WorldWideScience

Sample records for identity electronic resource

  1. Electronic identity

    CERN Document Server

    de Andrade, Norberto Nuno Gomes; Argles, David

    2014-01-01

    With the increasing availability of electronic services, security and a reliable means by which identity is verified is essential.Written by Norberto Andrade the first chapter of this book provides an overview of the main legal and regulatory aspects regarding electronic identity in Europe and assesses the importance of electronic identity for administration (public), business (private) and, above all, citizens. It also highlights the role of eID as a key enabler of the economy.In the second chapter Lisha Chen-Wilson, David Argles, Michele Schiano di Zenise and Gary Wills discuss the user-cent

  2. RFID-based Electronic Identity Security Cloud Platform in Cyberspace

    OpenAIRE

    Bing Chen; Chengxiang Tan; Bo Jin; Xiang Zou; Yuebo Dai

    2012-01-01

    With the moving development of networks, especially Internet of Things, electronic identity administration in cyberspace is becoming more and more important. And personal identity management in cyberspace associated with individuals in reality has been one significant and urgent task for the further development of information construction in China. So this paper presents a RFID-based electronic identity security cloud platform in cyberspace to implement an efficient security management of cyb...

  3. Identities for the electron forms 2 and their 3D representation

    International Nuclear Information System (INIS)

    Minogin, Vladimir G.

    2012-01-01

    New type of identities for products of the electron forms 2 (Fs2) and the bilinear forms (BFs) are derived. The identities are found for both temporal Fs2 describing the electron energy and quasi energy densities and spatial Fs2 describing the linear momentum and quasi linear momentum densities. The identities allow one to transform the quasi energy densities into the energy densities as well as the quasi linear momentum densities into the linear momentum densities. It is shown that by choosing any one of the 16 electron temporal or spatial Fs2 one can represent the remaining 15 temporal or spatial Fs2 as combinations of a chosen form 2 (F2) and the derivatives of a number of BFs. Any one of such 16 sets of identities can be considered as a specific form of an irreducible representation for the temporal or spatial Fs2. Similar to the bilinear identities for BFs the derived identities can be used for reduction different physical quantities describing the electron to the forms defined by the basic physical observables. As an example we consider transformation of the electron energy density to a new fundamental form that presents the energy density through the linear momentum density. - Highlights: ► New type of identities connecting electron forms 2 and bilinear forms is derived.► Identities are found for temporal and spatial forms 2. ► Irreducible representation of the identities is derived. ► New forms of the electron energy density are presented.

  4. designing a framework for a unified electronic identity system

    African Journals Online (AJOL)

    DJFLEX

    In this paper, a Unified Identity System is proposed where single electronic identity (eID) is issued that can be used ... online commerce and public sector organizations. Because ..... SearchUnifiedCommunications.com Definitions, Access date.

  5. Electronic Resource Management and Design

    Science.gov (United States)

    Abrams, Kimberly R.

    2015-01-01

    We have now reached a tipping point at which electronic resources comprise more than half of academic library budgets. Because of the increasing work associated with the ever-increasing number of e-resources, there is a trend to distribute work throughout the library even in the presence of an electronic resources department. In 2013, the author…

  6. Designing a framework for a unified electronic identity system ...

    African Journals Online (AJOL)

    In this paper, a Unified Identity System is proposed where single electronic identity (eID) is issued that can be used across the various platforms of business transaction. The activity/state diagram of the model is presented, and the means of authentication is based on the Secure Assertion Markup Language (SAML) ...

  7. Electron-positron pair production by two identical photons in the nuclear field

    International Nuclear Information System (INIS)

    Smirnov, A.I.

    1977-01-01

    In the Born approximation of the perturbation theory considered is a nonlinear effect of the electron-positron pair production by two identical photons in the Coulomb field of an atomic nucleus. The kinematic version of identical photons is studied. All the particles are considered to be nonpolarized. The calculation of the differential probability of the effect has been carried out earlier by the Feynman method. The total probability of the effect in limiting energy ranges is determined by integrating the formulas of the pair component distribution over energies. The probabilities of the electron-positron pair production and fusion of two photons into one in the nucleus field have been compared for the case of identical quanta. From the comparison of the results of analyzing both the nonlinear effects it follows that in the high-energy range the electron-positron pair production by two identical photons in the nucleus field extremely predominates over the fusion of two photons into one photon in the same field

  8. The Effect of Electronic Devices Self-Efficacy, Electronic Devices Usage and Information Security Awareness on Identity-Theft Anxiety Level

    Science.gov (United States)

    Sanga, Sushma

    2016-01-01

    Identity-theft means stealing someone's personal information and using it without his or her permission. Each year, millions of Americans are becoming the victims of identity-theft, and this is one of the seriously growing and widespread issues in the U.S. This study examines the effect of electronic devices self-efficacy, electronic devices…

  9. The Job Demands-Resources model as predictor of work identity and work engagement: A comparative analysis

    Directory of Open Access Journals (Sweden)

    Roslyn De Braine

    2011-05-01

    Research purpose: This study explored possible differences in the Job Demands-Resources model (JD-R as predictor of overall work engagement, dedication only and work-based identity, through comparative predictive analyses. Motivation for the study: This study may shed light on the dedication component of work engagement. Currently no literature indicates that the JD-R model has been used to predict work-based identity. Research design: A census-based survey was conducted amongst a target population of 23134 employees that yielded a sample of 2429 (a response rate of about 10.5%. The Job Demands- Resources scale (JDRS was used to measure job demands and job resources. A work-based identity scale was developed for this study. Work engagement was studied with the Utrecht Work Engagement Scale (UWES. Factor and reliability analyses were conducted on the scales and general multiple regression models were used in the predictive analyses. Main findings: The JD-R model yielded a greater amount of variance in dedication than in work engagement. It, however, yielded the greatest amount of variance in work-based identity, with job resources being its strongest predictor. Practical/managerial implications: Identification and work engagement levels can be improved by managing job resources and demands. Contribution/value-add: This study builds on the literature of the JD-R model by showing that it can be used to predict work-based identity.

  10. Electronic Resource Management Systems

    Directory of Open Access Journals (Sweden)

    Mark Ellingsen

    2004-10-01

    Full Text Available Computer applications which deal with electronic resource management (ERM are quite a recent development. They have grown out of the need to manage the burgeoning number of electronic resources particularly electronic journals. Typically, in the early years of e-journal acquisition, library staff provided an easy means of accessing these journals by providing an alphabetical list on a web page. Some went as far as categorising the e-journals by subject and then grouping the journals either on a single web page or by using multiple pages. It didn't take long before it was recognised that it would be more efficient to dynamically generate the pages from a database rather than to continually edit the pages manually. Of course, once the descriptive metadata for an electronic journal was held within a database the next logical step was to provide administrative forms whereby that metadata could be manipulated. This in turn led to demands for incorporating more information and more functionality into the developing application.

  11. Electronic Resources Management Project Presentation 2012

    KAUST Repository

    Ramli, Rindra M.

    2012-11-05

    This presentation describes the electronic resources management project undertaken by the KAUST library. The objectives of this project is to migrate information from MS Sharepoint to Millennium ERM module. One of the advantages of this migration is to consolidate all electronic resources into a single and centralized location. This would allow for better information sharing among library staff.

  12. PRINCIPLES OF CONTENT FORMATION EDUCATIONAL ELECTRONIC RESOURCE

    Directory of Open Access Journals (Sweden)

    О Ю Заславская

    2017-12-01

    Full Text Available The article considers modern possibilities of information and communication technologies for the design of electronic educational resources. The conceptual basis of the open educational multimedia system is based on the modular architecture of the electronic educational resource. The content of the electronic training module can be implemented in several versions of the modules: obtaining information, practical exercises, control. The regularities in the teaching process in modern pedagogical theory are considered: general and specific, and the principles for the formation of the content of instruction at different levels are defined, based on the formulated regularities. On the basis of the analysis, the principles of the formation of the electronic educational resource are determined, taking into account the general and didactic patterns of teaching.As principles of the formation of educational material for obtaining information for the electronic educational resource, the article considers: the principle of methodological orientation, the principle of general scientific orientation, the principle of systemic nature, the principle of fundamentalization, the principle of accounting intersubject communications, the principle of minimization. The principles of the formation of the electronic training module of practical studies in the article include: the principle of systematic and dose based consistency, the principle of rational use of study time, the principle of accessibility. The principles of the formation of the module for monitoring the electronic educational resource can be: the principle of the operationalization of goals, the principle of unified identification diagnosis.

  13. Implementing CORAL: An Electronic Resource Management System

    Science.gov (United States)

    Whitfield, Sharon

    2011-01-01

    A 2010 electronic resource management survey conducted by Maria Collins of North Carolina State University and Jill E. Grogg of University of Alabama Libraries found that the top six electronic resources management priorities included workflow management, communications management, license management, statistics management, administrative…

  14. Managing electronic resources a LITA guide

    CERN Document Server

    Weir, Ryan O

    2012-01-01

    Informative, useful, current, Managing Electronic Resources: A LITA Guide shows how to successfully manage time, resources, and relationships with vendors and staff to ensure personal, professional, and institutional success.

  15. Psychological resources, satisfaction, and career identity in the work transition: an outlook on Sicilian college students

    Directory of Open Access Journals (Sweden)

    Santisi G

    2018-05-01

    Full Text Available Giuseppe Santisi,1 Paola Magnano,2 Silvia Platania,1 Tiziana Ramaci2 1Department of Educational Sciences, University of Catania, Catania, Italy; 2Faculty of Human and Social Sciences, “Kore” University of Enna, Enna, Italy Background: The phases of career building today bring out a more complex process than in previous decades. Starting from the literature review, the university-to-work transition is considered a very important step in the future career of the graduates, and it involves some psychological resources and requires specific abilities. Methods: Research has examined the psychological resources that students at the end of a degree course can use in the university-to-work transition. The aim of the study is to verify the relationship between academic satisfaction and career identity, and the mediational role of readiness and confidence on this relationship. A group of 438 students were assigned to complete a questionnaire in order to examine the relationship between academic satisfaction and career identity and the role of core components of psychological resources: readiness and confidence as mediator. Results: The results indicated both a direct relationship between academic satisfaction and career identity and a mediated relationship with the influence of readiness and confidence for a transition. Adding to our results, we assert that academic satisfaction has a directed effect on confidence during the transition and is a predictor of career identity, both directly and by the mediation of readiness in career transitions. Conclusion: Career identity has implication for exploratory behavior, thus increasing the motivation and mindfulness that create a virtuous circle, influencing the development of knowledge and skills, which are the base of proactivity and confidence in construction of one’s future career. Keywords: career, transition, identity, satisfaction, resources

  16. Electronic Voting Protocol Using Identity-Based Cryptography

    Directory of Open Access Journals (Sweden)

    Gina Gallegos-Garcia

    2015-01-01

    Full Text Available Electronic voting protocols proposed to date meet their properties based on Public Key Cryptography (PKC, which offers high flexibility through key agreement protocols and authentication mechanisms. However, when PKC is used, it is necessary to implement Certification Authority (CA to provide certificates which bind public keys to entities and enable verification of such public key bindings. Consequently, the components of the protocol increase notably. An alternative is to use Identity-Based Encryption (IBE. With this kind of cryptography, it is possible to have all the benefits offered by PKC, without neither the need of certificates nor all the core components of a Public Key Infrastructure (PKI. Considering the aforementioned, in this paper we propose an electronic voting protocol, which meets the privacy and robustness properties by using bilinear maps.

  17. Electronic Voting Protocol Using Identity-Based Cryptography.

    Science.gov (United States)

    Gallegos-Garcia, Gina; Tapia-Recillas, Horacio

    2015-01-01

    Electronic voting protocols proposed to date meet their properties based on Public Key Cryptography (PKC), which offers high flexibility through key agreement protocols and authentication mechanisms. However, when PKC is used, it is necessary to implement Certification Authority (CA) to provide certificates which bind public keys to entities and enable verification of such public key bindings. Consequently, the components of the protocol increase notably. An alternative is to use Identity-Based Encryption (IBE). With this kind of cryptography, it is possible to have all the benefits offered by PKC, without neither the need of certificates nor all the core components of a Public Key Infrastructure (PKI). Considering the aforementioned, in this paper we propose an electronic voting protocol, which meets the privacy and robustness properties by using bilinear maps.

  18. Gender Analysis Of Electronic Information Resource Use: The Case ...

    African Journals Online (AJOL)

    Based on the findings the study concluded that access and use of electronic information resources creates a “social digital divide” along gender lines. The study ... Finally, the library needs to change its marketing strategies on the availability of electronic information resources to increase awareness of these resources.

  19. Psychological resources, satisfaction, and career identity in the work transition: an outlook on Sicilian college students.

    Science.gov (United States)

    Santisi, Giuseppe; Magnano, Paola; Platania, Silvia; Ramaci, Tiziana

    2018-01-01

    The phases of career building today bring out a more complex process than in previous decades. Starting from the literature review, the university-to-work transition is considered a very important step in the future career of the graduates, and it involves some psychological resources and requires specific abilities. Research has examined the psychological resources that students at the end of a degree course can use in the university-to-work transition. The aim of the study is to verify the relationship between academic satisfaction and career identity, and the mediational role of readiness and confidence on this relationship. A group of 438 students were assigned to complete a questionnaire in order to examine the relationship between academic satisfaction and career identity and the role of core components of psychological resources: readiness and confidence as mediator. The results indicated both a direct relationship between academic satisfaction and career identity and a mediated relationship with the influence of readiness and confidence for a transition. Adding to our results, we assert that academic satisfaction has a directed effect on confidence during the transition and is a predictor of career identity, both directly and by the mediation of readiness in career transitions. Career identity has implication for exploratory behavior, thus increasing the motivation and mindfulness that create a virtuous circle, influencing the development of knowledge and skills, which are the base of proactivity and confidence in construction of one's future career.

  20. Users satisfaction with electronic information resources and services ...

    African Journals Online (AJOL)

    This study investigated users satisfaction on the use of electronic information resources and services in MTN Net libraries in ABU & UNIBEN. Two objectives and one null hypotheses were formulated and tested with respect to the users' satisfaction on electronic information resources and services in MTN Net libraries in ...

  1. Using a generalised identity reference model with archetypes to support interoperability of demographics information in electronic health record systems.

    Science.gov (United States)

    Xu Chen; Berry, Damon; Stephens, Gaye

    2015-01-01

    Computerised identity management is in general encountered as a low-level mechanism that enables users in a particular system or region to securely access resources. In the Electronic Health Record (EHR), the identifying information of both the healthcare professionals who access the EHR and the patients whose EHR is accessed, are subject to change. Demographics services have been developed to manage federated patient and healthcare professional identities and to support challenging healthcare-specific use cases in the presence of diverse and sometimes conflicting demographic identities. Demographics services are not the only use for identities in healthcare. Nevertheless, contemporary EHR specifications limit the types of entities that can be the actor or subject of a record to health professionals and patients, thus limiting the use of two level models in other healthcare information systems. Demographics are ubiquitous in healthcare, so for a general identity model to be usable, it should be capable of managing demographic information. In this paper, we introduce a generalised identity reference model (GIRM) based on key characteristics of five surveyed demographic models. We evaluate the GIRM by using it to express the EN13606 demographics model in an extensible way at the metadata level and show how two-level modelling can support the exchange of instances of demographic identities. This use of the GIRM to express demographics information shows its application for standards-compliant two-level modelling alongside heterogeneous demographics models. We advocate this approach to facilitate the interoperability of identities between two-level model-based EHR systems and show the validity and the extensibility of using GIRM for the expression of other health-related identities.

  2. Organizational matters of competition in electronic educational resources

    Directory of Open Access Journals (Sweden)

    Ирина Карловна Войтович

    2015-12-01

    Full Text Available The article examines the experience of the Udmurt State University in conducting competitions of educational publications and electronic resources. The purpose of such competitions is to provide methodological support to educational process. The main focus is on competition of electronic educational resources. The technology of such contests is discussed through detailed analysis of the main stages of the contest. It is noted that the main task of the preparatory stage of the competition is related to the development of regulations on competition and the definition of criteria for selection of the submitted works. The paper also proposes a system of evaluation criteria of electronic educational resources developed by members of the contest organizing committee and jury members. The article emphasizes the importance of not only the preparatory stages of the competition, but also measures for its completion, aimed at training teachers create quality e-learning resources.

  3. CHALLENGES OF ELECTRONIC INFORMATION RESOURCES IN ...

    African Journals Online (AJOL)

    This paper discusses the role of policy for proper and efficient library services in the electronic era. It points out some of the possible dangers of embarking in electronic resources without a proper focus at hand. Thus, it calls for today's librarians and policy makers to brainstorm and come up with working policies suitable to ...

  4. Use of Electronic Resources in a Private University in Nigeria ...

    African Journals Online (AJOL)

    The study examined awareness and constraints in the use of electronic resources by lecturers and students of Ajayi Crowther University, Oyo, Nigeria. It aimed at justifying the resources expended in the provision of electronic resources in terms of awareness, patronage and factors that may be affecting awareness and use ...

  5. Electronic Resources Management System: Recommendation Report 2017

    KAUST Repository

    Ramli, Rindra M.

    2017-05-01

    This recommendation report provides an overview of the selection process for the new Electronic Resources Management System. The library has decided to move away from Innovative Interfaces Millennium ERM module. The library reviewed 3 system as potential replacements namely: Proquest 360 Resource Manager, Ex Libris Alma and Open Source CORAL ERMS. After comparing and trialling the systems, it was decided to go for Proquest 360 Resource Manager.

  6. Benefits of Implementing and Improving Collection of Sexual Orientation and Gender Identity Data in Electronic Health Records.

    Science.gov (United States)

    Bosse, Jordon D; Leblanc, Raeann G; Jackman, Kasey; Bjarnadottir, Ragnhildur I

    2018-06-01

    Individuals in lesbian, gay, bisexual, and transgender communities experience several disparities in physical and mental health (eg, cardiovascular disease and depression), as well as difficulty accessing care that is compassionate and relevant to their unique needs. Access to care is compromised in part due to inadequate information systems that fail to capture identity data. Beginning in January 2018, meaningful use criteria dictate that electronic health records have the capability to collect data related to sexual orientation and gender identity of patients. Nurse informaticists play a vital role in the process of developing new electronic health records that are sensitive to the needs and identities of the lesbian, gay, bisexual, and transgender communities. Improved collection of sexual orientation and gender identity data will advance the identification of health disparities experienced by lesbian, gay, bisexual, and transgender populations. More inclusive electronic health records will allow providers to monitor risk behavior, assess progress toward the reduction of disparities, and provide healthcare that is patient and family centered. Concrete suggestions for the modification of electronic health record systems are presented, as well as how nurse informaticists may be able to bridge gaps in provider knowledge and discomfort through interprofessional collaboration when implementing changes in electronic health records.

  7. use of electronic resources by graduate students of the department

    African Journals Online (AJOL)

    respondent's access electronic resources from the internet via Cybercafé .There is a high ... KEY WORDS: Use, Electronic Resources, Graduate Students, Cybercafé. INTRODUCTION ... Faculty of Education, University of Uyo, Uyo. Olu Olat ...

  8. Electronic resource management practical perspectives in a new technical services model

    CERN Document Server

    Elguindi, Anne

    2012-01-01

    A significant shift is taking place in libraries, with the purchase of e-resources accounting for the bulk of materials spending. Electronic Resource Management makes the case that technical services workflows need to make a corresponding shift toward e-centric models and highlights the increasing variety of e-formats that are forcing new developments in the field.Six chapters cover key topics, including: technical services models, both past and emerging; staffing and workflow in electronic resource management; implementation and transformation of electronic resource management systems; the ro

  9. Utilization of electronic information resources by academic staff at ...

    African Journals Online (AJOL)

    The study investigated the utilization of Electronic Information resources by the academic staff of Makerere University in Uganda. It examined the academic staff awareness of the resources available, the types of resources provided by the Makerere University Library, the factors affecting resource utilization. The study was ...

  10. Electronic Resources Management Project Presentation 2012

    KAUST Repository

    Ramli, Rindra M.

    2012-01-01

    This presentation describes the electronic resources management project undertaken by the KAUST library. The objectives of this project is to migrate information from MS Sharepoint to Millennium ERM module. One of the advantages of this migration

  11. The Job Demands-Resources model as predictor of work identity and work engagement: A comparative analysis

    OpenAIRE

    Roslyn De Braine; Gert Roodt

    2011-01-01

    Orientation: Research shows that engaged employees experience high levels of energy and strong identification with their work, hence this study’s focus on work identity and dedication. Research purpose: This study explored possible differences in the Job Demands-Resources model (JD-R) as predictor of overall work engagement, dedication only and work-based identity, through comparative predictive analyses. Motivation for the study: This study may shed light on the dedication component o...

  12. Practical guide to electronic resources in the humanities

    CERN Document Server

    Dubnjakovic, Ana

    2010-01-01

    From full-text article databases to digitized collections of primary source materials, newly emerging electronic resources have radically impacted how research in the humanities is conducted and discovered. This book, covering high-quality, up-to-date electronic resources for the humanities, is an easy-to-use annotated guide for the librarian, student, and scholar alike. It covers online databases, indexes, archives, and many other critical tools in key humanities disciplines including philosophy, religion, languages and literature, and performing and visual arts. Succinct overviews of key eme

  13. Utilisation of Electronic Information Resources By Lecturers in ...

    African Journals Online (AJOL)

    This study assesses the use of information resources, specifically, electronic databases by lecturers/teachers in Universities and Colleges of Education in South Western Nigeria. Information resources are central to teachers' education. It provides lecturers/teachers access to information that enhances research and ...

  14. Discipline, availability of electronic resources and the use of Finnish National Electronic Library - FinELib

    Directory of Open Access Journals (Sweden)

    Sanna Torma

    2004-01-01

    Full Text Available This study elaborated relations between digital library use by university faculty, users' discipline and the availability of key resources in the Finnish National Electronic Library (FinELib, Finnish national digital library, by using nationwide representative survey data. The results show that the perceived availability of key electronic resources by researchers in FinELib was a stronger predictor of the frequency and purpose of use of its services than users' discipline. Regardless of discipline a good perceived provision of central resources led to a more frequent use of FinELib. The satisfaction with the services did not vary with the discipline, but with the perceived availability of resources.

  15. The Role of the Acquisitions Librarian in Electronic Resources Management

    Science.gov (United States)

    Pomerantz, Sarah B.

    2010-01-01

    With the ongoing shift to electronic formats for library resources, acquisitions librarians, like the rest of the profession, must adapt to the rapidly changing landscape of electronic resources by keeping up with trends and mastering new skills related to digital publishing, technology, and licensing. The author sought to know what roles…

  16. Identity Crises in Love and at Work: Dispositional Optimism as a Durable Personal Resource

    Science.gov (United States)

    Andersson, Matthew A.

    2012-01-01

    Using the 2004 General Social Survey (N = 453), the identity stress process is investigated in terms of crises in intimate relationships and at the workplace. I discuss dispositional optimism as a psychological resource that is relatively independent of the situation and the self, making it ideal for structurally disadvantaged actors and for…

  17. Analysis of Pedagogic Potential of Electronic Educational Resources with Elements of Autodidactics

    Directory of Open Access Journals (Sweden)

    Igor A.

    2018-03-01

    Full Text Available Introduction: in recent years didactic properties of electronic educational resources undergo considerable changes, nevertheless, the question of studying of such complete phenomenon as “an electronic educational resource with autodidactics elements” remains open, despite sufficient scientific base of researches of the terms making this concept. Article purpose – determination of essence of electronic educational resources with autodidactics elements. Materials and Methods: the main method of research was the theoretical analysis of the pedagogical and psychological literature on the problem under study. We used the theoretical (analysis, synthesis, comparison and generalization methods, the method of interpretation, pedagogical modeling, and empirical methods (observation, testing, conversation, interview, analysis of students’ performance, pedagogical experiment, peer review. Results: we detected the advantages of electronic educational resources in comparison with traditional ones. The concept of autodidactics as applied to the subject of research is considered. Properties of electronic educational resources with a linear and nonlinear principle of construction are studied.The influence of the principle of construction on the development of the learners’ qualities is shown. We formulated an integral definition of electronic educational resources with elements of autodidactics, namely, the variability, adaptivity and cyclicity of training. A model of the teaching-learning process with electronic educational resources is developed. Discussion and Conclusions: further development of a problem will allow to define whether electronic educational resources with autodidactics elements pedagogical potential for realization of educational and self-educational activity of teachers have, to modify technological procedures taking into account age features of students, their specialties and features of the organization of process of training of

  18. Preservation and conservation of electronic information resources of ...

    African Journals Online (AJOL)

    The major holdings of the broadcast libraries of the Nigerian Television Authority (NTA) are electronic information resources; therefore, providing safe places for general management of these resources have aroused interest in the industry in Nigeria for sometimes. The need to study the preservation and conservation of ...

  19. Building an electronic resource collection a practical guide

    CERN Document Server

    Lee, Stuart D

    2004-01-01

    This practical book guides information professionals step-by-step through building and managing an electronic resource collection. It outlines the range of electronic products currently available in abstracting and indexing, bibliographic, and other services and then describes how to effectively select, evaluate and purchase them.

  20. Analysis of Human Resources Management Strategy in China Electronic Commerce Enterprises

    Science.gov (United States)

    Shao, Fang

    The paper discussed electronic-commerce's influence on enterprise human resources management, proposed and proved the human resources management strategy which electronic commerce enterprise should adopt from recruitment strategy to training strategy, keeping talent strategy and other ways.

  1. Using XML Technologies to Organize Electronic Reference Resources

    OpenAIRE

    Huser, Vojtech; Del Fiol, Guilherme; Rocha, Roberto A.

    2005-01-01

    Provision of access to reference electronic resources to clinicians is becoming increasingly important. We have created a framework for librarians to manage access to these resources at an enterprise level, rather than at the individual hospital libraries. We describe initial project requirements, implementation details, and some preliminary results.

  2. Electronic Resources and Mission Creep: Reorganizing the Library for the Twenty-First Century

    Science.gov (United States)

    Stachokas, George

    2009-01-01

    The position of electronic resources librarian was created to serve as a specialist in the negotiation of license agreements for electronic resources, but mission creep has added more functions to the routine work of electronic resources such as cataloging, gathering information for collection development, and technical support. As electronic…

  3. Electronic Resources Management System: Recommendation Report 2017

    KAUST Repository

    Ramli, Rindra M.

    2017-01-01

    This recommendation report provides an overview of the selection process for the new Electronic Resources Management System. The library has decided to move away from Innovative Interfaces Millennium ERM module. The library reviewed 3 system

  4. The Internet School of Medicine: use of electronic resources by medical trainees and the reliability of those resources.

    Science.gov (United States)

    Egle, Jonathan P; Smeenge, David M; Kassem, Kamal M; Mittal, Vijay K

    2015-01-01

    Electronic sources of medical information are plentiful, and numerous studies have demonstrated the use of the Internet by patients and the variable reliability of these sources. Studies have investigated neither the use of web-based resources by residents, nor the reliability of the information available on these websites. A web-based survey was distributed to surgical residents in Michigan and third- and fourth-year medical students at an American allopathic and osteopathic medical school and a Caribbean allopathic school regarding their preferred sources of medical information in various situations. A set of 254 queries simulating those faced by medical trainees on rounds, on a written examination, or during patient care was developed. The top 5 electronic resources cited by the trainees were evaluated for their ability to answer these questions accurately, using standard textbooks as the point of reference. The respondents reported a wide variety of overall preferred resources. Most of the 73 responding medical trainees favored textbooks or board review books for prolonged studying, but electronic resources are frequently used for quick studying, clinical decision-making questions, and medication queries. The most commonly used electronic resources were UpToDate, Google, Medscape, Wikipedia, and Epocrates. UpToDate and Epocrates had the highest percentage of correct answers (47%) and Wikipedia had the lowest (26%). Epocrates also had the highest percentage of wrong answers (30%), whereas Google had the lowest percentage (18%). All resources had a significant number of questions that they were unable to answer. Though hardcopy books have not been completely replaced by electronic resources, more than half of medical students and nearly half of residents prefer web-based sources of information. For quick questions and studying, both groups prefer Internet sources. However, the most commonly used electronic resources fail to answer clinical queries more than half

  5. ANALYTICAL REVIEW OF ELECTRONIC RESOURCES FOR THE STUDY OF LATIN

    Directory of Open Access Journals (Sweden)

    Olena Yu. Balalaieva

    2014-04-01

    Full Text Available The article investigates the current state of development of e-learning content in the Latin language. It is noted that the introduction of ICT in the educational space has expanded the possibility of studying Latin, opened access to digital libraries resources, made it possible to use scientific and educational potential and teaching Latin best practices of world's leading universities. A review of foreign and Ukrainian information resources and electronic editions for the study of Latin is given. Much attention was paid to the didactic potential of local and online multimedia courses of Latin, electronic textbooks, workbooks of interactive tests and exercises, various dictionaries and software translators, databases and digital libraries. Based on analysis of the world market of educational services and products the main trends in the development of information resources and electronic books are examined. It was found that multimedia courses with interactive exercises or workbooks with interactive tests, online dictionaries and translators are the most widely represented and demanded. The noticeable lagging of Ukrainian education and computer linguistics in quantitative and qualitative measures in this industry is established. The obvious drawback of existing Ukrainian resources and electronic editions for the study of Latin is their noninteractive nature. The prospects of e-learning content in Latin in Ukraine are outlined.

  6. Elektronik Bilgi Kaynaklarının Seçimi / Selection of Electronic Information Resources

    Directory of Open Access Journals (Sweden)

    Pınar Al

    2003-04-01

    Full Text Available For many years, library users have used only from the printed media in order to get the information that they have needed. Today with the widespread use of the Web and the addition of electronic information resources to library collections, the use of information in the electronic environment as well as in printed media is started to be used. In time, such types of information resources as, electronic journals, electronic books, electronic encyclopedias, electronic dictionaries and electronic theses have been added to library collections. In this study, selection criteria that can be used for electronic information resources are discussed and suggestions are provided for libraries that try to select electronic information resources for their collections.

  7. Access to electronic resources by visually impaired people

    Directory of Open Access Journals (Sweden)

    Jenny Craven

    2003-01-01

    Full Text Available Research into access to electronic resources by visually impaired people undertaken by the Centre for Research in Library and Information Management has not only explored the accessibility of websites and levels of awareness in providing websites that adhere to design for all principles, but has sought to enhance understanding of information seeking behaviour of blind and visually impaired people when using digital resources.

  8. Library training to promote electronic resource usage

    DEFF Research Database (Denmark)

    Frandsen, Tove Faber; Tibyampansha, Dativa; Ibrahim, Glory

    2017-01-01

    Purpose: Increasing the usage of electronic resources is an issue of concern for many libraries all over the world. Several studies stress the importance of information literacy and instruction in order to increase the usage. Design/methodology/approach: The present article presents the results...

  9. Why and How to Measure the Use of Electronic Resources

    Directory of Open Access Journals (Sweden)

    Jean Bernon

    2008-11-01

    Full Text Available A complete overview of library activity implies a complete and reliable measurement of the use of both electronic resources and printed materials. This measurement is based on three sets of definitions: document types, use types and user types. There is a common model of definitions for printed materials, but a lot of questions and technical issues remain for electronic resources. In 2006 a French national working group studied these questions. It relied on the COUNTER standard, but found it insufficient and pointed out the need for local tools such as web markers and deep analysis of proxy logs. Within the French national consortium COUPERIN, a new working group is testing ERMS, SUSHI standards, Shibboleth authentication, along with COUNTER standards, to improve the counting of the electronic resources use. At this stage this counting is insufficient and its improvement will be a European challenge for the future.

  10. Euler European Libraries and Electronic Resources in Mathematical Sciences

    CERN Document Server

    The Euler Project. Karlsruhe

    The European Libraries and Electronic Resources (EULER) Project in Mathematical Sciences provides the EulerService site for searching out "mathematical resources such as books, pre-prints, web-pages, abstracts, proceedings, serials, technical reports preprints) and NetLab (for Internet resources), this outstanding engine is capable of simple, full, and refined searches. It also offers a browse option, which responds to entries in the author, keyword, and title fields. Further information about the Project is provided at the EULER homepage.

  11. Effects of Electronic Information Resources Skills Training for Lecturers on Pedagogical Practices and Research Productivity

    Science.gov (United States)

    Bhukuvhani, Crispen; Chiparausha, Blessing; Zuvalinyenga, Dorcas

    2012-01-01

    Lecturers use various electronic resources at different frequencies. The university library's information literacy skills workshops and seminars are the main sources of knowledge of accessing electronic resources. The use of electronic resources can be said to have positively affected lecturers' pedagogical practices and their work in general. The…

  12. Elective Identities, (Culture, Identization and Integration)

    NARCIS (Netherlands)

    S.J. Magala (Slawomir)

    2002-01-01

    textabstractMost of contemporary individual and social identities (constructed with societal, cultural and technological resources) are radically autonomous, nomadic and virtual - i.e. they are de-traditionalized, open to negotiation and not based on a single interpretation of a tradition.

  13. Electronic Commerce Resource Centers. An Industry--University Partnership.

    Science.gov (United States)

    Gulledge, Thomas R.; Sommer, Rainer; Tarimcilar, M. Murat

    1999-01-01

    Electronic Commerce Resource Centers focus on transferring emerging technologies to small businesses through university/industry partnerships. Successful implementation hinges on a strategic operating plan, creation of measurable value for customers, investment in customer-targeted training, and measurement of performance outputs. (SK)

  14. USE OF ELECTRONIC EDUCATIONAL RESOURCES WHEN TRAINING IN WORK WITH SPREADSHEETS

    Directory of Open Access Journals (Sweden)

    Х А Гербеков

    2017-12-01

    Full Text Available Today the tools for maintaining training courses based on opportunities of information and communication technologies are developed. Practically in all directions of preparation and on all subject matters electronic textbook and self-instruction manuals are created. Nevertheless the industry of computer educational and methodical materials actively develops and gets more and more areas of development and introduction. In this regard more and more urgent is a problem of development of the electronic educational resources adequate to modern educational requirements. Creation and the organization of training courses with use of electronic educational resources in particular on the basis of Internet technologies remains a difficult methodical task.In article the questions connected with development of electronic educational resources for use when studying the substantial line “Information technologies” of a school course of informatics in particular for studying of spreadsheets are considered. Also the analysis of maintenance of a school course and the unified state examination from the point of view of representation of task in him corresponding to the substantial line of studying “Information technologies” on mastering technology of information processing in spreadsheets and the methods of visualization given by means of charts and schedules is carried out.

  15. Disability identity development: A systematic review of the literature.

    Science.gov (United States)

    Forber-Pratt, Anjali J; Lyew, Dominique A; Mueller, Carlyn; Samples, Leah B

    2017-05-01

    The purpose of this systematic review was to synthesize existing empirical research on disability identity development. This review is organized to present the demographics of participants and types of disabilities represented in the existing data, measures of disability identity development and theoretical models of disability identity development. Electronic databases (EBSCO, PsycINFO, ERIC, and Sociological Abstracts) were searched for all peer reviewed empirical studies published between 1980 and 2017. Articles were excluded if they were theoretical and/or did not include participants with disabilities, or focused on a disability-specific community identity rather than general disability identity. Empirical articles (N = 41) were included in the final review. An overwhelming majority (75.6%) were qualitative in nature, with only 22% of the articles reviewed being quantitative and only 1 that utilized a mixed methods design. The results suggest that disability identity can be considered a unique phenomenon that shapes persons' ways of seeing themselves, their bodies, and their way of interacting with the world. Disability identity development has the potential to become an important factor in developing effective interventions and/or therapies. Identity development is a fundamentally social process, and identities are formed through mirroring, modeling, and recognition through available identity resources, and so it is imperative that able-bodied professionals (i.e., rehabilitation professionals, therapists, teachers and caregivers) working with individuals with disabilities become aware of this developmental process to be able to better support individuals along this journey. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  16. 'Just like the fact that I'm Syrian like you are Scottish': ascribing interviewer identities as a resource in cross-cultural interaction.

    Science.gov (United States)

    Widdicombe, Sue

    2015-06-01

    Interviews are used as a research tool in numerous studies of identity. They have also been studied as social interactions in themselves. From this perspective, analysts have looked at the ways interviews generate identities, and how both parties work to fulfill the associated roles and expectations (e.g., the interviewer's neutrality). Interviewers thus become a more 'visible' participant, and several studies examine the influence of their multiple category memberships on the interaction. This paper aims to extend these insights to the insider/outsider dilemma in interviews, by looking at how participants make relevant and use interviewer identities as a resource. The data comes from a corpus of interviews with Syrian people on identity conducted by a British interviewer. The analysis shows how the interviewer's identity as a sojourner and stranger was used to warrant positive assessments of national character; her national identity was invoked to normalize national feelings; her identity as Christian used to characterize religious identity as inherent; and her identity as Westerner was used to legitimate complaints. I discuss implications for interviews on identity and identity within interviews, and argue that this approach is a thoroughly empirical way to address the shifting, practical ascription of insider-outsider status to the interviewer. © 2014 The British Psychological Society.

  17. Analytical Study of Usage of Electronic Information Resources at Pharmacopoeial Libraries in India

    Directory of Open Access Journals (Sweden)

    Sunil Tyagi

    2014-02-01

    Full Text Available The objective of this study is to know the rate and purpose of the use of e-resource by the scientists at pharmacopoeial libraries in India. Among other things, this study examined the preferences of the scientists toward printed books and journals, electronic information resources, and pattern of using e-resources. Non-probability sampling specially accidental and purposive technique was applied in the collection of primary data through administration of user questionnaire. The sample respondents chosen for the study consists of principle scientific officer, senior scientific officer, scientific officer, and scientific assistant of different division of the laboratories, namely, research and development, pharmaceutical chemistry, pharmacovigilance, pharmacology, pharmacogonosy, and microbiology. The findings of the study reveal the personal experiences and perceptions they have had on practice and research activity using e-resource. The major findings indicate that of the total anticipated participants, 78% indicated that they perceived the ability to use computer for electronic information resources. The data analysis shows that all the scientists belonging to the pharmacopoeial libraries used electronic information resources to address issues relating to drug indexes and compendia, monographs, drugs obtained through online databases, e-journals, and the Internet sources—especially polices by regulatory agencies, contacts, drug promotional literature, and standards.

  18. Page 170 Use of Electronic Resources by Undergraduates in Two ...

    African Journals Online (AJOL)

    undergraduate students use electronic resources such as NUC virtual library, HINARI, ... web pages articles from magazines, encyclopedias, pamphlets and other .... of Nigerian university libraries have Internet connectivity, some of the system.

  19. Resources to cope with stigma related to HIV status, gender identity, and sexual orientation in gay men and transgender women.

    Science.gov (United States)

    Arístegui, Inés; Radusky, Pablo D; Zalazar, Virginia; Lucas, Mar; Sued, Omar

    2018-02-01

    The stigma related to HIV status, gender identity, and sexual orientation has negative implications for the quality of life of individuals. A qualitative study was conducted to explore the resources that these stigmatized groups recognize as tools to cope with stigma and maintain their psychological well-being. Four focus groups were conducted with gay men and transgender women divided by HIV status. A thematic analysis revealed that individual, interpersonal, and institutional resources are commonly recognized as coping resources. This article discusses the importance of enhancing self-acceptance, social support, and a legal framework that legitimizes these groups as right holders.

  20. Scheduling preemptable jobs on identical processors under varying availability of an additional continuous resource

    Directory of Open Access Journals (Sweden)

    Różycki Rafał

    2016-09-01

    Full Text Available In this work we consider a problem of scheduling preemptable, independent jobs, characterized by the fact that their processing speeds depend on the amounts of a continuous, renewable resource allocated to jobs at a time. Jobs are scheduled on parallel, identical machines, with the criterion of minimization of the schedule length. Since two categories of resources occur in the problem: discrete (set of machines and continuous, it is generally called a discrete-continuous scheduling problem. The model studied in this paper allows the total available amount of the continuous resource to vary over time, which is a practically important generalization that has not been considered yet for discrete-continuous scheduling problems. For this model we give some properties of optimal schedules on a basis of which we propose a general methodology for solving the considered class of problems. The methodology uses a two-phase approach in which, firstly, an assignment of machines to jobs is defined and, secondly, for this assignment an optimal continuous resource allocation is found by solving an appropriate mathematical programming problem. In the approach various cases are considered, following from assumptions made on the form of the processing speed functions of jobs. For each case an iterative algorithm is designed, leading to an optimal solution in a finite number of steps.

  1. Model of e-learning with electronic educational resources of new generation

    Directory of Open Access Journals (Sweden)

    A. V. Loban

    2017-01-01

    Full Text Available Purpose of the article: improving of scientific and methodical base of the theory of the е-learning of variability. Methods used: conceptual and logical modeling of the е-learning of variability process with electronic educational resource of new generation and system analysis of the interconnection of the studied subject area, methods, didactics approaches and information and communication technologies means. Results: the formalization complex model of the е-learning of variability with electronic educational resource of new generation is developed, conditionally decomposed into three basic components: the formalization model of the course in the form of the thesaurusclassifier (“Author of e-resource”, the model of learning as management (“Coordination. Consultation. Control”, the learning model with the thesaurus-classifier (“Student”. Model “Author of e-resource” allows the student to achieve completeness, high degree of didactic elaboration and structuring of the studied material in triples of variants: modules of education information, practical task and control tasks; the result of the student’s (author’s of e-resource activity is the thesaurus-classifier. Model of learning as management is based on the principle of personal orientation of learning in computer environment and determines the logic of interaction between the lecturer and the student when determining the triple of variants individually for each student; organization of a dialogue between the lecturer and the student for consulting purposes; personal control of the student’s success (report generation and iterative search for the concept of the class assignment in the thesaurus-classifier before acquiring the required level of training. Model “Student” makes it possible to concretize the learning tasks in relation to the personality of the student and to the training level achieved; the assumption of the lecturer about the level of training of a

  2. A survey of the use of electronic scientific information resources among medical and dental students

    Directory of Open Access Journals (Sweden)

    Aarnio Matti

    2006-05-01

    Full Text Available Abstract Background To evaluate medical and dental students' utilization of electronic information resources. Methods A web survey sent to 837 students (49.9% responded. Results Twenty-four per cent of medical students and ninteen per cent of dental students searched MEDLINE 2+ times/month for study purposes, and thiry-two per cent and twenty-four per cent respectively for research. Full-text articles were used 2+ times/month by thirty-three per cent of medical and ten per cent of dental students. Twelve per cent of respondents never utilized either MEDLINE or full-text articles. In multivariate models, the information-searching skills among students were significantly associated with use of MEDLINE and full-text articles. Conclusion Use of electronic resources differs among students. Forty percent were non-users of full-text articles. Information-searching skills are correlated with the use of electronic resources, but the level of basic PC skills plays not a major role in using these resources. The student data shows that adequate training in information-searching skills will increase the use of electronic information resources.

  3. Access to electronic information resources by students of federal ...

    African Journals Online (AJOL)

    The paper discusses access to electronic information resources by students of Federal Colleges of Education in Eha-Amufu and Umunze. Descriptive survey design was used to investigate sample of 526 students. Sampling technique used was a Multi sampling technique. Data for the study were generated using ...

  4. Adoption and use of electronic information resources by medical ...

    African Journals Online (AJOL)

    This study investigated the adoption and use of electronic information resources by medical science students of the University of Benin. The descriptive survey research design was adopted for the study and 390 students provided the data. Data collected were analysed with descriptive Statistics(Simple percentage and ...

  5. Where Do Electronic Books Fit in the College Research Arsenal of Resources?

    Science.gov (United States)

    Barbier, Patricia

    2007-01-01

    Student use of electronic books has become an accepted supplement to traditional resources. Student use and satisfaction was monitored through an online course discussion board. Increased use of electronic books indicate this service is an accepted supplement to the print book collection.

  6. Strategic Planning for Electronic Resources Management: A Case Study at Gustavus Adolphus College

    Science.gov (United States)

    Hulseberg, Anna; Monson, Sarah

    2009-01-01

    Electronic resources, the tools we use to manage them, and the needs and expectations of our users are constantly evolving; at the same time, the roles, responsibilities, and workflow of the library staff who manage e-resources are also in flux. Recognizing a need to be more intentional and proactive about how we manage e-resources, the…

  7. REVIEW OF MOODLE PLUGINS FOR DESIGNING MULTIMEDIA ELECTRONIC EDUCATIONAL RESOURCES FROM LANGUAGE DISCIPLINES

    Directory of Open Access Journals (Sweden)

    Anton M. Avramchuk

    2015-09-01

    Full Text Available Today the problem of designing multimedia electronic educational resources from language disciplines in Moodle is very important. This system has a lot of different, powerful resources, plugins to facilitate the learning of students with language disciplines. This article presents an overview and comparative analysis of the five Moodle plugins for designing multimedia electronic educational resources from language disciplines. There have been considered their key features and functionality in order to choose the best for studying language disciplines in the Moodle. Plugins are compared by a group of experts according to the criteria: efficiency, functionality and easy use. For a comparative analysis of the plugins it is used the analytic hierarchy process.

  8. Modern ICT Tools: Online Electronic Resources Sharing Using Web ...

    African Journals Online (AJOL)

    Modern ICT Tools: Online Electronic Resources Sharing Using Web 2.0 and Its Implications For Library And Information Practice In Nigeria. ... The PDF file you selected should load here if your Web browser has a PDF reader plug-in installed (for example, a recent version of Adobe Acrobat Reader). If you would like more ...

  9. Saving Face and Group Identity

    DEFF Research Database (Denmark)

    Eriksson, Tor; Mao, Lei; Villeval, Marie-Claire

    2015-01-01

    their self- but also other group members' image. This behavior is frequent even in the absence of group identity. When group identity is more salient, individuals help regardless of whether the least performer is an in-group or an out-group. This suggests that saving others' face is a strong social norm.......Are people willing to sacrifice resources to save one's and others' face? In a laboratory experiment, we study whether individuals forego resources to avoid the public exposure of the least performer in their group. We show that a majority of individuals are willing to pay to preserve not only...

  10. 30 CFR 41.20 - Legal identity report.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 1 2010-07-01 2010-07-01 false Legal identity report. 41.20 Section 41.20... ADMINISTRATIVE REQUIREMENTS NOTIFICATION OF LEGAL IDENTITY Operator's Report to the Mine Safety and Health Administration § 41.20 Legal identity report. Each operator of a coal or other mine shall file notification of...

  11. THE MODEL OF LINGUISTIC TEACHERS’ COMPETENCY DEVELOPMENT ON DESIGNING MULTIMEDIA ELECTRONIC EDUCATIONAL RESOURCES IN THE MOODLE SYSTEM

    Directory of Open Access Journals (Sweden)

    Anton M. Avramchuk

    2017-10-01

    Full Text Available The article is devoted to the problem of developing the competency of teachers of language disciplines on designing multimedia electronic educational resources in the Moodle system. The concept of "the competence of teachers of language disciplines on designing multimedia electronic educational resources in the Moodle system" is justified and defined. Identified and characterized the components by which the levels of the competency development of teachers of language disciplines on designing multimedia electronic educational resources in the Moodle system should be assessed. Developed a model for the development of the competency of teachers of language disciplines on designing multimedia electronic educational resources in the Moodle system, which is based on the main scientific approaches, used in adult education, and consists of five blocks: target, informative, technological, diagnostic and effective.

  12. Exploring medical identity theft.

    Science.gov (United States)

    Mancilla, Desla; Moczygemba, Jackie

    2009-09-16

    The crime of medical identity theft is a growing concern in healthcare institutions. A mixed-method study design including a two-stage electronic survey, telephone survey follow-up, and on-site observations was used to evaluate current practices in admitting and registration departments to reduce the occurrence of medical identity theft. Survey participants were chief compliance officers in acute healthcare organizations and members of the Health Care Compliance Association. Study results indicate variance in whether or how patient identity is confirmed in healthcare settings. The findings of this study suggest that information systems need to be designed for more efficient identity management. Admitting and registration staff must be trained, and compliance with medical identity theft policies and procedures must be monitored. Finally, biometric identity management solutions should be considered for stronger patient identification verification.

  13. Developing Humanities Collections in the Digital Age: Exploring Humanities Faculty Engagement with Electronic and Print Resources

    Science.gov (United States)

    Kachaluba, Sarah Buck; Brady, Jessica Evans; Critten, Jessica

    2014-01-01

    This article is based on quantitative and qualitative research examining humanities scholars' understandings of the advantages and disadvantages of print versus electronic information resources. It explores how humanities' faculty members at Florida State University (FSU) use print and electronic resources, as well as how they perceive these…

  14. Electronic resource management systems a workflow approach

    CERN Document Server

    Anderson, Elsa K

    2014-01-01

    To get to the bottom of a successful approach to Electronic Resource Management (ERM), Anderson interviewed staff at 11 institutions about their ERM implementations. Among her conclusions, presented in this issue of Library Technology Reports, is that grasping the intricacies of your workflow-analyzing each step to reveal the gaps and problems-at the beginning is crucial to selecting and implementing an ERM. Whether the system will be used to fill a gap, aggregate critical data, or replace a tedious manual process, the best solution for your library depends on factors such as your current soft

  15. Electronic Resource Management System. Vernetzung von Lizenzinformationen

    Directory of Open Access Journals (Sweden)

    Michaela Selbach

    2014-12-01

    Full Text Available In den letzten zehn Jahren spielen elektronische Ressourcen im Bereich der Erwerbung eine zunehmend wichtige Rolle: Eindeutig lässt sich hier ein Wandel in den Bibliotheken (fort vom reinen Printbestand zu immer größeren E-Only-Beständen feststellen. Die stetig wachsende Menge an E-Ressourcen und deren Heterogenität stellt Bibliotheken vor die Herausforderung, die E-Ressourcen effizient zu verwalten. Nicht nur Bibliotheken, sondern auch verhandlungsführende Institutionen von Konsortial- und Allianzlizenzen benötigen ein geeignetes Instrument zur Verwaltung von Lizenzinformationen, welches den komplexen Anforderungen moderner E-Ressourcen gerecht wird. Die Deutsche Forschungsgemeinschaft (DFG unterstützt ein Projekt des Hochschulbibliothekszentrums des Landes Nordrhein-Westfalen (hbz, der Universitätsbibliothek Freiburg, der Verbundzentrale des Gemeinsamen Bibliotheksverbundes (GBV und der Universitätsbibliothek Frankfurt, in dem ein bundesweit verfügbares Electronic Ressource Managementsystem (ERMS aufgebaut werden soll. Ein solches ERMS soll auf Basis einer zentralen Knowledge Base eine einheitliche Nutzung von Daten zur Lizenzverwaltung elektronischer Ressourcen auf lokaler, regionaler und nationaler Ebene ermöglichen. Statistische Auswertungen, Rechteverwaltung für alle angeschlossenen Bibliotheken, kooperative Datenpflege sowie ein über standardisierte Schnittstellen geführter Datenaustausch stehen bei der Erarbeitung der Anforderungen ebenso im Fokus wie die Entwicklung eines Daten- und Funktionsmodells. In the last few years the importance of electronic resources in library acquisitions has increased significantly. There has been a shift from mere print holdings to both e- and print combinations and even e-only subscriptions. This shift poses a double challenge for libraries: On the one hand they have to provide their e-resource collections to library users in an appealing way, on the other hand they have to manage these

  16. The Electron Microscopy Outreach Program: A Web-based resource for research and education.

    Science.gov (United States)

    Sosinsky, G E; Baker, T S; Hand, G; Ellisman, M H

    1999-01-01

    We have developed a centralized World Wide Web (WWW)-based environment that serves as a resource of software tools and expertise for biological electron microscopy. A major focus is molecular electron microscopy, but the site also includes information and links on structural biology at all levels of resolution. This site serves to help integrate or link structural biology techniques in accordance with user needs. The WWW site, called the Electron Microscopy (EM) Outreach Program (URL: http://emoutreach.sdsc.edu), provides scientists with computational and educational tools for their research and edification. In particular, we have set up a centralized resource containing course notes, references, and links to image analysis and three-dimensional reconstruction software for investigators wanting to learn about EM techniques either within or outside of their fields of expertise. Copyright 1999 Academic Press.

  17. Technical Communicator: A New Model for the Electronic Resources Librarian?

    Science.gov (United States)

    Hulseberg, Anna

    2016-01-01

    This article explores whether technical communicator is a useful model for electronic resources (ER) librarians. The fields of ER librarianship and technical communication (TC) originated and continue to develop in relation to evolving technologies. A review of the literature reveals four common themes for ER librarianship and TC. While the…

  18. MODEL OF AN ELECTRONIC EDUCATIONAL RESOURCE OF NEW GENERATION

    Directory of Open Access Journals (Sweden)

    Anatoliy V. Loban

    2016-01-01

    Full Text Available The mathematical structure of the modular architecture of an electronic educational resource (EER of new generation, which allows to decompose the process of studying the subjects of the course at a hierarchically ordered set of data (knowledge and procedures for manipulating them, to determine the roles of participants of process of training of and technology the development and use of EOR in the study procrate.

  19. THE EFFECT OF MEDIA LITERACY ON THE SOCIAL IDENTITY OF VOLLEYBALL SPECTATORS THROUGH PERSONAL IDENTITY

    OpenAIRE

    Mahsa Nematzadeh

    2017-01-01

    This research aim was investigating the effect of media literacy on volleyball spectator's social identity through personal identity. The present study, psychologically, is divided in to 8 layers of view paradigm, the main type of applied research: deductive research approaches, quantity research strategies theories, field research tone, cross sectional survey methods, research objectives, description and finally data collection methods, library resource reviews, and questionnaires. The stati...

  20. Developing a workable teacher identity: Building and negotiating identity within a professional network

    Science.gov (United States)

    Rostock, Roseanne

    The challenge of attracting and retaining the next generation of teachers who are skilled and committed to meeting the growing demands of the profession is of increasing concern to researchers and policy makers, particularly since 45--50% of beginning teachers leave the profession within five years (Ingersoll & Smith, 2003). Reasons for such attrition include compensation, status and working conditions; however, there is growing evidence that a critical factor in new teacher retention hinges on teachers' ability to accomplish the difficult task of forming a workable professional identity in the midst of competing discourses about teaching (Alsup, 2006; Britzman, 2003). There is little research on professional identity development among those beginning teachers at highest risk for attrition (secondary math and science teachers, and those with strong academic backgrounds). This study explores the professional identity development of early-career math and science teachers who are part of the Knowles Science Teaching Foundation's (KSTF) teaching fellowship program, an external support network that aims to address many of the issues leading to high attrition among this particular population of teachers. Using narrative research methods, I examine three case studies of beginning teachers, exploring how they construct professional identity in relation to various discourse communities and negotiate tensions across multiple discourses. The cases identify both dominant discourses and counter-discourses that the teachers draw upon for important identity development resources. They also demonstrate that the way a teacher manages tensions across competing discourses is important to how well one can negotiate a workable professional identity. In particular, they emphasize the importance of engaging in borderland discourses (Gee, 1996) as a way of taking agency in one's own identity development as well as in transforming one's discourse communities. These cases shed light on how

  1. Narrative as resource for the display of self and identity: The narrative construction of an oppositional identity*

    Directory of Open Access Journals (Sweden)

    Alba Lucy Guerrero

    2011-11-01

    Full Text Available Narrative is a system of understanding that we use to construct and express meaning in our daily lives. The stories we narrate are not justresources for the development and presentation of the individual self; they allow us to see how identity is constructed within social and culturalworlds (Bruner, 1990. Schools and communities play a powerful role in shaping students identities; the ways in which stories are told and theidentities they create are influenced by the environment in which they take place. In this paper, by using excerpts from a conversation I hadwith a High School student in an urban school in Bogotá, I will discuss how narrative analysis can be used to understand the way studentsconstruct their identities within their schools and communities. First, I will present the theoretical contexts linking narrative with self-construction.Next, I will discuss the methodological implications in the process of collecting and representing experiences highlighting the possibilities ofnarrative to make visible the construction of identities. Then pieces of a narrative told in a research interview will be analyzed illustrating differentapproaches of narrative analysis. The paper will conclude with a section that outlines the implications of using narrative in educational research.

  2. Male Archetypes as Resources for Homosexual Identity Development in Gay Men.

    Science.gov (United States)

    McFarland, William P.; McMahon, Timothy R.

    1999-01-01

    The male archetypes of king, lover, magician, and warrior provide important and timeless insights into mature masculine qualities. Homosexual identity development models describe tasks that confront gay men as they move through the identity development process. Proposes that by understanding the metaphor of male archetypes, gay men will discover…

  3. Playing It Safe: Identity Management and Single Sign-On

    Science.gov (United States)

    Alawneh, John

    2012-01-01

    Whenever thousands of users need to connect seamlessly to a vast number of online resources, identity management (IDM) becomes a critical capability. Although several products on the market can deliver a robust identity management solution, there is no one-size-fits-all. Identity management requires business processes and a supporting…

  4. GUIDELINES FOR EVALUATION OF PSYCHOLOGICAL AND PEDAGOGICAL QUALITY CHARACTERISTICS OF ELECTRONIC EDUCATIONAL RESOURCES

    Directory of Open Access Journals (Sweden)

    Galina P. Lavrentieva

    2014-05-01

    Full Text Available The article highlights the causes of insufficient effective use of electronic learning resources and sets out the guidelines on ways to solve the aforementioned problems. The set of didactic, methodical, psychological, pedagogical, design and ergonomic quality requirements is considered for evaluation, selection and application of information and communication technologies in the educational process. The most appropriate mechanisms for the ICT introduction into the learning process are disclosed as it should meet the specific learning needs of the student and the objectives of the educational process. The guidance for psycho-educational assessment of quality of electronic educational resources is provided. It is argued that the effectiveness of the ICT use is to be improved by means of quality evaluation mechanisms involved into the educational process.

  5. Investigating of the effect of entrepreneurial orientations on formation of entrepreneurial identity

    Directory of Open Access Journals (Sweden)

    Manoochehr Parsian

    2016-10-01

    Full Text Available In today’s changing world, success belongs to the communities and organizations that make a significant relationship between scarce resources and capabilities of management and entrepreneurship of their human resource. In other words, societies and the organizations can move forward in the development path that, with creating the necessary conditions, equip their human resources to productive entrepreneurial knowledge and skills to conduct other organizations and community resources to create value and achieve the development, management. Formation of entrepreneurial identity plays an important role for the development of the entrepreneurial spirit in society. In this paper, given the importance of entrepreneurial identity, the role of entrepreneurial orientations based on Lampkin and Dess (1996 [Lumpkin, G. T., & Dess, G. G. (1996. Clarifying the entrepreneurial orientation construct and linking it to performance. Academy of Management Review, 21(1, 135-172.] is investigated on entrepreneurial identity of the municipality of Qom using a questionnaire consists of 18 items. The results show entrepreneurial orientation influences significantly on entrepreneurial identity.

  6. Availability, Use and Constraints to Use of Electronic Information Resources by Postgraduates Students at the University of Ibadan

    Directory of Open Access Journals (Sweden)

    Dare Samuel Adeleke

    2017-12-01

    Full Text Available Availability, awareness and use of electronic resources provide access to authoritative, reliable, accurate and timely access to information. The use of electronic information resources (EIRs can enable innovation in teaching and increase timeliness in research of postgraduate students which will eventual result into encouragement of the expected research-led enquiry in this digital age. The study adopted a descriptive survey design. Samples of 300 of postgraduate students within seven out 13 Faculties were randomly selected. Data were collected using questionnaire designed to elicit response from respondents and data were analyzed using descriptive statistics methods percentages, mean, and standard deviation. Results indicated that internet was ranked most available and used in the university. Low level of usage of electronic resources, in particular, full texts data bases is linked to a number of constraints: Interrupted power supply was ranked highest among other factors as speed and capacity of computers, retrieval of records with high recall and low precision, retrieving records relevant to information need, lack of knowledge of search techniques to retrieve information effectively, non possession of requisite IT skills and problems accessing the internet. The study recommended that usage of electronic resources be made compulsory, intensifying awareness campaigns concerning the availability, training on use of electronic resources and the problem of power outage be addressed.

  7. A Study on Developing Evaluation Criteria for Electronic Resources in Evaluation Indicators of Libraries

    Science.gov (United States)

    Noh, Younghee

    2010-01-01

    This study aimed to improve the current state of electronic resource evaluation in libraries. While the use of Web DB, e-book, e-journal, and other e-resources such as CD-ROM, DVD, and micro materials is increasing in libraries, their use is not comprehensively factored into the general evaluation of libraries and may diminish the reliability of…

  8. Rethinking social identity theory in international encounters:

    DEFF Research Database (Denmark)

    Lauring, Jakob

    2008-01-01

    In a globalized business environment, interaction across linguistic boundaries is becoming a normal part of everyday life. In these encounters language differences may affect the formation of social identities among organization members. While studies based on Social Identity Theory perceive...... the link between identity and language to be linear, this article takes a different approach. By drawing on anthropological theories on ethnic identity it is argued that the relation between language and social identity is negotiated in interaction. In the empirical analysis the article focuses...... on the encounter between expatriates and local employees of a Danish subsidiary in England. The findings show that identity making may be actualized by competition for resources and recognition. This can be done by investing certain objects such as the symbolic application of language with certain identifications...

  9. Identity transformation

    DEFF Research Database (Denmark)

    Neergaard, Helle; Robinson, Sarah; Jones, Sally

    , as well as the resources they have when they come to the classroom. It also incorporates perspectives from (ii) transformational learning and explores the concept of (iii) nudging from a pedagogical viewpoint, proposing it as an important tool in entrepreneurship education. The study incorporates......This paper develops the concept of ‘pedagogical nudging’ and examines four interventions in an entrepreneurship classroom and the potential it has for student identity transformation. Pedagogical nudging is positioned as a tool, which in the hands of a reflective, professional......) assists students in straddling the divide between identities, the emotions and tensions this elicits, and (iv) transform student understanding. We extend nudging theory into a new territory. Pedagogical nudging techniques may be able to unlock doors and bring our students beyond the unacknowledged...

  10. Understanding family dynasty: Nurturing the corporate identity across generations

    Directory of Open Access Journals (Sweden)

    Nemilentsev, M.

    2010-01-01

    Full Text Available This study aims to analyse the Ahlstrom annual reports. The content analysis contributes to family business corporate identity. According to the results family business corporate identity is based both on history and on the future. Human resource management, customer relationships, high quality, and also family ownership reflect corporate identity in large family corporations. Modern family business corporate identity is based on continuously developing the business concept and its core competency. Meeting the needs of customers and technical quality standards combined with upgrading and developing the business idea characterises family business corporate identity.

  11. THE MODEL OF LINGUISTIC TEACHERS’ COMPETENCY DEVELOPMENT ON DESIGNING MULTIMEDIA ELECTRONIC EDUCATIONAL RESOURCES IN THE MOODLE SYSTEM

    OpenAIRE

    Anton M. Avramchuk

    2017-01-01

    The article is devoted to the problem of developing the competency of teachers of language disciplines on designing multimedia electronic educational resources in the Moodle system. The concept of "the competence of teachers of language disciplines on designing multimedia electronic educational resources in the Moodle system" is justified and defined. Identified and characterized the components by which the levels of the competency development of teachers of language disciplines on designing ...

  12. Determining the level of awareness of the physicians in using the variety of electronic information resources and the effecting factors.

    Science.gov (United States)

    Papi, Ahmad; Ghazavi, Roghayeh; Moradi, Salimeh

    2015-01-01

    Understanding of the medical society's from the types of information resources for quick and easy access to information is an imperative task in medical researches and management of the treatment. The present study was aimed to determine the level of awareness of the physicians in using various electronic information resources and the factors affecting it. This study was a descriptive survey. The data collection tool was a researcher-made questionnaire. The study population included all the physicians and specialty physicians of the teaching hospitals affiliated to Isfahan University of Medical Sciences and numbered 350. The sample size based on Morgan's formula was set at 180. The content validity of the tool was confirmed by the library and information professionals and the reliability was 95%. Descriptive statistics were used including the SPSS software version 19. On reviewing the need of the physicians to obtain the information on several occasions, the need for information in conducting the researches was reported by the maximum number of physicians (91.9%) and the usage of information resources, especially the electronic resources, formed 65.4% as the highest rate with regard to meeting the information needs of the physicians. Among the electronic information databases, the maximum awareness was related to Medline with 86.5%. Among the various electronic information resources, the highest awareness (43.3%) was related to the E-journals. The highest usage (36%) was also from the same source. The studied physicians considered the most effective deterrent in the use of electronic information resources as being too busy and lack of time. Despite the importance of electronic information resources for the physician's community, there was no comprehensive knowledge of these resources. This can lead to less usage of these resources. Therefore, careful planning is necessary in the hospital libraries in order to introduce the facilities and full capabilities of the

  13. Managing Selection for Electronic Resources: Kent State University Develops a New System to Automate Selection

    Science.gov (United States)

    Downey, Kay

    2012-01-01

    Kent State University has developed a centralized system that manages the communication and work related to the review and selection of commercially available electronic resources. It is an automated system that tracks the review process, provides selectors with price and trial information, and compiles reviewers' feedback about the resource. It…

  14. End-of-life resource recovery from emerging electronic products

    DEFF Research Database (Denmark)

    Parajuly, Keshav; Habib, Komal; Cimpan, Ciprian

    2016-01-01

    Integrating product design with appropriate end-of-life (EoL) processing is widely recognized to have huge potentials in improving resource recovery from electronic products. In this study, we investigate both the product characteristics and EoL processing of robotic vacuum cleaner (RVC), as a case...... of emerging electronic product, in order to understand the recovery fate of different materials and its linkage to product design. Ten different brands of RVC were dismantled and their material composition and design profiles were studied. Another 125 RVCs (349 kg) were used for an experimental trial...... at a conventional ‘shred-and-separate’ type preprocessing plant in Denmark. A detailed material flow analysis was performed throughout the recycling chain. The results show a mismatch between product design and EoL processing, and the lack of practical implementation of ‘Design for EoL’ thinking. In the best...

  15. Use of electronic sales data to tailor nutrition education resources for an ethnically diverse population.

    Science.gov (United States)

    Eyles, H; Rodgers, A; Ni Mhurchu, C

    2010-02-01

    Nutrition education may be most effective when personally tailored. Individualised electronic supermarket sales data offer opportunities to tailor nutrition education using shopper's usual food purchases. The present study aimed to use individualised electronic supermarket sales data to tailor nutrition resources for an ethnically diverse population in a large supermarket intervention trial in New Zealand. Culturally appropriate nutrition education resources (i.e. messages and shopping lists) were developed with the target population (through two sets of focus groups) and ethnic researchers. A nutrient database of supermarket products was developed using retrospective sales data and linked to participant sales to allow tailoring by usual food purchases. Modified Heart Foundation Tick criteria were used to identify 'healthier' products in the database suitable for promotion in the resources. Rules were developed to create a monthly report listing the tailored and culturally targeted messages to be sent to each participant, and to produce automated, tailored shopping lists. Culturally targeted nutrition messages (n = 864) and shopping lists (n = 3 formats) were developed. The food and nutrient database (n = 3000 top-selling products) was created using 12 months of retrospective sales data, and comprised 60%'healthier' products. Three months of baseline sales data were used to determine usual food purchases. Tailored resources were successfully mailed to 123 Māori, 52 Pacific and 346 non-Māori non-Pacific participants over the 6-month trial intervention period. Electronic supermarket sales data can be used to tailor nutrition education resources for a large number of ethnically diverse supermarket shoppers.

  16. Some exact identities connecting one- and two-particle Green's functions in spin-orbit coupling systems

    International Nuclear Information System (INIS)

    Yang Huatong

    2007-01-01

    Some exact identities connecting one- and two-particle Green's functions in the presence of spin-orbit coupling have been derived. These identities are similar to the Ward identity in usual quantum transport theory of electrons. A satisfying approximate calculation of the spin transport in spin-orbit coupling system should also preserve these identities, just as the Ward identities should be remained in the usual electronic transport theory

  17. A study of identity construction in political discourse

    OpenAIRE

    Qaiwer, Shatha Naiyf

    2016-01-01

    This thesis interrogates the construction of identity and self-presentation strategies in the discourse of the current President of the United States of America, Barack Hussein Obama. The study seeks to answer questions about how the President constructs the various identities evident in his discourse, what kinds of resources are drawn upon, and how the resulting identities contribute to gain the support of the audience and the progression of political discourse in general. The present s...

  18. Preferred names, preferred pronouns, and gender identity in the electronic medical record and laboratory information system: Is pathology ready?

    Directory of Open Access Journals (Sweden)

    Katherine L Imborek

    2017-01-01

    Full Text Available Background: Electronic medical records (EMRs and laboratory information systems (LISs commonly utilize patient identifiers such as legal name, sex, medical record number, and date of birth. There have been recommendations from some EMR working groups (e.g., the World Professional Association for Transgender Health to include preferred name, pronoun preference, assigned sex at birth, and gender identity in the EMR. These practices are currently uncommon in the United States. There has been little published on the potential impact of these changes on pathology and LISs. Methods: We review the available literature and guidelines on the use of preferred name and gender identity on pathology, including data on changes in laboratory testing following gender transition treatments. We also describe pathology and clinical laboratory challenges in the implementation of preferred name at our institution. Results: Preferred name, pronoun preference, and gender identity have the most immediate impact on the areas of pathology with direct patient contact such as phlebotomy and transfusion medicine, both in terms of interaction with patients and policies for patient identification. Gender identity affects the regulation and policies within transfusion medicine including blood donor risk assessment and eligibility. There are limited studies on the impact of gender transition treatments on laboratory tests, but multiple studies have demonstrated complex changes in chemistry and hematology tests. A broader challenge is that, even as EMRs add functionality, pathology computer systems (e.g., LIS, middleware, reference laboratory, and outreach interfaces may not have functionality to store or display preferred name and gender identity. Conclusions: Implementation of preferred name, pronoun preference, and gender identity presents multiple challenges and opportunities for pathology.

  19. Learning as Negotiating Identities

    DEFF Research Database (Denmark)

    Jørgensen, Kenneth Mølbjerg; Keller, Hanne Dauer

    The paper explores the contribution of Communities of Practice (COP) to Human Resource Development (HRD). Learning as negotiating identities captures the contribution of COP to HRD. In COP the development of practice happens through negotiation of meaning. The learning process also involves modes...... of belonging constitutive of our identities. We suggest that COP makes a significant contribution by linking learning and identification. This means that learning becomes much less instrumental and much more linked to fundamental questions of being. We argue that the COP-framework links learning with the issue...... of time - caught in the notion of trajectories of learning - that integrate past, present and future. Working with the learners' notion of time is significant because it is here that new learning possibilities become visible and meaningful for individuals. Further, we argue that the concept of identity...

  20. Availability, Level of Use and Constraints to Use of Electronic Resources by Law Lecturers in Public Universities in Nigeria

    Science.gov (United States)

    Amusa, Oyintola Isiaka; Atinmo, Morayo

    2016-01-01

    (Purpose) This study surveyed the level of availability, use and constraints to use of electronic resources among law lecturers in Nigeria. (Methodology) Five hundred and fifty-two law lecturers were surveyed and four hundred and forty-two responded. (Results) Data analysis revealed that the level of availability of electronic resources for the…

  1. A systematic review of portable electronic technology for health education in resource-limited settings.

    Science.gov (United States)

    McHenry, Megan S; Fischer, Lydia J; Chun, Yeona; Vreeman, Rachel C

    2017-08-01

    The objective of this study is to conduct a systematic review of the literature of how portable electronic technologies with offline functionality are perceived and used to provide health education in resource-limited settings. Three reviewers evaluated articles and performed a bibliography search to identify studies describing health education delivered by portable electronic device with offline functionality in low- or middle-income countries. Data extracted included: study population; study design and type of analysis; type of technology used; method of use; setting of technology use; impact on caregivers, patients, or overall health outcomes; and reported limitations. Searches yielded 5514 unique titles. Out of 75 critically reviewed full-text articles, 10 met inclusion criteria. Study locations included Botswana, Peru, Kenya, Thailand, Nigeria, India, Ghana, and Tanzania. Topics addressed included: development of healthcare worker training modules, clinical decision support tools, patient education tools, perceptions and usability of portable electronic technology, and comparisons of technologies and/or mobile applications. Studies primarily looked at the assessment of developed educational modules on trainee health knowledge, perceptions and usability of technology, and comparisons of technologies. Overall, studies reported positive results for portable electronic device-based health education, frequently reporting increased provider/patient knowledge, improved patient outcomes in both quality of care and management, increased provider comfort level with technology, and an environment characterized by increased levels of technology-based, informal learning situations. Negative assessments included high investment costs, lack of technical support, and fear of device theft. While the research is limited, portable electronic educational resources present promising avenues to increase access to effective health education in resource-limited settings, contingent

  2. Constructing literacy identity through social interaction

    DEFF Research Database (Denmark)

    Laursen, Helle Pia

    2014-01-01

    Constructing literacy identity through social interaction Helle Pia Laursen Department of Education, Aarhus University, Denmark In a discussion of policy claims about ”what literacy is” and ”what literacy does”, Bartlett (2008) notes that ” we should not consider literacy as an actor with some...... figured worlds as interactional resources when constructing their identity and generating meaning in their social worlds. The empirical basis for this paper consists of interviews with three children in year 1 a few months after school start focusing on the children’s perceptions of reading and writing...... are also shaped and undergo change through interactional negotiation, through which different possible social identity positions are tested....

  3. SAGES: a suite of freely-available software tools for electronic disease surveillance in resource-limited settings.

    Directory of Open Access Journals (Sweden)

    Sheri L Lewis

    Full Text Available Public health surveillance is undergoing a revolution driven by advances in the field of information technology. Many countries have experienced vast improvements in the collection, ingestion, analysis, visualization, and dissemination of public health data. Resource-limited countries have lagged behind due to challenges in information technology infrastructure, public health resources, and the costs of proprietary software. The Suite for Automated Global Electronic bioSurveillance (SAGES is a collection of modular, flexible, freely-available software tools for electronic disease surveillance in resource-limited settings. One or more SAGES tools may be used in concert with existing surveillance applications or the SAGES tools may be used en masse for an end-to-end biosurveillance capability. This flexibility allows for the development of an inexpensive, customized, and sustainable disease surveillance system. The ability to rapidly assess anomalous disease activity may lead to more efficient use of limited resources and better compliance with World Health Organization International Health Regulations.

  4. Use and Cost of Electronic Resources in Central Library of Ferdowsi University Based on E-metrics

    Directory of Open Access Journals (Sweden)

    Mohammad Reza Davarpanah

    2012-07-01

    Full Text Available The purpose of this study was to investigate the usage of electronic journals in Ferdowsi University, Iran based on e-metrics. The paper also aimed to emphasize the analysis of cost-benefit and the correlation between the journal impact factors and the usage data. In this study experiences of Ferdowsi University library on licensing and usage of electronic resources was evaluated by providing a cost-benefit analysis based on the cost and usage statistics of electronic resources. Vendor-provided data were also compared with local usage data. The usage data were collected by tracking web-based access locally, and by collecting vender-provided usage data. The data sources were one-year of vendor-supplied e-resource usage data such as Ebsco, Elsevier, Proquest, Emerald, Oxford and Springer and local usage data collected from the Ferdowsi university web server. The study found that actual usage values differ for vendor-provided data and local usage data. Elsevier has got the highest usage degree in searches, sessions and downloads. Statistics also showed that a small number of journals satisfy significant amount of use while the majority of journals were used less frequent and some were never used at all. The users preferred the PDF rather than HTML format. The data in subject profile suggested that the provided e-resources were best suited to certain subjects. There was no correlation between IF and electronic journal use. Monitoring the usage of e-resources gained increasing importance for acquisition policy and budget decisions. The article provided information about local metrics for the six surveyed vendors/publishers, e.g. usage trends, requests per package, cost per use as related to the scientific specialty of the university.

  5. Identity as constraint and resource in interest group evolution

    DEFF Research Database (Denmark)

    Halpin, Darren; Daugbjerg, Carsten

    2015-01-01

    , and the capability of challengers to demonstrate to key audiences that the ‘radical’ change is in some way consistent with the founding identity of the group. We demonstrate the application of this approach by examining a case of radical change—a shift in overall form—in a well-known UK interest group, the Soil...

  6. Building and Managing Electronic Resources in Digital Era in India with Special Reference to IUCAA and NIV, Pune: A Comparative Case Study

    Science.gov (United States)

    Sahu, H. K.; Singh, S. N.

    2015-04-01

    This paper discusses and presents a comparative case study of two libraries in Pune, India, Inter-University Centre for Astronomy and Astrophysics and Information Centre and Library of National Institute of Virology (Indian Council of Medical Research). It compares how both libraries have managed their e-resource collections, including acquisitions, subscriptions, and consortia arrangements, while also developing a collection of their own resources, including pre-prints and publications, video lectures, and other materials in an institutional repository. This study illustrates how difficult it is to manage electronic resources in a developing country like India, even though electronic resources are used more than print resources. Electronic resource management can be daunting, but with a systematic approach, various problems can be solved, and use of the materials will be enhanced.

  7. Resolution-of-identity stochastic time-dependent configuration interaction for dissipative electron dynamics in strong fields.

    Science.gov (United States)

    Klinkusch, Stefan; Tremblay, Jean Christophe

    2016-05-14

    In this contribution, we introduce a method for simulating dissipative, ultrafast many-electron dynamics in intense laser fields. The method is based on the norm-conserving stochastic unraveling of the dissipative Liouville-von Neumann equation in its Lindblad form. The N-electron wave functions sampling the density matrix are represented in the basis of singly excited configuration state functions. The interaction with an external laser field is treated variationally and the response of the electronic density is included to all orders in this basis. The coupling to an external environment is included via relaxation operators inducing transition between the configuration state functions. Single electron ionization is represented by irreversible transition operators from the ionizing states to an auxiliary continuum state. The method finds its efficiency in the representation of the operators in the interaction picture, where the resolution-of-identity is used to reduce the size of the Hamiltonian eigenstate basis. The zeroth-order eigenstates can be obtained either at the configuration interaction singles level or from a time-dependent density functional theory reference calculation. The latter offers an alternative to explicitly time-dependent density functional theory which has the advantage of remaining strictly valid for strong field excitations while improving the description of the correlation as compared to configuration interaction singles. The method is tested on a well-characterized toy system, the excitation of the low-lying charge transfer state in LiCN.

  8. Resolution-of-identity stochastic time-dependent configuration interaction for dissipative electron dynamics in strong fields

    Energy Technology Data Exchange (ETDEWEB)

    Klinkusch, Stefan; Tremblay, Jean Christophe [Institute for Chemistry and Biochemistry, Freie Universität Berlin, Takustr. 3, D-14195 Berlin (Germany)

    2016-05-14

    In this contribution, we introduce a method for simulating dissipative, ultrafast many-electron dynamics in intense laser fields. The method is based on the norm-conserving stochastic unraveling of the dissipative Liouville-von Neumann equation in its Lindblad form. The N-electron wave functions sampling the density matrix are represented in the basis of singly excited configuration state functions. The interaction with an external laser field is treated variationally and the response of the electronic density is included to all orders in this basis. The coupling to an external environment is included via relaxation operators inducing transition between the configuration state functions. Single electron ionization is represented by irreversible transition operators from the ionizing states to an auxiliary continuum state. The method finds its efficiency in the representation of the operators in the interaction picture, where the resolution-of-identity is used to reduce the size of the Hamiltonian eigenstate basis. The zeroth-order eigenstates can be obtained either at the configuration interaction singles level or from a time-dependent density functional theory reference calculation. The latter offers an alternative to explicitly time-dependent density functional theory which has the advantage of remaining strictly valid for strong field excitations while improving the description of the correlation as compared to configuration interaction singles. The method is tested on a well-characterized toy system, the excitation of the low-lying charge transfer state in LiCN.

  9. Using History in the Creation of Organizational Identity

    DEFF Research Database (Denmark)

    Zundel, Mike; Holt, Robin; Popp, Andrew

    2016-01-01

    theorize these two uses by drawing on speech act theory to develop a taxonomy of uses of history and to elaborate the opportunities and challenges that come when historical narratives are fashioned in the service of identity. We conclude with a further insight gained from speech act theory that suggests......Organizations frequently draw on history as a resource, for instance when attempting to establish or maintain identity claims. However, little has been done to review the advantages and problems of such use of history and it is not clear how using history impacts on the appreciation of history...... itself and, ultimately, on the insights that may be gained when engaging with the past. To begin to address these questions we distinguish two related uses of history as a resource for organizational identity: as a means of committing external audiences and, as a way of finding inward commitment. We...

  10. Balancing the Fair Treatment of Others While Preserving Group Identity and Autonomy.

    Science.gov (United States)

    Killen, Melanie; Elenbaas, Laura; Rutland, Adam

    2016-04-01

    Social exclusion and inclusion from groups, as well as the distribution of resources, are fundamental aspects of social life, and serve as sources of conflicts that bear on issues of fairness and equality, beginning in childhood. For the most part, research on social exclusion and allocation of resources has not focused on the issue of group membership. Yet, social exclusion from groups and the denial of resources reflect societal issues pertaining to social inequality and its counterpoint, fair treatment of others. Social inequality occurs when opportunities and resources are distributed unevenly in society, often through group norms about allocation that reflect socially defined categories of persons. This occurs at multiple levels of societal organization, from experiences of exclusion in childhood such as being left out of a play activity, to being denied access to resources as a member of a group. These situations extend to larger level experiences in the adult world concerning social exclusion from voting, for example, or participation in educational institutions. Thus, most decisions regarding social exclusion and the denial of resources involve considerations of group identity and group membership, implicitly or explicitly, which contribute to prejudice and bias, even though this has rarely been investigated in developmental science. Current research illustrating the role of group identity and autonomy regarding decision-making about social exclusion and the denial of resources is reviewed from the Social Reasoning Developmental model, one that integrates social domain theory and developmental social identity theories to investigate how children use moral, conventional, and psychological judgments to evaluate contexts reflecting group identity, group norms, and intergroup dynamics.

  11. Exploring the perceptions and experiences of community health workers using role identity theory.

    Science.gov (United States)

    Mlotshwa, Langelihle; Harris, Bronwyn; Schneider, Helen; Moshabela, Mosa

    2015-01-01

    Community health workers (CHWs) are an integral resource in many health systems, particularly in resource-poor settings. Their identities--'who' they are--play an important role in their hiring, training, and retention. We explore the perceptions, experiences, and identities of CHWs as they adopt a CHW role in rural South Africa, using 'role identity theory'. From April to December 2010, we conducted 18 semi-structured interviews with CHWs volunteering in non-governmental home-based care (HBC) organisations in one rural sub-district in South Africa. The role identity theory framework was used to understand the work of CHWs within their communities, addressing themes, such as entry into, and nature of, caring roles, organisational support, state resourcing, and community acceptability. A thematic content analysis was used to analyse the collected data. The study found that CHWs usually begin their 'caring work' before they formally join HBC organisations, by caring for children, neighbours, mothers, fathers, friends, and the community in some way. CHWs felt that becoming a health worker provided an elevated status within the community, but that it often led community members to believe they were able to control resources. The key role identities assumed by CHWs, as they sought to meet patients' and their own needs, were a complex mix of community 'insider', 'outsider', and 'broker'. Each of these role identities served as a unique way to position, from the CHW's perspective, themselves and the community, given the diversity of needs and expectations. These role identities reveal the tensions CHWs face as 'insider' members of the community and yet at times being treated as 'outsiders', who might be regarded with suspicion, and at the same time, appreciated for the resources that they might possess. Understanding role identities, and how best to support them, may contribute to strategies of retention and sustainability of CHW programmes, as their formalisation in

  12. Exploring the perceptions and experiences of community health workers using role identity theory

    Directory of Open Access Journals (Sweden)

    Langelihle Mlotshwa

    2015-09-01

    Full Text Available Background: Community health workers (CHWs are an integral resource in many health systems, particularly in resource-poor settings. Their identities – ‘who’ they are – play an important role in their hiring, training, and retention. We explore the perceptions, experiences, and identities of CHWs as they adopt a CHW role in rural South Africa, using ‘role identity theory’. Design: From April to December 2010, we conducted 18 semi-structured interviews with CHWs volunteering in non-governmental home-based care (HBC organisations in one rural sub-district in South Africa. The role identity theory framework was used to understand the work of CHWs within their communities, addressing themes, such as entry into, and nature of, caring roles, organisational support, state resourcing, and community acceptability. A thematic content analysis was used to analyse the collected data. Results: The study found that CHWs usually begin their ‘caring work’ before they formally join HBC organisations, by caring for children, neighbours, mothers, fathers, friends, and the community in some way. CHWs felt that becoming a health worker provided an elevated status within the community, but that it often led community members to believe they were able to control resources. The key role identities assumed by CHWs, as they sought to meet patients’ and their own needs, were a complex mix of community ‘insider’, ‘outsider’, and ‘broker’. Each of these role identities served as a unique way to position, from the CHW's perspective, themselves and the community, given the diversity of needs and expectations. Conclusions: These role identities reveal the tensions CHWs face as ‘insider’ members of the community and yet at times being treated as ‘outsiders’, who might be regarded with suspicion, and at the same time, appreciated for the resources that they might possess. Understanding role identities, and how best to support them, may

  13. Regional identity can add value to agricultural products

    Directory of Open Access Journals (Sweden)

    Bradley C. Christensen

    2015-04-01

    Full Text Available Regional identity creation is being recognized for its economic benefits and as a strategic resource for producer communities. A regional identity is not a brand; it is built through a complicated process of developing cohesion and sharing in the industry community and communicating outside the industry community to opinion-makers and consumers. The California fine wine industry has built successful regional identities and leveraged them to add value to their wines. As regional identities in the wine industry have strengthened, so has the industry, and a symbiotic relationship with other local value-added industries, such as tourism and hospitality, has emerged. Other agricultural producers can learn from the identity creation experiences in the wine industry. With the many challenges faced by California agriculture, identity formation may offer producers new ideas for adding value to their products and finding larger markets.

  14. Performative Identity as a Resource for Classroom Participation: Scientific Shane vs. Jimmy Neutron

    Science.gov (United States)

    Anderson, Kate T.; Zuiker, Steven J.

    2010-01-01

    This study introduces performative identity as a lens for understanding student participation in discursive classroom routines and potentials for fostering student agency and enhanced learning. We argue that student negotiation of performative identities can facilitate productive transformations of individual and group trajectories. This study…

  15. [Use of internet and electronic resources among Spanish intensivist physicians. First national survey].

    Science.gov (United States)

    Gómez-Tello, V; Latour-Pérez, J; Añón Elizalde, J M; Palencia-Herrejón, E; Díaz-Alersi, R; De Lucas-García, N

    2006-01-01

    Estimate knowledge and use habits of different electronic resources in a sample of Spanish intensivists: Internet, E-mail, distribution lists, and use of portable electronic devices. Self-applied questionnaire. A 50-question questionnaire was distributed among Spanish intensivists through the hospital marketing delegates of a pharmaceutical company and of electronic forums. A total of 682 questionnaires were analyzed (participation: 74%). Ninety six percent of those surveyed used Internet individually: 67% admitted training gap. Internet was the second source of clinical consultations most used (61%), slightly behind consultation to colleagues (65%). The pages consulted most were bibliographic databases (65%) and electronic professional journals (63%), with limited use of Evidence Based Medicine pages (19%). Ninety percent of those surveyed used e-mail regularly in the practice of their profession, although 25% admitted that were not aware of its possibilities. The use of E-mail decreased significantly with increase in age. A total of 62% of the intensivists used distribution lists. Of the rest, 42% were not aware of its existence and 32% admitted they had insufficient training to handle them. Twenty percent of those surveyed had portable electronic devices and 64% considered it useful, basically due to its rapid consultation at bedside. Female gender was a negative predictive factor of its use (OR 0.35; 95% CI 0.2-0.63; p=0.0002). A large majority of the Spanish intensivists use Internet and E-mail. E-mail lists and use of portable devices are still underused resources. There are important gaps in training and infrequent use of essential pages. There are specific groups that require directed educational policies.

  16. Model of e-learning with electronic educational resources of new generation

    OpenAIRE

    A. V. Loban; D. A. Lovtsov

    2017-01-01

    Purpose of the article: improving of scientific and methodical base of the theory of the е-learning of variability. Methods used: conceptual and logical modeling of the е-learning of variability process with electronic educational resource of new generation and system analysis of the interconnection of the studied subject area, methods, didactics approaches and information and communication technologies means. Results: the formalization complex model of the е-learning of variability with elec...

  17. Impact of Knowledge Resources Linked to an Electronic Health Record on Frequency of Unnecessary Tests and Treatments

    Science.gov (United States)

    Goodman, Kenneth; Grad, Roland; Pluye, Pierre; Nowacki, Amy; Hickner, John

    2012-01-01

    Introduction: Electronic knowledge resources have the potential to rapidly provide answers to clinicians' questions. We sought to determine clinicians' reasons for searching these resources, the rate of finding relevant information, and the perceived clinical impact of the information they retrieved. Methods: We asked general internists, family…

  18. Electronic Document Management: A Human Resource Management Case Study

    Directory of Open Access Journals (Sweden)

    Thomas Groenewald

    2004-11-01

    Full Text Available This case study serve as exemplar regarding what can go wrong with the implementation of an electronic document management system. Knowledge agility and knowledge as capital, is outlined against the backdrop of the information society and knowledge economy. The importance of electronic document management and control is sketched thereafter. The literature review is concluded with the impact of human resource management on knowledge agility, which includes references to the learning organisation and complexity theory. The intervention methodology, comprising three phases, follows next. The results of the three phases are presented thereafter. Partial success has been achieved with improving the human efficacy of electronic document management, however the client opted to discontinue the system in use. Opsomming Die gevalle studie dien as voorbeeld van wat kan verkeerd loop met die implementering van ’n elektroniese dokumentbestuur sisteem. Teen die agtergrond van die inligtingsgemeenskap en kennishuishouding word kennissoepelheid en kennis as kapitaal bespreek. Die literatuurstudie word afgesluit met die inpak van menslikehulpbronbestuur op kennissoepelheid, wat ook die verwysings na die leerorganisasie en kompleksietydsteorie insluit. Die metodologie van die intervensie, wat uit drie fases bestaan, volg daarna. Die resultate van die drie fases word vervolgens aangebied. Slegs gedeelte welslae is behaal met die verbetering van die menslike doeltreffendheid ten opsigte van elektroniese dokumentbestuur. Die klient besluit egter om nie voort te gaan om die huidige sisteem te gebruik nie.

  19. USign--a security enhanced electronic consent model.

    Science.gov (United States)

    Li, Yanyan; Xie, Mengjun; Bian, Jiang

    2014-01-01

    Electronic consent becomes increasingly popular in the healthcare sector given the many benefits it provides. However, security concerns, e.g., how to verify the identity of a person who is remotely accessing the electronic consent system in a secure and user-friendly manner, also arise along with the popularity of electronic consent. Unfortunately, existing electronic consent systems do not pay sufficient attention to those issues. They mainly rely on conventional password based authentication to verify the identity of an electronic consent user, which is far from being sufficient given that identity theft threat is real and significant in reality. In this paper, we present a security enhanced electronic consent model called USign. USign enhances the identity protection and authentication for electronic consent systems by leveraging handwritten signatures everyone is familiar with and mobile computing technologies that are becoming ubiquitous. We developed a prototype of USign and conducted preliminary evaluation on accuracy and usability of signature verification. Our experimental results show the feasibility of the proposed model.

  20. Challenges in the implementation of an electronic surveillance system in a resource-limited setting: Alerta, in Peru

    Directory of Open Access Journals (Sweden)

    Soto Giselle

    2008-11-01

    Full Text Available Abstract Background Infectious disease surveillance is a primary public health function in resource-limited settings. In 2003, an electronic disease surveillance system (Alerta was established in the Peruvian Navy with support from the U.S. Naval Medical Research Center Detachment (NMRCD. Many challenges arose during the implementation process, and a variety of solutions were applied. The purpose of this paper is to identify and discuss these issues. Methods This is a retrospective description of the Alerta implementation. After a thoughtful evaluation according to the Centers for Disease Control and Prevention (CDC guidelines, the main challenges to implementation were identified and solutions were devised in the context of a resource-limited setting, Peru. Results After four years of operation, we have identified a number of challenges in implementing and operating this electronic disease surveillance system. These can be divided into the following categories: (1 issues with personnel and stakeholders; (2 issues with resources in a developing setting; (3 issues with processes involved in the collection of data and operation of the system; and (4 issues with organization at the central hub. Some of the challenges are unique to resource-limited settings, but many are applicable for any surveillance system. For each of these challenges, we developed feasible solutions that are discussed. Conclusion There are many challenges to overcome when implementing an electronic disease surveillance system, not only related to technology issues. A comprehensive approach is required for success, including: technical support, personnel management, effective training, and cultural sensitivity in order to assure the effective deployment of an electronic disease surveillance system.

  1. Federated Identity Management for Research Collaborations

    CERN Document Server

    Broeder, Daan; Kelsey, David; Kershaw, Philip; Lüders, Stefan; Lyall, Andrew; Nyrönen, Tommi; Wartel, Romain; Weyer, Heinz J

    2012-01-01

    Federated identity management (FIM) is an arrangement that can be made among multiple organisations that lets subscribers use the same identification data to obtain access to the secured resources of all organisations in the group. Identity federation offers economic advantages, as well as convenience, to organisations and their users. For example, multiple institutions can share a single application, with resultant cost savings and consolidation of resources. In order for FIM to be effective, the partners must have a sense of mutual trust. A number of laboratories including national and regional research organizations are facing the challenge of a deluge of scientific data that needs to be accessed by expanding user bases in dynamic collaborations that cross organisational and national boundaries. Driven by these needs, representatives from a variety of research communities, including photon/neutron facilities, social science & humanities, high-energy physics, atmospheric science, bioinformatics and fusi...

  2. Brand: Identity, Image, and Relationships

    Science.gov (United States)

    Danker, Stephanie Harvey

    2014-01-01

    Adolescents face complex dilemmas such as challenging issues of identity and self-concept, and struggles with building and maintaining relationships. These issues must be embraced in the art classroom. This Instructional Resource will focus on the concept of brand--connecting visual art, marketing, and psychology--and center on ideas found in the…

  3. Identity Discourse in Preservice Teachers' Science Learning Autobiographies and Science Teaching Philosophies

    Science.gov (United States)

    Hsu, Pei-Ling; Reis, Giuliano; Monarrez, Angelica

    2017-01-01

    Research in science education has shown that one's identities as science learner and teacher can mediate their pedagogical practices. Grounded in the perspective that language is a resource for identity (re)construction (Gee, 2000), the present study sought to understand how preservice science teachers' identities were manifested in their…

  4. Identity's identities

    DEFF Research Database (Denmark)

    Jensen, Kim Ebensgaard

    -specialized language in which it also serves a number of functions – some of which are quite fundamental to society as such. In other words, the lexeme identity is a polysemic word and has multiple, well, identities. Given that it appears to have a number of functions in a variety of registers, including terminologies...... in Academic English and more everyday-based English, identity as a lexeme is definitely worth having a look at. This paper presents a lexicological study of identity in which some of its senses are identified and their behaviors in actual discourse are observed. Drawing on data from the 2011 section...... of the Corpus of Contemporary American English, a behavioral profile of the distributional characteristics of identity is set up. Behavioral profiling is a lexicographical method developed by the corpus linguist Stefan Th. Gries which, by applying semantic ID tagging and statistical analysis, provides a fine...

  5. Considering Point-of-Care Electronic Medical Resources in Lieu of Traditional Textbooks for Medical Education.

    Science.gov (United States)

    Hale, LaDonna S; Wallace, Michelle M; Adams, Courtney R; Kaufman, Michelle L; Snyder, Courtney L

    2015-09-01

    Selecting resources to support didactic courses is a critical decision, and the advantages and disadvantages must be carefully considered. During clinical rotations, students not only need to possess strong background knowledge but also are expected to be proficient with the same evidence-based POC resources used by clinicians. Students place high value on “real world” learning and therefore may place more value on POC resources that they know practicing clinicians use as compared with medical textbooks. The condensed nature of PA education requires students to develop background knowledge and information literacy skills over a short period. One way to build that knowledge and those skills simultaneously is to use POC resources in lieu of traditional medical textbooks during didactic training. Electronic POC resources offer several advantages over traditional textbooks and should be considered as viable options in PA education.

  6. Resource conservation approached with an appropriate collection and upgrade-remanufacturing for used electronic products.

    Science.gov (United States)

    Zlamparet, Gabriel I; Tan, Quanyin; Stevels, A B; Li, Jinhui

    2018-03-01

    This comparative research represents an example for a better conservation of resources by reducing the amount of waste (kg) and providing it more value under the umbrella of remanufacturing. The three discussed cases will expose three issues already addressed separately in the literature. The generation of waste electrical and electronic equipment (WEEE) interacts with the environmental depletion. In this article, we gave the examples of addressed issues under the concept of remanufacturing. Online collection opportunity eliminating classical collection, a business to business (B2B) implementation for remanufactured servers and medical devices. The material reuse (recycling), component sustainability, reuse (part harvesting), product reuse (after repair/remanufacturing) indicates the recovery potential using remanufacturing tool for a better conservation of resources adding more value to the products. Our findings can provide an overview of new system organization for the general collection, market potential and the technological advantages using remanufacturing instead of recycling of WEEE or used electrical and electronic equipment. Copyright © 2017. Published by Elsevier Ltd.

  7. Hard Identity and Soft Identity

    Directory of Open Access Journals (Sweden)

    Hassan Rachik

    2006-04-01

    Full Text Available Often collective identities are classified depending on their contents and rarely depending on their forms. Differentiation between soft identity and hard identity is applied to diverse collective identities: religious, political, national, tribal ones, etc. This classification is made following the principal dimensions of collective identities: type of classification (univocal and exclusive or relative and contextual, the absence or presence of conflictsof loyalty, selective or totalitarian, objective or subjective conception, among others. The different characteristics analysed contribute to outlining an increasingly frequent type of identity: the authoritarian identity.

  8. Effects of the Use of Electronic Human Resource Management (EHRM Within Human Resource Management (HRM Functions at Universities

    Directory of Open Access Journals (Sweden)

    Chux Gervase Iwu

    2016-09-01

    Full Text Available This study set out to examine the effect of e-hrm systems in assisting human resource practitioners to execute their duties and responsibilities. In comparison to developed economies of the world, information technology adoption in sub-Saharan Africa has not been without certain glitches. Some of the factors that are responsible for these include poor need identification, sustainable funding, and insufficient skills. Besides these factors, there is also the issue of change management and users sticking to what they already know. Although, the above factors seem negative, there is strong evidence that information systems such as electronic human resource management present benefits to an organization. To achieve this, a dual research approach was utilized. Literature assisted immensely in both the development of the conceptual framework upon which the study hinged as well as in the development of the questionnaire items. The study also made use of an interview checklist to guide the participants. The findings reveal a mix of responses that indicate that while there are gains in adopting e-hrm systems, it is wiser to consider supporting resources as well as articulate the needs of the university better before any investment is made.

  9. Additional Resources on Asian Americans.

    Science.gov (United States)

    Kodama, Corinne Maekawa; Lee, Sunny; Liang, Christopher T. H.; Alvarez, Alvin N.; McEwen, Marylu K.

    2002-01-01

    The authors identify Asian American associations and organizations, academic journals, periodicals, and media resources. Selected annotated resources on Asian American activism and politics, counseling and psychology, educational issues, gender and sexual orientation, history, policy reports, and racial and ethnic identity are also included.…

  10. Electronic human resource management: Enhancing or entrancing?

    Directory of Open Access Journals (Sweden)

    Paul Poisat

    2017-07-01

    Full Text Available Orientation: This article provides an investigation into the current level of development of the body of knowledge related to electronic human resource management (e-HRM by means of a qualitative content analysis. Several aspects of e-HRM, namely definitions of e-HRM, the theoretical perspectives around e-HRM, the role of e-HRM, the various types of e-HRM and the requirements for successful e-HRM, are examined. Research purpose: The purpose of the article was to determine the status of e-HRM and examine the studies that report on the link between e-HRM and organisational productivity. Motivation for the study: e-HRM has the capacity to improve organisational efficiency and leverage the role of human resources (HR as a strategic business partner. Main findings: The notion that the implementation of e-HRM will lead to improved organisational productivity is commonly assumed; however, empirical evidence in this regard was found to be limited. Practical/managerial implications: From the results of this investigation it is evident that more research is required to gain a greater understanding of the influence of e-HRM on organisational productivity, as well as to develop measures for assessing this influence. Contribution: This article proposes additional areas to research and measure when investigating the effectiveness of e-HRM. It provides a different lens from which to view e-HRM assessment whilst keeping it within recognised HR measurement parameters (the HR value chain. In addition, it not only provides areas for measuring e-HRM’s influence but also provides important clues as to how the measurements may be approached.

  11. Reel Science: An Ethnographic Study of Girls' Science Identity Development In and Through Film

    Science.gov (United States)

    Chaffee, Rachel L.

    This dissertation study contributes to the research on filmmaking and identity development by exploring the ways that film production provided unique opportunities for a team of four girls to engage in science, to develop identities in science, and to see and understand science differently. Using social practice, identity, and feminist theory and New Literacies Studies as a theoretical lens and grounded theory and multimodality as analytic frameworks, I present findings that suggest that girls in this study authored identities and communicated and represented science in and through film in ways that drew on their social, cultural, and embodied resources and the material resources of the after-school science club. Findings from this study highlight the affordances of filmmaking as a venue for engaging in the disciplinary practices of science and for accessing and authoring identities in science.

  12. Building an Identity Management Governance Process

    Science.gov (United States)

    Berg, Joanne E.; Kraemer, Ron; Raatz, Carla; Devoti, Steve

    2009-01-01

    A particular challenge in any campus environment is determining how requests for access to services and resources are managed. Who decides the technology, infrastructure, policy, business process and procedure? The involvement of key institutional leaders and stakeholders in identity management governance is the driving force behind the way the…

  13. Context-Aware Identity Delegation

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.

    2009-01-01

    In emerging ubiquitous computing, related nomadic users often perform similar tasks and share the same computing infrastructure.This means that security of the shared resources is of prime importance.Frequent delegation of tasks among users must be anticipated as most nomadic environments...... are hectic and very dynamic. A delegation mechanism with a slightly complicated user interface will not only reduce the productivity but also provide nomadic users with a strong motivation to circumvent the mechanism itself. Delegation in access control domain is not practical for the most of nomadic users...... due to its complicated and complex structure. Identity delegation at authentication level provides improved usability, which reduces the risk of circumventing the delegation mechanism; at the same time, however, identity delegation violates the principle of least privileges. We use contextual...

  14. Identifying and evaluating electronic learning resources for use in adult-gerontology nurse practitioner education.

    Science.gov (United States)

    Thompson, Hilaire J; Belza, Basia; Baker, Margaret; Christianson, Phyllis; Doorenbos, Ardith; Nguyen, Huong

    2014-01-01

    Enhancing existing curricula to meet newly published adult-gerontology advanced practice registered nurse (APRN) competencies in an efficient manner presents a challenge to nurse educators. Incorporating shared, published electronic learning resources (ELRs) in existing or new courses may be appropriate in order to assist students in achieving competencies. The purposes of this project were to (a) identify relevant available ELR for use in enhancing geriatric APRN education and (b) to evaluate the educational utility of identified ELRs based on established criteria. A multilevel search strategy was used. Two independent team members reviewed identified ELR against established criteria to ensure utility. Only resources meeting all criteria were retained. Resources were found for each of the competency areas and included formats such as podcasts, Web casts, case studies, and teaching videos. In many cases, resources were identified using supplemental strategies and not through traditional search or search of existing geriatric repositories. Resources identified have been useful to advanced practice educators in improving lecture and seminar content in a particular topic area and providing students and preceptors with additional self-learning resources. Addressing sustainability within geriatric APRN education is critical for sharing of best practices among educators and for sustainability of teaching and related resources. © 2014.

  15. Systematic review of electronic surveillance of infectious diseases with emphasis on antimicrobial resistance surveillance in resource-limited settings.

    Science.gov (United States)

    Rattanaumpawan, Pinyo; Boonyasiri, Adhiratha; Vong, Sirenda; Thamlikitkul, Visanu

    2018-02-01

    Electronic surveillance of infectious diseases involves rapidly collecting, collating, and analyzing vast amounts of data from interrelated multiple databases. Although many developed countries have invested in electronic surveillance for infectious diseases, the system still presents a challenge for resource-limited health care settings. We conducted a systematic review by performing a comprehensive literature search on MEDLINE (January 2000-December 2015) to identify studies relevant to electronic surveillance of infectious diseases. Study characteristics and results were extracted and systematically reviewed by 3 infectious disease physicians. A total of 110 studies were included. Most surveillance systems were developed and implemented in high-income countries; less than one-quarter were conducted in low-or middle-income countries. Information technologies can be used to facilitate the process of obtaining laboratory, clinical, and pharmacologic data for the surveillance of infectious diseases, including antimicrobial resistance (AMR) infections. These novel systems require greater resources; however, we found that using electronic surveillance systems could result in shorter times to detect targeted infectious diseases and improvement of data collection. This study highlights a lack of resources in areas where an effective, rapid surveillance system is most needed. The availability of information technology for the electronic surveillance of infectious diseases, including AMR infections, will facilitate the prevention and containment of such emerging infectious diseases. Copyright © 2018 Association for Professionals in Infection Control and Epidemiology, Inc. Published by Elsevier Inc. All rights reserved.

  16. Mental Health and Coping Patterns in Jewish Gay Men in Israel: The Role of Dual Identity Conflict, Religious Identity, and Partnership Status.

    Science.gov (United States)

    Zeidner, Moshe; Zevulun, Attara

    2018-01-01

    This study examined the effects of dual-identity conflict, religious identity (religious/spiritual vs. sexual), and partnership status on the coping strategies and mental health of gay Jewish men in modern Israeli society. Participants were 73 religious and 71 secular gay men recruited via e-mail, social networking sites, and online resources targeting sexual minority men. Participants were assessed via measures of identity conflict, mental health, and coping strategies. Jewish gay men who reported more severe identity conflict also reported using less problem-focused and avoidance coping and more emotion-focused coping strategies and reported poorer mental health than their less identity-conflicted counterparts. Furthermore, gay men who self-identified as religious reported poorer mental health as well as less problem-focused coping and more emotion-focused coping compared to secular men. Religious gay men in romantic relationships reported lower intensities of dual-identity conflict and better mental health compared to their nonpartnered counterparts.

  17. "Not Homeless Yet. I'm Kind of Couch Surfing": Finding Identities for People at a Homeless Shelter.

    Science.gov (United States)

    Terui, Sachiko; Hsieh, Elaine

    2016-01-01

    The meanings of homelessness are fluid and socially constructed, providing resources and limitations for individuals to negotiate their identities and relationships in everyday life. In this study, we examine the strategies and corresponding resources utilized by people who are homeless to cope with the labeling of a homeless identity and to redefine their identities. We used constant comparative analysis to examine in-depth interviews with 16 participants (male = 11, female = 5) who access a local homeless shelter in the southwest United States for resources. We identified three strategies that homeless people adopt to cope with the labeling of homeless identity: (a) differentiating oneself from others who are homeless, (b) prioritizing certain aspects of life, and (c) embracing the status of homelessness. Although these strategies have been identified in previous literature, the authors extend this line of research by identifying the common resources people who are homeless utilize when adopting these strategies, which entail important implications for theory development and practical implications.

  18. Identity Issues and Challenges Faced by Russian Immigrants in New Zealand

    Directory of Open Access Journals (Sweden)

    Elena Maydell

    2009-08-01

    Full Text Available Among the processes cosmopolitan societies undergo at the present moment, is the unprecedented increase in mass migration across cultures. What challenges are faced by both immigrants, who have to settle in novel socio-cultural environments, and by the host populations accepting them? The current qualitative study investigates the nature of identity construction among Russian-speaking immigrants in New Zealand, applying thematic analysis for the interpretation of the data collected via 23 in-depth interviews. Among the most common themes articulated by the participants was the feeling of identity loss. A taken-for-granted sense of identity, brought by the participants from their culture of origin, was not validated by their new society of residence, mostly due to the lack of appropriate cultural resources. The participants were faced with a challenge of re-constructing their old identity, or constructing a new one, utilising the available resources in the community around them. At the same time, there was a sub-group for whom this challenge brought the realisation that the nature of their identity is cosmopolitan, rather than located within any particular culture or geographical space.

  19. Applying Banks' Typology of Ethnic Identity Development and Curriculum Goals to Story Content, Classroom Discussion, and the Ecology of Classroom and Community: Phase One. Instructional Resource No. 24.

    Science.gov (United States)

    Tomlinson, Louise M.

    This instructional resource describes ways in which J. A. Banks' typology of the stages of ethnic identity development and related curriculum goals can be applied to literacy instruction. Banks' definitions of the stages of development and the curriculum goals for each stage are provided. Strategies for analyzing materials and developing relevant…

  20. From Millennium ERM to Proquest 360 Resource Manager: Implementing a new Electronic Resources Management System ERMS in an International Graduate Research University in Saudi Arabia

    KAUST Repository

    Ramli, Rindra M.

    2017-01-01

    An overview of the Recommendation Study and the subsequent Implementation of a new Electronic Resources Management system ERMS in an international graduate research university in the Kingdom of Saudi Arabia. It covers the timeline, deliverables

  1. Patient Perspectives on Gender Identity Data Collection in Electronic Health Records: An Analysis of Disclosure, Privacy, and Access to Care.

    Science.gov (United States)

    Thompson, Hale M

    2016-01-01

    Purpose: In 2015, the Centers for Medicare and Medicaid Services ruled that health organizations comply with additional requirements for electronic health records (EHRs), known as "Meaningful Use," and develop the capacity to collect gender identity data. Research has established effectiveness of a two-step gender identity question to collect these data. This study examines transgender patient perspectives on the use of a two-step question and experiences with privacy and sensitive disclosures in EHRs and healthcare settings. Methods: Four focus groups ( N =30) were conducted in Chicago, Illinois in 2014-2015. Participants were asked to compare two intake forms-one with a two-step question and one with a single question-and discuss experiences with gender identity disclosure, privacy, and access to care. Narratives were transcribed verbatim to identify patterns and themes; the extended case method was used and grounded the data analysis process in the concept of intersectionality. Results: Participants expressed appreciation for improved reliability and competencies that the two-part question may afford. Narratives reveal concerns related to patient privacy, safety, and access because of the contexts in which these data are collected and transmitted. Virtually all participants described situations whereby sensitive gender identity information had been involuntarily disclosed, misinterpreted, or abused, and safety and care were compromised. Conclusion: Participants recognized the potential of the two-part question as a measurement and competency tool, but anticipated new privacy violations and involuntary disclosures. Narratives indicate that effects of sensitive disclosures may vary intersectionally, whereby white participants experienced lesser harms than their immigrant, HIV-positive, and black trans feminine counterparts. Discrimination and privacy violations may occur regardless of a two-part or one-part gender identity question, but increasing these sensitive

  2. Chapter 14. Systems of identical particles

    International Nuclear Information System (INIS)

    Anon.

    1977-01-01

    For the systems of identical particles it is necessary to introduce the postulate of symmetrization to describe quantum systems. Physical implications of this postulate are presented: bosons, fermions and Pauli exclusion principle; quantum statistics; interferences between direct process and exchange process. Permutation operators are also exposed. In complement are studied: approximation of central field, electron configurations, energy levels of helium atom (configurations, terms, multiplets), physical properties of electron gas (application to solids) [fr

  3. Fostering Positive Deaf Identity Development in a K-2 Deaf Classroom /

    OpenAIRE

    Hipskind, Courtney

    2014-01-01

    All Deaf children deserve to have opportunities to openly explore, examine, and affirm their own Deaf identities at school, yet there is a shortage of curricula and resources dedicated to this basic need. The aim of this thesis is to provide Deaf children with such opportunities. The curriculum within- Fostering Deaf Identity Development in a K-2 Deaf Classroom- consists of two units that address positive Deaf identity formation. The first unit focuses on the characterization and affirmation ...

  4. Identity as a major issue in an information society: the case for a chain approach

    NARCIS (Netherlands)

    Grijpink, J.H.A.M.

    1998-01-01

    Two new developments in information technology will have a profound effect on the identity issue in our society: multifunctional smartcards and biometrics. The wide-spread use of chipcards will in the future facilitate electronic identities and identity documents. This places identity fraud in a new

  5. Open-Source Electronic Health Record Systems for Low-Resource Settings: Systematic Review.

    Science.gov (United States)

    Syzdykova, Assel; Malta, André; Zolfo, Maria; Diro, Ermias; Oliveira, José Luis

    2017-11-13

    Despite the great impact of information and communication technologies on clinical practice and on the quality of health services, this trend has been almost exclusive to developed countries, whereas countries with poor resources suffer from many economic and social issues that have hindered the real benefits of electronic health (eHealth) tools. As a component of eHealth systems, electronic health records (EHRs) play a fundamental role in patient management and effective medical care services. Thus, the adoption of EHRs in regions with a lack of infrastructure, untrained staff, and ill-equipped health care providers is an important task. However, the main barrier to adopting EHR software in low- and middle-income countries is the cost of its purchase and maintenance, which highlights the open-source approach as a good solution for these underserved areas. The aim of this study was to conduct a systematic review of open-source EHR systems based on the requirements and limitations of low-resource settings. First, we reviewed existing literature on the comparison of available open-source solutions. In close collaboration with the University of Gondar Hospital, Ethiopia, we identified common limitations in poor resource environments and also the main requirements that EHRs should support. Then, we extensively evaluated the current open-source EHR solutions, discussing their strengths and weaknesses, and their appropriateness to fulfill a predefined set of features relevant for low-resource settings. The evaluation methodology allowed assessment of several key aspects of available solutions that are as follows: (1) integrated applications, (2) configurable reports, (3) custom reports, (4) custom forms, (5) interoperability, (6) coding systems, (7) authentication methods, (8) patient portal, (9) access control model, (10) cryptographic features, (11) flexible data model, (12) offline support, (13) native client, (14) Web client,(15) other clients, (16) code

  6. Instructional Design as Resource for the Strengthening of the Regional Identity

    Directory of Open Access Journals (Sweden)

    Carol del Carmen Terán González

    2017-05-01

    Full Text Available The present investigation takes as a fundamental goal, the elaboration of an instructional digital design that contributes to the strengthening of the regional identity of the students. The study is based on the theoretical postulates of: UNESCO (2004, CBN (1997, Ausubel (1983, Vygotsky, Rodríguez (2001, Careaga (2001, Galvis (1992, Pastorini, (2000, Salazar (2008, Rosario (2005, Bernice McCarthy (1987, among others. The same one, adopted the type of descriptive investigation, with a field design placed in the modality of viable project. The population is constituted by 12 teachers, and 40 students of the sixth degree. For the diagnostic phase a questionnaire will be applied with 14 items for teachers and students, the validation will be of content across the experts' judgment. In conclusion, there exists weakness for the constitutive elements of the historical memory as part of the regional identity.

  7. Universality of Schmidt decomposition and particle identity

    Science.gov (United States)

    Sciara, Stefania; Lo Franco, Rosario; Compagno, Giuseppe

    2017-03-01

    Schmidt decomposition is a widely employed tool of quantum theory which plays a key role for distinguishable particles in scenarios such as entanglement characterization, theory of measurement and state purification. Yet, its formulation for identical particles remains controversial, jeopardizing its application to analyze general many-body quantum systems. Here we prove, using a newly developed approach, a universal Schmidt decomposition which allows faithful quantification of the physical entanglement due to the identity of particles. We find that it is affected by single-particle measurement localization and state overlap. We study paradigmatic two-particle systems where identical qubits and qutrits are located in the same place or in separated places. For the case of two qutrits in the same place, we show that their entanglement behavior, whose physical interpretation is given, differs from that obtained before by different methods. Our results are generalizable to multiparticle systems and open the way for further developments in quantum information processing exploiting particle identity as a resource.

  8. Tribo-electric charging of dielectric solids of identical composition

    Science.gov (United States)

    Angus, John C.; Greber, Isaac

    2018-05-01

    Despite its long history and importance in many areas of science and technology, there is no agreement on the mechanisms responsible for tribo-electric charging, including especially the tribo-charging of chemically identical dielectric solids. Modeling of the excitation, diffusional transport, and de-excitation of electrons from hot spots shows that a difference in local surface roughness of otherwise identical solid dielectric objects leads to different transient excited electron concentrations during tribo-processes. The model predicts that excited electron concentrations are lower and concentration gradients higher in solids with rougher rather than smoother surfaces. Consequently, during contact, the flux of charge carriers (electrons or holes) from hot spots will be greater into the rougher solid than into the smoother solid. These predictions are in agreement with current and historical observations of tribo-electric charge transfer between solids of the same composition. This effect can take place in parallel with other processes and may also play a role in the charging of solids of different composition.

  9. Tools for Understanding Identity

    Energy Technology Data Exchange (ETDEWEB)

    Creese, Sadie; Gibson-Robinson, Thomas; Goldsmith, Michael; Hodges, Duncan; Kim, Dee DH; Love, Oriana J.; Nurse, Jason R.; Pike, William A.; Scholtz, Jean

    2013-12-28

    into account the difficulty of the inferences, allowing the user to consider different scenarios depending on the perceived resources of the attacker, or to prioritize lines of investigation. It also has a number of interesting visualizations that are designed to aid the user in understanding the model. The tool works by considering the inferences as a graph and runs various graph-theoretic algorithms, with some novel adaptations, in order to deduce various properties. Using the Model To help investigators exploit the model to perform identity attribution, we have developed the Identity Map visualization. For a user-provided set of known starting elements and a set of desired target elements for a given identity, the Identity Map generates investigative workflows as paths through the model. Each path consists of a series of elements and inferences between them that connect the input and output elements. Each path also has an associated confidence level that estimates the reliability of the resulting attribution. Identity Map can help investigators understand the possible ways to make an identification decision and guide them toward the data-collection or analysis steps required to reach that decision.

  10. Evaluation of three electronic report processing systems for preparing hydrologic reports of the U.S Geological Survey, Water Resources Division

    Science.gov (United States)

    Stiltner, G.J.

    1990-01-01

    In 1987, the Water Resources Division of the U.S. Geological Survey undertook three pilot projects to evaluate electronic report processing systems as a means to improve the quality and timeliness of reports pertaining to water resources investigations. The three projects selected for study included the use of the following configuration of software and hardware: Ventura Publisher software on an IBM model AT personal computer, PageMaker software on a Macintosh computer, and FrameMaker software on a Sun Microsystems workstation. The following assessment criteria were to be addressed in the pilot studies: The combined use of text, tables, and graphics; analysis of time; ease of learning; compatibility with the existing minicomputer system; and technical limitations. It was considered essential that the camera-ready copy produced be in a format suitable for publication. Visual improvement alone was not a consideration. This report consolidates and summarizes the findings of the electronic report processing pilot projects. Text and table files originating on the existing minicomputer system were successfully transformed to the electronic report processing systems in American Standard Code for Information Interchange (ASCII) format. Graphics prepared using a proprietary graphics software package were transferred to all the electronic report processing software through the use of Computer Graphic Metafiles. Graphics from other sources were entered into the systems by scanning paper images. Comparative analysis of time needed to process text and tables by the electronic report processing systems and by conventional methods indicated that, although more time is invested in creating the original page composition for an electronically processed report , substantial time is saved in producing subsequent reports because the format can be stored and re-used by electronic means as a template. Because of the more compact page layouts, costs of printing the reports were 15% to 25

  11. A Federated Digital Identity Management Approach for Business Processes

    Science.gov (United States)

    Bertino, Elisa; Ferrini, Rodolfo; Musci, Andrea; Paci, Federica; Steuer, Kevin J.

    Business processes have gained a lot of attention because of the pressing need for integrating existing resources and services to better fulfill customer needs. A key feature of business processes is that they are built from composable services, referred to as component services, that may belong to different domains. In such a context, flexible multi-domain identity management solutions are crucial for increased security and user-convenience. In particular, it is important that during the execution of a business process the component services be able to verify the identity of the client to check that it has the required permissions for accessing the services. To address the problem of multi-domain identity management, we propose a multi-factor identity attribute verification protocol for business processes that assures clients privacy and handles naming heterogeneity.

  12. Ethnic Harassment, Ethnic Identity Centrality, and Well-Being.

    Science.gov (United States)

    Wolfram, Hans-Joachim; Linton, Kenisha; McDuff, Nona

    2018-02-12

    In this study, we examined the direct effect of (positive vs. negative) evaluation of potentially harassing experiences due to ethnic background on impaired well-being as well as the moderating effect of ethnic identity centrality on the relationship between (lower vs. higher) frequency of potentially harassing experiences and impaired well-being. Using a gender-balanced sample with equal proportions of black and minority ethnic and white undergraduate students (N = 240), we found that, expectedly, ethnic identity centrality intensified the effects of higher frequency of potentially harassing experiences on lower self-esteem and lower positive affect. Unexpectedly, however, gender identity centrality buffered the effects of higher frequency as well as more negative evaluation of potentially harassing experiences on lower self-esteem, indicating that gender identity centrality may be a protective resource, even though it is not specific to ethnic harassment. Exploratory analyses revealed that for black and minority ethnic respondents with high ethnic identity centrality and for white respondents with low ethnic identity centrality, there were associations between more negative evaluation of potentially harassing experiences and lower self-esteem and lower positive affect. This finding might indicate that ethnic identity centrality was a risk factor in black and ethnic minority respondents, but a protective factor in white respondents.

  13. Use and User Perception of Electronic Information Resources: A Case Study of Siva Institute of Frontier Technology, India

    Directory of Open Access Journals (Sweden)

    Velmurugan Chandran

    2013-12-01

    Full Text Available The present study aims to explore the use and user perception of electronic resources in Siva Institute of Frontier Technology, India. A total number of 123 users were taken into account for the study through a questionnaire-based survey method. A well-structured questionnaire was designed and distributed to the selected 200 students and staff members. 123 copies of the questionnaires were returned dully filled in and the overall response rate was 61.50 percent. The questionnaire contained both open- and close-ended questions. The collected data were classified, analyzed, and tabulated by using simple statistical methods. This study covers the impact of electronic resources on students and faculty in their academic pursuit.

  14. A preliminary categorization of end-of-life electrical and electronic equipment as secondary metal resources

    International Nuclear Information System (INIS)

    Oguchi, Masahiro; Murakami, Shinsuke; Sakanakura, Hirofumi; Kida, Akiko; Kameya, Takashi

    2011-01-01

    Highlights: → End-of-life electrical and electronic equipment (EEE) as secondary metal resources. → The content and the total amount of metals in specific equipment are both important. → We categorized 21 EEE types from contents and total amounts of various metals. → Important equipment types as secondary resources were listed for each metal kind. → Collectability and possible collection systems of various EEE types were discussed. - Abstract: End-of-life electrical and electronic equipment (EEE) has recently received attention as a secondary source of metals. This study examined characteristics of end-of-life EEE as secondary metal resources to consider efficient collection and metal recovery systems according to the specific metals and types of EEE. We constructed an analogy between natural resource development and metal recovery from end-of-life EEE and found that metal content and total annual amount of metal contained in each type of end-of-life EEE should be considered in secondary resource development, as well as the collectability of the end-of-life products. We then categorized 21 EEE types into five groups and discussed their potential as secondary metal resources. Refrigerators, washing machines, air conditioners, and CRT TVs were evaluated as the most important sources of common metals, and personal computers, mobile phones, and video games were evaluated as the most important sources of precious metals. Several types of small digital equipment were also identified as important sources of precious metals; however, mid-size information and communication technology (ICT) equipment (e.g., printers and fax machines) and audio/video equipment were shown to be more important as a source of a variety of less common metals. The physical collectability of each type of EEE was roughly characterized by unit size and number of end-of-life products generated annually. Current collection systems in Japan were examined and potentially appropriate collection

  15. Principles of formation of the content of an educational electronic resource on the basis of general and didactic patterns of learning

    Directory of Open Access Journals (Sweden)

    Ольга Юрьевна Заславская

    2018-12-01

    Full Text Available The article considers the influence of the development of technical means of teaching on the effectiveness of educational and methodical resources. Modern opportunities of information and communication technologies allow creating electronic educational resources that represent educational information that automates the learning process, provide information assistance, if necessary, collect and process statistical information on the degree of development of the content of the school material by schoolchildren, set an individual trajectory of learning, and so on. The main principle of data organization is the division of the training course into separate sections on the thematic elements and components of the learning process. General regularities include laws that encompass the entire didactic system, and in specific (particular cases, those whose actions extend to a separate component (aspect of the system. From the standpoint of the existence of three types of electronic training modules in the aggregate content of the electronic learning resource - information, control and module of practical classes - the principles of the formation of the electronic learning resource, in our opinion, should regulate all these components. Each of the certain principles is considered in the groups: scientific orientation, methodological orientation, systemic nature, accounting of interdisciplinary connections, fundamentalization, systematic and dosage sequence, rational use of study time, accessibility, minimization, operationalization of goals, unified identification diagnosis.

  16. The Identity Process in Times of Ruptures

    DEFF Research Database (Denmark)

    Awad, Sarah H.

    2016-01-01

    revolution, at which time Egypt has witnessed major social and political changes. The aim is to understand the identity process of individuals as they develop and adapt through changing social contexts and how they create alternative social relations as they engage in prefigurative politics. The findings...... of agency in individuals’ ability to create new meanings of their world in spite of the socio-cultural and political constraints. This study presents narratives as an informing methodological resource that connects identity process with social representations and emphasizes the value of storytelling......This is a longitudinal study of the identity process through times of dramatic social change. Using a narrative psychological approach this research follows the life stories of five Egyptian bloggers as they write their stories on online blogs over the course of the three years following the 2011...

  17. Restoration of supersymmetric Slavnov-Taylor and Ward identities in presence of soft and spontaneous symmetry breaking

    International Nuclear Information System (INIS)

    Fischer, I.; Hollik, W.; Roth, M.; Stoeckinger, D.

    2003-12-01

    Supersymmetric Slavnov-Taylor and Ward identities are investigated in presence of soft and spontaneous symmetry breaking. We consider an abelian model where soft supersymmetry breaking yields a mass splitting between electron and selectron and triggers spontaneous symmetry breaking, and we derive corresponding identities that relate the electron and selectron masses with the Yukawa coupling. We demonstrate that the identities are valid in dimensional reduction and invalid in dimensional regularization and compute the necessary symmetry-restoring counterterms. (orig.)

  18. Social Identity, Social Ties and Social Capital: A Study in Gaming Context

    Science.gov (United States)

    Jiang, Hao

    2012-01-01

    This work will focus on how different social relationships, namely shared identity and personal tie, will impact cooperative behavior, a form of social capital. I designed and conducted an economic game study to show that shared identity and personal ties work differently on cooperation among people and resource flow in social groups. Many factors…

  19. Resources, mediators, and identities: Home literacy practices of ...

    African Journals Online (AJOL)

    Everyday home literacy practices of bilingual students who are learning English as an Additional Language (EAL) is an under-explored topic in South Africa. In this qualitative case study, home literacy practices of these students are viewed as a resource that can enhance their literacy development, while affirming their lived ...

  20. From Millennium ERM to Proquest 360 Resource Manager: Implementing a new Electronic Resources Management System ERMS in an International Graduate Research University in Saudi Arabia

    KAUST Repository

    Ramli, Rindra M.

    2017-05-17

    An overview of the Recommendation Study and the subsequent Implementation of a new Electronic Resources Management system ERMS in an international graduate research university in the Kingdom of Saudi Arabia. It covers the timeline, deliverables and challenges as well as lessons learnt by the Project Team.

  1. A National Identity Management Strategy to Enhance the Brazilian Electronic Government

    Directory of Open Access Journals (Sweden)

    José Alberto Sousa Torres

    2017-12-01

    Full Text Available Amongst the several problems with the Brazilian e-government services (e-Gov, many of them are related to the fact that Brazil does not have a National Strategy for Digital Identity Management (IdM. To design a  national strategy, it is crucial to analyze the solutions adopted in other countries and take into account Brazilian characteristics, such as its area, population, digital inclusion index, socio-political and economic profile, the current national identity registration system and the fraud rate. In this context, this paper aims to propose a national strategy for IdM for the Brazilian e-Gov program. This strategy was built upon by a literature review of the experiences of European countries and, mainly, the peculiarities inherent to Brazil.

  2. Adolescent Family Context and Adult Identity Formation

    Science.gov (United States)

    Benson, Janel E.; Johnson, Monica Kirkpatrick

    2009-01-01

    This study examines the links between adolescent family context and coming to see oneself as an adult. Using data from the National Longitudinal Study of Adolescent Health, the authors investigate how adolescent family structure, resources, and processes together influence adult identity and whether they do so similarly for men and women. The…

  3. The Synthesis of the Hierarchical Structure of Information Resources for Management of Electronic Commerce Entities

    Directory of Open Access Journals (Sweden)

    Krutova Anzhelika S.

    2017-06-01

    Full Text Available The aim of the article is to develop the theoretical bases for the classification and coding of economic information and the scientific justification of the content of information resources of an electronic commerce enterprise. The essence of information resources for management of electronic business entities is investigated. It is proved that the organization of accounting in e-commerce systems is advisable to be built on the basis of two circuits: accounting for financial flows and accounting associated with transformation of business factors in products and services as a result of production activities. There presented a sequence of accounting organization that allows to combine the both circuits in a single information system, which provides a possibility for the integrated replenishment and distributed simultaneous use of the e-commerce system by all groups of users. It is proved that the guarantee of efficient activity of the information management system of electronic commerce entities is a proper systematization of the aggregate of information resources on economic facts and operations of an enterprise in accordance with the management tasks by building the hierarchy of accounting nomenclatures. It is suggested to understand nomenclature as an objective, primary information aggregate concerning a certain fact of the economic activity of an enterprise, which is characterized by minimum requisites, is entered into the database of the information system and is to be reflected in the accounting system. It is proposed to build a database of e-commerce systems as a part of directories (constants, personnel, goods / products, suppliers, buyers and the hierarchy of accounting nomenclatures. The package of documents regulating the organization of accounting at an enterprise should include: the provision on the accounting services, the order on the accounting policy, the job descriptions, the schedules of information exchange, the report card and

  4. Controlling user access to electronic resources without password

    Science.gov (United States)

    Smith, Fred Hewitt

    2015-06-16

    Described herein are devices and techniques for remotely controlling user access to a restricted computer resource. The process includes pre-determining an association of the restricted computer resource and computer-resource-proximal environmental information. Indicia of user-proximal environmental information are received from a user requesting access to the restricted computer resource. Received indicia of user-proximal environmental information are compared to associated computer-resource-proximal environmental information. User access to the restricted computer resource is selectively granted responsive to a favorable comparison in which the user-proximal environmental information is sufficiently similar to the computer-resource proximal environmental information. In at least some embodiments, the process further includes comparing user-supplied biometric measure and comparing it with a predetermined association of at least one biometric measure of an authorized user. Access to the restricted computer resource is granted in response to a favorable comparison.

  5. Restoration of supersymmetric Slavnov-Taylor and Ward identities in the presence of soft and spontaneous symmetry breaking

    International Nuclear Information System (INIS)

    Fischer, I.; Hollik, W.; Roth, M.; Stoeckinger, D.

    2004-01-01

    Supersymmetric Slavnov-Taylor and Ward identities are investigated in the presence of soft and spontaneous symmetry breaking. We consider an Abelian model where soft supersymmetry breaking yields a mass splitting between electron and selectron and triggers spontaneous symmetry breaking, and we derive the corresponding identities that relate the electron and selectron masses to the Yukawa coupling. We demonstrate that the identities are valid in dimensional reduction and invalid in dimensional regularization and compute the necessary symmetry-restoring counterterms

  6. Electron-electron interactions in artificial graphene

    Science.gov (United States)

    Rasanen, Esa

    2013-03-01

    Recent advances in the creation and modulation of graphenelike systems are introducing a science of ``designer Dirac materials.'' In its original definition, artificial graphene is a man-made nanostructure that consists of identical potential wells (quantum dots) arranged in an adjustable honeycomb lattice in the two-dimensional electron gas. As our ability to control the quality of artificial graphene samples improves, so grows the need for an accurate theory of its electronic properties, including the effects of electron-electron interactions. Here we determine those effects on the band structure and on the emergence of Dirac points, and discuss future investigations and challenges in this field.

  7. STRATEGIC HUMAN RESOURCE MANAGEMENT : A Cross-Cultural Managerial Approach

    OpenAIRE

    Anyangwe, Xavier

    2017-01-01

    The goal of the thesis was to examine the impact of the concepts of culture, human resource management and strategic human resource management. A man without a culture is like a man with no identity, so the identity of people needs to be identified for effective unity in diversity. The findings of the thesis show that cultural diversity is an inclusive aspect of almost all communities and countries in the world. The richness of these cultures in terms of cultural values, languages, intera...

  8. Electronic theses and dissertations: a review of this valuable resource for nurse scholars worldwide.

    Science.gov (United States)

    Goodfellow, L M

    2009-06-01

    A worldwide repository of electronic theses and dissertations (ETDs) could provide worldwide access to the most up-to-date research generated by masters and doctoral students. Until that international repository is established, it is possible to access some of these valuable knowledge resources. ETDs provide a technologically advanced medium with endless multimedia capabilities that far exceed the print and bound copies of theses and dissertations housed traditionally in individual university libraries. CURRENT USE: A growing trend exists for universities worldwide to require graduate students to submit theses or dissertations as electronic documents. However, nurse scholars underutilize ETDs, as evidenced by perusing bibliographic citation lists in many of the research journals. ETDs can be searched for and retrieved through several digital resources such as the Networked Digital Library of Theses and Dissertations (http://www.ndltd.org), ProQuest Dissertations and Theses (http://www.umi.com), the Australasian Digital Theses Program (http://adt.caul.edu.au/) and through individual university web sites and online catalogues. An international repository of ETDs benefits the community of nurse scholars in many ways. The ability to access recent graduate students' research electronically from anywhere in the world is advantageous. For scholars residing in developing countries, access to these ETDs may prove to be even more valuable. In some cases, ETDs are not available for worldwide access and can only be accessed through the university library from which the student graduated. Public access to university library ETD collections is not always permitted. Nurse scholars from both developing and developed countries could benefit from ETDs.

  9. Certification and brand identity for energy efficiency in competitive energy services markets

    Energy Technology Data Exchange (ETDEWEB)

    Prindle, W.R.; Wiser, R.

    1998-07-01

    Resource commitments for energy efficiency from electricity companies are disappearing rapidly as the regulated Integrated Resource Planning and Demand-Side Management paradigms that fostered them give way to competitive power markets in a restructuring electricity industry. While free-market advocates claim that energy efficiency needs will be taken care of by competitive energy service providers, there is no assurance that efficiency will compete effectively with the panoply of other energy-related (and non-energy-related) services that are beginning to appear in early market offerings. This paper reports the results of a feasibility study for a certification and brand identity program for energy efficiency geared to competitive power markets. Funded by the Energy Foundation, this study involved a survey and personal interviews with stakeholders, plus a workshop to further the discussion. Stakeholders include independent power marketers and energy service companies, utility affiliate power marketers and energy service companies, government agencies, trade associations, non-profit organizations, equipment manufacturers, and consultants. The paper summarizes the study's findings on such key issues as: Whether a brand identity concept has a critical mass of interest and support; how qualification and certification could work in such a program; how a brand identity could be positioned in the market; how an efficiency brand identity could co-brand with renewable power branding programs and other green marketing efforts; and the resources and components needed to make such a program work on a national scale.

  10. Minimalism in architecture: Architecture as a language of its identity

    Directory of Open Access Journals (Sweden)

    Vasilski Dragana

    2012-01-01

    Full Text Available Every architectural work is created on the principle that includes the meaning, and then this work is read like an artifact of the particular meaning. Resources by which the meaning is built primarily, susceptible to transformation, as well as routing of understanding (decoding messages carried by a work of architecture, are subject of semiotics and communication theories, which have played significant role for the architecture and the architect. Minimalism in architecture, as a paradigm of the XXI century architecture, means searching for essence located in the irreducible minimum. Inspired use of architectural units (archetypical elements, trough the fatasm of simplicity, assumes the primary responsibility for providing the object identity, because it participates in language formation and therefore in its reading. Volume is form by clean language that builds the expression of the fluid areas liberated of recharge needs. Reduced architectural language is appropriating to the age marked by electronic communications.

  11. Library resources on the Internet

    Science.gov (United States)

    Buchanan, Nancy L.

    1995-07-01

    Library resources are prevalent on the Internet. Library catalogs, electronic books, electronic periodicals, periodical indexes, reference sources, and U.S. Government documents are available by telnet, Gopher, World Wide Web, and FTP. Comparatively few copyrighted library resources are available freely on the Internet. Internet implementations of library resources can add useful features, such as full-text searching. There are discussion lists, Gophers, and World Wide Web pages to help users keep up with new resources and changes to existing ones. The future will bring more library resources, more types of library resources, and more integrated implementations of such resources to the Internet.

  12. The Nielsen identities for the two-point functions of QED and QCD

    International Nuclear Information System (INIS)

    Breckenridge, J.C.; Sasketchewan Univ., Saskatoon, SK; Lavelle, M.J.; Steele, T.G.; Sasketchewan Univ., Saskatoon, SK

    1995-01-01

    We consider the Nielsen identities for the two-point functions of full QCD and QED in the class of Lorentz gauges. For pedagogical reasons the identities are first derived in QED to demonstrate the gauge independence of the photon self-energy, and of the electron mass shell. In QCD we derive the general identity and hence the identities for the quark, gluon and ghost propagators. The explicit contributions to the gluon and ghost identities are calculated to one-loop order, and then we show that the quark identity requires that in on-shell schemes the quark mass renormalisation must be gauge independent. Furthermore, we obtain formal solutions for the gluon self-energy and ghost propagator in terms of the gauge dependence of other, independent Green functions. (orig.)

  13. How does School Experience Relate to Adolescent Identity Formation Over Time? Cross-Lagged Associations between School Engagement, School Burnout and Identity Processing Styles.

    Science.gov (United States)

    Erentaitė, Rasa; Vosylis, Rimantas; Gabrialavičiūtė, Ingrida; Raižienė, Saulė

    2018-04-01

    The existing research findings still do not provide a clear understanding of the links between adolescent school experience and their identity formation. To address this gap, we analyzed the dynamic links between adolescent school experiences and identity formation by exploring the cross-lagged associations between school engagement, school burnout and identity processing styles (information-oriented, normative and diffuse-avoidant) over a 2-year period during middle-to-late adolescence. The sample of this school-based study included 916 adolescents (51.4% females) in the 9th to 12th grades from diverse socio-economic and family backgrounds. The results from the cross-lagged analyses with three time points revealed that (a) school engagement positively predicted information-oriented identity processing over a 2-year period; (b) school burnout positively predicted the reliance on normative and diffuse-avoidant identity styles across the three measurements; (c) the effects were stable over the three time points and across different gender, grade, and socio-economic status groups. The unidirectional effects identified in our study support the general prediction that active engagement in learning at school can serve as a resource for adolescent identity formation, while school burnout, in contrast, can hinder the formation of adolescent identity. This points to the importance of taking developmental identity-related needs of adolescents into account when planning the school curriculum.

  14. Community and Individuality: Performing Identity in Applied Linguistics

    Science.gov (United States)

    Hyland, Ken

    2010-01-01

    Recent research has emphasized the close connections between writing and the construction of an author's identity. While academic contexts privilege certain ways of making meanings and so restrict what resources participants can bring from their past experiences, we can also see these writing conventions as a repertoire of options that allow…

  15. ELECTRONIC EDUCATIONAL RESOURCES FOR ONLINE SUPPORT OF MODERN CHEMISTRY CLASSES IN SPECIALIZED SCHOOL

    Directory of Open Access Journals (Sweden)

    Maria D. Tukalo

    2013-09-01

    Full Text Available This article contains material of some modern electronic educational resources that can be used via the Internet to support the modern chemistry classes in specialized school. It was drawn attention to the educational chemical experiments as means of knowledge; simulated key motivational characteristics to enhance students interest for learning subjects, their cognitive and practical activity in the formation of self-reliance and self-creative; commented forecasts for creating of conditions to enhance the creative potential of students in a modern learning environment.

  16. Selection and Evaluation of Electronic Resources

    Directory of Open Access Journals (Sweden)

    Doğan Atılgan

    2013-11-01

    Full Text Available Publication boom and issues related to controlling and accession of printed sources have created some problems after World War II. Consequently, publishing industry has encountered the problem of finding possible solution for emerged situation. Industry of electronic publishing has started to improve with the rapid increase of the price of printed sources as well as the problem of publication boom. The first effects of electronic publishing were appeared on the academic and scholarly publications then electronic publishing became a crucial part of all types of publications. As a result of these developments, collection developments and service policies of information centers were also significantly changed. In this article, after a general introduction about selection and evaluation processes of electronic publications, the subscribed databases by a state and a privately owned university in Turkey and their usage were examined.

  17. An Exploratory study on the use of LibAnswers to Resolve, Track and Monitor Electronic Resources Issues: The KAUST Library experience

    KAUST Repository

    Ramli, Rindra M.

    2017-01-01

    An Exploratory study on KAUST library use of LibAnswers in resolving electronic resources questions received in LibAnswers. It describes the findings of the questions received in LibAnswers. The author made suggestions based on the findings to improve the reference services in responding to e-resources questions.

  18. An Exploratory study on the use of LibAnswers to Resolve, Track and Monitor Electronic Resources Issues: The KAUST Library experience

    KAUST Repository

    Ramli, Rindra M.

    2017-05-03

    An Exploratory study on KAUST library use of LibAnswers in resolving electronic resources questions received in LibAnswers. It describes the findings of the questions received in LibAnswers. The author made suggestions based on the findings to improve the reference services in responding to e-resources questions.

  19. The level of the usage of the human resource information system and electronic recruitment in Croatian companies

    Directory of Open Access Journals (Sweden)

    Snježana Pivac

    2014-12-01

    Full Text Available Performing business according to contemporary requirements influences companies for continuous usage of modern managerial tools, such as a human resource information system (HRIS and electronic recruitment (ER. Human resources have been recognised as curtail resources and the main source of a competitive advantage in creation of successful business performance. In order to attract and select the top employees, companies use quality information software for attracting internal ones, and electronic recruitment for attracting the best possible external candidates. The main aim of this paper is to research the level of the usage of HRIS and ER within medium-size and large Croatian companies. Moreover, the additional aim of this paper is to evaluate the relationship among the usage of these modern managerial tools and the overall success of human resource management within these companies. For the purpose of this paper, primary and secondary research has been conducted in order to reveal the level of the usage of HRIS and ER as well as the overall success of human resource management in Croatian companies. The companies’ classification (HRIS and ER is done by using the non-hierarchical k-means cluster method as well as the nonparametric Kruskal Wallis test. Further, the companies are ranked by the multicriteria PROMETHEE method. Relevant nonparametric tests are used for testing the overall companies’ HRM. Finally, binary logistic regression is estimated, relating binary variable HRM and HRIS development. After detailed research, it can be concluded that large Croatian companies apply HRIS in majority (with a positive relation to HRM performance, but still require certain degrees of its development.

  20. The electronic encapsulation of knowledge in hydraulics, hydrology and water resources

    Science.gov (United States)

    Abbott, Michael B.

    The rapidly developing practice of encapsulating knowledge in electronic media is shown to lead necessarily to the restructuring of the knowledge itself. The consequences of this for hydraulics, hydrology and more general water-resources management are investigated in particular relation to current process-simulation, real-time control and advice-serving systems. The generic properties of the electronic knowledge encapsulator are described, and attention is drawn to the manner in which knowledge 'goes into hiding' through encapsulation. This property is traced in the simple situations of pure mathesis and in the more complex situations of taxinomia using one example each from hydraulics and hydrology. The consequences for systems architectures are explained, pointing to the need for multi-agent architectures for ecological modelling and for more general hydroinformatics systems also. The relevance of these developments is indicated by reference to ongoing projects in which they are currently being realised. In conclusion, some more general epistemological aspects are considered within the same context. As this contribution is so much concerned with the processes of signification and communication, it has been partly shaped by the theory of semiotics, as popularised by Eco ( A Theory of Semiotics, Indiana University, Bloomington, 1977).

  1. Out of the Mainstream. Water Rights, Politics and Identity

    NARCIS (Netherlands)

    Boelens, R.A.; Getches, D.; Guevara-Gil, A.

    2010-01-01

    Water is not only a source of life and culture. It is also a source of power, conflicting interests and identity battles. Rights to materially access, culturally organize and politically control water resources are poorly understood by mainstream scientific approaches and hardly addressed by current

  2. "I'm Scared of the Disappointment": Young Adult Smokers' Relational Identity Gaps and Management Strategies as Sites of Communication Intervention.

    Science.gov (United States)

    Stanley, Samantha J; Pitts, Margaret Jane

    2018-02-22

    While cigarette smoking is decreasing among young adults, rates of nicotine consumption through other devices, most notably electronic cigarettes, are on the rise. Framed by communication theory of identity, this study examines young adult smokers' experiences with relational others in regard to their smoking. Focus group discussions and individual interviews convened with 20 young adult cigarette and electronic cigarette smokers revealed identity gaps implicating the relational layer of identity, including personal-relational, enacted-relational, and personal-enacted-relational identity gaps. Participants used communicative and behavioral strategies to manage relational discrepancies. The documented identity gaps and management strategies present opportunities for targeted smoking cessation interventions that amplify dissonance created through identity gaps as a motivational tactic.

  3. RESEARCH OF INFLUENCE OF QUALITY OF ELECTRONIC EDUCATIONAL RESOURCES ON QUALITY OF TRAINING WITH USE OF DISTANCE TECHNOLOGIES

    Directory of Open Access Journals (Sweden)

    H. M. Kravtsov

    2013-03-01

    Full Text Available Communication improving of educational processes requires today new approaches to the management arrangements and forming of educational policy in the field of distance learning, which is based on the use of modern information and communication technologies. An important step in this process is the continuous monitoring of the development and implementation of information technology and, in particular, the distance learning systems in higher educational establishments. The main objective of the monitoring is the impact assessment on the development of distance learning following the state educational standards, curricula, methodical and technical equipment and other factors; factors revelation that influence the implementation and outcomes of distance learning; results comparison of educational institution functioning and distance education systems in order to determine the most efficient ways of its development. The paper presents the analysis results of the dependence of the quality of educational services on the electronic educational resources. Trends in educational services development was studied by comparing the quality influence of electronic educational resources on the quality of educational services of higher pedagogical educational institutions of Ukraine as of 2009-2010 and 2012-2013. Generally, the analysis of the survey results allows evaluating quality of the modern education services as satisfactory and it can be said that almost 70% of the success of their future development depends on the quality of the used electronic educational resources and distance learning systems in particular.

  4. Becoming Black Women: Intimate Stories and Intersectional Identities

    Science.gov (United States)

    Wilkins, Amy C.

    2012-01-01

    In this article, I argue that intimate stories are an important resource for the achievement of intersectional identities. Drawing on in-depth interviews with black college students at two predominantly white universities, I examine the stories black college women tell about interracial relationships between black men and white women. I argue that…

  5. Tracking the Flow of Resources in Electronic Waste - The Case of End-of-Life Computer Hard Disk Drives.

    Science.gov (United States)

    Habib, Komal; Parajuly, Keshav; Wenzel, Henrik

    2015-10-20

    Recovery of resources, in particular, metals, from waste flows is widely seen as a prioritized option to reduce their potential supply constraints in the future. The current waste electrical and electronic equipment (WEEE) treatment system is more focused on bulk metals, where the recycling rate of specialty metals, such as rare earths, is negligible compared to their increasing use in modern products, such as electronics. This study investigates the challenges in recovering these resources in the existing WEEE treatment system. It is illustrated by following the material flows of resources in a conventional WEEE treatment plant in Denmark. Computer hard disk drives (HDDs) containing neodymium-iron-boron (NdFeB) magnets were selected as the case product for this experiment. The resulting output fractions were tracked until their final treatment in order to estimate the recovery potential of rare earth elements (REEs) and other resources contained in HDDs. The results further show that out of the 244 kg of HDDs treated, 212 kg comprising mainly of aluminum and steel can be finally recovered from the metallurgic process. The results further demonstrate the complete loss of REEs in the existing shredding-based WEEE treatment processes. Dismantling and separate processing of NdFeB magnets from their end-use products can be a more preferred option over shredding. However, it remains a technological and logistic challenge for the existing system.

  6. "It's in My Veins": Identity and Disciplinary Practice in Students' Discussions of a Historical Issue

    Science.gov (United States)

    Goldberg, Tsafrir

    2013-01-01

    Learners' identity is considered a resource, but is also assumed to conflict with impartial history learning practices. This empirical study explores the relationship between learners' social identity and their historical practices and understanding. Sixty-four Jewish-Israeli 12th-grade students of Mizrahi and Ashkenazi ethnicities studied a…

  7. Islamic Identity and Competitive Identities (Global, National and Ethnic Identity; A Case Study of Shiraz University Students

    Directory of Open Access Journals (Sweden)

    Mohammadtaghi Iman

    2013-06-01

    Full Text Available The verse of holy Koran "verily the most honored of you in the sight of Allah is [he who is] the most virtuous of you" directly shows that in god's willing there is no superiority of a man or a group than others except those who have piety to god. In fact, the Islamic identity focuses on the superiority of piety among humans and does not focus on superiority of a man or a group that causes Islamic identity theoretically be against other competitive identities such as ethnic, global and national identity. Therefore, this research aims to study the relationship between Islamic identity and competitive identities (ethnic, national and global. In this way based on Sheldon Stryker theory and survey method, 431 students have elected and have analyzed. The results have shown that there was positive significant relationship between Islamic identity, national and ethnic identity, and negative significant relationship between Islamic identity and global identity. In addition, multivariate regression results have shown that the variables national and global identities have explained 45 percent of the variation of Islamic identity variable. The results shows that national and ethnic identity amplify the Islamic identity and they have positive relationship with it and in fact they are not a competitive identity for Islamic identity but global identity has negative relationship with Islamic identity and therefore it is a competitive identity for Islamic identity.

  8. Randomized Controlled Trial of Electronic Care Plan Alerts and Resource Utilization by High Frequency Emergency Department Users with Opioid Use Disorder

    Directory of Open Access Journals (Sweden)

    Niels Rathlev, MD

    2016-01-01

    Full Text Available Introduction: There is a paucity of literature supporting the use of electronic alerts for patients with high frequency emergency department (ED use. We sought to measure changes in opioid prescribing and administration practices, total charges and other resource utilization using electronic alerts to notify providers of an opioid-use care plan for high frequency ED patients. Methods: This was a randomized, non-blinded, two-group parallel design study of patients who had 1 opioid use disorder and 2 high frequency ED use. Three affiliated hospitals with identical electronic health records participated. Patients were randomized into “Care Plan” versus “Usual Care groups”. Between the years before and after randomization, we compared as primary outcomes the following: 1 opioids (morphine mg equivalents prescribed to patients upon discharge and administered to ED and inpatients; 2 total medical charges, and the numbers of; 3 ED visits, 4 ED visits with advanced radiologic imaging (computed tomography [CT] or magnetic resonance imaging [MRI] studies, and 5 inpatient admissions. Results: A total of 40 patients were enrolled. For ED and inpatients in the “Usual Care” group, the proportion of morphine mg equivalents received in the post-period compared with the pre-period was 15.7%, while in the “Care Plan” group the proportion received in the post-period compared with the pre-period was 4.5% (ratio=0.29, 95% CI [0.07-1.12]; p=0.07. For discharged patients in the “Usual Care” group, the proportion of morphine mg equivalents prescribed in the post-period compared with the pre-period was 25.7% while in the “Care Plan” group, the proportion prescribed in the post-period compared to the pre-period was 2.9%. The “Care Plan” group showed an 89% greater proportional change over the periods compared with the “Usual Care” group (ratio=0.11, 95% CI [0.01-0.092]; p=0.04. Care plans did not change the total charges, or, the numbers

  9. Multimodal Resources in Transnational Adoption

    DEFF Research Database (Denmark)

    Raudaskoski, Pirkko Liisa

    The paper discusses an empirical analysis which highlights the multimodal nature of identity construction. A documentary on transnational adoption provides real life incidents as research material. The incidents involve (or from them emerge) various kinds of multimodal resources and participants...

  10. Identity Practices of Multilingual Writers in Social Networking Spaces

    Science.gov (United States)

    Chen, Hsin-I

    2013-01-01

    This study examines the literacy practices of two multilingual writers in social networking communities. The findings show that the multilingual writers explored and reappropriated symbolic resources afforded by the social networking site as they aligned themselves with particular collective and personal identities at local and global levels.…

  11. Constructing nurses' professional identity through social identity theory.

    Science.gov (United States)

    Willetts, Georgina; Clarke, David

    2014-04-01

    The profession of nursing continues to struggle with defining and clarifying its professional identity. The definitive recognition of nursing as a profession was the moving of training from the hospital apprentice model to the tertiary sector. However, this is only part of the story of professional identity in nursing. Once training finishes and enculturation into the workplace commences, professional identity becomes a complicated social activity. This paper proposes social identity theory as a valuable research framework to assist with clarifying and describing the professional identity of nurses. The paper outlines the key elements of a profession and then goes on to describe the main concepts of social identity theory. Lastly, a connection is made between the usefulness of using social identity theory in researching professional identity in nursing, recognizing the contextual nature of the social activity of the profession within its workplace environment. © 2013 Wiley Publishing Asia Pty Ltd.

  12. Resolving an identity crisis: Implicit drinking identity and implicit alcohol identity are related but not the same.

    Science.gov (United States)

    Ramirez, Jason J; Olin, Cecilia C; Lindgren, Kristen P

    2017-09-01

    Two variations of the Implicit Association Test (IAT), the Drinking Identity IAT and the Alcohol Identity IAT, assess implicit associations held in memory between one's identity and alcohol-related constructs. Both have been shown to predict numerous drinking outcomes, but these IATs have never been directly compared to one another. The purpose of this study was to compare these IATs and evaluate their incremental predictive validity. US undergraduate students (N=64, 50% female, mean age=21.98years) completed the Drinking Identity IAT, the Alcohol Identity IAT, an explicit measure of drinking identity, as well as measures of typical alcohol consumption and hazardous drinking. When evaluated in separate regression models that controlled for explicit drinking identity, results indicated that the Drinking Identity IAT and the Alcohol Identity IAT were significant, positive predictors of typical alcohol consumption, and that the Drinking Identity IAT, but not the Alcohol Identity IAT, was a significant predictor of hazardous drinking. When evaluated in the same regression models, the Drinking Identity IAT, but not the Alcohol Identity IAT, was significantly associated with typical and hazardous drinking. These results suggest that the Drinking Identity IAT and Alcohol Identity IAT are related but not redundant. Moreover, given that the Drinking Identity IAT, but not the Alcohol Identity IAT, incrementally predicted variance in drinking outcomes, identification with drinking behavior and social groups, as opposed to identification with alcohol itself, may be an especially strong predictor of drinking outcomes. Copyright © 2017 Elsevier Ltd. All rights reserved.

  13. Constructing a knowledge-based identity: Experiences from working with intellectual capital statements

    DEFF Research Database (Denmark)

    Kjærgaard, Isa Jensen

    2003-01-01

    how it wishes to define its activities both externally and internally. The paper concludes that, by working with IC statements, a company can achieve a way of constructing a new identity. Furthermore, the process of creating an IC statement can legitimize the whole idea of changing towards a knowledge......This paper analyses the inter-relationship between organizational identity and intellectual capital (IC) statements and suggests the IC statement as a framework for developing a knowledge-based identity. The results are based on a case study of a Danish electricity transmission system company......, which started the process of changing its public provider identity towards a knowledge-based identity in a changing market by applying the framework of an IC statement. The IC statement, as a new way of defining and working with strategic company resources, makes it possible for a company to communicate...

  14. Leadership identities

    DEFF Research Database (Denmark)

    Holmgreen, Lise-Lotte

    2018-01-01

    Questioning the assumption that identities can be controlled through a shared organisational culture, the article explores the inculcation of a discourse of diversity into leadership identities in a Danish bank and building society. Thus, it intends to demonstrate that, on the one hand, discourse...... plays a significant role in identity construction and, on the other, that leaders’ constructions may have many sources of inspiration within and outside the organisation, emphasising that identity construction is a complex process in which organisational efforts to promote a common leadership identity...... to construct their leadership identities. While the respondents present comparable identities to the interviewer, the analysis reveals that the they draw on different discourses and employ a number of different discursive means to present this identity. This, the article argues, may be the result of a number...

  15. A framework for implementation of user-centric identity management systems

    DEFF Research Database (Denmark)

    Adjei, Joseph K.; Olesen, Henning

    2010-01-01

    Users increasingly become part of electronic transactions, which take place instantaneously without direct user involvement. This leads to the risk of data manipulation, identity theft and privacy violation, and it has become a major concern for individuals and businesses around the world. Gov......-ernments in many countries are implementing identity man-agement systems (IdMS) to curtail these incidences and to offer citizens the power to exercise informational self-determination. Using concepts from technology adoption and fit-viability theo-ries as well as the laws of identity, this paper analyzes...... the crite-ria for successful implementation and defines a framework for a citizen-centric national IdMS. Results from a survey con-ducted in Ghana are also included....

  16. Electronic self-monitoring seal

    International Nuclear Information System (INIS)

    Campbell, J.W.

    1978-01-01

    The Electronic Self-Monitoring Seal is a new type of security seal which allows continuous verification of the seal's identity and status. The identity information is a function of the individual seal, time, and seal integrity. A description of this seal and its characteristics are presented. Also described are the use cycle for the seal and the support equipment for programming and verifying the seal

  17. Using mobile electronic devices to deliver educational resources in developing countries.

    Science.gov (United States)

    Mazal, Jonathan Robert; Ludwig, Rebecca

    2015-01-01

    Developing countries have far fewer trained radiography professionals than developed countries, which exacerbates the limited access to imaging services. The lack of trained radiographers reflects, in part, limited availability of radiographer-specific educational resources. Historically, organizations that provided such resources in the developing world faced challenges related to the limited stock of current materials as well as expenses associated with shipping and delivery. Four mobile electronic devices (MEDs) were loaded with educational content (e-books, PDFs, and digital applications) spanning major radiography topics. The MEDs were distributed to 4 imaging departments in Ghana, India, Nepal, and Nigeria based on evidence of need for radiography-specific resources, as revealed by survey responses. A cost comparison of postal delivery vs digital delivery of educational content was performed. The effectiveness of delivering additional content via Wi-Fi transmission also was evaluated. Feedback was solicited on users' experience with the MEDs as a delivery tool for educational content. An initial average per e-book expense of $30.05, which included the cost of the device, was calculated for the MED delivery method compared with $15.56 for postal delivery of printed materials. The cost of the MED delivery method was reduced to an average of $10.05 for subsequent e-book deliveries. Additional content was successfully delivered via Wi-Fi transmission to all recipients during the 3-month follow-up period. Overall user feedback on the experience was positive, and ideas for enhancing the MED-based method were identified. Using MEDs to deliver radiography-specific educational content appears to be more cost effective than postal delivery of printed materials on a long-term basis. MEDs are more efficient for providing updates to educational materials. Customization of content to department needs, and using projector devices could enhance the usefulness of MEDs for

  18. Legal Environment Against Online Identity Theft: Comparative Analysis of USA’s and Lithuania’s Legislation

    Directory of Open Access Journals (Sweden)

    Paulius Pakutinskas

    2011-08-01

    Full Text Available Summary. The growth of the Internet and e-commerce has taken identity theft to new levels. Indeed, consumers, financial institutions and the whole economic suffer from online identity theft. This article analyses the legal environment which is concerned with online identity theft. The analysis is based on the comparison of two countries—USA’s and Lithuania’s— legislation, regulating such fields as personal data protection, electronic information security, identification, criminal liability and special legal acts, regulating online identity theft, because if all these fields are sufficiently regulated, the fight with online identity theft is more successful. The choice of the countries is based on the fact that USA has experience in fighting online identity theft while Lithuania is taken into a deeper consideration asit is a member of the European Union, the legal system of which has great differences in comparison to the USA. The analysis of legislation, regulating personal data protection, is based on comparison of the main requirements and principles of personal data protection, institutions which are responsible for personal data protection and liability for breaches of personal data protection rules. The authors of the present article also present similarities and differences of legal regulation of electronic information security in USA and Lithuania by comparing the institutional control of information security, main requirements for information security and liability for breaches of information security rules. Also, the variety of personal identity documents in the USA and Lithuania is analyzed, main personal identity documents are presented as well as regulation of online identity theft, elements and types of identification online are discussed. Moreover, criminal and special legislation of USA and Lithuania is taken into consideration in order to discuss and compare criminalization aspects of online identity theft.In this article

  19. Legal Environment Against Online Identity Theft: Comparative Analysis of USA’s and Lithuania’s Legislation

    Directory of Open Access Journals (Sweden)

    Darius Štitilis

    2013-08-01

    Full Text Available The growth of the Internet and e-commerce has taken identity theft to new levels. Indeed, consumers, financial institutions and the whole economic suffer from online identity theft. This article analyses the legal environment which is concerned with online identity theft. The analysis is based on the comparison of two countries—USA’s and Lithuania’s— legislation, regulating such fields as personal data protection, electronic information security, identification, criminal liability and special legal acts, regulating online identity theft, because if all these fields are sufficiently regulated, the fight with online identity theft is more successful. The choice of the countries is based on the fact that USA has experience in fighting online identity theft while Lithuania is taken into a deeper consideration as it is a member of the European Union, the legal system of which has great differences in comparison to the USA. The analysis of legislation, regulating personal data protection, is based on comparison of the main requirements and principles of personal data protection, institutions which are responsible for personal data protection and liability for breaches of personal data protection rules. The authors of the present article also present similarities and differences of legal regulation of electronic information security in USA and Lithuania by comparing the institutional control of information security, main requirements for information security and liability for breaches of information security rules. Also, the variety of personal identity documents in the USA and Lithuania is analyzed, main personal identity documents are presented as well as regulation of online identity theft, elements and types of identification online are discussed. Moreover, criminal and special legislation of USA and Lithuania is taken into consideration in order to discuss and compare criminalization aspects of online identity theft. In this article it is

  20. Optimal taxation of exhaustible resource under monopoly

    International Nuclear Information System (INIS)

    Im, Jeong-Bin

    2002-01-01

    This paper deals with the problem of using taxes (or subsidies) to correct the inefficient resource allocation under monopoly. In this paper, the question raised is 'what would be the optimal tax on resource extraction under monopoly?' Ultimately, it is shown that taxes may be devised to generate price and extraction paths under monopoly that are identical to those under the competitive equilibrium. Tax policy can thus be used as an instrument for changing the distortionary resource allocation generated by the monopolist

  1. Identity at work: Exploring strategies for Identity Work

    Directory of Open Access Journals (Sweden)

    Byron G. Adams

    2012-01-01

    Full Text Available Orientation: This study explored strategies for identity work that are central to the negotiation and regulation of employee work identity.Research purpose: The main aim of this study was to explore employee narratives and identify the strategies available to them in the process of identity work, as they defined themselves at work.Motivation for the study: As there is a scarcity of research on identity work in South Africa, this study wanted to advance knowledge about identity work and the strategies used for regulating and negotiating an identity at work by exploring these constructs in this context.Research design, approach and method: A qualitative research process formed the basis for this study. Nineteen employees from a global manufacturing company participated in two semi-structured in-depth interviews. Grounded theory was applied to analyse and interpret the data.Main findings: Nine strategies for identity work were identified and categorised into four broad themes (personal philosophies; relationships; career management and negotiating balance.Practical/managerial implications: Employees followed various strategies for defining themselves at work and this may have some implications for employee work engagement and productivity.Contribution/value-add: This study expands on current theoretical knowledge of identity work, and provides insights into the strategies people use to regulate and negotiate their identities at work. 

  2. Success criteria for electronic medical record implementations in low-resource settings: a systematic review.

    Science.gov (United States)

    Fritz, Fleur; Tilahun, Binyam; Dugas, Martin

    2015-03-01

    Electronic medical record (EMR) systems have the potential of supporting clinical work by providing the right information at the right time to the right people and thus make efficient use of resources. This is especially important in low-resource settings where reliable data are also needed to support public health and local supporting organizations. In this systematic literature review, our objectives are to identify and collect literature about success criteria of EMR implementations in low-resource settings and to summarize them into recommendations. Our search strategy relied on PubMed queries and manual bibliography reviews. Studies were included if EMR implementations in low-resource settings were described. The extracted success criteria and measurements were summarized into 7 categories: ethical, financial, functionality, organizational, political, technical, and training. We collected 381 success criteria with 229 measurements from 47 articles out of 223 articles. Most papers were evaluations or lessons learned from African countries, published from 1999 to 2013. Almost half of the EMR systems served a specific disease area like human immunodeficiency virus (HIV). The majority of criteria that were reported dealt with the functionality, followed by organizational issues, and technical infrastructures. Sufficient training and skilled personnel were mentioned in roughly 10%. Political, ethical, and financial considerations did not play a predominant role. More evaluations based on reliable frameworks are needed. Highly reliable data handling methods, human resources and effective project management, as well as technical architecture and infrastructure are all key factors for successful EMR implementation. © The Author 2015. Published by Oxford University Press on behalf of the American Medical Informatics Association. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  3. Conflicts again? Resource exploitation and political instability in Melanesia

    Directory of Open Access Journals (Sweden)

    Kowasch, Matthias

    2014-09-01

    Full Text Available Most of the Melanesian countries are caracterized by political instability. At the same time, they possess enormous deposits of natural resources. The paper analyses the correlation between conflict and resource wealth. The authors explain that social relationships, identities and land are the things that matter in Melanesia. ‘Resource wealth’ is an amplifying factor, but not the main cause of violent disputes.

  4. Impact of Electronic Signatures and Time Stamping for the Protection of Electronic Agreements

    Directory of Open Access Journals (Sweden)

    Tadas Limba

    2012-12-01

    Full Text Available The article e495 valuates the impact of e-signatures and time stamping on electronic contracts and electronic documents for performing e-business opportunities and goals, and analyses e-signature application for business cases. Various electronic services, virtual shopping, electronic cash transactions are becoming increasingly popular as they allow users to quickly perform different actions, operations and functions. It is important not only for convenience, but also to ensure consumer data security and reliability. Security reasons are not enough for security transmitted data, since this method does not allow clarification of information about sender identity.Use of electronic signatures, electronic identities, checgs and ensures a very high level of data security in interchange data processes. E-signature allows e-business companies to transfer the company’s operation business processes and their application to the organization and management in the electronic environment, also automate internal and external compans processes, includinggon-going business processes.The object of paper is .-signature and time stamping application in the theoretical and practical way.The goal of this paper while evaluating and estimating the .-signature and time stamping application, i’s regulation and legal implementation worldwidesand in Lithuania—is to provideluseful recommendations for more efficient impact developing -commerce and -business in situations when -signature and time stamping is used for ensuring electronic contracs security.

  5. Impact of Electronic Signatures and Time Stamping for the Protection of Electronic Agreements

    Directory of Open Access Journals (Sweden)

    Tadas Limba

    2013-02-01

    Full Text Available The article e495 valuates the impact of e-signatures and time stamping on electronic contracts and electronic documents for performing e-business opportunities and goals, and analyses e-signature application for business cases. Various electronic services, virtual shopping, electronic cash transactions are becoming increasingly popular as they allow users to quickly perform different actions, operations and functions. It is important not only for convenience, but also to ensure consumer data security and reliability. Security reasons are not enough for security transmitted data, since this method does not allow clarification of information about sender identity. Use of electronic signatures, electronic identities, checgs and ensures a very high level of data security in interchange data processes. E-signature allows e-business companies to transfer the company’s operation business processes and their application to the organization and management in the electronic environment, also automate internal and external compans processes, includinggon-going business processes. The object of paper is .-signature and time stamping application in the theoretical and practical way. The goal of this paper while evaluating and estimating the .-signature and time stamping application, i’s regulation and legal implementation worldwidesand in Lithuania—is to provideluseful recommendations for more efficient impact developing -commerce and -business in situations when -signature and time stamping is used for ensuring electronic contracs security.

  6. Intergenerational transmission of ethnic identity and life satisfaction of Roma minority adolescents and their parents.

    Science.gov (United States)

    Dimitrova, Radosveta; Ferrer-Wreder, Laura; Trost, Kari

    2015-12-01

    This study investigates intergeneration transmission of ethnic identity as a resource for life satisfaction of Roma adolescents and their parents. Historically, Roma represent the largest ethnic minority in Europe. They have been exposed to severe discrimination, social exclusion, and poverty. Therefore, identifying resources for their life satisfaction is theoretically and practically important. The present study included 1093 participants, of which there were 171 Roma adolescents (age: M = 14.96 years, SD = 1.85), 155 mothers (age: M = 36.16 years, SD = 5.77) and 123 fathers (age: M = 39.68 years, SD = 6.06). Further, a comparison group of 248 mainstream adolescents with their mothers (n = 221) and fathers (n = 175) was also included in the study. Adolescents and their parents provided data on ethnic identity (MEIM; Phinney, 1992) and life satisfaction (SWLS; Diener, Emmons, Larsen, & Griffin, 1985). Results indicated that Roma youth were lower on endorsement of ethnic identity and average on life satisfaction compared to their mainstream peers. A structural equation model showed that ethnic identity was a positive predictor of life satisfaction for both adolescents and their Roma parents. Furthermore, parents' ethnic identity was a predictor of adolescent life satisfaction. We concluded that for Roma youth and their parents, ethnic identity represents a salient source for life satisfaction and an intergenerational continuity of identity and life satisfaction exists. Copyright © 2015 The Foundation for Professionals in Services for Adolescents. Published by Elsevier Ltd. All rights reserved.

  7. Identity, identity politics, and neoliberalism

    Directory of Open Access Journals (Sweden)

    Wrenn Mary

    2014-01-01

    Full Text Available With the intensification of neoliberalism, it is useful to examine how some individuals might cope with the irrationality of the system. Neoliberalism cloaks the execution of the corporate agenda behind rhetorical manipulation that advocates for limited government. The corollary absence of government involvement on behalf of the citizenry writ large disarms the means of social redress for the individual. Democracy funded and fueled by corporate power thereby disenfranchises the individual, provoking some to search for empowerment through identity politics. The argument set forth suggests that individuals construct, reinforce, or escalate allegiance to identities as a coping mechanism, some of which manifest in violent identity politics.

  8. The Process of Identity Work: Negotiating a Work Identity

    NARCIS (Netherlands)

    Crafford, A.; Adams, B.G.; Saayman, T.; Vinkenburg, C.J.; Jansen, P.G.W.; Roodt, G.

    2015-01-01

    Identity work is an important process in negotiating, regulating and maintaining a coherent sense of self-(identity). In this chapter we discuss how identity work is particularly useful in establishing a work identity. The crux of the discussion in this chapter is based on the qualitative phase of

  9. White Kids: Language, Race, and Styles of Youth Identity

    Science.gov (United States)

    Bucholtz, Mary

    2011-01-01

    In White Kids, Mary Bucholtz investigates how white teenagers use language to display identities based on race and youth culture. Focusing on three youth styles--preppies, hip hop fans, and nerds--Bucholtz shows how white youth use a wealth of linguistic resources, from social labels to slang, from Valley Girl speech to African American English,…

  10. Coherent Electron Scattering Captured by an Attosecond Quantum Stroboscope

    International Nuclear Information System (INIS)

    Mauritsson, J.; Johnsson, P.; Mansten, E.; Swoboda, M.; Ruchon, T.; L'Huillier, A.; Schafer, K. J.

    2008-01-01

    We demonstrate a quantum stroboscope based on a sequence of identical attosecond pulses that are used to release electrons into a strong infrared (IR) laser field exactly once per laser cycle. The resulting electron momentum distributions are recorded as a function of time delay between the IR laser and the attosecond pulse train using a velocity map imaging spectrometer. Because our train of attosecond pulses creates a train of identical electron wave packets, a single ionization event can be studied stroboscopically. This technique has enabled us to image the coherent electron scattering that takes place when the IR field is sufficiently strong to reverse the initial direction of the electron motion causing it to rescatter from its parent ion

  11. The role of the collaboratory in enabling large-scale identity management for HEP

    International Nuclear Information System (INIS)

    Cowles, Robert; Jackson, Craig; Welch, Von

    2014-01-01

    The authors are defining a model that describes and guides existing and future scientific collaboratory identity management implementations. Our ultimate goal is to provide guidance to virtual organizations and resource providers in designing an identity management implementation. Our model is captured in previously published work. Here, we substantially extend our analysis in terms of six motivation factors (user isolation, persistence of user data, complexity of virtual organization roles, cultural and historical inertia, scaling, and incentive for collaboration), observed in interviews with community members involved in identity management, that impact implementation decisions. This analysis is a significant step towards our ultimate goal of providing guidance to virtual organizations.

  12. Introducing the electronic patient record (EPR) in a hospital setting: boundary work and shifting constructions of professional identities.

    Science.gov (United States)

    Håland, Erna

    2012-06-01

    Today's healthcare sector is being transformed by several ongoing processes, among them the introduction of new technologies, new financial models and new ways of organising work. The introduction of the electronic patient record (EPR) is representative and part of these extensive changes. Based on interviews with health personnel and office staff in a regional hospital in Norway, and with health administrators and information technology service-centre staff in the region, the article examines how the introduction of the EPR, as experienced by the participants, affects the work practices and boundaries between various professional groups in the healthcare system and discusses the implications this has for the understanding of medical practice. The article shows how the EPR has become part of the professionals' boundary work; expressing shifting constructions of professional identities. © 2011 The Author. Sociology of Health & Illness © 2011 Foundation for the Sociology of Health & Illness/Blackwell Publishing Ltd.

  13. Medical Identity

    DEFF Research Database (Denmark)

    Musaeus, Peter

    2015-01-01

    Purpose: To examine philosophical stances underpinning medical identity and assess the conceptual relationship between physician, medical practice and culture. Argument: Medical identity is about the ideals and moral positions that physicians take when justifying themselves. Medical identity...... hedonistic versus sentimentalist approaches to medical identity. The sociocultural philosophical analysis of medical identity can shed light on what it means conceptually for a physician to harbor beliefs associated with him/her being taken to be an autonomous professional. It is important because it touches...... on the meaning of being a compassionate, good and skilled physician, making its relevance to person-centered medicine self-evident. Conclusion: Medical identity should be analyzed with reference to literature, philosophy and medical practice in order for the physician to exercise a reflective position...

  14. Bringing Federated Identity to Grid Computing

    Energy Technology Data Exchange (ETDEWEB)

    Teheran, Jeny [Fermilab

    2016-03-04

    The Fermi National Accelerator Laboratory (FNAL) is facing the challenge of providing scientific data access and grid submission to scientific collaborations that span the globe but are hosted at FNAL. Users in these collaborations are currently required to register as an FNAL user and obtain FNAL credentials to access grid resources to perform their scientific computations. These requirements burden researchers with managing additional authentication credentials, and put additional load on FNAL for managing user identities. Our design integrates the existing InCommon federated identity infrastructure, CILogon Basic CA, and MyProxy with the FNAL grid submission system to provide secure access for users from diverse experiments and collab orations without requiring each user to have authentication credentials from FNAL. The design automates the handling of certificates so users do not need to manage them manually. Although the initial implementation is for FNAL's grid submission system, the design and the core of the implementation are general and could be applied to other distributed computing systems.

  15. Identity at work: Exploring strategies for Identity Work

    Directory of Open Access Journals (Sweden)

    Byron G. Adams

    2012-09-01

    Research purpose: The main aim of this study was to explore employee narratives and identify the strategies available to them in the process of identity work, as they defined themselves at work. Motivation for the study: As there is a scarcity of research on identity work in South Africa, this study wanted to advance knowledge about identity work and the strategies used for regulating and negotiating an identity at work by exploring these constructs in this context. Research design, approach and method: A qualitative research process formed the basis for this study. Nineteen employees from a global manufacturing company participated in two semi-structured in-depth interviews. Grounded theory was applied to analyse and interpret the data. Main findings: Nine strategies for identity work were identified and categorised into four broad themes (personal philosophies; relationships; career management and negotiating balance. Practical/managerial implications: Employees followed various strategies for defining themselves at work and this may have some implications for employee work engagement and productivity. Contribution/value-add: This study expands on current theoretical knowledge of identity work, and provides insights into the strategies people use to regulate and negotiate their identities at work.

  16. Investigating the Identity Theft Prevention Strategies in M-Commerce

    Science.gov (United States)

    Shah, Mahmood Hussain; Ahmed, Javed; Soomro, Zahoor Ahmed

    2016-01-01

    Mobile commerce has provided extended business opportunities for online organisations and made it easier for customers to purchase products on-line from anywhere at any time. However, there are several risks associated with it, especially the identity theft. Online organisations commonly use electronic commerce approaches; however, these have some…

  17. Identity paradoxes

    Directory of Open Access Journals (Sweden)

    Đurić Jelena

    2010-01-01

    Full Text Available The article considers paradoxical nature of identity that emerges from: 1 the very concept of identity whose abstract generality unites various and even opposite features; 2 the processual nature of reality that is easier to express in the poetical metaphors or abstract principles than in unambiguous conceptual networks; 3 the oppose relationship between being and knowledge, mind and matter, subject and object, self and personality. Entangled in the labyrinth which evade efforts to be conceptually defined, the modern thinking of identity moves towards abandoning the idea of “self” on behalf of the “ego” and towards the misapprehension of identity as being identical. This corresponds to the “time of the lost spirit” stretched between the simultaneous need to find an identity and to give it up.

  18. Federated Identity Management

    OpenAIRE

    Chadwick, David W.

    2009-01-01

    Abstract. This paper addresses the topic of federated identity management. It discusses in detail the following topics: what is digital identity, what is identity management, what is federated identity management, Kim Camerons 7 Laws of Identity, how can we protect the users privacy in a federated environment, levels of assurance, some past and present federated identity management systems, and some current research in FIM.

  19. Educations in Ethnic Violence: Identity, Educational Bubbles, and Resource Mobilization

    Science.gov (United States)

    Lange, Matthew

    2011-01-01

    In "Educations in Ethnic Violence", Matthew Lange explores the effects education has on ethnic violence. Lange contradicts the widely-held belief that education promotes peace and tolerance. Rather, Lange finds that education commonly contributes to aggression, especially in environments with ethnic divisions, limited resources, and…

  20. Electronic Human Resources Management (e-HRM Adoption Studies: Past and Future Research

    Directory of Open Access Journals (Sweden)

    Winarto Winarto

    2018-05-01

    Full Text Available Electronic human resource management (e-HRM systems become more widely used by profit and non-profit organization. However, the field currently lacks sound theoretical frameworks that can be useful in addressing a key issue concerning the implementation of e-HRM systems, in particular to obtain a better understanding of the factors influencing the adoption of e-HRM systems. The objective of this paper is to provide a foundation towards the development of a theoretical framework for the implementation of e-HRM systems and develop a conceptual model that would reflect the nature of e-HRM systems’ adoption through systematic literature review. Adopting Crossan and Apaydin’s procedure of systematic review, this paper investigated 21 empirical papers of electronics human resources management, then categorized them into 4 characteristics which influence the adoption; System and technology characteristics; Organizational characteristics; User/individual characteristics, and Environmental and contextual characteristics. Finally, the e-HRM adoption research framework is drawn and based on the framework; avenues for future research are discussed.   Bahasa Indonesia Abstrak: Manajemen sumber daya manusia elektronik (selanjutnya disebut dengan e-HRM semakin banyak digunakan oleh organisasi profit dan nonprofit. Namun, bidang dan topik ini belum memiliki kerangka teori yang mapan, yang dapat digunakan untuk menganalisis isu-isu terkait penerapan e-HRM, terutama mengenai faktor-faktor yang mempengaruhi adopsi sistem e-HRM. Tujuan penelitian ini adalah untuk memberikan landasan bagi pengembangan kerangka teoritis untuk implementasi sistem e-HRM dan mengembangkan model konseptual yang akan menggambarkan adopsi sistem e-HRM melalui tinjauan literatur sistematis. Mengadopsi prosedur dan metode Crossan dan Apaydin untuk melakukan telaah literatur secara sistematis, paper ini menyelidiki 21 publikasi empiris manajemen sumber daya manusia elektronik dari 2

  1. Social identity change: shifts in social identity during adolescence.

    Science.gov (United States)

    Tanti, Chris; Stukas, Arthur A; Halloran, Michael J; Foddy, Margaret

    2011-06-01

    This study investigated the proposition that adolescence involves significant shifts in social identity as a function of changes in social context and cognitive style. Using an experimental design, we primed either peer or gender identity with a sample of 380 early- (12-13 years), mid- (15-16 years), and late-adolescents (18-20 years) and then measured the effect of the prime on self-stereotyping and ingroup favouritism. The findings showed significant differences in social identity across adolescent groups, in that social identity effects were relatively strong in early- and late-adolescents, particularly when peer group identity rather than gender identity was salient. While these effects were consistent with the experience of change in educational social context, differences in cognitive style were only weakly related to ingroup favouritism. The implications of the findings for theory and future research on social identity during adolescence are discussed. Crown Copyright © 2010. Published by Elsevier Ltd. All rights reserved.

  2. Comparative Associations Between Achieved Bicultural Identity, Achieved Ego Identity, and Achieved Religious Identity and Adaptation Among Australian Adolescent Muslims.

    Science.gov (United States)

    Abu-Rayya, Hisham M; Abu-Rayya, Maram H; White, Fiona A; Walker, Richard

    2018-04-01

    This study examined the comparative roles of biculturalism, ego identity, and religious identity in the adaptation of Australian adolescent Muslims. A total of 504 high school Muslim students studying at high schools in metropolitan Sydney and Melbourne, Australia, took part in this study which required them to complete a self-report questionnaire. Analyses indicated that adolescent Muslims' achieved religious identity seems to play a more important role in shaping their psychological and socio-cultural adaptation compared to adolescents' achieved bicultural identity. Adolescents' achieved ego identity tended also to play a greater role in their psychological and socio-cultural adaptation than achieved bicultural identity. The relationships between the three identities and negative indicators of psychological adaptation were consistently indifferent. Based on these findings, we propose that the three identity-based forces-bicultural identity development, religious identity attainment, and ego identity formation-be amalgamated into one framework in order for researchers to more accurately examine the adaptation of Australian adolescent Muslims.

  3. x509-free access to WLCG resources

    Science.gov (United States)

    Short, H.; Manzi, A.; De Notaris, V.; Keeble, O.; Kiryanov, A.; Mikkonen, H.; Tedesco, P.; Wartel, R.

    2017-10-01

    Access to WLCG resources is authenticated using an x509 and PKI infrastructure. Even though HEP users have always been exposed to certificates directly, the development of modern Web Applications by the LHC experiments calls for simplified authentication processes keeping the underlying software unmodified. In this work we will show a solution with the goal of providing access to WLCG resources using the user’s home organisations credentials, without the need for user-acquired x509 certificates. In particular, we focus on identity providers within eduGAIN, which interconnects research and education organisations worldwide, and enables the trustworthy exchange of identity-related information. eduGAIN has been integrated at CERN in the SSO infrastructure so that users can authenticate without the need of a CERN account. This solution achieves x509-free access to Grid resources with the help of two services: STS and an online CA. The STS (Security Token Service) allows credential translation from the SAML2 format used by Identity Federations to the VOMS-enabled x509 used by most of the Grid. The IOTA CA (Identifier-Only Trust Assurance Certification Authority) is responsible for the automatic issuing of short-lived x509 certificates. The IOTA CA deployed at CERN has been accepted by EUGridPMA as the CERN LCG IOTA CA, included in the IGTF trust anchor distribution and installed by the sites in WLCG. We will also describe the first pilot projects which are integrating the solution.

  4. Swiss identity smells like chocolate: Social identity shapes olfactory judgments

    Science.gov (United States)

    Coppin, Géraldine; Pool, Eva; Delplanque, Sylvain; Oud, Bastiaan; Margot, Christian; Sander, David; Van Bavel, Jay J.

    2016-01-01

    There is extensive evidence that social identities can shape people’s attitudes and behavior, but what about sensory judgments? We examined the possibility that social identity concerns may also shape the judgment of non-social properties—namely, olfactory judgment. In two experiments, we presented Swiss and non-Swiss participants with the odor of chocolate, for which Switzerland is world-famous, and a control odor (popcorn). Swiss participants primed with Swiss identity reported the odor of chocolate (but not popcorn) as more intense than non-Swiss participants (Experiments 1 and 2) and than Swiss participants primed with individual identity or not primed (Experiment 2). The self-reported intensity of chocolate smell tended to increase as identity accessibility increased—but only among Swiss participants (Experiment 1). These results suggest that identity priming can counter-act classic sensory habituation effects, allowing identity-relevant smells to maintain their intensity after repeated presentations. This suggests that social identity dynamically influences sensory judgment. We discuss the potential implications for models of social identity and chemosensory perception. PMID:27725715

  5. Swiss identity smells like chocolate: Social identity shapes olfactory judgments.

    Science.gov (United States)

    Coppin, Géraldine; Pool, Eva; Delplanque, Sylvain; Oud, Bastiaan; Margot, Christian; Sander, David; Van Bavel, Jay J

    2016-10-11

    There is extensive evidence that social identities can shape people's attitudes and behavior, but what about sensory judgments? We examined the possibility that social identity concerns may also shape the judgment of non-social properties-namely, olfactory judgment. In two experiments, we presented Swiss and non-Swiss participants with the odor of chocolate, for which Switzerland is world-famous, and a control odor (popcorn). Swiss participants primed with Swiss identity reported the odor of chocolate (but not popcorn) as more intense than non-Swiss participants (Experiments 1 and 2) and than Swiss participants primed with individual identity or not primed (Experiment 2). The self-reported intensity of chocolate smell tended to increase as identity accessibility increased-but only among Swiss participants (Experiment 1). These results suggest that identity priming can counter-act classic sensory habituation effects, allowing identity-relevant smells to maintain their intensity after repeated presentations. This suggests that social identity dynamically influences sensory judgment. We discuss the potential implications for models of social identity and chemosensory perception.

  6. Forum: cultural identity and (dis)continuities of children of immigrant communities

    Science.gov (United States)

    Obsiye, Mohamed; Cook, Rachel

    2016-12-01

    Susan Harper's study centres on `funds of knowledge' as a pedagogical resource for the development of a science curriculum, drawing on Karen refugee parents' cultural knowledge and identity. She argues that engagement in this process helps the parent generation of this community to `rebuild their cultural resilience' and cope with the resettlement process (p. 43). Drawing on our own research with Somali, Sierra Leonean and Nigerian diaspora communities in London, the following article extends this discussion with a particular focus on the intricate intergenerational dynamics between children and their parents' generation in relation to cultural identity development though engagement with education.

  7. Capitalism, Identity Politics, and Queerness Converge: LGBT Employee Resource Groups

    Science.gov (United States)

    Githens, Rod P.

    2009-01-01

    Lesbian, gay, bisexual, and transgender (LGBT) employee resource groups have brought about substantial organizational change within corporations. Capitalist structures have enabled these changes to occur more quickly in the private sector than within the public sector. In this article, I explore how capitalism has converged with two approaches of…

  8. "If I Had Abandoned My Children": Community Mobilization and Commitment to the Identity of Mother in Northeast Brazil.

    Science.gov (United States)

    Neuhouser, Kevin

    1998-01-01

    In an urban Brazilian shantytown, poor mothers took the risk of becoming squatters on public land (despite repressive actions by a military dictatorship) because activism was their only avenue to access the resources (housing) needed for motherhood--their only available valued identity. Poor fathers, having other possible identities, tended to…

  9. Improving Electronic Resources through Holistic Budgeting

    Science.gov (United States)

    Kusik, James P.; Vargas, Mark A.

    2009-01-01

    To establish a more direct link between its collections and the educational goals of Saint Xavier University, the Byrne Memorial Library has adopted a "holistic" approach to collection development. This article examines how traditional budget practices influenced the library's selection of resources and describes how holistic collection…

  10. Constructing Glocal Identities through Multilingual Writing Practices on Flickr.com[R

    Science.gov (United States)

    Lee, Carmen K. M.; Barton, David

    2011-01-01

    This article reports on a study of user-generated multilingual writing activities on the photo sharing site, Flickr.com[R]. It discusses how Flickr users deploy their multilingual resources when interacting with international audiences, the factors affecting their language choice, and how new multilingual identities are constructed. An exploratory…

  11. Forum: Cultural Identity and (Dis)Continuities of Children of Immigrant Communities

    Science.gov (United States)

    Obsiye, Mohamed; Cook, Rachel

    2016-01-01

    Susan Harper's study centres on "funds of knowledge" as a pedagogical resource for the development of a science curriculum, drawing on Karen refugee parents' cultural knowledge and identity. She argues that engagement in this process helps the parent generation of this community to "rebuild their cultural resilience" and cope…

  12. ORGANIZATION OF BIODIVERSITY RESOURCES BASED ON THE PROCESS OF THEIR CREATION AND THE ROLE OF INDIVIDUAL ORGANISMS AS RESOURCE RELATIONSHIP NODES

    Directory of Open Access Journals (Sweden)

    Steven J Baskauf

    2010-06-01

    Full Text Available Abstract. - Kinds of occurrences (evidence of particular living organisms can be grouped by common data and metadata characteristics that are determined by the way that the occurrence represents the organism. The creation of occurrence resources follows a pattern which can be used as the basis for organizing both the metadata associated with those resources and the relationships among the resources. The central feature of this organizational system is a resource representing the individual organism. This resource serves as a node which connects the organism's occurrences and any determinations of the organism's taxonomic identity. I specify a relatively small number of predicates which can define the important relationships among these resources and suggest which metadata properties should logically be associated with each kind of resource.

  13. Clinician‐selected Electronic Information Resources do not Guarantee Accuracy in Answering Primary Care Physicians’ Information Needs. A review of: McKibbon, K. Ann, and Douglas B. Fridsma. “Effectiveness of Clinician‐selected Electronic Information Resources for Answering Primary Care Physicians’ Information Needs.” Journal of the American Medical Informatics Association 13.6 (2006: 653‐9.

    Directory of Open Access Journals (Sweden)

    Martha Ingrid Preddie

    2008-03-01

    Full Text Available Objective – To determine if electronic information resources selected by primary care physicians improve their ability to answer simulated clinical questions.Design – An observational study utilizing hour‐long interviews and think‐aloud protocols.Setting – The offices and clinics of primary care physicians in Canada and the United States.Subjects – Twenty‐five primary care physicians of whom 4 were women, 17 were from Canada, 22 were family physicians,and 24 were board certified.Methods – Participants provided responses to 23 multiple‐choice questions. Each physician then chose two questions and looked for the answers utilizing information resources of their own choice. The search processes, chosen resources and search times were noted. These were analyzed along with data on the accuracy of the answers and certainties related to the answer to each clinical question prior to the search.Main results – Twenty‐three physicians sought answers to 46 simulated clinical questions. Utilizing only electronic information resources, physicians spent a mean of 13.0 (SD 5.5 minutes searching for answers to the questions, an average of 7.3(SD 4.0 minutes for the first question and 5.8 (SD 2.2 minutes to answer the second question. On average, 1.8 resources were utilized per question. Resources that summarized information, such as the Cochrane Database of Systematic Reviews, UpToDate and Clinical Evidence, were favored 39.2% of the time, MEDLINE (Ovid and PubMed 35.7%, and Internet resources including Google 22.6%. Almost 50% of the search and retrieval strategies were keyword‐based, while MeSH, subheadings and limiting were used less frequently. On average, before searching physicians answered 10 of 23 (43.5% questions accurately. For questions that were searched using clinician‐selected electronic resources, 18 (39.1% of the 46 answers were accurate before searching, while 19 (42.1% were accurate after searching. The difference of

  14. Review of material recovery from used electric and electronic equipment-alternative options for resource conservation.

    Science.gov (United States)

    Friege, Henning

    2012-09-01

    For waste from electric and electronic equipment, the WEEE Directive stipulates the separate collection of electric and electronic waste. As to new electric and electronic devices, the Restriction of Hazardous Substances (RoHS) Directive bans the use of certain chemicals dangerous for man and environment. From the implementation of the WEEE directive, many unsolved problems have been documented: poor collection success, emission of dangerous substances during collection and recycling, irretrievable loss of valuable metals among others. As to RoHS, data from the literature show a satisfying success. The problems identified in the process can be reduced to some basic dilemmas at the borders between waste management, product policy and chemical safety. The objectives of the WEEE Directive and the specific targets for use and recycling of appliances are not consistent. There is no focus on scarce resources. Extended producer responsibility is not sufficient to guarantee sustainable waste management. Waste management reaches its limits due to problems of implementation but also due to physical laws. A holistic approach is necessary looking at all branch points and sinks in the stream of used products and waste from electric and electronic equipment. This may be done with respect to the general rules for sustainable management of material streams covering the three dimensions of sustainable policy. The relationships between the players in the field of electric and electronic devices have to be taken into account. Most of the problems identified in the implementation process will not be solved by the current amendment of the WEEE Directive.

  15. Charting a Course through CORAL: Texas A&M University Libraries' Experience Implementing an Open-Source Electronic Resources Management System

    Science.gov (United States)

    Hartnett, Eric; Beh, Eugenia; Resnick, Taryn; Ugaz, Ana; Tabacaru, Simona

    2013-01-01

    In 2010, after two previous unsuccessful attempts at electronic resources management system (ERMS) implementation, Texas A&M University (TAMU) Libraries set out once again to find an ERMS that would fit its needs. After surveying the field, TAMU Libraries selected the University of Notre Dame Hesburgh Libraries-developed, open-source ERMS,…

  16. The Supermalt identity

    DEFF Research Database (Denmark)

    Bech-Larsen, Tino; Esbjerg, Lars; Grunert, Klaus G.

    2007-01-01

    on consumers' self-identities. The second part explored the role of food and beverage products in the construction of self-identities. The final part focused on the construction of brand identity for Supermalt. Findings - The article provides information on the self-identities constructed by Afro......-Caribbean informants. The food and beverage consumption of informants reflects their mixed cultural identity. The brand identity Supermalt appears to be malleable, with ample room for consumer co-construction. Perceptions of brand identity differ markedly among informants, who are all able to construct Supermalt......Purpose - The objective of this article is to conduct a case study of the Supermalt brand of malt beer, which has become the preferred beverage of Afro-Caribbean consumers in Brixton on a very limited marketing budget. Design/methodology/approach - The article uses the concepts of personal identity...

  17. Fashioning Identity

    DEFF Research Database (Denmark)

    Mackinney-Valentin, Maria

    We dress to communicate who we are, or who we would like others to think we are, telling seductive fashion narratives through our adornment. Yet, today, fashion has been democratized through high-low collaborations, social media and real-time fashion mediation, complicating the basic dynamic...... of identity displays, and creating tension between personal statements and social performances. Fashioning Identity explores how this tension is performed through fashion production and consumption,by examining a diverse series of case studies - from ninety-year old fashion icons to the paradoxical rebellion...... by readdressing Fred Davis' seminal concept of 'identity ambivalence' in Fashion, Culture and Identity (1992), Mackinney-Valentin argues that we are in an epoch of 'status ambivalence', in which fashioning one's own identity has become increasingly complicated....

  18. An Overview of Some Electronic Identification Use Cases in Europe

    Science.gov (United States)

    Mattatia, Fabrice

    As online services become more and more widely used, and as the exchanges of personal data become more and more widespread, electronic identification appears to be a key function for the security of the process and for the protection of privacy. It is the sole means of ensuring only authorized people have access to the data. In France and throughout Europe, e-government services, as well as private services, already use different means of electronic identification. Among the different technical solutions stand the electronic identity card: around 20 million eID cards have already been issued in Europe. The question of their interoperability is now open, in order that all European citizens may access the e-services of any Member State. With the development of electronic administration comes the need for the citizen to be able to prove his or her identity. This is essential if the citizen wants access to her personal data or administrative files, or if he wants to claim a right attached to his very identity. On the other hand, administrations have the obligation to ensure the personal data they store are not displayed to people who are not entitled to see them. They also have the need to detect fraudsters. Electronic identification, which is the ability to prove someone's identity on the Internet, thus becomes a central matter.

  19. Beyond identity politics: the making of an oral history of Hong Kong women who love women.

    Science.gov (United States)

    Wong, Day

    2006-01-01

    Oral history has long been an important resource for lesbian and other underprivileged groups in advancing identity politics. While there is an increased awareness of social construction of identity and the impact of race and class on the experiences of sexual identities, oral historians have yet to rethink their task in view of poststructuralists' and queer theorists' critique of identity. This paper examines the "Oral History Project of Hong Kong Women Who Love Women" as an attempt to construct histories that respect difference and minimize normalization. It discusses the project's significance in terms of its subversion of the heterosexual/homosexual binary and its queering of the notions of identity, community and coming out. The critique unfolded is one of anti-assimilation and anti-minoritization. doi:10.1300/J155v10n03_03.

  20. Psychotherapeutic discourse in problematizing transnational identities in computer-mediated interaction

    DEFF Research Database (Denmark)

    Klausen, Julia Zhukova

    2017-01-01

    The chapter focuses on the complexity of transnational belonging and on the diversity of the discursive and semiotic resources through which it is constructed in the computer-mediated Russian-speaking social space, Rusforum. The study connects the matters of transnational (dis)identification and ......, which take place in social media environments. Keywords: computer-mediated communication, social-semiotic discourse analysis, identity, transnational subjectivity, subjectivation......The chapter focuses on the complexity of transnational belonging and on the diversity of the discursive and semiotic resources through which it is constructed in the computer-mediated Russian-speaking social space, Rusforum. The study connects the matters of transnational (dis...

  1. Identity Assemblages

    DEFF Research Database (Denmark)

    Horn, Line Helverskov

    The study aims at exploring how identity is enacted within the context of a two-year programme in Service, Hospitality, and Tourism Management (SHTM). This research thus investigates how students and educators go about their daily lives in different educational contexts both on and off campus...... as a contribution to the body of literature of ANT-based studies. Second, it contributes to existing identity theories by exemplifying a socio-material approach to identity issues. Third, the study enables reflections upon how educational institutions as fundamentally identity-producing organisations acknowledge...

  2. Civil Identity

    DEFF Research Database (Denmark)

    Petersen, Lars Axel

    In this paper I will go through a catalogue of examples of contexts in which the term civil identity is currently used, ranging from the formal and technical process of linking a set of administrative and other events to an individual biological person by means of identity cards, fingerprints, iris...... of Israel to Luce Irigaray's Feminist agenda of elaborating gender specific civil identities. My intention is to investigate whether these different employments of 'civil identity' point towards a common, and fairly well defined object field asking questions of contemporary relevance to the philosophy...

  3. Identity management strategies among HIV-positive Colombian gay men in London.

    Science.gov (United States)

    Jaspal, Rusi; Williamson, Iain

    2017-12-01

    This study set out to explore the social-psychological aspects of living with HIV among a group of HIV-positive Colombian gay men in London, and the strategies that they deployed to manage ensuing threats to their identities. Focus group and individual interview data were collected from 14 Colombian gay men living with HIV, and were analysed using qualitative thematic analysis and identity process theory. The following themes are discussed: (1) identity struggles and conflicts in Colombia, (2), managing multiple layers of social stigma in England, and (3) changing interpersonal and intergroup dynamics, which highlight the inter-connections between sexual prejudice, sexual risk-taking and HIV stigma. Identity may be chronically threatened due to the multiple layers of stigma, which can limit the coping strategies available to individuals. Findings strongly support the need for action and programmes to highlight and tackle both racism and HIV stigma on the gay scene and to fund more specific resources for sub-communities of gay, bisexual and other men who have sex with men, which employ appropriately trained and culturally competent staff.

  4. On Fay identity

    International Nuclear Information System (INIS)

    Michev, Iordan P.

    2006-01-01

    In the first part of this paper we consider the transformation of the cubic identities for general Korteweg-de Vries (KdV) tau functions from [Mishev, J. Math. Phys. 40, 2419-2428 (1999)] to the specific identities for trigonometric KdV tau functions. Afterwards, we consider the Fay identity as a functional equation and provide a wide set of solutions of this equation. The main result of this paper is Theorem 3.4, where we generalize the identities from Mishev. An open problem is the transformation of the cubic identities from Mishev to the specific identities for elliptic KdV tau functions

  5. Identity and identity conflict in the workplace

    NARCIS (Netherlands)

    K.E. Horton (Kate); P.S. Bayerl (Saskia); G. Belschak-Jacobs (Gabriele)

    2014-01-01

    textabstractAs individuals, we define ourselves according to various characteristics that include our values and beliefs. This gives us our identity. As organisations become increasingly complex, understanding the concept of identity conflict may mean the difference between success and failure.

  6. Designing a model of electronic human resource management’s implementation at the Ministry of Communications and Information Technology

    Directory of Open Access Journals (Sweden)

    Mirali Seyednaghavi

    2017-06-01

    Full Text Available : In the first phase of this study a model for electronic human resource management in government agencies based on new public services was explored by using software MAXQDA, then in the second phase, relationship between the elements of the theory were tested using software Smart PLS2. So the aim of this study is to design a model of electronic human resource management’s implementation at the Ministry of Communications and Information Technology. In this regard, according to Strauss and Corbin’s structured plan, five hypotheses were tested. Quantitative data analysis indicates that the pressures of the policies and global perspectives cause to move toward e-HRM. Among the contextual conditions macro structural mechanisms, considerations of actors, governance considerations have a significant impact on the strategy of new public services and therefore lead to the consequences of its implementation in public organizations. The findings suggest that e-HRM does not have a positive and meaningful impact on new public services, and in our country, although the recent political developments have somehow removed the gap between public policy makers, administrators, and the public, but there is still a long way to go.

  7. Mistaken identity: activating conservative political identities induces "conservative" financial decisions.

    Science.gov (United States)

    Morris, Michael W; Carranza, Erica; Fox, Craig R

    2008-11-01

    Four studies investigated whether activating a social identity can lead group members to choose options that are labeled in words associated with that identity. When political identities were made salient, Republicans (but not Democrats) became more likely to choose the gamble or investment option labeled "conservative." This shift did not occur in a condition in which the same options were unlabeled. Thus, the mechanism underlying the effect appears to be not activated identity-related values prioritizing low risk, but rather activated identity-related language (the group label "conservative"). Indeed, when political identities were salient, Republicans favored options labeled "conservative" regardless of whether the options were low or high risk. Finally, requiring participants to explain the label "conservative" before making their choice did not diminish the effect, which suggests that it does not merely reflect inattention to content or construct accessibility. We discuss the implications of these results for the literatures on identity, priming, choice, politics, and marketing.

  8. Critical elements in defining work-based identity in a post-apartheid South Africa

    Directory of Open Access Journals (Sweden)

    Sandra Lloyd

    2011-08-01

    Research purpose: The aim of the specific research questions was to determine which life sphere and life role elements, and which work-based identity facets were significant in forming work-based identity. Motivation for the study: The findings of the study will enable the formulation of an integrative definition of work-based identity applicable to the South African context. Research design, approach and method: Qualitative data was collected by means of unstructured interviews with 29 employees representing a range of job titles, levels and demographics in a large South African manufacturing company. A grounded theory approach (open and axial coding was used to analyse the data. Main findings: Distinctive individual self-definitions and a number of common themes integrating social and personal identity perspectives emerged from the data. These themes provided a sound basis for the proposed integrative model to define work-based identity. Practical/managerial implications: The findings of this research will assist human resource practitioners to develop training interventions and management strategies for the potential enhancement of work-based identities. This will result in a more engaged and harmonised workforce. Contribution/value-add: This was the first study of its kind to identify and delineate significant work-based identity elements for the formation of a work-based identity within a South African work context.

  9. Teacher educators: their identities, sub-identities and implications for professional development

    NARCIS (Netherlands)

    Swennen, J.M.H.; Jones, K.; Volman, M.L.L.

    2010-01-01

    In this article we address the question: 'What sub-identities of teacher educators emerge from the research literature about teacher educators and what are the implications of the sub-identities for the professional development of teacher educators?' Like other professional identities, the identity

  10. Identity after Death

    DEFF Research Database (Denmark)

    Gerstrøm, Anna

    2015-01-01

    Purpose: The purpose of this paper is to explore how legacy organizational identity and death relate to each other and, thereby, contribute to closing the gap in knowledge on organizational identity constructions in times of death. Design/methodology/approach: The paper opted for an exploratory....../value: This paper addresses an apparent gap in the literature on identity and death; exploring identity narratives in a bankrupted bank, the paper considers constructions of legacy organizational identities in times of disruptive death....

  11. Identity/Time

    Directory of Open Access Journals (Sweden)

    Nancy J. Knauer

    2013-09-01

    Full Text Available This paper engages the unspoken fourth dimension of intersectionality—time. Using the construction of lesbian, gay, bisexual, and transgender (LGBT identities as an example, it establishes that identity, as it is lived and experienced, is not only multivalent, but also historically contingent. It then raises a number of points regarding the temporal locality of identity—the influence of time on issues of identity and understanding, its implications for legal interventions, social movement building, and paradigms of progressive change. As the title suggests, the paper asks us to consider the frame of identity over time.

  12. An identical-location transmission electron microscopy study on the degradation of Pt/C nanoparticles under oxidizing, reducing and neutral atmosphere

    International Nuclear Information System (INIS)

    Dubau, L.; Castanheira, L.; Berthomé, G.; Maillard, F.

    2013-01-01

    This study shows that the predominant degradation mechanism of Pt/Vulcan XC72 electrocatalysts strongly depends on the nature of the gas atmosphere and of the upper potential limit used in accelerated stress tests (ASTs). The morphological changes of Pt/Vulcan XC72 nanoparticles were studied by identical location transmission electron microscopy (IL-TEM), following accelerated stress tests in different potential ranges and under various gas atmospheres. X-ray photoelectron spectroscopy was used to probe changes in carbon surface chemistry. Whereas minor changes were detected under neutral atmosphere (Ar) and low potential limit conditions (0.05 2 ). With an increase of the upper potential limit to 1.23 V vs. RHE, the trends observed previously were maintained but 3D Ostwald ripening strongly overlapped with the three other degradation mechanisms, precluding any identification of the dominant mechanism

  13. The module of methodical support in system of electronic educational resources as the innovative element of the modern maintenance of formation

    Directory of Open Access Journals (Sweden)

    Ольга Николаевна Крылова

    2009-06-01

    Full Text Available The article introduces some results of research, which were devoted to evaluation of tearches' mobility to introduce innovations in the contents of education. The author considers innovative potential of modules of the methodical support for system of electronic educational resources.

  14. Vocational Identity and Ego Identity Status in Korean Nursing Students

    Directory of Open Access Journals (Sweden)

    Hyun-Young Koo, PhD, RN

    2016-03-01

    Conclusions: These findings show that nursing students in identity achievement status have secure and clear vocational identities. Further longitudinal and qualitative studies are needed to find out if identity formation among nursing students changes with age.

  15. Vision-based coaching: Optimizing resources for leader development

    Directory of Open Access Journals (Sweden)

    Angela M. Passarelli

    2015-04-01

    Full Text Available Leaders develop in the direction of their dreams, not in the direction of their deficits. Yet many coaching interactions intended to promote a leader’s development fail to leverage the developmental benefits of the individual’s personal vision. Drawing on Intentional Change Theory, this article postulates that coaching interactions that emphasize a leader’s personal vision (future aspirations and core identity evoke a psychophysiological state characterized by positive emotions, cognitive openness, and optimal neurobiological functioning for complex goal pursuit. Vision-based coaching, via this psychophysiological state, generates a host of relational and motivational resources critical to the developmental process. These resources include: formation of a positive coaching relationship, expansion of the leader’s identity, increased vitality, activation of learning goals, and a promotion-orientation. Organizational outcomes as well as limitations to vision-based coaching are discussed.

  16. Vision-based coaching: optimizing resources for leader development

    Science.gov (United States)

    Passarelli, Angela M.

    2015-01-01

    Leaders develop in the direction of their dreams, not in the direction of their deficits. Yet many coaching interactions intended to promote a leader’s development fail to leverage the benefits of the individual’s personal vision. Drawing on intentional change theory, this article postulates that coaching interactions that emphasize a leader’s personal vision (future aspirations and core identity) evoke a psychophysiological state characterized by positive emotions, cognitive openness, and optimal neurobiological functioning for complex goal pursuit. Vision-based coaching, via this psychophysiological state, generates a host of relational and motivational resources critical to the developmental process. These resources include: formation of a positive coaching relationship, expansion of the leader’s identity, increased vitality, activation of learning goals, and a promotion–orientation. Organizational outcomes as well as limitations to vision-based coaching are discussed. PMID:25926803

  17. 'Everyone here wants everyone else to get better': The role of social identity in eating disorder recovery.

    Science.gov (United States)

    McNamara, Niamh; Parsons, Harriet

    2016-12-01

    Retention of a positively valued illness identity contributes to poor outcomes for individuals with eating disorders (EDs). Consequently, dis-identification from the illness identity and the adoption of a recovery identity are vital for successful recovery. While social identity processes have been shown to influence ED maintenance, their role in recovery is rarely considered. This study explores how a sense of shared identity helps individuals with EDs manage their condition and promotes recovery. Transcripts from 18 online support sessions involving 75 participants were thematically analysed. Our findings suggest that the illness identity initially operates as a social identity that forms the basis for connections with similar others. For those wishing to recover, identity-based support is then perceived to be more effective than that found outside the group. Online interactions also facilitate construction of a new shared recovery identity which promotes a shift from the illness identity as a primary source of definition and endorses group norms of illness disclosure and treatment engagement. While in the clinical literature, ED identity is seen as problematic and interventions are targeted at challenging an individual's self-concept, we suggest that interventions could instead harness identity resources to support a transition to a recovery identity. © 2016 The British Psychological Society.

  18. Ternutator identities

    International Nuclear Information System (INIS)

    Devchand, Chandrashekar; Fairlie, David; Nuyts, Jean; Weingart, Gregor

    2009-01-01

    The ternary commutator or ternutator, defined as the alternating sum of the product of three operators, has recently drawn much attention as an interesting structure generalizing the commutator. The ternutator satisfies cubic identities analogous to the quadratic Jacobi identity for the commutator. We present various forms of these identities and discuss the possibility of using them to define ternary algebras.

  19. Ethnic Identity in Everyday Life: The Influence of Identity Development Status

    Science.gov (United States)

    Yip, Tiffany

    2013-01-01

    The current study explores the intersection of ethnic identity development and significance in a sample of 354 diverse adolescents (mean age 14). Adolescents completed surveys 5 times a day for 1 week. Cluster analyses revealed 4 identity clusters: diffused, foreclosed, moratorium, achieved. Achieved adolescents reported the highest levels of identity salience across situations, followed by moratorium adolescents. Achieved and moratorium adolescents also reported a positive association between identity salience and private regard. For foreclosed and achieved adolescents reporting low levels of centrality, identity salience was associated with lower private regard. For foreclosed and achieved adolescents reporting high levels of centrality, identity salience was associated with higher private regard. PMID:23581701

  20. Impact of Electronic Resources and Usage in Academic Libraries in Ghana: Evidence from Koforidua Polytechnic & All Nations University College, Ghana

    Science.gov (United States)

    Akussah, Maxwell; Asante, Edward; Adu-Sarkodee, Rosemary

    2015-01-01

    The study investigates the relationship between impact of electronic resources and its usage in academic libraries in Ghana: evidence from Koforidua Polytechnic & All Nations University College, Ghana. The study was a quantitative approach using questionnaire to gather data and information. A valid response rate of 58.5% was assumed. SPSS…

  1. Electronic universal vade-mecum

    CERN Document Server

    Mikolajczyk, Piotr

    1964-01-01

    Electronic Universal Vade-Mecum, Volume 1 considers the classification of about 15,000 types of electron devices into a number of groups. Each group includes similar devices irrespective of their marking and production origin. The group arrangement presented in this book has been devised according to a range principle, such as each group includes electron devices differing only insignificantly from those placed in neighboring groups. This indicates that any user of the vade-mecum can easily find all other types of identical or similar characteristics produced by various firms. Each group incl

  2. Unit-time scheduling problems with time dependent resources

    NARCIS (Netherlands)

    Tautenhahn, T.; Woeginger, G.

    1997-01-01

    We investigate the computational complexity of scheduling problems, where the operations consume certain amounts of renewable resources which are available in time-dependent quantities. In particular, we consider unit-time open shop problems and unit-time scheduling problems with identical parallel

  3. Experiencing with Identity

    DEFF Research Database (Denmark)

    Pors, Justine Grønbæk

    2012-01-01

    This article studies how a political organization begins to experiment with its identity. By use of an empirical case of the Danish Ministry of Education, I examine how a political organization supplements its identity of a legislating power with identities of a supervisor, beacon and facilitator...... of evaluation in public schools. Out of a paralysis emerge new innovative strategies of governing, aimed at the schools’ self-governing capacity. The identity of the political system thus emerges as oscillations between different roles of a legislating power and a supervising coach. The case study suggests...... that a society of experimentalism is emerging. Thus, the relevant object of study is no longer organizational identity, but the experiments with different identities that modern organizations are performing....

  4. Utilization of Electronic Information Resources by Undergraduate Students of University of Ibadan: A Case Study of Social Sciences and Education

    Science.gov (United States)

    Owolabi, Sola; Idowu, Oluwafemi A.; Okocha, Foluke; Ogundare, Atinuke Omotayo

    2016-01-01

    The study evaluated utilization of electronic information resources by undergraduates in the Faculties of Education and the Social Sciences in University of Ibadan. The study adopted a descriptive survey design with a study population of 1872 undergraduates in the Faculties of Education and the Social Sciences in University of Ibadan, from which a…

  5. "You Don't Look Like Your Profile Picture": The Ethical Implications of Researching Online Identities in Higher Education

    Science.gov (United States)

    Blanco Ramírez, Gerardo; Palu-ay, Lyssa

    2015-01-01

    Social media sites and other contemporary technologies open the possibility for the construction of online identities that are loosely connected to physical bodies; this construction allows individuals to edit their identities constantly, in a continuous process of self-recreation. In parallel, universities utilise printed and electronic media to…

  6. Shaping the Electronic Library--The UW-Madison Approach.

    Science.gov (United States)

    Dean, Charles W., Ed.; Frazier, Ken; Pope, Nolan F.; Gorman, Peter C.; Dentinger, Sue; Boston, Jeanne; Phillips, Hugh; Daggett, Steven C.; Lundquist, Mitch; McClung, Mark; Riley, Curran; Allan, Craig; Waugh, David

    1998-01-01

    This special theme section describes the University of Wisconsin-Madison's experience building its Electronic Library. Highlights include integrating resources and services; the administrative framework; the public electronic library, including electronic publishing capability and access to World Wide Web-based and other electronic resources;…

  7. Pragmatism vs. Idealism and the Identity Crisis of OER Advocacy

    Directory of Open Access Journals (Sweden)

    Rajiv Sunil Jhangiani

    2017-06-01

    Full Text Available The open education (OE movement is in its adolescent years and experiencing an identity crisis as it is pulled towards both pragmatism (marked by an emphasis on cost savings, resources, and incremental change and idealism (marked by an emphasis on permissions, practices, and radical change. In this article, I describe these tensions (free vs. freedom; evolution vs. revolution; and resources vs. practices before going on to argue in favour of a nuanced resolution to this Eriksonian crisis that reflects the diverse needs and motivations of educators. The merits of an integrated approach and its implications for the future trajectory of the OE movement are discussed.

  8. Identity Federation and Its Importance for NASA's Future: The SharePoint Extranet Pilot

    Science.gov (United States)

    Baturin, Rebecca R.

    2013-01-01

    My project at Kennedy Space Center (KSC) during the spring 2013 Project Management and Systems Engineering Internship was to functionalJy test and deploy the SharePoint Extranet system and ensure successful completion of the project's various lifecycle milestones as described by NASA Procedural Requirement (NPR) 7 120.7. I worked alongside NASA Project Managers, Systems Integration Engineers, and Information Technology (IT) Professionals to pilot this collaboration capability between NASA and its External Partners. The use of identity federation allows NASA to leverage externally-issued credentials of other federal agencies and private aerospace and defense companies, versus the traditional process of granting and maintaining full NASA identities for these individuals. This is the first system of its kind at NASA and it will serve as a pilot for the Federal Government. Recognizing the novelty of this service, NASA's initial approach for deployment included a pilot period where nearby employees of Patrick Air Force Base would assist in testing and deployment. By utilizing a credential registration process, Air Force users mapped their Air Force-issued Common Access Cards (CAC) to a NASA identity for access to the External SharePoint. Once the Air Force stands up an Active Directory Federation Services (ADFS) instance within their Data Center and establishes a direct trust with NASA, true identity federation can be established. The next partner NASA is targeting for collaboration is Lockheed Martin (LMCO), since they collaborate frequently for the ORION Program. Through the use of Exostar as an identity hub, LMCO employees will be able to access NASA data on a need to know basis, with NASA ultimately managing access. In a time when every dollar and resource is being scrutinized, this capability is an exciting new way for NASA to continue its collaboration efforts in a cost and resource effective manner.

  9. Identity Work and Emotions

    DEFF Research Database (Denmark)

    Winkler, Ingo

    2018-01-01

    This paper reviews the empirical literature on identity work and identifies two distinct approaches to incorporating emotion. The majority of empirical studies use emotion to describe the experiences of identity work. In doing so, the authors (a) mention the emotions that people feel in situations...... that trigger identity work, (b) illustrate identity work as an emotional endeavour, and (c) describe the emotional impact of successful and unsuccessful identity work. There is also an emerging literature that examines the mutual constitution of emotions and identity work. These authors address emotional...... labour, affective social identification, emotional attachment and detachment, and humour when studying identity work. This paper suggests that, to understand better the relation between emotions and identity work, future research should examine the role of emotions in problematizing identity...

  10. Spacing Identity

    DEFF Research Database (Denmark)

    Stang Våland, Marianne; Georg, Susse

    2018-01-01

    In this paper, we analyze how architectural design, and the spatial and material changes this involves, contributes to the continuous shaping of identities in an organization. Based upon a case study of organizational and architectural change in a municipal administration at a time of major public...... sector reforms, we examine how design interventions were used to (re)form work and professional relationships. The paper examines how engagements with spatial arrangements and material artifacts affected people’s sense of both occupational and organizational identity. Taking a relational approach...... to sociomateriality, the paper contributes to the further theorizing of space in organization studies by proposing the concept of spacing identity to capture the fluidity of identity performance....

  11. Perspectives on Sexual Identity Formation, Identity Practices, and Identity Transitions Among Men Who Have Sex With Men in India.

    Science.gov (United States)

    Tomori, Cecilia; Srikrishnan, Aylur K; Ridgeway, Kathleen; Solomon, Sunil S; Mehta, Shruti H; Solomon, Suniti; Celentano, David D

    2018-01-01

    Men who have sex with men (MSM) remain at high risk for HIV infection. Culturally specific sexual identities, encompassing sexual roles, behavior, and appearance, may shape MSM's experiences of stigmatization and discrimination, and affect their vulnerability to HIV. This multi-site qualitative study (n = 363) encompassing 31 focus group discussions (FGDs) and 121 in-depth interviews (IDIs) across 15 sites in India investigated sexual identity formation, identity practices, and transitions and their implications for HIV prevention. IDIs and FGDs were transcribed, translated, and underwent thematic analysis. Our findings document heterogeneous sexual identity formation, with MSM who have more gender nonconforming behaviors or appearance reporting greater family- and community-level disapproval, harassment, violence, and exclusion. Concealing feminine aspects of sexual identities was important in daily life, especially for married MSM. Some participants negotiated their identity practices in accordance with socioeconomic and cultural pressures, including taking on identity characteristics to suit consumer demand in sex work and on extended periods of joining communities of hijras (sometimes called TG or transgender women). Participants also reported that some MSM transition toward more feminine and hijra or transgender women identities, motivated by intersecting desires for feminine gender expression and by social exclusion and economic marginalization. Future studies should collect information on gender nonconformity stigma, and any changes in sexual identity practices or plans for transitions to other identities over time, in relation to HIV risk behaviors and outcomes.

  12. Controlling user access to electronic resources without password

    Science.gov (United States)

    Smith, Fred Hewitt

    2017-08-22

    Described herein are devices and techniques for remotely controlling user access to a restricted computer resource. The process includes obtaining an image from a communication device of a user. An individual and a landmark are identified within the image. Determinations are made that the individual is the user and that the landmark is a predetermined landmark. Access to a restricted computing resource is granted based on the determining that the individual is the user and that the landmark is the predetermined landmark. Other embodiments are disclosed.

  13. The use of quality benchmarking in assessing web resources for the dermatology virtual branch library of the National electronic Library for Health (NeLH).

    Science.gov (United States)

    Kamel Boulos, M N; Roudsari, A V; Gordon, C; Muir Gray, J A

    2001-01-01

    In 1998, the U.K. National Health Service Information for Health Strategy proposed the implementation of a National electronic Library for Health to provide clinicians, healthcare managers and planners, patients and the public with easy, round the clock access to high quality, up-to-date electronic information on health and healthcare. The Virtual Branch Libraries are among the most important components of the National electronic Library for Health. They aim at creating online knowledge based communities, each concerned with some specific clinical and other health-related topics. This study is about the envisaged Dermatology Virtual Branch Libraries of the National electronic Library for Health. It aims at selecting suitable dermatology Web resources for inclusion in the forthcoming Virtual Branch Libraries after establishing preliminary quality benchmarking rules for this task. Psoriasis, being a common dermatological condition, has been chosen as a starting point. Because quality is a principal concern of the National electronic Library for Health, the study includes a review of the major quality benchmarking systems available today for assessing health-related Web sites. The methodology of developing a quality benchmarking system has been also reviewed. Aided by metasearch Web tools, candidate resources were hand-selected in light of the reviewed benchmarking systems and specific criteria set by the authors. Over 90 professional and patient-oriented Web resources on psoriasis and dermatology in general are suggested for inclusion in the forthcoming Dermatology Virtual Branch Libraries. The idea of an all-in knowledge-hallmarking instrument for the National electronic Library for Health is also proposed based on the reviewed quality benchmarking systems. Skilled, methodical, organized human reviewing, selection and filtering based on well-defined quality appraisal criteria seems likely to be the key ingredient in the envisaged National electronic Library for

  14. The rise and fall of gay: a cultural-historical approach to gay identity development.

    Science.gov (United States)

    Weststrate, Nic M; McLean, Kate C

    2010-02-01

    Research on identity development has paid relatively little attention to the development of marginalised identities such as those of gays and lesbians, whose isolation from the canonical narrative of sexuality may limit the available resources required for establishing a coherent identity. We examined these contested identities in relation to cultural-historical factors that may have played a role in shaping these identities over the past 50 years, and looked at how such factors have impacted the voicing and silencing of gay experiences. Participants (N=251) reported (1) a memory of a cultural event relevant to their sexuality, and (2) a self-defining memory about their sexuality. Those in older cohorts reported cultural memories centred on politics and other external events (e.g., Stonewall riots), and younger cohorts reported more personal memories (e.g., coming out), suggesting that homosexual identities have become less culturally defined, and instead more personally defined. Further, participants of older cohorts reported self-defining events that were predominantly from one private domain (e.g., sex). In contrast, younger participants reported a variety of self-defining events. These results suggest that cultural-historical factors play an important role in defining the developmental pathway of individuals, perhaps especially those who have marginalised identities.

  15. There is a Relationship between Resource Expenditures and Reference Transactions in Academic Libraries. A Review of: Dubnjakovic, A. (2012. Electronic resource expenditure and the decline in reference transaction statistics in academic libraries. Journal of Academic Librarianship, 38(2, 94-100. doi:10.1016/j.acalib.2012.01.001

    Directory of Open Access Journals (Sweden)

    Annie M. Hughes

    2013-03-01

    Full Text Available Objective – To provide an analysis of the impact of expenditures on electronic resourcesand gate counts on the increase or decrease in reference transactions.Design – Analysis of results of existing survey data from the National Center for Educational Statistics (NCES 2006 Academic Library Survey(ALS.Setting – Academic libraries in the United States.Subjects – 3925 academic library respondents.Methods – The author chose to use survey data collected from the 2006 ALS conducted bythe NCES. The survey included data on various topics related to academic libraries, but in the case of this study, the author chose to analyze three of the 193 variables included. The three variables: electronic books expenditure, computer hardware and software, and expenditures on bibliographic utilities, were combined into one variable called electronic resource expenditure. Gate counts were also considered as a variable. Electronic resource expenditure was also split as a variable into three groups: low, medium, and high. Multiple regression analysis and general linear modeling, along with tests of reliability, were employed. Main Results – The author determined that low, medium, and high spenders with regard to electronic resources exhibited differences in gate counts, and gate counts have an effect on reference transactions in any given week. Gate counts tend to not have much of an effect on reference transactions for the higher spenders, and higher spenders tend to have a higher number of reference transactions overall. Low spenders have lower gate counts and also a lower amount of reference transactions.Conclusion – The findings from this study show that academic libraries spending more on electronic resources also tend to have an increase with regard to reference transactions. The author also concludes that library spaces are no longer the determining factor with regard to number of reference transactions. Spending more on electronic resources is

  16. Rewriting Dominant Narratives of the Academy: Women Faculty of Color and Identity Management

    Science.gov (United States)

    Motha, Suhanthie; Varghese, Manka M.

    2018-01-01

    Drawing on Delgado and Yosso's "counterstory," Yosso's "community cultural wealth," and Alsup's "borderland discourses," the authors, who are women of color academics, use narratives from their lives to discuss the ways in which they draw on resources in managing and reconfiguring their multiple identities within the…

  17. Identity Presentation: The Construction of Identity in Asynchronous Discussion

    Directory of Open Access Journals (Sweden)

    Brian Morgan

    2008-08-01

    Full Text Available This study examines the use of e-mail as a tool for long term discussion between teachers and grade six students. E-mail messages between grade six students and teachers were collected over the course of one academic year. Methods of conversation analysis within a framework of social practice are used to examine the data. While identity is more readily constructed and more fully developed in contexts which allow for physical embodiment such as face-to-face discussion, this analysis found that identity can be constructed in a context that does not provide for the physical embodiment of identity: Identity was constructed using the social, cultural, and technological tools provided and supported by e-mail to develop social practices germane to the e-mail discussion. This study has implications for further understanding the relation between identity, goals, constraints and affordances, and the collaborative creation of social practices in asynchronous computer mediated communication. URN: urn:nbn:de:0114-fqs0803185

  18. Electronic resources access and usage among the postgraduates of ...

    African Journals Online (AJOL)

    ... and usage among the postgraduates of a Nigerian University of Technology. ... faced by postgraduates in using e-resources include takes too much time to find, ... Resources, Access, Use, Postgraduat, Students, University, Technology, Nigeria ... By Country · List All Titles · Free To Read Titles This Journal is Open Access.

  19. Identity Styles and Religiosity: Examining the Role of Identity Commitment

    Science.gov (United States)

    Grajales, Tevni E.; Sommers, Brittany

    2016-01-01

    This study observed the role of identity styles, identity commitment, and identity statuses in predicting religiosity in a sample of undergraduate students attending a Seventh-day Adventist university (N = 138). Two structural models were evaluated via path analysis. Results revealed two strong models for the prediction of religiosity. Identity…

  20. Multiprocessor Real-Time Locking Protocols for Replicated Resources

    Science.gov (United States)

    2016-07-01

    assignment problem, the ac- tual identities of the allocated replicas must be known. When locking protocols are used, tasks may experience delays due to both...Multiprocessor Real-Time Locking Protocols for Replicated Resources ∗ Catherine E. Jarrett1, Kecheng Yang1, Ming Yang1, Pontus Ekberg2, and James H...replicas to execute. In prior work on replicated resources, k-exclusion locks have been used, but this restricts tasks to lock only one replica at a time. To

  1. Political, religious and occupational identities in context: placing identity status paradigm in context.

    Science.gov (United States)

    Solomontos-Kountouri, Olga; Hurry, Jane

    2008-04-01

    This study critically contrasts global identity with domain-specific identities (political, religious and occupational) and considers context and gender as integral parts of identity. In a cross-sectional survey, 1038 Greek Cypriot adolescents (449 boys and 589 girls, mean age 16.8) from the three different types of secondary schools (state, state technical and private) and from different SES completed part of the Extended Objective Measure of Ego Identity Status-2 (EOMEIS-2). The macro-context of Greek Cypriot society is used to understand the role of context in adolescents' identities. Results showed that Greek Cypriot young people were not in the same statuses across their global, political, religious and occupational identities. This heterogeneity in the status of global identity and of each identity domain is partially explained by differences in gender, type of school and SES (socio-economic status). The fact that identity status is found to be reactive to context suggests that developmental stage models of identity status should place greater emphasis on context.

  2. Identity of care in a Psychosocial Care Center for Children and Adolescents who uses drugs

    Directory of Open Access Journals (Sweden)

    Isabella Teixeira Bastos

    2014-12-01

    Full Text Available Objective To associate the territory of identity with the production of care within a PCC focusing on children and adolescents with drug abuse and their institutional identity. Method We used the “ process tracing methodology” in four research categories: focus groups, characterization of professionals, observing the everyday and interviewing two members of emblematic cases of the service. Results territory of identity of the institution, which operates the production of care is crossed by the difficulty of dealing with the complexity brought by the users and the performance of the PCC network. This paper is also permeated by different conceptions of care and small problematization of these issues in collective spaces of service. Conclusion The discussion in focus groups and other devices can be powerful resources to reframe the meaning of care and identity of collective service.

  3. Electronic Safety Resource Tools -- Supporting Hydrogen and Fuel Cell Commercialization

    Energy Technology Data Exchange (ETDEWEB)

    Barilo, Nick F.

    2014-09-29

    The Pacific Northwest National Laboratory (PNNL) Hydrogen Safety Program conducted a planning session in Los Angeles, CA on April 1, 2014 to consider what electronic safety tools would benefit the next phase of hydrogen and fuel cell commercialization. A diverse, 20-person team led by an experienced facilitator considered the question as it applied to the eight most relevant user groups. The results and subsequent evaluation activities revealed several possible resource tools that could greatly benefit users. The tool identified as having the greatest potential for impact is a hydrogen safety portal, which can be the central location for integrating and disseminating safety information (including most of the tools identified in this report). Such a tool can provide credible and reliable information from a trustworthy source. Other impactful tools identified include a codes and standards wizard to guide users through a series of questions relating to application and specific features of the requirements; a scenario-based virtual reality training for first responders; peer networking tools to bring users from focused groups together to discuss and collaborate on hydrogen safety issues; and a focused tool for training inspectors. Table ES.1 provides results of the planning session, including proposed new tools and changes to existing tools.

  4. Examining Technology, Structure and Identity During an Enterprise System Implementation

    Energy Technology Data Exchange (ETDEWEB)

    Alvarez, Rosio

    2008-11-12

    This paper presents a longitudinal study of an Enterprise System (ES) implementation by critically examining the discursive context in which an ES implementation unfolds. The findings show that users strongly supported the ES in the earlier stage of implementation when the technology was an imaginary phenomenon. However, in later stages, when the technology is in use, user support was not consistent. In this phase the ES produces loss of control and an inability to function as an arbiter of fairness (in allocating resources associated with the system) thereby directly challenging existing professional identities and roles. These outcomes, in turn, generate acts of resistance on the part of workers. Users reach inside the technology and reshape it by devising creative workarounds that produce a sense of reskilling to counter the deskilling produced by the loss of control and power. The analysis also shows that an ES is a complex social phenomenon that is intricately linked to and complicit in shaping organizational structure and identity. In particular this study shows how technology, structure, and identity are in a mutually constitutive relationship.

  5. Identities as organizational practices

    DEFF Research Database (Denmark)

    Oshima, Sae; Asmuß, Birte

    Identity has been widely acknowledged as playing a central role in various organizational processes, yet there is still a need to better understand the dynamics and functions of identity work in modern organizations. The present paper is centered within this concern, and examines identity......) reveal the intersubjective, multimodal and embodied nature of identity work; 2) demonstrate identity work as organizational practices, used in order to accomplish specific actions; and 3) pose a question on the view on identity as a layered/leveled phenomenon....

  6. Mobile Identity Management

    NARCIS (Netherlands)

    Hoepman, J.J.

    2011-01-01

    Identity management consists of the processes and all underlying technologies for the creation, management, and usage of digital identities. Business rely on identity management systems to simplify the management of access rights to their systems and services for both their employees and their

  7. EFFECTIVE ELECTRONIC TUTORIAL

    Directory of Open Access Journals (Sweden)

    Andrei A. Fedoseev

    2014-01-01

    Full Text Available The article analyzes effective electronic tutorials creation and application based on the theory of pedagogy. Herewith the issues of necessary electronic tutorial functional, ways of the educational process organization with the use of information and communication technologies and the logistics of electronic educational resources are touched upon. 

  8. Smoker identity and its potential role in young adults' smoking behavior: A meta-ethnography.

    Science.gov (United States)

    Tombor, Ildiko; Shahab, Lion; Herbec, Aleksandra; Neale, Joanne; Michie, Susan; West, Robert

    2015-10-01

    Identity is an important influence on behavior. To identify potential targets for smoking cessation interventions in young adults, we synthesized findings from qualitative studies on smoker identity and potential influences on smoking and smoking cessation. A systematic search of 4 electronic databases up to September 19, 2013, was conducted to identify qualitative studies on smoker identity in smokers and ex-smokers aged 16-34. Key concepts were extracted from individual studies and synthesized into higher-order interpretations by following the principles of meta-ethnography. Seventeen relevant papers were identified. At the highest level of interpretation, we identified 4 types of findings: (a) contributory factors to identity, (b) identity in relation to smoking, (c) contextual and temporal patterning, and (d) behavior in relation to smoking. Contributory factors included the desire to establish aspirational individual and social identities, enact a smoker identity appropriate to the momentary social context, and alter personal nonsmoking rules when consuming alcohol. Smoker identity was multifaceted and incorporated individuals' defensive rationalizations, and both positive and negative feelings attached to it. Smoker identities took time to develop, were subject to change, and were context dependent. Identity was found to play a role in quit attempts. Qualitative research into the identity of young adult smokers has established it as a multifaceted phenomenon serving important functions but also involving conflict and defensive rationalizations. It develops over time and contextual factors influence its expression. The nature of a smoker's identity can play an important role in smoking cessation. (PsycINFO Database Record (c) 2015 APA, all rights reserved).

  9. Blind quantum computation with identity authentication

    Science.gov (United States)

    Li, Qin; Li, Zhulin; Chan, Wai Hong; Zhang, Shengyu; Liu, Chengdong

    2018-04-01

    Blind quantum computation (BQC) allows a client with relatively few quantum resources or poor quantum technologies to delegate his computational problem to a quantum server such that the client's input, output, and algorithm are kept private. However, all existing BQC protocols focus on correctness verification of quantum computation but neglect authentication of participants' identity which probably leads to man-in-the-middle attacks or denial-of-service attacks. In this work, we use quantum identification to overcome such two kinds of attack for BQC, which will be called QI-BQC. We propose two QI-BQC protocols based on a typical single-server BQC protocol and a double-server BQC protocol. The two protocols can ensure both data integrity and mutual identification between participants with the help of a third trusted party (TTP). In addition, an unjammable public channel between a client and a server which is indispensable in previous BQC protocols is unnecessary, although it is required between TTP and each participant at some instant. Furthermore, the method to achieve identity verification in the presented protocols is general and it can be applied to other similar BQC protocols.

  10. Social identity and stroke: 'they don't make me feel like, there's something wrong with me'.

    Science.gov (United States)

    Anderson, Sharon; Whitfield, Kyle

    2013-12-01

    Over 85% of the people survive stroke; and of those, over 80% are discharged to the community. However, the majority do not recover completely. Loss of identity is a commonly reported experience after stroke. Studies focus on the individual survivors' use of their own cognitive resources to adapt to change, rather than examining the effects of social interactions on stroke survivors' identities. Social relationships are the foundation upon which survivors rebuild skills to engage with the world, yet little is known about the ways in which families, friends and neighbours provide a context for the recreation of a sense of self and activities after stroke. This article draws on situational analysis grounded theory analysis of in-depth individual interviews with nine middle-aged survivors of stroke. In situational analysis, the original grounded theory methods proposed by Glaser and Strauss are used; however, the situational context, and how environments and relationships influence actions, is explicitly analysed. Our objective was to understand the ways in which family, social, and community resources might enhance stroke survivors' participation in personally meaningful activities over the long term. The qualitative accounts of these survivors reveal how social support helped them maintain or more importantly regain a position in society. Following any life-changing event, people's sense of self is fluid. A relevant social position entitles stroke survivors to become actively involved in setting their own goals and maintaining a positive identity. However, as these participants attested, stroke impaired their social position and resources to reject an imposed social position. It was difficult for these survivors to construct a valued social identity without the support of other people. Future studies should explore the consequences of social interactions with others and how social attitudes about stroke disability affects individual's activity options, professional

  11. Identity Management

    CERN Document Server

    Pace, A

    2008-01-01

    This paper introduces identity management concepts and discusses various issues associated with its implementation. It will try to highlight technical, legal, and social aspects that must been foreseen when defining the numerous processes that an identity management infrastructure must support. Grid interoperability as well as cross platform interoperability is addressed on the technical aspect, followed by a short discussion on social consequences on user’s privacy when completed traceability is enforced and some examples on how identity management has been implemented at CERN

  12. Identity management

    International Nuclear Information System (INIS)

    Pace, A

    2008-01-01

    This paper introduces identity management concepts and discusses various issues associated with their implementation. It will try to highlight technical, legal, and social aspects that must been foreseen when defining the numerous processes that an identity management infrastructure must support. Grid interoperability as well as cross platform interoperability is addressed on the technical aspect, followed by a short discussion on social consequences on user's privacy when completed traceability is enforced. The paper will finally give some examples on how identity management has been implemented at CERN

  13. LGBTQ+ Young Adults on the Street and on Campus: Identity as a Product of Social Context.

    Science.gov (United States)

    Schmitz, Rachel M; Tyler, Kimberly A

    2018-01-01

    Lesbian, gay, bisexual, queer, and other sexual and gender minority (LGBTQ+) young adults face unique identity-related experiences based on their immersion in distinctive social contexts. The predominant framework of performing separate analyses on samples of LGBTQ+ young people by their primary social status obfuscates more holistic understandings of the role of social context. Using 46 in-depth interviews with LGBTQ+ college students and LGBTQ+ homeless young adults, we ask: How are LGBTQ+ young adults' capacities for "doing" their gender and sexual identities shaped by their distinctive social contexts? In developing their identities, both groups of LGBTQ+ young adults navigated their social environments to seek out resources and support. Most college students described their educational contexts as conducive to helping them develop their identities, or "undo" rigid norms of gender and sexuality. Homeless young adults' social environments, meanwhile, imposed complex barriers to self-expression that reinforced more normative expectations of "doing" gender and sexual identities.

  14. Constructing self-identity: minority students' adaptation trajectories in a Chinese university.

    Science.gov (United States)

    Li, Ling; Wu, Aruna; Li, Xiao Wen; Zhuang, Yuan

    2012-09-01

    Researchers have gone beyond identity status and been putting more and more emphases on the dynamic process of identity development and its contextual embeddedness. Study of individual's adaptation to the multicultural background is a good point of penetration. Because of the differences in regional conditions and cultural traditions, the minority youths who go to university in the mainstream culture would have special experiences and challenges in the development of their self-identities. Semi-structured interview and narrative were used in this research to discover the characteristics of the self-identity constructing processes of Mongolian undergraduates in a Shanghai university context. Their identity constructing process could be divided into three stages: difference-detecting, self-doubting and self-orienting. The main efforts of identity constructing in each stage could all be described as self-exploring and support-seeking. Special contents of internal explorations and sources of support were distinguished at different stages. As relative results, three main types of self-orientation were revealed: goal-oriented, self-isolated and unreserved assimilated. The characteristics of them are quite similar to those of three identity processing styles proposed by Berzonsky, which indicates there are some common elements lying in all self-development processes of adolescences and young adults. Ethnicity and culture could be background and resource or what Côté called identity capital that impacts the special course of self-identity constructing under similar principles. Different attitudes towards and relationships with their own ethnicity and new surroundings separated the three types of students from each other and interacted with the developmental characteristics and tendencies of their ethnicity identifications and self identities. It was found that minority youths' self-identity constructing was based on their needs of self-value and interacted with their

  15. Social identity management strategies used by workers with acquired hearing loss.

    Science.gov (United States)

    Jennings, Mary Beth; Southall, Kenneth; Gagné, Jean-Pierre

    2013-01-01

    There is a paucity of knowledge about social identity-management by persons with hearing loss. The objective of the study was to gain an understanding from the perspective of the participants, the ways in which workers with acquired hearing loss manage their identity in the workplace. Twelve persons with acquired hearing loss, who were gainfully employed in a variety of settings and occupations in three Canadian cities, participated in audio-recorded semi-structured interviews. A secondary qualitative analysis was conducted on transcripts of interviews collected in a previous study on factors that influence disclosure of hearing loss in the workplace. A qualitative descriptive research paradigm was adopted and content analyses were used to extract pertinent information from verbatim transcripts. Participants described a range of identity-management strategies enacted in the workplace. Five recurrent themes emerged as important considerations in the Art of Identity Management in the workplace: 1. Managing the situation, 2. Having a buddy system, 3. Feeling comfortable, 4. Using personal resources, 5. It gets easier with time. Social identity-management is a complex process. Although persons with acquired hearing loss experience different challenges from other persons with invisible stigmas, similarities in the range of social identity-management strategies employed were evident in our findings. In addition, the social cognitive learning model of disclosure appears to be relevant to the experiences of our participants. The implications of the findings emphasize the importance of all stakeholders working collaboratively to address the issues of the growing population of workers with hearing loss.

  16. Renewable energy resources

    DEFF Research Database (Denmark)

    Ellabban, Omar S.; Abu-Rub, Haitham A.; Blaabjerg, Frede

    2014-01-01

    Electric energy security is essential, yet the high cost and limited sources of fossil fuels, in addition to the need to reduce greenhouse gasses emission, have made renewable resources attractive in world energy-based economies. The potential for renewable energy resources is enormous because...... they can, in principle, exponentially exceed the world's energy demand; therefore, these types of resources will have a significant share in the future global energy portfolio, much of which is now concentrating on advancing their pool of renewable energy resources. Accordingly, this paper presents how...... renewable energy resources are currently being used, scientific developments to improve their use, their future prospects, and their deployment. Additionally, the paper represents the impact of power electronics and smart grid technologies that can enable the proportionate share of renewable energy...

  17. Preference and Use of Electronic Information and Resources by Blind/Visually Impaired in NCR Libraries in India

    Directory of Open Access Journals (Sweden)

    Shailendra Kumar

    2013-06-01

    Full Text Available This paper aims to determine the preference and use of electronic information and resources by blind/visually impaired users in the leading National Capital Region (NCR libraries of India. Survey methodology has been used as the basic research tool for data collection with the help of questionnaires. The 125 in total users surveyed in all the five libraries were selected randomly on the basis of willingness of the users with experience of working in digital environments to participate in the survey. The survey results were tabulated and analyzed with descriptive statistics methods using Excel software and 'Stata version 11'. The findings reveal that ICT have a positive impact in the lives of people with disabilities as it helps them to work independently and increases the level of confidence among them. The Internet is the most preferred medium of access to information among the majority of blind/visually impaired users. The 'Complexity of content available on the net' is found as the major challenge faced during Internet use by blind users of NCR libraries. 'Audio books on CDs/DVDs and DAISY books' are the most preferred electronic resources among the majority of blind/visually impaired users. This study will help the library professionals and organizations/institutions serving people with disabilities to develop effective library services for blind/visually impaired users in the digital environment on the basis of findings on information usage behavior in the study.

  18. The relationship between identity, language and teaching and learning in Higher Education in South Africa

    Directory of Open Access Journals (Sweden)

    Leibowitz, Brenda

    2005-12-01

    Full Text Available he study on the relationship of identity, language and teaching and learning was conducted by a team of eight members at a higher education institution in the Western Cape. The aims of the research were to investigate the relationship between language, identity and learning, to show how this investigation can benefit dialogue about transformation, and to facilitate the research development of the team. The research design made use of narrative and educational biography in semi-structured interviews with 64 staff members and 100 students. The study supports views of identity as constructed and non-unitary. It shows how language, both as proficiency in the dominant medium of communication and as discourse, is a key component of identity in a higher education institution. The interviews demonstrated how, according to lecturers and students, language and discourse function as primary influences on individuals’ acculturation and integration into the academic community. According to the interviewees, language as a marker of identity is interwoven with other aspects of identity. It is both a resource and a source of identification and affiliation. The research demonstrated that dialogue and self reflection can be facilitated via research into identity, teaching and learning, and that this can be beneficial for both the interviewees and the research team.

  19. LGBQ-Specific Elderly Housing as a "Sparkling Sanctuary": Boundary Work on LGBQ Identity and Community in Relationship to Potential LGBQ-Specific Elderly Housing in Sweden.

    Science.gov (United States)

    Rosenberg, Lena; Kottorp, Anders; Johansson, Karin

    2017-09-08

    This study explored how boundaries in relationship to community and identity were created and negotiated among lesbian, gay, bisexual, and queer (LGBQ) people within the framework of picturing LGBQ-specific elderly housing as a housing alternative in older age, by applying focus group methodology. "An island as a sparkling sanctuary" was identified as a metaphor for how symbolic resources defining the LGBQ community can be manifested in LGBQ-specific qualities of elderly housing. The boundary work underlying this manifestation included elaborations on the dilemma between exclusiveness and normality. The findings illustrate further how symbolic resources and collective identities were developed through dialectic interplay between internal and external definitions. Further, the findings show how boundary work generated shared feelings of similarity and group membership. The associated symbolic and social resources not only served to deal with difficult situations but also to manifest LGBQ identity and sense of community as a "gold medal."

  20. Electron microscopy at reduced levels of irradiation

    International Nuclear Information System (INIS)

    Kuo, I.A.M.

    1975-05-01

    Specimen damage by electron radiation is one of the factors that limits high resolution electron microscopy of biological specimens. A method was developed to record images of periodic objects at a reduced electron exposure in order to preserve high resolution structural detail. The resulting image would tend to be a statistically noisy one, as the electron exposure is reduced to lower and lower values. Reconstruction of a statistically defined image from such data is possible by spatial averaging of the electron signals from a large number of identical unit cells. (U.S.)

  1. Identity management

    Energy Technology Data Exchange (ETDEWEB)

    Pace, A [CERN, Geneva (Switzerland)

    2008-07-01

    This paper introduces identity management concepts and discusses various issues associated with their implementation. It will try to highlight technical, legal, and social aspects that must been foreseen when defining the numerous processes that an identity management infrastructure must support. Grid interoperability as well as cross platform interoperability is addressed on the technical aspect, followed by a short discussion on social consequences on user's privacy when completed traceability is enforced. The paper will finally give some examples on how identity management has been implemented at CERN.

  2. Asian American Adolescent Identity

    OpenAIRE

    Ohm, Julie Juhye

    1999-01-01

    The formation of ego identity in Asian American late adolescents attending Virginia Tech was examined within the frameworks of Erikson's psychosocial theory and Berry, Trimble, and Olmedo's model of acculturation. Ego identity was measured using the Achieved sub-scale of the Revised Version of the Extended Objective Measure of Ego Identity Status, an instrument based on the theoretical constructs of Erikson. Ethnic identity was measured using the Multigroup Ethnic Identity Measure and America...

  3. Attractive electron-electron interactions within robust local fitting approximations.

    Science.gov (United States)

    Merlot, Patrick; Kjærgaard, Thomas; Helgaker, Trygve; Lindh, Roland; Aquilante, Francesco; Reine, Simen; Pedersen, Thomas Bondo

    2013-06-30

    An analysis of Dunlap's robust fitting approach reveals that the resulting two-electron integral matrix is not manifestly positive semidefinite when local fitting domains or non-Coulomb fitting metrics are used. We present a highly local approximate method for evaluating four-center two-electron integrals based on the resolution-of-the-identity (RI) approximation and apply it to the construction of the Coulomb and exchange contributions to the Fock matrix. In this pair-atomic resolution-of-the-identity (PARI) approach, atomic-orbital (AO) products are expanded in auxiliary functions centered on the two atoms associated with each product. Numerical tests indicate that in 1% or less of all Hartree-Fock and Kohn-Sham calculations, the indefinite integral matrix causes nonconvergence in the self-consistent-field iterations. In these cases, the two-electron contribution to the total energy becomes negative, meaning that the electronic interaction is effectively attractive, and the total energy is dramatically lower than that obtained with exact integrals. In the vast majority of our test cases, however, the indefiniteness does not interfere with convergence. The total energy accuracy is comparable to that of the standard Coulomb-metric RI method. The speed-up compared with conventional algorithms is similar to the RI method for Coulomb contributions; exchange contributions are accelerated by a factor of up to eight with a triple-zeta quality basis set. A positive semidefinite integral matrix is recovered within PARI by introducing local auxiliary basis functions spanning the full AO product space, as may be achieved by using Cholesky-decomposition techniques. Local completion, however, slows down the algorithm to a level comparable with or below conventional calculations. Copyright © 2013 Wiley Periodicals, Inc.

  4. The constitution of marginalized identity in Signs of identity by Juan Goytisolo

    Directory of Open Access Journals (Sweden)

    Jelica Veljović

    2014-12-01

    Full Text Available The main objective of the article is to investigate the modes of constitution of a marginalized and exiled identity in the novel Signs of identity by Juan Goytisolo. It is categorised as a “testimony and postwar novel”, and the subjects’ constant search of themselves, of their Self and all the elements that constitute their identity is central to the work. The novel is set in the postwar socio-historical period and the protagonist – Alvaro Mendiola – searches for his identity in his childhood memories and family pictures, but also amongst all the Others whose life stories intertwine with his journey of identification. Tracing his line of identity formation, we found three different routes: the first through the genealogical records, the second through the concept of Otherness and the last one through love. We find Identity as a kaleidoscope containing all the Others who served as moulds for his Identity, yet leaving it undefined and incomplete. Therefore, the identity of an exiled and marginalized individual is always in flux, continually reinitiating the constitution of the Self that had been eradicated from its first and formative imagery: the family and the fatherland.

  5. Through Thick and Thin: How Views of Identity Affect Listening for a Story in Portraiture

    Directory of Open Access Journals (Sweden)

    Laurie R. Matthias Ed.D.

    2012-09-01

    Full Text Available This article illustrates how different conceptions of narrative identity shape the ways that researchers listen for stories in the research approach of portraiture. To do so, we explore the methodological details of two portraiture studies, one on the integration of religious faith and learning among college professors and another on college student participation in hip-hop culture. In this exploration, we illustrate how psychosocial and storied resource perspectives of identity in each study shape the positioning of participant voices as resonant, dissonant, or excluded altogether. Overall, we look beyond issues of researcher reflexivity to elucidate one of the distinguishing features of portraiture and call for coherency between key constructs such as narrative identity and the different elements of qualitative research processes more generally.

  6. Identity And Access Management e Federazione

    Directory of Open Access Journals (Sweden)

    Virginia Calabritto

    2012-07-01

    Full Text Available ItLa rete telematica è in costante crescita e così i servizi online che, in modo sempre più penetrante, rappresentano un aspetto della nostra quotidianità. I servizi in rete si distinguono in servizi ad accesso libero e servizi ad accesso controllato. Ogni giorno studenti, ricercatori e docenti accedono a contenuti e servizi (risorse ad accesso controllato con modalità diverse, la più diffusa è l'utilizzo dell‘informazione utenza/password, informazione diversa per ciascuna risorsa. Da questo punto di vista l’ampia disponibilità di risorse in rete crea all’utente, ma non solo a lui, diversi problemi, non ultimo quello della memorizzazione di un numero sempre più ampio di coppie utenza/password.L’articolo è teso ad illustrare, nel dettaglio, scenario e problematiche per passare quindi ad accennare alle tecnologie che possono costituire una soluzione, ovvero, l'Identity Management, il Single Sign On e le federazioni di infrastrutture di autenticazione e autorizzazione e, quindi, a degli esempi tra cui IDEM, la prima federazione italiana di Infrastrutture di Autenticazione e Autorizzazione, che coinvolge gli enti della comunità scientifica ed accademica e i fornitori di servizi.EnThe Internet is constantly growing, therefore on-line services, are becoming part of our daily life in a more and more pervasive manner. The network services are divided into two types of access: free access and controlled access. Every day students, researchers and teachers access content and services (resources through controlled access using different modes, e.g using user / password information which is different for each resource. From this perspective, the large availability of networked resources generates many problems for the users, last but not least the inconvenience of storing an increasing number of user / password.The article aims to illustrate, in detail, the context and the problems related to the management of a digital identiy in the

  7. Meristem identity and phyllotaxis in inflorescence development

    Directory of Open Access Journals (Sweden)

    Madelaine Elisabeth Bartlett

    2014-10-01

    Full Text Available Inflorescence morphology is incredibly diverse. This diversity of form has been a fruitful source of inquiry for plant morphologists for more than a century. Work in the grasses (Poaceae, the tomato family (Solanaceae, and Arabidopsis (Brassicaceae has led to a richer understanding of the molecular genetics underlying this diversity. The character of individual meristems, a combination of the number (determinacy and nature (identity of the products a meristem produces, is key in the development of plant form. A framework that describes inflorescence development in terms of shifting meristem identities has emerged and garnered empirical support in a number of model systems. We discuss this framework and highlight one important aspect of meristem identity that is often considered in isolation, phyllotaxis. Phyllotaxis refers to the arrangement of lateral organs around a central axis. The development and evolution of phyllotaxis in the inflorescence remains underexplored, but recent work analyzing early inflorescence development in the grasses identified an evolutionary shift in primary branch phyllotaxis in the Pooideae. We discuss the evidence for an intimate connection between meristem identity and phyllotaxis in both the inflorescence and vegetative shoot, and touch on what is known about the establishment of phyllotactic patterns in the meristem. Localized auxin maxima are instrumental in determining the position of lateral primordia. Upstream factors that regulate the position of these maxima remain unclear, and how phyllotactic patterns change over the course of a plant’s lifetime and evolutionary time, is largely unknown. A more complete understanding of the molecular underpinnings of phyllotaxis and architectural diversity in inflorescences will require capitalizing on the extensive resources available in existing genetic systems, and developing new model systems that more fully represent the diversity of plant morphology.

  8. Meristem identity and phyllotaxis in inflorescence development.

    Science.gov (United States)

    Bartlett, Madelaine E; Thompson, Beth

    2014-01-01

    Inflorescence morphology is incredibly diverse. This diversity of form has been a fruitful source of inquiry for plant morphologists for more than a century. Work in the grasses (Poaceae), the tomato family (Solanaceae), and Arabidopsis thaliana (Brassicaceae) has led to a richer understanding of the molecular genetics underlying this diversity. The character of individual meristems, a combination of the number (determinacy) and nature (identity) of the products a meristem produces, is key in the development of plant form. A framework that describes inflorescence development in terms of shifting meristem identities has emerged and garnered empirical support in a number of model systems. We discuss this framework and highlight one important aspect of meristem identity that is often considered in isolation, phyllotaxis. Phyllotaxis refers to the arrangement of lateral organs around a central axis. The development and evolution of phyllotaxis in the inflorescence remains underexplored, but recent work analyzing early inflorescence development in the grasses identified an evolutionary shift in primary branch phyllotaxis in the Pooideae. We discuss the evidence for an intimate connection between meristem identity and phyllotaxis in both the inflorescence and vegetative shoot, and touch on what is known about the establishment of phyllotactic patterns in the meristem. Localized auxin maxima are instrumental in determining the position of lateral primordia. Upstream factors that regulate the position of these maxima remain unclear, and how phyllotactic patterns change over the course of a plant's lifetime and evolutionary time, is largely unknown. A more complete understanding of the molecular underpinnings of phyllotaxis and architectural diversity in inflorescences will require capitalizing on the extensive resources available in existing genetic systems, and developing new model systems that more fully represent the diversity of plant morphology.

  9. Human identity versus gender identity: The perception of sexual addiction among Iranian women.

    Science.gov (United States)

    Moshtagh, Mozhgan; Mirlashari, Jila; Rafiey, Hassan; Azin, Ali; Farnam, Robert

    2017-07-01

    This qualitative study was conducted to explore the images of personal identity from the perspective of women with sexual addiction. The data required for the study were collected through 31 in-depth interviews. Sensing a threat to personal identity, dissatisfaction with gender identity, dissociation with the continuum of identity, and identity reconstruction in response to threat were four of the experiences that were common among women with sexual addiction. Painful emotional experiences appear to have created a sense of gender and sexual conflict or weakness in these women and thus threatened their personal identity and led to their sexual addiction.

  10. Organizational Identity

    DEFF Research Database (Denmark)

    Hatch, Mary Jo; Schultz, Majken

    This text presents the classic works on organizational identity alongside more current thinking on the issues. Ranging from theoretical contributions to empirical studies, the readings in this volume address the key issues of organizational identity, and show how these issues have developed through...

  11. The Identity Process in Times of Rupture: Narratives From the Egyptian Revolution

    Directory of Open Access Journals (Sweden)

    Sarah Hassan Awad

    2016-05-01

    Full Text Available This is a longitudinal study of the identity process through times of dramatic social change. Using a narrative psychological approach this research follows the life stories of five Egyptian bloggers as they write their stories on online blogs over the course of the three years following the 2011 revolution, at which time Egypt has witnessed major social and political changes. The aim is to understand the identity process of individuals as they develop and adapt through changing social contexts and how they create alternative social relations as they engage in prefigurative politics. The findings shed light on how ruptures trigger a process of reflexivity, adaptive learning, and sense-making that facilitates coping and the reconstruction of a positive identity after ruptures. It also suggests that the narration of the experience of rupture through storytelling creates a heightened sense of agency in individuals’ ability to create new meanings of their world in spite of the socio-cultural and political constraints. This study presents narratives as an informing methodological resource that connects identity process with social representations and emphasizes the value of storytelling as an integral part of the adaptation process.

  12. Identities in Harmony: Gender-Work Identity Integration Moderates Frame Switching in Cognitive Processing

    Science.gov (United States)

    Sacharin, Vera; Lee, Fiona; Gonzalez, Richard

    2009-01-01

    Professional women's identity integration--the perceived compatibility between work and gender identities--plays a role in how task or relationship information is processed. Seventy female business school students were primed with either their professional or their gender identity. Business women with higher identity integration showed an…

  13. Corporate Brand Identity in SMEs

    DEFF Research Database (Denmark)

    Mäläskä, Minna; Jones, Richard Ian

    Purpose: To study the emergence of corporate brand identity in SMEs and to develop a typology of brand identity drivers that reflects a co-creative approach to the emergence of brand identity. Design / Methodology / Approach : Existing approaches to brand identity are summarised. A narrative...... studies. The research is important since it suggests an iterative and co-creative approach to brand identity. A typology of brand identity formation for SMEs is presented: entrepreneur driven, market driven, stakeholder driven. Practical implications: The three paths to creating a strong brand identity...... challenge existing notions that brand identity is based solely on the values of the entrepreneur. This typology suggests that SMEs should be open to creating an identity that draws from their stakeholder eco-system. Originality / value: this research challenges the existing assumption that brand identity...

  14. Linear equations and rap battles: how students in a wired classroom utilized the computer as a resource to coordinate personal and mathematical positional identities in hybrid spaces

    Science.gov (United States)

    Langer-Osuna, Jennifer

    2015-03-01

    This paper draws on the constructs of hybridity, figured worlds, and cultural capital to examine how a group of African-American students in a technology-driven, project-based algebra classroom utilized the computer as a resource to coordinate personal and mathematical positional identities during group work. Analyses of several vignettes of small group dynamics highlight how hybridity was established as the students engaged in multiple on-task and off-task computer-based activities, each of which drew on different lived experiences and forms of cultural capital. The paper ends with a discussion on how classrooms that make use of student-led collaborative work, and where students are afforded autonomy, have the potential to support the academic engagement of students from historically marginalized communities.

  15. Thinking identity differently: dynamics of identity in self and institutional boundary

    Science.gov (United States)

    Albrecht, Nancy J.; Fortney, Brian S.

    2011-03-01

    In research oriented universities, research and teaching are often viewed as separate. Aydeniz and Hodge present one professor's struggles to synthesize an identity from three different spaces, each with competing values and core beliefs. As Mr. G's story unfolds, and he reflects upon his negotiation between teaching and research responsibilities, we seek to expand the discussion by presenting a caution to identity researchers. The caution pertains to construction of understanding on how identities are created, and the role that individual stories take in how identities are created and enacted. In this forum contribution, we present several questions in the hopes of furthering the discussion on identity research, and our understanding of the conceptualization of institutional boundaries and objectivity, as well as questions on participant involvement in the process of research.

  16. Multicultural identity processes.

    Science.gov (United States)

    Hong, Ying-Yi; Zhan, Siran; Morris, Michael W; Benet-Martínez, Verónica

    2016-04-01

    The study of multicultural identity has gained prominence in recent decades and will be even more urgent as the mobility of individuals and social groups becomes the 'new normal'. This paper reviews the state-of-the-art theoretical advancements and empirical discoveries of multicultural identity processes at the intrapersonal, interpersonal, and collective (e.g., organizational, societal) levels. First, biculturalism has more benefits for individuals' psychological and sociocultural adjustment than monoculturalism. Bicultural individuals' racial essentialist beliefs and Bicultural Identity Integration affect cultural frame switching, racial categorization, and creativity. Second, identity denial and identity-based discrimination by other people or groups threaten multicultural individuals' psychological health and performance. Third, multiculturalism and interculturalism policies are associated with different conceptions of and attitudes toward diversity, and have distinct outcomes for multicultural individuals and societies. Copyright © 2015 Elsevier Ltd. All rights reserved.

  17. Professional Identities and the Watershed of War: Teachers, Histories and Memories

    Directory of Open Access Journals (Sweden)

    Peter James Cunningham

    2015-02-01

    Full Text Available Teachers’ individual lives and careers, identities and experiences are so various as to almost defy generalization. A valid and realistic aim of educational research is however to identify significant commonalities that enhance an understanding of the teacher’s role. Memory is a prime resource for investigating factors that change over time in the course of a career and oral history provides a means of accessing and interpreting such a rich vein of evidence. One common feature shared by teachers in Britain during the mid-twentieth century was the impact on schooling of total war.This paper draws on the memories of three teachers interviewed during a large-scale enquiry into British teachers whose careers spanned World War II. Analysis of this evidence is made with reference to recent writings on professional identity, and one aim of the paper is to promote continuing reflection on the way teachers’ identities develop under the constraints of changing historical circumstance. Testimony selected for discussion here concerns their early education and career choices, their initial teacher training and their continuing professional formation, punctured for each at different points by the single overwhelming historical event of war.The paper concludes with reference to recent literature on teacher identity, indicating how historical research and autobiographical perspectives across a whole career can contribute to contemporary understandings of how teachers perceive their work, and the formation of professional identities.

  18. Social Identity in People with Multiple Sclerosis: An Examination of Family Identity and Mood.

    Science.gov (United States)

    Barker, Alex B; Lincoln, Nadina B; Hunt, Nigel; dasNair, Roshan

    2018-01-01

    Mood disorders are highly prevalent in people with multiple sclerosis (MS). MS causes changes to a person's sense of self. The Social Identity Model of Identity Change posits that group membership can have a positive effect on mood during identity change. The family is a social group implicated in adjustment to MS. The objectives of this study were to investigate whether family identity can predict mood in people with MS and to test whether this prediction was mediated by social support and connectedness to others. This cross-sectional survey of 195 participants comprised measures of family identity, family social support, connectedness to others, and mood. Family identity predicted mood both directly and indirectly through parallel mediators of family social support and connectedness to others. Family identity predicted mood as posited by the Social Identity Model of Identity Change. Involving the family in adjustment to MS could reduce low mood.

  19. Identity-specific motivation: How distinct identities direct self-regulation across distinct situations.

    Science.gov (United States)

    Browman, Alexander S; Destin, Mesmin; Molden, Daniel C

    2017-12-01

    Research on self-regulation has traditionally emphasized that people's thoughts and actions are guided by either (a) domain-general motivations that emerge from a cumulative history of life experiences, or (b) situation-specific motivations that emerge in immediate response to the incentives present in a particular context. However, more recent studies have illustrated the importance of understanding the interplay between such domain-general and situation-specific motivations across the types of contexts people regularly encounter. The present research, therefore, expands existing perspectives on self-regulation by investigating how people's identities -the internalized roles, relationships, and social group memberships that define who they are-systemically guide when and how different domain-general motivations are activated within specific types of situations. Using the motivational framework described by regulatory focus theory (Higgins, 1997), Studies 1 and 2 demonstrate that people indeed have distinct, identity-specific motivations that uniquely influence their current self-regulation when such identities are active. Studies 3-5 then begin to explore how identity-specific motivations are situated within people's larger self-concept. Studies 3a and 3b demonstrate that the less compatible people's specific identities, the more distinct are the motivations connected to those identities. Studies 4-5 then provide some initial, suggestive evidence that identity-specific motivations are not a separate, superordinate feature of people's identities that then alter how they pursue any subordinate, identity-relevant traits, but instead that such motivations emerge from the cumulative motivational significance of the subordinate traits to which the identities themselves become attached. Implications for understanding the role of the self-concept in self-regulation are discussed. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  20. Calculation of the electric potential around two identical atoms or ions

    International Nuclear Information System (INIS)

    Salzmann, D.

    1994-01-01

    Problems of diatomic molecules and atom-atom collisions, in which two identical atoms take part, or nearest-neighbor interactions in hot plasmas require the computations of the electric potential and the electron charge distribution around such a two-centered object. The electric potential around two such identical atoms or ions fulfills special symmetry conditions. These symmetries include a cylindrical symmetry around the line connecting the centers of the two atoms and a reflection symmetry around the plane perpendicular to this line halfway between the two atoms. When the two atoms are far apart, the asymptotic behavior of the charge-state distribution and the potential are those of two separated isolated atoms each of which can be expanded into multipole components around its nucleus. We define a set of new functions T mk (y,y n ) Eq. (2.25), which connect the various multipole components of the electric potential to those of the electron charge distribution in such a two-identical-atom problem, and which take into account all the above symmetry conditions. The great advantage of these transformation functions is the fact that by accounting for the above symmetry conditions, the three-dimensional integration required for the computation of the local electric microfield directly from the Poisson equation is practically reduced to a one-dimensional one. It is shown that the use of these functions greatly reduces the complexity and computation times of problems in which two identical atoms are involved, particularly for high-Z atoms. Explicit exact formulas are given for the computation of the T mk functions. An example is given which illustrates the use of these functions in first-order perturbation theory. For this special class of problems the procedure presented here results in a closed recursive equation, in which the interatomic distance is the only free parameter

  1. Memory transfer for emotionally valenced words between identities in dissociative identity disorder.

    Science.gov (United States)

    Huntjens, Rafaële J C; Peters, Madelon L; Woertman, Liesbeth; van der Hart, Onno; Postma, Albert

    2007-04-01

    The present study aimed to determine interidentity retrieval of emotionally valenced words in dissociative identity disorder (DID). Twenty-two DID patients participated together with 25 normal controls and 25 controls instructed to simulate DID. Two wordlists A and B were constructed including neutral, positive and negative material. List A was shown to one identity, while list B was shown to another identity claiming total amnesia for the words learned by the first identity. The identity claiming amnesia was tested for intrusions from list A words into the recall of words from list B and recognition of the words learned by both identities. Test results indicated no evidence of total interidentity amnesia for emotionally valenced material in DID. It is argued that dissociative amnesia in DID may more adequately be described as a disturbance in meta-memory functioning instead of an actual retrieval inability.

  2. Boundary crossing and learning identities – digital storytelling in primary schools

    Directory of Open Access Journals (Sweden)

    Anne Mette Bjørgen

    2010-11-01

    Full Text Available This article contributes to academic discussions on how digital storytelling in an educational setting may have potential to build and develop learning identities, agency and digital competences. With a socio-cultural framework on learning and identity as a point of departure, the article sets out to study these issues approached as boundary crossing between the intersecting contexts of leisure time and school. The analysis draws on three examples of digital storytelling among 5th - 7th graders in three Norwegian primary school classes. My findings suggest that digital storytelling might represent a boundary crossing enabling pupils to adopt new roles as producers of creative content, as mentors or guides, to explore new technology and software in a context different from that of outside school and to learn and develop competences related to production processes and multimodal resources. I argue that digital storytelling has a potential to contribute to learning, learning identity and agency, provided it is based on a more fully developed pedagogical strategy of carefully linking school and leisure time.

  3. Correlates of elemental-isotopic composition of stream fishes: the importance of land-use, species identity and body size.

    Science.gov (United States)

    Montaña, C G; Schalk, C M

    2018-04-01

    The isotopic (δ 13 C and δ 15 N) and stoichiometric (C:N:P) compositions of four fish species (Family Centrarchidae: Lepomis auritus, Lepomis cyanellus; Family Cyprinidae: Nocomis leptocephalus, Semotilus atromaculatus) were examined across four North Carolina Piedmont streams arrayed along an urbanization gradient. Both isotopic and stoichiometric composition of fishes appeared to track changes occurring in basal resource availability. Values of δ 13 C of basal resources and consumers were more enriched at the most urbanized streams. Similarly, basal resources and consumers were δ 15 N-enriched at more urbanized streams. Basal resource stoichiometry varied across streams, with periphyton being the most variable. Primary consumers stoichiometry also differed across streams. Intraspecific variation in fish stoichiometry correlated with the degree of urbanization, as the two cyprinids had higher N content and L. cyanellus had higher P content in more urbanized streams, probably due to enrichment of basal resources. Intrinsic factors, specifically species identity and body size also affected stoichiometric variation. Phosphorus (P) content increased significantly with body size in centrarchids, but not in cyprinids. These results suggest that although species identity and body size are important predictors of elemental stoichiometry, the complex nature of altered urban streams may yield imbalances in the elemental composition of consumers via their food resources. © 2018 The Fisheries Society of the British Isles.

  4. Library usage patterns in the electronic information environment. Electronic journals, Use studies, Libraries, Medical libraries

    Directory of Open Access Journals (Sweden)

    B. Franklin

    2004-01-01

    Full Text Available This paper examines the methodology and results from Web-based surveys of more than 15,000 networked electronic services users in the United States between July 1998 and June 2003 at four academic health sciences libraries and two large main campus libraries serving a variety of disciplines. A statistically valid methodology for administering simultaneous Web-based and print-based surveys using the random moments sampling technique is discussed and implemented. Results from the Web-based surveys showed that at the four academic health sciences libraries, there were approximately four remote networked electronic services users for each in-house user. This ratio was even higher for faculty, staff, and research fellows at the academic health sciences libraries, where more than five remote users for each in-house user were recorded. At the two main libraries, there were approximately 1.3 remote users for each in-house user of electronic information. Sponsored research (grant funded research accounted for approximately 32% of the networked electronic services activity at the health sciences libraries and 16% at the main campus libraries. Sponsored researchers at the health sciences libraries appeared to use networked electronic services most intensively from on-campus, but not from in the library. The purpose of use for networked electronic resources by patrons within the library is different from the purpose of use of those resources by patrons using the resources remotely. The implications of these results on how librarians reach decisions about networked electronic resources and services are discussed.

  5. CILogon: An Integrated Identity and Access Management Platform for Science

    Science.gov (United States)

    Basney, J.

    2016-12-01

    When scientists work together, they use web sites and other software to share their ideas and data. To ensure the integrity of their work, these systems require the scientists to log in and verify that they are part of the team working on a particular science problem. Too often, the identity and access verification process is a stumbling block for the scientists. Scientific research projects are forced to invest time and effort into developing and supporting Identity and Access Management (IAM) services, distracting them from the core goals of their research collaboration. CILogon provides an IAM platform that enables scientists to work together to meet their IAM needs more effectively so they can allocate more time and effort to their core mission of scientific research. The CILogon platform enables federated identity management and collaborative organization management. Federated identity management enables researchers to use their home organization identities to access cyberinfrastructure, rather than requiring yet another username and password to log on. Collaborative organization management enables research projects to define user groups for authorization to collaboration platforms (e.g., wikis, mailing lists, and domain applications). CILogon's IAM platform serves the unique needs of research collaborations, namely the need to dynamically form collaboration groups across organizations and countries, sharing access to data, instruments, compute clusters, and other resources to enable scientific discovery. CILogon provides a software-as-a-service platform to ease integration with cyberinfrastructure, while making all software components publicly available under open source licenses to enable re-use. Figure 1 illustrates the components and interfaces of this platform. CILogon has been operational since 2010 and has been used by over 7,000 researchers from more than 170 identity providers to access cyberinfrastructure including Globus, LIGO, Open Science Grid

  6. Ritual Identity

    NARCIS (Netherlands)

    van der Beek, Suzanne

    2017-01-01

    Rituals are often used as opportunities for self-reflection and identity construction. The Camino to Santiago de Compostela, which has become a singularly popular pilgrimage since the late 1980s, is an example of a ritual that is explicitly used to gain a deeper understanding of one’s identity

  7. Brand Identity.

    Science.gov (United States)

    Lawlor, John

    1998-01-01

    Instead of differentiating themselves by building "brand identities," colleges and universities often focus on competing with price. As a result, fewer and fewer institutions base their identities on value, the combination of quality and price. Methods of building two concepts to influence customers' brand image and brand loyalty are…

  8. Electronic resources of the rare books and valuable editions department of the Central Scientific Library of the V.N. Karazin Kharkiv National University: open access for research

    Directory of Open Access Journals (Sweden)

    І. К. Журавльова

    2014-12-01

    Full Text Available The article describes tasks that electronic collections of rare books fulfill: broad access for readers to rare and valuable editions providing, preservation of ensuring of the original. On the example of the electronic collection of the Central Scientific Library of the V.N. Karazin Kharkiv National University – «eScriptorium: electronic archive of rare books and manuscripts for research and education» the possibility of the full-text resources of the valuable editions using is shown. The principles of creation, structure, chronological frameworks, directions of adding the documents to the archive are represented. The perspectives of the project development are outlined as well as examples of the digital libraries of the European countries and Ukraine are provided, the actual task of preserving the originals of the rare books of the country is raised, the innovative approaches to serving users with electronic resources are considered. The evidences of cooperation of the Central Scientific Library of the V.N. Karazin Kharkiv National University with the largest world digital libraries: World Digital Library and Europeana are provided.

  9. Identity and Professional Networking.

    Science.gov (United States)

    Raj, Medha; Fast, Nathanael J; Fisher, Oliver

    2017-06-01

    Despite evidence that large professional networks afford a host of financial and professional benefits, people vary in how motivated they are to build such networks. To help explain this variance, the present article moves beyond a rational self-interest account to examine the possibility that identity shapes individuals' intentions to network. Study 1 established a positive association between viewing professional networking as identity-congruent and the tendency to prioritize strengthening and expanding one's professional network. Study 2 revealed that manipulating the salience of the self affects networking intentions, but only among those high in networking identity-congruence. Study 3 further established causality by experimentally manipulating identity-congruence to increase networking intentions. Study 4 examined whether identity or self-interest is a better predictor of networking intentions, providing support for the former. These findings indicate that identity influences the networks people develop. Implications for research on the self, identity-based motivation, and professional networking are discussed.

  10. Transfer of newly acquired stimulus valence between identities in dissociative identity disorder (DID).

    Science.gov (United States)

    Huntjens, Rafaële J C; Peters, Madelon L; Postma, Albert; Woertman, Liesbeth; Effting, Marieke; van der Hart, Onno

    2005-02-01

    Patients with Dissociative Identity Disorder (DID) frequently report episodes of interidentity amnesia, that is amnesia for events experienced by other identities. The goal of the present experiment was to test the implicit transfer of trauma-related information between identities in DID. We hypothesized that whereas declarative information may transfer from one identity to another, the emotional connotation of the memory may be dissociated, especially in the case of negative, trauma-related emotional valence. An evaluative conditioning procedure was combined with an affective priming procedure, both performed by different identities. In the evaluative conditioning procedure, previously neutral stimuli come to refer to a negative or positive connotation. The affective priming procedure was used to test the transfer of this acquired valence to an identity reporting interidentity amnesia. Results indicated activation of stimulus valence in the affective priming task, that is transfer of emotional material between identities.

  11. Challenging Identities

    DEFF Research Database (Denmark)

    Identity is a keyword in a number of academic fields as well as in public debate and in politics. During the last decades, references to identity have proliferated, yet there is no simple definition available that corresponds to the use of the notion in all contexts. The significance of the notion...

  12. Men as victims: "victim" identities, gay identities, and masculinities.

    Science.gov (United States)

    Dunn, Peter

    2012-11-01

    The impact and meanings of homophobic violence on gay men's identities are explored with a particular focus on their identities as men and as gay men. Homosexuality can pose a challenge to conventional masculinities, and for some gay men, being victimized on account of sexual orientation reawakens conflicts about their masculinity that they thought they had resolved. Being victimized can reinvoke shame that is rooted in failure or unwillingness to uphold masculine norms. For some gay men, victimization therefore has connotations of nonmasculinity that make being a victim an undesirable status, yet that status must be claimed to obtain a response from criminal justice or victim services. Men who experience homophobic abuse are helped by accepting a victim identity, but only if they can quickly move on from it by reconstructing a masculine gay (nonvictim) identity. This process can be facilitated by agencies such as the police and victim services, provided they help men exercise agency in "fighting back," that is, resisting further victimization and recovering.

  13. Entrepreneurship Education as Identity Workspace

    DEFF Research Database (Denmark)

    Frederiksen, Signe Hedeboe

    2016-01-01

    Entrepreneurship education theory and practice show increasing interest in identity work as an important part of entrepreneurial learning. Entrepreneurship programs become identity workspaces where pedagogical designs stimulate entrepreneurial identity work and support individuals’ discovery...... of themselves as entrepreneurs. This article investigates how entrepreneurship education is practiced as an identity workspace, when reflective identity work is turned into a pedagogical strategy for entrepreneurial learning. I present empirical data from a qualitative fieldstudy in an eleven week mandatory...... and identities. Exposed to identity work practices in class, learners experienced conflicting demands participating as succesful students and participating as potential entrepreneurs. The study draws attention to how an education setting contextualises identity work as a social practice. It critisises...

  14. BRANDING AND IDENTITY BUILDING FOR A SMALL COMPANY : Focused on Visual Identity

    OpenAIRE

    Näveri, Mattea

    2015-01-01

    The topic of this thesis is branding and identity of a small business, with a focus on visual identity. The major part of this thesis focuses on the research done on visual identity and the basic ideation of branding. The other half specifically focuses on the visual identity, the creation of a logo for the company, defining typography and colour and ephemera, and particularly, the company’s business card. The main goal was to execute a unique, individualized branding, which showcases...

  15. Transforming Mobile Platform with KI-SIM Card into an Open Mobile Identity Tool

    Science.gov (United States)

    Hyppönen, Konstantin; Hassinen, Marko; Trichina, Elena

    Recent introduction of Near Field Communication (NFC) in mobile phones has stimulated the development of new proximity payment and identification services. We present an architecture that facilitates the use of the mobile phone as a personalised electronic identity tool. The tool can work as a replacement for numerous ID cards and licenses. Design for privacy principles have been applied, such as minimisation of data collection and informed consent of the user. We describe an implementation of a lightweight version of the of the mobile identity tool using currently available handset technology and off-the-shelf development tools.

  16. Electronic tracking of human resource skills and knowledge, just in time training, manageable due diligence

    Energy Technology Data Exchange (ETDEWEB)

    Kolodziej, M.A. [Quick Test International Inc., (Canada). Canadian Technology Human Resource Board; Baker, O. [KeySpan Energy Canada, Calgary, AB (Canada)

    2001-06-01

    KeySpan Energy Canada is in the process of obtaining recognition of various occupational profiles including pipeline operators, inspectors, and field and plant operators from various certifying organizations. The process of allowing individuals to obtain certification is recognized by Canadian Technology Human Resources Board as a step towards national standards for technologists and technicians. Proven competency is a must for workers in todays oil industry in response to increasingly stringent government safety regulations, environmental concerns and high public scrutiny. Quick Test international Inc. has developed a management tool in collaboration with end users at KeySpan Energy Canada. It is an electronic, Internet based competency tool for tracking personal competencies and maintaining continued competency. Response to the tool has been favourable. 2 refs., 4 figs.

  17. Media identities and media-influenced indentifications Visibility and identity recognition in the media

    Directory of Open Access Journals (Sweden)

    Víctor Fco. Sampedro Blanco

    2004-10-01

    Full Text Available The media establish, in large part, the patterns of visibility and public recognition of collective identities. We define media identities as those that are the object of production and diffusion by the media. From this discourse, the communities and individuals elaborate media-influenced identifications; that is, processes of recognition or banishment; (rearticulating the identity markers that the media offer with other cognitive and emotional sources. The generation and appropriation of the identities are subjected to a media hierarchisation that influences their normalisation or marginalisation. The identities presented by the media and assumed by the audience as part of the official, hegemonic discourse are normalised, whereas the identities and identifications formulated in popular and minority terms are marginalised. After presenting this conceptual and analytical framework, this study attempts to outline the logics that condition the presentation, on the one hand, andthe public recognition, on the other hand, of contemporary identities.

  18. Do dimensions of ethnic identity mediate the association between perceived ethnic group discrimination and depressive symptoms?

    Science.gov (United States)

    Brittian, Aerika S; Kim, Su Yeong; Armenta, Brian E; Lee, Richard M; Umaña-Taylor, Adriana J; Schwartz, Seth J; Villalta, Ian K; Zamboanga, Byron L; Weisskirch, Robert S; Juang, Linda P; Castillo, Linda G; Hudson, Monika L

    2015-01-01

    Ethnic group discrimination represents a notable risk factor that may contribute to mental health problems among ethnic minority college students. However, cultural resources (e.g., ethnic identity) may promote psychological adjustment in the context of group-based discriminatory experiences. In the current study, we examined the associations between perceptions of ethnic group discrimination and depressive symptoms, and explored dimensions of ethnic identity (i.e., exploration, resolution, and affirmation) as mediators of this process among 2,315 ethnic minority college students (age 18 to 30 years; 37% Black, 63% Latino). Results indicated that perceived ethnic group discrimination was associated positively with depressive symptoms among students from both ethnic groups. The relationship between perceived ethnic group discrimination and depressive symptoms was mediated by ethnic identity affirmation for Latino students, but not for Black students. Ethnic identity resolution was negatively and indirectly associated with depressive symptoms through ethnic identity affirmation for both Black and Latino students. Implications for promoting ethnic minority college students' mental health and directions for future research are discussed. (PsycINFO Database Record (c) 2015 APA, all rights reserved).

  19. Electron image reconstruction of helical protein assemblies

    International Nuclear Information System (INIS)

    Cremers, A.F.M.

    1980-01-01

    The analysis of projections of large ordered biological systems obtained by electron microscopy of negatively stained specimens is described. The biological structures amenable to this approach are constructed from a large number of identical protein molecules, which are arranged according to helical symmetry. Electron images of these structures generally contain sufficient information in order to calculate a three-dimensional density map. (Auth.)

  20. Compact two-beam push-pull free electron laser

    Science.gov (United States)

    Hutton, Andrew [Yorktown, VA

    2009-03-03

    An ultra-compact free electron laser comprising a pair of opposed superconducting cavities that produce identical electron beams moving in opposite directions such that each set of superconducting cavities accelerates one electron beam and decelerates the other electron beam. Such an arrangement, allows the energy used to accelerate one beam to be recovered and used again to accelerate the second beam, thus, each electron beam is decelerated by a different structure than that which accelerated it so that energy exchange rather than recovery is achieved resulting in a more compact and highly efficient apparatus.

  1. Coming to an Asexual Identity: Negotiating Identity, Negotiating Desire.

    Science.gov (United States)

    Scherrer, Kristin S

    2008-10-01

    Sexuality is generally considered an important aspect of self-hood. Therefore, individuals who do not experience sexual attraction, and embrace an asexual identity are in a unique position to inform the social construction of sexuality. This study explores the experiences of asexual individuals utilizing open ended Internet survey data from 102 self-identified asexual people. In this paper I describe several distinct aspects of asexual identities: the meanings of sexual, and therefore, asexual behaviors, essentialist characterizations of asexuality, and lastly, interest in romance as a distinct dimension of sexuality. These findings have implications not only for asexual identities, but also for the connections of asexuality with other marginalized sexualities.

  2. A theory of electron baths: One-electron system dynamics

    International Nuclear Information System (INIS)

    McDowell, H.K.

    1992-01-01

    The second-quantized, many-electron, atomic, and molecular Hamiltonian is partitioned both by the identity or labeling of the spin orbitals and by the dynamics of the spin orbitals into a system coupled to a bath. The electron bath is treated by a molecular time scale generalized Langevin equation approach designed to include one-electron dynamics in the system dynamics. The bath is formulated as an equivalent chain of spin orbitals through the introduction of equivalent-chain annihilation and creation operators. Both the dynamics and the quantum grand canonical statistical properties of the electron bath are examined. Two versions for the statistical properties of the bath are pursued. Using a weak bath assumption, a bath statistical average is defined which allows one to achieve a reduced dynamics description of the electron system which is coupled to the electron bath. In a strong bath assumption effective Hamiltonians are obtained which reproduce the dynamics of the bath and which lead to the same results as found in the weak bath assumption. The effective (but exact) Hamiltonian is found to be a one-electron Hamiltonian. A reduced dynamics equation of motion for the system population matrix is derived and found to agree with a previous version. This equation of motion is useful for studying electron transfer in the system when coupled to an electron bath

  3. Performing coolness: smoking refusal and adolescent identities.

    Science.gov (United States)

    Plumridge, E W; Fitzgerald, L J; Abel, G M

    2002-04-01

    The implications of smoking refusal for personal identity style were studied through conversations in six small focus groups or dyads of 13- and 14-year-old non-smokers from an urban New Zealand secondary school. The approach to analyzing their talk was informed by notions of 'performativity' and 'social space' to focus on the connections between identity and social relations. Smoking emerged as a key signifier of power and status. It was salient at both top and bottom ends of the social hierarchy depending upon the competence displayed in smoking as part of a larger ensemble of personal deportment and behavior. Being a non-smoker therefore inevitably carried connotations of being 'average' or 'in the middle', presenting non-smoking adolescents with the problem of accrediting themselves against superior 'smoker cool' groups. A discourse analytic approach was used to examine the resources and strategies participants brought to bear on this 'problem', which was then seen to be solved differently by boys and girls. Boys could establish alternatives to 'smoker cool' through physical activity, girls had little recourse but to accept their inferior status. The implications of this for health education and promotion are discussed.

  4. The Biomedical Resource Ontology (BRO) to enable resource discovery in clinical and translational research.

    Science.gov (United States)

    Tenenbaum, Jessica D; Whetzel, Patricia L; Anderson, Kent; Borromeo, Charles D; Dinov, Ivo D; Gabriel, Davera; Kirschner, Beth; Mirel, Barbara; Morris, Tim; Noy, Natasha; Nyulas, Csongor; Rubenson, David; Saxman, Paul R; Singh, Harpreet; Whelan, Nancy; Wright, Zach; Athey, Brian D; Becich, Michael J; Ginsburg, Geoffrey S; Musen, Mark A; Smith, Kevin A; Tarantal, Alice F; Rubin, Daniel L; Lyster, Peter

    2011-02-01

    The biomedical research community relies on a diverse set of resources, both within their own institutions and at other research centers. In addition, an increasing number of shared electronic resources have been developed. Without effective means to locate and query these resources, it is challenging, if not impossible, for investigators to be aware of the myriad resources available, or to effectively perform resource discovery when the need arises. In this paper, we describe the development and use of the Biomedical Resource Ontology (BRO) to enable semantic annotation and discovery of biomedical resources. We also describe the Resource Discovery System (RDS) which is a federated, inter-institutional pilot project that uses the BRO to facilitate resource discovery on the Internet. Through the RDS framework and its associated Biositemaps infrastructure, the BRO facilitates semantic search and discovery of biomedical resources, breaking down barriers and streamlining scientific research that will improve human health. Copyright © 2010 Elsevier Inc. All rights reserved.

  5. Electronic Recruitment at CERN

    CERN Multimedia

    2004-01-01

    The Human Resources Department switches to electronic recruitment. From now on whenever you are involved in a recruitment action you will receive an e-mail giving you access to a Web folder. Inside you will find a shortlist of applications drawn up by the Human Resources Department. This will allow you to consult the folder, at the same time as everyone else involved in the recruitment process, for the vacancy you are interested in. This new electronic recruitment system, known as e-RT, will be introduced in a presentation given at 10 a.m. on 11 February in the Main Auditorium. Implemented by AIS (Administrative Information Services) and the Human Resources Department, e-RT will cover vacancies open in all of CERN's recruitment programmes. The electronic application system was initially made available to technical students in July 2003. By December it was extended to summer students, fellows, associates and Local Staff. Geraldine Ballet from the Recruitment Service prefers e-RT to mountains of paper! The Hu...

  6. Identity Support, Identity Devaluation, and Well-Being among Lesbians

    Science.gov (United States)

    Beals, Kristin P.; Peplau, Letitia Anne

    2005-01-01

    This research tested predictions about the association of identity support and identity devaluation with psychological well-being (self-esteem, life satisfaction, and depression). Lesbian women completed baseline surveys (N=42), then provided daily experience reports during a 2-week period (n=38), and completed a 2-month follow-up survey (n=34).…

  7. Plastics disassembly versus bulk recycling: engineering design for end-of-life electronics resource recovery.

    Science.gov (United States)

    Rios, Pedro; Stuart, Julie Ann; Grant, Ed

    2003-12-01

    Annual plastic flows through the business and consumer electronics manufacturing supply chain include nearly 3 billion lb of high-value engineering plastics derived from petroleum. The recovery of resource value from this stream presents critical challenges in areas of materials identification and recycling process design that demand new green engineering technologies applied together with life cycle assessment and ecological supply chain analysis to create viable plastics-to-plastics supply cycles. The sustainable recovery of potentially high-value engineering plastics streams requires that recyclers either avoid mixing plastic parts or purify later by separating smaller plastic pieces created in volume reduction (shredding) steps. Identification and separation constitute significant barriers in the plastics-to-plastics recycling value proposition. In the present work, we develop a model that accepts randomly arriving electronic products to study scenarios by which a recycler might identify and separate high-value engineering plastics as well as metals. Using discrete eventsimulation,we compare current mixed plastics recovery with spectrochemical plastic resin identification and subsequent sorting. Our results show that limited disassembly with whole-part identification can produce substantial yields in separated streams of recovered engineering thermoplastics. We find that disassembly with identification does not constitute a bottleneck, but rather, with relatively few workers, can be configured to pull the process and thus decrease maximum staging space requirements.

  8. Racial Identity Attitudes and Ego Identity Statuses in Dominican and Puerto Rican College Students

    Science.gov (United States)

    Sanchez, Delida

    2013-01-01

    This study explored the relation between racial identity attitudes and ego identity statuses in 94 Dominican and Puerto Rican Latino college students in an urban public college setting. Simultaneous regression analyses were conducted to test the relation between racial identity attitudes and ego identity statuses, and findings indicated that…

  9. Bridging Identities

    Science.gov (United States)

    Deaux, Kay; Burke, Peter

    2010-01-01

    Sociology and psychology are no strangers in the theoretical world of self and identity. Early works by William James (1890), a psychologist, and George Herbert Mead (1934), a sociologist, are often taken as a starting point by investigators in both fields. In more recent years, with the development of a number of identity theories in both fields,…

  10. The Resources of the Past in Early Medieval Europe

    NARCIS (Netherlands)

    Gantner, C.; McKitterick, R.M.; Meeder, S.M.

    2015-01-01

    This volume analyses the importance of history, the textual resources of the past and the integration of Christian and imperial Rome into the cultural memory of early medieval Europe within the wider question of identity formation. The case studies in this book shed new light on the process of

  11. Components of Sexual Identity

    Science.gov (United States)

    Shively, Michael G.; DeCecco, John P.

    1977-01-01

    This paper examines the four components of sexual identity: biological sex, gender identity, social sex-role, and sexual orientation. Theories about the development of each component and how they combine and conflict to form the individual's sexual identity are discussed. (Author)

  12. Korean Adoptee Identity: Adoptive and Ethnic Identity Profiles of Adopted Korean Americans

    Science.gov (United States)

    Beaupre, Adam J.; Reichwald, Reed; Zhou, Xiang; Raleigh, Elizabeth; Lee, Richard M.

    2015-01-01

    Adopted Korean adolescents face the task of grappling with their identity as Koreans and coming to terms with their adoptive status. In order to explore these dual identities, the authors conducted a person-centered study of the identity profiles of 189 adopted Korean American adolescents. Using cluster analytic procedures, the study examined…

  13. Cultural Integration and National Identity Education for Ethnic Minority College Students

    Institute of Scientific and Technical Information of China (English)

    LI Yongzheng; WANG Lixia

    2014-01-01

    Cultural integration is an objective historical phenomenon , and also exists in present society .No matter if seen from history or from the present world , cultural integration is the key to ethnic relations as well as an approach for cultural development .The concept of “nation” is a fairly new product introduced from western countries in modern times.It is a people ’ s cognition, ap-praisal and feelings towards the country where they live.It is mainly represented in the national politi-cal community , the structural level as well as the i-dentity in the common spiritual level of the Chinese nation. School education is a very strong tool during the formation process of a “nation”.Since the Qin and Han periods (2nd Century B.C.), China has formed a large -unified web of Chinese culture . After the creation of the New China , China also has paid attention to the development of education for the ethnic minorities , and has taken the task of training the new generation of ethnic minorities as an important national policy .“Fair Education” is the “core idea” of China ’ s ethnic minorities ’ education. This includes preferential policy for ethnic minority-students’ education chances , the investment of teaching resources in ethnic minority areas, and respect for and protection of the cul-tures of the ethnic minorities .Through these ac-tions, the government ensures that the ethnic mi-nority-students living in remote and poor areas get the chance for a fair education like the Han -Chi-nese students .The policy further enhances the e-qual development of , and exchanges among the va-rious nationalities in the whole country; promotes the common development of the ethnic economies , the common prosperity of their cultures , political stability;and finally ensures the citizen ’ s strong identity of the nation . Culturale integration is the foundation of and precondition for the national identity education of the ethnic minorities .On the one hand

  14. Regional Commonalities and Regional Identities: Forging a Normative Understanding of Southeast Asian Identity

    Directory of Open Access Journals (Sweden)

    Gürol Baba

    2016-01-01

    Full Text Available In the last two decades, most of the IR academia’s attention on Southeast Asian regionalism utilised constructivism and/or realism and has focused on ASEAN and its derivatives. This article aims to skew this angle by elaborating a possible relationship between Asian values and a normative understanding of Southeast Asian identity. The major reason for this article’s focus on a normative interpretation is that a practical application of Southeast Asian identity is not very achievable due to various ethnic, cultural, political, territorial, and historical diversities. While the region is diverse, there are also a number of commonalities among its states. Asian values, from a Confucian perspective, account for some of these commonalities. By using constructivists’ claims on both the links between norms and identity and the dynamic interaction between values and norms, this article argues that Asian values could contribute to the development of Amitav Acharya’s widely cited normative/ideational format of Southeast Asian identity. The article takes ASEAN identity as a case study and aims to show why a normative identity is more achievable than a practical identity among Southeast Asians, and how Asian values might contribute to the creation of this shared identity.

  15. Intergroup conflict management strategies as related to perceptions of dual identity and separate groups.

    Science.gov (United States)

    Bizman, Aharon; Yinon, Yoel

    2004-04-01

    The authors examined the relations between (a) the perceptions of dual identity and separate groups and (b) intergroup conflict management strategies, in two contexts: the conflict between the secular and religious sectors in Israel and the allocation of resources among organizational subunits. In both contexts, contention (i.e., forcing one's will on the other party) was associated with the perception of separate groups. Only in the organizational context, avoidance (i.e., doing nothing or discontinuing participation in the conflict) was associated with the perception of dual identity. Problem solving (i.e., finding a solution that is acceptable to both parties) was related to the perception of dual identity in the secular-religious context. In the organizational context, this relation appeared only under a low perception of separate groups. Yielding (i.e., satisfying the other party's needs at the expense of one's own) was related to the perception of dual identity in the organizational context. In the secular-religious context, this relation appeared only under a high perception of separate groups. The authors discussed the varying pattern of the associations between (a) the perceptions of dual identity and separate groups and (b) the conflict management strategies in the two contexts in terms of the Dual Concern Model and the perceived feasibility of the strategies.

  16. Lost in translation: conflicting views of deforestation, land use and identity in western Madagascar.

    Science.gov (United States)

    Scales, Ivan R

    2012-01-01

    This paper focuses on the interplay between environmental narratives, identity politics and the management of forest resources in Madagascar. While efforts to conserve the island's biological diversity have centred primarily on the designation of protected areas, policies have increasingly focused on local communities. The experiences of the last 20 years have shown that community-based approaches to conservation offer considerable challenges due to the complex politics of natural resource use, which involve multiple and diverse stakeholders, often with very different and sometimes conflicting values. In this paper, I focus on the environmental perceptions and values of two groups in the Central Menabe region of western Madagascar – conservation organisations and rural households – revealing a contrasting set of views regarding the region's forest. I show that the conservation discourse has changed over time, increasingly emphasising the biological diversity of the region's tropical dry-deciduous forest and prioritising non-consumptive uses of natural resources. Although policy has changed in response to changing values, I show that it has been underpinned by the notion that hatsake (‘slash-and-burn’ agriculture) is an irrational practice driven by necessity rather than choice. Policy has thus sought to provide livelihood alternatives, firstly through forestry, then through changes in cultivation and increasingly through tourism. This misunderstands the local view of the forest, which sees hatsake as a way to make the land productive, as long as it is carried out responsibly according to local fady (taboos). As well as facing problems of translating conservation goals into local values and misunderstanding the motives for forest clearance, policy has been based on a narrative that attaches particular land use practices to ethnic identities. I argue that this ignores the history and fluid reality of both identity and land use.

  17. Character convergence under competition for nutritionally essential resources.

    Science.gov (United States)

    Fox, Jeremy W; Vasseur, David A

    2008-11-01

    Resource competition is thought to drive divergence in resource use traits (character displacement) by generating selection favoring individuals able to use resources unavailable to others. However, this picture assumes nutritionally substitutable resources (e.g., different prey species). When species compete for nutritionally essential resources (e.g., different nutrients), theory predicts that selection drives character convergence. We used models of two species competing for two essential resources to address several issues not considered by existing theory. The models incorporated either slow evolutionary change in resource use traits or fast physiological or behavioral change. We report four major results. First, competition always generates character convergence, but differences in resource requirements prevent competitors from evolving identical resource use traits. Second, character convergence promotes coexistence. Competing species always attain resource use traits that allow coexistence, and adaptive trait change stabilizes the ecological equilibrium. In contrast, adaptation in allopatry never preadapts species to coexist in sympatry. Third, feedbacks between ecological dynamics and trait dynamics lead to surprising dynamical trajectories such as transient divergence in resource use traits followed by subsequent convergence. Fourth, under sufficiently slow trait change, ecological dynamics often drive one of the competitors to near extinction, which would prevent realization of long-term character convergence in practice.

  18. Merge of terminological resources

    DEFF Research Database (Denmark)

    Henriksen, Lina; Braasch, Anna

    2012-01-01

    In our globalized world, the amount of cross-national communication increases rapidly, which also calls for easy access to multi-lingual high quality terminological resources. Sharing of terminology resources is currently becoming common practice, and efficient strategies for integration...... – or merging – of terminology resources are strongly needed. This paper discusses prerequisites for successful merging with the focus on identification of candidate duplicates of a subject domain found in the resources to be merged, and it describes automatic merging strategies to be applied to such duplicates...... in electronic terminology resources. Further, some perspectives of manual, supplementary assessment methods supporting the automatic procedures are sketched. Our considerations are primarily based on experience gained in the IATE and EuroTermBank projects, as merging was a much discussed issue in both projects....

  19. Oppositional identities: dissimilarities in how women and men experience parent versus professional roles.

    Science.gov (United States)

    Hodges, Allegra J; Park, Bernadette

    2013-08-01

    As stereotypes of social groups undergo change, group members gain access to previously denied social and cultural roles. Although such access is desirable, to the extent that the behavior, traits, and attitudes required to succeed in a new role are in opposition to those required to do well in a still-valued old role, conflict in the self-concept may ensue. Specifically, the individual must necessarily fall short in social comparisons of the self to the ideal group member in 1 or both roles, threatening self-integrity. Examining the specific case of oppositional identities between career and mom roles, we argue that women respond to this conflict by shifting back and forth between activation of whichever identity is relevant in a given situational context in a way that men do not. This shifting of self-associations is hypothesized to deplete scarce cognitive resources, interfering with performance on a task that requires executive function capacity. In addition, to the extent the identities are viewed as trading off against one another, failure in 1 domain may be responded to by activating the alternate identity in an effort to restore self-integrity, again in a way that is not true for men. These hypotheses are explored across 4 studies, utilizing both college students in the midst of formulating--and working parents in the midst of negotiating--these identities.

  20. Social Identity Change: Shifts in Social Identity during Adolescence

    Science.gov (United States)

    Tanti, Chris; Stukas, Arthur A.; Halloran, Michael J.; Foddy, Margaret

    2011-01-01

    This study investigated the proposition that adolescence involves significant shifts in social identity as a function of changes in social context and cognitive style. Using an experimental design, we primed either peer or gender identity with a sample of 380 early- (12-13 years), mid- (15-16 years), and late-adolescents (18-20 years) and then…

  1. Inter-identity autobiographical amnesia in patients with dissociative identity disorder.

    Science.gov (United States)

    Huntjens, Rafaële J C; Verschuere, Bruno; McNally, Richard J

    2012-01-01

    A major symptom of Dissociative Identity Disorder (DID; formerly Multiple Personality Disorder) is dissociative amnesia, the inability to recall important personal information. Only two case studies have directly addressed autobiographical memory in DID. Both provided evidence suggestive of dissociative amnesia. The aim of the current study was to objectively assess transfer of autobiographical information between identities in a larger sample of DID patients. Using a concealed information task, we assessed recognition of autobiographical details in an amnesic identity. Eleven DID patients, 27 normal controls, and 23 controls simulating DID participated. Controls and simulators were matched to patients on age, education level, and type of autobiographical memory tested. Although patients subjectively reported amnesia for the autobiographical details included in the task, the results indicated transfer of information between identities. The results call for a revision of the DID definition. The amnesia criterion should be modified to emphasize its subjective nature.

  2. Complete electronics self-teaching guide with projects

    CERN Document Server

    Boysen, Earl

    2012-01-01

    An all-in-one resource on everything electronics-related! For almost 30 years, this book has been a classic text for electronics enthusiasts. Now completely updated for today's technology, this latest version combines concepts, self-tests, and hands-on projects to offer you a completely repackaged and revised resource. This unique self-teaching guide features easy-to-understand explanations that are presented in a user-friendly format to help you learn the essentials you need to work with electronic circuits. All you need is a general understanding of electronics concepts such as Oh

  3. Collective Endeavors to Address Institutional Contradiction between Gender Identity and Occupational Identity

    DEFF Research Database (Denmark)

    Villeseche, Florence

    or leaders and their social identity as women. Accordingly, I here seek to answer the following question: what dilemmas arise from the collective institutional work performed by actors facing institutional contradiction between their occupational and gender identity, and how are those dilemmas addressed? I......Women’s presence in the labor market is one of the major institutional changes of the past century. However, in particular at higher hierarchical levels, gender equality still remains a distant objective. The ideal-type of the worker, manager or leader is this largely a masculine one, thus...... associating the related occupational identity to a masculine gender social identity. Thus, it can be argued that women in organizations can face an “institutional contradiction” between their occupation and their gender – i.e a perceived discordancy between their social occupational identity as managers...

  4. Being Tolerant about Identity?

    NARCIS (Netherlands)

    van Rooij, R.; Gutzmann, D.; Köpping, J.; Meier, C.

    2014-01-01

    Identity and identification are very important concepts in philosophy and logic. They are crucial for the analysis of quantification and for counting. According to some philosophers, many examples that are supposed to show that identity is contingent, in fact show that the notion of identity is

  5. A storied-identity analysis approach to teacher candidates learning to teach in an urban setting

    Science.gov (United States)

    Ibourk, Amal

    highlighted his struggle with navigating talkativeness in the class, but also his struggle being an authority figure in his classroom. At present, only Becky and Ashley pursued teaching in a high needs setting. A storied identity analysis provided as well an insight into their storied strategies, or the teaching strategies shaped by the stories the interns told about how they made sense of the challenges they faced in their teaching practice. There were five teaching strategies the interns named that were important in supporting their learning to teach were (1) building relationships with their students, (2) being resourceful and creative when faced with limited lab materials, (3) making science relevant to their students, (4) scaffolding their students in their learning, and (5) having a network of people as resources in helping them be better teachers and helping their students learn. Out of these five teaching strategies, I called those they named and highlighted as helping them teach in ways they valued and that connected back to their storied identity of science learning their storied strategies. Implications for further pushing storied identities as a tool for teacher educators to help pinpoint priorities that surface in teacher candidates' practice are discussed. An insight into the priorities that teacher candidates highlight in their practice as well as the storied strategies they name and use to deal with challenges that surface in their practice has potential in better helping teacher candidates navigate their developing practice.

  6. Post-colonial identity in Greenland?

    DEFF Research Database (Denmark)

    Gad, Ulrik Pram

    2009-01-01

    could be furthered by bringing politics back in. Based on a discourse analysis of the Greenlandic debate on language, this paper makes three claims: First, the identity projects promoted in Greenland are based on an essentialist conception of identity. Secondly, Greenlandic identity discourse combines......In the gradual unravelling of Greenland’s colonial relationship to Denmark, an essentialist conceptualization of Greenlandic identity has played a significant role. However, both our scholarly understanding of post-colonial Greenlandic identity and the process towards independence for Greenland...... elements of traditional Inuit culture and elements of colonial modernity. Thirdly, monolingual Greenlanders are those with the most to gain from abandoning the dichotomy of essentialist identities. Strategically, the paper suggests a post-post-colonial Greenlandic identity as a means of avoiding...

  7. Afterword. Contesting Culture: Identity and Curriculum Dilemmas in the Age of Globalization, Postcolonialism, and Multiplicity.

    Science.gov (United States)

    McCarthy, Cameron; Giardina, Michael D.; Harewood, Susan Juanita; Park, Jin-Kyung

    2003-01-01

    Draws on articles in this special issue to find implications for educators of developments in popular culture, cultural globalization, and electronic images. Addresses questions concerning the reproduction of culture, identity, and community within contemporary educational debates. (Contains 48 references.) (Author/SK)

  8. On the fundamentals of identity

    NARCIS (Netherlands)

    van der Gaag, Mandy

    Various new perspectives on identity have been introduced or have increased in popularity over the past two decades. These include identity as dynamic system (Kunnen & Bosma, 2001), a narrative approach to identity (McAdams, 2001), multi-dimensional models of identity formation (Luyckx et al., 2006;

  9. Personal Identity in Enhancement

    Directory of Open Access Journals (Sweden)

    Jana Podroužková

    2015-09-01

    Full Text Available The aim of this paper is to introduce the concept of human enhancement, its methods and its relation to personal identity. Also several approaches to personal identity will be described. Transhumanism is a special think tank supporting human enhancement through modern technologies and some of its representatives claim, that even great changes to human organisms will not affect their personal identity. I will briefly describe the most important means of human enhancment and consider the problem of personal identity for each of them separately.

  10. Known and Unknown Identity

    DEFF Research Database (Denmark)

    Henze-Pedersen, Sofie

    This qualitative study investigates the relationship between openness and identity among 18 adoptees. Many studies have argued that a high degree of openness is important for the identity formation of adoptees. However, few studies have explored this relationship. Two types of openness...... (biographical knowledge and communicative openness) are used to categorise the empirical material, making it possible to illuminate how different types of openness influence identity. The findings suggest that there is no direct link between a high degree of openness and positive identity formation. Instead...

  11. Responses to professional identity threat: Identity management strategies in incident narratives of health care professionals.

    Science.gov (United States)

    van Os, Annemiek; de Gilder, Dick; van Dyck, Cathy; Groenewegen, Peter

    2015-01-01

    The purpose of this paper is to explore sensemaking of incidents by health care professionals through an analysis of the role of professional identity in narratives of incidents. Using insights from social identity theory, the authors argue that incidents may create a threat of professional identity, and that professionals make use of identity management strategies in response to this identity threat. The paper draws on a qualitative analysis of incident narratives in 14 semi-structured interviews with physicians, nurses, and residents at a Dutch specialist hospital. The authors used an existing framework of identity management strategies to categorize the narratives. The analysis yielded two main results. First, nurses and residents employed multiple types of identity management strategies simultaneously, which points to the possible benefit of combining different strategies. Second, physicians used the strategy of patronization of other professional groups, a specific form of downward comparison. The authors discuss the implications of the findings in terms of the impact of identity management strategies on the perpetuation of hierarchical differences in health care. The authors argue that efforts to manage incident handling may profit from considering social identity processes in sensemaking of incidents. This is the first study that systematically explores how health care professionals use identity management strategies to maintain a positive professional identity in the face of incidents. This study contributes to research on interdisciplinary cooperation in health care.

  12. ‘I Was the First Westerner, the Only English Person’: Discursive Construction of National Identity

    Directory of Open Access Journals (Sweden)

    Татьяна Викторовна Дубровская

    2015-12-01

    Full Text Available This study focuses on the issue of discursive construction of national identity. It aims to reveal how pragma-linguistic tools are exploited to construct and re-construct national identity, as well as to define how flexible it can be and how identities of the speakers correlate in dialogue. The research can be viewed as a case-study; the data for analysis come from three issues of the English language talk-show ‘Insight Germany’ on the German TV channel Deutsche Welle. Certain claims from social theories of identity are taken as a point of reference. In terms of methodology, the study draws on pragma-linguistic analysis, which takes into consideration both linguistic features of the text and extra-linguistic factors, such as personalities and their social characteristics as well as pragmatic purposes. As a result, the authors identify three levels of discursive construction of national identity: meaningful, communicative and meta-linguistic. The meaningful and meta-linguistic levels are described through the listing of tactics. The communicative level embraces heterogeneous phenomena and demands further explorations. The range of linguistic resources used to construct national identity is not limited and includes nominative units for nations and ethnicities, geographical names, names of languages, evaluative adjectives with negative and positive connotations, phonetic variants of words, and lexical and syntactic expressions of modality. The presenter’s role in interactive construction of national identity is also defined.

  13. Linguistic identity matching

    CERN Document Server

    Lisbach, Bertrand

    2013-01-01

    Regulation, risk awareness and technological advances are increasingly drawing identity search functionality into business, security and data management processes, as well as fraud investigations and counter-terrorist measures.Over the years, a number of techniques have been developed for searching identity data, traditionally focusing on logical algorithms. These techniques often failed to take into account the complexities of language and culture that provide the rich variations  seen in names used around the world. A new paradigm has now emerged for understanding the way that identity data

  14. Exploring the identity and "sense of identity" of organisations

    Directory of Open Access Journals (Sweden)

    C L Van Tonder

    2006-04-01

    Full Text Available During the past two decades a steady increase in scholarly contributions in the area of organisation identity have been observed – to the point that the phenomenon is now the subject of a sustainable discourse in several disciplines. Many theoretical and conceptual dilemmas however remain, largely as a result of the low incidence of empirical research in the area. This study reports the results of an exploratory investigation that adapted Schley and Wagenfield’s (1979 concept of identity for use in an organisational setting. Interviews were conducted with 152 top managers representing 10 companies. The results indicate that organisational responses to the question “who am I?�? elicit distinctive organisational self-descriptions and some awareness of identity issues.

  15. Professional development and human resources management in networks

    Directory of Open Access Journals (Sweden)

    Evgeniy Rudnev

    2016-05-01

    Full Text Available Social networks occupy more places in development of people and organizations. Confidence in institutions and social networking are different and based on referentiality in Internet. For communication in network persons choose a different strategies and behavior in LinkedIn, resources of whom may be in different degree are interesting in Human Resources Management for organizations. Members of different social groups and cultures demonstrate some differences in interaction with Russian identity native. There are gender differences behavior in networks. Participating in groups need ethical behavior and norms in social networking for professional development and communication in future.

  16. Economical multiparty simultaneous quantum identity authentication based on Greenberger–Horne–Zeilinger states

    International Nuclear Information System (INIS)

    Yu-Guang, Yang; Qiao-Yan, Wen

    2009-01-01

    A multiparty simultaneous quantum identity authentication protocol based on Greenberger–Horne–Zeilinger (GHZ) states is proposed. The multi-user can be authenticated by a trusted third party (TTP) simultaneously. Compared with the scheme proposed recently (Wang et al 2006 Chin. Phys. Lett. 23(9) 2360), the proposed scheme has the advantages of consuming fewer quantum and classical resources and lessening the difficulty and intensity of necessary operations. (general)

  17. Inter-Identity Autobiographical Amnesia in Patients with Dissociative Identity Disorder

    Science.gov (United States)

    Huntjens, Rafaële J. C.; Verschuere, Bruno; McNally, Richard J.

    2012-01-01

    Background A major symptom of Dissociative Identity Disorder (DID; formerly Multiple Personality Disorder) is dissociative amnesia, the inability to recall important personal information. Only two case studies have directly addressed autobiographical memory in DID. Both provided evidence suggestive of dissociative amnesia. The aim of the current study was to objectively assess transfer of autobiographical information between identities in a larger sample of DID patients. Methods Using a concealed information task, we assessed recognition of autobiographical details in an amnesic identity. Eleven DID patients, 27 normal controls, and 23 controls simulating DID participated. Controls and simulators were matched to patients on age, education level, and type of autobiographical memory tested. Findings Although patients subjectively reported amnesia for the autobiographical details included in the task, the results indicated transfer of information between identities. Conclusion The results call for a revision of the DID definition. The amnesia criterion should be modified to emphasize its subjective nature. PMID:22815769

  18. Inter-identity autobiographical amnesia in patients with dissociative identity disorder.

    Directory of Open Access Journals (Sweden)

    Rafaële J C Huntjens

    Full Text Available BACKGROUND: A major symptom of Dissociative Identity Disorder (DID; formerly Multiple Personality Disorder is dissociative amnesia, the inability to recall important personal information. Only two case studies have directly addressed autobiographical memory in DID. Both provided evidence suggestive of dissociative amnesia. The aim of the current study was to objectively assess transfer of autobiographical information between identities in a larger sample of DID patients. METHODS: Using a concealed information task, we assessed recognition of autobiographical details in an amnesic identity. Eleven DID patients, 27 normal controls, and 23 controls simulating DID participated. Controls and simulators were matched to patients on age, education level, and type of autobiographical memory tested. FINDINGS: Although patients subjectively reported amnesia for the autobiographical details included in the task, the results indicated transfer of information between identities. CONCLUSION: The results call for a revision of the DID definition. The amnesia criterion should be modified to emphasize its subjective nature.

  19. Oscillator clustering in a resource distribution chain

    DEFF Research Database (Denmark)

    Postnov, D.; Sosnovtseva, Olga; Mosekilde, Erik

    2005-01-01

    separate the inherent dynamics of the individual oscillator from the properties of the coupling network. Illustrated by examples from microbiological population dynamics, renal physiology, and electronic oscillator theory, we show how competition for primary resources in a resource distribution chain leads...

  20. The Informal Institutions and the Knowledge Sharing: The Mediating Effect of the Social Identity and the Organizational Trust

    Directory of Open Access Journals (Sweden)

    Erendira Fierro Moreno

    2016-06-01

    Full Text Available The aim of this scientific paper is to determine the extent to which social identity and organizational trust mediate the relationship between informal institutions and the exchange of knowledge. Based on a review of literature and relying on the theoretical perspective of new institutionalism and on the resource based-view the research hypotheses were formulated. Using a cross-sectional and with Mexican public sector organizations and through the perceptions of 252 public servants the hypotheses were tested. Multivariate analysis (SEM was performed. The results confirm the importance of informal institutions that legitimize the performance of organizations but do not guarantee its real efficiency. However, research shows that intervening valuable resources management (social identity and organizational trust helps to exploit opportunities and neutralize threats from the environment generating new capabilities: the exchange of knowledge.

  1. XSIM Final Report: Modelling the Past and Future of Identity Management for Scientific Collaborations

    Energy Technology Data Exchange (ETDEWEB)

    Cowles, Robert; Jackson, Craig; Welch, Von

    2016-08-31

    The eXtreme Science Identity Management (XSIM1) research project: collected and analyzed real world data on virtual organization (VO) identity management (IdM) representing the last 15+ years of collaborative DOE science; constructed a descriptive VO IdM model based on that data; used the model and existing trends to project the direction for IdM in the 2020 timeframe; and provided guidance to scientific collaborations and resource providers that are implementing or seeking to improve IdM functionality. XSIM conducted over 20 semi­structured interviews of representatives from scientific collaborations and resource providers, both in the US and Europe; the interviewees supported diverse set of scientific collaborations and disciplines. We developed a definition of “trust,” a key concept in IdM, to understand how varying trust models affect where IdM functions are performed. The model identifies how key IdM data elements are utilized in collaborative scientific workflows, and it has the flexibility to describe past, present and future trust relationships and IdM implementations. During the funding period, we gave more than two dozen presentations to socialize our work, encourage feedback, and improve the model; we also published four refereed papers. Additionally, we developed, presented, and received favorable feedback on three white papers providing practical advice to collaborations and/or resource providers.

  2. Power Electronics

    DEFF Research Database (Denmark)

    Iov, Florin; Ciobotaru, Mihai; Blaabjerg, Frede

    2008-01-01

    is to change the electrical power production sources from the conventional, fossil (and short term) based energy sources to renewable energy resources. The other is to use high efficient power electronics in power generation, power transmission/distribution and end-user application. This paper discuss the most...... emerging renewable energy sources, wind energy, which by means of power electronics are changing from being a minor energy source to be acting as an important power source in the energy system. Power electronics is the enabling technology and the presentation will cover the development in wind turbine...... technology from kW to MW, discuss which power electronic solutions are most feasible and used today....

  3. 7 CFR 52.771 - Identity.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 2 2010-01-01 2010-01-01 false Identity. 52.771 Section 52.771 Agriculture... United States Standards for Grades of Canned Red Tart Pitted Cherries 1 Identity and Grades § 52.771 Identity. Canned red tart pitted cherries is the product represented as defined in the standard of identity...

  4. Identity and the Management Project

    DEFF Research Database (Denmark)

    Jørgensen, Kenneth Mølbjerg; Dehlin, Erlend

    The paper discusses the concept of identity in relation to management. We take our starting point in Wittgenstein’s concept language games. We argue that identity is a question of using linguistic tools to construct reality. Two elements of the language game metaphor are central here: rules...... and family resemblance. As such, managing identity in organizations is closely linked to rules and family resemblance. Organizations manage identity through the definition of norms and values for right or wrong, appropriate or inappropriate, to name but a few. Norms and values are important as reference...... points for constructing identities. Managing identity has become more important because the rules-of-the-game have become more unstable. Managing identity is important if the bonds between individuals and organizations are to be sustained. But this task is contradictory and paradoxical of its very nature...

  5. Identity style and coping strategies.

    Science.gov (United States)

    Berzonsky, M D

    1992-12-01

    This study examined the relationship between identity style and strategies used to cope with stressors that potentially threaten one's sense of identity. Identity style refers to differences in the way individuals construct and revise or maintain their sense of identity. An informational style involves actively seeking out, evaluating, and utilizing self-relevant information. A normative style highlights the expectations and standards of significant others. A diffuse/avoidant style is characterized by procrastination and situation-specific reactions. Late-adolescent college subjects were administered measures of identity style, ways of coping with academic stressors, and test anxiety. Within this self-as-student context, subjects with diffuse and normative identity styles employed avoidant-oriented coping strategies (wishful thinking, distancing, and tension reduction). An informational style was associated with deliberate, problem-focused coping. Findings are discussed in terms of a process model of identity development.

  6. Contextual Treatment of Dissociative Identity Disorder.

    Science.gov (United States)

    Gold, Steven N; Elhai, Jon D; Rea, Bayard D; Weiss, Donna; Masino, Theodore; Morris, Staci Leon; McIninch, Jessica

    2001-01-01

    Evidence for the effectiveness of contextual therapy, a new approach for treating adult survivors of prolonged child abuse (PCA), is provided via case studies of three women with Dissociative Identity Disorder (DID). Contextual therapy is based on the premise that it is not only traumatic experiences that account for PCA survivors' psychological difficulties. Even more fundamentally, many survivors grow up in an interpersonal context in which adequate resources for secure attachment and acquisition of adaptive living skills are not available. As a result, they are left with lasting deficits that undermine not only their current functioning, but also their ability to cope with reliving their traumatic memories in therapy. The primary focus of this treatment approach, therefore, is on developing capacities for feeling and functioning better in the present, rather than on extensive exploration and processing of the client's trauma history or, in the case of DID, of identity fragments. Treatment of the three cases presented ranged from eight months to two and one-half years' duration, and culminated in very positive outcomes. The women's reports of achievements, such as obtaining and maintaining gainful employment, greater self-sufficiency, and the establishment of more intimate and gratifying relationships, indicated marked improvements in daily functioning. Objective test data obtained at admission and discharge, and in one case, at follow-up, documented substantial reductions in dissociative, posttraumatic stress, depressive, and other symptoms.

  7. Perceived consequences of hypothetical identity-inconsistent sexual experiences: effects of perceiver's sex and sexual identity.

    Science.gov (United States)

    Preciado, Mariana A; Johnson, Kerri L

    2014-04-01

    Most people organize their sexual orientation under a single sexual identity label. However, people may have sexual experiences that are inconsistent with their categorical sexual identity label. A man might identify as heterosexual but still experience some attraction to men; a woman might identify as lesbian yet enter into a romantic relationship with a man. Identity-inconsistent experiences are likely to have consequences. In the present study, we examined lay perceptions of the consequences of identity-inconsistent sexual experiences for self-perceived sexuality and for social relationships among a sexually diverse sample (N = 283). We found that the perceived consequences of identity-inconsistent experiences for self-perception, for social stigmatization, and for social relationships varied as a function of participant sex, participant sexual identity (heterosexual, gay, lesbian), and experience type (fantasy, attraction, behavior, love). We conclude that not all identity-inconsistent sexual experiences are perceived as equally consequential and that the perceived consequences of such experiences vary predictably as a function of perceiver sex and sexual identity. We discuss the role lay perceptions of the consequences of identity-inconsistent sexual experiences may play in guiding attitudes and behavior.

  8. The change of expression configuration affects identity-dependent expression aftereffect but not identity-independent expression aftereffect

    Directory of Open Access Journals (Sweden)

    Miao eSong

    2015-12-01

    Full Text Available The present study examined the influence of expression configuration on cross-identity expression aftereffect. The expression configuration refers to the spatial arrangement of facial features in a face for conveying an emotion, e.g., an open-mouth smile versus a closed-mouth smile. In the first of two experiments, the expression aftereffect is measured using across-identity/cross-expression configuration factorial design. The facial identities of test faces were the same or different from the adaptor, while orthogonally, the expression configurations of those facial identities were also the same or different. The result shows that the change of expression configuration impaired the expression aftereffect when the facial identities of adaptor and tests were the same; however, the impairment effect disappears when facial identities were different, indicating the identity-independent expression representation is more robust to the change of the expression configuration in comparison with the identity-dependent expression representation. In the second experiment, we used schematic line faces as adaptors and real faces as tests to minimize the similarity between the adaptor and tests, which is expected to exclude the contribution from the identity-dependent expression representation to expression aftereffect. The second experiment yields a similar result as the identity-independent expression aftereffect observed in Experiment 1. The findings indicate the different neural sensitivities to expression configuration for identity-dependent and identity-independent expression systems.

  9. Metadiscourse and Identity Construction in Teaching Philosophy Statements: A Critical Case Study of Two MATESOL Students

    Science.gov (United States)

    Supasiraprapa, Sarut; De costa, Peter I.

    2017-01-01

    Drawing on Hyland's (2005) metadiscourse framework, the researchers investigated how two English as a second or foreign language instructors constructed their identity in a teaching philosophy statement written for a master's in TESOL (MATESOL) course. Analyses revealed that both instructors employed almost all metadiscourse resources in the model…

  10. Two-particle renormalizations in many-fermion perturbation theory: the importance of the Ward identity

    Czech Academy of Sciences Publication Activity Database

    Janiš, Václav

    2003-01-01

    Roč. 15, - (2003), s. L311-L317 ISSN 0953-8984 R&D Projects: GA ČR GA202/01/0764 Institutional research plan: CEZ:AV0Z1010914 Keywords : Ward identity * electron correlations * conservation laws Subject RIV: BE - Theoretical Physics Impact factor: 1.757, year: 2003

  11. Negotiation of identities in intercultural communication

    Directory of Open Access Journals (Sweden)

    Janík Zdeněk

    2017-01-01

    Full Text Available Negotiation of identities in communication entails affirming the identities we want others to recognize in us and ascription of identities we mutually assign to each other in communication. The study of intercultural communication focuses on cultural identity as the principal identity component that defines intercultural communication. In this article, the assumption that cultural group membership factors determine the context of intercultural communication is questioned. The article examines how intercultural interlocutors negotiate their identities in various intercultural interactions. The aims of the research presented in this paper are: 1 to examine which identities - cultural, personal, or social - intercultural interlocutors activate in intercultural communication; 2 to determine whether interlocutors’ intercultural communication is largely influenced by their cultural identities; 3 and to identify situations in which they activate their cultural identities (3. The research data were collected from 263 international students studying at Masaryk University in Brno in the years 2010 - 2016. Although the research results are not conclusive, they indicate that cultural identities predominate in the students’ ethnocentric views and that stereotypes constrain the students’ cultural identities and affect the negotiation of identities in intercultural communication.

  12. Online Identities and Social Networking

    Science.gov (United States)

    Maheswaran, Muthucumaru; Ali, Bader; Ozguven, Hatice; Lord, Julien

    Online identities play a critical role in the social web that is taking shape on the Internet. Despite many technical proposals for creating and managing online identities, none has received widespread acceptance. Design and implementation of online identities that are socially acceptable on the Internet remains an open problem. This chapter discusses the interplay between online identities and social networking. Online social networks (OSNs) are growing at a rapid pace and has millions of members in them. While the recent trend is to create explicit OSNs such as Facebook and MySpace, we also have implicit OSNs such as interaction graphs created by email and instant messaging services. Explicit OSNs allow users to create profiles and use them to project their identities on the web. There are many interesting identity related issues in the context of social networking including how OSNs help and hinder the definition of online identities.

  13. Introducing sexual orientation and gender identity into the electronic health record: one academic health center's experience.

    Science.gov (United States)

    Callahan, Edward J; Sitkin, Nicole; Ton, Hendry; Eidson-Ton, W Suzanne; Weckstein, Julie; Latimore, Darin

    2015-02-01

    Many U.S. populations experience significant health disparities. Increasing health care providers' awareness of and education about sexual orientation (SO) and gender identity (GI) diversity could help reduce health disparities among lesbian, gay, bisexual, and transgender (LGBT) patients. The authors share the University of California, Davis, Health System's (UCDHS's) experience as it became the first U.S. academic health center to formally introduce patient SO/GI demographic data into its electronic health record (EHR) as a step toward reducing LGBT health disparities. Adding these data to the EHR initially met with resistance. The authors, members of the UCDHS Task Force for Inclusion of SO/GI in the EHR, viewed this resistance as an invitation to educate leaders, providers, and staff about LGBT health disparities and to expose providers to techniques for discussing SO/GI with patients. They describe the strategies they employed to effect institutional culture change, including involvement of senior leadership, key informant interviews, educational outreach via grand rounds and resident workshops, and creation of a patient safety net through inviting providers to self-identify as welcoming LGBT patients. The ongoing cultural change process has inspired spin-off projects contributing to an improved climate for LGBT individuals at UCDHS, including an employee organization supporting SO/GI diversity, support for and among LGBT medical learners through events and listservs, development and implementation of an LGBT health curriculum, and creation of peer navigator programs for LGBT patients with cancer. The authors reflect on lessons learned and on institutional pride in and commitment to providing quality care for LGBT patients.

  14. Personal Identity Online

    DEFF Research Database (Denmark)

    Rodogno, Raffaele

    2012-01-01

    Philosophers concerned with the question of personal identity have typically been asking the so-called re-identification question: what are the conditions under which a person at one point in time is properly re-identified at another point in time? This is a rather technical question. In our...... everyday interactions, however, we do raise a number of personal identity questions that are quite distinct from it. In order to explore the variety of ways in which the Internet may affect personal identity, I propose in this study to broaden the typical philosophical horizon to other more mundane senses...... of the question. In Section 2, I describe a number of possible meanings of personal identity observed in everyday contexts and more philosophical ones. With some caveats, I argue that it is the specific context in which the question arises that disambiguates the meaning of the question. Online contexts are novel...

  15. Researcher Identity in Transition

    DEFF Research Database (Denmark)

    Castelló, Montserrat; Kobayashi, Sofie; McGinn, Michelle K.

    2015-01-01

    to reinterpretation, and ECRs need to attend to new or reimagined signals in their efforts to develop a researcher identity in this current context. In this article, we present a comprehensive framework for researcher identity in relation to the ways ECRs recognise and respond to divergent signals across spheres...... of activity. We illustrate this framework through eight identity stories drawn from our earlier research projects. Each identity story highlights the congruence (or lack of congruence) between signals across spheres of activity and emphasises the different ways ECRs respond to these signals. The proposed...... comprehensive framework allows for the analysis of researcher identity development through the complex and intertwined activities in which ECRs are involved. We advance this approach as a foundation for a sustained research agenda to understand how ECRs identify and respond to relevant signals, and...

  16. Conceptualising the professional identity of industrial or organisational psychologists within the South African context

    Directory of Open Access Journals (Sweden)

    Llewellyn E. van Zyl

    2016-12-01

    Full Text Available Orientation: Lack in congruence amongst industrial and organisational psychologists (IOPs as to the conceptualisation of its profession poses a significant risk as to the relevance, longevity and professional identity of the profession within the South African context. Research purpose: This study aimed to explore the professional identity of IOPs within the South African context. Specifically, the aim of this study was four-fold: (1 to develop a contemporary definition for IOP, (2 to investigate IOP roles, (3 to determine how the profession should be labelled and (4 to differentiate IOP from human resource management (HRM from IOPs’ perspectives within South Africa. Motivation for the study: IOPs do not enjoy the same benefits in stature or status as other professions such as medicine, finances and engineering in the world of work. IOPs need to justify its relevance within organisational contexts as a globally shared understanding of ‘what it is’, ‘what it does’ and ‘what makes it different from other professions’, which is non-existent. In order to enhance its perceived relevance, clarity as to IOPs professional identity is needed. Research design, approach and method: A post-positivistic qualitative content analytic and descriptive research design was employed in this study. Data from practising industrial and organisational psychology (IOP within South Africa (N = 151 were gathered through an electronic web-based survey and were analysed through thematic content analysis. Main findings: The results indicate that IOP in South Africa seeks to optimise the potential of individuals, groups, organisations and the community by implementing scientific processes to support both individual and organisational wellness and sustainability. ‘Work Psychology’ was considered a more fitting professional designation or label than industrial and/or organisational psychology. The industrial psychologist’s major roles related to the well

  17. Electronic Identities: The Strategic Use of Email for Impression Management.

    Science.gov (United States)

    Kersten, Larry; Phillips, Stephen R.

    Traditionally, e-mail (electronic mail) has been seen as an efficient communications medium for the transmission of simple, routine, unambiguous messages. More recent research has argued that the simple, efficient view of e-mail is incomplete. Future research should be extended into the strategic and symbolic functions of email, such as the use of…

  18. Systematic analysis of protein identity between Zika virus and other arthropod-borne viruses.

    Science.gov (United States)

    Chang, Hsiao-Han; Huber, Roland G; Bond, Peter J; Grad, Yonatan H; Camerini, David; Maurer-Stroh, Sebastian; Lipsitch, Marc

    2017-07-01

    To analyse the proportions of protein identity between Zika virus and dengue, Japanese encephalitis, yellow fever, West Nile and chikungunya viruses as well as polymorphism between different Zika virus strains. We used published protein sequences for the Zika virus and obtained protein sequences for the other viruses from the National Center for Biotechnology Information (NCBI) protein database or the NCBI virus variation resource. We used BLASTP to find regions of identity between viruses. We quantified the identity between the Zika virus and each of the other viruses, as well as within-Zika virus polymorphism for all amino acid k -mers across the proteome, with k ranging from 6 to 100. We assessed accessibility of protein fragments by calculating the solvent accessible surface area for the envelope and nonstructural-1 (NS1) proteins. In total, we identified 294 Zika virus protein fragments with both low proportion of identity with other viruses and low levels of polymorphisms among Zika virus strains. The list includes protein fragments from all Zika virus proteins, except NS3. NS4A has the highest number (190 k -mers) of protein fragments on the list. We provide a candidate list of protein fragments that could be used when developing a sensitive and specific serological test to detect previous Zika virus infections.

  19. (Re)scaling identities

    DEFF Research Database (Denmark)

    Koefoed, Lasse Martin; Simonsen, Kirsten

    2012-01-01

    of Pakistani origin, the study employs theoretical ideas of estrangement, identification and recognition in order to obtain a thorough understanding of the complexity and the contradictory character of their spatial identities and affiliations. A turning point in the double processes of estrangement...... of identity....

  20. Identity without Membership?

    DEFF Research Database (Denmark)

    Dobusch, Leonhard; Schoeneborn, Dennis

    the formation of organizational identity in more fluid organizational settings. Drawing on an empirical study of the hacker collective Anonymous, we show that organizational identity is formed through public communicative events that are subject to meaning negotiation whether or not actions can be attributed...

  1. Finding Urban Identity through Culture-led Urban Regeneration

    Directory of Open Access Journals (Sweden)

    Kyu Hong Hwang

    , understanding the reasons for decline and local characteristics; Phase 3, making a database and establishing a direction; Phase 4, applying various techniques suitable for Phase 3; and Phase 5, monitoring and feedback. KEYWORDS: Urban Regeneration, culture-led, historic and cultural resources, urban identity

  2. Identity uncertainty and commitment making across adolescence : Five-year within-person associations using daily identity reports

    NARCIS (Netherlands)

    Becht, Andrik I.; Nelemans, Stefanie A.; Branje, Susan J. T.; Vollebergh, Wilma A. M.; Koot, Hans M.; Meeus, W.H.J.

    2017-01-01

    A central assumption of identity theory is that adolescents reconsider current identity commitments and explore identity alternatives before they make new commitments in various identity domains (Erikson, 1968; Marcia, 1966). Yet, little empirical evidence is available on how commitment and

  3. Sexual Orientation and Gender Identity Data Collection in Clinical Settings and in Electronic Health Records: A Key to Ending LGBT Health Disparities.

    Science.gov (United States)

    Cahill, Sean; Makadon, Harvey

    2014-03-01

    The Institute of Medicine's (IOM's) 2011 report on the health of LGBT people pointed out that there are limited health data on these populations and that we need more research. It also described what we do know about LGBT health disparities, including lower rates of cervical cancer screening among lesbians, and mental health issues related to minority stress. Patient disclosure of LGBT identity enables provider-patient conversations about risk factors and can help us reduce and better understand disparities. It is essential to the success of Healthy People 2020's goal of eliminating LGBT health disparities. This is why the IOM's report recommended data collection in clinical settings and on electronic health records (EHRs). The Center for Medicare and Medicaid Services and the Office of the National Coordinator of Health Information Technology rejected including sexual orientation and gender identity (SOGI) questions in meaningful use guidelines for EHRs in 2012 but are considering this issue again in 2013. There is overwhelming community support for the routine collection of SOGI data in clinical settings, as evidenced by comments jointly submitted by 145 leading LGBT and HIV/AIDS organizations in January 2013. Gathering SOGI data in EHRs is supported by the 2011 IOM's report on LGBT health, Healthy People 2020, the Affordable Care Act, and the Joint Commission. Data collection has long been central to the quality assurance process. Preventive health care from providers knowledgeable of their patients' SOGI can lead to improved access, quality of care, and outcomes. Medical and nursing schools should expand their attention to LGBT health issues so that all clinicians can appropriately care for LGBT patients.

  4. Perceptions of Biometric Experts on Whether or Not Biometric Modalities Will Combat Identity Fraud

    Science.gov (United States)

    Edo, Galaxy Samson

    2012-01-01

    Electronic-authentication methods, no matter how sophisticated they are in preventing fraud, must be able to identify people to a reasonable degree of certainty before any credentials are assured (Personix, 2006). User authentication is different from identity verification, and both are separate but vital steps in the process of securing…

  5. Identity as wrapping up

    DEFF Research Database (Denmark)

    Nickelsen, Niels Christian Mossfeldt

    2015-01-01

    The aim of this paper is to provide an understanding of cross-professional collaboration and to develop a notion of professional identity based in practice. The background of the paper is science and technology studies and more precisely actor network theory. The method used: The empirical analysis...... in close relation to the making of a report concerning the cross-professional collaboration. Findings are that “Identity as wrapping up” points to the way in which certain actors, by other actors, are maneuvered into certain pockets in a network. Identity as wrapping up is emphasized as a way...... of participating, which is closely connected to the intention to control the relation towards the other. Thus identity as wrapping up is argued to be a strategy to optimize the situation of one’s own profession. Conclusion: This articulation of identity contributes to the actor network literature as well...

  6. Visual identity and rebranding

    Directory of Open Access Journals (Sweden)

    Katarzyna Wrona

    2015-06-01

    Full Text Available The goal of this article is to highlight the essence of visual identification and rebranding, as well as to discuss elements of corporate identity, which are subject to revitalization in the process of refreshing the image of a brand. In the first part the article the analysis of the term visual identification is conducted. In the analysis special attention is drawn to the role of visual identification in creating a coherent identity of an organization. In the subsequent chapters further components of corporate identity are presented in detail – starting with logotype, through business forms, advertisements, accompanying materials and Internet websites to signs on buildings. Moreover, corporate identity book as a collection of standards and guidelines for application of corporate identity rules is discussed. The deliberations are based on the study of literature. The last chapter presented the transformation of the brand of Institute of Aviation.

  7. Children's Social Identities

    Science.gov (United States)

    Bennett, Mark

    2011-01-01

    This paper provides a brief overview of recent developmental research on themes related to children's social identities. Initially, consideration is given to the capacity for social categorization, following which attention is given to children's developing conceptions of social identities, their identification with social groups, and the…

  8. Electron-phonon coupling in one dimension

    International Nuclear Information System (INIS)

    Apostol, M.; Baldea, I.

    1981-08-01

    The Ward identity is derived for the electron-phonon coupling in one dimension and the spectrum of elementary excitations is calculated by assuming that the Fermi distribution is not strongly distorted by interaction. The electron-phonon vertex is renormalized in the case of the forward scattering and Migdal's theorem is discussed. A model is proposed for the giant Kohn anomaly. The dip in the phonon spectrum is obtained and found to be in agreement with the experimental data for KCP. (author)

  9. Street furniture concept in Pasar Buah and Bukit Gundaling Based on place identity

    Science.gov (United States)

    Ginting, Nurlisa; Vinky Rahman, N.; Delianur Nasution, Achmad; Nawawiy Loebis, M.; Sinaga, Fitri A.

    2018-03-01

    Tourism is one of the largest sources of the foreign exchange for a country, that encourage many developers to develop it. Karo District located in the province of North Sumatera, Indonesia, which has many tourist destinations with natural and cultural resources, including Pasar Buah and Bukit Gundaling. To develop Tourism, one of way is with increasing place identity in tourist destinations. Unfortunately, place identity in Pasar Buah and Bukit Gundaling are still lacking, so it needs improvement, one of that is the Street furniture in Pasar Buah and Bukit Gundaling. This study aims to design the concept of the Street furniture planning in Pasar Buah and Bukit Gundaling. The method used is a qualitative method, that is design street furniture using five groups elements of street furniture: decorative element, service furniture, trade furniture, signaling furniture, and advertisement furniture. The result of this study is the concept of the design street furniture of Pasar Buah and Bukit Gundaling, which can use to improve place identity in tourism of Karo District.

  10. When moral identity symbolization motivates prosocial behavior: the role of recognition and moral identity internalization.

    Science.gov (United States)

    Winterich, Karen Page; Aquino, Karl; Mittal, Vikas; Swartz, Richard

    2013-09-01

    This article examines the role of moral identity symbolization in motivating prosocial behaviors. We propose a 3-way interaction of moral identity symbolization, internalization, and recognition to predict prosocial behavior. When moral identity internalization is low, we hypothesize that high moral identity symbolization motivates recognized prosocial behavior due to the opportunity to present one's moral characteristics to others. In contrast, when moral identity internalization is high, prosocial behavior is motivated irrespective of the level of symbolization and recognition. Two studies provide support for this pattern examining volunteering of time. Our results provide a framework for predicting prosocial behavior by combining the 2 dimensions of moral identity with the situational factor of recognition. PsycINFO Database Record (c) 2013 APA, all rights reserved

  11. The Identity Crisis. Security, Privacy and Usability Issues in Identity Management

    NARCIS (Netherlands)

    Alpár, G.; Hoepman, J.H.; Siljee, B.I.J.

    2011-01-01

    This paper studies the current "identity crisis" caused by the substantial security, privacy and usability shortcomings encountered in existing systems for identity management. Some of these issues are well known, while others are much less understood. This paper brings them together in a single,

  12. Electronic conferencing for continuing medical education: a resource survey.

    Science.gov (United States)

    Sternberg, R J

    1986-10-01

    The use of electronic technologies to link participants for education conferences is an option for providers of Continuing Medical Education. In order to profile the kinds of electronic networks currently offering audio- or videoteleconferences for physician audiences, a survey was done during late 1985. The information collected included range of services, fees, and geographic areas served. The results show a broad diversity of providers providing both interactive and didactic programming to both physicians and other health care professionals.

  13. Gifted Gay, Lesbian, Bisexual, and Transgender Annotated Bibliography: A Resource for Educators of Gifted Secondary GLBT Students

    Science.gov (United States)

    Treat, Alena R.; Whittenburg, Becky

    2006-01-01

    This bibliography makes available to educators and others a comprehensive resource for information regarding gifted youth who are gay, lesbian, bisexual, transgender or questioning their sexual orientation and/or gender identity (G/GLBTQ). It includes articles, brochures, books, lesson plans, staff development, video media, and Web resources. As…

  14. Reciprocal Associations between Educational Identity and Vocational Identity in Adolescence: A Three-wave Longitudinal Investigation.

    Science.gov (United States)

    Negru-Subtirica, Oana; Pop, Eleonora Ioana

    2018-04-01

    Education and vocation are core identity domains in adolescence. School is a normative social context in this developmental time frame and the formation of an educational identity is embedded in the goals that youth pursue in school. One of the main goals of education is to prepare young people for their future careers. Hence, educational identity should support the formation of vocational identity during adolescence. Considering the limited evidence on the longitudinal links between these two domain-specific identities, we conducted a three-wave investigation, testing the moderating role of age group, gender, and type of school. Participants (N = 1030; 59.3% female) were adolescents (M age  = 16.72 years, SD age  = 1.23, age range 14-19 years) who completed self-report measures of educational and vocational identity three times during an academic year. We underscored reciprocal associations between educational identity and vocational identity. The results indicate that strong educational commitments supported the formation of strong vocational commitments across time. Adolescents who were involved in the in-depth exploration of their educational choices also reported more vocational exploration during the school year. In turn, vocational identity processes also supported educational identity formation, especially the reconsideration of educational commitments. In terms of moderators, we underscored that vocational commitment making and vocational flexibility bolstered educational commitment only in early-to-middle adolescents. Educational in-depth exploration fostered the identification with vocational commitments only in girls. Educational reconsideration of commitment promoted vocational self-doubt only in adolescents attending work-bound high-schools. Implications for research and practice are discussed.

  15. Ego identity formation in middle adolescence.

    Science.gov (United States)

    Lavoie, J C

    1976-12-01

    Assumed determinants of ego identity were investigated in this study using sophomore, junior, and senior high school males and females. Subjects were administered the Marcia Ego Identity Status Scale and measures of sex-role identification, personality development, psychological functioning, self-concept, and parental socialization practices. Data analyses, using a median split on identity score, showed that high-identity adolescents obtained more positive scores on sex-role identification, personality development, psychological adjustment, and self-concept than low-identity adolescents. Socialization practices also differed for the two groups. The sex differences which emerged were congruent with the identity literature. Overall, the data supported Erikson's theory of ego identity development.

  16. Professional entrepreneurial identity construction

    DEFF Research Database (Denmark)

    Ramsgaard, Michael Breum

    The present study investigates the construction of a professional identity as an entrepreneur in a sample of people with educational background in nutrition and health. The study examines the connection between professional identity construction and entrepreneurial business emergence using...... ‘entrepreneurial preparedness’ as parameter. This research seeks to address the following questions: What significant components or characteristics do entrepreneurs rely on in the early processes of constructing an entrepreneurial identity....

  17. Identities-in-action

    DEFF Research Database (Denmark)

    Stentoft, Diana; Valero, Paola

    2009-01-01

    The notion of identity is often used in mathematics education research in an attempt to link individual and social understandings of mathematical learning. In this paper we review existing research making use of the notion of identity, and we point to some of the strengths and weaknesses in the w...

  18. Balancing Fairness and Efficiency: The Impact of Identity-Blind and Identity-Conscious Accountability on Applicant Screening

    Science.gov (United States)

    Self, William T.; Mitchell, Gregory; Mellers, Barbara A.; Tetlock, Philip E.; Hildreth, J. Angus D.

    2015-01-01

    This study compared two forms of accountability that can be used to promote diversity and fairness in personnel selections: identity-conscious accountability (holding decision makers accountable for which groups are selected) versus identity-blind accountability (holding decision makers accountable for making fair selections). In a simulated application screening process, undergraduate participants (majority female) sorted applicants under conditions of identity-conscious accountability, identity-blind accountability, or no accountability for an applicant pool in which white males either did or did not have a human capital advantage. Under identity-conscious accountability, participants exhibited pro-female and pro-minority bias, particularly in the white-male-advantage applicant pool. Under identity-blind accountability, participants exhibited no biases and candidate qualifications dominated interview recommendations. Participants exhibited greater resentment toward management under identity-conscious accountability. PMID:26660723

  19. Gender identity development in adolescence.

    Science.gov (United States)

    Steensma, Thomas D; Kreukels, Baudewijntje P C; de Vries, Annelou L C; Cohen-Kettenis, Peggy T

    2013-07-01

    This article is part of a Special Issue "Puberty and Adolescence".This article aims to provide an outline of what is currently known on trajectories, and contributing factors to gender identity development in adolescence. We give a historical overview of the concept of gender identity, and describe general identity development in adolescence, gender identity development in the general population and in gender variant youth. Possible psychosocial (such as child and parental characteristics) and biological factors (such as the effects of prenatal exposure to gonadal hormones and the role of genetics) contributing to a gender variant identity are discussed. Studies focusing on a number of psychosocial and biological factors separately, indicate that each of these factors influence gender identity formation, but little is known about the complex interplay between the factors, nor about the way individuals themselves contribute to the process. Research into normative and gender variant identity development of adolescents is clearly lagging behind. However, studies on persons with gender dysphoria and disorders of sex development, show that the period of adolescence, with its changing social environment and the onset of physical puberty, seems to be crucial for the development of a non-normative gender identity. Copyright © 2013 Elsevier Inc. All rights reserved.

  20. Barriers and facilitators to Electronic Medical Record (EMR) use in an urban slum.

    Science.gov (United States)

    Jawhari, Badeia; Keenan, Louanne; Zakus, David; Ludwick, Dave; Isaac, Abraam; Saleh, Abdullah; Hayward, Robert

    2016-10-01

    Rapid urbanization has led to the growth of urban slums and increased healthcare burdens for vulnerable populations. Electronic Medical Records (EMRs) have the potential to improve continuity of care for slum residents, but their implementation is complicated by technical and non-technical limitations. This study sought practical insights about facilitators and barriers to EMR implementation in urban slum environments. Descriptive qualitative method was used to explore staff perceptions about a recent open-source EMR deployment in two primary care clinics in Kibera, Nairobi. Participants were interviewed using open-ended, semi-structured questions. Content analysis was used when exploring transcribed data. Three major themes - systems, software, and social considerations - emerged from content analysis, with sustainability concerns prevailing. Although participants reported many systems (e.g., power, network, Internet, hardware, interoperability) and software (e.g., data integrity, confidentiality, function) challenges, social factors (e.g., identity management, training, use incentives) appeared the most important impediments to sustainability. These findings are consistent with what others have reported, especially the importance of practical barriers to EMR deployments in resource-constrained settings. Other findings contribute unique insights about social determinants of EMR impact in slum settings, including the challenge of multiple-identity management and development of meaningful incentives to staff compliance. This study exposes front-line experiences with opportunities and shortcomings of EMR implementations in urban slum primary care clinics. Although the promise is great, there are a number of unique system, software and social challenges that EMR advocates should address before expecting sustainable EMR use in resource-constrained settings. Copyright © 2016 The Authors. Published by Elsevier Ireland Ltd.. All rights reserved.

  1. Flexible resources and adaptable human beings – the identity of temporary agency workers

    DEFF Research Database (Denmark)

    Winkler, Ingo; Khalil Mahmood, Mustafa

    2018-01-01

    consequences for their performance but also for their whole life. Furthermore, the constitution of agency workers as flexible resource has consequences for HRM in the user-firm. Originality/value The paper contributes to the limited amount of knowledge about the meanings that TAWs reflexively attach...

  2. Social Identity and Group Contests

    OpenAIRE

    Zaunbrecher, Henrik; Riedl, Arno

    2016-01-01

    Social identity has been shown to successfully enhance cooperation and effort in cooperation and coordination games. Little is known about the causal effect of social identity on the propensity to engage in group conflict. In this paper we explore theoretically and experimentally whether social identity increases investments in group contests. We show theoretically that increased social identity with the own group implies higher investments in Tullock contests. Empirically we find that induce...

  3. Social identity process within organizations

    OpenAIRE

    Bazarov, Takhir; Kuzmina, Maria

    2005-01-01

    Expanding and complex social realities cause new types of identity. Variety in organizations and workgroups (where people are involved), implies a special kind of social identity which can be defined as professional, organizational or managerial. The study of the social identity processes in organizations is a new interdisciplinary sphere that is presented especially commonly in European Social Psychology. The result of its theoretical comprehension is Social Identity Theory. In the article l...

  4. Characteristics of Place Identity as Part of Professional Identity Development among Pre-Service Teachers

    Science.gov (United States)

    Gross, Michal; Hochberg, Nurit

    2016-01-01

    How do pre-service teachers perceive place identity, and is there a connection between their formative place identity and the development of their professional teaching identity? These questions are probed among pre-service teachers who participated in a course titled "Integrating Nature into Preschool." The design of the course was…

  5. Critical Look at Physics Identity: An Operationalized Framework for Examining Race and Physics Identity

    Science.gov (United States)

    Hyater-Adams, Simone; Fracchiolla, Claudia; Finkelstein, Noah; Hinko, Kathleen

    2018-01-01

    Studies on physics identity are appearing more frequently and often responding to increased awareness of the underrepresentation of students of color in physics. In our broader research, we focus our efforts on understanding how racial identity and physics identity are negotiated throughout the experiences of Black physicists. In this paper, we…

  6. A Cross-Cultural Approach to the Negotiation of Individual and Group Identities: Parliamentary Debates and Editorial Meetings

    Science.gov (United States)

    Stewart, Miranda

    2012-01-01

    This article draws on interactional pragmatics and a cross-cultural approach (UK, France, Spain) to investigate the negotiation of individual and group identities in two different speech events, parliamentary debates and editorial meetings. The cross-cultural examination of the use of linguistic resources for signalling "social role,…

  7. Toward a general theory of conical intersections in systems of identical nuclei

    Science.gov (United States)

    Keating, Sean P.; Mead, C. Alden

    1987-02-01

    It has been shown previously that the Herzberg-Longuet-Higgins sign change produced in Born-Oppenheimer electronic wave functions when the nuclei traverse a closed path around a conical intersection has implications for the symmetry of wave functions under permutations of identical nuclei. For systems of three or four identical nuclei, there are special features present which have facilitated the detailed analysis. The present paper reports progress toward a general theory for systems of n nuclei. For n=3 or 4, the two key functions which locate conical intersections and define compensating phase factors can conveniently be defined so as to transform under permutations according to a two-dimensional irreducible representation of the permutation group. Since such representations do not exist for n>4, we have chosen to develop a formalism in terms of lab-fixed electronic basis functions, and we show how to define the two key functions in principle. The functions so defined both turn out to be totally symmetric under permutations. We show how they can be used to define compensating phase factors so that all modified electronic wave functions are either totally symmetric or totally antisymmetric under permutations. A detailed analysis is made to cyclic permutations in the neighborhood of Dnh symmetry, which can be extended by continuity arguments to more general configurations, and criteria are obtained for sign changes. There is a qualitative discussion of the treatment of more general permutations.

  8. Predicting Chinese human resource managers' strategic competence : roles of identity, career variety, organizational support and career adaptability.

    OpenAIRE

    Guan, Y.; Yang, W.; Zhou, X.; Tian, Z.; Eves, A.

    2016-01-01

    Based on career construction theory, the predictors of human resource managers' strategic competence in the Chinese context were examined. Results from a survey administered to Chinese HR managers (N = 220) showed that professional identification, career variety and organizational support for strategic human resource management positively predicted Chinese human resource managers' strategic competence. In addition, career adaptability served as a significant mediator for the above relations. ...

  9. Religiosity as identity: toward an understanding of religion from a social identity perspective.

    Science.gov (United States)

    Ysseldyk, Renate; Matheson, Kimberly; Anisman, Hymie

    2010-02-01

    As a social identity anchored in a system of guiding beliefs and symbols, religion ought to serve a uniquely powerful function in shaping psychological and social processes. Religious identification offers a distinctive "sacred" worldview and "eternal" group membership, unmatched by identification with other social groups. Thus, religiosity might be explained, at least partially, by the marked cognitive and emotional value that religious group membership provides. The uniqueness of a positive social group, grounded in a belief system that offers epistemological and ontological certainty, lends religious identity a twofold advantage for the promotion of well-being. However, that uniqueness may have equally negative impacts when religious identity itself is threatened through intergroup conflict. Such consequences are illustrated by an examination of identities ranging from religious fundamentalism to atheism. Consideration of religion's dual function as a social identity and a belief system may facilitate greater understanding of the variability in its importance across individuals and groups.

  10. Resonant Auger electron-photoion coincidence study of the fragmentation dynamics of an acrylonitrile molecule

    Energy Technology Data Exchange (ETDEWEB)

    Kooser, K; Ha, D T; Granroth, S; Itaelae, E; Nommiste, E; Kukk, E [Department of Physics, University of Turku, FIN-20014 Turku (Finland); Partanen, L; Aksela, H, E-mail: kunkoo@utu.f [Department of Physics, University of Oulu, Box 3000, FIN-90014 Oulu (Finland)

    2010-12-14

    Monochromatic synchrotron radiation was used to promote K-shell electrons of nitrogen and carbon from the cyano group (C {identical_to} N) of gaseous acrylonitrile (C{sub 2}H{sub 3}-CN) to the unoccupied antibonding {pi}*{sub C} {sub {identical_to} N} orbital. Photofragmentation of acrylonitrile molecules following selective resonant core excitations of carbon and nitrogen core electrons to the {pi}*{sub C} {sub {identical_to} N} orbital was investigated using the electron-energy-resolved photoelecton-photoion coincidence technique. The fragment ion mass spectra were recorded in coincidence with the resonant Auger electrons, emitted in the decay process of the core-excited states. Singly and triply deuterated samples were used for fragment identification. The results showed the initial core-hole localization to be of minor importance in determining the dissociation pattern of the molecular cation. The participator and spectator Auger transitions produce entirely different fragmentation patterns and the latter indicates that complex nuclear rearrangements take place. It is suggested that the calculated kinetic energy releases are caused by the existence of metastable states, which appear with the opening of the spectator Auger channels.

  11. Utilization of bio-resources by low energy electron beam

    International Nuclear Information System (INIS)

    Kume, Tamikazu

    2003-01-01

    Utilization of bio-resources by radiation has been investigated for recycling the natural resources and reducing the environmental pollution. Polysaccharides such as chitosan and sodium alginate were easily degraded by irradiation and induced various kinds of biological activities, i.g. anti-microbial activity, promotion of plant growth, suppression of heavy metal stress, phytoalexins induction. Radiation degraded chitosan was effective to enhance the growth of plants in tissue culture. It was demonstrated that the liquid sample irradiation system using low energy EB was effective for the preparation of degraded polysaccharides. Methylcellulose (MC) can be crosslinked under certain radiation condition as same as carboxymethylcellulose (CMC) and produced the biodegradable hydrogel for medical and agricultural use. Treatment of soybean seeds by low energy EB enhanced the growth and the number of rhizobia on the root. (author)

  12. John locke on personal identity.

    Science.gov (United States)

    Nimbalkar, Namita

    2011-01-01

    John Locke speaks of personal identity and survival of consciousness after death. A criterion of personal identity through time is given. Such a criterion specifies, insofar as that is possible, the necessary and sufficient conditions for the survival of persons. John Locke holds that personal identity is a matter of psychological continuity. He considered personal identity (or the self) to be founded on consciousness (viz. memory), and not on the substance of either the soul or the body.

  13. John Locke on Personal Identity**

    OpenAIRE

    Nimbalkar, Namita

    2011-01-01

    John Locke speaks of personal identity and survival of consciousness after death. A criterion of personal identity through time is given. Such a criterion specifies, insofar as that is possible, the necessary and sufficient conditions for the survival of persons. John Locke holds that personal identity is a matter of psychological continuity. He considered personal identity (or the self) to be founded on consciousness (viz. memory), and not on the substance of either the soul or the body.

  14. The theory of planned behaviour: self-identity, social identity and group norms.

    Science.gov (United States)

    Terry, D J; Hogg, M A; White, K M

    1999-09-01

    The aim of the present study was to examine further the role that self-identity plays in the theory of planned behaviour and, more specifically, to: (1) examine the combined effects of self-identity and social identity constructs on intention and behaviour, and (2) examine the effects of self-identity as a function of past experience of performing the behaviour. The study was concerned with the prediction of intention to engage in household recycling and reported recycling behaviour. A sample of 143 community residents participated in the study. It was prospective in design: measures of the predictors and intention were obtained at the first wave of data collection, whereas behaviour was assessed two weeks later. Self-identity significantly predicted behavioural intention, a relationship that was not dependent on the extent to which the behaviour had been performed in the past. As expected, there was also evidence that the perceived norm of a behaviourally relevant reference group was related to behavioural intention, but only for participants who identified strongly with the group, whereas the relationship between perceived behavioural control (a personal factor) and intention was strongest for low identifiers.

  15. Relations of Work Identity, Family Identity, Situational Demands, and Sex with Employee Work Hours

    Science.gov (United States)

    Greenhaus, Jeffrey H.; Peng, Ann C.; Allen, Tammy D.

    2012-01-01

    This study examined relations of multiple indicators of work identity and family identity with the number of weekly hours worked by 193 married business professionals. We found that men generally worked long hours regardless of the situational demands to work long hours and the strength of their work and family identities. Women's work hours, on…

  16. When dual identity becomes a liability: identity and political radicalism among migrants.

    Science.gov (United States)

    Simon, Bernd; Reichert, Frank; Grabow, Olga

    2013-03-01

    This article examines the role of dual identity in political radicalism among migrants. Dual identity is defined as identification with both one's ethnocultural minority in-group and one's society of residence. We employed a longitudinal research design using members of the two largest migrant groups in Germany (Turkish migrants and Russian migrants) as participants. We reasoned that when dual identity is burdened with incompatibility between component identifications, it may foster controversial or even destructive forms of political mobilization, such as radicalism. Multiple regression analysis controlling for other influences confirmed the hypothesized moderated relationship between dual identification and sympathy for radical action. When accompanied by high, as opposed to low, perceived identity incompatibility, dual identification predicted increases in sympathy for radical action among both Turkish migrants and Russian migrants. The implications for public life in ethnically and culturally heterogeneous societies are discussed.

  17. Co-creating Stakeholder and Brand Identities

    DEFF Research Database (Denmark)

    von Wallpach, Sylvia; Voyer, Benjamin; Kastanakis, Minas

    2017-01-01

    This article introduces the special section on reciprocal co-creation of stakeholder and brand identities. Branding research and practice traditionally focus on the managerial creation and implementation of brand identity. Based on recent paradigmatic shifts from managerial to co-creative branding...... and from consumer to multi-stakeholder approaches in marketing, this special section develops a dynamic, process-oriented perspective on brand identity. Brand identity continuously emerges as a dynamic outcome of social processes of stakeholder interaction. Reciprocally, brand identity plays a potentially...... important role in ongoing interactive identity development processes of stakeholders. The special section contributes to deepening the understanding of this reciprocal co-creation of stakeholder and brand identities, through a series of conceptual and empirical articles. The Introduction reviews four...

  18. Adaptation of mathematical educational content in e-learning resources

    Directory of Open Access Journals (Sweden)

    Yuliya V. Vainshtein

    2017-01-01

    Full Text Available Modern trends in the world electronic educational system development determine the necessity of adaptive learning intellectual environments and resources’ development and implementation. An upcoming trend in improvement the quality of studying mathematical disciplines is the development and application of adaptive electronic educational resources. However, the development and application experience of adaptive technologies in higher education is currently extremely limited and does not imply the usage flexibility. Adaptive educational resources in the electronic environment are electronic educational resources that provide the student with a personal educational space, filled with educational content that “adapts” to the individual characteristics of the students and provides them with the necessary information.This article focuses on the mathematical educational content adaptation algorithms development and their implementation in the e-learning system. The peculiarity of the proposed algorithms is the possibility of their application and distribution for adaptive e-learning resources construction. The novelty of the proposed approach is the three-step content organization of the adaptive algorithms for the educational content: “introductory adaptation of content”, “the current adaptation of content”, “estimative and a corrective adaptation”. For each stage of the proposed system, mathematical algorithms for educational content adaptation in adaptive e-learning resources are presented.Due to the high level of abstraction and complexity perception of mathematical disciplines, educational content is represented in the various editions of presentation that correspond to the levels of assimilation of the course material. Adaptation consists in the selection of the optimal edition of the material that best matches the individual characteristics of the student. The introduction of a three-step content organization of the adaptive

  19. Reconceptualising "Identity Slippage": Additional Language Learning and (L2) Identity Development

    Science.gov (United States)

    Armour, William

    2009-01-01

    This paper reconsiders the theoretical concept of "identity slippage" by considering a detailed exegesis of three model conversations taught to learners of Japanese as an additional language. To inform my analysis of these conversations and how they contribute to identity slippage, I have used the work of the systemic-functional linguist Jay Lemke…

  20. An 'open source' networked identity

    DEFF Research Database (Denmark)

    Larsen, Malene Charlotte

    2013-01-01

    This paper examines the concept of identity in relation to youth practices on social network sites (SNS). The paper illustrates how writing “I love you” or other emotional statements on each other’s profiles on SNS is not only a common way for Danish teenagers to communicate and practice friendship...... communicative actions – are not only performing their own identity, but are becoming co-constructors of each other's identities, which the author characterizes as an 'open source' networked identity....

  1. Human Rights and the Excess of Identity

    Science.gov (United States)

    Al Tamimi, Yussef

    2017-01-01

    Identity is a central theme in contemporary politics, but legal academia lacks a rigorous analysis of this concept. The aim of this article is twofold: (i) firstly, it aims to reveal presumptions on identity in human rights law by mapping how the European Court of Human Rights approaches identity and (ii) secondly, it seeks to analyse these presumptions using theoretical insights on identity. By merging legal and theoretical analysis, this article contributes a reading of the Court’s case law which suggests that the tension between the political and apolitical is visible as a common thread in the Court’s use of identity. In case law concerning paternity, the Court appears to hold a specific view of what is presented as an unquestionable part of identity. This ostensibly pre-political notion of identity becomes untenable in cases where the nature of an identity feature, such as the headscarf, is contended or a minority has adopted a national identity that conflicts with the majoritarian national identity. The Court’s approach to identity in such cases reflects a paradox that is inherent to identity; identity is personal while simultaneously constituted and shaped by overarching power mechanisms. PMID:29881144

  2. Inter-identity autobiographical amnesia in patients with dissociative identity disorder

    OpenAIRE

    Huntjens, Rafaele JC; Verschuere, Bruno; McNally, Richard J

    2012-01-01

    Background: A major symptom of Dissociative Identity Disorder (DID; formerly Multiple Personality Disorder) is dissociative amnesia, the inability to recall important personal information. Only two case studies have directly addressed autobiographical memory in DID. Both provided evidence suggestive of dissociative amnesia. The aim of the current study was to objectively assess transfer of autobiographical information between identities in a larger sample of DID patients. Methods: Using a c...

  3. Internet and Electronic Information Management

    Science.gov (United States)

    2004-12-01

    centers to form consortia and share electronic information sources. Although traditional resource sharing arrangements encouraged competition rather...outside world, through public relations and through marketing information products or services, to its own competitive advantage (Davenport 1997: 193-217... electronic information sources are a challenge for electronic information managers. Libraries and information centers are no longer “the only game in town

  4. Oppositional Identities: Dissimilarities in How Women and Men Experience Parent versus Professional Roles

    Science.gov (United States)

    Park, Bernadette

    2013-01-01

    As stereotypes of social groups undergo change, group members gain access to previously denied social and cultural roles. Although such access is desirable, to the extent that the behavior, traits, and attitudes required to succeed in a new role are in opposition to those required to do well in a still-valued old role, conflict in the self-concept may ensue. Specifically, the individual must necessarily fall short in social comparisons of the self to the ideal group member in one or both roles, threatening self-integrity. Examining the specific case of oppositional identities between career and mom roles, we argue that women respond to this conflict by shifting back and forth between activation of whichever identity is relevant in a given situational context in a way that men do not. This shifting of self-associations is hypothesized to deplete scarce cognitive resources, interfering with performance on a task that requires executive function capacity. In addition, to the extent the identities are viewed as trading off against one another, failure in one domain may be responded to by activating the alternate identity in an effort to restore self-integrity, again in a way that is not true for men. These hypotheses are explored across four studies, utilizing both college students in the midst of formulating – and working parents in the midst of negotiating – these PMID:23713699

  5. Queering Black Racial Identity Development

    Science.gov (United States)

    Johnson, Alandis A.; Quaye, Stephen John

    2017-01-01

    We used queer theory to encourage readers to think differently about previous theories about Black racial identity development. Queer theory facilitates new and deeper understandings of how Black people develop their racial identities, prompting more fluidity and nuance. Specifically, we present a queered model of Black racial identity development…

  6. Understanding Identity and Organizations

    DEFF Research Database (Denmark)

    Christensen, Lars Thøger

    2013-01-01

    The article reviews the book "Understanding Identity and Organizations," by Kate Kenny, Andrea Whitle, and Hugh Wilmott.......The article reviews the book "Understanding Identity and Organizations," by Kate Kenny, Andrea Whitle, and Hugh Wilmott....

  7. Researching Identity and Interculturality

    DEFF Research Database (Denmark)

    Lønsmann, Dorte

    2016-01-01

    Review of: Researching Identity and Interculturality / by F. Dervin and K. Risager (eds.). Routledge 2015, 245 pp.......Review of: Researching Identity and Interculturality / by F. Dervin and K. Risager (eds.). Routledge 2015, 245 pp....

  8. Researcher Identities in Transition

    DEFF Research Database (Denmark)

    Castelló, Montserrat; Wisker, Gina; Kobayashi, Sofie

    as other emergent ‘signals’, the latent or clear indications from institutions and academic communities regarding career directions and necessary professional skills and attitudes should be identified and interpreted for researchers to adequately develop their new identities. The aim of this paper......Researchers are now embarked upon what we define as a ‘risk career’, rather than, as previously, a relatively more predictable academic career. In this changing context, traditional milestones that enabled early career researchers to build their identities are disappearing. Instead, what we define...... is twofold: a) to present a comprehensive framework of the notion of researcher identity by means of analysing those spheres of activity related to researcher and career development; and b) to relate researcher identities to the experiences of early career researchers with issues concerning signals...

  9. Rights of Identity

    Directory of Open Access Journals (Sweden)

    Daniel Kofman

    2017-01-01

    Full Text Available A person’s identity is their sense of who and what they are, of who stands in significant relations to them, and of what is valuable to them. This is inevitably very broad, an immediate implication of which is that the concept of identity taken alone cannot do significant normative work. In some cases a person’s identity is bound up with the evil that they do or wish to do, and cannot thereby give them any right to do it. In other cases very powerful elements of a person’s identity – such as their attachment to loved ones – is certainly related to important rights, but it is not entirely clear that one needs the concept of identity to explicate or justify these rights; the deep involvement of their identity is arguably a byproduct of other important values in these cases (such as love, and those values can do the grounding work of the rights by themselves and more simply and clearly. Nevertheless, when suitably qualified, a person’s identity is central to accounting for important political rights. These ranges from rights to participate in cultural practices of one’s group, which sometimes implies duties on governments to support minorities threatened with extinction, to – at the outer limit – rights to arrange political administration. These rights are connected to both autonomy and fairness. Cultural rights are often taken either to be opposed to autonomy, or at best instrumental to personal autonomy (by providing ‘options’, but in fact, the ideal of autonomy, expressed by Mill as being the author of one’s life, requires that one be in control of significant aspects of one’s identity. Significant aspects of one’s identity are collectively determined within a culture. Cultures are not static, and their development is particularly affected by political boundaries. A fundamental right of autonomy implies, therefore, that groups be allowed, within reasonable constraints of general feasibility and stability, to arrange

  10. The Quest for Identity in Adolescence: Heterogeneity in Daily Identity Formation and Psychosocial Adjustment across 5 Years

    Science.gov (United States)

    Becht, Andrik I.; Nelemans, Stefanie A.; Branje, Susan J. T.; Vollebergh, Wilma A. M.; Koot, Hans M.; Denissen, Jaap J. A.; Meeus, Wim H. J.

    2016-01-01

    Identity formation is one of the key developmental tasks in adolescence. According to Erikson (1968) experiencing identity uncertainty is normative in adolescence. However, empirical studies investigating identity uncertainty on a daily basis are lacking. Hence, studying individual differences in daily certainty (i.e., identity commitment levels)…

  11. Identity Development in Deaf Adolescents

    Science.gov (United States)

    Kunnen, E. Saskia

    2014-01-01

    We studied identity development during 5 years in seven deaf adolescents who attended a school for deaf children in the highest level of regular secondary education (age between 14 and 18 years), administering identity interviews every year. Identity development is conceptualized as the processes of exploration and commitment formation (Bosma,…

  12. Electronic Information Access and Utilization by Makerere University Students in Uganda

    Directory of Open Access Journals (Sweden)

    Elisam Magara

    2008-09-01

    Full Text Available Objectives – The objectives of this study were to establish the level of computer utilization skills of Makerere University (Uganda Library and Information Science (LIS students; to determine the use of electronic information resources by LIS students; to determine the attitudes of LIS students towards electronic information resources; and to establish the problems faced by LIS students in accessing electronic information resources.Methods – A questionnaire survey was used for data collection.Results – The majority of Library and Information Science students at Makerere University depend on university computers for their work, and very few of them access the library’s e-resources. The few who access e-resources are self-taught. The majority of students surveyed were unaware of Emerald and EBSCO databases relevant to Library and Information Science students, and they found accessing eresources time-consuming. Conclusion – The study concluded that a concerted effort is needed by both LIS lecturers and university librarians in promoting use of the library’s electronic resources.

  13. Science Identity in Informal Education

    Science.gov (United States)

    Schon, Jennifer A.

    The national drive to increase the number of students pursuing Science Technology, Engineering, and Math (STEM) careers has brought science identity into focus for educators, with the need to determine what encourages students to pursue and persist in STEM careers. Science identity, the degree to which students think someone like them could be a scientist is a potential indicator of students pursuing and persisting in STEM related fields. Science identity, as defined by Carlone and Johnson (2007) consists of three constructs: competence, performance, and recognition. Students need to feel like they are good at science, can perform it well, and that others recognize them for these achievements in order to develop a science identity. These constructs can be bolstered by student visitation to informal education centers. Informal education centers, such as outdoor science schools, museums, and various learning centers can have a positive impact on how students view themselves as scientists by exposing them to novel and unique learning opportunities unavailable in their school. Specifically, the University of Idaho's McCall Outdoor Science School (MOSS) focuses on providing K-12 students with the opportunity to learn about science with a place-based, hands-on, inquiry-based curriculum that hopes to foster science identity development. To understand the constructs that lead to science identity formation and the impact the MOSS program has on science identity development, several questions were explored examining how students define the constructs and if the MOSS program impacted how they rate themselves within each construct. A mixed-method research approach was used consisting of focus group interviews with students and pre, post, one-month posttests for visiting students to look at change in science identity over time. Results from confirmatory factor analysis indicate that the instrument created is a good fit for examining science identity and the associated

  14. Dynamic models for distributed generation resources

    Energy Technology Data Exchange (ETDEWEB)

    Morched, A.S. [BPR Energie, Sherbrooke, PQ (Canada)

    2010-07-01

    Distributed resources can impact the performance of host power systems during both normal and abnormal system conditions. This PowerPoint presentation discussed the use of dynamic models for identifying potential interaction problems between interconnected systems. The models were designed to simulate steady state behaviour as well as transient responses to system disturbances. The distributed generators included directly coupled and electronically coupled generators. The directly coupled generator was driven by wind turbines. Simplified models of grid-side inverters, electronically coupled wind generators and doubly-fed induction generators (DFIGs) were presented. The responses of DFIGs to wind variations were evaluated. Synchronous machine and electronically coupled generator responses were compared. The system model components included load models, generators, protection systems, and system equivalents. Frequency responses to islanding events were reviewed. The study demonstrated that accurate simulations are needed to predict the impact of distributed generation resources on the performance of host systems. Advances in distributed generation technology have outpaced the development of models needed for integration studies. tabs., figs.

  15. From Farming to Fishing: Marine Resource Conservation and a New ...

    African Journals Online (AJOL)

    This paper examines the arrival of a new group of fishermen on the Kenyan coast and what this has meant for the state of fishery resources. It reviews four subject areas: access and the number of fishermen; the fishermen's identity; the choice of fishing gear; and the fishing grounds selected. Data were collected from a small ...

  16. Identity and Diversity in Today's World

    Science.gov (United States)

    Gee, James Paul

    2017-01-01

    This paper develops a thesis about identity and diversity. I first look at activity-based identities, identities like being a gardener, birder, citizen scientist or fan-fiction writer. These are freely chosen identities and they are proliferating at a great rate today thanks to participatory culture, the Maker Movement and digital and social…

  17. Implementation in Russia and the European Union of International Safety Standards of Identity Documents with Biometric Data: Legal Regulation and Perspectives

    Directory of Open Access Journals (Sweden)

    Alexander Grigoryevich Volevodz

    2015-01-01

    Full Text Available The article contains the findings of a research into particular aspects of use of identity documents with personal biometric data. It considers the international safety standards of documents with biometric data worked out by the International Civil Aviation Organization (ICAO, pursuant to which those data should be included into machine-readable documents used by their holders for travel to various states. It contains the information on the implementation of these international standards in Russian and European Union law. The author has substantiated a conclusion to the effect that the procedure established in Russia for production and issuance, as well as for use of international, diplomatic and service passports identifying the Russian Federation citizen outside the Russian Federation territory, containing electronic information carriers with personal and biometric personal data, currently conforms to the international safety standards of documents with biometric data. The article surveys the experience of introducing domestic biometric identity documents - electronic passports in various countries of the world, and the problems arising therefrom. It substantiates the advantages and disadvantages of determining a passport of the Russian Federation citizen issued in the form of an identity card with an electronic information carrier, as the main document of the Russian Federation citizen identifying him domestically within the country's territory.

  18. Lift of dilogarithm to partition identities

    International Nuclear Information System (INIS)

    Terhoeven, M.

    1992-11-01

    For the whole set of dilogarithm identities found recently using the thermodynamic Bethe-Ansatz for the ADET series of purely elastic scattering theories we give partition identities which involve characters of those conformal field theories which correspond to the UV-limits of the scattering theories. These partition identities in turn allow to derive the dilogarithm identities using modular invariance and a saddle point approximation. We conjecture on possible generalizations of this correspondance, namely, a lift from dilogarithm to partition identities. (orig.)

  19. The effects of smoking self-identity and quitting self-identity on attempts to quit smoking

    NARCIS (Netherlands)

    van den Putte, B.; Yzer, M.C.; Willemsen, M.C.; de Bruijn, G.J.

    2009-01-01

    Objective: To examine the effect of two types of self-identity on attempts to quit smoking: self-identity in terms of smoking and self-identity in terms of quitting. Design: A prospective survey among an initial sample of 3,411 smokers. Smoking history variables and psychosocial variables from the

  20. Fission track analysis and evolution of mesozoic-paleozoic hydrocarbon resource-rocks headed in Northern Jiangsu-South Yellow sea basin

    International Nuclear Information System (INIS)

    Xu Hong; Cai Qianzhong; Sun Heqing; Guo Zhenxuan; Yan Guijing; Dai Jing; Liu Dongying

    2008-01-01

    Fission track data of different geologic epoches from Binhai salient, Yancheng sag, Haian sag, Baiju sag, Gaoyou sag, Hongze sag and Jinhu sag of northern Jiangsu basin and seismic data from Laoshan uplift in South Yellow Sea basin and evolution of Paleozoic hydrocarbon resource-rocks headed in the Northern Jiangsu-South Yellow Sea basin were studied. Results indicate that Binhai salient uplifted in 38-15 Ma, forming 'structure uplifting model', Paleozoic hydrocarbon resource-rocks have the appearance of 'different layers but identical mature, different layers but identical temperature' with Laoshan uplift. All sags have the characters of 'long time heating model', and sedimentations in Cenozoic were exploited by 2 km. Mesozoic-Paleozoic hydrocarbon resource- rocks of Laoshan uplift get ahead of 10 km. Structure evolution was compared with Binhai salient. According to the modeling results of secondary hydrocarbon generation, Mesozoic-Paleozoic hydrocarbon resource-rocks of Laoshan uplift have the good reservoir potentiality and probably become an important new window for sea oil and gas exploration. (authors)

  1. Availability of Electronic Resources for Service Provision in ...

    African Journals Online (AJOL)

    The study also revealed that majority of the University libraries have adequate basic infrastructure for effective electronic information services. ... acquired by the library are put into maximal use by the library clientele, thereby ensuring the achievement of the library's objective which is satisfying the users, information needs.

  2. Strengthen Cloud Computing Security with Federal Identity Management Using Hierarchical Identity-Based Cryptography

    Science.gov (United States)

    Yan, Liang; Rong, Chunming; Zhao, Gansen

    More and more companies begin to provide different kinds of cloud computing services for Internet users at the same time these services also bring some security problems. Currently the majority of cloud computing systems provide digital identity for users to access their services, this will bring some inconvenience for a hybrid cloud that includes multiple private clouds and/or public clouds. Today most cloud computing system use asymmetric and traditional public key cryptography to provide data security and mutual authentication. Identity-based cryptography has some attraction characteristics that seem to fit well the requirements of cloud computing. In this paper, by adopting federated identity management together with hierarchical identity-based cryptography (HIBC), not only the key distribution but also the mutual authentication can be simplified in the cloud.

  3. Unpacking science for all through the lens of identities-in-practice: the stories of Amelia and Ginny

    Science.gov (United States)

    Tan, Edna; Barton, Angela Calabrese

    2008-04-01

    This manuscript reports on an ethnographic study of two Latina students who attended an urban middle school in a low-income community, and how they exhibit agency by purposefully authoring identities-in-practice that value nontraditional ways of knowing and resources. Drawing from both global feminism and sociocultural theory, we argue that by paying careful attention to how and why urban girls author identities-in-practice we can gain deep insight into the noncommodified forms of knowledge, relationships and activities that make up their engagement in science and that girls often employ to participate in science related communities in ways that are culturally and socially just and sustainable.

  4. 21 CFR 610.14 - Identity.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 7 2010-04-01 2010-04-01 false Identity. 610.14 Section 610.14 Food and Drugs... BIOLOGICAL PRODUCTS STANDARDS General Provisions § 610.14 Identity. The contents of a final container of each filling of each lot shall be tested for identity after all labeling operations shall have been completed...

  5. Quantitatively identical orientation-dependent ionization energy and electron affinity of diindenoperylene

    Energy Technology Data Exchange (ETDEWEB)

    Han, W. N.; Yonezawa, K.; Makino, R.; Kato, K.; Hinderhofer, A.; Ueno, N.; Kera, S. [Graduate School of Advanced Integration Science, Chiba University 1-33 Yayoi-cho, Inage-ku, Chiba 263-8522 (Japan); Murdey, R.; Shiraishi, R.; Yoshida, H.; Sato, N. [Institute for Chemical Research, Kyoto University, Uji, Kyoto 611-0011 (Japan)

    2013-12-16

    Molecular orientation dependences of the ionization energy (IE) and the electron affinity (EA) of diindenoperylene (DIP) films were studied by using ultraviolet photoemission spectroscopy and inverse photoemission spectroscopy. The molecular orientation was controlled by preparing the DIP films on graphite and SiO{sub 2} substrates. The threshold IE and EA of DIP thin films were determined to be 5.81 and 3.53 eV for the film of flat-lying DIP orientation, respectively, and 5.38 and 3.13 eV for the film of standing DIP orientation, respectively. The result indicates that the IE and EA for the flat-lying film are larger by 0.4 eV and the frontier orbital states shift away from the vacuum level compared to the standing film. This rigid energy shift is ascribed to a surface-electrostatic potential produced by the intramolecular polar bond (>C{sup −}-H{sup +}) for standing orientation and π-electron tailing to vacuum for flat-lying orientation.

  6. Emotional Intelligence Research within Human Resource Development Scholarship

    Science.gov (United States)

    Farnia, Forouzan; Nafukho, Fredrick Muyia

    2016-01-01

    Purpose: The purpose of this study is to review and synthesize pertinent emotional intelligence (EI) research within the human resource development (HRD) scholarship. Design/methodology/approach: An integrative review of literature was conducted and multiple electronic databases were searched to find the relevant resources. Using the content…

  7. Primary Identity in Literature

    DEFF Research Database (Denmark)

    Graham, Brian Russell

    In our times, literary criticism, as well as larger political and cultural developments, is characterized by identity politics, meaning that our discourses are structured around the notion of different socially identifiable populations in society. In relation to literature, this results in our...... viewing the characters in literature in terms of these political identities. Literature is consequently discussed in relation to political causes. Literary criticism is animated by the same causes, and is viewed as having a direct intervention in society in relation to them. In this paper, I will discuss......, in relation to Frye’s works, the idea that the primary identities of characters in literature were and, to a considerable extent, continue to be those of family-member identities. As such, literature should not be appropriated to a political context too readily. Whereas viewing characters in terms of...

  8. Ethnic Identity, Bicultural Identity Integration, and Psychological Well-Being among Transracial Adoptees: A Longitudinal Study

    Science.gov (United States)

    Ferrari, Laura; Rosnati, Rosa; Manzi, Claudia; Benet-Martínez, Verònica

    2015-01-01

    The ethnic identity development plays a crucial role in adolescence and emerging adulthood and may be more complex for adoptees who do not share their ethnic identity with their adoptive families. Evidence from the studies was mixed, with strong ethnic identity not always found to be indicative of improved psychological adjustment. Recently…

  9. Biography, Identity, Improvisation, Sound: Intersections of Personal and Social Identity through Improvisation

    Science.gov (United States)

    Smilde, Rineke

    2016-01-01

    This essay addresses the relationship of improvisation and identity. Biographical research that was conducted by the author into professional musicians' lifelong learning showed the huge importance of improvisation for personal expression. Musically, the concept of "sound" appeared to serve as a strong metaphor for identity. In addition,…

  10. Optimal Experience and Optimal Identity: A Multinational Study of the Associations Between Flow and Social Identity

    Science.gov (United States)

    Mao, Yanhui; Roberts, Scott; Pagliaro, Stefano; Csikszentmihalyi, Mihaly; Bonaiuto, Marino

    2016-01-01

    Eudaimonistic identity theory posits a link between activity and identity, where a self-defining activity promotes the strength of a person’s identity. An activity engaged in with high enjoyment, full involvement, and high concentration can facilitate the subjective experience of flow. In the present paper, we hypothesized in accordance with the theory of psychological selection that beyond the promotion of individual development and complexity at the personal level, the relationship between flow and identity at the social level is also positive through participation in self-defining activities. Three different samples (i.e., American, Chinese, and Spanish) filled in measures for flow and social identity, with reference to four previously self-reported activities, characterized by four different combinations of skills (low vs. high) and challenges (low vs. high). Findings indicated that flow was positively associated with social identity across each of the above samples, regardless of participants’ gender and age. The results have implications for increasing social identity via participation in self-defining group activities that could facilitate flow. PMID:26924995

  11. Optimal Experience and Optimal Identity: A Multinational Study of the Associations Between Flow and Social Identity.

    Science.gov (United States)

    Mao, Yanhui; Roberts, Scott; Pagliaro, Stefano; Csikszentmihalyi, Mihaly; Bonaiuto, Marino

    2016-01-01

    Eudaimonistic identity theory posits a link between activity and identity, where a self-defining activity promotes the strength of a person's identity. An activity engaged in with high enjoyment, full involvement, and high concentration can facilitate the subjective experience of flow. In the present paper, we hypothesized in accordance with the theory of psychological selection that beyond the promotion of individual development and complexity at the personal level, the relationship between flow and identity at the social level is also positive through participation in self-defining activities. Three different samples (i.e., American, Chinese, and Spanish) filled in measures for flow and social identity, with reference to four previously self-reported activities, characterized by four different combinations of skills (low vs. high) and challenges (low vs. high). Findings indicated that flow was positively associated with social identity across each of the above samples, regardless of participants' gender and age. The results have implications for increasing social identity via participation in self-defining group activities that could facilitate flow.

  12. Identity theft and your practice.

    Science.gov (United States)

    Asbell, Lisa

    2010-01-01

    Medical identity theft is a growing problem in America. The federal government has passed laws to help "prevent" identity theft. However, several powerful medical associations are fighting the legislation. Americans need to know what is happening with these laws and why these laws are important to protect providers from lawsuits and consumers of healthcare from medical identity theft.

  13. Social Identity Simulation System (SISTEM)

    Science.gov (United States)

    2014-03-31

    Report Individuation Individuation refers to when an individual attempts to preserve self-esteem by psychologically separating oneself from a...its expected costs. The following subsections describe various strategies of social identity entrepreneurship in more detail. Calling for...Haslam, S. A., & Reicher, S. (2007). Identity Entrepreneurship and the consequences of identity failure: the dynamics of leadership in the BBC prison

  14. A Temporal Perspective on Organizational Identity

    DEFF Research Database (Denmark)

    Schultz, Majken; Hernes, Tor

    2013-01-01

    time perspective in the use of memory enabled a longer time perspective in formulating claims for future identity, (2) a broader scope of articulated identity claims for the future was related to the combination of a broader range of memory forms, and (3) the depth of claims for future identity...... was related to the way in which memory forms were combined. At a more general level, our paper illustrates how viewing identity construction from the perspective of an ongoing present adds a new dimension to understanding the temporal dynamics of organizational identity....

  15. Independent center, independent electron approximation for dynamics of molecules and clusters

    International Nuclear Information System (INIS)

    McGuire, J.H.; Straton, J.C.; Wang, J.; Wang, Y.D.; Weaver, O.L.; Corchs, S.E.; Rivarola, R.D.

    1996-01-01

    A formalism is developed for evaluating probabilities and cross sections for multiple-electron transitions in scattering of molecules and clusters by charged collision partners. First, the molecule is divided into subclusters each made up of identical centers (atoms). Within each subcluster coherent scattering from identical centers may lead to observable phase terms and a geometrical structure factor. Then, using a mean field approximation to describe the interactions between centers we obtain A I ∼ summation k product ke iδ k I A Ik . Second, the independent electron approximation for each center may be obtained by neglecting the correlation between electrons in each center. The probability amplitude for each center is then a product of single electron transition probability amplitudes, a Ik i , i.e. A Ik ≅ product iaik i . Finally, the independent subcluster approximation is introduced by neglecting the interactions between different subclusters in the molecule or cluster. The total probability amplitude then reduces to a simple product of amplitudes for each subcluster, A≅ product IAI . Limitations of this simple approximation are discussed. copyright 1996 American Institute of Physics

  16. Stories we live, identities we build: how are elementary teachers' science identities shaped by their lived experiences?

    Science.gov (United States)

    Avraamidou, Lucy

    2018-02-01

    The aim of this multiple case study was to uncover a series of critical events and experiences related to the formation of the science identities of four beginning elementary female teachers, through a life-history approach and a conceptualization of teacher identity as lived experience. Grounded within the theoretical framework of Figured Worlds, the study used qualitative, interpretive methods for data collection (interviews, biographies, teaching philosophies) and analysis. The analysis shed light on the ways in which various experiences situated within different Figured Worlds (science, family and childhood, schooling, out-of-school, university, professional) impacted the participants' identity trajectories. The findings provided three main insights that contribute to science identity research and have implications for elementary teacher preparation: (a) science teacher identity is multidimensional and extends beyond cognitive domains of becoming to include affective dimensions; (b) science teacher identity is relational, linked and shaped by various other constructs or sub-identities; (c) place and time, defined as a space with meaning created by experiences, and science teacher identity are inextricably bound to one another.

  17. Generalized Cherednik-Macdonald identities

    NARCIS (Netherlands)

    Stokman, J.V.

    2008-01-01

    We derive generalizations of the Cherednik-Macdonald constant term identities associated to root systems which depend, besides on the usual Multiplicity function, symmetrically on two additional parameters omega +/-. They are natural analogues of the Cherednik-Macdonald constant term q-identities in

  18. Constructing leadership identities through stories

    DEFF Research Database (Denmark)

    Frimann, Søren; Hersted, Lone

    2016-01-01

    This article analyzes the construction of leadership identities through stories found in four narrative interviews from a qualitative study and leadership development project based on social constructionism and action learning. We argue that leadership development and the construction of leadership...... that the concept of coauthoring is useful in developing leadership and leadership identities through reflexive dialogs and emerging stories....... identities in a postmodern paradigm are based on the negotiation and co-construction of meanings, relationships, and stories. The following questions are investigated: What happens when a group of leaders from different organizations construct, deconstruct, and reconstruct their identity as leaders through...

  19. On the theory of excitation transfer process in slow collisions between identical particles

    International Nuclear Information System (INIS)

    Chibisov, M.I.

    1978-01-01

    Asymptotics has been investigated at R → infinity (R is internuclear distance) of exchange interaction for the quasimolecule of two identical one-electron atoms. It is shown that the theory of exchange interaction developed previously which does not take into account the symmetry on permutations of electron is not rigid. The exchange contribution to term splitting in alkali metal atoms determines the effective cross section for transfer of excitation at 10 3 K. The Van der Waals contribution is less than the exchange one. The cross section is of the order of 10 -14 cm 2 . The cross section dependence on temperature is weak, sigma approximately ln 2 T

  20. Quantum Phase Extraction in Isospectral Electronic Nanostructures

    Energy Technology Data Exchange (ETDEWEB)

    Moon, Christopher

    2010-04-28

    Quantum phase is not a direct observable and is usually determined by interferometric methods. We present a method to map complete electron wave functions, including internal quantum phase information, from measured single-state probability densities. We harness the mathematical discovery of drum-like manifolds bearing different shapes but identical resonances, and construct quantum isospectral nanostructures possessing matching electronic structure but divergent physical structure. Quantum measurement (scanning tunneling microscopy) of these 'quantum drums' [degenerate two-dimensional electron states on the Cu(111) surface confined by individually positioned CO molecules] reveals that isospectrality provides an extra topological degree of freedom enabling robust quantum state transplantation and phase extraction.

  1. Education and identity of adult educators

    Directory of Open Access Journals (Sweden)

    Zoran Jelenc

    2010-10-01

    Full Text Available Adult education and learning has because of its wide extensiveness and variability huge difficulties with its identity. Difficulties appear in all three spheres of identity: professional identity of adult education; societal identity of the field; and personal identity with the profession. In our contribution we list and describe difficulties in all three identity areas. Insufficient identity is a great obstacle for continuing education and further training of those who work or wish to work in adult education or they are obliged to carry out such education. They are all named ‘adult educators’ but their roles and tasks in education are different. Contents and ways of realization of programs have to be adapted to that. We recommend: modular programs for different target groups should be created from a wide list of contents; more sophisticated methods of marketing and recruiting should be used for the better realization of programs; programs should enable participants to get publicly recognized certificates and in this way current program of pedagogical-andragogical education which does not follow enough above-named difficulties of identity should be replaced; successful programs should be distributed all over Slovenia and performed in cooperation with another providers.

  2. Moral identity and emotion in athletes.

    Science.gov (United States)

    Kavussanu, Maria; Willoughby, Adrian; Ring, Christopher

    2012-12-01

    The purpose of this study was to investigate the effects of moral identity on physiological responses to affective pictures, namely, the startle blink reflex and pain-related evoked potential. Male (n = 48) and female (n = 46) athletes participating in contact team sports were randomly assigned to either a moral identity group or a non-moral identity group and viewed a series of unpleasant, neutral, and pleasant sport-specific pictures. During picture viewing, a noxious electrocutaneous stimulus was delivered as the startle probe and the startle blink and pain-related evoked potential were measured. Upon completion of physiological measures, participants reviewed the pictures and rated them for valence and arousal. ANOVAs revealed that participants in the moral identity group displayed larger startle blinks and smaller pain-related potentials than did those in the non-moral identity group across all picture valence categories. However, the difference in the magnitude of startle blinks between the moral and non-moral identity groups was larger in response to unpleasant than pleasant and neutral pictures. Our findings suggest that moral identity affects physiological responses to sport-specific affective pictures, thereby providing objective evidence for the link between moral identity and emotion in athletes.

  3. The emergence, structure and development of ethnic identity during childhood: the case of Roma identity.

    Science.gov (United States)

    Pnevmatikos, Dimitris; Geka, Maria; Divane, Maria

    2010-12-01

    This study investigates the emergence, development and structure of ethnic identity during childhood. Forty Roma children living in Greece aged between 2.8 and 11.9 years answered questions about their awareness/recognition of four aspects of their ethnic identity-namely place of habitation, traditional costumes, the Roma language, and early betrothal of children-their identity and their sense of stability and constancy. The study also investigates how the children feel about the abandonment of those four aspects. The evidence from the current data supports the hypothesis that awareness of ethnic identity emerges before the age of 4. Moreover, this study offers direct empirical evidence of the multidimensionality of ethnic identity. A model of three concentric rings is proposed, extending from a core containing the most highly valued aspects of ethnic identity to the outer annulus that comprises the nonpermanent and nonstable aspects of ethnic identity. The aspects in each annulus differ in terms of the development of the sense of stability and constancy and the feelings associated with loss of the aspects in question. Even the youngest participants considered the aspects in the core to be stable and constant as well as emotionally charged; and even the 11-year-olds did not consider the aspects contained in the outer, more fluid annulus as stable and constant aspects of their ethnic identity. The development of an aspect is determined by what the majority of adults in a society, at a particular time in history, consider to be most important.

  4. Intergroup Leadership Across Distinct Subgroups and Identities.

    Science.gov (United States)

    Rast, David E; Hogg, Michael A; van Knippenberg, Daan

    2018-03-01

    Resolving intergroup conflict is a significant and often arduous leadership challenge, yet existing theory and research rarely, if ever, discuss or examine this situation. Leaders confront a significant challenge when they provide leadership across deep divisions between distinct subgroups defined by self-contained identities-The challenge is to avoid provoking subgroup identity distinctiveness threat. Drawing on intergroup leadership theory, three studies were conducted to test the core hypothesis that, where identity threat exists, leaders promoting an intergroup relational identity will be better evaluated and are more effective than leaders promoting a collective identity; in the absence of threat, leaders promoting a collective identity will prevail. Studies 1 and 2 ( N = 170; N = 120) supported this general proposition. Study 3 ( N = 136) extended these findings, showing that leaders promoting an intergroup relational identity, but not a collective identity, improved intergroup attitudes when participants experienced an identity distinctiveness threat.

  5. To get or not to get: the KAUST library e-resources acquisition experience

    KAUST Repository

    Ramli, Rindra M.

    2014-06-01

    In the challenging times of budget cuts and reviews, libraries are faced with issues, among others, such as justifying acquisition, negotiating deals and reviewing current subscriptions (pertaining to electronic resources). With the rapid increase in growth of electronic resources, libraries have to continuously assess their acquisition models and policies to constantly ensure that they are balancing their budget and users’ needs as well. This paper highlights the role played by Technical and IT department of King Abdullah University of Science and Technology (KAUST) library (Saudi Arabia) in acquiring the electronic resources (electronic books, electronic journals, databases, image and reference) for the community. It will describe the processes during the early days when KAUST library was inaugurated; how electronic resources were acquired and what went through during those days. The paper will elaborate further how the acquisition model has evolved and the various important roles played by the library staff in ensuring that acquisitions/subscriptions are justified, within the budget and provides ROI for the library. King Abdullah University is a graduate research university which opened in September 2009 with its first cohort of 800 graduate students (25% female) taught by 100 faculties. The focus of study and research in the university are: Mathematics and Computer Science, Physical Sciences and Life Sciences. The university library started with 10 staff. The library has a “state-of-the-art learning and information resource center supporting graduate education and advanced scientific research” (KAUST, 2010).

  6. Ethical human resource management: a critical analysis

    OpenAIRE

    Khan, Muhammad

    2014-01-01

    In modern day, Human Resource Management (HRM) is seen as a mere variant of management control aiming intentionally to ‘colonize’ the identity of the individual employee which points to the contradictions between the idealised HRM theories and its practice commonly referred to as the difference between rhetoric and reality. These critical analyses suggest that HRM reflects a historical shift in the way work is defined and managed and research has to be undertaken on how morality and ethics ma...

  7. Fingerprint recognition with identical twin fingerprints.

    Science.gov (United States)

    Tao, Xunqiang; Chen, Xinjian; Yang, Xin; Tian, Jie

    2012-01-01

    Fingerprint recognition with identical twins is a challenging task due to the closest genetics-based relationship existing in the identical twins. Several pioneers have analyzed the similarity between twins' fingerprints. In this work we continue to investigate the topic of the similarity of identical twin fingerprints. Our study was tested based on a large identical twin fingerprint database that contains 83 twin pairs, 4 fingers per individual and six impressions per finger: 3984 (83*2*4*6) images. Compared to the previous work, our contributions are summarized as follows: (1) Two state-of-the-art fingerprint identification methods: P071 and VeriFinger 6.1 were used, rather than one fingerprint identification method in previous studies. (2) Six impressions per finger were captured, rather than just one impression, which makes the genuine distribution of matching scores more realistic. (3) A larger sample (83 pairs) was collected. (4) A novel statistical analysis, which aims at showing the probability distribution of the fingerprint types for the corresponding fingers of identical twins which have same fingerprint type, has been conducted. (5) A novel analysis, which aims at showing which finger from identical twins has higher probability of having same fingerprint type, has been conducted. Our results showed that: (a) A state-of-the-art automatic fingerprint verification system can distinguish identical twins without drastic degradation in performance. (b) The chance that the fingerprints have the same type from identical twins is 0.7440, comparing to 0.3215 from non-identical twins. (c) For the corresponding fingers of identical twins which have same fingerprint type, the probability distribution of five major fingerprint types is similar to the probability distribution for all the fingers' fingerprint type. (d) For each of four fingers of identical twins, the probability of having same fingerprint type is similar.

  8. Fingerprint recognition with identical twin fingerprints.

    Directory of Open Access Journals (Sweden)

    Xunqiang Tao

    Full Text Available Fingerprint recognition with identical twins is a challenging task due to the closest genetics-based relationship existing in the identical twins. Several pioneers have analyzed the similarity between twins' fingerprints. In this work we continue to investigate the topic of the similarity of identical twin fingerprints. Our study was tested based on a large identical twin fingerprint database that contains 83 twin pairs, 4 fingers per individual and six impressions per finger: 3984 (83*2*4*6 images. Compared to the previous work, our contributions are summarized as follows: (1 Two state-of-the-art fingerprint identification methods: P071 and VeriFinger 6.1 were used, rather than one fingerprint identification method in previous studies. (2 Six impressions per finger were captured, rather than just one impression, which makes the genuine distribution of matching scores more realistic. (3 A larger sample (83 pairs was collected. (4 A novel statistical analysis, which aims at showing the probability distribution of the fingerprint types for the corresponding fingers of identical twins which have same fingerprint type, has been conducted. (5 A novel analysis, which aims at showing which finger from identical twins has higher probability of having same fingerprint type, has been conducted. Our results showed that: (a A state-of-the-art automatic fingerprint verification system can distinguish identical twins without drastic degradation in performance. (b The chance that the fingerprints have the same type from identical twins is 0.7440, comparing to 0.3215 from non-identical twins. (c For the corresponding fingers of identical twins which have same fingerprint type, the probability distribution of five major fingerprint types is similar to the probability distribution for all the fingers' fingerprint type. (d For each of four fingers of identical twins, the probability of having same fingerprint type is similar.

  9. Interplay Between Intended Brand Identity and Identities in a Nike Related Brand Community

    DEFF Research Database (Denmark)

    Kornum, Niels; Gyrd-Jones, Richard; Al Zagir, Nadia

    2017-01-01

    While branding research traditionally views brand identity as an inside-out management controlled phenomenon, recent research emphasizes that a wide variety of stakeholders in the brand ecosystem enact and co-create brand identity. Following this theoretical perspective, management forms the inte...

  10. Perancangan Corporate Identity Astro Rent Car Surabaya

    OpenAIRE

    Gunardi, Yohanes Calvin; Negara, I Nengah Sudika; Aryanto, Hendro

    2017-01-01

    Corporate Identity merupakan hal yang krusial dalam perkembangan sebuah Perusahaan dalam segi internal maupun eksternal. Dalam membuat perancangan Corporate identity yang efektif, perancangan ini menampilkan segala teori dan ilmu yang berhubungan dengan Corporate identity. Dengan adanya perancangan ini diharapkan para pembaca mengerti betapa pentingnya peran sebuah corporate identity yang tepat dan mengena.Kata kunci: corporate identity, Astro, logo.

  11. Electronic health records: what does your signature signify?

    Directory of Open Access Journals (Sweden)

    Victoroff MD Michael S

    2012-08-01

    Full Text Available Abstract Electronic health records serve multiple purposes, including clinical communication, legal documentation, financial transaction capture, research and analytics. Electronic signatures attached to entries in EHRs have different logical and legal meanings for different users. Some of these are vestiges from historic paper formats that require reconsideration. Traditionally accepted functions of signatures, such as identity verification, attestation, consent, authorization and non-repudiation can become ambiguous in the context of computer-assisted workflow processes that incorporate functions like logins, auto-fill and audit trails. This article exposes the incompatibility of expectations among typical users of electronically signed information.

  12. Māori identity signatures: A latent profile analysis of the types of Māori identity.

    Science.gov (United States)

    Greaves, Lara M; Houkamau, Carla; Sibley, Chris G

    2015-10-01

    Māori are the indigenous peoples of New Zealand. However, the term 'Māori' can refer to a wide range of people of varying ethnic compositions and cultural identity. We present a statistical model identifying 6 distinct types, or 'Māori Identity Signatures,' and estimate their proportion in the Māori population. The model is tested using a Latent Profile Analysis of a national probability sample of 686 Māori drawn from the New Zealand Attitudes and Values Study. We identify 6 distinct signatures: Traditional Essentialists (22.6%), Traditional Inclusives (16%), High Moderates (31.7%), Low Moderates (18.7%), Spiritually Orientated (4.1%), and Disassociated (6.9%). These distinct Identity Signatures predicted variation in deprivation, age, mixed-ethnic affiliation, and religion. This research presents the first formal statistical model assessing how people's identity as Māori is psychologically structured, documents the relative proportion of these different patterns of structures, and shows that these patterns reliably predict differences in core demographics. We identify a range of patterns of Māori identity far more diverse than has been previously proposed based on qualitative data, and also show that the majority of Māori fit a moderate or traditional identity pattern. The application of our model for studying Māori health and identity development is discussed. (c) 2015 APA, all rights reserved).

  13. Corporate identity. Brand designs.

    Science.gov (United States)

    Mathieson, Steve

    2004-02-19

    The past two years have seen a steadily more consistent brand identity for the NHS. Branding will become more important as foundation status and PCT commissioning makes acute hospitals more competitive. This has put pressure on some trusts that have their own strong identities.

  14. Ethnic Identities of University Students

    Directory of Open Access Journals (Sweden)

    Gözde Özdikmenli-Demir

    2014-06-01

    Full Text Available The aim of this article is to understand the relationship between ethnic identity, victimization/witnessing community violence, ethnic discrimination, and aggression in a sample of university students living in the South East Region of Turkey. The participants were 263 university students of predominantly Kurdish ethnic origin. The results showed that males had higher levels of ethnic identity in the dimensions of exploration and commitment. Males also presented higher scores for witnessing community violence and lifetime exposure to ethnic discrimination. The most important predictor of participants’ ethnic identity was witnessing community violence. Participants who witnessed violent acts in their social environment had higher ethnic identity levels. Although the predictor variables could not explain an important part of the participants’ aggression levels, only perceived ethnic discrimination was positively related to aggressive behavior. The role of native language efficiency in ethnic identity is also discussed.

  15. Self-identity as a construct

    DEFF Research Database (Denmark)

    Sudzina, Frantisek

    Self-identity is a private assessment of one’s beliefs and values. The self is an active agent in the decision process that drives people to act in accordance with the behavior that they see appropriate for themselves. According to Triandis, one’s self-definition motivates behavior that is consis......Self-identity is a private assessment of one’s beliefs and values. The self is an active agent in the decision process that drives people to act in accordance with the behavior that they see appropriate for themselves. According to Triandis, one’s self-definition motivates behavior...... that is consistent with that definition. Self-identity has been shown to influence the acceptance and use of technology. Prior research has shown that self-identity includes the factors of innovativeness, tech savviness, and opinion leadership. The aim of the research is to test the self-identity construct...

  16. Development of the doppler electron velocimeter: theory.

    Energy Technology Data Exchange (ETDEWEB)

    Reu, Phillip L.

    2007-03-01

    Measurement of dynamic events at the nano-scale is currently impossible. This paper presents the theoretical underpinnings of a method for making these measurements using electron microscopes. Building on the work of Moellenstedt and Lichte who demonstrated Doppler shifting of an electron beam with a moving electron mirror, further work is proposed to perfect and utilize this concept in dynamic measurements. Specifically, using the concept of ''fringe-counting'' with the current principles of transmission electron holography, an extension of these methods to dynamic measurements is proposed. A presentation of the theory of Doppler electron wave shifting is given, starting from the development of the de Broglie wave, up through the equations describing interference effects and Doppler shifting in electron waves. A mathematical demonstration that Doppler shifting is identical to the conceptually easier to understand idea of counting moving fringes is given by analogy to optical interferometry. Finally, potential developmental experiments and uses of a Doppler electron microscope are discussed.

  17. Development and Validation of a Q-Sort Measure of Identity Processing Style: The Identity Processing Style Q-Sort

    Science.gov (United States)

    Pittman, Joe F.; Kerpelman, Jennifer L.; Lamke, Leanne K.; Sollie, Donna L.

    2009-01-01

    Identity styles represent strategies individuals use to explore identity-related issues. Berzonsky (Berzonsky, M. D. (1992). Identity style and coping strategies. "Journal of Personality, 60", 771-788) identified three styles: informational, normative, and diffuse. In three studies, this paper presents (a) the identity processing style Q-sort…

  18. Toward human resource management in inter-professional health practice: linking organizational culture, group identity and individual autonomy.

    Science.gov (United States)

    Tataw, David

    2012-01-01

    The literature on team and inter-professional care practice describes numerous barriers to the institutionalization of inter-professional healthcare. Responses to slow institutionalization of inter-professional healthcare practice have failed to describe change variables and to identify change agents relevant to inter-professional healthcare practice. The purpose of this paper is to (1) describe individual and organizational level barriers to collaborative practice in healthcare; (2) identify change variables relevant to the institutionalization of inter-professional practice at individual and organizational levels of analysis; and (3) identify human resource professionals as change agents and describe how the strategic use of the human resource function could transform individual and organizational level change variables and therefore facilitate the healthcare system's shift toward inter-professional practice. A proposed program of institutionalization includes the following components: a strategic plan to align human resource functions with organizational level inter-professional healthcare strategies, activities to enhance professional competencies and the organizational position of human resource personnel, activities to integrate inter-professional healthcare practices into the daily routines of institutional and individual providers, activities to stand up health provider champions as permanent leaders of inter-professional teams with human resource professionals as consultants and activities to bring all key players to the table including health providers. Copyright © 2012 John Wiley & Sons, Ltd.

  19. Strengthening quitter self-identity: An experimental study.

    Science.gov (United States)

    Meijer, Eline; Gebhardt, Winifred A; van Laar, Colette; van den Putte, Bas; Evers, Andrea W M

    2018-06-10

    Smoking-related self-identity processes are important for smoking cessation. We examined whether quitter self-identity (i.e. identification with quitting smoking) could be strengthened through a writing exercise, and whether expected social support for quitting, manipulated through vignettes, could facilitate identification with quitting. Participants (N = 339 daily smokers) were randomly assigned to a 2 (identity: strengthened quitter self-identity vs. control) × 3 (social support: present vs. absent vs. neutral control) between-participants design. The main outcome was post-test quitter self-identity. Post-test quitter self-identity was not strengthened successfully. Only a small and marginally significant intervention effect was found on quitter self-identity, which did not generalise to positively influence quit-intention or behaviour. The social support manipulation did not facilitate quitter self-identity. Secondary content analyses showed that quitter self-identity was strengthened among participants who linked quitting smoking to their lifestyle, wanted to become quitters for health reasons, and whose reasons for becoming quitters included approach of positive aspects of quitting, but not among participants who linked quitter self-identity to their self-perceptions. Results provide insight into the content of smokers' self-conceptualizations as quitters. Writing exercises should be improved and tested to eventually successfully strengthen quitter identities.

  20. Perancangan Corporate Identity Brotherwood Decoration

    OpenAIRE

    Ciputra, Ongky Permana; Bangsa, Petrus Gogor; Christianna, Aniendya

    2015-01-01

    Sebagai Perusahaan interior di Surabaya, “BROTHERWOOD” sedang membangun citra positif melalui penguatan corporate identity secara menyeluruh.Oleh karena itu “Brotherwood” memerlukan corporate identity dan mengaplikasikannya pada media promosi dan informasi yang sesuai dengan karakter dari target audience dan target market-nya.Dengan menggunakan corporate identity diharapkan “Brotherwood” menjadi lebih dikenal oleh target audience dan target market-nya sehingga membuat market “Brotherwood” men...