English Name Use by East Asians in Canada: Linguistic Pragmatics Or Cultural Identity? Kevin Heffernan Kwansei Gakuin University, Japan
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Domain-Specific Pseudonymous Signatures Revisited
Domain-Specific Pseudonymous Signatures Revisited Kamil Kluczniak Wroclaw University of Technology, Department of Computer Science [email protected] Abstract. Domain-Specific Pseudonymous Signature schemes were re- cently proposed for privacy preserving authentication of digital identity documents by the BSI, German Federal Office for Information Secu- rity. The crucial property of domain-specific pseudonymous signatures is that a signer may derive unique pseudonyms within a so called domain. Now, the signer's true identity is hidden behind his domain pseudonyms and these pseudonyms are unlinkable, i.e. it is infeasible to correlate two pseudonyms from distinct domains with the identity of a single signer. In this paper we take a critical look at the security definitions and construc- tions of domain-specific pseudonymous signatures proposed by far. We review two articles which propose \sound and clean" security definitions and point out some issues present in these models. Some of the issues we present may have a strong practical impact on constructions \provably secure" in this models. Additionally, we point out some worrisome facts about the proposed schemes and their security analysis. Key words: eID Documents, Privacy, Domain Signatures, Pseudonymity, Security Definition, Provable Security 1 Introduction Domain signature schemes are signature schemes where we have a set of users, an issuer and a set of domains. Each user obtains his secret keys in collaboration with the issuer and then may sign data with regards to his pseudonym. The crucial property of domain signatures is that each user may derive a pseudonym within a domain. Domain pseudonyms of a user are constant within a domain and a user should be unable to change his pseudonym within a domain, however, he may derive unique pseudonyms in each domain of the system. -
Choice of Foreign Names As a Strategy for Identity Management
Intercultural Communication Studies XVII: 2 2008 Cheang Choice of Foreign Names as a Strategy for Identity Management Justina Cheang, University of Macau Regardless of the fact that Macau’s dominating population are Chinese, English names, or to be more exact, foreign names, are favored and widely used, be it in the businesses, the government, or education institutions. Though Chinese (Cantonese) is spoken by most in the city, local Chinese people’s favor in the use of English/foreign names, whether they are students, civil servants, or working in the business, does reflect their taste and their desired image to be displayed to others. Interviews are conducted showing that people’s choice of English/foreign names are somehow a strategy for identity management – certain names are chosen to show a pleasant personality, or other desirable qualities that they wanted to project to others. It is interesting to note that, other than English names, people would choose Portuguese names, Japanese names, names of things (non-proper names), or even people’s own creation for use. A Chinese saying: “One does not fear if he/she has a bad fate; what one fears most is to be given a bad name.” Rather than a Chinese saying, this should also be a universal consideration when most parents all over the world are finding names for their children. Most people get their names when they are born, and very often they themselves are not involved in the decision-making. What if we get a chance to decide on our own name? To get a name by oneself is probably a very unique trend in Asia, and especially, the Chinese communities. -
PARK JIN HYOK, Also Known As ("Aka") "Jin Hyok Park," Aka "Pak Jin Hek," Case Fl·J 18 - 1 4 79
AO 91 (Rev. 11/11) Criminal Complaint UNITED STATES DISTRICT COURT for the RLED Central District of California CLERK U.S. DIS RICT United States ofAmerica JUN - 8 ?018 [ --- .. ~- ·~".... ~-~,..,. v. CENT\:y'\ l i\:,: ffl1G1 OF__ CAUFORN! BY .·-. ....-~- - ____D=E--..... PARK JIN HYOK, also known as ("aka") "Jin Hyok Park," aka "Pak Jin Hek," Case fl·J 18 - 1 4 79 Defendant. CRIMINAL COMPLAINT I, the complainant in this case, state that the following is true to the best ofmy knowledge and belief. Beginning no later than September 2, 2014 and continuing through at least August 3, 2017, in the county ofLos Angeles in the Central District of California, the defendant violated: Code Section Offense Description 18 U.S.C. § 371 Conspiracy 18 u.s.c. § 1349 Conspiracy to Commit Wire Fraud This criminal complaint is based on these facts: Please see attached affidavit. IBJ Continued on the attached sheet. Isl Complainant's signature Nathan P. Shields, Special Agent, FBI Printed name and title Sworn to before ~e and signed in my presence. Date: ROZELLA A OLIVER Judge's signature City and state: Los Angeles, California Hon. Rozella A. Oliver, U.S. Magistrate Judge Printed name and title -:"'~~ ,4G'L--- A-SA AUSAs: Stephanie S. Christensen, x3756; Anthony J. Lewis, x1786; & Anil J. Antony, x6579 REC: Detention Contents I. INTRODUCTION .....................................................................................1 II. PURPOSE OF AFFIDAVIT ......................................................................1 III. SUMMARY................................................................................................3 -
Reference Guides for Registering Students with Non English Names
Getting It Right Reference Guides for Registering Students With Non-English Names Jason Greenberg Motamedi, Ph.D. Zafreen Jaffery, Ed.D. Allyson Hagen Education Northwest June 2016 U.S. Department of Education John B. King Jr., Secretary Institute of Education Sciences Ruth Neild, Deputy Director for Policy and Research Delegated Duties of the Director National Center for Education Evaluation and Regional Assistance Joy Lesnick, Acting Commissioner Amy Johnson, Action Editor OK-Choon Park, Project Officer REL 2016-158 The National Center for Education Evaluation and Regional Assistance (NCEE) conducts unbiased large-scale evaluations of education programs and practices supported by federal funds; provides research-based technical assistance to educators and policymakers; and supports the synthesis and the widespread dissemination of the results of research and evaluation throughout the United States. JUNE 2016 This project has been funded at least in part with federal funds from the U.S. Department of Education under contract number ED‐IES‐12‐C‐0003. The content of this publication does not necessarily reflect the views or policies of the U.S. Department of Education nor does mention of trade names, commercial products, or organizations imply endorsement by the U.S. Government. REL Northwest, operated by Education Northwest, partners with practitioners and policymakers to strengthen data and research use. As one of 10 federally funded regional educational laboratories, we conduct research studies, provide training and technical assistance, and disseminate information. Our work focuses on regional challenges such as turning around low-performing schools, improving college and career readiness, and promoting equitable and excellent outcomes for all students. -
NIH Spanish Style Guide
NIH Spanish Style Guide Table of Contents 1. Introduction............................................................................................................................................................... 4 Purpose ...................................................................................................................................................................... 4 Target Audiences ....................................................................................................................................................... 4 2. Names ........................................................................................................................................................................ 4 2.1. NIH, Institutes, and Centers ................................................................................................................................. 4 2.2. Names of Countries, States, and Cities ............................................................................................................... 7 2.3. Addresses............................................................................................................................................................ 8 2.4. Names of Entities and Institutions ....................................................................................................................... 8 2.5. Acronyms and Abbreviations .............................................................................................................................. -
International Post Adoption Services | Korea Service Descriptions
1605 Eustis Street 80 0 -952-9302 Saint Paul, MN 55108 651-646-7771 chlss.org/post-adoption International Post Adoption Services | Korea Service Descriptions Important: CH/LSS and our Korean partnership agencies receive heightened service requests over the summer months, and you may experience a longer wait time for your case to be assigned. Thank you for your understanding. A $35 Registration Fee is due at time of service request Additional forms specific to your Korean agency will be required. Your post adoption worker will provide them to you. Birth Family Search - Korean and U.S. File Review are included *See age restrictions below If you are unsure about proceeding with a search, consider starting with a file review. An adopted adult, age 19+ or parents of adopted minors (13+) can initiate a search for birth parents. Prior to starting your search, your post adoption worker will speak with you in detail about your motivations to search, the range of possible outcomes, and access to support systems during the search and outreach journey. Correspondence (through email) will be exchanged at no extra cost up to 1 year from the time of first contact with birth mother or father (translation available through volunteer translators). Correspondence fees (page 2) apply after 1st year of letter exchange. ..............................................................................................................................................................................................................................................................………..$350 Use “Domestic” Search Service Request when all parties live in US and Korean agency is not involved..….…..….Domestic Service fees apply US and/or Korean file review and other special requests *See age restrictions below An adopted adult, age 19+ or parents of adopted minors (age 13+) can request that their US and/or Korean agency adoption file be checked for updates. -
English Names of Taiwanese Young Adults Survey Part I Background
Appendix A A list of questions of the questionnaire which was sent through the Google Forms to the respondents (English version) English Names of Taiwanese Young Adults Survey Dear respondent, thank you for taking the time to fill out this questionnaire. It is fully confidential, and the results will be used solely for our academic research. Please fill out as much of the survey as possible. Part I Background information 1. Age Your answer 2. Gender Male □ Female □ 3. Your Chinese given name Your answer 4. Education High school □ Undergraduate □ Graduate □ Postgraduate □ 5. Hometown Your answer 6. Nationality Taiwanese □ Other: 7. Mother tongue 8. Your second language (The language you have been learning the longest/are most proficient at) English □ Other: 9. How many years have you been learning English? Your answer 10. Do you enjoy using English? Yes □ No □ Part II The acquisition and use of your English name(s) 11. Do you have an English name? Yes □ No □ 12. If you do not have an English name, please explain why. Your answer If you do not have or use an English name, you do not need to answer the following questions. Thank you very much for your cooperation. 13. When did you get your first English name and who gave it to you? Your answer 14. What is your current English name? Your answer 15. Is your current English name your first English name, or has it been changed several times already? If it has been changed, please explain why, when and who gave you the name(s) you had before. -
Exploring Your Surname Exploring Your Surname
Exploring Your Surname As of 6/09/10 © 2010 S.C. Meates and the Guild of One-Name Studies. All rights reserved. This storyboard is provided to make it easy to prepare and give this presentation. This document has a joint copyright. Please note that the script portion is copyright solely by S.C. Meates. The script can be used in giving Guild presentations, although permission for further use, such as in articles, is not granted, to conform with prior licenses executed. The slide column contains a miniature of the PowerPoint slide for easy reference. Slides Script Welcome to our presentation, Exploring Your Surname. Exploring Your Surname My name is Katherine Borges, and this presentation is sponsored by the Guild of One- Name Studies, headquartered in London, England. Presented by Katherine Borges I would appreciate if all questions can be held to the question and answer period at Sponsored by the Guild of One-Name Studies the end of the presentation London, England © 2010 Guild of One-Name Studies. All rights reserved. www.one-name.org Surnames Your surname is an important part of your identity. How did they come about This presentation will cover information about surnames, including how they came Learning about surnames can assist your about, and what your surname can tell you. In addition, I will cover some of the tools genealogy research and techniques available for you to make discoveries about your surname. Historical development Regardless of the ancestral country for your surname, learning about surnames can assist you with your genealogy research. Emergence of variants Frequency and distribution The presentation will cover the historical development of surnames, the emergence of variants, what the current frequency and distribution of your surname can tell you DNA testing to make discoveries about the origins, and the use of DNA testing to make discoveries about your surname. -
How to Leak a Secret: Theory and Applications of Ring Signatures
How to Leak a Secret: Theory and Applications of Ring Signatures Ronald L. Rivest1, Adi Shamir2, and Yael Tauman1 1 Laboratory for Computer Science, Massachusetts Institute of Technology, Cambridge, MA 02139, 2 Computer Science department, The Weizmann Institute, Rehovot 76100, Israel. Abstract. In this work we formalize the notion of a ring signature, which makes it possible to specify a set of possible signers without re- vealing which member actually produced the signature. Unlike group sig- natures, ring signatures have no group managers, no setup procedures, no revocation procedures, and no coordination: any user can choose any set of possible signers that includes himself, and sign any message by using his secret key and the others' public keys, without getting their approval or assistance. Ring signatures provide an elegant way to leak authoritative secrets in an anonymous way, to sign casual email in a way that can only be veri¯ed by its intended recipient, and to solve other problems in multiparty computations. Our main contribution lies in the presentation of e±cient constructions of ring signatures; the general concept itself (under di®erent terminology) was ¯rst introduced by Cramer et al. [CDS94]. Our constructions of such signatures are unconditionally signer-ambiguous, secure in the random oracle model, and exceptionally e±cient: adding each ring member in- creases the cost of signing or verifying by a single modular multiplication and a single symmetric encryption. We also describe a large number of extensions, modi¯cations and applications of ring signatures which were published after the original version of this work (in Asiacrypt 2001). -
Identity Under Japanese Occupation
1 “BECOMING JAPANESE:” IDENTITY UNDER JAPANESE OCCUPATION GRADES: 9-12 AUTHOR: Katherine Murphy TOPIC/THEME: Japanese Occupation, World War II, Korean Culture, Identity TIME REQUIRED: Two 60-minute periods BACKGROUND: The lesson is based on the impact of the Japanese occupation of Korea during World War II on Korean culture and identity. In particular, the lesson focuses on the Japanese campaign in 1940 to encourage Koreans to abandon their Korean names and adopt Japanese names. This campaign was known as “sōshi-kaimei." The purpose of this campaign, along with campaigns requiring Koreans to recite an oath to the Japanese Emperor and bow at Shinto shrines, were to make the Korean people “Japanese” and hopefully, loyal subjects of the Japanese Empire by abandoning their Korean identity and loyalties. These cultural policies and campaigns were key to the Japanese war effort during World War II. The lesson draws from the students’ lives as well as two books: Lost Names: Scenes from a Korean Boyhood by Richard E. Kim and Under the Black Umbrella: Voices from Colonial Korea 1910-1945 by Hildi Kang. CURRICULUM CONNECTION: The lesson is intended to use the major themes from the summer reading book Lost Names: Scenes from a Korean Boyhood to introduce students to one of the five essential questions of the World History II course: How is identity constructed? How does identity impact human experience? In first investigating the origin of their own names and the meaning of Korean names, students can begin to explore the question “How is identity constructed?’ In examining how and why the Japanese sought to change the Korean people’s names, religion, etc during World War II, students will understand how global events such as World War II can impact an individual. -
Proposal for a Korean Script Root Zone LGR 1 General Information
(internal doc. #: klgp220_101f_proposal_korean_lgr-25jan18-en_v103.doc) Proposal for a Korean Script Root Zone LGR LGR Version 1.0 Date: 2018-01-25 Document version: 1.03 Authors: Korean Script Generation Panel 1 General Information/ Overview/ Abstract The purpose of this document is to give an overview of the proposed Korean Script LGR in the XML format and the rationale behind the design decisions taken. It includes a discussion of relevant features of the script, the communities or languages using it, the process and methodology used and information on the contributors. The formal specification of the LGR can be found in the accompanying XML document below: • proposal-korean-lgr-25jan18-en.xml Labels for testing can be found in the accompanying text document below: • korean-test-labels-25jan18-en.txt In Section 3, we will see the background on Korean script (Hangul + Hanja) and principal language using it, i.e., Korean language. The overall development process and methodology will be reviewed in Section 4. The repertoire and variant groups in K-LGR will be discussed in Sections 5 and 6, respectively. In Section 7, Whole Label Evaluation Rules (WLE) will be described and then contributors for K-LGR are shown in Section 8. Several appendices are included with separate files. proposal-korean-lgr-25jan18-en 1 / 73 1/17 2 Script for which the LGR is proposed ISO 15924 Code: Kore ISO 15924 Key Number: 287 (= 286 + 500) ISO 15924 English Name: Korean (alias for Hangul + Han) Native name of the script: 한글 + 한자 Maximal Starting Repertoire (MSR) version: MSR-2 [241] Note. -
Names in Toni Morrison's Novels: Connections
INFORMATION TO USERS This manuscript has been reproduced from the microfilm master. UMI films the text directly from the original or copy submitted. Thus, some thesis and dissertation copies are in typewriter face, while others may be from any type of computer printer. The quality or this reproduction is dependent upon the quaUty or the copy submitted. Broken or indistinct print, colored or poor quality illustrations and photographs, print bleedthrough, substandard margins, and improper alignment can adversely affect reproduction. In the unlikely. event that the author did not send UMI a complete manuscript and there are missing pages, these will be noted. Also, if unauthorized copyright material had to be removed, a note will indicate the deletion. Oversize materials (e.g., maps, drawings, charts) are reproduced by sectioning the original, beginning at the upper left-hand comer and continuing from left to right in equal sections with small overlaps. Each original is also photographed in one exposure and is included in reduced form at the back of the book. Photographs included in the original manuscript have been reproduced xerographically in this copy. Higher quality 6" x 9" black and white photographic prints are available for any photographs or illustrations appearing in this copy for an additional charge. Contact UMI directly to order. UMI A. Bell & Howell Information Company 300 North Zeeb Road. Ann Arbor. Ml48106·1346 USA 313!761·4700 8001521·0600 .. -------------------- ----- Order Number 9520522 Names in Toni Morrison's novels: Connections Clayton, Jane Burris, Ph.D. The University of North Carolina at Greensboro, 1994 Copyright @1994 by Clayton, Jane Burris.