• Title/Summary/Keyword: Identity and the Other

Search Result 1,451, Processing Time 0.031 seconds

Factors associated with Postpartum Depression and Its Influence on Maternal Identity (산후우울의 영향요인과 모성 정체성과의 관련성)

  • Jung, Yoen Yi;Kim, Hae Won
    • Women's Health Nursing
    • /
    • v.20 no.1
    • /
    • pp.29-37
    • /
    • 2014
  • Purpose: This study aimed to examine the factors associated with postpartum depression and its influence on maternal identity of postpartum women. Methods: Research design was a cross sectional descriptive study with a total of 89 women within the six month postpartum period. Associations of eating habits, overall sleep quality and other factors with postpartum depression utilizing the Korean Beck Depression Inventory (K-BDI) were done. The influence of postpartum depression on maternal identity was analyzed. Variables yielding significant associations (p<.05) were included in an adjusted logistic regression and a stepwise multiple regression. Results: Mean scores of postpartum depression was $9.42{\pm}6.08$ and 31.5% (n=28) for mild depression, 11.2% (n=10) was moderate and 4.5% (n=4) was severe depression on the K-BDI scale. Perceived health status and overall sleep quality were predictors of postpartum depression. Postpartum depression and the husband's love were predictors of maternal identity. Conclusion: Awareness of poor health perception and sleep quality will be helpful to detect for postpartum depression. Strategies to increase maternal identity during the postpartum period would be tailored by level of depression.

A Traumatic Face of Colonial Hawai'i: The 1998 Asian American Event and Lois-Ann Yamanaka's Blu's Hanging

  • Kim, Chang-Hee
    • Journal of English Language & Literature
    • /
    • v.56 no.6
    • /
    • pp.1311-1337
    • /
    • 2010
  • This paper deals with one of the hottest debates in the history of the Association for Asian American Studies (AAAS) since its inception in the late 1960s. In 1998 at Hawai'i, the AAAS awarded Lois-Ann Yamanaka its Fiction Award for her novel Blu's Hanging, only to have this award protested. The point at issue was the inappropriate representation of Filipino American characters called "Human Rats" in the novel. This event divided the association into two groups: one criticizing the novel for the problematic portrayal of Filipinos in colonial Hawai'i, and the other defending it from the criticism in the name of aesthetic freedom. Such a "crisis of representation" in Asian American identity reflects on the ways in which local Hawaiians are positioned in the complicate power dynamic between oppositional Hawaiian identity and cosmopolitan diasporic identity within the larger framework of Asian American pan-ethnic identity. The controversial event triggered the eruption of Asian Americans' anxiety over the identity-bounded nation of Asian America where intra-racial classism and conflict have been at play, which are primary themes of Blu's Hanging. This paper shows how Yamanaka's Blu's Hanging becomes so disturbing a work to prevent the hegemonic formality of Asian America identity from being fully dogmatic. Ultimately, it contradicts the political unconscious of the reading public and unmasked its false consciousness by engendering a "free subjective intervention" in the ideological reality of colonial Hawai'i.

Fuzzy identity-based signature scheme from lattice and its application in biometric authentication

  • Zhang, Xiaojun;Xu, Chunxiang;Zhang, Yuan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.5
    • /
    • pp.2762-2777
    • /
    • 2017
  • A fuzzy identity based signature (FIBS) scheme allows a signer with identity ${\omega}$ to generate a signature which could be verified under identity ${\omega}^{\prime}$ if and only if ${\omega}$ and ${\omega}^{\prime}$ are within a certain distance of each other as judged by some metric. In this paper, we propose an efficient FIBS scheme from lattice assumption, which can resist quantum-computer attacks. Without using the Bonsai Tree technique, we utilize the lattice basis delegation technique to generate the private key, which has the advantage of keeping the lattice dimension invariant. We also prove that our proposed scheme is existentially unforgeable under an adaptive chosen message and identity attack in the random oracle model. Compared with existing scheme, our proposed scheme is much more efficient, especially in terms of communication overhead. Since our FIBS scheme possesses similar error-tolerance property, it can be well applied in post-quantum communication biometric authentication environments, where biometric identifiers such as fingerprints, voice, iris and gait are used in human identification.

A Study of the Relationships between Ego Identity, Self-perceptions of Dressing Competence and Dressing Conformity (자아정체감과 외모를 통한 자기개념 및 개성에 관한 의복 심리학적 연구)

  • Shin Ok Shoon;Seu Bong Yeun;Lee Shoon Won
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.2 no.2
    • /
    • pp.217-225
    • /
    • 1978
  • This study investigated the relationship between ego identity within the framework of Erikson's psychosocial theory of ego development and self-perceptions of dressing competence and dressing conformity. The following problems have been investigated in this study. 1. The relationship between ego identity and self-perceptions of dressing competence. 2. The relationships between the subcategories of identity levels and self-perceptions of dressing competence. 3. The relationship between ego identity and self-perceptions of dressing conformity. Data were obtained from 242 freshman and 156 senior college students, who each received an ego identity scale and self-perceptions of dressing competence and dressing conformity scale. The statistical analyses of the obtained data included calculation of the Chi-Square ($X^2$) and Means (M). This study's finding were as follows; 1. A significant positive relationship was found between ego identity level and self-perceptions of dressing competence. 2. Significant relationships were found between most of the subcategories of ego identity level and self-perceptions of dressing competence, the exceptions being stability, uniqueness, sense of self. 3. Significant relationships were not found between ego identity and self-perceptions of dressing conformity but were found to be significantly related uniqueness and self assertiveness on one hand were found to be significantly related to self-perceptions of dressing individuality and stability on the other hand to self-perceptions of dressing conformity.

  • PDF

Relationship between Urban Identity and Time and Space - Focusing on , Zhang Lu's Film (도시 정체성과 시공간 구조의 관계 -장률(張律)의 영화 <군산: 거위를 노래하다>를 중심으로)

  • Cho, Myung-Ki
    • Journal of Popular Narrative
    • /
    • v.27 no.3
    • /
    • pp.151-191
    • /
    • 2021
  • This paper examines what is the content of Gusan's urban identity, represented by the film and how the contents and aspects of this city's identity interact with the structure of the films' discourse. weaves Gunsan and Seoul into continuously reorganized cities based on an interactive relation, rather than literal ones. Seoul in which the time for a film narrative is closed is converted into the starting point for tour to Gunsan. The both points in which audiences' ex post return occurs are the starting point for the time for the film discourse and the other point in which the title is suggested. The journey-type of the narrative structure in this film is a3-dimensional spiral-shaped, rather than a 2-dimensional circular regression. embodies the characteristics and the identity and apriority of two cities, based on such a spiral-shaped temporal and spatial structure. Seoul severs the relation between grand narrative/collective memory and small narrative/individual memory as an agnostic one, in other words, it is a city that cuts off cities, relations and memory and rejects the continuity of memory. On the other hand, Gunsan is a city in which both grand and small narrative and collective and individual memory coexist and both split and isolated mind are cured and mutually consoled. It describes Gunsan as the surplus space as a being for others, while expressing its identity as robust and literal thing. The film describes it as the field in which oppositional concepts such as historical interruption and continuity and spatial being for others and originality become 3-dimensional spiral ones, through the reciprocity between the narrative and the discourse structure. This paper has an implication, in that it examines how temporal and spatial relationship constituting the urban identity interacts with the structure of the film narrative.

Does Apparel Purchase Involve Joint Purchase Decision-Making? -Interpersonal Influences between Spouse or Significant Others-

  • Kang, Joohee;Lee, Yoon-Jung
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.39 no.6
    • /
    • pp.799-811
    • /
    • 2015
  • This study examined factors that influenced susceptibility to dyadic influences between opposite-gender couples on making apparel purchase decisions. This study focused on main effects of couple identity, product knowledge, clothing involvement and gender, and the interaction effects of gender with other factors for normative and informational influences. A survey was conducted on 155 males and 166 females currently married or in a relationship between the ages of 20 and 50 living in South Korea. For normative influence, the main effects of joint couple identity and clothing involvement (fashion interest, symbolism, and pleasure), and the interaction between gender and clothing involvement (fashion interest) were significant. The interaction between gender and other variables were insignificant. For informational influence, the main effects of partner's product knowledge, pleasure, and gender as well as the interaction effects between fashion interest and gender, and between pleasure and gender were significant. Marketers may find implications from the study results on how couples influence each other in making apparel purchase decisions.

Change Acceptable In-Depth Searching in LOD Cloud for Efficient Knowledge Expansion (효과적인 지식확장을 위한 LOD 클라우드에서의 변화수용적 심층검색)

  • Kim, Kwangmin;Sohn, Yonglak
    • Journal of Intelligence and Information Systems
    • /
    • v.24 no.2
    • /
    • pp.171-193
    • /
    • 2018
  • LOD(Linked Open Data) cloud is a practical implementation of semantic web. We suggested a new method that provides identity links conveniently in LOD cloud. It also allows changes in LOD to be reflected to searching results without any omissions. LOD provides detail descriptions of entities to public in RDF triple form. RDF triple is composed of subject, predicates, and objects and presents detail description for an entity. Links in LOD cloud, named identity links, are realized by asserting entities of different RDF triples to be identical. Currently, the identity link is provided with creating a link triple explicitly in which associates its subject and object with source and target entities. Link triples are appended to LOD. With identity links, a knowledge achieves from an LOD can be expanded with different knowledge from different LODs. The goal of LOD cloud is providing opportunity of knowledge expansion to users. Appending link triples to LOD, however, has serious difficulties in discovering identity links between entities one by one notwithstanding the enormous scale of LOD. Newly added entities cannot be reflected to searching results until identity links heading for them are serialized and published to LOD cloud. Instead of creating enormous identity links, we propose LOD to prepare its own link policy. The link policy specifies a set of target LODs to link and constraints necessary to discover identity links to entities on target LODs. On searching, it becomes possible to access newly added entities and reflect them to searching results without any omissions by referencing the link policies. Link policy specifies a set of predicate pairs for discovering identity between associated entities in source and target LODs. For the link policy specification, we have suggested a set of vocabularies that conform to RDFS and OWL. Identity between entities is evaluated in accordance with a similarity of the source and the target entities' objects which have been associated with the predicates' pair in the link policy. We implemented a system "Change Acceptable In-Depth Searching System(CAIDS)". With CAIDS, user's searching request starts from depth_0 LOD, i.e. surface searching. Referencing the link policies of LODs, CAIDS proceeds in-depth searching, next LODs of next depths. To supplement identity links derived from the link policies, CAIDS uses explicit link triples as well. Following the identity links, CAIDS's in-depth searching progresses. Content of an entity obtained from depth_0 LOD expands with the contents of entities of other LODs which have been discovered to be identical to depth_0 LOD entity. Expanding content of depth_0 LOD entity without user's cognition of such other LODs is the implementation of knowledge expansion. It is the goal of LOD cloud. The more identity links in LOD cloud, the wider content expansions in LOD cloud. We have suggested a new way to create identity links abundantly and supply them to LOD cloud. Experiments on CAIDS performed against DBpedia LODs of Korea, France, Italy, Spain, and Portugal. They present that CAIDS provides appropriate expansion ratio and inclusion ratio as long as degree of similarity between source and target objects is 0.8 ~ 0.9. Expansion ratio, for each depth, depicts the ratio of the entities discovered at the depth to the entities of depth_0 LOD. For each depth, inclusion ratio illustrates the ratio of the entities discovered only with explicit links to the entities discovered only with link policies. In cases of similarity degrees with under 0.8, expansion becomes excessive and thus contents become distorted. Similarity degree of 0.8 ~ 0.9 provides appropriate amount of RDF triples searched as well. Experiments have evaluated confidence degree of contents which have been expanded in accordance with in-depth searching. Confidence degree of content is directly coupled with identity ratio of an entity, which means the degree of identity to the entity of depth_0 LOD. Identity ratio of an entity is obtained by multiplying source LOD's confidence and source entity's identity ratio. By tracing the identity links in advance, LOD's confidence is evaluated in accordance with the amount of identity links incoming to the entities in the LOD. While evaluating the identity ratio, concept of identity agreement, which means that multiple identity links head to a common entity, has been considered. With the identity agreement concept, experimental results present that identity ratio decreases as depth deepens, but rebounds as the depth deepens more. For each entity, as the number of identity links increases, identity ratio rebounds early and reaches at 1 finally. We found out that more than 8 identity links for each entity would lead users to give their confidence to the contents expanded. Link policy based in-depth searching method, we proposed, is expected to contribute to abundant identity links provisions to LOD cloud.

Structural Relationships Among Parent-Adolescent Communication, Ego-Identity, and School Adjustment (부모-자녀 간의 의사소통, 자아정체감, 청소년의 학교적응 간의 관계구조)

  • Lee, Ji-Min
    • Korean Journal of Human Ecology
    • /
    • v.18 no.5
    • /
    • pp.1021-1033
    • /
    • 2009
  • The purpose of this study was twofold: One was to investigate the structural relationships among communication with father and mother, ego-identity, and school adjustment. The other was to test the structural equivalence among researched variables between middle and high school samples. The subjects were 419 sophomores of middle and high schools. The major findings were as follows. 1) Communication with the father had direct and indirect effects on adolescents' school adjustment, while communication with the mother had only an indirect effect on school adjustment. 2) Ego-identity had a direct effect on school adjustment, and mediated the effects of communication with father and mother in school adjustment. 3) Multiple-group analysis revealed that middle and high school groups had the same structural relationships, but had different regression weights.

An Empirical Research on Cultural Identity and Purchase Intention of Foreign Goods

  • Yu, Shasha;Liu, Xuefeng;Wu, Linjia
    • Journal of East Asia Management
    • /
    • v.2 no.1
    • /
    • pp.49-62
    • /
    • 2021
  • Multinational enterprises have adopted the form of business to successfully operate globally, and the overseas project has brought huge cultural exchange and penetration. The cultural liberalization also has improved the manufactured goods production and effect the consumers' purchase intentions. In this paper we focused on the influence factors that effected the cultural output, by investigating the actual consume market, using Structure Equation model(SEM model) to test the relationships among cultural preferences and purchase intentions of foreign products. Also, we evaluated the consumers' ethnocentrism's influences on cultural identity with other nations' cultural background. Lastly, we concluded that cultural identity has influences and complicate individual thoughts and purchase actions, it provides significance of impact of nation's soft power and whole economic development, and ethnocentrism has no significant influences on consuming foreign manufacture goods.

An Efficient Biometric Identity Based Signature Scheme

  • Yang, Yang;Hu, Yupu;Zhang, Leyou
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.8
    • /
    • pp.2010-2026
    • /
    • 2013
  • The combination of biometrics and cryptography gains a lot of attention from both academic and industry community. The noisy biometric measurement makes traditional identity based cryptosystems unusable. Also the extraction of key from biometric information is difficult. In this paper, we propose an efficient biometric identity based signature scheme (Bio-IBS) that makes use of fuzzy extractor to generate the key from a biometric data of user. The component fuzzy extraction is based on error correction code. We also prove that the security of suggested scheme is reduced to computational Diffie-Hellman (CDH) assumption instead of other strong assumptions. Meanwhile, the comparison with existing schemes shows that efficiency of the system is enhanced.