962 resultados para Digital Identity


Relevância:

40.00% 40.00%

Publicador:

Resumo:

Studies of code-switching in writing are very limited in comparison with the numerous investigations of this phenomenon in oral communication. Recent research has revealed that in text-based computer-mediated communication internet users bring into play the various languages available in their linguistic repertoire and, consequently, switch between them. In this case study, I investigate digital code-switching between Cypriot and Standard Greek, the two varieties of Greek spoken on the island of Cyprus. Following Auer’s conversation analytic approach and Gafaranga’s view that conversational structure coexists with social structure, I investigate code-switching in online interactions. The data to be analysed here, unlike those considered in most studies of code-switching, are written data, obtained from channel #Cyprus of Internet Relay Chat. The results suggest that code-switching in writing is influenced not only by macro-sociolinguistic factors, but they are also shaped by the medium- and social-specific characteristics of Internet Relay Chat. This, in turn, allows internet users to gain access to different roles and perform various identities within this online context.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

People manage a spectrum of identities in cyber domains. Profiling individuals and assigning them to distinct groups or classes have potential applications in targeted services, online fraud detection, extensive social sorting, and cyber-security. This paper presents the Uncertainty of Identity Toolset, a framework for the identification and profiling of users from their social media accounts and e-mail addresses. More specifically, in this paper we discuss the design and implementation of two tools of the framework. The Twitter Geographic Profiler tool builds a map of the ethno-cultural communities of a person's friends on Twitter social media service. The E-mail Address Profiler tool identifies the probable identities of individuals from their e-mail addresses and maps their geographical distribution across the UK. To this end, this paper presents a framework for profiling the digital traces of individuals.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

A strong designated verifier signature scheme makes it possible for a signer to convince a designated verifier that she has signed a message in such a way that the designated verifier cannot transfer the signature to a third party, and no third party can even verify the validity of a designated verifier signature. We show that anyone who intercepts one signature can verify subsequent signatures in Zhang-Mao ID-based designated verifier signature scheme and Lal-Verma ID-based designated verifier proxy signature scheme. We propose a new and efficient ID-based designated verifier signature scheme that is strong and unforgeable. As a direct corollary, we also get a new efficient ID-based designated verifier proxy signature scheme.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The field was the curation of new media within large-scale exhibition practice for Chinese audiences. The context was improved understandings of the intertwining cultures and concerns of Chinese and Western contemporary practitioners. The research uncovered a range of connective and dialogical concerns around cultural displacement and re-identification, germane to the chosen group of media artists. The methodology was principally practice-led. The research brought together 31 practitioners from Asian, European and Australasian cultures within a major highly visible Chinese exhibition context. By identifying and promoting a distinct commonality within difference amongst the diverse practitioners the exhibition successfully activated a global dialogue that incorporated environmental and cultural identity agendas within a major Chinese educational and public context - thereby promulgating cross-cultural understanding, despite the often oppressive shadowing of domestic political processes. The project was developed under the international aegis of IDA Projects (established since 1999) and was substantially supported by the Fine Art Department of the Beijing Film Academy, QUT Precincts and Platform China Art Institute. It built upon IDA’s 2005 inaugural new media exhibition at the ‘Today Art’ Museum in Beijing – now recognised as one of the leading art spaces in China. Numerous peer-reviewed grants won included the Australian Embassy in China and the Australia China Council. Through subsequent invitations from external curators the work then traveled in a range of reconfigured formats to other major venues including the Block Gallery at QUT, Brisbane and ZAIM Artspace, Yokohama Japan. A major catalogue with authoritative essays was also printed.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In a digital world, users’ Personally Identifiable Information (PII) is normally managed with a system called an Identity Management System (IMS). There are many types of IMSs. There are situations when two or more IMSs need to communicate with each other (such as when a service provider needs to obtain some identity information about a user from a trusted identity provider). There could be interoperability issues when communicating parties use different types of IMS. To facilitate interoperability between different IMSs, an Identity Meta System (IMetS) is normally used. An IMetS can, at least theoretically, join various types of IMSs to make them interoperable and give users the illusion that they are interacting with just one IMS. However, due to the complexity of an IMS, attempting to join various types of IMSs is a technically challenging task, let alone assessing how well an IMetS manages to integrate these IMSs. The first contribution of this thesis is the development of a generic IMS model called the Layered Identity Infrastructure Model (LIIM). Using this model, we develop a set of properties that an ideal IMetS should provide. This idealized form is then used as a benchmark to evaluate existing IMetSs. Different types of IMS provide varying levels of privacy protection support. Unfortunately, as observed by Jøsang et al (2007), there is insufficient privacy protection in many of the existing IMSs. In this thesis, we study and extend a type of privacy enhancing technology known as an Anonymous Credential System (ACS). In particular, we extend the ACS which is built on the cryptographic primitives proposed by Camenisch, Lysyanskaya, and Shoup. We call this system the Camenisch, Lysyanskaya, Shoup - Anonymous Credential System (CLS-ACS). The goal of CLS-ACS is to let users be as anonymous as possible. Unfortunately, CLS-ACS has problems, including (1) the concentration of power to a single entity - known as the Anonymity Revocation Manager (ARM) - who, if malicious, can trivially reveal a user’s PII (resulting in an illegal revocation of the user’s anonymity), and (2) poor performance due to the resource-intensive cryptographic operations required. The second and third contributions of this thesis are the proposal of two protocols that reduce the trust dependencies on the ARM during users’ anonymity revocation. Both protocols distribute trust from the ARM to a set of n referees (n > 1), resulting in a significant reduction of the probability of an anonymity revocation being performed illegally. The first protocol, called the User Centric Anonymity Revocation Protocol (UCARP), allows a user’s anonymity to be revoked in a user-centric manner (that is, the user is aware that his/her anonymity is about to be revoked). The second protocol, called the Anonymity Revocation Protocol with Re-encryption (ARPR), allows a user’s anonymity to be revoked by a service provider in an accountable manner (that is, there is a clear mechanism to determine which entity who can eventually learn - and possibly misuse - the identity of the user). The fourth contribution of this thesis is the proposal of a protocol called the Private Information Escrow bound to Multiple Conditions Protocol (PIEMCP). This protocol is designed to address the performance issue of CLS-ACS by applying the CLS-ACS in a federated single sign-on (FSSO) environment. Our analysis shows that PIEMCP can both reduce the amount of expensive modular exponentiation operations required and lower the risk of illegal revocation of users’ anonymity. Finally, the protocols proposed in this thesis are complex and need to be formally evaluated to ensure that their required security properties are satisfied. In this thesis, we use Coloured Petri nets (CPNs) and its corresponding state space analysis techniques. All of the protocols proposed in this thesis have been formally modeled and verified using these formal techniques. Therefore, the fifth contribution of this thesis is a demonstration of the applicability of CPN and its corresponding analysis techniques in modeling and verifying privacy enhancing protocols. To our knowledge, this is the first time that CPN has been comprehensively applied to model and verify privacy enhancing protocols. From our experience, we also propose several CPN modeling approaches, including complex cryptographic primitives (such as zero-knowledge proof protocol) modeling, attack parameterization, and others. The proposed approaches can be applied to other security protocols, not just privacy enhancing protocols.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The emergence of mobile and ubiquitous computing has created what is referred to as a hybrid space – a virtual layer of digital information and interaction opportunities that sits on top and augments the physical environment. The increasing connectedness through such media, from anywhere to anybody at anytime, makes us less dependent on being physically present somewhere in particular. But, what is the role of ubiquitous computing in making physical presence at a particular place more attractive? Acknowledging historic context and identity as important attributes of place, this work embarks on a ‘global sense of place’ in which the cultural diversity, multiple identities, backgrounds, skills and experiences of people traversing a place are regarded as social assets of that place. The aim is to explore ways how physical architecture and infrastructure of a place can be mediated towards making invisible social assets visible, thus augmenting people’s situated social experience. Thereby, the focus is on embodied media, i.e. media that materialise digital information as observable and sometimes interactive parts of the physical environment hence amplify people’s real world experience, rather than substituting or moving it to virtual spaces.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Usability in HCI (Human-Computer Interaction) is normally understood as the simplicity and clarity with which the interaction with a computer program or a web site is designed. Identity management systems need to provide adequate usability and should have a simple and intuitive interface. The system should not only be designed to satisfy service provider requirements but it has to consider user requirements, otherwise it will lead to inconvenience and poor usability for users when managing their identities. With poor usability and a poor user interface with regard to security, it is highly likely that the system will have poor security. The rapid growth in the number of online services leads to an increasing number of different digital identities each user needs to manage. As a result, many people feel overloaded with credentials, which in turn negatively impacts their ability to manage them securely. Passwords are perhaps the most common type of credential used today. To avoid the tedious task of remembering difficult passwords, users often behave less securely by using low entropy and weak passwords. Weak passwords and bad password habits represent security threats to online services. Some solutions have been developed to eliminate the need for users to create and manage passwords. A typical solution is based on generating one-time passwords, i.e. passwords for single session or transaction usage. Unfortunately, most of these solutions do not satisfy scalability and/or usability requirements, or they are simply insecure. In this thesis, the security and usability aspects of contemporary methods for authentication based on one-time passwords (OTP) are examined and analyzed. In addition, more scalable solutions that provide a good user experience while at the same time preserving strong security are proposed.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This artwork visualised my digital mind which is built on my technology experience. The contemporary technologies make available many small pieces of factual information that have affected the formation of my identity. This results that multiple identities can exist in a rhizomatic form through a vertical gene transfer. This does not refer to schizophrenia, but an ongoing transformation of digital mind.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This thesis builds on the scholarship and practical know-how that have emerged from digital storytelling projects around the world with diverse groups of participants in a range of institutions. I have used the results of these projects to explore the opportunities Digital Storytelling workshop practice may hold for women’s participation in the public sphere in Turkey. Through theoretical discussion and practical experimentation, I examine the potential of Digital Storytelling workshop practice as a means to promote agency and self-expression in a feminist activist organisation, focusing in particular on whether Digital Storytelling can be used as a change agent – as a tool for challenging the idea of public sphere in ways that make it more inclusive of women’s participation. The thesis engages with feminist scholarship’s critiques of the public/private dichotomy, as well as the concept of gender, to seek connections with narrative identity in the light of the analysis of the Digital Storytelling workshops and the digital stories that were created in a feminist context. The study on which this thesis is based saw the introduction of Digital Storytelling to Turkey for the first time through workshops in Istanbul and Antakya, conducted in partnership with the feminist activist organisation Amargi Women’s Academy. Applying the principles of feminist post-structuralist discourse analysis as used by Judith Baxter (2003), I examine two sets of data collected in this project. First, I analyse the interactions during the Digital Storytelling workshops, where women from Amargi created their digital stories in a collaborative setting. This is done through participatory observation notes and in-depth interviews with the workshop participants and facilitators. Second, I seek to uncover the strategies that these women used to ‘speak back to power’ in their digital stories, reading these as texts. I conclude that women from the Amargi network used the workshops to create digital content in order to communicate their concerns about issues that can be classified as gender-specific matters. During this process, they also cooperated, established new connections, and at the end of the process even defined new ways of using, circulating and repurposing their digital stories for feminist activism in Turkey. My research thereby contributes equally to feminist discourse analysis, the study of new-media usage and uptake among non-professionals, and the study of media–public sphere interactions in a particular national setting: Turkey. My conclusion indicates that the process of production is as important as the product itself, and from that I am able to draw out some strategies for developing digitally equipped women’s activism in Turkey.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This essay considers a specific digital ‘archive’ of early Australian children’s literature, known as the Children’s Literature Digital Resources (CLDR), which is located in AustLit: The Australian Literature Resource ( http://www.austlit.edu.au ). We examine what the CLDR collection can tell us about Australia’s history. To narrow the scope, we focus on how Australia was constructing itself as a nation with its own character, or national identity, in texts written for children from the latter part of the nineteenth century up until the end of World War II. Our approach is to consider how early Australian children’s literature included in the CLDR collection rhetorically constructs nation and place, and in so doing constructs an Australian identity for its implied readers.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This article explores how queer digital storytellers understand and mobilize concepts of privacy and publicness as they engage in everyday activism through creating and sharing personal stories designed to contribute to cultural and political debates. Through the pre-production, production, and distribution phases of digital storytelling workshops and participation in a related online community, these storytellers actively negotiate the tensions and continuua among visibility and hiddenness; secrecy and pride; finite and fluid renditions of self; and individual and collective constructions of identity. We argue that the social change they aspire to is at least partially achieved through “networked identity work” on and offline with both intimate and imagined publics.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper explores the process of introducing Digital Storytelling (DST) workshop practice to Turkey through a project called “Digital Stories from Amargi Women”, which was part of my Ph.D. research in the Creative Industries Faculty, Queensland University of Technology, Australia. In the resulting dissertation, I examined the potential of Digital Storytelling workshop practice as a means to promote agency and self-expression in a feminist activist organization (such as Amargi Women), focusing in particular on whether or not Digital Storytelling can be used as a change agent – as a tool for challenging the idea of a single public sphere in ways that make it more inclusive of women’s participation. In order to explore the issue in depth, my thesis engaged with feminist scholarship’s critiques of the public/private dichotomy, as well as the concept of gender. The conducted workshops, the resulting digital stories, and in-depth interviews were analyzed to seek connections between these topics and narrative identity. The results indicated that the participating women defined new activist usages for digital stories, as well as their overall activated networking habits in the DST workshop settings. Digital Stories from Amargi Women became the first Digital Storytelling project that aimed to enable women’s participation in Turkey through facilitating a co-creative environment where the participants could share their stories and learn digital skills that they could make use of after the workshops.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The World Wide Web constitutes one of the most important inventions of the late 20th century: it has changed culture, society, business, communication, politics, and many other fields of human endeavour, not least also by providing a more user-friendly pathway of access to its major underlying technology, the Internet itself. Key phases in its development can be charted, especially by how it has been used to present and share information – and here, the personal or professional, private or official homepage stands in as a useful representation of wider Web trends overall. From hand-coded beginnings through several successive stages of experimentation and standardisation, to the shifting balance between personal sites and social networks, the homepage demonstrates how the Web itself, and its place in our lives, have changed.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In 2011 Queensland suffered both floods and cyclones, leaving residents without homes and their communities in ruins (2011). This paper presents how researchers from QUT, who are also members of the Oral History Association of Australia (OHAA) Queensland’s chapter, are using oral history, photographs, videography and digital storytelling to help heal and empower rural communities around the state and how evaluation has become a key element of our research. QUT researchers ran storytelling workshops in the capital city of Brisbane i early 2011, after the city suffered sever flooding. Cyclone Yasi then struck the town of Cardwell (in February 2011) destroying their historical museum and recording equipment. We delivered an 'emergency workshop', offering participants hands on use of the equipment, ethical and interviewing theory, so that the community could start to build a new collection. We included oral history workshops as well as sessions on how best to use a video camera, digital camera and creative writing sessions, so the community would also know how to make 'products' or exhibition pieces out of the interviews they were recording. We returned six months later to conduct follow-up workshops and the material produced by and with the community had been amazing. More funding has now been secured to replicate audio/visual/writing workshops in other remote rural Queensland communities including Townsville, Mackay and Cunnamulla and Toowoomba in 2012, highlighting the need for a multi media approach, to leverage the most out of OH interviews as a mechanism to restore and promote community resilience and pride.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Over the past couple of decades, the cultural field formerly known as ‘domestic’, and later ‘personal’ photography has been remediated and transformed as part of the social web, with its convergence of personal expression, interpersonal communication, and online social networks (most recently via platforms like Flickr, Facebook and Twitter). Meanwhile, the Digital Storytelling movement (involving the workshop-based production of short autobiographical videos) from its beginnings in the mid 1990s relied heavily on the narrative power of the personal photograph, often sourced from family albums, and later from online archives. This paper addresses the new issues arising for the politics of self-representation and personal photography in the era of social media, focusing particularly on the consequences of online image-sharing. It discusses in detail the practices of selection, curation, manipulation and editing of personal photographic images among a group of activist-oriented queer digital storytellers who have in common a stated desire to share their personal stories in pursuit of social change, and whose stories often aim to address both intimate and antagonistic publics.