WorldWideScience

Sample records for controlling stamen identity

  1. The corona of the daffodil Narcissus bulbocodium shares stamen-like identity and is distinct from the orthodox floral whorls.

    Science.gov (United States)

    Waters, Mark T; Tiley, Anna M M; Kramer, Elena M; Meerow, Alan W; Langdale, Jane A; Scotland, Robert W

    2013-05-01

    The structural homology of the daffodil corona has remained a source of debate throughout the history of botany. Over the years it has been separately referred to as a modified petal stipule, stamen and tepal. Here we provide insights from anatomy and molecular studies to clarify the early developmental stages and position of corona initiation in Narcissus bulbocodium. We demonstrate that the corona initiates as six separate anlagen from hypanthial tissue between the stamens and perianth. Scanning electron microscope images and serial sections demonstrate that corona initiation occurs late in development, after the other floral whorls are fully developed. To define more precisely the identity of the floral structures, daffodil orthologues of the ABC floral organ identity genes were isolated and expression patterns were examined in perianth, stamens, carpel, hypanthial tube and corona tissue. Coupled with in situ hybridisation experiments, these analyses showed that the expression pattern of the C-class gene NbAGAMOUS in the corona is more similar to that of the stamens than that of the tepals. In combination, our results demonstrate that the corona of the daffodil N. bulbocodium exhibits stamen-like identity, develops independently from the orthodox floral whorls and is best interpreted as a late elaboration of the region between the petals and stamens associated with epigyny and the hypanthium.

  2. Stamen development.

    NARCIS (Netherlands)

    Keijzer, C.J.

    1986-01-01

    In this thesis the development of the stamen is investigated, using structural and histochemical observations, micromanipulation and in-vitro culture.Formation and exposure of pollen are the two main goals of the developing stamen. The main processes of the pollen formation were already known. In th

  3. Gibberellin and Jasmonate Crosstalk during Stamen Development

    Institute of Scientific and Technical Information of China (English)

    Jinrong Peng

    2009-01-01

    Gibberellin (GA) and jasmonate (JA) are two types of phytohormones that play important roles during stamen development. For example, Arabidopsis plants deficient in either of GA or JA develop short stamens. An apparent question to ask is whether GA action and JA action during stamen filament development are independent of each other or are in a hierarchy. Recent studies showed that GA modulates the expression of genes essential for JA biosynthesis to promote JA production and high levels of JA will induce the expression of three MYB genes MYB21, MYB24 and MYB57. These three MYB genes are crucial factors for the normal development of stamen filament in Arabidopsis.

  4. Intrafloral differentiation of stamens in heterantherous fowers

    Institute of Scientific and Technical Information of China (English)

    Zhong-Lai LUO; Lei GU; Dian-Xiang ZHANG

    2009-01-01

    Flowers that have heteromorphic stamens (heterantherous flowers) have intrigued many researchers ever since the phenomenon was discovered in the 19th century. The morphological differentiation in androecia has been suggested as a reflection of "labor division" in pollination in which one type of stamens attracts pollina-tors and satisfies their demand for pollen as food and the other satisfies the plant's need for safe gamete dispersal. The extent and patterns of stamen differentiation differ notably among taxa with heterantherous flowers. Seven species with heteromorphic stamens in three genera were sampled from Leguminosae and Melastomataceae, and the morphological difference of androecia, pollen content, pollen histochemistry and viability, pollen micro-morphology, as well as the main pollinators were examined and compared. Pollen number differs significantly between stamen sets of the same flower in most species investigated, and a correlation of pollen number and anther size was substantiated. Higher pollen viabilities were found in the long (pollinating) stamens of Senna alata (L.) Roxb. and S. bicapsularis (L.) Roxb. Dimorphic pollen exine ornamentation is reported here for the first time in Fordiophytonfaberi Stapf. The height of stigma and anther tips of the long stamens in natural conditions was proved to be highly correlated, supporting the hypothesis that they contact similar areas of the pollinator's body.

  5. Stamen specification and anther development in rice

    Institute of Scientific and Technical Information of China (English)

    ZHANG DaBing; WILSON Zoe A

    2009-01-01

    Male reproductive development is a complex biological process which includes the formation of the stamen with differentiated anther tissues, in which microspores/pollens are generated, then anther dehiscence and subsequently pollination. Stamen specification and anther development involve a number of extraordinary events such as meristem transition, cell division and differentiation, cell to cell communication, etc., which need the cooperative interaction of sporophytic and gametophytic genes. The advent of various tools for rice functional gene identification, such as complete genome sequence, genome-wide microarrays, collections of mutants, has greatly facilitated our understanding of mechanisms of rice stamen specification and anther development. Male sterile lines are critical for hybrid rice breeding, therefore understanding these processes will not only contribute greatly to the basic knowledge of crop developmental biology, but also to the development of new varieties for hybrid rice breeding in the future.

  6. Expressions of ECE-CYC2 clade genes relating to abortion of both dorsal and ventral stamens in Opithandra (Gesneriaceae).

    Science.gov (United States)

    Song, Chun-Feng; Lin, Qi-Bing; Liang, Rong-Hua; Wang, Yin-Zheng

    2009-10-07

    ECE-CYC2 clade genes known in patterning floral dorsoventral asymmetry (zygomorphy) in Antirrhinum majus are conserved in the dorsal identity function including arresting the dorsal stamen. However, it remains uncertain whether the same mechanism underlies abortion of the ventral stamens, an important morphological trait related to evolution and diversification of zygomorphy in Lamiales sensu lato, a major clade of predominantly zygomorphically flowered angiosperms. Opithandra (Gesneriaceae) is of particular interests in addressing this question as it is in the base of Lamiales s.l., an early representative of this type zygomorphy. We investigated the expression patterns of four ECE-CYC2 clade genes and two putative target cyclinD3 genes in Opithandra using RNA in situ hybridization and RT-PCR. OpdCYC gene expressions were correlated with abortion of both dorsal and ventral stamens in Opithandra, strengthened by the negatively correlated expression of their putative target OpdcyclinD3 genes. The complement of OpdcyclinD3 to OpdCYC expressions further indicated that OpdCYC expressions were related to the dorsal and ventral stamen abortion through negative effects on OpdcyclinD3 genes. These results suggest that ECE-CYC2 clade TCP genes are not only functionally conserved in the dorsal stamen repression, but also involved in arresting ventral stamens, a genetic mechanism underlying the establishment of zygomorphy with abortion of both the dorsal and ventral stamens evolved in angiosperms, especially within Lamiales s.l.

  7. Expressions of ECE-CYC2 clade genes relating to abortion of both dorsal and ventral stamens in Opithandra (Gesneriaceae

    Directory of Open Access Journals (Sweden)

    Wang Yin-Zheng

    2009-10-01

    Full Text Available Abstract Background ECE-CYC2 clade genes known in patterning floral dorsoventral asymmetry (zygomorphy in Antirrhinum majus are conserved in the dorsal identity function including arresting the dorsal stamen. However, it remains uncertain whether the same mechanism underlies abortion of the ventral stamens, an important morphological trait related to evolution and diversification of zygomorphy in Lamiales sensu lato, a major clade of predominantly zygomorphically flowered angiosperms. Opithandra (Gesneriaceae is of particular interests in addressing this question as it is in the base of Lamiales s.l., an early representative of this type zygomorphy. Results We investigated the expression patterns of four ECE-CYC2 clade genes and two putative target cyclinD3 genes in Opithandra using RNA in situ hybridization and RT-PCR. OpdCYC gene expressions were correlated with abortion of both dorsal and ventral stamens in Opithandra, strengthened by the negatively correlated expression of their putative target OpdcyclinD3 genes. The complement of OpdcyclinD3 to OpdCYC expressions further indicated that OpdCYC expressions were related to the dorsal and ventral stamen abortion through negative effects on OpdcyclinD3 genes. Conclusion These results suggest that ECE-CYC2 clade TCP genes are not only functionally conserved in the dorsal stamen repression, but also involved in arresting ventral stamens, a genetic mechanism underlying the establishment of zygomorphy with abortion of both the dorsal and ventral stamens evolved in angiosperms, especially within Lamiales s.l.

  8. Control of patterning, growth, and differentiation by floral organ identity genes.

    Science.gov (United States)

    Sablowski, Robert

    2015-02-01

    In spite of the different morphologies of sepals, petals, stamens, and carpels, all these floral organs are believed to be modified versions of a ground-state organ similar to the leaf. Modifications of the ground-state developmental programme are orchestrated by different combinations of MADS-domain transcription factors encoded by floral organ identity genes. In recent years, much has been revealed about the gene regulatory networks controlled by the floral organ identity genes and about the genetic pathways that control leaf development. This review examines how floral organ identity is connected with the control of morphogenesis and differentiation of shoot organs, focusing on the model species Arabidopsis thaliana. Direct links have emerged between floral organ identity genes and genes involved in abaxial-adaxial patterning, organ boundary formation, tissue growth, and cell differentiation. In parallel, predictive models have been developed to explain how the activity of regulatory genes can be coordinated by intercellular signalling and constrained by tissue mechanics. When combined, these advances provide a unique opportunity for revealing exactly how leaf-like organs have been 'metamorphosed' into floral organs during evolution and showing crucial regulatory points in the generation of plant form. © The Author 2015. Published by Oxford University Press on behalf of the Society for Experimental Biology. All rights reserved. For permissions, please email: journals.permissions@oup.com.

  9. Transcriptomic analysis of heteromorphic stamens in Cassia biscapsularis L.

    Science.gov (United States)

    Luo, Zhonglai; Hu, Jin; Zhao, Zhongtao; Zhang, Dianxiang

    2016-08-16

    Hermaphroditic flowers have evolved primarily under the selection on male function. Evolutionary modification often leads to stamen differentiation within flowers, or "heteranthery", a phenomenon intrigued scientists since the 18(th) century until recently. However, the genetic basis and molecular regulation mechanism has barely been touched. Here we conducted comparative transcriptome profiling in Cassia biscapsularis L., a heterantherous species with representative patterns of stamen differentiation. Numerous differentially expressed genes (DEGs) were detected between the staminodes (the degenerated stamens) and fertile stamens, while much fewer genes differentially expressed among the three sets of fertile stamens. GO term enrichment and KEGG pathway analysis characterized functional properties of DEGs in different stamen types. Transcripts showing close correlation between expression pattern and stamen types were identified. Transcription factors from the bHLH family were suggested to have taken crucial part in the formation of staminodes. This first global transcriptomic analysis focusing on stamen differentiation opens the door toward a more comprehensive understanding on the molecular regulation of floral organ evolution. Especially, the generated unigene resource would be valuable for developing male sterile lines in agronomy.

  10. Molecular phenotypes associated with anomalous stamen development in Alternanthera philoxeroides

    Directory of Open Access Journals (Sweden)

    Zhu eZhu

    2015-04-01

    Full Text Available Alternanthera philoxeroides is a perennial amphibious weed native to South America but has now spread to diverse parts of the world. A. philoxeroides reproduces both sexually and asexually in its native range, but propagates solely through vegetative means in its introduced range. Traits associated with sexual reproduction become degraded for sexual dysfunction, with flowers possessing either pistillate stamens or male-sterile anthers. Degradations of sexual characters for loss of sexuality commonly take place in clonal plants. The underlying molecular-genetic processes remain largely unknown. We compared the gene expression profiles of abnormal stamens with that of normal stamens by RNA-Seq analysis, and identified a large number of differentially expressed genes between abnormal and normal stamens. In accordance with flower morphology, the expression of B-class MADS-box genes (ApAP3, ApTM6 and ApPI was markedly reduced in pistillate stamens. However, most of the genes involved in meiosis were expressed normally in stamens with male-sterile anthers. In addition to verifying the expression patterns of genes previously known to be related to stamen and pollen grain development, we also identified previously unknown molecular phenotypes associated with sexual dysfunction in A. philoxeroides, that is helpful for dissecting the molecular mechanisms underpinning various male-sterile phenotypes and the molecular processes underlying the transition from sexuality to asexuality in clonal plants.

  11. The ASK1 gene regulates development and interacts with the UFO gene to control floral organ identity in Arabidopsis.

    Science.gov (United States)

    Zhao, D; Yang, M; Solava, J; Ma, H

    1999-09-01

    Normal flower development likely requires both specific and general regulators. We have isolated an Arabidopsis mutant ask1-1 (for -Arabidopsis skp1-like1-1), which exhibits defects in both vegetative and reproductive development. In the ask1-1mutant, rosette leaf growth is reduced, resulting in smaller than normal rosette leaves, and internodes in the floral stem are shorter than normal. Examination of cell sizes in these organs indicates that cell expansion is normal in the mutant, but cell number is reduced. In the mutant, the numbers of petals and stamens are reduced, and many flowers have one or more petals with a reduced size. In addition, all mutant flowers have short stamen filaments. Furthermore, petal/stamen chimeric organs are found in many flowers. These results indicate that the ASK1 gene affects the size of vegetative and floral organs. The ask1 floral phenotype resembles somewhat that of the Arabidopsis ufo mutants in that both genes affect whorls 2 and 3. We therefore tested for possible interactions between ASK1 and UFO by analyzing the phenotypes of ufo-2 ask1-1 double mutant plants. In these plants, vegetative development is similar to that of the ask1-1 single mutant, whereas the floral defects are more severe than those in either single mutant. Interior to the first whorl, the double mutant flowers have more sepals or sepal-like organs than are found in ufo-2, and less petals than ask1-1. Our results suggest that ASK1 interacts with UFO to control floral organ identity in whorls 2 and 3. This is very intriguing because ASK1 is very similar in sequence to the yeast SKP1 protein and UFO contains an F-box, a motif known to interact with SKP1 in yeast. Although the precise mechanism of ASK1 and UFO action is unknown, our results support the hypothesis that these two proteins physically interact in vivo. Copyright 1999 Wiley-Liss, Inc.

  12. The pattern of vascular bundles in the stamens of Nymphaea lotus L. and its bearing on stamen morphology

    NARCIS (Netherlands)

    Heel, van W.A.

    1977-01-01

    In 1969 I published, together with P. G. Heinsbroek, a paper on the anatomy of the stamens of Victoria amazonica. The flowers used in that study came from plants which were cultivated in the green-house of the Leiden Botanic Garden. Because the possibility could not be excluded that the structures t

  13. Epigenetic control of cell identity and plasticity

    KAUST Repository

    Orlando, Valerio

    2014-04-02

    The DNA centered dogma for genetic information and cell identity is now evolving into a much more complex and flexible dimension provided by the discovery of the Epigenome. This comprises those chromosome structural and topological components that complement DNA information and contribute to genome functional organization. Current concept is that the Epigenome constitutes the dynamic molecular interface allowing the Genome to interact with the Environment. Exploring how the genome interacts with the environment is a key to fully understand cellular and complex organism mechanisms of adaptation and plasticity. Our work focuses on the role of an essential, specialized group or chromatin associated proteins named Polycomb (PcG) that control maintenance of transcription programs during development and in adult life. In particular PcG proteins exert epigenetic “memory” function by modifying chromosome structures at various levels to maintain gene silencing in particular through cell division. While in the past decade substantial progress was made in understanding PcG mechanisms acting in development and partially during cell cycle, very little is known about their role in adult post-mitotic tissues and more in general the role of the epigenome in adaptation. To this, we studied the role of PcG in the context of mammalian skeletal muscle cell differentiation. We previously reported specific dynamics of PRC2 proteins in myoblasts and myotubes, in particular the dynamics of PcG Histone H3 K27 Methyl Transferases (HMT), EZH2 and EZH1, the latter apparently replacing for EZH2 in differentiated myotubes. Ezh1 protein, although almost identical to Ezh2, shows a weak H3K27 HMT activity and its primary function remains elusive. Recent ChIPseq studies performed in differentiating muscle cells revealed that Ezh1 associates with active and not repressed regulatory regions to control RNA pol II elongation. Since H3K27 tri-methylation levels are virtually steady in non

  14. Floral development and morphology of Vochysiaceae. II. The position of the single fertile stamen.

    Science.gov (United States)

    Litt, Amy; Stevenson, Dennis W

    2003-11-01

    A conspicuous feature of Vochysiaceae flowers is their single fertile stamen. In some genera, the stamen is in front of a petal, whereas in others it is in front of a sepal. This difference has been attributed to two independent reductions, which implies the stamen is not homologous across the family. The observation that genera with an antesepalous stamen have only one petal, whereas those with an antepetalous stamen have three or five petals, led us to the hypothesis that in all genera the stamen arises in an antepetalous position, but that it is displaced during development in single-petaled taxa. We examined developing buds of five genera using scanning electron microscopy and serial sectioning and conclude that the stamen in all genera is fundamentally antepetalous. The stamen is not displaced. The petal, however, appears to be displaced in some genera. Further, the position of the fertile stamen in Erisma has been misinterpreted. We discuss the evolution of the androecium in this family in a phylogenetic context and consider the significance of symmetry and of loss vs. suppression in the development of Vochysiaceae flowers.

  15. Ectopic expression of SUPERMAN suppresses development of petals and stamens.

    Science.gov (United States)

    Yun, Jae-Young; Weigel, Detlef; Lee, Ilha

    2002-01-01

    The floral regulatory gene SUPERMAN (SUP) encodes a C2H2 type zinc finger protein that is required for maintaining boundaries between floral organs in Arabidopsis. It has been proposed that the main function of SUP is to balance cell proliferation in the third and fourth whorl of developing flowers, thereby maintaining the boundaries between the two whorls. To gain further insight into the function of SUP, we have ectopically expressed SUP using the promoter of APETALA1 (AP1), a gene that is initially expressed throughout floral meristems and later becomes restricted to the first and second whorls. Flowers of AP1::SUP plants have fewer floral organs, consistent with an effect of SUP on cell proliferation. In addition, the AP1::SUP transgene caused the conversion of petals to sepals and suppressed the development of stamens. The expression of the B function homeotic gene APETALA3 (AP3) and its regulator UNUSUAL FLORAL ORGANS (UFO) were delayed and reduced in AP1::SUP flowers. However, SUP does not act merely through UFO, as constitutive expression of UFO did not rescue the defects in petal and stamen development in AP1::SUP flowers. Together, these results suggest that SUP has both indirect and direct effects on the expression of B function homeotic genes.

  16. Risk, control and self-identity

    DEFF Research Database (Denmark)

    Fynbo, Lars

    2014-01-01

    follows Stephen Lyng’s concept of “edgework”, focusing on volitional risk taking and its effect on the acting individual’s self-identity. RESULTS - Drawing on the interviewees’ accounts of being arrested for drunk driving, the analysis discusses three different categories of young drunk drivers. Those...... over their lives. CONCLUSION - The study shows that young drunk drivers have different associations with DUI-related risks. The more constrained they feel in relation to society, the more likely it is that they will divorce negative experiences related to DUI such as being arrested or causing a traffic...

  17. Transcriptional and hormonal regulation of petal and stamen development by STAMENLESS, the tomato (Solanum lycopersicum L.) orthologue to the B-class APETALA3 gene.

    Science.gov (United States)

    Quinet, Muriel; Bataille, Gwennaël; Dobrev, Petre I; Capel, Carmen; Gómez, Pedro; Capel, Juan; Lutts, Stanley; Motyka, Václav; Angosto, Trinidad; Lozano, Rafael

    2014-06-01

    Four B-class MADS box genes specify petal and stamen organ identities in tomato. Several homeotic mutants affected in petal and stamen development were described in this model species, although the causal mutations have not been identified for most of them. In this study we characterized a strong stamenless mutant in the tomato Primabel cultivar (sl-Pr), which exhibited homeotic conversion of petals into sepals and stamens into carpels and we compared it with the stamenless mutant in the LA0269 accession (sl-LA0269). Genetic complementation analysis proved that both sl mutants were allelic. Sequencing revealed point mutations in the coding sequence of the Tomato APETALA3 (TAP3) gene of the sl-Pr genome, which lead to a truncated protein, whereas a chromosomal rearrangement in the TAP3 promoter was detected in the sl-LA0269 allele. Moreover, the floral phenotype of TAP3 antisense plants exhibited identical homeotic changes to sl mutants. These results demonstrate that SL is the tomato AP3 orthologue and that the mutant phenotype correlated to the SL silencing level. Expression analyses showed that the sl-Pr mutation does not affect the expression of other tomato B-class genes, although SL may repress the A-class gene MACROCALYX. A partial reversion of the sl phenotype by gibberellins, gene expression analysis, and hormone quantification in sl flowers revealed a role of phytohormones in flower development downstream of the SL gene. Together, our results indicated that petal and stamen identity in tomato depends on gene-hormone interactions, as mediated by the SL gene. © The Author 2014. Published by Oxford University Press on behalf of the Society for Experimental Biology.

  18. LEAFY controls floral meristem identity in Arabidopsis

    OpenAIRE

    Weigel, Detlef; Alvarez, John; Smyth, David R.; Yanofsky, Martin F.; Meyerowitz, Elliot M.

    1992-01-01

    The first step in flower development is the generation of a floral meristem by the inflorescence meristem. We have analyzed how this process is affected by mutant alleles of the Arabidopsis gene LEAFY. We show that LEAFY interacts with another floral control gene, APETALA1, to promote the transition from inflorescence to floral meristem. We have cloned the LEAFY gene, and, consistent with the mutant phenotype, we find that LEAFY RNA is expressed strongly in young flower primordia. LEAFY expre...

  19. Searching for the Self: An Identity Control Theory Approach to Triggers of Occupational Exploration

    Science.gov (United States)

    Anderson, Katherine L.; Mounts, Nina S.

    2012-01-01

    Identity control theory researchers have found evidence for two processes of identity development (identity defense and identity change) and have theorized a third process (identity exploration). College students (N = 123) self-rated as high or low in occupational identity certainty and importance received self-discrepant feedback to induce…

  20. Auxin Polar Transport In Stamen Formation And Development: How Many Actors?

    Directory of Open Access Journals (Sweden)

    Maura eCardarelli

    2014-07-01

    Full Text Available In flowering plants, proper development of stamens, the male reproductive organs, is required for successful sexual reproduction. In Arabidopsis thaliana normally six stamen primordia arise in the third whorl of floral organs and subsequently differentiate into stamen filaments and anthers, where male meiosis occurs, thus ending the early developmental phase. This early phase is followed by a late developmental phase, which consists of a rapid elongation of stamen filaments coordinated with anther dehiscence and pollen maturation, and terminates with mature pollen grain release at anthesis. Increasing evidence suggests that auxin transport is necessary for both early and late phases of stamen development. It has been shown that different members of PIN (PIN-FORMED family are involved in the early phase, whereas members of both PIN and P-glycoproteins of the ABCB (PGP transporter families are required during the late developmental phase. In this review we provide an overview of the increasing knowledge on auxin transporters involved in Arabidopsis stamen formation and development and we discuss their role and functional conservation across plant species.

  1. Distributed Control for Identical Dynamically Coupled Systems: A Decomposition Approach

    NARCIS (Netherlands)

    Massioni, P.; Verhaegen, M.

    2009-01-01

    We consider the problem of designing distributed controllers for a class of systems which can be obtained from the interconnection of a number of identical subsystems. If the state space matrices of these systems satisfy a certain structural property, then it is possible to derive a procedure for de

  2. Study of evolution and developmental mechanism of stamen in Salvia hypoleuca Benth. (Lamiaceae and related taxa using Electron Microscopy and molecular phylogenetic tools

    Directory of Open Access Journals (Sweden)

    Maryam-Sadat Asadollahi

    2014-11-01

    Full Text Available The genus Salvia L. includes a group of plants having two stamens with a special morphology. Natural groups within this genus consist of species with special type of stamen morphology. In this paper, phylogenetic placement and developmental stages of stamen of S. hypoleuca Benth. were studied. Examination of this and related species showed that each flower had two stamens with posterior thecae not expressed and the distal posterior ends of the adjacent connectives were fused into a complex structure blocking access to nectar. All species with such type of stamens grouped into a monophyletic clade with robust support. Study of stamen development in S. hypoleuca showed that normal, anterior thecae were evolved before the other organs and that the stamen found its final matured form before flower opened. In an opened flower, stamen and reproductive organs could be found in their final maturestage. In addition, it seemed that stamen development in related species should be similar.

  3. Restoration of stamen development and production of functional pollen in an alloplasmic CMS tobacco line by ectopic expression of the Arabidopsis thaliana SUPERMAN gene.

    Science.gov (United States)

    Bereterbide, Agnès; Hernould, Michel; Farbos, Isabelle; Glimelius, Kristina; Mouras, Armand

    2002-03-01

    The alloplasmic male-sterile tobacco line Nta(rep)S, combining the nucleus of Nicotiana tabacum with the cytoplasm of Nicotiana repanda, exhibits cadastral-type anomalies due to a fusion of several stamens with the pistil. These anomalies share similarities with Arabidopsis superman mutants. SUPERMAN (SUP) is a cadastral gene controlling the boundary between whorls 3 (androecium) and 4 (gynoecium). Thus we hypothesized that the expression of the tobacco SUP orthologue might be impaired in the alloplasmic Nta(rep)S line, and that the deficiency could be complemented by the Arabidopsis SUP gene. Here we show that the ectopic expression of SUP in the alloplasmic male-sterile tobacco line Nta(rep)S significantly increases the frequency of flowers possessing free stamens, inducing the recovery of a proper structure for whorls 3 and 4. Furthermore, flowers of transgenic plants show a significant improvement of the morphology of stamens, and more particularly of the anthers, which are able to produce few but functional pollen. The data show that ectopic expression of Arabidopsis SUP reactivates the regulatory cascade of anther development. The plausible causes of the developmental defects of anthers in the alloplasmic male-sterile tobacco line are discussed in relation to the model of regulation of the Arabidopsis SUP gene.

  4. Controllability of deterministic networks with the identical degree sequence.

    Directory of Open Access Journals (Sweden)

    Xiujuan Ma

    Full Text Available Controlling complex network is an essential problem in network science and engineering. Recent advances indicate that the controllability of complex network is dependent on the network's topology. Liu and Barabási, et.al speculated that the degree distribution was one of the most important factors affecting controllability for arbitrary complex directed network with random link weights. In this paper, we analysed the effect of degree distribution to the controllability for the deterministic networks with unweighted and undirected. We introduce a class of deterministic networks with identical degree sequence, called (x,y-flower. We analysed controllability of the two deterministic networks ((1, 3-flower and (2, 2-flower by exact controllability theory in detail and give accurate results of the minimum number of driver nodes for the two networks. In simulation, we compare the controllability of (x,y-flower networks. Our results show that the family of (x,y-flower networks have the same degree sequence, but their controllability is totally different. So the degree distribution itself is not sufficient to characterize the controllability of deterministic networks with unweighted and undirected.

  5. Controllability of deterministic networks with the identical degree sequence.

    Science.gov (United States)

    Ma, Xiujuan; Zhao, Haixing; Wang, Binghong

    2015-01-01

    Controlling complex network is an essential problem in network science and engineering. Recent advances indicate that the controllability of complex network is dependent on the network's topology. Liu and Barabási, et.al speculated that the degree distribution was one of the most important factors affecting controllability for arbitrary complex directed network with random link weights. In this paper, we analysed the effect of degree distribution to the controllability for the deterministic networks with unweighted and undirected. We introduce a class of deterministic networks with identical degree sequence, called (x,y)-flower. We analysed controllability of the two deterministic networks ((1, 3)-flower and (2, 2)-flower) by exact controllability theory in detail and give accurate results of the minimum number of driver nodes for the two networks. In simulation, we compare the controllability of (x,y)-flower networks. Our results show that the family of (x,y)-flower networks have the same degree sequence, but their controllability is totally different. So the degree distribution itself is not sufficient to characterize the controllability of deterministic networks with unweighted and undirected.

  6. Efficient identity management and access control in cloud environment

    Science.gov (United States)

    Gloster, Jonathan

    2013-05-01

    As more enterprises are enticed to move data to a cloud environment to enhance data sharing and reduce operating costs by exploiting shared resources, concerns have risen over the ability to secure information within the cloud. This paper examines how a traditional Identity and Access Control (IDAM) architecture can be adapted to address security concerns of a cloud environment. We propose changing the paradigm of IDAM form a pure trust model to a risk based model will enable information to be protected securely in a cloud environment without impacting efficiencies of cloud environments.

  7. Self-control as a moderator of the relationship between drinking identity and alcohol use.

    Science.gov (United States)

    Foster, Dawn W; Young, Chelsie M; Bärnighausen, Till W

    2014-08-01

    This study evaluated self-control in the relationship between drinking identity and drinking. We expected those higher in drinking identity would drink more than those lower in drinking identity, particularly if low in self-control. Data were collected in 2012 via an online survey (N = 690 undergraduates, M age = 22.87, SD = 5.37, 82.50% female) at an urban university. An interaction emerged between self-control and drinking identity; self-control was negatively associated with drinking among individuals low in drinking identity, but positively associated with drinking among those high in drinking identity. Implications and future directions are discussed. This research was unfunded.

  8. Isorhamnetin glycosides with free radical and ONOO-scavenging activities from the stamens of Nelumbo nucifera.

    Science.gov (United States)

    Hyun, Sook Kyung; Jung, Yu Jung; Chung, Hae Young; Jung, Hyun Ah; Choi, Jae Sue

    2006-04-01

    In this study, we isolated two new isorhamnetin glycosides, designated as nelumboroside A (3) and nelumboroside B (4), as well as the previously-characterized isorhamnetin glucoside (1) and isorhamnetin rutinoside (2), from the n-BuOH fraction of Nelumbo nucifera stamens. The structures of the two new compounds were then determined, using chemical and spectroscopic techniques. All isolated isorhamnetin glycosides 1-4 showed marked antioxidant activities in the DPPH, and ONOO- assays.

  9. Evolution of stamen number in Ptychospermatinae (Arecaceae): insights from a new molecular phylogeny of the subtribe.

    Science.gov (United States)

    Alapetite, Elodie; Baker, William J; Nadot, Sophie

    2014-07-01

    The palm subtribe Ptychospermatinae (Arecaceae: Arecoideae) is naturally distributed in the South West Pacific area and contains 12 genera and around 60 species, including numerous popular ornamentals. Like many palms, Ptychospermatinae flowers are small, trimerous, unisexual and always grouped into inflorescences of various sizes. However they exhibit a wide diversity in stamen number (a few to several dozen or even hundreds) that is poorly understood from an evolutionary point of view. Although advances have been made in elucidating phylogenetic relationships within Ptychospermatinae, some relationships among and within genera still remain to be clarified. Here we used a combination of five nuclear markers (nrITS2, the conserved nuclear intron BRSC10 and three low copy genes, PRK, RPB2 and AGAMOUS) and three chloroplast markers (matK, ndhA and rps15-ycf1) to propose a new phylogenetic hypothesis for the subtribe. The combination of all these markers improved the resolution and robustness of phylogenetic relationships within the subtribe, allowing us to identify four major clades. This phylogenetic framework was used to examine the evolution of stamen number in the clade. The optimization of stamen number on the phylogeny highlighted the high level of interspecific variability, showing that the character is highly labile and raising questions about the evolutionary and functional significance of this lability.

  10. The systematic wood anatomy of the Moraceae (Urticales) IV. Genera of the tribe Moreae with urticaceous stamens

    NARCIS (Netherlands)

    Welle, ter B.J.H.; Koek-Noorman, J.; Topper, S.M.C.

    1983-01-01

    The wood anatomy of the genera of the tribe Moreae with urticaceous stamens, viz. Broussonetia, Madura s.l. (including Cardiogyne, Chlorophora, and Cudrania), Malaisia, Milicia, Morus, Olmedia, Pachytrophe, Plecospermum, Sloetiopsis, Streblus s.l. (including Paratrophis, Phyllochlamys, Pseudostreblu

  11. Control of cell identity in pancreas development and regeneration.

    Science.gov (United States)

    Stanger, Ben Z; Hebrok, Matthias

    2013-06-01

    The endocrine and exocrine cells in the adult pancreas are not static, but can change their differentiation state in response to injury or stress. This concept of cells in flux means that there may be ways to generate certain types of cells (such as insulin-producing β-cells) and prevent formation of others (such as transformed neoplastic cells). We review different aspects of cell identity in the pancreas, discussing how cells achieve their identity during embryonic development and maturation, and how this identity remains plastic, even in the adult pancreas.

  12. Remote Control: Identity, Power, and Technology in the Communication Classroom

    Science.gov (United States)

    Wood, Andrew F.; Fassett, Deanna L.

    2003-01-01

    Instructional communication researchers, by focusing attention on "how-to" matters and forays into conventional areas of study (i.e., immediacy, apprehension), neglect a nuanced treatment of student and teacher identity. Such a perspective is relatively disembodied and fails to engage actual classroom interactions. By engaging in autoethnographic…

  13. Identity's identities

    DEFF Research Database (Denmark)

    Jensen, Kim Ebensgaard

    in Academic English and more everyday-based English, identity as a lexeme is definitely worth having a look at. This paper presents a lexicological study of identity in which some of its senses are identified and their behaviors in actual discourse are observed. Drawing on data from the 2011 section...... of the Corpus of Contemporary American English, a behavioral profile of the distributional characteristics of identity is set up. Behavioral profiling is a lexicographical method developed by the corpus linguist Stefan Th. Gries which, by applying semantic ID tagging and statistical analysis, provides a fine......-grained insight into the semantic affinities of one or more lexemes. The main premise is that the semantic properties of a linguistic unit are reflected in its distributional characteristics, and, thus, by observing association patterns of a lexeme we can gain useful insights into its semantic affinities. Thus...

  14. Self-control and implicit drinking identity as predictors of alcohol consumption, problems, and cravings

    NARCIS (Netherlands)

    Lindgren, K.P.; Neighbors, C.; Westgate, E.; Salemink, E.

    2014-01-01

    Objective: We investigated trait and alcohol-specific self-control as unique predictors and moderators of the relation between implicit drinking identity associations and drinking. Method: Three hundred undergraduates completed a drinking identity Implicit Association Test (IAT), trait and alcohol

  15. Self-control and implicit drinking identity as predictors of alcohol consumption, problems, and cravings

    NARCIS (Netherlands)

    K.P. Lindgren; C. Neighbors; E. Westgate; E. Salemink

    2014-01-01

    Objective: We investigated trait and alcohol-specific self-control as unique predictors and moderators of the relation between implicit drinking identity associations and drinking. Method: Three hundred undergraduates completed a drinking identity Implicit Association Test (IAT), trait and alcohol s

  16. Identity Change

    Science.gov (United States)

    Burke, Peter J.

    2006-01-01

    This research examines two mechanisms by which persons' identities change over time. First, on the basis of identity control theory (ICT), I hypothesize that while identities influence the way in which a role is played out, discrepancies between the meanings of the identity standard and the meanings of the role performance will result in change.…

  17. Distributed Cooperative Control of Nonlinear and Non-identical Multi-agent Systems

    DEFF Research Database (Denmark)

    Bidram, Ali; Lewis, Frank; Davoudi, Ali

    2013-01-01

    to the synchronization problem for an identical linear multi-agent system. The controller for each agent is designed to be fully distributed, such that each agent only requires its own information and the information of its neighbors. The proposed control method is exploited to implement the secondary voltage control......This paper exploits input-output feedback linearization technique to implement distributed cooperative control of multi-agent systems with nonlinear and non-identical dynamics. Feedback linearization transforms the synchronization problem for a nonlinear and heterogeneous multi-agent system...... for electric power microgrids. The effectiveness of the proposed control is verified by simulating a microgrid test system....

  18. Plant neighbour identity matters to belowground interactions under controlled conditions.

    Directory of Open Access Journals (Sweden)

    Cristina Armas

    Full Text Available BACKGROUND: Root competition is an almost ubiquitous feature of plant communities with profound effects on their structure and composition. Far beyond the traditional view that plants interact mainly through resource depletion (exploitation competition, roots are known to be able to interact with their environment using a large variety of mechanisms that may inhibit or enhance access of other roots to the resource or affect plant growth (contest interactions. However, an extensive analysis on how these contest root interactions may affect species interaction abilities is almost lacking. METHODOLOGY/PRINCIPAL FINDINGS: In a common garden experiment with ten perennial plant species we forced pairs of plants of the same or different species to overlap their roots and analyzed how belowground contest interactions affected plant performance, biomass allocation patterns, and competitive abilities under abundant resource supply. Our results showed that net interaction outcome ranged from negative to positive, affecting total plant mass and allocation patterns. A species could be a strong competitor against one species, weaker against another one, and even facilitator to a third species. This leads to sets of species where competitive hierarchies may be clear but also to groups where such rankings are not, suggesting that intransitive root interactions may be crucial for species coexistence. CONCLUSIONS/SIGNIFICANCE: The outcome of belowground contest interactions is strongly dependent on neighbours' identity. In natural plant communities this conditional outcome may hypothetically help species to interact in non-hierarchical and intransitive networks, which in turn might promote coexistence.

  19. Identity driven Capability based Access Control (ICAC) Scheme for the Internet of Things

    DEFF Research Database (Denmark)

    Mahalle, Parikshit N.; Anggorojati, Bayu; Prasad, Neeli R.

    2012-01-01

    Internet of Things (IoT) becomes discretionary part of everyday life. Scalability and manageability is daunting due to unbounded number of devices and services. Access control and authorization in IoT with least privilege is equally important to establish secure communication between multiple...... devices and services. In this paper, the concept of capability for access control is introduced where the identities of the involved devices are entrenched in the access capabilities. Identity driven capability based access control (ICAC) scheme presented in this paper helps to alleviate issues related...

  20. Epigenetic Control of Smooth Muscle Cell Identity and Lineage Memory.

    Science.gov (United States)

    Gomez, Delphine; Swiatlowska, Pamela; Owens, Gary K

    2015-12-01

    Vascular smooth muscle cells (SMCs), like all cells, acquire a cell-specific epigenetic signature during development that includes acquisition of a unique repertoire of histone and DNA modifications. These changes are postulated to induce an open chromatin state (referred to as euchromatin) on the repertoire of genes that are expressed in differentiated SMC, including SMC-selective marker genes like Acta2 and Myh11, as well as housekeeping genes expressed by most cell types. In contrast, genes that are silenced in differentiated SMC acquire modifications associated with a closed chromatin state (ie, heterochromatin) and transcriptional silencing. Herein, we review mechanisms that regulate epigenetic control of the differentiated state of SMC. In addition, we identify some of the major limitations in the field and future challenges, including development of innovative new tools and approaches, for performing single-cell epigenetic assays and locus-selective editing of the epigenome that will allow direct studies of the functional role of specific epigenetic controls during development, injury repair, and disease, including major cardiovascular diseases, such as atherosclerosis, hypertension, and microvascular disease, associated with diabetes mellitus.

  1. Sub-functionalization to ovule development following duplication of a floral organ identity gene.

    Science.gov (United States)

    Galimba, Kelsey D; Di Stilio, Verónica S

    2015-09-01

    Gene duplications result in paralogs that may be maintained due to the gain of novel functions (neo-functionalization) or the partitioning of ancestral function (sub-functionalization). Plant genomes are especially prone to duplication; paralogs are particularly widespread in the floral MADS box transcription factors that control organ identity through the ABC model of flower development. C class genes establish stamen and carpel identity and control floral meristem determinacy, and are largely conserved across the angiosperm phylogeny. Originally, an additional D class had been identified as controlling ovule identity; yet subsequent studies indicated that both C and D lineage genes more commonly control ovule development redundantly. The ranunculid Thalictrum thalictroides has two orthologs of the Arabidopsis thaliana C class gene AGAMOUS (AG), ThtAG1 and ThtAG2 (Thalictrum thalictroides AGAMOUS1/2). We previously showed that ThtAG1 exhibits typical C class function; here we examine the role of its paralog, ThtAG2. Our phylogenetic analysis shows that ThtAG2 falls within the C lineage, together with ThtAG1, and is consistent with previous findings of a Ranunculales-specific duplication in this clade. However, ThtAG2 is not expressed in stamens, but rather solely in carpels and ovules. This female-specific expression pattern is consistent with D lineage genes, and with other C lineage genes known to be involved in ovule identity. Given the divergent expression of ThtAG2, we tested the hypothesis that it has acquired ovule identity function. Molecular evolution analyses showed evidence of positive selection on ThtAG2-a pattern that supports divergence of function by sub-functionalization. Down-regulation of ThtAG2 by virus-induced gene silencing resulted in homeotic conversions of ovules into carpel-like structures. Taken together, our results suggest that, although ThtAG2 falls within the C lineage, it has diverged to acquire "D function" as an ovule identity gene

  2. Arterial identity of endothelial cells is controlled by local cues.

    Science.gov (United States)

    Othman-Hassan, K; Patel, K; Papoutsi, M; Rodriguez-Niedenführ, M; Christ, B; Wilting, J

    2001-09-15

    The ephrins and their Eph receptors comprise the largest family of receptor tyrosine kinases. Studies on mice have revealed an important function of ephrin-B2 and Eph-B4 for the development of the arterial and venous vasculature, respectively, but the mechanisms regulating their expression have not been studied yet. We have cloned a chick ephrin-B2 cDNA probe. Expression was observed in endothelial cells of extra- and intraembryonic arteries and arterioles in all embryos studied from day 2 (stage 10 HH, before perfusion of the vessels) to day 16. Additionally, expression was found in the somites and neural tube in early stages, and later also in the smooth muscle cells of the aorta, parts of the Müllerian duct, dosal neural tube, and joints of the limbs. We isolated endothelial cells from the internal carotid artery and the vena cava of 14-day-old quail embryos and grafted them separately into day-3 chick embryos. Reincubation was performed until day 6 and the quail endothelial cells were identified with the QH1 antibody. The grafted arterial and venous endothelial cells expressed ephrin-B2 when they integrated into the lining of arteries. Cells that were not integrated into vessels, or into vessels other than arteries, were ephrin-B2-negative. The studies show that the expression of the arterial marker ephrin-B2 is controlled by local cues in arterial vessels of older embryos. Physical forces or the media smooth muscle cells may be involved in this process.

  3. A Systematic Approach to Identify Candidate Transcription Factors that Control Cell Identity

    Directory of Open Access Journals (Sweden)

    Ana C. D’Alessio

    2015-11-01

    Full Text Available Hundreds of transcription factors (TFs are expressed in each cell type, but cell identity can be induced through the activity of just a small number of core TFs. Systematic identification of these core TFs for a wide variety of cell types is currently lacking and would establish a foundation for understanding the transcriptional control of cell identity in development, disease, and cell-based therapy. Here, we describe a computational approach that generates an atlas of candidate core TFs for a broad spectrum of human cells. The potential impact of the atlas was demonstrated via cellular reprogramming efforts where candidate core TFs proved capable of converting human fibroblasts to retinal pigment epithelial-like cells. These results suggest that candidate core TFs from the atlas will prove a useful starting point for studying transcriptional control of cell identity and reprogramming in many human cell types.

  4. Antioxidant activity and DNA fingerprint of four varieties of lotus stamens (Nelumbo nucifera Gaertn.

    Directory of Open Access Journals (Sweden)

    Nithida Phonkot

    2008-01-01

    Full Text Available DNA fingerprints of stamens of four varieties of Nelumbo nucifera (Gaertn were established and their antioxidant activity was studied. PCR amplification was used for identification of Lotus DNA by using OPS3, OPS11, OPS13 and OPE3 random decamer-primers. The result showed variety-specific markers of Pathum, Sattabongkot, Boontharik and Sattabuut varieties. The antioxidant activities of solutions in methanol and mixed-solvent of the four varieties were determined by 2,2-diphenyl-1-picrylhydrazyl (DPPH model. The antioxidant activities (IC50 of methanol solution of the four varieties were 68.306.30, 62.224.00, 31.603.40 and 40.901.50 g.mL-1, respectively, whereas those of the mixed-solvent solution were 2.210.06, 2.230.05, 1.290.02 and 1.830.07 mg.mL-1. The result showed that IC50 of both solutions of Sattabongkot were significantly low (p<0.05, at the confidence level of 95%, indicating a higher activity than the others.

  5. Determination of flavonoids in stamen, gynoecium, and petals of Magnolia grandiflora L. and their associated antioxidant and hepatoprotection activities

    Directory of Open Access Journals (Sweden)

    Nadia M. Sokkar

    2014-01-01

    Full Text Available Chromatographic analysis of flavonoids in ethyl acetate fractions of the stamen, gynoecium, and petal of Magnolia grandiflora L. by HPLC-PDA-MS/MS-ESI in the negative ionization mode was performed in this study. The results revealed the presence of eight flavonoids: apigenin 8-C-glucoside, luteolin 8-C-glucoside, quercetin 3-O-rutinoside, quercetin 3-O-galactoside, quercetin, 3-O-glucoside, kaempferol 3-O-rutinoside, isorhamnetin 3-O-glucoside, and isorhamnetin. Their quantification revealed that luteolin 8-C-glucoside is the major flavonoid and that the total phenolic content is concentrated primarily in the stamen. The antioxidant and hepatoprotective effects of ethanolic extract of the flower organs were evaluated against hepatotoxicity induced by CCl4, compared with the effects of silymarin.

  6. Cucumber SUPERMAN has conserved function in stamen and fruit development and a distinct role in floral patterning.

    Directory of Open Access Journals (Sweden)

    Jianyu Zhao

    Full Text Available The Arabidopsis SUPERMAN (SUP gene encodes a C2H2 type zinc finger protein that is required for maintaining the boundaries between stamens and carpels, and for regulating development of ovule outer integument. Orthologs of SUP have been characterized in bisexual flowers as well as dioecious species, but it remains elusive in monoecious plants with unisexual flowers on the same individual. Here we isolate the SUP ortholog in Cucumis sativus L (CsSUP, a monoecious vegetable. CsSUP is predominantly expressed in female specific organs: the female flower buds and ovules. Ectopic expression of CsSUP in Arabidopsis can partially complement the fruit development in sup-5 mutant, and its over-expression in wide-type leads to reduced silique length, suppressed stamen development and distorted petal patterning. Our data suggest that CsSUP plays conserved as well as distinct roles during flower and fruit development, and it may function in the boundaries and ovules to balance petal patterning, stamen and ovule development in Arabidopsis.

  7. Cucumber SUPERMAN has conserved function in stamen and fruit development and a distinct role in floral patterning.

    Science.gov (United States)

    Zhao, Jianyu; Liu, Meiling; Jiang, Li; Ding, Lian; Yan, Shuang Shuang; Zhang, Juan; Dong, Zhaobin; Ren, Huazhong; Zhang, Xiaolan

    2014-01-01

    The Arabidopsis SUPERMAN (SUP) gene encodes a C2H2 type zinc finger protein that is required for maintaining the boundaries between stamens and carpels, and for regulating development of ovule outer integument. Orthologs of SUP have been characterized in bisexual flowers as well as dioecious species, but it remains elusive in monoecious plants with unisexual flowers on the same individual. Here we isolate the SUP ortholog in Cucumis sativus L (CsSUP), a monoecious vegetable. CsSUP is predominantly expressed in female specific organs: the female flower buds and ovules. Ectopic expression of CsSUP in Arabidopsis can partially complement the fruit development in sup-5 mutant, and its over-expression in wide-type leads to reduced silique length, suppressed stamen development and distorted petal patterning. Our data suggest that CsSUP plays conserved as well as distinct roles during flower and fruit development, and it may function in the boundaries and ovules to balance petal patterning, stamen and ovule development in Arabidopsis.

  8. High-performance liquid chromatographic determination of β-carotene content in four varieties of lotus stamens

    Directory of Open Access Journals (Sweden)

    Nithida Phonkot

    2010-08-01

    Full Text Available A high-performance liquid chromatography method was developed to determine -carotene content in lotus stamens.The stamens of four varieties of Nelumbo nucifera (Gaertn. and ten samples bought from traditional drug stores were determined.Validation of the method was carried out, the linearity of the -carotene concentrations range from 6.50-58.50 g.mL-1were 0.9997-0.9998. The repeatability and intermediate precision were 0.29 %CV (n=9 and 7.48 %CV (n=9, respectively; theaccuracy was 100.10 %w/w, the detection limit was 9.83 ng.mL-1 and the quantitation limit was 29.80 ng.mL-1. The -caroteneof the four varieties were 465.77-1150.80 mg% (n=3, and of the store samples were 4.70-41.73 mg% (n=3. The resultsdemonstrated that the contents varied according to the variety. The contents in the samples obtained from traditionaldrug stores were much lower that those dried in our laboratory, this might due to the source of the stamens, duration, andconditions of storages.

  9. Parental control mechanisms and their reflection on identity styles of Turkish adolescents

    Directory of Open Access Journals (Sweden)

    Hacer Nermin Çelen

    2009-04-01

    Full Text Available Research has shown that authoritarian parents limit their children's freedom of expression and monitor their children's behavior according to their rules. Children of authoritative families tend to have high self-esteem and refer to internalized norms. Parenting is a cultural product. In this study the model presented is limited in the sense that it does not consider the cultural diversity. We must evaluate the identity not only with perceived parenting style but also within the socio-cultural context. The present study explored the relationships between identity styles and perceived parenting control patterns in late adolescents. Responses of 402 Turkish university students to the Berzonsky's Identity Style Inventory were factor-analyzed, and patterns of correlations between four identity statuses, Steinberg's Authoritative Parenting Scale, and Kağitçibaş1's Authoritarianism Scale and parental education were examined. The findings are discussed in relation to ways of incorporating the cultural context into the study of identity development.

  10. Biocontrol of fouling pests: Effect of diversity, identity and density of control agents.

    Science.gov (United States)

    Atalah, Javier; Newcombe, Emma M; Zaiko, Anastasija

    2016-04-01

    Augmentative biocontrol, using native natural enemies, has been suggested as a promising tool to control marine biofouling pests on artificial structures. However, there are still important knowledge gaps to be addressed before biocontrol can be considered as a management tool. In a field experiment on floating marine structures we examined intra- and interspecific consumer interactions among biocontrol agents on different surface orientations. We tested the effect of identity, density and diversity of three invertebrates (the 11-arm seastar Coscinasterias muricata, the sea urchin Evechinus chloroticus and the gastropod Cook's turban Cookia sulcata) to reduce established biofouling and to prevent fouling growth on defouled surfaces. High densities of biocontrol agents were not more effective at fouling control (cover and biomass) than low densities. Nor did multi-species treatments function more effectively than mono-specific ones. However, biocontrol agent identity was important, with the 11-arm seastar and Cook's turban being the most effective at fouling reduction and prevention, respectively. Surface orientation had a strong effect on the effectiveness of control agents, with the best results obtained on vertical compared to diagonal and underside surfaces. This study confirmed the potential of biocontrol as a management tool for marine pest, indicating that identity is more important than richness and density of control agents. It also highlighted the limitations of this approach on diagonal and underside surfaces, where control agents have limited retention ability.

  11. Anticancer activity of Nelumbo nucifera stamen extract in human colon cancer HCT-116 cells in vitro

    Science.gov (United States)

    Zhao, Xin; Feng, Xia; Wang, Cun; Peng, Deguang; Zhu, Kai; Song, Jia-Le

    2017-01-01

    The aim of the present study was to investigate the anticancer activities of Nelumbo nucifera (Ba lotus) stamen ethanol crude extract (BLSEE) in human colon carcinoma HCT-116 cells. MTT assay, flow cytometry analysis and reverse transcription-polymerase chain reaction assay were employed to investigate the anticancer mechanisms of BLSEE (100, 200 and 400 µg/ml) in HCT-116 cells. BLSEE reduced HCT-116 cell proliferation in a dose-dependent manner. BLSEE treatment also significantly increased the sub-G1 population in HCT-116 cells (P=0.0020 at 400 µg/ml), as shown by flow cytometry assay. Following treatment with BLSEE, the mRNA levels of the apoptosis-associated factors Fas, Fas ligand, tumor necrosis factor-related apoptosis-inducing ligand, death receptor 4 (DR4), death receptor 5 (DR5), caspases 3, 8 and 9, and B-cell lymphoma-2 (Bcl-2) associated X protein were increased, and the expression of anti-apoptotic Bcl-2 and Bcl-extra large was decreased in HCT-116 cells. The mRNA levels of matrix metalloproteinase (MMP)-2, MMP-9, TIMP metallopeptidase inhibitor 1 and TIMP metallopeptidase inhibitor 2 were also regulated by BLSEE treatment. In addition, BLSEE was able to modulate the expression of inflammation-associated nuclear factor-κB, inhibitory κBα, inducible nitric oxide synthase and cyclooxygenase 2 in HCT-116 cells. The present study clearly indicated the cytotoxicity of BLSEE in HCT-116 cells through induced cellular apoptosis. These results also suggested the BLSEE may be a powerful agent against colon cancer cells. PMID:28454279

  12. Poppy APETALA1/FRUITFULL orthologs control flowering time, branching, perianth identity, and fruit development.

    Science.gov (United States)

    Pabón-Mora, Natalia; Ambrose, Barbara A; Litt, Amy

    2012-04-01

    Several MADS box gene lineages involved in flower development have undergone duplications that correlate with the diversification of large groups of flowering plants. In the APETALA1 gene lineage, a major duplication coincides with the origin of the core eudicots, resulting in the euFUL and the euAP1 clades. Arabidopsis FRUITFULL (FUL) and APETALA1 (AP1) function redundantly in specifying floral meristem identity but function independently in sepal and petal identity (AP1) and in proper fruit development and determinacy (FUL). Many of these functions are largely conserved in other core eudicot euAP1 and euFUL genes, but notably, the role of APETALA1 as an "A-function" (sepal and petal identity) gene is thought to be Brassicaceae specific. Understanding how functional divergence of the core eudicot duplicates occurred requires a careful examination of the function of preduplication (FUL-like) genes. Using virus-induced gene silencing, we show that FUL-like genes in opium poppy (Papaver somniferum) and California poppy (Eschscholzia californica) function in axillary meristem growth and in floral meristem and sepal identity and that they also play a key role in fruit development. Interestingly, in opium poppy, these genes also control flowering time and petal identity, suggesting that AP1/FUL homologs might have been independently recruited in petal identity. Because the FUL-like gene functional repertoire encompasses all roles previously described for the core eudicot euAP1 and euFUL genes, we postulate subfunctionalization as the functional outcome after the major AP1/FUL gene lineage duplication event.

  13. Individual identity and organisational control: empowerment and modernisation in a primary care trust.

    Science.gov (United States)

    McDonald, Ruth

    2004-11-01

    The notion of empowerment has been increasingly used within management discourses in recent years. Enthusiastic supporters conceive it as an acknowledgement of the individual employee as a talented, creative being, and hence a productive resource for contributing to organisational goals. Alternatively, more critical commentators have interpreted it as another means of exercising control over employees and their identities. Although various commentators have speculated on the management of identity as a means of organizational control, there is very little empirical work from which to draw conclusions. This paper, using participant observation and interview data, represents a contribution to the small body of empirical research in the area. It focuses on an initiative aimed ostensibly at 'empowering' staff in an English Primary Care Trust, which may be seen as an attempt at increasing organisational control by shaping employee identities. As such, these processes can be understood more readily in terms of ethics rather than empowerment. The term ethics is used here in a Foucauldian sense and is linked to the processes of self-definition and self-constraint by which individuals train themselves to become ethical persons. The paper suggests that the outcome of attempts to manufacture particular forms of subjectivity by such methods as 'empowerment' programmes may be very different from those intended.

  14. Identity Development as a Buffer of Adolescent Risk Behaviors in the Context of Peer Group Pressure and Control

    Science.gov (United States)

    Dumas, Tara M.; Ellis, Wendy E.; Wolfe, David A.

    2012-01-01

    We examined identity development as a moderator of the relation between peer group pressure and control and adolescents' engagement in risk behaviors. Participants (n = 1070; M[subscript age] = 15.45 years) completed a self-report measure of "identity exploration", the degree to which they have explored a variety of self-relevant values, beliefs…

  15. Identity Development as a Buffer of Adolescent Risk Behaviors in the Context of Peer Group Pressure and Control

    Science.gov (United States)

    Dumas, Tara M.; Ellis, Wendy E.; Wolfe, David A.

    2012-01-01

    We examined identity development as a moderator of the relation between peer group pressure and control and adolescents' engagement in risk behaviors. Participants (n = 1070; M[subscript age] = 15.45 years) completed a self-report measure of "identity exploration", the degree to which they have explored a variety of self-relevant values, beliefs…

  16. Identity Establishment and Capability Based Access Control (IECAC) Scheme for Internet of Things

    DEFF Research Database (Denmark)

    Mahalle, Parikshit N.; Anggorojati, Bayu; Prasad, Neeli R.

    2012-01-01

    and denial of service attacks, the concept of capability for access control is introduced. This paper presents Identity establishment and capability based access control (IECAC) protocol using ECC (Elliptical Curve Cryptography) for IoT along with protocol evaluation, which protect against the aforementioned......Internet of Things (IoT) become discretionary part of everyday life and could befall a threat if security is not considered before deployment. Authentication and access control in IoT is equally important to establish secure communication between devices. To protect IoT from man in middle, replay...... attacks. The protocol evaluation by using security protocol verification tool shows that IECAC is secure against these attacks. This paper also discusses performance analysis of the protocol in terms of computational time and compared with other existing solutions....

  17. Why do adolescents gather information or stick to parental norms? Examining autonomous and controlled motives behind adolescents' identity style.

    Science.gov (United States)

    Smits, Ilse; Soenens, Bart; Vansteenkiste, Maarten; Luyckx, Koen; Goossens, Luc

    2010-11-01

    Self-determination theory (SDT) distinguishes between autonomous and controlled reasons for people's behavior and essentially states that beneficial effects for individuals' psychosocial adjustment will accrue when behavior is guided by autonomous (rather than controlled) motives. The present study tested this assumption in the area of adolescents' identity styles. In a sample of mid-adolescents (N = 247; 53% female), it was found that the motives for using an information-oriented or a normative identity style explained additional variance beyond the identity styles as such in two of the adjustment outcomes examined. Specifically, autonomous motives underlying these two identity styles were positively related to commitment and personal well-being, whereas controlled motives were negatively related to these same adjustment outcomes. Perceived autonomy-supportive parenting was examined as a possible antecedent of the motives behind identity styles. Consistent with hypotheses, it was found that autonomy-supportive parenting was positively related to autonomous motives and negatively to controlled motives underlying identity styles. Implications for future research on the motivational dynamics behind identity development are discussed.

  18. Identity Authentication and Capability Based Access Control (IACAC) for the Internet of Things

    DEFF Research Database (Denmark)

    Mahalle, Parikshit N.; Anggorojati, Bayu; Prasad, Neeli R.

    2013-01-01

    and weak physical security of low power devices in IoT networks are possible sources for security vulnerabilities. It is promising to make an authentication and access control attack resistant and lightweight in a resource constrained and distributed IoT environment. This paper presents the Identity...... is secure against aforementioned attacks. This paper also discusses performance analysis of the protocol in terms of computational time compared to other existing solutions. Furthermore, this paper addresses challenges in IoT and security attacks are modelled with the use cases to give an actual view of IoT......In the last few years the Internet of Things (IoT) has seen widespread application and can be found in each field. Authentication and access control are important and critical functionalities in the context of IoT to enable secure communication between devices. Mobility, dynamic network topology...

  19. KLF2 and KLF4 control endothelial identity and vascular integrity

    Science.gov (United States)

    Sangwung, Panjamaporn; Zhou, Guangjin; Nayak, Lalitha; Chan, E. Ricky; Kang, Dong-Won; Zhang, Rongli; Lu, Yuan; Sugi, Keiki; Fujioka, Hisashi; Shi, Hong; Lapping, Stephanie D.; Ghosh, Chandra C.; Higgins, Sarah J.; Parikh, Samir M.; Jain, Mukesh K.

    2017-01-01

    Maintenance of vascular integrity in the adult animal is needed for survival, and it is critically dependent on the endothelial lining, which controls barrier function, blood fluidity, and flow dynamics. However, nodal regulators that coordinate endothelial identity and function in the adult animal remain poorly characterized. Here, we show that endothelial KLF2 and KLF4 control a large segment of the endothelial transcriptome, thereby affecting virtually all key endothelial functions. Inducible endothelial-specific deletion of Klf2 and/or Klf4 reveals that a single allele of either gene is sufficient for survival, but absence of both (EC-DKO) results in acute death from myocardial infarction, heart failure, and stroke. EC-DKO animals exhibit profound compromise in vascular integrity and profound dysregulation of the coagulation system. Collectively, these studies establish an absolute requirement for KLF2/4 for maintenance of endothelial and vascular integrity in the adult animal. PMID:28239661

  20. Flower development and perianth identity candidate genes in the basal angiosperm Aristolochia fimbriata (Piperales: Aristolochiaceae

    Directory of Open Access Journals (Sweden)

    Natalia ePabón-Mora

    2015-12-01

    Full Text Available Aristolochia fimbriata (Aristolochiaceae: Piperales exhibits highly synorganized flowers with a single convoluted structure forming a petaloid perianth that surrounds the gynostemium, putatively formed by the congenital fusion between stamens and the upper portion of the carpels. Here we present the flower development and morphology of A. fimbriata, together with the expression of the key regulatory genes that participate in flower development, particularly those likely controlling perianth identity. A. fimbriata is a member of the magnoliids, and thus gene expression detected for all ABCE MADS-box genes in this taxon, can also help to elucidate patterns of gene expression prior the independent duplication of these genes in eudicots and monocots. Using both floral development and anatomy in combination with the isolation of MADS-box gene homologs, gene phylogenetic analyses and expression studies (both by reverse transcription PCR and in situ hybridization we present hypotheses on floral organ identity genes involved in the formation of this bizarre flower. We found that most MADS-box genes were expressed in vegetative and reproductive tissues with the exception of AfimSEP2, AfimAGL6 and AfimSTK transcripts that are only found in flowers and capsules but are not detected in leaves. Two genes show ubiquitous expression; AfimFUL that is found in all floral organs at all developmental stages as well as in leaves and capsules and AfimAG that has low expression in leaves and is found in all floral organs at all stages with a considerable reduction of expression in the limb of anthetic flowers. Our results indicate that expression of AfimFUL is indicative of pleiotropic roles and not of a perianth identity specific function. On the other hand, expression of B-class genes, AfimAP3 and AfimPI, suggests their conserved role in stamen identity and corroborates that the perianth is sepal and not petal-derived. Our data also postulates an AGL6 ortholog as a

  1. An identity concerning controllability observability and coprimeness of linear systems and its applications

    Institute of Scientific and Technical Information of China (English)

    Bin ZHOU; Guangren DUAN; Shenmin SONG

    2007-01-01

    It is shown in this paper that any state space realization (A, b, c) of a given transfer function T(s) = β(s)/α(s)with α(s) monic and dim(A) = deg(α(s)), satisfies the identity β(A) = Qc(A, b)SαQο(A, c) where Qc(A, b) and Qο(A, c) are the controllability matrix and observability matrix of the matrix triple (A, b, c), respectively, and Sα is a nonsingular symmetric matrix. Such an identity gives a deep relationship between the state space description and the transfer function description of single-input single-output (SISO) linear systems. As a direct conclusion, we arrive at the well-known result that a realization of any transfer function is minimal if and only if the numerator and the denominator of the transfer function is coprime. Such a result is also extended to the SISO descriptor linear system case. As an applications,a complete solution to the commuting matrix equation AX = XA is proposed and the minimal realization of multi-input multi-output (MIMO) linear system is considered.

  2. Super-enhancers in the control of cell identity and disease.

    Science.gov (United States)

    Hnisz, Denes; Abraham, Brian J; Lee, Tong Ihn; Lau, Ashley; Saint-André, Violaine; Sigova, Alla A; Hoke, Heather A; Young, Richard A

    2013-11-07

    Super-enhancers are large clusters of transcriptional enhancers that drive expression of genes that define cell identity. Improved understanding of the roles that super-enhancers play in biology would be afforded by knowing the constellation of factors that constitute these domains and by identifying super-enhancers across the spectrum of human cell types. We describe here the population of transcription factors, cofactors, chromatin regulators, and transcription apparatus occupying super-enhancers in embryonic stem cells and evidence that super-enhancers are highly transcribed. We produce a catalog of super-enhancers in a broad range of human cell types and find that super-enhancers associate with genes that control and define the biology of these cells. Interestingly, disease-associated variation is especially enriched in the super-enhancers of disease-relevant cell types. Furthermore, we find that cancer cells generate super-enhancers at oncogenes and other genes important in tumor pathogenesis. Thus, super-enhancers play key roles in human cell identity in health and in disease.

  3. Illusionary delusions. Willingness to exercise self-control can mask effects of glucose on self-control performance in experimental paradigms that use identical self-control tasks.

    Science.gov (United States)

    Chatzisarantis, Nikos L D; Hagger, Martin S

    2015-01-01

    The purpose of the present article is to highlight limitations of Lange and Eggert's methodology of using identical self-control tasks in testing effects of glucose on depletion of self-control resources and self-control performance. We suggest that when participants engage in two identical self-control tasks, cognitions developed during initial act of self-control may mask the effects of glucose on self-control performance by undermining willingness to exert effort during the second act of self-control. As a consequence, glucose may increase ability to exercise self-control but participants may not want to capitalize on this "ability advantage" because they are unwilling to exercise self-control. The present article concludes that researchers who test the glucose hypothesis in the context of a depletion paradigm should employ dissimilar acts of self-control and ensure that depleted participants are sufficiently motivated to exercise self-control. Crown Copyright © 2014. Published by Elsevier Ltd. All rights reserved.

  4. Mediator subunit18 controls flowering time and floral organ identity in Arabidopsis.

    Directory of Open Access Journals (Sweden)

    Zhengui Zheng

    Full Text Available Mediator is a conserved multi-protein complex that plays an important role in regulating transcription by mediating interactions between transcriptional activator proteins and RNA polymerase II. Much evidence exists that Mediator plays a constitutive role in the transcription of all genes transcribed by RNA polymerase II. However, evidence is mounting that specific Mediator subunits may control the developmental regulation of specific subsets of RNA polymerase II-dependent genes. Although the Mediator complex has been extensively studied in yeast and mammals, only a few reports on Mediator function in flowering time control of plants, little is known about Mediator function in floral organ identity. Here we show that in Arabidopsis thaliana, MEDIATOR SUBUNIT 18 (MED18 affects flowering time and floral organ formation through FLOWERING LOCUS C (FLC and AGAMOUS (AG. A MED18 loss-of-function mutant showed a remarkable syndrome of later flowering and altered floral organ number. We show that FLC and AG mRNA levels and AG expression patterns are altered in the mutant. Our results support parallels between the regulation of FLC and AG and demonstrate a developmental role for Mediator in plants.

  5. A Network Topology Control and Identity Authentication Protocol with Support for Movable Sensor Nodes

    Directory of Open Access Journals (Sweden)

    Ying Zhang

    2015-12-01

    Full Text Available It is expected that in the near future wireless sensor network (WSNs will be more widely used in the mobile environment, in applications such as Autonomous Underwater Vehicles (AUVs for marine monitoring and mobile robots for environmental investigation. The sensor nodes’ mobility can easily cause changes to the structure of a network topology, and lead to the decline in the amount of transmitted data, excessive energy consumption, and lack of security. To solve these problems, a kind of efficient Topology Control algorithm for node Mobility (TCM is proposed. In the topology construction stage, an efficient clustering algorithm is adopted, which supports sensor node movement. It can ensure the balance of clustering, and reduce the energy consumption. In the topology maintenance stage, the digital signature authentication based on Error Correction Code (ECC and the communication mechanism of soft handover are adopted. After verifying the legal identity of the mobile nodes, secure communications can be established, and this can increase the amount of data transmitted. Compared to some existing schemes, the proposed scheme has significant advantages regarding network topology stability, amounts of data transferred, lifetime and safety performance of the network.

  6. Institutional Level Identity Control Strategies in the Distance Education Environment: A Survey of Administrative Staff

    Directory of Open Access Journals (Sweden)

    Alexander Amigud

    2013-12-01

    Full Text Available Physical separation of students and instructors creates the gap of anonymity and limited control over the remote learning environment. The ability of academic institutions to authenticate students and validate authorship of academic work at various points during a course is necessary for preserving not only perceived credibility but also public safety. With the growing scope of distance education programs that permeate critical areas such as healthcare, airspace, water management, and food solutions, universities have a moral obligation to employ secure measures to verify learning outcomes. This study examines the measures universities with large distance education programs employ to align identity of learners with the academic work they do, as well as the effectiveness of and challenges and barriers to their implementation. The research was undertaken using a multiple case approach and examined survey responses from five academic administrators at five officially accredited post secondary institutions in three countries. The cases examined in the study include: Athabasca University, Open University UK, Penn State University World Campus, University of Maryland University College, and eConcordia, Concordia University’s distance learning facility. This study is not an exhaustive attempt to examine all aspects of academic integrity, but rather to create awareness about various learner authentication strategies. This study confirms that secure learner authentication in the distance education environment is possible. However, with greater pressure to enhance security of learner authentication, the openness of open learning is challenged and may change as we know it.

  7. A Network Topology Control and Identity Authentication Protocol with Support for Movable Sensor Nodes.

    Science.gov (United States)

    Zhang, Ying; Chen, Wei; Liang, Jixing; Zheng, Bingxin; Jiang, Shengming

    2015-12-01

    It is expected that in the near future wireless sensor network (WSNs) will be more widely used in the mobile environment, in applications such as Autonomous Underwater Vehicles (AUVs) for marine monitoring and mobile robots for environmental investigation. The sensor nodes' mobility can easily cause changes to the structure of a network topology, and lead to the decline in the amount of transmitted data, excessive energy consumption, and lack of security. To solve these problems, a kind of efficient Topology Control algorithm for node Mobility (TCM) is proposed. In the topology construction stage, an efficient clustering algorithm is adopted, which supports sensor node movement. It can ensure the balance of clustering, and reduce the energy consumption. In the topology maintenance stage, the digital signature authentication based on Error Correction Code (ECC) and the communication mechanism of soft handover are adopted. After verifying the legal identity of the mobile nodes, secure communications can be established, and this can increase the amount of data transmitted. Compared to some existing schemes, the proposed scheme has significant advantages regarding network topology stability, amounts of data transferred, lifetime and safety performance of the network.

  8. Identity crisis: user perspectives on multiplicity and control in federated identitymanagement

    DEFF Research Database (Denmark)

    Howard, Steve; Satchell, C; Shanks, G

    2009-01-01

    Federated identity management systems synthesise complex and fragmented user information into a single entity. Literature from the provider’s perspective notes this integration extends many benefits to the end user and the privileges provided by digital identity authentication schemes have been...... well documented from this perspective. Less explored are the perceptions of federation from the user’s perspective. This study reports an empirical user study that examines the relationship between identity and technology using contextual interviews, focus groups and cultural probes. It emerges...

  9. The Control of Relationship between Social Capital and the Rate of Collective Identity

    Directory of Open Access Journals (Sweden)

    Jafar Hezarjaribi

    2011-07-01

    The results show that in general social capital has a direct and meaningful effect on collection identity. These results generally can be deduced in such a way that the studied students relatively have the three kinds of ethno, national and global identity that doesn't have distinguished opposition against the other and also doesn't refuse each other but they lie in returnable mood.

  10. Antagonistic effects of ethyl methanesulfonate and maleic hydrazide in inducing somatic mutations in the stamen hairs of Tradescantia clone BNL 4430

    OpenAIRE

    市川, 定夫

    1998-01-01

    Mutagenic interaction between ethyl methanesulfonate (EMS; a monofunctional alkylating agent) and maleic hydrazide (MH; a promutagen activated into a mutagen in plants highly likely by peroxidase) was studied in the stamen hairs of Tradescantia clone BNL 4430, a blue/pink heterozygote. Since EMS has been shown to act synergistically with X rays in inducing mutations, and mutagenic synergisms have also been observed between X rays and MH by exposing to X rays before MH treatments, EMS and MH w...

  11. Correlational study and randomised controlled trial for understanding and changing red meat consumption: The role of eating identities.

    Science.gov (United States)

    Carfora, V; Caso, D; Conner, M

    2017-02-01

    The present studies aimed to contribute to the literature on psychological variables involved in reducing red meat consumption (RMC). Study 1 investigated whether the theory of planned behaviour (TPB), plus healthy-eating and meat-eating identities, could explain intentions to reduce RMC. Study 2 evaluated the effectiveness of an SMS text message intervention on self-monitoring to reduce RMC. In Study 1, data were collected daily using online food diaries for one week and a TPB questionnaire. Study 2 was a randomised controlled trial assessing pre- and post-RMC and TPB constructs by online food diaries and questionnaires over a one-week period. Participants were Italian undergraduates in each study (Study 1: N = 405; Study 2: N = 244). In Study 2, participants were randomly allocated to control and message condition groups. Participants in the message condition group received a daily SMS, which reminded them to monitor RMC, while participants in the control group did not receive any message. Only students who completed all measures were considered in the analyses (Study 1: N = 342; Study 2: N = 228). Study 1 showed that affective and instrumental attitudes, perceived behavioural control, and meat-eating identity explained intentions to reduce RMC, while subjective norm, past behaviour, and healthy-eating identity did not. Study 2 showed that an SMS intervention was effective in increasing intentions and reducing RMC. Mediation analyses indicated partial serial mediation through healthy-eating and meat-eating identities and intentions. The present studies provide support for the predictive validity of TPB in explaining intentions to reduce RMC and for the efficacy of an SMS intervention targeting self-monitoring in reducing RMC. Findings confirmed the important role of eating identities in explaining intentions to reduce RMC and in changing this behaviour. Copyright © 2017 Elsevier Ltd. All rights reserved.

  12. Zebrafish Sox7 and Sox18 function together to control arterial-venous identity.

    Science.gov (United States)

    Pendeville, Hélène; Winandy, Marie; Manfroid, Isabelle; Nivelles, Olivier; Motte, Patrick; Pasque, Vincent; Peers, Bernard; Struman, Ingrid; Martial, Joseph A; Voz, Marianne L

    2008-05-15

    Sox7 and Sox18 are members of the F-subgroup of Sox transcription factors family and are mostly expressed in endothelial compartments. In humans, dominant mutations in Sox18 are the underlying cause of the severe hypotrichosis-lymphedema-telangiectasia disorder characterized by vascular defects. However little is known about which vasculogenic processes Sox7 and Sox18 regulate in vivo. We cloned the orthologs of Sox7 and Sox18 in zebrafish, analysed their expression pattern and performed functional analyses. Both genes are expressed in the lateral plate mesoderm during somitogenesis. At later stages, Sox18 is expressed in all axial vessels whereas Sox7 expression is mainly restricted to the dorsal aorta. Knockdown of Sox7 or Sox18 alone failed to reveal any phenotype. In contrast, blocking the two genes simultaneously led to embryos displaying dysmorphogenesis of the proximal aorta and arteriovenous shunts, all of which can account for the lack of circulation observed in the trunk and tail. Gene expression analyses performed with general endothelial markers on double morphants revealed that Sox7 and Sox18 are dispensable for the initial specification and positioning of the major trunk vessels. However, morphants display ectopic expression of the venous Flt4 marker in the dorsal aorta and a concomitant reduction of the artery-specific markers EphrinB2a and Gridlock. The striking similarities between the phenotype of Sox7/Sox18 morphants and Gridlock mutants strongly suggest that Sox7 and Sox18 control arterial-venous identity by regulating Gridlock expression.

  13. Quality of Participation in Youth Organizations: Relationships with Identity and Sense of Sociopolitical Control

    Science.gov (United States)

    Martínez, M. Loreto; Loyola, Luis Ignacio; Cumsille, Patricio

    2017-01-01

    Through a cross-sectional design, this study examines whether practices of active participation (AP; that is, opportunities for decision making and leadership) and quality of relationships (QR) established between members of youth organizations (i.e., affective and instrumental support) relate to dimensions of youth's identity (i.e., personal…

  14. Quantum Type Indeterminacy in Dynamic Decision-Making: Self-Control through Identity Management

    Directory of Open Access Journals (Sweden)

    Jerome Busemeyer

    2012-05-01

    Full Text Available The Type Indeterminacy model is a theoretical framework that uses some elements of quantum formalism to model the constructive preference perspective suggested by Kahneman and Tversky. In a dynamic decision context, type indeterminacy induces a game with multiple selves associated with a state transition process. We define a Markov perfect equilibrium among the selves with individual identity (preferences as the state variable. The approach allows to characterize generic personality types and derive some comparative static results.

  15. Parental control mechanisms and their reflection on identity styles of Turkish adolescents

    OpenAIRE

    Hacer Nermin Çelen; Muharrem Ersin Kuşdil

    2009-01-01

    Research has shown that authoritarian parents limit their children's freedom of expression and monitor their children's behavior according to their rules. Children of authoritative families tend to have high self-esteem and refer to internalized norms. Parenting is a cultural product. In this study the model presented is limited in the sense that it does not consider the cultural diversity. We must evaluate the identity not only with perceived parenting style but also within the socio-cultura...

  16. Antecedents of self identity and consequences for action control: an application of the theory of planned behaviour in the exercise domain

    NARCIS (Netherlands)

    de Bruijn, G.-J.; Verkooijen, K.; de Vries, N.K.; van den Putte, B.

    2012-01-01

    Objectives To study whether exercise action control profiles should be usefully extended to include exercise identity. Further, this study investigated theory of planned behaviour antecedents of exercise identity. Design Prospective data from 413 undergraduate students (M age = 21.4; 73.5% females).

  17. Antecedents of self identity and consequences for action control: An application of the theory of planned behaviour in the exercise domain

    NARCIS (Netherlands)

    Bruijn, de G.J.; Verkooijen, K.T.; Putte, van den B.; Vries, de N.K.

    2012-01-01

    Objectives: To study whether exercise action control profiles should be usefully extended to include exercise identity. Further, this study investigated theory of planned behaviour antecedents of exercise identity. Design: Prospective data from 413 undergraduate students (M age ¼ 21.4; 73.5% females

  18. Antecedents of self identity and consequences for action control: An application of the theory of planned behaviour in the exercise domain

    NARCIS (Netherlands)

    Bruijn, de G.J.; Verkooijen, K.T.; Putte, van den B.; Vries, de N.K.

    2012-01-01

    Objectives: To study whether exercise action control profiles should be usefully extended to include exercise identity. Further, this study investigated theory of planned behaviour antecedents of exercise identity. Design: Prospective data from 413 undergraduate students (M age ¼ 21.4; 73.5%

  19. Antecedents of self identity and consequences for action control: an application of the theory of planned behaviour in the exercise domain

    NARCIS (Netherlands)

    de Bruijn, G.-J.; Verkooijen, K.; de Vries, N.K.; van den Putte, B.

    2012-01-01

    Objectives To study whether exercise action control profiles should be usefully extended to include exercise identity. Further, this study investigated theory of planned behaviour antecedents of exercise identity. Design Prospective data from 413 undergraduate students (M age = 21.4; 73.5% females).

  20. The Arabidopsis SET-domain protein ASHR3 is involved in stamen development and interacts with the bHLH transcription factor ABORTED MICROSPORES (AMS).

    Science.gov (United States)

    Thorstensen, Tage; Grini, Paul E; Mercy, Inderjit S; Alm, Vibeke; Erdal, Sigrid; Aasland, Rein; Aalen, Reidunn B

    2008-01-01

    The Arabidopsis thaliana genome contains more than 30 genes encoding SET-domain proteins that are thought to be epigenetic regulators of gene expression and chromatin structure. SET-domain proteins can be divided into subgroups, and members of the Polycomb group (PcG) and trithorax group (trxG) have been shown to be important regulators of development. Both in animals and plants some of these proteins are components of multimeric protein complexes. Here, we have analyzed the Arabidopsis trxG protein ASHR3 which has a SET domain and pre- and post-SET domains similar to that of Ash1 in Drosophila. In addition to the SET domain, a divergent PHD finger is found in the N-terminus of the ASHR3 protein. As expected from SET-domain proteins involved in transcriptional activation, ASHR3 (coupled to GFP) localizes to euchromatin. A yeast two-hybrid screening revealed that the ASHR3 protein interacts with the putative basic helix-loop-helix (bHLH) transcription factor ABORTED MICROSPORES (AMS), which is involved in anther and stamen development in Arabidopsis. Deletion mapping indicated that both the PHD finger and the SET domain mediate the interaction between the two proteins. Overexpression of ASHR3 led in general to growth arrest, and specifically to degenerated anthers and male sterility. Expression analyses demonstrated that ASHR3 like AMS is expressed in the anther and in stamen filaments. We therefore propose that AMS can target ASHR3 to chromatin and regulate genes involved in stamen development and function.

  1. Control of flower development and phyllotaxy by meristem identity genes in antirrhinum.

    Science.gov (United States)

    Carpenter, R; Copsey, L; Vincent, C; Doyle, S; Magrath, R; Coen, E

    1995-01-01

    The flower meristem identity genes floricaula (flo) and squamosa (squa) promote a change in phyllotaxy from spiral to whorled in Antirrhinum. To determine how this might be achieved, we have performed a combination of morphological, genetic, and expression analyses. Comparison of the phenotypes and RNA expression patterns of single and double mutants with the wild type showed that flo and squa act together to promote flower development but that flo is epistatic to squa with respect to early effects on phyllotaxy. We propose that a common process underlies the phyllotaxy of wildtype, flo, and squa meristem development but that the relative timing of primordium initiation or growth is altered. This process depends on two separable events: setting aside zones for potential primordium initiation and partitioning these zones into discrete primordia. Failure of the second event can lead to the formation of continuous double spirals, which are occasionally seen in flo mutants. PMID:8718618

  2. The Neuropeptide Corazonin Controls Social Behavior and Caste Identity in Ants.

    Science.gov (United States)

    Gospocic, Janko; Shields, Emily J; Glastad, Karl M; Lin, Yanping; Penick, Clint A; Yan, Hua; Mikheyev, Alexander S; Linksvayer, Timothy A; Garcia, Benjamin A; Berger, Shelley L; Liebig, Jürgen; Reinberg, Danny; Bonasio, Roberto

    2017-08-10

    Social insects are emerging models to study how gene regulation affects behavior because their colonies comprise individuals with the same genomes but greatly different behavioral repertoires. To investigate the molecular mechanisms that activate distinct behaviors in different castes, we exploit a natural behavioral plasticity in Harpegnathos saltator, where adult workers can transition to a reproductive, queen-like state called gamergate. Analysis of brain transcriptomes during the transition reveals that corazonin, a neuropeptide homologous to the vertebrate gonadotropin-releasing hormone, is downregulated as workers become gamergates. Corazonin is also preferentially expressed in workers and/or foragers from other social insect species. Injection of corazonin in transitioning Harpegnathos individuals suppresses expression of vitellogenin in the brain and stimulates worker-like hunting behaviors, while inhibiting gamergate behaviors, such as dueling and egg deposition. We propose that corazonin is a central regulator of caste identity and behavior in social insects. Copyright © 2017 Elsevier Inc. All rights reserved.

  3. Modal identities for elastic bodies, with application to vehicle dynamics and control

    Science.gov (United States)

    Hughes, P. C.

    1980-01-01

    It is a standard procedure to analyze a flexible vehicle in terms of its vibration frequencies and mode shapes. However, the entire mode shape is not needed per se, but two integrals of the mode shape, pi and hi, which correspond to the momentum and angular momentum in Mode i. Together with the natural frequencies omega-i, these modal parameters satisfy several important identities, 25 of which are derived in this paper. Expansions in terms of both constrained and unconstrained modes are considered. A simple illustrative example is included. The paper concludes with some remarks on the theoretical and practical utility of these results, and several potential extensions to the theory are suggested.

  4. Homeotic-like modification of stamens to petals is associated with aberrant mitochondrial gene expression in cytoplasmic male sterile Ogura Brassica juncea

    Indian Academy of Sciences (India)

    Gargi Meur; K. Gaikwad; S. R. Bhat; S. Prakash; P. B. Kirti

    2006-08-01

    We have previously reported correction of severe leaf chlorosis in the cytoplasmic male sterile Ogura (also called Ogu) Brassica juncea line carrying Ogura cytoplasm by plastid substitution via protoplast fusion. Two cybrids obtained from the fusion experiment, Og1 and Og2, were green and carried the plastid genome of B. juncea cv. RLM198. While Og1 displayed normal flower morphology comparable to that of its euplasmic B. juncea counterpart except for sterile anthers, Og2 retained homeotic-like floral modification of stamens to petal-like structures and several other floral deformities observed in the chlorotic (Ogu) B. juncea cv. RLM198 (or OgRLM). With respect to the mitochondrial genome, Og1 showed 81% genetic similarity to the fertile cultivar RLM while Og2 showed 93% similarity to OgRLM. In spite of recombination and rearrangements in the mitochondrial genomes in the cybrids, expression patterns of 10 out of 11 mitochondrial genes were similar in all the three CMS lines; the only exception was atp6, whose expression was altered. While Og1 showed normal atp6 transcript similar to that in RLM, in Og2 and OgRLM weak expression of a longer transcript was detected. These results suggest that the homeotic-like changes in floral patterning leading to petaloid stamens in Og2 and OgRLM may be associated with aberrant mitochondrial gene expression.

  5. Hard Identity and Soft Identity

    Directory of Open Access Journals (Sweden)

    Hassan Rachik

    2006-04-01

    Full Text Available Often collective identities are classified depending on their contents and rarely depending on their forms. Differentiation between soft identity and hard identity is applied to diverse collective identities: religious, political, national, tribal ones, etc. This classification is made following the principal dimensions of collective identities: type of classification (univocal and exclusive or relative and contextual, the absence or presence of conflictsof loyalty, selective or totalitarian, objective or subjective conception, among others. The different characteristics analysed contribute to outlining an increasingly frequent type of identity: the authoritarian identity.

  6. The Interaction of Control Systems and Stakeholder Networks in Shaping the Identities of Self-managed Teams

    DEFF Research Database (Denmark)

    Annosi, Maria Carmela; Foss, Nicolai Juul; Brunetta, Federica

    2017-01-01

    Team identity has received little research attention even though an increasing number of firms are moving to team-based organizations and there is evidence that teams form identities. We explore the extent to which team identity can be institutionalized as a central organizing principle of team......-based firms. We argue that managerial and stakeholder interventions shape the self-construction of team identity as well as the team’s commitment to specific work objectives. We also suggest that team identity becomes isomorphic to organizational identity because of pressures related to: (1) the presence...... of a dense network of managers and stakeholders, which orients teams towards a focus on certain aspects of the higher-order identity; (2) the use of team routines and regular feedback loops, which force alignment with the organizational identity; and (3) the use of coordinating roles aimed at promoting...

  7. The Interaction of Control Systems and Stakeholder Networks in Shaping the Identities of Self-Managed Teams

    NARCIS (Netherlands)

    Annosi, Maria Carmela; Foss, Nicolai; Brunetta, Federica; Magnusson, Mats

    2017-01-01

    Team identity has received little research attention even though an increasing number of firms are moving to team-based organizations and there is evidence that teams form identities. We explore the extent to which team identity can be institutionalized as a central organizing principle of

  8. OTX2 Transcription Factor Controls Regional Patterning within the Medial Ganglionic Eminence and Regional Identity of the Septum

    Directory of Open Access Journals (Sweden)

    Renée V. Hoch

    2015-07-01

    Full Text Available The Otx2 homeodomain transcription factor is essential for gastrulation and early neural development. We generated Otx2 conditional knockout (cKO mice to investigate its roles in telencephalon development after neurulation (approximately embryonic day 9.0. We conducted transcriptional profiling and in situ hybridization to identify genes de-regulated in Otx2 cKO ventral forebrain. In parallel, we used chromatin immunoprecipitation sequencing to identify enhancer elements, the OTX2 binding motif, and de-regulated genes that are likely direct targets of OTX2 transcriptional regulation. We found that Otx2 was essential in septum specification, regulation of Fgf signaling in the rostral telencephalon, and medial ganglionic eminence (MGE patterning, neurogenesis, and oligodendrogenesis. Within the MGE, Otx2 was required for ventral, but not dorsal, identity, thus controlling the production of specific MGE derivatives.

  9. Risk, control and self-identity: Young drunk drivers’ experiences with driving under the influence of alcohol and drugs

    Directory of Open Access Journals (Sweden)

    Fynbo Lars

    2014-06-01

    Full Text Available AIM - This article explores how young Danish drunk (and drug drivers relate to the risk of driving under the influence (DUI. DESIGN - The study is based on qualitative interviews with 25 convicted drunk drivers who in 2010 participated in mandatory alcohol and traffic safety courses. The analysis follows Stephen Lyng’s concept of “edgework”, focusing on volitional risk taking and its effect on the acting individual’s self-identity. RESULTS - Drawing on the interviewees’ accounts of being arrested for drunk driving, the analysis discusses three different categories of young drunk drivers. Those in the first category view a DUI arrest as a loss of control and a reminder of the risk of DUI. Those in the second present DUI as a reaction to what they perceive as untenable social demands. Those in the third see loss of control - such as causing a traffic accident - as the ultimate way of claiming control over their lives. CONCLUSION - The study shows that young drunk drivers have different associations with DUI-related risks. The more constrained they feel in relation to society, the more likely it is that they will divorce negative experiences related to DUI such as being arrested or causing a traffic accident.

  10. Is it Trauma- or Fantasy-based? Comparing dissociative identity disorder, post-traumatic stress disorder, simulators, and controls.

    Science.gov (United States)

    Vissia, E M; Giesen, M E; Chalavi, S; Nijenhuis, E R S; Draijer, N; Brand, B L; Reinders, A A T S

    2016-08-01

    The Trauma Model of dissociative identity disorder (DID) posits that DID is etiologically related to chronic neglect and physical and/or sexual abuse in childhood. In contrast, the Fantasy Model posits that DID can be simulated and is mediated by high suggestibility, fantasy proneness, and sociocultural influences. To date, these two models have not been jointly tested in individuals with DID in an empirical manner. This study included matched groups [patients (n = 33) and controls (n = 32)] that were compared on psychological Trauma and Fantasy measures: diagnosed genuine DID (DID-G, n = 17), DID-simulating healthy controls (DID-S, n = 16), individuals with post-traumatic stress disorder (PTSD, n = 16), and healthy controls (HC, n = 16). Additionally, personality-state-dependent measures were obtained for DID-G and DID-S; both neutral personality states (NPS) and trauma-related personality states (TPS) were tested. For Trauma measures, the DID-G group had the highest scores, with TPS higher than NPS, followed by the PTSD, DID-S, and HC groups. The DID-G group was not more fantasy-prone or suggestible and did not generate more false memories. Malingering measures were inconclusive. Evidence consistently supported the Trauma Model of DID and challenges the core hypothesis of the Fantasy Model. © 2016 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.

  11. Reputation Management and Content Control: An Analysis of Radiation Oncologists' Digital Identities.

    Science.gov (United States)

    Prabhu, Arpan V; Kim, Christopher; De Guzman, Eison; Zhao, Eric; Madill, Evan; Cohen, Jonathan; Hansberry, David R; Agarwal, Nitin; Heron, Dwight E; Beriwal, Sushil

    2017-08-19

    Google is the most popular search engine in the United States, and patients are increasingly relying on online webpages to seek information about individual physicians. This study aims to characterize what patients find when they search for radiation oncologists online. The Centers for Medicare and Medicaid Services (CMS) Physician Comparable Downloadable File was used to identify all Medicare-participating radiation oncologists in the United States and Puerto Rico. Each radiation oncologist was characterized by medical school education, year of graduation, city of practice, gender, and affiliation with an academic institution. Using a custom Google-based search engine, up to the top 10 search results for each physician were extracted and categorized as relating to: (1) physician, hospital, or health care system; (2) third-party; (3) social media; (4) academic journal articles; or (5) other. Among all health care providers in the United States within CMS, 4443 self-identified as being radiation oncologists and yielded 40,764 search results. Of those, 1161 (26.1%) and 3282 (73.9%) were classified as academic and nonacademic radiation oncologists, respectively. At least 1 search result was obtained for 4398 physicians (99.0%). Physician, hospital, and health care-controlled websites (16,006; 39.3%) and third-party websites (10,494; 25.7%) were the 2 most often observed domain types. Social media platforms accounted for 2729 (6.7%) hits, and peer-reviewed academic journal websites accounted for 1397 (3.4%) results. About 6.8% and 6.7% of the top 10 links were social media websites for academic and nonacademic radiation oncologists, respectively. Most radiation oncologists lack self-controlled online content when patients search within the first page of Google search results. With the strong presence of third-party websites and lack of social media, opportunities exist for radiation oncologists to increase their online presence to improve patient-provider communication

  12. UNUSUAL FLORAL ORGANS Controls Meristem Identity and Organ Primordia Fate in Arabidopsis.

    Science.gov (United States)

    Wilkinson, M. D.; Haughn, G. W.

    1995-09-01

    A novel gene that is involved in regulating flower initiation and development has been identified in Arabidopsis. This gene has been designated UNUSUAL FLORAL ORGANS (UFO), with five corresponding nuclear recessive alleles designated ufo[middot]1 to ufo[middot]5. Under short day-length conditions, ufo homozygotes generate more coflorescences than do the wild type, and coflorescences often appear apical to the first floral shoot, resulting in a period of inflorescence development in which regions of floral and coflorescence shoots are produced alternately. ufo enhances the phenotype of weak leafy alleles, and the double mutant Ufo-1 Apetala1-1 produces only coflorescence-like shoots, suggesting that these two genes control different aspects of floral initiation. Floral development was also altered in Ufo plants. Ufo flowers have an altered organ number in all whorls, and organs in the first, second, and third whorls exhibit variable homeotic transformations. Ufo single and double mutant phenotypes suggest that the floral changes result from reduction in class B floral homeotic gene expression and fluctuations in the expression boundaries of class C function and FLO10. Surprisingly, in situ hybridization analysis revealed no obvious differences in expression pattern or level in developing Ufo flowers compared with that of the wild type for any class B or C gene studied. We propose that UFO acts in concert with known floral initiation genes and regulates the domains of floral homeotic gene function.

  13. Identity paradoxes

    Directory of Open Access Journals (Sweden)

    Đurić Jelena

    2010-01-01

    Full Text Available The article considers paradoxical nature of identity that emerges from: 1 the very concept of identity whose abstract generality unites various and even opposite features; 2 the processual nature of reality that is easier to express in the poetical metaphors or abstract principles than in unambiguous conceptual networks; 3 the oppose relationship between being and knowledge, mind and matter, subject and object, self and personality. Entangled in the labyrinth which evade efforts to be conceptually defined, the modern thinking of identity moves towards abandoning the idea of “self” on behalf of the “ego” and towards the misapprehension of identity as being identical. This corresponds to the “time of the lost spirit” stretched between the simultaneous need to find an identity and to give it up.

  14. Medical Identity

    DEFF Research Database (Denmark)

    Musaeus, Peter

    2015-01-01

    Purpose: To examine philosophical stances underpinning medical identity and assess the conceptual relationship between physician, medical practice and culture. Argument: Medical identity is about the ideals and moral positions that physicians take when justifying themselves. Medical identity...... hedonistic versus sentimentalist approaches to medical identity. The sociocultural philosophical analysis of medical identity can shed light on what it means conceptually for a physician to harbor beliefs associated with him/her being taken to be an autonomous professional. It is important because it touches...... on the meaning of being a compassionate, good and skilled physician, making its relevance to person-centered medicine self-evident. Conclusion: Medical identity should be analyzed with reference to literature, philosophy and medical practice in order for the physician to exercise a reflective position...

  15. Identity Management

    Data.gov (United States)

    Social Security Administration — Provides information for identity management services on the creation, modification and eventual deletion of accounts and entitlements based on user relationships on...

  16. Dissociative part-dependent resting-state activity in dissociative identity disorder: a controlled FMRI perfusion study.

    Directory of Open Access Journals (Sweden)

    Yolanda R Schlumpf

    Full Text Available In accordance with the Theory of Structural Dissociation of the Personality (TSDP, studies of dissociative identity disorder (DID have documented that two prototypical dissociative subsystems of the personality, the "Emotional Part" (EP and the "Apparently Normal Part" (ANP, have different biopsychosocial reactions to supraliminal and subliminal trauma-related cues and that these reactions cannot be mimicked by fantasy prone healthy controls nor by actors.Arterial spin labeling perfusion MRI was used to test the hypotheses that ANP and EP in DID have different perfusion patterns in response to rest instructions, and that perfusion is different in actors who were instructed to simulate ANP and EP. In a follow-up study, regional cerebral blood flow of DID patients was compared with the activation pattern of healthy non-simulating controls.Compared to EP, ANP showed elevated perfusion in bilateral thalamus. Compared to ANP, EP had increased perfusion in the dorsomedial prefrontal cortex, primary somatosensory cortex, and motor-related areas. Perfusion patterns for simulated ANP and EP were different. Fitting their reported role-play strategies, the actors activated brain structures involved in visual mental imagery and empathizing feelings. The follow-up study demonstrated elevated perfusion in the left temporal lobe in DID patients, whereas non-simulating healthy controls had increased activity in areas which mediate the mental construction of past and future episodic events.DID involves dissociative part-dependent resting-state differences. Compared to ANP, EP activated brain structures involved in self-referencing and sensorimotor actions more. Actors had different perfusion patterns compared to genuine ANP and EP. Comparisons of neural activity for individuals with DID and non-DID simulating controls suggest that the resting-state features of ANP and EP in DID are not due to imagination. The findings are consistent with TSDP and inconsistent

  17. Dissociative Part-Dependent Resting-State Activity in Dissociative Identity Disorder: A Controlled fMRI Perfusion Study

    Science.gov (United States)

    Schlumpf, Yolanda R.; Reinders, Antje A. T. S.; Nijenhuis, Ellert R. S.; Luechinger, Roger; van Osch, Matthias J. P.; Jäncke, Lutz

    2014-01-01

    Background In accordance with the Theory of Structural Dissociation of the Personality (TSDP), studies of dissociative identity disorder (DID) have documented that two prototypical dissociative subsystems of the personality, the “Emotional Part” (EP) and the “Apparently Normal Part” (ANP), have different biopsychosocial reactions to supraliminal and subliminal trauma-related cues and that these reactions cannot be mimicked by fantasy prone healthy controls nor by actors. Methods Arterial spin labeling perfusion MRI was used to test the hypotheses that ANP and EP in DID have different perfusion patterns in response to rest instructions, and that perfusion is different in actors who were instructed to simulate ANP and EP. In a follow-up study, regional cerebral blood flow of DID patients was compared with the activation pattern of healthy non-simulating controls. Results Compared to EP, ANP showed elevated perfusion in bilateral thalamus. Compared to ANP, EP had increased perfusion in the dorsomedial prefrontal cortex, primary somatosensory cortex, and motor-related areas. Perfusion patterns for simulated ANP and EP were different. Fitting their reported role-play strategies, the actors activated brain structures involved in visual mental imagery and empathizing feelings. The follow-up study demonstrated elevated perfusion in the left temporal lobe in DID patients, whereas non-simulating healthy controls had increased activity in areas which mediate the mental construction of past and future episodic events. Conclusion DID involves dissociative part-dependent resting-state differences. Compared to ANP, EP activated brain structures involved in self-referencing and sensorimotor actions more. Actors had different perfusion patterns compared to genuine ANP and EP. Comparisons of neural activity for individuals with DID and non-DID simulating controls suggest that the resting-state features of ANP and EP in DID are not due to imagination. The findings are

  18. Bridging Identities

    Science.gov (United States)

    Deaux, Kay; Burke, Peter

    2010-01-01

    Sociology and psychology are no strangers in the theoretical world of self and identity. Early works by William James (1890), a psychologist, and George Herbert Mead (1934), a sociologist, are often taken as a starting point by investigators in both fields. In more recent years, with the development of a number of identity theories in both fields,…

  19. Brand Identity.

    Science.gov (United States)

    Lawlor, John

    1998-01-01

    Instead of differentiating themselves by building "brand identities," colleges and universities often focus on competing with price. As a result, fewer and fewer institutions base their identities on value, the combination of quality and price. Methods of building two concepts to influence customers' brand image and brand loyalty are…

  20. Brand Identity.

    Science.gov (United States)

    Lawlor, John

    1998-01-01

    Instead of differentiating themselves by building "brand identities," colleges and universities often focus on competing with price. As a result, fewer and fewer institutions base their identities on value, the combination of quality and price. Methods of building two concepts to influence customers' brand image and brand loyalty are…

  1. Organizational Identity

    DEFF Research Database (Denmark)

    Hatch, Mary Jo; Schultz, Majken

    This text presents the classic works on organizational identity alongside more current thinking on the issues. Ranging from theoretical contributions to empirical studies, the readings in this volume address the key issues of organizational identity, and show how these issues have developed through...

  2. Identity Assemblages

    DEFF Research Database (Denmark)

    Horn, Line Helverskov

    2017-01-01

    , and theoretical foundation of the dissertation. Philosophically, the research rests on the central ANT concepts of symmetry, associations, and enactment with an inherent value of multiplicity. The philosophical position implies that the study of identity must be understood as the study of practices. This, in turn......Research in identity in general and professional identity specifically has seen an immense increase in recent years (Bauman 2004, Lawler 2014). Due to societal and technological developments, notions of what constitutes ‘the professional’ are subject to change. Thus, this dissertation rests...... on an understanding of professional identity as a moving concept that must be understood through its spatial and temporal contexts (Scanlon 2011). Accepting this position necessitates a reconsideration of the role that formal education plays in the development of professional identity of students. Researchers within...

  3. NPM-ALK oncogenic tyrosine kinase controls T-cell identity by transcriptional regulation and epigenetic silencing in lymphoma cells.

    Science.gov (United States)

    Ambrogio, Chiara; Martinengo, Cinzia; Voena, Claudia; Tondat, Fabrizio; Riera, Ludovica; di Celle, Paola Francia; Inghirami, Giorgio; Chiarle, Roberto

    2009-11-15

    Transformed cells in lymphomas usually maintain the phenotype of the postulated normal lymphocyte from which they arise. By contrast, anaplastic large cell lymphoma (ALCL) is a T-cell lymphoma with aberrant phenotype because of the defective expression of the T-cell receptor and other T-cell-specific molecules for still undetermined mechanisms. The majority of ALCL carries the translocation t(2;5) that encodes for the oncogenic tyrosine kinase NPM-ALK, fundamental for survival, proliferation, and migration of transformed T cells. Here, we show that loss of T-cell-specific molecules in ALCL cases is broader than reported previously and involves most T-cell receptor-related signaling molecules, including CD3epsilon, ZAP70, LAT, and SLP76. We further show that NPM-ALK, but not the kinase-dead NPM-ALK(K210R), downregulated the expression of these molecules by a STAT3-mediated gene transcription regulation and/or epigenetic silencing because this downregulation was reverted by treating ALCL cells with 5-aza-2-deoxycytidine or by knocking down STAT3 through short hairpin RNA. Finally, NPM-ALK increased the methylation of ZAP70 intron 1-exon 2 boundary region, and both NPM-ALK and STAT3 regulated the expression levels of DNA methyltransferase 1 in transformed T cells. Thus, our data reveal that oncogene-deregulated tyrosine kinase activity controls the expression of molecules that determine T-cell identity and signaling.

  4. Controlling the Regional Identity of hPSC-Derived Neurons to Uncover Neuronal Subtype Specificity of Neurological Disease Phenotypes

    Directory of Open Access Journals (Sweden)

    Kent Imaizumi

    2015-12-01

    Full Text Available The CNS contains many diverse neuronal subtypes, and most neurological diseases target specific subtypes. However, the mechanism of neuronal subtype specificity of disease phenotypes remains elusive. Although in vitro disease models employing human pluripotent stem cells (PSCs have great potential to clarify the association of neuronal subtypes with disease, it is currently difficult to compare various PSC-derived subtypes. This is due to the limited number of subtypes whose induction is established, and different cultivation protocols for each subtype. Here, we report a culture system to control the regional identity of PSC-derived neurons along the anteroposterior (A-P and dorsoventral (D-V axes. This system was successfully used to obtain various neuronal subtypes based on the same protocol. Furthermore, we reproduced subtype-specific phenotypes of amyotrophic lateral sclerosis (ALS and Alzheimer’s disease (AD by comparing the obtained subtypes. Therefore, our culture system provides new opportunities for modeling neurological diseases with PSCs.

  5. The Effect of Locus of Control, Self-Efficacy, and Gender-Role Identity on Academic Performance Outcomes of Female College Students

    Science.gov (United States)

    Sierra, Jade Simone

    2013-01-01

    This quantitative study investigated the predictive worthiness of the predictor variable indices--locus of control, self-efficacy, and gender identity--to ascertain if elevated levels of the predictors influence academic performance outcomes (individually as well as interactionally). The study theorized that students with increased levels of locus…

  6. The Effect of Locus of Control, Self-Efficacy, and Gender-Role Identity on Academic Performance Outcomes of Female College Students

    Science.gov (United States)

    Sierra, Jade Simone

    2013-01-01

    This quantitative study investigated the predictive worthiness of the predictor variable indices--locus of control, self-efficacy, and gender identity--to ascertain if elevated levels of the predictors influence academic performance outcomes (individually as well as interactionally). The study theorized that students with increased levels of locus…

  7. Bridging Identities through Identity Change

    Science.gov (United States)

    Cantwell, Allison M.; Martiny, Sarah E.

    2010-01-01

    As indicated by Deaux and Burke (this volume), sociology and psychology have shared a tradition of discourse allowing social psychologists to build upon each other's ideas. A conversation between social identity theory and identity theory was initiated fifteen years ago and addressed the similarities and differences between these theories. This…

  8. Identity as wrapping up

    DEFF Research Database (Denmark)

    Nickelsen, Niels Christian Mossfeldt

    2015-01-01

    The aim of this paper is to provide an understanding of cross-professional collaboration and to develop a notion of professional identity based in practice. The background of the paper is science and technology studies and more precisely actor network theory. The method used: The empirical analysis...... in close relation to the making of a report concerning the cross-professional collaboration. Findings are that “Identity as wrapping up” points to the way in which certain actors, by other actors, are maneuvered into certain pockets in a network. Identity as wrapping up is emphasized as a way...... of participating, which is closely connected to the intention to control the relation towards the other. Thus identity as wrapping up is argued to be a strategy to optimize the situation of one’s own profession. Conclusion: This articulation of identity contributes to the actor network literature as well...

  9. Electronic identity

    CERN Document Server

    de Andrade, Norberto Nuno Gomes; Argles, David

    2014-01-01

    With the increasing availability of electronic services, security and a reliable means by which identity is verified is essential.Written by Norberto Andrade the first chapter of this book provides an overview of the main legal and regulatory aspects regarding electronic identity in Europe and assesses the importance of electronic identity for administration (public), business (private) and, above all, citizens. It also highlights the role of eID as a key enabler of the economy.In the second chapter Lisha Chen-Wilson, David Argles, Michele Schiano di Zenise and Gary Wills discuss the user-cent

  10. Identity, identity politics, and neoliberalism

    Directory of Open Access Journals (Sweden)

    Wrenn Mary

    2014-01-01

    Full Text Available With the intensification of neoliberalism, it is useful to examine how some individuals might cope with the irrationality of the system. Neoliberalism cloaks the execution of the corporate agenda behind rhetorical manipulation that advocates for limited government. The corollary absence of government involvement on behalf of the citizenry writ large disarms the means of social redress for the individual. Democracy funded and fueled by corporate power thereby disenfranchises the individual, provoking some to search for empowerment through identity politics. The argument set forth suggests that individuals construct, reinforce, or escalate allegiance to identities as a coping mechanism, some of which manifest in violent identity politics.

  11. Credit and identity theft

    OpenAIRE

    Charles M. Kahn; Roberds, William

    2005-01-01

    The quintessential crime of the information age is identity theft, the malicious use of personal identifying data. In this paper we model “identity” and its use in credit transactions. Various types of identity theft occur in equilibrium, including “new account fraud,” “existing account fraud,” and “friendly fraud.” The equilibrium incidence of identity theft represents a tradeoff between a desire to avoid costly or invasive monitoring of individuals on the one hand and the need to control tr...

  12. Gender Socialization and Identity Theory

    Directory of Open Access Journals (Sweden)

    Michael J. Carter

    2014-05-01

    Full Text Available Gender socialization is examined through a social psychological lens by applying identity theory and identity control theory. Current research from the fields of family and sociological social psychology are surveyed to provide a better conception of how the family operates as agents of socialization, and how identities that are cultivated and fostered in youth provide meaning throughout the life course and maintain the social order. The application of identity theory shows how gender is a diffuse status characteristic, which is salient in person, role, and social (group identities, and also across social situations. Identity control theory is applied to show how emotions operate within an internal control system to stabilize gendered identities and perpetuate the social structure. Both theories are specifically applied to understand socialization dynamics that exist for children and families.

  13. Assessment of the genotoxicity of {sup 137}Cs radiation using Vicia-micronucleus, Tradescantia-micronucleus and Tradescantia-stamen-hair mutation bioassays

    Energy Technology Data Exchange (ETDEWEB)

    Minouflet, Marion [Laboratoire Ecotoxicite et Sante Environnementale, CNRS FRE 2635, UFR Sci.F.A., Universite de Metz-Bridoux, rue du General Delestraint, F-57070 Metz (France)]. E-mail: marion.minouflet@terre.unige.ch; Ayrault, Sophie [Laboratoire Pierre Suee, CEA-CNRS, CEA Saclay, F-91191 Gif-sur-Yvette cedex (France); Badot, Pierre-Marie [Laboratoire de Biologie Environnementale, EA 3184 USC INRA, Universite de Franche-Comte, Place Leclerc, F-25030 Besancon cedex (France); Cotelle, Sylvie [Laboratoire Ecotoxicite et Sante Environnementale, CNRS FRE 2635, UFR Sci.F.A., Universite de Metz-Bridoux, rue du General Delestraint, F-57070 Metz (France); Ferard, Jean-Francois [Laboratoire Ecotoxicite et Sante Environnementale, CNRS FRE 2635, UFR Sci.F.A., Universite de Metz-Bridoux, rue du General Delestraint, F-57070 Metz (France)

    2005-07-01

    Since the middle of the 20th century, ionizing radiations from radioactive isotopes including {sup 137}Cs have been investigated to determine their genotoxic impact on living organisms. The present study was designed to compare the effectiveness of three plant bioassays to assess DNA damage induced by low doses of {sup 137}Cs: Vicia-micronucleus test (Vicia-MCN), Tradescantia-micronucleus test (Trad-MCN) and Tradescantia-stamen-hair mutation test (Trad-SH) were used. Vicia faba (broad bean) and Tradescantia clone 4430 (spiderwort) were exposed to {sup 137}Cs according to different scenarios: external and internal (contamination) irradiations. Experiments were conducted with various levels of radioactivity in solution or in soil, using solid or liquid {sup 137}Cs sources. The three bioassays showed different sensitivities to the treatments. Trad-MCN appeared to be the most sensitive test (significative response from 1.5 kBq/200 ml after 30 h of contamination). Moreover, at comparable doses, internal irradiations led to larger effects for the three bioassays. These bioassays are effective tests for assessing the genotoxic effects of radioactive {sup 137}Cs pollution.

  14. Assessment of the genotoxicity of 137Cs radiation using Vicia-micronucleus, Tradescantia-micronucleus and Tradescantia-stamen-hair mutation bioassays.

    Science.gov (United States)

    Minouflet, Marion; Ayrault, Sophie; Badot, Pierre-Marie; Cotelle, Sylvie; Ferard, Jean-François

    2005-01-01

    Since the middle of the 20th century, ionizing radiations from radioactive isotopes including 137Cs have been investigated to determine their genotoxic impact on living organisms. The present study was designed to compare the effectiveness of three plant bioassays to assess DNA damage induced by low doses of 137Cs: Vicia-micronucleus test (Vicia-MCN), Tradescantia-micronucleus test (Trad-MCN) and Tradescantia-stamen-hair mutation test (Trad-SH) were used. Vicia faba (broad bean) and Tradescantia clone 4430 (spiderwort) were exposed to 137Cs according to different scenarios: external and internal (contamination) irradiations. Experiments were conducted with various levels of radioactivity in solution or in soil, using solid or liquid 137Cs sources. The three bioassays showed different sensitivities to the treatments. Trad-MCN appeared to be the most sensitive test (significative response from 1.5 kBq/200 ml after 30 h of contamination). Moreover, at comparable doses, internal irradiations led to larger effects for the three bioassays. These bioassays are effective tests for assessing the genotoxic effects of radioactive 137Cs pollution.

  15. Commons of Identity: Sherpa Identity Management

    Directory of Open Access Journals (Sweden)

    Leif Rune Loland

    2006-12-01

    Full Text Available The recent history of Sherpas demonstrates how identities can be scarce goods. While ‘Sherpa’ refers to an ethnic identity, ‘Sherpa’ refers to a crucial occupation in the trekking industry.i Their privileged position in Nepal’s international tourist industry is related to their common reputation. Their collective use of identity seems to help them getting access to an economic niche, and work in tourism seems to be an aspect of being Sherpa. Thus, an individual that operates in the tourist market does not only manage material assets but also identity assets to maintain the Sherpa reputation. Consequently, one can expect it to be a collective concern to husband their image, ie to control each member’s behaviour which could affect the Sherpa image. This article on Sherpa identity in encounters with outsiders analyses Sherpaness as a manageable resource that constitutes a collectively sanctioned commons. My point of departure is Barth’s analysis of ethnic boundary dynamics (1969, 1994 combined with Bourdieu’s concept of ‘capital’ and Hardin’s perspective on commons.DOI: 10.3126/dsaj.v1i0.288Dhaulagiri Vol.1 (2005 pp.176-192

  16. Challenging Identities

    DEFF Research Database (Denmark)

    Identity is a keyword in a number of academic fields as well as in public debate and in politics. During the last decades, references to identity have proliferated, yet there is no simple definition available that corresponds to the use of the notion in all contexts. The significance of the notio...... Christian Lammers, Saxo-Instituttet - Arkæologi, Etnologi, Historie og Græsk og Latin; Gert Sørensen, Institut for Engelsk, Germansk og Romansk ; Anne Ring Petersen, Institut for Kunst- og Kulturvidenskab...

  17. Is it Trauma- or Fantasy-based? Comparing dissociative identity disorder, post-traumatic stress disorder, simulators, and controls

    NARCIS (Netherlands)

    Vissia, E. M.; Giesen, M. E.; Chalavi, S.; Nijenhuis, E. R. S.; Draijer, N.; Brand, B. L.; Reinders, A. A. T. S.

    Objective: The Trauma Model of dissociative identity disorder (DID) posits that DID is etiologically related to chronic neglect and physical and/or sexual abuse in childhood. In contrast, the Fantasy Model posits that DID can be simulated and is mediated by high suggestibility, fantasy proneness,

  18. Dissociative Part-Dependent Resting-State Activity in Dissociative Identity Disorder : A Controlled fMRI Perfusion Study

    NARCIS (Netherlands)

    Schlumpf, Yolanda R.; Reinders, Antje A. T. S.; Nijenhuis, Ellert R. S.; Luechinger, Roger; van Osch, Matthias J. P.; Jaencke, Lutz

    2014-01-01

    Background: In accordance with the Theory of Structural Dissociation of the Personality (TSDP), studies of dissociative identity disorder (DID) have documented that two prototypical dissociative subsystems of the personality, the "Emotional Part'' (EP) and the "Apparently Normal Part'' (ANP), have d

  19. Is it Trauma- or Fantasy-based? Comparing dissociative identity disorder, post-traumatic stress disorder, simulators, and controls

    NARCIS (Netherlands)

    Vissia, E. M.; Giesen, M. E.; Chalavi, S.; Nijenhuis, E. R. S.; Draijer, N.; Brand, B. L.; Reinders, A. A. T. S.

    2016-01-01

    Objective: The Trauma Model of dissociative identity disorder (DID) posits that DID is etiologically related to chronic neglect and physical and/or sexual abuse in childhood. In contrast, the Fantasy Model posits that DID can be simulated and is mediated by high suggestibility, fantasy proneness, an

  20. Designer's Identity

    DEFF Research Database (Denmark)

    Kunrath, Kamila; Cash, Philip; Li-Ying, Jason

    2016-01-01

    A designer’s professional identity (DPI) develops through both education and professional experience, building on core personality traits and innate skills. In this paper a systematic literature review and a secondary narrative review were developed in order to map personal attributes and design...

  1. [Identity theft

    CERN Multimedia

    Wolinksy, H

    2003-01-01

    "A new survey by the Federal Trade Commission indicates that over the last five years one in four American households has been hit by identity theft, which can result in thieves tapping their victims' credit cards or bank accounts" (1 page).

  2. Mediating Identity

    DEFF Research Database (Denmark)

    Kjærgaard, Annemette Leonhardt; Morsing, Mette; Ravasi, Davide

    2011-01-01

    This paper reports a longitudinal field study on the effects of positive media coverage on the reconstruction of organizational identity. The study highlights how intense positive coverage – to the point of turning an organization into a ‘celebrity’– influences both the way members understand the...

  3. 'Who's who' in two different flower types of Calluna vulgaris (Ericaceae: morphological and molecular analyses of flower organ identity

    Directory of Open Access Journals (Sweden)

    Krüger Katja

    2009-12-01

    Full Text Available Abstract Background The ornamental crop Calluna vulgaris is of increasing importance to the horticultural industry in the northern hemisphere due to a flower organ mutation: the flowers of the 'bud-flowering' phenotype remain closed i.e. as buds throughout the total flowering period and thereby maintain more colorful flowers for a longer period of time than the wild-type. This feature is accompanied and presumably caused by the complete lack of stamens. Descriptions of this botanical particularity are inconsistent and partially conflicting. In order to clarify basic questions of flower organ identity in general and stamen loss in detail, a study of the wild-type and the 'bud-flowering' flower type of C. vulgaris was initiated. Results Flowers were examined by macro- and microscopic techniques. Organ development was investigated comparatively in both the wild-type and the 'bud-flowering' type by histological analyses. Analysis of epidermal cell surface structure of vegetative tissues and perianth organs using scanning electron microscopy revealed that in wild-type flowers the outer whorls of colored organs may be identified as sepals, while the inner ones may be identified as petals. In the 'bud-flowering' type, two whorls of sepals are directly followed by the gynoecium. Both, petals and stamens, are completely missing in this flower type. The uppermost whorl of green leaves represents bracts in both flower types. In addition, two MADS-box genes (homologs of AP3/DEF and SEP1/2 were identified in C. vulgaris using RACE-PCR. Expression analysis by qRT-PCR was conducted for both genes in leaves, bracts, sepals and petals. These experiments revealed an expression pattern supporting the organ classification based on morphological characteristics. Conclusions Organ identity in both wild-type and 'bud-flowering' C. vulgaris was clarified using a combination of microscopic and molecular methods. Our results for bract, sepal and petal organ identity are

  4. The Alberta Mental Health Act 2010 and Revolving Door Syndrome: Control, Care, and Identity in Making up People.

    Science.gov (United States)

    Barron, Gary R S

    2016-08-01

    In this paper, I describe dividing practices in making up a specific medical-legal category-the revolving door patient-to identify, label, and direct the actions of particular people living with mental illness. The revolving door patient was a category that had been spoken of for some time, but became a formal legal subject with the introduction of the Alberta Mental Health Act 2010 and Community Treatment Orders (CTOs). I demonstrate how a rationale of control over unpredictable and dangerous individuals was primary in creating this new category, and that the characterization of the revolving door patient required a disciplinary technology to reduce danger. I argue that the CTO is a medical-legal technology that solves the problem of governing a subject in order to produce a patient that manages mental illness. I conclude by reflecting on how the narrative of the revolving door patient, and of mental illness more broadly, has implications for personal identity and tensions between care and control. Dans cet article, je décris comment des 'pratiques divisées' ont créé une catégorie spécifique médico-légale - le « revolving door patient » - afin d'identifier, d'étiqueter et de contrôler les comportements de certains individus vivants avec une maladie mentale. Le «revolving door patient», une catégorie dont on avait parlé depuis un certain temps, est devenu un sujet juridique formel par l'introduction de la loi de la santé mentale de l'Alberta 2010 et de l'Ordre de Traitement Communautaire (OCT). Je démontre comment une logique de contrôle sur les individus imprévisibles et dangereux eu un rôle prépondérant lors de la création de cette catégorie et que la caractérisation du «revolving door patient», entant que telle, a nécessité une technologie disciplinaire pour réduire le danger social. Je soutiens que le OTC est une technologie médico-légale qui résout le problème de contrôle d'un sujet en produisant un patient qui gère une

  5. Yearly variation of spontaneous somatic mutation frequency in the stamen hairs of Tradescantia clone KU 9 grown outdoors, which showed a significant increase after the Chernobyl accident.

    Science.gov (United States)

    Ichikawa, S; Nakano, A; Kenmochi, M; Yamamoto, I; Murai, M; Takahashi, E; Yamaguchi, A; Watanabe, K; Tomiyama, M; Sugiyama, K; Yogo, A; Yazaki, T; Okumura, M; Shima, N; Satoh, M; Yoshimoto, M; Xiao, L Z

    1996-02-01

    Scoring of spontaneous somatic pink mutation frequency in the stamen hairs of Tradescantia clone KU 9, a heterozygote for flower color (blue/pink; the blue color being dominant), was carried out for 11 years on plants grown outdoors, during the period of May 11-31 (for 3 weeks) in every year from 1982 to 1992. Weekly and yearly variations of the spontaneous mutation frequency were observed, and such variations could mostly be correlated to the difference in temperature. That is, the mutation frequency was generally higher in the weeks and years when the temperature was relatively low, showing the strongest negative correlation with the average minimum temperature. The variations were also correlated to the diurnal temperature difference, the mutation frequency being higher with larger diurnal temperature difference in general. However, the mutation frequency observed in 1986 was exceptionally higher than that expected from the temperature for this year, and was very significantly higher than for other years. The scoring of mutation frequency was thus continued in 1986 for an additional 4 weeks (June 1-28), and it was confirmed that such higher mutation frequencies lasted for 6 weeks in total. The exceptionally high mutation frequency seemed to be related to the radioactive fallout which occurred in early to mid May of 1986, even in Japan, after the serious nuclear reactor accident at Chernobyl, and also to the biological concentrations of radioactive nuclides which subsequently occurred, although it was difficult to conclude this definitely. The mutation frequency in 1987 was second highest, and was also significantly higher than the lowest mutation frequency observed in 1990.

  6. Control of Embryonic Stem Cell Identity by BRD4-Dependent Transcriptional Elongation of Super-Enhancer-Associated Pluripotency Genes

    Directory of Open Access Journals (Sweden)

    Raffaella Di Micco

    2014-10-01

    Full Text Available Transcription factors and chromatin-remodeling complexes are key determinants of embryonic stem cell (ESC identity. Here, we demonstrate that BRD4, a member of the bromodomain and extraterminal domain (BET family of epigenetic readers, regulates the self-renewal ability and pluripotency of ESCs. BRD4 inhibition resulted in induction of epithelial-to-mesenchymal transition (EMT markers and commitment to the neuroectodermal lineage while reducing the ESC multidifferentiation capacity in teratoma assays. BRD4 maintains transcription of core stem cell genes such as OCT4 and PRDM14 by occupying their super-enhancers (SEs, large clusters of regulatory elements, and recruiting to them Mediator and CDK9, the catalytic subunit of the positive transcription elongation factor b (P-TEFb, to allow Pol-II-dependent productive elongation. Our study describes a mechanism of regulation of ESC identity that could be applied to improve the efficiency of ESC differentiation.

  7. Correlational study and randomised controlled trial for understanding and changing red meat consumption: The role of eating identities

    OpenAIRE

    Carfora, V; Caso, D.; Conner, M.

    2017-01-01

    Rationale: The present studies aimed to contribute to the literature on psychological variables involved in reducing red meat consumption (RMC). Objective: Study 1 investigated whether the theory of planned behaviour (TPB), plus healthy-eating and meat-eating identities, could explain intentions to reduce RMC. Study 2 evaluated the effectiveness of an SMS text message intervention on self-monitoring to reduce RMC. Methods: In Study 1, data were collected daily using online food diaries for on...

  8. Civil Identity

    DEFF Research Database (Denmark)

    Petersen, Lars Axel

    scanning, etc., to discussions of Shari'a law versus common civil law in India; from the study of religious cult in ancient city states to the processes of constitutional reconstruction in former Communist countries; and from attempts at conflict resolution and prevention between Jewish and Arab citizens......In this paper I will go through a catalogue of examples of contexts in which the term civil identity is currently used, ranging from the formal and technical process of linking a set of administrative and other events to an individual biological person by means of identity cards, fingerprints, iris...... of technology and of law. If such a field can be established, the answers to those questions might be relevant to such contemporary issues as inter-ethnic, religious, and -cultural conflict or reconciliation, migration and nationality, civil rights and surveillance, security and privacy, bureaucracy and inter...

  9. Civil Identity

    DEFF Research Database (Denmark)

    Petersen, Lars Axel

    scanning, etc., to discussions of Shari'a law versus common civil law in India; from the study of religious cult in ancient city states to the processes of constitutional reconstruction in former Communist countries; and from attempts at conflict resolution and prevention between Jewish and Arab citizens...... of Israel to Luce Irigaray's Feminist agenda of elaborating gender specific civil identities. My intention is to investigate whether these different employments of 'civil identity' point towards a common, and fairly well defined object field asking questions of contemporary relevance to the philosophy...... of technology and of law. If such a field can be established, the answers to those questions might be relevant to such contemporary issues as inter-ethnic, religious, and -cultural conflict or reconciliation, migration and nationality, civil rights and surveillance, security and privacy, bureaucracy and inter...

  10. Consumer Identity

    OpenAIRE

    Young, Melissa Marie

    2009-01-01

    The purpose of this thesis is to prove that despite consumers' impression that they are alone in deciding their consumption decision they are wrong. Consumers are manipulated on various levels by marketers. It is the marketer who decides what consumer identities should be created. Consumers are persuaded by marketers on different levels beginning with consumers' needs. Marketers begin by appealing to consumer drives, motivations and emotions to persuade their consumers to purchase their brand...

  11. Trigonometric identities

    Directory of Open Access Journals (Sweden)

    Malvina Baica

    1986-01-01

    Full Text Available In this paper the author obtains new trigonometric identities of the form 2(p−1(p−22∏k=1p−2(1−cos2πkpp−1−k=pp−2 which are derived as a result of relations in a cyclotomic field ℛ(ρ, where ℛ is the field of rationals and ρ is a root of unity.

  12. Identity transformation

    DEFF Research Database (Denmark)

    Neergaard, Helle; Robinson, Sarah; Jones, Sally

    This paper develops the concept of ‘pedagogical nudging’ and examines four interventions in an entrepreneurship classroom and the potential it has for student identity transformation. Pedagogical nudging is positioned as a tool, which in the hands of a reflective, professional, with an understand......This paper develops the concept of ‘pedagogical nudging’ and examines four interventions in an entrepreneurship classroom and the potential it has for student identity transformation. Pedagogical nudging is positioned as a tool, which in the hands of a reflective, professional......, as well as the resources they have when they come to the classroom. It also incorporates perspectives from (ii) transformational learning and explores the concept of (iii) nudging from a pedagogical viewpoint, proposing it as an important tool in entrepreneurship education. The study incorporates......) assists students in straddling the divide between identities, the emotions and tensions this elicits, and (iv) transform student understanding. We extend nudging theory into a new territory. Pedagogical nudging techniques may be able to unlock doors and bring our students beyond the unacknowledged...

  13. The Relevance of Tag along Rights and Identity of Controlling Shareholders for the Price Spreads between Dual-Class Shares: the Brazilian Case

    Directory of Open Access Journals (Sweden)

    Richard Saito

    2010-01-01

    Full Text Available This paper analyzes the determinants of the differential pricing of equity classes (the so-called dual-class premium [DCP] in Brazil from 1995 to 2006 with a focus on two specific corporate governance aspects: i the granting of tag along rights, a mandatory bid rule that extends to minority shareholders the right to sell their shares in case of a control transfer; and ii the identity of the controlling shareholders, with an emphasis on family control. We examined 87 Brazilian listed firms throughout the period, resulting in a sample of 3,287 observations. We found empirical evidence that changes in Corporate Law decreased (increased the advantage of voting shares in terms of tag along rights reduced (incremented DCP. However, we did not find empirical evidence that the voluntary granting of tag along rights altered DCP. We also found evidence suggesting that family control is positively associated with DCP level. Overall, our results indicate that regulations regarding shareholders’ rights and the identity of controlling shareholders are the two relevant corporate governance variables for DCP level in environments characterized by concentrated ownership structures.

  14. Identity of psychology, identity and psychology

    Directory of Open Access Journals (Sweden)

    Mirjana Nastran Ule

    2003-09-01

    Full Text Available The article deals with epistemic issues of modern psychology with the starting hypothesis being that scientific psychology must satisfy three main interests: scientific, practical and emancipatory interest. Particularly important is the emancipatory interest, which is based on the social reflection of scientific work and conclusions. Psychological knowledge involves not only neutral descriptions of facts, but also implicit rules, expectations regarding values or norms, and criticism of undesirable behavior. The traditional psychological model attempts to satisfy the scientific interest and partly practical interest, while avoiding emancipatory interest. But I believe modern socio-historical models of psychology to be significant precisely owing to the inclusion of emancipatory interest. The difference between these two models of psychology is most obvious in their perception of identity i.e. individuality. Conventional perceptions follow the logic of "possessive individualism" in which the individual is seen as an autonomous bearer and owner of his/her psychological states and processes. The conventional model of identity supports the modernist concept of the individual as being focused on his/her self or personal identity. Socio-historical models, on the other hand, see the individual as a being embedded in social relations and social interactions, and one who builds and expresses his/her individuality through the reflection on social interactions, discursive practices, and response to the hierarchy of power and social mechanisms of control. According to this model, identity evolves through a series of social constructions which are embodied in the individual and represent him/her in society. Identity thus becomes a notion that combines individuality and social context, subjectivation and objectivation of the individual, and historical and biographical time.

  15. LATHYROIDES, Encoding a WUSCHEL-Related Homeobox1 Transcription Factor, Controls Organ Lateral Growth, and Regulates Tendril and Dorsal Petal Identities in Garden Pea (Pisum sativum L.)

    Institute of Scientific and Technical Information of China (English)

    Li-Li Zhuang; Mike Ambrose; Catherine Rameau; Lin Weng; Jun Yang; Xiao-He Hu; Da Luo; Xin Li

    2012-01-01

    During organ development,many key regulators have been identified in plant genomes,which play a conserved role among plant species to control the organ identities and/or determine the organ size and shape.It is intriguing whether these key regulators can acquire diverse function and be integrated into different molecular pathways among different species,giving rise to the immense diversity of organ forms in nature.In this study,we have characterized and cloned LATHYROIDES (LATH),a classical locus in pea,whose mutation displays pleiotropic alteration of lateral growth of organs and predominant effects on tendril and dorsal petal development.LATH encodes a WUSCHEL-related homeobox1 (WOX1) transcription factor,which has a conserved function in determining organ lateral growth among different plant species.Furthermore,we showed that LATH regulated the expression level of TENDRIL-LESS (TL),a key factor in the control of tendril development in compound leaf,and LATH genetically interacted with LOBED STANDARD (LST),a floral dorsal factor,to affect the dorsal petal identity.Thus,LATH plays multiple roles during organ development in pea:it maintains a conserved function controlling organ lateral outgrowth,and modulates organ identities in compound leaf and zygomorphic flower development,respectively.Our data indicated that a key regulator can play important roles in different aspects of organ development and dedicate to the complexity of the molecular mechanism in the control of organ development so as to create distinct organ forms in different species.

  16. Interactions between genetic admixture, ethnic identity, APOE genotype and dementia prevalence in an admixed Cuban sample; a cross-sectional population survey and nested case-control study

    Directory of Open Access Journals (Sweden)

    Hernandez Milagros

    2011-03-01

    Full Text Available Abstract Background The prevalence and incidence of dementia are low in Nigeria, but high among African-Americans. In these populations there is a high frequency of the risk-conferring APOE-e4 allele, but the risk ratio is less than in Europeans. In an admixed population of older Cubans we explored the effects of ethnic identity and genetic admixture on APOE genotype, its association with dementia, and dementia prevalence. Methods A cross-sectional catchment area survey of 2928 residents aged 65 and over, with a nested case-control study of individual admixture. Dementia diagnosis was established using 10/66 Dementia and DSM-IV criteria. APOE genotype was determined in 2520 participants, and genetic admixture in 235 dementia cases and 349 controls. Results Mean African admixture proportions were 5.8% for 'white', 28.6% for 'mixed' and 49.6% for 'black' ethnic identities. All three groups were substantially admixed with considerable overlap. African admixture was linearly related to number of APOE-e4 alleles. One or more APOE-e4 alleles was associated with dementia in 'white' and 'black' but not 'mixed' groups but neither this, nor the interaction between APOE-e4 and African admixture (PR 0.52, 95% CI 0.13-2.08 were statistically significant. Neither ethnic identity nor African admixture was associated with dementia prevalence when assessed separately. However, considering their joint effects African versus European admixture was independently associated with a higher prevalence, and 'mixed' or 'black' identity with a lower prevalence of dementia. Conclusions APOE genotype is strongly associated with ancestry. Larger studies are needed to confirm whether the concentration of the high-risk allele in those with African ancestry is offset by an attenuation of its effect. Counter to our hypothesis, African admixture may be associated with higher risk of dementia. Although strongly correlated, effects of admixture and ethnic identity should be

  17. Drug-Related Identity Change

    Directory of Open Access Journals (Sweden)

    ferydoon Seyed Rabiee

    2004-02-01

    Full Text Available Our study is concentrating on understanding drug-related identity process which may enter important sociological visions into drug abuse pathology. It is in the framework of symbolic proactivity، cultural studies and the existing model for analyzing drug-related identity (Anderson – 1994. In this study، we have used a qualitative survey and a model test in a statistical sample cosisting white/black males and females who are under drug abuse treatment in Middle Michigan. Our data shows that identity change occures during childihood or early adolescence and is accompanied with experiences of isolationism before drug abuse which facilitates the creation of an afflicted identity as well as the loss of the ability to control the personal identity. Assimilation and drug abuse subculture have represented altenative identities for resolving such an unsuitable situation.

  18. Identity Style, Parental Authority, and Identity Commitment.

    Science.gov (United States)

    Berzonsky, Michael D.

    2004-01-01

    The role that parental authority patterns and social-cognitive identity styles may play in establishing identity commitments was investigated. The results indicated that family authority and identity style variables combined accounted for 50% of the variation in strength of identity commitment. As hypothesized, the relationship between parental…

  19. Identity Style, Parental Authority, and Identity Commitment.

    Science.gov (United States)

    Berzonsky, Michael D.

    2004-01-01

    The role that parental authority patterns and social-cognitive identity styles may play in establishing identity commitments was investigated. The results indicated that family authority and identity style variables combined accounted for 50% of the variation in strength of identity commitment. As hypothesized, the relationship between parental…

  20. Swiss identity smells like chocolate: Social identity shapes olfactory judgments.

    Science.gov (United States)

    Coppin, Géraldine; Pool, Eva; Delplanque, Sylvain; Oud, Bastiaan; Margot, Christian; Sander, David; Van Bavel, Jay J

    2016-10-11

    There is extensive evidence that social identities can shape people's attitudes and behavior, but what about sensory judgments? We examined the possibility that social identity concerns may also shape the judgment of non-social properties-namely, olfactory judgment. In two experiments, we presented Swiss and non-Swiss participants with the odor of chocolate, for which Switzerland is world-famous, and a control odor (popcorn). Swiss participants primed with Swiss identity reported the odor of chocolate (but not popcorn) as more intense than non-Swiss participants (Experiments 1 and 2) and than Swiss participants primed with individual identity or not primed (Experiment 2). The self-reported intensity of chocolate smell tended to increase as identity accessibility increased-but only among Swiss participants (Experiment 1). These results suggest that identity priming can counter-act classic sensory habituation effects, allowing identity-relevant smells to maintain their intensity after repeated presentations. This suggests that social identity dynamically influences sensory judgment. We discuss the potential implications for models of social identity and chemosensory perception.

  1. The Role that Religious Festivities Have in Society and Ideology: Local Identity, Social Control and Instrument of Domination

    Directory of Open Access Journals (Sweden)

    José Fernando Domene Verdú

    2017-08-01

    Full Text Available This article attempts to answer the question: what role have religious and patroness festivities in society, now and throughout history? They belong to what is called popular religiosity, are utilitarian —because they were used as a solution to natural and epidemic calamities— and are mainly a symbol of local or regional identity. But besides this, they have always had a social and ideological role, which can be summarized as maintaining the established social order, mainly by making that a part of the population identifies itself with the Crown and the ruling aristocracy. The parallel between God, the Virgin and the saints with the kings, feudal lords and members of the nobility in general favored that the same attitudes of obedience and submission that common people had toward the religious figures, they also had them to the social ruling figures (the nobility, the clergy and the subsequent absolute monarchy. Therefore, religious festivities (Easter, Christmas, Kings and, especially, the patron-saints’ festivities were the most suitable cultural event to promote that the common people adopt these attitudes towards religious figures and, indirectly, also towards the civilian ones.

  2. DORNRÖSCHEN, DORNRÖSCHEN-LIKE, and PUCHI redundantly control floral meristem identity and organ initiation in Arabidopsis.

    Science.gov (United States)

    Chandler, J W; Werr, W

    2017-06-15

    The biphasic floral transition in Arabidopsis thaliana involves many redundant intersecting regulatory networks. The related AP2 transcription factors DORNRÖSCHEN (DRN), DORNRÖSCHEN-LIKE (DRNL), and PUCHI individually execute well-characterized functions in diverse developmental contexts, including floral development. Here, we show that their combined loss of function leads to synergistic floral phenotypes, including reduced floral merosity in all whorls, which reflects redundant functions of all three genes in organ initiation rather than outgrowth. Additional loss of BLADE-ON-PETIOLE1 (BOP1) and BOP2 functions results in the complete conversion of floral meristems into secondary inflorescence shoots, demonstrating that all five genes define an essential regulatory network for establishing floral meristem identity, and we show that their functions converge to regulate LEAFY expression. Thus, despite their largely discrete spatiotemporal expression domains in the inflorescence meristem and early floral meristem, PUCHI, DRN, and DRNL interdependently contribute to cellular fate decisions. Auxin might represent one potential non-cell-autonomous mediator of their gene functions, because PUCHI, DRN, and DRNL all interact with auxin transport and biosynthesis pathways. © The Author 2017. Published by Oxford University Press on behalf of the Society for Experimental Biology. All rights reserved. For permissions, please email: journals.permissions@oup.com.

  3. High definition viral vaccine strain identity and stability testing using full-genome population data--The next generation of vaccine quality control.

    Science.gov (United States)

    Höper, Dirk; Freuling, Conrad M; Müller, Thomas; Hanke, Dennis; von Messling, Veronika; Duchow, Karin; Beer, Martin; Mettenleiter, Thomas C

    2015-10-26

    Vaccines are the most effective prophylactic public health tools. With the help of vaccines, prevention of infectious disease spread and, in concert with other measures, even eradication has become possible. Until now, licensing and quality control require the determination of consensus genome sequences of replication competent infectious agents contained in vaccines. Recent improvements in sequencing technologies now enable the sequencing of complete genomes and the genetic analysis of populations with high reliability and resolution. The latter is particularly important for RNA viruses, which consist of fluctuating heterogeneous populations rather than genetically stable entities. This information now has to be integrated into the existing regulatory framework, challenging both licensing authorities and vaccine producers to develop new quality control criteria. Commercially available modified-live oral rabies vaccines and their precursor strains were deep-sequenced to assess strain identity and relations between strains based on population diversity. Strain relations were inferred based on the Manhattan distances calculated between the compositions of the viral populations of the strains. We provide a novel approach to assess viral strain relations with high resolution and reliability by deep sequencing with subsequent analysis of the overall genetic diversity within the viral populations. A comparison of our novel approach of inferring strain relations based on population data with consensus sequence analysis clearly shows that consensus sequence analysis of diverse viral populations can be misleading. Therefore, for quality control of viral vaccines deep sequencing analysis is to be preferred over consensus sequence analysis. The presented methodology allows for routine integration of deep sequencing data in vaccine quality control and licensing for highly reliable assessment of strain identity and stability. Copyright © 2015 Elsevier Ltd. All rights reserved.

  4. Claiming identity

    DEFF Research Database (Denmark)

    Krag, Mo Michelsen Stochholm

    2016-01-01

    ) The controlled ruin: March 2014 (figure 1) This strategy involves partially demolishing of the abandoned building and subse-quently allowing the remnants to decay naturally. A precisely defined partial demo-lition transformed the abandoned building into a controlled ruin and exposed the building's private...... prototypes were tested as present manifestations in rural villages as an alternative way to pre-serve and activate buildings as well as memories....

  5. A controlled quantum teleportation scheme with identity certification%一种可控量子隐形传态身份认证的方案

    Institute of Scientific and Technical Information of China (English)

    龚敬; 谭晓青

    2013-01-01

    提出了一种实现可控量子隐形传态身份认证的方案.可信第三方Charlie利用纠缠交换原理对接收者Bob进行身份认证,在确定Bob的合法身份并将消息反馈给发送者Alice后,Alice再对量子信息进行传送.本方案能有效解决假冒身份攻击,从而保证量子信息传送的安全性.%This paper proposed a controlled quantum teleportation scheme with identity certification. The receiver Bob was identified by entanglement swapping principle from the trusted Charlie. After the sender Alice gets the feedback from Charlie, and Charlie can make sure the identity of Bob and then send the quantum information to Bob. The scheme could prevent forgery attack effectively to ensure the security of quantum information transmission.

  6. Questions of Identity and Self Determination

    DEFF Research Database (Denmark)

    Dybbroe, Susanne

    1996-01-01

    This essay on Inuit identity seeks to describe identity in terms of individual experience and of collective processes. These two elements are subsequently put into relation with the political situation of contemporary Inuit, particularly with their quest for self-determination. The author conclud...... that the maintenance of cultural identity is a process related to symbolic control....

  7. Questions of Identity and Self Determination

    DEFF Research Database (Denmark)

    Dybbroe, Susanne

    1996-01-01

    This essay on Inuit identity seeks to describe identity in terms of individual experience and of collective processes. These two elements are subsequently put into relation with the political situation of contemporary Inuit, particularly with their quest for self-determination. The author concludes...... that the maintenance of cultural identity is a process related to symbolic control....

  8. Music and collective identities

    Directory of Open Access Journals (Sweden)

    Milanović Biljana

    2007-01-01

    Full Text Available This paper presents some introductory observations on the ways in which the opposition between the modern and post-modern understanding of social identities can be overcome in the context of musicology. It is based on the consideration of identities as dynamic and changeable categories, as well as on the importance of the relation between individual and collective positionings, on the complexities of the multiple identifications and on the understanding of music as a social construction of identity. Due attention is paid to basic theoretical and methodological aspects in the interdisciplinary analysis of ′self′ and ′other′. In music, the problems of self-presentation appropriation, difference, power, control, authenticity, hybridity, as well as other issues that blur the boundaries between musicology, ethnomusicology and the studies of popular music, are made relevant by these interdisciplinary terms. Both the modern and post-modern understanding of identity can first be placed in the context of the binary questions: ′How to construct the identity and maintain it?′ and ′How to avoid the construction of the fixed identity and thus leave the door open for the possibility of change?′. It seems that the deconstruction of these opposite approaches has now grown in importance. This paper focuses especially on that kind of theorizing about music and socio-cultural identities. The views of Georgina Born and David Hesmondhalgh, that older and recent models of music representation are not ′either/or′ categories but rather complement each other, are especially singled out. These authors show by numerous examples that music can invariably both reflect existing identities and construct new ones. They conclude that possible shortcomings, such as the danger of essentialism in the earlier approach, and of later reductionism, could be avoided by carefully using the homology and process models of music representation. Their typology of music

  9. Zbtb20 Defines a Hippocampal Neuronal Identity Through Direct Repression of Genes That Control Projection Neuron Development in the Isocortex

    DEFF Research Database (Denmark)

    Nielsen, Jakob V; Thomassen, Mads; Møllgård, Kjeld

    2014-01-01

    Hippocampal pyramidal neurons are important for encoding and retrieval of spatial maps and episodic memories. While previous work has shown that Zbtb20 is a cell fate determinant for CA1 pyramidal neurons, the regulatory mechanisms governing this process are not known. In this study, we demonstrate...... that Zbtb20 binds to genes that control neuronal subtype specification in the developing isocortex, including Cux1, Cux2, Fezf2, Foxp2, Mef2c, Rorb, Satb2, Sox5, Tbr1, Tle4, and Zfpm2. We show that Zbtb20 represses these genes during ectopic CA1 pyramidal neuron development in transgenic mice. These data...

  10. Digital Identity Management Systems

    OpenAIRE

    Kuhar, Marko

    2010-01-01

    The goal of this thesis is a review of existing systems and technologies for managing digital identities. After the selection of the two most promising systems there will be a detailed comparison for a typical environment. In the first part of my thesis, the theory for understanding issues of identity management is introduced. Furthermore, the difference between identity and digital identity is explained and identity management itself is interpreted. An example of identity management solut...

  11. Zbtb20 defines a hippocampal neuronal identity through direct repression of genes that control projection neuron development in the isocortex.

    Science.gov (United States)

    Nielsen, Jakob V; Thomassen, Mads; Møllgård, Kjeld; Noraberg, Jens; Jensen, Niels A

    2014-05-01

    Hippocampal pyramidal neurons are important for encoding and retrieval of spatial maps and episodic memories. While previous work has shown that Zbtb20 is a cell fate determinant for CA1 pyramidal neurons, the regulatory mechanisms governing this process are not known. In this study, we demonstrate that Zbtb20 binds to genes that control neuronal subtype specification in the developing isocortex, including Cux1, Cux2, Fezf2, Foxp2, Mef2c, Rorb, Satb2, Sox5, Tbr1, Tle4, and Zfpm2. We show that Zbtb20 represses these genes during ectopic CA1 pyramidal neuron development in transgenic mice. These data reveal a novel regulatory mechanism by which Zbtb20 suppresses the acquisition of an isocortical fate during archicortical neurogenesis to ensure commitment to a CA1 pyramidal neuron fate. We further show that the expression pattern of Zbtb20 is evolutionary conserved in the fetal human hippocampus, where it is complementary to the expression pattern of the Zbtb20 target gene Tbr1. Therefore, the disclosed Zbtb20-mediated transcriptional repressor mechanism may be involved in development of the human archicortex.

  12. 微波辅助提取牡丹雄蕊总生物碱工艺研究%The microWave-assisted extraction technology of total alkaloids from peony stamens

    Institute of Scientific and Technical Information of China (English)

    马传利; 郑国生; 周远明; 史美丽

    2014-01-01

    采用微波辅助法提取牡丹雄蕊中的总生物碱。考察了料液比、浸润时间、微波加热提取时间、微波功率、pH值和乙醇浓度等对提取率的影响。结果表明,牡丹雄蕊总生物碱的最佳提取工艺条件为:料液比1:20,浸润时间24 h,微波加热提取时间15 min,微波功率500 W,pH 值3和乙醇浓度80%。在此最佳工艺条件下,牡丹雄蕊中总生物碱提取率为2.16%。%Total alkaloids were extracted from peony stamens through microwave-assisted technique. Effects of the ratio of sample weight to solvent volume,soakage time,microwave radiation time,microwave power,pH value and ethanol concentration were studied. Result shows that the optimum technology of the total alkaloids extraction:1 : 20 of solid to liquid,24 h of soakage in solvent,15 min of microwave-assisted extraction,500 W of microwave power,3 of pH value and 80% ethanol. Under the optimized conditions, the extraction percent of total alkaloids from peony stamens is about 2. 16% .

  13. A novel approach to search for identity by descent in small samples of patients and controls from the same mendelian breeding unit: a pilot study on myopia.

    Science.gov (United States)

    Heath, S; Robledo, R; Beggs, W; Feola, G; Parodo, C; Rinaldi, A; Contu, L; Dana, D; Stambolian, D; Siniscalco, M

    2001-01-01

    Autosomal dominant high myopia, a genetic disorder already mapped to region 18p11.31, is common in Carloforte (Sardinia, Italy), an isolated village of 8,000 inhabitants descending from a founder group of 300 in the early 1700s. Fifteen myopic propositi and 36 normal controls were selected for not having ancestors in common at least up to the grandparental generation, although still descendants of the original founders. All subjects were genotyped for 14 markers located on autosome 18 at a resolution of about 10 cM. Allelic distributions were found to be similar at all tested loci in propositi and controls, except for the candidate marker D18S63 known to segregate in close linkage association with high myopia. In particular, the frequency of allele 85 among the propositi was almost double that of the controls (Fisher's exact test, p = 0.037). The association is more striking when the frequency of the genotype 85/85 in the two groups is compared (Fisher's exact test, p = 0.005). This conclusion was further evaluated through a bootstrap analysis by computing the overall probability of the observed data under the null hypothesis (i.e. no difference between the two groups in frequency distributions for the chromosome 18 markers). Again, marker D18S63 was found to have a sample probability lower than 0.004, which is significant at the 0.05 level after correcting for simultaneous testing of multiple loci. The study demonstrates the efficiency of our novel strategy to detect identity by descent (IBD) in small numbers of patients and controls when they are both part of well-defined Mendelian breeding units (MBUs). The iterative application of our strategy in separate MBUs is expected to become the method of choice to evaluate the ever-growing number of reported associations between candidate genes and multifactorial traits and diseases.

  14. What is digital identity?

    OpenAIRE

    Ertzscheid, Olivier

    2016-01-01

    The question of digital identity and e-reputation is central in today’s Internet ecosystem, both in terms of individual and collective use. This book is an accessible guide to cutting-edge research on the subject and provides an overview of the fundamental issues that individuals need to master in order to retain control over their or their organization’s online presence. This is a book for readers who wish to discover more about this rich and complex issue, as well as for businesses, organi...

  15. Identity Management A Primer

    CERN Document Server

    Sharoni, Ilan; Williamson, Graham; Yip, David

    2009-01-01

    In an age in which the boundaries between the real and the virtual are becoming increasingly blurred, this timely guide teaches both the key issues of identity management as well as appropriate strategies and preventative measures for ensuring personal safety in the virtual world. In a corporate setting, it is essential to identify and control the way in which the organization deals with customers, suppliers, employees, and other users who may interact with the information systems of the company. Providing strategies for overcoming this task in real-world terms as well as questions that assist

  16. 智慧标识网络控制平面设计与实现%Design and Implementation of Control Plane in Smart Identity Network

    Institute of Scientific and Technical Information of China (English)

    丁杰; 郜帅

    2015-01-01

    With the rapid spread and explosive growth of the Internet,there have been an increasing demand of the Internet. The rigid and static Internet make it difficult to implement new technologies and new ideas. On the whole,the current Internet has three types of bind-ings due to the defect of design,namely the binding between resource and locators,the binding between control and data,and the binding between identity and locator,which are basically solved in smart identity network,greatly improving the security and mobility and other performance of Internet. While the prototype system of smart identity network means much to the development of theory and identification of novel achievement and idea. A design thought of the control plane of the prototype system is proposed in this paper and a qualitatively functional validation scheme is described,which fundamentally accomplish the implementation of resource adaption and decision delivery of the control plane.%随着互联网的迅速普及和爆炸性发展,网络资源利用率低、网络能耗高等弊端逐步显现。而互联网相对“静态”和“僵化”的网络体系和机制,导致互联网网络新技术和新思想在现有互联网的部署困难。现有互联网具有“三重绑定”的特征,即:服务的“资源和位置绑定”、网络的“控制和数据绑定”及“身份与位置绑定”。智慧标识网络从根本上解决了网络的“三重绑定”,能够使互联网的安全性、移动性等方面的性能得到极大改善。智慧标识网络原型系统是智慧标识网络理论体系验证平台,对理论研究的发展和新成果、新思想的验证具有重要意义。文中将提出一种智慧标识网络原型系统控制平面的设计思想,阐述了实现方案并定性验证了功能,完成了对智慧标识网络原型系统控制平面资源适配和决策下发的初步实现。

  17. Personal Identity in Italy

    Science.gov (United States)

    Crocetti, Elisabetta; Rabaglietti, Emanuela; Sica, Luigia Simona

    2012-01-01

    This chapter discusses specifics of identity formation in Italian adolescents and emerging adults. We review consistent evidence illustrating that, in Italy, a progressive deferral of transition to adulthood strongly impacts youth identity development by stimulating identity exploration and postponement of identity commitments. We also consider…

  18. Personal Identity in Italy

    Science.gov (United States)

    Crocetti, Elisabetta; Rabaglietti, Emanuela; Sica, Luigia Simona

    2012-01-01

    This chapter discusses specifics of identity formation in Italian adolescents and emerging adults. We review consistent evidence illustrating that, in Italy, a progressive deferral of transition to adulthood strongly impacts youth identity development by stimulating identity exploration and postponement of identity commitments. We also consider…

  19. Identity and identity conflict in the workplace

    NARCIS (Netherlands)

    K.E. Horton (Kate); P.S. Bayerl (Saskia); G. Belschak-Jacobs (Gabriele)

    2014-01-01

    textabstractAs individuals, we define ourselves according to various characteristics that include our values and beliefs. This gives us our identity. As organisations become increasingly complex, understanding the concept of identity conflict may mean the difference between success and failure.

  20. Identities as organizational practices

    DEFF Research Database (Denmark)

    Oshima, Sae; Asmuß, Birte

    Identity has been widely acknowledged as playing a central role in various organizational processes, yet there is still a need to better understand the dynamics and functions of identity work in modern organizations. The present paper is centered within this concern, and examines identity as inte......) reveal the intersubjective, multimodal and embodied nature of identity work; 2) demonstrate identity work as organizational practices, used in order to accomplish specific actions; and 3) pose a question on the view on identity as a layered/leveled phenomenon.......Identity has been widely acknowledged as playing a central role in various organizational processes, yet there is still a need to better understand the dynamics and functions of identity work in modern organizations. The present paper is centered within this concern, and examines identity...

  1. Negotiating work identity

    Directory of Open Access Journals (Sweden)

    Tamsen Saayman

    2011-03-01

    Full Text Available Orientation: The study explored the dynamics of work identity negotiation and construction.Research purpose: The aim of the study was to investigate identity tensions and demands that mobilise identity work in the work environment.Motivation for the study: The study hoped to improve the understanding of the dynamics of identity construction and negotiation.Research design, approach and method: Using grounded theory methodology in the context of qualitative field research, the researchers conducted two unstructured interviews with 28 employees of a South African manufacturing company.Main findings: The five primary dimensions the data yielded were personal identity, individual agency, social identity, social practice and job.Practical/managerial implications: This study has implications for organisations that want to improve productivity through understanding work identity.Contribution/value-add: The article presents a conceptual model of the demands and tensions that influence work identity.

  2. Researching Identity and Interculturality

    DEFF Research Database (Denmark)

    Lønsmann, Dorte

    2016-01-01

    Review of: Researching Identity and Interculturality / by F. Dervin and K. Risager (eds.). Routledge 2015, 245 pp.......Review of: Researching Identity and Interculturality / by F. Dervin and K. Risager (eds.). Routledge 2015, 245 pp....

  3. Diversity of deaf identities.

    Science.gov (United States)

    Bat-Chava, Y

    2000-12-01

    Social Identity Theory (Tajfel, 1981) posits that members of minority groups achieve positive social identity by (a) attempting to gain access to the mainstream through individual mobility or (b) working with other group members to bring about social change. Some people may use a combination of both strategies. Through the use of cluster analysis, the existence of three identities associated with these strategies was discerned in a sample of 267 deaf adults: culturally hearing identity, culturally deaf identity, and bicultural identity, each comprising about a third of the sample. A subset of 56 people were interviewed in depth; excerpts are presented to illustrate the identity types. Qualified support was found for the prediction that people with culturally deaf and bicultural identities would have higher self-esteem.

  4. Professional entrepreneurial identity construction

    DEFF Research Database (Denmark)

    Ramsgaard, Michael Breum

    2014-01-01

    The present study investigates the construction of a professional identity as an entrepreneur in a sample of people with educational background in nutrition and health. The study examines the connection between professional identity construction and entrepreneurial business emergence using...

  5. Language, Power and Identity

    Science.gov (United States)

    Wodak, Ruth

    2012-01-01

    How are identities constructed in discourse? How are national and European identities tied to language and communication? And what role does power have--power in discourse, over discourse and of discourse? This paper seeks to identify and analyse processes of identity construction within Europe and at its boundaries, particularly the diversity of…

  6. Experiencing with Identity

    DEFF Research Database (Denmark)

    Pors, Justine Grønbæk

    2012-01-01

    This article studies how a political organization begins to experiment with its identity. By use of an empirical case of the Danish Ministry of Education, I examine how a political organization supplements its identity of a legislating power with identities of a supervisor, beacon and facilitator...

  7. Identity Security Awareness

    OpenAIRE

    Philipsen, Nayna C.

    2004-01-01

    Identity theft is an increasing concern when organizations, businesses, and even childbirth educators ask for a client's Social Security number for identification purposes. In this column, the author suggests ways to protect one's identity and, more importantly, decrease the opportunities for identity theft.

  8. Teachers' Interpersonal Role Identity

    Science.gov (United States)

    van der Want, Anna C.; den Brok, Perry; Beijaard, Douwe; Brekelmans, Mieke; Claessens, Luce C. A.; Pennings, Helena J. M.

    2015-01-01

    This article investigates the link between teachers' appraisal of specific interpersonal situations in classrooms and their more general interpersonal identity standard, which together form their interpersonal role identity. Using semi-structured and video-stimulated interviews, data on teachers' appraisals and interpersonal identity standards…

  9. Mobile Identity Management

    NARCIS (Netherlands)

    Hoepman, J.J.

    2011-01-01

    Identity management consists of the processes and all underlying technologies for the creation, management, and usage of digital identities. Business rely on identity management systems to simplify the management of access rights to their systems and services for both their employees and their custo

  10. I am remix your web identity

    CERN Document Server

    Sordi, Paolo

    2015-01-01

    I Am: Remix Your Web Identity explores methods of designing and developing a personal website with RSS feeds that aggregate blog posts along with posts on social networks, such as Flickr, YouTube, Goodreads, Last.fm, and Delicious, in order to regain control and ownership (as well as authorship) of one's identity in one consistent and customized location. The book provides a short overview of the evolution of digital identity and the transformation of personal websites from Geocities to blogs...

  11. Understanding of and Approaches to Urban Identity

    Institute of Scientific and Technical Information of China (English)

    2010-01-01

    As an issue broadly related to local culture and urban morphology, urban identity is a prevalent and important factor to examine the quality of urban development. Currently, urban identity is mainly achieved by inheriting historical features instead of urban planning. This is largely due to the absence of planning control on the development goals and forms of urban space. Therefore, to define public aesthetics and guarantee it through an adequate centralization of power is critical for the establishment of urban identity.

  12. 番红花雄蕊柱头状物的离体再生%In Vitro Regeneration of Style-stigma-like Structure from Stamens of Crocus sativus

    Institute of Scientific and Technical Information of China (English)

    赵军; 陈放; 颜钫; 唐琳; 徐莺

    2001-01-01

    以番红花(Crocus sativusL.)雄蕊为材料诱导培养出花柱柱头状结构,诱导率可达30%,起源于花丝基部。影响雄蕊柱头状物诱导的主要因素为外植体的发育期和生长素NAA的使用浓度。幼嫩浅黄色雄蕊适于诱导柱头状物。温度和光照在不同激素水平下对雄蕊柱头状物诱导的影响不同。紫外检测表明,由雄蕊诱导出的柱头状物含有番红花甙、番红花醛和番红花苦甙。其含量明显高于由花柱诱导出的柱头状结构。在诱导花柱、子房、花瓣的柱头状物的过程中,观察到成花逆转现象。%Style-stigma-like structures were regenerated from stamens ofCrocus sativus L. The age of the stamen explant has an obvious effect on the induction rate. Auxin NAA has larger effect on the induction of filament style-stigma-like structure. Auxin NAA of higher concentration can lead to higher induction rate. Temperature and light have different effects on the induction of style-stigma-like structure from anther's filament of C.sativus with exogenous hormones at different levels. Ultraviolet tests show that style-stigma-like structure from anther's filament of C.sativus contains crocin, safranal and picrocrocin, contents of which are obviously more than those contained in the style-stigma-like from style. Floral reversion was observed in the induction of style-stigma-like structure from petals, ovaries and styles.

  13. Social Identity and Preferences*

    Science.gov (United States)

    Benjamin, Daniel J.; Choi, James J.; Strickland, A. Joshua

    2009-01-01

    Social identities prescribe behaviors for people. We identify the marginal behavioral effect of these norms on discount rates and risk aversion by measuring how laboratory subjects’ choices change when an aspect of social identity is made salient. When we make ethnic identity salient to Asian-American subjects, they make more patient choices. When we make racial identity salient to black subjects, non-immigrant blacks (but not immigrant blacks) make more patient choices. Making gender identity salient has no effect on intertemporal or risk choices. PMID:20871741

  14. Keeping identity private

    DEFF Research Database (Denmark)

    Adjei, Joseph K.; Olesen, Henning

    2011-01-01

    Privacy has become a major issue for policy makers. This has been impelled by the rapid development of technologies that facilitate collection, distribution, storage, and manipulation of personal information. Business organizations are finding new ways of leveraging the value derived from consumer...... is an attempt to understand the relationship between individuals’ intentions to disclose personal information, their actual personal information disclosure behaviours, and how these can be leveraged to develop privacy-enhancing identity management systems (IDMS) that users can trust. Legal, regu...... information. On the other hand, consumers have expressed concerns that their rights and ability to control their personal information are violated. Paradoxically, it appears that users provide personal data freely and willingly, as it has been observed on Facebook and other social networks. This study...

  15. Biometrics and Identity Management

    DEFF Research Database (Denmark)

    security and border control scenarios it is now apparent that the widespread availability of biometrics in everyday life will also spin out an ever increasing number of (private) applications in other domains. Crucial to this vision is the management of the user's identity, which does not only imply...... management. BIOID 2008. The papers are categorized in four classes. These classes represent the 4 working groups of the COST Action 2101. For more information, see http://www.cost2101.org/.   Biometric data quality and multimodal biometric templates, Unsupervised interactive interfaces for multimodal...... of the Workshop are: The European Biometrics Forum, The Danish Biometrics Research Project Consortium, the UK Biometrics Institute and the Institution of Engineering and Technology. The BIOID workshop was jointly organized and held at the Roskilde University in Denmark from May 7 — May 9, 2008....

  16. Identity and Professional Networking.

    Science.gov (United States)

    Raj, Medha; Fast, Nathanael J; Fisher, Oliver

    2017-06-01

    Despite evidence that large professional networks afford a host of financial and professional benefits, people vary in how motivated they are to build such networks. To help explain this variance, the present article moves beyond a rational self-interest account to examine the possibility that identity shapes individuals' intentions to network. Study 1 established a positive association between viewing professional networking as identity-congruent and the tendency to prioritize strengthening and expanding one's professional network. Study 2 revealed that manipulating the salience of the self affects networking intentions, but only among those high in networking identity-congruence. Study 3 further established causality by experimentally manipulating identity-congruence to increase networking intentions. Study 4 examined whether identity or self-interest is a better predictor of networking intentions, providing support for the former. These findings indicate that identity influences the networks people develop. Implications for research on the self, identity-based motivation, and professional networking are discussed.

  17. The Supermalt identity

    DEFF Research Database (Denmark)

    Bech-Larsen, Tino; Esbjerg, Lars; Grunert, Klaus G.

    2007-01-01

    -Caribbean informants. The food and beverage consumption of informants reflects their mixed cultural identity. The brand identity Supermalt appears to be malleable, with ample room for consumer co-construction. Perceptions of brand identity differ markedly among informants, who are all able to construct Supermalt...... on consumers' self-identities. The second part explored the role of food and beverage products in the construction of self-identities. The final part focused on the construction of brand identity for Supermalt. Findings - The article provides information on the self-identities constructed by Afro...... aiming to develop strong brands with a limited marketing budget. Based on the Supermalt case, suggestions are made regarding branding in relation to ethnic minorities. Originality/value - This article provides a study of a brand that has become strong within a narrowly defined group of consumers....

  18. Experiences and Lessons Learnt with Collaborative e-Research Infrastructure and the application of Identity Management and Access Control for the Centre for Environmental Data Analysis

    Science.gov (United States)

    Kershaw, P.

    2016-12-01

    CEDA, the Centre for Environmental Data Analysis, hosts a range of services on behalf of NERC (Natural Environment Research Council) for the UK environmental sciences community and its work with international partners. It is host to four data centres covering atmospheric science, earth observation, climate and space data domain areas. It holds this data on behalf of a number of different providers each with their own data policies which has thus required the development of a comprehensive system to manage access. With the advent of CMIP5, CEDA committed to be one of a number of centres to host the climate model outputs and make them available through the Earth System Grid Federation, a globally distributed software infrastructure developed for this purpose. From the outset, a means for restricting access to datasets was required, necessitating the development a federated system for authentication and authorisation so that access to data could be managed across multiple providers around the world. From 2012, CEDA has seen a further evolution with the development of JASMIN, a multi-petabyte data analysis facility. Hosted alongside the CEDA archive, it provides a range of services for users including a batch compute cluster, group workspaces and a community cloud. This has required significant changes and enhancements to the access control system. In common with many other examples in the research community, the experiences of the above underline the difficulties of developing collaborative e-Research infrastructures. Drawing from these there are some recurring themes: Clear requirements need to be established at the outset recognising that implementing strict access policies can incur additional development and administrative overhead. An appropriate balance is needed between ease of access desired by end users and metrics and monitoring required by resource providers. The major technical challenge is not with security technologies themselves but their effective

  19. Cyclobenzaprine ER for muscle spasm associated with low back and neck pain: two randomized, double-blind, placebo-controlled studies of identical design.

    Science.gov (United States)

    Malanga, Gerard A; Ruoff, Gary E; Weil, Arnold J; Altman, Charles A; Xie, Fang; Borenstein, David G

    2009-05-01

    To evaluate efficacy and tolerability of once-daily cyclobenzaprine extended release (CER) 15- and 30-mg capsules in patients with muscle spasm associated with acute, painful musculoskeletal conditions. Two identically designed, randomized, double-blind, placebo- and active-controlled, parallel-group studies in patients aged 18-75 years with muscle spasm associated with neck or back pain. Patients received CER 15 or 30 mg once daily, cyclobenzaprine immediate release (CIR) 10 mg three times daily, or placebo for 14 days. Primary efficacy measures were patient's rating of medication helpfulness and physician's clinical global assessment of response to therapy at day 4. Secondary measures were patient's rating of medication helpfulness and physician's clinical global assessment of response (days 8 and 14), relief from local pain, global impression of change, restriction in activities of daily living, restriction of movement, daytime drowsiness, quality of nighttime sleep (days 4, 8, and 14), and quality of life (days 8 and 14). A total of 156/254 randomized patients in study 1 and 174/250 in study 2 completed 14 days of treatment. Significant improvements in patient's rating of medication helpfulness were reported with CER versus placebo (CER 30 mg, study 1, p = 0.007; CER 15 mg, study 2, p = 0.018) at day 4. Significant improvements with CER 30 mg versus placebo were also seen at day 4 in study 1 for patient-rated global impression of change (p = 0.008), relief of local pain (p = 0.004), and restriction of movement (p = 0.002). Neither study reported differences between study groups on the physician's clinical global assessment. Improvements with CER were comparable to that of CIR. In both studies, daytime drowsiness was reported more frequently in active treatment groups than in the placebo group; however, reports of drowsiness decreased over time in all groups. In general, daytime drowsiness was reported more frequently in CIR groups than in CER groups. More

  20. The Effect of Identity Development, Self-Esteem, Low Self-Control and Gender on Aggression in Adolescence and Emerging Adulthood

    Science.gov (United States)

    Morsunbul, Ümit

    2015-01-01

    Problem Statement: Aggression seems to be an extensive and serious problem among adolescents and emerging adults, negatively affecting both the victims and the offenders. In adolescence and emerging adulthood, a lot of factors affect aggression. In this study, five factors were examined: gender, life periods, identity formation, low self-control…

  1. Controlling National Identity and Reshaping the Role of Education: The Vision of State Formation in Meiji Japan and the German "Kaiserreich"

    Science.gov (United States)

    Shibata, Masako

    2004-01-01

    In Meiji Japan (1868?1912) and the German "Kaiserreich" (1871-1918), the educational system assisted the state in the definition of the notions of national identity. They developed, it is broadly claimed, within a similar vision of a state, which culminated in similar patterns of nationalism towards the end of the Second World War. In this article…

  2. Genetics and identity.

    Science.gov (United States)

    Nordgren, Anders

    2008-01-01

    For the last 20 years the concepts of identity and identification have been subject to much interest in the humanities and social sciences. However, the implications of genetics for identity and identification have been largely neglected. In this paper, I distinguish various conceptions of identity (as continuity over time, as basic kind of being, as unique set of properties, and as social role) and identification (as subjective experience of identity in various senses and as social ascription of identity in various senses), and investigate systematically genetic perspectives on each of these conceptions. I stress the importance of taking the genetic perspectives seriously but also their limitations. In particular, I pinpoint conceptual problems that arise when a genetic approach to identity is adopted.

  3. Identity and total institution

    Directory of Open Access Journals (Sweden)

    Ljubičić Milana

    2015-01-01

    Full Text Available This paper analyses a psychiatric institution resident’s identity (self- construction processes. Our quest was grounded on constructivist theoretical paradigm that sees identity as a manner a person defines oneself in accordance with offered social repertoire. In other words, the total institution milieu offers limited range of identities to its residents. On the other hand, the latter are not just passive subjects that identity is imposed upon. They are able to use a number of adjustment mechanisms to the knowledge about themselves - ranging from symbolic escape to open resistance against the imposed image about them; to obedience, and we were interested to understand the (supposed complex dynamic of identity (re-building in, so-called, special or forensic patients. In order to understand this process and attempting to discover, besides the manifest also the latent layer of the story about self, the local, or personal, identity understanding was examined.

  4. Exploring medical identity theft.

    Science.gov (United States)

    Mancilla, Desla; Moczygemba, Jackie

    2009-09-16

    The crime of medical identity theft is a growing concern in healthcare institutions. A mixed-method study design including a two-stage electronic survey, telephone survey follow-up, and on-site observations was used to evaluate current practices in admitting and registration departments to reduce the occurrence of medical identity theft. Survey participants were chief compliance officers in acute healthcare organizations and members of the Health Care Compliance Association. Study results indicate variance in whether or how patient identity is confirmed in healthcare settings. The findings of this study suggest that information systems need to be designed for more efficient identity management. Admitting and registration staff must be trained, and compliance with medical identity theft policies and procedures must be monitored. Finally, biometric identity management solutions should be considered for stronger patient identification verification.

  5. Athletic identity foreclosure.

    Science.gov (United States)

    Brewer, Britton W; Petitpas, Albert J

    2017-08-01

    Athletic identity foreclosure refers to commitment to the athlete role in the absence of exploration of occupational or ideological alternatives. This article traces the theoretical underpinnings of the construct, examines the role of sport participation in identity development, and provides an overview of the course, correlates, and consequences of athletic identity foreclosure. Implications for future research are discussed. Copyright © 2017 Elsevier Ltd. All rights reserved.

  6. Preventing Identity Theft

    OpenAIRE

    Jensen, Christine

    2004-01-01

    Identity theft is becoming more common and is a very serious crime. Victims of identity theft can spend months or years and a lot of hard earned money cleaning up the mess thieves have made of their good name and credit record. Identity thieves can use your personal information to take over your credit accounts and open new ones. They may even use your good credit to get a job, take out a car loan, or rent an apartment. Identity theft victims may lose job opportunities, be refused loans for e...

  7. Personal Identity in Enhancement

    Directory of Open Access Journals (Sweden)

    Jana Podroužková

    2015-09-01

    Full Text Available The aim of this paper is to introduce the concept of human enhancement, its methods and its relation to personal identity. Also several approaches to personal identity will be described. Transhumanism is a special think tank supporting human enhancement through modern technologies and some of its representatives claim, that even great changes to human organisms will not affect their personal identity. I will briefly describe the most important means of human enhancment and consider the problem of personal identity for each of them separately.

  8. Identity/Time

    Directory of Open Access Journals (Sweden)

    Nancy J. Knauer

    2013-09-01

    Full Text Available This paper engages the unspoken fourth dimension of intersectionality—time. Using the construction of lesbian, gay, bisexual, and transgender (LGBT identities as an example, it establishes that identity, as it is lived and experienced, is not only multivalent, but also historically contingent. It then raises a number of points regarding the temporal locality of identity—the influence of time on issues of identity and understanding, its implications for legal interventions, social movement building, and paradigms of progressive change. As the title suggests, the paper asks us to consider the frame of identity over time.

  9. Elective Identities, (Culture, Identization and Integration)

    NARCIS (Netherlands)

    S.J. Magala (Slawomir)

    2002-01-01

    textabstractMost of contemporary individual and social identities (constructed with societal, cultural and technological resources) are radically autonomous, nomadic and virtual - i.e. they are de-traditionalized, open to negotiation and not based on a single interpretation of a tradition.

  10. "I provide the pleasure, I control it": sexual pleasure and "bottom" identity constructs amongst gay youth in a Stepping Stones workshop.

    Science.gov (United States)

    Kiguwa, Peace

    2015-11-01

    This paper explores the meanings attached to gay sexuality through the self-labelling practices of a group of young gay-identified students in focus group and individual interviews in Johannesburg, South Africa. These meanings include constructs of the dynamics surrounding safe sex negotiation and risk related to "top-bottom" subject positioning as well as the erotics of power and desire that are imbued in these practices and positioning. Using performativity theory as a theoretical tool of analysis, I argue that constructs of "top-bottom" subjectivities can be seen to meet certain erotic needs for LGBTI youth, including reasons related to physical safety for LGBTI people living in dangerous spaces. The performance of "bottom" identities in sexual intimacy and behaviour is further deployed in the expression and performance of power that the participants construct as erotic. The implications for sexual health intervention include understanding the gendered performance influences of sexual behaviour including safe sex, exploring creative ways that practices of sexual health can be engaged with this population group in a way that accommodates the erotic pleasure interfaced with sexual identity identifications and performances of "bottom" identities.

  11. Identity without Membership?

    DEFF Research Database (Denmark)

    Dobusch, Leonhard; Schoeneborn, Dennis

    the formation of organizational identity in more fluid organizational settings. Drawing on an empirical study of the hacker collective Anonymous, we show that organizational identity is formed through public communicative events that are subject to meaning negotiation whether or not actions can be attributed...

  12. Corporate identity. Brand designs.

    Science.gov (United States)

    Mathieson, Steve

    2004-02-19

    The past two years have seen a steadily more consistent brand identity for the NHS. Branding will become more important as foundation status and PCT commissioning makes acute hospitals more competitive. This has put pressure on some trusts that have their own strong identities.

  13. Capturing Chemical Identity Thinking

    Science.gov (United States)

    Ngai, Courtney; Sevian, Hannah

    2017-01-01

    Chemical identity, the idea that every substance has at least one property that makes it unique and able to be differentiated from other substances, is core to the practice of chemistry. Such practice requires using properties to classify as well as to differentiate. Learning which substance properties are productive in chemical identity thinking…

  14. Personal Identity in Japan

    Science.gov (United States)

    Sugimura, Kazumi; Mizokami, Shinichi

    2012-01-01

    This chapter explores characteristics of identity formation among Japanese adolescents and young adults living in a cultural context where individualism has been increasingly emphasized even while maintaining collectivism. We argue that, to develop a sense of identity in Japanese culture, adolescents and young adults carefully consider others'…

  15. Identities-in-action

    DEFF Research Database (Denmark)

    Stentoft, Diana; Valero, Paola

    2009-01-01

    The notion of identity is often used in mathematics education research in an attempt to link individual and social understandings of mathematical learning. In this paper we review existing research making use of the notion of identity, and we point to some of the strengths and weaknesses in the w...

  16. Teachers' interpersonal role identity

    NARCIS (Netherlands)

    van der Want, Anna C.; den Brok, Perry; Beijaard, Douwe; Brekelmans, Mieke; Claessens, Luce C A; Pennings, Helena J M

    2014-01-01

    This article investigates the link between teachers' appraisal of specific interpersonal situations in classrooms and their more general interpersonal identity standard, which together form their interpersonal role identity. Using semi-structured and video-stimulated interviews, data on teachers' ap

  17. Teachers' Interpersonal Role Identity

    NARCIS (Netherlands)

    van der Want, Anna C.; den Brok, Perry; Beijaard, Douwe; Brekelmans, Mieke; Claessens, Luce C A; Pennings, Helena J M

    2015-01-01

    This article investigates the link between teachers' appraisal of specific interpersonal situations in classrooms and their more general interpersonal identity standard, which together form their interpersonal role identity. Using semi-structured and video-stimulated interviews, data on teachers' ap

  18. Cultural Identity Through CLIL

    OpenAIRE

    Oprescu Monica

    2015-01-01

    The CLIL approach is a modern manner of teaching English, which has been adapted in Romanian schools and universities. An interesting aspect of learning a foreign language is the contact with its culture/s and the changes it produces in terms of identity. Therefore, a challenging question to be answered is whether a CLIL approach focusing on culture influences students' cultural identity.

  19. Value Conditionality of Identity

    Directory of Open Access Journals (Sweden)

    M M Yusupov

    2013-12-01

    Full Text Available The article considers theoretical approaches to the study of values and identity, and reveals the role of values in the formation of the ethnic, regional and Russian identity on the example of Chechnya and the North Caucasus, with the sociological indicators characterizing value orientations and self-identification.

  20. Identity And Privacy Services

    Directory of Open Access Journals (Sweden)

    Harry Katzan, Jr.

    2010-12-01

    Full Text Available Personal identity and privacy are important topics in information systems in general and data analytics in particular.  Normally associated with digital security, the scope of identity and privacy is much greater and affects most aspects of everyday life.  Related subjects are behavioral tracking, personal-identifiable information (PII, privacy data relevance, data repurposing, identity theft, and homeland security.  Identity and Privacy Services is an admixture of the major issues in the area of personal identity and privacy and the security of individual rights in a complex societal environment.  This is a general paper on this important subject, intended to give exposure to the constituent topics.

  1. Visual identity and rebranding

    Directory of Open Access Journals (Sweden)

    Katarzyna Wrona

    2015-06-01

    Full Text Available The goal of this article is to highlight the essence of visual identification and rebranding, as well as to discuss elements of corporate identity, which are subject to revitalization in the process of refreshing the image of a brand. In the first part the article the analysis of the term visual identification is conducted. In the analysis special attention is drawn to the role of visual identification in creating a coherent identity of an organization. In the subsequent chapters further components of corporate identity are presented in detail – starting with logotype, through business forms, advertisements, accompanying materials and Internet websites to signs on buildings. Moreover, corporate identity book as a collection of standards and guidelines for application of corporate identity rules is discussed. The deliberations are based on the study of literature. The last chapter presented the transformation of the brand of Institute of Aviation.

  2. Do consanguineous parents of a child affected by an autosomal recessive disease have more DNA identical-by-descent than similarly-related parents with healthy offspring? Design of a case-control study

    Directory of Open Access Journals (Sweden)

    Cornel Martina C

    2010-07-01

    Full Text Available Abstract Background The offspring of consanguineous relations have an increased risk of congenital/genetic disorders and early mortality. Consanguineous couples and their offspring account for approximately 10% of the global population. The increased risk for congenital/genetic disorders is most marked for autosomal recessive disorders and depends on the degree of relatedness of the parents. For children of first cousins the increased risk is 2-4%. For individual couples, however, the extra risk can vary from zero to 25% or higher, with only a minority of these couples having an increased risk of at least 25%. It is currently not possible to differentiate between high-and low-risk couples. The quantity of DNA identical-by-descent between couples with the same degree of relatedness shows a remarkable variation. Here we hypothesize that consanguineous partners with children affected by an autosomal recessive disease have more DNA identical-by-descent than similarly-related partners who have only healthy children. The aim of the study is thus to establish whether the amount of DNA identical-by-descent in consanguineous parents of children with an autosomal recessive disease is indeed different from its proportion in consanguineous parents who have healthy children only. Methods/Design This project is designed as a case-control study. Cases are defined as consanguineous couples with one or more children with an autosomal recessive disorder and controls as consanguineous couples with at least three healthy children and no affected child. We aim to include 100 case couples and 100 control couples. Control couples are matched by restricting the search to the same family, clan or ethnic origin as the case couple. Genome-wide SNP arrays will be used to test our hypothesis. Discussion This study contains a new approach to risk assessment in consanguineous couples. There is no previous study on the amount of DNA identical-by-descent in consanguineous

  3. 新疆高葶韭雄蕊开花动态特征与花粉育性研究%Stamen dynamics and pollen fertility of Allium obliquum in Xinjiang Province,China

    Institute of Scientific and Technical Information of China (English)

    林辰壹; 韩文娟; 祁晨霞; 叶强

    2012-01-01

    Allium obliquum only distributes in the Xinjiang Province,China.The marked plants were used to observe stamen morphological characteristics to analyze the floral dynamics of stamen and test pollen fertility of A.obliquum by 6 methods.This study showed that five morphological phases were found during flowering period.The inner filaments earlier expanded than the outer ones,and the inner anthers firstly expanded from perianth.It was about 4-5 d for all 6 anthers from open to fall.The individual anther released pollen about 1.5-2.0 h from the beginning dispersion to the end.Pollen viability kept about 0-10 h above 50% after anther dehiscence.The triphenyl tetrazolium chloride,diphenyl tetrazolium bromide,benzidine,and the in vitro germination test were used to test pollen fertility and the acetocarmine and iodine potassium iodide test was not suitable for A.obliquum pollen testing.A.obliquum was dichogamy and protandry with fertility,short longevity pollen,which would provide basic theory and method for pollen development,pollination biology and artificial sexual reproduction by and six methods were used to test pollen fertility.%为进一步研究国内仅分布于新疆的高葶韭(Allium obliquum)花粉发育、传粉生物学以及为高葶韭人工有性繁殖提供理论依据和试验方法,定株观察了花期高葶韭雄蕊的开花进程以及形态变化特征,并采用6种方法测定了高葶韭花粉育性。结果显示,高葶韭单花开放经过5个形态变化至花药脱落和花被片完全闭合。高葶韭内轮花丝先于外轮花丝伸长,内轮花药先伸出花被片,随后外轮花药陆续伸出花被片。雄蕊开放至6枚花药全部脱落4~5d。单枚花药从散粉到完全散粉一般需要1.5~2.0h。散粉后高葶韭花粉活力(萌发率)0~10h内超过50%。0.5%氯化三苯基四氮唑、四甲基偶氮唑、联苯胺和离体萌发法可以用来检验高葶韭花粉活力和花粉萌发率,而醋酸洋红和碘-

  4. [Diagnosing gender identity].

    Science.gov (United States)

    Kaltiala-Heino, Riittakerttu; Mattila, Aino; Kärnä, Teemu; Joutsenneimi, Kaisla

    2015-01-01

    Transsexualism and other variations of gender identity are based on a stable sense of identity. The aetiology of this phenomenon is not fully known. Suffering caused by gender dysphoria is alleviated with sex reassignment. The psychiatric assessment of both adolescents and adults has been centralized in Finland to two university hospitals, the Helsinki University Hospital and Tampere University Hospital. In both hospitals, multidisciplinary teams aim at differential diagnosis by using well-known psychiatric and psychological instruments. Wishes for sex reassignment that are caused by a mental health disorder are excluded. Assessment in adolescence is challenging because the identity in youth is still forming.

  5. Linguistic identity matching

    CERN Document Server

    Lisbach, Bertrand

    2013-01-01

    Regulation, risk awareness and technological advances are increasingly drawing identity search functionality into business, security and data management processes, as well as fraud investigations and counter-terrorist measures.Over the years, a number of techniques have been developed for searching identity data, traditionally focusing on logical algorithms. These techniques often failed to take into account the complexities of language and culture that provide the rich variations  seen in names used around the world. A new paradigm has now emerged for understanding the way that identity data

  6. [Gender identity and eating disorders].

    Science.gov (United States)

    Behar, R; de la Barrera, M; Michelotti, J

    2001-09-01

    A possible role of the feminine gender role in the genesis of eating disorders is possible, since most patients with these disorders are women. To compare some traits of gender identity between females with eating disorders and a control group. An structured clinical interview based on the DSM-IV diagnostic criteria for eating disorders and the Bem Sex Role Inventory (BSRI) were administered to 63 patients that fulfilled the DSM-IV criteria for anorexia nervosa or bulimia nervosa (ED group) and 63 comparison subjects (C group). Forty three percent of patients in contrast with 23.8% of controls were classified within the feminine category. Likewise 19% of patients and 31.7% of controls were qualified as Androgynous; 27% of patients and 43% of controls were qualified as Undifferentiated. There were significant differences between patients and controls in 22 items of the BSRI (p gender identity in patients suffering of eating disorders. In contrast, Androgyny showed by the control group could result in a better adaptability and flexibility to face difficult life circumstances.

  7. 1 THE HUMANITIES AND NATIONAL IDENTITY, SECURITY AND ...

    African Journals Online (AJOL)

    User

    looked at clarification of concepts like the humanities, national ... challenges of Nigeria in terms of national identity and security. The ... among different ethnic groups in Nigeria and also pose a .... with political representation as well as access to and control of ... identity instead of national identity is articulated in all aspects.

  8. Adolescence: Search for an Identity

    Science.gov (United States)

    Kasinath, H. M.

    2013-01-01

    James Marcia (1991, 1994, 1999, 2002) expanded on Erikson's theory of identity formation. Specifically, he focused on two essential processes in achieving a mature identity: exploration and commitment. Erikson's observations about identity were extended by Marcia, who described four identity statuses: identity diffusion, foreclosure, moratorium…

  9. Vocational Identity and Ego Identity Status in Korean Nursing Students

    Directory of Open Access Journals (Sweden)

    Hyun-Young Koo, PhD, RN

    2016-03-01

    Conclusions: These findings show that nursing students in identity achievement status have secure and clear vocational identities. Further longitudinal and qualitative studies are needed to find out if identity formation among nursing students changes with age.

  10. Interplay Between Intended Brand Identity and Identities in a Nike Related Brand Community

    DEFF Research Database (Denmark)

    Kornum, Niels; Gyrd-Jones, Richard; Al Zagir, Nadia

    2017-01-01

    While branding research traditionally views brand identity as an inside-out management controlled phenomenon, recent research emphasizes that a wide variety of stakeholders in the brand ecosystem enact and co-create brand identity. Following this theoretical perspective, management forms......, this research compares individual and collective articulations of a Nike related brand community with articulations of the intended brand identity. While earlier findings solely emphasize inside-out brand management or outside-in brand community perspectives, the findings of this article reveal a nested system...... the intended brand identity in a deliberate process and articulates this identity, surfacing as values and artifacts. Stakeholders develop and articulate values and artifacts in their own manner, but enact the brand identity at the same time. On the basis of data from a participatory ethnographic study...

  11. Gender Identity: Intersex Individuals

    Directory of Open Access Journals (Sweden)

    Ilhame Khabar

    2016-12-01

    Full Text Available According to past beliefs and social norms, society has been taught that their has only been two types of biological structures regarding the ideal male and female. The majority of society has also believed that gender identity was specific only to those structures, as most have had a very fixed perspective of men and women and the sexual organs that are associated. In today's society, there has been an observed increase of many variations in sexual orientation, gender identity, gender expression, and sex anatomy. Awareness has been subtle, yet growing on gender identity and intersex individuals; however, some studies and popular media stories have also shown that many of these individuals have experienced trauma and hardship due to their ambiguous genitalia and how it has affected their gender identity.

  12. Identity after Death

    DEFF Research Database (Denmark)

    Gerstrøm, Anna

    2015-01-01

    of the financial industry. Findings: The paper finds that members of a dead organization construct a bankruptcy narrative that is also a legacy organizational identity narrative including a legacy organizational identity transformation and several identities that have positive and negative aspects...... evidence on ways that legacy organizational identity from a dead organization play a substantial role in a living organization. Research limitations/implications: Because of the chosen research approach, the research results may lack generalizability. Practical implications: The paper holds insight...... that can help practitioners understand members of a dying organization -- including the ways they come to form and perform in a new organizational context; an understanding that is a prerequisite for helping and supporting these members in coming to perform satisfyingly in the new organization. Originality/value...

  13. Researcher Identities in Transition

    DEFF Research Database (Denmark)

    Castelló, Montserrat; Wisker, Gina; Kobayashi, Sofie

    as other emergent ‘signals’, the latent or clear indications from institutions and academic communities regarding career directions and necessary professional skills and attitudes should be identified and interpreted for researchers to adequately develop their new identities. The aim of this paper...... is twofold: a) to present a comprehensive framework of the notion of researcher identity by means of analysing those spheres of activity related to researcher and career development; and b) to relate researcher identities to the experiences of early career researchers with issues concerning signals......Researchers are now embarked upon what we define as a ‘risk career’, rather than, as previously, a relatively more predictable academic career. In this changing context, traditional milestones that enabled early career researchers to build their identities are disappearing. Instead, what we define...

  14. Autoethnography: Inquiry into Identity

    Science.gov (United States)

    Hoppes, Steve

    2014-01-01

    This chapter provides guidelines and suggestions for assessing student development using autoethnography, a qualitative research method. Autoethnography guides students in examining the nexus between personal and professional identities, including skills, challenges, values, histories, and hopes for the future.

  15. Personal Identity Online

    DEFF Research Database (Denmark)

    Rodogno, Raffaele

    2012-01-01

    Philosophers concerned with the question of personal identity have typically been asking the so-called re-identification question: what are the conditions under which a person at one point in time is properly re-identified at another point in time? This is a rather technical question. In our...... everyday interactions, however, we do raise a number of personal identity questions that are quite distinct from it. In order to explore the variety of ways in which the Internet may affect personal identity, I propose in this study to broaden the typical philosophical horizon to other more mundane senses...... of the question. In Section 2, I describe a number of possible meanings of personal identity observed in everyday contexts and more philosophical ones. With some caveats, I argue that it is the specific context in which the question arises that disambiguates the meaning of the question. Online contexts are novel...

  16. The Supermalt identity

    DEFF Research Database (Denmark)

    Bech-Larsen, Tino; Esbjerg, Lars; Grunert, Klaus G.

    2007-01-01

    aiming to develop strong brands with a limited marketing budget. Based on the Supermalt case, suggestions are made regarding branding in relation to ethnic minorities. Originality/value - This article provides a study of a brand that has become strong within a narrowly defined group of consumers.......Purpose - The objective of this article is to conduct a case study of the Supermalt brand of malt beer, which has become the preferred beverage of Afro-Caribbean consumers in Brixton on a very limited marketing budget. Design/methodology/approach - The article uses the concepts of personal identity...... and brand identity in a qualitative study to explore how Brixtonbased Afro-Caribbean consumers construct their self-identities and the brand identity of Supermalt. Semi-structured interviews were conducted with 14 Afro-Caribbean consumers. Each interview was divided into three parts. The first part focused...

  17. Personal Identity Online

    DEFF Research Database (Denmark)

    Rodogno, Raffaele

    2012-01-01

    Philosophers concerned with the question of personal identity have typically been asking the so-called re-identification question: what are the conditions under which a person at one point in time is properly re-identified at another point in time? This is a rather technical question. In our...... everyday interactions, however, we do raise a number of personal identity questions that are quite distinct from it. In order to explore the variety of ways in which the Internet may affect personal identity, I propose in this study to broaden the typical philosophical horizon to other more mundane senses...... of the question. In Section 2, I describe a number of possible meanings of personal identity observed in everyday contexts and more philosophical ones. With some caveats, I argue that it is the specific context in which the question arises that disambiguates the meaning of the question. Online contexts are novel...

  18. Esperanto & cultural identity

    OpenAIRE

    Lehrmann, Ask; Christensen, Julie Hellesøe; Dzieza, Malgorzata; Hansen, Nathalie Gylling

    2007-01-01

    The topic of this project is the relationship between culture, cultural identity and language, and their relationship to the ambiguous concept of neutrality. Taking a case study of Esperanto, an artificial language designed with the specific intention of being a completely neutral and nationless language, we will explore how languages relate to the world. By comparing the thoughts on culture and group identity of various authors, we will then try to explore the concept of neutrality – for can...

  19. Visual identity and rebranding

    OpenAIRE

    Katarzyna Wrona

    2015-01-01

    The goal of this article is to highlight the essence of visual identification and rebranding, as well as to discuss elements of corporate identity, which are subject to revitalization in the process of refreshing the image of a brand. In the first part the article the analysis of the term visual identification is conducted. In the analysis special attention is drawn to the role of visual identification in creating a coherent identity of an organization. In the subsequent chapters further comp...

  20. Cultural Identity Through CLIL

    Directory of Open Access Journals (Sweden)

    Oprescu Monica

    2015-11-01

    Full Text Available The CLIL approach is a modern manner of teaching English, which has been adapted in Romanian schools and universities. An interesting aspect of learning a foreign language is the contact with its culture/s and the changes it produces in terms of identity. Therefore, a challenging question to be answered is whether a CLIL approach focusing on culture influences students' cultural identity.

  1. IMMIGRATION, IDENTITY AND LITERATURE

    Directory of Open Access Journals (Sweden)

    Semran CENGİZ

    2010-12-01

    Full Text Available The leading problems incidental to the globalization are the immigration, the poverty, the adaptation problems of the immigrants, the identity and the cultural conflicts. The globalization actors that are transforming the whole world to a huge market, consider to commercialize the product even to the people at the other end of the world. Therefore they lay emphasis on its local identity and remark its variety as its richness. In this way the limits are easily exceeded and the consumption culture becomes available to be instilled upon even the people at the back of the beyond. However one party always wins; the more some people consume, the more some people make profit. The people who does not have any power to consume anymore, becomes the guest of the ones who get them adopt this habit and desires to receive a share from this profit.The modern world people who are not pleased with this situation, have made every effort to alienate the immigrants from the center but they could not succeed. The situation that gave rise to a conflict between parties, have also led the identity problems to occur. In the present situation, the immigrants are trying to take place in the modern world as people with hybrid identities. The music produced by the children of the immigrants with double identities, attracts attention of the world where the immigrant identity, changing its shell, promises hope as the conciliation area of the new century.

  2. Names and Collective Identity

    Directory of Open Access Journals (Sweden)

    Otto Krogseth

    2012-08-01

    Full Text Available The preceding two decades have displayed a remarkable awareness for a connection between the concepts "identity" and "cultural memory". David Lowenthal speaks of a "current craze for heritage"! Cultural heritage has become extremely popular, especially in combination with tourism, and has accordingly been converted into a modern system of meaning a type of "secular religion". With reference to collective identity and cultural memory, it is important to ask the cul- tural analytical questions: "Why identity now? Why heritage now?" My reply is that we experience a critical identity crisis. Three central aspects signify individual and collective identity: Continuity, coherence and individuality. The three aspects, constituting the concept of identity, are exposed to serious threats in the post-modern era: The danger of changeability, fragmentation and standardisation. This ten- dency has, however, met various compensating counter reactions like for instance "re-traditionalisation". In my presentation, I will examine the phenomenon cultural memory through examples from the German tradition -- principally from the works of Aleida and Jan Assmann.

  3. Identity and psychological ownership in chronic illness and disease state.

    Science.gov (United States)

    Karnilowicz, W

    2011-03-01

    Psychological ownership is rarely considered in health discourse related to chronic illness or disease state. Construction of identity is an important consideration within this framework. This autoethnographic study explores psychological ownership and identity related to prostate cancer and chronic illness. Conclusions about the nature of psychological ownership and identity were gathered from the relevant literature and personal experience. Themes include the patient-healthcare professional relationship and that psychological ownership is personal and grounded in an individual's sense of identity, control and perceived capacity to control illness or disease. Personal reflection through autoethnography guides discussion of psychological ownership and identity.

  4. On a New Trigonometric Identity

    Science.gov (United States)

    Chen, Hongwei

    2002-01-01

    A new trigonometric identity derived from factorizations and partial fractions is given. This identity is used to evaluate the Poisson integral via Riemann sum and to establish some trigonometric summation identities.

  5. Function projective synchronization of identical and non-identical modified finance and Shimizu–Morioka systems

    Indian Academy of Sciences (India)

    S R Kareem; K S Sojo; A N Njah

    2012-07-01

    In this paper, function projective synchronizations (FPS) of identical and non-identical modified finance systems (MFS) and Shimizu-Morioka system (S-MS) are studied via active control technique. The technique is applied to construct a response system which synchronizes with a given drive system for a desired function relation between identical MFS, identical S-MS and between MFS and S-MS. The results are validated via numerical simulations.

  6. Tools for Understanding Identity

    Energy Technology Data Exchange (ETDEWEB)

    Creese, Sadie; Gibson-Robinson, Thomas; Goldsmith, Michael; Hodges, Duncan; Kim, Dee DH; Love, Oriana J.; Nurse, Jason R.; Pike, William A.; Scholtz, Jean

    2013-12-28

    Identity attribution and enrichment is critical to many aspects of law-enforcement and intelligence gathering; this identity typically spans a number of domains in the natural-world such as biographic information (factual information – e.g. names, addresses), biometric information (e.g. fingerprints) and psychological information. In addition to these natural-world projections of identity, identity elements are projected in the cyber-world. Conversely, undesirable elements may use similar techniques to target individuals for spear-phishing attacks (or worse), and potential targets or their organizations may want to determine how to minimize the attack surface exposed. Our research has been exploring the construction of a mathematical model for identity that supports such holistic identities. The model captures the ways in which an identity is constructed through a combination of data elements (e.g. a username on a forum, an address, a telephone number). Some of these elements may allow new characteristics to be inferred, hence enriching the holistic view of the identity. An example use-case would be the inference of real names from usernames, the ‘path’ created by inferring new elements of identity is highlighted in the ‘critical information’ panel. Individual attribution exercises can be understood as paths through a number of elements. Intuitively the entire realizable ‘capability’ can be modeled as a directed graph, where the elements are nodes and the inferences are represented by links connecting one or more antecedents with a conclusion. The model can be operationalized with two levels of tool support described in this paper, the first is a working prototype, the second is expected to reach prototype by July 2013: Understanding the Model The tool allows a user to easily determine, given a particular set of inferences and attributes, which elements or inferences are of most value to an investigator (or an attacker). The tool is also able to take

  7. Moral identity in psychopathy

    Directory of Open Access Journals (Sweden)

    Andrea L. Glenn

    2010-12-01

    Full Text Available Several scholars have recognized the limitations of theories of moral reasoning in explaining moral behavior. They have argued that moral behavior may also be influenced by moral identity, or how central morality is to one's sense of self. This idea has been supported by findings that people who exemplify moral behavior tend to place more importance on moral traits when defining their self-concepts (Colby and Damon, 1995. This paper takes the next step of examining individual variation in a construct highly associated with IMMORAL behavior --- psychopathy. In Study 1, we test the hypothesis that individuals with a greater degree of psychopathic traits have a weaker moral identity. Within a large online sample, we found that individuals who scored higher on a measure of psychopathic traits were less likely to base their self-concepts on moral traits. In Study 2, we test whether this reduced sense of moral identity can be attributed to differences in moral judgment, which is another factor that could influence immoral behavior. Our results indicated that the reduced sense of moral identity among more psychopathic individuals was independent of variation in moral judgment. These results suggest that individuals with psychopathic traits may display immoral behavior partially because they do not construe their personal identities in moral terms.

  8. Narrating Career, Positioning Identity: Career Identity as a Narrative Practice

    Science.gov (United States)

    LaPointe, Kirsi

    2010-01-01

    In contrast to traditional definitions of career identity as an individual construct, this article argues for a discursive approach to career identity as a narrative practice. Career identity is conceptualized as a practice of articulating, performing and negotiating identity positions in narrating career experiences. By using the concept of…

  9. Researcher Identity in Transition

    DEFF Research Database (Denmark)

    Castelló, Montserrat; Kobayashi, Sofie; McGinn, Michelle K.

    2015-01-01

    Within the current higher education context, early career researchers (ECRs) face a ‘risk-career’ in which predictable, stable academic careers have become increasingly rare. Traditional milestones to signal progress toward a sustainable research career are disappearing or subject...... to reinterpretation, and ECRs need to attend to new or reimagined signals in their efforts to develop a researcher identity in this current context. In this article, we present a comprehensive framework for researcher identity in relation to the ways ECRs recognise and respond to divergent signals across spheres...... comprehensive framework allows for the analysis of researcher identity development through the complex and intertwined activities in which ECRs are involved. We advance this approach as a foundation for a sustained research agenda to understand how ECRs identify and respond to relevant signals, and...

  10. Learning as Negotiating Identities

    DEFF Research Database (Denmark)

    Jørgensen, Kenneth Mølbjerg; Keller, Hanne Dauer

    of time - caught in the notion of trajectories of learning - that integrate past, present and future. Working with the learners' notion of time is significant because it is here that new learning possibilities become visible and meaningful for individuals. Further, we argue that the concept of identity......The paper explores the contribution of Communities of Practice (COP) to Human Resource Development (HRD). Learning as negotiating identities captures the contribution of COP to HRD. In COP the development of practice happens through negotiation of meaning. The learning process also involves modes...... of belonging constitutive of our identities. We suggest that COP makes a significant contribution by linking learning and identification. This means that learning becomes much less instrumental and much more linked to fundamental questions of being. We argue that the COP-framework links learning with the issue...

  11. Identity work and identity regulation in managers' personal development training

    OpenAIRE

    Andersson, Thomas

    2008-01-01

    This article describes the role of personal development training in managers’ identity processes. Personal development training constitutes a local management discourse, which can influence both identity work and identity regulation processes. The study emphasizes the importance of personal life stories in understanding how managers are influenced by personal development training. The training provokes different processes of identity work and identity regulation, and managers actively work wi...

  12. The relationship between internet addiction and ego-identity, self-control ability of college students%大学生网络成瘾与自我同一性、自我控制能力的关系

    Institute of Scientific and Technical Information of China (English)

    王娟; 游越; 黄俊; 陈端颖; 庄红平

    2012-01-01

    Objective To explore the relationship between internet addiction and ego-identity, self-control ability in college students, and to offer evidence for the prevention of internet addiction in college students. Methods Students were recruited from 16 classes in a certain university in Hubei province by the method of stratified random sampling. They were investigated with the questionnaire of Internet-addiction Evaluation Scale, Ego Identity Scale and College Students' Self-control Ability Questionnaire. Results The prevalence of internet addiction was 3. 8%. The severity of internet addiction was significantly negatively correlated with the present involvement and the future intention ( P < 0.01) of ego-identity, as well as the self-control ability (P < 0. 01). Scores of present involvement and the future intention of ego-identity in addiction group were significantly lower than those in non-addiction group ( P < 0. 01). The self-control ability of students with internet addiction was significantly lower than that innon-addictive students ( P < 0. 01). Conclusion Good ego-identity and self-control ability can help college students coping with growth stress and setbacks, preventing themselves from internet addiction.%目的 了解大学生网络成瘾与自我同一性以及自我控制能力的关系,为预防和治疗大学生网络成瘾提供依据.方法 采用分层随机抽样的方法对湖北省某所大学16个班级的学生进行问卷调查,问卷包括网络成瘾诊断量表、自我同一性量表和大学生自我控制能力问卷.结果 被调查大学生网络成瘾检出率为3.8%,网络成瘾程度和与个体的自我同一性发展的现在的自我投入和将来自我投入愿望有明显负相关(P<0.01),与自我控制能力呈显著负相关(P<0.01).网络成瘾组在自我同一性发展的现在的自我投入和将来自我投入愿望得分明显低于非成瘾组(P<0.01),自我控制能力明显低于非成瘾组(P<0.01).

  13. Professions and their Identities

    DEFF Research Database (Denmark)

    Krejsler, John

    2005-01-01

    PROFESSIONS AND THEIR IDENTITIES: HOW TO EXPLORE PROFESSIONAL DEVELOPMENT AMONG (SEMI-)PROFESSIONS This article explores conditions for discussing what it means to be professional among teachers, pre-school teachers, nurses and social workers. From an epistemological point of view it explores how...... analytical strategies can frame in sufficiently complex ways what it means to be a professional today. It is assumed that at least four main issues must be dealt with in order to conduct a satisfactory analysis of professions and their identities. Firstly, it is of fundamental strategic importance that one...

  14. Splitting Ward identity

    Energy Technology Data Exchange (ETDEWEB)

    Safari, Mahmoud [Institute for Research in Fundamental Sciences (IPM), School of Particles and Accelerators, P.O. Box 19395-5531, Tehran (Iran, Islamic Republic of)

    2016-04-15

    Within the background-field framework we present a path integral derivation of the splitting Ward identity for the one-particle irreducible effective action in the presence of an infrared regulator, and make connection with earlier works on the subject. The approach is general in the sense that it does not rely on how the splitting is performed. This identity is then used to address the problem of background dependence of the effective action at an arbitrary energy scale. We next introduce the modified master equation and emphasize its role in constraining the effective action. Finally, application to general gauge theories within the geometric approach is discussed. (orig.)

  15. National and Transnational Identities

    DEFF Research Database (Denmark)

    Jørgensen, Martin Bak

    is that the opportunity and incentive structures clearly affect collective identities and the organising processes of the Turkish minority groups within in the three countries. The analysis shows that the immigrant organisations adapt to the structural limitations and claims and identities are negotiated within...... in terms of career paths. In Germany the integration activities are increasingly being pushed over to the immigrant organisations which now share the role of being service providers together with the welfare organisations, which also stipulates increased competition. The analysis also shows...

  16. Identity-based encryption

    CERN Document Server

    Chatterjee, Sanjit

    2011-01-01

    Identity Based Encryption (IBE) is a type of public key encryption and has been intensely researched in the past decade. Identity-Based Encryption summarizes the available research for IBE and the main ideas that would enable users to pursue further work in this area. This book will also cover a brief background on Elliptic Curves and Pairings, security against chosen Cipher text Attacks, standards and more. Advanced-level students in computer science and mathematics who specialize in cryptology, and the general community of researchers in the area of cryptology and data security will find Ide

  17. Microsoft Windows Identity Foundation Cookbook

    CERN Document Server

    Chanda, Sandeep

    2012-01-01

    This book is written in a simple, easy to understand format, with lots of screenshots and step-by-step explanations.If you are a .NET developer looking forward to building access control in your applications using claims-based identity, then this is the best guide for you. This book is also an excellent choice for professionals and IT administrators trying to enable Single Sign-On across applications within the enterprise, and in the cloud spanning interoperable platforms. No previous knowledge on the subject is necessary, however a strong foundation in the C# programming language and .NET Fra

  18. On the fundamentals of identity

    NARCIS (Netherlands)

    van der Gaag, Mandy

    2016-01-01

    Various new perspectives on identity have been introduced or have increased in popularity over the past two decades. These include identity as dynamic system (Kunnen & Bosma, 2001), a narrative approach to identity (McAdams, 2001), multi-dimensional models of identity formation (Luyckx et al., 2006;

  19. On the fundamentals of identity.

    NARCIS (Netherlands)

    van der Gaag, Mandy

    2016-01-01

    Various new perspectives on identity have been introduced or have increased in popularity over the past two decades. These include identity as dynamic system (Kunnen & Bosma, 2001), a narrative approach to identity (McAdams, 2001), multi-dimensional models of identity formation (Luyckx et al., 2006;

  20. Corporate Brand Identity in SMEs

    DEFF Research Database (Denmark)

    Mäläskä, Minna; Jones, Richard Ian

    studies. The research is important since it suggests an iterative and co-creative approach to brand identity. A typology of brand identity formation for SMEs is presented: entrepreneur driven, market driven, stakeholder driven. Practical implications: The three paths to creating a strong brand identity......Purpose: To study the emergence of corporate brand identity in SMEs and to develop a typology of brand identity drivers that reflects a co-creative approach to the emergence of brand identity. Design / Methodology / Approach : Existing approaches to brand identity are summarised. A narrative...... approach to understanding the emergence of brand identity is employed in case studies of 10 case companies reflecting both B-to-B and B-to-C companies. Findings: In all cases we see that brand identity is not a clear, enduring identity as suggested in the literature but is formed in a co-creative process...

  1. IDENTITY THEFT COMMITTED THROUGH INTERNET

    OpenAIRE

    Adrian Cristian MOISE

    2015-01-01

    In this study, starting with the presentation of some aspects regarding management of identity in cyberspace, it is carried out the analysis of the offence of identity theft committed through Internet. The term “identity theft” describes the criminal acts through which the offender obtains and uses in a fraudulent manner the identity of other person. These criminal acts may be carried out through the use of information and communication technology, too. The cases of identity theft committed t...

  2. Identity-based consumer behavior.

    OpenAIRE

    Reed, Americus; Forehand, Mark; Puntoni, Stefano; Warlop, Luk

    2012-01-01

    Although the influence of identity on consumer behavior has been documented in many streams of literature, the absence of a consistent definition of identity and of generally accepted principles regarding the drivers of identity-based behavior complicates comparisons across these literatures. To resolve that problem, we propose a simple but inclusive definition of identity. Identity can be defined as any category label with which a consumer self-associates that is amenable to a clear picture ...

  3. Inter-identity autobiographical amnesia in patients with dissociative identity disorder.

    Directory of Open Access Journals (Sweden)

    Rafaële J C Huntjens

    Full Text Available BACKGROUND: A major symptom of Dissociative Identity Disorder (DID; formerly Multiple Personality Disorder is dissociative amnesia, the inability to recall important personal information. Only two case studies have directly addressed autobiographical memory in DID. Both provided evidence suggestive of dissociative amnesia. The aim of the current study was to objectively assess transfer of autobiographical information between identities in a larger sample of DID patients. METHODS: Using a concealed information task, we assessed recognition of autobiographical details in an amnesic identity. Eleven DID patients, 27 normal controls, and 23 controls simulating DID participated. Controls and simulators were matched to patients on age, education level, and type of autobiographical memory tested. FINDINGS: Although patients subjectively reported amnesia for the autobiographical details included in the task, the results indicated transfer of information between identities. CONCLUSION: The results call for a revision of the DID definition. The amnesia criterion should be modified to emphasize its subjective nature.

  4. Fluidity, Identity, and Organizationality

    DEFF Research Database (Denmark)

    Dobusch, Leonhard; Schoeneborn, Dennis

    2015-01-01

    that the organizationality of a social collective is accomplished through “identity claims”—i.e., speech acts that concern what the social collective is or does—and negotiations on whether or not these claims have been made on the collective's behalf. We empirically examine the case of the hacker collective Anonymous...

  5. Gendered Avatar Identity

    Science.gov (United States)

    Woolums, Viola

    2011-01-01

    Gendered appearance in "World of Warcraft" is of particular interest because it seems to infiltrate interactions between individuals without serving a functional purpose within the game itself. It provides an opportunity to look at avatar choice in environments that have a primary purpose aside from existing as an arena for creating identity, and…

  6. Dissociative Identity Disorder

    Science.gov (United States)

    Schmidt, Tom

    2007-01-01

    Few psychological disorders in the Diagnostic Statistical Manual have generated as much controversy as Dissociative Identity Disorder (DID). For the past 35 years diagnoses of DID, previously referred to as Multiple Personality Disorder (MPD), have increased exponentially, causing various psychological researchers and clinicians to question the…

  7. The Visual Identity Project

    Science.gov (United States)

    Tennant-Gadd, Laurie; Sansone, Kristina Lamour

    2008-01-01

    Identity is the focus of the middle-school visual arts program at Cambridge Friends School (CFS) in Cambridge, Massachusetts. Sixth graders enter the middle school and design a personal logo as their first major project in the art studio. The logo becomes a way for students to introduce themselves to their teachers and to represent who they are…

  8. Bilingualism versus identity

    DEFF Research Database (Denmark)

    Hermann, Jesper

    1988-01-01

    During the last hundred years psychologists, philosophers and theologians have developed two different conceptions of personal identity. One of them insists that each person is a unique and transcendental being, whereas the other finds the personality deriving from interaction with other persons........ (This is the prevailing view today.) These theories are placed in relation to the difficulties an immigrant encounters....

  9. Gender, Identity and CMC.

    Science.gov (United States)

    Yates, Simeon J.

    1997-01-01

    Some research and popularized accounts have claimed computer-mediated communication (CMC) based interactions are free of gender inequality though a growing body of research has documented gender differences in access and practice. This article examines both positions and cultural aspects of gender identities to make clear the centrality of gender…

  10. What about Linguistic Identity?

    Science.gov (United States)

    Andrews, Micah

    2010-01-01

    The recent influx of Latino immigrants in the Mid-West U.S. has also increased the number of Mexican students in schools. As recent immigrants, one of the challenges Mexican students face besides learning a different language is the construction of new identities in unfamiliar environments. Learning a language involves acquiring another identity…

  11. Teaching European Identities

    Science.gov (United States)

    Raento, Pauliina

    2008-01-01

    The political, cultural and social make-up of Europe is changing fast. A new European identity is under construction, but old contradictions and diversity challenge its contents, forms and boundaries. Migration, the changing role of the nation-state and Europe's regions, the reshaping of politico-administrative and perceptional boundaries, the…

  12. Language and Identity Explored

    Directory of Open Access Journals (Sweden)

    Thomas Rozanov

    2016-06-01

    Full Text Available The relationship between language and identity is widely discussed in applied linguistics, sociology, communications and other related scholarly fields. Furthermore, many researchers have focused on the post-Soviet region, which given its unique historical context allows for testing of this relationship. The widespread bilingualism as a result of historical russification and the linguistic transformations that occurred after the collapse of the Soviet Union make the region a ‘sociolinguistic playground’. Recent events in Ukraine have given grounds to further explore this relationship, now in attempt to link language and identity as potential forces for geopolitical change in the region. This paper presents an overview of existing research, theories, and opposing perspectives related to the relationship between language and identity, and considers complications such as historical russification, religious influence, socioeconomic factors, and education with regards to the Ukrainian and post-Soviet context.  I aim to illustrate the significance of language and its effects on socio-political change in the case of Ukraine, by presenting arguments and complications in support of the relationship between language and identity.

  13. Spatial Identity in Gagauzia

    Directory of Open Access Journals (Sweden)

    A. V. Salavatova

    2015-01-01

    Full Text Available Historically the gagauz developed a self-perception based on their difference from Moldova as well as the ‘Turkish world’. The article argues that this fact has determined their pro-Russian political orientation as the only possible way of maintaining their identity

  14. Graduate Identity and Employability

    Science.gov (United States)

    Hinchliffe, Geoffrey William; Jolly, Adrienne

    2011-01-01

    This paper develops the concept of graduate identity as a way of deepening the understanding of graduate employability. It does this through presenting research in which over 100 employers in East Anglia were asked to record their perceptions of graduates in respect of their employability. The findings suggest a composite and complex graduate…

  15. Language and Social Identity

    Institute of Scientific and Technical Information of China (English)

    2012-01-01

    A person' s language and social identity are in fact an inseparable entity. When I was in Australia, as I can recall, my neighbour practised his speaking every morning, making it both pleasant and a privilege to hear, for the purpose of getting into parliament.

  16. Migration, Narration, Identity

    DEFF Research Database (Denmark)

    Leese, Peter

    three consecutive summers from 2010 to 2012. The articles focus on various aspects of the migrant experience and try to answer questions about migrant identity and its representations in literature and the media. The book closes with an original play by Carlos Morton, the Chicano playwright working...

  17. Discourses of Identity

    Science.gov (United States)

    Van Leeuwen, Theo

    2009-01-01

    This lecture discusses the concept of lifestyle, which emerged in the field of marketing in the 1970s, as a new, and increasingly pervasive, discourse of identity cutting through older "demographic" discourses. Distributed by mediated experts and role models, and realized through the semiotics of "composites of connotation", it redraws the…

  18. WORK AND LEARNER IDENTITY

    DEFF Research Database (Denmark)

    Kondrup, Sissel

    2015-01-01

    The aim of this article is to suggest a theoretical framework than can assess to how people’s engagement in specific historical and social work practices are significant to their development, maintenance or transformation of a learner identity. Such a framework is crucial in order to grasp how...

  19. Story Telling: Crafting Identities

    Science.gov (United States)

    McMahon, Mary; Watson, Mark

    2013-01-01

    Career guidance clients are seeking to craft new identities that better position them in their careers. The focus of the present article is on narrative career counselling's potential contribution in providing a meaningful and useful experience for career guidance clients. To illustrate the potential of narrative career counselling, the story…

  20. Imagining Geographies, Mapping Identities

    Directory of Open Access Journals (Sweden)

    Matthew Graves

    2015-03-01

    Full Text Available The ambition of this issue of Portal is to reach across the methodological boundaries of history, politics, literature and geography to apply their complementary perspectives to the study of identity and its relation to space and place, an aim that involves attempting to identify the many different ways the notoriously slippery concepts of identity and geography may intersect. For this issue we have selected articles that cast a fresh perspective on two areas where identity and geography intersect: the construction of identity through the imaginative recreation of place in literature: Mapping Literary Spaces; and the study of the shifting relationships of centre and periphery, exclusion and inclusion in urban settings and geopolitical confrontations: Social and Political Peripheries. Gerard Toal has written that geography is not a noun but a verb: it does not describe what space is but studies what we do with space, imaginatively and politically. The articles in this issue illustrate the exercise of the literary and political imagination and the role of materiality and memory in the creation of geographic representation. They show too a new awareness of the centrality of space in the constitution of identities, and the need for a new geocritical reading of its discourse, as the interrelations of place and community are played out on the many scales of social and political life, from the local to the global.   The special issue is organised thus: Introduction Matthew Graves (Aix-Marseille University & Liz Rechniewski (Sydney University: “Imagining Geographies, Mapping Identities.” I. Mapping Literary Spaces - Isabelle Avila (University of Paris XIII, "Les Cartes de l'Afrique au XIXe siècle et Joseph Conrad : Perceptions d'une Révolution Cartographique." - Daniela Rogobete (University of Craiova, "Global vs Glocal: Dimensions of the post-1981 Indian English Novel." II. Social and Political Peripheries - Elizabeth Rechniewski (Sydney

  1. Design of an adaptive finite-time controller for synchronization of two identical/different non-autonomous chaotic flywheel governor systems

    Institute of Scientific and Technical Information of China (English)

    Mohammad Pourmahmood Aghababa

    2012-01-01

    The centrifugal flywheel governor (CFG) is a mechanical device that automatically controls the speed of an engine and avoids the damage caused by sudden change of load torque. It has been shown that this system exhibits very rich and complex dynamics such as chaos.This paper investigates the problem of robust finite-time synchronization of non-autonomous chaotic CFGs.The effects of unknown parameters,model uncertainties and external disturbances are fully taken into account.First,it is assumed that the parameters of both master and slave CFGs have the same value and a suitable adaptive finite-time controller is designed.Second,two CFGs are synchronized with the parameters of different values via a robust adaptive finite-time control approach.Finally,some numerical simulations are used to demonstrate the effectiveness and robustness of the proposed finite-time controllers.

  2. Separate elements of the TERMINAL FLOWER 1 cis-regulatory region integrate pathways to control flowering time and shoot meristem identity.

    Science.gov (United States)

    Serrano-Mislata, Antonio; Fernández-Nohales, Pedro; Doménech, María J; Hanzawa, Yoshie; Bradley, Desmond; Madueño, Francisco

    2016-09-15

    TERMINAL FLOWER 1 (TFL1) is a key regulator of Arabidopsis plant architecture that responds to developmental and environmental signals to control flowering time and the fate of shoot meristems. TFL1 expression is dynamic, being found in all shoot meristems, but not in floral meristems, with the level and distribution changing throughout development. Using a variety of experimental approaches we have analysed the TFL1 promoter to elucidate its functional structure. TFL1 expression is based on distinct cis-regulatory regions, the most important being located 3' of the coding sequence. Our results indicate that TFL1 expression in the shoot apical versus lateral inflorescence meristems is controlled through distinct cis-regulatory elements, suggesting that different signals control expression in these meristem types. Moreover, we identified a cis-regulatory region necessary for TFL1 expression in the vegetative shoot and required for a wild-type flowering time, supporting that TFL1 expression in the vegetative meristem controls flowering time. Our study provides a model for the functional organisation of TFL1 cis-regulatory regions, contributing to our understanding of how developmental pathways are integrated at the genomic level of a key regulator to control plant architecture. © 2016. Published by The Company of Biologists Ltd.

  3. Identity Development and Identity Formation: A Theoretical Assessment

    Directory of Open Access Journals (Sweden)

    Hasan Atak

    2011-03-01

    Full Text Available Basic function of adolescence -one of the human life periods when physical and mental changes are experienced most heavily- is suggested to be identity development. Recent developmental psychology studies hypothesized that identity development starts during adolescence but intensifies during transi-tion to adulthood. This study addresses identity concept, in detail, from a theoretical point of view and in the scope of empirical studies. Literature offers quite different explanations and models as well as a few basic theories in this framework. The number of studies on identity subject is higher than the number of studies on other psycho-social study subjects. This study presents the theories offering basic explanations about identity (such as the works of Erikson, Marcia, Berzonsky, Waterman and the theories referring to identity (such as the works of Blos, Arnett, Kegan. Theories related to identity are addressed under the titles of identity exploration, identity status and identity styles. Almost all of the identity studies conducted in Turkey focused on identity status. In this context, new theories and tendencies may be taken into consideration in the studies to be made in Turkey on identity development.

  4. Transformation from Identity Stone Age to Digital Identity

    Directory of Open Access Journals (Sweden)

    Mohit Kohli

    2011-05-01

    Full Text Available Technological conversion, political interests and Business drivers has triggered a means, to establish individual characterization and personalization.People started raising concerns on multiple identities managed across various zones and hence various solutions were designed. Technological advancement has brought various issues and concerns around Identity assurance, privacy and policy enabled common Authentication framework. A compressive framework is needed to established common identity model to address national needs like standards, regulation and laws, minimum risk, interoperability and to provide user with a consistent context or user experience.This document focuses on Transformation path of identity stone age to Identity as in state. It defines a digital identity zone model (DIZM to showcase the Global Identity defined across the ecosystem. Also, provide insight of emerging Technology trend to enable Identity assurance, privacy and policy enabled common Authentication framework.

  5. Transformation from Identity Stone Age to Digital Identity

    CERN Document Server

    Kohli, Mohit

    2011-01-01

    Technological conversion, political interests and Business drivers has triggered a means, to establish individual characterization and personalization. People started raising concerns on multiple identities managed across various zones and hence various solutions were designed. Technological advancement has brought various issues and concerns around Identity assurance, privacy and policy enabled common Authentication framework. A compressive framework is needed to established common identity model to address national needs like standards, regulation and laws, minimum risk, interoperability and to provide user with a consistent context or user experience. This document focuses on Transformation path of identity stone age to Identity as in state. It defines a digital identity zone model (DIZM) to showcase the Global Identity defined across the ecosystem. Also, provide insight of emerging Technology trend to enable Identity assurance, privacy and policy enabled common Authentication framework.

  6. Social identities and risk

    DEFF Research Database (Denmark)

    Blok, Anders; Jensen, Mette; Kaltoft, Pernille

    2008-01-01

    Expert-based environmental and health risk regulation is widely believed to suffer from a lack of public understanding and legitimacy. On controversial issues such as genetically modified organisms and food-related chemicals, a "lay-expert discrepancy" in the assessment of risks is clearly visible...... of social identities. On the basis of qualitative interviews with citizens and experts, respectively, we focus on the multiple ways in which identities come to be employed in actors' risk accounts. Empirically, we identify salient characteristics of "typical" imagined experts and lay-people, while arguing...... that these conceptions vary identifiably in-between four groups of citizens and experts. On the basis of our findings, some implications for bridging the lay-expert discrepancy on risk issues are sketched out....

  7. Novell Identity Manager 4

    Institute of Scientific and Technical Information of China (English)

    王志超

    2010-01-01

    本刊讯 5月27日,Novell推出Identity Manager 4解决方案系列,它可在跨物理、虚拟和云环境中安全地进行身份和访问管理。Novell Identity Manager4是业界首个在企业整体IT生态系统中,可确保身份、安全和合规策略连贯一致的解决方案,并在云环境中提供与数据中心环境相同水平的高安全性和稳定性。

  8. Holy Nations. Global Identities

    DEFF Research Database (Denmark)

    Along with the processes of globalisation and the end of the cold war we have seen an upsurge in religious nationalism and an increasing focus on the role of religion as a legitimising force in democratic secular states. Holy Nations & Global Identities draws on the combined theoretical and histo......Along with the processes of globalisation and the end of the cold war we have seen an upsurge in religious nationalism and an increasing focus on the role of religion as a legitimising force in democratic secular states. Holy Nations & Global Identities draws on the combined theoretical...... and historical insight of historians, political scientists and social scientists on the question of nationalism and globalisation with the methodological knowledge of religion presented by sociologists of religion. The book brings genuine theoretical explorations and original case studies on civil religion...

  9. Identity in craft

    Directory of Open Access Journals (Sweden)

    Agneta Knutas

    2013-06-01

    Full Text Available In contrast to efficiency, a bakery on the countryside in Norway is known for its slow pace of work. The slow pace allows the product, as well as the craftsperson, time in production and quality in relation to market. Therefore, the emphasis is on the importance of the aesthetic in craft, the building of identity as well as the association of tradition as part of the craft. Furthermore, allowing the time to understand both craft and tradition is what makes knowledge meaningful (Arendt, 1998/1958. Closely following craftsmen at a bakery in Norway, for two days, allowed the collection of observations and interviews. This paper is presented in narrative format. The study utilises support from Sennett (2009 and Arendt (1998/1958 in the analysis of the collected empirical data. The results regarding identity and enhancing vocational education in craft point towards the importance of concentration, judgement, an unhurried education process and a sociable master.

  10. Perceived Parenting Dimensions and Identity Styles: Exploring the Socialization of Adolescents' Processing of Identity-Relevant Information

    Science.gov (United States)

    Smits, Ilse; Soenens, Bart; Luyckx, Koen; Duriez, Bart; Berzonsky, Michael; Goossens, Luc

    2008-01-01

    This study examined the relationships between crucial dimensions of perceived parenting (support, behavioral control, and psychological control) and the three identity styles defined by Berzonsky [Berzonsky, M. D. (1990). "Self-construction over the life span: A process perspective on identity formation." "Advances in Personal Construct…

  11. Keeping identity private

    DEFF Research Database (Denmark)

    Adjei, Joseph K.; Olesen, Henning

    2011-01-01

    Privacy has become a major issue for policy makers. This has been impelled by the rapid development of technologies that facilitate collection, distribution, storage, and manipulation of personal information. Business organizations are finding new ways of leveraging the value derived from consumer...... is an attempt to understand the relationship between individuals’ intentions to disclose personal information, their actual personal information disclosure behaviours, and how these can be leveraged to develop privacy-enhancing identity management systems (IDMS) that users can trust. Legal, regu...

  12. 统一身份控制和审计管理在大型企业IT系统中的应用研究%Unified Identity Control and Audit Management Application in Large Enterprises IT System

    Institute of Scientific and Technical Information of China (English)

    胡学勇

    2011-01-01

    In large enterprises IT system run management,through establishing unified identity control and audit management platform,implementation Account Management,Authentication,Authorization and Audit,will strengthen and upgrade information system audit of-in rules sexual and system run of security.%在大型企业IT系统运行管理中通过建立统一身份控制和审计管理平台,实现集中账号管理、集中身份认证、集中访问授权、集中审计,有效提升了大型企业信息系统审计的合规性和系统运行的安全性。

  13. Synchronization of two identical and non-identical Rulkov models

    Science.gov (United States)

    Sun, Huijing; Cao, Hongjun

    2016-11-01

    In this paper, the synchronization of two chaotic Rulkov map-based neurons is taken into account. Firstly, based on the master stability function (MSF) analysis, the complete synchronization of two electrical coupled chaotic Rulkov neurons is investigated in detail. The two-dimensional parameter-space plot that displays directly the values of the MSF in different colors is numerically obtained. The numerical values of the MSF show that the two electrical coupled Rulkov neurons are likely to achieve the complete synchronization when each single neuron is in a silent state or a period-1 bursting state, while are unable to reach the complete synchronous state when each single neuron is in a chaotic bursting state or a spiking state. Secondly, Pearson's correlation coefficient is employed to measure the synchronization degree, which demonstrates the nonexistence of the complete synchronization for non-identical electrical coupled Rulkov neurons. Importantly, the complete synchronization can not be reached with the increase of the electrical coupling strength, which is different from the continuous-time neuronal models. Finally, based on the active control method, a synchronization scheme is presented to study the complete synchronization for two Rulkov neurons no matter whether they are identical or not. The scheme is also applied to investigate the anticipated synchronization and the lag synchronization for any two Rulkov neurons. Numerical simulations verify the correctness of our analytical results and the effectiveness of our methods.

  14. Architectural mismatch issues in identity management deployment

    DEFF Research Database (Denmark)

    Andersen, Mads Schaarup

    2010-01-01

    Integrating Commercial Off-The-Shelf products in a company's software product portfolio offers business value, but introduces challenges from a software architecture perspective. In this paper, the research challenges in relation to identity management in the Danish municipality administration...... system called Opus, are outlined. Opus BRS is the identity management part of Opus. Opus integrates SAP, legacy mainframe systems, and other third party systems of the individual municipality. Each of these systems define their own software architecture and access control model, leading to architectural...... mismatch with an impact on security, usability, and maintainability. The research project is discussed and access control and identity provisioning are recognized as the major areas of interest in relation to the mismatch challenges. The project is carried out in close cooperation with KMD, one...

  15. Identity Construction, Negotiation, and Resistance: Reconsideration of "Japanese" Identity

    Science.gov (United States)

    Fukuda, Chie

    2010-01-01

    This dissertation explores identity construction, mainly focusing on the ethnonational identity of "Japanese," in contrast to that of "non-Japanese" from ethnomethodological and social constructionist perspectives. Within these approaches, identity is not given "a priori" but emerges through sociohistorical contexts…

  16. Identity Styles and Religiosity: Examining the Role of Identity Commitment

    Science.gov (United States)

    Grajales, Tevni E.; Sommers, Brittany

    2016-01-01

    This study observed the role of identity styles, identity commitment, and identity statuses in predicting religiosity in a sample of undergraduate students attending a Seventh-day Adventist university (N = 138). Two structural models were evaluated via path analysis. Results revealed two strong models for the prediction of religiosity. Identity…

  17. Does Everyone Have a Musical Identity?: Reflections on "Musical Identities"

    Science.gov (United States)

    Gracyk, Theodore

    2004-01-01

    The book, "Musical Identities" (Raymond MacDonald, David Hargreaves, Dorothy Miell, eds.; Oxford and New York: Oxford University Press, 2002) consists of 11 essays on the psychology of music. The editors divided the essays into two groups: those on developing musical identities ("identities in music" involving recognizable social and cultural…

  18. Identity Styles and Religiosity: Examining the Role of Identity Commitment

    Science.gov (United States)

    Grajales, Tevni E.; Sommers, Brittany

    2016-01-01

    This study observed the role of identity styles, identity commitment, and identity statuses in predicting religiosity in a sample of undergraduate students attending a Seventh-day Adventist university (N = 138). Two structural models were evaluated via path analysis. Results revealed two strong models for the prediction of religiosity. Identity…

  19. Entrepreneurship Education as Identity Workspace

    DEFF Research Database (Denmark)

    Frederiksen, Signe Hedeboe

    2016-01-01

    and identities. Exposed to identity work practices in class, learners experienced conflicting demands participating as succesful students and participating as potential entrepreneurs. The study draws attention to how an education setting contextualises identity work as a social practice. It critisises......Entrepreneurship education theory and practice show increasing interest in identity work as an important part of entrepreneurial learning. Entrepreneurship programs become identity workspaces where pedagogical designs stimulate entrepreneurial identity work and support individuals’ discovery...... of themselves as entrepreneurs. This article investigates how entrepreneurship education is practiced as an identity workspace, when reflective identity work is turned into a pedagogical strategy for entrepreneurial learning. I present empirical data from a qualitative fieldstudy in an eleven week mandatory...

  20. Object Identity in Database Systems

    Institute of Scientific and Technical Information of China (English)

    李天柱

    1995-01-01

    The concept of object identity and implementation of object identity in some systems have been explained in literature.Based on an analysis on the idea of data scheme in ANSI/X3/SPARC,this paper presents the concept of full-identity,which includes entity identity,conceptual object identity,and internal object identity,In addition,the equality of objects,which is richer and more practical,is discussed based on the full identity of objects.Therefore,the semantics and constructions of the identity for the complex objects are fully observed,and some appliactions in object management,version management,and user interface are found.Also,it could support the combination of O-O model with V-O model.

  1. Altered self-identity and autobiographical memory in epilepsy.

    Science.gov (United States)

    Allebone, James; Rayner, Genevieve; Siveges, Benjamin; Wilson, Sarah J

    2015-12-01

    Research suggests that individuals with chronic epilepsy display differences in their self-identity. The mechanisms by which self-identity is altered, however, are not well understood. Neural networks supporting autobiographical memory retrieval in the mesial temporal (MT) lobe are thought to be fundamental to self-identity processes. Thus, we examined differences in self-identity and autobiographical memory in patients with either MT or non-mesial temporal (NMT) foci with early or late age of habitual seizure onset. Participants included 102 adults: 51 healthy individuals and 51 patients with drug-resistant focal seizures (19 MT, 32 NMT). We used the Ego Identity Process Questionnaire to profile the identity development of participants, and examined how this related to memory function assessed using the Autobiographical Memory Test. Patients and controls had strikingly different self-identity profiles, with early onset MT patients showing the least identity development compared to controls and other patient groups. In contrast, late-onset NMT patients showed the highest level of identity development of the patient groups and closely resembled healthy controls (p < 0.05 for all comparisons). For all MT patients, poor autobiographical memory retrieval was correlated with altered self-identity (p < 0.001). No associations between autobiographical memory and self-identity were evident in the NMT group. Self-identity in epilepsy may be modulated by the extent to which seizure foci impinge on the autobiographical memory network and the timing of seizure onset. Early disruption to MT regions of the autobiographical memory network may constitute a neurocognitive mechanism by which self-identity is altered in chronic focal epilepsy. Wiley Periodicals, Inc. © 2015 International League Against Epilepsy.

  2. Globalization and the identity dilemma

    Directory of Open Access Journals (Sweden)

    Alina-Petronela NEGREA

    2012-09-01

    Full Text Available The paper begins with a review of theoretical aspects including a conceptual delimitation of the term “economic globalization” from the perspective of different theorists, its main features, dimensions and vectors that boost and promote the process expansion. The phenolmenon is extensive, complex and difficult to control, fact that includes in this “wave” of globalization advantages and disadvantages also.The globalization of the economic activity is studied through globalization indicators such as: FDI, financial dimension, the role of transnational economic actors in the global economy, the relationship between international trade growth and increased domestic production, internationalization of the financial markets. The structure of the global economic system and the problems that the current global economy is facing are also analysed.The “thorny” subject of the influence that globalization has on national identity from an economic perspective is seen through the eyes of Romania, analyzing the economic implications of globalization for our country, how much the identity of Romanian companies was affected over the last years, which are now the Romanian multinationals and what challenges and opportunities globalization has brought to the country that was written with envy during the interwar period that is has “oil and wheat”.

  3. John locke on personal identity.

    Science.gov (United States)

    Nimbalkar, Namita

    2011-01-01

    John Locke speaks of personal identity and survival of consciousness after death. A criterion of personal identity through time is given. Such a criterion specifies, insofar as that is possible, the necessary and sufficient conditions for the survival of persons. John Locke holds that personal identity is a matter of psychological continuity. He considered personal identity (or the self) to be founded on consciousness (viz. memory), and not on the substance of either the soul or the body.

  4. John locke on personal identity

    Directory of Open Access Journals (Sweden)

    Nimbalkar Namita

    2011-01-01

    Full Text Available John Locke speaks of personal identity and survival of consciousness after death. A criterion of personal identity through time is given. Such a criterion specifies, insofar as that is possible, the necessary and sufficient conditions for the survival of persons. John Locke holds that personal identity is a matter of psychological continuity. He considered personal identity (or the self to be founded on consciousness (viz. memory, and not on the substance of either the soul or the body.

  5. John locke on personal identity

    Directory of Open Access Journals (Sweden)

    Namita Nimbalkar

    2011-03-01

    Full Text Available John Locke speaks of personal identity and survival of consciousness after death. A criterion of personal identity through time is given. Such a criterion specifies, insofar as that is possible, the necessary and sufficient conditions for the survival of persons. John Locke holds that personal identity is a matter of psychological continuity. He considered personal identity (or the self to be founded on consciousness (viz. memory, and not on the substance of either the soul or the body.

  6. Social Identity Simulation System (SISTEM)

    Science.gov (United States)

    2014-03-31

    number of people G = identity group (e.g. gender, ethnicity, etc.) D = identity (e.g. male/ female , White/Black/Spanish/… etc.) R = real resources for an...actions as part of a collective. The collective actions are driven by social identity entrepreneurs (SIDs) (Haslam & Reicher, 2007; Lal, 1997). These...social identity entrepreneurs only advocate a collective action on behalf of the group when they perceive benefits of advocating being greater than

  7. Identity formation in multiparty negotiations

    NARCIS (Netherlands)

    Swaab, R; Postmes, T.; Spears, R.

    2008-01-01

    Based on the recently proposed Interactive Model of Identity Formation, we examine how top-down deductive and bottom-up inductive identity formations influence intentions and behaviour in multiparty negotiations. Results show that a shared identity can be deduced from the social context through reco

  8. Identity Development in Deaf Adolescents

    Science.gov (United States)

    Kunnen, E. Saskia

    2014-01-01

    We studied identity development during 5 years in seven deaf adolescents who attended a school for deaf children in the highest level of regular secondary education (age between 14 and 18 years), administering identity interviews every year. Identity development is conceptualized as the processes of exploration and commitment formation (Bosma,…

  9. New identities for sessile drops

    CERN Document Server

    Hajirahimi, Maryam; Fatollahi, Amir H

    2014-01-01

    A new set of mathematical identities is presented for axi-symmetric sessile drops on flat and curved substrates. The geometrical parameters, including the apex curvature and height, and the contact radius, are related by the identities. The validity of the identities are checked by various numerical solutions both for flat and curved substrates.

  10. Identity theft and your practice.

    Science.gov (United States)

    Asbell, Lisa

    2010-01-01

    Medical identity theft is a growing problem in America. The federal government has passed laws to help "prevent" identity theft. However, several powerful medical associations are fighting the legislation. Americans need to know what is happening with these laws and why these laws are important to protect providers from lawsuits and consumers of healthcare from medical identity theft.

  11. Ethnic Identity: Crisis and Resolution.

    Science.gov (United States)

    Ruiz, Aureliano Sandoval

    1990-01-01

    Presents Chicano/Latino ethnic identity development model that fosters understanding of ethnic identity conflicts particular to Chicano and Latino clients. Presents five stages (causal, cognitive, consequence, working through, and successful resolution) in relationship to ethnic identity conflicts, interventions, and resolution. Combines several…

  12. Sense of Identity and Collegiate Academic Achievement

    Science.gov (United States)

    Lounsbury, John W.; Huffstetler, Beverly C.; Leong, Frederick T. L.; Gibson, Lucy W.

    2005-01-01

    In a sample of 434 university freshmen, Sense of Identity was found to be positively related to GPA, even controlling for the Big Five personality traits of Agreeableness, Conscientiousness, Emotional Stability, Extraversion, and Openness. Similar correlations were found for racial and gender subgroups. When all study variables entered a stepwise…

  13. Ego Identity of Adolescent Children of Alcoholics

    Science.gov (United States)

    Gavriel-Fried, Belle; Teichman, Meir

    2007-01-01

    The study examines the issue of ego identity among adolescent sons of alcoholic fathers. Forty-four adolescent sons of alcoholic fathers, age of 15-18, constituted the sample. They were drawn from public alcohol treatment center in Israel. The control group included 60 adolescents none of their parents is known as an alcoholic, sampled from…

  14. Religion, Politician Identity and Development Outcomes: Evidence from India

    OpenAIRE

    Bhalotra, Sonia; Cassan, Guilhem; Clots-Figueras, Irma; Iyer, Lakshmi

    2013-01-01

    This paper investigates whether the religious identity of state legislators in India influences development outcomes, both for citizens of their religious group and for the population as a whole. To control for politician identity to be correlated with constituency level voter preferences or characteristics that make religion salient, we use quasi-random variation in legislator identity generated by close elections between Muslim and non-Muslim candidates. We find that increasing the politica...

  15. Primary Identity in Literature

    DEFF Research Database (Denmark)

    Graham, Brian Russell

    viewing the characters in literature in terms of these political identities. Literature is consequently discussed in relation to political causes. Literary criticism is animated by the same causes, and is viewed as having a direct intervention in society in relation to them. In this paper, I will discuss...... in opposite directions towards the fulfillment of desire at one end of experience and a world of fear and despair at the other, and in relation to its notion of a better society, what interests literature is a society of contented families joined through the marriage of their adult children....

  16. Digital identity management

    CERN Document Server

    Laurent, Maryline

    2015-01-01

    In the past four decades, information technology has altered chains of value production, distribution, and information access at a significant rate. These changes, although they have shaken up numerous economic models, have so far not radically challenged the bases of our society.This book addresses our current progress and viewpoints on digital identity management in different fields (social networks, cloud computing, Internet of Things (IoT)), with input from experts in computer science, law, economics and sociology. Within this multidisciplinary and scientific context, having crossed analys

  17. FINDING MY IDENTITY

    Institute of Scientific and Technical Information of China (English)

    Keith Farnish

    2010-01-01

    @@ I have found an identity. Is that really such a big deal? The thing is,I didn't realize I was missing one.There are so many things I could call myself: a human,male,a father,a husband,a writer,a thinker,a gardener,a campaigner...so many things that I feel pretty comfortable with,yet until a couple of weeks ago I didn't realize there was something missing; something that yawned inside me,empty and lacking substance.

  18. Shifting Design Consultancy Identities

    DEFF Research Database (Denmark)

    Larsen, Henry; Huijboom, Nina; Holm Nielsen, Anne

    2014-01-01

    and identities that resonate more with freelancing and portfolio careers than with the intention of creating firms that are intended to expand. We recognized a pattern where freelancers build up their work as a portfolio by moving from one engagement to another, a process that we will call sequential freelancing...... on design for innovation as a strategy for growth might well benefit if they understand that other companies in their municipality can grow if they actively support designers and help them develop their networking capabilities....

  19. Understanding your digital identity

    OpenAIRE

    Williams, Shirley Ann; Fleming, Sarah Christine; Lundqvist, Karsten Oster; Parslow, Patrick Neil

    2010-01-01

    The term “Digital Identity” is used here to describe the persona a person projects across the internet. Your Digital Identity as perceived by other people is made up of material that you post yourself (for example photographs on Flickr and your own web page) but it also is made up of material other people put there about you (blog posts that mention you, photographs in which you are tagged). The “This is Me” project has developed resources that can be used by students and others to appreci...

  20. Memory transfer for emotionally valenced words between identities in dissociative identity disorder

    NARCIS (Netherlands)

    Huntjens, Rafaele J. C.; Peters, Madelon L.; Woertman, Liesbeth; van der Hart, Onno; Postma, Albert

    The present study aimed to determine interidentity retrieval of emotionally valenced words in dissociative identity disorder (DID). Twenty-two DID patients participated together with 25 normal controls and 25 controls instructed to simulate DID. Two wordlists A and B were constructed including

  1. Memory transfer for emotionally valenced words between identities in dissociative identity disorder

    NARCIS (Netherlands)

    Huntjens, Rafaele J. C.; Peters, Madelon L.; Woertman, Liesbeth; van der Hart, Onno; Postma, Albert

    2007-01-01

    The present study aimed to determine interidentity retrieval of emotionally valenced words in dissociative identity disorder (DID). Twenty-two DID patients participated together with 25 normal controls and 25 controls instructed to simulate DID. Two wordlists A and B were constructed including neutr

  2. INTERPRETATION OF CORPORATE IDENTITY IN CONTEMPORARY WESTERN SOCIOLOGY OF MANAGEMENT

    Directory of Open Access Journals (Sweden)

    T. N. DUKHINA

    2016-01-01

    Full Text Available The article gives an interpretation of the concept of corporate identity from the perspective of Western sociology of management. The differences of values and norms, and the identity of the target component, discuss the role of identity as a strategic project of building corporate relationships. The analysis of the content of foreign scientists work on the role of corporate identity in the management of the organization, which is divided into three areas of research and interpretation of the phenomenon under study - functionalist, constructivist, poststructuralist. Corporate identity is interpreted as a resource or mechanism of its creation and reproduction. In considering approaches to the study of corporate identity in contemporary Western sociology and management and management knowledge, the author notes the theory of hidden and "non-intrusive control" in the organization, conducts its substantive analysis, refers to the concept of "coordinated supervision" as a new, postbureaucratic forms of control focuses on the teamwork, flexibility and innovation, departing from the strict hierarchical subordination and leading to a relative unanimity in values. The article notes that some researchers do not identify the notion of corporate and organizational identity, and that this difference in most cases occurs within the typology of identity on several levels and the allocation of the problem of "multiple identities". Corporate identity does not imply the conditions under which members of the organization fully identify themselves with the organization of both the regulator and the only socio-cultural group. The article shows that C.R. Scott, S.R. Corman, G. Cheney and identified four objectives for the identification of the source: the person, the working group, the organization and the profession. M. Pratt and P. Foreman in the existence of multiple identities see opportunities and threats. H.W. He and J.M.T. Balmer allocate identity levels

  3. Contextuality of identical particles

    Science.gov (United States)

    Kurzyński, Paweł

    2017-01-01

    There exist quantum phenomena that cannot be explained by noncontextual hidden-variable theories, yet the majority of them requires measurements that are performed on a single quantum system at a time. This fact constrains the phenomenon of contextuality to the microscopic domain. It is therefore natural to ask if quantum contextuality can be observed in measurements on collections of particles. Since particles in nature are identical, one can expect that such contextuality would be linked to bosonic and fermionic properties. Analysis of quantum contextuality in such scenarios would broaden our understanding of nonclassical effects in composite systems and perhaps would give us a hint on how to observe quantum phenomena in the macroscopic world. In this work I propose a generalization of quantum contextuality to the case of many identical particles. I show that a type of contextuality exhibited by a collection of particles (state dependent, state independent, or noncontextual) depends on their type and their number. I also discuss further properties of this generalization and identify major open questions.

  4. Controls of Net Ecosystem Exchange at an Old Field, a Pine Plantation, and a Hardwood Forest under Identical Climatic and Edaphic Conditions-Isotopic Studies

    Energy Technology Data Exchange (ETDEWEB)

    Chanton, J. P.; Mortazavi, B.

    2004-11-04

    During the past year we have submitted two manuscripts. 1. Mortazavi, B., J. Chanton, J.L. Prater, A.C. Oishi, R. Oren and G. Katul. Temporal variability in 13C of respired CO2 in a pine and a hardwood forest subject to similar climatic conditions (in Press). Oecologia 2. Mortazavi, B. and J. P. Chanton. Use of Keeling plots for determining sources of dissolved organic carbon in nearshore and open ocean systems (Published in Limnology and Oceanography (2004) Vol 49 pages 102-108). 3. Mortazavi, B., J. L. Prater, and J. P. Chanton (2004). A field-based method for simultaneous measurements of the 18O and 13C of soil CO2 efflux. Biogeosciences Vol 1:1-16 Most recent products delivered: Mortazavi, B. and J. P. Chanton. Abiotic and biotic controls on the 13C of respired CO2 in the southeastern US forest mosaics and a new technique for measuring the of soil CO2 efflux. Joint Biosphere Stable Isotope Network (US) and Stable Isotopes in Biosphere Atmosphere Exchange (EU) 2004 Meeting, Interlaken, Switzerland, March 31-April 4, 2004. Mortazavi, B., J. Chanton, J.L. Prater, A.C. Oishi, R. Oren and G. Katul. Temporal variability in 13C of respired CO2 in a pine and a hardwood forest subject to similar climatic conditions. American Geophysical Union Fall Meeting, San Francisco, USA, December 8-12, 2003. Prater, J., Mortazavi, B. and J. P. Chanton. Measurement of discrimination against 13C during photosynthesis and quantification of the short-term variability of 13C over a diurnal cycle. American Geophysical Union Fall Meeting, San Francisco, USA, December 8-12, 2003.

  5. Online Identities and Social Networking

    Science.gov (United States)

    Maheswaran, Muthucumaru; Ali, Bader; Ozguven, Hatice; Lord, Julien

    Online identities play a critical role in the social web that is taking shape on the Internet. Despite many technical proposals for creating and managing online identities, none has received widespread acceptance. Design and implementation of online identities that are socially acceptable on the Internet remains an open problem. This chapter discusses the interplay between online identities and social networking. Online social networks (OSNs) are growing at a rapid pace and has millions of members in them. While the recent trend is to create explicit OSNs such as Facebook and MySpace, we also have implicit OSNs such as interaction graphs created by email and instant messaging services. Explicit OSNs allow users to create profiles and use them to project their identities on the web. There are many interesting identity related issues in the context of social networking including how OSNs help and hinder the definition of online identities.

  6. Specific and Individuated Death Reflection Fosters Identity Integration.

    Directory of Open Access Journals (Sweden)

    Laura E R Blackie

    Full Text Available Identity integration is the process wherein a person assimilates multiple or conflicting identities (e.g., beliefs, values, needs into a coherent, unified self-concept. Three experiments examined whether contemplating mortality in a specific and individuated manner (i.e., via the death reflection manipulation facilitated outcomes indicative of identity integration. Participants in the death reflection condition (vs. control conditions considered positive and negative life experiences as equally important in shaping their current identity (Experiment 1, regarded self-serving values and other-serving values as equally important life principles (Experiment 2, and were equally motivated to pursue growth-oriented and security-oriented needs (Experiment 3. Death reflection motivates individuals to integrate conflicting aspects of their identity into a coherent self-concept. Given that identity integration is associated with higher well-being, the findings have implications for understanding the psychological benefits of existential contemplation.

  7. When design meets identities

    DEFF Research Database (Denmark)

    Dau, Susanne

    2013-01-01

    The aim of this paper is to present result from the first period of implementing models of blended learning in two Danish educations centers at a University College. The question addressed is how activation of blended learning models in undergraduate education for teacher and radiography affects...... knowledge development and which are the constraints or challenges to take into consideration in the process of implementation. The research takes its departure in the two different models of blended learning designed by teachers in undergraduate education centers. This is an investigation of the first...... through a critical hermeneutical process of prefiguration, configuration and refiguration. The results illustrate a significant impact of students identities as a part of the referential whole, since it is both prerequisite and an obstruction in the activation of blended learning environments...

  8. Identities at Odds

    DEFF Research Database (Denmark)

    Hazel, Spencer

    2015-01-01

    This study offers an interaction analytic account of how linguistic identities in internationalized workplaces in Denmark are indexed against members’ institutional positions in particular interactional settings. Where language policy may not be explicitly articulated between members, it is still...... embedded in how participants micro-manage their interactions, and implicit in how member’s display orientations to deviance, in the case of encountering others in the workplace whose language repertoires or preferences do not meet with expectation pertaining to the institutional position they hold....... The study uses recordings of naturally occurring interaction in different international workplace settings, and argues for greater attention to be paid to the actual language-policy practices in international workplace settings, as a entry point into developing a more nuanced understanding of the practices...

  9. Identities in Conflict

    DEFF Research Database (Denmark)

    Andersen, Dorte Jagetic

    2015-01-01

    the national public school system. The main hypothesis is, that parts of the dysfunction stems from the national lack of semantics and competence to understand and discuss experience with warzone extremes, children and spouses of Danish Soldiers and Veterans miss the language to talk and be silent. I propose......, that systems theory is both able and competent to analyze the missing gaps and empty spaces of the competing identities inside and outside the forms of peace and war. Through the use of Luhmannian systems theory and form analysis, the children and partners of war veterans give us the chance to observe...... 'inbetween'. In public education, those Soldier-kids often show abnormal behaviour and dysfunctional social integration and mental regulation. Health Care Systems and social workers turn to diagnoses of secondary traumatization, attachment disorder and develop therapies to calm the effects of exposure to War...

  10. Scripting Professional Identities

    DEFF Research Database (Denmark)

    Bévort, Frans; Suddaby, Roy

    2016-01-01

    This article examines how individual accountants subjectively interpret competing logics of professionalism as they transform from practicing accountants to managerial roles and as their organizations transform from traditional professional partnerships to more corporate organizational forms. Based...... on a longitudinal ethnography of professionals in a Big Four accounting firm we analyse the process by which individual professionals make sense of their new roles and integrate the conflicting demands of professional and managerial logics. We find that individuals are active authors of their own identity scripts...... logics is based less of inter-subjective interactions, as prior literature has assumed, and is, instead, based on individual cognition and interpretive subjectivity. We also contribute to research in professional service firms by offering a conceptual model of the individual micro-processes required...

  11. Nostalgia and lost identity.

    Science.gov (United States)

    Pourtova, Elena

    2013-02-01

    Nostalgia for the Soviet Union is a major social phenomenon in Russia today due to the irrevocable losses of the recent past in which Soviet citizens involuntarily became immigrants in their own country. With reference to discussions of nostalgia in philosophical and psychoanalytic literature, I suggest that nostalgia may represent either a defensive regression to the past or a progressive striving for wholeness through re-connecting with what has been lost in the service of a greater integration. I compare this with the processes of adaptation seen in immigrants and provide a clinical illustration of a young man coming to terms with loss and change in the post-Soviet era. When nostalgia is recognized as a legitimate emotional experience it may facilitate mourning and enable the integration of the past with the present and the development of a new identity.

  12. When design meets identities

    DEFF Research Database (Denmark)

    Dau, Susanne

    2013-01-01

    The aim of this paper is to present result from the first period of implementing models of blended learning in two Danish educations centers at a University College. The question addressed is how activation of blended learning models in undergraduate education for teacher and radiography affects...... through a critical hermeneutical process of prefiguration, configuration and refiguration. The results illustrate a significant impact of students identities as a part of the referential whole, since it is both prerequisite and an obstruction in the activation of blended learning environments...... knowledge development and which are the constraints or challenges to take into consideration in the process of implementation. The research takes its departure in the two different models of blended learning designed by teachers in undergraduate education centers. This is an investigation of the first...

  13. 基于适度创新设计的产品形象(PI)理论研究%Research on the Theory of Product Identity (PI) Based on Appropriate Innovation: With a Corporate into the Special Power Supply and Intelligent Control System for an Example

    Institute of Scientific and Technical Information of China (English)

    王金广; 禄璟

    2012-01-01

    将适度创新方法引入产品形象(PI)理论,分析PI与更新,创新之间的关系,认识视觉识别(VI)、PI与企业形象(CI)的关系,完善PI理论.结合化成电源设备产品案例,为正在转型的电气产品工业设计的创新提供一种新的参考方法.%This essay introduces the appropriate innovation method into the product identity theory in order to improve product identity theory by analyzing the relationship between product identity and innovation and understanding the relationship between visual identities, product identity and corporate identity. Combined with the practice of the special power supply and intelligent control system products, this essay also offers the reference method for the creativity in industry design of electronic products during the transitional period.

  14. Creation, Identity and Reflection

    Directory of Open Access Journals (Sweden)

    Alina Beatrice Cheşcă

    2015-05-01

    Full Text Available The paper “Creation, Identity and Reflection” approaches the identification in the “mirror” of reality with creation, in other words seeking the authors’ identity in the reflected images. Reflection means attempting to find oneself, the mirror being the main principle of creation. Many characters become interesting only when they step into the world beyond the mirror, when their faces are doubled by the other self or when their selves are returned by other characters. The narcissistic concept of the mirror, i.e. the reflection in the mirror and the representation of the mirror itself, is a recurrent one in literature, but the reflection of the self which is not the self (as it is a reflection does not necessarily appear in a mirror or in a photograph or portrait. Sometimes, the not-self is returned to the self by another person or character. As far as Oscar Wilde’s theories are concerned, the main idea is that people are interesting for their masks, not for their inner nature. What Wilde calls “inner nature” is the characters’ un-reflected self and the mask is the reflection, the self in the mirror. Some characters’ relationships develop within a fiction that they dramatically try to preserve and protect with the risk of suffering. They refuse to take off the masks which define them in the others’ minds and hearts; the narcissistic individuals (both artists and characters seek and love their own image which they project upon facts, thus creating a fictive realm.

  15. Identity at work: Exploring strategies for Identity Work

    Directory of Open Access Journals (Sweden)

    Byron G. Adams

    2012-01-01

    Full Text Available Orientation: This study explored strategies for identity work that are central to the negotiation and regulation of employee work identity.Research purpose: The main aim of this study was to explore employee narratives and identify the strategies available to them in the process of identity work, as they defined themselves at work.Motivation for the study: As there is a scarcity of research on identity work in South Africa, this study wanted to advance knowledge about identity work and the strategies used for regulating and negotiating an identity at work by exploring these constructs in this context.Research design, approach and method: A qualitative research process formed the basis for this study. Nineteen employees from a global manufacturing company participated in two semi-structured in-depth interviews. Grounded theory was applied to analyse and interpret the data.Main findings: Nine strategies for identity work were identified and categorised into four broad themes (personal philosophies; relationships; career management and negotiating balance.Practical/managerial implications: Employees followed various strategies for defining themselves at work and this may have some implications for employee work engagement and productivity.Contribution/value-add: This study expands on current theoretical knowledge of identity work, and provides insights into the strategies people use to regulate and negotiate their identities at work. 

  16. Personal identity and eastern thought

    Directory of Open Access Journals (Sweden)

    Correia Carlos João

    2009-01-01

    Full Text Available This paper aims to show that the problem of personal identity is a fundamental question of the classical Indian thought. Usually we tend to think that personal identity is a Western philosophical subject, and so we tend to forget the significance of the Self (Atman in Hinduism and even in Buddhism. The author shows how the Indian thought approached the question of personal identity and which was the singular solution outlined in the work consensually attributed to Gotama, the Buddha.

  17. An 'open source' networked identity

    DEFF Research Database (Denmark)

    Larsen, Malene Charlotte

    2013-01-01

    , but also an important part of their self-presentation online. It is discussed why these emotional statements are almost always publically available – or even strategically, intentionally placed on the young people's profiles. In relation to this, it is argued that young people – through their emotional...... communicative actions – are not only performing their own identity, but are becoming co-constructors of each other's identities, which the author characterizes as an 'open source' networked identity....

  18. Digital Identity in The Absence of Authorities: A New Socio-Technical Approach

    CERN Document Server

    McLaughlin, Mark; Malone, Paul

    2010-01-01

    On the Internet large service providers tend to control the digital identities of users. These defacto identity authorities wield significant power over users, compelling them to comply with non-negotiable terms, before access to services is granted. In doing so, users expose themselves to privacy risks, manipulation and exploitation via direct marketing. Against this backdrop, the emerging areas of Digital Ecosystems and user-centric identity emphasise decentralised environments with independent self-determining entities that control their own data and identity. We show that recent advances in user-centric identity, federated identity and trust have prepared the ground for decentralised identity provisioning. We show how social trust, rather than blind deference to authorities, can provide a basis for identity, where risks can be weighed and compared rather than merely accepted. Fundamentally, we are considering the move from authority-centric centralised identity provisioning to user-centric distributed ide...

  19. Threading "Stitches" to Approach Gender Identity, Sexual Identity, and Difference

    Science.gov (United States)

    North, Connie E.

    2010-01-01

    As LGBTQI (lesbian, gay, bisexual, transgender, queer/questioning, and intersex) issues become increasingly integrated into multicultural education discourses, we as educators need to examine the implications of our pedagogies for teaching about gender and sexual identities. This article explores my teaching of non-conforming gender identities in…

  20. High School Identity Climate and Student Identity Development

    Science.gov (United States)

    Rich, Yisrael; Schachter, Elli P.

    2012-01-01

    This research investigated whether schools characterized by high school students as being rich in identity promoting features contribute to student identity development. A theoretical model posited that student perceptions of teachers as caring role models and their school as cultivating the whole student will foster student exploration and…

  1. Networked identity: how immigrant youth employ online identity resources

    NARCIS (Netherlands)

    Prinsen, Fleur; de Haan, Mariette; Leander, Kevin

    2015-01-01

    In recent years, practices of online social networking and their implications for migrant youth identity development have been heavily debated. The nature of access to resources for identification is changing, and by using a social network perspective, this research conceptualizes identity as a netw

  2. Social Identity Change: Shifts in Social Identity during Adolescence

    Science.gov (United States)

    Tanti, Chris; Stukas, Arthur A.; Halloran, Michael J.; Foddy, Margaret

    2011-01-01

    This study investigated the proposition that adolescence involves significant shifts in social identity as a function of changes in social context and cognitive style. Using an experimental design, we primed either peer or gender identity with a sample of 380 early- (12-13 years), mid- (15-16 years), and late-adolescents (18-20 years) and then…

  3. Identity Support, Identity Devaluation, and Well-Being among Lesbians

    Science.gov (United States)

    Beals, Kristin P.; Peplau, Letitia Anne

    2005-01-01

    This research tested predictions about the association of identity support and identity devaluation with psychological well-being (self-esteem, life satisfaction, and depression). Lesbian women completed baseline surveys (N=42), then provided daily experience reports during a 2-week period (n=38), and completed a 2-month follow-up survey (n=34).…

  4. Men as Victims: "Victim" Identities, Gay Identities, and Masculinities

    Science.gov (United States)

    Dunn, Peter

    2012-01-01

    The impact and meanings of homophobic violence on gay men's identities are explored with a particular focus on their identities as men and as gay men. Homosexuality can pose a challenge to conventional masculinities, and for some gay men, being victimized on account of sexual orientation reawakens conflicts about their masculinity that they…

  5. Identity Support, Identity Devaluation, and Well-Being among Lesbians

    Science.gov (United States)

    Beals, Kristin P.; Peplau, Letitia Anne

    2005-01-01

    This research tested predictions about the association of identity support and identity devaluation with psychological well-being (self-esteem, life satisfaction, and depression). Lesbian women completed baseline surveys (N=42), then provided daily experience reports during a 2-week period (n=38), and completed a 2-month follow-up survey (n=34).…

  6. Visual adaptation provides objective electrophysiological evidence of facial identity discrimination.

    Science.gov (United States)

    Retter, Talia L; Rossion, Bruno

    2016-07-01

    Discrimination of facial identities is a fundamental function of the human brain that is challenging to examine with macroscopic measurements of neural activity, such as those obtained with functional magnetic resonance imaging (fMRI) and electroencephalography (EEG). Although visual adaptation or repetition suppression (RS) stimulation paradigms have been successfully implemented to this end with such recording techniques, objective evidence of an identity-specific discrimination response due to adaptation at the level of the visual representation is lacking. Here, we addressed this issue with fast periodic visual stimulation (FPVS) and EEG recording combined with a symmetry/asymmetry adaptation paradigm. Adaptation to one facial identity is induced through repeated presentation of that identity at a rate of 6 images per second (6 Hz) over 10 sec. Subsequently, this identity is presented in alternation with another facial identity (i.e., its anti-face, both faces being equidistant from an average face), producing an identity repetition rate of 3 Hz over a 20 sec testing sequence. A clear EEG response at 3 Hz is observed over the right occipito-temporal (ROT) cortex, indexing discrimination between the two facial identities in the absence of an explicit behavioral discrimination measure. This face identity discrimination occurs immediately after adaptation and disappears rapidly within 20 sec. Importantly, this 3 Hz response is not observed in a control condition without the single-identity 10 sec adaptation period. These results indicate that visual adaptation to a given facial identity produces an objective (i.e., at a pre-defined stimulation frequency) electrophysiological index of visual discrimination between that identity and another, and provides a unique behavior-free quantification of the effect of visual adaptation.

  7. Supporting Biracial Children's Identity Development.

    Science.gov (United States)

    Morrison, Johnetta Wade; Bordere, Tashel

    2001-01-01

    Discusses stages of identity development in early childhood, as well as ways teachers can be supportive of that development. Addresses components of identity development in young children, parental preferences, valuing diversity, and curriculum recommendations. Provides suggestions appropriate for children of any racial combination. (SD)

  8. Teacher Investment in Learner Identity

    Science.gov (United States)

    Reeves, Jenelle

    2009-01-01

    From a sociocultural perspective, teacher identity is constructed in relation to others, including other teachers and students. Drawing on positioning theory and the concept of investment, this study analyzed the case of a secondary English teacher who negotiated his teacher identity in relation to English language learners (ELLs). Findings…

  9. Identity and the Management Project

    DEFF Research Database (Denmark)

    Jørgensen, Kenneth Mølbjerg; Dehlin, Erlend

    and family resemblance. As such, managing identity in organizations is closely linked to rules and family resemblance. Organizations manage identity through the definition of norms and values for right or wrong, appropriate or inappropriate, to name but a few. Norms and values are important as reference...

  10. Food, Identity, and Environmental Education

    Science.gov (United States)

    Stapleton, Sarah Riggs

    2015-01-01

    While food is an exceedingly rich area for environmental education, I caution environmental educators and researchers from moving too quickly into messaging about what people "should" eat, given the many complexities around food and identity. Eating, as an inherently identity-laden practice, is fraught with complicated meanings,…

  11. Identity development in deaf adolescents

    NARCIS (Netherlands)

    Kunnen, E. Saskia

    2014-01-01

    We studied identity development during 5 years in 11 deaf adolescents who attend a school for deaf children in the highest level of regular secondary education (age between 14 and 19 years). Identity development is conceptualized by the processes of exploration and commitment formation, as

  12. Fibonacci Identities, Matrices, and Graphs

    Science.gov (United States)

    Huang, Danrun

    2005-01-01

    General strategies used to help discover, prove, and generalize identities for Fibonacci numbers are described along with some properties about the determinants of square matrices. A matrix proof for identity (2) that has received immense attention from many branches of mathematics, like linear algebra, dynamical systems, graph theory and others…

  13. Identity development in deaf adolescents

    NARCIS (Netherlands)

    Kunnen, E. Saskia

    2014-01-01

    We studied identity development during 5 years in 11 deaf adolescents who attend a school for deaf children in the highest level of regular secondary education (age between 14 and 19 years). Identity development is conceptualized by the processes of exploration and commitment formation, as formulate

  14. Gender identity development in adolescence.

    Science.gov (United States)

    Steensma, Thomas D; Kreukels, Baudewijntje P C; de Vries, Annelou L C; Cohen-Kettenis, Peggy T

    2013-07-01

    This article is part of a Special Issue "Puberty and Adolescence".This article aims to provide an outline of what is currently known on trajectories, and contributing factors to gender identity development in adolescence. We give a historical overview of the concept of gender identity, and describe general identity development in adolescence, gender identity development in the general population and in gender variant youth. Possible psychosocial (such as child and parental characteristics) and biological factors (such as the effects of prenatal exposure to gonadal hormones and the role of genetics) contributing to a gender variant identity are discussed. Studies focusing on a number of psychosocial and biological factors separately, indicate that each of these factors influence gender identity formation, but little is known about the complex interplay between the factors, nor about the way individuals themselves contribute to the process. Research into normative and gender variant identity development of adolescents is clearly lagging behind. However, studies on persons with gender dysphoria and disorders of sex development, show that the period of adolescence, with its changing social environment and the onset of physical puberty, seems to be crucial for the development of a non-normative gender identity. Copyright © 2013 Elsevier Inc. All rights reserved.

  15. Teacher Investment in Learner Identity

    Science.gov (United States)

    Reeves, Jenelle

    2009-01-01

    From a sociocultural perspective, teacher identity is constructed in relation to others, including other teachers and students. Drawing on positioning theory and the concept of investment, this study analyzed the case of a secondary English teacher who negotiated his teacher identity in relation to English language learners (ELLs). Findings…

  16. National Identity in Korean Curriculum

    Science.gov (United States)

    Kim, Hyojeong

    2004-01-01

    The concept of national identity has evolved during the last half century within the Korean social studies curriculum. There have been seven curricular revisions since the first national curriculum was released in 1955. Each time the concept of national identity was changed with the biggest changes to this concept within the last two iterations of…

  17. Exploring Leader Identity and Development.

    Science.gov (United States)

    Priest, Kerry L; Middleton, Eric

    2016-01-01

    Taking on a leader identity can be a motivating force for pursuing leader development. This chapter explores the reciprocal and recursive nature of identity development and leader development, emphasizing how shifting views of self influence one's motivation to develop as a leader.

  18. Identity Research in Mathematics Education

    Science.gov (United States)

    Darragh, Lisa

    2016-01-01

    This paper examines the literature on identity within mathematics education published in journals over the past two decades. It analyses the theoretical underpinnings, research methods and definitions of identity, providing a critique rather than a summary of the literature. A total of 188 articles from 85 different journals are reviewed in the…

  19. Explanatory Identities and Conceptual Change

    Science.gov (United States)

    Thagard, Paul

    2014-01-01

    Although mind-brain identity remains controversial, many other identities of ordinary things with scientific ones are well established. For example, air is a mixture of gases, water is H[subscript 2]O, and fire is rapid oxidation. This paper examines the history of 15 important identifications: air, blood, cloud, earth, electricity, fire, gold,…

  20. Hierarchy of Modular Graph Identities

    CERN Document Server

    D'Hoker, Eric

    2016-01-01

    The low energy expansion of Type II superstring amplitudes at genus one is organized in terms of modular graph functions associated with Feynman graphs of a conformal scalar field on the torus. In earlier work, surprising identities between two-loop graphs at all weights, and between higher-loop graphs of weights four and five were constructed. In the present paper, these results are generalized in two complementary directions. First, all identities at weight six and all dihedral identities at weight seven are obtained and proven. Whenever the Laurent polynomial at the cusp is available, the form of these identities confirms the pattern by which the vanishing of the Laurent polynomial governs the full modular identity. Second, the family of modular graph functions is extended to include all graphs with derivative couplings and worldsheet fermions. These extended families of modular graph functions are shown to obey a hierarchy of inhomogeneous Laplace eigenvalue equations. The eigenvalues are calculated analy...

  1. National Development Generates National Identities

    Science.gov (United States)

    2016-01-01

    The purpose of the article is to test the relationship between national identities and modernisation. We test the hypotheses that not all forms of identity are equally compatible with modernisation as measured by Human Development Index. The less developed societies are characterised by strong ascribed national identities based on birth, territory and religion, but also by strong voluntarist identities based on civic features selected and/or achieved by an individual. While the former decreases with further modernisation, the latter may either decrease or remain at high levels and coexist with instrumental supranational identifications, typical for the most developed countries. The results, which are also confirmed by multilevel regression models, thus demonstrate that increasing modernisation in terms of development contributes to the shifts from classical, especially ascribed, identities towards instrumental identifications. These findings are particularly relevant in the turbulent times increasingly dominated by the hardly predictable effects of the recent mass migrations. PMID:26841050

  2. Unskilled Work and Learner Identity

    DEFF Research Database (Denmark)

    Kondrup, Sissel

    2014-01-01

    . The main argument is that participation research must abandon the notion of motivation as an individual attribute and apply a dialectic concept of learner identity acknowledging work-life as a pivotal space for learning and formation of identity. I outline how a work-life-historical approach combining...... a critical theoretical approach inspired by Salling-Olesen’s and Archer’s concepts of identity and concerns can contribute to an understanding of the relationship between work and learner identity. Through narrative work-life interviews I examine how engagement in unskilled work in small and medium sized...... Danish enterprises causes a multitude of different and ambiguous immediate experiences and concerns pivotal for the workers’ learner identities....

  3. STORYTELLING AND UNIVERSITY BRANDING IDENTITY

    Directory of Open Access Journals (Sweden)

    ANDREEA MONICA STATE

    2016-08-01

    Full Text Available The present article sets out to clarify the concepts of storytelling and branding, with a focus on university branding and visual identity – the latter being a vital element to a brand’s uniqueness. Storytelling is an important method of brand construction, and it entails a strong power of seduction. Branding is increasingly more about storytelling. Practically, a story is an image made up of facts, feelings and interpretations, which are often told to us solely by the university itself. As such, the brand appears on the market accompanied by its identity. Identity is what we aim to express with help of the brand. Implementing a system of visual identity that would help to harmoniously develop a university brand requires a handbook of visual identity. The present article aims to be a starting point for such a handbook serving the University of Bucharest, which currently does not own such a handbook

  4. Ethnic Identities of University Students

    Directory of Open Access Journals (Sweden)

    Gözde Özdikmenli-Demir

    2014-06-01

    Full Text Available The aim of this article is to understand the relationship between ethnic identity, victimization/witnessing community violence, ethnic discrimination, and aggression in a sample of university students living in the South East Region of Turkey. The participants were 263 university students of predominantly Kurdish ethnic origin. The results showed that males had higher levels of ethnic identity in the dimensions of exploration and commitment. Males also presented higher scores for witnessing community violence and lifetime exposure to ethnic discrimination. The most important predictor of participants’ ethnic identity was witnessing community violence. Participants who witnessed violent acts in their social environment had higher ethnic identity levels. Although the predictor variables could not explain an important part of the participants’ aggression levels, only perceived ethnic discrimination was positively related to aggressive behavior. The role of native language efficiency in ethnic identity is also discussed.

  5. Gender identity disorder.

    LENUS (Irish Health Repository)

    De Gascun, C

    2006-05-01

    Gender Identity Disorder (GID) is a relatively rare condition of atypical gender development in which there is a psychological perception of self as masculine or feminine which is incongruent with ones phenotype. GID replaced the term Transsexualism in DSM-IV in 1994. The demographics of GID in Ireland have not been established. Since 2000 we have received 52 referrals of individuals with confirmed GID to our endocrine service for consideration for hormonal treatment (HT). Of the 52 patients 45 have male to female (MTF) GID (mean age 38.9 years) and 7 have female to male (FTM) GID (mean age 30.7 years). The age at presentation in this group is approximately 9 years older than in international series for both MTF (39 years v 30yrs) and FTM (31 yrs v 22yrs). The karyotype where analysed has been normal for their phenotypic sex. Twenty-three of the patients had received HT prior to attending our clinic that in only one case had been prescribed by a specialist. A number of patients had obtained HT via the internet or from overseas sources without medical review. Eighteen of the patients have been or are married and 14 of the group have children. The scale of referrals confirms that GID exists in the Irish population to a significant degree. Thus an appropriate care pathway for people with the condition needs to be established. This will facilitate optimum medical management of the patient group and a coherent approach to the many difficult social issues faced individuals with this disorder.

  6. Body integrity identity disorder.

    Directory of Open Access Journals (Sweden)

    Rianne M Blom

    Full Text Available INTRODUCTION: Body Integrity Identity Disorder (BIID is a rare, infrequently studied and highly secretive condition in which there is a mismatch between the mental body image and the physical body. Subjects suffering from BIID have an intense desire to amputate a major limb or severe the spinal cord in order to become paralyzed. Aim of the study is to broaden the knowledge of BIID amongst medical professionals, by describing all who deal with BIID. METHODS: Somatic, psychiatric and BIID characteristic data were collected from 54 BIID individuals using a detailed questionnaire. Subsequently, data of different subtypes of BIID (i.e. wish for amputation or paralyzation were evaluated. Finally, disruption in work, social and family life due to BIID in subjects with and without amputation were compared. RESULTS: Based on the subjects' reports we found that BIID has an onset in early childhood. The main rationale given for their desire for body modification is to feel complete or to feel satisfied inside. Somatic and severe psychiatric co-morbidity is unusual, but depressive symptoms and mood disorders can be present, possibly secondary to the enormous distress BIID puts upon a person. Amputation and paralyzation variant do not differ in any clinical variable. Surgery is found helpful in all subjects who underwent amputation and those subjects score significantly lower on a disability scale than BIID subjects without body modification. CONCLUSIONS: The amputation variant and paralyzation variant of BIID are to be considered as one of the same condition. Amputation of the healthy body part appears to result in remission of BIID and an impressive improvement of quality of life. Knowledge of and respect for the desires of BIID individuals are the first steps in providing care and may decrease the huge burden they experience.

  7. Identity and Intimacy during Adolescence: Connections among Identity Styles, Romantic Attachment and Identity Commitment

    Science.gov (United States)

    Kerpelman, Jennifer L.; Pittman, Joe F.; Cadely, Hans Saint-Eloi; Tuggle, Felicia J.; Harrell-Levy, Marinda K.; Adler-Baeder, Francesca M.

    2012-01-01

    Integration of adult attachment and psychosocial development theories suggests that adolescence is a time when capacities for romantic intimacy and identity formation are co-evolving. The current study addressed direct, indirect and moderated associations among identity and romantic attachment constructs with a diverse sample of 2178 middle…

  8. integrated identity and integrated identity and access management ...

    African Journals Online (AJOL)

    eobe

    a fingerprint biometric database that centrally manages students' identity, course .... widening use, motivated the use of biometrics ... System and Examination Screening and Attendance ... of each person's entry into examination/lecture halls,.

  9. FORMATION OF PROFESSIONAL IDENTITY IN PARADIGM OF THE PERSONAL AUTONOMY

    Directory of Open Access Journals (Sweden)

    Maikova Eleonora Yurievna

    2013-01-01

    Full Text Available This article traces the interrelation of a personal autonomy and professional identity. The purpose of research consists in revealing predictors of professional identity as initiation of a personal autonomy of student's youth. Methodology / Approach / Methods. The discourse-analysis on a problem of a personal autonomy and professional identity, toolkit of psychological diagnostics (diagnostic techniques of a level of subjective control, personal orientation and life sense orientations, creative potential, tolerance index and statuses of professional identity, mathematic analysis of the received empirical data have been used for achievement of the purpose. The results of research show and prove correlation of such factors of an personal autonomy as the responsibility, creative potential, tolerance, values of sense life and status of professional identity. Practical implications. The results of research can be applied in higher school's educational practice for development of a personal autonomy of training youth.

  10. An 'open source' networked identity

    DEFF Research Database (Denmark)

    Larsen, Malene Charlotte

    2016-01-01

    friendship, but also an important part of their self-presentation online. It examines why these emotional statements are almost always publicly available – or even strategically and intentionally placed on the young people’s profiles. In relation to this, it is argued that young people – through...... their emotional communicative actions – are not only staging their own identity, but are co-constructors of each other’s identities, which the author characterises as an “open source”, networked identity....

  11. The challenge of plural identity

    Directory of Open Access Journals (Sweden)

    Jovanović Bojan

    2005-01-01

    Full Text Available The complexity of collective existence is expressed through an awareness of its real identity, which then entails an appropriate attitude towards its own negativity. Within the hierarchically structured identity, different levels of its generality make it possible to consider them as factors of a plural reality. If negativity is raised to consciousness, then its dark side is dismantled. Thus, instead of being a factor of conflict, negativity becomes an element of complementariness and a factor in the construction of a shared identity at a higher level of generality.

  12. Ward Identities for Hall Transport

    CERN Document Server

    Hoyos, Carlos; Oz, Yaron

    2014-01-01

    We derive quantum field theory Ward identities based on linear area preserving and conformal transformations in 2+1 dimensions. The identities relate Hall viscosities, Hall conductivities and the angular momentum. They apply both for relativistic and non relativistic systems, at zero and at finite temperature. We consider systems with or without translation invariance, and introduce an external magnetic field and viscous drag terms. A special case of the identities yields the well known relation between the Hall conductivity and half the angular momentum density.

  13. Identity In and Around Organisations

    DEFF Research Database (Denmark)

    Schultz, Majken; Maguire, Steve

    2013-01-01

    At the heart of any successful organisation lies a powerful conception of identity: the coherent way in which it presents itself to its stakeholders and employees, containing its purpose, goals and key characteristics. However, the traditional idea of identity as a stable, solid and reliable...... concept may not be the best way of approaching and managing your organisation. Rather, Majken Schultz and Steve Maguire argue that organisations would benefit from adopting a process-based view of identity, which integrates history, ongoing change and market instability into its definition....

  14. From identity to organisation identity: The evolution of a concept

    Directory of Open Access Journals (Sweden)

    C. L. Van Tonder

    2003-10-01

    Full Text Available The view that corporate and/or organisation identity is a contributing factor to organisational success, is increasingly observed in the media. At the same time research interest in the concept appears to be on the increase. While identity is not a novel concept and has presented in different forms, it remains shrouded in ambiguity and is in need of more precise articulation. The present study revisited the origins of the identity concept and reviewed various perspectives on identity. A specific meaning structure and theoretical framework for the organization identity concept is proposed and it is concluded that contemporary views of identity are increasingly embracing earlier psychological perspectives. Opsomming Die siening dat korporatiewe en/of organisasie-identiteit ’n bydraende faktor tot organisasiesukses is, word toenemend in die media waargeneem. Navorsingsbelangstelling in die konsep skyn terselfdertyd toe te neem. Terwyl identiteit geensins ’n nuwe konsep is nie en in verskillende vorme voorkom, bly dit in vaagheid gehul en word ’n meer duidelike omskrywing daarvan benodig. Die huidige studie het die oorsprong van die indentiteitskonsep nagespeur en verskeie perspektiewe op identiteit in oënskou geneem. ’n Bepaalde betekenisstruktuur en teoretiese raamwerk word vir die identiteitskonsep voorgestel en die gevolgtrekking word gemaak dat kontemporêre sienings van identiteit toenemend besig is om vroeëre psigologiese perspektiewe te omsluit.

  15. Chicana Identity Construction: Pushing the Boundaries

    Science.gov (United States)

    Vera, Helen; De Los Santos, Esmeralda

    2005-01-01

    Identity concepts that Chicana feminists have described as central to their developmental experience are not reflected in the traditional views of identity, feminist accounts of women's identity, or ethnic identity theory. Chicana feminist Gloria Anzaldua initially postulated that in the straddling of two cultures, a hybrid or mestiza identity is…

  16. Unhealthy Paradoxes of Healthy Identities

    NARCIS (Netherlands)

    S.J. Magala (Slawomir)

    2003-01-01

    textabstractComparative cross-cultural studies and identity research in social psychology focused on national and organizational differences, clashes and dimensions (Hofstede, Barsoux & Schneider, Jackson, Ward, Bochner & Furnham, Capoza & Brown). Mapping cultural software of individuals and dynamic

  17. Conflicted Pasts and National Identities

    DEFF Research Database (Denmark)

    With reference to current theories of cultural memory, the book explores how memories of war and conflict are passed from generation to generation, how these complex processes have transformed and shaped collective identities, and how they still inform national "conversations"....

  18. Unskilled Work and Learner Identity

    DEFF Research Database (Denmark)

    Kondrup, Sissel

    2014-01-01

    The paper examines how unskilled work forms conditions for meeting the obligation to position oneself as an educable subject and engage in formal learning activities. Sensitivity to peoples’ work-life-experiences is necessary to understand their orientation toward different learning activities....... The main argument is that participation research must abandon the notion of motivation as an individual attribute and apply a dialectic concept of learner identity acknowledging work-life as a pivotal space for learning and formation of identity. I outline how a work-life-historical approach combining...... a critical theoretical approach inspired by Salling-Olesen’s and Archer’s concepts of identity and concerns can contribute to an understanding of the relationship between work and learner identity. Through narrative work-life interviews I examine how engagement in unskilled work in small and medium sized...

  19. Unskilled Work and Learner Identity

    DEFF Research Database (Denmark)

    Kondrup, Sissel

    The paper examines how unskilled work forms conditions for meeting the obligation to position oneself as an educable subject and engage in formal learning activities. Sensitivity to peoples’ work-life-experiences is necessary to understand their orientation toward different learning activities....... The main argument is that participation research must abandon the notion of motivation as an individual attribute and apply a dialectic concept of learner identity acknowledging work-life as a pivotal space for learning and formation of identity. I outline how a work-life-historical approach combining...... a critical theoretical approach inspired by Salling- Olesen’s and Archer’s concepts of identity and concerns can contribute to an understanding of the relationship between work and learner identity. Through narrative work-life interviews I examine how engagement in unskilled work in small and medium sized...

  20. Unskilled Work and Learner Identity

    DEFF Research Database (Denmark)

    Kondrup, Sissel

    a critical theoretical approach inspired by Salling- Olesen’s and Archer’s concepts of identity and concerns can contribute to an understanding of the relationship between work and learner identity. Through narrative work-life interviews I examine how engagement in unskilled work in small and medium sized......The paper examines how unskilled work forms conditions for meeting the obligation to position oneself as an educable subject and engage in formal learning activities. Sensitivity to peoples’ work-life-experiences is necessary to understand their orientation toward different learning activities....... The main argument is that participation research must abandon the notion of motivation as an individual attribute and apply a dialectic concept of learner identity acknowledging work-life as a pivotal space for learning and formation of identity. I outline how a work-life-historical approach combining...

  1. Human Rights and Cultural Identity

    Directory of Open Access Journals (Sweden)

    John-Stewart Gordon

    2015-12-01

    Full Text Available Universal human rights and particular cultural identities, which are relativistic by nature, seem to stand in conflict with each other. It is commonly suggested that the relativistic natures of cultural identities undermine universal human rights and that human rights might compromise particular cultural identities in a globalised world. This article examines this supposed clash and suggests that it is possible to frame a human rights approach in such a way that it becomes the starting point and constraining framework for all non-deficient cultural identities. In other words, it is possible to depict human rights in a culturally sensitive way so that universal human rights can meet the demands of a moderate version of meta-ethical relativism which acknowledges a small universal core of objectively true or false moral statements and avers that, beyond that small core, all other moral statements are neither objectively true nor false.

  2. Ward identity in noncommutative QED

    OpenAIRE

    Mariz, T.; Pires, C. A. de S.; R F Ribeiro

    2002-01-01

    Although noncommutative QED presents a nonabelian structure, it does not present structure constants. In view of this we investigate how Ward identity is satisfied in pair annihilation process and $\\gamma \\gamma \\to \\gamma \\gamma$ scattering in noncommutative QED.

  3. Monetary Organization and National Identity

    DEFF Research Database (Denmark)

    Ravn Sørensen, Anders

    2016-01-01

    This article develops a detailed overview of literature on the relationship between monetary organization, understood as currencies and central banks, and issues of national identity and nationalism. It demonstrates how the literature on this subject for the past 20 years has developed...... identity, (2) an increased focus on central banks and monetary authorities, as well as the historical development in which monetary organization evolved in concert with ideas of the national identity and nationalism....... organization to an emphasis on how collective identities legitimize monetary organization. Based on the literature review, the article points to two underdeveloped themes for future research to investigate: (1) further studies on the interrelation between the legitimacy of monetary organization and national...

  4. Digital Identity - The Legal Person?

    Science.gov (United States)

    Sullivan, Clare

    This paper examines the concept of digital identity which the author asserts is now evident in the United Kingdom as a consequence of the Identity Cards Act (UK) 2006 and the National Identity Scheme it establishes. The nature and functions of the concept, particularly the set of information which constitutes an individual’s transactional identity, are examined. The paper then considers the central question of who, or what, is the legal person in a transaction i.e. who or what enters into legal relations. The analysis presents some intriguing results which were almost certainly not envisaged by the legislature. The implications extend beyond the United Kingdom to similar schemes in other jurisdictions, and to countries, like Australia, which may implement such a scheme.

  5. Children Literature: Shaping Gender Identities

    National Research Council Canada - National Science Library

    IQRA JABEEN; ASAD MEHMOOD

    2014-01-01

    ...; norms of interpretation; and genres. Selected children's stories were analyzed to identify their role as primary thought developing sources in the mind of young learners thus shaping their gender identities...

  6. Science Identity in Informal Education

    Science.gov (United States)

    Schon, Jennifer A.

    The national drive to increase the number of students pursuing Science Technology, Engineering, and Math (STEM) careers has brought science identity into focus for educators, with the need to determine what encourages students to pursue and persist in STEM careers. Science identity, the degree to which students think someone like them could be a scientist is a potential indicator of students pursuing and persisting in STEM related fields. Science identity, as defined by Carlone and Johnson (2007) consists of three constructs: competence, performance, and recognition. Students need to feel like they are good at science, can perform it well, and that others recognize them for these achievements in order to develop a science identity. These constructs can be bolstered by student visitation to informal education centers. Informal education centers, such as outdoor science schools, museums, and various learning centers can have a positive impact on how students view themselves as scientists by exposing them to novel and unique learning opportunities unavailable in their school. Specifically, the University of Idaho's McCall Outdoor Science School (MOSS) focuses on providing K-12 students with the opportunity to learn about science with a place-based, hands-on, inquiry-based curriculum that hopes to foster science identity development. To understand the constructs that lead to science identity formation and the impact the MOSS program has on science identity development, several questions were explored examining how students define the constructs and if the MOSS program impacted how they rate themselves within each construct. A mixed-method research approach was used consisting of focus group interviews with students and pre, post, one-month posttests for visiting students to look at change in science identity over time. Results from confirmatory factor analysis indicate that the instrument created is a good fit for examining science identity and the associated

  7. Corporate Visual Identity Systems origin

    OpenAIRE

    Raposo, D.

    2009-01-01

    Este artigo trata de fazer um pequeno recorrido histórico sobre como a marca se converteu nos sistemas de identidade visual corporativa. Alguns dos principais projectos de identidade ajudam a entender quais as motivações que originaram a necessidade de organização dos sistemas de identidade. Abstract: This paper is a short path about how brands became Corporate Visual Identity Systems. Some of the biggest and emblematic corporate identity projects are helpful to understand which moti...

  8. Theoretical Simulation for Identical Bands

    Institute of Scientific and Technical Information of China (English)

    CHEN Yong-Jing; CHEN Yong-Shou; GAO Zao-Chun

    2004-01-01

    @@ The frequency of occurrence of identical bands is studied by analysing a large number of rotational bands calculated with the reflection asymmetric shell model, and the statistical properties of identical bands indicated in all the experimental observations are reproduced within the mean field approximation and beyond mean field treatment, such as angular momentum projection. The distributions of the calculated J(2), Eγ and the fractional change of J(2) are discussed.

  9. Applications of the lantern identity

    CERN Document Server

    Garoufalidis, S

    1997-01-01

    The purpose of this note is to unify the role of the lantern identity in the proof of several finiteness theorems. In particular, we show that for every nonnegative integer m, the vector space (over the rationals) of type m (resp. T-type m) invariants of integral homology 3-spheres are finite dimensional. These results have already been obtained by [Oh] and [GL2] respectively; our derivation however is simpler, conceptual and relates to several other applications of the lantern identity.

  10. Organisation identity : an exploratory study.

    OpenAIRE

    2012-01-01

    D.Litt. et Phil. Recent studies have found that the life expectancy of organisations is rapidly declining (currently between 40 and 50 years) and that organisational decline and bankruptcy were increasing at disturbing rates. Equally recent contributions in the popular and business press have suggested that the expensive path to corporate failure could be linked to the "identity" or "corporate identity" of the organisation (more specifically the absence thereof). With the exception of the ...

  11. A Mechanism for Identity Delegation at Authentication Level

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.

    2009-01-01

    operating systems, by delegating privileges at the identity level. The complexity of classic delegation models, especially if it strictly fol- lows the principle of least privileges, often leads to poor usability which motivates a user to circumvent the default delegation mechanism. On the other hand......Authentication and access control are normally considered separate security concepts that have separate goals and are supported by separate security mechanisms. In most operating systems, however, access control is exclusively based on the identity of the requesting principal, e.g., an access...... control mechanism based on Access Control Lists simply verifies that the authenticated identity of the requesting principal is on the list of authorized users. In this paper we propose a delegation mechanism for nomadic users, which exploits the amalgamation of authentication and access control in most...

  12. On Using TPM for Secure Identities in Future Home Networks

    Directory of Open Access Journals (Sweden)

    Georg Carle

    2011-01-01

    Full Text Available Security should be integrated into future networks from the beginning, not as an extension. Secure identities and authentication schemes are an important step to fulfill this quest. In this article, we argue that home networks are a natural trust anchor for such schemes. We describe our concept of home networks as a universal point of reference for authentication, trust and access control, and show that our scheme can be applied to any next generation network. As home networks are no safe place, we apply Trusted Computing technology to prevent the abuse of identities, i.e., identity theft.

  13. Function Projective Synchronization of Two Identical New Hyperchaotic Systems

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    A function projective synchronization of two identical hyperchaotic systems is defined and the theorem of sufficient condition is given. Based on the active control method and symbolic computation Maple, the scheme of function projective synchronization is developed to synchronize the two identical new hyperchaotic systems constructed by Yan up to a scaling function matrix with different initial values. Numerical simulations are used to verify the effectiveness of the scheme.

  14. Exploring the identity and "sense of identity" of organisations

    Directory of Open Access Journals (Sweden)

    C L Van Tonder

    2006-03-01

    Full Text Available During the past two decades a steady increase in scholarly contributions in the area of organisation identity have been observed – to the point that the phenomenon is now the subject of a sustainable discourse in several disciplines. Many theoretical and conceptual dilemmas however remain, largely as a result of the low incidence of empirical research in the area. This study reports the results of an exploratory investigation that adapted Schley and Wagenfield’s (1979 concept of identity for use in an organisational setting. Interviews were conducted with 152 top managers representing 10 companies. The results indicate that organisational responses to the question “who am I?�? elicit distinctive organisational self-descriptions and some awareness of identity issues.

  15. "I've Called 'em Tom-ah-toes All My Life and I'm Not Going To Change!": Maintaining Linguistic Control over English Identity in the U.S.

    Science.gov (United States)

    Jones, Katharine W.

    2001-01-01

    In-depth interviews with 34 English immigrants living in the "Anglophilic" eastern United States examined the social status of various English accents, anxiety engendered by creeping Americanization of their accents, how they coped with claiming an identity undermined by changing accents, and mechanisms to distance themselves from…

  16. Contested identities: Identity constructions in a youth recreational drug culture

    DEFF Research Database (Denmark)

    Ravn, Signe

    2012-01-01

    as responsible drug users. The article studies this recreational drug culture and its internal distinctions, conceptions and norms as they are expressed discursively. The analysis identifies six dimensions of the identity as a responsible, recreational drug user: drug practice, general drug knowledge, context......-specific drug knowledge, practices for checking drugs, acknowledging one’s position in the surrounding drug scene and age. The analysis shows how being able to perform a coherent identity in line with these dimensions is necessary for being acknowledged as a responsible, recreational drug user....

  17. Pancreatic β-cell identity in diabetes.

    Science.gov (United States)

    Remedi, M S; Emfinger, C

    2016-09-01

    Recovery of functional β-cell mass continues to be an ongoing challenge in treating diabetes. Initial work studying β-cells suggested apoptotic β-cell death as a main contributor for the loss of β-cell mass in diabetes. Restoration of β-cells either by transplant or stimulating proliferation of remaining β-cells or precursors would then logically be a viable therapeutic option for diabetes. However, recent work has highlighted the inherent β-cell plasticity and the critical role of loss of β-cell identity in diabetes, and has suggested that β-cells fail to maintain a fully differentiated glucose-responsive and drug-responsive state, particularly in diabetic individuals with poorly controlled, long-lasting periods of hyperglycaemia. Understanding the underlying mechanisms of loss of β-cell identity and conversion in other cell types, as well as how to regain their mature differentiated functional state, is critical to develop novel therapeutic strategies to prevent or reverse these processes. In this review, we discuss the role of plasticity and loss of β-cell identity in diabetes, the current understanding of mechanisms involved in altering this mature functional β-cell state and potential progresses to identify novel therapeutic targets providing better opportunities for slowing or preventing diabetes progression.

  18. Sense of identity and depression in adolescents.

    Science.gov (United States)

    Demir, Başaran; Kaynak-Demir, Hadiye; Sönmez, Emel Irmak

    2010-01-01

    The objective of this study was to investigate the relationship between sense of identity and depression in a group of adolescents. Thirty-one depressed adolescents and 31 control subjects were included in the study. They were evaluated using the Sense of Identity Assessment Form (SIAF), Hamilton Depression Rating Scale (HDRS), Beck Depression Inventory (BDI), and Beck Anxiety Inventory (BAI). Depressed adolescents were reevaluated during the eighth week of antidepressant treatment. Higher baseline SIAF scores were detected in depressed adolescents as compared with non-depressed subjects. After antidepressant treatment, there was a significant decrease in SIAF scores in the depression group. Correlation analysis indicated that there are significant, positive relationships between SIAF, depression, and anxiety scores. The regression analysis results suggested that the change in SIAF scores can accurately predict 91.6% of the remitters and 42.8% of the non-remitters. Collectively, these findings indicate that there is a close association between depression symptoms and identity confusion-related distress in adolescents.

  19. PERSONAL IDENTITY IN DEAF ADOLESCENTS

    Directory of Open Access Journals (Sweden)

    Joanna KOSSEWSKA

    2008-06-01

    Full Text Available The purpose of this study was to investigate the factors influencing the identity deaf adolescents. The study involved 67 deaf adolescents (38 boys and 29 girls aged 16 to 19 students of secondary school. Ninety-three hearing children constituted a comparison group. The structure of identity was explored on the basis of identification references given by the subjects who were to reply in writing, 20 times running, to the question: „Who Am I?” the test, adapted from M. H. Kuhn and T. S. McPartland by Martines and Silvestre (1995 given in written and signed mode.Results showed that the hearing status as well as mode of communication influence the description of personal identity. It was found that deaf adoles­cents used more descriptions especially in the fol­lowing categories: Civil Status, Body and Physical Appearance, Tastes and Activities, Friendship and Relationships, Personal and Social Situation, Negative Personal Traits, and Neutral Personality Traits. Although this study could demonstrate im­pact independent variables on identity, the data raise the need for further, preferably longitudinal, research. This complex phenomenon has to be examined more closely.Combined self-descriptive processes lead to the development of an organized, learned and dynamic identity, and subjective description of an individ­ual has strong emotional consequences for the in­dividual in question.

  20. At the Intersection of Identities

    Directory of Open Access Journals (Sweden)

    Hidasi Judit

    2016-12-01

    Full Text Available It is assumed that part of today’s societal difficulties, uncertainties and crisis worldwide can be attributed to the competing of multiple identities, to their intersections and their overlapping nature – on the level of nations, on the level of communities and also on the level of the individual. We aim at presenting a typology of identities that come into play in the public and in the private domain of the individual. It is hypothesized that there is a strong interdependence of cultural heritage, human values and social traditions in the competition of identities. These questions, which are interrelated and interconnected with each other through a common denominator, namely “cultural-mental programming” and “reprogramming efforts,” are going to be pondered about in the presentation. In the context of globalization the relevance of this topic is reinforced by the need to adapt to changes within the ever-intensifying shift from intercultural to multicultural environment in communities, in business and in work places. Attempts will be made to articulate some projections with respect to future trends that are to be expected: the way to go from competing identities to establishing a competitive identity (Simon Anholt. The contribution does not offer ready solutions but rather serves as fuel for further discussions.

  1. Hierarchy of modular graph identities

    Energy Technology Data Exchange (ETDEWEB)

    D’Hoker, Eric; Kaidi, Justin [Mani L. Bhaumik Institute for Theoretical Physics, Department of Physics and Astronomy,University of California,Los Angeles, CA 90095 (United States)

    2016-11-09

    The low energy expansion of Type II superstring amplitudes at genus one is organized in terms of modular graph functions associated with Feynman graphs of a conformal scalar field on the torus. In earlier work, surprising identities between two-loop graphs at all weights, and between higher-loop graphs of weights four and five were constructed. In the present paper, these results are generalized in two complementary directions. First, all identities at weight six and all dihedral identities at weight seven are obtained and proven. Whenever the Laurent polynomial at the cusp is available, the form of these identities confirms the pattern by which the vanishing of the Laurent polynomial governs the full modular identity. Second, the family of modular graph functions is extended to include all graphs with derivative couplings and worldsheet fermions. These extended families of modular graph functions are shown to obey a hierarchy of inhomogeneous Laplace eigenvalue equations. The eigenvalues are calculated analytically for the simplest infinite sub-families and obtained by Maple for successively more complicated sub-families. The spectrum is shown to consist solely of eigenvalues s(s−1) for positive integers s bounded by the weight, with multiplicities which exhibit rich representation-theoretic patterns.

  2. Identity, Diversity and Diversity Management

    DEFF Research Database (Denmark)

    Holck, Lotte; Muhr, Sara Louise; Villeseche, Florence

    2016-01-01

    – The work can encourage policy makers, diversity and HR managers to question their own practices and assumptions leading to more theoretical informed diversity management practices. Originality/value – The theoretical connections between identity and diversity literature have so far not been reviewed...... systematically. The work foregrounds how important it is for diversity scholars to consider identity underpinnings of diversity research to help further develop the field within and beyond the three streams the authors discuss.......The purpose of this paper is to examine the relationship between the identity and diversity literatures and discuss how a better understanding of the theoretical connections between the two informs both diversity research and diversity management practices. Design/methodology/approach – Literature...

  3. CORPORATE IDENTITY SEJARAH DAN APLIKASINYA

    Directory of Open Access Journals (Sweden)

    Christine Suharto Cenadi

    1999-01-01

    Full Text Available In the recent globalization era%2C and the developed market%2C many companies compete to attract consumers to buy their products. One of the keys to compete and survive in this developing market is by creating an image and graphic identity. This paper will discuss about corporate identity%2C image%2C its purpose and applications. Abstract in Bahasa Indonesia : Dalam era globalisasi dewasa ini%2C dan dengan berkembangnya pasar (market%2C banyak perusahaan bersaing untuk menarik perhatian konsumen untuk membeli produknya. Salah satu cara untuk bersaing dan dapat bertahan di dalam pasar yang terus berkembang ini adalah dengan menciptakan suatu image dan identitas graphic. Tulisan ini akan membahas tentang corporate identity%2C image%2C fungsi dan aplikasinya

  4. Identity Authentication over Noisy Channels

    Directory of Open Access Journals (Sweden)

    Fanfan Zheng

    2015-07-01

    Full Text Available Identity authentication is the process of verifying users’ validity. Unlike classical key-based authentications, which are built on noiseless channels, this paper introduces a general analysis and design framework for identity authentication over noisy channels. Specifically, the authentication scenarios of single time and multiple times are investigated. For each scenario, the lower bound on the opponent’s success probability is derived, and it is smaller than the classical identity authentication’s. In addition, it can remain the same, even if the secret key is reused. Remarkably, the Cartesian authentication code proves to be helpful for hiding the secret key to maximize the secrecy performance. Finally, we show a potential application of this authentication technique.

  5. Identity politics: implications for gender analysis policy and training.

    Science.gov (United States)

    Erturk, Y

    1997-01-01

    As attention has shifted from a concern for citizenship, equality, and welfare to ideas of empowerment, equity, and governance, the locus of competition over power has rested with "identity politics," a recognition of cultural diversity that claims the legitimate right to produce alternative definitions and symbols of identity in public space. The change in identity formation from universal/national to fractured/tribalizing has implications for gender relations in contexts where patriarchal power controls production and reproduction. Except for feminism, all discourses in the current competition over identity politics are patriarchal. A look at the forces of change that shifted the process of modernization to a process of globalization reveals that, while modernization tends to standardize, globalization embraces the contradictory forces of universalizing and diversifying trends. Issues of identity and inequality were not problematic until the modern and the traditional subsumed each other and, thus, revealed the inherent contradictions of modernization. The diversifying forces that jeopardize the transnationalization of identity into membership in a "human society" include 1) language differences among the working classes, 2) growing global inequalities, and 3) collective memories of antagonistic histories. An analysis of gender based on identity politics can be conducted on a macro-level to understand the reluctance of central governments to initiate certain interventions, competing needs, new contradictions, changing gender roles, and the importance of promoting a global social contract.

  6. Drawing Identity: Beginning Pre-Service Teachers' Professional Identities

    Science.gov (United States)

    Beltman, Susan; Glass, Christine; Dinham, Judith; Chalk, Beryl; Nguyen, Bich

    2015-01-01

    Developing a professional teacher identity can be complex as pre-service teachers engage with a process informed by their previous experiences of teachers and teaching, by learning in their pre-service course, by field placements, and by societal expectations. Using drawing as the method for gathering data, pre-service teachers in an Australian…

  7. Black German identities : validating the multidimensional inventory of black identity

    NARCIS (Netherlands)

    Wandert, T.; Ochsmann, R.; Brug, P.; Chybicka, A.; Lacassagne, M.F.; Verkuyten, M.J.A.M.

    2009-01-01

    This study examines the reliability and validity of a German version of the Multidimensional Inventory of Black Identity (MIBI) in a sample of 170 Black Germans. The internal consistencies of all subscales are at least moderate. The factorial structure of the MIBI, as assessed by principal component

  8. "Doing Identity" in the Botswana Classroom: Negotiating Gendered Institutional Identities

    Science.gov (United States)

    Humphreys, Sara

    2013-01-01

    Drawing on post-structural and post-colonial conceptions of gender, this paper explores multiple student masculinities and femininities in the classrooms of four junior secondary schools in Botswana. These gendered identities, it is argued, are negotiated within broader institutional constraints that have been socio-historically produced. Such…

  9. Bridging Identity Gaps : Supporting Identity Performance in Citizen Service Encounters

    DEFF Research Database (Denmark)

    Borchorst, Nikolaj Gandrup; McPhail, Brenda; Smith, Karen Louise

    2012-01-01

    . Lastly, we turn to a discussion of how the established identity gaps can be addressed through design. Information and communication technologies as well as face-to-face encounters have an important role to play in the building of an interface to government. Here, it is paramount to consider the context...

  10. Identity in Flux: Negotiating Identity While Studying Abroad

    Science.gov (United States)

    Young, Jennifer T.; Natrajan-Tyagi, Rajeswari; Platt, Jason J.

    2015-01-01

    Study abroad is one aspect of global movement that connects individuals of diverse backgrounds. Individuals studying abroad are proffered to negotiate self-identity when they confront novelty and new contexts. This study chose to use the qualitative method of phenomenological interviews to examine how individuals experience themselves and others…

  11. Integrating Identities: Ethnic and Academic Identities among Diverse College Students

    Science.gov (United States)

    Walker, Lovey H. M.; Syed, Moin

    2013-01-01

    Background/Context: Students of Color continue to be underrepresented at the undergraduate level. Recent research has demonstrated the importance of non-academic psychosocial factors for understanding college experiences. One factor, identity, is a broad, multidimensional construct that comprises numerous distinct domains, including political,…

  12. Blended Identities: Identity Work, Equity and Marginalization in Blended Learning

    Science.gov (United States)

    Heikoop, Will

    2013-01-01

    This article is a theoretical study of the self-presentation strategies employed by higher education students online; it examines student identity work via profile information and avatars in a blended learning environment delivered through social networking sites and virtual worlds. It argues that students are faced with difficult choices when…

  13. Saving Face and Group Identity

    DEFF Research Database (Denmark)

    Eriksson, Tor; Mao, Lei; Villeval, Marie-Claire

    2015-01-01

    their self- but also other group members' image. This behavior is frequent even in the absence of group identity. When group identity is more salient, individuals help regardless of whether the least performer is an in-group or an out-group. This suggests that saving others' face is a strong social norm.......Are people willing to sacrifice resources to save one's and others' face? In a laboratory experiment, we study whether individuals forego resources to avoid the public exposure of the least performer in their group. We show that a majority of individuals are willing to pay to preserve not only...

  14. Context-Aware Identity Delegation

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.

    2009-01-01

    In emerging ubiquitous computing, related nomadic users often perform similar tasks and share the same computing infrastructure.This means that security of the shared resources is of prime importance.Frequent delegation of tasks among users must be anticipated as most nomadic environments...... due to its complicated and complex structure. Identity delegation at authentication level provides improved usability, which reduces the risk of circumventing the delegation mechanism; at the same time, however, identity delegation violates the principle of least privileges. We use contextual...

  15. RFID identity theft and countermeasures

    Science.gov (United States)

    Herrigel, Alexander; Zhao, Jian

    2006-02-01

    This paper reviews the ICAO security architecture for biometric passports. An attack enabling RFID identity theft for a later misuse is presented. Specific countermeasures against this attack are described. Furthermore, it is shown that robust high capacity digital watermarking for the embedding and retrieving of binary digital signature data can be applied as an effective mean against RFID identity theft. This approach requires only minimal modifications of the passport manufacturing process and is an enhancement of already proposed solutions. The approach may also be applied in combination with a RFID as a backup solution (damaged RFID chip) to verify with asymmetric cryptographic techniques the authenticity and the integrity of the passport data.

  16. Constructing leadership identities through stories

    DEFF Research Database (Denmark)

    Frimann, Søren; Hersted, Lone

    2016-01-01

    This article analyzes the construction of leadership identities through stories found in four narrative interviews from a qualitative study and leadership development project based on social constructionism and action learning. We argue that leadership development and the construction of leadership...... narrative interviews about their challenges as leaders? In addition, how do these discursive constructions restrict or enable new perspectives, other voices, and the possibilities for learning and change? Our analysis identified traces of both modern and postmodern leadership discourses. We suggest...... that the concept of coauthoring is useful in developing leadership and leadership identities through reflexive dialogs and emerging stories....

  17. Politicized Collective Identity: A Social Psychological Analysis.

    Science.gov (United States)

    Simon, Bernd; Klandermans, Bert

    2001-01-01

    Develops a social psychological model of politicized collective identity that revolves around three conceptual themes (collective identity, the struggle for power, and the wider societal context of that power struggle). Discusses how collective identity has been politicized, showing that politicized collective identity has important consequences…

  18. An Existentialist Account of Identity Formation.

    Science.gov (United States)

    Bilsker, Dan

    1992-01-01

    Gives account of Marcia's identity formation model in language of existentialist philosophy. Examines parallels between ego-identity and existentialist approaches. Describes identity in terms of existentialist concepts of Heidegger and Sartre. Argues that existentialist account of identity formation has benefits of clarification of difficult…

  19. Teacher Identity Work in Mathematics Teacher Education

    Science.gov (United States)

    Neumayer-Depiper, Jill

    2013-01-01

    Becoming a teacher is not developing an identity, but is developing identity as a continuous process of constructing and deconstructing understandings within the complexities of social practice, beliefs, experiences, and social norms. I take up this stance on identity as articulated in Judith Butler's (1999) work with gender identity and…

  20. Teacher Educators' Identity: A Review of Literature

    Science.gov (United States)

    Izadinia, Mahsa

    2014-01-01

    Research suggests that the development of a teacher educator identity is a central process in becoming a teacher educator. Recently, there has been an increasing interest in the concept of teacher identity. However, teacher educator identity seems to be still under-researched. In this article, a review of literature on teacher educator identity is…

  1. A Dialogical Approach to Conceptualizing Teacher Identity

    Science.gov (United States)

    Akkerman, Sanne F.; Meijer, Paulien C.

    2011-01-01

    In recent attempts to address the notion of teacher identity, scholars have stressed how identity is dynamically evolving, intrinsically related to others, and consists of multiple identities. Though these postmodern characterizations represent radically new perceptions of identity, they are not extensively discussed in relation to previous…

  2. Identity and Diversity in Today's World

    Science.gov (United States)

    Gee, James Paul

    2017-01-01

    This paper develops a thesis about identity and diversity. I first look at activity-based identities, identities like being a gardener, birder, citizen scientist or fan-fiction writer. These are freely chosen identities and they are proliferating at a great rate today thanks to participatory culture, the Maker Movement and digital and social…

  3. Teacher Identity Work in Mathematics Teacher Education

    Science.gov (United States)

    Neumayer-Depiper, Jill

    2013-01-01

    Becoming a teacher is not developing an identity, but is developing identity as a continuous process of constructing and deconstructing understandings within the complexities of social practice, beliefs, experiences, and social norms. I take up this stance on identity as articulated in Judith Butler's (1999) work with gender identity and…

  4. A note on the Jacobi identity

    CERN Document Server

    Lavrov, P M; Tyutin, I V

    2013-01-01

    We present new basic identity for any associative algebra in terms of single commutator and anticommutators. From this identity we derive the set of four identities in terms of double commutators and anticommutators. Two of these four identities are independent. Equipping a given algebra with the basic identity we can prove that the multiplication in this algebra satisfies the associative condition. Extension of obtained results to supercase is found. A new identity for non-degenerate even symplectic (super)manifolds is proposed. Generalization of basic identity for the case of arbitrary number of elements is given.

  5. Struggling with cancer and treatment: young athletes recapture body control and identity through exercise: qualitative findings from a supervised group exercise program in cancer patients of mixed gender undergoing chemotherapy

    DEFF Research Database (Denmark)

    Adamsen, L.; Andersen, C.; Midtgaard, J.

    2009-01-01

    Cancer and treatment can negatively affect the body's performance and appearance. Exercise has been tested in a few studies for altered body image among middle-aged women with breast cancer. The aim of the study was to explore how young pre-cancer athletes of both genders experience disease......- and treatment-related physical fitness and appearance changes while undergoing chemotherapy and participating in a 6-week group exercise intervention. A prospective, explorative study using semi-structured interviews was conducted before and at termination of the intervention. The study included 22 cancer...... patients (median age 28 years). The young athletes experienced a change from a high level of physical activity, body satisfaction and a positive self-identity to a low level of physical activity, body denial and a negative self-identity. In the program, the patients experienced increased physical strength...

  6. Group identity and leading-by-example

    OpenAIRE

    Drouvelis, Michalis; Nosenzo, Daniele

    2012-01-01

    We study the interplay between leading-by-example and group identity in a public goods game experiment. A common identity between the leader and her followers is beneficial for cooperation: average contributions are more than 30% higher than in a treatment where no identity was induced. In two further treatments we study the effects of heterogeneous identities. We find no effect on cooperation when only part of the followers share the leader’s identity, or when followers share a common identi...

  7. Identity, Culture and Cosmopolitan Futures

    Science.gov (United States)

    Rizvi, Fazal

    2005-01-01

    This paper examines the policy notion of multiculturalism, and suggests that it is no longer adequate for understanding contemporary forms of interculturality that span across the globe, and are deeply affected by the processes of cultural globalization. Cultural identities can no longer be assumed as static and nation-bound, and are created…

  8. [Identity and narration: autobiographical quests].

    Science.gov (United States)

    Arfuch, Leonor

    2013-01-01

    This paper aims to tackle the subtle relation between autobiographical narratives and identity construction, from a non essentialist conception of identity. In a perspective that articulates philosophy of language, psychoanalysis, semiotics and literary critique, we posit the concept of biographical space as an analytical instrument to make a critical update of the reconfiguration of identities and subjectivities in contemporary culture, marked by the predominance of the biographical, the private and a kind of "public intimacy". This look is more symptomatic than descriptive: it intends to account for the rise of auto/biographical narratives and life-stories, from canonic genres to their multiple derivations in the media, social networks and the most diverse artistic practices, a phenomenon that seems to reaffirm the notion of narrative identities by Ricoeur. Our analysis here, from an ethic, aesthetic and political point of view, will focus on two visual arts experiences that have recently taken place for the first time in Buenos Aires: Christian Boltanski's and Tracey Emin's, solo exhibitions, each of them with a different biographical approach.

  9. Towards a Digital Learner Identity

    NARCIS (Netherlands)

    Berlanga, Adriana; Sloep, Peter

    2011-01-01

    Berlanga, A. J., & Sloep, P. B. (2011). Towards a Digital Learner Identity. In F. Abel, V. Dimitrova, E. Herder, & G. J. Houben (Eds.), Augmenting User Models with Real World Experiences Workshop (AUM). In conjunction with UMAP 2011. July, 15, 2011, Girona, Spain.

  10. Socialization and Ethnic Identity Development.

    Science.gov (United States)

    Weinreich, Peter

    A study of identity development was carried out in Bristol, England, with Asian, West Indian, and indigenous British adolescents. Ethnic and gender differences in patterns of identification conflict with others were found between minority group boys and girls. Both sexes from both minority groups, however, had substantial identification conflicts…

  11. Affirming Identity in Multilingual Classrooms

    Science.gov (United States)

    Cummins, Jim; Bismilla, Vicki; Chow, Patricia; Giampapa, Frances; Cohen, Sarah; Leoni, Lisa; Sandhu, Perminder; Sastri, Padma

    2005-01-01

    The authors argue that in classrooms with students from linguistically diverse backgrounds, instruction should explicitly activate prior knowledge. Teachers have the opportunity to create environments that affirm the identities of English language learners, thereby increasing the confidence with which these students engage in language and literacy…

  12. identical stations and random failures

    Directory of Open Access Journals (Sweden)

    Dennis E. Blumenfeld

    2005-01-01

    line with identical workstations and buffers of equal size. It is a closed-form expression that shows the mathematical relationships between the system parameters, and that can be used to gain basic insight into system behavior at the initial design stage.

  13. Feminist Identity among Latina Adolescents

    Science.gov (United States)

    Manago, Adriana M.; Brown, Christia Spears; Leaper, Campbell

    2009-01-01

    This study explores developing conceptions of feminism among Latina adolescents, their prevalence of feminist endorsement, and whether home environment and well-being are related to feminist identity. One hundred and forty Latina girls (Grades 9 to 12, M age = 15) wrote personal narratives of their understanding of feminism and whether they…

  14. Feminist Identity among Latina Adolescents

    Science.gov (United States)

    Manago, Adriana M.; Brown, Christia Spears; Leaper, Campbell

    2009-01-01

    This study explores developing conceptions of feminism among Latina adolescents, their prevalence of feminist endorsement, and whether home environment and well-being are related to feminist identity. One hundred and forty Latina girls (Grades 9 to 12, M age = 15) wrote personal narratives of their understanding of feminism and whether they…

  15. Trig Integrals without Trig Identities

    Science.gov (United States)

    Sprows, David J.

    2008-01-01

    The standard approach to finding antiderivatives of trigonometric expressions such as sin(ax) cos(bx) is to make use of certain trigonometric identities. The disadvantage of this technique is that it gives no insight into the problem, but relies on students using a memorized formula. This note considers a technique for finding antiderivatives of…

  16. The ambiguous identity of auditing

    DEFF Research Database (Denmark)

    Lindeberg, Tobias

    2007-01-01

    This paper analyses the identity of auditing by comparing performance auditing to financial auditing and programme evaluation. Based on an analysis of textbooks, it is concluded that these evaluative practices are situated on a continuum. This implies that studies that rely on ‘audit’ as a label...

  17. The Roots of Our Identity.

    Science.gov (United States)

    Cotti, Flavio

    1993-01-01

    Maintains that Switzerland's national spirit lies in cultural and linguistic diversity. Proposes a "Ten Commandments of Multilingualism" for Swiss citizens who share this core principle of national identity. Concludes that Swiss should be happy and proud to have a nation based on cultural diversity. (CFR)

  18. Cultivating archives: meanings and identities

    NARCIS (Netherlands)

    E. Ketelaar

    2012-01-01

    By cultivating archives through successive activations, people and communities define their identities. In these activations, the meanings of archives are constructed and reconstructed. Archives are not a static artifact imbued with the record creator’s voice alone, but a dynamic process involving a

  19. Digital identity in ambient environments

    NARCIS (Netherlands)

    B.A.M. Ben Schouten; Onkar Ambekar

    2006-01-01

    Embedded systems and ambient technology enable users to interact at any time and anywhere. In the BASIS project for identity management, CWI investigates transparent biometrics in home environments. Possible application areas are user profiling for shopping , listening to one's favourite music and o

  20. Cultural heritage and identity politics

    NARCIS (Netherlands)

    During, R.

    2011-01-01

    ‘As the authors in this fascinating volume point out, both heritage and identity discourse can be instrumentalized, by proponents and opponents of European integration, as they can be commodified, in branding efforts with various implementations. Just as in Macchiavelli’s Europe, political and econo

  1. The Ambiguous Identity of Auditing

    DEFF Research Database (Denmark)

    Lindeberg, Tobias Høygaard

    2007-01-01

    This paper analyses the identity of auditing by comparing performance auditing to financial auditing and programme evaluation. Based on an analysis of textbooks, it is concluded that these evaluative practices are situated on a continuum. This implies that studies that rely on ‘audit’ as a label...

  2. Understanding, Personal Identity and Education

    Science.gov (United States)

    Godon, Rafal

    2004-01-01

    Analysing the triad understanding-personal identity-education in three different contexts (scientism, historicism, hermeneutics) make it possible to investigate the kind of thinking that is emphasised most in each context. The implications of thinking to educational practice are stressed at each level of interpretation. The chief shortfalls in the…

  3. Understanding, Personal Identity and Education

    Science.gov (United States)

    Godon, Rafal

    2004-01-01

    Analysing the triad understanding-personal identity-education in three different contexts (scientism, historicism, hermeneutics) make it possible to investigate the kind of thinking that is emphasised most in each context. The implications of thinking to educational practice are stressed at each level of interpretation. The chief shortfalls in the…

  4. 6 Keys to Identity Management

    Science.gov (United States)

    Shoham, Idan

    2011-01-01

    An Identity and Access Management (IAM) project on campus can feel like a Sisyphean task: Just when access rights have finally been sorted out, the semester ends--and users change roles, leave campus, or require new processes. IT departments face a constantly changing technical landscape: (1) integrating new applications and retiring old ones; (2)…

  5. Cultural heritage and identity politics

    NARCIS (Netherlands)

    During, R.

    2011-01-01

    ‘As the authors in this fascinating volume point out, both heritage and identity discourse can be instrumentalized, by proponents and opponents of European integration, as they can be commodified, in branding efforts with various implementations. Just as in Macchiavelli’s Europe, political and

  6. Developing Students' Professional Digital Identity

    Science.gov (United States)

    Cochrane, Thomas; Antonczak, Laurent

    2015-01-01

    In contrast to the myth of the "Digital Native" and the ubiquity of Facebook use, we have found that students' digital identities are predominantly social with their online activity beyond Facebook limited to being social media consumers rather than producers. Within a global economy students need to learn new digital literacy skills to…

  7. Brand: Identity, Image, and Relationships

    Science.gov (United States)

    Danker, Stephanie Harvey

    2014-01-01

    Adolescents face complex dilemmas such as challenging issues of identity and self-concept, and struggles with building and maintaining relationships. These issues must be embraced in the art classroom. This Instructional Resource will focus on the concept of brand--connecting visual art, marketing, and psychology--and center on ideas found in the…

  8. Counselor Identity: Conformity or Distinction?

    Science.gov (United States)

    McLaughlin, Jerry E.; Boettcher, Kathryn

    2009-01-01

    The authors explore 3 debates in other disciplines similar to counseling's identity debate in order to learn about common themes and outcomes. Conformity, distinction, and cohesion emerged as common themes. They conclude that counselors should retain their distinctive, humanistic approach rather than conforming to the dominant, medical approach.

  9. Identity Management in University System

    OpenAIRE

    Emanuil REDNIC; Manole VELICANU

    2008-01-01

    The Identity Management became to be a real and important problem for distributed environments. First off all the access to distributed resources, the distributed communication, virtual workspaces, virtual repositories influence in developing this field of security. How this all started? How this can be implemented? How this can be maintained in a distributed environment?

  10. Counselor Identity: Conformity or Distinction?

    Science.gov (United States)

    McLaughlin, Jerry E.; Boettcher, Kathryn

    2009-01-01

    The authors explore 3 debates in other disciplines similar to counseling's identity debate in order to learn about common themes and outcomes. Conformity, distinction, and cohesion emerged as common themes. They conclude that counselors should retain their distinctive, humanistic approach rather than conforming to the dominant, medical approach.

  11. Rethinking Materiality, Memory and Identity

    Directory of Open Access Journals (Sweden)

    Tracy Ireland

    2016-12-01

    Full Text Available This introductory article  considers and questions exactly how materials and people constitute social worlds and relationships which sustain identity and memory and, in turn, the social and political structures or norms that these attachments invest in, stabilise and maintain.

  12. Brand: Identity, Image, and Relationships

    Science.gov (United States)

    Danker, Stephanie Harvey

    2014-01-01

    Adolescents face complex dilemmas such as challenging issues of identity and self-concept, and struggles with building and maintaining relationships. These issues must be embraced in the art classroom. This Instructional Resource will focus on the concept of brand--connecting visual art, marketing, and psychology--and center on ideas found in the…

  13. Virtual Identity and Digital Reading

    OpenAIRE

    Carlos Rodríguez Gordo

    2014-01-01

    This article firstly addresses a terminological clarification of the concepts of "digital identity", "digital reputation" and "digital fingerprint". On the second hand, it tries to think about the overall online activity of the digital subject, understood through the concept of “prosumer”, to lastly focus more specifically in the practical consequences of the progressive digitalization of reading.

  14. Digital identity in ambient environments

    NARCIS (Netherlands)

    Schouten, Ben; Ambekar, Onkar

    2006-01-01

    Embedded systems and ambient technology enable users to interact at any time and anywhere. In the BASIS project for identity management, CWI investigates transparent biometrics in home environments. Possible application areas are user profiling for shopping , listening to one's favourite music and o

  15. An 'open source' networked identity

    DEFF Research Database (Denmark)

    Larsen, Malene Charlotte

    2013-01-01

    This paper examines the concept of identity in relation to youth practices on social network sites (SNS). The paper illustrates how writing “I love you” or other emotional statements on each other’s profiles on SNS is not only a common way for Danish teenagers to communicate and practice friendship...

  16. Extracting entanglement from identical particles.

    Science.gov (United States)

    Killoran, N; Cramer, M; Plenio, M B

    2014-04-18

    Identical particles and entanglement are both fundamental components of quantum mechanics. However, when identical particles are condensed in a single spatial mode, the standard notions of entanglement, based on clearly identifiable subsystems, break down. This has led many to conclude that such systems have limited value for quantum information tasks, compared to distinguishable particle systems. To the contrary, we show that any entanglement formally appearing amongst the identical particles, including entanglement due purely to symmetrization, can be extracted into an entangled state of independent modes, which can then be applied to any task. In fact, the entanglement of the mode system is in one-to-one correspondence with the entanglement between the inaccessible identical particles. This settles the long-standing debate about the resource capabilities of such states, in particular spin-squeezed states of Bose-Einstein condensates, while also revealing a new perspective on how and when entanglement is generated in passive optical networks. Our results thus reveal new fundamental connections between entanglement, squeezing, and indistinguishability.

  17. Cultural Identity in Korean English

    Science.gov (United States)

    Chang, Bok-Myung

    2010-01-01

    This study aims to investigate the cultural identity of Korean English and to make the intercultural communications among non-native speakers successful. The purposes of this study can be summarized as follows: 1) to recognize the concept of English as an International Language (EIL), 2) to emphasize cross-cultural understanding in the globalized…

  18. Identity Management in Agent Systems

    NARCIS (Netherlands)

    Brazier, F.M.T.; Groot, de D.R.A.

    2006-01-01

    If agent-based applications are to be used in large scale, open environments, security is a main issue; digital identity management (DIDM) an essential element. DIDM is needed to be able to determine the rights and obligations of the four main

  19. Identity Over Time: Objectively, Subjectively

    NARCIS (Netherlands)

    van Fraassen, B.C.; Peschard, I.F.

    2008-01-01

    In the philosophy of science, identity over time emerges as a central concern both as an ontological category in the interpretation of physical theories, and as an epistemological problem concerning the conditions of possibility of knowledge. In Reichenbach and subsequent writers on the problem of

  20. Digital photography: communication, identity, memory

    NARCIS (Netherlands)

    van Dijck, J.

    2008-01-01

    Taking photographs seems no longer primarily an act of memory intended to safeguard a family's pictorial heritage, but is increasingly becoming a tool for an individual's identity formation and communication. Digital cameras, cameraphones, photoblogs and other multipurpose devices are used to

  1. Identities for the Fibonacci Powers

    Science.gov (United States)

    Chen, Alex; Chen, Hongwei

    2008-01-01

    Based on the generating functions, for any positive integers "n" and "k", identities are established and the explicit formula for a[subscript i](k) in terms of Fibonomial coefficients are presented. The corresponding results are extended to some other famous sequences including Lucas and Pell sequences.

  2. Unhealthy Paradoxes of Healthy Identities

    OpenAIRE

    Magala, Slawomir

    2003-01-01

    textabstractComparative cross-cultural studies and identity research in social psychology focused on national and organizational differences, clashes and dimensions (Hofstede, Barsoux & Schneider, Jackson, Ward, Bochner & Furnham, Capoza & Brown). Mapping cultural software of individuals and dynamics of small groups was supposed to provide additional managerial knowledge and skills indispensable for global expansion of stable organizational bureaucracies. However, social constructivists and c...

  3. Physical attractiveness of boys with gender identity disorder.

    Science.gov (United States)

    Zucker, K J; Wild, J; Bradley, S J; Lowry, C B

    1993-02-01

    University students blind to group status rated boys with gender identity disorder and clinical control boys regarding their physical attractiveness. Ratings were made of the face and upper torso from photographs taken at the time of clinical assessment (mean age, 8.1 years). On all five adjectives (attractive, beautiful, cute, handsome, and pretty), boys with gender identity disorder were judged to be more attractive than were the clinical control boys. Attractiveness correlated with extent of behavioral femininity in the clinical control group, but not in the group of boys with gender identity disorder. The extent to which the group differences in attractiveness were due to objective, structural differences in facial attractiveness vs. socially created, or subjective, processes is discussed.

  4. Identity Management Framework for Internet of Things

    DEFF Research Database (Denmark)

    Mahalle, Parikshit N.

    . This broader scope of interactions enhances the need to extend current Identity Management (IdM) models to include how users interact with devices as well as devices interact with other devices. Users interact with their devices and consume services in IoT through verified identity. In IoT, this concept...... that are public can be part of the personal space of multiple users at the same time. Secure interaction in and with IoT, secure data management and exchange, authentication, distributed access control and IdM of the devices are the main challenges. The work carried out in the scope of this thesis addresses...... important areas of IdM by identifying unsolved problems and proposing novel techniques to solve these problems. The goal is to propose methods for efficient and effective IdM in order to achieve authentication, access control and trust management of the things or devices in IoT. The goal is also to propose...

  5. Learning process for creating community identity

    Directory of Open Access Journals (Sweden)

    Ratanakosol Kulthida

    2016-01-01

    Full Text Available Creating community identity needs a learning process to assist community to identify, recognize, build acceptance and cultivate awareness in identity. The purpose of this study was to develop the draft of a learning process to create community identity. The study employed a qualitative research method through literature review. The result shows that the community learning process must empower all parties concerned and empowerment should be based on the social capital of the community. A draft of the learning process involved in the creation of community identity includes four main steps: i plan consists of target community selection, community identity vision creation and operational planning for creation of community identity, ii action consists of community survey, social capital analysis, community identity identification, creating and operating activities to supplement community identity, and setting development goals and actions based on community identity, iii practical observation, iv reflection consists of evaluation and reflection, and public presentation.

  6. Fragile Identities: Exploring Learner Identity, Learner Autonomy and Motivation through Young Learners’ Voices

    Directory of Open Access Journals (Sweden)

    Terry Eric Lamb

    2011-12-01

    Full Text Available Abstract Recent research in the fields of motivation and learner autonomy in language learning has begun to explore their relationships to the construct of identity. This article builds on this through the voices of a group of six learners of French or German in a secondary school in England, over a two-year period. These young learners initially reveal a clear identity as learners responsible for and able to take control of their own learning. However, this identity is seen as fragile when teacher control is increased in response to the external pressure of examinations, and there are indications of loss of motivation. Secondary school teachers, therefore, need to ensure that the learning environment they create engages, nurtures, and protects their learners’ identity as learners through sustained opportunities for autonomy. Further research is proposed into aspects of learner identity, as well as ways in which changing pedagogy involves changes in teacher identity. Résumé Des études récentes dans les domaines de la motivation et de l’autonomie de l’apprenant des langues explorent les relations entre ces deux domaines et l’identité de l’apprenant. Cet article contribue à ces recherches, en examinant pendant une période de deux ans la voix d'un groupe de six jeunes qui apprennent le français ou l’allemand dans une école secondaire en Angleterre. Ces jeunes apprenants révèlent au début une identité claire en tant qu’apprenants responsables pour et capables de contrôler leur propre apprentissage. Cependant on voit que cette identité est fragile quand le contrôle de l’enseignant est augmenté face à la pression externe des examens, menant potentiellement a une perte de motivation. Les professeurs du secondaire devraient donc créer un milieu d'apprentissage capable d’engager, de développer et de protéger l’identité des apprenants en tant qu'apprenants, en assurant qu’ils peuvent continuer à jouir des

  7. The frontiers of identity, and the identity of frontiers

    Directory of Open Access Journals (Sweden)

    Wojciech Burszta

    2016-01-01

    Full Text Available The frontiers of identity, and the identity of frontiers The essay discusses the relationship between group identities (especially national and the notion of territory and its symbolic significance in the creation of the idea of community. The author examines possible contexts that connect the frontiers of identity with the identities of national state borders, as well as ways in which these connections become symbolic, using the example of the recent plane crash tragedy in Smoleńsk. In the final part of the essay the author refers to Leszek Kołakowski’s notion of myth in order to justify the thesis that each nation (also in the first decades of the 21th century is always a mythical community that is being constantly reactivated through current political and ideological actions.   Granice tożsamości i tożsamość granic Artykuł omawia kwestie związków tożsamości zbiorowych, zwłaszcza narodowych, z pojęciem własnego terytorium i jego symbolicznego znaczenia dla budowania dla wyobrażeń wspólnotowych. Na przykładzie tragedii katastrofy samolotu pod Smoleńskiem autor artykułu pokazuje możliwe konteksty, w jakich tytułowe granice tożsamości wiążą się z tożsamością granic narodowego terytorium oraz w jaki sposób zaznacza się symbolicznie ten nierozerwalny związek. W końcowej partii artykułu autor odwołuje się do koncepcji mitu Leszka Kołakowskiego, aby uzasadnić tezę, że każdy naród, także w pierwszych dekadach XXI wieku, jest zawsze wspólnotą mityczną, która nieustannie się reaktywuje również w kontekście działań politycznych i ideologicznych.

  8. Psychobiological characteristics of dissociative identity disorder : A symptom provocation study

    NARCIS (Netherlands)

    Reinders, A. A. T. Simone; Nijenhuis, Ellert R. S.; Quak, Jacqueline; Korf, Jakob; Haaksma, Jaap; Paans, Anne M. J.; Willemsen, Antoon T. M.; den Boer, Johan A.

    2006-01-01

    Background: Dissociative identity disorder (DID) patients function as two or more identities or dissociative identity states (DIS), categorized as 'neutral identity states' (NIS) and 'traumatic identity states' (TIS). NIS inhibit access to traumatic memories thereby enabling daily life functioning.

  9. Psychobiological characteristics of dissociative identity disorder : A symptom provocation study

    NARCIS (Netherlands)

    Reinders, A. A. T. Simone; Nijenhuis, Ellert R. S.; Quak, Jacqueline; Korf, Jakob; Haaksma, Jaap; Paans, Anne M. J.; Willemsen, Antoon T. M.; den Boer, Johan A.

    2006-01-01

    Background: Dissociative identity disorder (DID) patients function as two or more identities or dissociative identity states (DIS), categorized as 'neutral identity states' (NIS) and 'traumatic identity states' (TIS). NIS inhibit access to traumatic memories thereby enabling daily life functioning.

  10. How Multiple Social Identities Are Related to Creativity.

    Science.gov (United States)

    Steffens, Niklas K; Gocłowska, Małgorzata A; Cruwys, Tegan; Galinsky, Adam D

    2016-02-01

    The present research examined whether possessing multiple social identities (i.e., groups relevant to one's sense of self) is associated with creativity. In Study 1, the more identities individuals reported having, the more names they generated for a new commercial product (i.e., greater idea fluency). In Study 2, multiple identities were associated with greater fluency and originality (mediated by cognitive flexibility, but not by persistence). Study 3 validated these findings using a highly powered sample. We again found that multiple identities increase fluency and originality, and that flexibility (but not persistence) mediated the effect on originality. Study 3 also ruled out several alternative explanations (self-affirmation, novelty seeking, and generalized persistence). Across all studies, the findings were robust to controlling for personality, and there was no evidence of a curvilinear relationship between multiple identities and creativity. These results suggest that possessing multiple social identities is associated with enhanced creativity via cognitive flexibility. © 2015 by the Society for Personality and Social Psychology, Inc.

  11. Facilitating Conversations about Managerial Identities

    DEFF Research Database (Denmark)

    Madsen, Mona Toft

    for identity work was introduced. The empirical starting point was progressive performativity and constructionistic process consultation with the intention to engage with a practical context, a company. The empirical study was based on a) individual interviews with three middle managers in a project......-based organization in the engineering consulting sector b) a reflection meeting, where the same three managers were gathered, and conversations were facilitated based on identity work in the context of earlier interviews. More specifically, three themes were discussed; flat organizational structure, tensions between...... project work and professional development, and the role of Department Heads. Theoretically, the study contributes to discussions on the need for legitimizing different mixtures of bureaucratic and post bureaucratic ideals. Methodological reflections are made in the discussion as well....

  12. Fannish tattooing and sacred identity

    Directory of Open Access Journals (Sweden)

    Bethan Jones

    2015-03-01

    Full Text Available Pleasure is an important motivation for fans to adopt texts. Fannish tattoos function to demonstrate affective investments in a text; they are also a performance of fandom and an example of sacred fan identity. Like engaging in cosplay or wearing clothing that features logos, fannish tattoos mark people as fans of a text. Furthermore, the more obscure the logo or fannish reference, the more performative the tattoo. Fannish tattoos help to construct a sacred fan identity. The sacred experience (as theorized by Émile Durkheim and his concept of the totem is imbued with meaning through choices that set it aside from the mundane. Within the context of fannish tattoos, fan affect gains similar significance.

  13. Upward social mobility and identity.

    Science.gov (United States)

    Destin, Mesmin; Debrosse, Régine

    2017-08-09

    As psychological research on socioeconomic status (SES) continues to expand, greater attention should be devoted to the influence of social mobility and the dynamic and malleable aspects of SES on people's lives. Status-based identity describes how people's socioeconomic circumstances relate to their broader sense of self and the meaning that they make of their own SES. Such an approach allows for complex study of the challenges and consequences of a change in SES. Research related to status-based identity suggests that although social mobility is often considered a signifier of reduced inequality, upward social mobility may also exacerbate other forms of inequality by instigating a destabilizing sense of status uncertainty that impairs motivation and well-being for class migrants. Copyright © 2017 Elsevier Ltd. All rights reserved.

  14. Eriksonian Identity Theory in Counterterrorism

    Directory of Open Access Journals (Sweden)

    Cally O'Brien

    2010-01-01

    Full Text Available Certain terrorists come from unexpected backgrounds. They give up comfortable lives and opportunities in order to wage jihad. Their existence has puzzled various theorists since they came to light. This article will explain how a theory of psychosocial identity formation created by Erik Erikson and his student James Marcia may explain this phenomenon. It will also explain how Erikson's theoretical legacy has contributed to current attempts at increasing moderation in the Middle East through education. Many of those attempts reflect ideas that are drawn from Eriksonian theory, although they are not typically described in Eriksonian terms. Meanwhile, while some theorists have considered the applications of various aspects of Eriksonian theory, especially negative identity, to terrorism few have focused on radical Islam or evaluated specific biographies against Marcia's additions to the framework.

  15. [Delayed identity development, family relationships and psychopathology: Links between healthy and clinically disturbed youth].

    Science.gov (United States)

    Seiffge-Krenke, Inge; Escher, Fabian J

    2017-05-19

    This study compared three groups of various age and health status (total N = 732) with respect to their identity status, stress level, and parental behavior. As expected, patients were characterized by delayed identity development, particularly ruminative exploration. Further, patients experienced high identity stress and described high levels of anxious paternal rearing and intrusive maternal psychological control. The patients‘ levels of both internalizing and externalizing symptomatology were high, and the impact of externalizing symptoms on identity arrest was strong. Identity status was delayed, albeit age adequate in both groups of healthy youths, with comparably high levels of anxious parental monitoring. Compared to adolescents, young adults were particularly active in their identity development, showing a high level of identity stress but no increase in psychopathology.

  16. Building Place Identity through Heritage

    Directory of Open Access Journals (Sweden)

    Alexandra PACESCU

    2015-12-01

    Full Text Available In an increasingly globalized world, the fading specificity is producing homogeneous images that make cities more and more difficult to tell apart. The market economy tends to commodify each and every aspect of urban life, even those belonging to the cultural realm. As a consequence, a need for differentiators arises, which can be best embodied by the local heritage. The present paper is trying to establish a link between the concept of Place Identity, seen from a marketing point of view, and Heritage, as a key factor to build or emphasize a ‘point of difference’ for ‘a unique selling proposition’. Although ‘brands’ are commonly associated with globalization and its supposed tendency to erase defining characteristics, their marketing principles could prove to be the very solution to regaining the lost specificity, since they help embed local heritage, already an asset, into the ‘mix’ that determines ‘place identity’. Building and promoting an identity is also the endeavor of branding, hence the overlapping of these two concepts. It is therefore useful to examine the evolution of brands from simple marks of identity to entities which develop complex relations with the users. The need for a ‘a unique selling proposition’ that brands have already acknowledged should be considered when building the place identity so much needed by cities in their fierceful competition for attracting activities. Branding through heritage could prove to be a safe bet to reinforce the particular in the globalised market, if correctly managed and planned. Promoting the city and salvaging one of its key differentiators at the same time is, for sure, a win-win situation.

  17. Foreign language didactics: Identity questions

    OpenAIRE

    Michaela Píšová

    2011-01-01

    The efforts to emancipate foreign language didactics have been an ongoingand non-linear process launched in our country in the 50s of the previous century.Its key aspects may be presented as foreign language didactics identity questions.These include explicit delineation of the object and methodology of foreign languagedidactics on the basis of developmental analysis, current state of knowledge andtrends/approaches to the discipline. The issues related to the full-fledged scientificstatus of ...

  18. Literary Translation and Identity Politics

    DEFF Research Database (Denmark)

    Sabih, Joshua

    2016-01-01

    particular group of Moroccan Jewish authors in Isreal that either continue writing in French or shifted completely into writing in Hebrew. Due to the increasing influence of this Moroccan-Israeli writers in the cultural and literary Israeli landscape, the issue of the Moroccan Jewish identity has in recent...... years contributed to a change with regard to the perception of Arabic literary works, their selection for translation, readers’ expectations....

  19. Digital photography: communication, identity, memory

    OpenAIRE

    Dijck, van, JAB

    2008-01-01

    Taking photographs seems no longer primarily an act of memory intended to safeguard a family's pictorial heritage, but is increasingly becoming a tool for an individual's identity formation and communication. Digital cameras, cameraphones, photoblogs and other multipurpose devices are used to promote the use of images as the preferred idiom of a new generation of users. The aim of this article is to explore how technical changes (digitization) combined with growing insights in cognitive scien...

  20. Human Rights and Cultural Identity

    National Research Council Canada - National Science Library

    Gordon John-Stewart

    2015-01-01

    ...-deficient cultural identities. In other words, it is possible to depict human rights in a culturally sensitive way so that universal human rights can meet the demands of a moderate version of meta-ethical relativism which acknowledges a small universal core of objectively true or false moral statements and avers that, beyond that small core, all other moral statements are neither objectively true nor false.

  1. Tracing the Identity of Objects

    Science.gov (United States)

    Rips, Lance J.; Blok, Sergey; Newman, George

    2006-01-01

    This article considers how people judge the identity of objects (e.g., how people decide that a description of an object at one time, t-sub-0, belongs to the same object as a description of it at another time, t-sub-1). The authors propose a causal continuer model for these judgments, based on an earlier theory by Nozick (1981). According to this…

  2. Identity vicissitudes in work organizations

    Directory of Open Access Journals (Sweden)

    Giovanni Di Stefano

    2014-09-01

    Full Text Available Today’s pressing scientific and technological changes, while having an impact on the organizational life of our post-industrial world, are producing drastic transformations within organizations, creating in workers new feelings of anxiety and uncertainty. The features of the present state of crises - instability, uncertainty, weakening of family bonds – define a peculiar social and psychological uneasiness, proper of our time, as a consequence of the technological business culture prevailing today, which is destabilizing the institutional role of organizations, namely fixing the various forms of personal identity. This contribution offers, also by presenting a training experience in a business setting, a critical psycho-socio-analysis of the roles that individuals and organizations must presently face to foster development and, at the same time, provides directions to avoid the perverse drift of today’s culture and promote the identity process through the reactivation of the learning/changing capacity aimed at the definition of new shared meanings.Keywords: identity, organization, psycho-socio-analysis

  3. Learning, memory and exploratory similarities in genetically identical cloned dogs.

    Science.gov (United States)

    Shin, Chi Won; Kim, Geon A; Park, Won Jun; Park, Kwan Yong; Jeon, Jeong Min; Oh, Hyun Ju; Kim, Min Jung; Lee, Byeong Chun

    2016-12-30

    Somatic cell nuclear transfer allows generation of genetically identical animals using donor cells derived from animals with particular traits. To date, few studies have investigated whether or not these cloned dogs will show identical behavior patterns. To address this question, learning, memory and exploratory patterns were examined using six cloned dogs with identical nuclear genomes. The variance of total incorrect choice number in the Y-maze test among cloned dogs was significantly lower than that of the control dogs. There was also a significant decrease in variance in the level of exploratory activity in the open fields test compared to age-matched control dogs. These results indicate that cloned dogs show similar cognitive and exploratory patterns, suggesting that these behavioral phenotypes are related to the genotypes of the individuals.

  4. Christian identity of secular Europe

    Directory of Open Access Journals (Sweden)

    Malešević Miroslava

    2006-01-01

    Full Text Available The Jyllands-Posten Muhammad cartoons controversy began after twelve editorial cartoons, most of which depicted the Islamic prophet Muhammad, were published in the Danish newspaper Jyllands-Posten on September 30, 2005. The newspaper explained that this publication was a contribution to debate regarding criticism of Islam and self-censorship. In response, Danish Muslim organizations held public protests and spread knowledge of Jyllands-Postens publication. As the controversy grew, some or all of the cartoons were reprinted in newspapers in more than fifty other countries, which led to violent protests, particularly in the Muslim world. Critics of the cartoons describe them as islamophobic and argue that they are blasphemous, intended to humiliate a marginalized Danish minority, and a manifestation of ignorance about the history of western imperialism, from colonialism to the current conflicts in the Middle East. Supporters of the cartoons claim they illustrate an important issue in an age of Islamic extremist terrorism and that their publication is a legitimate exercise of the right of free speech. They also note that similar cartoons about other religions are frequently printed, arguing that the followers of Islam were not targeted in a discriminatory way. The dispute has again pointed out to the relevance of religion and religious differences in the contemporary world. Again, several questions presented themselves as significant: citizen freedom, values and the rights to exercise them, secularism, tolerance, multiculturalism majority-minority relationships and so on. The resolution to these issues appears as of the outmost importance, considering the existing tendencies of united Europe to even more firmly establish cultural, economic, and political associations, in order to launch a one, joined European identity with vanishing national, ethnic and religious differences. Therefore, the question becomes: what could serve as a foundation for

  5. Perception, experience and body identity.

    Science.gov (United States)

    López-Ibor, Juan J; Ortiz, Tomás; López-Ibor, María I

    2011-12-01

    Physician has to know the patient in the disease and not only the disease in the patient, from the dual perspective of the body as object and the body as subject. This also affects the patient who has to cope with the reality of having a body that bursts into the subject's consciousness as a vital threat, as source of discomfort and inability and being a body (Marcel). The human body in its dual aspect has been and is a great unknown, if not a great outrage in spite of the fact that we are our body and our body is each of us. We sometimes do not feel as we are and thus a confrontation arises, sometimes more normal, others more morbid. This forces the physician to face complex ethics considerations and the scientist to accept a personal identity disorder. Dualism considers that there are two substances in us, one that distinguishes us from other beings and from the rest of the individuals of the human species, the soul, the psychic life, mind or consciousness, and another more insubstancial one, the body. The aim of the first substance is to dominate the body, to survive it after death when it is, already a corpse is meant to become putrefied, is buried, incinerated or thrown to the depth of the sea. This dualism aims to explain the origin of the evil and the attitude to defeat it and it does so efficiently. This anthropology has very ancient roots (the Upvanishads, in the orphic texts, in Plato), it is the core of Gnostic thought and the foundation of the modern science since Descartes. Some monist perspectives are a masked dualism or a mereologic fallacy, according to which, the brain is conscious, when that what is conscious is the subject, although the subject, with the brain could not be conscious. Therefore, a new perspective is proposed, chiasmatic or janicular monism, that considers the adaptive value of focusing on the reality from two perspectives, as physical universe and the world of interpersonal relationships. In the agnosias and in the phantom limb

  6. 'Hidden identities': perceptions of sexual identity in Beijing.

    Science.gov (United States)

    Miles-Johnson, Toby; Wang, Yurong

    2017-07-08

    This article draws upon responses given by volunteers who work in the Beijing LGBT Centre regarding perceptions of sexual identity, and how Chinese culture affects hidden or open sexual identities of Chinese lesbian and gay people in this region. The insights gained from those working carefully to create social change offers an important and original contribution to the field of gay and lesbian studies in China. The findings indicate the volunteers at the Beijing LGBT Centre are frustrated by the lack of acceptance of non-heterosexual relationships among Chinese culture and society, and by the disregard of lesbian gay and bisexual (LGB) people by the Chinese government. The findings also illustrate stigmatization of homosexuality in China is enacted in structural terms (such as in the lack of policy, legislation and positive endorsement by governmental and socio-political organizations), public expression (such as negative attitudes, beliefs or reactions towards LGB people) and internalized repression (through fear of stigmatization, and subsequent abuse due to negative societal attitudes and discrimination). Influenced by the Chinese tradition of conforming to group values, the findings from this study show that volunteers at the Beijing LGBT Centre believe LGB people in China are generally hesitant to disclose their sexual identities, and reject the idea that there had been a collective shift in Chinese culture regarding increased acceptance of LGB people. It also finds volunteers at the LGBT Centre in Beijing blame Chinese culture for its lack of acceptance of non-heterosexual relationships, and state stigmatization of homosexuality in China is due to deep-rooted cultural homophobia. © London School of Economics and Political Science 2017.

  7. Change and Identity in Complex Systems

    National Research Council Canada - National Science Library

    Cumming, Graeme S; Collier, John

    2005-01-01

    .... Systems can only be considered as single study units if they retain their identity. Previous system definitions have largely ignored the need for both spatial and temporal continuity as essential attributes of identity...

  8. Local identities involving Jacobi elliptic functions

    Indian Academy of Sciences (India)

    Avinash Khare; Arul Lakshminarayan; Uday Sukhatme

    2004-06-01

    We derive a number of local identities involving Jacobi elliptic functions and use them to obtain several new results. First, we present an alternative, simpler derivation of the cyclic identities discovered by us recently, along with an extension to several new cyclic identities. Second, we obtain a generalization to cyclic identities in which successive terms have a multiplicative phase factor exp$(2i=s)$, where $s$ is any integer. Third, we systematize the local identities by deriving four local `master identities' analogous to the master identities for the cyclic sums discussed by us previously. Fourth, we point out that many of the local identities can be thought of as exact discretizations of standard non-linear differential equations satisfied by the Jacobi elliptic functions. Finally, we obtain explicit answers for a number of definite integrals and simpler forms for several indefinite integrals involving Jacobi elliptic functions.

  9. Fuzzy Identities and Attribute-Based Encryption

    Science.gov (United States)

    Sahai, Amit; Waters, Brent

    We introduce a new type of Identity-Based Encryption (IBE) scheme that we call Fuzzy Identity-Based Encryption. In fuzzy IBE, we view an identity as a set of descriptive attributes. A fuzzy IBE scheme allows for a private key for an identity,ωù, to decrypt a ciphertext encrypted with an identity, ùω´, if and only if the identities ùω and ùω´are close to each other as measured by the "set overlap" distance metric. A fuzzy IBE scheme can be applied to enable encryption using biometric inputs as identities; the error-tolerance property of a fuzzy IBE scheme is precisely what allows for the use of biometric identities, which inherently will have some noise each time they are sampled. Additionally, we show that fuzzy IBE can be used for a type of application that we term "attribute-based encryption."

  10. Idendity and identity conflict in the workplace

    NARCIS (Netherlands)

    K.E. Horton (Kate); P.S. Bayerl (Saskia); G. Belschak-Jacobs (Gabriele)

    2014-01-01

    markdownabstract__Abstract__ As individuals, we define ourselves according to various characteristics that include our values and beliefs. This gives us our identity. As organisations become increasingly complex, understanding the concept of identity conflict may mean the difference between success

  11. Corporate Brand Identity Development in SMEs

    DEFF Research Database (Denmark)

    Gyrd-Jones, Richard; Törmälä, Minna

    2016-01-01

    We study the interactive narratives that underpin the emergence of corporate brand identity in new venture SMEs. We apply a process perspective that considers the complex interactions between layers of identities and sense-making in and around the organisation in the stakeholder eco-system. We...... propose a typology of brand identity drivers that reflects a co-creative approach to the emergence of brand identity....

  12. Responding to Identity Crime on the Internet

    Directory of Open Access Journals (Sweden)

    Eric Holm

    2015-05-01

    Full Text Available This paper discusses the unique challenges of responding to identity crime. Identity crime involves the use of personal identification information to perpetrate crimes. As such, identity crime involves using personal and private information to for illegal purposes. In this article, the two significant issues that obstruct responses to this crime are considered. These are first, the reporting of crime, and second the issue of jurisdiction. The paper also presents an exploration of some responses to identity crime.

  13. Reorienting Deliberation: Identity Politics in Multicultural Societies

    Directory of Open Access Journals (Sweden)

    Rebecca Mason

    2010-03-01

    Full Text Available Many political theorists argue that cross-cultural communication within multicultural democracies is not best served by a commitment to identity politics. In response, I argue that identity politics only interfere with democratic participation according to an erroneous interpretation of the relationship between identity and reasoning. I argue that recognizing the importance of identity to the intelligibility of reasons offered in the context of civic deliberation is the first step towards the kind of dialogue that democratic participation requires.

  14. Under Construction (Identities, Communities and Visual Overkill)

    NARCIS (Netherlands)

    S.J. Magala (Slawomir)

    2001-01-01

    textabstractMost of modern identities emerge from mediated interactions in public and virtual spaces. There are no acknowledged authorities to watch over organizational identities and grant them legitimacy. These identities are renegotiated in real and virtual communities, often carry a permanent la

  15. Pre-Service Teacher Cultural Identity Development

    Science.gov (United States)

    Cunningham, Maurella Louise

    2013-01-01

    The main purpose of this study is to conduct exploratory qualitative research to investigate how PSTs and practicing teachers experience cultural and racial identity development or changes in identity. Rather than examine the "what" or contributors to identity development, I will explore the "how" or processes of identity…

  16. Fibonacci Identities via the Determinant Sum Property

    Science.gov (United States)

    Spivey, Michael

    2006-01-01

    We use the sum property for determinants of matrices to give a three-stage proof of an identity involving Fibonacci numbers. Cassini's and d'Ocagne's Fibonacci identities are obtained at the ends of stages one and two, respectively. Catalan's Fibonacci identity is also a special case.

  17. Career Identity among Community College Students

    Science.gov (United States)

    Stringer, Kate J.; Kerpelman, Jennifer L.

    2014-01-01

    Career identity development is salient in adolescence and young adulthood, but little research has assessed career identity in populations other than four-year college students. Context should be considered when examining career identity, and to address this gap in the literature, the current study examined the extent to which parental support for…

  18. On an Extension of a Combinatorial Identity

    Indian Academy of Sciences (India)

    M Rana; A K Agarwal

    2009-02-01

    Using Frobenius partitions we extend the main results of [4]. This leads to an infinite family of 4-way combinatorial identities. In some particular cases we get even 5-way combinatorial identities which give us four new combinatorial versions of Göllnitz–Gordon identities.

  19. Foreign Language Teaching and Cultural Identity.

    Science.gov (United States)

    Nasr, Raja T., Ed.; And Others

    A collection of works on the role of cultural identity in second language learning and teaching includes: "Linguas estrangeiras e ideologia" (Roberto Ballalai); "Cultural Identity and Bilinguality" (Josiane F. Hamers, Michel Blanc); "Foreign Language Teaching and Cultural Identity" (Lakshmie K. Cumaranatunge);…

  20. Bijective Proofs of Gould's and Rothe's Identities

    CERN Document Server

    Guo, Victor J W

    2010-01-01

    We first give a bijective proof of Gould's identity in the model of binary words. Then we deduce Rothe's identity from Gould's identity again by a bijection, which also leads to a double-sum extension of the $q$-Chu-Vandermonde formula.

  1. Racial and Ethnic Identities in American Society.

    Science.gov (United States)

    Yin, Robert K.

    The investigation of race relations, of social problems related to race and ethnicity, and of different racial and social groups, all presume prior information about the definition of racial or ethnic group identity, about the formation, maintenance, and dissolution of such identities, and about the importance of such identities in American…

  2. 7 CFR 52.771 - Identity.

    Science.gov (United States)

    2010-01-01

    ... United States Standards for Grades of Canned Red Tart Pitted Cherries 1 Identity and Grades § 52.771 Identity. Canned red tart pitted cherries is the product represented as defined in the standard of identity for canned cherries (21 CFR 145.125(a)), issued pursuant to the Federal Food, Drug, and Cosmetic...

  3. 21 CFR 610.14 - Identity.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 7 2010-04-01 2010-04-01 false Identity. 610.14 Section 610.14 Food and Drugs... BIOLOGICAL PRODUCTS STANDARDS General Provisions § 610.14 Identity. The contents of a final container of each filling of each lot shall be tested for identity after all labeling operations shall have been...

  4. Pre-Service Teacher Cultural Identity Development

    Science.gov (United States)

    Cunningham, Maurella Louise

    2013-01-01

    The main purpose of this study is to conduct exploratory qualitative research to investigate how PSTs and practicing teachers experience cultural and racial identity development or changes in identity. Rather than examine the "what" or contributors to identity development, I will explore the "how" or processes of identity…

  5. Negotiation of identities in intercultural communication

    Directory of Open Access Journals (Sweden)

    Janík Zdeněk

    2017-01-01

    Full Text Available Negotiation of identities in communication entails affirming the identities we want others to recognize in us and ascription of identities we mutually assign to each other in communication. The study of intercultural communication focuses on cultural identity as the principal identity component that defines intercultural communication. In this article, the assumption that cultural group membership factors determine the context of intercultural communication is questioned. The article examines how intercultural interlocutors negotiate their identities in various intercultural interactions. The aims of the research presented in this paper are: 1 to examine which identities - cultural, personal, or social - intercultural interlocutors activate in intercultural communication; 2 to determine whether interlocutors’ intercultural communication is largely influenced by their cultural identities; 3 and to identify situations in which they activate their cultural identities (3. The research data were collected from 263 international students studying at Masaryk University in Brno in the years 2010 - 2016. Although the research results are not conclusive, they indicate that cultural identities predominate in the students’ ethnocentric views and that stereotypes constrain the students’ cultural identities and affect the negotiation of identities in intercultural communication.

  6. Imagery Measures of Ego, Id, Superego, and Identity: Validity Studies.

    Science.gov (United States)

    Cartwright, D.; DeBruin, J.

    1988-01-01

    Five validity studies of the id, ego, superego, and identity scales of the Study of Imagery are reported, using undergraduate students. Multistage Bonferroni procedures are used to evaluate the significance of results. The scales are related to each other and to toughmindedness, self-control, and behavioral conflict. (TJH)

  7. Out of the Mainstream. Water Rights, Politics and Identity

    NARCIS (Netherlands)

    Boelens, R.A.; Getches, D.; Guevara-Gil, A.

    2010-01-01

    Water is not only a source of life and culture. It is also a source of power, conflicting interests and identity battles. Rights to materially access, culturally organize and politically control water resources are poorly understood by mainstream scientific approaches and hardly addressed by current

  8. Effects of Collaborative Activities on Group Identity in Virtual World

    Science.gov (United States)

    Park, Hyungsung; Seo, Sumin

    2013-01-01

    The purpose of this study was to analyze the effects of collaborative activities on group identity in a virtual world such as "Second Life." To achieve this purpose, this study adopted events that promoted participants' interactions using tools inherent in "Second Life." The interactive tools given to the control group in…

  9. Out of the Mainstream. Water Rights, Politics and Identity

    NARCIS (Netherlands)

    Boelens, R.A.; Getches, D.; Guevara-Gil, A.

    2010-01-01

    Water is not only a source of life and culture. It is also a source of power, conflicting interests and identity battles. Rights to materially access, culturally organize and politically control water resources are poorly understood by mainstream scientific approaches and hardly addressed by current

  10. A weighted identity for stochastic partial differential operators and its applications

    OpenAIRE

    2015-01-01

    In this paper, a pointwise weighted identity for some stochastic partial differential operators (with complex principal parts) is established. This identity presents a unified approach in studying the controllability, observability and inverse problems for some deterministic/stochastic partial differential equations. Based on this identity, one can deduce all the known Carleman estimates and observability results, for some deterministic partial differential equations, stochastic heat equation...

  11. Practicing Identity: A Crafty Ideal?

    Science.gov (United States)

    Brysbaert, A.; Vetters, M.

    This paper focuses on the materialization of technological practices as a form of identity expression. Contextual analyses of a Mycenaean workshop area in the Late Bronze Age citadel of Tiryns (Argolis, Greece) are presented to investigate the interaction of different artisans under changing socio-political and economic circumstances. The case study indicates that although certain technological practices are often linked to specific crafts, they do not necessarily imply the separation of job tasks related to the working of one specific material versus another. Shared technological practices and activities, therefore, may be a factor in shaping cohesive group identities of specialized artisans. Since tracing artisans' identities is easier said than done on the basis of excavated materials alone, we employ the concepts of multiple chaînes opératoires combined with cross-craft interactions as a methodology in order to retrieve distinctive sets of both social and technological practices from the archaeological remains. These methodological concepts are not restricted to a specific set of steps in the production cycle, but ideally encompass reconstructing contexts of extraction, manufacture, distribution and discard/reuse for a range of artefacts. Therefore, these concepts reveal both technological practices, and, by contextualising these technological practices in their spatial layout, equally focus on social contacts that would have taken place during any of these actions. Our detailed contextual study demonstrates that the material remains when analysed in their entirety are complementary to textual evidence. In this case study they even form a source of information on palatial spheres of life about which the fragmentary Linear B texts, so far, remain silent.

  12. Bicharacters, braids and Jacobi identity

    CERN Document Server

    Rozansky, L

    1996-01-01

    For an abelian group G we consider braiding in a category of G-graded modules $M^{kG}$ given by a bicharacter \\chi on G. For $(G,\\chi)$-bialgebra A in $M^{kG}$ an analog of Lie bracket is defined. This bracket is determined by a linear map $E\\in\\End(A)$ and n-ary operations $\\Omega^{n}_{E}$ on A. Our result states that if $E(1)=0,E^{2}=0$ and $\\Omega^{3}_{E}=0$ then a braided Jacobi identity holds and the linear map E is a braided derivation of a braided Lie algebra.

  13. Corporate visual identity: a case in hospitals.

    Science.gov (United States)

    Alkibay, Sanem; Ozdogan, F Bahar; Ermec, Aysegul

    2007-01-01

    This paper aims to present a perspective to better understand corporate identity through examining the perceptions of Turkish patients and develop a corporate visual identity scale. While there is no study related to corporate identity research on hospitals in Turkey as a developing country, understanding consumer's perceptions about corporate identity efforts of hospitals could provide different perspectives for recruiters. When the hospitals are considered in two different groups as university and state hospitals, the priority of the characteristics of corporate visual identity may change, whereas the top five characteristics remain the same for all the hospitals.

  14. Rethinking social identity theory in international encounters:

    DEFF Research Database (Denmark)

    Lauring, Jakob

    2008-01-01

    the link between identity and language to be linear, this article takes a different approach. By drawing on anthropological theories on ethnic identity it is argued that the relation between language and social identity is negotiated in interaction. In the empirical analysis the article focuses......In a globalized business environment, interaction across linguistic boundaries is becoming a normal part of everyday life. In these encounters language differences may affect the formation of social identities among organization members. While studies based on Social Identity Theory perceive....... It is finally argued that the processes by which identifications develop can cause both polarization and accommodation in the relation between groups and individuals.  ...

  15. Conceptualizing Identity Development: Unmasking the Assumptions within Inventories Measuring Identity Development

    Science.gov (United States)

    Moran, Christy D.

    2009-01-01

    The purpose of this qualitative research was to analyze the dimensions and manifestations of identity development embedded within commonly used instruments measuring student identity development. To this end, a content analysis of ten identity assessment tools was conducted to determine the assumptions about identity development contained therein.…

  16. Racial Identity Attitudes and Ego Identity Statuses in Dominican and Puerto Rican College Students

    Science.gov (United States)

    Sanchez, Delida

    2013-01-01

    This study explored the relation between racial identity attitudes and ego identity statuses in 94 Dominican and Puerto Rican Latino college students in an urban public college setting. Simultaneous regression analyses were conducted to test the relation between racial identity attitudes and ego identity statuses, and findings indicated that…

  17. Ambivalent Urban, Immigrant Identities: The Incompleteness of Lao American Student Identities

    Science.gov (United States)

    Ngo, Bic

    2009-01-01

    In this article, the author elucidates the identity work of Lao American urban, immigrant students, highlighting ambivalent identities that do not fit into notions of bicultural or binary identities. It examines the various discourses and practices that inform and shape the experiences and identities of urban, Lao American high school students. It…

  18. Identity processes as a predictor of memory beliefs in older adults.

    Science.gov (United States)

    Hilgeman, Michelle M; Allen, Rebecca S; Carden, Keisha D

    2017-07-01

    The impact of identity processes (identity assimilation, identity accommodation, and identity balance) on memory beliefs was explored. Individually administered questionnaires (e.g. depressive symptoms, subjective health, identity processes, memory beliefs) and a brief neuropsychological assessment of cognitive abilities were completed during a one-time interview with 82 participants aged 58-92 years-old (M = 74.68, SD = 10.95). Forty (49.4%) identified their race as White/Caucasian, 38 (46.9%) identified their race as Black/African American, and 3 (3.7%) indicated no primary racial/ethnic group. Hierarchical regression analyses revealed that identity processes account for differences in memory beliefs beyond established predictors. Specifically, identity accommodation and identity balance predicted memory self-efficacy beyond depression and subjective health. These findings are congruent with identity process theory; however, the impact of identity assimilation in this population was unremarkable. Exploratory analyses also indicated that the identity processes have a stronger relationship to some domains of memory self-efficacy (i.e. anxiety, capacity) than others (i.e. perceived change, locus of control). Beliefs about memory and their integration into an adaptable, yet consistent self-concept are an important element of identity for aging individuals. Additional research is needed to determine the unique role of identity accommodation and identity balance in understanding cognitive functioning and ultimately the impact on potential clinical applications, such as related health-seeking behavior among older adults. Tailored interventions could be developed to facilitate optimal utilization of health care services at a time when early diagnosis of memory-related disorders is critical for future planning and care decisions.

  19. Patient satisfaction and ethnic identity among American Indian older adults.

    Science.gov (United States)

    Garroutte, Eva Marie; Kunovich, Robert M; Jacobsen, Clemma; Goldberg, Jack

    2004-12-01

    Work in the field of culturally competent medical care draws on studies showing that minority Americans often report lower satisfaction with care than White Americans and recommends that providers should adapt care to patients' cultural needs. However, empirical evidence in support of cultural competence models is limited by reliance upon measurements of racial rather than ethnic identity and also by a near-total neglect of American Indians. This project explored the relationship between ethnic identity and satisfaction using survey data collected from 115 chronically ill American Indian patients >or=50 years at a Cherokee Nation clinic. Satisfaction scores were high overall and comparable to those found in the general population. Nevertheless, analysis using hierarchical linear modeling showed that patients' self-rated American Indian ethnic identity was significantly associated with satisfaction. Specifically, patients who rated themselves high on the measure of American Indian ethnic identity reported reduced scores on satisfaction with health care providers' social skill and attentiveness, as compared to those who rated themselves lower. Significant associations remained after controlling for patients' sex, age, education, marital status, self-reported health, wait time, and number of previous visits. There were no significant associations between patients' American Indian ethnic identity and satisfaction with provider's technical skill and shared decision-making. Likewise, there were no significant associations between satisfaction and a separate measure of White American ethnic identity, although a suggestive trend was observed for satisfaction with provider's social skill. Our findings demonstrate the importance of including measures of ethnic identity in studies of medical satisfaction in racial minority populations. They support the importance of adapting care to patient's cultural needs, and they highlight the particular significance of interpersonal

  20. New graduate identity: discursive mismatch.

    Science.gov (United States)

    Hamilton, Helen

    2005-09-01

    For many new graduates the transition from nursing student to a professional in practice is marked by conflict and tension. Given that conflict may ensue from differing discursive constructions of new graduates, this article reports a review of discursive construction between new graduates from two institutions with vested interests in nursing graduates--comparing health service organisations and educational institutions in Victoria. Four discourses, common to both sets of texts and constitutive of new graduate identity were identified: these were the discourse of nursing practice; the discourse of the good nurse; the discourse of knowing and thinking; and the discourse of statute and regulation. A discourse peculiar to health service organisations only was identified as an organisational and bureaucratic discourse. This review reports the new graduate, as constructed in education texts, as a rational, independent, critically thinking and knowing care giver. In contrast, in health service organisation texts, the new graduate is constructed as a functional, efficient, organisational operative, providing a nursing service. New graduates are concluded to experience multiple discursive dissonances in their first employment which stem from differing constructions of new graduate identity within institutional discourses. If tensions experienced in the transition as discursively generated are understood, previously unthought of ways preparing and introducing nurses to the work place may ensue.