To see the other types of publications on this topic, follow the link: Identity fraud.

Dissertations / Theses on the topic 'Identity fraud'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Identity fraud.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Frank, Mari J. "Identity theft prevention and survival /." [Laguna Niguel, Calif.] : M.J. Frank and Associates, 1999. http://www.identitytheft.org.

Full text
Abstract:
ID-theft survival kit -- Book From victim to victor -- ID theft FAQ -- Audiocassettes -- Identity theft resources -- Testimonials -- ID theft action letters -- About the author -- Media appearances -- Identity theft laws -- Theft Deterrence Act.<br>Title from opening screen, December 28, 1999.
APA, Harvard, Vancouver, ISO, and other styles
2

Holmes, Timothy. "Examination of identity theft and identity fraud and the role of the National Identity Card Scheme." Thesis, Bangor University, 2009. https://research.bangor.ac.uk/portal/en/theses/examination-of-identity-theft-and-identity-fraud-and-the-role-of-the-national-identity-card-scheme(2ea7fafb-d68d-4e1a-9edb-591a1abcf167).html.

Full text
Abstract:
Since the start of the 21st century the terms identity theft and identity fraud have been used to describe a variety of crimes which appear both new and unique to the 21st century. So much so, that the government is in the process of re-introducing a National Identity Card Scheme to tackle the problem. But are identity theft and identity fraud uniquely 21st century problems, and is a new Identity Card Scheme going to prevent these crimes? The study seeks to examine identity theft and identity fraud and determine what these crimes are, and to distinguish between the two. In order to do this, the study will examine the different definitions used in America, Australia and the U.K. as well as the history of identity related crime. The use of identity theft and identity fraud by organised crime, illegal immigration and terrorism will also be discussed. This examination of identity theft and identity fraud includes an explanation of the differences between modern and traditional identity related crimes and the various methods used to gather information on people's identities. The study also looks at ways of researching identity related crime. As part of the research process, simulated identity theft was developed as a research approach. The use of this research method and the ethical and legal consideration associated with it are discussed at length as is the use of the internet as a source of information. The study concludes with an analysis of the role of the National Identity Card Scheme in preventing identity related crime, and the potential benefits and drawbacks of reintroducing a National Identity Card Scheme.
APA, Harvard, Vancouver, ISO, and other styles
3

Björnhed, Joakim. "Using a Chatbot to Prevent Identity Fraud By Social Engineering." Thesis, University of Skövde, School of Humanities and Informatics, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-3396.

Full text
Abstract:
<p>Social engineering is a threat that is expanding and threatens organisations existence. A social engineer can get hold of crucial business information that is vital for the organisation and by this threaten the organisation. To prevent successful fraud attempts the organisations need to educate their employees about social engineering fraud techniques that can be used for gaining information. Hence, information security education needs new educational approaches to cope with the threats.</p><p>A solution to the problem is the use of an automated chatbot that gives the employees knowledge about a threat that is difficult to spot. To understand if an automated chatbot is a possible solution to educate the users, an investigation about the applicability is conducted. The investigation is based on a survey that compares traditional security education that is based on reading a written informational text and the use of an automated chatbot that simulates a fraud attempt with the purpose to steal an identity. The education with the automated chatbot is to be exposed to an identity fraud attempt in a controlled environment and then get an explanation of what have happened and way.</p><p>The automated chatbot is developed with a fraud attempt that looks like a normal market research approach, the market research where conducted with question that gather information that is important for identity thefts.</p><p>The result of the investigation shows that it may be possible to use an automated chatbot for educating in social engineering fraud attacks. However there is still a need to solve several major problems before there are possible to make sure the concept is fully feasible.</p><p> </p>
APA, Harvard, Vancouver, ISO, and other styles
4

Henry, Kenneth Robert. "Attributes of Identity Document Credibility: A Synthesis of Expert Knowledge." FIU Digital Commons, 2008. http://digitalcommons.fiu.edu/etd/57.

Full text
Abstract:
In broad terms — including a thief's use of existing credit card, bank, or other accounts — the number of identity fraud victims in the United States ranges 9-10 million per year, or roughly 4% of the US adult population. The average annual theft per stolen identity was estimated at $6,383 in 2006, up approximately 22% from $5,248 in 2003; an increase in estimated total theft from $53.2 billion in 2003 to $56.6 billion in 2006. About three million Americans each year fall victim to the worst kind of identity fraud: new account fraud. Names, Social Security numbers, dates of birth, and other data are acquired fraudulently from the issuing organization, or from the victim then these data are used to create fraudulent identity documents. In turn, these are presented to other organizations as evidence of identity, used to open new lines of credit, secure loans, “flip” property, or otherwise turn a profit in a victim's name. This is much more time consuming — and typically more costly — to repair than fraudulent use of existing accounts. This research borrows from well-established theoretical backgrounds, in an effort to answer the question – what is it that makes identity documents credible? Most importantly, identification of the components of credibility draws upon personal construct psychology, the underpinning for the repertory grid technique, a form of structured interviewing that arrives at a description of the interviewee’s constructs on a given topic, such as credibility of identity documents. This represents substantial contribution to theory, being the first research to use the repertory grid technique to elicit from experts, their mental constructs used to evaluate credibility of different types of identity documents reviewed in the course of opening new accounts. The research identified twenty-one characteristics, different ones of which are present on different types of identity documents. Expert evaluations of these documents in different scenarios suggest that visual characteristics are most important for a physical document, while authenticated personal data are most important for a digital document.
APA, Harvard, Vancouver, ISO, and other styles
5

Johnson, Mireille. "Am I who I say I am? a systems analysis into identity fraud in New Zealand." AUT University, 2009. http://hdl.handle.net/10292/828.

Full text
Abstract:
The purpose of this thesis was to research the systems issues surrounding identity fraud in New Zealand. There is only limited published research on the topic, either at an academic or industry level. The New Zealand Government has been conducting work in identity fraud in recent times but New Zealand appears to be lagging behind other similar westernised countries in terms of developing specific identity fraud policy or legislative provisions. The research showed that New Zealand does have serious problems in its systems, which in some cases facilitate identity fraud. There is a lack of synchronicity between New Zealand Government systems which undermines a whole of government approach to minimising the risk of identity fraud. Issues in the private sector with identity fraud are just as serious, with financial advantage being one of the main reasons that identity fraud is committed. However, the lack of information sharing between the public and private sectors does not help stem the flow of identity fraud that is currently occurring. Finding policy solutions to combat identity fraud is far from being simplistic. Public policy in this area is fraught with social, political and financial implications. Identity fraud is committed with speed while public policy faces a slow battle with red tape. Nonetheless, the New Zealand Government does not even appear to categorically know what is happening on its own door step with respect to identity fraud. There are no statistics on identity fraud and no concrete figures as to the cost of identity fraud to New Zealand. To compound problems, identity fraud is not even an official offence classification so even when it is occurring, it is not always being recorded. The damage resulting from identity fraud can be catastrophic. Identity fraud is a breeder crime for other offences. It can enable an act of terrorism to occur, women and children to be trafficked, and organisations and individuals to suffer serious financial loss. In New Zealand however, the benefits of identity fraud can be great while the deterrents are weak. New Zealand faces potential harm to its international reputation if its systems are not strengthened to fight identity fraud. In order for this to occur, New Zealand needs to develop a specific identity fraud policy so that it has the basic knowledge in place to allocate the necessary resources to this problem.
APA, Harvard, Vancouver, ISO, and other styles
6

Brandt, Hjertstedt Eleonor. "Cybercrime Using Electronical Identification." Thesis, Malmö universitet, Fakulteten för hälsa och samhälle (HS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-26561.

Full text
Abstract:
Detta examensarbete undersöker riskerna med elektronisk identifiering, mer specifikt säkerhetsrisker kring enheten BankID i Sverige. Idag används BankID i stor utsträckning, men elektronisk identifiering kommer också med vissa risker när det gäller identitetsrelaterade brott. I Sverige var brottstypen som ökade mest det senaste året mätt i anmälda brott, bedrägerier som huvudsakligen begåtts genom informationsteknik. Arbetet syftar därför till att undersöka vilka säkerhetsrisker som finns med den elektroniska identifieringen BankID, och hur Polismyndigheten och Ekobrottsmyndigheten bekämpar brott på detta område. Resultatet visar att den största säkerhetsrisken med BankID är användare/kunder som kan luras. Gärningsmän använder olika metoder för att få tillgång till andra personer BankID. Vad gäller hur Polismyndigheten och Ekobrottsmyndigheten bekämpar brott riktade mot elektronisk identifiering är resultatet delvis bristfälligt på grund av att Ekobrottsmyndigheten inte är representerade. Utifrån polisens perspektiv så undersöker de bedrägeri avseende BankID så som de gör med alla andra brott, men brottet har generellt en lägre prioritet inom myndigheten. Polisen samarbetar med olika aktörer samt bidrar båda till att utveckla produktens säkerhet och informera kunderna om säkerhet och risker avseende BankID.<br>This thesis investigates the threats against electronical identification, more specifically the danger that comes with the device BankID in Sweden. Today BankID is widely used but electronical identification also comes with certain security risks regarding identity related crimes. In Sweden, the crime type which increased the most last year 2018 measured in reported crimes was fraud mainly committed through information technology. This thesis therefore aim to investigate what the safety risks are using electronical identification, such as BankID and how the police force and Swedish Economic Crime Authority combat cybercrimes in this area. The result show that the main security risk with BankID is the customers that can be deceived. Perpetrators use different methods to get access to another individuals BankID. Regarding how the police force and Swedish Economic Crime Authority combat crimes against electronical identification, the result is partly defective due to that the Swedish Economic Crime Authority not being represented in this thesis. However, from the police perspective, they investigate fraud regarding BankID as all other crimes but it has in general a lower priority within the authority. The police cooperate with different actors and help both with development of the product security and inform customers about safety and risks regarding BankID.
APA, Harvard, Vancouver, ISO, and other styles
7

Clement, Junior V. "Strategies to Prevent and Reduce Medical Identity Theft Resulting in Medical Fraud." ScholarWorks, 2018. https://scholarworks.waldenu.edu/dissertations/4843.

Full text
Abstract:
Medical identity fraud is a byproduct of identity theft; it enables imposters to procure medical treatment, thus defrauding patients, insurers, and government programs through forged prescriptions, falsified medical records, and misuse of victim's health insurance. In 2014, for example, the United States Government lost $14.1 billion in improper payments. The purpose of this multiple case study, grounded by the Health Insurance Portability and Accountability Act as the conceptual framework, was to explore the strategies 5 healthcare leaders used to prevent identity theft and medical identity fraud and thus improve business performance in the state of New York. Data were collected using telephone interviews and open-ended questions. The data were analyzed using Yin's 5 step process. Based on data analysis, 5 themes emerged including: training and education (resulting to sub-themes: train employees, train patients, and educate consumers), technology (which focused on Kiosk, cloud, off-site storage ending with encryption), protective measures, safeguarding personally identifiable information, and insurance. Recommendations calls for leaders of large, medium, and small healthcare organizations and other industries to educate employees and victims of identity theft because the problems resulting from fraud travel beyond the borders of medical facilities: they flow right into consumers' residences. Findings from this study may contribute to social change through improved healthcare services and reduced medical costs, leading to more affordable healthcare.
APA, Harvard, Vancouver, ISO, and other styles
8

Allison, Stuart F. H. "A Case Study of Identity Theft." [Tampa, Fla. : s.n.], 2003. http://purl.fcla.edu/fcla/etd/SFE0000093.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Phiri, Jackson. "A digital identity management system." Thesis, UWC, 2007. http://hdl.handle.net/11394/2871.

Full text
Abstract:
>Magister Scientiae - MSc<br>The recent years have seen an increase in the number of users accessing online services using communication devices such as computers, mobile phones and cards based credentials such as credit cards. This has prompted most governments and business organizations to change the way they do business and manage their identity information. The coming of the online services has however made most Internet users vulnerable to identity fraud and theft. This has resulted in a subsequent increase in the number of reported cases of identity theft and fraud, which is on the increase and costing the global industry excessive amounts. Today with more powerful and effective technologies such as artificial intelligence, wireless communication, mobile storage devices and biometrics, it should be possible to come up with a more effective multi-modal authentication system to help reduce the cases of identity fraud and theft. A multi-modal digital identity management system is proposed as a solution for managing digital identity information in an effort to reduce the cases of identity fraud and theft seen on most online services today. The proposed system thus uses technologies such as artificial intelligence and biometrics on the current unsecured networks to maintain the security and privacy of users and service providers in a transparent, reliable and efficient way. In order to be authenticated in the proposed multi-modal authentication system, a user is required to submit more than one credential attribute. An artificial intelligent technology is used to implement a technique of information fusion to combine the user’s credential attributes for optimum recognition. The information fusion engine is then used to implement the required multi-modal authentication system.
APA, Harvard, Vancouver, ISO, and other styles
10

Downing, Christopher O'Brien Jr. "Developing a Practical Intervention to Prevent Identity Theft: A Behavioral-Science Field Study." Thesis, Virginia Tech, 2010. http://hdl.handle.net/10919/41968.

Full text
Abstract:
Cashiers' identification-checking behaviors were observed at two grocery stores with the aim to actively involve cashiers in decreasing credit-card fraud. After baseline observations, cashiers at one store received a participative goal-setting and feedback intervention, whereby they collaboratively set a store goal for checking customers' identification. Over 23 days, the cashiers received one-to-one verbal feedback on their store's identification-checking percentages. The percentage of identification-checked purchases at the intervention store increased from 0.2 percent at Baseline to 9.7 percent during the Intervention. Then, it declined to 2.3 percent during Withdrawal, showing functional control of the intervention over the cashiers' target behavior. The cashiers at the other store served as the control group, and their percentage of identification-checked purchases were 0.3 percent, 0.4 percent, and 0.7 percent respectively during each of the A-B-A phases at the intervention store. It was also found the intervention affected male cashiers more than female cashiers. The present study also assessed the social validity of the current intervention by surveying both customers and cashiers from the intervention store. The results showed that customers do not mind getting their ID checked, while cashiers consider it important to check a customer for identification during a credit purchase.<br>Master of Science
APA, Harvard, Vancouver, ISO, and other styles
11

Minniti, Robert K. "Identifying Business Risk Factors of Identity Theft." ScholarWorks, 2016. https://scholarworks.waldenu.edu/dissertations/2935.

Full text
Abstract:
Businesses are under pressure to identify and control risks affecting profitability, including the risk of fraud. Identity theft, a type of fraud, costs businesses, governments, and individuals in excess of $56 billion a year. In order to develop good internal controls to help prevent and detect fraud, it is necessary to identify the risks to the business, but business owners are not always aware of what risk factors relate to identity theft. A nonexperimental research design formed the basis of this research study. The population for this study was data from all 50 U.S. states, represented via government databases maintained by the Federal Trade Commission, the U.S. Census Bureau, and the Department of Labor from all 50 U.S. states from 2008 until 2014. The fraud triangle theory formed the theoretical framework for this study. Regression analysis determined the significance of relationships between state-specific instances of international immigration, state-specific unemployment rates, and state-specific instances of identity theft. Both state-specific instances of international immigration and state-specific unemployment rates demonstrated a significant and positive relationship with instances of identity theft. The implications for positive social change include improved understanding of risk factors for identity theft, which could lead to lower costs of operation for businesses and lower prices for consumers.
APA, Harvard, Vancouver, ISO, and other styles
12

Ahmed, Javed. "A framework for identity fraud management in mobile commerce : a case of online retail organisations in the UK." Thesis, University of Central Lancashire, 2018. http://clok.uclan.ac.uk/25379/.

Full text
Abstract:
Mobile commerce (m-commerce) provides remarkable opportunities for online retail organisations, but also poses the risk of identity-related frauds. Due to the propensity of these frauds through mobile devices, approaches used by retail organisations are ineffective for management of identity frauds in m-commerce. Online retail organisations need a guiding framework for the evaluation of approaches used for identity fraud management. In addition, very little research has been conducted on identity frauds and methods of evaluation of the approaches to combat it in m-commerce. To better understand these issues and address the missing link, this study explores the types and possible methods of identity-related frauds in m-commerce and evaluates approaches. The fraud management lifecycle framework Wilhelm (2004) has been extended to include the evaluation of identity fraud management approaches. A qualitative approach to data collection was adopted and case study research methods were applied. Three large online retail organisations based in the UK were selected for data collection. In all, 36 semi-structured interviews were conducted from staff involved in online business management, information security, and related areas. Where possible, internal documents were also collected. Wilhelm's (2004) framework was adopted to underpin this research. The reliability of the questionnaire was tested through a pilot study. The results were analysed using a thematic approach. Both inductive and deductive approaches were used to explore themes at each stage of the framework. The cross-case analysis approach adopted to compare the results of the three case studies was also reflected through extant literature. This study found that most of the identity frauds are committed through mobile devices while online organisations are using traditional e-commerce approaches, which are not equally effective in m-commerce. Furthermore, these approaches have never been evaluated in m-commerce, which is a major cause of increasing identity fraud. This is the first study to evaluate the existing identity fraud management approaches in m-commerce. This research has identified the weaknesses and limitations in the approaches used in identity fraud management. The study also suggests guidelines to improve existing approaches and some new approaches. Finally, the Wilhelm (2004) framework has been extended to evaluate identity fraud management approaches in m-commerce. The study provides in-depth understanding about the process of identity fraud management, which consists of the methods, approaches, and strategies that online organisations have adopted. In this research, guidelines are suggested to evaluate the identity fraud management approached in m-commerce. This will help online organisations to understand the weaknesses in existing approaches and improve the performance in m-commerce identity fraud management. This study will also help online organisations to control the fraud losses and could provide them with a competitive edge in the industry.
APA, Harvard, Vancouver, ISO, and other styles
13

Wilson, Belinda R. "The Forgotten Signature: An Observational Study on Policy of Securing Identity in Prevention of Identity Theft and Credit/Debit Card Fraud at Retail Store POS Terminals." Digital Commons @ East Tennessee State University, 2016. https://dc.etsu.edu/etd/3074.

Full text
Abstract:
Identity theft and credit and bank card fraud is increasing in America and worldwide. Given the current statistics of its prevalence and practices around the world, many in government are starting to take critical notice due to its impact on a nation’s economy. Limited amounts of research have been conducted regarding the practices of applying the Routine Activities Theory (Cohen & Felson, 1979) to better equip store managers in understanding the critical need for capable and effective point of sale guardianship for in-store prevention of credit or bank card fraud due to identity theft. This research has used qualitative observational studies to investigate the presence of or lack of capable guardianship at point of sales transactions in large department stores where a majority of in-store credit and bank card fraud loss occurs. Findings conclude an overwhelming lack of capable guardianship at retail store POS terminals.
APA, Harvard, Vancouver, ISO, and other styles
14

Muliuolis, Remigijus. "Asmens tapatybės nustatymas Internete, teisiniai aspektai." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2009. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2008~D_20090204_113046-51127.

Full text
Abstract:
Magistro baigiamąjame darbe nagrinėjama asmens tapatybės nustatymo Internete samprata bei praktinis realizavimas, analizuojama ar pakankamai teisiškai reglamentuota, taip pat ar yra būtinumas kriminalizuoti asmens tapatybės klastotę Internete, atribojant ją nuo paprasto sukčiavimo. Pagrindinis tyrimo tikslas - išanalizuoti teisinius ir praktinius asmens tapatybės Internete buvimo, slėpimo ir klastojimo aspektus, nurodyti pagrindines teisines problemas, su kuriomis susiduriama siekiant išlikti anonimiškam, o taip pat pateikti išvadas ir siūlymus kaip tobulinti teisinį reguliavimą. Darbe iškelta hipotezė, kad asmens tapatybės nustatymo internete samprata bei praktinis realizavimas yra neaiški ir nepakankamai teisiškai reglamentuota, taip pat reiktų kriminalizuoti asmens tapatybės klastotę elektroninėje erdvėje, atribojant ją nuo paprasto sukčiavimo, nepasitvirtino šiais aspektais: Lietuvoje nėra atskirai išskirta ir kriminalizuota asmens tapatybės klastotė Internete, tačiau to ir nereikia, kadangi visiškai užtenka šiuo metu galiojančių teisės aktų. Lietuvoje teisinė bazė pilnai reglamentuota ir pakankama, kad tinkamai kvalifikuoti nusikalstamas veikas, padaromas elektroninėje erdvėje. Dabartinis Lietuvoje veikiantis teisinis reguliavimas nėra pritaikytas anonimiškumui elektroninėje erdvėje, todėl siūlytina derinti šiuo metu galiojančias prekybos ir paslaugų taisykles prie elektroninės komercijos keliamų poreikių. Didžiausią dėmesį skirti anonimiškų vartotojų, ypatingai tų... [toliau žr. visą tekstą]<br>Master work examines the concept of online identity and the practical implementation, analysis, or enough legally regulated, including whether there is the need to criminalize identity fraud in the Internet banned it from a simple fraud. The main purpose of the study - to examine the legal and practical identity online presence, evasion and fraud aspects of major legal problems encountered in order to survive in anonymous, as well as the conclusions and proposals for improving the legal regulations. The paper put forward a hypothesis that a person's identity online and practical realization of the concept is unclear and not legally regulated, should also be criminalize identity fraud in cyberspace banned it from a mere fraud, failed the following aspects: Lithuania does not separately distinguished, and criminalized identity forgery Internet, however, and it is not necessary, because sufficient current legislation. Lithuania legal basis for a fully regulated and sufficient suitably qualified criminal acts committed in cyberspace. Current Lithuania acting regulation is not adapted to the anonymity of cyberspace, and therefore propose to combine the existing marketing and service rules for electronic commerce needs are. Focus on the anonymity of users, particularly those using electronic means, protection of the rights. It is also proposed to create an entirely new regulatory framework to govern completely anonymous transactions for the needs, but also specify the rights... [to full text]
APA, Harvard, Vancouver, ISO, and other styles
15

Low, Rouhshi. "The use of technology to automate the registration process within the Torrens system and its impact on fraud : an analysis." Thesis, Queensland University of Technology, 2008. https://eprints.qut.edu.au/18301/1/Rouhshi_Low_Thesis.pdf.

Full text
Abstract:
Improvements in technology and the Internet have seen a rapid rise in the use of technology in various sectors such as medicine, the courts and banking. The conveyancing sector is also experiencing a similar revolution, with technology touted as able to improve the effectiveness of the land registration process. In some jurisdictions, such as New Zealand and Canada, the paper-based land registration system has been replaced with one in which creation, preparation, and lodgement of land title instruments are managed in a wholly electronic environment. In Australia, proposals for an electronic registration system are under way. The research question addressed by this thesis is what would be the impact on fraud of automating the registration process. This is pertinent because of the adverse impact of fraud on the underlying principles of the Torrens system, particularly security of title. This thesis first charts the importance of security of title, examining how security of title is achieved within the Torrens system and the effects that fraud has on this. Case examples are used to analyse perpetration of fraud under the paper registration system. Analysis of functional electronic registration systems in comparison with the paper-based registration system is then undertaken to reveal what changes might be made to conveyancing practices were an electronic registration system implemented. Whether, and if so, how, these changes might impact upon paper based frauds and whether they might open up new opportunities for fraud in an electronic registration system forms the next step in the analysis. The final step is to use these findings to propose measures that might be used to minimise fraud opportunities in an electronic registration system, so that as far as possible the Torrens system might be kept free from fraud, and the philosophical objectives of the system, as initially envisaged by Sir Robert Torrens, might be met.
APA, Harvard, Vancouver, ISO, and other styles
16

Low, Rouhshi. "The use of technology to automate the registration process within the Torrens system and its impact on fraud : an analysis." Queensland University of Technology, 2008. http://eprints.qut.edu.au/18301/.

Full text
Abstract:
Improvements in technology and the Internet have seen a rapid rise in the use of technology in various sectors such as medicine, the courts and banking. The conveyancing sector is also experiencing a similar revolution, with technology touted as able to improve the effectiveness of the land registration process. In some jurisdictions, such as New Zealand and Canada, the paper-based land registration system has been replaced with one in which creation, preparation, and lodgement of land title instruments are managed in a wholly electronic environment. In Australia, proposals for an electronic registration system are under way. The research question addressed by this thesis is what would be the impact on fraud of automating the registration process. This is pertinent because of the adverse impact of fraud on the underlying principles of the Torrens system, particularly security of title. This thesis first charts the importance of security of title, examining how security of title is achieved within the Torrens system and the effects that fraud has on this. Case examples are used to analyse perpetration of fraud under the paper registration system. Analysis of functional electronic registration systems in comparison with the paper-based registration system is then undertaken to reveal what changes might be made to conveyancing practices were an electronic registration system implemented. Whether, and if so, how, these changes might impact upon paper based frauds and whether they might open up new opportunities for fraud in an electronic registration system forms the next step in the analysis. The final step is to use these findings to propose measures that might be used to minimise fraud opportunities in an electronic registration system, so that as far as possible the Torrens system might be kept free from fraud, and the philosophical objectives of the system, as initially envisaged by Sir Robert Torrens, might be met.
APA, Harvard, Vancouver, ISO, and other styles
17

Kwaa-Aidoo, Ephrem K. "Culturally aligned security in banking. A system for rural banking in Ghana." Thesis, University of Bradford, 2010. http://hdl.handle.net/10454/4433.

Full text
Abstract:
This thesis is an investigation into the unique rural banking system in Ghana and the role of information systems in fraud control. It presents a robust information security and internal control model to deal with fraud for the banking system. The rural banking industry has been noted for poor internal control leading to fraud. This has resulted in poor performance and even the collapse of some banks. The Focus of the study was on the processes used to deliver banking services. To design a protection system, a number of rural banks were visited. This was to understand the environment, regulatory regimes and the structure and banking processes of the industry and banks. Systemic vulnerabilities within the industry which could be exploited for fraud were found. The lack of structures like an address system and unreliable identification documents makes it difficult to use conventional identification processes. Also the lack of adequate controls, small staff numbers and the cross organisational nature of some transactions among other cultural issues reduces the ability to implement transaction controls. Twenty fraud scenarios were derived to illustrate the manifestation of these vulnerabilities. The rural banking integrity model was developed to deal with these observations. This protection model was developed using existing information security models and banking control mechanisms but incorporating the nature of the rural banking industry and culture of its environment. The fraud protection model was tested against the fraud scenarios and was shown to meet the needs of the rural banking industry in dealing with its systemic vulnerabilities. The proposed community-based identification scheme deals with identification weaknesses as an alternative to conventional identity verification mechanisms. The Transaction Authentication Code uses traditional adinkra symbols. Whilst other mechanisms like the Transaction Verification Code design v internal controls into the banking processes. This deals with various process control weaknesses and avoids human discretion in complying with controls. Object based separation of duties is also introduced as a means of controlling conflicting tasks which could lead to fraud.
APA, Harvard, Vancouver, ISO, and other styles
18

Kwaa-Aidoo, Ephrem Kwaku. "Culturally aligned security in banking : a system for rural banking in Ghana." Thesis, University of Bradford, 2010. http://hdl.handle.net/10454/4433.

Full text
Abstract:
This thesis is an investigation into the unique rural banking system in Ghana and the role of information systems in fraud control. It presents a robust information security and internal control model to deal with fraud for the banking system. The rural banking industry has been noted for poor internal control leading to fraud. This has resulted in poor performance and even the collapse of some banks. The Focus of the study was on the processes used to deliver banking services. To design a protection system, a number of rural banks were visited. This was to understand the environment, regulatory regimes and the structure and banking processes of the industry and banks. Systemic vulnerabilities within the industry which could be exploited for fraud were found. The lack of structures like an address system and unreliable identification documents makes it difficult to use conventional identification processes. Also the lack of adequate controls, small staff numbers and the cross organisational nature of some transactions among other cultural issues reduces the ability to implement transaction controls. Twenty fraud scenarios were derived to illustrate the manifestation of these vulnerabilities. The rural banking integrity model was developed to deal with these observations. This protection model was developed using existing information security models and banking control mechanisms but incorporating the nature of the rural banking industry and culture of its environment. The fraud protection model was tested against the fraud scenarios and was shown to meet the needs of the rural banking industry in dealing with its systemic vulnerabilities. The proposed community-based identification scheme deals with identification weaknesses as an alternative to conventional identity verification mechanisms. The Transaction Authentication Code uses traditional adinkra symbols. Whilst other mechanisms like the Transaction Verification Code design v internal controls into the banking processes. This deals with various process control weaknesses and avoids human discretion in complying with controls. Object based separation of duties is also introduced as a means of controlling conflicting tasks which could lead to fraud.
APA, Harvard, Vancouver, ISO, and other styles
19

Al-Harby, Fahad M. "Biometric authentication systems for secured e-transactions in Saudi Arabia. An empirical investigation of the factors affecting users' acceptance of fingerprint authentication systems to improve online security for e-commerce and e-government websites in Saudi Arabia." Thesis, University of Bradford, 2010. http://hdl.handle.net/10454/4415.

Full text
Abstract:
Security is becoming an increasingly important issue for business, and with it comes the need for appropriate authentication; consequently, it is becoming gradually more important to develop secure e-commerce systems. Fraud via the web, identity theft, and phishing are raising concerns for users and financial organisations. In addition, current authentication methods, like passwords, have many problems (e.g. some users write them down, they forget them, or they make them easy to hack). We can overcome these drawbacks by using biometric authentication systems. Biometric systems are being used for personal authentication in response to the rising issue of authentication and security. Biometrics provide much promise, in terms of preserving our identities without the inconvenience of carrying ID cards and/or remembering passwords. This research is important because the securing of e-commerce transactions is becoming increasingly important. Identity theft, hacking and viruses are growing threats to Internet users. As more people use the Internet, more identity theft cases are being reported. This could harm not only the users, but also the reputation of the organisations whose names are used in these illegal acts. For example, in the UK, online banking fraud doubled in 2008 compared to 2007. More users took to e-shopping and online banking, but failed to take necessary protection. For non-western cultures, the figures for web security, in 2008, illustrated that Saudi Arabia was ranked ninth worldwide for users who had been attacked over the web. The above statistics reflect the significance of information security with e-commerce systems. As with any new technology, user acceptance of the new technology is often hard to measure. In this thesis, a study of user acceptance of biometric authentication systems in e-transactions, such as online banking, within Saudi society was conducted. It examined whether Saudis are practically willing to accept this technology. This thesis focuses upon Saudi Arabia, which has developing economy. It has achieved a rapid rate of growth, and therefore makes an interesting and unique case study. From an economist¿s point of view, Saudi Arabia is the powerhouse of the Middle East. It has the leading regional economy, and, even though it is still relatively young. It has a young and rapid growing population; therefore, this makes Saudi Arabia an attractive potential market for all kinds of e-commerce applications. Having said that, with more than half of population under the age of 30 are more to be expected to take the risk of accepting new technology. For this work, 306 Saudi participants were involved in the experiments. A laboratory experiment was created that actively tested a biometric authentication system in combination with a survey. The Technology Acceptance Model (TAM) was adopted in the first experimental phase as the theoretical basis on which to develop the iv research framework, the model has proven its efficiency as a good predictor for the biometric authentication system. Furthermore, in a second experimental phase, the Unified Theory of Acceptance and Use of Technology (UTAUT) with moderating variables such as age, gender and education level was examined as a proposed conceptual framework to overcome the limitations of TAM. The aim of the study was to explore factors affecting users¿ acceptance of biometric authentication systems. The findings from Structural Equation Modelling (SEM) analysis indicate that education level is a significant moderating factor, while gender and age do not record as significant. This thesis added new knowledge to this field and highlighted the importance of the perceptions of users regarding biometric security technologies. It helps determine the factors affecting the acceptance of biometric technology. To our knowledge, this is the first systematic study of this issue carried out by academic and non-biased researchers in Saudi Arabia. Furthermore, the thesis presents security technology companies and developers of information security products with information to help in the determination of what is significant to their user base when taking into account the introduction of new secure systems and products.
APA, Harvard, Vancouver, ISO, and other styles
20

Al-Harby, Fahad Mohammed. "Biometric authentication systems for secured e-transactions in Saudi Arabia : an empirical investigation of the factors affecting users' acceptance of fingerprint authentication systems to improve online security for e-commerce and e-government websites in Saudi Arabia." Thesis, University of Bradford, 2010. http://hdl.handle.net/10454/4415.

Full text
Abstract:
Security is becoming an increasingly important issue for business, and with it comes the need for appropriate authentication; consequently, it is becoming gradually more important to develop secure e-commerce systems. Fraud via the web, identity theft, and phishing are raising concerns for users and financial organisations. In addition, current authentication methods, like passwords, have many problems (e.g. some users write them down, they forget them, or they make them easy to hack). We can overcome these drawbacks by using biometric authentication systems. Biometric systems are being used for personal authentication in response to the rising issue of authentication and security. Biometrics provide much promise, in terms of preserving our identities without the inconvenience of carrying ID cards and/or remembering passwords. This research is important because the securing of e-commerce transactions is becoming increasingly important. Identity theft, hacking and viruses are growing threats to Internet users. As more people use the Internet, more identity theft cases are being reported. This could harm not only the users, but also the reputation of the organisations whose names are used in these illegal acts. For example, in the UK, online banking fraud doubled in 2008 compared to 2007. More users took to e-shopping and online banking, but failed to take necessary protection. For non-western cultures, the figures for web security, in 2008, illustrated that Saudi Arabia was ranked ninth worldwide for users who had been attacked over the web. The above statistics reflect the significance of information security with e-commerce systems. As with any new technology, user acceptance of the new technology is often hard to measure. In this thesis, a study of user acceptance of biometric authentication systems in e-transactions, such as online banking, within Saudi society was conducted. It examined whether Saudis are practically willing to accept this technology. This thesis focuses upon Saudi Arabia, which has developing economy. It has achieved a rapid rate of growth, and therefore makes an interesting and unique case study. From an economist's point of view, Saudi Arabia is the powerhouse of the Middle East. It has the leading regional economy, and, even though it is still relatively young. It has a young and rapid growing population; therefore, this makes Saudi Arabia an attractive potential market for all kinds of e-commerce applications. Having said that, with more than half of population under the age of 30 are more to be expected to take the risk of accepting new technology. For this work, 306 Saudi participants were involved in the experiments. A laboratory experiment was created that actively tested a biometric authentication system in combination with a survey. The Technology Acceptance Model (TAM) was adopted in the first experimental phase as the theoretical basis on which to develop the iv research framework, the model has proven its efficiency as a good predictor for the biometric authentication system. Furthermore, in a second experimental phase, the Unified Theory of Acceptance and Use of Technology (UTAUT) with moderating variables such as age, gender and education level was examined as a proposed conceptual framework to overcome the limitations of TAM. The aim of the study was to explore factors affecting users' acceptance of biometric authentication systems. The findings from Structural Equation Modelling (SEM) analysis indicate that education level is a significant moderating factor, while gender and age do not record as significant. This thesis added new knowledge to this field and highlighted the importance of the perceptions of users regarding biometric security technologies. It helps determine the factors affecting the acceptance of biometric technology. To our knowledge, this is the first systematic study of this issue carried out by academic and non-biased researchers in Saudi Arabia. Furthermore, the thesis presents security technology companies and developers of information security products with information to help in the determination of what is significant to their user base when taking into account the introduction of new secure systems and products.
APA, Harvard, Vancouver, ISO, and other styles
21

Henshaw, James Presley. "Phishing Warden : enhancing content-triggered trust negotiation to prevent phishing attacks /." Diss., CLICK HERE for online access, 2005. http://contentdm.lib.byu.edu/ETD/image/etd840.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Tayler, Denise May. "The haunting of consciousness, Freud, Lockean identity, and the uncanny self." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1997. http://www.collectionscanada.ca/obj/s4/f2/dsk2/ftp04/mq22880.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Eilitta, Leena. "Approaches to personal identity in Kafka's short fiction : Freud, Darwin, Kierkegaard." Thesis, University of Oxford, 1997. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.389301.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Brindley, Nicholas. "The gender of ethics : sexual and moral identity in Rousseau, Freud, and Kierkegaard." Thesis, University of Warwick, 1993. http://wrap.warwick.ac.uk/59606/.

Full text
Abstract:
This thesis argues that questions of ethical life, moral identity, and gender are inextricably involved, and that an appropriate conception of each is necessary for the thinking of the others. In particular it seeks to demonstrate that the way in which freedom is conceived in its relation to moral identity and ethical life has profound implications for the thought of gender relations. It is further argued that the writings of Kierkegaard open up a way of relating freedom and the finite that offers the possibility of re-thinking gender. The writings of Rousseau and of Freud are examined to show the interdependence of their philosophical anthropology and the systematic subordination and exclusion of women that operates in each of them. In each case it is shown that, despite the very different, and even opposed ways that they construe the nature of moral identity and its relation to ethical life, a parallel gender polarity is at work. In Rousseau male moral identity rests on independence from society and infinite, excessive freedom. This is brought into relation to the mundane world of ethical life through gender. Women are denied independence and moral identity and made responsible for social being. Their subordination is such that dependence on them does not destroy the integrity of men. The crisis of this unstable structure is demonstrated through a reading of Rousseau's novel La Nouvelle Heloise, the death of whose heroine is shown to be the moment of collapse of the Rousseauean synthesis. In Freud moral identity is achieved through the identification of the self with social authority. The finite freedom that can be thought in psychoanalysis rests on a fusion of ethical and moral life. The "depersonalisation" of the super-ego is the road to liberation. Through the gendered experience of the Oedipal drama this path can only be taken by men. Woman are again exclude from moral identity, being allowed only a "masochistic" relation to the Law. The crisis of this structure is found in the notion of the "archaic heritage", which it is argued, represents a collapse of Freudian thought. Finally both Freud and Rousseau are brought into relation with the psychological writings of Kierkegaard, whose distinctive notion of freedom and faith is held to address the limitations of both sets of writing. Infinite freedom is made to co-exist with finitude. The implications of these writings for the thought of gender is briefly explored through other of the writings of Kierkegaard.
APA, Harvard, Vancouver, ISO, and other styles
25

Curet, Olivier Louis. "Using precedents to identify top management fraud : the study of a case-based learning and reasoning model." Thesis, London School of Economics and Political Science (University of London), 1996. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.243959.

Full text
Abstract:
This thesis discusses how best to design, implement and evaluate a Case-Based Learning and Reasoning (CB-LR) model to assist accountants in identifying Top Management Fraud (TMF). There is no structured knowledge about TMF in the fonn of rules, only cases encountered by experienced auditors. The changing economic, financial and social environment has produced more fraud which at the same time has become increasingly complex to identify and isolate. Previous research shows that fraud has evaded auditors, and highlights a need for new computer-based learning and reasoning paradigms in this domain. Case-Based Reasoning (CBR) has been considered as an approach to building knowledge systems which involves reasoning about the current situation on the basis of pinpointing and resuscitating past instances. As with artificial intelligence in general, there is no standard readymade CBR method suitable for any domain or application: the challenge in CBR is to come up with methods that are suitable for problem-solving and learning in particular subject domains and for particular application environments. INCASE, a Top Management Fraud diagnostic application, has been designed with a specific methodology derived from Schank and Riesbeck's principles. INCASE works on the basis of the interviewees' concerns so that it can act as a 'stimulus agent' for decision support. The intention is for auditors to use it proactively in a conversational mode, focusing on learning and reasoning about the problem domain~ hence the use of the CB-LR model. Although evaluation methods relevant to traditional rule-based expert systems have been discussed in the literature, their emphasis on system issues was found to be inappropriate for this CB-LR application. Since there is no agreed and established method for evaluating a casebased tool, 'a new approach is discussed including verification (where the focus is on response accuracy of infonnation retrieval) and validation (where user judgement and satisfaction are key issues). One important component in the evaluation was an in-house questionnaire based on total quality management ideas. Findings from the evaluation of the TMF diagnostic system suggest that case-based learning and reasoning has a valuable part to play in assisting auditing profession in the detection of fraud
APA, Harvard, Vancouver, ISO, and other styles
26

Jacob, John Bryan. "The Haus of Frau: Radical Drag Queens Disrupting the Visual Fiction of Gendered Appearances." Diss., Virginia Tech, 1999. http://hdl.handle.net/10919/27770.

Full text
Abstract:
This research considers the connections between appearance and identity apparent in the social experience of five gay male drag queens. Appearing at variance with gender norms that underwrite male appearance in mainstream society and among gay men prompted social consequences that impacted their identities and world views. One aim is to apprehend the experiences of difference that drag appearance manifest and expressed. Another aim is to gain a new perspective on the social construction of gendered appearances from marginalized persons who seem to look from the "outside" in toward mainstream social appearances and relations. Qualitative analysis relied on interview data and occurred using grounded theory methodology. However, analysis gained focus and intensified by engaging Stone's (1970) theorizing on "Appearance and the Self," Feminist articulations of "the gaze" and poststructural conceptions of the discursively constituted person as "the subject." This research especially emphasizes the points of connection between Stone's theorizing and more recent feminist theoretical advancements on the gaze as they each pertain to appearance, identity and social operations of seeing and being seen. Yet there is also consideration of the manners in which gendered appearance norms circulate in discourse and permeate the individual psyche. The research findings also locate social consequences of transgressing male appearance norms. These drag queens' interviews revealed that they used appearance to visibly portray gendered identities. Manners in which they related their drag appearances to the self were suggestive that gender identities are states of consciousness stemming from one's imagined connections to mass cultural conceptions of male and/or female. Where most people seem to commit themselves exclusively to male or female appearance repertoires and identity sets, these men indicated that they made both male and female identifications. These mixed identifications, which could have remained hidden, materialized when they did drag. In a sense, by doing drag, they performed their gender ambivalence. Their drag appearances were meta-performances that referred both to their own ambivalence with the gender binary, and to how appearance assists in constructing, maintaining and communicating (i.e., performing) status quo gendered identities.<br>Ph. D.
APA, Harvard, Vancouver, ISO, and other styles
27

Murbeth, Susanne. "Die ?asexuelle Witwe? im Identit??tskonflikt am Beispiel von Arthur Schnitzlers ?Frau Berta Garlan? und ?Frau Beate und ihr Sohn?" Thesis, University of Waterloo, 2006. http://hdl.handle.net/10012/2825.

Full text
Abstract:
The role of women in society was an important socio?cultural discourse explored in the literature of the late 19th century. The Austrian author Arthur Schnitzler was a key contributor to this discourse. He was well known for the psychological portrayal of his characters and the sexualization of his literary types, especially of his female characters, and in his writings he dared to break societal taboos. Schnitzler created a wide array of social types, such as the "integrated woman," the "ageing spinster," the "woman of the world," the "prostitute" and the widely discussed type the "s????e M??del" ("sweet girl"). In this thesis, however, I will focus on one of the less examined female types in Schnitzler's work: the "widow. " I will examine two narratives by Schnitzler that concentrate on the widow "Frau Berta Garlan" (1901) and "Frau Beate und ihr Sohn" (1913), to investigate this type and to examine the modes of gendered identity?formation as portrayed in the literary texts. <br /><br /> To examine the gender?types that the protagonists reflect in the search for their identity, I will undertake an intratextual analysis of the text, based on the central premises of Michel Foucault's discourse analysis and Judith Butler's analysis of gender as construct. Within this constructivist paradigm of gender and identity, I will undertake a textual analysis of character representation to demonstrate how identity is formed within the constraints of hegemonic discourses, and how resistance against these preformed modes of identity is predicated by fixed notions of social norms. <br /><br /> The texts focus on the lives of the two female protagonists. Both are widowed and fail to break out of the constraints forced upon them by society. With the awakening of their sexual desire, they are caught in an identity crisis, their desires standing at odds with the asexual identity they must assume as widows. In their attempt to combine their sexual desires with their desire to remain respectable in the eyes of society, the widows eventually fail since normative discourses of gender identity do not allow for alternative identities. Although the texts demonstrate the impossibility of living identities that contravene the central tenets of social norm, that the individual is not free to fashion its own identity, Schnitzler's texts also debunk the myth of a natural gender identity and subvert its fatalistic message by demonstrating clearly the constructed character of gender almost a century before the advent of poststructuralist gender?theory.
APA, Harvard, Vancouver, ISO, and other styles
28

Allolio-Näcke, Lars. "Ostdeutsche Frauen haben (k)eine Chance doing identity 15 Jahre nach der deutsch-deutschen Vereinigung." Hamburg Kovač, 2005. http://www.verlagdrkovac.de/978-3-8300-2682-2.htm.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Cavalcanti, Rosalia Andrade. "Corpos reinventados: a questão dos gêneros em Freud." Universidade Católica de Pernambuco, 2009. http://www.unicap.br/tede//tde_busca/arquivo.php?codArquivo=497.

Full text
Abstract:
O presente trabalho analisa o arcabouço teórico que fundamenta o modelo fálico-edípico freudiano, a fim de refletir em que medida reproduz a divisão sexual e binária, com suas implicações hierarquizantes e assimétricas. Inicialmente, examinamos os pressupostos filosóficos, científicos e políticos que possibilitaram a invenção do modelo da diferença sexual, produzindo lugares específicos para o gênero feminino e masculino. Em seguida, avaliamos as repercussões oriundas do monismo sexual e fálico na reinvenção dos corpos sexuados. E, por fim, nos debruçamos sobre a construção do modelo fálico-edípico, buscando aproximações com o monismo e o dimorfismo sexual, bem como suas imbricações na produção das subjetividades. Para tanto, realizamos uma pesquisa e análise bibliográfica da obra de Freud, bem como da Psicanálise contemporânea a partir de autores que procuram problematizar as implicações da utilização do referencial fálico-edípico como eixo central de subjetivação e de erotização, tais como: Joel Birman, Márcia Arán, Regina Néri e Silvia Nunes. Da mesma forma, estabelecemos um diálogo profícuo com os autores Thomas Laqueur, Michel Foucault e Judith Butler no que concerne à criação das categorias de sexo e gênero. Esperamos que nosso trabalho amplie a discussão e o conhecimento sobre as questões referentes à problemática de sexo e gênero, na contemporaneidade, oferecendo subsídios aos profissionais que lidam direta ou indiretamente com o tema<br>The present paper analyses the theoretical framework that subsidizes the phallic-oedipal Freudian model in order to consider to what extent it reproduces sexual and binary divisions, with its hierarchical and asymmetrical implications. Initially, we have examined philosophical, scientific and political assumptions that permitted the invention of the sexual difference model, producing specific roles to feminine and masculine genders. Afterwards, we have evaluated repercussions from the sexual and phallic monism on the reinvention of sexed bodies. And, finally, we have focused on the construction of the phallic-oedipal model, searching for approximations with monism and sexual dimorphism, as well as its imbrications on subjectivities production. To do so, we have carried out a bibliographical research and analysis of Freudian work and contemporary psychoanalysis by authors who seek to question the implications of the phallicoedipal model utilization as a central axis for subjectivity and eroticization, such as Joel Birman, Márcia Arán, Regina Néri and Silvia Nunes. In the same way, we have established a productive dialogue with authors such as Thomas Laqueur, Michel Foucault and Judith Butler with regards to the creation of sex and gender categories. We expect our work to broaden discussion and knowledge on questions related to sex and gender problematic in contemporaneity, offering support to professionals who deal with those themes directly or indirectly
APA, Harvard, Vancouver, ISO, and other styles
30

Dillenberger, Susanna Juliana. "Grasping At Freedom: Identity, Paradox, and Concessions of Will in the Works of Conrad, Gide, and Woolf." Ohio Dominican University / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=odu1566744731937264.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Levy, Sydney. "L' 'identité autochtone : penser le rapport vertical à la terre." Paris 7, 2008. http://www.theses.fr/2008PA070102.

Full text
Abstract:
L'intuition de départ de cette recherche en psychanalyse a été d'approcher la question de l'identité nationale à partir de la verticalité de l'Homme en son rapport à la Terre. Devant la violence, toujours actuelle, des discours autour des revendications nationales liées à une appartenance à la Terre des origines, question qui rencontre une impasse pour la pensée, la nécessité de travailler (du point de vue de la psychanalyse) les mythes autochtones s'avérera féconde. On montre que penser les différentes dynamiques de la stabilité d'un axe vertical (souple ou rigide) permet de distinguer la Terre du Sol en imaginant une interaction entre ces deux entités. Ces différentes formes topiques Terre-Sol-Verticalité (s) conditionnent les dynamiques violentes individuelles et groupales des revendications nationalistes. Cette approche représente un travail de civilisation (Kulturarbeit) et éclaire en retour, à partir de l'image de la verticalité, la notion freudienne d'Identification primaire. L'identité autochtone suppose une pensée de notre rapport vertical à la Terre<br>The notion at the outset of this psychoanalytic research was to approach the question of national identity, starting from the Verticality of Man, in his connection with the Earth. In front of violence, always current, speeches around the national claims related to a membership of the Earth of the origins, question which meets a dead end for the thought, need for working (from the psychoanalytic point of view) the indigenous myths prove fertile. One shows that to think different dynamics from the stability of a vertical axis (flexible or rigid) makes it possible to distinguish the Earth from the Ground by imagining an interaction between these two entities. These various forms topics Earth-Ground-Verticality (-ies) condition the violent individual and group dynamics of nationalist claims. This approach represents a work of civilization (Kulturarbeit) and illuminates in return, starting from the image of verticality, the Freudian notion of primary identification. The innate identity supposes a sense of our vertical rapport with the Earth
APA, Harvard, Vancouver, ISO, and other styles
32

Kim, Hyowon. "Adopted colors identity, race, and the passion for other people's nationalism ; George Eliot, Elizabeth Barrett Browning, and imagining kinship in 19th century nation-building." Saarbrücken VDM Verlag Dr. Müller, 2007. http://d-nb.info/991276604/04.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Bouacha, Mustapha. "L'intime dans l'écriture psychanalytique : la question de l'identité juive." Paris 7, 1997. http://www.theses.fr/1997PA070124.

Full text
Abstract:
Notre travail étude l'aspect psychanalytique de l'écriture autobiographique des écrivains juifs: il s'agit d'analyser comment ses écrits figurent l'identité juive. L'objet étudie est l'écriture de soi: comment celle-ci figure la problématique identitaire. Dans le premier chapitre, nous avons trace un cadre d'écriture dans lequel s'insère la question de l'intime et de l'identité dans un rapport privilégié a l'écriture psychanalytique. Nous sommes penches sur les témoignages des analystes et analysants juifs, ayant fait le choix d'écrire leurs récits de cures analytiques. Notre but est d'interroger les écrits de la cure à travers des sources variées afin de résoudre la question fondamentale qui touche à la teneur de ce chapitre, celle du comment on définit ce qui se passe lors d'une analyse. Dans le deuxième chapitre, nous nous intéressons aux propos de Freud sur le sujet de sa judéité dans sa correspondance privée. Sur ce sujet, notre recherche s'organise autour de trois axes principaux: 1. Le discours manifeste que Freud tient sur sa judéité. 2. Le registre latent, inconscient, présent dans son œuvre, existerait-il un discours "manque" de Freud sur sa judéité. 3. Les moyens qu'il met en œuvre pour affirmer, dans la réalité. Sa judéité. Dans le troisième chapitre. Nous avons cherche les traces de la shoah dans les écrits autobiographiques des orphelins juifs. Nous ne retiendrons ici que les écrits particulièrement représentatifs de notre propos: étudier les personnages juifs tels qu'ils apparaissent dans l'écriture de soi<br>Our work studies the appearance psychoanalytic from writing autobiographical from writer jews: it's matter of to analyse how thes writing to represent the identity jewish. The object studied is the writing of oneself: how this one to represent the problematic identity. In the first chapter, we have drawing a context to writing into wich to fit into the question to intimate and the identity in on link privileged of the writing psychoanalytic. We have to lean over on the account the analyst and analysis jews to do the choice to write them story of treatment psychoanalytic. Our target is to question the writing of treatment to failing from source various in order to resolve the question fundamental which a touch of content from chapter. The on from how you one definite this who to happen at time of analysis. In the second chapter, we interested to talk from Freud on the subjet from his jewish in his correspondance private. On this subjet, our search get organized round from three axis prinicipal: 1. The speech obvious that to hold on his jewish. 2. The registre latent inconscious present in his work, to exist a speech missed from on his jewish. 3. The means who he put in for to maintain in the reality his judaism. The third chapter, we have asking the trace from the genocide in the written autobiographical an orphans jews we hold back here that the written particularity representative from our talk :to study the figure jews such he appear in writing from oneself
APA, Harvard, Vancouver, ISO, and other styles
34

Åkerberg, Mathias, and Anders Tibbling. "Säker identitetshantering på internet : Att minimera bedrägerier och öka konsumentens säkerhet och inflytande vid e-handel." Thesis, KTH, Data- och elektroteknik, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-169434.

Full text
Abstract:
Risken att en obehörig part kan komma över och använda en enskild konsuments identitets-handlingar är stor, samtidigt som individens möjlighet att kontrollera hur och när dess iden-titet används är liten. Problemformuleringen som skulle besvaras var hur identitetsstölder och bedrägerier på internet kunde minimeras samtidigt som konsumenten får ett ökat infly-tande över hanteringen av sin identitet. Målsättningen var att centralisera och skapa ett gemensamt förhållningssätt för identitets-hantering på internet till förmån för konsumenterna, och på så vis minimera spridning av egna lösningar för identitetshantering hos enskilda aktörer. Lösningen resulterade i en systemmodell med förutsättningar för att autentisera konsumen-ten, hantera filter för hur enskilda identitetshandlingar får användas på internet, samt för att möjliggöra kommunikation med konsumenten genom att skicka notifikationer om händelser som uppstått kopplat till en specifik identitet. Genom en användarportal skulle konsumen-ten kunna administrera sina filter för olika e-tjänster och webbutiker samt få en överblick över specifika händelser som inträffat. En prototyp togs fram för att demonstrera systemmodellens grundläggande funktionalitet i praktiken. Denna kom att innefatta funktionalitet för att autentisera konsumenten, skicka notifikationer om händelser och kontrollera existerande filter för en specifik identitet. Pro-totypen kom att bestå av ett förenklat system enligt den modell som tagits fram, med ett tillhörande API samt två modeller motsvarande en webbutik och en betalningsväxel som skulle nyttja funktionaliteten genom att anropa systemets API. Lösningen utvärderades baserat på det uppnådda resultatet från intervjuer med experter inom problemområdet och genomförd funktionskontroll av den framtagna prototypen. Ge-nom utvärderingen kunde slutsatsen dras att identitetsbaserade bedrägerier med stor sanno-likhet skulle sjunka drastiskt och att den enskilde konsumentens inflytande och medveten-het skulle stärkas. Den största bidragande faktorn till slutsatsen ansågs främst vara det kon-sistenta och standardiserade sätt som skapats för autentisering av och kommunikation med konsumenten. På så vis skulle aktörerna själva avsätta delar av den funktionalitet och de säkerhetsrisker som ansågs finnas i anslutning till hanteringen av identiteter på internet. Svårigheterna med den föreslagna lösningen ansågs vara att få konsumenter, webbutiker och betalningsväxlar att ansluta sig till ett centralt system då man av affärsmässiga skäl väljer att behålla särskilda delar internt.<br>There's a high risk that an unauthorized party can gain access to and use a consumer's iden-tity. This while the ability to control how and when a personal identity is used is small. The question to be answered were regarding how identity theft and online fraud could be mi-nimized and give the consumers a greater influence and more control over the management of their identity online. The goal was to centralize and establish a common approach for identity management on-line, with greater benefits for consumers. Through central service individual consumers would be able to set conditions for which online shops and services would be able to access their identities and grant access in each specific transaction. This would remove the need for non-central control of identities and as a result remove the need for independent storage of identity information. The solution would result in a system model with the potential to authenticate the consu-mer, managing conditions for how individual identity documents may be used online and to provide the consumer with a online history by sending notifications of events that has occurred with regard to a specific identity. A prototype was developed to demonstrate the basic functionality in practice. This included the functionality to authenticate the consumer with Mobile BankID, send notifications about events and check existing conditions regarding a specific identity. This prototype came to consist of a simplified system according to the model developed, an associated API, and two models representing an online store and a payment provider that would utilize the functionality of the system by calling the API. The proposed solution was evaluated through two interviews with experts in the fields of IT Security and e-commerce. The conclusion was that identity fraud would probably drop drastically and the individual consumer influence and awareness would be fortified. The main reason for this was considered to be primarily through the consistent and standardized way for authentication of and communication with the consumer. This would remove the individual risk for online services. The challenge with this proposed solution is believed to be getting consumers, online re-tailers and payment providers to accept a central solution instead of relying on internally developed and disconnected solution.
APA, Harvard, Vancouver, ISO, and other styles
35

Koch, Jessica [Verfasser], Brigitte [Akademischer Betreuer] Glaser, and Barbara [Akademischer Betreuer] Schaff. ""My sense of my own identity is bound up with the past" : The Quest for a Female Identity in Historical Novels by British Women Writers: Penelope Lively, Margaret Drabble, A.S. Byatt, Esther Freud / Jessica Koch. Gutachter: Brigitte Glaser ; Barbara Schaff. Betreuer: Brigitte Glaser." Göttingen : Niedersächsische Staats- und Universitätsbibliothek Göttingen, 2014. http://d-nb.info/1047237024/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Chemouni, Jacquy. "Judeite et psychanalyse." Paris 5, 1989. http://www.theses.fr/1989PA05H006.

Full text
Abstract:
Freud a toujours affirme que ses origines juives ont joue un role dans la decouverte de la psychanalyse. Son attitude a l'egard du sionisme illustre la facon dont il assume sa judeite et sa germanite. Il accepte l'idee de la creation d'un etat juif, mais refuse que celui-ci se fasse au detriment des autochtones arabes; il ne souhaite pas que jerusalem devienne une capitale juive et craint que le sionisme ressuscite le pouvoir de l'ancienne religion ces restrictions ne l'empechent pas d'adherer a des organisations juives sionistes comme la kadimah ou le keren ha-yesod. Pendant plusieurs annees, de 1897 a 1917, il prononcera des conferences aub'nai b'rith, association juive culturelle en tant que juif, il a souffert de l'antisemitisme qu'il rencontre veritable ment a l'universite. Il proposera une interpretation psychanalytique de l'antisemitisme, considere comme l'emanation d'un complexe de castration, sans pour autant reduire son analyse au domaine psychologique
APA, Harvard, Vancouver, ISO, and other styles
37

Lima, Henrique Garcia de. "O uso de tecnologia biométrica para o combate à fraude e a melhoria da gestão de pessoas no serviço público." reponame:Repositório Institucional do FGV, 2014. http://hdl.handle.net/10438/11866.

Full text
Abstract:
Submitted by Henrique Garcia de Lima (hgdlima@gmail.com) on 2014-07-01T02:56:41Z No. of bitstreams: 1 2014-06-30_FGV_Dissertação - Henrique Lima_versão Biblioteca Digital.pdf: 6573543 bytes, checksum: 10d52e68445c89c829a62146889b904f (MD5)<br>Approved for entry into archive by ÁUREA CORRÊA DA FONSECA CORRÊA DA FONSECA (aurea.fonseca@fgv.br) on 2014-07-07T13:34:56Z (GMT) No. of bitstreams: 1 2014-06-30_FGV_Dissertação - Henrique Lima_versão Biblioteca Digital.pdf: 6573543 bytes, checksum: 10d52e68445c89c829a62146889b904f (MD5)<br>Approved for entry into archive by Marcia Bacha (marcia.bacha@fgv.br) on 2014-07-14T13:58:09Z (GMT) No. of bitstreams: 1 2014-06-30_FGV_Dissertação - Henrique Lima_versão Biblioteca Digital.pdf: 6573543 bytes, checksum: 10d52e68445c89c829a62146889b904f (MD5)<br>Made available in DSpace on 2014-07-14T13:58:29Z (GMT). No. of bitstreams: 1 2014-06-30_FGV_Dissertação - Henrique Lima_versão Biblioteca Digital.pdf: 6573543 bytes, checksum: 10d52e68445c89c829a62146889b904f (MD5) Previous issue date: 2014-04-30<br>Este trabalho teve como objetivo analisar o uso da biometria no serviço público como forma de redução das oportunidades de fraudes e melhoria da gestão de pessoas na administração pública. Para isso, foi feita uma comparação semiestruturada da experiência internacional e um estudo de caso aprofundado do projeto Identidade Funcional, desenvolvido pelo governo do Estado do Rio de Janeiro. As lições mais importantes, derivadas destas experiências, estão refletidas em um modelo de projeto para formação de uma base biométrica capaz de garantir a integridade do cadastro de pagamento dos salários e benefícios de previdência da administração pública. O modelo tomou por referência a prefeitura de Duque de Caxias, porém foi estruturado de modo a ser viável em municípios do mesmo porte.<br>This study aims to analyze the use of biometrics in the public service as a way of reducing opportunities for fraud and improving the management of public affairs. The current study uses a semi-structured comparison of international experiences and an in-depth case study of Functional Identity design undertaken by the state government of Rio de Janeiro. The most important lessons derived from these cases were then used to develop a project template for registering biometric data to ensure the integrity of salary and pension benefit within the public administration. The template took as a reference the municipality of Duque de Caxias, but was structured to be viable in cities of a similar size.
APA, Harvard, Vancouver, ISO, and other styles
38

Martin, Jocelyn S. "Re/membering: articulating cultural identity in Philippine fiction in English." Doctoral thesis, Universite Libre de Bruxelles, 2010. http://hdl.handle.net/2013/ULB-DIPOT:oai:dipot.ulb.ac.be:2013/210163.

Full text
Abstract:
This dissertation examines how Philippine (or Filipino) authors emphasise the need for articulating or “re/membering” cultural identity. The researcher mainly draws from the theory of Caribbean critic, Stuart Hall, who views cultural identity as an articulation which allows “the fragmented, decentred human agent” to be considered as one who is both “subject-ed” by power but/and one who is capable of acting against those powers (Grossberg 1996 [1986]: 157, emphasis mine). Applied to the Philippine context, this writer argues that, instead of viewing an apparent fragmented Filipino identity as a hindrance to “defining” cultural identity, she views the “damaged” (Fallows 1987) Filipino history as a the material itself which allows articulation of identity. Instead of reducing the cultural identity of a people to what-they-could-have-been-had-history-not-intervened, she puts forward a vision of identity which attempts to transfigure these “damages” through the efforts of coming-to-terms with history. While this point of view has already been shared by other critics (such as Feria 1991 or Dalisay 1998:145), the author’s contribution lies in presenting re/membering to describe a specific type of articulation which neither permits one to deny wounds of the past nor stagnate in them. Moreover, re/membering allows one to understand continuous re-articulations of “new” identities (due to current migration), while putting an “arbitrary closure” (Hall) to simplistic re-articulations which may only further the “lines of tendential forces” (such as black or brown skin bias) or hegemonic practices.<p><p>Written as such (with a slash),“re/membering” encapsulates the following three-fold meaning: (1) a “re-membering”, to indicate “a putting together of the dismembered past to make sense of the trauma of the present” (Bhabha 1994:63); as (2) a “re-membering” or a re-integration into a group and; as (3) “remembering” which implies possessing “memory or … set [ting] off in search of a memory” (Ricoeur 2004:4). As a morphological unit, “re/membering” designates, the ways in which Filipino authors try to articulate cultural identity through the routes of colonisation, migration and dictatorship. <p><p>The authors studied in this thesis include: Carlos Bulosan, Bienvenido Santos, N.V.M. Gonzalez, Nick Joaquin, Frank Sionil José, Ninotchka Rosca, Jessica Hagedorn, and Merlinda Bobis. Sixty-years separate Bulosan’s America is in the Heart (1943) from Hagedorn’s Dream Jungle (2003). Analysis of these works reveals how articulation is both difficult and hopeful. On the one hand, authors criticize the lack of efforts and seriousness towards articulation of cultural identity as re/membering (coming to terms with the past, fostering belonging and cultivating memory). Not only is re/membering challenged by double-consciousness (Du Bois 1994), dismemberment and forgetting, moreover, its necessity is likewise hard to recognize because of pain, trauma, phenomena of splitting, escapist attitudes and preferences for a “comfortable captivity”. <p><p>On the other hand, re/membering can also be described as hopeful by the way authors themselves make use of literature to articulate identity through research, dialogue, time, reconciliation and re-creation. Although painstaking and difficult, re/membering is important and necessary because what is at stake is an articulated Philippine cultural identity. However, who would be prepared to make the effort?<p>------<p><p>Cette thèse démontre que, pour les auteurs philippins, l’articulation ou « re/membering » l'identité culturelle, est nécessaire. Le chercheur s'appuie principalement sur la théorie de Stuart Hall, qui perçoit l'identité culturelle comme une articulation qui permet de considérer l’homme assujetti capable aussi d'agir contre des pouvoirs (cf. Grossberg 1996 [1986]: 157). Appliquée au contexte philippin, cet auteur soutient que, au lieu de la visualisation d'une identité fragmentée apparente comme un obstacle à une « définition » de l'identité culturelle, elle regarde l’histoire philippine «abîmée» (Fallows 1987) comme le matériel même qui permet l'articulation d’identité. Au lieu de réduire l'identité culturelle d'un peuple à ce qu’ ils auraint pû être avant les interventions de l’histoire, elle met en avant une vision de l'identité qui cherche à transfigurer ces "dommages" par un travail d’acceptation avec l'histoire. <p><p>Bien que ce point de vue a déjà été partagé par d'autres critiques (tels que Feria 1991 ou Dalisay 1998:145), la contribution de l'auteur réside dans la présentation de « re/membering » pour décrire un type d'articulation sans refouler les plaies du passé, mais sans stagner en elles non plus. De plus, « re/membering » permet de comprendre de futures articulations de « nouvelles » identités culturelles (en raison de la migration en cours), tout en mettant une «fermeture arbitraire» (Hall) aux ré-articulations simplistes qui ne font que promouvoir des “lines of tendential forces” (Hall) (tels que des préjugés sur la couleur brune ou noire de peau) ou des pratiques hégémoniques.<p><p>Rédigé en tant que telle (avec /), « re/membering » comporte une triple signification: (1) une «re-membering », pour indiquer une mise ensemble d’un passé fragmenté pour donner un sens au traumatisme du présent (cf. Bhabha, 1994:63); (2) une «re-membering» ou une ré-intégration dans un groupe et finalement, comme (3)"remembering", qui suppose la possession de mémoire ou une recherche d'une mémoire »(Ricoeur 2004:4). Comme unité morphologique, « re/membering » désigne la manière dont les auteurs philippins tentent d'articuler l'identité culturelle à travers les routes de la colonisation, les migrations et la dictature. <p><p>Les auteurs inclus dans cette thèse sont: Carlos Bulosan, Bienvenido Santos, NVM Gonzalez, Nick Joaquin, Frank Sionil José, Ninotchka Rosca, Jessica Hagedorn, et Merlinda Bobis. Soixante ans séparent America is in the Heart (1943) du Bulosan et le Dream Jungle (2003) du Hagedorn. L'analyse de ces œuvres révèle la façon dont l'articulation est à la fois difficile et pleine d'espoir. D'une part, les auteurs critiquent le manque d'efforts envers l'articulation en tant que « re/membering » (confrontation avec le passé, reconnaissance de l'appartenance et cultivation de la mémoire). Non seulement est « re/membering » heurté par le double conscience (Du Bois 1994), le démembrement et l'oubli, en outre, sa nécessité est également difficile à reconnaître en raison de la douleur, les traumatismes, les phénomènes de scission, les attitudes et les préférences d'évasion pour une captivité "confortable" .<p><p>En même temps, « re/membering » peut également être décrit comme plein d'espoir par la façon dont les auteurs eux-mêmes utilisent la littérature pour articuler l'identité à travers la recherche, le dialogue, la durée, la réconciliation et la re-création. Bien que laborieux et difficile, « re/membering » est important et nécessaire car ce qui est en jeu, c'est une identité culturelle articulée des Philippines. Mais qui serait prêt à l'effort? <p><br>Doctorat en Langues et lettres<br>info:eu-repo/semantics/nonPublished
APA, Harvard, Vancouver, ISO, and other styles
39

Ghassemi, Nima. "Mäns identitetsskapande på en kvinnodominerad arbetsplats." Thesis, Halmstad University, School of Social and Health Sciences (HOS), 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-4107.

Full text
Abstract:
<p>Syftet med föreliggande studie är att utifrån ett individperspektiv erhålla djupare förståelse och ökad insikt inom ramen för mäns identitetskapande på en kvinnodominerad arbetsplats. Studien utgick från en kvalitativ metod med en tematisk, semistrukturerad intervjuguide. Urvalet utgjordes av fyra män som jobbar på ett sjukhus i Halmstad. Resultatet visar att männens identitet är flyktig och att den är situationsbunden. Resultatet påvisar även hur en identitet är bunden till olika slags sociala relationer.Resultatet analyseras utifrån George Herbert Mead, Sigmund Freud, Erwig Goffman, William James samt Gregory Stone. Analysen berör aspekterna; maskulin identitet, rollskiftningar samt vad en identitet innebär.</p>
APA, Harvard, Vancouver, ISO, and other styles
40

Göransson, Annie. "Electronic Identification as an Enabling or Obstructive force : The general public’s use and reflections on the Swedish e-ID." Thesis, Linnéuniversitetet, Institutionen för informatik (IK), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-77052.

Full text
Abstract:
This thesis is an exploration of the general public's use and reflections on electronic identification (e-ID) tokens, in Sweden. Based on the researcher’s own experiences, the aim was to understand how the current e-ID scheme was enabling or obstructing the interaction with public agencies, etcetera. The thesis has a qualitative research design and is situated within the interpretivist paradigm. The data was collected through semi-structured interviews and the analysis of three documents, published by three different public agencies in Sweden. The data was analyzed through the vehicle of thematic analysis, which engendered four themes. These were 1. e-ID definitions, 2. the personal identity number as enabler and obstruction, 3. banks as the major e-ID issuer in Sweden and 4. security, skepticism and trust. The findings indicated that the e-ID was associated with convenience and security risks, which were brought up by the interviewees as well as the analyzed public reports. Furthermore, one of the public reports argued that the e-ID should be separated from the notion of having authority, through re- baptizing the Swedish term for e-ID, in Swedish 'e-legitimation' to electronic identity document ('elektronisk identitetshandling' in Swedish).
APA, Harvard, Vancouver, ISO, and other styles
41

Sibold, Noëmie. "Madeleine Dreyfus: „Ein ziemlich jüdisches Leben“. Säkulare Identitäten im Spannungsfeld interreligiöser Beziehungen." HATiKVA e.V. – Die Hoffnung Bildungs- und Begegnungsstätte für Jüdische Geschichte und Kultur Sachsen, 2018. https://slub.qucosa.de/id/qucosa%3A34596.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Jorgensen, Andrew S. "James Thurber's Little Man and the Battle of the Sexes: The Humor of Gender and Conflict." BYU ScholarsArchive, 2006. https://scholarsarchive.byu.edu/etd/946.

Full text
Abstract:
James Thurber, along with others who wrote for The New Yorker magazine, developed the 'little man' comic figure. The little man as a central character was a shift from earlier nineteenth-century traditions in humor. This twentieth-century protagonist was a comic antihero whose function was to create sympathy rather than scorn and bring into question the values and behaviors of society rather than affirm them, as earlier comic figures did. The little man was urban, inept, frustrated, childlike, suspicious, and stubborn. His female counterpart was often a foil: confident and controlling enough to highlight his most pitiable and funniest features. Contradictory gender roles and stereotypes are essential to Thurber's humor. This thesis thus reads Thurber's work as critical of gender roles. Thurber's humor demonstrates that expectations for men and women to be socially masculine and feminine are often incongruous with their capabilities and natures. Often his work is funny because of the way it portrays gender as performance and as expectations imposed upon people instead of as inherent qualities in men and women. These roles create conflicted characters as well as conflict between the characters that Thurber draws in his stories, often a quarreling husband and wife. Also characteristic in Thurber's humor is the element of neurosis. Thurber often played with the vernacular concepts of neurosis, and he capitalized on public obsession with Freudian psychology with his satires and with fiction and essays about various anxieties and daydreaming. Neurosis works well as comic material because it also catalyzes the battle of the sexes. To support my interpretation of Thurber as a critic of societal gender roles, Freud's book The Joke and Its Relation to the Unconscious is useful at illuminating a deeper 'tendency' in Thurber's humor. Thurber is often thought of as a misogynist, for his personal behavior and for his unflattering literary portrayal of women as unimaginative nags. This thesis also examines the complexities and developments of Thurber's attitudes toward women. Most importantly for Thurber, his little man figure and the battle of the sexes was a way to express the importance and power of the liberated human imagination.
APA, Harvard, Vancouver, ISO, and other styles
43

Büchel-Thalmaier, Sandra. "Dekonstruktive und rekonstruktive Perspektiven auf Identität und Geschlecht : eine feministisch-religionspädagogische Analyse /." Münster : LIT, 2005. http://www.gbv.de/dms/bs/toc/47799864x.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Zamora, Maria C. "Nation, race & history in Asian American literature re-membering the body." New York, NY Washington, DC Baltimore, Md. Bern Frankfurt, M. Berlin Brussels Vienna Oxford Lang, 2008. http://d-nb.info/990413780/04.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Broom, Hannah. "Aggressive Flesh: The Obese Female Other." Thesis, Queensland University of Technology, 2005. https://eprints.qut.edu.au/16093/1/Hannah_Broom_Thesis.pdf.

Full text
Abstract:
My visual art practice explores the point at which a sense of bodily humour and revulsion may intersect in the world of the monstrous-feminine: the female grotesque, presented as my own obese (and post-obese) body. This exegesis is a written elucidation of my visual art practice as research. As an artist I create performative photographic images featuring taboo or otherwise 'inappropriate' subject matter, situations, materials and behaviours including bodily fluids, offal, internal organs and my own post-obese body. Through these modes of working, I establish and investigate the subjectivity of flesh: Why are we repulsed by the female grotesque? How can this flesh be used to subvert readings of the female body? My research is informed by those understandings of the female body, sexuality and difference described in the work of feminist theorists including Julia Kristeva, Helene Cixous, Ruth Salvaggio and Elizabeth Grosz. I explore the work of influential artists such as Eleanor Antin, Carolee Schneeman, Cindy Sherman and Sarah Lucas. In this context, I present my own visual art practice as a point from which the monstrous-feminine can be given voice as sentient, intelligent flesh.
APA, Harvard, Vancouver, ISO, and other styles
46

Broom, Hannah. "Aggressive Flesh: The Obese Female Other." Queensland University of Technology, 2005. http://eprints.qut.edu.au/16093/.

Full text
Abstract:
My visual art practice explores the point at which a sense of bodily humour and revulsion may intersect in the world of the monstrous-feminine: the female grotesque, presented as my own obese (and post-obese) body. This exegesis is a written elucidation of my visual art practice as research. As an artist I create performative photographic images featuring taboo or otherwise 'inappropriate' subject matter, situations, materials and behaviours including bodily fluids, offal, internal organs and my own post-obese body. Through these modes of working, I establish and investigate the subjectivity of flesh: Why are we repulsed by the female grotesque? How can this flesh be used to subvert readings of the female body? My research is informed by those understandings of the female body, sexuality and difference described in the work of feminist theorists including Julia Kristeva, Helene Cixous, Ruth Salvaggio and Elizabeth Grosz. I explore the work of influential artists such as Eleanor Antin, Carolee Schneeman, Cindy Sherman and Sarah Lucas. In this context, I present my own visual art practice as a point from which the monstrous-feminine can be given voice as sentient, intelligent flesh.
APA, Harvard, Vancouver, ISO, and other styles
47

Berrios-Ayala, Mark. "Brave New World Reloaded: Advocating for Basic Constitutional Search Protections to Apply to Cell Phones from Eavesdropping and Tracking by Government and Corporate Entities." Honors in the Major Thesis, University of Central Florida, 2013. http://digital.library.ucf.edu/cdm/ref/collection/ETH/id/1547.

Full text
Abstract:
Imagine a world where someone’s personal information is constantly compromised, where federal government entities AKA Big Brother always knows what anyone is Googling, who an individual is texting, and their emoticons on Twitter. Government entities have been doing this for years; they never cared if they were breaking the law or their moral compass of human dignity. Every day the Federal government blatantly siphons data with programs from the original ECHELON to the new series like PRISM and Xkeyscore so they can keep their tabs on issues that are none of their business; namely, the personal lives of millions. Our allies are taking note; some are learning our bad habits, from Government Communications Headquarters’ (GCHQ) mass shadowing sharing plan to America’s Russian inspiration, SORM. Some countries are following the United States’ poster child pose of a Brave New World like order of global events. Others like Germany are showing their resolve in their disdain for the rise of tyranny. Soon, these new found surveillance troubles will test the resolve of the American Constitution and its nation’s strong love and tradition of liberty. Courts are currently at work to resolve how current concepts of liberty and privacy apply to the current conditions facing the privacy of society. It remains to be determined how liberty will be affected as well; liberty for the United States of America, for the European Union, the Russian Federation and for the people of the World in regards to the extent of privacy in today’s blurred privacy expectations.<br>B.S.<br>Bachelors<br>Health and Public Affairs<br>Legal Studies
APA, Harvard, Vancouver, ISO, and other styles
48

Brenner, Jennifer Tatiana. "One step ahead, not two steps behind: the fight to protect our identities." Thesis, 2014. http://hdl.handle.net/2152/26002.

Full text
Abstract:
This thesis reviews different types of identity theft and conducts and in-depth review of the threats to our personally identifiable information (PII). There has been an alarming increase in the availability of industry applications that aggregate our PII with the promise of convenience. This paper deeply explores three data aggregators: Google Mobile Wallet, COIN and PayPal Beacon, to understand what they are, potential security implications and how widespread data aggregation may alter the identity landscape as a whole. Discussion of common technologies leveraged by these data aggregators help illustrate the vulnerability of the data consumers are willingly sharing. In an attempt to better understand the crimes that steal and fraudulently use PII, this thesis introduces the ITAP, the Identity Theft Assessment and Prediction tool to illustrate why it is important to study theft and fraud as a business process. The paper presents a small, independent study conducted to emphasize the validly of both the business process ideology and usefulness of the results. Closing thoughts are presented to speculate what the future of identity could look like and how consumers may need to use the information gathered from tools such as the ITAP to shape best practices. The goal is to be two steps ahead instead of one step behind.<br>text
APA, Harvard, Vancouver, ISO, and other styles
49

Ngugi, Benjamin. "Electronic capture and analysis of fraudulent behavioral patterns an application to identity fraud /." Thesis, 2005. http://library1.njit.edu/etd/fromwebvoyage.cfm?id=njit-etd2005-133.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Mabasa, Christopher. "Guidelines for formulating questions to interview applicants of identity documents." Diss., 2016. http://hdl.handle.net/10500/22645.

Full text
Abstract:
The aim of this research is to investigate guidelines for formulating questions to interview applicants of identity documents, for the use of the Department of Home Affairs (DHA) officials during the interviewing of applicants of identity documents. The research further intends to share and introduce a number of important concepts, namely: Interviewing, Crime Investigation, Information, Identity Docu-ment, Immigration Officer, Department, and Case File. The research will explain the objectives of investigation and guidelines for developing proper questions for use by officials of the DHA, to test information on new applicants of identity documents. The object of the investigation is to obtain information to prove the correct techniques on how to interview appli-cants of identity documents. It further explains that criminal investigation can be defined as the process of discovering, collecting, preparing, identifying and presenting evidence, to deter-mine what happened and who is responsible. Interviewing is defined as the process of gathering testimonial evidence through interviewing, and it has a predetermined objective, namely discovering the truth about the matter under investigation. It is also explained that during guidelines for formulating relevant questions to use to enable the official or immigration officer to formulate test questions that are clearly understood better by DHA. The relevant questions should be formulated by DHA officials, so that the questions get to the heart of the issue. This can enable the official to avoid applicants submitting fraudulent documents which could later result in litigation. The research will assist in decreasing the high rate of corruption, and also litigation, as these represent the main problem of the research.<br>Criminology and Security Science<br>M. Tech. (Forensic Investigation)
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography