Search results for "Authentic"
showing 10 items of 203 documents
Dog blogs as ventriloquism: Authentication of the human voice
2015
This paper looks at personal blogging by dog owners in an international, English language blogsite in which dog owners from around the world report and reflect upon their dogs and their lives with dogs, and do so by using the dog׳s voice. It approaches dog blogs as an example of the strategic use of pervasive but contentious anthropomorphic western discourses about animals and discusses how dog bloggers use anthropomorphism as a discursive means for crafting and collectively ratifying authenticity in a translocal, interest-driven and informal social media context in which traditional territorial and demographic parameters of authenticity are not easily available or relevant. More specifical…
Presenting “pissis girls”: Categorisation in a social media video
2015
In Finland, a social category called “pissis girls” has evolved into a cultural concept, used widely in various discourses concerning young women. In the paper, the empirical focus is on how, in the context of a viral video disseminated in social media, a group of young girls are presented as representatives of this category. The video, called ÄM IRK, is a short edited clip of an emergent interaction between young men and girls meeting by chance in a park. Drawing on the notions of membership categorisation, cluster of indexes and indexical field, “enoughness” and authentication, the paper investigates how the edited video, through the means of de- and recontextualisation of the emergent in…
Democratic institutions and recognition of individual identities
2016
This paper draws from two central intuitions that characterize modern western societies. The first is the normative claim that our identities should be recognized in an authentic way. The second intuition is that our common matters are best organized through democratic decision-making and democratic institutions. It is argued here that while deliberative democracy is a promising candidate for just organization of recognition relationships, it cannot fulfil its promise if recognition is understood either as recognition of ‘authentic’ collective identities or as recognition of too atomistic or individualized subjects. If deliberative democracy is to be understood as successfully providing au…
“I be da reel gansta”—A Finnish footballer’s Twitter writing and metapragmatic evaluations of authenticity
2015
This article explores the ways in which ‘gangsta’ English features are deployed, evaluated and adopted in two types of social media, the web forum and Twitter, within the domains of hip hop culture and football (soccer) culture, from the dual perspective of authenticity and normativity. Empirically, we aim to break new ground by investigating the intricate interconnections between two social media formats and combining two highly popular but previously seldom connected cultural forms—football and hip hop. Our theoretical aim is to contribute to the current debate on authenticity, normativity, popular culture and social media, and the complex ways in which they are connected. We focus, first…
Authenticity, normativity and social media
2015
The influence of transformational and authentic leadership on the satisfaction of hotel customers in the Canary Islands
2019
Leadership provides a strategy to deal with intense competition and high customer expectations in the hotel industry. This paper analyses the ability of managers’ transformational and authentic leadership to predict customer satisfaction. A sample of 18,944 customers and managers of eight hotels in the Canary Islands was used for the analysis. The data were collected using the Multifactor Leadership Questionnaire-6s, the Authentic Leadership Questionnaire and ReviewPro management software. The data were analysed to confirm the ability of transformational and authentic leadership to predict overall customer satisfaction. The results indicate that the transformational subscales of idealised i…
Appeal against the Decision on the Application for a Declaration on enforceability. Procedure to Contest the Decision Given on Appeal. Refusal or Rev…
2016
Lo scritto è un commento agli articoli da 50 a 58 del Regolamento n. 650 del 2012 del Parlamento Europeo e del Consiglio del 4 luglio 2012, relativo alla competenza, alla legge applicabile, al riconoscimento e all’esecuzione delle decisioni e all’accettazione e all’esecuzione degli atti pubblici in materia di successioni e alla creazione di un certificato successorio europeo. Lo scritto affronta i temi relativi alla impugnazione avverso la decisione emessa in seguito alla istanza per il riconoscimento delle sentenze e dei provvedimenti stranieri nelle materie oggetto del regolamento; il procedimento per impugnare le sentenza emesse in seguito all'appello; il rifiuto o la revoca del riconosc…
Rasch Analysis of Authentic Evaluation of Young Children's Functioning in Classroom Routines.
2021
This study evaluated the functioning of children in early childhood education classroom routines, using the 3M Functioning in Preschool Routines Scale. A total of 366 children aged 36 to 70 months and 22 teachers from six early childhood education centers in Spain participated in the study. The authors used the Rasch model to determine the item fit and the difficulty of the items in relation to children's ability levels in this age range. The Rasch Differential Item Functioning (DIF) analysis by child age groups showed that the item difficulty differed according to the children's age and according to their levels of competence. The results of this study supported the reliability and validit…
Design and Implementation of Deep Learning Based Contactless Authentication System Using Hand Gestures
2021
Hand gestures based sign language digits have several contactless applications. Applications include communication for impaired people, such as elderly and disabled people, health-care applications, automotive user interfaces, and security and surveillance. This work presents the design and implementation of a complete end-to-end deep learning based edge computing system that can verify a user contactlessly using &lsquo
Applying Spring Security Framework with KeyCloak-Based OAuth2 to Protect Microservice Architecture APIs: A Case Study
2022
In this study, we implemented an integrated security solution with Spring Security and Keycloak open-access platform (SSK) to secure data collection and exchange over microservice architecture application programming interfaces (APIs). The adopted solution implemented the following security features: open authorization, multi-factor authentication, identity brokering, and user management to safeguard microservice APIs. Then, we extended the security solution with a virtual private network (VPN), Blowfish and crypt (Bcrypt) hash, encryption method, API key, network firewall, and secure socket layer (SSL) to build up a digital infrastructure. To accomplish and describe the adopted SSK solutio…