48,053 research outputs found

    Sticking Together Because We're Stuck Together: Solidarity, Indivisibility, and Collective Action in the European Union

    Get PDF
    Starting from the premise that popular support is increasingly a necessary condition for European Union initiatives, this paper utilizes the concept of solidarity to attempt to better specify the nature of “we feeling” in Europe and its relationship to support for institutionalized collective action through the EU. Building on the Europeanization literature’s examination of the socialization of individuals toward European norms, the paper distinguishes between shared identities and common fate, arguing that the literature has tended to privilege the former over the latter. Using recent Eurobarometer public opinion surveys, this paper explores the different measures of identity and common fate and their apparent relationship to support for collective action across a range of issue areas

    Blockchain-based trust management and authentication of devices in smart grid

    Get PDF
    The digitalization of the power grid and advancement in intelligent technologies have enabled the service provider to convert the existing electrical grid into a smart grid. The transformation of the grid will help in integrating cleaner energy technologies with energy management to improve power network efficiency. Internet of things (IoT) and various network components need to be deployed to harness the full potential of the smart grid. Also, integrating intermittent renewable energy sources, energy storage, intelligent control of selected power-intensive loads, etc will improve energy efficiency. But deployment of this information and communication technologies will make the grid more vulnerable to cyber attacks from hackers. In this work, blockchain-based self-sovereign identification and authentication technique is presented to avert identity theft and masquerading. The proposed approach can minimize the chances of identity-based security breaches in the smart grid. This paper provides an overview of the model of identification and authentication of IoT devices in Smart Grid based on Blockchain technology. The Blockchain based implementation of identification and authentication of devices is proposed to validate the model in the distributed electrical energy network. The model is able to authenticate the device using Blockchain in a trusted model. The system works according to plan validating the authenticity of transaction in a node in log(n) time, which justifies presented result.publishedVersio

    The Self-Destruction of Yugoslavia

    Get PDF
    The self-destructiveness of the former Yugoslav federal system has not yet received its appropriate place in numerous accounts of the causes of Yugoslavia’s disintegration. This essay explores the self-destructive mechanism of the former Yugoslav socialist federal system. Its main thesis is that it was the institutional composition of the former Yugoslavia that was largely responsible for the cleavages in the 1980s, which caused the mutually exclusive ethnic nationalisms of today. In other words, the crisis, the subsequent ethnonational homogenization and the dissolution of the federal state were a natural outcome of the constitutional foundations of the system. When in the 1980s, republican elites defined national self-determination not politically, in terms of citizens’ rights, but ethnically, in terms of group rights, they were closely following the Constitution. They recognized that insistence on primordial social, national and cultural differences in the country could be used to legitimize political power within their respective federal units. This insistence on the ethnic principle radicalized inter-ethnic relations in the country to the extent that the destruction of Yugoslavia became inevitable

    A conceptual decentralized identity solution for state government

    Get PDF
    In recent years, state governments, exemplified by Mississippi, have significantly expanded their online service offerings to reduce costs and improve efficiency. However, this shift has led to challenges in managing digital identities effectively, with multiple fragmented solutions in use. This paper proposes a Self-Sovereign Identity (SSI) framework based on distributed ledger technology. SSI grants individuals control over their digital identities, enhancing privacy and security without relying on a centralized authority. The contributions of this research include increased efficiency, improved privacy and security, enhanced user satisfaction, and reduced costs in state government digital identity management. The paper provides background on digital identity management in the public sector, discusses existing practices, presents the SSI framework as a solution, and outlines potential future research areas

    The Review of Non-Technical Assumptions in Digital Identity Architectures

    Get PDF
    The literature on digital identity management systems (IdM) is abundant and solutions vary by technology components and non-technical requirements. In the long run, however, there is a need for exchanging identities across domains or even borders, which requires interoperable solutions and flexible architectures. This article aims to give an overview of the current research on digital identity management. We conduct a systematic literature review of digital identity solution architectures and extract their inherent non-technical assumptions. The findings show that solution designs can be based on organizational, business and trust assumptions as well as human-user assumptions. Namely, establishing the trust relationships and collaborations among participating organizations; human-users capability for maintaining private cryptographic material or the assumptions that win-win business models could be easily identified. By reviewing the key findings of solutions proposed and looking at the differences and commonalities of their technical, organizational and social requirements, we discuss their potential real-life inhibitors and identify opportunities for future research in IdM

    Democratic Culture in America

    Get PDF
    America has multiple civic traditions and is a nation that blends liberal and illiberal ideals. The Lockean liberal foundations the American civic community is built upon left space for people like Thomas Jefferson to add non-liberal elements to Locke’s theory, so it could better fit the context of the situation. Rogers Smith argues that the political elite fill that space with illiberal values to obtain power or maintain already established power structures.The political elite create “civic myths,” tales that are made from falsehoods, that give the individuals of a certain community greater worth than individuals who do not share the community’s common identity. This can help politicians mobilize their base in times of economic hardship. Since Lockean liberalism gives individuals theirworth based upon their productivity, individuals find their worth in sub-community identities, which politiciansare not afraid to use for their own political gain

    Transition Pathways towards Design Principles of Self-Sovereign Identity

    Get PDF
    Society\u27s accelerating digital transformation during the COVID-19 pandemic highlighted clearly that the Internet lacks a secure, efficient, and privacy-oriented model for identity. Self-sovereign identity (SSI) aims to address core weaknesses of siloed and federated approaches to digital identity management from both users\u27 and service providers\u27 perspectives. SSI emerged as a niche concept in libertarian communities, and was initially strongly associated with blockchain technology. Later, when businesses and governments began to invest, it quickly evolved towards a mainstream concept. To investigate this evolution and its effects on SSI, we conduct design science research rooted in the theory of technological transition pathways. Our study identifies nine core design principles of SSI as deployed in relevant applications, and discusses associated competing political and socio-technical forces in this space. Our results shed light on SSI\u27s key characteristics, its development pathway, and tensions in the transition between regimes of digital identity management
    • 

    corecore