Current Search: authenticity (x)
View All Items
- Title
- ALCOHOLISM, A.A., AND THE CHALLENGE OF AUTHENTICITY.
- Creator
-
Madden, Patricia, Jones, Donald, University of Central Florida
- Abstract / Description
-
This thesis examines the possibilities of living an authentic life for an alcoholic, both in and out of Alcoholics Anonymous. Authenticity is explored using the existential models put forth by Jean-Paul Sartre and Soren Kierkegaard. Alcoholics Anonymous figures prominently in this analysis. It is suggested that A.A. acts inauthentically in its claims that it is not a religious organization. A.A. creates special problems for female alcoholics because of the sexist and masculinist nature of its...
Show moreThis thesis examines the possibilities of living an authentic life for an alcoholic, both in and out of Alcoholics Anonymous. Authenticity is explored using the existential models put forth by Jean-Paul Sartre and Soren Kierkegaard. Alcoholics Anonymous figures prominently in this analysis. It is suggested that A.A. acts inauthentically in its claims that it is not a religious organization. A.A. creates special problems for female alcoholics because of the sexist and masculinist nature of its primary literature. While A.A. claims that its message is the only way by which an alcoholic can recover, other treatment methods exist. Suggestions are made that A.A. revise its main texts, and two alternative organizations to A.A. are briefly discussed.
Show less - Date Issued
- 2005
- Identifier
- CFE0000374, ucf:46329
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0000374
- Title
- VOICE AUTHENTICATIONA STUDY OF POLYNOMIAL REPRESENTATION OF SPEECH SIGNALS.
- Creator
-
Strange, John, Mohapatra, Ram, University of Central Florida
- Abstract / Description
-
A subset of speech recognition is the use of speech recognition techniques for voice authentication. Voice authentication is an alternative security application to the other biometric security measures such as the use of fingerprints or iris scans. Voice authentication has advantages over the other biometric measures in that it can be utilized remotely, via a device like a telephone. However, voice authentication has disadvantages in that the authentication system typically requires a large...
Show moreA subset of speech recognition is the use of speech recognition techniques for voice authentication. Voice authentication is an alternative security application to the other biometric security measures such as the use of fingerprints or iris scans. Voice authentication has advantages over the other biometric measures in that it can be utilized remotely, via a device like a telephone. However, voice authentication has disadvantages in that the authentication system typically requires a large memory and processing time than do fingerprint or iris scanning systems. Also, voice authentication research has yet to provide an authentication system as reliable as the other biometric measures. Most voice recognition systems use Hidden Markov Models (HMMs) as their basic probabilistic framework. Also, most voice recognition systems use a frame based approach to analyze the voice features. An example of research which has been shown to provide more accurate results is the use of a segment based model. The HMMs impose a requirement that each frame has conditional independence from the next. However, at a fixed frame rate, typically 10 ms., the adjacent feature vectors might span the same phonetic segment and often exhibit smooth dynamics and are highly correlated. The relationship between features of different phonetic segments is much weaker. Therefore, the segment based approach makes fewer conditional independence assumptions which are also violated to a lesser degree than for the frame based approach. Thus, the HMMs using segmental based approaches are more accurate. The speech polynomials (feature vectors) used in the segmental model have been shown to be Chebychev polynomials. Use of the properties of these polynomials has made it possible to reduce the computation time for speech recognition systems. Also, representing the spoken word waveform as a Chebychev polynomial allows for the recognition system to easily extract useful and repeatable features from the waveform allowing for a more accurate identification of the speaker. This thesis describes the segmental approach to speech recognition and addresses in detail the use of Chebychev polynomials in the representation of spoken words, specifically in the area of speaker recognition. .
Show less - Date Issued
- 2005
- Identifier
- CFE0000366, ucf:46340
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0000366
- Title
- ANALYZING CHILDREN'S LITERATURE AWARDS, LITERARY CRITERIA, AND DISTRICT DEMOGRAPHICS TO CREATE A DIVERSE AND INCLUSIVE ELEMENTARY SCHOOL CLASSROOM LIBRARY.
- Creator
-
Lavallee, Casey L, Trimble Spalding, Lee-Anne, University of Central Florida
- Abstract / Description
-
Future elementary school teachers are tasked with the responsibility to ensure that the children in their classrooms have access to high quality books every day. This can be accomplished by building classroom libraries with titles that are not only of high literary quality but are also inclusive of the students in the classroom as well as the people these children will encounter outside of the classroom. Children should be able to see themselves represented in the literature they read, and...
Show moreFuture elementary school teachers are tasked with the responsibility to ensure that the children in their classrooms have access to high quality books every day. This can be accomplished by building classroom libraries with titles that are not only of high literary quality but are also inclusive of the students in the classroom as well as the people these children will encounter outside of the classroom. Children should be able to see themselves represented in the literature they read, and they should also be able to develop empathy for people who are different than they are. Diverse literature can have a huge impact on children and their outlook on themselves and the world. Because of the importance of quality diverse books for young children, this thesis outlines the resources, such as the plethora of children's literature awards for diverse books, that are available to teachers. It also includes a checklist for teachers to follow as they build their classroom libraries. This checklist helps teachers ensure that the books they choose meet the needs of the diverse population in their class. Once teachers know the resources available to them, they have a checklist that they can follow to build or evaluate their library, and they are aware of the diverse populations represented in their districts, schools, and classes, they are able to create an inclusive and impactful collection of books for their students.
Show less - Date Issued
- 2018
- Identifier
- CFH2000426, ucf:45813
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFH2000426
- Title
- EXTENDING DISTRIBUTED TEMPORAL PROTOCOL LOGIC TO A PROOF BASED FRAMEWORK FOR AUTHENTICATION PROTOCOLS.
- Creator
-
Muhammad, Shahabuddin, Guha, Ratan, University of Central Florida
- Abstract / Description
-
Running critical applications, such as e-commerce, in a distributed environment requires assurance of the identities of the participants communicating with each other. Providing such assurance in a distributed environment is a difficult task. The goal of a security protocol is to overcome the vulnerabilities of a distributed environment by providing a secure way to disseminate critical information into the network. However, designing a security protocol is itself an error-prone process. In...
Show moreRunning critical applications, such as e-commerce, in a distributed environment requires assurance of the identities of the participants communicating with each other. Providing such assurance in a distributed environment is a difficult task. The goal of a security protocol is to overcome the vulnerabilities of a distributed environment by providing a secure way to disseminate critical information into the network. However, designing a security protocol is itself an error-prone process. In addition to employing an authentication protocol, one also needs to make sure that the protocol successfully achieves its authentication goals. The Distributed Temporal Protocol Logic (DTPL) provides a language for formalizing both local and global properties of distributed communicating processes. The DTPL can be effectively applied to security protocol analysis as a model checker. Although, a model checker can determine flaws in a security protocol, it can not provide proof of the security properties of a protocol. In this research, we extend the DTPL language and construct a set of axioms by transforming the unified framework of SVO logic into DTPL. This results into a deductive style proof-based framework for the verification of authentication protocols. The proposed framework represents authentication protocols and concisely proves their security properties. We formalize various features essential for achieving authentication, such as message freshness, key association, and source association in our framework. Since analyzing security protocols greatly depends upon associating a received message to its source, we separately analyze the source association axioms, translate them into our framework, and extend the idea for public-key protocols. Developing a proof-based framework in temporal logic gives us another verification tool in addition to the existing model checker. A security property of a protocol can either be verified using our approach, or a design flaw can be identified using the model checker. In this way, we can analyze a security protocol from both perspectives while benefiting from the representation of distributed temporal protocol logic. A challenge-response strategy provides a higher level of abstraction for authentication protocols. Here, we also develop a set of formulae using the challenge-response strategy to analyze a protocol at an abstract level. This abstraction has been adapted from the authentication tests of the graph-theoretic approach of strand space method. First, we represent a protocol in logic and then use the challenge-response strategy to develop authentication tests. These tests help us find the possibility of attacks on authentication protocols by investigating the originator of its received messages. Identifying the unintended originator of a received message indicates the existence of possible flaws in a protocol. We have applied our strategy on several well-known protocols and have successfully identified the attacks.
Show less - Date Issued
- 2007
- Identifier
- CFE0001799, ucf:47281
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0001799
- Title
- NAVIGATING AUTHENTICITY IN THE AGE OF THE INTERNET: A PHENOMENOLOGICAL EXPLORATION OF THE EXISTENTIAL EFFECTS OF SOCIAL MEDIA.
- Creator
-
Zimmerman, Douglas, Strawser, Michael, University of Central Florida
- Abstract / Description
-
Our world is a world of technology, and technology is part of what has made human beings so adept at survival. Yet, the 21st century has seen a new type of technology that is unlike anything ever seen before. This new information technology is known as social media (including such things as Facebook, Twitter, MySpace, etc.), and it has the power to influence our very being. However, we are seemingly uncritical and unconcerned about social media in relation to society. This project attempts to...
Show moreOur world is a world of technology, and technology is part of what has made human beings so adept at survival. Yet, the 21st century has seen a new type of technology that is unlike anything ever seen before. This new information technology is known as social media (including such things as Facebook, Twitter, MySpace, etc.), and it has the power to influence our very being. However, we are seemingly uncritical and unconcerned about social media in relation to society. This project attempts to analyze social media and its relationship to human beings from an ontological standpoint. I do so by exploring both the ontic and the ontological aspects of social media. In order to do so, I use a method of hermeneutical inquiry and phenomenological exploration. By using the works of several different thinkers, I attempt to get at the essence of the relationship between humans and social media. First, using the works of Martin Heidegger, I argue that there is an ethical dimension contained within the concept of authenticity. Then, using the works of psychologists, phenomenologists, and cognitive scientists, I show that social media has just as much control over us as we think we have over it. Lastly, I return to Heidegger's work in order to understand what the very essence of social media is, and I then explain what our relationship to social media ought to be in order to live authentically. In doing so, I attempt to explain how we can gain a free relation to social media in order to establish the ways in which it can be most helpful to us.
Show less - Date Issued
- 2012
- Identifier
- CFH0004303, ucf:45047
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFH0004303
- Title
- Raising Roma Voices: An Insider Examination of American Roma Realities, Resistance, and Revaluation.
- Creator
-
Deaton, Sabrina, Grauerholz, Liz, Koontz, Amanda, Rivera, Fernando, Hancock, Ian, Santana, Maria, University of Central Florida
- Abstract / Description
-
A vast scholarship has been dedicated to examining the discrimination racial and ethnic minorities endure in the United States. Research has also shown racial and ethnic minorities work to resist discrimination via various social processes. One ethnic minority group absent from the literature is the American Roma, more commonly known as Gypsies. Therefore, this study aimed to gain insights into the situation of the American Roma, including the discrimination they endure and the resistance...
Show moreA vast scholarship has been dedicated to examining the discrimination racial and ethnic minorities endure in the United States. Research has also shown racial and ethnic minorities work to resist discrimination via various social processes. One ethnic minority group absent from the literature is the American Roma, more commonly known as Gypsies. Therefore, this study aimed to gain insights into the situation of the American Roma, including the discrimination they endure and the resistance tactics they employ. In-depth semi-structured interviews were conducted with 31 native-born American Roma adults during the course of this insider study. Participants reported experiencing discrimination in schools, employment, and the criminal justice system, similar to other racialized minorities. Findings also show members of the American Roma population invoke authenticity work, passing, and moral boundaries to resist discrimination and ethno-religious efforts to combat internal issues such as Romani language attrition and illiteracy.
Show less - Date Issued
- 2019
- Identifier
- CFE0007835, ucf:52833
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0007835
- Title
- DEVELOPING STRAND SPACE BASED MODELS AND PROVING THE CORRECTNESS OF THE IEEE 802.11I AUTHENTICATION PROTOCOL WITH RESTRICTED SECURITY OBJECTIVES.
- Creator
-
Furqan, Zeeshan, Guha, Ratan, University of Central Florida
- Abstract / Description
-
The security objectives enforce the security policy, which defines what is to be protected in a network environment. The violation of these security objectives induces security threats. We introduce an explicit notion of security objectives for a security protocol. This notion should precede the formal verification process. In the absence of such a notion, the security protocol may be proven correct despite the fact that it is not equipped to defend against all potential threats. In order to...
Show moreThe security objectives enforce the security policy, which defines what is to be protected in a network environment. The violation of these security objectives induces security threats. We introduce an explicit notion of security objectives for a security protocol. This notion should precede the formal verification process. In the absence of such a notion, the security protocol may be proven correct despite the fact that it is not equipped to defend against all potential threats. In order to establish the correctness of security objectives, we present a formal model that provides basis for the formal verification of security protocols. We also develop the modal logic, proof based, and multi-agent approaches using the Strand Space framework. In our modal logic approach, we present the logical constructs to model a protocol's behavior in such a way that the participants can verify different security parameters by looking at their own run of the protocol. In our proof based model, we present a generic set of proofs to establish the correctness of a security protocol. We model the 802.11i protocol into our proof based system and then perform the formal verification of the authentication property. The intruder in our model is imbued with powerful capabilities and repercussions to possible attacks are evaluated. Our analysis proves that the authentication of 802.11i is not compromised in the presented model. We further demonstrate how changes in our model will yield a successful man-in-the-middle attack. Our multi-agent approach includes an explicit notion of multi-agent, which was missing in the Strand Space framework. The limitation of Strand Space framework is the assumption that all the information available to a principal is either supplied initially or is contained in messages received by that principal. However, other important information may also be available to a principal in a security setting, such as a principal may combine information from different roles played by him in a protocol to launch a powerful attack. Our presented approach models the behavior of a distributed system as a multi-agent system. The presented model captures the combined information, the formal model of knowledge, and the belief of agents over time. After building this formal model, we present a formal proof of authentication of the 4-way handshake of the 802.11i protocol.
Show less - Date Issued
- 2007
- Identifier
- CFE0001801, ucf:47380
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0001801
- Title
- A BLUEPRINT FOR PLANNING AND DESIGNING STAGED-AUTHENTIC HERITAGE ATTRACTIONS IN SMALL ISLAND NATIONS.
- Creator
-
Lasten, Earney, Pizam, Abraham, University of Central Florida
- Abstract / Description
-
The purpose of this largely qualitative study was to develop a blueprint for planning and designing a staged-authentic heritage tourist attraction for small island nations. Data were gathered and analyzed in three phases. In Phase I, existing and potential supply, demand, and external variables associated with staged-authentic heritage attractions were identified, and a preliminary planning model and conceptual framework was developed. In Phase II, the model was refined. A blueprint...
Show moreThe purpose of this largely qualitative study was to develop a blueprint for planning and designing a staged-authentic heritage tourist attraction for small island nations. Data were gathered and analyzed in three phases. In Phase I, existing and potential supply, demand, and external variables associated with staged-authentic heritage attractions were identified, and a preliminary planning model and conceptual framework was developed. In Phase II, the model was refined. A blueprint containing seven major questions and 26 sequential steps was developed. In Phase III, the blueprint was tested using focus groups and an online tourist survey in the Caribbean region (Aruba) in order to determine the extent to which it could be useful to those responsible for the development of staged-authentic heritage tourist attractions. It was concluded that (a) the devised blueprint is appropriate and effective for planning and designing a staged-authentic heritage attraction for small island nations, (b) the seven questions and 26 steps developed to support the methodological flowchart ensure attention to essential activities and events in the planning and designing of a staged-authentic heritage attraction, and (c) continuous collaboration among all stakeholders is required in planning and designing staged-authentic heritage attractions so as to ensure commitment of those who would be contributors, supporters, and developers of the project. Implications for the use of the blueprint and for staged-authentic heritage attractions were offered. Also presented were recommendations for future research.
Show less - Date Issued
- 2010
- Identifier
- CFE0003450, ucf:48406
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0003450
- Title
- MINDFULNESS AND AUTHENTIC CREATIVITY: DEVELOPING A HEALTHY LIFESTYLE.
- Creator
-
Cockrell, Brittany, Congdon, Kristin, University of Central Florida
- Abstract / Description
-
The contemporary society of the United States of America is becoming an increasingly stressful environment to live in. Our rapid advances and developments in virtual, electronic, and high-speed technology have led us to a lifestyle that operates more quickly. However, our attachment to such a face-paced lifestyle has unfortunately led us towards an increasingly stressful lifestyle. This research focuses on identifying our current society's perceptual outlook and illustrating how the practice...
Show moreThe contemporary society of the United States of America is becoming an increasingly stressful environment to live in. Our rapid advances and developments in virtual, electronic, and high-speed technology have led us to a lifestyle that operates more quickly. However, our attachment to such a face-paced lifestyle has unfortunately led us towards an increasingly stressful lifestyle. This research focuses on identifying our current society's perceptual outlook and illustrating how the practice of mindfulness can help reduce the anxieties, struggles, and mental flaws which cloud our perception. The intent of this thesis is to show how the practice of mindfulness is beneficial towards our mental health. The practice of mindfulness originated within the Buddhist tradition and has evolved into a new area of interest in the fields of mental health, psychology, philosophy, and humanities. Also, the connection between the practice of mindfulness, and the practice of authentic creativity, as demonstrated in playing the piano, is illuminated within this research. Authentic creativity thus serves as an enlightening metaphor for the elusive practice of mindfulness, and creates a more vivid understanding of the concept of mindfulness. For this thesis I have conducted a literature review in the areas of philosophy, religion, aesthetics and cognitive science. Also, I am actively participating in my research by personally practicing mindfulness and piano. Part of my methodology involves critical thinking on the personal level as I am writing journal entries about my views and thoughts concerning these processes.
Show less - Date Issued
- 2011
- Identifier
- CFH0003842, ucf:44698
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFH0003842
- Title
- Nike(&)#191;s Corporate Social Advocacy (CSA) Practices as Related to Strategic Issues Management (SIM) and Threats to Organizational Legitimacy.
- Creator
-
Heffron, Eve, Dodd, Melissa, Spence, Patric, Yu, Nan, University of Central Florida
- Abstract / Description
-
This research examined how corporate social advocacy (CSA) and corporate social responsibility (CSR) efforts impacted perceptions of authenticity. Using an experimental survey, participants were randomly exposed to Nike's actions related to the Black Lives Matter (BLM) movement via mock-online news articles. Participants completed a survey that contained Likert-type scale items regarding attitudes (perceived corporate intent, perceived authenticity, brand trust, and brand credibility) and...
Show moreThis research examined how corporate social advocacy (CSA) and corporate social responsibility (CSR) efforts impacted perceptions of authenticity. Using an experimental survey, participants were randomly exposed to Nike's actions related to the Black Lives Matter (BLM) movement via mock-online news articles. Participants completed a survey that contained Likert-type scale items regarding attitudes (perceived corporate intent, perceived authenticity, brand trust, and brand credibility) and behavioral intentions (word of mouth intentions (WOM), and purchase intention (PI)). Results indicated that positive attitudes significantly increased when Nike implemented an action step after taking a public stance on a controversial social-political issue. Further, results revealed significant differences for positive WOM intentions and PI, given the experimental prompt. This study extends public relations scholarship through expanding our understanding of stakeholder perceptions of authenticity when companies engage in CSA and CSR practices. To earn legitimacy, companies must meet stakeholder expectations through successfully executing socially responsible actions. This study illustrates a need for future research on stakeholder perceptions of authenticity when various action steps are added to a company stance on divisive social-political issues.
Show less - Date Issued
- 2019
- Identifier
- CFE0007650, ucf:52461
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0007650
- Title
- IMPROVED INTERNET SECURITY PROTOCOLS USING CRYPTOGRAPHIC ONE-WAY HASH CHAINS.
- Creator
-
Alabrah, Amerah, Bassiouni, Mostafa, Zou, Changchun, Lang, Sheau-Dong, Bai, Yuanli, University of Central Florida
- Abstract / Description
-
In this dissertation, new approaches that utilize the one-way cryptographic hash functions in designing improved network security protocols are investigated. The proposed approaches are designed to be scalable and easy to implement in modern technology.The first contribution explores session cookies with emphasis on the threat of session hijacking attacks resulting from session cookie theft or sniffing. In the proposed scheme, these cookies are replaced by easily computed authentication...
Show moreIn this dissertation, new approaches that utilize the one-way cryptographic hash functions in designing improved network security protocols are investigated. The proposed approaches are designed to be scalable and easy to implement in modern technology.The first contribution explores session cookies with emphasis on the threat of session hijacking attacks resulting from session cookie theft or sniffing. In the proposed scheme, these cookies are replaced by easily computed authentication credentials using Lamport's well-known one-time passwords. The basic idea in this scheme revolves around utilizing sparse caching units, where authentication credentials pertaining to cookies are stored and fetched once needed, thereby, mitigating computational overhead generally associated with one-way hash constructions.The second and third proposed schemes rely on dividing the one-way hash construction into a hierarchical two-tier construction. Each tier component is responsible for some aspect of authentication generated by using two different hash functions. By utilizing different cryptographic hash functions arranged in two tiers, the hierarchical two-tier protocol (our second contribution) gives significant performance improvement over previously proposed solutions for securing Internet cookies. Through indexing authentication credentials by their position within the hash chain in a multi-dimensional chain, the third contribution achieves improved performance.In the fourth proposed scheme, an attempt is made to apply the one-way hash construction to achieve user and broadcast authentication in wireless sensor networks. Due to known energy and memory constraints, the one-way hash scheme is modified to mitigate computational overhead so it can be easily applied in this particular setting.The fifth scheme tries to reap the benefits of the sparse cache-supported scheme and the hierarchical scheme. The resulting hybrid approach achieves efficient performance at the lowest cost of caching possible.In the sixth proposal, an authentication scheme tailored for the multi-server single sign-on (SSO) environment is presented. The scheme utilizes the one-way hash construction in a Merkle Hash Tree and a hash calendar to avoid impersonation and session hijacking attacks. The scheme also explores the optimal configuration of the one-way hash chain in this particular environment.All the proposed protocols are validated by extensive experimental analyses. These analyses are obtained by running simulations depicting the many scenarios envisioned. Additionally, these simulations are supported by relevant analytical models derived by mathematical formulas taking into consideration the environment under investigation.
Show less - Date Issued
- 2014
- Identifier
- CFE0005453, ucf:50392
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0005453