824 resultados para Single Sign-On, Shibboleth, Identity Provider, Identity Federation, SAML
Resumo:
This paper lays down some theoretical framework for further research to be made on the subject of how identity of young Slovenian and Catalan users is forming within the social networking website Facebook. The author pursues his interest based on observation of how communicationand thus interaction between users is changing and how this is reflected in everyday practices. In so doing he tries to identify the connections between the individual, society and technology, asthese are more and more interwoven, and we cannot think one without the other in thecontemporary globalised world.
Resumo:
Objective To associate the territory of identity with the production of care within a PCC focusing on children and adolescents with drug abuse and their institutional identity. Method We used the “ process tracing methodology” in four research categories: focus groups, characterization of professionals, observing the everyday and interviewing two members of emblematic cases of the service. Results territory of identity of the institution, which operates the production of care is crossed by the difficulty of dealing with the complexity brought by the users and the performance of the PCC network. This paper is also permeated by different conceptions of care and small problematization of these issues in collective spaces of service. Conclusion The discussion in focus groups and other devices can be powerful resources to reframe the meaning of care and identity of collective service.
Resumo:
A population register is an inventory of residents within a country, with their characteristics (date of birth, sex, marital status, etc.) and other socio-economic data, such as occupation or education. However, data on population are also stored in numerous other public registers such as tax, land, building and housing, military, foreigners, vehicles, etc. Altogether they contain vast amounts of personal and sensitive information. Access to public information is granted by law in many countries, but this transparency is generally subject to tensions with data protection laws. This paper proposes a framework to analyze data access (or protection) requirements, as well as a model of metadata for data exchange.
Resumo:
The taxonomic identity of the butterfly Heliconius melpomene f. pyritosa var. fumigata Zikán, 1937 (Nymphalidae: Heliconiinae) is discussed based on the discovery of the specimen based on which this name was assigned. The specimen is not a variation of Eueides tales surdus Stichel, 1903, as previously stated, but is in fact a variation of H. melpomene f. pyritosa, which is a synonym of Heliconius erato amalfreda Riffarth, 1901.
Resumo:
The HbpR protein is the sigma54-dependent transcription activator for 2-hydroxybiphenyl degradation in Pseudomonas azelaica. The ability of HbpR and XylR, which share 35% amino acid sequence identity, to cross-activate the PhbpC and Pu promoters was investigated by determining HbpR- or XylR-mediated luciferase expression and by DNA binding assays. XylR measurably activated the PhbpC promoter in the presence of the effector m-xylene, both in Escherichia coli and Pseudomonas putida. HbpR weakly stimulated the Pu promoter in E. coli but not in P. azelaica. Poor HbpR-dependent activation from Pu was caused by a weak binding to the operator region. To create promoters efficiently activated by both regulators, the HbpR binding sites on PhbpC were gradually changed into the XylR binding sites of Pu by site-directed mutagenesis. Inducible luciferase expression from mutated promoters was tested in E. coli on a two plasmid system, and from mono copy gene fusions in P. azelaica and P. putida. Some mutants were efficiently activated by both HbpR and XylR, showing that promoters can be created which are permissive for both regulators. Others achieved a higher XylR-dependent transcription than from Pu itself. Mutants were also obtained which displayed a tenfold lower uninduced expression level by HbpR than the wild-type PhbpC, while keeping the same maximal induction level. On the basis of these results, a dual-responsive bioreporter strain of P. azelaica was created, containing both XylR and HbpR, and activating luciferase expression from the same single promoter independently with m-xylene and 2-hydroxybiphenyl.
Resumo:
Under the influence of intelligence-led policing models, crime analysis methods have known of important developments in recent years. Applications have been proposed in several fields of forensic science to exploit and manage various types of material evidence in a systematic and more efficient way. However, nothing has been suggested so far in the field of false identity documents.This study seeks to fill this gap by proposing a simple and general method for profiling false identity documents which aims to establish links based on their visual forensic characteristics. A sample of more than 200 false identity documents including French stolen blank passports, counterfeited driving licenses from Iraq and falsified Bulgarian driving licenses was gathered from nine Swiss police departments and integrated into an ad hoc developed database called ProfID. Links detected automatically and systematically through this database were exploited and analyzed to produce strategic and tactical intelligence useful to the fight against identity document fraud.The profiling and intelligence process established for these three types of false identity documents has confirmed its efficiency, more than 30% of documents being linked. Identity document fraud appears as a structured and interregional criminality, against which material and forensic links detected between false identity documents might serve as a tool for investigation.
Resumo:
La globalización cuestiona la existencia de una relación mimética entre ciudadanía y Estado-nación. Las identidades homogéneas, sustentadas ideológicamente en nociones como «lengua nacional», plantean problemas en sociedades en las que ha crecido espectacularmente la diversidad lingüística e identitaria. Cataluña es un territorio en el que una parte de la población afirma una identidad catalana distinta a la española y viceversa. Además, se ha teorizado que la identidad catalana y la lengua catalana coexisten mutuamente. Por eso, se suceden voces que defienden la presencia del catalán en la educación escolar como fuente de la identidad nacional catalana, mientras que otras voces defienden su presencia simplemente como una buena manera de aprender el catalán cuando no se puede aprender en el medio social y familiar. En los últimos años, Cataluña ha recibido casi un millón de personas extranjeras que han modificado notablemente su situación sociolingüística. Las últimas encuestas manifiestan que un 6,3% de la población utiliza habitualmente una lengua distinta del catalán y del castellano. En este marco, mostramos las construcciones identitarias de un grupo de adolescentes de origen extranjero que están en el segundo ciclo de la ESO. Los datos fueron recogidos mediante dos grupos de discusión de seis-siete estudiantes de distinto origen, lengua propia y tiempo de residencia en Cataluña. Los resultados muestran la importancia del lugar de origen en la construcción de la identidad. Además, los participantes que afirman sentimientos catalanes o españoles no los relacionan con la lengua sino con los intercambios sociales que han establecido con sus iguales de origen naciona. Las intervenciones muestran también las dificultades para promover identidades múltiples desde el contexto escolar que eviten actitudes racistas y xenófobas y sirvan para promover proyectos colectivos de futuro en los que se pueda vivir desde una cierta diferencia
Resumo:
The identity [r]evolution is happening. Who are you, who am I in the information society? In recent years, the convergence of several factors - technological, political, economic - has accelerated a fundamental change in our networked world. On a technological level, information becomes easier to gather, to store, to exchange and to process. The belief that more information brings more security has been a strong political driver to promote information gathering since September 11. Profiling intends to transform information into knowledge in order to anticipate one's behaviour, or needs, or preferences. It can lead to categorizations according to some specific risk criteria, for example, or to direct and personalized marketing. As a consequence, new forms of identities appear. They are not necessarily related to our names anymore. They are based on information, on traces that we leave when we act or interact, when we go somewhere or just stay in one place, or even sometimes when we make a choice. They are related to the SIM cards of our mobile phones, to our credit card numbers, to the pseudonyms that we use on the Internet, to our email addresses, to the IP addresses of our computers, to our profiles... Like traditional identities, these new forms of identities can allow us to distinguish an individual within a group of people, or describe this person as belonging to a community or a category. How far have we moved through this process? The identity [r]evolution is already becoming part of our daily lives. People are eager to share information with their "friends" in social networks like Facebook, in chat rooms, or in Second Life. Customers take advantage of the numerous bonus cards that are made available. Video surveillance is becoming the rule. In several countries, traditional ID documents are being replaced by biometric passports with RFID technologies. This raises several privacy issues and might actually even result in changing the perception of the concept of privacy itself, in particular by the younger generation. In the information society, our (partial) identities become the illusory masks that we choose -or that we are assigned- to interplay and communicate with each other. Rights, obligations, responsibilities, even reputation are increasingly associated with these masks. On the one hand, these masks become the key to access restricted information and to use services. On the other hand, in case of a fraud or negative reputation, the owner of such a mask can be penalized: doors remain closed, access to services is denied. Hence the current preoccupying growth of impersonation, identity-theft and other identity-related crimes. Where is the path of the identity [r]evolution leading us? The booklet is giving a glance on possible scenarios in the field of identity.
Resumo:
* Arbuscular mycorrhizal fungi (AMF) are plant symbionts that improve floristic diversity and ecosystem productivity. Many AMF species are generalists with wide host ranges. Arbuscular mycorrhizal fungi individuals are heterokaryotic, and AMF populations are genetically diverse. Populations of AMF harbor two levels of genetic diversity on which selection can act, namely among individuals and within individuals. Whether environmental factors alter genetic diversity within populations is still unknown. * Here, we measured genetic changes and changes in fitness-related traits of genetically distinct AMF individuals from one field, grown with different concentrations of available phosphate or different host species. * We found significant genotype-by-environment interactions for AMF fitness traits in response to these treatments. Host identity had a strong effect on the fitness of different AMF, unearthing a specificity of response within Glomus intraradices. Arbuscular mycorrhizal fungi individuals grown in novel environments consistently showed a reduced presence of polymorphic genetic markers, providing some evidence for host or phosphate-induced genetic change in AMF. * Given that AMF individuals can form extensive hyphal networks colonizing different hosts simultaneously, contrasting habitats or soil properties may lead to evolution in the population. Local selection may alter the structure of AMF populations and maintain genetic diversity, potentially even within the hyphal network of one fungus.
Resumo:
1. Accumulating evidence indicates that plant resistance against above-ground herbivores can be affected by the presence of arbuscular mycorrhizal fungi (AMF) in association with the host plant. Little is known, however, about how AMF composition can influence herbivore choice to feed on a particular plant. 2. Unravelling the preference-performance hypothesis in a multitrophic context is needed to expand our knowledge of complex multitrophic interactions in natural systems. If given mycorrhizal fungal genotypes increase attractiveness for a herbivore (reduced plant resistance), then the benefits of increased unpalatability provided by the mycorrhizal fungi (increased plant resistance) might be outweighed by the increased herbivore recruitment. 3. This was addressed by designing three experiments to test the effects of different AMF genotypes, inoculated either alone or in combination, to measure intraspecific AMF effects on plant resistance and insect herbivore preference. Using strawberry (Fragaria vesca L.) plants that were colonised by eight different combinations of Rhizophagus irregularis isolates, we measured effects on plant growth, insect growth and survival, as well as feeding preferences of a generalist herbivore caterpillar (Spodoptera littoralis Boisduval). 4. Overall, it was found that: (i) AMF influenced plant resistance in an AMF genotype-specific manner; (ii) some AMF inoculations decreased insect performance; (iii) insects preferentially chose to feed more on leaves originating from non-mycorrhizal plants; but also that (iv) in a whole plant bioassay, insects preferentially chose the biggest plant, regardless of their mycorrhizal status. 5. Therefore, AMF-mediated trade-offs between growth and resistance against herbivores have been shown. Such trade-offs, particularly driven by plant attractiveness to herbivores, buffer the positive effects of the mycorrhizal symbiosis on enhanced plant growth.
Resumo:
En este trabajo se expone e ilustra un modelo teórico para entender las funciones de la identidad, así como los mecanismospsicosociales asociados a su construcción: “Modelo Evolutivo y Funcional de la Identidad Mediada” (MEBIM). La identidad, mediada narrativamente, cumple una función personal orientada a la dirección de la propia vida, así como una función sociocultural vinculada a la búsqueda de reconocimiento de los derechos de los grupos sociales a los que uno se siente apegado. Se ilustran los factores asociados a la construcción de la identidad personal (sí mismos posibles, transiciones vitales, vínculo afectivo) y sociocultural (acción-transformación e identificación simbólica) a partir de 12 historias de vida realizadas con mestizos e indígenasde la Universidad Intercultural de Chiapas (México). Se sugiere que en contextos educativos formales, como la escuela o la Universidad, se deben propiciar narrativas personales y socioculturales con el objetivo de optimizar la identidad en un mundo a la vez globalizado y plural
Resumo:
False identity documents represent a serious threat through their production and use in organized crime and by terrorist organizations. The present-day fight against this criminal problem and threats to national security does not appropriately address the organized nature of this criminal activity, treating each fraudulent document on its own during investigation and the judicial process, which causes linkage blindness and restrains the analysis capacity. Given the drawbacks of this case-by-case approach, this article proposes an original model in which false identity documents are used to inform a systematic forensic intelligence process. The process aims to detect links, patterns, and tendencies among false identity documents in order to support strategic and tactical decision making, thus sustaining a proactive intelligence-led approach to fighting identity document fraud and the associated organized criminality. This article formalizes both the model and the process, using practical applications to illustrate its powerful capabilities. This model has a general application and can be transposed to other fields of forensic science facing similar difficulties.
Resumo:
Essay on the origin, use and development of the arcuated lintel in ancient Rome and the configuration of the so– called ‘Serlian motif’. These architectural elements will be related to the architecture of prestige on its technical, functional, visual and symbolic sphere. Its depictions, in addition to buildings, can offer a rich repertory of images that speak about the relations between visual culture, religion and power. Furthermore, the analyzed motifs will become important elements of the Western cultural legacy for centuries. The analysis of these events will contribute to the comprehension of the role played by some resources of ancient Rome architecture of prestige and its success
Resumo:
The production and use of false identity and travel documents in organized crime represent a serious and evolving threat. However, a case-by-case perspective, thus suffering from linkage blindness and a limited analysis capacity, essentially drives the present-day fight against this criminal problem. To assist in overcoming these limitations, a process model was developed using a forensic perspective. It guides the systematic analysis and management of seized false documents to generate forensic intelligence that supports strategic and tactical decision-making in an intelligence-led policing approach. The model is articulated on a three-level architecture that aims to assist in detecting and following-up on general trends, production methods and links between cases or series. Using analyses of a large dataset of counterfeit and forged identity and travel documents, it is possible to illustrate the model, its three levels and their contribution. Examples will point out how the proposed approach assists in detecting emerging trends, in evaluating the black market's degree of structure, in uncovering criminal networks, in monitoring the quality of false documents, and in identifying their weaknesses to orient the conception of more secured travel and identity documents. The process model proposed is thought to have a general application in forensic science and can readily be transposed to other fields of study.
Resumo:
Gender identity disorder is defined as a permanent desire to relieve one's own sexual features to acquire the sexual features and line to life of the opposite sex. The diagnosis is based on the psychiatric evaluation and treatment on an interdisciplinary approach by endocrinologists, surgeons and psychiatrists, and can be conceptualized into distinct phases: diagnostic evaluation, real life experience, hormonal treatment and surgery. Multiples challenges have to be faced, especially by the psychiatrist who follows the patient during the whole process.