Search results for "Authentic"

showing 10 items of 203 documents

Dog blogs as ventriloquism: Authentication of the human voice

2015

This paper looks at personal blogging by dog owners in an international, English language blogsite in which dog owners from around the world report and reflect upon their dogs and their lives with dogs, and do so by using the dog׳s voice. It approaches dog blogs as an example of the strategic use of pervasive but contentious anthropomorphic western discourses about animals and discusses how dog bloggers use anthropomorphism as a discursive means for crafting and collectively ratifying authenticity in a translocal, interest-driven and informal social media context in which traditional territorial and demographic parameters of authenticity are not easily available or relevant. More specifical…

Cultural StudiesAuthenticationAuthenticationStylizationBloggingCommunicationmedia_common.quotation_subjectMedia studiesta6121Context (language use)AnthropomorphismEnglish languageantropomorfismiDogstodentaminenSocial mediaDiary writingta518PsychologyFunction (engineering)Social psychologyDog ownersIndexicalityHuman voicemedia_common
researchProduct

Presenting “pissis girls”: Categorisation in a social media video

2015

In Finland, a social category called “pissis girls” has evolved into a cultural concept, used widely in various discourses concerning young women. In the paper, the empirical focus is on how, in the context of a viral video disseminated in social media, a group of young girls are presented as representatives of this category. The video, called ÄM IRK, is a short edited clip of an emergent interaction between young men and girls meeting by chance in a park. Drawing on the notions of membership categorisation, cluster of indexes and indexical field, “enoughness” and authentication, the paper investigates how the edited video, through the means of de- and recontextualisation of the emergent in…

Cultural StudiesCommunicationmedia_common.quotation_subjectField (Bourdieu)de- and recontextualisationta6121Context (language use)RecontextualisationAuthentication (law)pissis girlsindexescategorisationenoughnessSemioticsSocial mediaGirlta518PsychologyIndexicalitySocial psychologymedia_commonDiscourse, Context & Media
researchProduct

Democratic institutions and recognition of individual identities

2016

This paper draws from two central intuitions that characterize modern western societies. The first is the normative claim that our identities should be recognized in an authentic way. The second intuition is that our common matters are best organized through democratic decision-making and democratic institutions. It is argued here that while deliberative democracy is a promising candidate for just organization of recognition relationships, it cannot fulfil its promise if recognition is understood either as recognition of ‘authentic’ collective identities or as recognition of too atomistic or individualized subjects. If deliberative democracy is to be understood as successfully providing au…

Cultural StudiesHistorySociology and Political Sciencemedia_common.quotation_subject0603 philosophy ethics and religionDeliberative democracyauthenticityCollective identityHonneth050602 political science & public administrationSociologyta611identitymedia_common05 social sciences06 humanities and the artsCharlesDemocracy0506 political scienceEpistemologyTaylorAxel060302 philosophyPolitical Science and International RelationsNormativerecognitionSocial psychologydeliberative democracyIntuitionThesis Eleven
researchProduct

“I be da reel gansta”—A Finnish footballer’s Twitter writing and metapragmatic evaluations of authenticity

2015

This article explores the ways in which ‘gangsta’ English features are deployed, evaluated and adopted in two types of social media, the web forum and Twitter, within the domains of hip hop culture and football (soccer) culture, from the dual perspective of authenticity and normativity. Empirically, we aim to break new ground by investigating the intricate interconnections between two social media formats and combining two highly popular but previously seldom connected cultural forms—football and hip hop. Our theoretical aim is to contribute to the current debate on authenticity, normativity, popular culture and social media, and the complex ways in which they are connected. We focus, first…

Cultural StudiesOnline and offlineMediation (Marxist theory and media studies)African American Vernacular EnglishCommunicationFootballMedia studiesnormatiivisuussosiaalinen mediaPopular cultureSuperdiversityta6121Hip hop cultureNormativityFootballAfrican American Vernacular EnglishAuthenticityLinguisticsSocial mediaAppropriationjalkapalloSocial mediaSociologyautenttisuusDiscourse, Context & Media
researchProduct

Authenticity, normativity and social media

2015

Cultural StudiesetnografiaAnthropologyCommunicationDiscourse analysisEthnographynormatiivisuussosiaalinen mediata6121NormativitysosiolingvistiikkaAuthenticitySocial mediaSociolinguisticsEthnographyDiscourse studiesSocial mediaSociologyautenttisuusta518SociolinguisticsDiscourse, Context and Media
researchProduct

The influence of transformational and authentic leadership on the satisfaction of hotel customers in the Canary Islands

2019

Leadership provides a strategy to deal with intense competition and high customer expectations in the hotel industry. This paper analyses the ability of managers’ transformational and authentic leadership to predict customer satisfaction. A sample of 18,944 customers and managers of eight hotels in the Canary Islands was used for the analysis. The data were collected using the Multifactor Leadership Questionnaire-6s, the Authentic Leadership Questionnaire and ReviewPro management software. The data were analysed to confirm the ability of transformational and authentic leadership to predict overall customer satisfaction. The results indicate that the transformational subscales of idealised i…

Customer satisfactionBusiness administrationGeography Planning and DevelopmentScopusCanary IslandsAuthentic leadershipHotel industryCompetition (economics)Authentic leadershipPsicología Evolutiva y de la EducaciónTransformational leadershipTransformational leadershipTourism Leisure and Hospitality ManagementCustomer satisfactionBusinessHotel industry
researchProduct

Appeal against the Decision on the Application for a Declaration on enforceability. Procedure to Contest the Decision Given on Appeal. Refusal or Rev…

2016

Lo scritto è un commento agli articoli da 50 a 58 del Regolamento n. 650 del 2012 del Parlamento Europeo e del Consiglio del 4 luglio 2012, relativo alla competenza, alla legge applicabile, al riconoscimento e all’esecuzione delle decisioni e all’accettazione e all’esecuzione degli atti pubblici in materia di successioni e alla creazione di un certificato successorio europeo. Lo scritto affronta i temi relativi alla impugnazione avverso la decisione emessa in seguito alla istanza per il riconoscimento delle sentenze e dei provvedimenti stranieri nelle materie oggetto del regolamento; il procedimento per impugnare le sentenza emesse in seguito all'appello; il rifiuto o la revoca del riconosc…

EU Regulation No 650/2012 on jurisdiction applicable law recognition and enforcement of decisions and acceptance and enforcement of authentic instruments in matters of succession - Decision given in a Member State - Enforceability - Procedure to Contest the Decision on EnforceabilitySettore IUS/15 - Diritto Processuale CivileRegolamento n. 650 del 2012 del Parlamento Europeo e del Consiglio del 4 luglio 2012 relativo alla competenza alla legge applicabile al riconoscimento e all’esecuzione delle decisioni in materia di successioni - Decisioni rese in altri Stati membri - Esecutività - Procedimenti per contestare la decisione emessa sulla istanza per il riconoscimento delle sentenze e dei provvedimenti stranieri
researchProduct

Rasch Analysis of Authentic Evaluation of Young Children's Functioning in Classroom Routines.

2021

This study evaluated the functioning of children in early childhood education classroom routines, using the 3M Functioning in Preschool Routines Scale. A total of 366 children aged 36 to 70 months and 22 teachers from six early childhood education centers in Spain participated in the study. The authors used the Rasch model to determine the item fit and the difficulty of the items in relation to children's ability levels in this age range. The Rasch Differential Item Functioning (DIF) analysis by child age groups showed that the item difficulty differed according to the children's age and according to their levels of competence. The results of this study supported the reliability and validit…

Early childhood educationvaliditylcsh:BF1-990Item difficultybehavioral disciplines and activitieschild functioningpreschoolDevelopmental psychology03 medical and health sciences0302 clinical medicinePsychology030212 general & internal medicineCompetence (human resources)Reliability (statistics)General PsychologyOriginal ResearchRasch modelreliability030503 health policy & servicesRasch analysisDifferential item functioninglcsh:PsychologyAuthentic assessmentScale (social sciences)authentic assessment0305 other medical sciencePsychologyFrontiers in psychology
researchProduct

Design and Implementation of Deep Learning Based Contactless Authentication System Using Hand Gestures

2021

Hand gestures based sign language digits have several contactless applications. Applications include communication for impaired people, such as elderly and disabled people, health-care applications, automotive user interfaces, and security and surveillance. This work presents the design and implementation of a complete end-to-end deep learning based edge computing system that can verify a user contactlessly using &lsquo

Edge deviceComputer Networks and CommunicationsComputer scienceSpeech recognitionlcsh:TK7800-8360securitySign languageVDP::Teknologi: 500::Elektrotekniske fag: 540edge computingCode (cryptography)ComputerSystemsOrganization_SPECIAL-PURPOSEANDAPPLICATION-BASEDSYSTEMSElectrical and Electronic EngineeringEdge computingAuthenticationhand gestures recognitionArtificial neural networkbusiness.industryDeep learninglcsh:Electronicsdeep learningneural networkscontactless authenticationHardware and ArchitectureControl and Systems Engineeringcamera based authenticationSignal ProcessingArtificial intelligencebusinessGesture
researchProduct

Applying Spring Security Framework with KeyCloak-Based OAuth2 to Protect Microservice Architecture APIs: A Case Study

2022

In this study, we implemented an integrated security solution with Spring Security and Keycloak open-access platform (SSK) to secure data collection and exchange over microservice architecture application programming interfaces (APIs). The adopted solution implemented the following security features: open authorization, multi-factor authentication, identity brokering, and user management to safeguard microservice APIs. Then, we extended the security solution with a virtual private network (VPN), Blowfish and crypt (Bcrypt) hash, encryption method, API key, network firewall, and secure socket layer (SSL) to build up a digital infrastructure. To accomplish and describe the adopted SSK solutio…

Electrical and Electronic EngineeringAPI; REST; spring-boot; Keycloak; authentication; authorization; encryption; external attacksVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550BiochemistryInstrumentationComputer SecuritySoftwareAtomic and Molecular Physics and OpticsAnalytical ChemistrySensors
researchProduct