Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 11 of 11

Full-Text Articles in Social and Behavioral Sciences

Projecting The Self Into A Virtual World: Merging Identities With A Video Game Character, Kevin S. Smith Oct 2014

Projecting The Self Into A Virtual World: Merging Identities With A Video Game Character, Kevin S. Smith

Kevin S Smith

The purpose of the present study was to examine the effect of perspective-taking instructions (PTI) on (a) the tendency to project aspects of the self onto a video game character and (b) the degree of “telepresence” within a virtual world. Perspective taking instructions encourage subjects to imagine themselves as a story character. It has been found in the past that PTI may cause an individual to merge identities with a story character in written stories1 and films2. This study replicated these findings using a video game. Male video game players were asked to play a video game and completed character …


Socio-Emotional Connections: Identity, Belonging And Learning In Online Interactions. A Literature Review, Janine Delahunty, Irina Verenikina, Pauline Jones Sep 2014

Socio-Emotional Connections: Identity, Belonging And Learning In Online Interactions. A Literature Review, Janine Delahunty, Irina Verenikina, Pauline Jones

I. Verenikina

This review focuses on three interconnected socio-emotional aspects of online learning: interaction, sense of community and identity formation. In the intangible social space of the virtual classroom, students come together to learn through dialogic, often asynchronous, exchanges. This creates distinctive learning environments where learning goals, interpersonal relationships and emotions are no less important because of their 'virtualness', and for which traditional face-to-face pedagogies are not neatly transferrable. The literature reveals consistent connections between interaction and sense of community. Yet identity, which plausibly and naturally emerges from any social interaction, is much less explored in online learning. While it is widely …


Seeking An Identity: The Portrayal Of Archivists In Film, Anne Daniel, Amanda Oliver Jun 2014

Seeking An Identity: The Portrayal Of Archivists In Film, Anne Daniel, Amanda Oliver

Anne Daniel

The image of archivists in media can sometimes seem nebulous. From descriptions of dusty, unorganized vaults and cardigan-clad gatekeepers, there appears to be many stereotypes perpetuated in media. Building upon previous research in this area, this study aims to investigate how archivists are portrayed in film. Films involving archives and archivists were selected and a content analysis of these films was conducted to address the following questions: is there an archivist in the film and how is the character portrayed? Can specific stereotypes be identified? Do archivists have their own distinct identities in films or is the archivist a non-descript …


Representation In Kenya, Its Diaspora, And Academia: Colonial Legacies In Constructions Of Knowledge About Kenya's Coast, Jesse Benjamin Apr 2014

Representation In Kenya, Its Diaspora, And Academia: Colonial Legacies In Constructions Of Knowledge About Kenya's Coast, Jesse Benjamin

Jesse Benjamin

This paper explores the construction of knowledge in Kenya in the context and aftermath of colonialism and underdevelopment. Those communities that were politically and economically marginalized in Coast Province over the past century were also displaced in terms of academic opportunities, resulting in fewer social science scholars from Mijikenda and other non-Swahili communities in both Kenyan and diaspora universities. Underdevelopment studies in Africa and Kenya are briefly reviewed, and the colonial history of asymmetric social relations at coastal Kenya is traced. Finally, key debates over identity and history are examined within this context and shown to be exacerbated by diasporic …


The Lion & The Ringmaster: Croatia's Accession To The European Union, Jelena Bilandzich Apr 2014

The Lion & The Ringmaster: Croatia's Accession To The European Union, Jelena Bilandzich

Jelena N Bilandzich

July 1, 2013 marked Croatia's official induction into the European Union. For Croatia this was the culmination of a long negotiation process filled with concessions and challenges. This situation inspired the question of how Croatia's alliance with the EU has affected the state? In order to analyze this relationship the aspects of Croatian identity and sovereignty were explored, in addition to the EU's principles and problems regarding member and candidate states. The evidence found within this investigation came from a number of literary sources ranging from the academic to official government documents. Furthermore, nine interviews were conducted within Croatia, which …


I Am What I Am? The Baller Identity Measurement Scale (Bims) With A Division I Football Team In American Higher Education, C. Keith Harrison, Laurel Traynowicz, Scott Bukstein, Ginny Mcpherson-Botts, Suzanne Malia Lawrence Mar 2014

I Am What I Am? The Baller Identity Measurement Scale (Bims) With A Division I Football Team In American Higher Education, C. Keith Harrison, Laurel Traynowicz, Scott Bukstein, Ginny Mcpherson-Botts, Suzanne Malia Lawrence

Scott Bukstein JD

The purpose of this paper is to examine the impact of culture and socio-cultural contexts on academic and athletic motivation of American male college football student-athletes. This study measured perceptions of student-athletes' athletic and academic identities tied to motivation for performance using a culturally relevant assessment tool, the Baller Identity Measurement Scale.


Identity Based Identification From Algebraic Coding Theory, Guomin Yang, Chik How Tan, Yi Mu, Willy Susilo, Duncan S. Wong Mar 2014

Identity Based Identification From Algebraic Coding Theory, Guomin Yang, Chik How Tan, Yi Mu, Willy Susilo, Duncan S. Wong

Professor Willy Susilo

Cryptographic identification schemes allow a remote user to prove his/her identity to a verifier who holds some public information of the user, such as the user public key or identity. Most of the existing cryptographic identification schemes are based on number-theoretic hard problems such as Discrete Log and Factorization. This paper focuses on the design and analysis of identity based identification (IBI) schemes based on algebraic coding theory. We first revisit an existing code-based IBI scheme which is derived by combining the Courtois-Finiasz-Sendrier signature scheme and the Stern zero-knowledge identification scheme. Previous results have shown that this IBI scheme is …


Identity-Based Mediated Rsa Revisited, Ibrahim Elashry, Yi Mu, Willy Susilo Mar 2014

Identity-Based Mediated Rsa Revisited, Ibrahim Elashry, Yi Mu, Willy Susilo

Professor Willy Susilo

In SSYM 2001, Boneh, Ding, Tsudik and Wong presented encryption and signature schemes based on the identity-based mediated RSA (ID-MRSA), in which the users are not allowed to decrypt/sign messages without the permission of a security mediator (the SEM). This allows a simple key revocation. Subsequently, in CT-RSA 2003, Ding and Tsudik presented a security proof for these schemes. In particular, they stated that 'IB-mRSA/OAEP encryption offers equivalent the semantic security to RSA/OAEP against adaptive chosen ciphertext attacks in the random oracle model if the key generation function is division intractable'. To make the key generation function division intractable, Ding …


Identity-Based Multisignature With Message Recovery, Kefeng Wang, Yi Mu, Willy Susilo Mar 2014

Identity-Based Multisignature With Message Recovery, Kefeng Wang, Yi Mu, Willy Susilo

Professor Willy Susilo

We present a new notion of short identity-based multisignature scheme with message recovery. We propose a concrete identity-based multisignature with message recovery scheme based on bilinear pairing in which multiple signers can generate a constant size multisignature on same message regardless of the number of signers. There is no requirement to transmit the original message to the verifier, since the original message can be recovered from the multisignature. Therefore, this scheme minimizes the total length of the original message and the appended multisignature. The proposed scheme is proven to be existentially unforgeable against adaptively chosen message attacks in the random …


People Don't Want To Call It Your Baby: Stigma And Identity In Misscarriage Narratives, Jennifer Fairchild, Arrington M. Dec 2013

People Don't Want To Call It Your Baby: Stigma And Identity In Misscarriage Narratives, Jennifer Fairchild, Arrington M.

Jennifer Fairchild Ph.D.

No abstract provided.


Studying Prenatal Loss From The Inside And The Outside: The Stories We Create Through Shared Lived Experiences, Jennifer Fairchild, Michael Arrington Dec 2013

Studying Prenatal Loss From The Inside And The Outside: The Stories We Create Through Shared Lived Experiences, Jennifer Fairchild, Michael Arrington

Jennifer Fairchild Ph.D.

No abstract provided.