WorldWideScience

Sample records for identity management bioid

  1. Biometrics and Identity Management

    DEFF Research Database (Denmark)

    security and border control scenarios it is now apparent that the widespread availability of biometrics in everyday life will also spin out an ever increasing number of (private) applications in other domains. Crucial to this vision is the management of the user's identity, which does not only imply...... management. BIOID 2008. The papers are categorized in four classes. These classes represent the 4 working groups of the COST Action 2101. For more information, see http://www.cost2101.org/.   Biometric data quality and multimodal biometric templates, Unsupervised interactive interfaces for multimodal...... of the Workshop are: The European Biometrics Forum, The Danish Biometrics Research Project Consortium, the UK Biometrics Institute and the Institution of Engineering and Technology. The BIOID workshop was jointly organized and held at the Roskilde University in Denmark from May 7 — May 9, 2008....

  2. Identity Management

    Data.gov (United States)

    Social Security Administration — Provides information for identity management services on the creation, modification and eventual deletion of accounts and entitlements based on user relationships on...

  3. Digital Identity Management Systems

    OpenAIRE

    Kuhar, Marko

    2010-01-01

    The goal of this thesis is a review of existing systems and technologies for managing digital identities. After the selection of the two most promising systems there will be a detailed comparison for a typical environment. In the first part of my thesis, the theory for understanding issues of identity management is introduced. Furthermore, the difference between identity and digital identity is explained and identity management itself is interpreted. An example of identity management solut...

  4. Mobile Identity Management

    NARCIS (Netherlands)

    Hoepman, J.J.

    2011-01-01

    Identity management consists of the processes and all underlying technologies for the creation, management, and usage of digital identities. Business rely on identity management systems to simplify the management of access rights to their systems and services for both their employees and their custo

  5. BioID Identification of Lamin-Associated Proteins.

    Science.gov (United States)

    Mehus, Aaron A; Anderson, Ruthellen H; Roux, Kyle J

    2016-01-01

    A- and B-type lamins support the nuclear envelope, contribute to heterochromatin organization, and regulate a myriad of nuclear processes. The mechanisms by which lamins function in different cell types and the mechanisms by which lamin mutations cause over a dozen human diseases (laminopathies) remain unclear. The identification of proteins associated with lamins is likely to provide fundamental insight into these mechanisms. BioID (proximity-dependent biotin identification) is a unique and powerful method for identifying protein-protein and proximity-based interactions in living cells. BioID utilizes a mutant biotin ligase from bacteria that is fused to a protein of interest (bait). When expressed in living cells and stimulated with excess biotin, this BioID-fusion protein promiscuously biotinylates directly interacting and vicinal endogenous proteins. Following biotin-affinity capture, the biotinylated proteins can be identified using mass spectrometry. BioID thus enables screening for physiologically relevant protein associations that occur over time in living cells. BioID is applicable to insoluble proteins such as lamins that are often refractory to study by other methods and can identify weak and/or transient interactions. We discuss the use of BioID to elucidate novel lamin-interacting proteins and its applications in a broad range of biological systems, and provide detailed protocols to guide new applications.

  6. Novell Identity Manager 4

    Institute of Scientific and Technical Information of China (English)

    王志超

    2010-01-01

    本刊讯 5月27日,Novell推出Identity Manager 4解决方案系列,它可在跨物理、虚拟和云环境中安全地进行身份和访问管理。Novell Identity Manager4是业界首个在企业整体IT生态系统中,可确保身份、安全和合规策略连贯一致的解决方案,并在云环境中提供与数据中心环境相同水平的高安全性和稳定性。

  7. Digital identity management

    CERN Document Server

    Laurent, Maryline

    2015-01-01

    In the past four decades, information technology has altered chains of value production, distribution, and information access at a significant rate. These changes, although they have shaken up numerous economic models, have so far not radically challenged the bases of our society.This book addresses our current progress and viewpoints on digital identity management in different fields (social networks, cloud computing, Internet of Things (IoT)), with input from experts in computer science, law, economics and sociology. Within this multidisciplinary and scientific context, having crossed analys

  8. Identity Management A Primer

    CERN Document Server

    Sharoni, Ilan; Williamson, Graham; Yip, David

    2009-01-01

    In an age in which the boundaries between the real and the virtual are becoming increasingly blurred, this timely guide teaches both the key issues of identity management as well as appropriate strategies and preventative measures for ensuring personal safety in the virtual world. In a corporate setting, it is essential to identify and control the way in which the organization deals with customers, suppliers, employees, and other users who may interact with the information systems of the company. Providing strategies for overcoming this task in real-world terms as well as questions that assist

  9. Commons of Identity: Sherpa Identity Management

    Directory of Open Access Journals (Sweden)

    Leif Rune Loland

    2006-12-01

    Full Text Available The recent history of Sherpas demonstrates how identities can be scarce goods. While ‘Sherpa’ refers to an ethnic identity, ‘Sherpa’ refers to a crucial occupation in the trekking industry.i Their privileged position in Nepal’s international tourist industry is related to their common reputation. Their collective use of identity seems to help them getting access to an economic niche, and work in tourism seems to be an aspect of being Sherpa. Thus, an individual that operates in the tourist market does not only manage material assets but also identity assets to maintain the Sherpa reputation. Consequently, one can expect it to be a collective concern to husband their image, ie to control each member’s behaviour which could affect the Sherpa image. This article on Sherpa identity in encounters with outsiders analyses Sherpaness as a manageable resource that constitutes a collectively sanctioned commons. My point of departure is Barth’s analysis of ethnic boundary dynamics (1969, 1994 combined with Bourdieu’s concept of ‘capital’ and Hardin’s perspective on commons.DOI: 10.3126/dsaj.v1i0.288Dhaulagiri Vol.1 (2005 pp.176-192

  10. Identity and the Management Project

    DEFF Research Database (Denmark)

    Jørgensen, Kenneth Mølbjerg; Dehlin, Erlend

    and family resemblance. As such, managing identity in organizations is closely linked to rules and family resemblance. Organizations manage identity through the definition of norms and values for right or wrong, appropriate or inappropriate, to name but a few. Norms and values are important as reference...

  11. Identity work and identity regulation in managers' personal development training

    OpenAIRE

    Andersson, Thomas

    2008-01-01

    This article describes the role of personal development training in managers’ identity processes. Personal development training constitutes a local management discourse, which can influence both identity work and identity regulation processes. The study emphasizes the importance of personal life stories in understanding how managers are influenced by personal development training. The training provokes different processes of identity work and identity regulation, and managers actively work wi...

  12. Identity, Diversity and Diversity Management

    DEFF Research Database (Denmark)

    Holck, Lotte; Muhr, Sara Louise; Villeseche, Florence

    2016-01-01

    – The work can encourage policy makers, diversity and HR managers to question their own practices and assumptions leading to more theoretical informed diversity management practices. Originality/value – The theoretical connections between identity and diversity literature have so far not been reviewed...... systematically. The work foregrounds how important it is for diversity scholars to consider identity underpinnings of diversity research to help further develop the field within and beyond the three streams the authors discuss.......The purpose of this paper is to examine the relationship between the identity and diversity literatures and discuss how a better understanding of the theoretical connections between the two informs both diversity research and diversity management practices. Design/methodology/approach – Literature...

  13. 6 Keys to Identity Management

    Science.gov (United States)

    Shoham, Idan

    2011-01-01

    An Identity and Access Management (IAM) project on campus can feel like a Sisyphean task: Just when access rights have finally been sorted out, the semester ends--and users change roles, leave campus, or require new processes. IT departments face a constantly changing technical landscape: (1) integrating new applications and retiring old ones; (2)…

  14. Identity Management in University System

    OpenAIRE

    Emanuil REDNIC; Manole VELICANU

    2008-01-01

    The Identity Management became to be a real and important problem for distributed environments. First off all the access to distributed resources, the distributed communication, virtual workspaces, virtual repositories influence in developing this field of security. How this all started? How this can be implemented? How this can be maintained in a distributed environment?

  15. Identity Management in Agent Systems

    NARCIS (Netherlands)

    Brazier, F.M.T.; Groot, de D.R.A.

    2006-01-01

    If agent-based applications are to be used in large scale, open environments, security is a main issue; digital identity management (DIDM) an essential element. DIDM is needed to be able to determine the rights and obligations of the four main

  16. integrated identity and integrated identity and access management ...

    African Journals Online (AJOL)

    eobe

    a fingerprint biometric database that centrally manages students' identity, course .... widening use, motivated the use of biometrics ... System and Examination Screening and Attendance ... of each person's entry into examination/lecture halls,.

  17. Managing conflicts through strength of identity

    OpenAIRE

    Mayer, Claude-Hélène

    2009-01-01

    Identity, in management sciences, comprises a newly popular research topic. This article assesses identity aspects based on intra- and inter-personal constructs, as well as conflict and the management thereof in a selected international automotive organization in South Africa. It introduces the recent theoretical research and presents selected qualitative research findings from a case study. The aim of this article, therefore, is to investigate managerial identity aspects, as well as their st...

  18. Parallel Exploration of Interaction Space by BioID and Affinity Purification Coupled to Mass Spectrometry.

    Science.gov (United States)

    Hesketh, Geoffrey G; Youn, Ji-Young; Samavarchi-Tehrani, Payman; Raught, Brian; Gingras, Anne-Claude

    2017-01-01

    Complete understanding of cellular function requires knowledge of the composition and dynamics of protein interaction networks, the importance of which spans all molecular cell biology fields. Mass spectrometry-based proteomics approaches are instrumental in this process, with affinity purification coupled to mass spectrometry (AP-MS) now widely used for defining interaction landscapes. Traditional AP-MS methods are well suited to providing information regarding the temporal aspects of soluble protein-protein interactions, but the requirement to maintain protein-protein interactions during cell lysis and AP means that both weak-affinity interactions and spatial information is lost. A more recently developed method called BioID employs the expression of bait proteins fused to a nonspecific biotin ligase, BirA*, that induces in vivo biotinylation of proximal proteins. Coupling this method to biotin affinity enrichment and mass spectrometry negates many of the solubility and interaction strength issues inherent in traditional AP-MS methods, and provides unparalleled spatial context for protein interactions. Here we describe the parallel implementation of both BioID and FLAG AP-MS allowing simultaneous exploration of both spatial and temporal aspects of protein interaction networks.

  19. Architectural mismatch issues in identity management deployment

    DEFF Research Database (Denmark)

    Andersen, Mads Schaarup

    2010-01-01

    Integrating Commercial Off-The-Shelf products in a company's software product portfolio offers business value, but introduces challenges from a software architecture perspective. In this paper, the research challenges in relation to identity management in the Danish municipality administration...... system called Opus, are outlined. Opus BRS is the identity management part of Opus. Opus integrates SAP, legacy mainframe systems, and other third party systems of the individual municipality. Each of these systems define their own software architecture and access control model, leading to architectural...... mismatch with an impact on security, usability, and maintainability. The research project is discussed and access control and identity provisioning are recognized as the major areas of interest in relation to the mismatch challenges. The project is carried out in close cooperation with KMD, one...

  20. Identity management key to successful mergers

    NARCIS (Netherlands)

    S.R. Giessner (Steffen)

    2011-01-01

    textabstractAlienated employees who feel a loss of identity could place financial and strategic objectives of a merger at risk through lack of drive, reduced performance, and even sabotage. Identifying and managing these issues from the start could therefore be critical to the success of such undert

  1. Federated Identity Management for Research Collaborations

    CERN Document Server

    Broeder, Daan; Kelsey, David; Kershaw, Philip; Lüders, Stefan; Lyall, Andrew; Nyrönen, Tommi; Wartel, Romain; Weyer, Heinz J

    2012-01-01

    Federated identity management (FIM) is an arrangement that can be made among multiple organisations that lets subscribers use the same identification data to obtain access to the secured resources of all organisations in the group. Identity federation offers economic advantages, as well as convenience, to organisations and their users. For example, multiple institutions can share a single application, with resultant cost savings and consolidation of resources. In order for FIM to be effective, the partners must have a sense of mutual trust. A number of laboratories including national and regional research organizations are facing the challenge of a deluge of scientific data that needs to be accessed by expanding user bases in dynamic collaborations that cross organisational and national boundaries. Driven by these needs, representatives from a variety of research communities, including photon/neutron facilities, social science & humanities, high-energy physics, atmospheric science, bioinformatics and fusi...

  2. Identity Management Framework for Internet of Things

    DEFF Research Database (Denmark)

    Mahalle, Parikshit N.

    . This broader scope of interactions enhances the need to extend current Identity Management (IdM) models to include how users interact with devices as well as devices interact with other devices. Users interact with their devices and consume services in IoT through verified identity. In IoT, this concept...... that are public can be part of the personal space of multiple users at the same time. Secure interaction in and with IoT, secure data management and exchange, authentication, distributed access control and IdM of the devices are the main challenges. The work carried out in the scope of this thesis addresses...... important areas of IdM by identifying unsolved problems and proposing novel techniques to solve these problems. The goal is to propose methods for efficient and effective IdM in order to achieve authentication, access control and trust management of the things or devices in IoT. The goal is also to propose...

  3. Comparing Identity Management Frameworks in a Business Context

    Science.gov (United States)

    Hoepman, Jaap-Henk; Joosten, Rieks; Siljee, Johanneke

    Several frameworks for identity management exist, each of them with its own distinguishing features. These frameworks are complex however, and their features not easily understood. This makes it hard for businesses to understand the intricacies, and difficult to select and deploy one. This paper develops business selection criteria and applies them to four popular identity management frameworks. The resulting score card (1) helps businesses to select and deploy an identity management system, and (2) provides valuable feedback to developers of identity management systems on the criteria that they should take into account when designing and implementing an identity management system that is useful for specific businesses.

  4. Corporate identity: The concept, its measurement and management

    NARCIS (Netherlands)

    C.B.M. van Riel (Cees); J.M.T. Balmer (John)

    1997-01-01

    textabstractArticulates the main trends in the literature on corporate identity; defines corporate identity; explains the rationale for corporate identity management and describes the main methods used to reveal the desired and the actual corporate identity. Particular reference will be made to two

  5. Corporate identity: The concept, its measurement and management

    NARCIS (Netherlands)

    C.B.M. van Riel (Cees); J.M.T. Balmer (John)

    1997-01-01

    textabstractArticulates the main trends in the literature on corporate identity; defines corporate identity; explains the rationale for corporate identity management and describes the main methods used to reveal the desired and the actual corporate identity. Particular reference will be made to two

  6. Corporate identity: The concept, its measurement and management

    OpenAIRE

    Riel, Cees; Balmer, John

    1997-01-01

    textabstractArticulates the main trends in the literature on corporate identity; defines corporate identity; explains the rationale for corporate identity management and describes the main methods used to reveal the desired and the actual corporate identity. Particular reference will be made to two recently developed models used to reveal an organization's identity: Balmer's Affinity Audit (BAA) and The Rotterdam Organizational Identification Test (ROIT). Concludes that while empirical resear...

  7. PKI in Government Identity Management Systems

    CERN Document Server

    Al-Khouri, Ali M

    2011-01-01

    The purpose of this article is to provide an overview of the PKI project initiated part of the UAE national ID card program. It primarily shows the operational model of the PKI implementation that is indented to integrate the federal government identity management infrastructure with e-government initiatives owners in the country. It also explicates the agreed structure of the major components in relation to key stakeholders; represented by federal and local e-government authorities, financial institutions, and other organizations in both public and private sectors. The content of this article is believed to clarify some of the misconceptions about PKI implementation in national ID schemes, and explain how the project is envisaged to encourage the diffusion of e-government services in the United Arab Emirates. The study concludes that governments in the Middle East region have the trust in PKI technology to support their e-government services and expanding outreach and population trust, if of course accompani...

  8. Identity And Access Management e Federazione

    Directory of Open Access Journals (Sweden)

    Virginia Calabritto

    2012-07-01

    Full Text Available ItLa rete telematica è in costante crescita e così i servizi online che, in modo sempre più penetrante, rappresentano un aspetto della nostra quotidianità. I servizi in rete si distinguono in servizi ad accesso libero e servizi ad accesso controllato. Ogni giorno studenti, ricercatori e docenti accedono a contenuti e servizi (risorse ad accesso controllato con modalità diverse, la più diffusa è l'utilizzo dell‘informazione utenza/password, informazione diversa per ciascuna risorsa. Da questo punto di vista l’ampia disponibilità di risorse in rete crea all’utente, ma non solo a lui, diversi problemi, non ultimo quello della memorizzazione di un numero sempre più ampio di coppie utenza/password.L’articolo è teso ad illustrare, nel dettaglio, scenario e problematiche per passare quindi ad accennare alle tecnologie che possono costituire una soluzione, ovvero, l'Identity Management, il Single Sign On e le federazioni di infrastrutture di autenticazione e autorizzazione e, quindi, a degli esempi tra cui IDEM, la prima federazione italiana di Infrastrutture di Autenticazione e Autorizzazione, che coinvolge gli enti della comunità scientifica ed accademica e i fornitori di servizi.EnThe Internet is constantly growing, therefore on-line services, are becoming part of our daily life in a more and more pervasive manner. The network services are divided into two types of access: free access and controlled access. Every day students, researchers and teachers access content and services (resources through controlled access using different modes, e.g using user / password information which is different for each resource. From this perspective, the large availability of networked resources generates many problems for the users, last but not least the inconvenience of storing an increasing number of user / password.The article aims to illustrate, in detail, the context and the problems related to the management of a digital identiy in the

  9. PKI in Government Identity Management Systems

    Directory of Open Access Journals (Sweden)

    Ali M. Al-Khouri

    2011-05-01

    Full Text Available The purpose of this article is to provide an overview of the PKI project initiated part of the UAE national ID card program. It primarily shows the operational model of the PKI implementation that is indented to integrate the federal government identity management infrastructure with e-government initiatives owners in the country. It also explicates the agreed structure of the major components in relation to key stakeholders; represented by federal and local e-government authorities, financial institutions, and other organizations in both public and private sectors. The content of this article is believed to clarify some of the misconceptions about PKI implementation in national ID schemes, and explain how the project is envisaged to encourage the diffusion of e-government services in the United Arab Emirates. The study concludes that governments in the Middle East region have the trust in PKI technology to support theire-government services and expanding outreach and population trust, if of course accompanied by comprehensive digital laws and policies.

  10. Organizational Identity and Culture in the Context of Managed Change

    DEFF Research Database (Denmark)

    Hatch, Mary Jo; Schultz, Majken; Skov, Anne-Marie

    2015-01-01

    This article presents top and middle managers’ experiences and understandings of how organizational identity and culture were entangled with transformational change as it unfolded over a 5-year period in Carlsberg Group. Combining ethnography and grounded theory methods with engaged scholarship...... their organization’s identity led middle managers and employees both to support and resist new organizational identity claims made by top management. Within these identity activation processes we found frequent references relating new identity claims to organizational culture. Further analysis of the data revealed......, our work sits between research and practice, speaking directly to the experience of managers at the same time that it researches both the content and processes of organizational identity and culture. The study shows that engaging in processes of reflecting, questioning, and debating about...

  11. The Identity Crisis. Security, Privacy and Usability Issues in Identity Management

    NARCIS (Netherlands)

    Alpár, G.; Hoepman, J.H.; Siljee, B.I.J.

    2011-01-01

    This paper studies the current "identity crisis" caused by the substantial security, privacy and usability shortcomings encountered in existing systems for identity management. Some of these issues are well known, while others are much less understood. This paper brings them together in a single,

  12. ISLAM AND MINORITIES: Managing Identity in Malaysia

    Directory of Open Access Journals (Sweden)

    Ahmad Suaedy

    2010-02-01

    Full Text Available The Malaysian general election in March 2008 raised an interesting and new phenomenon. For the first time since independence in 1957, the ruling alliance known as the National Front (Barisan Nasional, BN failed to secure two thirds of seats in parliament and lost control of five of Malaysia’s 13 states. This was due to the challenge presented by the new opposition alliance known as the Alternative Front (Barisan Alternatif, BA or the People’s Alliance (Pakatan Rakyat, PK which won more than 36% of seats in parliament and gained control of the five states. In the 2004 election, BN secured the largest ever percentage of seats in parliament with 91%. What is interesting is that it seems that this significant increase in support for the opposition is  due to their offer to change the way minorities and ethnicity is managed. They  propose a move from “Bumiputera Supremacy”, or affirmative action for the approximately 65% of “Bumiputera” Malaysians (the rest being largely of Chinese or Indian ethnicity, to “The People’s Supremacy”, which involves eradicating affirmative action based on ethnicity, basing it instead on need, for  instance need due to poverty. This would potentially increase the likelihood  of justice and equality for all ethnic or racial groups. This paper connects the phenomenon of change, as seen in the about turn in the results between the  2004 and 2008 elections, to the more global trend in which minorities are standing up to demand their rights in this era of globalization, and to the challenge multiculturalism presents to parts of the Muslim world such as Malaysia. Malaysia, a Muslim majority nation that has formally declared Islam the official state religion with Yang di-Pertuan Agong (the King as  Head of the State and symbol of Islam, is one example, though not necessarily  representative, of how Islam and Muslims manage minorities and identity or  multiculturalism within the process of globalization

  13. INTERPRETATION OF CORPORATE IDENTITY IN CONTEMPORARY WESTERN SOCIOLOGY OF MANAGEMENT

    Directory of Open Access Journals (Sweden)

    T. N. DUKHINA

    2016-01-01

    Full Text Available The article gives an interpretation of the concept of corporate identity from the perspective of Western sociology of management. The differences of values and norms, and the identity of the target component, discuss the role of identity as a strategic project of building corporate relationships. The analysis of the content of foreign scientists work on the role of corporate identity in the management of the organization, which is divided into three areas of research and interpretation of the phenomenon under study - functionalist, constructivist, poststructuralist. Corporate identity is interpreted as a resource or mechanism of its creation and reproduction. In considering approaches to the study of corporate identity in contemporary Western sociology and management and management knowledge, the author notes the theory of hidden and "non-intrusive control" in the organization, conducts its substantive analysis, refers to the concept of "coordinated supervision" as a new, postbureaucratic forms of control focuses on the teamwork, flexibility and innovation, departing from the strict hierarchical subordination and leading to a relative unanimity in values. The article notes that some researchers do not identify the notion of corporate and organizational identity, and that this difference in most cases occurs within the typology of identity on several levels and the allocation of the problem of "multiple identities". Corporate identity does not imply the conditions under which members of the organization fully identify themselves with the organization of both the regulator and the only socio-cultural group. The article shows that C.R. Scott, S.R. Corman, G. Cheney and identified four objectives for the identification of the source: the person, the working group, the organization and the profession. M. Pratt and P. Foreman in the existence of multiple identities see opportunities and threats. H.W. He and J.M.T. Balmer allocate identity levels

  14. Professional identity and role transitions in clinical managers.

    Science.gov (United States)

    Spehar, Ivan; Frich, Jan C; Kjekshus, Lars Erik

    2015-01-01

    The purpose of this paper is to investigate how clinicians' professional background influences their transition into the managerial role and identity as clinical managers. The authors interviewed and observed 30 clinicians in managerial positions in Norwegian hospitals. A central finding was that doctors experienced difficulties in reconciling the role as health professional with the role as manager. They maintained a health professional identity and reported to find meaning and satisfaction from clinical work. Doctors also emphasized clinical work as a way of gaining legitimacy and respect from medical colleagues. Nurses recounted a faster and more positive transition into the manager role, and were more fully engaged in the managerial aspects of the role. The authors advance that health care organizations need to focus on role, identity and need satisfaction when recruiting and developing clinicians to become clinical managers. The study suggests that the inclusion of aspects from identity and need satisfaction literature expands on and enriches the study of clinical managers.

  15. Strategies for managing impressions of racial identity in the workplace.

    Science.gov (United States)

    Roberts, Laura Morgan; Cha, Sandra E; Kim, Sung Soo

    2014-10-01

    This article deepens understanding of the workplace experiences of racial minorities by investigating racial identity-based impression management (RIM) by Asian American journalists. Racial centrality, directly or indirectly, predicted the use of 4 RIM strategies (avoidance, enhancement, affiliation, and racial humor). Professional centrality also predicted strategy use, which was related to life satisfaction and perceived career success. By shedding light on proactive strategies that individuals use to influence colleagues' impressions of their racial identity, we contribute to research on diversity in organizations, impression management, and racial identity. (PsycINFO Database Record (c) 2014 APA, all rights reserved).

  16. The Identity Crisis. Security, Privacy and Usability Issues in Identity Management

    CERN Document Server

    Alpár, Gergely; Siljee, Johanneke

    2011-01-01

    This paper studies the current "identity crisis" caused by the substantial security, privacy and usability shortcomings encountered in existing systems for identity management. Some of these issues are well known, while others are much less understood. This paper brings them together in a single, comprehensive study and proposes recommendations to resolve or to mitigate the problems. Some of these problems cannot be solved without substantial research and development effort.

  17. A Contextual Model for Identity Management (IdM) Interfaces

    Science.gov (United States)

    Fuller, Nathaniel J.

    2014-01-01

    The usability of Identity Management (IdM) systems is highly dependent upon design that simplifies the processes of identification, authentication, and authorization. Recent findings reveal two critical problems that degrade IdM usability: (1) unfeasible techniques for managing various digital identifiers, and (2) ambiguous security interfaces.…

  18. Research Management in Portugal: A Quest for Professional Identity

    Science.gov (United States)

    Trindade, Margarida; Agostinho, Marta

    2014-01-01

    Research managers at science-intensive institutions appear as a continuously evolving group of professionals whose identity is somewhat fragmented, even to themselves. In Portugal, specialized research manager roles have rapidly emerged over the last years alongside the development of a small but consolidated scientific system. In order to get an…

  19. African-American lesbian identity management and identity development in the context of family and community.

    Science.gov (United States)

    Miller, Shannon J

    2011-01-01

    Don't Ask, Don't Tell is gaining attention in family studies literature as a cultural specific context to understand lesbian, gay, and bisexual visibility in African-American families and communities. This policy suggests that sexual minorities are accepted within African-American families and communities as long as they do not label themselves or acknowledge publicly that they engage in same-sex relationships. The narratives of two African-American lesbians (aged 26 and 27 years) are chronicled in the present study to reveal their lesbian identity development, lesbian identity management, and how they defined and navigated Don't Ask, Don't Tell. They encountered challenges and successes in a quest to find communities that would embrace and affirm their multiple marginalized identities. Their stories are offered as a point of entry to further inquiry concerning African-American lesbian visibility and identity proclamation within African-American families and communities.

  20. CILogon: An Integrated Identity and Access Management Platform for Science

    Science.gov (United States)

    Basney, J.

    2016-12-01

    When scientists work together, they use web sites and other software to share their ideas and data. To ensure the integrity of their work, these systems require the scientists to log in and verify that they are part of the team working on a particular science problem. Too often, the identity and access verification process is a stumbling block for the scientists. Scientific research projects are forced to invest time and effort into developing and supporting Identity and Access Management (IAM) services, distracting them from the core goals of their research collaboration. CILogon provides an IAM platform that enables scientists to work together to meet their IAM needs more effectively so they can allocate more time and effort to their core mission of scientific research. The CILogon platform enables federated identity management and collaborative organization management. Federated identity management enables researchers to use their home organization identities to access cyberinfrastructure, rather than requiring yet another username and password to log on. Collaborative organization management enables research projects to define user groups for authorization to collaboration platforms (e.g., wikis, mailing lists, and domain applications). CILogon's IAM platform serves the unique needs of research collaborations, namely the need to dynamically form collaboration groups across organizations and countries, sharing access to data, instruments, compute clusters, and other resources to enable scientific discovery. CILogon provides a software-as-a-service platform to ease integration with cyberinfrastructure, while making all software components publicly available under open source licenses to enable re-use. Figure 1 illustrates the components and interfaces of this platform. CILogon has been operational since 2010 and has been used by over 7,000 researchers from more than 170 identity providers to access cyberinfrastructure including Globus, LIGO, Open Science Grid

  1. A Federated Digital Identity Management Approach for Business Processes

    Science.gov (United States)

    Bertino, Elisa; Ferrini, Rodolfo; Musci, Andrea; Paci, Federica; Steuer, Kevin J.

    Business processes have gained a lot of attention because of the pressing need for integrating existing resources and services to better fulfill customer needs. A key feature of business processes is that they are built from composable services, referred to as component services, that may belong to different domains. In such a context, flexible multi-domain identity management solutions are crucial for increased security and user-convenience. In particular, it is important that during the execution of a business process the component services be able to verify the identity of the client to check that it has the required permissions for accessing the services. To address the problem of multi-domain identity management, we propose a multi-factor identity attribute verification protocol for business processes that assures clients privacy and handles naming heterogeneity.

  2. Identity Management and Trust Services: Foundations for Cloud Computing

    Science.gov (United States)

    Suess, Jack; Morooney, Kevin

    2009-01-01

    Increasingly, IT organizations will move from providing IT services locally to becoming an integrator of IT services--some provided locally and others provided outside the institution. As a result, institutions must immediately begin to plan for shared services and must understand the essential role that identity management and trust services play…

  3. Privacy & federated authentication and identity management in the infoservice society

    NARCIS (Netherlands)

    Bodea, G.; Lieshout, M.J. van

    2008-01-01

    The paper examines some of the privacy issues related to forms of federated authentication and identity management (FAIM) employed in the delivery of electronic services (mainly of the government). The paper should be read as a merely exploratory exercise. It starts by defining briefly the context

  4. Privacy & federated authentication and identity management in the infoservice society

    NARCIS (Netherlands)

    Bodea, G.; Lieshout, M.J. van

    2007-01-01

    The paper examines some of the privacy issues related to forms of federated authentication and identity management (FAIM) employed in the delivery of electronic services (mainly of the government). The paper should be read as a merely exploratory exercise. It starts by defining briefly the context

  5. Managing identity: buying into the brand at work

    National Research Council Canada - National Science Library

    Crain, Marion

    2010-01-01

    ... with that of the firm, persuading employees to internalize the firm's brand so that they "live the brand" and react instinctively "on-brand." Identity-based brand management, the most aggressive and potentially effective of the internal branding programs, aims to induce employees to view their employment as a personal relationship akin to a family ti...

  6. Comparing Identity Management Frameworks in a Business Context

    NARCIS (Netherlands)

    Hoepman, H.J.; Joosten, H.J.M.; Siljee, J.

    2009-01-01

    Several frameworks for identity management exist, each of them with its own distinguishing features. These frameworks are complex however, and their features not easily understood. This makes it hard for businesses to understand the intricacies, and difficult to select and deploy one. This paper dev

  7. Qualitative Study on the Identity of the Manager in Romania

    Directory of Open Access Journals (Sweden)

    FLORENTINA SCÂRNECI

    2011-01-01

    Full Text Available The article presents the results of a qualitative research project carried out in 2008, which aimed at identifying the identity condition of managers in Romania. The article presents part of the grounded theory on the identity of managers: the day to day circumstances in which they live - issues related to childhood and maturity (material situation, relationships, family, etc.. Also, it describes in brief the methodology applied: qualitative collection of data, theoretical sampling, theoretical saturation and the analysis of qualitative data obtained.The article presents, also in brief, the larger research framework wherefrom the presented part was extracted. The conclusion is that there are life-related issues specific to managers (and, more precisely, specific reactions to the environment and that their identification can form the basis for designing methods of managerial diagnosis and prognosis.

  8. A Reputation-Based Identity Management Model for Cloud Computing

    Directory of Open Access Journals (Sweden)

    Lifa Wu

    2015-01-01

    Full Text Available In the field of cloud computing, most research on identity management has concentrated on protecting user data. However, users typically leave a trail when they access cloud services, and the resulting user traceability can potentially lead to the leakage of sensitive user information. Meanwhile, malicious users can do harm to cloud providers through the use of pseudonyms. To solve these problems, we introduce a reputation mechanism and design a reputation-based identity management model for cloud computing. In the model, pseudonyms are generated based on a reputation signature so as to guarantee the untraceability of pseudonyms, and a mechanism that calculates user reputation is proposed, which helps cloud service providers to identify malicious users. Analysis verifies that the model can ensure that users access cloud services anonymously and that cloud providers assess the credibility of users effectively without violating user privacy.

  9. Patient privacy, consent, and identity management in health information exchange

    CERN Document Server

    Hosek, Susan D

    2013-01-01

    As a step toward improving its health information technology (IT) interoperability, the Military Health System is seeking to develop a research roadmap to better coordinate health IT research efforts, address IT capability gaps, and reduce programmatic risk for its enterprise projects. This report identifies gaps in research, policy, and practice involving patient privacy, consent, and identity management that need to be addressed to improve the quality and efficiency of care through health information exchange.

  10. Digital identity management system: strategy and design considerations

    OpenAIRE

    Coer, Matjaž

    2009-01-01

    Large companies are daily faced with new challenges in all areas. Many challenges come from information technology. In the recent past there is often a question of users identity and their management. There is an increasing number of applications and internet providers, users have their mailboxes and various access data. Usernames and passwords are easily accumulate which easily leads to confusion, forgotten user access, misuse and the result of all this is bad mood of employees and administr...

  11. Identity and access management business performance through connected intelligence

    CERN Document Server

    Osmanoglu, Ertem

    2013-01-01

    Identity and Access Management: Controlling Your Network provides you with a practical, in-depth walkthrough of how to plan, assess, design, and deploy IAM solutions. This book breaks down IAM into manageable components to ease systemwide implementation. The hands-on, end-to-end approach includes a proven step-by-step method for deploying IAM that has been used successfully in over 200 deployments. The book also provides reusable templates and source code examples in Java, XML, and SPML.Focuses on real-word implementations Provides end-to-end coverage of IAM from business drivers, requirements

  12. Management challenges in a case of gender identity disorder

    Directory of Open Access Journals (Sweden)

    Anubhav Rathi

    2014-01-01

    Full Text Available Gender identity disorder (GID is a complex disorder and can be defined as a group of disorders whose common feature is a strong and persistent preference for living as a person of the other sex. It is associated with significant impairment in social, occupational, interpersonal, and other areas of functioning. We describe the case of an adolescent, biologically male who was brought to our outpatient department primarily with symptoms of adjustment disorder with GID and the management provided. The role of a psychiatrist in the management, ethical and legal issues involved is also discussed.

  13. Valued identities and deficit identities: Wellness Recovery Action Planning and self-management in mental health.

    Science.gov (United States)

    Scott, Anne; Wilson, Lynere

    2011-03-01

    Wellness Recovery Action Planning (WRAP) is a self-management programme for people with mental illnesses developed by a mental health consumer, and rooted in the values of the 'recovery' movement. The WRAP is noteworthy for its construction of a health identity which is individualised, responsibilized, and grounded in an 'at risk' subjectivity; success with this programme requires development of an intensely focused health lifestyle. We draw on Bourdieu and Giddens to argue that what is being developed is a 'reflexive health habitus', which is not equally accessible to all social groups, and is in tension with WRAP's recovery-orientated aims. However, it is understandable that such a programme developed in mental health, because people with mental illness are highly stigmatized as 'a risk' and viewed as in need of risk management. By developing their own form of self-monitoring 'at risk' identity, mental health consumers are, paradoxically, able to construct themselves as ideal health citizens and no longer a risk, thus re-entering the moral community. We conclude by suggesting some changes to WRAP practice. © 2011 Blackwell Publishing Ltd.

  14. Identity Management Mismatch Challenges in the Danish Municipality Administration System

    DEFF Research Database (Denmark)

    Andersen, Mads Schaarup; Christensen, Henrik Bærbak

    2010-01-01

    Integrating a COTS product in a company’s product portfolio is appealing from a business perspective but highly challenging from the perspective of the software architecture. In this paper we outline research challenges regarding authorization in the identity management part of the Danish......, usability, as well as maintainability. We outline a three-year research project and discuss our research method that will include elements of action research as well as experiments using architectural prototyping. The project is carried out in cooperation with KMD, one of the largest Danish IT companies...

  15. OAuth 2.0 identity and access management patterns

    CERN Document Server

    Spasovski, Martin

    2013-01-01

    This is a practical and fast-paced guide that gives you all the information you need to start implementing secure OAuth 2.0 implementations in your web applications.OAuth 2.0 Identity and Access Management Patterns is intended for software developers, software architects, and enthusiasts working with the OAuth 2.0 framework.In order to learn and understand the OAuth 2.0 grant flow, it is assumed that you have some basic knowledge of HTTP communication. For the practical examples, basic knowledge of HTML templating, programming languages, and executing commands in the command line terminal is a

  16. Enterprise identity management towards an investment decision support approach

    CERN Document Server

    Royer, Denis

    2013-01-01

    ?The introduction of Enterprise Identity Management Systems (EIdMS) in organizations even beyond the purely technological level is a costly and challenging endeavor. However, for decision makers it seems difficult to fully understand the impacts and opportunities arising from the introduction of EIdMS. This book explores the relevant aspects for an ex-ante evaluation of EIdMS. Therefore it examines this domain by employing a qualitative expert interview study to better understand the nature of EIdMS, as they are situated between security and productive IT systems. To this regard, the focus is

  17. Working to Reduce the Effects of Discrimination: Identity Management Strategies in Organizations

    Science.gov (United States)

    Shih, Margaret; Young, Maia J.; Bucher, Amy

    2013-01-01

    Despite efforts to dispel discrimination, workplace discrimination still occurs. We introduce two classes of identity management strategies individuals use to mitigate the negative consequences of discrimination: identity switching (i.e., deemphasizing target identities and recategorizing to a more positively valued identity) and identity…

  18. Working to Reduce the Effects of Discrimination: Identity Management Strategies in Organizations

    Science.gov (United States)

    Shih, Margaret; Young, Maia J.; Bucher, Amy

    2013-01-01

    Despite efforts to dispel discrimination, workplace discrimination still occurs. We introduce two classes of identity management strategies individuals use to mitigate the negative consequences of discrimination: identity switching (i.e., deemphasizing target identities and recategorizing to a more positively valued identity) and identity…

  19. The social identity of hospital consultants as managers.

    Science.gov (United States)

    Russell, Vincent; Wyness, Laura A; McAuliffe, Eilish; Fellenz, Martin

    2010-01-01

    This paper aims to explore hospital consultants' social identification, in terms of perceptions of their position in society, the salient targets for their social identification and how this appears to influence their perceptions of management activities and change. A purposeful sample of 15 hospital consultants from a wide range of specialities and work locations in Ireland were recruited. Semi-structured, in-depth interviews were undertaken and thematic analysis was used to interpret the interview data. The paper finds that all interviewees perceived public attitudes towards hospital consultants, as a group, to be negative. Twelve interviewees derived most sense of belonging from group membership within their immediate work area. These groups seemed to represent sources of validation and esteem and enabled consultants to exercise control over their work. Many consultants, however, described a sense of detachment from their employing health boards. Management, as a salient target for social group identification, was perceived as associated with powerlessness and lack of respect. Interviewees generally viewed involvement in management with little enthusiasm and considerable caution. This paper shows that management approaches to hospital consultants could benefit from awareness that their social identity may already be under threat. Assaults on core professional values in the communication surrounding change are likely to provoke resistance. Existing work groups, with which consultants identify, could serve as a less threatening means to engage them with issues of cost and quality than externally imposed structures. This paper informs ways in which hospital consultants could be more successfully involved in health service management.

  20. Role-meanings as a critical factor in understanding doctor managers' identity work and different role identities.

    Science.gov (United States)

    Cascón-Pereira, Rosalía; Chillas, Shiona; Hallier, Jerry

    2016-12-01

    This study examines "identity work" among hybrid doctor-managers (DMs) in the Spanish National Health System to make sense of their managerial roles. In particular, the meanings underlying DMs experience of their hybrid role are investigated using a Grounded Theory methodology, exposing distinctions in role-meanings. Our findings provide evidence that using different social sources of comparison (senior managers or clinicians) to construct the meaning of managerial roles leads to different role-meanings and role identities, which are the source of the two established types of DM in the literature, the reluctant and the enthusiast. The contribution is twofold: our findings lead us to theorize DMs' identity work processes by adding an overlooked role-meaning dimension to identity work; and raise practical reflections for those who wish to develop enthusiast doctor managers. Copyright © 2016 Elsevier Ltd. All rights reserved.

  1. [Meanings attributed to management as an explanation for clinician managers' attitudes and professional identity].

    Science.gov (United States)

    Cascón-Pereira, Rosalía; Valverde, Mireia

    2014-01-01

    To understand the process by which clinician managers construct their professional identities and develop their attitudes toward managing. A qualitative study was performed, based on grounded theory, through in-depth interviews with 20 clinician managers selected through theoretical sampling in two public hospitals of Catalonia (Spain), participant observation, and documentation. Clinician managers' role meanings are constructed by comparing their roles with those of senior managers and clinicians. In this process, clinician managers seek to differentiate themselves from senior managers through the meanings constructed. In particular, they use proximity with reality and clinical knowledge as the main sources of differentiation. This study sheds light on why clinician managers develop adverse attitudes to managing and why they define themselves as clinicians rather than as managers. The explanation lies in the construction of the meanings they assign to managing as the basis of their attitudes to this role and professional identity. These findings have some practical implications for healthcare management. Copyright © 2014. Published by Elsevier Espana.

  2. Analysis of Privacy-Enhancing Identity Management Systems

    DEFF Research Database (Denmark)

    Adjei, Joseph K.; Olesen, Henning

    is an attempt to understand the relationship between individuals’ intentions to disclose personal information, their actual personal information disclosure behaviours, and how these can be leveraged to develop privacy-enhancing identity management systems (IDMS) that users can trust. Legal, regulatory......Privacy has become a major issue for policy makers. This has been impelled by the rapid development of technologies that facilitate collection, distribution, storage, and manipulation of personal information. Business organizations are finding new ways of leveraging the value derived from consumer...... information. On the other hand, consumers have expressed concerns that their rights and ability to control their personal information are violated. Paradoxically, it appears that users provide personal data freely and willingly, as it has been observed on Facebook and other social networks. This study...

  3. Single Thing Sign On Identity Management for Internet of Things

    DEFF Research Database (Denmark)

    Zdravkova, Vanya; Mihaylov, Mihail Rumenov; Mihovska, Albena Dimitrova

    2016-01-01

    —Within the context of heterogeneous Internet of Things (IoT) network driven by Machine-to-Machine (M2M) communications there is a need for a proper user identification and Identity Management (IdM) mechanisms which to involve all of the objects in the IoT. The paper addresses user identification...... by proposing Single Thing Sign On (STSO) IdM architecture for IoT, where the end-user is in the middle of a user-centered services ecosystem. The proposed scheme enables user recognition and services access only by identification of one of the “things” related to the user such as personal computing devices...

  4. Open source identity management patterns and practices using OpenAM 10.x

    CERN Document Server

    Kenning, Waylon

    2013-01-01

    This is a Packt Mini in a tutorial format that provides multiple examples on Identity Management using OpenAM 10.x.Open Source Identity Management Patterns and Practices Using OpenAM 10.x is great for developers and architects who are new to Identity Management, and who want a brief overview of what's possible and how to quickly implement a prototype. It's assumed that you've had experience with web applications and some knowledge of Apache and Tomcat.

  5. Searching for Extended Identity: The Problematised Role of Managing People Development, as Illuminated by the Frontline Management Initiative.

    Science.gov (United States)

    Barratt-Pugh, Llandis

    Australia's Frontline Management Initiative (FMI) marks a political move toward workplace learning and provides evidence concerning development of managing identities and management of such workplace learning. The FMI was examined as a technology of identity within the discourse of enterprise and an instrument of textualization of the workplace.…

  6. Identifying and Prioritizing Evaluation Criteria for User-Centric Digital Identity Management Systems

    Directory of Open Access Journals (Sweden)

    Sepideh Banihashemi

    2016-07-01

    Full Text Available Identity Management systems are used for securing digital identity of users in reliable, automated and compatible way. Service providers employ identity management systems which are cost effective and scalable but cause poor usability for users. Identity management systems are user-centric applications which should be designed by considering users’ perspective. User centricity is a remarkable concept in identity management systems as it provides more powerful user control and privacy. This approach has been evolved from amending past paradigms. Thus, evaluation of digital identity management systems based on users’ point of view, is really important. The main objective of this paper is to identify the appropriateness of the criteria used in evaluation of user-centric digital identity management systems. These criteria are gathered from the literature and then categorized into four groups for the first time in this work to examine the importance of each parameter. In this approach, several interviews were performed as a qualitative research method and two questionnaires have been filled out by forty six users who were involved with identity management systems. Since the answers are perception based data the most important criteria in each category are assessed by using fuzzy method. This research found that the most important criteria are related to security category. The results of this research can provide valuable information for managers and decision makers of hosting companies as well as system designers to adapt and develop appropriate user-centric digital identity management systems.

  7. The importance of corporate brand identity in business management: An application to the UK banking sector

    Directory of Open Access Journals (Sweden)

    Isabel Buil

    2016-01-01

    Full Text Available Corporate brand identity management is a key issue for any organisation. Accordingly, its study is a research field of great interest. This paper seeks to broaden the understanding of this strategic activity and its effects. Specifically, it investigates the concept of corporate brand identity from the employees’ perspective in the UK financial banking sector and analyses the link between brand identity management and employees’ attitudes and behaviours. Results indicate that organisations should pay special attention to the corporate brand identity management, given its influence on employees’ commitment with their organisations, as well as their brand performance and satisfaction.

  8. Identity management for e-government Libya as a case study

    DEFF Research Database (Denmark)

    Elaswad, Othoman; Jensen, Christian Damsgaard

    2016-01-01

    Governments are strengthening their identity (ID) management strategies to deliver new and improved online services to their citizens. Such online services typically include applications for different types of permissions, requests for different types of official documents and management of diffe...

  9. Walking the tightrope: Constructing gender and professional identities in account management

    NARCIS (Netherlands)

    Gremmen, C.C.M.; Benschop, Y.W.M.

    2009-01-01

    This paper contributes to the growing stream of organization research that explores the relationship between professional identities and gender. Our central question pertains to how account managers ‘do gender’ in constructing their professional identities. While account management has been consider

  10. Building trusted national identity management systems: Presenting the privacy concern-trust (PCT) model

    DEFF Research Database (Denmark)

    Adjei, Joseph K.; Olesen, Henning

    This paper discusses the effect of trust and information privacy concerns on citizens’ attitude towards national identity management systems. We introduce the privacyconcerns- trust model, which shows the role of trust in mediating and moderating citizens’ attitude towards identity management...... encouraging further institutional collaboration and acceptance of citizens’ informational self-determination....

  11. Social and psychological creativity in gay male midlife identity management.

    Science.gov (United States)

    Hajek, Christopher

    2016-06-01

    This study utilizes a qualitative thematic analysis methodology and a social identity theory framework to explore ways in which early midlife gay men report enhancing their social identities through social and psychological creativity. Face-to-face, semi-structured interviews were conducted with forty early midlife gay men (aged 40-53) in four US cities. Men discussed the collective and individual essences of their age and gay identities, including attitudes, beliefs, and behaviours that they embraced to self-enhance at midlife. These discussions emphasized differences from the younger gay outgroup, often in the context of intergenerational interaction. Identified were three strategies (and seven substrategies) that summarized the ways that interviewees constructed their identities in the interest of self-enhancement, specifically in the context of intergenerational comparisons with younger gay men. These strategies may be considered as extensions to social creativity strategies presented in Tajfel and Turner's (Psychology of intergroup relations. Chicago, IL: Nelson, 1986: 7) social identity theory.

  12. A framework for implementation of user-centric identity management systems

    DEFF Research Database (Denmark)

    Adjei, Joseph K.; Olesen, Henning

    2010-01-01

    -ernments in many countries are implementing identity man-agement systems (IdMS) to curtail these incidences and to offer citizens the power to exercise informational self-determination. Using concepts from technology adoption and fit-viability theo-ries as well as the laws of identity, this paper analyzes...

  13. The Effects of Virtual Communities on Group Identity in Classroom Management

    Science.gov (United States)

    Ho, Tu-Kuang; Lin, Yu-Tzeng

    2016-01-01

    Group identity is a critical component in developing effective classroom management. While there have been numerous studies on group identity, they have primarily focused on its effects on the physical classroom entity. Advances in information technology, however, have enabled the creation of virtual communities, which have become a vital channel…

  14. The Effects of Virtual Communities on Group Identity in Classroom Management

    Science.gov (United States)

    Ho, Tu-Kuang; Lin, Yu-Tzeng

    2016-01-01

    Group identity is a critical component in developing effective classroom management. While there have been numerous studies on group identity, they have primarily focused on its effects on the physical classroom entity. Advances in information technology, however, have enabled the creation of virtual communities, which have become a vital channel…

  15. Object Classification based Context Management for Identity Management in Internet of Things

    OpenAIRE

    Mahalle, Parikshit N.; Prasad, Neeli R.; Prasad, Ramjee

    2013-01-01

    As computing technology is becoming more tightly coupled into dynamic and mobile world of the Internet of Things (IoT), security mechanism is more stringent, flexible and less intrusive. Scalability issue in IoT makes identity management (IdM) of ubiquitous objects more challenging, and there is a need of context-aware access control solution for IdM. Confronting uncertainty of different types of objects in IoT is not easy. This paper presents the logical framework for object classification i...

  16. Forest management in a Pukhtun community : the Constructions of Identities

    NARCIS (Netherlands)

    Southwold-Llewellyn, S.

    2006-01-01

    Description: How do we recognize and understand the interactions between nature, nationness, and nationalism? How is nature appropriated by politics when asserting identity, interests, and rights? Drawing from South Asia¿s varying regions, the essays in this pathbreaking volume answer such

  17. Forest management in a Pukhtun community : the Constructions of Identities

    NARCIS (Netherlands)

    Southwold-Llewellyn, S.

    2006-01-01

    Description: How do we recognize and understand the interactions between nature, nationness, and nationalism? How is nature appropriated by politics when asserting identity, interests, and rights? Drawing from South Asia¿s varying regions, the essays in this pathbreaking volume answer such questions

  18. "Managing by Not Managing": How Gay Engineering Students Manage Sexual Orientation Identity

    Science.gov (United States)

    Hughes, Bryce E.

    2017-01-01

    From a social constructivist paradigm I explored the experiences of 7 openly gay engineering students to understand how, if at all, they made sense of the intersections between their engineering and sexual orientation identities. By eliciting stories through individual and focus group interviews, a narrative approach allowed me to capture the…

  19. Management strategies to harness cultural diversity in Australian construction sites - a social identity perspective

    Directory of Open Access Journals (Sweden)

    Martin Loosemore

    2012-02-01

    Full Text Available Construction sites around the world employ large numbers of people from diverse cultural backgrounds. The effective management of this cultural diversity has important implications for the productivity, safety, health and welfare of construction workers and for the performance and reputation of firms which employ them. The findings of a three year, multi-staged study of cultural diversity management practices on construction sites are critiqued using social identity theory. This reveals that so called “best-practice” diversity management strategies may have an opposite effect to that intended. It is concluded that the management of diversity on construction projects would benefit from being informed by social identity research.

  20. Identity Management and Mental Health Discourse in Social Media.

    Science.gov (United States)

    Pavalanathan, Umashanthi; De Choudhury, Munmun

    2015-05-01

    Social media is increasingly being adopted in health discourse. We examine the role played by identity in supporting discourse on socially stigmatized conditions. Specifically, we focus on mental health communities on reddit. We investigate the characteristics of mental health discourse manifested through reddit's characteristic 'throwaway' accounts, which are used as proxies of anonymity. For the purpose, we propose affective, cognitive, social, and linguistic style measures, drawing from literature in psychology. We observe that mental health discourse from throwaways is considerably disinhibiting and exhibits increased negativity, cognitive bias and self-attentional focus, and lowered self-esteem. Throwaways also seem to be six times more prevalent as an identity choice on mental health forums, compared to other reddit communities. We discuss the implications of our work in guiding mental health interventions, and in the design of online communities that can better cater to the needs of vulnerable populations. We conclude with thoughts on the role of identity manifestation on social media in behavioral therapy.

  1. Identity Management and Mental Health Discourse in Social Media

    Science.gov (United States)

    Pavalanathan, Umashanthi; De Choudhury, Munmun

    2015-01-01

    Social media is increasingly being adopted in health discourse. We examine the role played by identity in supporting discourse on socially stigmatized conditions. Specifically, we focus on mental health communities on reddit. We investigate the characteristics of mental health discourse manifested through reddit's characteristic ‘throwaway’ accounts, which are used as proxies of anonymity. For the purpose, we propose affective, cognitive, social, and linguistic style measures, drawing from literature in psychology. We observe that mental health discourse from throwaways is considerably disinhibiting and exhibits increased negativity, cognitive bias and self-attentional focus, and lowered self-esteem. Throwaways also seem to be six times more prevalent as an identity choice on mental health forums, compared to other reddit communities. We discuss the implications of our work in guiding mental health interventions, and in the design of online communities that can better cater to the needs of vulnerable populations. We conclude with thoughts on the role of identity manifestation on social media in behavioral therapy. PMID:27376158

  2. VET Manager Identities: Culture, Philosophy and Professional Practice

    Science.gov (United States)

    Foley, Annette

    2011-01-01

    Using a post-structural approach this article investigates the working lives of frontline managers in VET and how they negotiate change in their day to day practices and decision making. The article is organised around accounts made by managers from different types of Vocational Education and Training (VET) organisations, namely: Technical and…

  3. VET Manager Identities: Culture, Philosophy and Professional Practice

    Science.gov (United States)

    Foley, Annette

    2011-01-01

    Using a post-structural approach this article investigates the working lives of frontline managers in VET and how they negotiate change in their day to day practices and decision making. The article is organised around accounts made by managers from different types of Vocational Education and Training (VET) organisations, namely: Technical and…

  4. Efficient identity management and access control in cloud environment

    Science.gov (United States)

    Gloster, Jonathan

    2013-05-01

    As more enterprises are enticed to move data to a cloud environment to enhance data sharing and reduce operating costs by exploiting shared resources, concerns have risen over the ability to secure information within the cloud. This paper examines how a traditional Identity and Access Control (IDAM) architecture can be adapted to address security concerns of a cloud environment. We propose changing the paradigm of IDAM form a pure trust model to a risk based model will enable information to be protected securely in a cloud environment without impacting efficiencies of cloud environments.

  5. Collective identity and resilience in the management of common pool resources

    Directory of Open Access Journals (Sweden)

    Alfons W. Mosimane

    2012-08-01

    Full Text Available Effective management of common pool resources through collective action is dependent upon the efforts of the resources users to establish an identity that is held collectively. It is widely accepted that the term common pool resources implies a resource that is common to a ‘pool’ of people, the resource users. Their interests in the resource connect users and potential users, and we propose that the more strongly they identify with the resources and commit to act collectively, the stronger the collective action. Achieving sustainable use of common pool resources is thus determined by the interplay between collective identity and collective action. But collective identity as defined by the resource and its users is dynamic, making the identity vulnerable in directing the behaviour of users. In this paper, we draw on collective identity and resilience theories to develop a framework for exploring the role of collective identity in understanding collective action in the management of common pool resources. We suggest that two key attributes of collective identity – identification and affective commitment, provide the premise for interpreting, tracking and directing change in collective identity. We interpret how the interactions between the two attributes contribute to resilience of common pool resources as complex social-ecological systems.

  6. Managing Quality, Identity and Adversaries in Public Discourse with Machine Learning

    Science.gov (United States)

    Brennan, Michael

    2012-01-01

    Automation can mitigate issues when scaling and managing quality and identity in public discourse on the web. Discourse needs to be curated and filtered. Anonymous speech has to be supported while handling adversaries. Reliance on human curators or analysts does not scale and content can be missed. These scaling and management issues include the…

  7. Managing Quality, Identity and Adversaries in Public Discourse with Machine Learning

    Science.gov (United States)

    Brennan, Michael

    2012-01-01

    Automation can mitigate issues when scaling and managing quality and identity in public discourse on the web. Discourse needs to be curated and filtered. Anonymous speech has to be supported while handling adversaries. Reliance on human curators or analysts does not scale and content can be missed. These scaling and management issues include the…

  8. Object Classification based Context Management for Identity Management in Internet of Things

    DEFF Research Database (Denmark)

    Mahalle, Parikshit N.; Prasad, Neeli R.; Prasad, Ramjee

    2013-01-01

    , and there is a need of context-aware access control solution for IdM. Confronting uncertainty of different types of objects in IoT is not easy. This paper presents the logical framework for object classification in context aware IoT, as richer contextual information creates an impact on the access control. This paper......As computing technology is becoming more tightly coupled into dynamic and mobile world of the Internet of Things (IoT), security mechanism is more stringent, flexible and less intrusive. Scalability issue in IoT makes identity management (IdM) of ubiquitous objects more challenging....... This paper also presents proof of concept and time analysis of the proposed decision theory based object classification....

  9. Analysing Power Consumption Of Different Browsers & Identity Management Systems In Mobile Phones

    Directory of Open Access Journals (Sweden)

    Md. Sadek Ferdous

    2012-04-01

    Full Text Available Currently there are many different Identity Management Systems which differ in their architectures as well as use different protocols and serve different purposes and are extensively used by organisations to provide online services. With the remarkable growth of mobile phones in the last few years, both in number and computational power, more and more users are accessing an array of online services using their mobile phones. One of the major concerns for the user of mobile phones is the battery life which is limited and tends to run out quickly. Hence, efficiency in power consumption is a crucial factor for any system when it is accessed using a mobile phone. In this paper, we analyse the efficiency, in terms ofpower consumption, of different browsers in mobile phones and different Identity Management Systems when the mobile phones are used to access online services protected by those Identity Management Systems.

  10. A Case for Implementation of Citizen Centric National Identity Management Systems

    DEFF Research Database (Denmark)

    Adjei, Joseph K.

    of national IdMS, using a qualitative case study research approach. Empirical data were gathered in Ghana through a combination of quasi-statistical survey and problem structuring methodology. The study shows that effective IdMS depend on efficient civil registration systems, user involvement......Commercial transactions and social interactions increasingly rely on effective exchange of personal identity information, which has become an integral part of modern business models. However, the use of personal information raises societal concerns about security and privacy, as well as the level...... of trust in transacting parties. Policy makers are therefore trying to implement identity policies to prevent identity abuses, promote the seamless flow of business transactions, and provide citizens the ability to exercise informational self-determination. Previously, the design of identity management...

  11. Identity's identities

    DEFF Research Database (Denmark)

    Jensen, Kim Ebensgaard

    in Academic English and more everyday-based English, identity as a lexeme is definitely worth having a look at. This paper presents a lexicological study of identity in which some of its senses are identified and their behaviors in actual discourse are observed. Drawing on data from the 2011 section...... of the Corpus of Contemporary American English, a behavioral profile of the distributional characteristics of identity is set up. Behavioral profiling is a lexicographical method developed by the corpus linguist Stefan Th. Gries which, by applying semantic ID tagging and statistical analysis, provides a fine......-grained insight into the semantic affinities of one or more lexemes. The main premise is that the semantic properties of a linguistic unit are reflected in its distributional characteristics, and, thus, by observing association patterns of a lexeme we can gain useful insights into its semantic affinities. Thus...

  12. Does identity shape leadership and management practice? Experiences of PHC facility managers in Cape Town, South Africa.

    Science.gov (United States)

    Daire, Judith; Gilson, Lucy

    2014-09-01

    In South Africa, as elsewhere, Primary Health Care (PHC) facilities are managed by professional nurses. Little is known about the dimensions and challenges of their job, or what influences their managerial practice. Drawing on leadership and organizational theory, this study explored what the job of being a PHC manager entails, and what factors influence their managerial practice. We specifically considered whether the appointment of professional nurses as facility managers leads to an identity transition, from nurse to manager. The overall intention was to generate ideas about how to support leadership development among PHC facility managers. Adopting case study methodology, the primary researcher facilitated in-depth discussions (about their personal history and managerial experiences) with eight participating facility managers from one geographical area. Other data were collected through in-depth interviews with key informants, document review and researcher field notes/journaling. Analysis involved data triangulation, respondent and peer review and cross-case analysis. The experiences show that the PHC facility manager's job is dominated by a range of tasks and procedures focused on clinical service management, but is expected to encompass action to address the population and public health needs of the surrounding community. Managing with and through others, and in a complex system, requiring self-management, are critical aspects of the job. A range of personal, professional and contextual factors influence managerial practice, including professional identity. The current largely facility-focused management practice reflects the strong nursing identity of managers and broader organizational influences. However, three of the eight managers appear to self-identify an emerging leadership identity and demonstrate related managerial practices. Nonetheless, there is currently limited support for an identity transition towards leadership in this context. Better

  13. Business identity, image and reputation: The integration of theoretical perspectives for a successful management

    Directory of Open Access Journals (Sweden)

    Andrea Pérez

    2014-05-01

    Full Text Available The corporate marketing perspective is a new paradigm which identifies the management of the business identity, image and reputation as an essential tool for the survival and success of companies. Accordingly, the correct understanding of these three concepts is a basic pre-requisite for the companies interested in managing their businesses in accordance to the latest marketing trends. Nonetheless, the proliferation of diverse approaches to the study of the identity, image and reputation hampers the generation of useful knowledge regarding these issues. In this paper, an integrative perspective is proposed to better understand the concepts and dimensions of the business identity, image and reputation. The theoretical review provided in the paper allows scholars and practitioners to better understand these three faces of the corporate marketing perspective.

  14. Management strategies to harness cultural diversity in Australian construction sites - a social identity perspective

    Directory of Open Access Journals (Sweden)

    Martin Loosemore

    2012-02-01

    Full Text Available  Construction sites around the world employ large numbers of people from diverse cultural backgrounds. The effective management of this cultural diversity has important implications for the productivity, safety, health and welfare of construction workers and for the performance and reputation of firms which employ them. The findings of a three year, multi-staged study of cultural diversity management practices on construction sites are critiqued using social identity theory. This reveals that so called “best-practice” diversity management strategies may have an opposite effect to that intended. It is concluded that the management of diversity on construction projects would benefit from being informed by social identity research. 

  15. When Social Identities Collide: Commentary on "Gender in the Management Education Classroom"

    Science.gov (United States)

    Patton, Eric

    2010-01-01

    This commentary to "Gender in the Management Education Classroom" (Bilimoria, O'Neil, Hopkins, & Murphy, 2010) employs social identity and self-categorization theory to analyze the incident described in the article. In any MBA classroom, students are dealing with multiple group memberships. Similar to workplace settings, when the focus is on…

  16. We're Decent People: Constructing and Managing Family Identity in Rural Workingclass Communities

    Science.gov (United States)

    Kiter Edwards, Margie L.

    2004-01-01

    Using grounded theory methodology, I establish family identity management as an important type of invisible work that connects women's household-based domestic activities with community members perceptions and treatment of them and their family members. Detailed observations of household routines and family interactions, as well as in-depth…

  17. Diversifying Academic and Professional Identities in Higher Education: Some Management Challenges

    Science.gov (United States)

    Whitchurch, Celia; Gordon, George

    2010-01-01

    This paper draws on an international study of the management challenges arising from diversifying academic and professional identities in higher education. These challenges include, for instance, the introduction of practice-based disciplines with different traditions such as health and social care, the changing aspirations and expectations of…

  18. Leadership, New Public Management and the Re-Modelling and Regulation of Teacher Identities

    Science.gov (United States)

    Hall, David; Gunter, Helen; Bragg, Joanna

    2013-01-01

    This article examines the rapidly shifting relationship between teachers and the state and efforts to re-model teacher identities within the wider context of public sector modernization and the New Public Management. The construction and development of officially authorized and normative discursive practices relating to leadership and the…

  19. Managing intangible assets: An essay on organising contemporary organisations based upon identity, competencies and networks

    NARCIS (Netherlands)

    Schoemaker, M.J.R.; Jonker, J.

    2005-01-01

    - Purpose – To develop a concept of managing intangible assets in contemporary organisations. Insight is given into the rise of the network organisation and the importance of talent, social capital and identity in this kind of organisation. - Design/methodology/approach – This paper develops a conce

  20. Academic Manager or Managed Academic? Academic Identity Schisms in Higher Education

    Science.gov (United States)

    Winter, Richard

    2009-01-01

    The relationship between values and academic identity has received scant attention in the higher education literature with some notable exceptions (Churchman, 2006; Harley, 2002; Henkel, 2005). This paper contends that the perceived need to align all academics around corporate values and goals has given rise to academic identity schisms in higher…

  1. Campus Single Sign-On und hochschulübergreifendes Identity Management

    Science.gov (United States)

    Hommel, Wolfgang

    Das im Rahmen von IntegraTUM für die TUM geschaffene Identity & Access Management System setzt das Paradigma unified login um, d. h. ein Benutzer kann alle für ihn relevanten Dienste innerhalb der Hochschule mit derselben Loginname-/Passwortkombination nutzen. Dieser Artikel zeigt, wie auf Basis der Software Shibboleth und der deutschlandweiten Hochschulföderation DFN-AAI als weitere Mehrwerte das campusweite web single sign-on und die nahtlose Nutzung zahlreicher externer Web-Anwendungen erreicht werden. Als Beispiel für die Abläufe bei der Erschließung neuer Dienste für die hochschulübergreifende Nutzung wird die Anbindung von Learning Management Systemen auf Basis des DFN-AAI E-Learning-Profils diskutiert. Den umfassenden Vorteilen werden schließlich die aktuellen technischen Grenzen bei der Umsetzung des hochschulübergreifenden Identity Management gegenübergestellt.

  2. The NSF Cybersecurity Center of Excellence: Translating Identity Management and Cybersecurity into Scientific Collaboration

    Science.gov (United States)

    Welch, V.

    2016-12-01

    Scientists care deeply about their collaborations: who is a member, who can access, produce, and correct data, and manager instruments critical to their science missions. The communities of cybersecurity and identity management professionals develop tools to support collaborations and the undertaking of trustworthy science, but there are large cultural and linguistic gaps between these communities and the scientists they service. The National Science Foundation has recently funded a NSF Cybersecurity Center of Excellence to help its community of projects by providing leadership and addressing the challenges of trustworthy science. A key goal of this NSF Center has been translating between the goals of the science community into requirements and risks understood by identity management and cybersecurity communities. This talk will give an update on the Center's efforts and other services it provides to the NSF community to bridge these cultures.

  3. Target-tracking and identity management algorithms for air traffic surveillance

    Science.gov (United States)

    Balakrishnan, Hamsa

    The air traffic control system of the United States is responsible for managing traffic in the National Airspace System; safety is a paramount concern. The air traffic surveillance network has the task of collecting and processing information on the positions, velocities and identities of the aircraft in the system, before presenting it to air traffic controllers to use in maintaining an orderly flow of traffic. This dissertation attempts to design techniques that provide controllers with high-fidelity information about the aircraft in their controlled airspace, using the observations of the air traffic surveillance network. We propose algorithms for the efficient tracking of aircraft, as well as for maintaining beliefs of their identities. Such methods would improve the processing of aircraft situation data, particularly in a congested airspace with general aviation. In this thesis, we propose an algorithmic framework for the simultaneous tracking and identity management of multiple maneuvering targets. We design an algorithm that efficiently tracks the positions, velocities, flight modes, and identities of multiple aircraft in cluttered environments. We tackle the challenges of data association, identity management and state estimation of aircraft trajectories by proposing a modification of the Joint Probabilistic Data Association algorithm, an algorithm based on identity-mass flow, and a state estimation algorithm for tracking hybrid systems, respectively. The identity of each aircraft, an essential feature of aircraft situation data, is often not available but needs to be inferred from radar observations, and maintained in terms of probabilities. We present an algorithm to update the probabilistic matrices that represent the belief of aircraft identities, in the presence of intermittent measurements. We demonstrate the performance of the framework using examples drawn from air traffic surveillance. We also consider the problem of identifying stochastic hybrid

  4. The Interaction of Control Systems and Stakeholder Networks in Shaping the Identities of Self-managed Teams

    DEFF Research Database (Denmark)

    Annosi, Maria Carmela; Foss, Nicolai Juul; Brunetta, Federica

    2017-01-01

    Team identity has received little research attention even though an increasing number of firms are moving to team-based organizations and there is evidence that teams form identities. We explore the extent to which team identity can be institutionalized as a central organizing principle of team......-based firms. We argue that managerial and stakeholder interventions shape the self-construction of team identity as well as the team’s commitment to specific work objectives. We also suggest that team identity becomes isomorphic to organizational identity because of pressures related to: (1) the presence...... of a dense network of managers and stakeholders, which orients teams towards a focus on certain aspects of the higher-order identity; (2) the use of team routines and regular feedback loops, which force alignment with the organizational identity; and (3) the use of coordinating roles aimed at promoting...

  5. Managing corporate identities of non-profit organisations in the social welfare sector

    Directory of Open Access Journals (Sweden)

    Lida Holtzhausen

    2013-01-01

    Full Text Available Present-day South Africa is characterised by many societal and developmental issues, such as HIV awareness and prevention, child-headed households, environmental protection, poverty alleviation, violence and victim aid. However, it is widely acknowledged that government alone cannot address these issues effectively. The role of non-profit organisations (NPOs in addressing social and development issues is increasingly emphasised. NPOs work at grass-roots level and they can therefore, on the whole, identify societal vulnerabilities and risks earlier than the government sector. However, due to the economic recession, NPOs operate in a competitive environment where an increasing number of NPOs rely on a small number of donors and other resources. NPOs should therefore differentiate themselves from the competition in order to obtain public legitimacy and funding. Corporate identity management is important for NPOs to fulfil their role in social welfare and thus contribute to disaster risk reduction. The exploratory nature of this study dictates a qualitative research approach. Semi-structured interviews with management of five NPOs in the social welfare sector were conducted in order to provide an answer to the study’s research question: ‘To what extent do NPOs in the social welfare sector practise corporate identity management, in order to prevent and address social welfare risks?’ The research found that NPOs do not realise the full potential of managing their corporate identities. NPOs therefore do not take advantage of a strong and distinct corporate identity which would allow them to ensure their ability to assess, address, reduce and/or alleviate vulnerabilities and disaster risks.

  6. User-centred and context-aware identity management in mobile ad-hoc networks

    CERN Document Server

    Arabo, Abdullahi

    2013-01-01

    The emergent notion of ubiquitous computing makes it possible for mobile devices to communicate and provide services via networks connected in an ad-hoc manner. These have resulted in the proliferation of wireless technologies such as Mobile Ad-hoc Networks (MANets), which offer attractive solutions for services that need flexible setup as well as dynamic and low cost wireless connectivity. However, the growing trend outlined above also raises serious concerns over Identity Management (IM) du...

  7. Identity management, negotiation and resistance among women in the sex trade in London, Ontario.

    Science.gov (United States)

    Orchard, Treena; Farr, Sara; Macphail, Susan; Wender, Cass; Young, Dawn

    2013-01-01

    Sex work, and ideas about women in the trade, have long been represented as tragic and/or threatening. However, such portrayals tell us very little about how women think about themselves and the kinds of work they do. The data for this paper come from an ethnographic, community-based study in London, Ontario, that involves women in street-based, indoor and transactional sex work. This discussion focuses on how women develop different individual identities, including the management of multiple selves, their sexual identities and what we have termed the 'good junkie' identity. We also examine how these women employ aspects of dominant representation of sex workers, namely the low status accorded to those in street-based work and the defamatory term 'whore' or 'ho', when negotiating the moral hierarchies that exist within various kinds of sex work (i.e., stripping, massage parlours) and making sense of their professional and personal lives. The work that goes into the creation and maintenance of the women's divergent identities sheds important light on this complicated and tremendously demanding, yet inadequately understood, aspect of life as women in the sex trade.

  8. Managing corporate visual identity: Use and effects of organizational measures to support a consistent self-presentation.

    NARCIS (Netherlands)

    van den Bosch, A.L.M.; de Jong, Menno D.T.; Elving, W.J.L.

    2004-01-01

    It is generally acknowledged that corporate visual identity (CVI) is an important element of identity, reputation, and relationship management. Academic research has focused strongly on the strategic and design aspects of CVI, and neglected the operational level. This article addresses one of the ma

  9. Managing corporate visual identity: Use and effects of organizational measures to support a consistent self-presentation.

    NARCIS (Netherlands)

    van den Bosch, A.L.M.; de Jong, Menno D.T.; Elving, W.J.L.

    2004-01-01

    It is generally acknowledged that corporate visual identity (CVI) is an important element of identity, reputation, and relationship management. Academic research has focused strongly on the strategic and design aspects of CVI, and neglected the operational level. This article addresses one of the

  10. Staying in the Hood: Black Lesbian and Transgender Women and Identity Management in North Philadelphia.

    Science.gov (United States)

    Brooks, Siobhan

    2016-12-01

    The concept Don't Ask, Don't Tell regarding Black LGBT sexuality in Black communities has been an acceptable form of identity management for Black LGBT people. In other words, Black LGBT people are accepted as long as they are not vocal about their sexuality. However, this is changing with the issue of gay marriage, which is creating a space where Black LGBT people are more open about their gender identity and sexuality in heterosexual Black spaces. This new form of openness allows Black LGBT people to "stay in" their communities, as opposed to coming out. In this article I examine how Black LGBT women in North Philadelphia stay in their communities: being politically active regarding LGBT issues, disengaging from LGBT issues, passing, and educating straight Black people about issues affecting the Black LGBT community. I conclude with implications of staying in and intersectionality among Black heterosexual and LGBT women fighting for social change.

  11. 'Even though it's a small checkbox, it's a big deal': stresses and strains of managing sexual identity(s) on Facebook.

    Science.gov (United States)

    Rubin, Jennifer D; McClelland, Sara I

    2015-01-01

    Facebook offers a socialisation context in which young people from ethnic, gender and sexual minorities must continually manage the potential for prejudice and discrimination in the form of homophobia and racism. In-depth interviews were conducted with eight young women, aged 16-19 years, who self-identified as queer and as women of colour. A detailed analysis of these interviews--focusing in particular on how young people described navigating expectations of rejection from family and friends--offered insight into the psychological and health consequences associated with managing sexual identity(s) while online. The 'closet' ultimately takes on new meaning in this virtual space: participants described trying to develop social relationships within Facebook, which demands sharing one's thoughts, behaviours and ideas, while also hiding and silencing their emerging sexuality. In this 'virtual closet', tempering self-presentation to offset social exclusion has become a continuous, yet personally treacherous, activity during the daily practice of using Facebook.

  12. Holistic Privacy-Preserving Identity Management System for the Internet of Things

    Directory of Open Access Journals (Sweden)

    Jorge Bernal Bernabe

    2017-01-01

    Full Text Available Security and privacy concerns are becoming an important barrier for large scale adoption and deployment of the Internet of Things. To address this issue, the identity management system defined herein provides a novel holistic and privacy-preserving solution aiming to cope with heterogeneous scenarios that requires both traditional online access control and authentication, along with claim-based approach for M2M (machine to machine interactions required in IoT. It combines a cryptographic approach for claim-based authentication using the Idemix anonymous credential system, together with classic IdM mechanisms by relying on the FIWARE IdM (Keyrock. This symbiosis endows the IdM system with advanced features such as privacy-preserving, minimal disclosure, zero-knowledge proofs, unlikability, confidentiality, pseudonymity, strong authentication, user consent, and offline M2M transactions. The IdM system has been specially tailored for the Internet of Things bearing in mind the management of both users’ and smart objects’ identity. Moreover, the IdM system has been successfully implemented, deployed, and tested in the scope of SocIoTal European research project.

  13. The Ineffectiveness of "Effective" Management Strategies: First-Year Teachers, Behavior Management, and Identity

    Science.gov (United States)

    Dugas, Daryl

    2016-01-01

    This article presents a research project that challenges the skills-based approach to classroom management in teacher education, particularly in the domain of responding to student misbehaviors. In 90-minute narrative-based interviews, 16 first-year Chicago Public School (CPS) teachers were prompted for narratives of their experiences responding…

  14. The Trend of Identity Management and the Identity Management System of Chinese Academy of Sciences%身份管理发展趋势和中国科学院身份管理系统

    Institute of Scientific and Technical Information of China (English)

    薛聪; 向继; 高能

    2015-01-01

    用户通过使用网络身份访问互联网应用及服务。身份管理整合了用户身份信息保护和资源访问控制等诸多技术,为优化用户体验奠定基础。本文基于网络身份特点及身份管理基础框架,分析了身份管理的发展趋势,并介绍了基于云架构的中国科学院统一身份管理系统应用案例,该系统使用单点登录、多重认证和多级安全策略,实现了应用服务间网络身份的安全高效部署及融合。%Generally, the internet applications and services need to be able to accept user network identities. Identity Management Technology integrates identity data protection and resource access control technology, and provides the foundation for optimizing user experience. Based on the characteristics of identity and the framework of identity management, this paper analyses the development trend of Identity Management, and introduces the Identity Management System of Chinese Academy of Sciences in cloud architecture. This system uses single sign-on, multiple authentication and multi-level security policies so as to implement the secure and efficient deployment of identities between various applications or services.

  15. Globus Nexus: A Platform-As-A-Service provider of research Identity, Profile, and Group Management, Future Generation

    Energy Technology Data Exchange (ETDEWEB)

    Chard, Kyle; Lidman, Mattias; McCollam, Brendan; Bryan, Josh; Ananthakrishnan, Rachana; Tuecke, Steven; Foster, Ian

    2016-03-01

    Globus Nexus is a professionally hosted Platform-as-a-Service that provides identity, profile and group management functionality for the research community. Many collaborative e-Science applications need to manage large numbers of user identities, profiles, and groups. However, developing and maintaining such capabilities is often challenging given the complexity of modern security protocols and requirements for scalable, robust, and highly available implementations. By outsourcing this functionality to Globus Nexus, developers can leverage best-practice implementations without incurring development and operations overhead. Users benefit from enhanced capabilities such as identity federation, flexible profile management, and user-oriented group management. In this paper we present Globus Nexus, describe its capabilities and architecture, summarize how several e-Science applications leverage these capabilities, and present results that characterize its scalability, reliability, and availability.

  16. Gender identity and the management of the transgender patient: a guide for non-specialists.

    Science.gov (United States)

    Joseph, Albert; Cliffe, Charlotte; Hillyard, Miriam; Majeed, Azeem

    2017-04-01

    In this review, we introduce the topic of transgender medicine, aimed at the non-specialist clinician working in the UK. Appropriate terminology is provided alongside practical advice on how to appropriately care for transgender people. We offer a brief theoretical discussion on transgenderism and consider how it relates to broader understandings of both gender and disease. In respect to epidemiology, while it is difficult to assess the exact size of the transgender population in the UK, population surveys suggest a prevalence of between 0.2 and 0.6% in adults, with rates of referrals to gender identity clinics in the UK increasing yearly. We outline the legal framework that protects the rights of transgender people, showing that is not legal for physicians to deny transgender people access to services based on their personal beliefs. Being transgender is often, although not always, associated with gender dysphoria, a potentially disabling condition in which the discordance between a person's natal sex (that assigned to them at birth) and gender identity results in distress, with high associated rates of self-harm, suicidality and functional impairment. We show that gender reassignment can be a safe and effective treatment for gender dysphoria with counselling, exogenous hormones and surgery being the mainstay of treatment. The role of the general practitioner in the management of transgender patients is discussed and we consider whether hormone therapy should be initiated in primary care in the absence of specialist advice, as is suggested by recent General Medical Council guidance.

  17. Patients' Data Management System Protected by Identity-Based Authentication and Key Exchange.

    Science.gov (United States)

    Rivero-García, Alexandra; Santos-González, Iván; Hernández-Goya, Candelaria; Caballero-Gil, Pino; Yung, Moti

    2017-03-31

    A secure and distributed framework for the management of patients' information in emergency and hospitalization services is proposed here in order to seek improvements in efficiency and security in this important area. In particular, confidentiality protection, mutual authentication, and automatic identification of patients are provided. The proposed system is based on two types of devices: Near Field Communication (NFC) wristbands assigned to patients, and mobile devices assigned to medical staff. Two other main elements of the system are an intermediate server to manage the involved data, and a second server with a private key generator to define the information required to protect communications. An identity-based authentication and key exchange scheme is essential to provide confidential communication and mutual authentication between the medical staff and the private key generator through an intermediate server. The identification of patients is carried out through a keyed-hash message authentication code. Thanks to the combination of the aforementioned tools, a secure alternative mobile health (mHealth) scheme for managing patients' data is defined for emergency and hospitalization services. Different parts of the proposed system have been implemented, including mobile application, intermediate server, private key generator and communication channels. Apart from that, several simulations have been performed, and, compared with the current system, significant improvements in efficiency have been observed.

  18. Patients’ Data Management System Protected by Identity-Based Authentication and Key Exchange

    Directory of Open Access Journals (Sweden)

    Alexandra Rivero-García

    2017-03-01

    Full Text Available A secure and distributed framework for the management of patients’ information in emergency and hospitalization services is proposed here in order to seek improvements in efficiency and security in this important area. In particular, confidentiality protection, mutual authentication, and automatic identification of patients are provided. The proposed system is based on two types of devices: Near Field Communication (NFC wristbands assigned to patients, and mobile devices assigned to medical staff. Two other main elements of the system are an intermediate server to manage the involved data, and a second server with a private key generator to define the information required to protect communications. An identity-based authentication and key exchange scheme is essential to provide confidential communication and mutual authentication between the medical staff and the private key generator through an intermediate server. The identification of patients is carried out through a keyed-hash message authentication code. Thanks to the combination of the aforementioned tools, a secure alternative mobile health (mHealth scheme for managing patients’ data is defined for emergency and hospitalization services. Different parts of the proposed system have been implemented, including mobile application, intermediate server, private key generator and communication channels. Apart from that, several simulations have been performed, and, compared with the current system, significant improvements in efficiency have been observed.

  19. Patients’ Data Management System Protected by Identity-Based Authentication and Key Exchange

    Science.gov (United States)

    Rivero-García, Alexandra; Santos-González, Iván; Hernández-Goya, Candelaria; Caballero-Gil, Pino; Yung, Moti

    2017-01-01

    A secure and distributed framework for the management of patients’ information in emergency and hospitalization services is proposed here in order to seek improvements in efficiency and security in this important area. In particular, confidentiality protection, mutual authentication, and automatic identification of patients are provided. The proposed system is based on two types of devices: Near Field Communication (NFC) wristbands assigned to patients, and mobile devices assigned to medical staff. Two other main elements of the system are an intermediate server to manage the involved data, and a second server with a private key generator to define the information required to protect communications. An identity-based authentication and key exchange scheme is essential to provide confidential communication and mutual authentication between the medical staff and the private key generator through an intermediate server. The identification of patients is carried out through a keyed-hash message authentication code. Thanks to the combination of the aforementioned tools, a secure alternative mobile health (mHealth) scheme for managing patients’ data is defined for emergency and hospitalization services. Different parts of the proposed system have been implemented, including mobile application, intermediate server, private key generator and communication channels. Apart from that, several simulations have been performed, and, compared with the current system, significant improvements in efficiency have been observed. PMID:28362328

  20. Patient identity management for secondary use of biomedical research data in a distributed computing environment.

    Science.gov (United States)

    Nitzlnader, Michael; Schreier, Günter

    2014-01-01

    Dealing with data from different source domains is of increasing importance in today's large scale biomedical research endeavours. Within the European Network for Cancer research in Children and Adolescents (ENCCA) a solution to share such data for secondary use will be established. In this paper the solution arising from the aims of the ENCCA project and regulatory requirements concerning data protection and privacy is presented. Since the details of secondary biomedical dataset utilisation are often not known in advance, data protection regulations are met with an identity management concept that facilitates context-specific pseudonymisation and a way of data aggregation using a hidden reference table later on. Phonetic hashing is proposed to prevent duplicated patient registration and re-identification of patients is possible via a trusted third party only. Finally, the solution architecture allows for implementation in a distributed computing environment, including cloud-based elements.

  1. Formal Modelling of a Usable Identity Management Solution for Virtual Organisations

    CERN Document Server

    Haidar, Ali N; Abdallah, Ali E; Ryan, P Y A; Beckles, B; Brooke, J M; Jones, M A S; 10.4204/EPTCS.16.4

    2010-01-01

    This paper attempts to accurately model security requirements for computational grid environments with particular focus on authentication. We introduce the Audited Credential Delegation (ACD) architecture as a solution to some of the virtual organisations identity management usability problems. The approach uses two complementary models: one is state based, described in Z notation, and the other is event-based, expressed in the Process Algebra of Hoare's Communicating Sequential Processes (CSP). The former will be used to capture the state of the WS and to model back-end operations on it whereas the latter will be used to model behavior, and in particular, front-end interactions and communications. The modelling helps to clearly and precisely understand functional and security requirements and provide a basis for verifying that the system meets its intended requirements.

  2. Veil as Stigma: Exploring the Role of Representations in Muslim Women’s Management of Threatened Social Identity

    DEFF Research Database (Denmark)

    Chapman, Madeleine

    2016-01-01

    This study extends research on the relations between social representations and social identities through an exploration of how Muslim women manage the stigma of veiling. Based on analysis of individual and group interviews among Muslim women in Denmark and the UK, the study highlights...... the dialectical nature of social identity as constructed through and against others’ representations of social groups and the norms of valuing they impose. It shows how, for the women here, the reinforcement of a shared sense of Muslim identity goes together with re-evaluation of aspects of that identity......, principally in response to representations of the veil that deny Muslim women agency and cast them as oppressed. It shows how norms of gender and agency are in this process variously resisted and affirmed, resulting in the reframing of gendered religious values. Theoretically, the study argues that an account...

  3. Organizational Identity Expressiveness and Perception Management : Principles for Expressing the Organizational Identity in Order to Manage External Stakeholders’ Perceptions of a Company

    NARCIS (Netherlands)

    M.D. van Halderen (Mignon)

    2008-01-01

    textabstractIt is especially during the past decade that stakeholders have become extremely heedful of organizations and their activities. A dominant organizational response of companies to this development is to express their organizational identity, in terms of who they are, what they stand for,

  4. Organizational Identity Expressiveness and Perception Management : Principles for Expressing the Organizational Identity in Order to Manage External Stakeholders’ Perceptions of a Company

    NARCIS (Netherlands)

    M.D. van Halderen (Mignon)

    2008-01-01

    textabstractIt is especially during the past decade that stakeholders have become extremely heedful of organizations and their activities. A dominant organizational response of companies to this development is to express their organizational identity, in terms of who they are, what they stand for, w

  5. Use of standardized multidimensional evaluation tools and the emergence of the case manager's professional identity in France.

    Science.gov (United States)

    Nugue, Mathilde; De Stampa, Matthieu; Couturier, Yves; Somme, Dominique

    2012-01-01

    In France, the national public health plan proposes a group of innovations including the initiation of case management for older adults in complex situations, particularly those with cognitive disorders. In this context, public authorities asked case managers to use a standardized multidimensional evaluation tool. The results of a qualitative study on the pertinence of such a tool relative to the emergence of this new professional field are described. Early use of an evaluation tool seems to be linked to the emergence of a new professional identity for recently recruited case managers. Factors determining the strength of this link are training tool standardization, computerization, and local structure's involvement. Our results contribute to identifying one of the ways by which professional identity can be changed to become a case manager.

  6. Brief Report: The Identity Style Inventory (ISI-3) and the Utrecht-Management of Identity Commitments Scale (U-MICS)--Factor Structure, Reliability, and Convergent Validity in French-Speaking University Students

    Science.gov (United States)

    Zimmermann, Gregoire; Mahaim, Elodie Biermann; Mantzouranis, Gregory; Genoud, Philippe A.; Crocetti, Elisabetta

    2012-01-01

    The purpose of this study was to evaluate the factor structure and the reliability of the French versions of the Identity Style Inventory (ISI-3) and the Utrecht-Management of Identity Commitments Scale (U-MICS) in a sample of college students (N = 457, 18-25 years old). Confirmatory factor analyses confirmed the hypothesized three-factor solution…

  7. Contributions of the Life Story Method for Studies on Identity: the example of study about female professors in management positions

    Directory of Open Access Journals (Sweden)

    Adílio Renê Almeida Miranda

    2014-12-01

    Full Text Available Recently, the Life Story Method has been used in the area of Business Administration as an important methodological strategy in qualitative research. The purpose is to understand groups or collective bodies based on individual paths of life. Thus, the goal of this study was to show the contribution of the life story method in understanding the identity dynamics of female professors managing a public university, by means of an example derived from an empirical study. It was observed from the reports of four female professors involved in management that recovery of past memories, as well as of values, facts, standards and occurrences connected with the primary and organizational socialization of the interviewees, contributes to understanding of their identity dynamics. Some categories of analysis emerged that express relationships between life story and identity, e.g., discontinuity, subjectivity and the importance of allowing an individual/subject to speak; the individual and the social sphere and socio-historical transformations, a dynamic interaction in construction of identities; and temporal analysis in construction of identities.

  8. Adequate Security Protocols Adopt in a Conceptual Model in Identity Management for the Civil Registry of Ecuador

    Science.gov (United States)

    Toapanta, Moisés; Mafla, Enrique; Orizaga, Antonio

    2017-08-01

    We analyzed the problems of security of the information of the civil registries and identification at world level that are considered strategic. The objective is to adopt the appropriate security protocols in a conceptual model in the identity management for the Civil Registry of Ecuador. In this phase, the appropriate security protocols were determined in a Conceptual Model in Identity Management with Authentication, Authorization and Auditing (AAA). We used the deductive method and exploratory research to define the appropriate security protocols to be adopted in the identity model: IPSec, DNSsec, Radius, SSL, TLS, IEEE 802.1X EAP, Set. It was a prototype of the location of the security protocols adopted in the logical design of the technological infrastructure considering the conceptual model for Identity, Authentication, Authorization, and Audit management. It was concluded that the adopted protocols are appropriate for a distributed database and should have a direct relationship with the algorithms, which allows vulnerability and risk mitigation taking into account confidentiality, integrity and availability (CIA).

  9. Management Challenges in the identification of Organizational Identity and Corporate Reputation as Intangible Assets

    National Research Council Canada - National Science Library

    Eduardo Bueno; Mónica Longo-Somoza; Raquel García-Revilla; Ramona-Diana Leon

    2015-01-01

      Based on intellectual capital models and reports, companies identify and define Organizational Identity and Corporate Reputation as strategic intangible assets capable of generating sustainable competitive advantages...

  10. Beyond Administration and Management: Reconstructing the Identities of Professional Staff in UK Higher Education

    Science.gov (United States)

    Whitchurch, Celia

    2008-01-01

    This paper describes an empirical study associated with earlier reviews of the changing roles and identities of contemporary professional staff in UK higher education (Whitchurch, 2004; 2006a; 2006b). The study draws on the narratives of 24 individuals to illustrate that identity movements cannot be captured solely in terms of a shift from…

  11. BioHealth--the need for security and identity management standards in eHealth.

    Science.gov (United States)

    Hildebrand, Claudia; Pharow, Peter; Engelbrecht, Rolf; Blobel, Bernd; Savastano, Mario; Hovsto, Asbjorn

    2006-01-01

    The experience gained in these last years and the several lesson learned have clearly shown that eHealth is more than just a simple change from paper records to electronic records. It necessitates a change of paradigms, on the one hand and the use of new technologies and introduction of new procedures on the other. Interoperability becomes a crucial issue. Security and confidentiality are vital for the acceptance of the new approaches and for the support of eHealth. Shared care and across-border interactions require a reliable and stable normative framework based on the application of standardized solutions, which are often not yet sufficiently known, diffused and implemented. Feeling this gap, a group of international experts in the medical area proposed to the EC the BioHealth project whose main aim is to create awareness about standardization in eHealth and to facilitate its practical implementation. The project will address all the stakeholders concerning their respective domain. It will evaluate the socio-economic and cultural aspects concerning eHealth with particular reference to the growing introduction of emerging technologies such as health cards, biometrics, RFID (radio-frequency identification) and NFC (Near field communication) tags. By providing information and expert advice on standardization and best practices it will raise the acceptance on standardization. Furthermore, the project will deeply approach the ethical and accessibility issues connected to identity management in eHealth, which -together with privacy- represent probably the most significant obstacles for the wide diffusion of eHealth procedures.

  12. Efficient Consistency Achievement of Federated Identity and Access Management Based on a Novel Self-Adaptable Approach

    Science.gov (United States)

    Cha, Shi-Cho; Chang, Hsiang-Meng

    Federated identity and access management (FIAM) systems enable a user to access services provided by various organizations seamlessly. In FIAM systems, service providers normally stipulate that their users show assertions issued by allied parties to use their services as well as determine user privileges based on attributes in the assertions. However, the integrity of the attributes is important under certain circumstances. In such a circumstance, all released assertions should reflect modifications made to user attributes. Despite the ability to adopt conventional certification revocation technologies, including CRL or OCSP, to revoke an assertion and request the corresponding user to obtain a new assertion, re-issuing an entirely new assertion if only one attribute, such as user location or other environmental information, is changed would be inefficient. Therefore, this work presents a self-adaptive framework to achieve consistency in federated identity and access management systems (SAFIAM). In SAFIAM, an identity provider (IdP), which authenticates users and provides user attributes, should monitor access probabilities according to user attributes. The IdP can then adopt the most efficient means of ensuring data integrity of attributes based on related access probabilities. While Internet-based services emerge daily that have various access probabilities with respect to their user attributes, the proposed self-adaptive framework significantly contributes to efforts to streamline the use of FIAM systems.

  13. Student and/or Entrepreneur? Managing Multiple Identities among Emerging University Student Entrepreneurs

    DEFF Research Database (Denmark)

    Sørensen, Suna; B. Gartner, William

    2006-01-01

    for combining the identities are proposed and discussed as a way to challenge the meaning attached to the practiced concepts of "student" and "entrepreneur" from a theoretical as well as practical perspective. The practices are organized into a conceptual framework containing the two continuums: "integration......Drawing on narratives and a multi-layered sense-making perspective, this paper explores how students make use of different novel combinations of the two identities "student" and "entrepreneur" in an effort to coordinate these in the process of becoming an entrepreneur. Six grounded practices....../disintegration" and "student and/or entrepreneur".  ...

  14. National and Gender Measurement Invariance of the Utrecht-Management of Identity Commitments Scale (U-MICS) : A 10-Nation Study With University Students

    NARCIS (Netherlands)

    Crocetti, Elisabetta; Cieciuch, Jan; Gao, Cheng Hai; Klimstra, Theo; Lin, Ching Ling; Matos, Paula Mena; Morsünbül, Ümit; Negru, Oana; Sugimura, Kazumi; Zimmermann, Grégoire; Meeus, Wim

    2015-01-01

    The purpose of this study was to examine the psychometric properties of the Utrecht-Management of Identity Commitments Scale (U-MICS), a self-report measure aimed at assessing identity processes of commitment, in-depth exploration, and reconsideration of commitment. We tested its factor structure in

  15. National and gender measurement invariance of the Utrecht-Management of Identity Commitments Scale (U-MICS) : A 10-nation study with university students

    NARCIS (Netherlands)

    Crocetti, E.; Cieciuch, J.; Gao, C.-H.; Klimstra, T.A.; Lin, C.-L.; Mena de Matos, P.; Morsünbül, U.; Negru, O.; Sugimura, K.; Zimmermann, G.; Meeus, W.H.J.

    2015-01-01

    The purpose of this study was to examine the psychometric properties of the Utrecht-Management of Identity Commitments Scale (U-MICS), a self-report measure aimed at assessing identity processes of commitment, in-depth exploration, and reconsideration of commitment. We tested its factor structure in

  16. Visual identity of a selected university – the scope, process of implementation, management

    Directory of Open Access Journals (Sweden)

    Marcin Gębarowski

    2014-12-01

    Full Text Available Image is one of key elements which determines whether contemporary market entities achieve a competitive advantage. This is also true in case of universities which compete with each other – mainly to attract students. The image of a university in its environment is to a large extent determined by consistent application of the system of visual identity, which includes recommendations concerning the functioning of an organization in the sphere of markers (symbolism. The basic goal of this article is to define the factors conditioning the efficient utilization of such systems by universities. Exemplification of the process of planning and implementing solutions from the area of visual identity was carried out on the basis of Rzeszow University of Technology. Reference was also made to the effects of functioning of the system of visual identity of the university from Podkarpacie region through the investigation of the students’ awareness of the existence of a standardized structure of markers and the perception of current utilization of its elements. In the supplement a division of universities in Poland, according to the scope of held systems of visual identity was carried out.

  17. A framework for implementation of user-centric identity management systems

    DEFF Research Database (Denmark)

    Adjei, Joseph K.; Olesen, Henning

    2010-01-01

    Users increasingly become part of electronic transactions, which take place instantaneously without direct user involvement. This leads to the risk of data manipulation, identity theft and privacy violation, and it has become a major concern for individuals and businesses around the world. Gov...

  18. Managing risk and marginalizing identities: on the society-of-captives thesis and the harm of social dis-ease.

    Science.gov (United States)

    Arrigo, Bruce A

    2013-06-01

    This article develops the constitutive features of the society-of-captives thesis as suggested by Arrigo and Milovanovic, and Arrigo, Bersot, and Sellers. The relevance of this thesis is briefly explored in relation to the institutional and community-based treatment philosophies that currently inform the mental health and criminal justice systems. This exploration specifies how risk (being human and doing humanness differently) is managed symbolically, linguistically, materially, and culturally. The management of this risk extends to the kept as well as to their keepers, regulators, and watchers (i.e., the society of captives). This article calls for a new clinical praxis (being/doing a critical mindfulness) designed to overcome the totalizing madness (the harm of social dis-ease) that follows from managing risk fearfully and marginalizing identities desperately as reified recursively through society's captivity. The ethical underpinnings of this clinical praxis represent an emergent direction for undertaking correctional policy reform.

  19. Serostatus Disclosure, Stigma Resistance, and Identity Management Among HIV-Positive Gay Men in Ireland.

    Science.gov (United States)

    Murphy, Patrick J; Hevey, David; O'Dea, Siobhán; Ní Rathaille, Neans; Mulcahy, Fiona

    2016-09-01

    In this study, we examined how non-infectiousness due to antiretroviral therapy has affected HIV-positive gay men's experience of serostatus disclosure to casual sex partners. Interviews were conducted with 15 seropositive gay men living in Ireland. Using grounded theory, three constructions of non-disclosure were proposed-as self-protection, as a morally permissible act, and as a rejection of the HIV-positive identity. Each construction entailed an aspect related to the sexual exclusion of those living with HIV, and an aspect related to their social exclusion. The extent to which the lives of those interviewed were affected by stigma was starkly revealed, as was the extent to which they stigmatized others living with HIV and rejected the HIV-positive identity. The research highlights the failure to socially normalize HIV and that interventions are needed to reduce the distress associated with seropositivity. © The Author(s) 2015.

  20. Quantum Type Indeterminacy in Dynamic Decision-Making: Self-Control through Identity Management

    Directory of Open Access Journals (Sweden)

    Jerome Busemeyer

    2012-05-01

    Full Text Available The Type Indeterminacy model is a theoretical framework that uses some elements of quantum formalism to model the constructive preference perspective suggested by Kahneman and Tversky. In a dynamic decision context, type indeterminacy induces a game with multiple selves associated with a state transition process. We define a Markov perfect equilibrium among the selves with individual identity (preferences as the state variable. The approach allows to characterize generic personality types and derive some comparative static results.

  1. Family support in the transition to adulthood in Portugal--its effects on identity capital development, uncertainty management and psychological well-being.

    Science.gov (United States)

    Oliveira, José Egídio; Mendonça, Marina; Coimbra, Susana; Fontaine, Anne Marie

    2014-12-01

    In a familistic southern European society such as the Portuguese, the family has historically played a prominent role in supporting the negotiation of transition pathways into adulthood. The present study aimed at capturing (1) the relative weight of parental financial support and autonomy support in contributing to the youngsters' psychological well-being (PWB), and (2) the mediating role of identity capital and uncertainty management in this relationship. A total of 620 participants completed measures of parental support, identity capital, uncertainty management and PWB. Autonomy support was found to be the strongest predictor of PWB, both directly and indirectly through its effects on identity capital and the use of target focused uncertainty management strategies. Conversely, financial support evidenced only a minor indirect impact through the mediation of tangible identity capital. Autonomy stimulation may constitute one of the most developmentally determinant family challenges in assisting the process of coming of age in Portugal.

  2. Brief report: The Identity Style Inventory (ISI-3) and the Utrecht-Management of Identity Commitments Scale (U-MICS): factor structure, reliability, and convergent validity in French-speaking university students.

    Science.gov (United States)

    Zimmermann, Grégoire; Mahaim, Elodie Biermann; Mantzouranis, Gregory; Genoud, Philippe A; Crocetti, Elisabetta

    2012-04-01

    The purpose of this study was to evaluate the factor structure and the reliability of the French versions of the Identity Style Inventory (ISI-3) and the Utrecht-Management of Identity Commitments Scale (U-MICS) in a sample of college students (N = 457, 18-25 years old). Confirmatory factor analyses confirmed the hypothesized three-factor solution of the ISI-3 identity styles (i.e. informational, normative, and diffuse-avoidant styles), the one-factor solution of the ISI-3 identity commitment, and the three-factor structure of the U-MICS (i.e. commitment, in-depth exploration, and reconsideration of commitment). Additionally, theoretically consistent and meaningful associations among the ISI-3, U-MICS, and Ego Identity Process Questionnaire (EIPQ) confirmed convergent validity. Overall, the results of the present study indicate that the French versions of the ISI-3 and UMICS are useful instruments for assessing identity styles and processes, and provide additional support to the cross-cultural validity of these tools.

  3. Self presentation and management of gender identity change in a young middle-class girl

    OpenAIRE

    Seid, Gonzalo

    2015-01-01

    This article describes the management of a sex-gender change executed by a transsexual in Buenos Aires. The data was collected through depth interviews, observations and informal conversations in everyday life situations. The analysis focuses on the self presentation and the management of impressions produced on other people, from the dramaturgical approach of Erving Goffman. The main results show two sides on femininity: as a natural state she has always had, and as a permanent achievement t...

  4. Rhetorical Savvy as Social Skill: Modeling Entrepreneur Identity Construction within Educational Content Management Systems

    Science.gov (United States)

    Spartz, John M.

    2010-01-01

    This article focuses on one aspect of rhetorical training that writing instructors have an opportunity--if not an obligation--to inculcate (or at least introduce) in students studying to be entrepreneurs and taking their writing classes. Specifically, through the use of an open source Content Management System (CMS) (e.g., Drupal or Moodle),…

  5. 'Swinging the Lamp': The Watch Manager's Career, Role and Occupational Identity within the Modernising Agenda of the UK Fire and Rescue Service

    OpenAIRE

    O'Connor, Sarah Jane

    2017-01-01

    This research focuses on the career and work identity of watch managers in the Fire and Rescue Service (FRS). Their role is to manage firefighters who are infamously known in political circles to possess grass root cultures that remain resistant to forms of change and modernisation. Watch managers are not only tasked with leading emergency teams at incidents but they are also at the receiving end of a relentless stream of political pressure to achieve change. This research draws on qualitativ...

  6. 比利时电子身份管理制度评鉴%Comment on Electronic Identity Management (EIDM) Systems in Belgian

    Institute of Scientific and Technical Information of China (English)

    赵丽莉; 江智茹; 马民虎

    2011-01-01

    In order to realize the management of the virtual social identity, identity tags (issued by electronic identity) has become common practice of the national development plans. It can help to realize the effective identification management of network virtual identity for the government to strengthen the Internet activity. But the Electronic Identity Management (EIDM) will face some dilemmas, where the scope of EID is broad and comprehensive. The Belgian government is in vanguard role as the practice field of the EIDM, and form a perfect electronic identity management mechanism. Therefore, the paper will examine the Belgian electronic identity management system and explore some references for the implementation and practice for electronic identity system in China.%提出为了实现虚拟社会真实身份管理,签发电子身份标识(electronic identity,EID)已成为当前许多国家发展计划中的普遍实践。认为EID的发行有助于实现网络虚拟身份的有效识别,为政府加强互联网活动综合管控提供有效路径,但也面临管理涉及面广、综合性强等困境。比利时政府在EID实践领域担任先锋角色,形成了完善的电子身份管理机制,因此,考查比利时电子身份管理制度将为我国推行和实践电子身份制度提供借鉴作用。

  7. Patient empowerment by the means of citizen-managed Electronic Health Records: web 2.0 health digital identity scenarios.

    Science.gov (United States)

    Falcão-Reis, Filipa; Correia, Manuel E

    2010-01-01

    With the advent of more sophisticated and comprehensive healthcare information systems, system builders are becoming more interested in patient interaction and what he can do to help to improve his own health care. Information systems play nowadays a crucial and fundamental role in hospital work-flows, thus providing great opportunities to introduce and improve upon "patient empowerment" processes for the personalization and management of Electronic Health Records (EHRs). In this paper, we present a patient's privacy generic control mechanisms scenarios based on the Extended OpenID (eOID), a user centric digital identity provider previously developed by our group, which leverages a secured OpenID 2.0 infrastructure with the recently released Portuguese Citizen Card (CC) for secure authentication in a distributed health information environment. eOID also takes advantage of Oauth assertion based mechanisms to implement patient controlled secure qualified role based access to his EHR, by third parties.

  8. 'Good' and 'bad' deaths: Narratives and professional identities in interviews with hospice managers

    OpenAIRE

    Semino, E.; Demjén, Z.; Koller, V.

    2014-01-01

    This article explores the formal and functional characteristics of narratives of 'good' and 'bad' deaths as they were told by 13 UK-based hospice managers in the course of semi-structured interviews. The interviewees' responses include a variety of remarkably consistent 'narratives of successful/frustrated intervention', which exhibit distinctive formal characteristics in terms of the starting point and core of the action, the choice of personal pronouns and metaphors, and the ways in which p...

  9. The identity approach for assessing socio-technical resilience to climate change: example of flood risk management for the Island of Dordrecht

    Directory of Open Access Journals (Sweden)

    B. Gersonius

    2012-07-01

    Full Text Available Recent EU guidance on adaptation calls for the enhancement of socio-technical resilience to climate change. However, socio-technical resilience is relatively poorly defined and this makes it difficult to apply in practice. This paper uses the concept of identity as a vehicle to advance the definition and assessment of socio-technical resilience. Identity comprises four aspects (components, relationships, innovation, and continuity that constitute the minimum of what has to be identified and specified if resilience is to be assessed. Characterising the identity of a socio-technical system requires the conceptualisation of these four aspects in relation to the particular function provided by the system (e.g. flood risk management and also the identification of the specific variables and thresholds that reflect changes in identity. We have demonstrated the utility of the identity approach, using the example of flood risk management for the Island of Dordrecht, the Netherlands. Based on the results, socio-technical resilience has been redefined as the ability of the system to continue to function as expected in the face of change. This definition implies that a system is resilient when it can deliver performance without a change of identity by continuing compliance with standards and expectations.

  10. 'Don Fabio' and the taming of the three lions: the discursive construction of a foreign England manager's identity in the sports online written media

    Directory of Open Access Journals (Sweden)

    Dermot Brendan Heaney

    2013-06-01

    Full Text Available This article considers the appointment of a foreign manager to coach a national football team from the perspective of discursive identity construction. The data is comprised of three corpora of online versions of newspaper articles, each corresponding to a phase in Fabio Capello’s first two years of tenure. Reflecting current trends in Critical Discourse Analysis, qualitative close analysis is carried out on two articles from each corpus while quantitative analysis is extended across each corpus to identify salient and consistent aspects of discursive identity construction. Exploiting the multi-disciplinary basis of CDA, the data is examined in terms of transitivity, lexis (comprising vocabulary, collocation, deixis, and intertextuality, and narrative identity construction. Micro-analysis of grammatical and linguistic patterns is applied to indicate patterns in press coverage in each phase, and a corresponding overview considers how aspects of identity work diffused through each corpus cohere into general storylines.

  11. The Interaction of Control Systems and Stakeholder Networks in Shaping the Identities of Self-Managed Teams

    NARCIS (Netherlands)

    Annosi, Maria Carmela; Foss, Nicolai; Brunetta, Federica; Magnusson, Mats

    2017-01-01

    Team identity has received little research attention even though an increasing number of firms are moving to team-based organizations and there is evidence that teams form identities. We explore the extent to which team identity can be institutionalized as a central organizing principle of

  12. Exploring medical identity theft.

    Science.gov (United States)

    Mancilla, Desla; Moczygemba, Jackie

    2009-09-16

    The crime of medical identity theft is a growing concern in healthcare institutions. A mixed-method study design including a two-stage electronic survey, telephone survey follow-up, and on-site observations was used to evaluate current practices in admitting and registration departments to reduce the occurrence of medical identity theft. Survey participants were chief compliance officers in acute healthcare organizations and members of the Health Care Compliance Association. Study results indicate variance in whether or how patient identity is confirmed in healthcare settings. The findings of this study suggest that information systems need to be designed for more efficient identity management. Admitting and registration staff must be trained, and compliance with medical identity theft policies and procedures must be monitored. Finally, biometric identity management solutions should be considered for stronger patient identification verification.

  13. Identity Change

    Science.gov (United States)

    Burke, Peter J.

    2006-01-01

    This research examines two mechanisms by which persons' identities change over time. First, on the basis of identity control theory (ICT), I hypothesize that while identities influence the way in which a role is played out, discrepancies between the meanings of the identity standard and the meanings of the role performance will result in change.…

  14. IDENTITY THEFT COMMITTED THROUGH INTERNET

    OpenAIRE

    Adrian Cristian MOISE

    2015-01-01

    In this study, starting with the presentation of some aspects regarding management of identity in cyberspace, it is carried out the analysis of the offence of identity theft committed through Internet. The term “identity theft” describes the criminal acts through which the offender obtains and uses in a fraudulent manner the identity of other person. These criminal acts may be carried out through the use of information and communication technology, too. The cases of identity theft committed t...

  15. The system-stabilizing role of identity management strategies: social creativity can undermine collective action for social change.

    Science.gov (United States)

    Becker, Julia C

    2012-10-01

    Three studies were conducted to examine whether, in an event of negative distinctiveness, engaging in 1 of the 3 identity management strategies of social creativity can undermine group member's intentions to engage in collective action. Study 1a (N = 55) and Study 1b (N = 58) illustrated that selecting a new (complementary) comparison dimension undermined middle-class people's and women's intention to participate in collective action. Study 1c (N = 74) and Study 1d (N = 126) revealed that a downward comparison undermined collective action intentions among unemployed people and women. Study 1e (N = 69) and Study 1f (N = 110) showed that a positive redefinition of an externally imposed negative group attribute did not diminish collective action intentions among immigrants and women. Study 2 (N = 99) illustrated that an alternative operationalization of revaluation of the attribute, namely, downplaying the status-defining attribute, undermined collective action among students. Study 2 and Study 3 (N = 95) consistently illustrated that reduced levels of group-relative deprivation mediated the negative relation between the social creativity strategies and collective action intentions. Implications for social change are discussed.

  16. Why do I dread looking old?: A test of social identity theory, terror management theory, and the double standard of aging.

    Science.gov (United States)

    Chonody, Jill M; Teater, Barbra

    2016-01-01

    Outward appearance is one of the means by which age is determined, and fear of looking old may stem from fears about social identity and death. This study explored how social identity theory and terror management theory may help to explain the dread of looking old. University students from the United States, England, and Australia (N = 1,042) completed a questionnaire regarding their attitudes about aging and older adults. Results indicated that sex, age, beliefs about personal aging, and death anxiety explained 30.4% of the variance for participants' dread of looking old. Theoretical hypotheses were supported by our findings.

  17. Hard Identity and Soft Identity

    Directory of Open Access Journals (Sweden)

    Hassan Rachik

    2006-04-01

    Full Text Available Often collective identities are classified depending on their contents and rarely depending on their forms. Differentiation between soft identity and hard identity is applied to diverse collective identities: religious, political, national, tribal ones, etc. This classification is made following the principal dimensions of collective identities: type of classification (univocal and exclusive or relative and contextual, the absence or presence of conflictsof loyalty, selective or totalitarian, objective or subjective conception, among others. The different characteristics analysed contribute to outlining an increasingly frequent type of identity: the authoritarian identity.

  18. Inference for Identity Management

    Science.gov (United States)

    2010-08-16

    proposal. Briefly, and following the spirit of the idea that Mallows [6] introduced for permutations, we define a measure of compatibility between a...A. The posterior p(x(0) | y(0)) can be computed by first determining high-likelihood esti- mates x̂(0) of x(0) from y(0). We can then use a Mallows ...described in the next Section. Section 2.4 then describes a key problem common to approaches that estimate x̂(0) by additive measures of graph cuts, and

  19. Emotion, power and identity. Emotional display of envy when taking on management roles in a professional hierarchy.

    Science.gov (United States)

    Sebrant, Ulla

    2014-01-01

    Drawing on a previous study of organising processes and the construction of identity in a Swedish geriatric clinic, the impact of emotions is brought to the fore in the interpretation of power relations among professional groups. The purpose of this paper is to find a way to interpret emotions as discursively constructed in organising processes. A sequence of critical events is described where leading positions were negotiated at the clinic. Senior physicians and head nurses are highlighted as opposing forces in a struggle where envious emotions seemed to be a driving force in the political interplay. The empirical material in this paper comes from the previous study. It is a set of participant observations and parts of interviews that took place before and after the implementation of a new organisational plan for the clinic. The envious and regressive undertone in the relationships between the actors made them act for egocentric reasons instead of creating new ways of collaborating and learning new leading roles. The power relations of the medical hierarchy were reproduced, which made new ways of relating threatening and difficult to achieve. The results of the study confirm that people involved and perhaps in conflict with each other have to be able to, or get help to, make sense of their emotional experiences to employ them constructively. Otherwise they fall back into well-known patterns in order to feel secure. A vital part of learning in change processes is the support to individuals and groups in gaining emotional understanding of themselves and others. Leaders and managers who often are initiators of change ought to be aware of the importance of emotional support in change processes. If they are not, they are destined to be a part of the confusion and unable to lead or support their staff in change processes.

  20. Design of User Identity Management System Based on RFID%基于RFID的用户身份识别管理系统的设计

    Institute of Scientific and Technical Information of China (English)

    陈楷

    2014-01-01

    RFID是一种射频识别技术,不要求识别系统与特定目标之间互相接触或建立连接。提出一种基于RFID的用户身份识别管理系统,采用RFID模块配合WPF编写的软件系统和SQL数据库,对用户身份进行识别和管理。%RFID is a kind of radio frequency identification technology. Recognition system does not require to contact or establish a connection with a particular target. Puts forward a management system of user identity based on RFID. Using RFID module with WPF to write software system and SQL databases. For identifying and managing user identity.

  1. Construction of Doctors'Multiple Identities under Harmonious Management Model%和谐管理模式下医生多元身份的建构

    Institute of Scientific and Technical Information of China (English)

    夏玉琼

    2015-01-01

    语言的使用与说话人的身份有密切的关系。身份不仅指说话人的固有身份,也包括说话人主动建构的身份。依据Brewer & Gardner 的身份表征理论以及Spencer‐Oatey的人际关系和谐管理模式,对医患会话中医生多元身份的建构展开研究。通过分析发现,医生在群体层面上,常常建构机构身份和职业身份;在关系层面上,建构带有情感互动色彩的关系身份;在个体层面上,则建构突显个体独特性特征的个人身份。医生选择不同的身份视点与患者交流,是为满足特定阶段的交际需要,也会对医患关系构成和谐‐维护、和谐‐挑战、和谐‐增强或和谐‐忽视取向。%There is close relationship between the use of language and the identity of the speaker Language . Identity has a dual function of transferring information and constructing interlocutors'identities .Based on the collected data between doctors and patients ,the construction of doctors'multiple identities in terms of"collective identity"was explored ,"relational identity"and "personal identity"are within the framework of Brewer & Gardner's Self‐representation Model and Spencer‐Oatey's Rapport‐Management Model .It is found that doctors can construct different identities to realize interactional goals and manage harmony‐dis‐harmony between doctors and patients .

  2. The importance of social identities in the management of and recovery from ‘Diabulimia’: A qualitative exploration

    OpenAIRE

    Hastings, A; McNamara, N; Allan, J; Marriott, M.

    2016-01-01

    Introduction: A significant barrier to recovery for individuals with co-morbid eating disorders and type 1 diabetes is the way in which group members self-categorise. Nonetheless, identity issues are neglected during the recovery process. The aim of this paper is to explore how group memberships (and the associated identities) both contribute to and hinder recovery in this cohort. Method: Transcripts from five online focus groups with 13 members of an online support group for individuals with...

  3. Object Identity in Database Systems

    Institute of Scientific and Technical Information of China (English)

    李天柱

    1995-01-01

    The concept of object identity and implementation of object identity in some systems have been explained in literature.Based on an analysis on the idea of data scheme in ANSI/X3/SPARC,this paper presents the concept of full-identity,which includes entity identity,conceptual object identity,and internal object identity,In addition,the equality of objects,which is richer and more practical,is discussed based on the full identity of objects.Therefore,the semantics and constructions of the identity for the complex objects are fully observed,and some appliactions in object management,version management,and user interface are found.Also,it could support the combination of O-O model with V-O model.

  4. Identity paradoxes

    Directory of Open Access Journals (Sweden)

    Đurić Jelena

    2010-01-01

    Full Text Available The article considers paradoxical nature of identity that emerges from: 1 the very concept of identity whose abstract generality unites various and even opposite features; 2 the processual nature of reality that is easier to express in the poetical metaphors or abstract principles than in unambiguous conceptual networks; 3 the oppose relationship between being and knowledge, mind and matter, subject and object, self and personality. Entangled in the labyrinth which evade efforts to be conceptually defined, the modern thinking of identity moves towards abandoning the idea of “self” on behalf of the “ego” and towards the misapprehension of identity as being identical. This corresponds to the “time of the lost spirit” stretched between the simultaneous need to find an identity and to give it up.

  5. Medical Identity

    DEFF Research Database (Denmark)

    Musaeus, Peter

    2015-01-01

    Purpose: To examine philosophical stances underpinning medical identity and assess the conceptual relationship between physician, medical practice and culture. Argument: Medical identity is about the ideals and moral positions that physicians take when justifying themselves. Medical identity...... hedonistic versus sentimentalist approaches to medical identity. The sociocultural philosophical analysis of medical identity can shed light on what it means conceptually for a physician to harbor beliefs associated with him/her being taken to be an autonomous professional. It is important because it touches...... on the meaning of being a compassionate, good and skilled physician, making its relevance to person-centered medicine self-evident. Conclusion: Medical identity should be analyzed with reference to literature, philosophy and medical practice in order for the physician to exercise a reflective position...

  6. Linguistic identity matching

    CERN Document Server

    Lisbach, Bertrand

    2013-01-01

    Regulation, risk awareness and technological advances are increasingly drawing identity search functionality into business, security and data management processes, as well as fraud investigations and counter-terrorist measures.Over the years, a number of techniques have been developed for searching identity data, traditionally focusing on logical algorithms. These techniques often failed to take into account the complexities of language and culture that provide the rich variations  seen in names used around the world. A new paradigm has now emerged for understanding the way that identity data

  7. Possible selves and identity in relation to career development: evidence from Chilean male middle-aged managers' career narratives

    NARCIS (Netherlands)

    Nazar, Gabriela; Heijden, van der Beatrice I.J.M.

    2014-01-01

    Social and economic conditions, as well as the dynamism of the Chilean labour market, place new demands on middle-aged workers who have to explore both internal and external opportunities to develop successful careers. We assumed that possible self and identity in future states are core organizing a

  8. The Intention and Reflection Model of Self-Disclosure: Social Work Education for Student Identity Management in Gay Men

    Science.gov (United States)

    Satterly, Brent A.

    2007-01-01

    Little research exists on how self-disclosure is taught in social work education (Pianko, 2001). Few social work education programs include precontemplative components of exploring identity for gay male students. In this study, the data from 4 focus groups of gay male therapists, who discussed their self-disclosure, decision-making processes, were…

  9. The Influence of Identity Solves the Problems of Management of the Communities in the Network Societies More Effectively

    Directory of Open Access Journals (Sweden)

    Benas Brunalas

    2015-02-01

    Full Text Available The two scientific perspectives that compete in social sciences – positivism and postpositivism – present two different perceptions of the realities and their interpretations. The logic of the two different positions perceives identity and the ratio of structure to a unit differently. From positivist perspective, the dominating statements propose that preconceived and ‘stationary’ structures, the states of units of structures and identities exist, whereas post-positivism approach suggests that a circulation of units, structures and identities is a constant action.An aspiration to strictly conform to the logic of one or the other scientific paradigm, while forming ontological and epistemological positions, leads to dead-end, and the initial aspiration of a scientific theory – practical benefit – remains unfulfilled. A way out of this ‘theoretical maze’ is assisted by propositions of scientific realism, which allows combining positions, while adjusting the attitudes of positivism and post-positivism which look contradictory from a standpoint. These propositions follow subjectivistic ontology; however, they deny the fact that it necessarily has to implicate positivistic epistemology. By using the statements of scientific realism, the article justifies a transitional way between the two camps (positivism and post-positivism, while arguing that only by integrating different positions, the research of identity that points to practice is possible. This is especially relevant during the analysis of the structure and the ratio of the structure to a unit.The article holds an attitude that a network society, which has a fresh quality and highlights a double-sided relationship of the structure and a unit of the structure, has been developing in the 21st century. The specific structure of the network is a decentralized structure, which power center can be perceived as an actual network’s self-regulating mode, which ‘indicates’ and

  10. Study on Service Identity Rule Centralized Management Solution%业务识别规则集中管理解决方案研究

    Institute of Scientific and Technical Information of China (English)

    王磊; 赫罡

    2015-01-01

    针对现网业务识别规则配置方式的优化需求进行了深入阐述。对移动网络中的业务识别技术及业务识别规则配置方式进行了分析,包括DFI、SPI、DPI 3种业务识别方式,PGW、PCRF 2种业务识别规则配置方式;对业务识别规则集中管理方案进行了阐述与分析,分别从方案特点、网络架构与接口、主要业务流程3方面进行了详细介绍;结合2类移动互联网业务特点,给出了业务识别规则集中管理解决方案的实际应用;为解决目前现网问题提供了一种思路。%It expounds the need for optimization of service identity rule configuration. Firstly,it studies the service identification technolo-gy in mobile network,including three kinds of identification ways,and service identity rule configuration( PGW and PCRF static configuration). Secondly,it expatiates the service identity rule centralized management solution and elaborates it re-spectively from the aspects of characteristics,architecture interface and service process. Final y,combined the characteristics of two types of mobile Internet service,it gives the practical application of service identity rule centralized management solu-tion in the current networks,to provide a consideration on solving the current network problems.

  11. Transformation from Identity Stone Age to Digital Identity

    Directory of Open Access Journals (Sweden)

    Mohit Kohli

    2011-05-01

    Full Text Available Technological conversion, political interests and Business drivers has triggered a means, to establish individual characterization and personalization.People started raising concerns on multiple identities managed across various zones and hence various solutions were designed. Technological advancement has brought various issues and concerns around Identity assurance, privacy and policy enabled common Authentication framework. A compressive framework is needed to established common identity model to address national needs like standards, regulation and laws, minimum risk, interoperability and to provide user with a consistent context or user experience.This document focuses on Transformation path of identity stone age to Identity as in state. It defines a digital identity zone model (DIZM to showcase the Global Identity defined across the ecosystem. Also, provide insight of emerging Technology trend to enable Identity assurance, privacy and policy enabled common Authentication framework.

  12. Transformation from Identity Stone Age to Digital Identity

    CERN Document Server

    Kohli, Mohit

    2011-01-01

    Technological conversion, political interests and Business drivers has triggered a means, to establish individual characterization and personalization. People started raising concerns on multiple identities managed across various zones and hence various solutions were designed. Technological advancement has brought various issues and concerns around Identity assurance, privacy and policy enabled common Authentication framework. A compressive framework is needed to established common identity model to address national needs like standards, regulation and laws, minimum risk, interoperability and to provide user with a consistent context or user experience. This document focuses on Transformation path of identity stone age to Identity as in state. It defines a digital identity zone model (DIZM) to showcase the Global Identity defined across the ecosystem. Also, provide insight of emerging Technology trend to enable Identity assurance, privacy and policy enabled common Authentication framework.

  13. Bridging Identities

    Science.gov (United States)

    Deaux, Kay; Burke, Peter

    2010-01-01

    Sociology and psychology are no strangers in the theoretical world of self and identity. Early works by William James (1890), a psychologist, and George Herbert Mead (1934), a sociologist, are often taken as a starting point by investigators in both fields. In more recent years, with the development of a number of identity theories in both fields,…

  14. Brand Identity.

    Science.gov (United States)

    Lawlor, John

    1998-01-01

    Instead of differentiating themselves by building "brand identities," colleges and universities often focus on competing with price. As a result, fewer and fewer institutions base their identities on value, the combination of quality and price. Methods of building two concepts to influence customers' brand image and brand loyalty are…

  15. Brand Identity.

    Science.gov (United States)

    Lawlor, John

    1998-01-01

    Instead of differentiating themselves by building "brand identities," colleges and universities often focus on competing with price. As a result, fewer and fewer institutions base their identities on value, the combination of quality and price. Methods of building two concepts to influence customers' brand image and brand loyalty are…

  16. Organizational Identity

    DEFF Research Database (Denmark)

    Hatch, Mary Jo; Schultz, Majken

    This text presents the classic works on organizational identity alongside more current thinking on the issues. Ranging from theoretical contributions to empirical studies, the readings in this volume address the key issues of organizational identity, and show how these issues have developed through...

  17. Identity Assemblages

    DEFF Research Database (Denmark)

    Horn, Line Helverskov

    2017-01-01

    , and theoretical foundation of the dissertation. Philosophically, the research rests on the central ANT concepts of symmetry, associations, and enactment with an inherent value of multiplicity. The philosophical position implies that the study of identity must be understood as the study of practices. This, in turn......Research in identity in general and professional identity specifically has seen an immense increase in recent years (Bauman 2004, Lawler 2014). Due to societal and technological developments, notions of what constitutes ‘the professional’ are subject to change. Thus, this dissertation rests...... on an understanding of professional identity as a moving concept that must be understood through its spatial and temporal contexts (Scanlon 2011). Accepting this position necessitates a reconsideration of the role that formal education plays in the development of professional identity of students. Researchers within...

  18. Bridging Identities through Identity Change

    Science.gov (United States)

    Cantwell, Allison M.; Martiny, Sarah E.

    2010-01-01

    As indicated by Deaux and Burke (this volume), sociology and psychology have shared a tradition of discourse allowing social psychologists to build upon each other's ideas. A conversation between social identity theory and identity theory was initiated fifteen years ago and addressed the similarities and differences between these theories. This…

  19. Electronic identity

    CERN Document Server

    de Andrade, Norberto Nuno Gomes; Argles, David

    2014-01-01

    With the increasing availability of electronic services, security and a reliable means by which identity is verified is essential.Written by Norberto Andrade the first chapter of this book provides an overview of the main legal and regulatory aspects regarding electronic identity in Europe and assesses the importance of electronic identity for administration (public), business (private) and, above all, citizens. It also highlights the role of eID as a key enabler of the economy.In the second chapter Lisha Chen-Wilson, David Argles, Michele Schiano di Zenise and Gary Wills discuss the user-cent

  20. National and Gender Measurement Invariance of the Utrecht-Management of Identity Commitments Scale (U-MICS): A 10-Nation Study With University Students.

    Science.gov (United States)

    Crocetti, Elisabetta; Cieciuch, Jan; Gao, Cheng-Hai; Klimstra, Theo; Lin, Ching-Ling; Matos, Paula Mena; Morsünbül, Ümit; Negru, Oana; Sugimura, Kazumi; Zimmermann, Grégoire; Meeus, Wim

    2015-12-01

    The purpose of this study was to examine the psychometric properties of the Utrecht-Management of Identity Commitments Scale (U-MICS), a self-report measure aimed at assessing identity processes of commitment, in-depth exploration, and reconsideration of commitment. We tested its factor structure in university students from a large array of cultural contexts, including 10 nations located in Europe (i.e., Italy, the Netherlands, Poland, Portugal, Romania, and Switzerland), Middle East (i.e., Turkey), and Asia (i.e., China, Japan, and Taiwan). Furthermore, we tested national and gender measurement invariance. Participants were 6,118 (63.2% females) university students aged from 18 to 25 years (Mage = 20.91 years). Results indicated that the three-factor structure of the U-MICS fitted well in the total sample, in each national group, and in gender groups. Furthermore, national and gender measurement invariance were established. Thus, the U-MICS can be fruitfully applied to study identity in university students from various Western and non-Western contexts.

  1. Threat of the feminine identity: The emerging structure in exploring the process of women's empowerment for menopause management: A grounded theory study

    Directory of Open Access Journals (Sweden)

    Mansoureh Yazdkhasti

    2016-11-01

    Full Text Available Women empowerment in different spheres of life especially menopause is among the key elements of health promotion in all communities. However there is no realistic images of empowering women in menopausal symptoms management. The present survey aimed to explain the process of women's empowerment for menopausal symptoms management. This qualitative study is part of a larger project which was conducted using Grounded Theory between 2013 and 2015. The article's main focus was to explore the underlying conditions and factors affecting the process of women's empowerment. Using a purposive and theoretical sampling method, 25 participants were interviewed 28 times. Data was collected through some in-depth, semi-structural and open ended interviews with the participant and also memoing and field notes. The interviews were conducted in Neighborhoods House affiliated to Tehran municipality and two gynecological clinics affiliated to Tehran University of Medical Sciences. Data analysis was applied through Strauss and Corbin approach (2008 using MAXQDA10 software. Threat of the feminine identity has been noted as the women's most common concern to being empowered in menopause management. The key theme emerged in the present study (threat of the feminine identity included four main categories (consciousness about the likelihood of femininity decline, negative attitude towards herself, inadequate supportive context, latent opportunity, two subcategories and 109 first-level codes. There is a logical, coherent and integrated relationship between all these concepts and the theme of feminine identity threat. This theme is considered as an underlying social problem and a major concern for postmenopausal women in the context of this group of women's empowerment. The factors (barriers and facilitators affecting women's empowerment in menopause management are associated with social context, intensity and origin of each society. Evaluation of Iranian women

  2. Changing the Ties That Bind? The Emerging Roles and Identities of General Practitioners and Managers in the New Clinical Commissioning Groups in the English NHS

    Directory of Open Access Journals (Sweden)

    Julia Segar

    2014-10-01

    Full Text Available The English National Health Service (NHS is undergoing significant reorganization following the 2012 Health and Social Care Act. Key to these changes is the shift of responsibility for commissioning services from Primary Care Trusts (PCTs to general practitioners (GPs working together in Clinical Commissioning Groups (CCGs. This article is based on an empirical study that examined the development of emerging CCGs in eight case studies across England between September 2011 and June 2012. The findings are based on interviews with GPs and managers, observations of meetings, and reading of related documents. Scott’s notion that institutions are constituted by three pillars—the regulative, normative, and cognitive–cultural—is explored here. This approach helps to understand the changing roles and identities of doctors and managers implicated by the present reforms. This article notes the far reaching changes in the regulative pillar and questions how these changes will affect the normative and cultural–cognitive pillars.

  3. Identity, identity politics, and neoliberalism

    Directory of Open Access Journals (Sweden)

    Wrenn Mary

    2014-01-01

    Full Text Available With the intensification of neoliberalism, it is useful to examine how some individuals might cope with the irrationality of the system. Neoliberalism cloaks the execution of the corporate agenda behind rhetorical manipulation that advocates for limited government. The corollary absence of government involvement on behalf of the citizenry writ large disarms the means of social redress for the individual. Democracy funded and fueled by corporate power thereby disenfranchises the individual, provoking some to search for empowerment through identity politics. The argument set forth suggests that individuals construct, reinforce, or escalate allegiance to identities as a coping mechanism, some of which manifest in violent identity politics.

  4. Reciprocal Benefits, Legacy and Risk: Applying Ellinger and Bostrom's Model of Line Manager Role Identity as Facilitators of Learning

    Science.gov (United States)

    Campbell, Paul; Evans, Peter

    2016-01-01

    Purpose: The purpose of this paper is to explore the beliefs held by managers about their roles as facilitators of learning with their employees in a public utilities organisation. Design/methodology/approach: The research was based on Ellinger and Bostrom's (2002) study on managers' beliefs on their role as facilitators of learning in…

  5. Online Identities and Social Networking

    Science.gov (United States)

    Maheswaran, Muthucumaru; Ali, Bader; Ozguven, Hatice; Lord, Julien

    Online identities play a critical role in the social web that is taking shape on the Internet. Despite many technical proposals for creating and managing online identities, none has received widespread acceptance. Design and implementation of online identities that are socially acceptable on the Internet remains an open problem. This chapter discusses the interplay between online identities and social networking. Online social networks (OSNs) are growing at a rapid pace and has millions of members in them. While the recent trend is to create explicit OSNs such as Facebook and MySpace, we also have implicit OSNs such as interaction graphs created by email and instant messaging services. Explicit OSNs allow users to create profiles and use them to project their identities on the web. There are many interesting identity related issues in the context of social networking including how OSNs help and hinder the definition of online identities.

  6. Fusing Knowledge Management into the Public Sector: a Review of the Field and the Case of the Emirates Identity Authority

    Directory of Open Access Journals (Sweden)

    Ali M. Al-Khouri

    2014-06-01

    Full Text Available Organizations worldwide are showing increasing interest in knowledge management practices to address the contemporary challenges of today's digital age. Knowledge is becoming a critical core asset to sustain competitive advantage and as a vehicle for continuous improvement and innovation. However, most of the developments in the knowledge management field are driven by international organizations or private commercial companies. Considering the impact of knowledge management practices, government organizations have the potential for significant improvements in performance, transformation, and the development of a more responsive citizen-centric government. This article has two objectives: The first is to provide an overview of knowledge management and highlight the importance of this field of practice, and the second is to provide a case study of the successful implementation of knowledge management in a federal government organization in the United Arab Emirates. This article outlines the adopted approach and framework and elaborates on each of the implemented components. The presented case study and lessons learned are benchmarks for best practices and contribute to the existing experimental cases. This, in turn, should help organizations and researchers to better understand how public sector government organizations perceive and practicing knowledge management, which should enable them to reflect and propose improvements.

  7. Challenging Identities

    DEFF Research Database (Denmark)

    Identity is a keyword in a number of academic fields as well as in public debate and in politics. During the last decades, references to identity have proliferated, yet there is no simple definition available that corresponds to the use of the notion in all contexts. The significance of the notio...... Christian Lammers, Saxo-Instituttet - Arkæologi, Etnologi, Historie og Græsk og Latin; Gert Sørensen, Institut for Engelsk, Germansk og Romansk ; Anne Ring Petersen, Institut for Kunst- og Kulturvidenskab...

  8. 基于VDS的异构环境统一身份管理解决方案%Solution for heterogeneous environments unified identity management based on Virtual Directory System

    Institute of Scientific and Technical Information of China (English)

    刘树坤; 程立雪

    2012-01-01

    为了解决异构网络环境中存在多种形式的身份信息整合问题,提出一种基于身份聚合和虚拟目录技术的统一身份解决方案,实现身份信息的统一管理,保障了身份信息的一致性,减少了维护管理,满足应用系统单点登录和安全审计等需求.尤其针对包含多分支机构集团的管理需求,实现了多分支机构身份信息的“分治”和企业级身份信息的“统治”.%In order to solve the integration problems existing in many forms of identity information in a heterogeneous network environmenl, this paper proposes an unified identity management solution basing on identity aggregation and Virtual Directory System(VDS) technology. It can achieve unified management of status information, ensure the consistency of identity information, and reduce maintenance and management work. Therefore it can meet the requirements of single sign-on, security and auditing for the application system. Especially for multi-branch group, the solution can implement the independent management of identity information for multiple branches and the centralized management for enterprise.

  9. A mutual authentication system of identity management based on eID%一种基于eID的身份管理双向认证系统

    Institute of Scientific and Technical Information of China (English)

    张雪锋; 谭鲁玚

    2015-01-01

    A mutual authentication system of identity management based on eID is designed in order to solve the credible problem between user and server while internet application provider authenticating the user.The system is designed based on the principle of S/Key dynamic password authenticating system,to use eID to provide credible validation of user’s identity,and to generate the symmetrical encrypt password which is used in S/Key system’s authenticating process through a double variables one-way function.Therefore a framework of the authentication system and authenticating protocols based on eID is finally designed.Both simulation results and security analysis show that the system can achieve identity validation with high security.%针对互联网应用机构对用户进行认证过程中用户与服务器间的可信问题,设计一种基于 eID身份管理内容的双向认证系统。该系统基于 S/Key动态口令系统认证原理,引入 eID对用户身份有效性进行可信验证,并通过双变量单向函数生成 S/Key系统认证过程中对称加密密钥,设计基于 eID的认证系统框架及认证协议。实验仿真结果和安全性分析表明,系统能够实现基于 eID的身份验证,具有较好的安全性。

  10. Designer's Identity

    DEFF Research Database (Denmark)

    Kunrath, Kamila; Cash, Philip; Li-Ying, Jason

    2016-01-01

    A designer’s professional identity (DPI) develops through both education and professional experience, building on core personality traits and innate skills. In this paper a systematic literature review and a secondary narrative review were developed in order to map personal attributes and design...

  11. [Identity theft

    CERN Multimedia

    Wolinksy, H

    2003-01-01

    "A new survey by the Federal Trade Commission indicates that over the last five years one in four American households has been hit by identity theft, which can result in thieves tapping their victims' credit cards or bank accounts" (1 page).

  12. Mediating Identity

    DEFF Research Database (Denmark)

    Kjærgaard, Annemette Leonhardt; Morsing, Mette; Ravasi, Davide

    2011-01-01

    This paper reports a longitudinal field study on the effects of positive media coverage on the reconstruction of organizational identity. The study highlights how intense positive coverage – to the point of turning an organization into a ‘celebrity’– influences both the way members understand the...

  13. Design and Construction of an Entity Resolution System that Supports Entity Identity Information Management and Asserted Resolution

    Science.gov (United States)

    Nelson, Eric Derrand

    2011-01-01

    This work describes the design and construction of an open source, entity resolution system that enables users to assign and maintain persistent identifiers for master data items. Two key features of this system that are not available in current ER systems and that make persistent identification possible are (1) The capture and management of…

  14. Civil Identity

    DEFF Research Database (Denmark)

    Petersen, Lars Axel

    scanning, etc., to discussions of Shari'a law versus common civil law in India; from the study of religious cult in ancient city states to the processes of constitutional reconstruction in former Communist countries; and from attempts at conflict resolution and prevention between Jewish and Arab citizens......In this paper I will go through a catalogue of examples of contexts in which the term civil identity is currently used, ranging from the formal and technical process of linking a set of administrative and other events to an individual biological person by means of identity cards, fingerprints, iris...... of technology and of law. If such a field can be established, the answers to those questions might be relevant to such contemporary issues as inter-ethnic, religious, and -cultural conflict or reconciliation, migration and nationality, civil rights and surveillance, security and privacy, bureaucracy and inter...

  15. Civil Identity

    DEFF Research Database (Denmark)

    Petersen, Lars Axel

    scanning, etc., to discussions of Shari'a law versus common civil law in India; from the study of religious cult in ancient city states to the processes of constitutional reconstruction in former Communist countries; and from attempts at conflict resolution and prevention between Jewish and Arab citizens...... of Israel to Luce Irigaray's Feminist agenda of elaborating gender specific civil identities. My intention is to investigate whether these different employments of 'civil identity' point towards a common, and fairly well defined object field asking questions of contemporary relevance to the philosophy...... of technology and of law. If such a field can be established, the answers to those questions might be relevant to such contemporary issues as inter-ethnic, religious, and -cultural conflict or reconciliation, migration and nationality, civil rights and surveillance, security and privacy, bureaucracy and inter...

  16. Consumer Identity

    OpenAIRE

    Young, Melissa Marie

    2009-01-01

    The purpose of this thesis is to prove that despite consumers' impression that they are alone in deciding their consumption decision they are wrong. Consumers are manipulated on various levels by marketers. It is the marketer who decides what consumer identities should be created. Consumers are persuaded by marketers on different levels beginning with consumers' needs. Marketers begin by appealing to consumer drives, motivations and emotions to persuade their consumers to purchase their brand...

  17. Trigonometric identities

    Directory of Open Access Journals (Sweden)

    Malvina Baica

    1986-01-01

    Full Text Available In this paper the author obtains new trigonometric identities of the form 2(p−1(p−22∏k=1p−2(1−cos2πkpp−1−k=pp−2 which are derived as a result of relations in a cyclotomic field ℛ(ρ, where ℛ is the field of rationals and ρ is a root of unity.

  18. Identity transformation

    DEFF Research Database (Denmark)

    Neergaard, Helle; Robinson, Sarah; Jones, Sally

    This paper develops the concept of ‘pedagogical nudging’ and examines four interventions in an entrepreneurship classroom and the potential it has for student identity transformation. Pedagogical nudging is positioned as a tool, which in the hands of a reflective, professional, with an understand......This paper develops the concept of ‘pedagogical nudging’ and examines four interventions in an entrepreneurship classroom and the potential it has for student identity transformation. Pedagogical nudging is positioned as a tool, which in the hands of a reflective, professional......, as well as the resources they have when they come to the classroom. It also incorporates perspectives from (ii) transformational learning and explores the concept of (iii) nudging from a pedagogical viewpoint, proposing it as an important tool in entrepreneurship education. The study incorporates......) assists students in straddling the divide between identities, the emotions and tensions this elicits, and (iv) transform student understanding. We extend nudging theory into a new territory. Pedagogical nudging techniques may be able to unlock doors and bring our students beyond the unacknowledged...

  19. "Meth circles" and "pipe pirates": crystal methamphetamine smoking and identity management among a social network of young adults.

    Science.gov (United States)

    Green, Rachael; Moore, David

    2013-06-01

    This article analyzes crystal methamphetamine smoking among a social network of young Australian adults. Ethnographic data were collected from 2005 to 2007 among 60 individuals, and semistructured in-depth interviews were conducted with a sub-set of 25 individuals. Fieldnotes and interview transcripts were entered into NVivo7 and thematically analyzed. We argue that although drug use may be considered "normal" among some social networks, the management of stigma associated with drug use is more complex and contested than portrayed in the literature. Policy implications are discussed. The study was supported by funds from Australia's National Health and Medical Research Council.

  20. Keeping identity private

    DEFF Research Database (Denmark)

    Adjei, Joseph K.; Olesen, Henning

    2011-01-01

    Privacy has become a major issue for policy makers. This has been impelled by the rapid development of technologies that facilitate collection, distribution, storage, and manipulation of personal information. Business organizations are finding new ways of leveraging the value derived from consumer...... is an attempt to understand the relationship between individuals’ intentions to disclose personal information, their actual personal information disclosure behaviours, and how these can be leveraged to develop privacy-enhancing identity management systems (IDMS) that users can trust. Legal, regu...

  1. Identity at work: Exploring strategies for Identity Work

    Directory of Open Access Journals (Sweden)

    Byron G. Adams

    2012-01-01

    Full Text Available Orientation: This study explored strategies for identity work that are central to the negotiation and regulation of employee work identity.Research purpose: The main aim of this study was to explore employee narratives and identify the strategies available to them in the process of identity work, as they defined themselves at work.Motivation for the study: As there is a scarcity of research on identity work in South Africa, this study wanted to advance knowledge about identity work and the strategies used for regulating and negotiating an identity at work by exploring these constructs in this context.Research design, approach and method: A qualitative research process formed the basis for this study. Nineteen employees from a global manufacturing company participated in two semi-structured in-depth interviews. Grounded theory was applied to analyse and interpret the data.Main findings: Nine strategies for identity work were identified and categorised into four broad themes (personal philosophies; relationships; career management and negotiating balance.Practical/managerial implications: Employees followed various strategies for defining themselves at work and this may have some implications for employee work engagement and productivity.Contribution/value-add: This study expands on current theoretical knowledge of identity work, and provides insights into the strategies people use to regulate and negotiate their identities at work. 

  2. Assessment and Management of the Geomorphological Heritage of Monte Pindo (NW Spain: A Landscape as a Symbol of Identity

    Directory of Open Access Journals (Sweden)

    Manuela Costa-Casais

    2015-06-01

    Full Text Available This study focuses on the granite mountain known as Monte Pindo (627 m above sea level in the Autonomous Community of Galicia (NW Spain. This territory is included in the area classified as “Costa da Morte” in the “Politica de Ordenación Litoral” (POL (Coastal Planning Policy for the region of Galicia. This coastal unit, located between “Rías Baixas” and “Cape Fisterra” has great potential for demonstrating geological processes and its geomorphological heritage is characterized by a high degree of geodiversity of granite landforms. The main objective of our work is to assess the geomorphological heritage of the site, thus revealing its wide geodiversity. We shall analyze and highlight: its scientific value, developing an inventory of granite landforms; its educational valuel and its geotouristic potential. It must be ensured that the Administration understands that natural diversity is composed of both geodiversity and biodiversity. Only then will the sustainable management of Monte Pindo become possible by integrating natural and cultural heritage values. The goal is to ensure that Monte Pindo and its immediate surroundings become a geopark with the aim of promoting local development projects based on the conservation and valorization of its geological heritage.

  3. Identity Style, Parental Authority, and Identity Commitment.

    Science.gov (United States)

    Berzonsky, Michael D.

    2004-01-01

    The role that parental authority patterns and social-cognitive identity styles may play in establishing identity commitments was investigated. The results indicated that family authority and identity style variables combined accounted for 50% of the variation in strength of identity commitment. As hypothesized, the relationship between parental…

  4. Identity Style, Parental Authority, and Identity Commitment.

    Science.gov (United States)

    Berzonsky, Michael D.

    2004-01-01

    The role that parental authority patterns and social-cognitive identity styles may play in establishing identity commitments was investigated. The results indicated that family authority and identity style variables combined accounted for 50% of the variation in strength of identity commitment. As hypothesized, the relationship between parental…

  5. Economic, Political and Symbolic Management of “Traditional Knowledge”: The Construction of a Self-Identity in a Globalized World

    Directory of Open Access Journals (Sweden)

    Marc Lenaerts

    2010-11-01

    Full Text Available This paper is the introduction to the dossier with three articles resulting from the Symposium “Economic, Political and Symbolic Management of ‘Traditional Knowledge’: Indigenous Criteria and External Redefinitions” of the 53rd International Congress of Americanists (Mexico, 2009. We have modified the subtitle of the Symposium, adopting in exchange for this dossier the subtitle of the Congress’ motto: “The Construction of a Self-Identity in a Globalized World”. The first part of the text remembers Ana María Spadafora, co-organizer of the Symposium and editor of the dossier, who passed away in 2010. The second part presents the aim of the Symposium and the contribution of the three articles in the dossier, plus Ana María Spadafora’s article, which was published earlier in this journal. Even though they touch on quite different research fields—bio-trade in Mexico and Peru, commercialization of handicrafts in French Guiana, modifications of traditional knowledge among the Ashéninka of Peru, and dreams of Pilagá women of the Chaco as practical action—all four papers show that the emphasis on relational aspects, the polyvalence of thoughts and practices or the imbrication of speaking, thinking and doing are stronger constants than the persistence of this or that emblematic element of “ethnic tradition.”

  6. Identity In and Around Organisations

    DEFF Research Database (Denmark)

    Schultz, Majken; Maguire, Steve

    2013-01-01

    At the heart of any successful organisation lies a powerful conception of identity: the coherent way in which it presents itself to its stakeholders and employees, containing its purpose, goals and key characteristics. However, the traditional idea of identity as a stable, solid and reliable...... concept may not be the best way of approaching and managing your organisation. Rather, Majken Schultz and Steve Maguire argue that organisations would benefit from adopting a process-based view of identity, which integrates history, ongoing change and market instability into its definition....

  7. Development and Application of Network Electronic Identity Management in Major Countries and Regions around the World%全球主要国家和地区网络电子身份管理发展与应用

    Institute of Scientific and Technical Information of China (English)

    胡传平; 陈兵; 方滨兴; 邹翔

    2016-01-01

    本文对世界主要国家和地区网络电子身份管理的最新进展、典型应用以及我国网络电子身份管理与应用等情况进行了全面的分析与梳理,并结合网络身份管理技术的发展趋势,提出“十三五”期间我国网络电子身份管理的发展思路和建设性意见,旨在加强网络空间身份管理,构建网络空间身份管理体系,同时有助于规范网民行为、防范打击网络犯罪、构建网络强国、维护国家安全和网络空间主权、保护网络用户的个人隐私,以期为“十三五”期间我国网络身份管理发展提供借鉴和参考。%This paper analyzes and sorts out the latest developments and typical applications of network electronic identity manage-ment in major countries and regions around the world, and discusses development trends in network identity management technology. It outlines network electronic identity management in China according to the 13th Five-Year Plan, including the development of ideas and constructive suggestions, the strengthening of network space identity management, and the construction of a network space iden-tity management system. Such a system can help to regulate the behavior of Internet users, ifght against network crime, build network power, safeguard national security and cyberspace sovereignty, and protect the privacy of network users;thus, it provides a reference for China’s network identity management development during the 13th Five-Year Plan.

  8. 德国eID机制对我国网络身份管理的启示%Reference of Germany eID Mechanism for China Network Identity Management

    Institute of Scientific and Technical Information of China (English)

    杨明慧; 刘孟占; 邹翔; 汪志鹏; 饶洁

    2014-01-01

    Network identity management has become the base of on-line applications such as e-business,e-government and social net-work. Civil network electronic identity (eID) is authoritative electronic file to determine individual identity,which is an effective ap-proach to implement the network identity management. However,it is a problem to protect the client’ s private data when carrying out the identity management in the network. In this paper,some problems of traditional identity authentication methods are described first. Then a deep analysis of Germany eID mechanism is made,especially for privacy protection and data security. The results show that Germany eID mechanism has important reference for China network identity management.%网络身份管理已经成为电子商务、电子政务、社交网络等各类网络在线应用的基础。公民网络电子身份标识eID是网络上远程证明个人真实身份的权威性电子文件,是一种实现网络身份管理的有效手段。如何在进行有效的身份认证的同时又能兼顾保护用户隐私是当前网络身份管理中亟需解决的问题。首先概述了当前网络身份认证中存在的问题,然后针对德国eID机制在隐私保护、数据安全方面采取的措施进行了研究分析,最后给出了德国eID机制对我国网络身份管理的借鉴意义。

  9. Exploiting OAuth 2.0: from User Delegation for OGC Services to a Generic Federation-as-a-Service Solution for Federated Identity Management

    Science.gov (United States)

    Kershaw, Philip; Jensen, Jens; Stephens, Ag; van Engen, Willem

    2013-04-01

    We explore an application of OAuth to enable user delegation for OGC-based services and the evolution of this solution to form part of a wider Federation-as-a-Service offering for federated identity management. OAuth has established itself in the commercial sector as a means for users to delegate access to secured resources under their control to third parties. It has also found its way into the academic and research domains as a solution for user delegation. Notable examples including the CILogon project for Teragrid in the US, and also, closer to the Earth Sciences, as part of the OGC Web Services, Phase 6 Testbed. Both are examples of OAuth 1.0 implementations. Version 2.0 has seen significant changes to this original specification which have not been without controversy but it has arguably provided a greater degree of flexibility in how it can be applied and the use cases that it can address. At CEDA (Centre for Environmental Data Archival, STFC), a Python implementation of OAuth 2.0 was made to explore these capabilities with a focus on providing a solution for user delegation for data access, processing and visualisation services for the Earth Observation and Climate sciences domains. The initial goal was to provide a means of delegating short-lived user credentials to trusted services along the same lines as the established approach of Proxy certificates widely used in Grid computing. For the OGC and other HTTP-based services employed by CEDA, OAuth makes a natural fit for this role, integrating with minimal impact on existing interfaces. Working implementations have been made for CEDA's COWS Web Processing Service and Web Map Service. Packaging the software and making it available in Open Source repositories together with the generic nature of the solution have made it readily exploitable in other application domains. At the Max Planck Institute for Psycholinguistics (Nijmegen, The Netherlands), the software will be used to integrate some tools in the

  10. 基于身份的Ad Hoc网密钥管理方案%Identity-based key management scheme for Ad Hoc network

    Institute of Scientific and Technical Information of China (English)

    孙梅; 赵兵

    2012-01-01

    According to the characteristics of Ad Hoc networks, such as mobility and self-organization, an identity-based key management scheme for Ad Hoc networks was proposed. In the paper, by the method of secure distributed key generation based on threshold cryptography, the interior members of Ad Hoc networks collaborated to conduct the system private key. Compared with the existent protocol, the proposed scheme, does not require the fixed structure of service nodes, and service nodes can dynamically join and leave network. At the same time, the system key is updatable among service nodes. The analytical results show the proposed scheme is flexible and secure, and it is suitable for Mobile Ad Hoc Network ( MANET).%鉴于Ad Hoc网络的可移动、自组织性等优点,提出了一种适用于Ad Hoc网络的基于身份的密钥管理方案,所提方案在门限密码学的基础上以完全分布化方式建立系统密钥.与已有的Ad Hoc网络密钥管理方案相比,它不需要固定的密钥服务节点组,密钥服务节点可以动态加入和撤离,而且系统密钥在密钥服务节点组内还可以动态更新.分析结果表明所提方案具有灵活、安全的特点,较好地适应了移动自组网(MANET).

  11. Ad Hoc网络中基于身份的密钥管理及认证%An Identity-based Key Management and Authentication in Wireless Ad Hoc Network

    Institute of Scientific and Technical Information of China (English)

    肖希; 金亮

    2012-01-01

    In this paper, a distributed key management and authentication approach based on identity in wireless Ad Hoc network is introduced. Each node uses the identity as its public key. The master private is shared by the private key of every node. Threshold and identity-based key management and authentication are used. The identity-based mechanism is applied here not only to provide end-to-end authenticity and confidentiality, but also to save network bandwidth and computational power of wireless nodes. It is very efficient and robust to transfer packets.%提出了在AdHoe网络中一种分布式基于身份的密钥管理及认证方法。每个节点使用其身份作为公钥,主密钥由各节点的私钥分享,从而形成基于身份的门限分布式密钥管理。该方法不仅提供了点对点的认证,而且节省了网络带宽和节点的能量消耗,具有很高的效率和鲁棒性。

  12. Experiences and Lessons Learnt with Collaborative e-Research Infrastructure and the application of Identity Management and Access Control for the Centre for Environmental Data Analysis

    Science.gov (United States)

    Kershaw, P.

    2016-12-01

    CEDA, the Centre for Environmental Data Analysis, hosts a range of services on behalf of NERC (Natural Environment Research Council) for the UK environmental sciences community and its work with international partners. It is host to four data centres covering atmospheric science, earth observation, climate and space data domain areas. It holds this data on behalf of a number of different providers each with their own data policies which has thus required the development of a comprehensive system to manage access. With the advent of CMIP5, CEDA committed to be one of a number of centres to host the climate model outputs and make them available through the Earth System Grid Federation, a globally distributed software infrastructure developed for this purpose. From the outset, a means for restricting access to datasets was required, necessitating the development a federated system for authentication and authorisation so that access to data could be managed across multiple providers around the world. From 2012, CEDA has seen a further evolution with the development of JASMIN, a multi-petabyte data analysis facility. Hosted alongside the CEDA archive, it provides a range of services for users including a batch compute cluster, group workspaces and a community cloud. This has required significant changes and enhancements to the access control system. In common with many other examples in the research community, the experiences of the above underline the difficulties of developing collaborative e-Research infrastructures. Drawing from these there are some recurring themes: Clear requirements need to be established at the outset recognising that implementing strict access policies can incur additional development and administrative overhead. An appropriate balance is needed between ease of access desired by end users and metrics and monitoring required by resource providers. The major technical challenge is not with security technologies themselves but their effective

  13. Digital identity in ambient environments

    NARCIS (Netherlands)

    B.A.M. Ben Schouten; Onkar Ambekar

    2006-01-01

    Embedded systems and ambient technology enable users to interact at any time and anywhere. In the BASIS project for identity management, CWI investigates transparent biometrics in home environments. Possible application areas are user profiling for shopping , listening to one's favourite music and o

  14. Digital identity in ambient environments

    NARCIS (Netherlands)

    Schouten, Ben; Ambekar, Onkar

    2006-01-01

    Embedded systems and ambient technology enable users to interact at any time and anywhere. In the BASIS project for identity management, CWI investigates transparent biometrics in home environments. Possible application areas are user profiling for shopping , listening to one's favourite music and o

  15. 一种以用户为中心的移动互联网身份管理及认证系统%A user-centric identity management and authentication system for mobile Internet

    Institute of Scientific and Technical Information of China (English)

    王鹃; 何琪; 严飞; 蒋万伟; 杨明; 王妍

    2012-01-01

    Based on the current research of user-centric identity management mechanism and technology, a new user- centric identity authentication system on mobile Internet platform named ID-Vcard was proposed and implemented on the Android platform. In the system of ID-Vcard, user can manage and use own identity information in the form of virtual card. In the process of authentication, it takes the advantage of the user' s and IdP' s digital certificates to authenticate users on RP. ID-Vcard has good usability in mobile platform because users can manage their identity information by vir- tual cards. In addition, it tries to reduce and eliminate the username/password authentication method.%在对目前以用户为中心的身份管理机制及技术的研究基础上,提出了一种以用户为中心的移动互联网身份认证系统ID-Vcard,并基于Android平台实现了该系统。ID-Vcard系统中的用户通过虚拟卡的形式管理和使用自己的身份信息,在身份认证过程中,通过用户及IdP的数字证书在Web站点进行身份认证。该系统在移动平台上具有良好的可用性,减少并尽量消除了目前互联网身份认证对用户名/密码方式的依赖。

  16. Personal Identity in Italy

    Science.gov (United States)

    Crocetti, Elisabetta; Rabaglietti, Emanuela; Sica, Luigia Simona

    2012-01-01

    This chapter discusses specifics of identity formation in Italian adolescents and emerging adults. We review consistent evidence illustrating that, in Italy, a progressive deferral of transition to adulthood strongly impacts youth identity development by stimulating identity exploration and postponement of identity commitments. We also consider…

  17. Personal Identity in Italy

    Science.gov (United States)

    Crocetti, Elisabetta; Rabaglietti, Emanuela; Sica, Luigia Simona

    2012-01-01

    This chapter discusses specifics of identity formation in Italian adolescents and emerging adults. We review consistent evidence illustrating that, in Italy, a progressive deferral of transition to adulthood strongly impacts youth identity development by stimulating identity exploration and postponement of identity commitments. We also consider…

  18. Interplay Between Intended Brand Identity and Identities in a Nike Related Brand Community

    DEFF Research Database (Denmark)

    Kornum, Niels; Gyrd-Jones, Richard; Al Zagir, Nadia

    2017-01-01

    While branding research traditionally views brand identity as an inside-out management controlled phenomenon, recent research emphasizes that a wide variety of stakeholders in the brand ecosystem enact and co-create brand identity. Following this theoretical perspective, management forms......, this research compares individual and collective articulations of a Nike related brand community with articulations of the intended brand identity. While earlier findings solely emphasize inside-out brand management or outside-in brand community perspectives, the findings of this article reveal a nested system...... the intended brand identity in a deliberate process and articulates this identity, surfacing as values and artifacts. Stakeholders develop and articulate values and artifacts in their own manner, but enact the brand identity at the same time. On the basis of data from a participatory ethnographic study...

  19. Exploring the identity and "sense of identity" of organisations

    Directory of Open Access Journals (Sweden)

    C L Van Tonder

    2006-03-01

    Full Text Available During the past two decades a steady increase in scholarly contributions in the area of organisation identity have been observed – to the point that the phenomenon is now the subject of a sustainable discourse in several disciplines. Many theoretical and conceptual dilemmas however remain, largely as a result of the low incidence of empirical research in the area. This study reports the results of an exploratory investigation that adapted Schley and Wagenfield’s (1979 concept of identity for use in an organisational setting. Interviews were conducted with 152 top managers representing 10 companies. The results indicate that organisational responses to the question “who am I?�? elicit distinctive organisational self-descriptions and some awareness of identity issues.

  20. Monitoring migrants or making migrants ‘misfit’? : Data protection and human rights perspectives on Dutch identity management practices regarding migrants

    NARCIS (Netherlands)

    La Fors, Karolina

    2016-01-01

    Record numbers of migrants and refugees fleeing violence and poverty in parts of Africa and the Middle East present the European Union with unprecedented challenges, including in determining their identity as well as status. In recent years problems of identifying immigrants have been addressed in

  1. The identity approach for assessing socio-technical resilience to climate change: example of flood risk management for the Island of Dordrecht

    NARCIS (Netherlands)

    Gersonius, B.; Ashley, R.; Zevenbergen, C.

    2012-01-01

    Recent EU guidance on adaptation calls for the enhancement of socio-technical resilience to climate change. However, socio-technical resilience is relatively poorly defined and this makes it difficult to apply in practice. This paper uses the concept of identity as a vehicle to advance the definitio

  2. Monitoring migrants or making migrants ‘misfit’? : Data protection and human rights perspectives on Dutch identity management practices regarding migrants

    NARCIS (Netherlands)

    La Fors, Karolina

    2016-01-01

    Record numbers of migrants and refugees fleeing violence and poverty in parts of Africa and the Middle East present the European Union with unprecedented challenges, including in determining their identity as well as status. In recent years problems of identifying immigrants have been addressed in o

  3. Keeping identity private

    DEFF Research Database (Denmark)

    Adjei, Joseph K.; Olesen, Henning

    2011-01-01

    Privacy has become a major issue for policy makers. This has been impelled by the rapid development of technologies that facilitate collection, distribution, storage, and manipulation of personal information. Business organizations are finding new ways of leveraging the value derived from consumer...... is an attempt to understand the relationship between individuals’ intentions to disclose personal information, their actual personal information disclosure behaviours, and how these can be leveraged to develop privacy-enhancing identity management systems (IDMS) that users can trust. Legal, regu...... information. On the other hand, consumers have expressed concerns that their rights and ability to control their personal information are violated. Paradoxically, it appears that users provide personal data freely and willingly, as it has been observed on Facebook and other social networks. This study...

  4. Identities at Odds

    DEFF Research Database (Denmark)

    Hazel, Spencer

    2015-01-01

    This study offers an interaction analytic account of how linguistic identities in internationalized workplaces in Denmark are indexed against members’ institutional positions in particular interactional settings. Where language policy may not be explicitly articulated between members, it is still...... embedded in how participants micro-manage their interactions, and implicit in how member’s display orientations to deviance, in the case of encountering others in the workplace whose language repertoires or preferences do not meet with expectation pertaining to the institutional position they hold....... The study uses recordings of naturally occurring interaction in different international workplace settings, and argues for greater attention to be paid to the actual language-policy practices in international workplace settings, as a entry point into developing a more nuanced understanding of the practices...

  5. 统一身份控制和审计管理在大型企业IT系统中的应用研究%Unified Identity Control and Audit Management Application in Large Enterprises IT System

    Institute of Scientific and Technical Information of China (English)

    胡学勇

    2011-01-01

    In large enterprises IT system run management,through establishing unified identity control and audit management platform,implementation Account Management,Authentication,Authorization and Audit,will strengthen and upgrade information system audit of-in rules sexual and system run of security.%在大型企业IT系统运行管理中通过建立统一身份控制和审计管理平台,实现集中账号管理、集中身份认证、集中访问授权、集中审计,有效提升了大型企业信息系统审计的合规性和系统运行的安全性。

  6. Identity and identity conflict in the workplace

    NARCIS (Netherlands)

    K.E. Horton (Kate); P.S. Bayerl (Saskia); G. Belschak-Jacobs (Gabriele)

    2014-01-01

    textabstractAs individuals, we define ourselves according to various characteristics that include our values and beliefs. This gives us our identity. As organisations become increasingly complex, understanding the concept of identity conflict may mean the difference between success and failure.

  7. Identities as organizational practices

    DEFF Research Database (Denmark)

    Oshima, Sae; Asmuß, Birte

    Identity has been widely acknowledged as playing a central role in various organizational processes, yet there is still a need to better understand the dynamics and functions of identity work in modern organizations. The present paper is centered within this concern, and examines identity as inte......) reveal the intersubjective, multimodal and embodied nature of identity work; 2) demonstrate identity work as organizational practices, used in order to accomplish specific actions; and 3) pose a question on the view on identity as a layered/leveled phenomenon.......Identity has been widely acknowledged as playing a central role in various organizational processes, yet there is still a need to better understand the dynamics and functions of identity work in modern organizations. The present paper is centered within this concern, and examines identity...

  8. The medical leadership challenge in healthcare is an identity challenge.

    Science.gov (United States)

    Andersson, Thomas

    2015-01-01

    The purpose of this article is to describe and analyse the identity challenges that physicians with medical leadership positions face. Four qualitative case studies were performed to address the fact that identity is processual, relational and situational. Physicians with managerial roles were interviewed, as well as their peers, supervisors and subordinates. Furthermore, observations were made to understand how different identities are displayed in action. This study illustrates that medical leadership implies identity struggles when physicians have manager positions, because of the different characteristics of the social identities of managers and physicians. Major differences are related between physicians as autonomous individuals in a system and managers as subordinates to the organizational system. There are psychological mechanisms that evoke the physician identity more often than the managerial identity among physicians who are managers, which explains why physicians who are managers tend to remain foremost physicians. The implications of the findings, that there are major identity challenges by being both a physician and manager, suggest that managerial physicians might not be the best prerequisite for medical leadership, but instead, cooperative relationships between physicians and non-physician managers might be a less difficult way to support medical leadership. Acknowledging and addressing identity challenges can be important both in creating structures in organizations and designing the training for managers in healthcare (both physicians and non-physicians) to support medical leadership. Medical leadership is most often related to organizational structure and/or leadership skills, but this paper discusses identity requirements and challenges related to medical leadership.

  9. Management of a Concealable Stigmatized Identity: A Qualitative Study of Concealment, Disclosure, and Role Flexing Among Young, Resilient Sexual and Gender Minority Individuals.

    Science.gov (United States)

    Bry, Laura Jane; Mustanski, Brian; Garofalo, Robert; Burns, Michelle Nicole

    2017-01-01

    Disclosure of a sexual or gender minority status has been associated with both positive and negative effects on wellbeing. Few studies have explored the disclosure and concealment process in young people. Interviews were conducted with 10 sexual and/or gender minority individuals, aged 18-22 years, of male birth sex. Data were analyzed qualitatively, yielding determinants and effects of disclosure and concealment. Determinants of disclosure included holding positive attitudes about one's identity and an implicit devaluation of acceptance by society. Coming out was shown to have both positive and negative effects on communication and social support and was associated with both increases and decreases in experiences of stigma. Determinants of concealment included lack of comfort with one's identity and various motivations to avoid discrimination. Concealment was also related to hypervigilance and unique strategies of accessing social support. Results are discussed in light of their clinical implications.

  10. Short forms of the Utrecht-Management of Identity Commitments Scale (U-MICS) with the domains of job, romantic relationship, and region.

    Science.gov (United States)

    Schubach, Elisabeth; Zimmermann, Julia; Noack, Peter; Neyer, Franz J

    2017-01-01

    The U-MICS is a self-report questionnaire designed to assess the identity dimensions from a domain-specific perspective. The present study reports on the development of a short-form version for the domains of job and romantic relationship in young adults from Germany and extends this scale to include the domain of region (nSample1 = 95, 84% female, mean age 22.45 years; nSample2 = 1,795, 71% female, mean age 24.53 years). We found the short form to possess adequate psychometric properties and to demonstrate a factor structure congruent to the long-form version. Regarding validity, the small correlations across domains within dimensions support a domain-specific approach to identity. The associations between the different identity domains with personality traits are similar, indicating a consistent pattern of convergent validity for all domains. We conclude that "region" provides a valuable complement to the established domains that can all be reliably assessed with the U-MICS-Short Form. Copyright © 2016 The Foundation for Professionals in Services for Adolescents. Published by Elsevier Ltd. All rights reserved.

  11. Negotiating work identity

    Directory of Open Access Journals (Sweden)

    Tamsen Saayman

    2011-03-01

    Full Text Available Orientation: The study explored the dynamics of work identity negotiation and construction.Research purpose: The aim of the study was to investigate identity tensions and demands that mobilise identity work in the work environment.Motivation for the study: The study hoped to improve the understanding of the dynamics of identity construction and negotiation.Research design, approach and method: Using grounded theory methodology in the context of qualitative field research, the researchers conducted two unstructured interviews with 28 employees of a South African manufacturing company.Main findings: The five primary dimensions the data yielded were personal identity, individual agency, social identity, social practice and job.Practical/managerial implications: This study has implications for organisations that want to improve productivity through understanding work identity.Contribution/value-add: The article presents a conceptual model of the demands and tensions that influence work identity.

  12. Researching Identity and Interculturality

    DEFF Research Database (Denmark)

    Lønsmann, Dorte

    2016-01-01

    Review of: Researching Identity and Interculturality / by F. Dervin and K. Risager (eds.). Routledge 2015, 245 pp.......Review of: Researching Identity and Interculturality / by F. Dervin and K. Risager (eds.). Routledge 2015, 245 pp....

  13. Diversity of deaf identities.

    Science.gov (United States)

    Bat-Chava, Y

    2000-12-01

    Social Identity Theory (Tajfel, 1981) posits that members of minority groups achieve positive social identity by (a) attempting to gain access to the mainstream through individual mobility or (b) working with other group members to bring about social change. Some people may use a combination of both strategies. Through the use of cluster analysis, the existence of three identities associated with these strategies was discerned in a sample of 267 deaf adults: culturally hearing identity, culturally deaf identity, and bicultural identity, each comprising about a third of the sample. A subset of 56 people were interviewed in depth; excerpts are presented to illustrate the identity types. Qualified support was found for the prediction that people with culturally deaf and bicultural identities would have higher self-esteem.

  14. Professional entrepreneurial identity construction

    DEFF Research Database (Denmark)

    Ramsgaard, Michael Breum

    2014-01-01

    The present study investigates the construction of a professional identity as an entrepreneur in a sample of people with educational background in nutrition and health. The study examines the connection between professional identity construction and entrepreneurial business emergence using...

  15. Facilitating Conversations about Managerial Identities

    DEFF Research Database (Denmark)

    Madsen, Mona Toft

    for identity work was introduced. The empirical starting point was progressive performativity and constructionistic process consultation with the intention to engage with a practical context, a company. The empirical study was based on a) individual interviews with three middle managers in a project......-based organization in the engineering consulting sector b) a reflection meeting, where the same three managers were gathered, and conversations were facilitated based on identity work in the context of earlier interviews. More specifically, three themes were discussed; flat organizational structure, tensions between...... project work and professional development, and the role of Department Heads. Theoretically, the study contributes to discussions on the need for legitimizing different mixtures of bureaucratic and post bureaucratic ideals. Methodological reflections are made in the discussion as well....

  16. Language, Power and Identity

    Science.gov (United States)

    Wodak, Ruth

    2012-01-01

    How are identities constructed in discourse? How are national and European identities tied to language and communication? And what role does power have--power in discourse, over discourse and of discourse? This paper seeks to identify and analyse processes of identity construction within Europe and at its boundaries, particularly the diversity of…

  17. Experiencing with Identity

    DEFF Research Database (Denmark)

    Pors, Justine Grønbæk

    2012-01-01

    This article studies how a political organization begins to experiment with its identity. By use of an empirical case of the Danish Ministry of Education, I examine how a political organization supplements its identity of a legislating power with identities of a supervisor, beacon and facilitator...

  18. Identity Security Awareness

    OpenAIRE

    Philipsen, Nayna C.

    2004-01-01

    Identity theft is an increasing concern when organizations, businesses, and even childbirth educators ask for a client's Social Security number for identification purposes. In this column, the author suggests ways to protect one's identity and, more importantly, decrease the opportunities for identity theft.

  19. Teachers' Interpersonal Role Identity

    Science.gov (United States)

    van der Want, Anna C.; den Brok, Perry; Beijaard, Douwe; Brekelmans, Mieke; Claessens, Luce C. A.; Pennings, Helena J. M.

    2015-01-01

    This article investigates the link between teachers' appraisal of specific interpersonal situations in classrooms and their more general interpersonal identity standard, which together form their interpersonal role identity. Using semi-structured and video-stimulated interviews, data on teachers' appraisals and interpersonal identity standards…

  20. Social Identity and Preferences*

    Science.gov (United States)

    Benjamin, Daniel J.; Choi, James J.; Strickland, A. Joshua

    2009-01-01

    Social identities prescribe behaviors for people. We identify the marginal behavioral effect of these norms on discount rates and risk aversion by measuring how laboratory subjects’ choices change when an aspect of social identity is made salient. When we make ethnic identity salient to Asian-American subjects, they make more patient choices. When we make racial identity salient to black subjects, non-immigrant blacks (but not immigrant blacks) make more patient choices. Making gender identity salient has no effect on intertemporal or risk choices. PMID:20871741

  1. 30 CFR 41.20 - Legal identity report.

    Science.gov (United States)

    2010-07-01

    ... legal identity and every change thereof with the appropriate district manager of the Mine Safety and... 30 Mineral Resources 1 2010-07-01 2010-07-01 false Legal identity report. 41.20 Section 41.20... ADMINISTRATIVE REQUIREMENTS NOTIFICATION OF LEGAL IDENTITY Operator's Report to the Mine Safety and...

  2. Identity and Professional Networking.

    Science.gov (United States)

    Raj, Medha; Fast, Nathanael J; Fisher, Oliver

    2017-06-01

    Despite evidence that large professional networks afford a host of financial and professional benefits, people vary in how motivated they are to build such networks. To help explain this variance, the present article moves beyond a rational self-interest account to examine the possibility that identity shapes individuals' intentions to network. Study 1 established a positive association between viewing professional networking as identity-congruent and the tendency to prioritize strengthening and expanding one's professional network. Study 2 revealed that manipulating the salience of the self affects networking intentions, but only among those high in networking identity-congruence. Study 3 further established causality by experimentally manipulating identity-congruence to increase networking intentions. Study 4 examined whether identity or self-interest is a better predictor of networking intentions, providing support for the former. These findings indicate that identity influences the networks people develop. Implications for research on the self, identity-based motivation, and professional networking are discussed.

  3. The Supermalt identity

    DEFF Research Database (Denmark)

    Bech-Larsen, Tino; Esbjerg, Lars; Grunert, Klaus G.

    2007-01-01

    -Caribbean informants. The food and beverage consumption of informants reflects their mixed cultural identity. The brand identity Supermalt appears to be malleable, with ample room for consumer co-construction. Perceptions of brand identity differ markedly among informants, who are all able to construct Supermalt...... on consumers' self-identities. The second part explored the role of food and beverage products in the construction of self-identities. The final part focused on the construction of brand identity for Supermalt. Findings - The article provides information on the self-identities constructed by Afro...... aiming to develop strong brands with a limited marketing budget. Based on the Supermalt case, suggestions are made regarding branding in relation to ethnic minorities. Originality/value - This article provides a study of a brand that has become strong within a narrowly defined group of consumers....

  4. 'I don't view myself as a woman politician, I view myself as a politician who's a woman': The discursive management of gender identity in political leadership.

    Science.gov (United States)

    Sorrentino, Jasmin; Augoustinos, Martha

    2016-09-01

    Former Prime Minister Julia Gillard's speech in the Australian parliament on sexism and misogyny received considerable public attention and controversy. However, less attention has been paid to how Gillard attended and oriented to issues related to her status as a woman during the period between her elevation to the position of Prime Minister in June 2010 and the delivery of the misogyny speech in October 2012. Using a discursive psychological approach, this article examines a corpus of interview transcripts in which gender was occasioned both explicitly and implicitly by speakers, thus requiring Gillard to attend to her gender identity. The analysis demonstrates that far from making gender a salient and relevant membership category, Gillard worked strategically to mitigate her gender as merely inconsequential to her role as Prime Minister. These findings are discussed in relation to existing research examining how gender is oriented to, negotiated, and resisted in talk to accomplish social actions, and more specifically what may be at stake for women in leadership positions who explicitly orient to gender as an identity category.

  5. An Identity-Based Encryption Scheme with Compact Ciphertexts

    Institute of Scientific and Technical Information of China (English)

    LIU Sheng-li; GUO Bao-an; ZHANG Qing-sheng

    2009-01-01

    This paper proposes an identity-based encryption scheme with the help of bilinear pairings, where the identity information of a user functions as the user's public key. The advantage of an identity-based public key system is that it can avoid public key certificates and certificate management. Our identity-based encryption scheme enjoys short ciphertexts and provable security against chosen-ciphertext attack (CCA).

  6. Theories in Progress Series: Perpetual Identity Constructing

    Directory of Open Access Journals (Sweden)

    Alison Clancy, RGN, M.Sc., B.NS, HDNS

    2010-06-01

    Full Text Available For academics who work within higher education, the difficulties in finding the space and time to learn, to reflect and to self-evaluate have increased due to multiple expectations and demands of an increasingly competitive business environment. This substantive theory of ‘Perpetual Identity Constructing’ proposes that when academics are presented with an opportunity to enhance their development, they experience a 3-stage process that facilitates their constructing a preferred sense of their academic identity. This theory of managing a predisposed identity, deconstructing and then reconstructing a preferred academic identity demonstrates the critical importance of institutional support for providing academics with needed space and time to realise their full potential.Key words: Academic identity, possibility portals, learning spaces.

  7. Genetics and identity.

    Science.gov (United States)

    Nordgren, Anders

    2008-01-01

    For the last 20 years the concepts of identity and identification have been subject to much interest in the humanities and social sciences. However, the implications of genetics for identity and identification have been largely neglected. In this paper, I distinguish various conceptions of identity (as continuity over time, as basic kind of being, as unique set of properties, and as social role) and identification (as subjective experience of identity in various senses and as social ascription of identity in various senses), and investigate systematically genetic perspectives on each of these conceptions. I stress the importance of taking the genetic perspectives seriously but also their limitations. In particular, I pinpoint conceptual problems that arise when a genetic approach to identity is adopted.

  8. Identity and total institution

    Directory of Open Access Journals (Sweden)

    Ljubičić Milana

    2015-01-01

    Full Text Available This paper analyses a psychiatric institution resident’s identity (self- construction processes. Our quest was grounded on constructivist theoretical paradigm that sees identity as a manner a person defines oneself in accordance with offered social repertoire. In other words, the total institution milieu offers limited range of identities to its residents. On the other hand, the latter are not just passive subjects that identity is imposed upon. They are able to use a number of adjustment mechanisms to the knowledge about themselves - ranging from symbolic escape to open resistance against the imposed image about them; to obedience, and we were interested to understand the (supposed complex dynamic of identity (re-building in, so-called, special or forensic patients. In order to understand this process and attempting to discover, besides the manifest also the latent layer of the story about self, the local, or personal, identity understanding was examined.

  9. Athletic identity foreclosure.

    Science.gov (United States)

    Brewer, Britton W; Petitpas, Albert J

    2017-08-01

    Athletic identity foreclosure refers to commitment to the athlete role in the absence of exploration of occupational or ideological alternatives. This article traces the theoretical underpinnings of the construct, examines the role of sport participation in identity development, and provides an overview of the course, correlates, and consequences of athletic identity foreclosure. Implications for future research are discussed. Copyright © 2017 Elsevier Ltd. All rights reserved.

  10. Preventing Identity Theft

    OpenAIRE

    Jensen, Christine

    2004-01-01

    Identity theft is becoming more common and is a very serious crime. Victims of identity theft can spend months or years and a lot of hard earned money cleaning up the mess thieves have made of their good name and credit record. Identity thieves can use your personal information to take over your credit accounts and open new ones. They may even use your good credit to get a job, take out a car loan, or rent an apartment. Identity theft victims may lose job opportunities, be refused loans for e...

  11. Personal Identity in Enhancement

    Directory of Open Access Journals (Sweden)

    Jana Podroužková

    2015-09-01

    Full Text Available The aim of this paper is to introduce the concept of human enhancement, its methods and its relation to personal identity. Also several approaches to personal identity will be described. Transhumanism is a special think tank supporting human enhancement through modern technologies and some of its representatives claim, that even great changes to human organisms will not affect their personal identity. I will briefly describe the most important means of human enhancment and consider the problem of personal identity for each of them separately.

  12. Identity/Time

    Directory of Open Access Journals (Sweden)

    Nancy J. Knauer

    2013-09-01

    Full Text Available This paper engages the unspoken fourth dimension of intersectionality—time. Using the construction of lesbian, gay, bisexual, and transgender (LGBT identities as an example, it establishes that identity, as it is lived and experienced, is not only multivalent, but also historically contingent. It then raises a number of points regarding the temporal locality of identity—the influence of time on issues of identity and understanding, its implications for legal interventions, social movement building, and paradigms of progressive change. As the title suggests, the paper asks us to consider the frame of identity over time.

  13. Collective Endeavors to Address Institutional Contradiction between Gender Identity and Occupational Identity

    DEFF Research Database (Denmark)

    Villeseche, Florence

    Women’s presence in the labor market is one of the major institutional changes of the past century. However, in particular at higher hierarchical levels, gender equality still remains a distant objective. The ideal-type of the worker, manager or leader is this largely a masculine one, thus...... associating the related occupational identity to a masculine gender social identity. Thus, it can be argued that women in organizations can face an “institutional contradiction” between their occupation and their gender – i.e a perceived discordancy between their social occupational identity as managers...

  14. DEVELOPING PLURILINGUAL IDENTITY IN THIRD LANGUAGE CLASSROOM

    Directory of Open Access Journals (Sweden)

    HACKETT-JONES A.V.

    2015-12-01

    Full Text Available The article analyzes the notions of plurilingualism and plurilingual identity through the prism of the concepts of multilingualism and multilingual identity and the perspective of the theories of bilingualism. The article suggests that plurilingual identity can be viewed as an objective in third language (second foreign language teaching and contemplates specific characteristic imposed on a third language learner by the process of third language acquisition and the necessity of managing a certain imbalance between the degrees of language command and culture experience in different target languages.

  15. DEVELOPING PLURILINGUAL IDENTITY IN THIRD LANGUAGE CLASSROOM

    Directory of Open Access Journals (Sweden)

    HACKETT-JONES A.V.

    2015-01-01

    Full Text Available The article analyzes the notions of plurilingualism and plurilingual identity through the prism of the concepts of multilingualism and multilingual identity and the perspective of the theories of bilingualism. The article suggests that plurilingual identity can be viewed as an objective in third language (second foreign language teaching and contemplates specific characteristic imposed on a third language learner by the process of third language acquisition and the necessity of managing a certain imbalance between the degrees of language command and culture experience in different target languages.

  16. Research on the Theory of Ego Identity and Its Enlightenment on Student-management Work in Universities%人格同一性理论研究及其对高校学生工作的启示

    Institute of Scientific and Technical Information of China (English)

    赵佳宾

    2012-01-01

    The theory of Ego Identity was developed by E. H. Erikson, an American Psychologist, which illustrates different stages of people's personality. Continuously perfected by scholars, Ego Identity has now been regarded as the key concept as well as the important proof to analyze the youth' s psychological development. During its development, college students' personality will be influenced by factors including the society, school, and family,etc. Therefore, when conducting student-management work in universities, we should focus on the development of the students' ego identity and overcome negative influential factors. We should build good atmosphere on campus by setting up a good communication mechanism between school and families, so as to promote college students' personality to develop in a healthy way.%人格同一性理论是美国心理学家埃里克森提出的用以说明个人人格发展阶段的理论。经过学界的不断发展完善,人格同一性已经被认为是分析青年心理发展的关键概念,是分析青年人格发展情况的重要依据。大学生在人格的发展过程中会受到社会、学校、家庭等各方因素的影响,因此,在开展高校学生工作的过程中,应当充分关注大学生人格同一性的发展,排除不利的影响因素,通过建立良好的学校、家庭之间的沟通机制以及营造良好的学校氛围,促进大学生人格的健康发展。

  17. Elective Identities, (Culture, Identization and Integration)

    NARCIS (Netherlands)

    S.J. Magala (Slawomir)

    2002-01-01

    textabstractMost of contemporary individual and social identities (constructed with societal, cultural and technological resources) are radically autonomous, nomadic and virtual - i.e. they are de-traditionalized, open to negotiation and not based on a single interpretation of a tradition.

  18. Personal number Management : personal numbers and identity fraud – number strategies for security and privacy in an information society - part 1

    NARCIS (Netherlands)

    Grijpink, J.H.A.M.

    2002-01-01

    For the sake of clarity and manageability, this article is in the form of a checklist. It will be published in two parts. The first part in this issue presents some practical and juridical characteristics of personal number systems. But at the end of the day, it is the number strategy that

  19. Population genetics of traditionally managed maize : farming practice as a determinant of genetic structure and identity of maize landraces in Mexico

    NARCIS (Netherlands)

    Heerwaarden, van J.

    2007-01-01

    A large amount of crop genetic diversity is being maintained in farmers' fields worldwide. The population genetics of traditionally managed landraces is therefore of interest to the conservation of genetic resources. The growing trend towards agricultural modernization and the prospect of introducin

  20. Population genetics of traditionally managed maize : farming practice as a determinant of genetic structure and identity of maize landraces in Mexico

    NARCIS (Netherlands)

    Heerwaarden, van J.

    2007-01-01

    A large amount of crop genetic diversity is being maintained in farmers' fields worldwide. The population genetics of traditionally managed landraces is therefore of interest to the conservation of genetic resources. The growing trend towards agricultural modernization and the prospect of introducin

  1. Identity of psychology, identity and psychology

    Directory of Open Access Journals (Sweden)

    Mirjana Nastran Ule

    2003-09-01

    Full Text Available The article deals with epistemic issues of modern psychology with the starting hypothesis being that scientific psychology must satisfy three main interests: scientific, practical and emancipatory interest. Particularly important is the emancipatory interest, which is based on the social reflection of scientific work and conclusions. Psychological knowledge involves not only neutral descriptions of facts, but also implicit rules, expectations regarding values or norms, and criticism of undesirable behavior. The traditional psychological model attempts to satisfy the scientific interest and partly practical interest, while avoiding emancipatory interest. But I believe modern socio-historical models of psychology to be significant precisely owing to the inclusion of emancipatory interest. The difference between these two models of psychology is most obvious in their perception of identity i.e. individuality. Conventional perceptions follow the logic of "possessive individualism" in which the individual is seen as an autonomous bearer and owner of his/her psychological states and processes. The conventional model of identity supports the modernist concept of the individual as being focused on his/her self or personal identity. Socio-historical models, on the other hand, see the individual as a being embedded in social relations and social interactions, and one who builds and expresses his/her individuality through the reflection on social interactions, discursive practices, and response to the hierarchy of power and social mechanisms of control. According to this model, identity evolves through a series of social constructions which are embodied in the individual and represent him/her in society. Identity thus becomes a notion that combines individuality and social context, subjectivation and objectivation of the individual, and historical and biographical time.

  2. Identity without Membership?

    DEFF Research Database (Denmark)

    Dobusch, Leonhard; Schoeneborn, Dennis

    the formation of organizational identity in more fluid organizational settings. Drawing on an empirical study of the hacker collective Anonymous, we show that organizational identity is formed through public communicative events that are subject to meaning negotiation whether or not actions can be attributed...

  3. Corporate identity. Brand designs.

    Science.gov (United States)

    Mathieson, Steve

    2004-02-19

    The past two years have seen a steadily more consistent brand identity for the NHS. Branding will become more important as foundation status and PCT commissioning makes acute hospitals more competitive. This has put pressure on some trusts that have their own strong identities.

  4. Capturing Chemical Identity Thinking

    Science.gov (United States)

    Ngai, Courtney; Sevian, Hannah

    2017-01-01

    Chemical identity, the idea that every substance has at least one property that makes it unique and able to be differentiated from other substances, is core to the practice of chemistry. Such practice requires using properties to classify as well as to differentiate. Learning which substance properties are productive in chemical identity thinking…

  5. Personal Identity in Japan

    Science.gov (United States)

    Sugimura, Kazumi; Mizokami, Shinichi

    2012-01-01

    This chapter explores characteristics of identity formation among Japanese adolescents and young adults living in a cultural context where individualism has been increasingly emphasized even while maintaining collectivism. We argue that, to develop a sense of identity in Japanese culture, adolescents and young adults carefully consider others'…

  6. Identities-in-action

    DEFF Research Database (Denmark)

    Stentoft, Diana; Valero, Paola

    2009-01-01

    The notion of identity is often used in mathematics education research in an attempt to link individual and social understandings of mathematical learning. In this paper we review existing research making use of the notion of identity, and we point to some of the strengths and weaknesses in the w...

  7. Teachers' interpersonal role identity

    NARCIS (Netherlands)

    van der Want, Anna C.; den Brok, Perry; Beijaard, Douwe; Brekelmans, Mieke; Claessens, Luce C A; Pennings, Helena J M

    2014-01-01

    This article investigates the link between teachers' appraisal of specific interpersonal situations in classrooms and their more general interpersonal identity standard, which together form their interpersonal role identity. Using semi-structured and video-stimulated interviews, data on teachers' ap

  8. Teachers' Interpersonal Role Identity

    NARCIS (Netherlands)

    van der Want, Anna C.; den Brok, Perry; Beijaard, Douwe; Brekelmans, Mieke; Claessens, Luce C A; Pennings, Helena J M

    2015-01-01

    This article investigates the link between teachers' appraisal of specific interpersonal situations in classrooms and their more general interpersonal identity standard, which together form their interpersonal role identity. Using semi-structured and video-stimulated interviews, data on teachers' ap

  9. Cultural Identity Through CLIL

    OpenAIRE

    Oprescu Monica

    2015-01-01

    The CLIL approach is a modern manner of teaching English, which has been adapted in Romanian schools and universities. An interesting aspect of learning a foreign language is the contact with its culture/s and the changes it produces in terms of identity. Therefore, a challenging question to be answered is whether a CLIL approach focusing on culture influences students' cultural identity.

  10. Value Conditionality of Identity

    Directory of Open Access Journals (Sweden)

    M M Yusupov

    2013-12-01

    Full Text Available The article considers theoretical approaches to the study of values and identity, and reveals the role of values in the formation of the ethnic, regional and Russian identity on the example of Chechnya and the North Caucasus, with the sociological indicators characterizing value orientations and self-identification.

  11. Identity And Privacy Services

    Directory of Open Access Journals (Sweden)

    Harry Katzan, Jr.

    2010-12-01

    Full Text Available Personal identity and privacy are important topics in information systems in general and data analytics in particular.  Normally associated with digital security, the scope of identity and privacy is much greater and affects most aspects of everyday life.  Related subjects are behavioral tracking, personal-identifiable information (PII, privacy data relevance, data repurposing, identity theft, and homeland security.  Identity and Privacy Services is an admixture of the major issues in the area of personal identity and privacy and the security of individual rights in a complex societal environment.  This is a general paper on this important subject, intended to give exposure to the constituent topics.

  12. Identity as wrapping up

    DEFF Research Database (Denmark)

    Nickelsen, Niels Christian Mossfeldt

    2015-01-01

    The aim of this paper is to provide an understanding of cross-professional collaboration and to develop a notion of professional identity based in practice. The background of the paper is science and technology studies and more precisely actor network theory. The method used: The empirical analysis...... in close relation to the making of a report concerning the cross-professional collaboration. Findings are that “Identity as wrapping up” points to the way in which certain actors, by other actors, are maneuvered into certain pockets in a network. Identity as wrapping up is emphasized as a way...... of participating, which is closely connected to the intention to control the relation towards the other. Thus identity as wrapping up is argued to be a strategy to optimize the situation of one’s own profession. Conclusion: This articulation of identity contributes to the actor network literature as well...

  13. Visual identity and rebranding

    Directory of Open Access Journals (Sweden)

    Katarzyna Wrona

    2015-06-01

    Full Text Available The goal of this article is to highlight the essence of visual identification and rebranding, as well as to discuss elements of corporate identity, which are subject to revitalization in the process of refreshing the image of a brand. In the first part the article the analysis of the term visual identification is conducted. In the analysis special attention is drawn to the role of visual identification in creating a coherent identity of an organization. In the subsequent chapters further components of corporate identity are presented in detail – starting with logotype, through business forms, advertisements, accompanying materials and Internet websites to signs on buildings. Moreover, corporate identity book as a collection of standards and guidelines for application of corporate identity rules is discussed. The deliberations are based on the study of literature. The last chapter presented the transformation of the brand of Institute of Aviation.

  14. Gender identity disorder.

    LENUS (Irish Health Repository)

    De Gascun, C

    2006-05-01

    Gender Identity Disorder (GID) is a relatively rare condition of atypical gender development in which there is a psychological perception of self as masculine or feminine which is incongruent with ones phenotype. GID replaced the term Transsexualism in DSM-IV in 1994. The demographics of GID in Ireland have not been established. Since 2000 we have received 52 referrals of individuals with confirmed GID to our endocrine service for consideration for hormonal treatment (HT). Of the 52 patients 45 have male to female (MTF) GID (mean age 38.9 years) and 7 have female to male (FTM) GID (mean age 30.7 years). The age at presentation in this group is approximately 9 years older than in international series for both MTF (39 years v 30yrs) and FTM (31 yrs v 22yrs). The karyotype where analysed has been normal for their phenotypic sex. Twenty-three of the patients had received HT prior to attending our clinic that in only one case had been prescribed by a specialist. A number of patients had obtained HT via the internet or from overseas sources without medical review. Eighteen of the patients have been or are married and 14 of the group have children. The scale of referrals confirms that GID exists in the Irish population to a significant degree. Thus an appropriate care pathway for people with the condition needs to be established. This will facilitate optimum medical management of the patient group and a coherent approach to the many difficult social issues faced individuals with this disorder.

  15. Traços identitários da enfermeira-gerente em hospitais privados de Belo Horizonte, Brasil The nurse manager's identity features in private hospitals of Belo Horizonte, Brazil

    Directory of Open Access Journals (Sweden)

    Maria José Menezes Brito

    2008-06-01

    Full Text Available Com o propósito de compreender aspectos subjetivos do trabalho da enfermeira-gerente, buscou-se, por meio deste estudo, analisar os traços identitários da enfermeira-gerente no contexto de instituições hospitalares a partir do questionamento fundamentado na apresentação que os sujeitos fazem de si mesmos. Trata-se de um estudo de caso, com abordagem qualitativa, do qual participaram nove enfermeiras-gerente que atuam em quatro instituições hospitalares privadas de médio e grande porte, no município de Belo Horizonte. Os traços identitários foram organizados de acordo com os planos profissional, organizacional e individual, os quais abrangem: preservação e reforço de identidade social da enfermeira, a trajetória profissional como uma evolução da prática da assistência para o exercício da gerência, valorização da experiência prática e permanência em atividades ligadas à prestação da assistência direta ao paciente; identificação com a organização; e questões relativas à vida privada e auto-imagem positiva expressa pelas gerentes. O estudo permitiu a identificação de traços marcantes de um grupo profissional específico, evidenciando a influência das questões de gênero, das relações de poder e da cultura na identidade social dos sujeitos pesquisados.Aiming to understand subjective aspects of the work of nurse managers, this study analyzed their identity features in the context of hospital institutions. These were obtained through a questioning based on the introduction that the subjects make of themselves. It is a case study carried out according to the qualitative approach, in which nine nurse managers participated. They worked at four large- and medium-sized private hospitals in the city of Belo Horizonte. The identity features were organized in accordance with the professional, institutional and individual planes, which encompass: the preservation and reinforcement of the nurse's social identity

  16. Understanding family dynasty: Nurturing the corporate identity across generations

    Directory of Open Access Journals (Sweden)

    Nemilentsev, M.

    2010-01-01

    Full Text Available This study aims to analyse the Ahlstrom annual reports. The content analysis contributes to family business corporate identity. According to the results family business corporate identity is based both on history and on the future. Human resource management, customer relationships, high quality, and also family ownership reflect corporate identity in large family corporations. Modern family business corporate identity is based on continuously developing the business concept and its core competency. Meeting the needs of customers and technical quality standards combined with upgrading and developing the business idea characterises family business corporate identity.

  17. [Diagnosing gender identity].

    Science.gov (United States)

    Kaltiala-Heino, Riittakerttu; Mattila, Aino; Kärnä, Teemu; Joutsenneimi, Kaisla

    2015-01-01

    Transsexualism and other variations of gender identity are based on a stable sense of identity. The aetiology of this phenomenon is not fully known. Suffering caused by gender dysphoria is alleviated with sex reassignment. The psychiatric assessment of both adolescents and adults has been centralized in Finland to two university hospitals, the Helsinki University Hospital and Tampere University Hospital. In both hospitals, multidisciplinary teams aim at differential diagnosis by using well-known psychiatric and psychological instruments. Wishes for sex reassignment that are caused by a mental health disorder are excluded. Assessment in adolescence is challenging because the identity in youth is still forming.

  18. Credit and identity theft

    OpenAIRE

    Charles M. Kahn; Roberds, William

    2005-01-01

    The quintessential crime of the information age is identity theft, the malicious use of personal identifying data. In this paper we model “identity” and its use in credit transactions. Various types of identity theft occur in equilibrium, including “new account fraud,” “existing account fraud,” and “friendly fraud.” The equilibrium incidence of identity theft represents a tradeoff between a desire to avoid costly or invasive monitoring of individuals on the one hand and the need to control tr...

  19. Adolescence: Search for an Identity

    Science.gov (United States)

    Kasinath, H. M.

    2013-01-01

    James Marcia (1991, 1994, 1999, 2002) expanded on Erikson's theory of identity formation. Specifically, he focused on two essential processes in achieving a mature identity: exploration and commitment. Erikson's observations about identity were extended by Marcia, who described four identity statuses: identity diffusion, foreclosure, moratorium…

  20. Vocational Identity and Ego Identity Status in Korean Nursing Students

    Directory of Open Access Journals (Sweden)

    Hyun-Young Koo, PhD, RN

    2016-03-01

    Conclusions: These findings show that nursing students in identity achievement status have secure and clear vocational identities. Further longitudinal and qualitative studies are needed to find out if identity formation among nursing students changes with age.

  1. Building Place Identity through Heritage

    Directory of Open Access Journals (Sweden)

    Alexandra PACESCU

    2015-12-01

    Full Text Available In an increasingly globalized world, the fading specificity is producing homogeneous images that make cities more and more difficult to tell apart. The market economy tends to commodify each and every aspect of urban life, even those belonging to the cultural realm. As a consequence, a need for differentiators arises, which can be best embodied by the local heritage. The present paper is trying to establish a link between the concept of Place Identity, seen from a marketing point of view, and Heritage, as a key factor to build or emphasize a ‘point of difference’ for ‘a unique selling proposition’. Although ‘brands’ are commonly associated with globalization and its supposed tendency to erase defining characteristics, their marketing principles could prove to be the very solution to regaining the lost specificity, since they help embed local heritage, already an asset, into the ‘mix’ that determines ‘place identity’. Building and promoting an identity is also the endeavor of branding, hence the overlapping of these two concepts. It is therefore useful to examine the evolution of brands from simple marks of identity to entities which develop complex relations with the users. The need for a ‘a unique selling proposition’ that brands have already acknowledged should be considered when building the place identity so much needed by cities in their fierceful competition for attracting activities. Branding through heritage could prove to be a safe bet to reinforce the particular in the globalised market, if correctly managed and planned. Promoting the city and salvaging one of its key differentiators at the same time is, for sure, a win-win situation.

  2. Un/covering: Making Disability Identity Legible

    Directory of Open Access Journals (Sweden)

    Heather Dawn Evans

    2017-03-01

    Full Text Available This article examines one aspect of disability identity among people with non-apparent or "invisible" disabilities: the decision to emphasize, remind others about, or openly acknowledge impairment in social settings. I call this process "un/covering," and situate this concept in the sociological and Disability Studies literature on disability stigma, passing, and covering. Drawing on interviews with people who have acquired a non-apparent impairment through chronic illness or injury, I argue that decisions to un/cover (after a disability disclosure has already been made play a pivotal role for this group in developing a strong, positive disability identity and making that identity legible to others. Decisions to pass, cover, or un/cover are ongoing decisions that stitch together the fabric of each person's daily life experiences, thus serving as primary mechanisms for identity negotiation and management.

  3. Gender Identity: Intersex Individuals

    Directory of Open Access Journals (Sweden)

    Ilhame Khabar

    2016-12-01

    Full Text Available According to past beliefs and social norms, society has been taught that their has only been two types of biological structures regarding the ideal male and female. The majority of society has also believed that gender identity was specific only to those structures, as most have had a very fixed perspective of men and women and the sexual organs that are associated. In today's society, there has been an observed increase of many variations in sexual orientation, gender identity, gender expression, and sex anatomy. Awareness has been subtle, yet growing on gender identity and intersex individuals; however, some studies and popular media stories have also shown that many of these individuals have experienced trauma and hardship due to their ambiguous genitalia and how it has affected their gender identity.

  4. Identity after Death

    DEFF Research Database (Denmark)

    Gerstrøm, Anna

    2015-01-01

    of the financial industry. Findings: The paper finds that members of a dead organization construct a bankruptcy narrative that is also a legacy organizational identity narrative including a legacy organizational identity transformation and several identities that have positive and negative aspects...... evidence on ways that legacy organizational identity from a dead organization play a substantial role in a living organization. Research limitations/implications: Because of the chosen research approach, the research results may lack generalizability. Practical implications: The paper holds insight...... that can help practitioners understand members of a dying organization -- including the ways they come to form and perform in a new organizational context; an understanding that is a prerequisite for helping and supporting these members in coming to perform satisfyingly in the new organization. Originality/value...

  5. Researcher Identities in Transition

    DEFF Research Database (Denmark)

    Castelló, Montserrat; Wisker, Gina; Kobayashi, Sofie

    as other emergent ‘signals’, the latent or clear indications from institutions and academic communities regarding career directions and necessary professional skills and attitudes should be identified and interpreted for researchers to adequately develop their new identities. The aim of this paper...... is twofold: a) to present a comprehensive framework of the notion of researcher identity by means of analysing those spheres of activity related to researcher and career development; and b) to relate researcher identities to the experiences of early career researchers with issues concerning signals......Researchers are now embarked upon what we define as a ‘risk career’, rather than, as previously, a relatively more predictable academic career. In this changing context, traditional milestones that enabled early career researchers to build their identities are disappearing. Instead, what we define...

  6. Autoethnography: Inquiry into Identity

    Science.gov (United States)

    Hoppes, Steve

    2014-01-01

    This chapter provides guidelines and suggestions for assessing student development using autoethnography, a qualitative research method. Autoethnography guides students in examining the nexus between personal and professional identities, including skills, challenges, values, histories, and hopes for the future.

  7. Personal Identity Online

    DEFF Research Database (Denmark)

    Rodogno, Raffaele

    2012-01-01

    Philosophers concerned with the question of personal identity have typically been asking the so-called re-identification question: what are the conditions under which a person at one point in time is properly re-identified at another point in time? This is a rather technical question. In our...... everyday interactions, however, we do raise a number of personal identity questions that are quite distinct from it. In order to explore the variety of ways in which the Internet may affect personal identity, I propose in this study to broaden the typical philosophical horizon to other more mundane senses...... of the question. In Section 2, I describe a number of possible meanings of personal identity observed in everyday contexts and more philosophical ones. With some caveats, I argue that it is the specific context in which the question arises that disambiguates the meaning of the question. Online contexts are novel...

  8. The Supermalt identity

    DEFF Research Database (Denmark)

    Bech-Larsen, Tino; Esbjerg, Lars; Grunert, Klaus G.

    2007-01-01

    aiming to develop strong brands with a limited marketing budget. Based on the Supermalt case, suggestions are made regarding branding in relation to ethnic minorities. Originality/value - This article provides a study of a brand that has become strong within a narrowly defined group of consumers.......Purpose - The objective of this article is to conduct a case study of the Supermalt brand of malt beer, which has become the preferred beverage of Afro-Caribbean consumers in Brixton on a very limited marketing budget. Design/methodology/approach - The article uses the concepts of personal identity...... and brand identity in a qualitative study to explore how Brixtonbased Afro-Caribbean consumers construct their self-identities and the brand identity of Supermalt. Semi-structured interviews were conducted with 14 Afro-Caribbean consumers. Each interview was divided into three parts. The first part focused...

  9. Personal Identity Online

    DEFF Research Database (Denmark)

    Rodogno, Raffaele

    2012-01-01

    Philosophers concerned with the question of personal identity have typically been asking the so-called re-identification question: what are the conditions under which a person at one point in time is properly re-identified at another point in time? This is a rather technical question. In our...... everyday interactions, however, we do raise a number of personal identity questions that are quite distinct from it. In order to explore the variety of ways in which the Internet may affect personal identity, I propose in this study to broaden the typical philosophical horizon to other more mundane senses...... of the question. In Section 2, I describe a number of possible meanings of personal identity observed in everyday contexts and more philosophical ones. With some caveats, I argue that it is the specific context in which the question arises that disambiguates the meaning of the question. Online contexts are novel...

  10. Esperanto & cultural identity

    OpenAIRE

    Lehrmann, Ask; Christensen, Julie Hellesøe; Dzieza, Malgorzata; Hansen, Nathalie Gylling

    2007-01-01

    The topic of this project is the relationship between culture, cultural identity and language, and their relationship to the ambiguous concept of neutrality. Taking a case study of Esperanto, an artificial language designed with the specific intention of being a completely neutral and nationless language, we will explore how languages relate to the world. By comparing the thoughts on culture and group identity of various authors, we will then try to explore the concept of neutrality – for can...

  11. Visual identity and rebranding

    OpenAIRE

    Katarzyna Wrona

    2015-01-01

    The goal of this article is to highlight the essence of visual identification and rebranding, as well as to discuss elements of corporate identity, which are subject to revitalization in the process of refreshing the image of a brand. In the first part the article the analysis of the term visual identification is conducted. In the analysis special attention is drawn to the role of visual identification in creating a coherent identity of an organization. In the subsequent chapters further comp...

  12. Cultural Identity Through CLIL

    Directory of Open Access Journals (Sweden)

    Oprescu Monica

    2015-11-01

    Full Text Available The CLIL approach is a modern manner of teaching English, which has been adapted in Romanian schools and universities. An interesting aspect of learning a foreign language is the contact with its culture/s and the changes it produces in terms of identity. Therefore, a challenging question to be answered is whether a CLIL approach focusing on culture influences students' cultural identity.

  13. IMMIGRATION, IDENTITY AND LITERATURE

    Directory of Open Access Journals (Sweden)

    Semran CENGİZ

    2010-12-01

    Full Text Available The leading problems incidental to the globalization are the immigration, the poverty, the adaptation problems of the immigrants, the identity and the cultural conflicts. The globalization actors that are transforming the whole world to a huge market, consider to commercialize the product even to the people at the other end of the world. Therefore they lay emphasis on its local identity and remark its variety as its richness. In this way the limits are easily exceeded and the consumption culture becomes available to be instilled upon even the people at the back of the beyond. However one party always wins; the more some people consume, the more some people make profit. The people who does not have any power to consume anymore, becomes the guest of the ones who get them adopt this habit and desires to receive a share from this profit.The modern world people who are not pleased with this situation, have made every effort to alienate the immigrants from the center but they could not succeed. The situation that gave rise to a conflict between parties, have also led the identity problems to occur. In the present situation, the immigrants are trying to take place in the modern world as people with hybrid identities. The music produced by the children of the immigrants with double identities, attracts attention of the world where the immigrant identity, changing its shell, promises hope as the conciliation area of the new century.

  14. Names and Collective Identity

    Directory of Open Access Journals (Sweden)

    Otto Krogseth

    2012-08-01

    Full Text Available The preceding two decades have displayed a remarkable awareness for a connection between the concepts "identity" and "cultural memory". David Lowenthal speaks of a "current craze for heritage"! Cultural heritage has become extremely popular, especially in combination with tourism, and has accordingly been converted into a modern system of meaning a type of "secular religion". With reference to collective identity and cultural memory, it is important to ask the cul- tural analytical questions: "Why identity now? Why heritage now?" My reply is that we experience a critical identity crisis. Three central aspects signify individual and collective identity: Continuity, coherence and individuality. The three aspects, constituting the concept of identity, are exposed to serious threats in the post-modern era: The danger of changeability, fragmentation and standardisation. This ten- dency has, however, met various compensating counter reactions like for instance "re-traditionalisation". In my presentation, I will examine the phenomenon cultural memory through examples from the German tradition -- principally from the works of Aleida and Jan Assmann.

  15. On a New Trigonometric Identity

    Science.gov (United States)

    Chen, Hongwei

    2002-01-01

    A new trigonometric identity derived from factorizations and partial fractions is given. This identity is used to evaluate the Poisson integral via Riemann sum and to establish some trigonometric summation identities.

  16. Tools for Understanding Identity

    Energy Technology Data Exchange (ETDEWEB)

    Creese, Sadie; Gibson-Robinson, Thomas; Goldsmith, Michael; Hodges, Duncan; Kim, Dee DH; Love, Oriana J.; Nurse, Jason R.; Pike, William A.; Scholtz, Jean

    2013-12-28

    Identity attribution and enrichment is critical to many aspects of law-enforcement and intelligence gathering; this identity typically spans a number of domains in the natural-world such as biographic information (factual information – e.g. names, addresses), biometric information (e.g. fingerprints) and psychological information. In addition to these natural-world projections of identity, identity elements are projected in the cyber-world. Conversely, undesirable elements may use similar techniques to target individuals for spear-phishing attacks (or worse), and potential targets or their organizations may want to determine how to minimize the attack surface exposed. Our research has been exploring the construction of a mathematical model for identity that supports such holistic identities. The model captures the ways in which an identity is constructed through a combination of data elements (e.g. a username on a forum, an address, a telephone number). Some of these elements may allow new characteristics to be inferred, hence enriching the holistic view of the identity. An example use-case would be the inference of real names from usernames, the ‘path’ created by inferring new elements of identity is highlighted in the ‘critical information’ panel. Individual attribution exercises can be understood as paths through a number of elements. Intuitively the entire realizable ‘capability’ can be modeled as a directed graph, where the elements are nodes and the inferences are represented by links connecting one or more antecedents with a conclusion. The model can be operationalized with two levels of tool support described in this paper, the first is a working prototype, the second is expected to reach prototype by July 2013: Understanding the Model The tool allows a user to easily determine, given a particular set of inferences and attributes, which elements or inferences are of most value to an investigator (or an attacker). The tool is also able to take

  17. Moral identity in psychopathy

    Directory of Open Access Journals (Sweden)

    Andrea L. Glenn

    2010-12-01

    Full Text Available Several scholars have recognized the limitations of theories of moral reasoning in explaining moral behavior. They have argued that moral behavior may also be influenced by moral identity, or how central morality is to one's sense of self. This idea has been supported by findings that people who exemplify moral behavior tend to place more importance on moral traits when defining their self-concepts (Colby and Damon, 1995. This paper takes the next step of examining individual variation in a construct highly associated with IMMORAL behavior --- psychopathy. In Study 1, we test the hypothesis that individuals with a greater degree of psychopathic traits have a weaker moral identity. Within a large online sample, we found that individuals who scored higher on a measure of psychopathic traits were less likely to base their self-concepts on moral traits. In Study 2, we test whether this reduced sense of moral identity can be attributed to differences in moral judgment, which is another factor that could influence immoral behavior. Our results indicated that the reduced sense of moral identity among more psychopathic individuals was independent of variation in moral judgment. These results suggest that individuals with psychopathic traits may display immoral behavior partially because they do not construe their personal identities in moral terms.

  18. Narrating Career, Positioning Identity: Career Identity as a Narrative Practice

    Science.gov (United States)

    LaPointe, Kirsi

    2010-01-01

    In contrast to traditional definitions of career identity as an individual construct, this article argues for a discursive approach to career identity as a narrative practice. Career identity is conceptualized as a practice of articulating, performing and negotiating identity positions in narrating career experiences. By using the concept of…

  19. Researcher Identity in Transition

    DEFF Research Database (Denmark)

    Castelló, Montserrat; Kobayashi, Sofie; McGinn, Michelle K.

    2015-01-01

    Within the current higher education context, early career researchers (ECRs) face a ‘risk-career’ in which predictable, stable academic careers have become increasingly rare. Traditional milestones to signal progress toward a sustainable research career are disappearing or subject...... to reinterpretation, and ECRs need to attend to new or reimagined signals in their efforts to develop a researcher identity in this current context. In this article, we present a comprehensive framework for researcher identity in relation to the ways ECRs recognise and respond to divergent signals across spheres...... comprehensive framework allows for the analysis of researcher identity development through the complex and intertwined activities in which ECRs are involved. We advance this approach as a foundation for a sustained research agenda to understand how ECRs identify and respond to relevant signals, and...

  20. Learning as Negotiating Identities

    DEFF Research Database (Denmark)

    Jørgensen, Kenneth Mølbjerg; Keller, Hanne Dauer

    of time - caught in the notion of trajectories of learning - that integrate past, present and future. Working with the learners' notion of time is significant because it is here that new learning possibilities become visible and meaningful for individuals. Further, we argue that the concept of identity......The paper explores the contribution of Communities of Practice (COP) to Human Resource Development (HRD). Learning as negotiating identities captures the contribution of COP to HRD. In COP the development of practice happens through negotiation of meaning. The learning process also involves modes...... of belonging constitutive of our identities. We suggest that COP makes a significant contribution by linking learning and identification. This means that learning becomes much less instrumental and much more linked to fundamental questions of being. We argue that the COP-framework links learning with the issue...

  1. Professions and their Identities

    DEFF Research Database (Denmark)

    Krejsler, John

    2005-01-01

    PROFESSIONS AND THEIR IDENTITIES: HOW TO EXPLORE PROFESSIONAL DEVELOPMENT AMONG (SEMI-)PROFESSIONS This article explores conditions for discussing what it means to be professional among teachers, pre-school teachers, nurses and social workers. From an epistemological point of view it explores how...... analytical strategies can frame in sufficiently complex ways what it means to be a professional today. It is assumed that at least four main issues must be dealt with in order to conduct a satisfactory analysis of professions and their identities. Firstly, it is of fundamental strategic importance that one...

  2. Splitting Ward identity

    Energy Technology Data Exchange (ETDEWEB)

    Safari, Mahmoud [Institute for Research in Fundamental Sciences (IPM), School of Particles and Accelerators, P.O. Box 19395-5531, Tehran (Iran, Islamic Republic of)

    2016-04-15

    Within the background-field framework we present a path integral derivation of the splitting Ward identity for the one-particle irreducible effective action in the presence of an infrared regulator, and make connection with earlier works on the subject. The approach is general in the sense that it does not rely on how the splitting is performed. This identity is then used to address the problem of background dependence of the effective action at an arbitrary energy scale. We next introduce the modified master equation and emphasize its role in constraining the effective action. Finally, application to general gauge theories within the geometric approach is discussed. (orig.)

  3. National and Transnational Identities

    DEFF Research Database (Denmark)

    Jørgensen, Martin Bak

    is that the opportunity and incentive structures clearly affect collective identities and the organising processes of the Turkish minority groups within in the three countries. The analysis shows that the immigrant organisations adapt to the structural limitations and claims and identities are negotiated within...... in terms of career paths. In Germany the integration activities are increasingly being pushed over to the immigrant organisations which now share the role of being service providers together with the welfare organisations, which also stipulates increased competition. The analysis also shows...

  4. Identity-based encryption

    CERN Document Server

    Chatterjee, Sanjit

    2011-01-01

    Identity Based Encryption (IBE) is a type of public key encryption and has been intensely researched in the past decade. Identity-Based Encryption summarizes the available research for IBE and the main ideas that would enable users to pursue further work in this area. This book will also cover a brief background on Elliptic Curves and Pairings, security against chosen Cipher text Attacks, standards and more. Advanced-level students in computer science and mathematics who specialize in cryptology, and the general community of researchers in the area of cryptology and data security will find Ide

  5. On the fundamentals of identity

    NARCIS (Netherlands)

    van der Gaag, Mandy

    2016-01-01

    Various new perspectives on identity have been introduced or have increased in popularity over the past two decades. These include identity as dynamic system (Kunnen & Bosma, 2001), a narrative approach to identity (McAdams, 2001), multi-dimensional models of identity formation (Luyckx et al., 2006;

  6. On the fundamentals of identity.

    NARCIS (Netherlands)

    van der Gaag, Mandy

    2016-01-01

    Various new perspectives on identity have been introduced or have increased in popularity over the past two decades. These include identity as dynamic system (Kunnen & Bosma, 2001), a narrative approach to identity (McAdams, 2001), multi-dimensional models of identity formation (Luyckx et al., 2006;

  7. Corporate Brand Identity in SMEs

    DEFF Research Database (Denmark)

    Mäläskä, Minna; Jones, Richard Ian

    studies. The research is important since it suggests an iterative and co-creative approach to brand identity. A typology of brand identity formation for SMEs is presented: entrepreneur driven, market driven, stakeholder driven. Practical implications: The three paths to creating a strong brand identity......Purpose: To study the emergence of corporate brand identity in SMEs and to develop a typology of brand identity drivers that reflects a co-creative approach to the emergence of brand identity. Design / Methodology / Approach : Existing approaches to brand identity are summarised. A narrative...... approach to understanding the emergence of brand identity is employed in case studies of 10 case companies reflecting both B-to-B and B-to-C companies. Findings: In all cases we see that brand identity is not a clear, enduring identity as suggested in the literature but is formed in a co-creative process...

  8. Identity-based consumer behavior.

    OpenAIRE

    Reed, Americus; Forehand, Mark; Puntoni, Stefano; Warlop, Luk

    2012-01-01

    Although the influence of identity on consumer behavior has been documented in many streams of literature, the absence of a consistent definition of identity and of generally accepted principles regarding the drivers of identity-based behavior complicates comparisons across these literatures. To resolve that problem, we propose a simple but inclusive definition of identity. Identity can be defined as any category label with which a consumer self-associates that is amenable to a clear picture ...

  9. Fluidity, Identity, and Organizationality

    DEFF Research Database (Denmark)

    Dobusch, Leonhard; Schoeneborn, Dennis

    2015-01-01

    that the organizationality of a social collective is accomplished through “identity claims”—i.e., speech acts that concern what the social collective is or does—and negotiations on whether or not these claims have been made on the collective's behalf. We empirically examine the case of the hacker collective Anonymous...

  10. Gendered Avatar Identity

    Science.gov (United States)

    Woolums, Viola

    2011-01-01

    Gendered appearance in "World of Warcraft" is of particular interest because it seems to infiltrate interactions between individuals without serving a functional purpose within the game itself. It provides an opportunity to look at avatar choice in environments that have a primary purpose aside from existing as an arena for creating identity, and…

  11. Dissociative Identity Disorder

    Science.gov (United States)

    Schmidt, Tom

    2007-01-01

    Few psychological disorders in the Diagnostic Statistical Manual have generated as much controversy as Dissociative Identity Disorder (DID). For the past 35 years diagnoses of DID, previously referred to as Multiple Personality Disorder (MPD), have increased exponentially, causing various psychological researchers and clinicians to question the…

  12. The Visual Identity Project

    Science.gov (United States)

    Tennant-Gadd, Laurie; Sansone, Kristina Lamour

    2008-01-01

    Identity is the focus of the middle-school visual arts program at Cambridge Friends School (CFS) in Cambridge, Massachusetts. Sixth graders enter the middle school and design a personal logo as their first major project in the art studio. The logo becomes a way for students to introduce themselves to their teachers and to represent who they are…

  13. Bilingualism versus identity

    DEFF Research Database (Denmark)

    Hermann, Jesper

    1988-01-01

    During the last hundred years psychologists, philosophers and theologians have developed two different conceptions of personal identity. One of them insists that each person is a unique and transcendental being, whereas the other finds the personality deriving from interaction with other persons........ (This is the prevailing view today.) These theories are placed in relation to the difficulties an immigrant encounters....

  14. Gender, Identity and CMC.

    Science.gov (United States)

    Yates, Simeon J.

    1997-01-01

    Some research and popularized accounts have claimed computer-mediated communication (CMC) based interactions are free of gender inequality though a growing body of research has documented gender differences in access and practice. This article examines both positions and cultural aspects of gender identities to make clear the centrality of gender…

  15. What about Linguistic Identity?

    Science.gov (United States)

    Andrews, Micah

    2010-01-01

    The recent influx of Latino immigrants in the Mid-West U.S. has also increased the number of Mexican students in schools. As recent immigrants, one of the challenges Mexican students face besides learning a different language is the construction of new identities in unfamiliar environments. Learning a language involves acquiring another identity…

  16. Teaching European Identities

    Science.gov (United States)

    Raento, Pauliina

    2008-01-01

    The political, cultural and social make-up of Europe is changing fast. A new European identity is under construction, but old contradictions and diversity challenge its contents, forms and boundaries. Migration, the changing role of the nation-state and Europe's regions, the reshaping of politico-administrative and perceptional boundaries, the…

  17. Language and Identity Explored

    Directory of Open Access Journals (Sweden)

    Thomas Rozanov

    2016-06-01

    Full Text Available The relationship between language and identity is widely discussed in applied linguistics, sociology, communications and other related scholarly fields. Furthermore, many researchers have focused on the post-Soviet region, which given its unique historical context allows for testing of this relationship. The widespread bilingualism as a result of historical russification and the linguistic transformations that occurred after the collapse of the Soviet Union make the region a ‘sociolinguistic playground’. Recent events in Ukraine have given grounds to further explore this relationship, now in attempt to link language and identity as potential forces for geopolitical change in the region. This paper presents an overview of existing research, theories, and opposing perspectives related to the relationship between language and identity, and considers complications such as historical russification, religious influence, socioeconomic factors, and education with regards to the Ukrainian and post-Soviet context.  I aim to illustrate the significance of language and its effects on socio-political change in the case of Ukraine, by presenting arguments and complications in support of the relationship between language and identity.

  18. Spatial Identity in Gagauzia

    Directory of Open Access Journals (Sweden)

    A. V. Salavatova

    2015-01-01

    Full Text Available Historically the gagauz developed a self-perception based on their difference from Moldova as well as the ‘Turkish world’. The article argues that this fact has determined their pro-Russian political orientation as the only possible way of maintaining their identity

  19. Graduate Identity and Employability

    Science.gov (United States)

    Hinchliffe, Geoffrey William; Jolly, Adrienne

    2011-01-01

    This paper develops the concept of graduate identity as a way of deepening the understanding of graduate employability. It does this through presenting research in which over 100 employers in East Anglia were asked to record their perceptions of graduates in respect of their employability. The findings suggest a composite and complex graduate…

  20. Language and Social Identity

    Institute of Scientific and Technical Information of China (English)

    2012-01-01

    A person' s language and social identity are in fact an inseparable entity. When I was in Australia, as I can recall, my neighbour practised his speaking every morning, making it both pleasant and a privilege to hear, for the purpose of getting into parliament.

  1. Migration, Narration, Identity

    DEFF Research Database (Denmark)

    Leese, Peter

    three consecutive summers from 2010 to 2012. The articles focus on various aspects of the migrant experience and try to answer questions about migrant identity and its representations in literature and the media. The book closes with an original play by Carlos Morton, the Chicano playwright working...

  2. Discourses of Identity

    Science.gov (United States)

    Van Leeuwen, Theo

    2009-01-01

    This lecture discusses the concept of lifestyle, which emerged in the field of marketing in the 1970s, as a new, and increasingly pervasive, discourse of identity cutting through older "demographic" discourses. Distributed by mediated experts and role models, and realized through the semiotics of "composites of connotation", it redraws the…

  3. WORK AND LEARNER IDENTITY

    DEFF Research Database (Denmark)

    Kondrup, Sissel

    2015-01-01

    The aim of this article is to suggest a theoretical framework than can assess to how people’s engagement in specific historical and social work practices are significant to their development, maintenance or transformation of a learner identity. Such a framework is crucial in order to grasp how...

  4. Story Telling: Crafting Identities

    Science.gov (United States)

    McMahon, Mary; Watson, Mark

    2013-01-01

    Career guidance clients are seeking to craft new identities that better position them in their careers. The focus of the present article is on narrative career counselling's potential contribution in providing a meaningful and useful experience for career guidance clients. To illustrate the potential of narrative career counselling, the story…

  5. Imagining Geographies, Mapping Identities

    Directory of Open Access Journals (Sweden)

    Matthew Graves

    2015-03-01

    Full Text Available The ambition of this issue of Portal is to reach across the methodological boundaries of history, politics, literature and geography to apply their complementary perspectives to the study of identity and its relation to space and place, an aim that involves attempting to identify the many different ways the notoriously slippery concepts of identity and geography may intersect. For this issue we have selected articles that cast a fresh perspective on two areas where identity and geography intersect: the construction of identity through the imaginative recreation of place in literature: Mapping Literary Spaces; and the study of the shifting relationships of centre and periphery, exclusion and inclusion in urban settings and geopolitical confrontations: Social and Political Peripheries. Gerard Toal has written that geography is not a noun but a verb: it does not describe what space is but studies what we do with space, imaginatively and politically. The articles in this issue illustrate the exercise of the literary and political imagination and the role of materiality and memory in the creation of geographic representation. They show too a new awareness of the centrality of space in the constitution of identities, and the need for a new geocritical reading of its discourse, as the interrelations of place and community are played out on the many scales of social and political life, from the local to the global.   The special issue is organised thus: Introduction Matthew Graves (Aix-Marseille University & Liz Rechniewski (Sydney University: “Imagining Geographies, Mapping Identities.” I. Mapping Literary Spaces - Isabelle Avila (University of Paris XIII, "Les Cartes de l'Afrique au XIXe siècle et Joseph Conrad : Perceptions d'une Révolution Cartographique." - Daniela Rogobete (University of Craiova, "Global vs Glocal: Dimensions of the post-1981 Indian English Novel." II. Social and Political Peripheries - Elizabeth Rechniewski (Sydney

  6. Music and collective identities

    Directory of Open Access Journals (Sweden)

    Milanović Biljana

    2007-01-01

    Full Text Available This paper presents some introductory observations on the ways in which the opposition between the modern and post-modern understanding of social identities can be overcome in the context of musicology. It is based on the consideration of identities as dynamic and changeable categories, as well as on the importance of the relation between individual and collective positionings, on the complexities of the multiple identifications and on the understanding of music as a social construction of identity. Due attention is paid to basic theoretical and methodological aspects in the interdisciplinary analysis of ′self′ and ′other′. In music, the problems of self-presentation appropriation, difference, power, control, authenticity, hybridity, as well as other issues that blur the boundaries between musicology, ethnomusicology and the studies of popular music, are made relevant by these interdisciplinary terms. Both the modern and post-modern understanding of identity can first be placed in the context of the binary questions: ′How to construct the identity and maintain it?′ and ′How to avoid the construction of the fixed identity and thus leave the door open for the possibility of change?′. It seems that the deconstruction of these opposite approaches has now grown in importance. This paper focuses especially on that kind of theorizing about music and socio-cultural identities. The views of Georgina Born and David Hesmondhalgh, that older and recent models of music representation are not ′either/or′ categories but rather complement each other, are especially singled out. These authors show by numerous examples that music can invariably both reflect existing identities and construct new ones. They conclude that possible shortcomings, such as the danger of essentialism in the earlier approach, and of later reductionism, could be avoided by carefully using the homology and process models of music representation. Their typology of music

  7. 基于身份的电子文档域密钥分发算法及协议%Identity-based domain key distribution protocol in the E-document security management

    Institute of Scientific and Technical Information of China (English)

    闫玺玺; 马兆丰; 杨义先; 钮心忻

    2012-01-01

    In order to create a security domain environment in the E-document management, an identity domain key distribution scheme using bilinear pairings for large and dynamic domain was proposed. The scheme could handle the joining and leaving of domain members efficiently, and updateed the domain key in the manner of broadcast, which avoided the complex protocols of key agreement. In addition, the distribution protocol based sharing-domain for E-document was also given, which aimed to realize the function of sharing the documents in a domain and distributing the documents between different domains securely. With the protocol, the E-documents obtained by a domain member could be transmitted to other domain members seamlessly. On the opposite, the E-document which was distributed to another domain need to be upload to the server, which would verify the identity of the domain member and encrypt the documents with the specified domain key.%为了实现电子文档安全管理环境中域间用户的通信安全,采用双线性对构造了一个适用于大数量、动态域组的基于身份的域密钥分发算法,该算法实现了域环境下用户的动态加入与离开,通过广播加密的方式使域用户获得更新后的域密钥,避免了复杂的密钥更新协商协议.另外,提出基于共享域的电子文档管理协议,实现域内用户共享,不同域之间安全分发电子文档.在该协议工作下,共享域内每个用户合法获得的电子文档可以在域中各设备间无缝地流动,实现资源共享.不同的域之间电子文档的传输有严格的限制,需要经服务器认证,确保电子文档的安全管理与防泄密.

  8. SuperIdentity: Fusion of Identity across Real and Cyber Domains

    Energy Technology Data Exchange (ETDEWEB)

    Black, Sue; Creese, Sadie; Guest, Richard; Pike, William A.; Saxby, Steven; Stanton Fraser, Danae; Stevenage, Sarah; Whitty, Monica

    2012-04-23

    Under both benign and malign circumstances, people now manage a spectrum of identities across both real-world and cyber domains. Our belief, however, is that all these instances ultimately track back for an individual to reflect a single 'SuperIdentity'. This paper outlines the assumptions underpinning the SuperIdentity Project, describing the innovative use of data fusion to incorporate novel real-world and cyber cues into a rich framework appropriate for modern identity. The proposed combinatorial model will support a robust identification or authentication decision, with confidence indexed both by the level of trust in data provenance, and the diagnosticity of the identity factors being used. Additionally, the exploration of correlations between factors may underpin the more intelligent use of identity information so that known information may be used to predict previously hidden information. With modern living supporting the 'distribution of identity' across real and cyber domains, and with criminal elements operating in increasingly sophisticated ways in the hinterland between the two, this approach is suggested as a way forwards, and is discussed in terms of its impact on privacy, security, and the detection of threat.

  9. Identity Management Task Force Report 2008

    Science.gov (United States)

    2008-01-01

    agent would be the local post office? A kiosk in a mall? 2. How does the ‘trusted agent’ submit the application? How does he know where to send it...have the travel system suggest an itinerary and hotel based on past choices, eliminating step 6. We could eliminate the multiple entries into our silos

  10. Sensing and Efficient Inference for Identity Management

    Science.gov (United States)

    2016-06-14

    Cucchiara. Learning articulated body models for people re- identification. In Proceedings of the 21st ACM International Conference on Multimedia, MM...13, pages 557–560, New York, NY, USA, 2013. ACM . [8] D. Baltieri, R. Vezzani, and R. Cucchiara. Mapping appearance descriptors on 3d body models for...of the 9th Annual Conference on Computer Graphics and Interactive Techniques, SIGGRAPH ’82, pages 297–307, New York, NY, USA, 1982. ACM . [46] J. F

  11. Metadata For Identity Management of Population Registers

    Directory of Open Access Journals (Sweden)

    Olivier Glassey

    2011-04-01

    Full Text Available A population register is an inventory of residents within a country, with their characteristics (date of birth, sex, marital status, etc. and other socio-economic data, such as occupation or education. However, data on population are also stored in numerous other public registers such as tax, land, building and housing, military, foreigners, vehicles, etc. Altogether they contain vast amounts of personal and sensitive information. Access to public information is granted by law in many countries, but this transparency is generally subject to tensions with data protection laws. This paper proposes a framework to analyze data access (or protection requirements, as well as a model of metadata for data exchange.

  12. Identity Development and Identity Formation: A Theoretical Assessment

    Directory of Open Access Journals (Sweden)

    Hasan Atak

    2011-03-01

    Full Text Available Basic function of adolescence -one of the human life periods when physical and mental changes are experienced most heavily- is suggested to be identity development. Recent developmental psychology studies hypothesized that identity development starts during adolescence but intensifies during transi-tion to adulthood. This study addresses identity concept, in detail, from a theoretical point of view and in the scope of empirical studies. Literature offers quite different explanations and models as well as a few basic theories in this framework. The number of studies on identity subject is higher than the number of studies on other psycho-social study subjects. This study presents the theories offering basic explanations about identity (such as the works of Erikson, Marcia, Berzonsky, Waterman and the theories referring to identity (such as the works of Blos, Arnett, Kegan. Theories related to identity are addressed under the titles of identity exploration, identity status and identity styles. Almost all of the identity studies conducted in Turkey focused on identity status. In this context, new theories and tendencies may be taken into consideration in the studies to be made in Turkey on identity development.

  13. Social identities and risk

    DEFF Research Database (Denmark)

    Blok, Anders; Jensen, Mette; Kaltoft, Pernille

    2008-01-01

    Expert-based environmental and health risk regulation is widely believed to suffer from a lack of public understanding and legitimacy. On controversial issues such as genetically modified organisms and food-related chemicals, a "lay-expert discrepancy" in the assessment of risks is clearly visible...... of social identities. On the basis of qualitative interviews with citizens and experts, respectively, we focus on the multiple ways in which identities come to be employed in actors' risk accounts. Empirically, we identify salient characteristics of "typical" imagined experts and lay-people, while arguing...... that these conceptions vary identifiably in-between four groups of citizens and experts. On the basis of our findings, some implications for bridging the lay-expert discrepancy on risk issues are sketched out....

  14. Holy Nations. Global Identities

    DEFF Research Database (Denmark)

    Along with the processes of globalisation and the end of the cold war we have seen an upsurge in religious nationalism and an increasing focus on the role of religion as a legitimising force in democratic secular states. Holy Nations & Global Identities draws on the combined theoretical and histo......Along with the processes of globalisation and the end of the cold war we have seen an upsurge in religious nationalism and an increasing focus on the role of religion as a legitimising force in democratic secular states. Holy Nations & Global Identities draws on the combined theoretical...... and historical insight of historians, political scientists and social scientists on the question of nationalism and globalisation with the methodological knowledge of religion presented by sociologists of religion. The book brings genuine theoretical explorations and original case studies on civil religion...

  15. Identity in craft

    Directory of Open Access Journals (Sweden)

    Agneta Knutas

    2013-06-01

    Full Text Available In contrast to efficiency, a bakery on the countryside in Norway is known for its slow pace of work. The slow pace allows the product, as well as the craftsperson, time in production and quality in relation to market. Therefore, the emphasis is on the importance of the aesthetic in craft, the building of identity as well as the association of tradition as part of the craft. Furthermore, allowing the time to understand both craft and tradition is what makes knowledge meaningful (Arendt, 1998/1958. Closely following craftsmen at a bakery in Norway, for two days, allowed the collection of observations and interviews. This paper is presented in narrative format. The study utilises support from Sennett (2009 and Arendt (1998/1958 in the analysis of the collected empirical data. The results regarding identity and enhancing vocational education in craft point towards the importance of concentration, judgement, an unhurried education process and a sociable master.

  16. Identity and the Itinerant Online Learner

    Directory of Open Access Journals (Sweden)

    Marguerite Koole

    2014-12-01

    Full Text Available This paper outlines a preliminary study of the kinds of strategies that master students draw upon for interpreting and enacting their identities in online learning environments. Based primarily on the seminal works of Goffman (1959 and Foucault (1988, the Web of Identity Model (Koole, 2009; Koole and Parchoma, 2012 is used as an underlying theoretical framework for this research study. The WoI model suggests that there are five major categories of “dramaturgical” strategies: technical, political, structural, cultural, and personal-agential. In the data collection, five online master of education students participated in semi-structured, online interviews. Phenomenography guided the data collection and analysis resulting in an outcome space for each strategy of the WoI model. The study results indicate that online learners actively employ a variety of strategies in interpreting and enacting their identities. The outcome spaces provide insights into ways in which online learners can manage their identity performances and strategies for ontological re-alignment (reconceptualization of oneself. Further study has the potential to elucidate how learning designers and online instructors might facilitate such identity-work in order to shape productive online environments.

  17. Identity Construction, Negotiation, and Resistance: Reconsideration of "Japanese" Identity

    Science.gov (United States)

    Fukuda, Chie

    2010-01-01

    This dissertation explores identity construction, mainly focusing on the ethnonational identity of "Japanese," in contrast to that of "non-Japanese" from ethnomethodological and social constructionist perspectives. Within these approaches, identity is not given "a priori" but emerges through sociohistorical contexts…

  18. Identity Styles and Religiosity: Examining the Role of Identity Commitment

    Science.gov (United States)

    Grajales, Tevni E.; Sommers, Brittany

    2016-01-01

    This study observed the role of identity styles, identity commitment, and identity statuses in predicting religiosity in a sample of undergraduate students attending a Seventh-day Adventist university (N = 138). Two structural models were evaluated via path analysis. Results revealed two strong models for the prediction of religiosity. Identity…

  19. Does Everyone Have a Musical Identity?: Reflections on "Musical Identities"

    Science.gov (United States)

    Gracyk, Theodore

    2004-01-01

    The book, "Musical Identities" (Raymond MacDonald, David Hargreaves, Dorothy Miell, eds.; Oxford and New York: Oxford University Press, 2002) consists of 11 essays on the psychology of music. The editors divided the essays into two groups: those on developing musical identities ("identities in music" involving recognizable social and cultural…

  20. Identity Styles and Religiosity: Examining the Role of Identity Commitment

    Science.gov (United States)

    Grajales, Tevni E.; Sommers, Brittany

    2016-01-01

    This study observed the role of identity styles, identity commitment, and identity statuses in predicting religiosity in a sample of undergraduate students attending a Seventh-day Adventist university (N = 138). Two structural models were evaluated via path analysis. Results revealed two strong models for the prediction of religiosity. Identity…

  1. Gestão pública, formação e identidade de profissionais de educação infantil Public management, education and identity of early child education professionals

    Directory of Open Access Journals (Sweden)

    Sonia Kramer

    2007-08-01

    Full Text Available O artigo trata da gestão da educação infantil e das políticas de formação de profissionais da área. Buscou resgatar histórias de formação das profissionais responsáveis pela gestão da educação infantil nas Secretarias Municipais de Educação do Estado do Rio de Janeiro. O texto está estruturado em três partes. A primeira contextualiza a pesquisa, traz questões de natureza metodológica sobre o questionário aplicado nos municípios e sintetiza dados obtidos com esse instrumento. A segunda aborda as entrevistas realizadas com as profissionais no que diz respeito ao referencial teórico-metodológico, traz aspectos práticos da sua realização e apresenta uma síntese das principais categorias que emergiram dos relatos. A terceira parte focaliza o tema da gestão, identidade e formação. As entre vistadas falam do contexto em que atuam, de hierarquia e poder, revelando situações em que a precariedade, a falta de condições materiais e humanas, o despreparo e o improviso convivem com a dedicação, o idealismo e o compromisso profissional.The article addresses early child education and the policies set forth for the professional formation in this field. It sought to rescue stories about the education of professionals in charge of the management of early child education at the Municipal Secretariats of Education of the State of Rio de Janeiro. The text consists of three sections. The first contextualizes the research, addressing issues of methodological nature related to the questionnaire employed in the municipalities and summarizes the data thus obtained. The second section deals with the interviews conducted with these professionals, discussing the theoretic-methodological framework employed, practical aspects related to the conduction of the interviews, and the main categories that emerged from the reports. The third part focuses on the themes of management, identity and education. The interviewed speak about the context

  2. Entrepreneurship Education as Identity Workspace

    DEFF Research Database (Denmark)

    Frederiksen, Signe Hedeboe

    2016-01-01

    and identities. Exposed to identity work practices in class, learners experienced conflicting demands participating as succesful students and participating as potential entrepreneurs. The study draws attention to how an education setting contextualises identity work as a social practice. It critisises......Entrepreneurship education theory and practice show increasing interest in identity work as an important part of entrepreneurial learning. Entrepreneurship programs become identity workspaces where pedagogical designs stimulate entrepreneurial identity work and support individuals’ discovery...... of themselves as entrepreneurs. This article investigates how entrepreneurship education is practiced as an identity workspace, when reflective identity work is turned into a pedagogical strategy for entrepreneurial learning. I present empirical data from a qualitative fieldstudy in an eleven week mandatory...

  3. John locke on personal identity.

    Science.gov (United States)

    Nimbalkar, Namita

    2011-01-01

    John Locke speaks of personal identity and survival of consciousness after death. A criterion of personal identity through time is given. Such a criterion specifies, insofar as that is possible, the necessary and sufficient conditions for the survival of persons. John Locke holds that personal identity is a matter of psychological continuity. He considered personal identity (or the self) to be founded on consciousness (viz. memory), and not on the substance of either the soul or the body.

  4. John locke on personal identity

    Directory of Open Access Journals (Sweden)

    Nimbalkar Namita

    2011-01-01

    Full Text Available John Locke speaks of personal identity and survival of consciousness after death. A criterion of personal identity through time is given. Such a criterion specifies, insofar as that is possible, the necessary and sufficient conditions for the survival of persons. John Locke holds that personal identity is a matter of psychological continuity. He considered personal identity (or the self to be founded on consciousness (viz. memory, and not on the substance of either the soul or the body.

  5. John locke on personal identity

    Directory of Open Access Journals (Sweden)

    Namita Nimbalkar

    2011-03-01

    Full Text Available John Locke speaks of personal identity and survival of consciousness after death. A criterion of personal identity through time is given. Such a criterion specifies, insofar as that is possible, the necessary and sufficient conditions for the survival of persons. John Locke holds that personal identity is a matter of psychological continuity. He considered personal identity (or the self to be founded on consciousness (viz. memory, and not on the substance of either the soul or the body.

  6. Social Identity Simulation System (SISTEM)

    Science.gov (United States)

    2014-03-31

    number of people G = identity group (e.g. gender, ethnicity, etc.) D = identity (e.g. male/ female , White/Black/Spanish/… etc.) R = real resources for an...actions as part of a collective. The collective actions are driven by social identity entrepreneurs (SIDs) (Haslam & Reicher, 2007; Lal, 1997). These...social identity entrepreneurs only advocate a collective action on behalf of the group when they perceive benefits of advocating being greater than

  7. Identity formation in multiparty negotiations

    NARCIS (Netherlands)

    Swaab, R; Postmes, T.; Spears, R.

    2008-01-01

    Based on the recently proposed Interactive Model of Identity Formation, we examine how top-down deductive and bottom-up inductive identity formations influence intentions and behaviour in multiparty negotiations. Results show that a shared identity can be deduced from the social context through reco

  8. Identity Development in Deaf Adolescents

    Science.gov (United States)

    Kunnen, E. Saskia

    2014-01-01

    We studied identity development during 5 years in seven deaf adolescents who attended a school for deaf children in the highest level of regular secondary education (age between 14 and 18 years), administering identity interviews every year. Identity development is conceptualized as the processes of exploration and commitment formation (Bosma,…

  9. New identities for sessile drops

    CERN Document Server

    Hajirahimi, Maryam; Fatollahi, Amir H

    2014-01-01

    A new set of mathematical identities is presented for axi-symmetric sessile drops on flat and curved substrates. The geometrical parameters, including the apex curvature and height, and the contact radius, are related by the identities. The validity of the identities are checked by various numerical solutions both for flat and curved substrates.

  10. Identity theft and your practice.

    Science.gov (United States)

    Asbell, Lisa

    2010-01-01

    Medical identity theft is a growing problem in America. The federal government has passed laws to help "prevent" identity theft. However, several powerful medical associations are fighting the legislation. Americans need to know what is happening with these laws and why these laws are important to protect providers from lawsuits and consumers of healthcare from medical identity theft.

  11. Ethnic Identity: Crisis and Resolution.

    Science.gov (United States)

    Ruiz, Aureliano Sandoval

    1990-01-01

    Presents Chicano/Latino ethnic identity development model that fosters understanding of ethnic identity conflicts particular to Chicano and Latino clients. Presents five stages (causal, cognitive, consequence, working through, and successful resolution) in relationship to ethnic identity conflicts, interventions, and resolution. Combines several…

  12. Rules, social ontology and collective identity

    OpenAIRE

    Martins, Nuno O.

    2009-01-01

    Copyright © 2009 The Author. Journal compilation © The Executive Management Committee/Blackwell Publishing. Mainstream game theory explains cooperation as the outcome of the interaction of agents who permanently pursue their individual goals. Amartya Sen argues instead that cooperation can only be understood by positing a type of rule-following behaviour that can be (and often is) out of phase with the pursuit of individual goals, due to the existence of a collective identity. However, Sen...

  13. Schizophrenia masquerading as Dissociative Identity Disorder

    OpenAIRE

    Jegan Yogaratnam; Rajesh Jacob

    2012-01-01

    Dissociative symptoms can dominate the clinical picture in many psychiatric conditions and possess a huge challenge to the clinicians in management. We present a case report of a female with a strong family history of schizophrenia who initially presented with features suggestive of dissociative identity disorder, which is itself a rare clinical entity, was later diagnosed to have schizophrenia. Authors would like to emphasise that clinicians should have a high index of suspicion for schizoph...

  14. Primary Identity in Literature

    DEFF Research Database (Denmark)

    Graham, Brian Russell

    viewing the characters in literature in terms of these political identities. Literature is consequently discussed in relation to political causes. Literary criticism is animated by the same causes, and is viewed as having a direct intervention in society in relation to them. In this paper, I will discuss...... in opposite directions towards the fulfillment of desire at one end of experience and a world of fear and despair at the other, and in relation to its notion of a better society, what interests literature is a society of contented families joined through the marriage of their adult children....

  15. FINDING MY IDENTITY

    Institute of Scientific and Technical Information of China (English)

    Keith Farnish

    2010-01-01

    @@ I have found an identity. Is that really such a big deal? The thing is,I didn't realize I was missing one.There are so many things I could call myself: a human,male,a father,a husband,a writer,a thinker,a gardener,a campaigner...so many things that I feel pretty comfortable with,yet until a couple of weeks ago I didn't realize there was something missing; something that yawned inside me,empty and lacking substance.

  16. Shifting Design Consultancy Identities

    DEFF Research Database (Denmark)

    Larsen, Henry; Huijboom, Nina; Holm Nielsen, Anne

    2014-01-01

    and identities that resonate more with freelancing and portfolio careers than with the intention of creating firms that are intended to expand. We recognized a pattern where freelancers build up their work as a portfolio by moving from one engagement to another, a process that we will call sequential freelancing...... on design for innovation as a strategy for growth might well benefit if they understand that other companies in their municipality can grow if they actively support designers and help them develop their networking capabilities....

  17. What is digital identity?

    OpenAIRE

    Ertzscheid, Olivier

    2016-01-01

    The question of digital identity and e-reputation is central in today’s Internet ecosystem, both in terms of individual and collective use. This book is an accessible guide to cutting-edge research on the subject and provides an overview of the fundamental issues that individuals need to master in order to retain control over their or their organization’s online presence. This is a book for readers who wish to discover more about this rich and complex issue, as well as for businesses, organi...

  18. Understanding your digital identity

    OpenAIRE

    Williams, Shirley Ann; Fleming, Sarah Christine; Lundqvist, Karsten Oster; Parslow, Patrick Neil

    2010-01-01

    The term “Digital Identity” is used here to describe the persona a person projects across the internet. Your Digital Identity as perceived by other people is made up of material that you post yourself (for example photographs on Flickr and your own web page) but it also is made up of material other people put there about you (blog posts that mention you, photographs in which you are tagged). The “This is Me” project has developed resources that can be used by students and others to appreci...

  19. (Re-) Framing Authenticity: Considering Multiple Social Identities Using Autoethnographic and Intersectional Approaches

    Science.gov (United States)

    Jones, Susan R.; Kim, Yoolee Choe; Skendall, Kristan Cilente

    2012-01-01

    The purpose of this autoethnographic study was to explore the lived experience of identity construction and negotiation of multiple identities using an intersectional framework. Results present examples of the troublesome nature of authenticity as multiple identities were negotiated and managed based upon context and the influence of power and…

  20. (Re-) Framing Authenticity: Considering Multiple Social Identities Using Autoethnographic and Intersectional Approaches

    Science.gov (United States)

    Jones, Susan R.; Kim, Yoolee Choe; Skendall, Kristan Cilente

    2012-01-01

    The purpose of this autoethnographic study was to explore the lived experience of identity construction and negotiation of multiple identities using an intersectional framework. Results present examples of the troublesome nature of authenticity as multiple identities were negotiated and managed based upon context and the influence of power and…

  1. Empirical Analysis of the Major Identity and Its Influence on Employment Act after Graduation for Students Major in Property Management%物业管理专业本科生专业认同及对择业行为影响的实证分析

    Institute of Scientific and Technical Information of China (English)

    李海波; 黄蕾

    2014-01-01

    The paper empirically analyzes the major identity of students major in property management during the period of studying at school and its influence on their employment acts after graduation by using the methods of regression analysis and factor analysis.Re-sults show that major consciousness,major teaching,major values and major environment have strong positive effects on major identity in the composition of property management major identity,and major prejudice has a weak negative effect on professional identity.The major identity of undergraduate students major in property management during the period of studying at school does not have a positive impact on the employment act after graduation.Finally,the paper puts forward some suggestions on how to improve the major identity and professional employment rate for students major in property management.%通过问卷调查,运用回归和因子分析法对物业管理本科毕业生在校期间的专业认同和毕业后的择业行为进行了实证研究。研究结果表明,在物业管理专业认同的构成中,专业意识、专业教学、专业价值和专业环境对专业认同具有较强的正影响,专业偏见对专业认同具有较弱的负影响;物业管理本科生在校期间的专业认同对毕业后的择业行为并不具有积极影响。最后,本文针对如何提升物业管理本科生的专业认同和专业内就业率提出了相关建议。

  2. RFID-based Electronic Identity Security Cloud Platform in Cyberspace

    Directory of Open Access Journals (Sweden)

    Bing Chen

    2012-07-01

    Full Text Available With the moving development of networks, especially Internet of Things, electronic identity administration in cyberspace is becoming more and more important. And personal identity management in cyberspace associated with individuals in reality has been one significant and urgent task for the further development of information construction in China. So this paper presents a RFID-based electronic identity security cloud platform in cyberspace to implement an efficient security management of cyber personal identity, and designs and realizes a strong and pervasive security cloud service platform, and discusses key technology including security authentication mechanism for the electronic identity card, super high frequency RFID with eID cards, multilevel privacy protection mechanism, security cloud service, security isolation and single-oriented transmission, and boundary security gateway protection, and it can well apply to personal identity management with virtual roles of citizens in cyberspace such as E-Government and E-Business, and the electronic identity security platform has been primary implemented and achieved good effects in actual applications.

  3. Contextuality of identical particles

    Science.gov (United States)

    Kurzyński, Paweł

    2017-01-01

    There exist quantum phenomena that cannot be explained by noncontextual hidden-variable theories, yet the majority of them requires measurements that are performed on a single quantum system at a time. This fact constrains the phenomenon of contextuality to the microscopic domain. It is therefore natural to ask if quantum contextuality can be observed in measurements on collections of particles. Since particles in nature are identical, one can expect that such contextuality would be linked to bosonic and fermionic properties. Analysis of quantum contextuality in such scenarios would broaden our understanding of nonclassical effects in composite systems and perhaps would give us a hint on how to observe quantum phenomena in the macroscopic world. In this work I propose a generalization of quantum contextuality to the case of many identical particles. I show that a type of contextuality exhibited by a collection of particles (state dependent, state independent, or noncontextual) depends on their type and their number. I also discuss further properties of this generalization and identify major open questions.

  4. Gender Socialization and Identity Theory

    Directory of Open Access Journals (Sweden)

    Michael J. Carter

    2014-05-01

    Full Text Available Gender socialization is examined through a social psychological lens by applying identity theory and identity control theory. Current research from the fields of family and sociological social psychology are surveyed to provide a better conception of how the family operates as agents of socialization, and how identities that are cultivated and fostered in youth provide meaning throughout the life course and maintain the social order. The application of identity theory shows how gender is a diffuse status characteristic, which is salient in person, role, and social (group identities, and also across social situations. Identity control theory is applied to show how emotions operate within an internal control system to stabilize gendered identities and perpetuate the social structure. Both theories are specifically applied to understand socialization dynamics that exist for children and families.

  5. Rethinking Christian Identity: African Reflections from Pauline Writings

    Directory of Open Access Journals (Sweden)

    Togarasei Lovemore

    2016-06-01

    Full Text Available Despite its existence for over a century in Africa and statistics putting the Christian populations at average 80 percent mostly in sub-Saharan African countries, Christianity has not managed to provide an alternative identity to ethnicity as issues of identity continue dogging the continent. Many African societies remain divided and at war on the basis of identities, be they racial, tribal, creedal, gender, class, language or other identities. Surprisingly, this state of affairs is also found even within the precincts of the church. Many churches remain divided along racial, ethnic, tribal, and other identities. One does not need to look far and wide to acknowledge this reality. Does Christianity have an identity? Could the writings of Paul address the issues of Christian identity? Or do the writings address this problem at all? These are the questions at the heart of this paper. Making use of Pauline texts such as Galatians 3:28 and scholarly works such as those of Buell and Hodge (2004:237, I discuss Paul’s understanding of Christian identity and its implications for Christian identity in Africa today.

  6. 不同标识在精神科住院患者身份识别管理中的应用比较%Comparison of different identification application in identity management of patients with mental disorder

    Institute of Scientific and Technical Information of China (English)

    徐彬; 钱一平; 沈念红; 胡筱峰

    2015-01-01

    目的:探讨不同身份识别方法对住院精神病患者临床护理管理质量的影响。方法通过常规识别、腕带识别、指纹识别仪识别,比较使用不同标识前后对精神病患者身份识别的正确率、依从率、缺陷率、腕带材料成本节约率、精神病患者对身份识别的满意率的影响。结果不同标识患者身份识别的正确率分别为95.60%,99.00%,100%,差异有统计学意义(χ2=62.58,P<0.05),3组间两两比较差异均有统计学意义(χ2值分别为25.42,44.99,10.06;P<0.01)。使用指纹识别仪前后精神病患者对身份识别依从率分别是82%,98%;身份识别的缺陷率分别是36%,6%;腕带材料成本节约率分别是5%,45%;精神病患者对身份识别方式的满意率分别是86%,99%;差异均有统计学意义(χ2值分别为45.81,282.74,490.08,10.07;P<0.01)。结论不同标识患者身份识别正确率不同。腕带有利于提高精神病患者身份识别的正确率,而指纹识别仪正确率最高,它避免腕带在精神科使用的局限性,提高精神科护患双方身份识别的依从性,降低身份识别的缺陷率,节约人力及材料成本及提高护患双方的满意率。%Objective To explore the effects of different identity identification methods in the quality of clinical nursing management of psychosis patients. Methods By the conventional recognition, wristband identification, fingerprint identification, we compared the different identification correct rate, compliance rate, defect rate, wristband material cost saving rates, satisfaction of identification for mental patients before and after the identification. Results The rate of correct identification for patients with different identification were respectively 95. 60%, 99%, 100% with statistical significance (χ2 =62. 58,P<0. 05). After several correct rate of identification comparison, there were statistically significant differences in any two of three groups (χ2 =25. 42

  7. Destination Branding Identity from the Stakeholders’ Perspectives

    Directory of Open Access Journals (Sweden)

    Mohd Fadil Mohd Yusof

    2015-01-01

    Full Text Available In order to establish a strong destination branding, understanding the process of image in positioning the destination is crucial. Arguably, a brand identity for a tourist destination that makes up a name is often captured from the user point of view. However, little was understood as to how the stakeholders perceived image-making, and later, the branding of destination and their influence. In this context, brand identity through projection of Destination Management Organizations (DMOs, significantly contribute towards existing image. In other words, they are forcing the creation of branding using the vision of how the market and segmentation should perceive a brand. The question that may rise is how this branding process is truly acting as a catalyst of a production towards desirable destination. This paper addresses the following issues; (1 Stakeholders’ involvement particularly local community in tourism development and planning (2 previous studies in destination branding (3 the relationships between destination identity and destination brand. This paper also highlights the existing gaps in understanding destination identity from the stakeholders’ perspectives to the branding strategy. It also suggests the future studies.

  8. When design meets identities

    DEFF Research Database (Denmark)

    Dau, Susanne

    2013-01-01

    The aim of this paper is to present result from the first period of implementing models of blended learning in two Danish educations centers at a University College. The question addressed is how activation of blended learning models in undergraduate education for teacher and radiography affects...... knowledge development and which are the constraints or challenges to take into consideration in the process of implementation. The research takes its departure in the two different models of blended learning designed by teachers in undergraduate education centers. This is an investigation of the first...... through a critical hermeneutical process of prefiguration, configuration and refiguration. The results illustrate a significant impact of students identities as a part of the referential whole, since it is both prerequisite and an obstruction in the activation of blended learning environments...

  9. Identities in Conflict

    DEFF Research Database (Denmark)

    Andersen, Dorte Jagetic

    2015-01-01

    the national public school system. The main hypothesis is, that parts of the dysfunction stems from the national lack of semantics and competence to understand and discuss experience with warzone extremes, children and spouses of Danish Soldiers and Veterans miss the language to talk and be silent. I propose......, that systems theory is both able and competent to analyze the missing gaps and empty spaces of the competing identities inside and outside the forms of peace and war. Through the use of Luhmannian systems theory and form analysis, the children and partners of war veterans give us the chance to observe...... 'inbetween'. In public education, those Soldier-kids often show abnormal behaviour and dysfunctional social integration and mental regulation. Health Care Systems and social workers turn to diagnoses of secondary traumatization, attachment disorder and develop therapies to calm the effects of exposure to War...

  10. Scripting Professional Identities

    DEFF Research Database (Denmark)

    Bévort, Frans; Suddaby, Roy

    2016-01-01

    This article examines how individual accountants subjectively interpret competing logics of professionalism as they transform from practicing accountants to managerial roles and as their organizations transform from traditional professional partnerships to more corporate organizational forms. Based...... on a longitudinal ethnography of professionals in a Big Four accounting firm we analyse the process by which individual professionals make sense of their new roles and integrate the conflicting demands of professional and managerial logics. We find that individuals are active authors of their own identity scripts...... logics is based less of inter-subjective interactions, as prior literature has assumed, and is, instead, based on individual cognition and interpretive subjectivity. We also contribute to research in professional service firms by offering a conceptual model of the individual micro-processes required...

  11. Nostalgia and lost identity.

    Science.gov (United States)

    Pourtova, Elena

    2013-02-01

    Nostalgia for the Soviet Union is a major social phenomenon in Russia today due to the irrevocable losses of the recent past in which Soviet citizens involuntarily became immigrants in their own country. With reference to discussions of nostalgia in philosophical and psychoanalytic literature, I suggest that nostalgia may represent either a defensive regression to the past or a progressive striving for wholeness through re-connecting with what has been lost in the service of a greater integration. I compare this with the processes of adaptation seen in immigrants and provide a clinical illustration of a young man coming to terms with loss and change in the post-Soviet era. When nostalgia is recognized as a legitimate emotional experience it may facilitate mourning and enable the integration of the past with the present and the development of a new identity.

  12. When design meets identities

    DEFF Research Database (Denmark)

    Dau, Susanne

    2013-01-01

    The aim of this paper is to present result from the first period of implementing models of blended learning in two Danish educations centers at a University College. The question addressed is how activation of blended learning models in undergraduate education for teacher and radiography affects...... through a critical hermeneutical process of prefiguration, configuration and refiguration. The results illustrate a significant impact of students identities as a part of the referential whole, since it is both prerequisite and an obstruction in the activation of blended learning environments...... knowledge development and which are the constraints or challenges to take into consideration in the process of implementation. The research takes its departure in the two different models of blended learning designed by teachers in undergraduate education centers. This is an investigation of the first...

  13. Creation, Identity and Reflection

    Directory of Open Access Journals (Sweden)

    Alina Beatrice Cheşcă

    2015-05-01

    Full Text Available The paper “Creation, Identity and Reflection” approaches the identification in the “mirror” of reality with creation, in other words seeking the authors’ identity in the reflected images. Reflection means attempting to find oneself, the mirror being the main principle of creation. Many characters become interesting only when they step into the world beyond the mirror, when their faces are doubled by the other self or when their selves are returned by other characters. The narcissistic concept of the mirror, i.e. the reflection in the mirror and the representation of the mirror itself, is a recurrent one in literature, but the reflection of the self which is not the self (as it is a reflection does not necessarily appear in a mirror or in a photograph or portrait. Sometimes, the not-self is returned to the self by another person or character. As far as Oscar Wilde’s theories are concerned, the main idea is that people are interesting for their masks, not for their inner nature. What Wilde calls “inner nature” is the characters’ un-reflected self and the mask is the reflection, the self in the mirror. Some characters’ relationships develop within a fiction that they dramatically try to preserve and protect with the risk of suffering. They refuse to take off the masks which define them in the others’ minds and hearts; the narcissistic individuals (both artists and characters seek and love their own image which they project upon facts, thus creating a fictive realm.

  14. Swiss identity smells like chocolate: Social identity shapes olfactory judgments.

    Science.gov (United States)

    Coppin, Géraldine; Pool, Eva; Delplanque, Sylvain; Oud, Bastiaan; Margot, Christian; Sander, David; Van Bavel, Jay J

    2016-10-11

    There is extensive evidence that social identities can shape people's attitudes and behavior, but what about sensory judgments? We examined the possibility that social identity concerns may also shape the judgment of non-social properties-namely, olfactory judgment. In two experiments, we presented Swiss and non-Swiss participants with the odor of chocolate, for which Switzerland is world-famous, and a control odor (popcorn). Swiss participants primed with Swiss identity reported the odor of chocolate (but not popcorn) as more intense than non-Swiss participants (Experiments 1 and 2) and than Swiss participants primed with individual identity or not primed (Experiment 2). The self-reported intensity of chocolate smell tended to increase as identity accessibility increased-but only among Swiss participants (Experiment 1). These results suggest that identity priming can counter-act classic sensory habituation effects, allowing identity-relevant smells to maintain their intensity after repeated presentations. This suggests that social identity dynamically influences sensory judgment. We discuss the potential implications for models of social identity and chemosensory perception.

  15. Drug-Related Identity Change

    Directory of Open Access Journals (Sweden)

    ferydoon Seyed Rabiee

    2004-02-01

    Full Text Available Our study is concentrating on understanding drug-related identity process which may enter important sociological visions into drug abuse pathology. It is in the framework of symbolic proactivity، cultural studies and the existing model for analyzing drug-related identity (Anderson – 1994. In this study، we have used a qualitative survey and a model test in a statistical sample cosisting white/black males and females who are under drug abuse treatment in Middle Michigan. Our data shows that identity change occures during childihood or early adolescence and is accompanied with experiences of isolationism before drug abuse which facilitates the creation of an afflicted identity as well as the loss of the ability to control the personal identity. Assimilation and drug abuse subculture have represented altenative identities for resolving such an unsuitable situation.

  16. Personal identity and eastern thought

    Directory of Open Access Journals (Sweden)

    Correia Carlos João

    2009-01-01

    Full Text Available This paper aims to show that the problem of personal identity is a fundamental question of the classical Indian thought. Usually we tend to think that personal identity is a Western philosophical subject, and so we tend to forget the significance of the Self (Atman in Hinduism and even in Buddhism. The author shows how the Indian thought approached the question of personal identity and which was the singular solution outlined in the work consensually attributed to Gotama, the Buddha.

  17. An 'open source' networked identity

    DEFF Research Database (Denmark)

    Larsen, Malene Charlotte

    2013-01-01

    , but also an important part of their self-presentation online. It is discussed why these emotional statements are almost always publically available – or even strategically, intentionally placed on the young people's profiles. In relation to this, it is argued that young people – through their emotional...... communicative actions – are not only performing their own identity, but are becoming co-constructors of each other's identities, which the author characterizes as an 'open source' networked identity....

  18. Developing Professional Identity in an Online Learning Environment

    DEFF Research Database (Denmark)

    Horn, Line Helverskov

    2015-01-01

    identity as the outcome for the intern. This paper describes the interactions in an online learning environment. The online platform sought to enable peer interaction between younger and older students in a discussion of the professional identity of Natural and Cultural Heritage Management (NCHM......From a socio-cultural perspective, the development of a professional identity is an on-going process that is social in nature and negotiated in communities of practice (Wenger, 1998). Internships in higher education function as such communities of practice, with an improved sense of professional...... for designing educational activities with this purpose....

  19. Foreign Managers' Perception on Urban Landscape of Place and Their Cross-cultural Identity: A Case Study in Guangzhou%高星级酒店外籍管理者对广州地方景观的感知与跨文化认同

    Institute of Scientific and Technical Information of China (English)

    蔡晓梅; 朱竑

    2012-01-01

    Globalization is the main characteristic of the contemporary world. Therefore, there come many global cities which attract a host of migrants at home and abroad. On this trend of migrants' flow, the research on transnational migrant's transcultural and translocal phenomenon plays a key role in the studies of the social and cultural geographies. At the same time, in these global cities, how the transnational migrants feel of the city environment seems to be an essential question to both geographers and the authorities. Since the reform and opening up policy was set up, a great deal of foreign capital has been consistently flowing into Chinese market. Whilst, these transforming flows have brought China numerous transnational companies and foreign employees. The high-star hotels are one of the most international companies which attract many international clients, and staff as well. As a result, high-star hotels can be regarded as the typical and representative micro transnational social spaces in urban areas. In these contexts, this article selects a special socio-cultural groups, that is, the foreign managers who are working in high-star hotels, in Guangzhou, a typical global city in China, as its research objects, using semi-structured interviews and cognitive map's drawing to collect data and information, and draws the following conclusions on how they perceive and identify the urban landscape of place though semi-structured interviews. (1) With professional features, foreign managers hold the passive place identity on the host city, and build up the passive assimilated cross-cultural identity modes. (2) The foreign managers perceive the urban landscape on the basis of their self-identity construction, therefore, they hold strong perception on urban landscapes of place which reflect their identities of 'mine', 'others', and 'global persons'. It means that, they hold complicated place identity on their hometown and the host city, and express both the integrated and

  20. The Identity of Students Choosing Marketing Programs

    Directory of Open Access Journals (Sweden)

    Barreto, Idaly

    2009-12-01

    Full Text Available The purpose of this study is to look deeply into the identity of young students interested in training professional in marketing programs in Bogotá, Colombia. This descriptive study was conducted with the application of multidimensional surveys to 262 young people from five universities that offer training in marketing. The results show that there are differences and similarities in the lifestyles of young people who choose to study Marketing. The first, relating mainly to the identities assumed by students of daytime and nighttime that differ in their activities and more income. The second, by the increasing use and development of academic and social activities through the Internet of interest to young people today. It is hoped that these results provide the administrative and academic management of marketing programs that result in better communication and care of students as consumers.

  1. Threading "Stitches" to Approach Gender Identity, Sexual Identity, and Difference

    Science.gov (United States)

    North, Connie E.

    2010-01-01

    As LGBTQI (lesbian, gay, bisexual, transgender, queer/questioning, and intersex) issues become increasingly integrated into multicultural education discourses, we as educators need to examine the implications of our pedagogies for teaching about gender and sexual identities. This article explores my teaching of non-conforming gender identities in…

  2. High School Identity Climate and Student Identity Development

    Science.gov (United States)

    Rich, Yisrael; Schachter, Elli P.

    2012-01-01

    This research investigated whether schools characterized by high school students as being rich in identity promoting features contribute to student identity development. A theoretical model posited that student perceptions of teachers as caring role models and their school as cultivating the whole student will foster student exploration and…

  3. Networked identity: how immigrant youth employ online identity resources

    NARCIS (Netherlands)

    Prinsen, Fleur; de Haan, Mariette; Leander, Kevin

    2015-01-01

    In recent years, practices of online social networking and their implications for migrant youth identity development have been heavily debated. The nature of access to resources for identification is changing, and by using a social network perspective, this research conceptualizes identity as a netw

  4. Social Identity Change: Shifts in Social Identity during Adolescence

    Science.gov (United States)

    Tanti, Chris; Stukas, Arthur A.; Halloran, Michael J.; Foddy, Margaret

    2011-01-01

    This study investigated the proposition that adolescence involves significant shifts in social identity as a function of changes in social context and cognitive style. Using an experimental design, we primed either peer or gender identity with a sample of 380 early- (12-13 years), mid- (15-16 years), and late-adolescents (18-20 years) and then…

  5. Identity Support, Identity Devaluation, and Well-Being among Lesbians

    Science.gov (United States)

    Beals, Kristin P.; Peplau, Letitia Anne

    2005-01-01

    This research tested predictions about the association of identity support and identity devaluation with psychological well-being (self-esteem, life satisfaction, and depression). Lesbian women completed baseline surveys (N=42), then provided daily experience reports during a 2-week period (n=38), and completed a 2-month follow-up survey (n=34).…

  6. Men as Victims: "Victim" Identities, Gay Identities, and Masculinities

    Science.gov (United States)

    Dunn, Peter

    2012-01-01

    The impact and meanings of homophobic violence on gay men's identities are explored with a particular focus on their identities as men and as gay men. Homosexuality can pose a challenge to conventional masculinities, and for some gay men, being victimized on account of sexual orientation reawakens conflicts about their masculinity that they…

  7. Identity Support, Identity Devaluation, and Well-Being among Lesbians

    Science.gov (United States)

    Beals, Kristin P.; Peplau, Letitia Anne

    2005-01-01

    This research tested predictions about the association of identity support and identity devaluation with psychological well-being (self-esteem, life satisfaction, and depression). Lesbian women completed baseline surveys (N=42), then provided daily experience reports during a 2-week period (n=38), and completed a 2-month follow-up survey (n=34).…

  8. PERSONAL IDENTITY IN THE BALANCE BETWEEN WORK AND FAMILY

    Directory of Open Access Journals (Sweden)

    Dora Levterova

    2013-06-01

    Full Text Available This paper discusses current trends in the balance between work and family and the personal identity. Submitted results were obtained from the interviews with 60 people over the age of 18 with the method of depth interview. The results demonstrate that maintaining the personal identity is very important for saving the balance work - family. The personal identity is influenced by age, gender, health and values. In the balance between work and family, the personal identity in the life cycle is shifting from the career in youth and adulthood, to the family in later age stages.Although, for the women the maintaining of the balance work - family is more complicated. Their strong and clear identity with the family is supporting the career development. The family identity is a leading and determining factor of the professional identity. If in the family everything is okay, then in the work place everything is okay. The results will be useful for all who are interested in the issues of the identity - for  psychologists, for managers and for family  members.

  9. Supporting Biracial Children's Identity Development.

    Science.gov (United States)

    Morrison, Johnetta Wade; Bordere, Tashel

    2001-01-01

    Discusses stages of identity development in early childhood, as well as ways teachers can be supportive of that development. Addresses components of identity development in young children, parental preferences, valuing diversity, and curriculum recommendations. Provides suggestions appropriate for children of any racial combination. (SD)

  10. Teacher Investment in Learner Identity

    Science.gov (United States)

    Reeves, Jenelle

    2009-01-01

    From a sociocultural perspective, teacher identity is constructed in relation to others, including other teachers and students. Drawing on positioning theory and the concept of investment, this study analyzed the case of a secondary English teacher who negotiated his teacher identity in relation to English language learners (ELLs). Findings…

  11. Food, Identity, and Environmental Education

    Science.gov (United States)

    Stapleton, Sarah Riggs

    2015-01-01

    While food is an exceedingly rich area for environmental education, I caution environmental educators and researchers from moving too quickly into messaging about what people "should" eat, given the many complexities around food and identity. Eating, as an inherently identity-laden practice, is fraught with complicated meanings,…

  12. Identity development in deaf adolescents

    NARCIS (Netherlands)

    Kunnen, E. Saskia

    2014-01-01

    We studied identity development during 5 years in 11 deaf adolescents who attend a school for deaf children in the highest level of regular secondary education (age between 14 and 19 years). Identity development is conceptualized by the processes of exploration and commitment formation, as

  13. Fibonacci Identities, Matrices, and Graphs

    Science.gov (United States)

    Huang, Danrun

    2005-01-01

    General strategies used to help discover, prove, and generalize identities for Fibonacci numbers are described along with some properties about the determinants of square matrices. A matrix proof for identity (2) that has received immense attention from many branches of mathematics, like linear algebra, dynamical systems, graph theory and others…

  14. Identity development in deaf adolescents

    NARCIS (Netherlands)

    Kunnen, E. Saskia

    2014-01-01

    We studied identity development during 5 years in 11 deaf adolescents who attend a school for deaf children in the highest level of regular secondary education (age between 14 and 19 years). Identity development is conceptualized by the processes of exploration and commitment formation, as formulate

  15. Gender identity development in adolescence.

    Science.gov (United States)

    Steensma, Thomas D; Kreukels, Baudewijntje P C; de Vries, Annelou L C; Cohen-Kettenis, Peggy T

    2013-07-01

    This article is part of a Special Issue "Puberty and Adolescence".This article aims to provide an outline of what is currently known on trajectories, and contributing factors to gender identity development in adolescence. We give a historical overview of the concept of gender identity, and describe general identity development in adolescence, gender identity development in the general population and in gender variant youth. Possible psychosocial (such as child and parental characteristics) and biological factors (such as the effects of prenatal exposure to gonadal hormones and the role of genetics) contributing to a gender variant identity are discussed. Studies focusing on a number of psychosocial and biological factors separately, indicate that each of these factors influence gender identity formation, but little is known about the complex interplay between the factors, nor about the way individuals themselves contribute to the process. Research into normative and gender variant identity development of adolescents is clearly lagging behind. However, studies on persons with gender dysphoria and disorders of sex development, show that the period of adolescence, with its changing social environment and the onset of physical puberty, seems to be crucial for the development of a non-normative gender identity. Copyright © 2013 Elsevier Inc. All rights reserved.

  16. Teacher Investment in Learner Identity

    Science.gov (United States)

    Reeves, Jenelle

    2009-01-01

    From a sociocultural perspective, teacher identity is constructed in relation to others, including other teachers and students. Drawing on positioning theory and the concept of investment, this study analyzed the case of a secondary English teacher who negotiated his teacher identity in relation to English language learners (ELLs). Findings…

  17. National Identity in Korean Curriculum

    Science.gov (United States)

    Kim, Hyojeong

    2004-01-01

    The concept of national identity has evolved during the last half century within the Korean social studies curriculum. There have been seven curricular revisions since the first national curriculum was released in 1955. Each time the concept of national identity was changed with the biggest changes to this concept within the last two iterations of…

  18. Exploring Leader Identity and Development.

    Science.gov (United States)

    Priest, Kerry L; Middleton, Eric

    2016-01-01

    Taking on a leader identity can be a motivating force for pursuing leader development. This chapter explores the reciprocal and recursive nature of identity development and leader development, emphasizing how shifting views of self influence one's motivation to develop as a leader.

  19. Identity Research in Mathematics Education

    Science.gov (United States)

    Darragh, Lisa

    2016-01-01

    This paper examines the literature on identity within mathematics education published in journals over the past two decades. It analyses the theoretical underpinnings, research methods and definitions of identity, providing a critique rather than a summary of the literature. A total of 188 articles from 85 different journals are reviewed in the…

  20. Explanatory Identities and Conceptual Change

    Science.gov (United States)

    Thagard, Paul

    2014-01-01

    Although mind-brain identity remains controversial, many other identities of ordinary things with scientific ones are well established. For example, air is a mixture of gases, water is H[subscript 2]O, and fire is rapid oxidation. This paper examines the history of 15 important identifications: air, blood, cloud, earth, electricity, fire, gold,…

  1. Is Identical Really Identical? An Investigation of Equivalency Theory and Online Learning

    Directory of Open Access Journals (Sweden)

    Rex Moody

    2008-01-01

    Full Text Available This study investigates the validity of equivalency theory among 63 students by comparing two introductory upper-division human resource management courses: one taught online, the other in a traditional classroom. Commonalities included same term, same professor, and identical assignments/tests in the same order, thus allowing a direct comparison of course outcomes. MANCOVA results supported equivalency theory, and further suggest that the online learning pedagogy may be superior in its overall effect on student performance.

  2. Hierarchy of Modular Graph Identities

    CERN Document Server

    D'Hoker, Eric

    2016-01-01

    The low energy expansion of Type II superstring amplitudes at genus one is organized in terms of modular graph functions associated with Feynman graphs of a conformal scalar field on the torus. In earlier work, surprising identities between two-loop graphs at all weights, and between higher-loop graphs of weights four and five were constructed. In the present paper, these results are generalized in two complementary directions. First, all identities at weight six and all dihedral identities at weight seven are obtained and proven. Whenever the Laurent polynomial at the cusp is available, the form of these identities confirms the pattern by which the vanishing of the Laurent polynomial governs the full modular identity. Second, the family of modular graph functions is extended to include all graphs with derivative couplings and worldsheet fermions. These extended families of modular graph functions are shown to obey a hierarchy of inhomogeneous Laplace eigenvalue equations. The eigenvalues are calculated analy...

  3. National Development Generates National Identities

    Science.gov (United States)

    2016-01-01

    The purpose of the article is to test the relationship between national identities and modernisation. We test the hypotheses that not all forms of identity are equally compatible with modernisation as measured by Human Development Index. The less developed societies are characterised by strong ascribed national identities based on birth, territory and religion, but also by strong voluntarist identities based on civic features selected and/or achieved by an individual. While the former decreases with further modernisation, the latter may either decrease or remain at high levels and coexist with instrumental supranational identifications, typical for the most developed countries. The results, which are also confirmed by multilevel regression models, thus demonstrate that increasing modernisation in terms of development contributes to the shifts from classical, especially ascribed, identities towards instrumental identifications. These findings are particularly relevant in the turbulent times increasingly dominated by the hardly predictable effects of the recent mass migrations. PMID:26841050

  4. Unskilled Work and Learner Identity

    DEFF Research Database (Denmark)

    Kondrup, Sissel

    2014-01-01

    . The main argument is that participation research must abandon the notion of motivation as an individual attribute and apply a dialectic concept of learner identity acknowledging work-life as a pivotal space for learning and formation of identity. I outline how a work-life-historical approach combining...... a critical theoretical approach inspired by Salling-Olesen’s and Archer’s concepts of identity and concerns can contribute to an understanding of the relationship between work and learner identity. Through narrative work-life interviews I examine how engagement in unskilled work in small and medium sized...... Danish enterprises causes a multitude of different and ambiguous immediate experiences and concerns pivotal for the workers’ learner identities....

  5. STORYTELLING AND UNIVERSITY BRANDING IDENTITY

    Directory of Open Access Journals (Sweden)

    ANDREEA MONICA STATE

    2016-08-01

    Full Text Available The present article sets out to clarify the concepts of storytelling and branding, with a focus on university branding and visual identity – the latter being a vital element to a brand’s uniqueness. Storytelling is an important method of brand construction, and it entails a strong power of seduction. Branding is increasingly more about storytelling. Practically, a story is an image made up of facts, feelings and interpretations, which are often told to us solely by the university itself. As such, the brand appears on the market accompanied by its identity. Identity is what we aim to express with help of the brand. Implementing a system of visual identity that would help to harmoniously develop a university brand requires a handbook of visual identity. The present article aims to be a starting point for such a handbook serving the University of Bucharest, which currently does not own such a handbook

  6. Ethnic Identities of University Students

    Directory of Open Access Journals (Sweden)

    Gözde Özdikmenli-Demir

    2014-06-01

    Full Text Available The aim of this article is to understand the relationship between ethnic identity, victimization/witnessing community violence, ethnic discrimination, and aggression in a sample of university students living in the South East Region of Turkey. The participants were 263 university students of predominantly Kurdish ethnic origin. The results showed that males had higher levels of ethnic identity in the dimensions of exploration and commitment. Males also presented higher scores for witnessing community violence and lifetime exposure to ethnic discrimination. The most important predictor of participants’ ethnic identity was witnessing community violence. Participants who witnessed violent acts in their social environment had higher ethnic identity levels. Although the predictor variables could not explain an important part of the participants’ aggression levels, only perceived ethnic discrimination was positively related to aggressive behavior. The role of native language efficiency in ethnic identity is also discussed.

  7. Body integrity identity disorder.

    Directory of Open Access Journals (Sweden)

    Rianne M Blom

    Full Text Available INTRODUCTION: Body Integrity Identity Disorder (BIID is a rare, infrequently studied and highly secretive condition in which there is a mismatch between the mental body image and the physical body. Subjects suffering from BIID have an intense desire to amputate a major limb or severe the spinal cord in order to become paralyzed. Aim of the study is to broaden the knowledge of BIID amongst medical professionals, by describing all who deal with BIID. METHODS: Somatic, psychiatric and BIID characteristic data were collected from 54 BIID individuals using a detailed questionnaire. Subsequently, data of different subtypes of BIID (i.e. wish for amputation or paralyzation were evaluated. Finally, disruption in work, social and family life due to BIID in subjects with and without amputation were compared. RESULTS: Based on the subjects' reports we found that BIID has an onset in early childhood. The main rationale given for their desire for body modification is to feel complete or to feel satisfied inside. Somatic and severe psychiatric co-morbidity is unusual, but depressive symptoms and mood disorders can be present, possibly secondary to the enormous distress BIID puts upon a person. Amputation and paralyzation variant do not differ in any clinical variable. Surgery is found helpful in all subjects who underwent amputation and those subjects score significantly lower on a disability scale than BIID subjects without body modification. CONCLUSIONS: The amputation variant and paralyzation variant of BIID are to be considered as one of the same condition. Amputation of the healthy body part appears to result in remission of BIID and an impressive improvement of quality of life. Knowledge of and respect for the desires of BIID individuals are the first steps in providing care and may decrease the huge burden they experience.

  8. Bringing Federated Identity to Grid Computing

    Energy Technology Data Exchange (ETDEWEB)

    Teheran, Jeny [Fermilab

    2016-03-04

    The Fermi National Accelerator Laboratory (FNAL) is facing the challenge of providing scientific data access and grid submission to scientific collaborations that span the globe but are hosted at FNAL. Users in these collaborations are currently required to register as an FNAL user and obtain FNAL credentials to access grid resources to perform their scientific computations. These requirements burden researchers with managing additional authentication credentials, and put additional load on FNAL for managing user identities. Our design integrates the existing InCommon federated identity infrastructure, CILogon Basic CA, and MyProxy with the FNAL grid submission system to provide secure access for users from diverse experiments and collab orations without requiring each user to have authentication credentials from FNAL. The design automates the handling of certificates so users do not need to manage them manually. Although the initial implementation is for FNAL's grid submission system, the design and the core of the implementation are general and could be applied to other distributed computing systems.

  9. Developing a workable teacher identity: Building and negotiating identity within a professional network

    Science.gov (United States)

    Rostock, Roseanne

    The challenge of attracting and retaining the next generation of teachers who are skilled and committed to meeting the growing demands of the profession is of increasing concern to researchers and policy makers, particularly since 45--50% of beginning teachers leave the profession within five years (Ingersoll & Smith, 2003). Reasons for such attrition include compensation, status and working conditions; however, there is growing evidence that a critical factor in new teacher retention hinges on teachers' ability to accomplish the difficult task of forming a workable professional identity in the midst of competing discourses about teaching (Alsup, 2006; Britzman, 2003). There is little research on professional identity development among those beginning teachers at highest risk for attrition (secondary math and science teachers, and those with strong academic backgrounds). This study explores the professional identity development of early-career math and science teachers who are part of the Knowles Science Teaching Foundation's (KSTF) teaching fellowship program, an external support network that aims to address many of the issues leading to high attrition among this particular population of teachers. Using narrative research methods, I examine three case studies of beginning teachers, exploring how they construct professional identity in relation to various discourse communities and negotiate tensions across multiple discourses. The cases identify both dominant discourses and counter-discourses that the teachers draw upon for important identity development resources. They also demonstrate that the way a teacher manages tensions across competing discourses is important to how well one can negotiate a workable professional identity. In particular, they emphasize the importance of engaging in borderland discourses (Gee, 1996) as a way of taking agency in one's own identity development as well as in transforming one's discourse communities. These cases shed light on how

  10. CAH AMPERA: HYBRID IDENTITY OF KAMPUNG YOUTHS IN NEGOTIATING CITIZENSHIP

    Directory of Open Access Journals (Sweden)

    Subando Agus Margono

    2014-06-01

    Full Text Available This article attempts to investigate the negotiating process for citizenship of a group of youths facing entrenched social, cultural, and political exclusion. It examines the phenomenon of citizenship negotiation based on stigmatized position of exluded youths. It was found that despite overwhelming odds, the youths use their hybrid identity, which is a manifestation of cah Ampera identity. They succeed in managing the antagonism and affiliation. The citizenship of cah Ampera ismanaged through symbolic capital and action in village micro politics. Success is reflected in their ability to manage their relations with adults, employment, and their young world.

  11. Persistent, Global Identity for Scientists via ORCID

    CERN Document Server

    Evrard, August E; Holmquist, Jane; Damon, James; Dietrich, Dianne

    2015-01-01

    Scientists have an inherent interest in claiming their contributions to the scholarly record, but the fragmented state of identity management across the landscape of astronomy, physics, and other fields makes highlighting the contributions of any single individual a formidable and often frustratingly complex task. The problem is exacerbated by the expanding variety of academic research products and the growing footprints of large collaborations and interdisciplinary teams. In this essay, we outline the benefits of a unique scholarly identifier with persistent value on a global scale and we review astronomy and physics engagement with the Open Researcher and Contributor iD (ORCID) service as a solution.

  12. Identity and Intimacy during Adolescence: Connections among Identity Styles, Romantic Attachment and Identity Commitment

    Science.gov (United States)

    Kerpelman, Jennifer L.; Pittman, Joe F.; Cadely, Hans Saint-Eloi; Tuggle, Felicia J.; Harrell-Levy, Marinda K.; Adler-Baeder, Francesca M.

    2012-01-01

    Integration of adult attachment and psychosocial development theories suggests that adolescence is a time when capacities for romantic intimacy and identity formation are co-evolving. The current study addressed direct, indirect and moderated associations among identity and romantic attachment constructs with a diverse sample of 2178 middle…

  13. An 'open source' networked identity

    DEFF Research Database (Denmark)

    Larsen, Malene Charlotte

    2016-01-01

    friendship, but also an important part of their self-presentation online. It examines why these emotional statements are almost always publicly available – or even strategically and intentionally placed on the young people’s profiles. In relation to this, it is argued that young people – through...... their emotional communicative actions – are not only staging their own identity, but are co-constructors of each other’s identities, which the author characterises as an “open source”, networked identity....

  14. The challenge of plural identity

    Directory of Open Access Journals (Sweden)

    Jovanović Bojan

    2005-01-01

    Full Text Available The complexity of collective existence is expressed through an awareness of its real identity, which then entails an appropriate attitude towards its own negativity. Within the hierarchically structured identity, different levels of its generality make it possible to consider them as factors of a plural reality. If negativity is raised to consciousness, then its dark side is dismantled. Thus, instead of being a factor of conflict, negativity becomes an element of complementariness and a factor in the construction of a shared identity at a higher level of generality.

  15. Ward Identities for Hall Transport

    CERN Document Server

    Hoyos, Carlos; Oz, Yaron

    2014-01-01

    We derive quantum field theory Ward identities based on linear area preserving and conformal transformations in 2+1 dimensions. The identities relate Hall viscosities, Hall conductivities and the angular momentum. They apply both for relativistic and non relativistic systems, at zero and at finite temperature. We consider systems with or without translation invariance, and introduce an external magnetic field and viscous drag terms. A special case of the identities yields the well known relation between the Hall conductivity and half the angular momentum density.

  16. Gestão Democrática: Abertura para a Acessibilidade do Sujeito de Identidade Surda Múltipla e Multifacetada nas Instituições de Ensino. Democratic Management: Opening accessibility for subject of deaf identity multiple and multi-faceted in the regular education

    Directory of Open Access Journals (Sweden)

    Santos, Sheila Batista Maia

    2010-05-01

    Full Text Available No presente artigo refletimos sobre Gestão Democrática, Projeto Político Pedagógico e Currículo na interface das representações linguísticas e sócio-antropológicas dos Sujeitos de Identidades Surdas Múltiplas e Multifacetadas no processo de inclusão. Para isto foi feito um levantamento bibliográfico com autores que referendam as temáticas: coordenação pedagógica, educação e surdez - na perspectiva das identidades culturais na pós-modernidade -, Lei 10.436/2002 e do Decreto 5626/2005. Assim, as implementações apontadas fundamentam-se nas idiossincrasias destes sujeitos: língua materna - Língua de Sinais -, historicidade, cultura, identidade, pedagogia surda, e Língua Portuguesa como segunda língua.In this article we reflect on Democratic Management, Political Pedagogical Project and Curriculum at the interface representations and socio-anthropological Subjects’ Identity Deaf multiple and multifaceted process of inclusion. To this was done a literature with authors who endorse the following themes: education supervision, education and deafness - from the perspective of cultural identities in post-modernity, of Decree Law 10436/2002 and 5626/2005. Thus, the implementations identified based upon the idiosyncrasies of these subjects: native language - sign language - history, culture, identity, pedagogy deaf, and Portuguese as a second language.

  17. From identity to organisation identity: The evolution of a concept

    Directory of Open Access Journals (Sweden)

    C. L. Van Tonder

    2003-10-01

    Full Text Available The view that corporate and/or organisation identity is a contributing factor to organisational success, is increasingly observed in the media. At the same time research interest in the concept appears to be on the increase. While identity is not a novel concept and has presented in different forms, it remains shrouded in ambiguity and is in need of more precise articulation. The present study revisited the origins of the identity concept and reviewed various perspectives on identity. A specific meaning structure and theoretical framework for the organization identity concept is proposed and it is concluded that contemporary views of identity are increasingly embracing earlier psychological perspectives. Opsomming Die siening dat korporatiewe en/of organisasie-identiteit ’n bydraende faktor tot organisasiesukses is, word toenemend in die media waargeneem. Navorsingsbelangstelling in die konsep skyn terselfdertyd toe te neem. Terwyl identiteit geensins ’n nuwe konsep is nie en in verskillende vorme voorkom, bly dit in vaagheid gehul en word ’n meer duidelike omskrywing daarvan benodig. Die huidige studie het die oorsprong van die indentiteitskonsep nagespeur en verskeie perspektiewe op identiteit in oënskou geneem. ’n Bepaalde betekenisstruktuur en teoretiese raamwerk word vir die identiteitskonsep voorgestel en die gevolgtrekking word gemaak dat kontemporêre sienings van identiteit toenemend besig is om vroeëre psigologiese perspektiewe te omsluit.

  18. Chicana Identity Construction: Pushing the Boundaries

    Science.gov (United States)

    Vera, Helen; De Los Santos, Esmeralda

    2005-01-01

    Identity concepts that Chicana feminists have described as central to their developmental experience are not reflected in the traditional views of identity, feminist accounts of women's identity, or ethnic identity theory. Chicana feminist Gloria Anzaldua initially postulated that in the straddling of two cultures, a hybrid or mestiza identity is…

  19. PRODUCT BRAND IDENTITY – A FACTOR OF SUCCESSFUL MARKET POSITIONING OF A BRAND

    Directory of Open Access Journals (Sweden)

    Branislav Lijović

    2012-12-01

    Full Text Available This paper begins with the term product brand identity as the new market paradigm. It aims to define the term product brand identity and its significance for realisation of the market value of a product’s brand and overall marketing goals of an economic operator. The strategy of economic operator and desired market positioning of a brand is implemented by means of product brand identity and a combination of its elements. Systematic creation and identity management of a product’s brand resulted in the uniqueness of the brand, and set the foundation for building the entire process of product brand management.

  20. (De)stabilizing Self-Identities in Professional Work

    DEFF Research Database (Denmark)

    Buch, Anders; Andersen, Vibeke

    2013-01-01

    is established in a complex work context where various goals, interests, and perspectives are mediated, altered, contested, mangled, and negotiated in a process of sense-making. The work context is heterogeneously populated by various actors (e.g., the customer, the manager, the colleagues) and actants (e...... implications for the way professionals make sense of their work and their own identities. The identity work of professionals is interwoven with their professional training and career background. With an academic training and a professional career, the individual typically identifies with the profession......, the construction of self-identity becomes the yardstick for the individual’s sense-making and, a fortiori, for the individual’s sense of meaningful work. In this paper, we will claim that the ambiguity involved in professional work becomes a potential strain on the identity construction of the employees engaged...

  1. Unhealthy Paradoxes of Healthy Identities

    NARCIS (Netherlands)

    S.J. Magala (Slawomir)

    2003-01-01

    textabstractComparative cross-cultural studies and identity research in social psychology focused on national and organizational differences, clashes and dimensions (Hofstede, Barsoux & Schneider, Jackson, Ward, Bochner & Furnham, Capoza & Brown). Mapping cultural software of individuals and dynamic

  2. Conflicted Pasts and National Identities

    DEFF Research Database (Denmark)

    With reference to current theories of cultural memory, the book explores how memories of war and conflict are passed from generation to generation, how these complex processes have transformed and shaped collective identities, and how they still inform national "conversations"....

  3. Unskilled Work and Learner Identity

    DEFF Research Database (Denmark)

    Kondrup, Sissel

    2014-01-01

    The paper examines how unskilled work forms conditions for meeting the obligation to position oneself as an educable subject and engage in formal learning activities. Sensitivity to peoples’ work-life-experiences is necessary to understand their orientation toward different learning activities....... The main argument is that participation research must abandon the notion of motivation as an individual attribute and apply a dialectic concept of learner identity acknowledging work-life as a pivotal space for learning and formation of identity. I outline how a work-life-historical approach combining...... a critical theoretical approach inspired by Salling-Olesen’s and Archer’s concepts of identity and concerns can contribute to an understanding of the relationship between work and learner identity. Through narrative work-life interviews I examine how engagement in unskilled work in small and medium sized...

  4. Unskilled Work and Learner Identity

    DEFF Research Database (Denmark)

    Kondrup, Sissel

    The paper examines how unskilled work forms conditions for meeting the obligation to position oneself as an educable subject and engage in formal learning activities. Sensitivity to peoples’ work-life-experiences is necessary to understand their orientation toward different learning activities....... The main argument is that participation research must abandon the notion of motivation as an individual attribute and apply a dialectic concept of learner identity acknowledging work-life as a pivotal space for learning and formation of identity. I outline how a work-life-historical approach combining...... a critical theoretical approach inspired by Salling- Olesen’s and Archer’s concepts of identity and concerns can contribute to an understanding of the relationship between work and learner identity. Through narrative work-life interviews I examine how engagement in unskilled work in small and medium sized...

  5. Unskilled Work and Learner Identity

    DEFF Research Database (Denmark)

    Kondrup, Sissel

    a critical theoretical approach inspired by Salling- Olesen’s and Archer’s concepts of identity and concerns can contribute to an understanding of the relationship between work and learner identity. Through narrative work-life interviews I examine how engagement in unskilled work in small and medium sized......The paper examines how unskilled work forms conditions for meeting the obligation to position oneself as an educable subject and engage in formal learning activities. Sensitivity to peoples’ work-life-experiences is necessary to understand their orientation toward different learning activities....... The main argument is that participation research must abandon the notion of motivation as an individual attribute and apply a dialectic concept of learner identity acknowledging work-life as a pivotal space for learning and formation of identity. I outline how a work-life-historical approach combining...

  6. Human Rights and Cultural Identity

    Directory of Open Access Journals (Sweden)

    John-Stewart Gordon

    2015-12-01

    Full Text Available Universal human rights and particular cultural identities, which are relativistic by nature, seem to stand in conflict with each other. It is commonly suggested that the relativistic natures of cultural identities undermine universal human rights and that human rights might compromise particular cultural identities in a globalised world. This article examines this supposed clash and suggests that it is possible to frame a human rights approach in such a way that it becomes the starting point and constraining framework for all non-deficient cultural identities. In other words, it is possible to depict human rights in a culturally sensitive way so that universal human rights can meet the demands of a moderate version of meta-ethical relativism which acknowledges a small universal core of objectively true or false moral statements and avers that, beyond that small core, all other moral statements are neither objectively true nor false.

  7. Ward identity in noncommutative QED

    OpenAIRE

    Mariz, T.; Pires, C. A. de S.; R F Ribeiro

    2002-01-01

    Although noncommutative QED presents a nonabelian structure, it does not present structure constants. In view of this we investigate how Ward identity is satisfied in pair annihilation process and $\\gamma \\gamma \\to \\gamma \\gamma$ scattering in noncommutative QED.

  8. Monetary Organization and National Identity

    DEFF Research Database (Denmark)

    Ravn Sørensen, Anders

    2016-01-01

    This article develops a detailed overview of literature on the relationship between monetary organization, understood as currencies and central banks, and issues of national identity and nationalism. It demonstrates how the literature on this subject for the past 20 years has developed...... identity, (2) an increased focus on central banks and monetary authorities, as well as the historical development in which monetary organization evolved in concert with ideas of the national identity and nationalism....... organization to an emphasis on how collective identities legitimize monetary organization. Based on the literature review, the article points to two underdeveloped themes for future research to investigate: (1) further studies on the interrelation between the legitimacy of monetary organization and national...

  9. Digital Identity - The Legal Person?

    Science.gov (United States)

    Sullivan, Clare

    This paper examines the concept of digital identity which the author asserts is now evident in the United Kingdom as a consequence of the Identity Cards Act (UK) 2006 and the National Identity Scheme it establishes. The nature and functions of the concept, particularly the set of information which constitutes an individual’s transactional identity, are examined. The paper then considers the central question of who, or what, is the legal person in a transaction i.e. who or what enters into legal relations. The analysis presents some intriguing results which were almost certainly not envisaged by the legislature. The implications extend beyond the United Kingdom to similar schemes in other jurisdictions, and to countries, like Australia, which may implement such a scheme.

  10. Children Literature: Shaping Gender Identities

    National Research Council Canada - National Science Library

    IQRA JABEEN; ASAD MEHMOOD

    2014-01-01

    ...; norms of interpretation; and genres. Selected children's stories were analyzed to identify their role as primary thought developing sources in the mind of young learners thus shaping their gender identities...

  11. Science Identity in Informal Education

    Science.gov (United States)

    Schon, Jennifer A.

    The national drive to increase the number of students pursuing Science Technology, Engineering, and Math (STEM) careers has brought science identity into focus for educators, with the need to determine what encourages students to pursue and persist in STEM careers. Science identity, the degree to which students think someone like them could be a scientist is a potential indicator of students pursuing and persisting in STEM related fields. Science identity, as defined by Carlone and Johnson (2007) consists of three constructs: competence, performance, and recognition. Students need to feel like they are good at science, can perform it well, and that others recognize them for these achievements in order to develop a science identity. These constructs can be bolstered by student visitation to informal education centers. Informal education centers, such as outdoor science schools, museums, and various learning centers can have a positive impact on how students view themselves as scientists by exposing them to novel and unique learning opportunities unavailable in their school. Specifically, the University of Idaho's McCall Outdoor Science School (MOSS) focuses on providing K-12 students with the opportunity to learn about science with a place-based, hands-on, inquiry-based curriculum that hopes to foster science identity development. To understand the constructs that lead to science identity formation and the impact the MOSS program has on science identity development, several questions were explored examining how students define the constructs and if the MOSS program impacted how they rate themselves within each construct. A mixed-method research approach was used consisting of focus group interviews with students and pre, post, one-month posttests for visiting students to look at change in science identity over time. Results from confirmatory factor analysis indicate that the instrument created is a good fit for examining science identity and the associated

  12. Corporate Visual Identity Systems origin

    OpenAIRE

    Raposo, D.

    2009-01-01

    Este artigo trata de fazer um pequeno recorrido histórico sobre como a marca se converteu nos sistemas de identidade visual corporativa. Alguns dos principais projectos de identidade ajudam a entender quais as motivações que originaram a necessidade de organização dos sistemas de identidade. Abstract: This paper is a short path about how brands became Corporate Visual Identity Systems. Some of the biggest and emblematic corporate identity projects are helpful to understand which moti...

  13. Theoretical Simulation for Identical Bands

    Institute of Scientific and Technical Information of China (English)

    CHEN Yong-Jing; CHEN Yong-Shou; GAO Zao-Chun

    2004-01-01

    @@ The frequency of occurrence of identical bands is studied by analysing a large number of rotational bands calculated with the reflection asymmetric shell model, and the statistical properties of identical bands indicated in all the experimental observations are reproduced within the mean field approximation and beyond mean field treatment, such as angular momentum projection. The distributions of the calculated J(2), Eγ and the fractional change of J(2) are discussed.

  14. Applications of the lantern identity

    CERN Document Server

    Garoufalidis, S

    1997-01-01

    The purpose of this note is to unify the role of the lantern identity in the proof of several finiteness theorems. In particular, we show that for every nonnegative integer m, the vector space (over the rationals) of type m (resp. T-type m) invariants of integral homology 3-spheres are finite dimensional. These results have already been obtained by [Oh] and [GL2] respectively; our derivation however is simpler, conceptual and relates to several other applications of the lantern identity.

  15. Organisation identity : an exploratory study.

    OpenAIRE

    2012-01-01

    D.Litt. et Phil. Recent studies have found that the life expectancy of organisations is rapidly declining (currently between 40 and 50 years) and that organisational decline and bankruptcy were increasing at disturbing rates. Equally recent contributions in the popular and business press have suggested that the expensive path to corporate failure could be linked to the "identity" or "corporate identity" of the organisation (more specifically the absence thereof). With the exception of the ...

  16. How does Accreditation Influence the Dynamics of Organizational Identity for Business Schools?

    DEFF Research Database (Denmark)

    Lejeune, Christophe; Schultz, Majken; Vas, Alain

    2015-01-01

    Accreditation has become more prominent for business schools since two decades. In this paper, we explore how accreditation influences the internal and external processes of identity dynamics. First, we argue that Hatch & Schultz (2002) framework, social identity theory and the habitual routines...... approach offer a comprehensive theoretical framework. Second, we illustrate it with a European Management School’s accreditation failure and its management of change related to the accreditation goal. We elaborate and discuss a model titled “Identity Change through Accreditation” (ICA). Finally, we suggest...... some implications for managing change during accreditation as well as avenues for research....

  17. Contested identities: Identity constructions in a youth recreational drug culture

    DEFF Research Database (Denmark)

    Ravn, Signe

    2012-01-01

    as responsible drug users. The article studies this recreational drug culture and its internal distinctions, conceptions and norms as they are expressed discursively. The analysis identifies six dimensions of the identity as a responsible, recreational drug user: drug practice, general drug knowledge, context......-specific drug knowledge, practices for checking drugs, acknowledging one’s position in the surrounding drug scene and age. The analysis shows how being able to perform a coherent identity in line with these dimensions is necessary for being acknowledged as a responsible, recreational drug user....

  18. PERSONAL IDENTITY IN DEAF ADOLESCENTS

    Directory of Open Access Journals (Sweden)

    Joanna KOSSEWSKA

    2008-06-01

    Full Text Available The purpose of this study was to investigate the factors influencing the identity deaf adolescents. The study involved 67 deaf adolescents (38 boys and 29 girls aged 16 to 19 students of secondary school. Ninety-three hearing children constituted a comparison group. The structure of identity was explored on the basis of identification references given by the subjects who were to reply in writing, 20 times running, to the question: „Who Am I?” the test, adapted from M. H. Kuhn and T. S. McPartland by Martines and Silvestre (1995 given in written and signed mode.Results showed that the hearing status as well as mode of communication influence the description of personal identity. It was found that deaf adoles­cents used more descriptions especially in the fol­lowing categories: Civil Status, Body and Physical Appearance, Tastes and Activities, Friendship and Relationships, Personal and Social Situation, Negative Personal Traits, and Neutral Personality Traits. Although this study could demonstrate im­pact independent variables on identity, the data raise the need for further, preferably longitudinal, research. This complex phenomenon has to be examined more closely.Combined self-descriptive processes lead to the development of an organized, learned and dynamic identity, and subjective description of an individ­ual has strong emotional consequences for the in­dividual in question.

  19. At the Intersection of Identities

    Directory of Open Access Journals (Sweden)

    Hidasi Judit

    2016-12-01

    Full Text Available It is assumed that part of today’s societal difficulties, uncertainties and crisis worldwide can be attributed to the competing of multiple identities, to their intersections and their overlapping nature – on the level of nations, on the level of communities and also on the level of the individual. We aim at presenting a typology of identities that come into play in the public and in the private domain of the individual. It is hypothesized that there is a strong interdependence of cultural heritage, human values and social traditions in the competition of identities. These questions, which are interrelated and interconnected with each other through a common denominator, namely “cultural-mental programming” and “reprogramming efforts,” are going to be pondered about in the presentation. In the context of globalization the relevance of this topic is reinforced by the need to adapt to changes within the ever-intensifying shift from intercultural to multicultural environment in communities, in business and in work places. Attempts will be made to articulate some projections with respect to future trends that are to be expected: the way to go from competing identities to establishing a competitive identity (Simon Anholt. The contribution does not offer ready solutions but rather serves as fuel for further discussions.

  20. Hierarchy of modular graph identities

    Energy Technology Data Exchange (ETDEWEB)

    D’Hoker, Eric; Kaidi, Justin [Mani L. Bhaumik Institute for Theoretical Physics, Department of Physics and Astronomy,University of California,Los Angeles, CA 90095 (United States)

    2016-11-09

    The low energy expansion of Type II superstring amplitudes at genus one is organized in terms of modular graph functions associated with Feynman graphs of a conformal scalar field on the torus. In earlier work, surprising identities between two-loop graphs at all weights, and between higher-loop graphs of weights four and five were constructed. In the present paper, these results are generalized in two complementary directions. First, all identities at weight six and all dihedral identities at weight seven are obtained and proven. Whenever the Laurent polynomial at the cusp is available, the form of these identities confirms the pattern by which the vanishing of the Laurent polynomial governs the full modular identity. Second, the family of modular graph functions is extended to include all graphs with derivative couplings and worldsheet fermions. These extended families of modular graph functions are shown to obey a hierarchy of inhomogeneous Laplace eigenvalue equations. The eigenvalues are calculated analytically for the simplest infinite sub-families and obtained by Maple for successively more complicated sub-families. The spectrum is shown to consist solely of eigenvalues s(s−1) for positive integers s bounded by the weight, with multiplicities which exhibit rich representation-theoretic patterns.

  1. CORPORATE IDENTITY SEJARAH DAN APLIKASINYA

    Directory of Open Access Journals (Sweden)

    Christine Suharto Cenadi

    1999-01-01

    Full Text Available In the recent globalization era%2C and the developed market%2C many companies compete to attract consumers to buy their products. One of the keys to compete and survive in this developing market is by creating an image and graphic identity. This paper will discuss about corporate identity%2C image%2C its purpose and applications. Abstract in Bahasa Indonesia : Dalam era globalisasi dewasa ini%2C dan dengan berkembangnya pasar (market%2C banyak perusahaan bersaing untuk menarik perhatian konsumen untuk membeli produknya. Salah satu cara untuk bersaing dan dapat bertahan di dalam pasar yang terus berkembang ini adalah dengan menciptakan suatu image dan identitas graphic. Tulisan ini akan membahas tentang corporate identity%2C image%2C fungsi dan aplikasinya

  2. Identity Authentication over Noisy Channels

    Directory of Open Access Journals (Sweden)

    Fanfan Zheng

    2015-07-01

    Full Text Available Identity authentication is the process of verifying users’ validity. Unlike classical key-based authentications, which are built on noiseless channels, this paper introduces a general analysis and design framework for identity authentication over noisy channels. Specifically, the authentication scenarios of single time and multiple times are investigated. For each scenario, the lower bound on the opponent’s success probability is derived, and it is smaller than the classical identity authentication’s. In addition, it can remain the same, even if the secret key is reused. Remarkably, the Cartesian authentication code proves to be helpful for hiding the secret key to maximize the secrecy performance. Finally, we show a potential application of this authentication technique.

  3. Drawing Identity: Beginning Pre-Service Teachers' Professional Identities

    Science.gov (United States)

    Beltman, Susan; Glass, Christine; Dinham, Judith; Chalk, Beryl; Nguyen, Bich

    2015-01-01

    Developing a professional teacher identity can be complex as pre-service teachers engage with a process informed by their previous experiences of teachers and teaching, by learning in their pre-service course, by field placements, and by societal expectations. Using drawing as the method for gathering data, pre-service teachers in an Australian…

  4. Black German identities : validating the multidimensional inventory of black identity

    NARCIS (Netherlands)

    Wandert, T.; Ochsmann, R.; Brug, P.; Chybicka, A.; Lacassagne, M.F.; Verkuyten, M.J.A.M.

    2009-01-01

    This study examines the reliability and validity of a German version of the Multidimensional Inventory of Black Identity (MIBI) in a sample of 170 Black Germans. The internal consistencies of all subscales are at least moderate. The factorial structure of the MIBI, as assessed by principal component

  5. "Doing Identity" in the Botswana Classroom: Negotiating Gendered Institutional Identities

    Science.gov (United States)

    Humphreys, Sara

    2013-01-01

    Drawing on post-structural and post-colonial conceptions of gender, this paper explores multiple student masculinities and femininities in the classrooms of four junior secondary schools in Botswana. These gendered identities, it is argued, are negotiated within broader institutional constraints that have been socio-historically produced. Such…

  6. Bridging Identity Gaps : Supporting Identity Performance in Citizen Service Encounters

    DEFF Research Database (Denmark)

    Borchorst, Nikolaj Gandrup; McPhail, Brenda; Smith, Karen Louise

    2012-01-01

    . Lastly, we turn to a discussion of how the established identity gaps can be addressed through design. Information and communication technologies as well as face-to-face encounters have an important role to play in the building of an interface to government. Here, it is paramount to consider the context...

  7. Identity in Flux: Negotiating Identity While Studying Abroad

    Science.gov (United States)

    Young, Jennifer T.; Natrajan-Tyagi, Rajeswari; Platt, Jason J.

    2015-01-01

    Study abroad is one aspect of global movement that connects individuals of diverse backgrounds. Individuals studying abroad are proffered to negotiate self-identity when they confront novelty and new contexts. This study chose to use the qualitative method of phenomenological interviews to examine how individuals experience themselves and others…

  8. Integrating Identities: Ethnic and Academic Identities among Diverse College Students

    Science.gov (United States)

    Walker, Lovey H. M.; Syed, Moin

    2013-01-01

    Background/Context: Students of Color continue to be underrepresented at the undergraduate level. Recent research has demonstrated the importance of non-academic psychosocial factors for understanding college experiences. One factor, identity, is a broad, multidimensional construct that comprises numerous distinct domains, including political,…

  9. Blended Identities: Identity Work, Equity and Marginalization in Blended Learning

    Science.gov (United States)

    Heikoop, Will

    2013-01-01

    This article is a theoretical study of the self-presentation strategies employed by higher education students online; it examines student identity work via profile information and avatars in a blended learning environment delivered through social networking sites and virtual worlds. It argues that students are faced with difficult choices when…

  10. Saving Face and Group Identity

    DEFF Research Database (Denmark)

    Eriksson, Tor; Mao, Lei; Villeval, Marie-Claire

    2015-01-01

    their self- but also other group members' image. This behavior is frequent even in the absence of group identity. When group identity is more salient, individuals help regardless of whether the least performer is an in-group or an out-group. This suggests that saving others' face is a strong social norm.......Are people willing to sacrifice resources to save one's and others' face? In a laboratory experiment, we study whether individuals forego resources to avoid the public exposure of the least performer in their group. We show that a majority of individuals are willing to pay to preserve not only...

  11. Context-Aware Identity Delegation

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.

    2009-01-01

    In emerging ubiquitous computing, related nomadic users often perform similar tasks and share the same computing infrastructure.This means that security of the shared resources is of prime importance.Frequent delegation of tasks among users must be anticipated as most nomadic environments...... due to its complicated and complex structure. Identity delegation at authentication level provides improved usability, which reduces the risk of circumventing the delegation mechanism; at the same time, however, identity delegation violates the principle of least privileges. We use contextual...

  12. RFID identity theft and countermeasures

    Science.gov (United States)

    Herrigel, Alexander; Zhao, Jian

    2006-02-01

    This paper reviews the ICAO security architecture for biometric passports. An attack enabling RFID identity theft for a later misuse is presented. Specific countermeasures against this attack are described. Furthermore, it is shown that robust high capacity digital watermarking for the embedding and retrieving of binary digital signature data can be applied as an effective mean against RFID identity theft. This approach requires only minimal modifications of the passport manufacturing process and is an enhancement of already proposed solutions. The approach may also be applied in combination with a RFID as a backup solution (damaged RFID chip) to verify with asymmetric cryptographic techniques the authenticity and the integrity of the passport data.

  13. Constructing leadership identities through stories

    DEFF Research Database (Denmark)

    Frimann, Søren; Hersted, Lone

    2016-01-01

    This article analyzes the construction of leadership identities through stories found in four narrative interviews from a qualitative study and leadership development project based on social constructionism and action learning. We argue that leadership development and the construction of leadership...... narrative interviews about their challenges as leaders? In addition, how do these discursive constructions restrict or enable new perspectives, other voices, and the possibilities for learning and change? Our analysis identified traces of both modern and postmodern leadership discourses. We suggest...... that the concept of coauthoring is useful in developing leadership and leadership identities through reflexive dialogs and emerging stories....

  14. Politicized Collective Identity: A Social Psychological Analysis.

    Science.gov (United States)

    Simon, Bernd; Klandermans, Bert

    2001-01-01

    Develops a social psychological model of politicized collective identity that revolves around three conceptual themes (collective identity, the struggle for power, and the wider societal context of that power struggle). Discusses how collective identity has been politicized, showing that politicized collective identity has important consequences…

  15. An Existentialist Account of Identity Formation.

    Science.gov (United States)

    Bilsker, Dan

    1992-01-01

    Gives account of Marcia's identity formation model in language of existentialist philosophy. Examines parallels between ego-identity and existentialist approaches. Describes identity in terms of existentialist concepts of Heidegger and Sartre. Argues that existentialist account of identity formation has benefits of clarification of difficult…

  16. Teacher Identity Work in Mathematics Teacher Education

    Science.gov (United States)

    Neumayer-Depiper, Jill

    2013-01-01

    Becoming a teacher is not developing an identity, but is developing identity as a continuous process of constructing and deconstructing understandings within the complexities of social practice, beliefs, experiences, and social norms. I take up this stance on identity as articulated in Judith Butler's (1999) work with gender identity and…

  17. Teacher Educators' Identity: A Review of Literature

    Science.gov (United States)

    Izadinia, Mahsa

    2014-01-01

    Research suggests that the development of a teacher educator identity is a central process in becoming a teacher educator. Recently, there has been an increasing interest in the concept of teacher identity. However, teacher educator identity seems to be still under-researched. In this article, a review of literature on teacher educator identity is…

  18. A Dialogical Approach to Conceptualizing Teacher Identity

    Science.gov (United States)

    Akkerman, Sanne F.; Meijer, Paulien C.

    2011-01-01

    In recent attempts to address the notion of teacher identity, scholars have stressed how identity is dynamically evolving, intrinsically related to others, and consists of multiple identities. Though these postmodern characterizations represent radically new perceptions of identity, they are not extensively discussed in relation to previous…

  19. Identity and Diversity in Today's World

    Science.gov (United States)

    Gee, James Paul

    2017-01-01

    This paper develops a thesis about identity and diversity. I first look at activity-based identities, identities like being a gardener, birder, citizen scientist or fan-fiction writer. These are freely chosen identities and they are proliferating at a great rate today thanks to participatory culture, the Maker Movement and digital and social…

  20. Teacher Identity Work in Mathematics Teacher Education

    Science.gov (United States)

    Neumayer-Depiper, Jill

    2013-01-01

    Becoming a teacher is not developing an identity, but is developing identity as a continuous process of constructing and deconstructing understandings within the complexities of social practice, beliefs, experiences, and social norms. I take up this stance on identity as articulated in Judith Butler's (1999) work with gender identity and…

  1. Secondary Uses of Personal Identity Information: Policies, Technologies and Regulatory Framework

    DEFF Research Database (Denmark)

    Adjei, Joseph K.; Olesen, Henning

    2012-01-01

    Although personal identity information must primarily be used for protecting and promoting the physical needs of individuals, it has also become central to the business models of the digital age due to its use for other secondary purposes, resulting in various innovative identity management (Id...

  2. An Identity-Based Group Signature with Membership Revocation in the Standard Model

    NARCIS (Netherlands)

    Ibraimi, Luan; Nikova, Svetla; Hartel, Pieter; Jonker, Willem

    2010-01-01

    Group signatures allow group members to sign an arbitrary number of messages on behalf of the group without revealing their identity. Under certain circumstances the group manager holding a tracing key can reveal the identity of the signer from the signature. Practical group signature schemes should

  3. The Scanfin Merger: a Matter of Culture and Identity (Case A)

    DEFF Research Database (Denmark)

    Smith, Pernille; Carugati, Andrea; Giangreco, Antonio

    and middle managers reacted to the merger. The issues in this case are culture and identity. What are the implications when companies from four different countries merge? What role does differing cultures (national or organisational) play in the process and how does this affect the identity of the company...

  4. Identity threat at work: how social identity threat and situational cues contribute to racial and ethnic disparities in the workplace.

    Science.gov (United States)

    Emerson, Katherine T U; Murphy, Mary C

    2014-10-01

    Significant disparities remain between racial and ethnic minorities' and Whites' experiences of American workplaces. Traditional prejudice and discrimination approaches explain these gaps in hiring, promotion, satisfaction, and well-being by pointing to the prejudice of people within organizations such as peers, managers, and executives. Grounded in social identity threat theory, this theoretical review instead argues that particular situational cues-often communicated by well-meaning, largely unprejudiced employees and managers-signal to stigmatized groups whether their identity is threatened and devalued or respected and affirmed. First, we provide an overview of how identity threat shapes the psychological processes of racial and ethnic minorities by heightening vigilance to certain situational cues in the workplace. Next, we outline several of these cues and their role in creating and sustaining perceptions of identity threat (or safety). Finally, we provide empirically grounded suggestions that organizations may use to increase identity safety among their employees of color. Taken together, the research demonstrates how situational cues contribute to disparate psychological experiences for racial and ethnic minorities at work, and suggests that by altering threatening cues, organizations may create more equitable, respectful, and inclusive environments where all people may thrive.

  5. A note on the Jacobi identity

    CERN Document Server

    Lavrov, P M; Tyutin, I V

    2013-01-01

    We present new basic identity for any associative algebra in terms of single commutator and anticommutators. From this identity we derive the set of four identities in terms of double commutators and anticommutators. Two of these four identities are independent. Equipping a given algebra with the basic identity we can prove that the multiplication in this algebra satisfies the associative condition. Extension of obtained results to supercase is found. A new identity for non-degenerate even symplectic (super)manifolds is proposed. Generalization of basic identity for the case of arbitrary number of elements is given.

  6. Group identity and leading-by-example

    OpenAIRE

    Drouvelis, Michalis; Nosenzo, Daniele

    2012-01-01

    We study the interplay between leading-by-example and group identity in a public goods game experiment. A common identity between the leader and her followers is beneficial for cooperation: average contributions are more than 30% higher than in a treatment where no identity was induced. In two further treatments we study the effects of heterogeneous identities. We find no effect on cooperation when only part of the followers share the leader’s identity, or when followers share a common identi...

  7. Identity, Culture and Cosmopolitan Futures

    Science.gov (United States)

    Rizvi, Fazal

    2005-01-01

    This paper examines the policy notion of multiculturalism, and suggests that it is no longer adequate for understanding contemporary forms of interculturality that span across the globe, and are deeply affected by the processes of cultural globalization. Cultural identities can no longer be assumed as static and nation-bound, and are created…

  8. [Identity and narration: autobiographical quests].

    Science.gov (United States)

    Arfuch, Leonor

    2013-01-01

    This paper aims to tackle the subtle relation between autobiographical narratives and identity construction, from a non essentialist conception of identity. In a perspective that articulates philosophy of language, psychoanalysis, semiotics and literary critique, we posit the concept of biographical space as an analytical instrument to make a critical update of the reconfiguration of identities and subjectivities in contemporary culture, marked by the predominance of the biographical, the private and a kind of "public intimacy". This look is more symptomatic than descriptive: it intends to account for the rise of auto/biographical narratives and life-stories, from canonic genres to their multiple derivations in the media, social networks and the most diverse artistic practices, a phenomenon that seems to reaffirm the notion of narrative identities by Ricoeur. Our analysis here, from an ethic, aesthetic and political point of view, will focus on two visual arts experiences that have recently taken place for the first time in Buenos Aires: Christian Boltanski's and Tracey Emin's, solo exhibitions, each of them with a different biographical approach.

  9. Towards a Digital Learner Identity

    NARCIS (Netherlands)

    Berlanga, Adriana; Sloep, Peter

    2011-01-01

    Berlanga, A. J., & Sloep, P. B. (2011). Towards a Digital Learner Identity. In F. Abel, V. Dimitrova, E. Herder, & G. J. Houben (Eds.), Augmenting User Models with Real World Experiences Workshop (AUM). In conjunction with UMAP 2011. July, 15, 2011, Girona, Spain.

  10. Socialization and Ethnic Identity Development.

    Science.gov (United States)

    Weinreich, Peter

    A study of identity development was carried out in Bristol, England, with Asian, West Indian, and indigenous British adolescents. Ethnic and gender differences in patterns of identification conflict with others were found between minority group boys and girls. Both sexes from both minority groups, however, had substantial identification conflicts…

  11. Affirming Identity in Multilingual Classrooms

    Science.gov (United States)

    Cummins, Jim; Bismilla, Vicki; Chow, Patricia; Giampapa, Frances; Cohen, Sarah; Leoni, Lisa; Sandhu, Perminder; Sastri, Padma

    2005-01-01

    The authors argue that in classrooms with students from linguistically diverse backgrounds, instruction should explicitly activate prior knowledge. Teachers have the opportunity to create environments that affirm the identities of English language learners, thereby increasing the confidence with which these students engage in language and literacy…

  12. identical stations and random failures

    Directory of Open Access Journals (Sweden)

    Dennis E. Blumenfeld

    2005-01-01

    line with identical workstations and buffers of equal size. It is a closed-form expression that shows the mathematical relationships between the system parameters, and that can be used to gain basic insight into system behavior at the initial design stage.

  13. Feminist Identity among Latina Adolescents

    Science.gov (United States)

    Manago, Adriana M.; Brown, Christia Spears; Leaper, Campbell

    2009-01-01

    This study explores developing conceptions of feminism among Latina adolescents, their prevalence of feminist endorsement, and whether home environment and well-being are related to feminist identity. One hundred and forty Latina girls (Grades 9 to 12, M age = 15) wrote personal narratives of their understanding of feminism and whether they…

  14. Feminist Identity among Latina Adolescents

    Science.gov (United States)

    Manago, Adriana M.; Brown, Christia Spears; Leaper, Campbell

    2009-01-01

    This study explores developing conceptions of feminism among Latina adolescents, their prevalence of feminist endorsement, and whether home environment and well-being are related to feminist identity. One hundred and forty Latina girls (Grades 9 to 12, M age = 15) wrote personal narratives of their understanding of feminism and whether they…

  15. Trig Integrals without Trig Identities

    Science.gov (United States)

    Sprows, David J.

    2008-01-01

    The standard approach to finding antiderivatives of trigonometric expressions such as sin(ax) cos(bx) is to make use of certain trigonometric identities. The disadvantage of this technique is that it gives no insight into the problem, but relies on students using a memorized formula. This note considers a technique for finding antiderivatives of…

  16. The ambiguous identity of auditing

    DEFF Research Database (Denmark)

    Lindeberg, Tobias

    2007-01-01

    This paper analyses the identity of auditing by comparing performance auditing to financial auditing and programme evaluation. Based on an analysis of textbooks, it is concluded that these evaluative practices are situated on a continuum. This implies that studies that rely on ‘audit’ as a label...

  17. The Roots of Our Identity.

    Science.gov (United States)

    Cotti, Flavio

    1993-01-01

    Maintains that Switzerland's national spirit lies in cultural and linguistic diversity. Proposes a "Ten Commandments of Multilingualism" for Swiss citizens who share this core principle of national identity. Concludes that Swiss should be happy and proud to have a nation based on cultural diversity. (CFR)

  18. Cultivating archives: meanings and identities

    NARCIS (Netherlands)

    E. Ketelaar

    2012-01-01

    By cultivating archives through successive activations, people and communities define their identities. In these activations, the meanings of archives are constructed and reconstructed. Archives are not a static artifact imbued with the record creator’s voice alone, but a dynamic process involving a

  19. Cultural heritage and identity politics

    NARCIS (Netherlands)

    During, R.

    2011-01-01

    ‘As the authors in this fascinating volume point out, both heritage and identity discourse can be instrumentalized, by proponents and opponents of European integration, as they can be commodified, in branding efforts with various implementations. Just as in Macchiavelli’s Europe, political and econo

  20. The Ambiguous Identity of Auditing

    DEFF Research Database (Denmark)

    Lindeberg, Tobias Høygaard

    2007-01-01

    This paper analyses the identity of auditing by comparing performance auditing to financial auditing and programme evaluation. Based on an analysis of textbooks, it is concluded that these evaluative practices are situated on a continuum. This implies that studies that rely on ‘audit’ as a label...

  1. Understanding, Personal Identity and Education

    Science.gov (United States)

    Godon, Rafal

    2004-01-01

    Analysing the triad understanding-personal identity-education in three different contexts (scientism, historicism, hermeneutics) make it possible to investigate the kind of thinking that is emphasised most in each context. The implications of thinking to educational practice are stressed at each level of interpretation. The chief shortfalls in the…

  2. Understanding, Personal Identity and Education

    Science.gov (United States)

    Godon, Rafal

    2004-01-01

    Analysing the triad understanding-personal identity-education in three different contexts (scientism, historicism, hermeneutics) make it possible to investigate the kind of thinking that is emphasised most in each context. The implications of thinking to educational practice are stressed at each level of interpretation. The chief shortfalls in the…

  3. Cultural heritage and identity politics

    NARCIS (Netherlands)

    During, R.

    2011-01-01

    ‘As the authors in this fascinating volume point out, both heritage and identity discourse can be instrumentalized, by proponents and opponents of European integration, as they can be commodified, in branding efforts with various implementations. Just as in Macchiavelli’s Europe, political and

  4. Developing Students' Professional Digital Identity

    Science.gov (United States)

    Cochrane, Thomas; Antonczak, Laurent

    2015-01-01

    In contrast to the myth of the "Digital Native" and the ubiquity of Facebook use, we have found that students' digital identities are predominantly social with their online activity beyond Facebook limited to being social media consumers rather than producers. Within a global economy students need to learn new digital literacy skills to…

  5. Brand: Identity, Image, and Relationships

    Science.gov (United States)

    Danker, Stephanie Harvey

    2014-01-01

    Adolescents face complex dilemmas such as challenging issues of identity and self-concept, and struggles with building and maintaining relationships. These issues must be embraced in the art classroom. This Instructional Resource will focus on the concept of brand--connecting visual art, marketing, and psychology--and center on ideas found in the…

  6. Counselor Identity: Conformity or Distinction?

    Science.gov (United States)

    McLaughlin, Jerry E.; Boettcher, Kathryn

    2009-01-01

    The authors explore 3 debates in other disciplines similar to counseling's identity debate in order to learn about common themes and outcomes. Conformity, distinction, and cohesion emerged as common themes. They conclude that counselors should retain their distinctive, humanistic approach rather than conforming to the dominant, medical approach.

  7. Counselor Identity: Conformity or Distinction?

    Science.gov (United States)

    McLaughlin, Jerry E.; Boettcher, Kathryn

    2009-01-01

    The authors explore 3 debates in other disciplines similar to counseling's identity debate in order to learn about common themes and outcomes. Conformity, distinction, and cohesion emerged as common themes. They conclude that counselors should retain their distinctive, humanistic approach rather than conforming to the dominant, medical approach.

  8. Rethinking Materiality, Memory and Identity

    Directory of Open Access Journals (Sweden)

    Tracy Ireland

    2016-12-01

    Full Text Available This introductory article  considers and questions exactly how materials and people constitute social worlds and relationships which sustain identity and memory and, in turn, the social and political structures or norms that these attachments invest in, stabilise and maintain.

  9. Brand: Identity, Image, and Relationships

    Science.gov (United States)

    Danker, Stephanie Harvey

    2014-01-01

    Adolescents face complex dilemmas such as challenging issues of identity and self-concept, and struggles with building and maintaining relationships. These issues must be embraced in the art classroom. This Instructional Resource will focus on the concept of brand--connecting visual art, marketing, and psychology--and center on ideas found in the…

  10. Virtual Identity and Digital Reading

    OpenAIRE

    Carlos Rodríguez Gordo

    2014-01-01

    This article firstly addresses a terminological clarification of the concepts of "digital identity", "digital reputation" and "digital fingerprint". On the second hand, it tries to think about the overall online activity of the digital subject, understood through the concept of “prosumer”, to lastly focus more specifically in the practical consequences of the progressive digitalization of reading.

  11. An 'open source' networked identity

    DEFF Research Database (Denmark)

    Larsen, Malene Charlotte

    2013-01-01

    This paper examines the concept of identity in relation to youth practices on social network sites (SNS). The paper illustrates how writing “I love you” or other emotional statements on each other’s profiles on SNS is not only a common way for Danish teenagers to communicate and practice friendship...

  12. Extracting entanglement from identical particles.

    Science.gov (United States)

    Killoran, N; Cramer, M; Plenio, M B

    2014-04-18

    Identical particles and entanglement are both fundamental components of quantum mechanics. However, when identical particles are condensed in a single spatial mode, the standard notions of entanglement, based on clearly identifiable subsystems, break down. This has led many to conclude that such systems have limited value for quantum information tasks, compared to distinguishable particle systems. To the contrary, we show that any entanglement formally appearing amongst the identical particles, including entanglement due purely to symmetrization, can be extracted into an entangled state of independent modes, which can then be applied to any task. In fact, the entanglement of the mode system is in one-to-one correspondence with the entanglement between the inaccessible identical particles. This settles the long-standing debate about the resource capabilities of such states, in particular spin-squeezed states of Bose-Einstein condensates, while also revealing a new perspective on how and when entanglement is generated in passive optical networks. Our results thus reveal new fundamental connections between entanglement, squeezing, and indistinguishability.

  13. Cultural Identity in Korean English

    Science.gov (United States)

    Chang, Bok-Myung

    2010-01-01

    This study aims to investigate the cultural identity of Korean English and to make the intercultural communications among non-native speakers successful. The purposes of this study can be summarized as follows: 1) to recognize the concept of English as an International Language (EIL), 2) to emphasize cross-cultural understanding in the globalized…

  14. Identity Over Time: Objectively, Subjectively

    NARCIS (Netherlands)

    van Fraassen, B.C.; Peschard, I.F.

    2008-01-01

    In the philosophy of science, identity over time emerges as a central concern both as an ontological category in the interpretation of physical theories, and as an epistemological problem concerning the conditions of possibility of knowledge. In Reichenbach and subsequent writers on the problem of

  15. Digital photography: communication, identity, memory

    NARCIS (Netherlands)

    van Dijck, J.

    2008-01-01

    Taking photographs seems no longer primarily an act of memory intended to safeguard a family's pictorial heritage, but is increasingly becoming a tool for an individual's identity formation and communication. Digital cameras, cameraphones, photoblogs and other multipurpose devices are used to

  16. Identities for the Fibonacci Powers

    Science.gov (United States)

    Chen, Alex; Chen, Hongwei

    2008-01-01

    Based on the generating functions, for any positive integers "n" and "k", identities are established and the explicit formula for a[subscript i](k) in terms of Fibonomial coefficients are presented. The corresponding results are extended to some other famous sequences including Lucas and Pell sequences.

  17. Unhealthy Paradoxes of Healthy Identities

    OpenAIRE

    Magala, Slawomir

    2003-01-01

    textabstractComparative cross-cultural studies and identity research in social psychology focused on national and organizational differences, clashes and dimensions (Hofstede, Barsoux & Schneider, Jackson, Ward, Bochner & Furnham, Capoza & Brown). Mapping cultural software of individuals and dynamics of small groups was supposed to provide additional managerial knowledge and skills indispensable for global expansion of stable organizational bureaucracies. However, social constructivists and c...

  18. 一种基于集成可信身份识别和访问管理方法的安全可信网络框架%A Trusted Network Framework Based on Integration of Trusted Identity and Access Management Method of Trusted Network Framework

    Institute of Scientific and Technical Information of China (English)

    夏石莹; 谭敏生; 汪琳霞

    2011-01-01

    The trusted network authentication frame and the trusted authentication method based on integration of trusted identity and access management method of trusted network framework are put forward.The framework provides a mechanism of flexible modeling and describing digital user identity.It can support transaction-based privacy protection,personal data acquisition,and a flexible third party accountability mechanism and end-to-end secure communication to complete trusted authentication.%本文提出一种基于集成可信身份识别和访问管理方法的安全可信网络框架,该框架提供了一种灵活建模和描述数字用户身份的机制,同时支持基于事务的隐私保护和个人数据获取,以及灵活的第三方问责机制与端到端的安全交流,从而完成可信认证。

  19. Representing Identity and Equivalence for Scientific Data

    Science.gov (United States)

    Wickett, K. M.; Sacchi, S.; Dubin, D.; Renear, A. H.

    2012-12-01

    Matters of equivalence and identity are central to the stewardship of scientific data. In order to properly prepare for and manage the curation, preservation and sharing of digitally-encoded data, data stewards must be able to characterize and assess the relationships holding between data-carrying digital resources. However, identity-related questions about resources and their information content may not be straightforward to answer: for example, what exactly does it mean to say that two files contain the same data, but in different formats? Information content is frequently distinguished from particular representations, but there is no adequately developed shared understanding of what this really means and how the relationship between content and its representations hold. The Data Concepts group at the Center for Informatics Research in Science and Scholarship (CIRSS), University of Illinois at Urbana Champaign, is developing a logic-based framework of fundamental concepts related to scientific data to support curation and integration. One project goal is to develop precise accounts of information resources carrying the same data. We present two complementary conceptual models for information representation: the Basic Representation Model (BRM) and the Systematic Assertion Model (SAM). We show how these models provide an analytical account of digitally-encoded scientific data and a precise understanding of identity and equivalence. The Basic Representation Model identifies the core entities and relationships involved in representing information carried by digital objects. In BRM, digital objects are symbol structures that express propositional content, and stand in layered encoding relationships. For example, an RDF description may be serialized as either XML or N3, and those expressions in turn may be encoded as either UTF-8 or UTF-16 sequences. Defining this encoding stack reveals distinctions necessary for a precise account of identity and equivalence

  20. Performance through transformation of identity in road cycling

    DEFF Research Database (Denmark)

    Stilling Olesen, Jesper

    In this paper I investigate the relationship between skills and identity of an elite cyclist, who during his career managed to become a big star in the professional peleton. This is Jesper Skibby. The paper is based on a reading of his autobiography "Forstå mig ret." In the book he reproduces his...... career chronologically progressing through a series of identities from an amateur rider, to a team rider and a captain. On the surface and in his own self-understanding these identities and the corresponding competencies belong to the individual. But on closer reading based on actor-network theory......, it turns out that the conception of the self-reliant, performing individual does not hold. In this paper I will argue that the rider achieve his skills through the deletion of personal boundaries and re-assembly with an ever-wider range of actors in the surrounding world. To develop as a rider...