scholarly journals Digital Identity Challenge: The Security and Convenience Dilemma

2021 ◽  
Author(s):  
André Ferraz ◽  
Carlos Ferraz

This paper argues that the essential pieces of an enduring digital identity should be privacy, security, and convenience. Authentication should be frictionless. In this sense, the core of the digital identity of the future will be created around location sensing techniques. Incognia proposes a solution to secure and frictionless authentication for mobile apps that is composed of five steps. Its proprietary technology called environment fingerprinting can identify location spoofing and precisely determine the devices actual location. Incognia has found that most mobile logins, sensitive transactions, and purchases occur at trusted locations. To date, 90% of mobile logins and 89% of mobile banking sessions happen at a trusted location. Experimental results show false-negative rates below 0.004% and a decrease of over 85% of account takeover attacks.

2014 ◽  
Vol 7 (2) ◽  
pp. 136-151 ◽  
Author(s):  
Sung-Ae Lee

To displace a character in time is to depict a character who becomes acutely conscious of his or her status as other, as she or he strives to comprehend and interact with a culture whose mentality is both familiar and different in obvious and subtle ways. Two main types of time travel pose a philosophical distinction between visiting the past with knowledge of the future and trying to inhabit the future with past cultural knowledge, but in either case the unpredictable impact a time traveller may have on another society is always a prominent theme. At the core of Japanese time travel narratives is a contrast between self-interested and eudaimonic life styles as these are reflected by the time traveller's activities. Eudaimonia is a ‘flourishing life’, a life focused on what is valuable for human beings and the grounding of that value in altruistic concern for others. In a study of multimodal narratives belonging to two sets – adaptations of Tsutsui Yasutaka's young adult novella The Girl Who Leapt Through Time and Yamazaki Mari's manga series Thermae Romae – this article examines how time travel narratives in anime and live action film affirm that eudaimonic living is always a core value to be nurtured.


Author(s):  
Norazean Sulaiman ◽  
Nurul Nadiah Dewi Faizul Ganapathy ◽  
Wan Faizatul Azirah Ismayatim

Listening skills should be given more attention as listening takes precedence over anything else when it comes to acquiring a language (Putriani, Sukirlan & Supriyadi, 2013). Even with the booming of various technology to facilitate teaching and learning of listening skills in class, the assessment conducted to identify students’ level of understanding of certain topic is still not up-to-date and not parallel with the advancement of technology. The current studies show that the use of mobile apps for listening purpose is proven to be effective in reducing students’ anxiety (Rahimi & Soleymani, 2015), sustaining students’ motivation (Read & Kukulska-Hulme, 2015), and improving students’ linguistic competencies (Ramos & Valderruten, 2017). This study is aimed to test the effectiveness of mobile application in assessing students’ listening skills. Diploma students from various faculties in UiTM Shah Alam were randomly chosen to answer listening comprehension questions via the prototype developed, named Pocket E-Li. The results demonstrate that the majority of the students provided positive response towards the implementation of mobile application for listening assessment. Almost all respondents agreed that listening assessment should be conducted via mobile application in the future. It can be concluded that listening assessment via mobile application is beneficial to students since it meets the students’ demands and needs which is equivalent with the use of current technology.


Author(s):  
Pasi Heikkurinen

This article investigates human–nature relations in the light of the recent call for degrowth, a radical reduction of matter–energy throughput in over-producing and over-consuming cultures. It outlines a culturally sensitive response to a (conceived) paradox where humans embedded in nature experience alienation and estrangement from it. The article finds that if nature has a core, then the experienced distance makes sense. To describe the core of nature, three temporal lenses are employed: the core of nature as ‘the past’, ‘the future’, and ‘the present’. It is proposed that while the degrowth movement should be inclusive of temporal perspectives, the lens of the present should be emphasised to balance out the prevailing romanticism and futurism in the theory and practice of degrowth.


Author(s):  
Daphna Oyserman

Everyone can imagine their future self, even very young children, and this future self is usually positive and education-linked. To make progress toward an aspired future or away from a feared future requires people to plan and take action. Unfortunately, most people often start too late and commit minimal effort to ineffective strategies that lead their attention elsewhere. As a result, their high hopes and earnest resolutions often fall short. In Pathways to Success Through Identity-Based Motivation Daphna Oyserman focuses on situational constraints and affordances that trigger or impede taking action. Focusing on when the future-self matters and how to reduce the shortfall between the self that one aspires to become and the outcomes that one actually attains, Oyserman introduces the reader to the core theoretical framework of identity-based motivation (IBM) theory. IBM theory is the prediction that people prefer to act in identity-congruent ways but that the identity-to-behavior link is opaque for a number of reasons (the future feels far away, difficulty of working on goals is misinterpreted, and strategies for attaining goals do not feel identity-congruent). Oyserman's book goes on to also include the stakes and how the importance of education comes into play as it improves the lives of the individual, their family, and their society. The framework of IBM theory and how to achieve it is broken down into three parts: how to translate identity-based motivation into a practical intervention, an outline of the intervention, and empirical evidence that it works. In addition, the book also includes an implementation manual and fidelity measures for educators utilizing this book to intervene for the improvement of academic outcomes.


Author(s):  
Rosemary Foot

Over a relatively short period of time, Beijing moved from passive involvement with the UN to active engagement. How are we to make sense of the People’s Republic of China’s (PRC) embrace of the UN, and what does its engagement mean in larger terms? Is it a ‘supporter’ that takes its fair share of responsibilities, or a ‘spoiler’ that seeks to transform the UN’s contribution to world order? Certainly, it is difficult to label it a ‘shirker’ in the last decade or more, given Beijing’s apparent appreciation of the UN, its provision of public goods to the organization, and its stated desire to offer ‘Chinese wisdom and a Chinese approach to solving the problems facing mankind’. This study traces questions such as these, interrogating the value of such categorization through direct focus on Beijing’s involvement in one of the most contentious areas of UN activity—human protection—contentious because the norm of human protection tips the balance away from the UN’s Westphalian state-based profile, towards the provision of greater protection for the security of individuals and their individual liberties. The argument that follows shows that, as an ever-more crucial actor within the United Nations, Beijing’s rhetoric and some of its practices are playing an increasingly important role in determining how this norm is articulated and interpreted. In some cases, the PRC is also influencing how these ideas of human protection are implemented. At stake in the questions this book tackles is both how we understand the PRC as a participant in shaping global order, and the future of some of the core norms that constitute global order.


Author(s):  
Norman Schofield

A key concept of social choice is the idea of the Condorcet point or core. For example, consider a voting game with four participants so any three will win. If voters have Euclidean preferences, then the point at the center will be unbeaten. Earlier spatial models of social choice focused on deterministic voter choice. However, it is clear that voter choice is intrinsically stochastic. This chapter employs a stochastic model based on multinomial logit to examine whether parties in electoral competition tend to converge toward the electoral center or respond to activist pressure to adopt more polarized policies. The chapter discusses experimental results of the idea of the core explores empirical analyses of elections in Israel and the United States.


2011 ◽  
Vol 130-134 ◽  
pp. 2245-2248
Author(s):  
Yong Hong Ma ◽  
Chong Xiang Zhang ◽  
Pan Zhang

we demonstrate a wavelength interleaved DWDM Radio-over-Fiber (ROF) system for providing 1-Gb/s OFDM signal in downlink and 1-Gb/s OOK data in uplink simultaneously. In this scheme, we use only one arrayed waveguide grating device at the remote node to realize both the de-multiplexing and multiplexing functions. The experimental results demonstrate that this scheme is feasible to the future broadband high-speed OFDM-ROF access system.


2010 ◽  
Vol 33 (6) ◽  
pp. 464-480 ◽  
Author(s):  
Paula M. Niedenthal ◽  
Martial Mermillod ◽  
Marcus Maringer ◽  
Ursula Hess

AbstractThe set of 30 stimulating commentaries on our target article helps to define the areas of our initial position that should be reiterated or else made clearer and, more importantly, the ways in which moderators of and extensions to the SIMS can be imagined. In our response, we divide the areas of discussion into (1) a clarification of our meaning of “functional,” (2) a consideration of our proposed categories of smiles, (3) a reminder about the role of top-down processes in the interpretation of smile meaning in SIMS, (4) an evaluation of the role of eye contact in the interpretation of facial expression of emotion, and (5) an assessment of the possible moderators of the core SIMS model. We end with an appreciation of the proposed extensions to the model, and note that the future of research on the problem of the smile appears to us to be assured.


2018 ◽  
Vol 2018 ◽  
pp. 1-22 ◽  
Author(s):  
Shuang Zhao ◽  
Xiapu Luo ◽  
Xiaobo Ma ◽  
Bo Bai ◽  
Yankang Zhao ◽  
...  

Proximity-based apps have been changing the way people interact with each other in the physical world. To help people extend their social networks, proximity-based nearby-stranger (NS) apps that encourage people to make friends with nearby strangers have gained popularity recently. As another typical type of proximity-based apps, some ridesharing (RS) apps allowing drivers to search nearby passengers and get their ridesharing requests also become popular due to their contribution to economy and emission reduction. In this paper, we concentrate on the location privacy of proximity-based mobile apps. By analyzing the communication mechanism, we find that many apps of this type are vulnerable to large-scale location spoofing attack (LLSA). We accordingly propose three approaches to performing LLSA. To evaluate the threat of LLSA posed to proximity-based mobile apps, we perform real-world case studies against an NS app named Weibo and an RS app called Didi. The results show that our approaches can effectively and automatically collect a huge volume of users’ locations or travel records, thereby demonstrating the severity of LLSA. We apply the LLSA approaches against nine popular proximity-based apps with millions of installations to evaluate the defense strength. We finally suggest possible countermeasures for the proposed attacks.


2013 ◽  
Vol 321-324 ◽  
pp. 1939-1942
Author(s):  
Lei Gu

The locality sensitive k-means clustering method has been presented recently. Although this approach can improve the clustering accuracies, it often gains the unstable clustering results because some random samples are employed for the initial centers. In this paper, an initialization method based on the core clusters is used for the locality sensitive k-means clustering. The core clusters can be formed by constructing the σ-neighborhood graph and their centers are regarded as the initial centers of the locality sensitive k-means clustering. To investigate the effectiveness of our approach, several experiments are done on three datasets. Experimental results show that our proposed method can improve the clustering performance compared to the previous locality sensitive k-means clustering.


Sign in / Sign up

Export Citation Format

Share Document