131 |
Ankara, 1923-1950: The Socio-spatial Manifestation Of Republican WillTak, Ahmet 01 February 2007 (has links) (PDF)
ANKARA, 1923-1950: THE SOCIO-SPATIAL MANIFESTATION OF
REPUBLICAN WILL
Tak, Ahmet
Ph. D., Department of Sociology
Supervisor: Prof. Dr. Yusuf Ziya Ö / zcan
February 2007, 248 pages
The social, cultural, aesthetic, and spatial aspects of the urban transformation in its specific relationship with a certain ideology is examined in the study. Ankara, as the capital city of a new state, is regarded as a materialized reflection of the modernization program of the Kemalist ideology which defined the main foundations of the Republic and shaped its formation. The formation process of Ankara is tried to
be understood in a historical deepness. Therefore, in order to comprehend the nature of the social transformation, in a historical context, Istanbul is taken into consideration as a model for the traditional Ottoman city because it had represented the Ottoman urban ideals with its social, cultural and aesthetic aspects. From the Ottoman period to the Republican, the structural transformation of the cities is tried
to be studied with referring to a notion of crisis which has covered the cultural area.
Ankara had been the most important place where the endeavors of the Republican elite to build a nation and to create a national culture and identity had became manifest explicitly and in the most pure form. Therefore, the creation process of Ankara presents us an important exemple to understand social and cultural dimensions of the Turkish modernization in the Republican period. In the context of
Ankara, the process of establishing a modern and national high culture and identity in the tensions between modernity and traditionalism and its consequences are
examined in the study.
|
132 |
Entwicklung und Betrieb eines Anonymisierungsdienstes für das WWWKöpsell, Stefan 10 March 2010 (has links) (PDF)
Die Dissertation erläutert, wie ein Anonymisierungsdienst zu gestalten ist, so daß er für den durchschnittlichen Internetnutzer benutzbar ist.
Ein Schwerpunkt dabei war die Berücksichtigung einer möglichst holistischen Sichtweise auf das Gesamtsystem "Anonymisierungsdienst".
Es geht daher um die ingenieurmäßige Berücksichtigung der vielschichtigen Anforderungen der einzelnen Interessengruppen.
Einige dieser Anforderungen ergeben sich aus einem der zentralen Widersprüche: auf der einen Seite die Notwendigkeit
von Datenschutz und Privatheit für den Einzelnen, auf der anderen Seite die ebenso notwendige Überwachbarkeit und Zurechenbarkeit, etwa für die Strafverfolgung.
Die Dissertation beschäftigt sich mit dem Aufzeigen und Entwickeln von technischen Möglichkeiten, die zur Lösung dieses Widerspruches herangezogen werden können.
|
133 |
How reliable are the marginal totals in cooperation experiments in the laboratory?Berger, Roger 22 July 2014 (has links) (PDF)
Subjects in laboratory experiments are prone to effects of social desirability. This reactive behavior is due to the subjects perceived anonymity in the entire experiment. Especially, socially desirable behavior is also triggered by assembling and/or payment procedures that are not anonymous. Indeed, in a laboratory experiments with a one-shot prisoner’s dilemma (PD) and perfect stranger anonymity
subjects (n=174) showed significantly different cooperation rates depending on the anonymity conditions during assembling and the payment procedure, ranging from 33.3% to 19.9%. In addition, a first experiment with the PD and anonymous payment and double blind experimenting lead to a cooperation rate of 33.3%. Only after the same subjects (n=34) took part a second time in same, entire experiment,
the cooperation rate fell to 8.8%. Therefore this measurement of the cooperation rates in a laboratory experiment failed the test-retest check on reliability. This happened though all manipulations used fulfilled the standards of fully anonymous experimenting. This means that such processes could go unnoticed and bias the results of any standard laboratory experiment on cooperation in one shot decisions. Therefore, in accordance with the textbook logic of laboratory experiments, but in contrast to a common practice (cf. Behavioral Game
Theory) marginal totals from cooperation experiments in the laboratory should not be interpreted.
|
134 |
Personnel et impersonnel dans la conception de la chair chez Merleau-Ponty / Personal et impersonal dimension in Merleau-Ponty's conception of fleshBocca, Roberta 01 December 2017 (has links)
Notre projet vise à suivre et reconstruire, de l’intérieur de la pensée de Merleau-Ponty, le concept de « personnel » dans sa relation avec ceux d’« impersonnel » et de « généralité », les trois étant impliqués dans la notion de « chair » et faisant partie de la reformulation du sujet et de l’identité. Selon nous, négliger la connexion existante entre les aspects les plus « personnels » de chaque individu et ceux plus « généraux », qui soutiennent une conception aussi bien du sujet que de la société, donne lieu à une lecture partielle de l’auteur. Cela risque, de surcroît, de rendre difficile la compréhension de la dimension qui en est la synthèse la plus avancée chez Merleau-Ponty, à savoir sa dimension « charnelle ». Étudier la relation qui entrelace le « personnel » au « général », en passant par l’analyse du concept d’« anonymat », revient à chercher une clef d’intelligibilité majeure de la pensée merleau-pontienne, qui respecte l’ampleur de sa réflexion, pour en entrevoir les raisons de départ et en justifier les points d’arrivée, grâce à l’approfondissement de ses textes encore inédits. / Our project aims to reconstitute, from the inside of Merleau-Ponty’s philosophical thought, the concept of « personal » in relation to the concepts of « impersonal » and « generality ». Those three concepts are involved in the notion of « flesh » and are part of the reformulation of the terms of subject (person) and identity. According to us, neglecting the bond between the more « personal » aspects of an individual and those more « general », aspects which support a conception of both subject and society, would lead to a « partial » interpretation of our author. In addition, it would make difficult the understanding of Merleau-Ponty’s most advanced synthesis, namely the dimension of the flesh. Studying the relation that intertwines the « personal » with the « general », through the examination of the importance of the notion of « anonymity » for our author, would mean instead looking for a central key of reading in the merleau-pontian thought, that would respect the whole amplitude of its reflection, so to sense the starting reasons and justify the arriving points, thanks to the in-depth study of its still unpublished texts.
|
135 |
La lutte contre la cybercriminalité au regard de l’action des États / The fight against cyber crime under state actionBoos, Romain 09 December 2016 (has links)
Le XXIe siècle voit la consécration des technologies numériques comme la fin du Moyen Âge a vu celle de l’imprimerie. L’ère numérique ignore désormais toutes les frontières. Elle permet l’accès à la culture et à la connaissance, favorise les échanges entre les personnes. Elle rend possible la constitution d’une économie en ligne et rapproche le citoyen de son administration. Les technologies numériques sont porteuses d’innovation et de croissance, en même temps qu’elles peuvent aider ou accélérer le développement des pays émergents. Mais un certain pessimisme vient tempérer cette approche idéaliste. Tous les progrès génèrent aussi de nouvelles fragilités et vulnérabilités propices aux menaces ou aux risques, car ils aiguisent l’imagination des criminels. La cybercriminalité est désormais une réalité. Elle est d’autant plus dangereuse qu’elle pénètre au sein des familles, là où la délinquance ordinaire n’avait pas accès jusqu’à présent. Dès lors, cette nouvelle forme de criminalité laisse apparaître comme une évidence, l'adaptation du système judiciaire. En effet, face à ces atteintes, il existe bel et bien des lois qui sont d'ores et déjà appliquées à l’Internet. Mais sont-elles réellement efficaces ? Dans le même sens, la coopération interétatique est-elle également suffisante pour lutter efficacement contre la cybercriminalité ? Ainsi, il importe de se demander si dans notre société moderne, le cadre normatif et la coopération institutionnelle tant européenne qu'internationale, sont suffisants et efficaces pour sanctionner les infractions cybercriminelles ? / The twenty-first century sees the consecration of digital technologies just as the end of the Middle-Ages saw the creation of printing.Henceforth, the digital era has no limits. It gives access to culture and knowledge, encourages the exchanges between people.It allows the constitution of an economy online and brings citizens closer to their adminitration. Digital technologies generate innovation and growth, and can help or accelerate the development of the emergent countries as well. But a certain pessimism moderates this idealistic approach.All these advances also generate new fragilities and vulnerabilities propicious to threats or risks, as they stimulate the criminals' imagination.Now , cybercriminality has become reality.It is all the more dangerous as it penetrates within families , where ordinary delinquency didn't exist until now. From now on, this new kind of criminality made it obvious that the judicial system had to be adapted. Indeed , faced with these violations , there are of course laws that are applied here and now to the Internet.But , are they really efficient? In the same way, is the intersate cooperation also sufficient to fight against cybercriminality? So , it is important to wonder whether , in our modern society , the legislative framework and the institutional cooperation , both european and international , are sufficient and efficient to penalize the cybercriminal offences.
|
136 |
PROTAGONISTAS DO COTIDIANO NA REVISTA PIAUÍSilva, Francilene de Oliveira 07 April 2010 (has links)
Made available in DSpace on 2016-08-03T12:31:09Z (GMT). No. of bitstreams: 1
Francilene de Oliveira SilvaPDF.pdf: 1960459 bytes, checksum: 1d90c67fd776856d105fb5b5f11dea10 (MD5)
Previous issue date: 2010-04-07 / Coordenação de Aperfeiçoamento de Pessoal de Nível Superior / This study investigates the importance of the anonym and the quotidian for the history and for Brazilian journalism, in a general democratization way that propitiate a better understanding of the boarded moment social reality. For this I seek to important concepts that explains the reality where we live, the complexity and the interdisciplinarity, mainly between three areas: History, Literature and Anthropology. Since the 20th century, the "anonym" has been seen in a singular way by the historiographers in a sense of a Social History Realization. In Journalism, the importance given to the "Quotidian Protagonist", term that I am using in this work, has been short, as I see. Despite of this, some more advanced journalistic initiatives try to rescue the place of these anonymous "voices" in the social life. My work tells about one of these, the piauí magazine.(AU) / Este estudo investiga a presença e a importância do anônimo e do cotidiano para a história e para o jornalismo brasileiro, no sentido de democratização de vozes que propicia um melhor entendimento da realidade social do momento abordado. Para isso, recorro a conceitos importantes que melhor explicam a realidade em que vivemos como o de complexidade e transdisciplinaridade, enfocando três áreas: História, Literatura e Antropologia. Desde o século XX, o anônimo tem sido visto com olhar diferenciado pelos historiadores no sentido de realização de uma história social. No jornalismo, a importância dada ao protagonista do cotidiano , como me refiro neste trabalho, tem sido pequena, segundo entendo. Apesar disso, algumas iniciativas jornalísticas mais avançadas procuram resgatar o espaço dessas vozes anônimas na vida social. Meu estudo versa sobre uma delas, a revista piauí.(AU)
|
137 |
A soberania dos dados versus a autonomia do usuário: Big Data, Internet das Coisas e as estratégias afirmativas do anonimatoAbreu, Giovanna Oliveira Lima de 29 May 2015 (has links)
Submitted by Clebson Anjos (clebson.leandro54@gmail.com) on 2016-02-18T18:09:26Z
No. of bitstreams: 1
arquivototal.pdf: 1029536 bytes, checksum: c6402b495142035de9a42bf1bf610cc9 (MD5) / Made available in DSpace on 2016-02-18T18:09:26Z (GMT). No. of bitstreams: 1
arquivototal.pdf: 1029536 bytes, checksum: c6402b495142035de9a42bf1bf610cc9 (MD5)
Previous issue date: 2015-05-29 / Coordenação de Aperfeiçoamento de Pessoal de Nível Superior - CAPES / The interaction between society and technology in the context of mediated ambience, enhanced by processes and tools such as Big Data and Internet of Things are the basis of scientific advances that are gradually transforming our daily lives. With the Big Data phenomenon we are able to capture a massive quantity of data, creating endless possibilities of connections and control. The Internet of Things, in turn, is related to embedded devices networks that communicate with each other in an automated way to help make our lives more efficient and more vulnerable too. In the era of pervasive computing and datafication, any attempt to safeguard our data seems insufficient. So, this study presents a reflection on the existing oppositeness between the ideas of freedom as an essential attribute for online information sharing and the sovereignty imposed by the data control, besides we also examine the implications of this surveillance on the user autonomy. To understand the links between the mediations, the network and the members of this interconnected system, we adopted the Actor-Network Theory (LATOUR, 2012). This theory of social also inserts itself as the methodology, laying the foundations for guiding this study. Another important point is to understand the conceptual differences between surveillance, control and monitoring (LEMOS, 2009). The work, divided into two parts and their respective chapters, also includes the analysis of some attempts of resistance to this control imposed on members of the interconnected public sphere, and it points out the paradoxes concerning, particularly, to anonymity, one of the main forms of opposition to the monitoring state established in the net. Since we are in the middle of a still in progress process, accurate and airtight conclusions are not possible. However, if we are not able to set limits to the new digital society, then we run a risk of seeing vital rights, essential to the proper functioning of society, wrecked in the name of innovation and convenience. / A interação entre sociedade e tecnologia presente no contexto da midiatização, potencializada por processos e ferramentas como o Big Data e a Internet das Coisas são a base de avanços científicos que vêm, paulatinamente, transformando o nosso cotidiano. Com o fenômeno do Big Data capta-se uma torrente de dados, gerando infinitas possibilidades de conexões e controle. A Internet das Coisas, por sua vez, está relacionada às redes de dispositivos embarcados que se comunicam uns com os outros de forma automatizada para ajudar a tornar nossas vidas mais eficientes, porém mais vulneráveis. Na era da computação pervasiva e da dataficação, qualquer tentativa de salvaguardar nossos dados parece insuficiente. Assim, este estudo traz uma reflexão sobre o oposicionismo entre as ideias de liberdade como atributo essencial para o compartilhamento de informações online e a soberania conquistada através do controle dos dados, além de examinar as implicações da vigilância sobre a autonomia do usuário. Para compreender os vínculos entre as mediações, a rede e os integrantes desse sistema interconectado, adotamos a Teoria Ator-Rede (LATOUR, 2012). Essa teoria do social insere-se também como metodologia, lançando os princípios norteadores para elaboração da pesquisa. Outro ponto relevante é a compreensão das diferenças conceituais entre as ações de vigilância, controle e monitoramento (LEMOS, 2009). O trabalho, dividido em duas partes e seus respectivos capítulos, conta ainda com a análise de algumas tentativas de resistência ao controle imposto aos integrantes da esfera pública interconectada, e com apontamentos às antinomias referentes, em específico, ao anonimato, uma das principais formas de oposição ao monitoramento instaurado na rede. Por estarmos diante de um processo em franco desenvolvimento, conclusões exatas e certeiras não são possíveis. Todavia, se não formos, desde já, capazes de estabelecer limites para essa nova sociedade digital, então correremos o risco de vermos naufragar direitos vitais para o bom funcionamento da sociedade em prol da inovação e da conveniência.
|
138 |
A investiga??o criminal e a veda??o ao anonimato no sistema jur?dico brasileiroSouza, Rodrigo Telles de 27 April 2012 (has links)
Made available in DSpace on 2014-12-17T14:27:18Z (GMT). No. of bitstreams: 1
RodrigoTS_DISSERT.pdf: 2054262 bytes, checksum: a442d5049733fd558a4becf94783b22a (MD5)
Previous issue date: 2012-04-27 / The thesis, prepared with basis on deductive reasoning (through the utilization of general
concepts of the fundamental rights theory) and on inductive logic (by means of the
consideration of particular situations in which the theme has been approached) deals with the
criminal investigation and the prohibition of anonymity in the Brazilian law system. The state
criminal investigation activity presents not only a substantial constitutional basis, due to the
objective dimension of fundamental rights (which imposes an obligation to protect these
essential values), but also a formal constitutional basis, arising from the administrative
principles of rule of law, morality and efficiency, referred to in article 37 of the Constitution.
The criminal investigation, however, is not an unlimited pursuit, being restrained by the duty
to consider fundamental rights that oppose to its realization. One of the limits of the state
investigation activity, in the Brazilian law system, is the prohibition of anonymity, referred to
in article 5?, IV, of the Constitution. This prohibition is a direct constitutional restriction to
the freedom of expression that aims to ensure the credibility of the diffusion of ideas and
prevent the abusive exercise of this fundamental right, which could harm both persons and the
state, with no possibility of punishment to the offending party. Generally, based on this
prohibition, it is affirmed that a criminal investigation cannot begin and progress founded on
anonymous communication of crimes. Informations about crimes to the investigative
authorities require the correct identification of the stakeholders. Therefore, it is sustained that
the prohibition of anonymity also comprehends the prohibition of utilization of pseudonyms
and heteronyms. The main purpose of this essay is to recognize the limits and possibilities in
starting and conducting criminal investigations based on communication of crimes made by
unidentified persons, behind the veil of anonymity or hidden by pseudonyms or heteronyms.
Although the prohibition of article 5?, IV, of the Constitution is not submitted to direct or
indirect constitutional restrictions, this impediment can be object of mitigation in certain
cases, in attention to the constitutional values that support state investigation. The pertinence
analysis of the restrictions to the constitutional anonymity prohibition must consider the
proportionality, integrated by the partial elements of adequacy, necessity and strict sense
proportionality. The criminal investigation is a means to achieve a purpose, the protection of
fundamental rights, because the disclosure of facts, through the investigatory activity, gives
rise to the accomplishment of measures in order to prevent or punish the violations eventually
verified. So, the start and the development of the state criminal investigation activity, based
on a crime communication carried out by an unidentified person, will depend on the
demonstration that the setting up and continuity of an investigation procedure, in each case,
are an adequate, necessary and (in a strict sense) proportional means to the protection of
fundamental rights / A disserta??o, elaborada com base no m?todo dedutivo, atrav?s da utiliza??o de conceitos
gerais de teoria dos direitos fundamentais, e no m?todo indutivo, mediante a considera??o de
situa??es particulares em que o assunto foi abordado, trata da investiga??o criminal e da
veda??o ao anonimato no sistema jur?dico brasileiro. A atividade investigat?ria criminal do
Estado apresenta um fundamento constitucional substancial ou final?stico, decorrente da
dimens?o objetiva dos direitos fundamentais, que imp?e um dever de prote??o eficiente a
esses valores b?sicos, e outro formal ou instrumental, derivado dos princ?pios administrativos
da legalidade, da moralidade e da efici?ncia, previstos no artigo 37 da Constitui??o. A
investiga??o criminal, entretanto, n?o ? ilimitada, submetendo-se a restri??es decorrentes da
obrigatoriedade de considera??o de direitos fundamentais que venham a contrapor-se ? sua
concretiza??o. Uma das limita??es a que se sujeita a atividade estatal investigat?ria, no
sistema jur?dico brasileiro, consiste na veda??o ao anonimato, consagrada no artigo 5?, IV, da
Constitui??o. Tal proibi??o ? uma restri??o diretamente constitucional ? liberdade de
manifesta??o do pensamento e objetiva assegurar a credibilidade da divulga??o de ideias, bem
como evitar que o direito fundamental em refer?ncia seja exercido de forma abusiva,
causando danos a particulares e ao poder p?blico, sem que seja poss?vel a puni??o do
respons?vel. Normalmente, com base nessa veda??o, afirma-se que uma investiga??o criminal
n?o pode iniciar-se ou desenvolver-se a partir de comunica??es an?nimas de il?citos. As
informa??es sobre il?citos penais ao poder p?blico, para fins de investiga??o, pressup?em a
correta identifica??o dos respectivos interessados. Por isso se sustenta que a veda??o ao
anonimato tamb?m abrange a proibi??o do uso de pseud?nimos e heter?nimos. O objetivo
principal do trabalho consiste em demarcar os limites e as possibilidades do in?cio e do
desenvolvimento de investiga??es criminais com base em comunica??es de il?citos
formuladas por pessoas n?o identificadas, sob o manto do anonimato, de pseud?nimos ou de
heter?nimos. Embora a proibi??o do artigo 5?, IV, da Constitui??o n?o esteja sujeita a
restri??es direta ou indiretamente estabelecidas pelo texto constitucional, tal veda??o pode ser
alvo de interven??o em certos casos, em aten??o aos valores constitucionais que fundamentam
a investiga??o do Estado. O exame do cabimento e da medida da restri??o ? veda??o
constitucional ao anonimato, em prol da efetividade da investiga??o estatal, h? de concretizarse
mediante o recurso ? proporcionalidade, formada pelos elementos parciais da adequa??o,
da necessidade e da proporcionalidade em sentido estrito. O desempenho da atividade
investigat?ria criminal ? um meio para o alcance de uma finalidade, o exerc?cio do dever
estatal de prote??o a direitos fundamentais, pois o esclarecimento dos fatos, mediante a
investiga??o, permite a ado??o de medidas preventivas ou repressivas em rela??o ?s viola??es
eventualmente constatadas. Assim, o in?cio e o desenvolvimento da atividade investigat?ria
criminal do Estado com base em uma comunica??o de il?cito formulada por pessoa n?o
identificada dependem da demonstra??o de que a instaura??o e a continuidade de uma
investiga??o, em cada caso, s?o meios adequados, necess?rios e proporcionais em sentido
estrito para a prote??o a direitos fundamentais
|
139 |
Is this your smart phone? : On connecting MAC-addresses to a specific individual using access point dataVesterlund, Martin, Wiklund, Viktor January 2015 (has links)
Context. The potential to track individuals become greater and greater in the society today. We want to develop a method that is easy to understand so more people can participate in the discussion about the collection, and storing, of seemingly non-invasive device data and personal integrity. Objectives. In this work we investigate the potential to connect a WiFi enabled device to a known individual by analysing log files. Since we want to keep the method as simple as possible we choose to not use machine learning because this might add unnecessary layers of complexity. Methods. The conducted experiments were performed against a test group consisting of six persons. The dataset used consisted of authentication logs from a university WiFi-network collected during a month and data acquired by capturing WiFi-traffic. Results. We were able to connect 67% of the targeted test persons to their smart phones and 60% to their laptops. Conclusions. In this work we conclude that a device identifier in combination with data that can tie it to a location at a given time is to be seen as sensitive information with regard to personal integrity. We also conclude that it is possible to create and use an easy method to connect a device to a given person.
|
140 |
The influence of anonymity on participation in online communities / L'influence de l'anonymat sur la participation dans les communautés en lignePaskuda, Malte 24 October 2016 (has links)
Cette thèse de doctorat porte sur l'influence de l'anonymat sur la participation dans les communautés en ligne. Le point de départ de ce travail est une observation au cours de la conception d'une plate-forme en ligne pour le soutien social entre aidants informels. J'avais noté que nous ne savions pas décider si les aidants devaient pouvoir être anonymes sur la plate-forme ou non, et quel en serait l’effet. Ma thèse comporte une revue de la littérature qui est synthétisée dans un modèle qui décrit quel sont les facteurs qui de participation en ligne qui pourraient être influencés par l’anonymat. Nous avons conduit trois études : Une sur Youtube, dont le système d'identification a changé pour ne plus permettre de poster des commentaires de façon anonyme, une sur Quora, où les utilisateurs peuvent choisir de répondre aux questions de manière anonyme ou non, et une sur Hacker News, où les utilisateurs peuvent choisir de dévoiler plus ou moins leur identité. Ces études nous permettent de montrer que, contrairement à ce que dit la littérature, 1) l'anonymat ne conduit pas nécessairement à des discussions impolies, 2) qu'il y a d'autres facteurs que l'anonymat qui ont une influence plus importante sur la participation, et que 3) l'anonymat peut révéler d’autres facteurs qui ont un effet sur la participation, comme la longueur du texte, qui a un effet sur l’appréciation sociale. Ces résultats permettent de confirmer le modèle "Social Identity of Deindividuation Effects", et le fait que l'anonymat peut avoir une influence positive sur l'esprit de groupe / This work presents my PhD thesis over the influence of anonymity on participation in online environments. The starting point was the observation made during the design of an online platform for informal caregivers, where I realized that it was unknown to us which practical effects an anonymous identity would have on the participation. This work contains the subsequent literature review, which was synthesized into a model showing which participation factors might be influenced by anonymity. We conducted three studies on existing online environments: One on Youtube, where there was a change in the comment system forbidding anonymous comments, one on Quora, where users can opt to answer questions anonymously, and one on Hacker News, where users choose how many identity factors they present and which name they use. The result of these studies are that, contrary to what the literature would suggest, 1) anonymity did not result to impolite and uncivil discussion, and 2) other factors than anonymity have a stronger influence on participation, and that 3) anonymity can make the effect of social signals visible, e.g. text properties like length which influences social appreciation. Additionally, we observed that participation is linked to profile completeness, and that an established web presence elsewhere limits participation. The implications of these results are a confirmation of the Social Identity Model of Deindividuation Effects, in its interpretation that anonymity can have positive effects on group identity
|
Page generated in 0.0373 seconds