157,852 research outputs found

    A Not so Secret Garden: English Roses, Victorian Aestheticism and the Making of Social Identities

    Get PDF
    The English rose has a long tradition in Britain as a national symbol, largely for being a metaphor applied to a woman who has a natural beauty and a strong character. In the Victorian age, the language of flowers conveyed an acknowledged social and moral code, and floral symbolism was widely used in the arts. In a time ruled by industrialisation, the Ruskinian "go to Nature" precept inspired not only Pre-Raphaelite aestheticism but ordinary women who longed to turn their home into a paradise as well as a garden, where they could play the part of angel and queen. Thus, a neo-Victorian perspective can reinterpret this idealisation of social roles as being close to identities with a subversive potential for giving a voice to those who could not otherwise make themselves heard. In sum, floral representations, both in the literal and the figurative sense, contribute to a better understanding of Victorian and contemporary British culture. This essay therefore aims to link gender and identity questions with cultural history.A rosa inglesa tem uma longa tradição na Grã-Bretanha como símbolo nacional, em larga medida por constituir uma metáfora que se aplica a uma mulher possuidora de beleza natural e de personalidade determinada. Na era vitoriana, a linguagem das flores transmitia um código de valores sociais e morais bem estabelecido e identificável, tendo a simbologia floral sido amplamente utilizada no domínio artístico. Numa época dominada pela industrialização, o preceito ruskiniano de se ir ao encontro da Natureza inspirou não só o esteticismo pré-rafaelita mas também inúmeras mulheres comuns que aspiravam transformar o lar num paraíso e num jardim, onde desempenhariam o papel de anjo e de rainha. Numa perspectiva crítica neovictoriana, importa reinterpretar a idealização de papéis sociais como uma construção de identidades com o potencial subversivo de dar voz a quem não se fazia ouvir. Em suma, as representações florais, quer em sentido literal, quer figurado, contribuem para um melhor conhecimento da cultura inglesa oitocentista e contemporânea. O presente artigo visa, deste modo, articular questões de género, de identidade e de história cultural

    Publications of the Identity of Children in Conflict with the Law on the Official Site of the Indonesian Supreme Court Decision Directory

    Get PDF
    Protection of children's rights in conflict with the law (ABH) is a state obligation. The protection aims to ensure the best interests of the child and to prevent discrimination. As stated in Article 19 of Law Number 11 of 2012, one of the rights is that law enforcement institutions are not allowed to publish the identities of ABH, either in print/ electronic media. However, their identities are still revealed in various Decisions of children's cases. Particularly, their identity is published on the Site of the Supreme Court's Ruling Directory. The purpose of this study is to find out why the Supreme Court Decision Directory Site does not keep the identity of ABH a secret and what are the implications. This research used a socio-legal approach. The results of the study show the management team did not understand their main tasks and rules of protecting the identity of ABH, inconsistency in checking copies of court decisions, ineffective monitoring, and only a handful of people reported the case so this situation is considered normal. The implications of the children’s identity disclosure have affected the rights of children, families, and applicable rules that do not provide legal certainty

    My Trouble with Queer

    Get PDF
    Gay Bosnians are struggling with the (US-based) concept of ‘coming out’. Homosexuality here is shameful and is only possible when it is secret, hidden, anonymous. My problem with queer theory and activism is not the theory itself. Indeed queer theory’s most important contribution is to disclose how the gay movement of the 1970s and 1980s only dealt with white gay male experience, thus centralising some identities and marginalising others. However my problem (or, to be more exact, my concern or maybe my own ignorance) is how to translate queer theory into the practice of everyday politics, especially in thepostwar areas of the former Yugoslavia. As yet, it seems that the (radical) US queer model does not translate well into those societies on the doorstep of the European Union (EU). Even so, as someone at the Queer Zagreb conference mentioned, New York and San Francisco are not the USA, which means that ‘queering’ in some other parts of the country would provoke similar hostile reactions, or, to put it differently, one can find Bosnia in many parts of the USA. The million-dollar question, therefore, is how to translate the queer sensibility of identities into policy papers and government resolutions

    Callisto: a cryptographic approach to detecting serial perpetrators of sexual misconduct

    Get PDF
    Sexual misconduct is prevalent in workplace and education settings but stigma and risk of further damage deter many victims from seeking justice. Callisto, a non-profit that has created an online sexual assault reporting platform for college campuses, is expanding its work to combat sexual assault and harassment in other industries. In this new product, users will be invited to an online "matching escrow" that will detect repeat perpetrators and create pathways to support for victims. Users submit encrypted data about their perpetrator, and this data can only be decrypted by the Callisto Options Counselor (a lawyer), when another user enters the identity of the same perpetrator. If the perpetrator identities match, both users will be put in touch independently with the Options Counselor, who will connect them to each other (if appropriate) and help them determine their best path towards justice. The client relationships with the Options Counselors are structured so that any client-counselor communications would be privileged. A combination of client-side encryption, encrypted communication channels, oblivious pseudo-random functions, key federation, and Shamir Secret Sharing keep data confidential in transit, at rest, and during the matching process with the guarantee that only the lawyer ever has access to user submitted data, and even then only when a match is identified.Accepted manuscrip

    Finding Safety in Numbers with Secure Allegation Escrows

    Full text link
    For fear of retribution, the victim of a crime may be willing to report it only if other victims of the same perpetrator also step forward. Common examples include 1) identifying oneself as the victim of sexual harassment, especially by a person in a position of authority or 2) accusing an influential politician, an authoritarian government, or ones own employer of corruption. To handle such situations, legal literature has proposed the concept of an allegation escrow: a neutral third-party that collects allegations anonymously, matches them against each other, and de-anonymizes allegers only after de-anonymity thresholds (in terms of number of co-allegers), pre-specified by the allegers, are reached. An allegation escrow can be realized as a single trusted third party; however, this party must be trusted to keep the identity of the alleger and content of the allegation private. To address this problem, this paper introduces Secure Allegation Escrows (SAE, pronounced "say"). A SAE is a group of parties with independent interests and motives, acting jointly as an escrow for collecting allegations from individuals, matching the allegations, and de-anonymizing the allegations when designated thresholds are reached. By design, SAEs provide a very strong property: No less than a majority of parties constituting a SAE can de-anonymize or disclose the content of an allegation without a sufficient number of matching allegations (even in collusion with any number of other allegers). Once a sufficient number of matching allegations exist, the join escrow discloses the allegation with the allegers' identities. We describe how SAEs can be constructed using a novel authentication protocol and a novel allegation matching and bucketing algorithm, provide formal proofs of the security of our constructions, and evaluate a prototype implementation, demonstrating feasibility in practice.Comment: To appear in NDSS 2020. New version includes improvements to writing and proof. The protocol is unchange

    KeyForge: Mitigating Email Breaches with Forward-Forgeable Signatures

    Full text link
    Email breaches are commonplace, and they expose a wealth of personal, business, and political data that may have devastating consequences. The current email system allows any attacker who gains access to your email to prove the authenticity of the stolen messages to third parties -- a property arising from a necessary anti-spam / anti-spoofing protocol called DKIM. This exacerbates the problem of email breaches by greatly increasing the potential for attackers to damage the users' reputation, blackmail them, or sell the stolen information to third parties. In this paper, we introduce "non-attributable email", which guarantees that a wide class of adversaries are unable to convince any third party of the authenticity of stolen emails. We formally define non-attributability, and present two practical system proposals -- KeyForge and TimeForge -- that provably achieve non-attributability while maintaining the important protection against spam and spoofing that is currently provided by DKIM. Moreover, we implement KeyForge and demonstrate that that scheme is practical, achieving competitive verification and signing speed while also requiring 42% less bandwidth per email than RSA2048
    • …
    corecore