Open Access. Powered by Scholars. Published by Universities.®

Science and Technology Studies Commons

Open Access. Powered by Scholars. Published by Universities.®

Identity

Discipline
Institution
Publication Year
Publication
Publication Type
File Type

Articles 1 - 28 of 28

Full-Text Articles in Science and Technology Studies

¿Quién Soy Yo? [Who Am I?]: Exploring Identity Through Analyzing Afro-Cuban Poetry And Creative Coding In A Post-Secondary Spanish Literature Classroom, F. Megumi Kivuva Jan 2022

¿Quién Soy Yo? [Who Am I?]: Exploring Identity Through Analyzing Afro-Cuban Poetry And Creative Coding In A Post-Secondary Spanish Literature Classroom, F. Megumi Kivuva

Senior Projects Spring 2022

With efforts to broaden participation in computing by integrating CS education into humanities and developing more critical pedagogy, this research focuses on teaching computing in a post-secondary Spanish literature class through analyzing Afro-Cuban poetry. Its goal was to evaluate how participants may use Twine to reflect on Afro-Cuban poetry and their own identities. A group of 5 participants, one professor, and five students, learned how to use Twine to create interactive narratives reflecting on “El apellido,” a poem by Afro-Cuban poet Nicolás Guillén. Through analyzing researcher notes, participants’ projects, post-workshop surveys, and interviews, the research revealed that students were able …


The Giver: Vision & Memory, Alexander J. Dontre Nov 2021

The Giver: Vision & Memory, Alexander J. Dontre

All Faculty and Staff Scholarship

A memory hole is the banishment of problematic thoughts. We exile that which we prefer not to exist. Enter the perilous Memory Hole: The Psychology of Dystopia, to explore a legion of social and psychological themes through the lens of dystopian literature. The crushing fist of 1984 annihilating thoughts from existence as a means of persuasion. The exquisite seduction of addiction as an agent of control in Brave New World. Incineration of the written word to bask in the embers of peace of mind in Fahrenheit 451. Each chapter weaves in and out of the dystopian realms forged …


Making Makers: Tracing Stem Identity In Rural Communities, Jessie Nixon, Andy Stoiber, Erica Halverson, Michael Dando Jun 2021

Making Makers: Tracing Stem Identity In Rural Communities, Jessie Nixon, Andy Stoiber, Erica Halverson, Michael Dando

Journal of Pre-College Engineering Education Research (J-PEER)

In this article, we describe efforts to reduce barriers of entry to pre-college engineering in a rural community by training local teens to become maker-mentors and staff a mobile makerspace in their community. We bring a communities of practice frame to our inquiry, focusing on inbound and peripheral learning and identity trajectories as a mechanism for representing the maker-mentor experience. Through a longitudinal case study, we traced the individual trajectories of five maker-mentors over two years. We found a collection of interrelated factors present in those students who maintained inbound trajectories and those who remained on the periphery. Our research …


From Protecting To Performing Privacy, Garfield Benjamin May 2020

From Protecting To Performing Privacy, Garfield Benjamin

The Journal of Sociotechnical Critique

Privacy is increasingly important in an age of facial recognition technologies, mass data collection, and algorithmic decision-making. Yet it persists as a contested term, a behavioural paradox, and often fails users in practice. This article critiques current methods of thinking privacy in protectionist terms, building on Deleuze's conception of the society of control, through its problematic relation to freedom, property and power. Instead, a new mode of understanding privacy in terms of performativity is provided, drawing on Butler and Sedgwick as well as Cohen and Nissenbaum. This new form of privacy is based on identity, consent and collective action, a …


The Affective Politics Of Twitter, Johnathan C. Flowers May 2019

The Affective Politics Of Twitter, Johnathan C. Flowers

Computer Ethics - Philosophical Enquiry (CEPE) Proceedings

Given the increasing encroachment of Twitter into offline experience, it has become necessary to look beyond the formation of identity in online spaces to the ways in which identities surface through the formation of affective communities organized through the use of technocultural assemblages, or the platforms, algorithms, and digital networks through which affect circulates in an online space. This essay focuses on the microblogging website Twitter as one such technocultural assemblage whose hashtag functionality allows for the circulation of affect among bodies which “surface” within the affective communities organized on Twitter through their alignment with and orientation by hashtags which …


Social Media And Othering: Philosophy, Algorithms, And The Essence Of Being Human, Mark Ehlebracht May 2019

Social Media And Othering: Philosophy, Algorithms, And The Essence Of Being Human, Mark Ehlebracht

Consensus

No abstract provided.


Are You Really Anonymous Online? Your Friends On Twitter May Give You Away, Jessica T. Su Jan 2017

Are You Really Anonymous Online? Your Friends On Twitter May Give You Away, Jessica T. Su

FDLA Journal

As you browse the internet, online advertisers track nearly every site you visit, amassing a trove of information on your habits and preferences. When you visit a news site, they might see you’re a fan of basketball, opera and mystery novels, and accordingly select ads tailored to your tastes.

Advertisers use this information to create highly personalized experiences, but they typically don’t know exactly who you are. They observe only your digital trail, not your identity itself, and so you might feel that you’ve retained a degree of anonymity.


Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving For Cloud Storage, Yong Yu, Man Ho Au, Giuseppe Ateniese, Xinyi Huang, Willy Susilo, Yuanshun Dai, Geyong Min Jan 2017

Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving For Cloud Storage, Yong Yu, Man Ho Au, Giuseppe Ateniese, Xinyi Huang, Willy Susilo, Yuanshun Dai, Geyong Min

Faculty of Engineering and Information Sciences - Papers: Part A

Remote data integrity checking (RDIC) enables a data storage server, say a cloud server, to prove to a verifier that it is actually storing a data owner's data honestly. To date, a number of RDIC protocols have been proposed in the literature. However, most of the constructions suffer from the issue of requiring complex key management. That is, they rely on the expensive public key infrastructure (PKI), which might hinder the deployment of RDIC in practice. In this paper, we propose a new construction of identity-based (ID-based) RDIC protocol by making use of key-homomorphic cryptographic primitive to reduce the system …


Remembering Me: Big Data, Individual Identity, And The Psychological Necessity Of Forgetting, Jacquelyn A. Burkell Mar 2016

Remembering Me: Big Data, Individual Identity, And The Psychological Necessity Of Forgetting, Jacquelyn A. Burkell

FIMS Publications

Each of us has a personal narrative: a story that defines us, and one that we tell about ourselves to our inner and outer worlds. A strong sense of identity is rooted in a personal narrative that has coherence and correspondence (Conway, 2005): coherence in the sense that the story we tell is consistent with and supportive of our current version of ‘self’; and correspondence in the sense that the story reflects the contents of autobiographical memory and the meaning of our experiences. These goals are achieved by a reciprocal interaction of autobiographical memory and the self, in which memories …


Anonymous Identity-Based Broadcast Encryption With Revocation For File Sharing, Jianchang Lai, Yi Mu, Fuchun Guo, Willy Susilo, Rongmao Chen Jan 2016

Anonymous Identity-Based Broadcast Encryption With Revocation For File Sharing, Jianchang Lai, Yi Mu, Fuchun Guo, Willy Susilo, Rongmao Chen

Faculty of Engineering and Information Sciences - Papers: Part A

Traditionally, a ciphertext from an identity-based broadcast encryption can be distributed to a group of receivers whose identities are included in the ciphertext. Once the ciphertext has been created, it is not possible to remove any intended receivers from it without conducting decryption. In this paper, we consider an interesting question: how to remove target designated receivers from a ciphertext generated by an anonymous identity-based broadcast encryption? The solution to this question is found applicable to file sharing with revocation. In this work, we found an affirmative answer to this question. We construct an anonymous identity-based broadcast encryption, which offers …


Sounding Identity: Soundscapes, Music, And Technoculture In The Chinese Diaspora Of Panama, Corey Michael Blake Aug 2015

Sounding Identity: Soundscapes, Music, And Technoculture In The Chinese Diaspora Of Panama, Corey Michael Blake

Masters Theses

Present in Panama since the 19th century, the Chinese diaspora in Panama City, Panama represents an empowered community of individuals who identify as both Chinese and Panamanian. These Chinese Panamanian hybrid identities emerge within sonic environments through an engagement with transnational media and digital technologies, notably within retail stores. Specifically, music surfaces as an especially important sonic marker of the Chinese Panamanian hybridity. Within the mall of the Panamanian Chinatown of El Dorado, an interesting mixture of both Chinese and Latin American popular music genres sounds throughout the various stores. This mixture of music genres demonstrates Chinese Panamanian agency …


Identity Awareness And Re-Use Of Research Data In Veillance And Social Computing, Alexander Hayes, Stephen Mann, Amir Aryani, Susannah Sabine, Leigh Blackall, Pia Waugh, Stephan Ridgway Jun 2015

Identity Awareness And Re-Use Of Research Data In Veillance And Social Computing, Alexander Hayes, Stephen Mann, Amir Aryani, Susannah Sabine, Leigh Blackall, Pia Waugh, Stephan Ridgway

Alexander Hayes Mr.

Identity awareness of research data has been introduced as a requirement for open research, transparency and reusability of research data in the context of eScience. This requirement includes the capability of linking research data to researchers, research projects and publications, and identifying the license for the data. This connectivity between research data and other elements in research ecosystems is required in order to make the data available and reusable beyond the initial research. In this paper, we examine these capabilities in the domains of veillance and social computing. The dataset cases presented in this paper articulate the challenges that researchers …


An Identity-Based Multi-Proxy Multi-Signature Scheme Without Bilinear Pairings And Its Variants, Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh, Willy Susilo Jan 2015

An Identity-Based Multi-Proxy Multi-Signature Scheme Without Bilinear Pairings And Its Variants, Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh, Willy Susilo

Faculty of Engineering and Information Sciences - Papers: Part A

The notions of identity-based multi-proxy signature, proxy multi-signature and multi-proxy multisignature have been proposed to facilitate public key certificate management of these kinds of signatures by merely employing signer’s identities in place of the public keys and their certificates. In the literature, most identity-based multi-proxy signature, proxy multi-signature and multi-proxy multi-signature schemes are based on bilinear pairings. Without incorporating bilinear pairings, Tiwari and Padhye proposed an identity-based proxy multi-signature scheme in 2011. Subsequently, an identity-based multi-proxy multi-signature scheme was proposed byTiwari et al. in 2012. First, we review identity-based (multi)-proxy multi-signature schemes without bilinear pairings and show that unfortunately, they …


Identity-Based Quotable Ring Signature, Kefeng Wang, Yi Mu, Willy Susilo Jan 2015

Identity-Based Quotable Ring Signature, Kefeng Wang, Yi Mu, Willy Susilo

Faculty of Engineering and Information Sciences - Papers: Part A

We present a new notion of identity-based quotable ring signature. This new cryptographic primitive can be used to derive new ring signatures on substrings of an original message from an original ring signature on the original message, which is generated by the actual signer included in the ring. No matter whether a ring signature is originally generated or is quoted from another valid ring signature, it will convince the verifier that it is generated by one of the ring members, without revealing any information about which ring member is the actual signer. The set of ring members could be arbitrarily …


An Efficient Variant Of Boneh-Gentry-Hamburg's Identity-Based Encryption Without Pairing, Ibrahim Elashry, Yi Mu, Willy Susilo Jan 2015

An Efficient Variant Of Boneh-Gentry-Hamburg's Identity-Based Encryption Without Pairing, Ibrahim Elashry, Yi Mu, Willy Susilo

Faculty of Engineering and Information Sciences - Papers: Part A

No abstract provided.


Identity Based Identification From Algebraic Coding Theory, Guomin Yang, Chik How Tan, Yi Mu, Willy Susilo, Duncan S. Wong Mar 2014

Identity Based Identification From Algebraic Coding Theory, Guomin Yang, Chik How Tan, Yi Mu, Willy Susilo, Duncan S. Wong

Professor Willy Susilo

Cryptographic identification schemes allow a remote user to prove his/her identity to a verifier who holds some public information of the user, such as the user public key or identity. Most of the existing cryptographic identification schemes are based on number-theoretic hard problems such as Discrete Log and Factorization. This paper focuses on the design and analysis of identity based identification (IBI) schemes based on algebraic coding theory. We first revisit an existing code-based IBI scheme which is derived by combining the Courtois-Finiasz-Sendrier signature scheme and the Stern zero-knowledge identification scheme. Previous results have shown that this IBI scheme is …


Identity-Based Mediated Rsa Revisited, Ibrahim Elashry, Yi Mu, Willy Susilo Mar 2014

Identity-Based Mediated Rsa Revisited, Ibrahim Elashry, Yi Mu, Willy Susilo

Professor Willy Susilo

In SSYM 2001, Boneh, Ding, Tsudik and Wong presented encryption and signature schemes based on the identity-based mediated RSA (ID-MRSA), in which the users are not allowed to decrypt/sign messages without the permission of a security mediator (the SEM). This allows a simple key revocation. Subsequently, in CT-RSA 2003, Ding and Tsudik presented a security proof for these schemes. In particular, they stated that 'IB-mRSA/OAEP encryption offers equivalent the semantic security to RSA/OAEP against adaptive chosen ciphertext attacks in the random oracle model if the key generation function is division intractable'. To make the key generation function division intractable, Ding …


Identity-Based Multisignature With Message Recovery, Kefeng Wang, Yi Mu, Willy Susilo Mar 2014

Identity-Based Multisignature With Message Recovery, Kefeng Wang, Yi Mu, Willy Susilo

Professor Willy Susilo

We present a new notion of short identity-based multisignature scheme with message recovery. We propose a concrete identity-based multisignature with message recovery scheme based on bilinear pairing in which multiple signers can generate a constant size multisignature on same message regardless of the number of signers. There is no requirement to transmit the original message to the verifier, since the original message can be recovered from the multisignature. Therefore, this scheme minimizes the total length of the original message and the appended multisignature. The proposed scheme is proven to be existentially unforgeable against adaptively chosen message attacks in the random …


Identity-Based Secure Distributed Data Storage Schemes, Jinguang Han, Willy Susilo, Yi Mu Jan 2014

Identity-Based Secure Distributed Data Storage Schemes, Jinguang Han, Willy Susilo, Yi Mu

Faculty of Engineering and Information Sciences - Papers: Part A

Secure distributed data storage can shift the burden of maintaining a large number of files from the owner to proxy servers. Proxy servers can convert encrypted files for the owner to encrypted files for the receiver without the necessity of knowing the content of the original files. In practice, the original files will be removed by the owner for the sake of space efficiency. Hence, the issues on confidentiality and integrity of the outsourced data must be addressed carefully. In this paper, we propose two identity-based secure distributed data storage (IBSDDS) schemes. Our schemes can capture the following properties: (1) …


A Provably Secure Identity-Based Proxy Ring Signature Based On Rsa, Maryam Rjabzadeh Asaar, Mahmoud Salmasizadeh, Willy Susilo Jan 2014

A Provably Secure Identity-Based Proxy Ring Signature Based On Rsa, Maryam Rjabzadeh Asaar, Mahmoud Salmasizadeh, Willy Susilo

Faculty of Engineering and Information Sciences - Papers: Part A

Proxy ring (anonymous proxy) signatures allow an entity to delegate its signing capability to a group of entities (proxy group) such that only one of the members in the proxy group can generate a proxy signature on behalf of the delegator while privacy of the proxy signer is protected. Identity-based versions of proxy ring signatures employ identity strings in place of randomly generated public keys. Our contribution is two-fold. First, we formalize a security model for identity-based proxy ring signatures. We note that there exists no formal security model for identity-based proxy ring signatures prior to our work. Second, we …


Identity-Based Chameleon Hashing And Signatures Without Key Exposure, Xiaofeng Xiaofeng Chen, Fangguo Zhang, Willy Susilo, Haibo Tian, Jin Li, Kwangjo Kim Jan 2014

Identity-Based Chameleon Hashing And Signatures Without Key Exposure, Xiaofeng Xiaofeng Chen, Fangguo Zhang, Willy Susilo, Haibo Tian, Jin Li, Kwangjo Kim

Faculty of Engineering and Information Sciences - Papers: Part A

The notion of chameleon hash function without key exposure plays an important role in designing secure chameleon signatures. However, all of the existing key-exposure free chameleon hash schemes are presented in the setting of certificate-based systems. In 2004, Ateniese and de Medeiros questioned whether there is an efficient construction for identity-based chameleon hashing without key exposure. In this paper, we propose the first identity-based chameleon hash scheme without key exposure based on the three-trapdoor mechanism, which provides an affirmative answer to the open problem. Moreover, we use the proposed chameleon hash scheme to design an identity-based chameleon signature scheme, which …


Identity Based Identification From Algebraic Coding Theory, Guomin Yang, Chik How Tan, Yi Mu, Willy Susilo, Duncan S. Wong Jan 2014

Identity Based Identification From Algebraic Coding Theory, Guomin Yang, Chik How Tan, Yi Mu, Willy Susilo, Duncan S. Wong

Faculty of Engineering and Information Sciences - Papers: Part A

Cryptographic identification schemes allow a remote user to prove his/her identity to a verifier who holds some public information of the user, such as the user public key or identity. Most of the existing cryptographic identification schemes are based on number-theoretic hard problems such as Discrete Log and Factorization. This paper focuses on the design and analysis of identity based identification (IBI) schemes based on algebraic coding theory. We first revisit an existing code-based IBI scheme which is derived by combining the Courtois-Finiasz-Sendrier signature scheme and the Stern zero-knowledge identification scheme. Previous results have shown that this IBI scheme is …


Identity-Based Multisignature With Message Recovery, Kefeng Wang, Yi Mu, Willy Susilo Jan 2013

Identity-Based Multisignature With Message Recovery, Kefeng Wang, Yi Mu, Willy Susilo

Faculty of Engineering and Information Sciences - Papers: Part A

We present a new notion of short identity-based multisignature scheme with message recovery. We propose a concrete identity-based multisignature with message recovery scheme based on bilinear pairing in which multiple signers can generate a constant size multisignature on same message regardless of the number of signers. There is no requirement to transmit the original message to the verifier, since the original message can be recovered from the multisignature. Therefore, this scheme minimizes the total length of the original message and the appended multisignature. The proposed scheme is proven to be existentially unforgeable against adaptively chosen message attacks in the random …


Identity-Based Mediated Rsa Revisited, Ibrahim Elashry, Yi Mu, Willy Susilo Jan 2013

Identity-Based Mediated Rsa Revisited, Ibrahim Elashry, Yi Mu, Willy Susilo

Faculty of Engineering and Information Sciences - Papers: Part A

In SSYM 2001, Boneh, Ding, Tsudik and Wong presented encryption and signature schemes based on the identity-based mediated RSA (ID-MRSA), in which the users are not allowed to decrypt/sign messages without the permission of a security mediator (the SEM). This allows a simple key revocation. Subsequently, in CT-RSA 2003, Ding and Tsudik presented a security proof for these schemes. In particular, they stated that 'IB-mRSA/OAEP encryption offers equivalent the semantic security to RSA/OAEP against adaptive chosen ciphertext attacks in the random oracle model if the key generation function is division intractable'. To make the key generation function division intractable, Ding …


Efficient And Dynamic Key Management For Multiple Identities In Identity-Based Systems, Hua Guo, Chang Xu, Zhoujun Li, Yanqing Yao, Yi Mu Jan 2013

Efficient And Dynamic Key Management For Multiple Identities In Identity-Based Systems, Hua Guo, Chang Xu, Zhoujun Li, Yanqing Yao, Yi Mu

Faculty of Engineering and Information Sciences - Papers: Part A

The traditional identity-based cryptography requires a user, who holds multiple identities, to hold multiple private keys, where each private key is associated with an identity. Managing multiple private/public keys is a heavy burden to a user due to key management and storage. The recent advancement of identity-based cryptography allow a single private key to map multiple public keys (identities); therefore the private key management is simplified. Unfortunately, the existing schemes capturing this feature do not allow dynamic changes of identities and have a large data size proportional to the number of the associated identities. To overcome these problems, in this …


Ethics In Engineering: Student Perceptions And Their Professional Identity Development, Brad Stappenbelt Jan 2012

Ethics In Engineering: Student Perceptions And Their Professional Identity Development, Brad Stappenbelt

Faculty of Engineering and Information Sciences - Papers: Part A

Professional ethics instruction in engineering is commonly conducted by examining case studies in light of the code of conduct of a suitable professional body. Although graphical presentations of spectacular failures, sobering stories of the repercussions and the solid framework provided by the tenets of a code of ethics may leave a lasting impression, students generally gain their professional identity from relatives and colleagues. Their professional ethics tend to be mostly an extension of their personal ethics. Instruction on ethics generally serves only to reinforce students' inclination to act ethically and provides encouragement to act on these beliefs. In this study …


Physical Activity Data Use By Technoathletes: Examples Of Collection, Inscription, And Identification, Victor R. Lee, Joel Drake Jan 2012

Physical Activity Data Use By Technoathletes: Examples Of Collection, Inscription, And Identification, Victor R. Lee, Joel Drake

Instructional Technology and Learning Sciences Faculty Publications

The proliferation of physical activity data monitoring devices had led to an increase in technoathletes—individuals who combine athletic training and performance with the collection and evaluation of personally-relevant data in an effort to better understand their own abilities. We interviewed 20 technoathletes who were actively involved within either cycling or running communities. Qualitative vignettes of technoathletic engagement with data and the practice of data logging, in specific, are discussed and illustrated. Individual relationships that technoathletes have with their data are also examined. Through the examples, we highlight some commonalities in the data that were obtained and how various athletes …


Adolescent Use Of Social Networking Sites And Internet Safety, Mary Kate Whitcomb Mar 2011

Adolescent Use Of Social Networking Sites And Internet Safety, Mary Kate Whitcomb

Psychology and Child Development

The use of computers and the Internet continue to increase, especially by children and adolescents. Approximately 40% of adolescents access social networking sites in a typical day and spend on average 54 minutes on the sites (Rideout, Foehr, & Roberts, 2010). Social networking sites, such as Facebook, allow users to provide personal information, continually update information, post images, and communicate with friends. Due to an increase in availability, media has become greatly related to the socialization of adolescents. Identity formation is a major component of adolescence and social networking sites are a realm in which adolescents can explore and express …