81,154 research outputs found
Mobile Identity Management Revisited
Identity management provides PET (privacy enhancing technology) tools for users to control privacy of their personal data. With the support of mobile location determination techniques based on GPS, WLAN, Bluetooth, etc., context-aware and location-aware mobile applications (e.g. restaurant finder, friend finder, indoor and outdoor navigation, etc.) have gained quite big interest in the business and IT world. Considering sensitive static personal information (e.g. name, address, phone number, etc.) and also dynamic personal information (e.g. current location, velocity in car, current status, etc.), mobile identity management is required to help mobile users to safeguard their personal data. In this paper, we evaluate certain required aspects and features (e.g. context-to-context dependence and relation, blurring in levels, trust management with p3p integration, extended privacy preferences, etc.) of mobile identity managemen
Inequality and identity in contemporary processes of labour market restructuring
Contemporary processes of labour market restructuring have resulted in increasing social and spacial inequalities in the United Kingdom. While the well discussed-issues of class, race and gender continue to be correlated to inequality, the decline in manufacturing jobs and rise in low-level service work has brought a new reality of identity-correlation. To remain employed, workers must increasingly transcend their geography and current job role; presenting an identity that is appealing to employers. Thus, in today's labour market with its increasing economic polarisation, previously strong social and work identities are now challenged by the logic of capital
Recommended from our members
The commodification of security in the risk society
Expanding on the works of Beck and others on the growing business of risk, this paper examines the role of private industry in the creation, management and perpetuation of the world risk society. It observes that the replacement of the concept of security with risk over the past decades has permitted private firms to identify a growing range of unknown and unknown-unknown dangers which cannot be eliminated and require continuous risk management. Using the discourse of risk and its strategies of commercialized, individualized and reactive risk management, the private risk industry has thus contributed to the rise of a world risk society in which the demand for security can never be satisfied and so guarantees continuous profits
Migrant networks, language learning and tourism employment
This paper examines the relationship between migrantsâ social networks, the processes of language acquisition and tourism employment. Data collected using netnography and interviews are used to identify the strategies that Polish workers in the UK use to develop their language skills. The paper highlights the roles played by co-workers, co-nationals and customers in migrantsâ language learning, both in the physical spaces of work and the virtual spaces of internet forums. It also shows how migrant workers exchange knowledge about the use of English during different stages of their migration careers: prior to leaving their country of origin and getting a job, during their employment and after leaving their job. Implications for academic inquiry and human resource management practice are outlined
- âŠ