894 resultados para Postcolonial identity


Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this computerized, globalised and internet world our computer collects various types of information’s about every human being and stores them in files secreted deep on its hard drive. Files like cache, browser history and other temporary Internet files can be used to store sensitive information like logins and passwords, names addresses, and even credit card numbers. Now, a hacker can get at this information by wrong means and share with someone else or can install some nasty software on your computer that will extract your sensitive and secret information. Identity Theft posses a very serious problem to everyone today. If you have a driver’s license, a bank account, a computer, ration card number, PAN card number, ATM card or simply a social security number you are more than at risk, you are a target. Whether you are new to the idea of ID Theft, or you have some unanswered questions, we’ve compiled a quick refresher list below that should bring you up to speed. Identity theft is a term used to refer to fraud that involves pretending to be someone else in order to steal money or get other benefits. Identity theft is a serious crime, which is increasing at tremendous rate all over the world after the Internet evolution. There is widespread agreement that identity theft causes financial damage to consumers, lending institutions, retail establishments, and the economy as a whole. Surprisingly, there is little good public information available about the scope of the crime and the actual damages it inflicts. Accounts of identity theft in recent mass media and in film or literature have centered on the exploits of 'hackers' - variously lauded or reviled - who are depicted as cleverly subverting corporate firewalls or other data protection defenses to gain unauthorized access to credit card details, personnel records and other information. Reality is more complicated, with electronic identity fraud taking a range of forms. The impact of those forms is not necessarily quantifiable as a financial loss; it can involve intangible damage to reputation, time spent dealing with disinformation and exclusion from particular services because a stolen name has been used improperly. Overall we can consider electronic networks as an enabler for identity theft, with the thief for example gaining information online for action offline and the basis for theft or other injury online. As Fisher pointed out "These new forms of hightech identity and securities fraud pose serious risks to investors and brokerage firms across the globe," I am a victim of identity theft. Being a victim of identity theft I felt the need for creating an awareness among the computer and internet users particularly youngsters in India. Nearly 70 per cent of Indian‘s population are living in villages. Government of India already started providing computer and internet facilities even to the remote villages through various rural development and rural upliftment programmes. Highly educated people, established companies, world famous financial institutions are becoming victim of identity theft. The question here is how vulnerable the illiterate and innocent rural people are if they suddenly exposed to a new device through which some one can extract and exploit their personal data without their knowledge? In this research work an attempt has been made to bring out the real problems associated with Identity theft in developed countries from an economist point of view.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Now a days, email has become the most widely communication way in daily life. The main reason for using email is probably because of the convenience and speed in which it can be transmitted irrespective of geographical distances. To improve security and efficiency of email system, most of the email system adopt PKI and IBE encryption schemes. However, both PKI and IBE encryption schemes have their own shortcomings and consequently bring security issues to email systems. This paper proposes a new secure email system based on IBE which combines finger print authentication and proxy service for encryption and decryption

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Resumen tomado de la publicaci??n

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Resumen tomado de la publicaci??n

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Resumen tomado de la publicaci??n

Relevância:

20.00% 20.00%

Publicador:

Resumo:

WAIS Seminar, presented 29 Mar 2012

Relevância:

20.00% 20.00%

Publicador:

Resumo:

For Ethics in a Complex World module. General topics with links to resources about identity and privacy. Mainly looking at online identity and how you manage it effectively.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Three things to think about and Three possible futures to discuss

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Week 4

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This article presents a reflection about the Disability like a human phenomenon, which needs not only new definitions if not a criticism point of view as a Concept, with the end of indicate representations forms not only for people with disabilities if not for the citizens in general. Considers discourses that identify arguments from social sciences, appearing the Disability like a differentiate condition between human beings, mainly for an exclusion process that announce social behaviors in relations with the persons with disabilities.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

La arquitectura de la Cooperación Internacional ha atravesado varios cambios. Entre ellos, el surgimiento de la Cooperación Sur-Sur dejó entrever el marcado interés de los países en desarrollo por hacer parte de la misma. En Brasil, el gobierno de Lula da Silva fue el gran promotor de esta cooperación, especialmente con aquellos países de habla portuguesa en África. En este contexto, la presente monografía pretende determinar de qué manera la construcción social de identidad incide en la dinámica de Cooperación Sur-Sur entre Brasil y los países lusófonos africanos. Mediante una perspectiva constructivista, se analiza el valor de diversos elementos sociales, culturales e históricos cuya interacción configuró determinadas percepciones entre Brasil y los países lusófonos africanos. Este proceso de interacción social permitió la consolidación de una identificación positiva entre ellos, fortaleciendo su acercamiento político y generando así un considerable aumento en el volumen y las temáticas de los proyectos de cooperación formulados de 2003 a 2010.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

El presente trabajo describe la identidad organizacional de una antigua Universidad Colombiana – Universidad del Rosario – desde 1890 hasta 1991. Esta descripción detallada se realizó con el propósito de hacer preguntas y señalar algunos de los desafíos que esta universidad se encontrará al educar las nuevas generaciones de la nación para la sociedad del conocimiento. Este documento también describe brevemente las características más importantes de la sociedad del conocimiento, así como las características de las universidades que desarrollan sus actividades en ella. También, se hace una síntesis sobre el estado de desarrollo de la sociedad del conocimiento en Colombia. Finalmente, se extraen algunas conclusiones a acerca de las oportunidades de cambio que tendrá la identidad Rosarista para continuar siendo relevante en el siglo XXI.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

El interés de este estudio de caso es analizar el Programa Conjunto de UNFPA y UNICEF sobre MGF/E en Kenia bajo la luz de los postulados poscolonialistas. Partiendo de la idea de que la MGF es una manifestación de las desigualdades de género, se argumenta que el PC reproduce la imagen de la mujer keniana como una víctima del poder masculino. A partir de esta imagen se deslegitima el orden cultural de los grupos que siguen esta tradición, afectando las lógicas de unidad y cohesión de la sociedad. El análisis de este tipo de dinámicas permite comprender mejor los procesos de intervención de las organizaciones internacionales sobre las estructuras sociales de actores frágiles del sistema internacional.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Se realiza un análisis de 'Inmenso estrecho', obra que recopila relatos sobre inmigración escritos por 25 autores y que presenta una panorámica de las reacciones que provoca la inmigración en España. Se reflexiona sobre los distintos relatos y sobre el comportamiento de los personajes y se ponen en relación con los descritos por el psicólogo Salman Akhtar que ha estudiado los procesos de adaptación de los inmigrantes a los países de acogida.