• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 6
  • 1
  • 1
  • Tagged with
  • 9
  • 6
  • 6
  • 5
  • 5
  • 5
  • 5
  • 5
  • 4
  • 4
  • 4
  • 3
  • 3
  • 3
  • 3
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

The Collaborative Self: From Collectivity to Individuality and What Blogs Can Teach Us About Identity

Hagenah, Nathan January 2013 (has links)
This paper uses blogs as a starting point for an examination of how identity is constructed collaboratively through a series of linguistically mediated social processes. The goal is to establish a theoretical framework for understanding individual identity as rooted in media, language, and society and the result of collective social processes as opposed to their genesis. It draws together conceptual models from theorists in sociology, media studies, and genre theory to explore how selves are created in the online contexts of blogs and how those concepts relate to wider cultural concerns and anxieties related to the construction of individual identity. By examining issues of privacy, anonymity, and authenticity as they relate to blogs and bloggers, this paper aims to provide a view of individual identity as contextually situated yet continuous across social contexts and which is the result of collaborative, collective social processes.
2

Pseudonymity, authorship, selfhood : the names and lives of Charlotte Brontë and George Eliot

Nikkila, Sonja Renee January 2006 (has links)
"Why did George Eliot live and Currer Bell die?" Victorian pseudonymity is seldom treated to any critical scrutiny - the only sustained interest has been in reading masculine pseudonyms as masks for "disreputable femininity," signs of the woman writer's "anxiety of authorship." This thesis proposes that pseudonymity is not a capitulation to gender ideology, but that a nom de plume is an exaggerated version of any authorial signature - the abstraction (or Othering) of a self into text which occurs in the production of "real" authors as well as fictional characters. After an introductory chapter presenting the theoretical issues of selfhood and authorship, I go on to discuss milieu - the contexts which produced Bronte and Eliot - including a brief history of pseudonymous novelists and the Victorian publishing and reviewing culture. The third and fourth chapters deal with pseudonymity as heccéité, offering "biographies" of the authorial personas "Currer Bell" and "George Eliot" rather than the women who created them, thus demonstrating the problems of biography and the relative, multiple status of identity. The three following chapters explore the concerns of pseudonymity through a reading of the novels: I treat Jane Eyre, Villette, and even Shirley as "autobiographical" in order to address the construction of self and narrative; I examine how Eliot's realist fictions (notably Scenes of Clerical Life, Romola, Middlemarch and Daniel Deronda) trouble the "reality"/"fiction" binary; and finally I read Bronte specifically for her engagement with "dress," using queer theories of performativity with Victorian theories of clothing and conduct to question "readability" itself. My final chapter is concerned with agencement (adjustment) and "mythmaking": the posthumous biographical and critical practices surrounding these two writers reveal that an author's "name," secured through literary reputation, is not static or inevitable, but the result of constant process and revision.
3

A comunicação existencial na filosofia de Søren Aabye Kierkegaard

Oliveira, Ranis Fonseca de 12 December 2014 (has links)
Made available in DSpace on 2016-04-27T17:27:09Z (GMT). No. of bitstreams: 1 Ranis Fonseca de Oliveira.pdf: 1448737 bytes, checksum: 3882cbbccd65bc32b14973ed936dc835 (MD5) Previous issue date: 2014-12-12 / Coordenação de Aperfeiçoamento de Pessoal de Nível Superior / This thesis proposes to examine as a mainstay in the theoretical literature and the existential philosophy of communication Søren Aabye Kierkegaard (1813-1855). The author's existential communication is understood as communication of reflection, which addresses the individual and not the mass. Accordingly, this communication is done indirectly and justified in interpreting that existence is too contradictory to be considered and appraised objectively. The existential communication is the feature that the Danish thinker developed to position himself in front of Christendom, this is, the trivialization of real Christianity. For this, we used irony and pseudonymity / A presente tese propõe-se a analisar, com esteio em pesquisa teórica e bibliográfica, a comunicação existencial na filosofia de Søren Aabye Kierkegaard (1.813 1.855). A comunicação existencial do autor é compreendida como comunicação de reflexão, que se dirige ao Indivíduo e não à massa. Nesse sentido, tal comunicação é realizada indiretamente e justifica-se na interpretação de que a existência é muito contraditória para ser pensada e conceituada objetivamente. A comunicação existencial é o recurso que o pensador dinamarquês desenvolveu para posicionar-se diante da filosofia do Sistema, como também diante da cristandade, isto é, da banalização do verdadeiro cristianismo. Para tanto, utilizou-se da ironia e da pseudonímia
4

Identity and Anonymity in Ad Hoc Networks

Martucci, Leonardo Augusto January 2009 (has links)
In ad hoc networks every device is responsible for its own basic computer services, including packet routing, data forwarding, security, and privacy. Most of the protocols used in wired networks are not suitable for ad hoc networks, since they were designed for static environments with defined borders and highly specialized devices, such as routers, authentication servers, and firewalls. This dissertation concentrates on the achievement of privacy-friendly identifiersand anonymous communication in ad hoc networks. In particular, the objective is to offer means for better anonymous communication in such networks. Two research questions were formulated to address the objective: I. How to design proper and trusted privacy-friendly digital identifiers to beused in ad hoc network environments? II. How to provide anonymous communication in ad hoc networks and whatis the performance cost in relation to the obtained degree of anonymity? To address the first research question we studied and classified the security and privacy threats, enhancements, and requirements in ad hoc networks and analyzed the need for privacy and identification. The analysis led us to the relationship between security, identification, and anonymous communication that we refer to as the “identity-anonymity paradox”. We further identifiedthe requirements for privacy-friendly identifiers and proposed the self-certified Sybil-free pseudonyms to address such requirements. The second research question was addressed with the design and implementation of the Chameleon protocol, an anonymous communication mechanism for ad hoc networks. The performance of Chameleon was evaluated using a network simulator. The results were used to find out the trade-off between anonymity and performance in terms of the expected end-to-end delay. The solutions proposed in this dissertation are important steps towards the achievement of better anonymous communications in ad hoc networks andcomplement other mechanisms required to prevent leaks of personal data.
5

E-handelsplattform med efterlevnad av GDPR som utgångspunkt : Utveckling av en labbportal med pseudonymisering och kryptering-tillämpningar

Tran, Kenny January 2022 (has links)
Företaget Provsvaret vill utveckla en labbportal avsedd för företagskunder. Företaget kommer att arbeta med ett externt labb för att starta självtest som en tjänst. Detta innebär att regler och begränsningar måste beaktas vid behandling av personuppgifter. Under 2018 trädde GDPR i kraft för att stärka skyddet kring datasekretess. Detta skapade ytterligare arbete för e-handelsplattformar som behöver vidta tekniska säkerhetsåtgärder. GDPR har även definierat nya rättigheter för användarna såsom rätt till information, rätt till tillgång och rätt till radering. Denna studie riktar sig mot att undersöka de rättigheter och säkerhetsåtgärder som har angetts av GDPR. Målet kommer vara att konstruera en e-handelsplattform med efterlevnad av GDPR som utgångspunkt. Under projektets gång så har man utfört en analys där man har jämfört olika psuedonymiseringsarkitekturer och har baserat på den analysen kunnat tillämpa pseudonymisering inom labbportalen. Under implementerprocessen var det nödvändigt att ta användning av en molnleverantör för att tillhandahålla krypteringsnycklar. Efter en noggrann jämförelse har man valt att gå vidare med Google Cloud Platform (GCP) pågrund av att GCP var kost effektivt och var mer användarvänlig mot småföretag som Provsvaret. Användbarhetstesteterna har även utförts i syfte av att undersöka i vilken mån av efterlevnad som plattformen hade i förhållande till GDPR rättigheter. Som slutsats så kan man konstatera att labbportalen hade en bra efterlevnad av GDPR däremot så fanns det vissa aspekter som behövde förbättras. Information och villkoren på plattformen kan visas på ett tydligare sätt samt så kan man även förbättra på hur man hantera invändningar och radering av konto. Implementeringen av BankID har genomgått väl och i slutendan så har labbportalen de funktionalitet som eftersöktes. / The company Provsvaret is looking to develop a lab portal intended for corporate customers. The company will be working with an external lab to bootstrap self-test as a service. This entails that regulations and restrictions must be taken into account when processing personal data. In 2018, the GDPR came into force to strengthen the protection of data privacy. This created additional work for e-commerce platforms that need to implement technical security measures. GDPR has also defined new rights for users such as the right to information, the right to access and the right to erasure. This study aims to examine the rights and security measures designated by the GDPR. The goal will be to construct an e-commerce platform based on compliance with the GDPR. During the project, an analysis has been performed where different pseudonymisation architectures have been compared and based on that analysis, been able to apply pseudonymisation within the lab portal. During the implementation process, it was necessary to use a cloud provider to provide encryption keys. After a careful comparison, Cloud Platform (GCP) has been chosen as the selected cloud provider due to the fact that GCP was cost effective and was more user-friendly towards small companies such as Provsvaret. The usability tests have also been performed for the purpose of examining the degree of compliance that the platform had in relation to GDPR rights. In conclusion, it can be stated that the lab portal has good compliance with GDPR, however, there are certain aspects that need to be improved. Information and conditions on the platform can be displayed in a clearer way and the lab portal can also improve on how it handles objections and deletion of accounts. The implementation of BankID has been successful and in the end the lab portal has the functionality that was sought after.
6

Enhancing Privacy for Mobile Networks : Examples of Anonymity Solutions and Their Analysis

Andersson, Christer January 2005 (has links)
<p>Internet and mobile communications have had a profound effect on today’s society. New services are constantly being deployed, in which an increasing amount of personal data is being processed in return for personally tailored services. Further, the use of electronic surveillance is increasing. There is the risk that honest citizens will have their privacy invaded for “the greater good”. We argue that it is of uttermost importance to retain the individuals’ control over their personal spheres.</p><p>One approach for enhancing the users’ privacy is to deploy technical measures for safeguarding privacy, so-called Privacy-Enhancing Technologies (PETs). This thesis examines a set of PETs for enabling anonymous communication, so-called anonymous overlay networks,which eliminate the processing of personal data altogether by allowing the users act anonymously when communicating in a networked environment.</p><p>This thesis focuses mainly on mobile networks. These are of great interest because on the one hand they lay the groundwork for new innovative applications, but on the other hand they pose numerous novel challenges to privacy. This thesis describes the implementation</p><p>and performance evaluation of mCrowds – an anonymous overlay network for mobile Internet that enables anonymous browsing. It also describes the ongoing investigation on how to design anonymous overlay networks in order to make them suitable for mobile ad hoc</p><p>networks, a required building block for ambient intelligence.</p>
7

Enhancing Privacy for Mobile Networks : Examples of Anonymity Solutions and Their Analysis

Andersson, Christer January 2005 (has links)
Internet and mobile communications have had a profound effect on today’s society. New services are constantly being deployed, in which an increasing amount of personal data is being processed in return for personally tailored services. Further, the use of electronic surveillance is increasing. There is the risk that honest citizens will have their privacy invaded for “the greater good”. We argue that it is of uttermost importance to retain the individuals’ control over their personal spheres. One approach for enhancing the users’ privacy is to deploy technical measures for safeguarding privacy, so-called Privacy-Enhancing Technologies (PETs). This thesis examines a set of PETs for enabling anonymous communication, so-called anonymous overlay networks,which eliminate the processing of personal data altogether by allowing the users act anonymously when communicating in a networked environment. This thesis focuses mainly on mobile networks. These are of great interest because on the one hand they lay the groundwork for new innovative applications, but on the other hand they pose numerous novel challenges to privacy. This thesis describes the implementation and performance evaluation of mCrowds – an anonymous overlay network for mobile Internet that enables anonymous browsing. It also describes the ongoing investigation on how to design anonymous overlay networks in order to make them suitable for mobile ad hoc networks, a required building block for ambient intelligence.
8

Design and Evaluation of Anonymity Solutions for Mobile Networks

Andersson, Christer January 2007 (has links)
Internet and mobile communications have had a profound effect on today's society. New services are constantly being deployed, in which personal data are being processed in return for personally tailored services. While mobile networks lay the groundwork for new innovative services, at the same time they pose numerous privacy challenges. There is the risk that honest citizens participating in mobile communications will have their privacy invaded for "the greater good". We argue that it is highly important that individuals are empowered to retain control over their personal spheres. Thus, the goal of this thesis is to design and evaluate anonymous overlay networks} adapted for mobile networks that allow users to control which information leaves their personal spheres in a mobile communication. Technically, by using an anonymous overlay network, users can communicate with their communication partners without disclosing their network identities. In this thesis, we propose three different anonymous overlay networks tailored for mobile networks. First, two approaches are proposed for anonymous browsing on the mobile Internet, namely mCrowds and a Tor-based approach. By applying theoretical analysis and\,/\,or practical experiments, we show that these approaches offer an appropriate trade-off between the offered degree of anonymity and performance loss. Second, an anonymous overlay network for use in mobile ad hoc networks - Chameleon - is suggested. Besides the actual design of these anonymous overlay networks, this thesis provides novel contributions in other essential areas of privacy protection and anonymous communication. First, also non-technical aspects of privacy protection are thoroughly discussed, including legal, social, and user interface aspects. Second, we survey existing metrics for quantifying anonymity and also propose new ideas regarding anonymity metrics. Third, we review and classify existing mechanisms for anonymous communication in mobile ad hoc networks. Lastly, we also propose a cryptographic technique for building up the user base of an anonymous overlay network in a secure and privacy-friendly manner.
9

Anonymity and Privacy in Wireless Mobile Ad Hoc Networks / Anonymität und Privatsphäre in drahtlosen mobilen ad hoc Netzwerken

Taheri, Somayeh 12 December 2011 (has links)
No description available.

Page generated in 0.2593 seconds