Essays about: "identity design"

Showing result 11 - 15 of 535 essays containing the words identity design.

  1. 11. The Race to Success: Navigating the Roadblocks to Formula E's Popularity

    University essay from Lunds universitet/Företagsekonomiska institutionen

    Author : Rebecca Aharon; Fu Jill Dakota van der Horst; Guillaume Berge; [2023]
    Keywords : Keywords: Brand loyalty; Corporate Brand Identity; Sustainable Messaging; Media Influence; Business and Economics;

    Abstract : Purpose: Formula E, the electric counterpart to Formula 1, has not achieved the same level of popularity among consumers. The purpose of this paper is to understand why Formula E has not been as successful as Formula 1 and the barriers to consumer adoption of Formula E. READ MORE

  2. 12. #DeGenderFashion : A Visual Analysis of How Fashion Is Used to Challenge Gender Norms and Heteronormative Expectations

    University essay from Malmö universitet/Institutionen för konst, kultur och kommunikation (K3)

    Author : Alexandra Edelsbrunner; [2023]
    Keywords : Fashion Theory; Gender Theory; Social Media Activism; Identity; Cultural Studies; Gender Norms;

    Abstract : The study aims to answer the question of whether fashion can communicate meaning, by addressing how creators on Instagram challenge dominant gender norms through fashion, with a focus on the activist movement of #DeGenderFashion. The research questions will be answered using fashion theory and gender theory as guiding points, with literature on social media activism, representations of gender, and cultural studies giving further insight into the dynamics of the movement. READ MORE

  3. 13. Towards Building Privacy-Preserving Language Models: Challenges and Insights in Adapting PrivGAN for Generation of Synthetic Clinical Text

    University essay from Stockholms universitet/Institutionen för data- och systemvetenskap

    Author : Atena Nazem; [2023]
    Keywords : Generative Adversarial Networks; privacy-preserving language models; clinical text data; reinforcement learning; synthetic data;

    Abstract : The growing development of artificial intelligence (AI), particularly neural networks, is transforming applications of AI in healthcare, yet it raises significant privacy concerns due to potential data leakage. As neural networks memorise training data, they may inadvertently expose sensitive clinical data to privacy breaches, which can engender serious repercussions like identity theft, fraud, and harmful medical errors. READ MORE

  4. 14. Spatiotemporal Selves on a Location-Based Social Network : A Postphenomenological Autoethnography of Snap Map

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Adam Särnell; [2023]
    Keywords : postphenomenology; autoethnography; spatiotemporality; performativity; location-based social networks; postfenomenologi; autoetnografi; spatiotemporalitet; performativitet; platsbaserade sociala nätverk;

    Abstract : The location-based social network (LBSN) Snapchat allows millions of users to share their locations to others through Snap Map: a digital map that updates their position each time they open the app. While social science studies have explored sentiments, behaviors and norms among Snap Map users, there is limited research on this type of location-based social network in the field of human-computer interaction (HCI), indicating a need for expanding the understanding of the roles that this technology and its design play in shaping the experiences and interactions among users. READ MORE

  5. 15. Securing Sensitive Data in the Cloud: A New Era of Security Through Zero Trust Principles

    University essay from KTH/Hälsoinformatik och logistik

    Author : Thomas Yacob; [2023]
    Keywords : Zero Trust; GitLab; Docker; Keycloak; GPG keys; sensitive data; firewalls;

    Abstract : The goal of this report is to examine how traditional security systems are structured and see their shortcomings, and from there propose how a new system can be built to secure sensitive data. The proposed approach is a new architecture called Zero Trust, which means implementing security at the design of the system and providing minimal access to users to perform their tasks. READ MORE