Identity and Access Management in the Internet Age

This chapter presents a few scenarios to demonstrate the fact that identity management is employed in many aspects of our daily activities and gives a brief history of Identity and Access Management, showing our readers how the Internet has prompted identity problems. The author will discuss some of the challenges exemplified by some scenarios such as passwords, biometrics, social identity, and identity mobility.

Religions ◽  
2019 ◽  
Vol 10 (9) ◽  
pp. 520
Author(s):  
David Inglis ◽  
Chris Thorpe

In Fellini-Roma (1972), the film director Federico Fellini includes a sequence about an imaginary ecclesiastical fashion show, a display of ever more outlandish clerical clothing designs. Fellini brought together various elements that, in conventional cultural coding, do not seem to fit together: secular fashion design and catwalks, and Catholic practice and ceremonial. The sequence juxtaposes and intermingles these apparent incompatibles. Surprisingly little scholarly attention has been paid to the nature and significance of this sequence. Yet it is complex, being simultaneously satirical and empathetic, as well as camp and carnivalesque. The paper reaches back in time, reviewing the history of Catholic vestments, to show that the sequence also dramatizes the fact that sartorial fashion and Church garb have overlapped and informed each other historically. The appeal of the sequence for various types of audience has been enhanced in the internet age, and the paper considers how it has become an increasingly ubiquitous reference-point for the fashion industry, bloggers, and cultural critics, especially when the latter want to thematize controversies about male homosexuality in the Church today. Fellini’s presentation of catwalk Catholicism is both a rich object of scholarship, and a multivalent vehicle used by actors for various contemporary purposes.


2019 ◽  
Vol 9 (3) ◽  
Author(s):  
Lucy R. Tavitian ◽  
Michael Bender ◽  
Fons J. R. Van de Vijver ◽  
Athanasios Chasiotis ◽  
Hrag A. Vosgerichian

How people deal with adversity, in terms of threats to their social or ethnic identity has been extensively investigated. However, most studies have focused on samples (e.g. minority groups) from prototypical Western contexts. It is unclear how individuals perceive and deal with identity threats within non-Western plural contexts characterized by intergroup conflict. We therefore assess whether self-affirmation by recalling a past success can buffer against identity threat in the plural, non-Western context of Lebanon. In two studies we investigate how threats are negotiated at a national (Lebanon) (Study 1) and ethnic minority (Armenian) level (Study 2). In Study 1, we show that in a context characterized by a history of intergroup conflict, a superordinate national identity is non-salient. When investigating the content of memories of a sectarian group in Study 2, we find a hypersalient and chronically accessible ethnic identity, a pattern specific to Armenian Lebanese. We suggest that this hyper-salience is employed as a spontaneous identity management strategy by a minority group coping with constant continuity threat. Our findings point to the importance of expanding the study of identity processes beyond the typically Western contexts and in turn, situating them within their larger socio-political and historical contexts.


Author(s):  
Dan Jerker B. Svantesson

Internet jurisdiction has emerged as one of the greatest and most urgent challenges online, severely affecting areas as diverse as e-commerce, data privacy, law enforcement, content take-downs, cloud computing, e-health, Cyber security, intellectual property, freedom of speech, and Cyberwar. In this innovative book, Professor Svantesson presents a vision for a new approach to Internet jurisdiction––for both private international law and public international law––based on sixteen years of research dedicated specifically to the topic. The book demonstrates that our current paradigm remains attached to a territorial thinking that is out of sync with our modern world, especially, but not only, online. Having made the claim that our adherence to the territoriality principle is based more on habit than on any clear and universally accepted legal principles, Professor Svantesson advances a new jurisprudential framework for how we approach jurisdiction. He also proposes several other reform initiatives such as the concept of ‘investigative jurisdiction’ and an approach to geo-blocking, aimed at equipping us to solve the Internet jurisdiction puzzle. In addition, the book provides a history of Internet jurisdiction, and challenges our traditional categorisation of different types of jurisdiction. It places Internet jurisdiction in a broader context and outlines methods for how properly to understand and work with rules of Internet jurisdiction. While Solving the Internet Puzzle paints a clear picture of the concerns involved and the problems that needs to be overcome, this book is distinctly aimed at finding practical solutions anchored in a solid theoretical framework.


2021 ◽  
pp. 0261927X2110190
Author(s):  
Christopher Hajek

This study draws upon interview data and a grounded theoretical methodology to explore entrepreneurial social identity management. Interviews were conducted with forty-three entrepreneurs in several U.S. cities. The women and men discussed past conversations with (non)entrepreneurs, with foci on self- and other stereotyping, associated language use, prototypicality, and motivation. Open and axial coding of the interview content revealed a new model of entrepreneurial social identity management. The model’s implications for understanding entrepreneurs’ social identity and motivation were discussed.


Author(s):  
Lena Nadarevic ◽  
Rolf Reber ◽  
Anne Josephine Helmecke ◽  
Dilara Köse

Abstract To better understand the spread of fake news in the Internet age, it is important to uncover the variables that influence the perceived truth of information. Although previous research identified several reliable predictors of truth judgments—such as source credibility, repeated information exposure, and presentation format—little is known about their simultaneous effects. In a series of four experiments, we investigated how the abovementioned factors jointly affect the perceived truth of statements (Experiments 1 and 2) and simulated social media postings (Experiments 3 and 4). Experiment 1 explored the role of source credibility (high vs. low vs. no source information) and presentation format (with vs. without a picture). In Experiments 2 and 3, we additionally manipulated repeated exposure (yes vs. no). Finally, Experiment 4 examined the role of source credibility (high vs. low) and type of repetition (congruent vs. incongruent vs. no repetition) in further detail. In sum, we found no effect of presentation format on truth judgments, but strong, additive effects of source credibility and repetition. Truth judgments were higher for information presented by credible sources than non-credible sources and information without sources. Moreover, congruent (i.e., verbatim) repetition increased perceived truth whereas semantically incongruent repetition decreased perceived truth, irrespectively of the source. Our findings show that people do not rely on a single judgment cue when evaluating a statement’s truth but take source credibility and their meta-cognitive feelings into account.


Cryptography ◽  
2021 ◽  
Vol 5 (2) ◽  
pp. 14
Author(s):  
Xavier Boyen ◽  
Udyani Herath ◽  
Matthew McKague ◽  
Douglas Stebila

The conventional public key infrastructure (PKI) model, which powers most of the Internet, suffers from an excess of trust into certificate authorities (CAs), compounded by a lack of transparency which makes it vulnerable to hard-to-detect targeted stealth impersonation attacks. Existing approaches to make certificate issuance more transparent, including ones based on blockchains, are still somewhat centralized. We present decentralized PKI transparency (DPKIT): a decentralized client-based approach to enforcing transparency in certificate issuance and revocation while eliminating single points of failure. DPKIT efficiently leverages an existing blockchain to realize an append-only, distributed associative array, which allows anyone (or their browser) to audit and update the history of all publicly issued certificates and revocations for any domain. Our technical contributions include definitions for append-only associative ledgers, a security model for certificate transparency, and a formal analysis of our DPKIT construction with respect to the same. Intended as a client-side browser extension, DPKIT will be effective at fraud detection and prosecution, even under fledgling user adoption, and with better coverage and privacy than federated observatories, such as Google’s or the Electronic Frontier Foundation’s.


Sign in / Sign up

Export Citation Format

Share Document