lead to categorizations according to some specific risk criteria, for example, or to direct and personalized marketing. As a consequence, new forms of identities appear. They are not necessarily related to our names anymore. They are based on information, on traces that we leave when we act or interact, when we go somewhere or just stay in one place, or even sometimes when we make a choice. They are related to the SIM cards of our mobile phones, to our credit card numbers, to the pseudonyms that we use on the Internet, to our email addresses, to the IP addresses of our computers, to our profiles... Like traditional identities, these new forms of identities can allow us to distinguish an individual within a group of people, or describe this person as belonging to a community or a category. How far have we moved through this process? The identity [r]evolution is already becoming part of our daily lives. People are eager to share information with their "friends" in social networks like Facebook, in chat rooms, or in Second Life. Customers take advantage of the numerous bonus cards that are made available. Video surveillance is becoming the rule. In several countries, traditional ID documents are being replaced by biometric passports with RFID technologies. This raises several privacy issues and might actually even result in changing the perception of the concept of privacy itself, in particular by the younger generation. In the information society, our (partial) identities become the illusory masks that we choose -or that we are assigned- to interplay and communicate with each other. Rights, obligations, responsibilities, even reputation are increasingly associated with these masks. On the one hand, these masks become the key to access restricted information and to use services. On the other hand, in case of a fraud or negative reputation, the owner of such a mask can be penalized: doors remain closed, access to services is denied. Hence the current preoccupying growth of impersonation, identity-theft and other identity-related crimes. Where is the path of the identity [r]evolution leading us? The booklet is giving a glance on possible scenarios in the field of identity.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

False identity documents constitute a potential powerful source of forensic intelligence because they are essential elements of transnational crime and provide cover for organized crime. In previous work, a systematic profiling method using false documents' visual features has been built within a forensic intelligence model. In the current study, the comparison process and metrics lying at the heart of this profiling method are described and evaluated. This evaluation takes advantage of 347 false identity documents of four different types seized in two countries whose sources were known to be common or different (following police investigations and dismantling of counterfeit factories). Intra-source and inter-sources variations were evaluated through the computation of more than 7500 similarity scores. The profiling method could thus be validated and its performance assessed using two complementary approaches to measuring type I and type II error rates: a binary classification and the computation of likelihood ratios. Very low error rates were measured across the four document types, demonstrating the validity and robustness of the method to link documents to a common source or to differentiate them. These results pave the way for an operational implementation of a systematic profiling process integrated in a developed forensic intelligence model.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Essay on the origin, use and development of the arcuated lintel in ancient Rome and the configuration of the so– called ‘Serlian motif’. These architectural elements will be related to the architecture of prestige on its technical, functional, visual and symbolic sphere. Its depictions, in addition to buildings, can offer a rich repertory of images that speak about the relations between visual culture, religion and power. Furthermore, the analyzed motifs will become important elements of the Western cultural legacy for centuries. The analysis of these events will contribute to the comprehension of the role played by some resources of ancient Rome architecture of prestige and its success

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Internet-palvelujen määrä kasvaa jatkuvasti. Henkilöllä on yleensä yksi sähköinen identiteetti jokaisessa käyttämässään palvelussa. Autentikointitunnusten turvallinen säilytys käy yhä vaikeammaksi, kun niitä kertyy yhdet jokaisesta uudesta palvelurekisteröitymisestä. Tämä diplomityö tarkastelee ongelmaa ja ratkaisuja sekä palvelulähtöisestä että teknisestä näkökulmasta. Palvelulähtöisen identiteetinhallinnan liiketoimintakonsepti ja toteutustekniikat – kuten single sign-on (SSO) ja Security Assertion Markup Language (SAML) – käydään läpi karkeiden esimerkkien avulla sekä tutustuen Nokia Account -hankkeessa tuotetun ratkaisun konseptiin ja teknisiin yksityiskohtiin. Nokia Account -palvelun ensimmäisen version toteutusta analysoidaan lopuksi identiteetinhallintapalveluiden suunnitteluperiaatteita ja vaatimuksia vasten.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Forensic intelligence has recently gathered increasing attention as a potential expansion of forensic science that may contribute in a wider policing and security context. Whilst the new avenue is certainly promising, relatively few attempts to incorporate models, methods and techniques into practical projects are reported. This work reports a practical application of a generalised and transversal framework for developing forensic intelligence processes referred to here as the Transversal model adapted from previous work. Visual features present in the images of four datasets of false identity documents were systematically profiled and compared using image processing for the detection of a series of modus operandi (M.O.) actions. The nature of these series and their relation to the notion of common source was evaluated with respect to alternative known information and inferences drawn regarding respective crime systems. 439 documents seized by police and border guard authorities across 10 jurisdictions in Switzerland with known and unknown source level links formed the datasets for this study. Training sets were developed based on both known source level data, and visually supported relationships. Performance was evaluated through the use of intra-variability and inter-variability scores drawn from over 48,000 comparisons. The optimised method exhibited significant sensitivity combined with strong specificity and demonstrates its ability to support forensic intelligence efforts.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

What research learning experiences do current students have as research assistants (RAs) in the Faculty of Education at Brock University? How do the experiences of research assistants contribute to the formation of a researcher identity and influence future research plans? Despite the importance of these questions, there seems to be very little research conducted or written about the experiences of research assistants as they engage in the research process. There are few resources to which research assistants or their advisors can refer regarding graduate student research learning experiences. The purpose of this study was to understand the kinds of learning experiences that 4 RAs (who are enrolled in the Faculty of Education at Brock University, St. Catharines, Ontario) have and how those experiences contribute to their identities as researchers. Through interviews with participants, observations of participants, and textual documents produced by participants, I have (a) discovered what 4 RAs have learned while engaged in one or more research assistantships and (b) explored how these 4 RAs' experiences have shaped their identities as new researchers. My research design provided a separate case study for each participant RA, including myself as a research participant. Then as a collective, I studied all 4 cases as a case study in itself in the form of a cross-analysis to identify similarities and differences between cases. Using a variety of writing forms and visual narratives, I analyzed and interpreted the experiences of my participants utilizing arts-based literature to inform my analysis and thesis format. The final presentation includes electronic diagrams, models, poetry, a newsletter, a website presentation, and other representational arts-based forms.This thesis is a resource for current and future research assistants who can learn from the research assistant experiences presented in the research. Faculty members who hire research assistants to assist them with their research will also benefit from reading about RAs' learning experiences from the RAs' perspective. The information provided in this thesis document is a resource to inform future policies and research training initiatives in faculty departments and offices at universities. Consequently, this thesis also informs researchers (experienced and inexperienced) about how to conduct research in ways that benefit all parties and provide insight into potential ways to improve research assistantship practices.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The purpose of this research was to examine the nexus at which Indiana basketball and the state’s ‘hoosier’ identity meet. More specifically, this thesis interrogates the romanticization of this sporting culture for its pedagogical role in the creation of twenty-first century ‘hoosier’ bodies. Adopting a theoretical orientation rooted in critical race theory, I argue that Indiana’s basketball culture represents a normalized / normalizing structure underneath which Otherness is reified to produce hypervisible “different” outsiders (‘non-hoosiers’), and invisible “disciplined” insiders (i.e. ‘hoosiers’). Utilizing data gleaned over a two-month period spent conducting fieldwork in the “hoosier state” (document analysis, unstructured interviewing, and participant observation), I specifically tailor my analysis to uncover people’s understanding, negotiation, and performance of this regional and national subject position. From this point of inquiry, authentic ‘hoosierness’ comes to be represented, known, practiced, and felt in relation to hierarchies of power that privilege white, hypermasculine, rural, and conservative bodies.