Search results

1 – 10 of 573
Book part
Publication date: 1 March 2013

Thomas Olesen

This chapter offers a symbolic perspective on the Egyptian Revolution. It does so by analyzing the transformation of Khaled Said, a 28-year-old Egyptian man beaten to death by…

Abstract

This chapter offers a symbolic perspective on the Egyptian Revolution. It does so by analyzing the transformation of Khaled Said, a 28-year-old Egyptian man beaten to death by police on June 6, 2010, into a key visual injustice symbol. Activists were motivated by a horrifying cell phone photograph of Said taken by his family at the morgue and uploaded on the web. Although the postmortem photograph had a powerful emotional impact in itself, the transformation of Said from local/particular incident to injustice symbol with society-wide repercussions cannot be explained by its mere availability in the public sphere. The transformation required intervention and appropriation by activists who creatively and strategically universalized the case, linking it with existing injustice frames in Egypt. This chapter analyzes this interplay between photographs, activism, and society in two steps. The first provides an analysis of the genesis of the Said symbol and identifies three levels of agency in its formation. The second step analyzes the process through which Said was infused with injustice meanings by activists. Providing the first systematic analysis of Said from a social movement perspective, the chapter draws on several data sources that are subjected to interpretive analysis: visual material available on the internet, Facebook pages, and interviews with and accounts by key activists. And it calls for more attention to photographs and symbols in the analysis of activism and points to several historical and present cases with relevance for such an approach.

Details

Advances in the Visual Analysis of Social Movements
Type: Book
ISBN: 978-1-78190-636-1

Keywords

Article
Publication date: 10 September 2019

Khaled Sayed Asfour

The purpose of this paper is to discuss architecture that produces spatial experience with which children and young adults are able to interact, giving them a great sense of…

1636

Abstract

Purpose

The purpose of this paper is to discuss architecture that produces spatial experience with which children and young adults are able to interact, giving them a great sense of positive energy that translates into actual healing. This type of architecture is few in number but can create a transition toward sustainable healing.

Design/methodology/approach

Spatial experience was evident in the architectural practice of the ancient world. Back then architects considered what moods should they give to spaces that best suit their functions. In our contemporary world, this trail of thinking is replaced by architecture that do not connect with the user’s psychology. The paper will prove that there are few architects today who are willing to exert an effort in providing the right moods for their buildings with a sustainable vibe. The paper will discuss this point by taking four examples of architecture specialized in healing young adults and children.

Findings

Through analysis of the case studies, the paper reveals the importance of spatial experience approach in producing meaningful architecture that connects with the user. The paper shows that it is through this approach that important moments of architectural history was made as well as the works of famous architects of our times.

Originality/value

The research redefines how should we look at architectural history through spatial experience analysis. It also gives us an insight into how architects become famous today through their unique design process that continue to be successful and admired by ordinary users not just specialists. The research is not limited to this paper, but currently expanding to include other case studies of different building types.

Details

Archnet-IJAR: International Journal of Architectural Research, vol. 14 no. 2
Type: Research Article
ISSN: 2631-6862

Keywords

Open Access
Article
Publication date: 9 October 2023

Aya Khaled Youssef Sayed Mohamed, Dagmar Auer, Daniel Hofer and Josef Küng

Data protection requirements heavily increased due to the rising awareness of data security, legal requirements and technological developments. Today, NoSQL databases are…

1037

Abstract

Purpose

Data protection requirements heavily increased due to the rising awareness of data security, legal requirements and technological developments. Today, NoSQL databases are increasingly used in security-critical domains. Current survey works on databases and data security only consider authorization and access control in a very general way and do not regard most of today’s sophisticated requirements. Accordingly, the purpose of this paper is to discuss authorization and access control for relational and NoSQL database models in detail with respect to requirements and current state of the art.

Design/methodology/approach

This paper follows a systematic literature review approach to study authorization and access control for different database models. Starting with a research on survey works on authorization and access control in databases, the study continues with the identification and definition of advanced authorization and access control requirements, which are generally applicable to any database model. This paper then discusses and compares current database models based on these requirements.

Findings

As no survey works consider requirements for authorization and access control in different database models so far, the authors define their requirements. Furthermore, the authors discuss the current state of the art for the relational, key-value, column-oriented, document-based and graph database models in comparison to the defined requirements.

Originality/value

This paper focuses on authorization and access control for various database models, not concrete products. This paper identifies today’s sophisticated – yet general – requirements from the literature and compares them with research results and access control features of current products for the relational and NoSQL database models.

Details

International Journal of Web Information Systems, vol. 20 no. 1
Type: Research Article
ISSN: 1744-0084

Keywords

Open Access
Article
Publication date: 15 August 2022

Aya Khaled Youssef Sayed Mohamed, Dagmar Auer, Daniel Hofer and Josef Küng

Authorization and access control have been a topic of research for several decades. However, existing definitions are inconsistent and even contradicting each other. Furthermore…

6822

Abstract

Purpose

Authorization and access control have been a topic of research for several decades. However, existing definitions are inconsistent and even contradicting each other. Furthermore, there are numerous access control models and even more have recently evolved to conform with the challenging requirements of resource protection. That makes it hard to classify the models and decide for an appropriate one satisfying security needs. Therefore, this study aims to guide through the plenty of access control models in the current state of the art besides this opaque accumulation of terms meaning and how they are related.

Design/methodology/approach

This study follows the systematic literature review approach to investigate current research regarding access control models and illustrate the findings of the conducted review. To provide a detailed understanding of the topic, this study identified the need for an additional study on the terms related to the domain of authorization and access control.

Findings

The authors’ research results in this paper are the distinction between authorization and access control with respect to definition, strategies, and models in addition to the classification schema. This study provides a comprehensive overview of existing models and an analysis according to the proposed five classes of access control models.

Originality/value

Based on the authors’ definitions of authorization and access control along with their related terms, i.e. authorization strategy, model and policy as well as access control model and mechanism, this study gives an overview of authorization strategies and propose a classification of access control models providing examples for each category. In contrast to other comparative studies, this study discusses more access control models, including the conventional state-of-the-art models and novel ones. This study also summarizes each of the literature works after selecting the relevant ones focusing on the database system domain or providing a survey, a classification or evaluation criteria of access control models. Additionally, the introduced categories of models are analyzed with respect to various criteria that are partly selected from the standard access control system evaluation metrics by the National Institute of Standards and Technology.

Details

International Journal of Web Information Systems, vol. 18 no. 2/3
Type: Research Article
ISSN: 1744-0084

Keywords

Book part
Publication date: 9 August 2023

Chloé Branders

This chapter is based on criminological research about theatre in detention. The research results allow a new conceptual approach to the notion of subversion. The purpose of this…

Abstract

This chapter is based on criminological research about theatre in detention. The research results allow a new conceptual approach to the notion of subversion. The purpose of this work is to (a) briefly present the object, context, and methodology of the research; (b) describe the concept of subversion; and (c) explain how subversion can serve an activist project in criminology. The topic will be situated in an epistemological reflection, illuminating the nature of the prison theatre project and its criminological applications.

Details

The Emerald International Handbook of Activist Criminology
Type: Book
ISBN: 978-1-80262-199-0

Keywords

Book part
Publication date: 11 August 2014

Lara Lengel and Victoria Ann Newsom

To examine how social media restrict and recreate messages within current interactionist scripts in the Middle East and North Africa (MENA), this study applies a framework of…

Abstract

To examine how social media restrict and recreate messages within current interactionist scripts in the Middle East and North Africa (MENA), this study applies a framework of digital reflexivity highlighting stages of information flow. It applies the symbolic interaction concept of emotional events to analyze the self-immolation of Mohamed Bouazizi and the role of social media in disseminating Bouazizi’s act as one catalyst of the MENA citizen uprisings. The role of social media in the “Arab Spring” merits investigation because social media provide opportunities to examine shifting identities, interactions, and actions of citizen activists in the MENA uprisings. This study is important and timely because little symbolic interactionist scholarship exists on MENA identities and social movements, or on crowd interaction and activism outside the West. The nuanced nature of MENA political activism and complex processes of the development of activists’ “mutable” selves (Zurcher, 1977) are fluid and resistant to symbolically defined social roles, interactionist scripts and reflexivity, and public communication practices in a MENA under political and social transition.

Details

Symbolic Interaction and New Social Media
Type: Book
ISBN: 978-1-78350-933-1

Keywords

Book part
Publication date: 12 September 2017

Jason Nunzio Dorio

In this chapter, I will first conceptualize social movement theory before examining the importance of student movements and student activism. I then will link social movement…

Abstract

In this chapter, I will first conceptualize social movement theory before examining the importance of student movements and student activism. I then will link social movement theory to the university in Egypt. Next, I will contextualize university activism by describing the authoritarian structures of Egypt’s university system. Then, using secondary data sources, I will characterize university activism during the three transitional political periods (under the Supreme Council of the Armed Forces (SACF), under President Morsi, and after the ousting of Morsi), and conclude with a discussion on the implications of student activism on future university reform.

Details

The Power of Resistance
Type: Book
ISBN: 978-1-78350-462-6

Keywords

Content available
Article
Publication date: 4 September 2007

120

Abstract

Details

Disaster Prevention and Management: An International Journal, vol. 16 no. 4
Type: Research Article
ISSN: 0965-3562

Abstract

Details

Nirbhaya, New Media and Digital Gender Activism
Type: Book
ISBN: 978-1-78754-529-8

Content available
Book part
Publication date: 22 August 2018

Adrija Dey

Abstract

Details

Nirbhaya, New Media and Digital Gender Activism
Type: Book
ISBN: 978-1-78754-529-8

1 – 10 of 573