Academic literature on the topic 'Self- generated pseudonym'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Self- generated pseudonym.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Self- generated pseudonym"

1

He, Bintao, and Shangping Wang. "A Traceable Self-Generated Pseudonym Scheme in VANETs." Journal of Physics: Conference Series 2384, no. 1 (2022): 012020. http://dx.doi.org/10.1088/1742-6596/2384/1/012020.

Full text
Abstract:
Abstract The generation of the pseudonym in vehicular ad hoc networks (VANETs) usually requires the participation of a trusted center (TA), and it needs multiple interactions with the TA. To address these problems, we propose a novel traceable self-generated pseudonym based on the non-interactive zero-knowledge proof (NIZK) and consortium blockchain in VANETs. In our scheme, a self-generated pseudonyms method is introduced to eliminate excessive communication burden, and a consortium blockchain is composed of multiple roadside units (RSUs) to replace the TA. RSUs in the consortium blockchain verify the effectiveness of OBU’s self-generated pseudonyms through the consensus mechanism. Multiple trace authorities (TRAs) are designed to jointly tracking of the real identity of the OBU, which effectively prevents the abuse of supervision by the only supervisor.
APA, Harvard, Vancouver, ISO, and other styles
2

Liew, Hattie. "Anti-fandom in the Xiaxue empire: A celebrity blogger and her haters." Journal of Fandom Studies 7, no. 3 (2019): 261–77. http://dx.doi.org/10.1386/jfs_00004_1.

Full text
Abstract:
The advent of the Internet and user-generated platforms has facilitated the rise of a new breed of celebrity. Bloggers, YouTubers and Instagram stars, armed with their laptops and smartphones, represent an important part of the contemporary media landscape. This article will investigate Singaporean social media influencer Wendy Cheng, known by her pseudonym, Xiaxue. Starting her Internet career as a blogger in 2003, Xiaxue has built a massive online presence over multiple platforms and is arguably one of the most commercially successful Internet celebrities in her country. Her thriving Internet career implies the presence of a large follower and fan base. However, we will look at the other side of the coin ‐ the anti-fans ‐ an often-neglected segment of users in the study of Internet celebrity. These anti-fans, individuals who strongly dislike Xiaxue, can be just as engaged and committed as fans, albeit in different ways. This article will analyse user comments on Xiaxue’s online video channel Xiaxue’s Guide to Life, and anti-fan platform Guru Gossip’s Abhorred Bloggers (Xiaxue) forum. Findings show that Xiaxue’s anti-fandom is driven by a moral economy related to her self-presentation, femininity and nature of her celebrity.
APA, Harvard, Vancouver, ISO, and other styles
3

Sucasas, Víctor, Georgios Mantas, Saud Althunibat, et al. "A Privacy-Enhanced OAuth 2.0 based Protocol for Smart City Mobile Applications." Elsevier Computers & Security 74, no. C (2018): 258–74. https://doi.org/10.1016/j.cose.2018.01.014.

Full text
Abstract:
In the forthcoming Smart City scenario, Service Providers will require users to authenticate themselves and authorize their mobile applications to access their remote accounts. In this scenario, OAuth 2.0 has been widely adopted as a de facto authentication and authorization protocol. However, the current OAuth 2.0 protocol specification does not consider the user privacy issue and presents several vulnerabilities that can jeopardize users' privacy rights. Therefore, in this paper we propose an OAuth 2.0 based protocol for Smart City mobile applications that addresses the user privacy issue by integrating a pseudonym-based signature scheme and a signature delegation scheme into the OAuth 2.0 protocol flow. The proposed solution allows users to self-generate user-specific and app-specific pseudonyms on-demand and ensure privacy-enhanced user authentication at the Service Provider side. The proposed protocol has been validated with Proverif and its performance has been evaluated in terms of time and space complexity. Results show that the proposed protocol can provide users with efficient and effective means to authenticate towards service providers while preventing user tracking and impersonation from malicious entities located in the network side or in the users' mobile device.
APA, Harvard, Vancouver, ISO, and other styles
4

Vine, Tom. "Women, bullying and the construction industry: Twisted gender dynamics in a male-dominated environment." puntOorg International Journal 1, no. 1 (2018): 23–27. http://dx.doi.org/10.19245//25.05.wpn.1.1.5.

Full text
Abstract:
To the extent that it can be construed as harassment, bullying within the workplace is illegal (Gov.uk, 2013). Despite this, evidence suggests that the phenomenon remains widespread, and often proliferates in obscure and ambiguous ways (Miner and Eischeid, 2012). The Advisory, Conciliation and Arbitration Service (Acas) (2013) define bullying as “unwanted behaviour that makes someone feel intimidated, degraded, humiliated or offended”, with examples ranging from “spreading malicious rumours, or insulting someone, to exclusion or victimisation”. We present a subject that has received limited attention within the literature: bullying between women. In fact, this paper focuses on workplace bullying inflicted on women, by women, but in a male-dominated environment. It is against this background that we identify and explore the phenomenon at British Construction (a pseudonym) (BC). The following empirical data reflects the experiences described in the diary of a woman at BC (Tina, one of the authors of this paper). While such experience certainly includes the barriers to recruitment encountered, the emphasis here is on the specific challenges women encounter once working within the male-dominated industry. In fact, Tina was an employee at the company for 15 years and subsequently resigned following sustained bullying by a female colleague together with an employer that would not acknowledge its seriousness, or apply its policies to protect her in the absence of statutory law. On one level the story told in this paper will be one familiar to many of us: daily frustrations at work, resentment and self-doubt. Indeed, most of us accept such occurrences as inevitable. But on another level, the story reveals a dysfunctional behaviour which scholars working in the field of work and organization can actively help ameliorate. The narrative focuses on the phenomenon of bullying between women, and the cultural and leadership mechanisms through which male-dominated workforces apparently facilitate it. By way of analysis, this research uses the framework developed by MacIntosh et al. (2010). The framework suggests women typically experience workplace bullying through a four stage process. The four stages are defined as Being Conciliatory, Reconsidering, Reducing Interference and Redeveloping Balance. Such bullying is here conceptualised as part of what has become known in recent decades as the “Queen Bee Syndrome” (Staines et al., 1973). It is seen to have a detrimental effect not only on those involved directly, but on the broader relations between employee and employer. Whereas the vast majority of existing studies on workplace bullying rely on survey or other quantitative data, we here impart a first-hand experience by means of retrospective autoethnography (sometimes referred to as “autoethnography a posteriori”; see for example Boncori 2013: xvii). We go on to argue that, unaddressed, there are far-reaching implications for organisations, particularly in male-dominated industries. Organisations can mitigate this phenomenon by raising awareness, providing training, establishing and maintaining robust workplace policies, and – perhaps most pertinently - by actively championing gender balance in hitherto male-dominated industries. Additionally, in reflecting on the findings generated we speculate that although the Queen Bee Syndrome implies superficially that women are their own worst enemies (see, for example, findings reported by Rindfleish, 2000), we argue that this phenomenon is deeply entrenched in behavioural norms, the parameters for which have been defined by societal forces more generally. Finally, we delineate recommendations to expand research in this area to encompass the experiences of other women, in other industries.
APA, Harvard, Vancouver, ISO, and other styles
5

Pitts, Frederick Harry, Paolo Borghi, and Annalisa Murgia. "Organising the self-employed: combining community unionism, coworking and cooperativism across contexts." Open Research Europe 3 (May 16, 2023): 80. http://dx.doi.org/10.12688/openreseurope.15798.1.

Full text
Abstract:
The growing insecurity, flexibilisation and fragmentation of labour markets goes hand-in-hand with the decrease of social protection levels and collective representation for workers in non-standard employment relationships, such as the hybrid category of ‘solo self-employed workers’. In response, on the one hand, trade unions attempt to approach and organise this heterogenous category of workers. On the other, new freelancer organisations are emerging to improve worker rights and safety, and overcome their social and professional isolation. Reporting the findings of long-term, slow ethnography, we describe a failed collaboration between three new collective actors in the representation and organisation of self-employed workers. In the second half of the 2010s, two UK organisations, Coworking (all names pseudonyms), a coworking space operator working in a deprived ex-industrial area, and Union, a former industrial union, created Coworking.Union, a cooperative trade union offering services and advocacy for the self-employed. Coworking.Union collaborated with Cooperative, a freelancer cooperative based in Northern Europe, with a view to emulate aspects of its model in the UK. We present a detailed reconstruction of the interactions of the three actors over time, including their context, expectations, and visions, starting from the motivations that generated the first contacts, through to the development of operational agreements, up to the failure of these agreements as relations cooled. The case study, and the failed experiment it captures, constitutes an important opportunity to understand the dynamism, complexity, and contradiction manifest in organising the self-employed. While the strategic ingredients of significant organisational innovation were in evidence between the three actors, it generated instead a failure. The case study thus demonstrates the importance of an in-depth analysis of failed attempts at organising the self-employed and their meaning for broader struggles by old and new actors to alter the terrain of the hybrid areas of employment more generally.
APA, Harvard, Vancouver, ISO, and other styles
6

J., Jenefa, and A. Mary Anita E. "A Signature-Based Secure Authentication Framework for Vehicular Ad Hoc Networks." February 4, 2016. https://doi.org/10.5281/zenodo.1123795.

Full text
Abstract:
Vehicular Ad hoc NETwork (VANET) is a kind of Mobile Ad hoc NETwork (MANET). It allows the vehicles to communicate with one another as well as with nearby Road Side Units (RSU) and Regional Trusted Authorities (RTA). Vehicles communicate through On-Board Units (OBU) in which privacy has to be assured which will avoid the misuse of private data. A secure authentication framework for VANETs is proposed in which Public Key Cryptography (PKC) based adaptive pseudonym scheme is used to generate self-generated pseudonyms. Self-generated pseudonyms are used instead of real IDs for privacy preservation and non-repudiation. The ID-Based Signature (IBS) and ID-Based Online/Offline Signature (IBOOS) schemes are used for authentication. IBS is used to authenticate between vehicle and RSU whereas IBOOS provides authentication among vehicles. Security attacks like impersonation attack in the network are resolved and the attacking nodes are rejected from the network, thereby ensuring secure communication among the vehicles in the network. Simulation results shows that the proposed system provides better authentication in VANET environment.
APA, Harvard, Vancouver, ISO, and other styles
7

J., Jenefa, and A. Mary Anita E. "A Signature-Based Secure Authentication Framework for Vehicular Ad Hoc Networks." International Journal of Information, Control and Computer Sciences 9.0, no. 2 (2016). https://doi.org/10.5281/zenodo.1339213.

Full text
Abstract:
Vehicular Ad hoc NETwork (VANET) is a kind of Mobile Ad hoc NETwork (MANET). It allows the vehicles to communicate with one another as well as with nearby Road Side Units (RSU) and Regional Trusted Authorities (RTA). Vehicles communicate through On-Board Units (OBU) in which privacy has to be assured which will avoid the misuse of private data. A secure authentication framework for VANETs is proposed in which Public Key Cryptography (PKC) based adaptive pseudonym scheme is used to generate self-generated pseudonyms. Self-generated pseudonyms are used instead of real IDs for privacy preservation and non-repudiation. The ID-Based Signature (IBS) and ID-Based Online/Offline Signature (IBOOS) schemes are used for authentication. IBS is used to authenticate between vehicle and RSU whereas IBOOS provides authentication among vehicles. Security attacks like impersonation attack in the network are resolved and the attacking nodes are rejected from the network, thereby ensuring secure communication among the vehicles in the network. Simulation results shows that the proposed system provides better authentication in VANET environment.
APA, Harvard, Vancouver, ISO, and other styles
8

MacDougall, Alan. "'And the Word Was Made Flesh and Dwelt among Us...'." M/C Journal 2, no. 3 (1999). http://dx.doi.org/10.5204/mcj.1751.

Full text
Abstract:
And the Word was made flesh, and dwelt amongst us, ... full of grace and truth. -- John 1, 14. So you use the Internet. Perhaps during the course of today you have interacted with an individual with whom you have had no direct real life experience. In email, on ICQ, or within one of the Activeworlds, you may have come to understand and recognise the personality of someone with whom you interact regularly. Even though you've never met them in the flesh, they have a presence in your life. They may give no clues as to their location or hints at any form of personal identifier. You even accept what they show of themselves as a sort of truth, although it may be unverifiable. What else can you do? In effect, you have been dealing with a pseudonymous individual. The use of pseudonyms "creates a context of 'managed ambiguity', permitting relationship, while offering an opportunity to actively conceal or reveal elements of real-life identity" (Chester & Gwynne). Pseudonymity differs from anonymity in that an alias is bestowed upon or chosen by the user, and used consistently over time. New technologies will allow this idea to be taken even further, with users able to construct untraceable identities for use online. These identities will be the "bodies", the new flesh, the vehicle in which users will conduct their online lives. Like Baudrillard's simulacra, this new flesh may even be a representation of something that does not exist in the real world. The driving forces for Internet pseudonymity may include users' desires to play with the concept of identity and explore their own personalities. As Sherry Turkle notes, "computer-mediated communications can serve as a place for the construction and reconstruction of identities" (Turkle 14). With more and more of our everyday activities occurring online the opportunities increase for creation of an online identity that may be different to that presented in real life. Even in choosing a name for use online, we are creating the new flesh in embryonic form. For example on Internet Relay Chat, like many communication forms on the Internet, there is a lack of visual cues associated with participants. To overcome the lack of information which would otherwise be obtained by viewing participants face to face, a self-chosen name becomes the "only initial way of saying who we are, in literally one word or one expression" (Bechar-Israeli). Thus the chosen name becomes a very important token of identity, and may communicate a quite different picture of its owner than exists in reality. However some Internet users lack the opportunity or inclination for this sort of "play". In particular, for many professional, academic and business users, "their institutional connection is a highly relevant fact" (Wynn & Katz). Conducting themselves pseudonymously would require a long period of reputation and credential building that would interfere with their purpose in using the Internet. Pseudonymity is thus unlikely to be an attractive option for these users. However, out in the wider Internet community, another driver for the development of technological solutions to pseudonymity is a broadly felt concern for privacy on the Internet. In October last year a major survey of Internet users found that respondents ranked privacy as the "single most critical issue facing the Internet" (Graphic, Visualization, & Usability Center). Internet users need assurance that they may conduct online activities without fear of surveillance. The concerns about Internet privacy have expanded beyond the traditional fears of government intrusion to include fears about commercial interests reaching further into our private lives. This latter concern may be best expressed in terms of the commoditisation of private information. Information about the behaviour and patterns of individuals is becoming increasingly valuable in our societies. If information about ourselves is becoming valuable, we hope to respond by controlling access to that information and even requiring something in exchange for its use. Think of a customer loyalty card on which you are collecting "points". In effect, the user has swapped their demographic details and a full purchase history for a prize, or a discount on some future purchase. This allows a commercially useful correlation between the individual and their personal situation, likes, dislikes, wants and needs, and behaviour as a consumer. At the same time the user has (hopefully) gained something from the exchange. For commercial interests on the Internet, such an arrangement is unnecessary because the correlation of individuals with their online behaviour patterns is easier to uncover. One example of this is the recent move of database marketers onto the Internet. Last year IntelliQuest, owners of a large database comprising "over 50% of Internet-enabled households" (IntelliQuest), announced a plan to join forces with 24/7, an Internet advertising firm. Unless the user indicates otherwise, Intelliquest will collect demographic data when a software product is registered online. An identifying file (a "cookie") is placed on the user's hard-drive which can be "read" by Websites visited subsequently. 24/7, in cooperation with the visited Website, are then able to serve advertisements targeted to the specific user. 24/7 will track the movements of specific users, and can then "supply IntelliQuest with online surfing habits to supplement [Intelliquest's] demographic information" (Bicknell). In effect, the Internet user has given away their demographic data and a full browsing history for nothing in return. In response to issues of this nature, researchers around the world are developing methods to separate the content of online communications from association with individual senders and receivers. An example is "Crowds", which "operates by grouping users into a large and geographically diverse group (crowd) that collectively issues requests on behalf of its members" (Reiter & Rubin). This prevents a Webserver from identifying the original user requesting a Web page. At the same time, the user could also employ the "Lucent Personal Web Page Assistant" which inserts randomly generated pseudonyms "into Web forms that request a user's name". The system is designed to "consistently use the same pseudonyms every time a particular user returns to the same site, but use a different pseudonym at each Web site" (Cranor). Although each Website may gain information about the browsing habits of a particular pseudonymous user on their own site, it is unable to cross-reference that information with other sites and databases. Taking these and related ideas further is Zero-Knowledge Systems, whose unreleased "Freedom" product reportedly allows the user to create multiple untraceable digital pseudonyms. The company even states that using Freedom to create different pseudonyms gives the user the "opportunity to separately explore completely different areas of the Internet and avoid being profiled by Internet marketers" (Zero-Knowledge Systems). As yet, all of these technologies are immature and often require a motivation and degree of proficiency possibly beyond that of many Internet users. But increasingly the trend is for the technologies to be built invisibly into the lower levels of Internet infrastructure, so that the user may only need to overtly choose who or what they want to be today. The technical details of presenting a consistent and pseudonymous identity will be taken care of automatically. Pseudonymity, and especially anonymity, on the Internet are subject to abuse. Several anonymous remailers, forerunners of systems like Freedom, have had to shut down or restrict their services. In most cases this was not because of criminal or libellous abuse (which would be difficult to prove given the nature of the systems concerned), but because of mass email spam being routed through them. Authorities worldwide are naturally concerned that anonymising and pseudonymising systems may shield the activities of serious criminals. The Cypherpunks, a loose grouping of Internet cryptography and anonymity advocates, term this the "Four Horsemen of the Infocalypse" scenario. Cypherpunks see authorities exaggerating the spectres of "terrorists, paedophiles, drug dealers, and money launderers" ("Adam") in their arguments for greater regulation of the Internet. Despite the hyperbole on both sides, these are serious issues over which debate will intensify. Up until now a deterrent to crime has been the possibility that a criminal might be held responsible for their actions and be bodily removed from society by being taken to prison. With a real life crime committed under conditions of untraceable pseudonymity, only the criminal's pseudonym may be identified. The pseudonymous identity may be removed from society by perhaps somehow being prevented from using the network. But the actual criminal is still free to create another pseudonym and resume activities. Thus, the pseudonymous identity is not subject to the same physical controls or constraints on behaviour as the bodies we use in real life. Perhaps even more alarmingly, the new flesh may still be subject to what could arguably be seen as derivations of real life crimes, such as rape. By the same token this freedom from constraint could also be a positive thing. A person could choose to shape a pseudonymous identity quite different from their real life identity. They might choose a different name, gender, age, body or personality type; and if they are unsatisfied with their experiment, they may try another. Here, the new flesh allows changes in appearence and personality without therapy or surgery. Explorations of the possibilities inherent in the new flesh might help reconcile people to their problems with the old. The improvement and eventual transparency of pseudonymity enhancing technologies will have wide ranging effects. David Post, of the Cyberspace Law Institute, believes pseudonymous speech "is valuable in a way that anonymous speech is not and cannot be, because it permits the accumulation of reputational capital and 'goodwill' over time in the pseudonym itself, while simultaneously serving as a liability limitation insulating the speaker's 'true identity' from exposure" (Post). Given enough time, we may come to accept and trust a pseudonymous identity without needing to question its real life owner. An individual may ultimately be judged less on who or what they are and more on what they are actually seen to do. Pseudonymous life will permit individuals to take part in all aspects of Internet society, to build communities, participate in electronic commerce, and explore aspects of human existence independently and without compromising their real life identities. As the use of the Internet broadens we shall likely see not only pseudonyms in use, but also avatars, representations of a physical form that the user has chosen as their outward appearance. These may be seen now in some three-dimensional interactive spaces, such as Activeworlds, where the user can construct their own body. The avatar is "seen" by other users as the form and location of a pseudonymous individual. One wonders if the new flesh will be a replacement for the old, rather than a sort of supplement. Certainly there is not the technology available now or in the near future for pseudonymous life as a full replacement for the real, The Matrix notwithstanding. Would anyone really want a full replacement which is technically inferior to the real thing? But perhaps without wanting to divorce themselves from the real world, users will still take up pseudonyms for varied reasons -- among them a desire for experiment, privacy, or simply because their Internet Service provider offers the facility. Stewart Brand once said "we are as gods and might as well get good at it". In terms of the Internet, the potential for an almost godlike power to create identities and appearances could lead to a virtual world of the word made flesh. This new flesh may not necessarily be full of grace and truth, but it will dwell amongst us. References "Adam". "The Four Horsemen of the Infocalyse." 1995. 16 Apr. 1999 <http://www.decode.com/fourhorsemen.php>. Bechar-Israeli, Haya. "From <Bonehead&gt to <cLoNehEAd&gt: Nicknames, Play, and Identity on Internet Relay Chat." 1995. 3 May 1999 <http://www.ascusc.org/jcmc/vol1/issue2/bechar.php>. Bicknell, Craig. "Database Marketing on the Web." 1998. 8 Apr. 1999 <http://www.wired.com/news/news/business/story/15456.php>. Chester, Andrea, and Gillian Gwynne. "Online Teaching: Encouraging Collaboration through Anonymity." Journal of Computer Mediated Communication 4.2 (1998). 12 Apr. 1999 <http://www.ascusc.org/jcmc/vol4/issue2/chester.php>. Cranor, Lorrie. "Internet Privacy: A Public Concern." 1998. 7 Apr. 1999 <http://www.research.att.com/~lorrie/pubs/networker-privacy.php>. Graphic, Visualization, & Usability Center. "10th WWW User Survey." 1999. 7 Apr. 1999 <http://www.gvu.gatech.edu/gvu/user_surveys/survey-1998-10/>. IntelliQuest. "IntelliQuest's Rapidly Growing High-Tech Household Database Now Identifies More Than 11.5 Million Internet-User Households." 1999. 8 Apr. 1999 <http://www.iq2.net/news/hthh.htm>. Post, David. "Pooling Intellectual Capital: Thoughts on Anonymity, Pseudonymity, and Limited Liability in Cyberspace." 1996. 14 Apr. 1999 <http://www.cli.org/DPost/paper8.htm>. Reiter, Mike, and Avi Rubin. "Anonymity Loves Company." 1999. 14 Apr. 1999 <http://www.research.att.com/projects/crowds/>. Turkle, Sherry. Life on the Screen: Identity in the Age of the Internet. New York: Touchstone, 1995. Wynn, Eleanor, and James Katz. "Hyperbole over Cyberspace: Self-presentation & Social Boundaries in Internet Home Pages and Discourse." The Information Society 13.4 (1998). 13 Apr. 1999 <http://www.slis.indiana.edu/TIS/hyperbole.php>. Zero-Knowledge Systems. "What is Freedom?" 1999. 14 Apr. 1999 <http://www.zeroknowledge.com/products/what.asp>. Citation reference for this article MLA style: Alan Macdougall. "'And the Word Was Made Flesh and Dwelt among Us...': Towards Pseudonymous Life on the Internet." M/C: A Journal of Media and Culture 2.3 (1999). [your date of access] <http://www.uq.edu.au/mc/9905/life.php>. Chicago style: Alan Macdougall, "'And the Word Was Made Flesh and Dwelt among Us...': Towards Pseudonymous Life on the Internet," M/C: A Journal of Media and Culture 2, no. 3 (1999), <http://www.uq.edu.au/mc/9905/life.php> ([your date of access]). APA style: Alan Macdougall. (1999) 'And the word was made flesh and dwelt among us...': towards pseudonymous life on the Internet. M/C: A Journal of Media and Culture 2(3). <http://www.uq.edu.au/mc/9905/life.php> ([your date of access]).
APA, Harvard, Vancouver, ISO, and other styles
9

Nafisul Kiron, Ifeoma Adaji, Jeff long, and Julita Vassileva. "Engaging Students in a Peer‑Quizzing Game to Encourage Active Learning and Building a Student‑Generated Question Bank." Electronic Journal of e-Learning 18, no. 3 (2020). http://dx.doi.org/10.34190/ejel.18.3.1906.

Full text
Abstract:
Games are a great source of entertainment and are used by people of all ages; they motivate and engage people and affect their behavior. Therefore, games have been widely studied in many non‑game contexts. Education is one of those areas where gamified, and game‑based learning strategies have been implemented and explored. To engage and motivate students to quiz each other, and as a side effect, build a question bank, as well as to study the gaming and learning behavior of students, we used a peer‑quizzing game called "Tower of Questions" (ToQ). The game uses some themes and mechanics found in tower defense (TD) games. The students received points for posing and answering the questions in the game in the form of gems. Students played the game with pseudonyms for one academic term and were told not to disclose their identities to anyone. We conducted a 3‑month long study for two consecutive years in the same first‑year undergraduate computer science course. In this paper, we present the findings from our studies using ToQ, specifically findings related to the students’ self‑monitoring and quizzing activities based on the game logs and two self‑reported surveys from data collected in the second year of the study.
APA, Harvard, Vancouver, ISO, and other styles
10

Pitts, Frederick Harry, Paolo Borghi, and Annalisa Murgia. "Organising the self-employed: combining community unionism, coworking and cooperativism across contexts." Open Research Europe, May 16, 2023. https://doi.org/10.12688/openreseurope.15798.1.

Full text
Abstract:
The growing insecurity, flexibilisation and fragmentation of labour markets goes hand-in-hand with the decrease of social protection levels and collective representation for workers in non-standard employment relationships, such as the hybrid category of 'solo self-employed workers'. In response, on the one hand, trade unions attempt to approach and organise this heterogenous category of workers. On the other, new freelancer organisations are emerging to improve worker rights and safety, and overcome their social and professional isolation. Reporting the findings of long-term, slow ethnography, we describe a failed collaboration between three new collective actors in the representation and organisation of self-employed workers. In the second half of the 2010s, two UK organisations, Coworking (all names pseudonyms), a coworking space operator working in a deprived ex-industrial area, and Union, a former industrial union, created Coworking.Union, a cooperative trade union offering services and advocacy for the self-employed. Coworking.Union collaborated with Cooperative, a freelancer cooperative based in Northern Europe, with a view to emulate aspects of its model in the UK. We present a detailed reconstruction of the interactions of the three actors over time, including their context, expectations, and visions, starting from the motivations that generated the first contacts, through to the development of operational agreements, up to the failure of these agreements as relations cooled. The case study, and the failed experiment it captures, constitutes an important opportunity to understand the dynamism, complexity, and contradiction manifest in organising the self-employed. While the strategic ingredients of significant organisational innovation were in evidence between the three actors, it generated instead a failure. The case study thus demonstrates the importance of an in-depth analysis of failed attempts at organising the self-employed and their meaning for broader struggles by old and new actors to alter the terrain of the hybrid areas of employment more generally.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Self- generated pseudonym"

1

Qi, Jiayu, and Tianhan Gao. "An Anonymous Authentication Scheme Based on Self-generated Pseudonym for VANETs." In Innovative Mobile and Internet Services in Ubiquitous Computing. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-08819-3_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Self- generated pseudonym"

1

Dang, Xiaojun, and Yang Zhang. "Hierarchical Pseudonym-Based Signature Scheme and Self-Generated Pseudonym System in Ad Hoc Networks." In 2008 The Fourth International Conference on Wireless and Mobile Communications. IEEE, 2008. http://dx.doi.org/10.1109/icwmc.2008.19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography