WorldWideScience

Sample records for identity management bioid

  1. Biometrics and Identity Management

    DEFF Research Database (Denmark)

    management. BIOID 2008. The papers are categorized in four classes. These classes represent the 4 working groups of the COST Action 2101. For more information, see http://www.cost2101.org/.   Biometric data quality and multimodal biometric templates, Unsupervised interactive interfaces for multimodal...... security and border control scenarios it is now apparent that the widespread availability of biometrics in everyday life will also spin out an ever increasing number of (private) applications in other domains. Crucial to this vision is the management of the user's identity, which does not only imply...... biometrics, Biometric attacks and countermeasures, Standards and privacy issues for biometrics in identity documents and smart cards. BIOID 2008 is an initiative of the COST Action 2101 on Biometrics for Identity Documents and Smart Cards. It is supported by the EU Framework 7 Programme. Other sponsors...

  2. Federated Identity Management

    OpenAIRE

    Chadwick, David W.

    2009-01-01

    Abstract. This paper addresses the topic of federated identity management. It discusses in detail the following topics: what is digital identity, what is identity management, what is federated identity management, Kim Camerons 7 Laws of Identity, how can we protect the users privacy in a federated environment, levels of assurance, some past and present federated identity management systems, and some current research in FIM.

  3. Mobile Identity Management

    NARCIS (Netherlands)

    Hoepman, J.J.

    2011-01-01

    Identity management consists of the processes and all underlying technologies for the creation, management, and usage of digital identities. Business rely on identity management systems to simplify the management of access rights to their systems and services for both their employees and their

  4. Identity Management

    CERN Document Server

    Pace, A

    2008-01-01

    This paper introduces identity management concepts and discusses various issues associated with its implementation. It will try to highlight technical, legal, and social aspects that must been foreseen when defining the numerous processes that an identity management infrastructure must support. Grid interoperability as well as cross platform interoperability is addressed on the technical aspect, followed by a short discussion on social consequences on user’s privacy when completed traceability is enforced and some examples on how identity management has been implemented at CERN

  5. Identity management

    International Nuclear Information System (INIS)

    Pace, A

    2008-01-01

    This paper introduces identity management concepts and discusses various issues associated with their implementation. It will try to highlight technical, legal, and social aspects that must been foreseen when defining the numerous processes that an identity management infrastructure must support. Grid interoperability as well as cross platform interoperability is addressed on the technical aspect, followed by a short discussion on social consequences on user's privacy when completed traceability is enforced. The paper will finally give some examples on how identity management has been implemented at CERN

  6. Identity management

    Energy Technology Data Exchange (ETDEWEB)

    Pace, A [CERN, Geneva (Switzerland)

    2008-07-01

    This paper introduces identity management concepts and discusses various issues associated with their implementation. It will try to highlight technical, legal, and social aspects that must been foreseen when defining the numerous processes that an identity management infrastructure must support. Grid interoperability as well as cross platform interoperability is addressed on the technical aspect, followed by a short discussion on social consequences on user's privacy when completed traceability is enforced. The paper will finally give some examples on how identity management has been implemented at CERN.

  7. Identity and the Management Project

    DEFF Research Database (Denmark)

    Jørgensen, Kenneth Mølbjerg; Dehlin, Erlend

    The paper discusses the concept of identity in relation to management. We take our starting point in Wittgenstein’s concept language games. We argue that identity is a question of using linguistic tools to construct reality. Two elements of the language game metaphor are central here: rules...... and family resemblance. As such, managing identity in organizations is closely linked to rules and family resemblance. Organizations manage identity through the definition of norms and values for right or wrong, appropriate or inappropriate, to name but a few. Norms and values are important as reference...... points for constructing identities. Managing identity has become more important because the rules-of-the-game have become more unstable. Managing identity is important if the bonds between individuals and organizations are to be sustained. But this task is contradictory and paradoxical of its very nature...

  8. Identity Management

    Data.gov (United States)

    Social Security Administration — Provides information for identity management services on the creation, modification and eventual deletion of accounts and entitlements based on user relationships on...

  9. Identity, Diversity and Diversity Management

    DEFF Research Database (Denmark)

    Holck, Lotte; Muhr, Sara Louise; Villeseche, Florence

    2016-01-01

    – The work can encourage policy makers, diversity and HR managers to question their own practices and assumptions leading to more theoretical informed diversity management practices. Originality/value – The theoretical connections between identity and diversity literature have so far not been reviewed......The purpose of this paper is to examine the relationship between the identity and diversity literatures and discuss how a better understanding of the theoretical connections between the two informs both diversity research and diversity management practices. Design/methodology/approach – Literature...... and limitations – is crucial for successful diversity management research and practice. Research limitations/implications – The authors argue for a better understanding of differences, overlaps and limits of different identity perspectives, and for a stronger engagement with practice. Practical implications...

  10. integrated identity and integrated identity and access management

    African Journals Online (AJOL)

    eobe

    Management System (T-IAMS) is a fingerprint biometric database that centrally manages students' identity, course a fingerprint ... registration, library and medical services information. .... based application and a web-based application.

  11. Responses to professional identity threat: Identity management strategies in incident narratives of health care professionals.

    Science.gov (United States)

    van Os, Annemiek; de Gilder, Dick; van Dyck, Cathy; Groenewegen, Peter

    2015-01-01

    The purpose of this paper is to explore sensemaking of incidents by health care professionals through an analysis of the role of professional identity in narratives of incidents. Using insights from social identity theory, the authors argue that incidents may create a threat of professional identity, and that professionals make use of identity management strategies in response to this identity threat. The paper draws on a qualitative analysis of incident narratives in 14 semi-structured interviews with physicians, nurses, and residents at a Dutch specialist hospital. The authors used an existing framework of identity management strategies to categorize the narratives. The analysis yielded two main results. First, nurses and residents employed multiple types of identity management strategies simultaneously, which points to the possible benefit of combining different strategies. Second, physicians used the strategy of patronization of other professional groups, a specific form of downward comparison. The authors discuss the implications of the findings in terms of the impact of identity management strategies on the perpetuation of hierarchical differences in health care. The authors argue that efforts to manage incident handling may profit from considering social identity processes in sensemaking of incidents. This is the first study that systematically explores how health care professionals use identity management strategies to maintain a positive professional identity in the face of incidents. This study contributes to research on interdisciplinary cooperation in health care.

  12. Exhausting management work: conflicting identities.

    Science.gov (United States)

    Mischenko, Jane

    2005-01-01

    The primary purpose of this paper is to critically explore managers' experience of work identity in the National Health Service (NHS). This paper is unconventional in that it uses an auto-ethnographic approach and poetry as the empirical data from which the conceptual framework evolves. The concepts of identity, power and self are analysed in relation to the narrative utilising a post-structuralist, critical management lens, particularly drawing from Foucault. The paper reflects and critiques the challenges of undertaking auto-ethnography, not least the publication and exposure of a "vulnerable aspect" of the author but also identifies this as a powerful method to explore how one uses narrative to create meaning and constitute oneself, the challenges of such textual representation and the various ways one adapts, resists and survives the challenge of the "multiphrenic" world. The contribution this paper makes is an "outing" of the dynamics of being a manager in the NHS and an opening of a debate on current management discourse and practice. The further value of this paper is the experimentation of critically evaluating an auto-ethnographic approach to researching management identity work.

  13. Playing It Safe: Identity Management and Single Sign-On

    Science.gov (United States)

    Alawneh, John

    2012-01-01

    Whenever thousands of users need to connect seamlessly to a vast number of online resources, identity management (IDM) becomes a critical capability. Although several products on the market can deliver a robust identity management solution, there is no one-size-fits-all. Identity management requires business processes and a supporting…

  14. The Identity Crisis. Security, Privacy and Usability Issues in Identity Management

    NARCIS (Netherlands)

    Alpár, G.; Hoepman, J.H.; Siljee, B.I.J.

    2011-01-01

    This paper studies the current "identity crisis" caused by the substantial security, privacy and usability shortcomings encountered in existing systems for identity management. Some of these issues are well known, while others are much less understood. This paper brings them together in a single,

  15. Identity management and witness protection system

    OpenAIRE

    Paunović, Saša; Starčević, Dušan; Nešić, Lazar

    2013-01-01

    The protection of participants in criminal proceedings is one of the most important tools for prosecution of war crimes and organized crime cases. The paper presents the basic characteristics and the importance of implementing the Program of protection in criminal proceedings, with emphasis on the protection system and management of identity. Special attention was paid to challenges facing the protection system in criminal proceedings and the management of identities, which are caused by the ...

  16. Improving Measurement of Workplace Sexual Identity Management

    Science.gov (United States)

    Lance, Teresa S.; Anderson, Mary Z.; Croteau, James M.

    2010-01-01

    The purpose of this study was to advance measurement of sexual identity management for lesbian, gay, and bisexual workers. Psychometric properties of a revised version of the Workplace Sexual Identity Management Measure (WSIMM; Anderson, Croteau, Chung, & DiStefano, 2001) were examined on a sample of 64 predominantly White K-12 teachers.…

  17. Integrated Identity and Access Management System for Tertiary ...

    African Journals Online (AJOL)

    Nigerian Journal of Technology ... identity management and access control and the unavailability of actionable information on pattern of ... This Tertiary Identity and Access Management System (T-IAMS) is a fingerprint biometric database that ...

  18. Professional identity and role transitions in clinical managers.

    Science.gov (United States)

    Spehar, Ivan; Frich, Jan C; Kjekshus, Lars Erik

    2015-01-01

    The purpose of this paper is to investigate how clinicians' professional background influences their transition into the managerial role and identity as clinical managers. The authors interviewed and observed 30 clinicians in managerial positions in Norwegian hospitals. A central finding was that doctors experienced difficulties in reconciling the role as health professional with the role as manager. They maintained a health professional identity and reported to find meaning and satisfaction from clinical work. Doctors also emphasized clinical work as a way of gaining legitimacy and respect from medical colleagues. Nurses recounted a faster and more positive transition into the manager role, and were more fully engaged in the managerial aspects of the role. The authors advance that health care organizations need to focus on role, identity and need satisfaction when recruiting and developing clinicians to become clinical managers. The study suggests that the inclusion of aspects from identity and need satisfaction literature expands on and enriches the study of clinical managers.

  19. Corporate identity: The concept, its measurement and management

    NARCIS (Netherlands)

    C.B.M. van Riel (Cees); J.M.T. Balmer (John)

    1997-01-01

    textabstractArticulates the main trends in the literature on corporate identity; defines corporate identity; explains the rationale for corporate identity management and describes the main methods used to reveal the desired and the actual corporate identity. Particular reference will be made to two

  20. Organizational Identity and Culture in the Context of Managed Change

    DEFF Research Database (Denmark)

    Hatch, Mary Jo; Schultz, Majken; Skov, Anne-Marie

    2015-01-01

    their organization’s identity led middle managers and employees both to support and resist new organizational identity claims made by top management. Within these identity activation processes we found frequent references relating new identity claims to organizational culture. Further analysis of the data revealed......This article presents top and middle managers’ experiences and understandings of how organizational identity and culture were entangled with transformational change as it unfolded over a 5-year period in Carlsberg Group. Combining ethnography and grounded theory methods with engaged scholarship......, our work sits between research and practice, speaking directly to the experience of managers at the same time that it researches both the content and processes of organizational identity and culture. The study shows that engaging in processes of reflecting, questioning, and debating about...

  1. Profile list: JPST000273 [jPOST repository metadata[Archive

    Lifescience Database Archive (English)

    Full Text Available JPST000273 f_0000496093 no title S0000000509 DIAPH1 interaction partner identifica...tion using BioID. F0000000136 DIAPH1 interaction partner identification using BioID. E0000000130 DIAPH1 interaction... partner identification using BioID. M0000000131 DIAPH1 interaction partner identification using BioID.

  2. Profile list: JPST000273 [jPOST repository metadata[Archive

    Lifescience Database Archive (English)

    Full Text Available JPST000273 f_0000496131 no title S0000000509 DIAPH1 interaction partner identifica...tion using BioID. F0000000136 DIAPH1 interaction partner identification using BioID. E0000000130 DIAPH1 interaction... partner identification using BioID. M0000000131 DIAPH1 interaction partner identification using BioID.

  3. Building an Identity Management Governance Process

    Science.gov (United States)

    Berg, Joanne E.; Kraemer, Ron; Raatz, Carla; Devoti, Steve

    2009-01-01

    A particular challenge in any campus environment is determining how requests for access to services and resources are managed. Who decides the technology, infrastructure, policy, business process and procedure? The involvement of key institutional leaders and stakeholders in identity management governance is the driving force behind the way the…

  4. Role-meanings as a critical factor in understanding doctor managers' identity work and different role identities.

    Science.gov (United States)

    Cascón-Pereira, Rosalía; Chillas, Shiona; Hallier, Jerry

    2016-12-01

    This study examines "identity work" among hybrid doctor-managers (DMs) in the Spanish National Health System to make sense of their managerial roles. In particular, the meanings underlying DMs experience of their hybrid role are investigated using a Grounded Theory methodology, exposing distinctions in role-meanings. Our findings provide evidence that using different social sources of comparison (senior managers or clinicians) to construct the meaning of managerial roles leads to different role-meanings and role identities, which are the source of the two established types of DM in the literature, the reluctant and the enthusiast. The contribution is twofold: our findings lead us to theorize DMs' identity work processes by adding an overlooked role-meaning dimension to identity work; and raise practical reflections for those who wish to develop enthusiast doctor managers. Copyright © 2016 Elsevier Ltd. All rights reserved.

  5. Architectural mismatch issues in identity management deployment

    DEFF Research Database (Denmark)

    Andersen, Mads Schaarup

    2010-01-01

    Integrating Commercial Off-The-Shelf products in a company's software product portfolio offers business value, but introduces challenges from a software architecture perspective. In this paper, the research challenges in relation to identity management in the Danish municipality administration...... system called Opus, are outlined. Opus BRS is the identity management part of Opus. Opus integrates SAP, legacy mainframe systems, and other third party systems of the individual municipality. Each of these systems define their own software architecture and access control model, leading to architectural...... mismatch with an impact on security, usability, and maintainability. The research project is discussed and access control and identity provisioning are recognized as the major areas of interest in relation to the mismatch challenges. The project is carried out in close cooperation with KMD, one...

  6. Digital identity management

    CERN Document Server

    Laurent, Maryline

    2015-01-01

    In the past four decades, information technology has altered chains of value production, distribution, and information access at a significant rate. These changes, although they have shaken up numerous economic models, have so far not radically challenged the bases of our society.This book addresses our current progress and viewpoints on digital identity management in different fields (social networks, cloud computing, Internet of Things (IoT)), with input from experts in computer science, law, economics and sociology. Within this multidisciplinary and scientific context, having crossed analys

  7. Working to reduce the effects of discrimination: Identity management strategies in organizations.

    Science.gov (United States)

    Shih, Margaret; Young, Maia J; Bucher, Amy

    2013-04-01

    Despite efforts to dispel discrimination, workplace discrimination still occurs. We introduce two classes of identity management strategies individuals use to mitigate the negative consequences of discrimination: identity switching (i.e., deemphasizing target identities and recategorizing to a more positively valued identity) and identity redefinition (i.e., stereotype reassociation and regeneration). Organizations adopting a color-blind approach may make it more difficult for individuals to use identity switching because the policies deemphasize differences in social identities. In contrast, organizations adopting a multicultural approach may make it more difficult for individuals to use identity redefinition. Multicultural approaches, applied superficially, may celebrate group differences that might actually reinforce culturally dominant stereotypes. We explore the likelihood that individuals will adopt each strategy given these organizational approaches to diversity. We outline steps organizations can take to reduce the need for identity management strategies and to facilitate identity management when necessary.

  8. Identity management for e-government Libya as a case study

    DEFF Research Database (Denmark)

    Elaswad, Othoman; Jensen, Christian D.

    2016-01-01

    Governments are strengthening their identity (ID) management strategies to deliver new and improved online services to their citizens. Such online services typically include applications for different types of permissions, requests for different types of official documents and management...... of different types of entitlements. The ID management scheme must therefore be able to correctly authenticate citizens and link online presence to real world identities....

  9. A Federated Digital Identity Management Approach for Business Processes

    Science.gov (United States)

    Bertino, Elisa; Ferrini, Rodolfo; Musci, Andrea; Paci, Federica; Steuer, Kevin J.

    Business processes have gained a lot of attention because of the pressing need for integrating existing resources and services to better fulfill customer needs. A key feature of business processes is that they are built from composable services, referred to as component services, that may belong to different domains. In such a context, flexible multi-domain identity management solutions are crucial for increased security and user-convenience. In particular, it is important that during the execution of a business process the component services be able to verify the identity of the client to check that it has the required permissions for accessing the services. To address the problem of multi-domain identity management, we propose a multi-factor identity attribute verification protocol for business processes that assures clients privacy and handles naming heterogeneity.

  10. 6 Keys to Identity Management

    Science.gov (United States)

    Shoham, Idan

    2011-01-01

    An Identity and Access Management (IAM) project on campus can feel like a Sisyphean task: Just when access rights have finally been sorted out, the semester ends--and users change roles, leave campus, or require new processes. IT departments face a constantly changing technical landscape: (1) integrating new applications and retiring old ones; (2)…

  11. Social identity management strategies used by workers with acquired hearing loss.

    Science.gov (United States)

    Jennings, Mary Beth; Southall, Kenneth; Gagné, Jean-Pierre

    2013-01-01

    There is a paucity of knowledge about social identity-management by persons with hearing loss. The objective of the study was to gain an understanding from the perspective of the participants, the ways in which workers with acquired hearing loss manage their identity in the workplace. Twelve persons with acquired hearing loss, who were gainfully employed in a variety of settings and occupations in three Canadian cities, participated in audio-recorded semi-structured interviews. A secondary qualitative analysis was conducted on transcripts of interviews collected in a previous study on factors that influence disclosure of hearing loss in the workplace. A qualitative descriptive research paradigm was adopted and content analyses were used to extract pertinent information from verbatim transcripts. Participants described a range of identity-management strategies enacted in the workplace. Five recurrent themes emerged as important considerations in the Art of Identity Management in the workplace: 1. Managing the situation, 2. Having a buddy system, 3. Feeling comfortable, 4. Using personal resources, 5. It gets easier with time. Social identity-management is a complex process. Although persons with acquired hearing loss experience different challenges from other persons with invisible stigmas, similarities in the range of social identity-management strategies employed were evident in our findings. In addition, the social cognitive learning model of disclosure appears to be relevant to the experiences of our participants. The implications of the findings emphasize the importance of all stakeholders working collaboratively to address the issues of the growing population of workers with hearing loss.

  12. Strengthen Cloud Computing Security with Federal Identity Management Using Hierarchical Identity-Based Cryptography

    Science.gov (United States)

    Yan, Liang; Rong, Chunming; Zhao, Gansen

    More and more companies begin to provide different kinds of cloud computing services for Internet users at the same time these services also bring some security problems. Currently the majority of cloud computing systems provide digital identity for users to access their services, this will bring some inconvenience for a hybrid cloud that includes multiple private clouds and/or public clouds. Today most cloud computing system use asymmetric and traditional public key cryptography to provide data security and mutual authentication. Identity-based cryptography has some attraction characteristics that seem to fit well the requirements of cloud computing. In this paper, by adopting federated identity management together with hierarchical identity-based cryptography (HIBC), not only the key distribution but also the mutual authentication can be simplified in the cloud.

  13. CILogon: An Integrated Identity and Access Management Platform for Science

    Science.gov (United States)

    Basney, J.

    2016-12-01

    When scientists work together, they use web sites and other software to share their ideas and data. To ensure the integrity of their work, these systems require the scientists to log in and verify that they are part of the team working on a particular science problem. Too often, the identity and access verification process is a stumbling block for the scientists. Scientific research projects are forced to invest time and effort into developing and supporting Identity and Access Management (IAM) services, distracting them from the core goals of their research collaboration. CILogon provides an IAM platform that enables scientists to work together to meet their IAM needs more effectively so they can allocate more time and effort to their core mission of scientific research. The CILogon platform enables federated identity management and collaborative organization management. Federated identity management enables researchers to use their home organization identities to access cyberinfrastructure, rather than requiring yet another username and password to log on. Collaborative organization management enables research projects to define user groups for authorization to collaboration platforms (e.g., wikis, mailing lists, and domain applications). CILogon's IAM platform serves the unique needs of research collaborations, namely the need to dynamically form collaboration groups across organizations and countries, sharing access to data, instruments, compute clusters, and other resources to enable scientific discovery. CILogon provides a software-as-a-service platform to ease integration with cyberinfrastructure, while making all software components publicly available under open source licenses to enable re-use. Figure 1 illustrates the components and interfaces of this platform. CILogon has been operational since 2010 and has been used by over 7,000 researchers from more than 170 identity providers to access cyberinfrastructure including Globus, LIGO, Open Science Grid

  14. Walking the tightrope: Constructing gender and professional identities in account management

    NARCIS (Netherlands)

    Gremmen, C.C.M.; Benschop, Y.W.M.

    2009-01-01

    This paper contributes to the growing stream of organization research that explores the relationship between professional identities and gender. Our central question pertains to how account managers ‘do gender’ in constructing their professional identities. While account management has been

  15. A Case for Implementation of Citizen Centric National Identity Management Systems

    DEFF Research Database (Denmark)

    Adjei, Joseph K.

    of trust in transacting parties. Policy makers are therefore trying to implement identity policies to prevent identity abuses, promote the seamless flow of business transactions, and provide citizens the ability to exercise informational self-determination. Previously, the design of identity management...... and exposure, and a high level of literacy. But in developing countries infrastructural challenges, low literacy level, and physical verification of credentials hamper the effective use of identity management systems. This PhD study adapts the DeLone and McLean model of information systems success to the case...

  16. Open source identity management patterns and practices using OpenAM 10.x

    CERN Document Server

    Kenning, Waylon

    2013-01-01

    This is a Packt Mini in a tutorial format that provides multiple examples on Identity Management using OpenAM 10.x.Open Source Identity Management Patterns and Practices Using OpenAM 10.x is great for developers and architects who are new to Identity Management, and who want a brief overview of what's possible and how to quickly implement a prototype. It's assumed that you've had experience with web applications and some knowledge of Apache and Tomcat.

  17. Identity and Access Management and Security in Higher Education.

    Science.gov (United States)

    Bruhn, Mark; Gettes, Michael; West, Ann

    2003-01-01

    Discusses the drivers for an identity management system (IdM), components of this system, and its role within a school security strategy, focusing on: basic access management; requirements for access management; middleware support for an access management system; IdM implementation considerations (e.g., access eligibilities, authentication…

  18. Integrating Identity Management With Federated Healthcare Data Models

    Science.gov (United States)

    Hu, Jun; Peyton, Liam

    In order to manage performance and provide integrated services, health care data needs to be linked and aggregated across data sources from different organizations. The Internet and secure B2B networks offer the possibility of providing near real-time integration. However, there are three major stumbling blocks. One is to standardize and agree upon a common data model across organizations. The second is to match identities between different locations in order to link and aggregate records. The third is to protect identity and ensure compliance with privacy laws. In this paper, we analyze three main approaches to the problem and use a healthcare scenario to illustrate how each one addresses different aspects of the problem while failing to address others. We then present a systematic framework in which the different approaches can be flexibly combined for a more comprehensive approach to integrate identity management with federated healthcare data models.

  19. Strategies for managing impressions of racial identity in the workplace.

    Science.gov (United States)

    Roberts, Laura Morgan; Cha, Sandra E; Kim, Sung Soo

    2014-10-01

    This article deepens understanding of the workplace experiences of racial minorities by investigating racial identity-based impression management (RIM) by Asian American journalists. Racial centrality, directly or indirectly, predicted the use of 4 RIM strategies (avoidance, enhancement, affiliation, and racial humor). Professional centrality also predicted strategy use, which was related to life satisfaction and perceived career success. By shedding light on proactive strategies that individuals use to influence colleagues' impressions of their racial identity, we contribute to research on diversity in organizations, impression management, and racial identity. (PsycINFO Database Record (c) 2014 APA, all rights reserved).

  20. [Meanings attributed to management as an explanation for clinician managers' attitudes and professional identity].

    Science.gov (United States)

    Cascón-Pereira, Rosalía; Valverde, Mireia

    2014-01-01

    To understand the process by which clinician managers construct their professional identities and develop their attitudes toward managing. A qualitative study was performed, based on grounded theory, through in-depth interviews with 20 clinician managers selected through theoretical sampling in two public hospitals of Catalonia (Spain), participant observation, and documentation. Clinician managers' role meanings are constructed by comparing their roles with those of senior managers and clinicians. In this process, clinician managers seek to differentiate themselves from senior managers through the meanings constructed. In particular, they use proximity with reality and clinical knowledge as the main sources of differentiation. This study sheds light on why clinician managers develop adverse attitudes to managing and why they define themselves as clinicians rather than as managers. The explanation lies in the construction of the meanings they assign to managing as the basis of their attitudes to this role and professional identity. These findings have some practical implications for healthcare management. Copyright © 2014. Published by Elsevier Espana.

  1. Identity Management A Primer

    CERN Document Server

    Sharoni, Ilan; Williamson, Graham; Yip, David

    2009-01-01

    In an age in which the boundaries between the real and the virtual are becoming increasingly blurred, this timely guide teaches both the key issues of identity management as well as appropriate strategies and preventative measures for ensuring personal safety in the virtual world. In a corporate setting, it is essential to identify and control the way in which the organization deals with customers, suppliers, employees, and other users who may interact with the information systems of the company. Providing strategies for overcoming this task in real-world terms as well as questions that assist

  2. Developing an Assessment of Sexual Identity Management for Lesbian and Gay Workers.

    Science.gov (United States)

    Anderson, Mary Z.; Croteau, James M.; DiStefano, Teresa M.; Chung, Y. Barry

    2001-01-01

    Psychometric properties of the Workplace Sexual Identity Management Measure were tested with 172 professionals. Results suggest it successfully assesses a continuum of lesbian and gay identity management strategies (passing, covering, implicitly out, explicitly out). (Contains 27 references.) (SK)

  3. Leadership as social identity management: Introducing the Identity Leadership Inventory (ILI) to assess and validate a four-dimensional model

    OpenAIRE

    Steffens, Niklas K.; Haslam, S. Alexander; Reicher, Stephen D.; Platow, Michael J.; Fransen, Katrien; Yang, Jie; Ryan, Michelle K.; Jetten, Jolanda; Peters, Kim O.; Boen, Filip

    2014-01-01

    Although nearly two decades of research has provided support for the social identity approach to leadership, most previous work has focused on leaders’ identity prototypicality while neglecting the assessment of other equally important dimensions of social identity management. However, recent theoretical developments have argued that in order to mobilize and direct followers’ energies, leaders need not only to ‘be one of us’ (identity prototypicality), but also to ‘do it for us’ (identity adv...

  4. British-Pakistani women's perspectives of diabetes self-management: the role of identity.

    Science.gov (United States)

    Majeed-Ariss, Rabiya; Jackson, Cath; Knapp, Peter; Cheater, Francine M

    2015-09-01

    To explore the effects of type 2 diabetes on British-Pakistani women's identity and its relationship with self-management. Type 2 diabetes is more prevalent and has worse outcomes among some ethnic minority groups. This may be due to poorer self-management and an inadequate match of health services to patient needs. The influence that type 2 diabetes has on British-Pakistani women's identity and subsequent self-management has received limited attention. An explorative qualitative study. Face-to-face semi-structured English and Urdu language interviews were conducted with a purposively selected heterogeneous sample of 15 British-Pakistani women with type 2 diabetes. Transcripts were analysed thematically. Four themes emerged: Perceived change in self emphasised how British-Pakistani women underwent a conscious adaptation of identity following diagnosis; Familiarity with ill health reflected women's adjustment to their changed identity over time; Diagnosis improves social support enabled women to accept changes within themselves and Supporting family is a barrier to self-management demonstrated how family roles were an aspect of women's identities that was resilient to change. The over-arching theme Role re-alignment enables successful self-management encapsulated how self-management was a continuous process where achievements needed to be sustained. Inter-generational differences were also noted: first generation women talked about challenges associated with ageing and co-morbidities; second generation women talked about familial and work roles competing with self-management. The complex nature of British-Pakistani women's self-identification requires consideration when planning and delivering healthcare. Culturally competent practice should recognise how generational status influences self-identity and diabetes self-management in ethnically diverse women. Health professionals should remain mindful of effective self-management occurring alongside, and being

  5. Does identity shape leadership and management practice? Experiences of PHC facility managers in Cape Town, South Africa

    Science.gov (United States)

    Daire, Judith; Gilson, Lucy

    2014-01-01

    In South Africa, as elsewhere, Primary Health Care (PHC) facilities are managed by professional nurses. Little is known about the dimensions and challenges of their job, or what influences their managerial practice. Drawing on leadership and organizational theory, this study explored what the job of being a PHC manager entails, and what factors influence their managerial practice. We specifically considered whether the appointment of professional nurses as facility managers leads to an identity transition, from nurse to manager. The overall intention was to generate ideas about how to support leadership development among PHC facility managers. Adopting case study methodology, the primary researcher facilitated in-depth discussions (about their personal history and managerial experiences) with eight participating facility managers from one geographical area. Other data were collected through in-depth interviews with key informants, document review and researcher field notes/journaling. Analysis involved data triangulation, respondent and peer review and cross-case analysis. The experiences show that the PHC facility manager’s job is dominated by a range of tasks and procedures focused on clinical service management, but is expected to encompass action to address the population and public health needs of the surrounding community. Managing with and through others, and in a complex system, requiring self-management, are critical aspects of the job. A range of personal, professional and contextual factors influence managerial practice, including professional identity. The current largely facility-focused management practice reflects the strong nursing identity of managers and broader organizational influences. However, three of the eight managers appear to self-identify an emerging leadership identity and demonstrate related managerial practices. Nonetheless, there is currently limited support for an identity transition towards leadership in this context. Better

  6. Working to Reduce the Effects of Discrimination: Identity Management Strategies in Organizations

    Science.gov (United States)

    Shih, Margaret; Young, Maia J.; Bucher, Amy

    2013-01-01

    Despite efforts to dispel discrimination, workplace discrimination still occurs. We introduce two classes of identity management strategies individuals use to mitigate the negative consequences of discrimination: identity switching (i.e., deemphasizing target identities and recategorizing to a more positively valued identity) and identity…

  7. Biometric identity management for standard mobile medical networks.

    Science.gov (United States)

    Egner, Alexandru; Soceanu, Alexandru; Moldoveanu, Florica

    2012-01-01

    The explosion of healthcare costs over the last decade has prompted the ICT industry to respond with solutions for reducing costs while improving healthcare quality. The ISO/IEEE 11073 family of standards recently released is the first step towards interoperability of mobile medical devices used in patient environments. The standards do not, however, tackle security problems, such as identity management, or the secure exchange of medical data. This paper proposes an enhancement of the ISO/IEEE 11073-20601 protocol with an identity management system based on biometry. The paper describes a novel biometric-based authentication process, together with the biometric key generation algorithm. The proposed extension of the ISO/IEEE 11073-20601 is also presented.

  8. Corporate visual identity management: current practices, impact, and assessment

    NARCIS (Netherlands)

    van den Bosch, A.L.M.

    2005-01-01

    This dissertation is about Corporate Visual Identity (CVI) management. Its purpose is to gain more insight into activities associated with managing CVI and the impact of these activities on the outcome: the degree of consistency in CVI.

  9. Managing corporate identity: an integrative framework of dimensions and determinants

    NARCIS (Netherlands)

    Cornelissen, Joep; Elving, Wim

    2003-01-01

    Although there has been an enduring interest in corporate identity and image management, there is relatively little systematic empirical research on the topic. Large due to the diffuse interpretations, and dubious denotation that have characterized the subject of corporate identity so far, the

  10. The Formation of Professional Identity in French "Apprenti" Managers

    Science.gov (United States)

    Angot, Jacques; Malloch, Hedley; Kleymann, Birgit

    2008-01-01

    Purpose: The paper aims to show how professional identity is constructed at a very early stage of initial management education. In so doing, it questions the notion of "le metier" in management. Design/methodology/approach: The paper is based on a study of the experiences of six French management apprentices (or apprentis) who…

  11. Does identity shape leadership and management practice? Experiences of PHC facility managers in Cape Town, South Africa.

    Science.gov (United States)

    Daire, Judith; Gilson, Lucy

    2014-09-01

    In South Africa, as elsewhere, Primary Health Care (PHC) facilities are managed by professional nurses. Little is known about the dimensions and challenges of their job, or what influences their managerial practice. Drawing on leadership and organizational theory, this study explored what the job of being a PHC manager entails, and what factors influence their managerial practice. We specifically considered whether the appointment of professional nurses as facility managers leads to an identity transition, from nurse to manager. The overall intention was to generate ideas about how to support leadership development among PHC facility managers. Adopting case study methodology, the primary researcher facilitated in-depth discussions (about their personal history and managerial experiences) with eight participating facility managers from one geographical area. Other data were collected through in-depth interviews with key informants, document review and researcher field notes/journaling. Analysis involved data triangulation, respondent and peer review and cross-case analysis. The experiences show that the PHC facility manager's job is dominated by a range of tasks and procedures focused on clinical service management, but is expected to encompass action to address the population and public health needs of the surrounding community. Managing with and through others, and in a complex system, requiring self-management, are critical aspects of the job. A range of personal, professional and contextual factors influence managerial practice, including professional identity. The current largely facility-focused management practice reflects the strong nursing identity of managers and broader organizational influences. However, three of the eight managers appear to self-identify an emerging leadership identity and demonstrate related managerial practices. Nonetheless, there is currently limited support for an identity transition towards leadership in this context. Better

  12. Conversations outside the Comfort Zone: Identity Formation in SME Manager Action Learning

    Science.gov (United States)

    Anderson, Lisa; Gold, Jeff

    2009-01-01

    In this paper we consider the construction of narrative identity and particularly how managers of small businesses may construct new narrative identities within the activity of the action learning situation. We build on recent work to suggest that the "world" of managers can be explored through a consideration of Vygotsky's socio-cultural theory…

  13. A Contextual Model for Identity Management (IdM) Interfaces

    Science.gov (United States)

    Fuller, Nathaniel J.

    2014-01-01

    The usability of Identity Management (IdM) systems is highly dependent upon design that simplifies the processes of identification, authentication, and authorization. Recent findings reveal two critical problems that degrade IdM usability: (1) unfeasible techniques for managing various digital identifiers, and (2) ambiguous security interfaces.…

  14. Covering your face on Facebook.Managing identity through untagging and deletion

    OpenAIRE

    Strano, Michele; Wattei, Jill

    2010-01-01

    This paper describes the ways in which Facebook users manage their online identities through untagging and deleting photos to make sure images are interpreted in a desirable way. Using data collected from an online survey and thirty in-depth interviews with American adult Facebook users, the authors argue that identity management can best be understood as the combination of constructive and destructive practices through which users control not only their self-presentation (p...

  15. Research Management in Portugal: A Quest for Professional Identity

    Science.gov (United States)

    Trindade, Margarida; Agostinho, Marta

    2014-01-01

    Research managers at science-intensive institutions appear as a continuously evolving group of professionals whose identity is somewhat fragmented, even to themselves. In Portugal, specialized research manager roles have rapidly emerged over the last years alongside the development of a small but consolidated scientific system. In order to get an…

  16. The role of the collaboratory in enabling large-scale identity management for HEP

    International Nuclear Information System (INIS)

    Cowles, Robert; Jackson, Craig; Welch, Von

    2014-01-01

    The authors are defining a model that describes and guides existing and future scientific collaboratory identity management implementations. Our ultimate goal is to provide guidance to virtual organizations and resource providers in designing an identity management implementation. Our model is captured in previously published work. Here, we substantially extend our analysis in terms of six motivation factors (user isolation, persistence of user data, complexity of virtual organization roles, cultural and historical inertia, scaling, and incentive for collaboration), observed in interviews with community members involved in identity management, that impact implementation decisions. This analysis is a significant step towards our ultimate goal of providing guidance to virtual organizations.

  17. Federated Identity Management for Research Collaborations

    CERN Document Server

    Broeder, Daan; Kelsey, David; Kershaw, Philip; Lüders, Stefan; Lyall, Andrew; Nyrönen, Tommi; Wartel, Romain; Weyer, Heinz J

    2012-01-01

    Federated identity management (FIM) is an arrangement that can be made among multiple organisations that lets subscribers use the same identification data to obtain access to the secured resources of all organisations in the group. Identity federation offers economic advantages, as well as convenience, to organisations and their users. For example, multiple institutions can share a single application, with resultant cost savings and consolidation of resources. In order for FIM to be effective, the partners must have a sense of mutual trust. A number of laboratories including national and regional research organizations are facing the challenge of a deluge of scientific data that needs to be accessed by expanding user bases in dynamic collaborations that cross organisational and national boundaries. Driven by these needs, representatives from a variety of research communities, including photon/neutron facilities, social science & humanities, high-energy physics, atmospheric science, bioinformatics and fusi...

  18. Object Classification based Context Management for Identity Management in Internet of Things

    DEFF Research Database (Denmark)

    Mahalle, Parikshit N.; Prasad, Neeli R.; Prasad, Ramjee

    2013-01-01

    As computing technology is becoming more tightly coupled into dynamic and mobile world of the Internet of Things (IoT), security mechanism is more stringent, flexible and less intrusive. Scalability issue in IoT makes identity management (IdM) of ubiquitous objects more challenging, and there is ......As computing technology is becoming more tightly coupled into dynamic and mobile world of the Internet of Things (IoT), security mechanism is more stringent, flexible and less intrusive. Scalability issue in IoT makes identity management (IdM) of ubiquitous objects more challenging......, and there is a need of context-aware access control solution for IdM. Confronting uncertainty of different types of objects in IoT is not easy. This paper presents the logical framework for object classification in context aware IoT, as richer contextual information creates an impact on the access control. This paper...

  19. The Effects of Virtual Communities on Group Identity in Classroom Management

    Science.gov (United States)

    Ho, Tu-Kuang; Lin, Yu-Tzeng

    2016-01-01

    Group identity is a critical component in developing effective classroom management. While there have been numerous studies on group identity, they have primarily focused on its effects on the physical classroom entity. Advances in information technology, however, have enabled the creation of virtual communities, which have become a vital channel…

  20. Adaptation of the Utrecht-Management of Identity Commitments Scale (U-MICS) to the measurement of the parental identity domain.

    Science.gov (United States)

    Piotrowski, Konrad

    2018-04-01

    The present studies examined the psychometric properties of the Utrecht-Management of Identity Commitments Scale (U-MICS) adapted to the measurement of identity formation in the parental identity domain. As the parental identity domain has only been studied within the neo-Eriksonian approach to a very limited extent, the aim of these studies was to prepare a short, valid and reliable tool for the measurement of parental identity in order to fill this gap. The associations of commitment, in-depth exploration and reconsideration of commitment in the parental domain with well-being and with other identity constructs were analyzed. The results showed that parental identity formation is associated with mothers' satisfaction with life and trait anxiety and with identity formation in other areas as well. The initial results suggest that the adapted version of the U-MICS is a valid and reliable measure that can be used in future studies on parental identity formation. © 2017 The Author. Scandinavian Journal of Psychology published by Scandinavian Psychological Associations and John Wiley & Sons Ltd.

  1. Managing corporate visual identity : exploring the differences between manufacturing and service, and profit-making and nonprofit organizations

    NARCIS (Netherlands)

    van den Bosch, Annette; de Jong, Menno; Elving, Wim

    2006-01-01

    Corporate Visual Identity (CVI) is a crucial part of the identity of any organization. Most research on managing corporate identity deals with the strategic development of corporate identity and the design and effects of specific elements of the CVI. This study focuses on an aspect of CVI management

  2. Qualitative Study on the Identity of the Manager in Romania

    Directory of Open Access Journals (Sweden)

    FLORENTINA SCÂRNECI

    2011-01-01

    Full Text Available The article presents the results of a qualitative research project carried out in 2008, which aimed at identifying the identity condition of managers in Romania. The article presents part of the grounded theory on the identity of managers: the day to day circumstances in which they live - issues related to childhood and maturity (material situation, relationships, family, etc.. Also, it describes in brief the methodology applied: qualitative collection of data, theoretical sampling, theoretical saturation and the analysis of qualitative data obtained.The article presents, also in brief, the larger research framework wherefrom the presented part was extracted. The conclusion is that there are life-related issues specific to managers (and, more precisely, specific reactions to the environment and that their identification can form the basis for designing methods of managerial diagnosis and prognosis.

  3. Campus Single Sign-On und hochschulübergreifendes Identity Management

    Science.gov (United States)

    Hommel, Wolfgang

    Das im Rahmen von IntegraTUM für die TUM geschaffene Identity & Access Management System setzt das Paradigma unified login um, d. h. ein Benutzer kann alle für ihn relevanten Dienste innerhalb der Hochschule mit derselben Loginname-/Passwortkombination nutzen. Dieser Artikel zeigt, wie auf Basis der Software Shibboleth und der deutschlandweiten Hochschulföderation DFN-AAI als weitere Mehrwerte das campusweite web single sign-on und die nahtlose Nutzung zahlreicher externer Web-Anwendungen erreicht werden. Als Beispiel für die Abläufe bei der Erschließung neuer Dienste für die hochschulübergreifende Nutzung wird die Anbindung von Learning Management Systemen auf Basis des DFN-AAI E-Learning-Profils diskutiert. Den umfassenden Vorteilen werden schließlich die aktuellen technischen Grenzen bei der Umsetzung des hochschulübergreifenden Identity Management gegenübergestellt.

  4. Identity management strategies among HIV-positive Colombian gay men in London.

    Science.gov (United States)

    Jaspal, Rusi; Williamson, Iain

    2017-12-01

    This study set out to explore the social-psychological aspects of living with HIV among a group of HIV-positive Colombian gay men in London, and the strategies that they deployed to manage ensuing threats to their identities. Focus group and individual interview data were collected from 14 Colombian gay men living with HIV, and were analysed using qualitative thematic analysis and identity process theory. The following themes are discussed: (1) identity struggles and conflicts in Colombia, (2), managing multiple layers of social stigma in England, and (3) changing interpersonal and intergroup dynamics, which highlight the inter-connections between sexual prejudice, sexual risk-taking and HIV stigma. Identity may be chronically threatened due to the multiple layers of stigma, which can limit the coping strategies available to individuals. Findings strongly support the need for action and programmes to highlight and tackle both racism and HIV stigma on the gay scene and to fund more specific resources for sub-communities of gay, bisexual and other men who have sex with men, which employ appropriately trained and culturally competent staff.

  5. The importance of corporate brand identity in business management: An application to the UK banking sector

    Directory of Open Access Journals (Sweden)

    Isabel Buil

    2016-01-01

    Full Text Available Corporate brand identity management is a key issue for any organisation. Accordingly, its study is a research field of great interest. This paper seeks to broaden the understanding of this strategic activity and its effects. Specifically, it investigates the concept of corporate brand identity from the employees’ perspective in the UK financial banking sector and analyses the link between brand identity management and employees’ attitudes and behaviours. Results indicate that organisations should pay special attention to the corporate brand identity management, given its influence on employees’ commitment with their organisations, as well as their brand performance and satisfaction.

  6. Dialogue, Language and Identity: Critical Issues for Networked Management Learning

    Science.gov (United States)

    Ferreday, Debra; Hodgson, Vivien; Jones, Chris

    2006-01-01

    This paper draws on the work of Mikhail Bakhtin and Norman Fairclough to show how dialogue is central to the construction of identity in networked management learning. The paper is based on a case study of a networked management learning course in higher education and attempts to illustrate how participants negotiate issues of difference,…

  7. The identity management practices of beauty-bloggers: a multimodal approach to the deprofessionalization’s analysis

    OpenAIRE

    Martyanova Natalia Alexandrovna; Rubtcova Maria Vladimirovna

    2015-01-01

    The article analyses the identity management practices of beauty-bloggers who on YouTube. The authors relies on the theory of deprofessionalization and show how bloggers gain the symbolic power and authority, which professionals previously had. Exploring the forms and methods of Internet communication the authors reveal the latent common identity management practices questioning the authority of professionals, and creating new managed space.

  8. A Reputation-Based Identity Management Model for Cloud Computing

    Directory of Open Access Journals (Sweden)

    Lifa Wu

    2015-01-01

    Full Text Available In the field of cloud computing, most research on identity management has concentrated on protecting user data. However, users typically leave a trail when they access cloud services, and the resulting user traceability can potentially lead to the leakage of sensitive user information. Meanwhile, malicious users can do harm to cloud providers through the use of pseudonyms. To solve these problems, we introduce a reputation mechanism and design a reputation-based identity management model for cloud computing. In the model, pseudonyms are generated based on a reputation signature so as to guarantee the untraceability of pseudonyms, and a mechanism that calculates user reputation is proposed, which helps cloud service providers to identify malicious users. Analysis verifies that the model can ensure that users access cloud services anonymously and that cloud providers assess the credibility of users effectively without violating user privacy.

  9. "Managing identities" and parental disclosure of HIV sero-status in Zimbabwe.

    Science.gov (United States)

    Muparamoto, Nelson; Chiweshe, Manase Kudzai

    2015-01-01

    Drawing from a small sample of HIV infected respondents, this paper examines parents' perceptions on the decision to disclose or not to disclose their HIV sero-status to their children. It explores how parents control the information in the interactional ritual with their children. The paper uses Goffman's concept of dramaturgy to analyse how parents manage and control disclosure within a context where HIV and AIDS is associated with stigma. Disclosure is a strategic encounter in which the interactants (parents) manage to create a desired identity or spoil an identity. Qualitative research incorporating focus group discussions and in-depth interviews was used to examine the perceptions of parents who are HIV positive on disclosure of their status to their children. Such a methodological approach allows for a nuanced understanding of the context in which decision to disclose status happens. The study findings show that in a social context involving parents and children as actors there are complex expectations which affect parental disclosure of HIV sero-status to their children. The desire to manage an expected identity militated or enabled disclosure in a parental relationship.

  10. A framework for implementation of user-centric identity management systems

    DEFF Research Database (Denmark)

    Adjei, Joseph K.; Olesen, Henning

    2010-01-01

    Users increasingly become part of electronic transactions, which take place instantaneously without direct user involvement. This leads to the risk of data manipulation, identity theft and privacy violation, and it has become a major concern for individuals and businesses around the world. Gov......-ernments in many countries are implementing identity man-agement systems (IdMS) to curtail these incidences and to offer citizens the power to exercise informational self-determination. Using concepts from technology adoption and fit-viability theo-ries as well as the laws of identity, this paper analyzes...... the crite-ria for successful implementation and defines a framework for a citizen-centric national IdMS. Results from a survey con-ducted in Ghana are also included....

  11. Identity management and privacy languages technologies: Improving user control of data privacy

    Science.gov (United States)

    García, José Enrique López; García, Carlos Alberto Gil; Pacheco, Álvaro Armenteros; Organero, Pedro Luis Muñoz

    The identity management solutions have the capability to bring confidence to internet services, but this confidence could be improved if user has more control over the privacy policy of its attributes. Privacy languages could help to this task due to its capability to define privacy policies for data in a very flexible way. So, an integration problem arises: making work together both identity management and privacy languages. Despite several proposals for accomplishing this have already been defined, this paper suggests some topics and improvements that could be considered.

  12. The identity management practices of beauty-bloggers: a multimodal approach to the deprofessionalization’s analysis

    Directory of Open Access Journals (Sweden)

    Martyanova Natalia Alexandrovna

    2015-04-01

    Full Text Available The article analyses the identity management practices of beauty-bloggers who on YouTube. The authors relies on the theory of deprofessionalization and show how bloggers gain the symbolic power and authority, which professionals previously had. Exploring the forms and methods of Internet communication the authors reveal the latent common identity management practices questioning the authority of professionals, and creating new managed space.

  13. Managing corporate identities of non-profit organisations in the social welfare sector

    Directory of Open Access Journals (Sweden)

    Lida Holtzhausen

    2013-03-01

    Full Text Available Present-day South Africa is characterised by many societal and developmental issues, such as HIV awareness and prevention, child-headed households, environmental protection, poverty alleviation, violence and victim aid. However, it is widely acknowledged that government alone cannot address these issues effectively. The role of non-profit organisations (NPOs in addressing social and development issues is increasingly emphasised. NPOs work at grass-roots level and they can therefore, on the whole, identify societal vulnerabilities and risks earlier than the government sector. However, due to the economic recession, NPOs operate in a competitive environment where an increasing number of NPOs rely on a small number of donors and other resources. NPOs should therefore differentiate themselves from the competition in order to obtain public legitimacy and funding. Corporate identity management is important for NPOs to fulfil their role in social welfare and thus contribute to disaster risk reduction. The exploratory nature of this study dictates a qualitative research approach. Semi-structured interviews with management of five NPOs in the social welfare sector were conducted in order to provide an answer to the study’s research question: ‘To what extent do NPOs in the social welfare sector practise corporate identity management, in order to prevent and address social welfare risks?’ The research found that NPOs do not realise the full potential of managing their corporate identities. NPOs therefore do not take advantage of a strong and distinct corporate identity which would allow them to ensure their ability to assess, address, reduce and/or alleviate vulnerabilities and disaster risks.

  14. Globus Nexus: A Platform-as-a-Service Provider of Research Identity, Profile, and Group Management.

    Science.gov (United States)

    Chard, Kyle; Lidman, Mattias; McCollam, Brendan; Bryan, Josh; Ananthakrishnan, Rachana; Tuecke, Steven; Foster, Ian

    2016-03-01

    Globus Nexus is a professionally hosted Platform-as-a-Service that provides identity, profile and group management functionality for the research community. Many collaborative e-Science applications need to manage large numbers of user identities, profiles, and groups. However, developing and maintaining such capabilities is often challenging given the complexity of modern security protocols and requirements for scalable, robust, and highly available implementations. By outsourcing this functionality to Globus Nexus, developers can leverage best-practice implementations without incurring development and operations overhead. Users benefit from enhanced capabilities such as identity federation, flexible profile management, and user-oriented group management. In this paper we present Globus Nexus, describe its capabilities and architecture, summarize how several e-Science applications leverage these capabilities, and present results that characterize its scalability, reliability, and availability.

  15. Globus Nexus: A Platform-as-a-Service provider of research identity, profile, and group management

    Energy Technology Data Exchange (ETDEWEB)

    Chard, Kyle; Lidman, Mattias; McCollam, Brendan; Bryan, Josh; Ananthakrishnan, Rachana; Tuecke, Steven; Foster, Ian

    2016-03-01

    Globus Nexus is a professionally hosted Platform-as-a-Service that provides identity, profile and group management functionality for the research community. Many collaborative e-Science applications need to manage large numbers of user identities, profiles, and groups. However, developing and maintaining such capabilities is often challenging given the complexity of modern security protocols and requirements for scalable, robust, and highly available implementations. By outsourcing this functionality to Globus Nexus, developers can leverage best-practice implementations without incurring development and operations overhead. Users benefit from enhanced capabilities such as identity federation, flexible profile management, and user-oriented group management. In this paper we present Globus Nexus, describe its capabilities and architecture, summarize how several e-Science applications leverage these capabilities, and present results that characterize its scalability, reliability, and availability.

  16. Identity Management and Trust Services: Foundations for Cloud Computing

    Science.gov (United States)

    Suess, Jack; Morooney, Kevin

    2009-01-01

    Increasingly, IT organizations will move from providing IT services locally to becoming an integrator of IT services--some provided locally and others provided outside the institution. As a result, institutions must immediately begin to plan for shared services and must understand the essential role that identity management and trust services play…

  17. Building trusted national identity management systems: Presenting the privacy concern-trust (PCT) model

    DEFF Research Database (Denmark)

    Adjei, Joseph K.; Olesen, Henning

    This paper discusses the effect of trust and information privacy concerns on citizens’ attitude towards national identity management systems. We introduce the privacyconcerns- trust model, which shows the role of trust in mediating and moderating citizens’ attitude towards identity management...... systems. We adopted a qualitative research approach in our analysis of data that was gathered through a series of interviews and a stakeholder workshop in Ghana. Our findings indicate that, beyond the threshold level of trust, societal information privacy concern is low; hence, trust is high, thereby...

  18. Managing Quality, Identity and Adversaries in Public Discourse with Machine Learning

    Science.gov (United States)

    Brennan, Michael

    2012-01-01

    Automation can mitigate issues when scaling and managing quality and identity in public discourse on the web. Discourse needs to be curated and filtered. Anonymous speech has to be supported while handling adversaries. Reliance on human curators or analysts does not scale and content can be missed. These scaling and management issues include the…

  19. Identity Management Mismatch Challenges in the Danish Municipality Administration System

    DEFF Research Database (Denmark)

    Andersen, Mads Schaarup; Christensen, Henrik Bærbak

    2010-01-01

    Integrating a COTS product in a company’s product portfolio is appealing from a business perspective but highly challenging from the perspective of the software architecture. In this paper we outline research challenges regarding authorization in the identity management part of the Danish...

  20. Identity and access management business performance through connected intelligence

    CERN Document Server

    Osmanoglu, Ertem

    2013-01-01

    Identity and Access Management: Controlling Your Network provides you with a practical, in-depth walkthrough of how to plan, assess, design, and deploy IAM solutions. This book breaks down IAM into manageable components to ease systemwide implementation. The hands-on, end-to-end approach includes a proven step-by-step method for deploying IAM that has been used successfully in over 200 deployments. The book also provides reusable templates and source code examples in Java, XML, and SPML.Focuses on real-word implementations Provides end-to-end coverage of IAM from business drivers, requirements

  1. Analysis of Privacy-Enhancing Identity Management Systems

    DEFF Research Database (Denmark)

    Adjei, Joseph K.; Olesen, Henning

    Privacy has become a major issue for policy makers. This has been impelled by the rapid development of technologies that facilitate collection, distribution, storage, and manipulation of personal information. Business organizations are finding new ways of leveraging the value derived from consumer...... is an attempt to understand the relationship between individuals’ intentions to disclose personal information, their actual personal information disclosure behaviours, and how these can be leveraged to develop privacy-enhancing identity management systems (IDMS) that users can trust. Legal, regulatory...... and technological aspects of privacy and technology adoption are also discussed....

  2. Spoiled Group Identities and Backstage Work: A Theory of Stigma Management Rehearsals

    Science.gov (United States)

    O'Brien, John

    2011-01-01

    How do persons with a stigmatized identity learn potential responses to discrimination and harassment? Drawing on three and a half years of ethnographic data, this paper demonstrates how members of a group of Muslim American youth are socialized in locally dominant stigma management strategies through stigma management rehearsals. Stigma…

  3. Identity And Access Management e Federazione

    Directory of Open Access Journals (Sweden)

    Virginia Calabritto

    2012-07-01

    Full Text Available ItLa rete telematica è in costante crescita e così i servizi online che, in modo sempre più penetrante, rappresentano un aspetto della nostra quotidianità. I servizi in rete si distinguono in servizi ad accesso libero e servizi ad accesso controllato. Ogni giorno studenti, ricercatori e docenti accedono a contenuti e servizi (risorse ad accesso controllato con modalità diverse, la più diffusa è l'utilizzo dell‘informazione utenza/password, informazione diversa per ciascuna risorsa. Da questo punto di vista l’ampia disponibilità di risorse in rete crea all’utente, ma non solo a lui, diversi problemi, non ultimo quello della memorizzazione di un numero sempre più ampio di coppie utenza/password.L’articolo è teso ad illustrare, nel dettaglio, scenario e problematiche per passare quindi ad accennare alle tecnologie che possono costituire una soluzione, ovvero, l'Identity Management, il Single Sign On e le federazioni di infrastrutture di autenticazione e autorizzazione e, quindi, a degli esempi tra cui IDEM, la prima federazione italiana di Infrastrutture di Autenticazione e Autorizzazione, che coinvolge gli enti della comunità scientifica ed accademica e i fornitori di servizi.EnThe Internet is constantly growing, therefore on-line services, are becoming part of our daily life in a more and more pervasive manner. The network services are divided into two types of access: free access and controlled access. Every day students, researchers and teachers access content and services (resources through controlled access using different modes, e.g using user / password information which is different for each resource. From this perspective, the large availability of networked resources generates many problems for the users, last but not least the inconvenience of storing an increasing number of user / password.The article aims to illustrate, in detail, the context and the problems related to the management of a digital identiy in the

  4. Management challenges in a case of gender identity disorder

    Directory of Open Access Journals (Sweden)

    Anubhav Rathi

    2014-01-01

    Full Text Available Gender identity disorder (GID is a complex disorder and can be defined as a group of disorders whose common feature is a strong and persistent preference for living as a person of the other sex. It is associated with significant impairment in social, occupational, interpersonal, and other areas of functioning. We describe the case of an adolescent, biologically male who was brought to our outpatient department primarily with symptoms of adjustment disorder with GID and the management provided. The role of a psychiatrist in the management, ethical and legal issues involved is also discussed.

  5. Group affiliation in self-management: support or threat to identity?

    Science.gov (United States)

    Bossy, Dagmara; Knutsen, Ingrid Ruud; Rogers, Anne; Foss, Christina

    2017-02-01

    Self-management is considered important in chronic illness, and contemporary health policy recommends participation in support groups for individuals with chronic conditions. Although withdrawal from or non-participation in support groups is an important problem, there is limited knowledge about individuals' own motivation for participation in or withdrawal from self-management support groups. To investigate how individuals with type 2 diabetes perceive participation in group-based self-management support. This is a qualitative focus group study using a semi-structured interview guide. Sixteen participants diagnosed with type 2 diabetes were included in the study. Individuals with and without group affiliations were mixed in three focus groups to trigger discussions. In the analysis, reoccurring themes of engagement and discussions between participants were focused within a theoretical frame of institutional logic. The focus groups are seen as social spaces where participants construct identity. Both participation and non-participation in group-based self-management support are associated with dealing with the stigma of having type 2 diabetes. Negotiations contribute to constructing an illness dignity as a response to the logic of moral responsibility for the disease. Contemporary policy contributes to societal understandings of individuals with type 2 diabetes as morally inadequate. Our study shows that group-based self-management support may counteract blame and contribute in negotiations of identity for individuals with type 2 diabetes. This mechanism makes participation in groups beneficial for some but stigma inducing for others. © 2016 The Authors. Health Expectations Published by John Wiley & Sons Ltd.

  6. Intergroup conflict management strategies as related to perceptions of dual identity and separate groups.

    Science.gov (United States)

    Bizman, Aharon; Yinon, Yoel

    2004-04-01

    The authors examined the relations between (a) the perceptions of dual identity and separate groups and (b) intergroup conflict management strategies, in two contexts: the conflict between the secular and religious sectors in Israel and the allocation of resources among organizational subunits. In both contexts, contention (i.e., forcing one's will on the other party) was associated with the perception of separate groups. Only in the organizational context, avoidance (i.e., doing nothing or discontinuing participation in the conflict) was associated with the perception of dual identity. Problem solving (i.e., finding a solution that is acceptable to both parties) was related to the perception of dual identity in the secular-religious context. In the organizational context, this relation appeared only under a low perception of separate groups. Yielding (i.e., satisfying the other party's needs at the expense of one's own) was related to the perception of dual identity in the organizational context. In the secular-religious context, this relation appeared only under a high perception of separate groups. The authors discussed the varying pattern of the associations between (a) the perceptions of dual identity and separate groups and (b) the conflict management strategies in the two contexts in terms of the Dual Concern Model and the perceived feasibility of the strategies.

  7. Adequate Security Protocols Adopt in a Conceptual Model in Identity Management for the Civil Registry of Ecuador

    Science.gov (United States)

    Toapanta, Moisés; Mafla, Enrique; Orizaga, Antonio

    2017-08-01

    We analyzed the problems of security of the information of the civil registries and identification at world level that are considered strategic. The objective is to adopt the appropriate security protocols in a conceptual model in the identity management for the Civil Registry of Ecuador. In this phase, the appropriate security protocols were determined in a Conceptual Model in Identity Management with Authentication, Authorization and Auditing (AAA). We used the deductive method and exploratory research to define the appropriate security protocols to be adopted in the identity model: IPSec, DNSsec, Radius, SSL, TLS, IEEE 802.1X EAP, Set. It was a prototype of the location of the security protocols adopted in the logical design of the technological infrastructure considering the conceptual model for Identity, Authentication, Authorization, and Audit management. It was concluded that the adopted protocols are appropriate for a distributed database and should have a direct relationship with the algorithms, which allows vulnerability and risk mitigation taking into account confidentiality, integrity and availability (CIA).

  8. Managing corporate visual identity: use and effects of organizational measures to support a consistent self-presentation

    NARCIS (Netherlands)

    van den Bosch, Annette; de Jong, Menno; Elving, Wim

    2004-01-01

    It is generally acknowledged that corporate visual identity (CVI) is an important element of identity, reputation, and relationship management. Academic research has focused strongly on the strategic and design aspects of CVI, and neglected the operational level. This article addresses one of the

  9. Managing corporate visual identity: Use and effects of organizational measures to support a consistent self-presentation.

    NARCIS (Netherlands)

    van den Bosch, A.L.M.; de Jong, Menno D.T.; Elving, W.J.L.

    2004-01-01

    It is generally acknowledged that corporate visual identity (CVI) is an important element of identity, reputation, and relationship management. Academic research has focused strongly on the strategic and design aspects of CVI, and neglected the operational level. This article addresses one of the

  10. "I'm Scared of the Disappointment": Young Adult Smokers' Relational Identity Gaps and Management Strategies as Sites of Communication Intervention.

    Science.gov (United States)

    Stanley, Samantha J; Pitts, Margaret Jane

    2018-02-22

    While cigarette smoking is decreasing among young adults, rates of nicotine consumption through other devices, most notably electronic cigarettes, are on the rise. Framed by communication theory of identity, this study examines young adult smokers' experiences with relational others in regard to their smoking. Focus group discussions and individual interviews convened with 20 young adult cigarette and electronic cigarette smokers revealed identity gaps implicating the relational layer of identity, including personal-relational, enacted-relational, and personal-enacted-relational identity gaps. Participants used communicative and behavioral strategies to manage relational discrepancies. The documented identity gaps and management strategies present opportunities for targeted smoking cessation interventions that amplify dissonance created through identity gaps as a motivational tactic.

  11. The Role of Individual Differences and Situational Variables in the Use of Workplace Sexual Identity Management Strategies.

    Science.gov (United States)

    Reed, Louren; Leuty, Melanie E

    2016-07-01

    Examination of individual difference variables have been largely ignored within research on the use of workplace sexual identity management strategies. The current study examined personality traits (extraversion, openness, and neuroticism), facets of sexual identity development (identity confusion, internalized heterosexism), and situational variables (e.g., perceptions of workplace climate and heterosexism) in explaining the use of management strategies, as well as possible interactions between individual and situational factors. Perceptions of the workplace climate toward lesbian and gay individuals significantly related to the use each of the management strategies, and Internalized Heterosexism was found to significantly predict the use of the Explicitly Out strategy. Most interactions between individual difference and situational variables were not supported, with the exception of an interaction between workplace heterosexism and internalized homophobia in explaining the use of the Explicitly Out strategy.

  12. 'Even though it's a small checkbox, it's a big deal': stresses and strains of managing sexual identity(s) on Facebook.

    Science.gov (United States)

    Rubin, Jennifer D; McClelland, Sara I

    2015-01-01

    Facebook offers a socialisation context in which young people from ethnic, gender and sexual minorities must continually manage the potential for prejudice and discrimination in the form of homophobia and racism. In-depth interviews were conducted with eight young women, aged 16-19 years, who self-identified as queer and as women of colour. A detailed analysis of these interviews--focusing in particular on how young people described navigating expectations of rejection from family and friends--offered insight into the psychological and health consequences associated with managing sexual identity(s) while online. The 'closet' ultimately takes on new meaning in this virtual space: participants described trying to develop social relationships within Facebook, which demands sharing one's thoughts, behaviours and ideas, while also hiding and silencing their emerging sexuality. In this 'virtual closet', tempering self-presentation to offset social exclusion has become a continuous, yet personally treacherous, activity during the daily practice of using Facebook.

  13. Interplay Between Intended Brand Identity and Identities in a Nike Related Brand Community

    DEFF Research Database (Denmark)

    Kornum, Niels; Gyrd-Jones, Richard; Al Zagir, Nadia

    2017-01-01

    While branding research traditionally views brand identity as an inside-out management controlled phenomenon, recent research emphasizes that a wide variety of stakeholders in the brand ecosystem enact and co-create brand identity. Following this theoretical perspective, management forms the inte...

  14. The NSF Cybersecurity Center of Excellence: Translating Identity Management and Cybersecurity into Scientific Collaboration

    Science.gov (United States)

    Welch, V.

    2016-12-01

    Scientists care deeply about their collaborations: who is a member, who can access, produce, and correct data, and manager instruments critical to their science missions. The communities of cybersecurity and identity management professionals develop tools to support collaborations and the undertaking of trustworthy science, but there are large cultural and linguistic gaps between these communities and the scientists they service. The National Science Foundation has recently funded a NSF Cybersecurity Center of Excellence to help its community of projects by providing leadership and addressing the challenges of trustworthy science. A key goal of this NSF Center has been translating between the goals of the science community into requirements and risks understood by identity management and cybersecurity communities. This talk will give an update on the Center's efforts and other services it provides to the NSF community to bridge these cultures.

  15. OAuth 2.0 identity and access management patterns

    CERN Document Server

    Spasovski, Martin

    2013-01-01

    This is a practical and fast-paced guide that gives you all the information you need to start implementing secure OAuth 2.0 implementations in your web applications.OAuth 2.0 Identity and Access Management Patterns is intended for software developers, software architects, and enthusiasts working with the OAuth 2.0 framework.In order to learn and understand the OAuth 2.0 grant flow, it is assumed that you have some basic knowledge of HTTP communication. For the practical examples, basic knowledge of HTML templating, programming languages, and executing commands in the command line terminal is a

  16. Holistic Privacy-Preserving Identity Management System for the Internet of Things

    Directory of Open Access Journals (Sweden)

    Jorge Bernal Bernabe

    2017-01-01

    Full Text Available Security and privacy concerns are becoming an important barrier for large scale adoption and deployment of the Internet of Things. To address this issue, the identity management system defined herein provides a novel holistic and privacy-preserving solution aiming to cope with heterogeneous scenarios that requires both traditional online access control and authentication, along with claim-based approach for M2M (machine to machine interactions required in IoT. It combines a cryptographic approach for claim-based authentication using the Idemix anonymous credential system, together with classic IdM mechanisms by relying on the FIWARE IdM (Keyrock. This symbiosis endows the IdM system with advanced features such as privacy-preserving, minimal disclosure, zero-knowledge proofs, unlikability, confidentiality, pseudonymity, strong authentication, user consent, and offline M2M transactions. The IdM system has been specially tailored for the Internet of Things bearing in mind the management of both users’ and smart objects’ identity. Moreover, the IdM system has been successfully implemented, deployed, and tested in the scope of SocIoTal European research project.

  17. Exploring medical identity theft.

    Science.gov (United States)

    Mancilla, Desla; Moczygemba, Jackie

    2009-09-16

    The crime of medical identity theft is a growing concern in healthcare institutions. A mixed-method study design including a two-stage electronic survey, telephone survey follow-up, and on-site observations was used to evaluate current practices in admitting and registration departments to reduce the occurrence of medical identity theft. Survey participants were chief compliance officers in acute healthcare organizations and members of the Health Care Compliance Association. Study results indicate variance in whether or how patient identity is confirmed in healthcare settings. The findings of this study suggest that information systems need to be designed for more efficient identity management. Admitting and registration staff must be trained, and compliance with medical identity theft policies and procedures must be monitored. Finally, biometric identity management solutions should be considered for stronger patient identification verification.

  18. Identity Assemblages

    DEFF Research Database (Denmark)

    Horn, Line Helverskov

    The study aims at exploring how identity is enacted within the context of a two-year programme in Service, Hospitality, and Tourism Management (SHTM). This research thus investigates how students and educators go about their daily lives in different educational contexts both on and off campus...... as a contribution to the body of literature of ANT-based studies. Second, it contributes to existing identity theories by exemplifying a socio-material approach to identity issues. Third, the study enables reflections upon how educational institutions as fundamentally identity-producing organisations acknowledge...

  19. A National Identity Management Strategy to Enhance the Brazilian Electronic Government

    Directory of Open Access Journals (Sweden)

    José Alberto Sousa Torres

    2017-12-01

    Full Text Available Amongst the several problems with the Brazilian e-government services (e-Gov, many of them are related to the fact that Brazil does not have a National Strategy for Digital Identity Management (IdM. To design a  national strategy, it is crucial to analyze the solutions adopted in other countries and take into account Brazilian characteristics, such as its area, population, digital inclusion index, socio-political and economic profile, the current national identity registration system and the fraud rate. In this context, this paper aims to propose a national strategy for IdM for the Brazilian e-Gov program. This strategy was built upon by a literature review of the experiences of European countries and, mainly, the peculiarities inherent to Brazil.

  20. Patient privacy, consent, and identity management in health information exchange

    CERN Document Server

    Hosek, Susan D

    2013-01-01

    As a step toward improving its health information technology (IT) interoperability, the Military Health System is seeking to develop a research roadmap to better coordinate health IT research efforts, address IT capability gaps, and reduce programmatic risk for its enterprise projects. This report identifies gaps in research, policy, and practice involving patient privacy, consent, and identity management that need to be addressed to improve the quality and efficiency of care through health information exchange.

  1. Collective Endeavors to Address Institutional Contradiction between Gender Identity and Occupational Identity

    DEFF Research Database (Denmark)

    Villeseche, Florence

    or leaders and their social identity as women. Accordingly, I here seek to answer the following question: what dilemmas arise from the collective institutional work performed by actors facing institutional contradiction between their occupational and gender identity, and how are those dilemmas addressed? I......Women’s presence in the labor market is one of the major institutional changes of the past century. However, in particular at higher hierarchical levels, gender equality still remains a distant objective. The ideal-type of the worker, manager or leader is this largely a masculine one, thus...... associating the related occupational identity to a masculine gender social identity. Thus, it can be argued that women in organizations can face an “institutional contradiction” between their occupation and their gender – i.e a perceived discordancy between their social occupational identity as managers...

  2. The Interaction of Control Systems and Stakeholder Networks in Shaping the Identities of Self-managed Teams

    DEFF Research Database (Denmark)

    Annosi, Maria Carmela; Foss, Nicolai Juul; Brunetta, Federica

    2017-01-01

    -based firms. We argue that managerial and stakeholder interventions shape the self-construction of team identity as well as the team’s commitment to specific work objectives. We also suggest that team identity becomes isomorphic to organizational identity because of pressures related to: (1) the presence...... of a dense network of managers and stakeholders, which orients teams towards a focus on certain aspects of the higher-order identity; (2) the use of team routines and regular feedback loops, which force alignment with the organizational identity; and (3) the use of coordinating roles aimed at promoting......, ratifying and reinforcing the convergence of identity within the team. We analyse multiple cases from a major multinational corporation in the telecommunications industry, which we examine through the lens of a multi-level model of controls involving the micro, meso and macro organizational levels. We...

  3. When Social Identities Collide: Commentary on "Gender in the Management Education Classroom"

    Science.gov (United States)

    Patton, Eric

    2010-01-01

    This commentary to "Gender in the Management Education Classroom" (Bilimoria, O'Neil, Hopkins, & Murphy, 2010) employs social identity and self-categorization theory to analyze the incident described in the article. In any MBA classroom, students are dealing with multiple group memberships. Similar to workplace settings, when the focus is on…

  4. [Effects of an integrated self-management program on self-management, glycemic control, and maternal identity in women with gestational diabetes mellitus].

    Science.gov (United States)

    Kim, HeeSook; Kim, Sue

    2013-02-01

    The purpose of the study was to investigate the effects of an integrated self-management program on self-management, glycemic control, and maternal identity in women with gestational diabetes mellitus (GDM). A non-equivalent control group non-synchronized quasi-experimental design was used. A total of 55 women with GDM were recruited from Cheil General Hospital, Seoul, Korea and were assigned to an experimental (n=28) or control group (n=27). The participants were 24-30 weeks pregnant women who had been diagnosed with GDM as of July 30, 2010. The program was conducted as a 1 hour small group meeting 3 out of 5 times and by telephone-counseling 2 out of 5 times. The integrated self-management program was verified by an expert panel. Although there was no significant reduction in HbA1c (U= -1.17, p=.238), there were statistically significant increases in self-management (U= -3.80, pidentity (U= -4.48, pmanagement program for women with GDM improves self-management, maternal identity, and glycemic control. Further studies are needed to identify the effects of an integrated self-management program on pregnancy and neonatal outcomes.

  5. An exploration of mothers' and fathers' views of their identities in chronic-kidney-disease management: parents as students?

    Science.gov (United States)

    Swallow, Veronica

    2008-12-01

    To explore parents' views of their identities as they learn to manage their child's chronic kidney disease. Parents are expected to participate in management and usually learn necessary skills from the multidisciplinary team. Research highlights the importance of professionals defining parents' management roles in chronic disease; but little is known about parents' views on their own identities as the complex and dynamic process of teaching and learning unfolds around their child's condition. According to positioning theory, identity development is a dynamic and fluid process that occurs during interaction, with each person positioning themselves while simultaneously positioning the other person, yet this concept has not been considered in relation to parents' contributions to disease management. A longitudinal, grounded theory study conducted in a UK Children's Kidney Unit. This paper focuses on one aspect of a larger study exploring family learning in disease management. Six mothers and two fathers of six children with a recently diagnosed chronic kidney disease participated in a total of 21 semi-structured interviews during the 18 months after referral to the unit. Interviews included discussion about the parts they played in relation to professionals during the management process. Findings were interpreted within a framework of positioning theory. Parents participated in teaching/learning/assessment that was both planned (involving allocated clinical lessons and tasks) and spontaneous (in response to current situations), to facilitate their participation. They positioned multidisciplinary team members as teachers as well as professionals, simultaneously positioning themselves as students as well as parents. Parents' clinical duties and obligations are not an automatic part of parenting but become part of the broader process of sharing disease management, this can lead to them assuming the additional identity of a 'student'. Involving parents in ongoing

  6. Use of standardized multidimensional evaluation tools and the emergence of the case manager's professional identity in France.

    Science.gov (United States)

    Nugue, Mathilde; De Stampa, Matthieu; Couturier, Yves; Somme, Dominique

    2012-01-01

    In France, the national public health plan proposes a group of innovations including the initiation of case management for older adults in complex situations, particularly those with cognitive disorders. In this context, public authorities asked case managers to use a standardized multidimensional evaluation tool. The results of a qualitative study on the pertinence of such a tool relative to the emergence of this new professional field are described. Early use of an evaluation tool seems to be linked to the emergence of a new professional identity for recently recruited case managers. Factors determining the strength of this link are training tool standardization, computerization, and local structure's involvement. Our results contribute to identifying one of the ways by which professional identity can be changed to become a case manager.

  7. Enterprise identity management towards an investment decision support approach

    CERN Document Server

    Royer, Denis

    2013-01-01

    ?The introduction of Enterprise Identity Management Systems (EIdMS) in organizations even beyond the purely technological level is a costly and challenging endeavor. However, for decision makers it seems difficult to fully understand the impacts and opportunities arising from the introduction of EIdMS. This book explores the relevant aspects for an ex-ante evaluation of EIdMS. Therefore it examines this domain by employing a qualitative expert interview study to better understand the nature of EIdMS, as they are situated between security and productive IT systems. To this regard, the focus is

  8. Rewriting Dominant Narratives of the Academy: Women Faculty of Color and Identity Management

    Science.gov (United States)

    Motha, Suhanthie; Varghese, Manka M.

    2018-01-01

    Drawing on Delgado and Yosso's "counterstory," Yosso's "community cultural wealth," and Alsup's "borderland discourses," the authors, who are women of color academics, use narratives from their lives to discuss the ways in which they draw on resources in managing and reconfiguring their multiple identities within the…

  9. Leadership, New Public Management and the Re-Modelling and Regulation of Teacher Identities

    Science.gov (United States)

    Hall, David; Gunter, Helen; Bragg, Joanna

    2013-01-01

    This article examines the rapidly shifting relationship between teachers and the state and efforts to re-model teacher identities within the wider context of public sector modernization and the New Public Management. The construction and development of officially authorized and normative discursive practices relating to leadership and the…

  10. Getting the Most of Management Training - the Role of Identical Elements for Training Transfer

    NARCIS (Netherlands)

    prof. dr. Karen van Dam; drs. Martijn van der Locht; dr. Dan Chiaburu

    2013-01-01

    Purpose - Focusing on management training, this study aimed to establish whether identical elements in a training program (i.e. aspects resembling participants' work situation) can improve training transfer and whether they do so beyond the contribution of two well-established predictors --

  11. Brief Report: The Identity Style Inventory (ISI-3) and the Utrecht-Management of Identity Commitments Scale (U-MICS)--Factor Structure, Reliability, and Convergent Validity in French-Speaking University Students

    Science.gov (United States)

    Zimmermann, Gregoire; Mahaim, Elodie Biermann; Mantzouranis, Gregory; Genoud, Philippe A.; Crocetti, Elisabetta

    2012-01-01

    The purpose of this study was to evaluate the factor structure and the reliability of the French versions of the Identity Style Inventory (ISI-3) and the Utrecht-Management of Identity Commitments Scale (U-MICS) in a sample of college students (N = 457, 18-25 years old). Confirmatory factor analyses confirmed the hypothesized three-factor solution…

  12. Globus Identity, Access, and Data Management: Platform Services for Collaborative Science

    Science.gov (United States)

    Ananthakrishnan, R.; Foster, I.; Wagner, R.

    2016-12-01

    Globus is software-as-a-service for research data management, developed at, and operated by, the University of Chicago. Globus, accessible at www.globus.org, provides high speed, secure file transfer; file sharing directly from existing storage systems; and data publication to institutional repositories. 40,000 registered users have used Globus to transfer tens of billions of files totaling hundreds of petabytes between more than 10,000 storage systems within campuses and national laboratories in the US and internationally. Web, command line, and REST interfaces support both interactive use and integration into applications and infrastructures. An important component of the Globus system is its foundational identity and access management (IAM) platform service, Globus Auth. Both Globus research data management and other applications use Globus Auth for brokering authentication and authorization interactions between end-users, identity providers, resource servers (services), and a range of clients, including web, mobile, and desktop applications, and other services. Compliant with important standards such as OAuth, OpenID, and SAML, Globus Auth provides mechanisms required for an extensible, integrated ecosystem of services and clients for the research and education community. It underpins projects such as the US National Science Foundation's XSEDE system, NCAR's Research Data Archive, and the DOE Systems Biology Knowledge Base. Current work is extending Globus services to be compliant with FEDRAMP standards for security assessment, authorization, and monitoring for cloud services. We will present Globus IAM solutions and give examples of Globus use in various projects for federated access to resources. We will also describe how Globus Auth and Globus research data management capabilities enable rapid development and low-cost operations of secure data sharing platforms that leverage Globus services and integrate them with local policy and security.

  13. Identity at work: Exploring strategies for Identity Work

    Directory of Open Access Journals (Sweden)

    Byron G. Adams

    2012-09-01

    Research purpose: The main aim of this study was to explore employee narratives and identify the strategies available to them in the process of identity work, as they defined themselves at work. Motivation for the study: As there is a scarcity of research on identity work in South Africa, this study wanted to advance knowledge about identity work and the strategies used for regulating and negotiating an identity at work by exploring these constructs in this context. Research design, approach and method: A qualitative research process formed the basis for this study. Nineteen employees from a global manufacturing company participated in two semi-structured in-depth interviews. Grounded theory was applied to analyse and interpret the data. Main findings: Nine strategies for identity work were identified and categorised into four broad themes (personal philosophies; relationships; career management and negotiating balance. Practical/managerial implications: Employees followed various strategies for defining themselves at work and this may have some implications for employee work engagement and productivity. Contribution/value-add: This study expands on current theoretical knowledge of identity work, and provides insights into the strategies people use to regulate and negotiate their identities at work.

  14. Identity at work: Exploring strategies for Identity Work

    Directory of Open Access Journals (Sweden)

    Byron G. Adams

    2012-01-01

    Full Text Available Orientation: This study explored strategies for identity work that are central to the negotiation and regulation of employee work identity.Research purpose: The main aim of this study was to explore employee narratives and identify the strategies available to them in the process of identity work, as they defined themselves at work.Motivation for the study: As there is a scarcity of research on identity work in South Africa, this study wanted to advance knowledge about identity work and the strategies used for regulating and negotiating an identity at work by exploring these constructs in this context.Research design, approach and method: A qualitative research process formed the basis for this study. Nineteen employees from a global manufacturing company participated in two semi-structured in-depth interviews. Grounded theory was applied to analyse and interpret the data.Main findings: Nine strategies for identity work were identified and categorised into four broad themes (personal philosophies; relationships; career management and negotiating balance.Practical/managerial implications: Employees followed various strategies for defining themselves at work and this may have some implications for employee work engagement and productivity.Contribution/value-add: This study expands on current theoretical knowledge of identity work, and provides insights into the strategies people use to regulate and negotiate their identities at work. 

  15. Report: Improvements Needed in CSB’s Identity and Access Management and Incident Response Security Functions

    Science.gov (United States)

    Report #18-P-0030, October 30, 2017. Weaknesses in the Identity and Access Management and Incident Response metric domains leave the CSB vulnerable to attacks occurring and not being detected in a timely manner.

  16. Linguistic identity matching

    CERN Document Server

    Lisbach, Bertrand

    2013-01-01

    Regulation, risk awareness and technological advances are increasingly drawing identity search functionality into business, security and data management processes, as well as fraud investigations and counter-terrorist measures.Over the years, a number of techniques have been developed for searching identity data, traditionally focusing on logical algorithms. These techniques often failed to take into account the complexities of language and culture that provide the rich variations  seen in names used around the world. A new paradigm has now emerged for understanding the way that identity data

  17. The medical leadership challenge in healthcare is an identity challenge.

    Science.gov (United States)

    Andersson, Thomas

    2015-01-01

    The purpose of this article is to describe and analyse the identity challenges that physicians with medical leadership positions face. Four qualitative case studies were performed to address the fact that identity is processual, relational and situational. Physicians with managerial roles were interviewed, as well as their peers, supervisors and subordinates. Furthermore, observations were made to understand how different identities are displayed in action. This study illustrates that medical leadership implies identity struggles when physicians have manager positions, because of the different characteristics of the social identities of managers and physicians. Major differences are related between physicians as autonomous individuals in a system and managers as subordinates to the organizational system. There are psychological mechanisms that evoke the physician identity more often than the managerial identity among physicians who are managers, which explains why physicians who are managers tend to remain foremost physicians. The implications of the findings, that there are major identity challenges by being both a physician and manager, suggest that managerial physicians might not be the best prerequisite for medical leadership, but instead, cooperative relationships between physicians and non-physician managers might be a less difficult way to support medical leadership. Acknowledging and addressing identity challenges can be important both in creating structures in organizations and designing the training for managers in healthcare (both physicians and non-physicians) to support medical leadership. Medical leadership is most often related to organizational structure and/or leadership skills, but this paper discusses identity requirements and challenges related to medical leadership.

  18. Contributions of the Life Story Method for Studies on Identity: the example of study about female professors in management positions

    Directory of Open Access Journals (Sweden)

    Adílio Renê Almeida Miranda

    2014-12-01

    Full Text Available Recently, the Life Story Method has been used in the area of Business Administration as an important methodological strategy in qualitative research. The purpose is to understand groups or collective bodies based on individual paths of life. Thus, the goal of this study was to show the contribution of the life story method in understanding the identity dynamics of female professors managing a public university, by means of an example derived from an empirical study. It was observed from the reports of four female professors involved in management that recovery of past memories, as well as of values, facts, standards and occurrences connected with the primary and organizational socialization of the interviewees, contributes to understanding of their identity dynamics. Some categories of analysis emerged that express relationships between life story and identity, e.g., discontinuity, subjectivity and the importance of allowing an individual/subject to speak; the individual and the social sphere and socio-historical transformations, a dynamic interaction in construction of identities; and temporal analysis in construction of identities.

  19. Family support in the transition to adulthood in Portugal--its effects on identity capital development, uncertainty management and psychological well-being.

    Science.gov (United States)

    Oliveira, José Egídio; Mendonça, Marina; Coimbra, Susana; Fontaine, Anne Marie

    2014-12-01

    In a familistic southern European society such as the Portuguese, the family has historically played a prominent role in supporting the negotiation of transition pathways into adulthood. The present study aimed at capturing (1) the relative weight of parental financial support and autonomy support in contributing to the youngsters' psychological well-being (PWB), and (2) the mediating role of identity capital and uncertainty management in this relationship. A total of 620 participants completed measures of parental support, identity capital, uncertainty management and PWB. Autonomy support was found to be the strongest predictor of PWB, both directly and indirectly through its effects on identity capital and the use of target focused uncertainty management strategies. Conversely, financial support evidenced only a minor indirect impact through the mediation of tangible identity capital. Autonomy stimulation may constitute one of the most developmentally determinant family challenges in assisting the process of coming of age in Portugal. Copyright © 2014 The Foundation for Professionals in Services for Adolescents. Published by Elsevier Ltd. All rights reserved.

  20. "Everybody Puts Their Whole Life on Facebook": Identity Management and the Online Social Networks of LGBTQ Youth.

    Science.gov (United States)

    McConnell, Elizabeth; Néray, Bálint; Hogan, Bernie; Korpak, Aaron; Clifford, Antonia; Birkett, Michelle

    2018-05-26

    Lesbian, gay, bisexual, transgender, and queer (LGBTQ) youth and young adults almost inevitably "come out", or self-disclose their identity to others. Some LGBTQ youth are more uniformly "out", while others may disclose to some groups but not others. This selective disclosure is complicated on real name social media sites, which tend to encourage a unified presentation of self across social contexts. We explore these complications with a cohort of LBGTQ youth on Facebook ( N = 199, M age = 24.13). Herein we ask: How do LBGTQ youth manage the disclosure of their sexual orientation and/or gender identity to different people in their lives? Further, are there identifiable differences in the online social network structure for LGBTQ youth who manage outness in different ways? Finally, how do LGBTQ young people describe their experiences on Facebook? We answer these questions using a mixed methods approach, combining statistical cluster analysis, network visualization, and qualitative data. Our findings illustrate patterns in network structure by outness cluster type, highlighting both the work involved in managing one's online identity as well as the costs to (semi-) closeted individuals including a considerably lower overall network connectivity. In particular, outness to family characterized LGBTQ young people's experiences on Facebook.

  1. User-centred and context-aware identity management in mobile ad-hoc networks

    CERN Document Server

    Arabo, Abdullahi

    2013-01-01

    The emergent notion of ubiquitous computing makes it possible for mobile devices to communicate and provide services via networks connected in an ad-hoc manner. These have resulted in the proliferation of wireless technologies such as Mobile Ad-hoc Networks (MANets), which offer attractive solutions for services that need flexible setup as well as dynamic and low cost wireless connectivity. However, the growing trend outlined above also raises serious concerns over Identity Management (IM) du...

  2. Academic Manager or Managed Academic? Academic Identity Schisms in Higher Education

    Science.gov (United States)

    Winter, Richard

    2009-01-01

    The relationship between values and academic identity has received scant attention in the higher education literature with some notable exceptions (Churchman, 2006; Harley, 2002; Henkel, 2005). This paper contends that the perceived need to align all academics around corporate values and goals has given rise to academic identity schisms in higher…

  3. Sensor management for identity fusion on a mobile robot

    DEFF Research Database (Denmark)

    Larsen, Thomas Dall; Andersen, Nils Axel; Ravn, Ole

    1998-01-01

    This paper addresses the problem of identity fusion, i.e. the problem of selecting one of several identity hypotheses concerning an observed object. Two problems are considered. Firstly the problem of preserving the information in the representation and fusion of measurements relating to identity...

  4. A User-Centric System for Verified Identities on the Bitcoin Blockchain

    OpenAIRE

    Augot, Daniel; Chabanne, Hervé; Chenevier, Thomas; George, William; Lamber, Laurent

    2017-01-01

    International audience; We present an identity management scheme built into the Bitcoin blockchain, allowing for identities that are as indelible as the blockchain itself. Moreover, we take advantage of Bitcoin's decentralized nature to facilitate a shared control between users and identity providers, allowing users to directly manage their own identities, fluidly coordinating identities from different providers, even as identity providers can revoke identities and impose controls.

  5. Single Thing Sign On Identity Management for Internet of Things

    DEFF Research Database (Denmark)

    Zdravkova, Vanya; Mihaylov, Mihail Rumenov; Mihovska, Albena Dimitrova

    2016-01-01

    —Within the context of heterogeneous Internet of Things (IoT) network driven by Machine-to-Machine (M2M) communications there is a need for a proper user identification and Identity Management (IdM) mechanisms which to involve all of the objects in the IoT. The paper addresses user identification...... by proposing Single Thing Sign On (STSO) IdM architecture for IoT, where the end-user is in the middle of a user-centered services ecosystem. The proposed scheme enables user recognition and services access only by identification of one of the “things” related to the user such as personal computing devices...

  6. Issues of E-Learning Standards and Identity Management for Mobility and Collaboration in Higher Education

    Science.gov (United States)

    Alves, Paulo; Uhomoibhi, James

    2010-01-01

    Purpose: This paper seeks to investigate and report on the status of identity management systems and e-learning standards across Europe for promoting mobility, collaboration and the sharing of contents and services in higher education institutions. Design/methodology/approach: The present research work examines existing e-learning standards and…

  7. Exploring the identity and "sense of identity" of organisations

    Directory of Open Access Journals (Sweden)

    C L Van Tonder

    2006-04-01

    Full Text Available During the past two decades a steady increase in scholarly contributions in the area of organisation identity have been observed – to the point that the phenomenon is now the subject of a sustainable discourse in several disciplines. Many theoretical and conceptual dilemmas however remain, largely as a result of the low incidence of empirical research in the area. This study reports the results of an exploratory investigation that adapted Schley and Wagenfield’s (1979 concept of identity for use in an organisational setting. Interviews were conducted with 152 top managers representing 10 companies. The results indicate that organisational responses to the question “who am I?�? elicit distinctive organisational self-descriptions and some awareness of identity issues.

  8. “Everybody Puts Their Whole Life on Facebook”: Identity Management and the Online Social Networks of LGBTQ Youth

    Directory of Open Access Journals (Sweden)

    Elizabeth McConnell

    2018-05-01

    Full Text Available Lesbian, gay, bisexual, transgender, and queer (LGBTQ youth and young adults almost inevitably “come out”, or self-disclose their identity to others. Some LGBTQ youth are more uniformly “out”, while others may disclose to some groups but not others. This selective disclosure is complicated on real name social media sites, which tend to encourage a unified presentation of self across social contexts. We explore these complications with a cohort of LBGTQ youth on Facebook (N = 199, Mage = 24.13. Herein we ask: How do LBGTQ youth manage the disclosure of their sexual orientation and/or gender identity to different people in their lives? Further, are there identifiable differences in the online social network structure for LGBTQ youth who manage outness in different ways? Finally, how do LGBTQ young people describe their experiences on Facebook? We answer these questions using a mixed methods approach, combining statistical cluster analysis, network visualization, and qualitative data. Our findings illustrate patterns in network structure by outness cluster type, highlighting both the work involved in managing one’s online identity as well as the costs to (semi- closeted individuals including a considerably lower overall network connectivity. In particular, outness to family characterized LGBTQ young people’s experiences on Facebook.

  9. Research Trends and Issues in the Study of Identity of Multi-ethnic Persons

    OpenAIRE

    TABA, Ayumi; TAKAI, Jiro

    2016-01-01

    In this article, concepts of identity are considered and surveyed researches of ego identity and group identity in social identity theory, self-categorization theory. It indicates ethnic identity is related to selfconcept, well-being, academic achievement, mental health, and so on. Furthermore, identity management theory reveals that cross- cultural communication occurs depending on management of cultural identity as group identity and relational identity as personal identity. However, there ...

  10. Survivorship and discourses of identity.

    Science.gov (United States)

    Little, Miles; Paul, Kim; Jordens, Christopher F C; Sayers, Emma-Jane

    2002-01-01

    Personal identity is self-evidently important to us all. Identity is a philosophically complex subject, but there is some agreement that memory, embodiment and continuity are essential components. The sense of memory includes 'future memory', the kind of memory we would like to construct for ourselves as our lives proceed. While the sense of personal identity is internal to the individual, a sense of that person's identity exists in the minds of others. Extreme experiences threaten the element of continuity, because they may bring bodily changes as well as cognitive changes that challenge central values. Restoring or preserving continuity is a major task for survivors. The ways in which people experience discontinuity because of cancer illness, and the ways in which they manage this experience emerges from the narratives of the survivors of cancer and in the narratives of health care workers who look after them. People manage discontinuity by reference to stable 'anchor points' in their beliefs and values; by re-constructing versions of their pre-experience identities, drawing on past memory and finding ways to preserve a continuity between past memory, present experience and constructions of the future; by using the experience to develop established facets of identity; and by imbuing the experience with meaning and recognising the enlarged identity made possible by survival. Those who cannot achieve a sense of continuity may feel alienated from themselves, their friends and family. All these methods of management may be used by one person to negotiate the post-experience identity in its different social interactions. The experience of the survivor can be further understood by recognising the challenge posed by extreme experience to the sense of continuity of both embodied self and memory. A satisfactory discourse of survival has yet to enter the public domain. This lack adds to the burdens of survivors, including those who have survived cancer. Copyright 2002 John

  11. Identity negotiations in meetings

    DEFF Research Database (Denmark)

    Asmuß, Birte; Oshima, Sae

    of the company, and all members know (and display) that he holds some information that the rest don’t have access to. Our analysis shows that the participants evoke various identities of the manager, sometimes orienting to the structure of the organization, and other times orienting to wider social categories......Meetings are places, where identity negotiation is a central activity and where members’ local practices recurrently inform and are informed by larger categories (Antaki and Widdicombe 1998). Correspondingly, the approach to understanding organization (macro) by way of identity work (micro) has...... company, and in the data recorded over 10 days, the employees frequently complain about the many changes that have taken place. Our focus lies in a unique occasion where one of the managers makes an unusual appearance at the lunchroom. In this situation, he is the only one that is on the business side...

  12. National and gender measurement invariance of the Utrecht-Management of Identity Commitments Scale (U-MICS) : A 10-nation study with university students

    NARCIS (Netherlands)

    Crocetti, E.; Cieciuch, J.; Gao, C.-H.; Klimstra, T.A.; Lin, C.-L.; Mena de Matos, P.; Morsünbül, U.; Negru, O.; Sugimura, K.; Zimmermann, G.; Meeus, W.H.J.

    2015-01-01

    The purpose of this study was to examine the psychometric properties of the Utrecht-Management of Identity Commitments Scale (U-MICS), a self-report measure aimed at assessing identity processes of commitment, in-depth exploration, and reconsideration of commitment. We tested its factor structure in

  13. National and Gender Measurement Invariance of the Utrecht-Management of Identity Commitments Scale (U-MICS) : A 10-Nation Study With University Students

    NARCIS (Netherlands)

    Crocetti, Elisabetta; Cieciuch, Jan; Gao, Cheng Hai; Klimstra, Theo; Lin, Ching Ling; Matos, Paula Mena; Morsünbül, Ümit; Negru, Oana; Sugimura, Kazumi; Zimmermann, Grégoire; Meeus, Wim

    2015-01-01

    The purpose of this study was to examine the psychometric properties of the Utrecht-Management of Identity Commitments Scale (U-MICS), a self-report measure aimed at assessing identity processes of commitment, in-depth exploration, and reconsideration of commitment. We tested its factor structure in

  14. Balancing Fairness and Efficiency: The Impact of Identity-Blind and Identity-Conscious Accountability on Applicant Screening

    Science.gov (United States)

    Self, William T.; Mitchell, Gregory; Mellers, Barbara A.; Tetlock, Philip E.; Hildreth, J. Angus D.

    2015-01-01

    This study compared two forms of accountability that can be used to promote diversity and fairness in personnel selections: identity-conscious accountability (holding decision makers accountable for which groups are selected) versus identity-blind accountability (holding decision makers accountable for making fair selections). In a simulated application screening process, undergraduate participants (majority female) sorted applicants under conditions of identity-conscious accountability, identity-blind accountability, or no accountability for an applicant pool in which white males either did or did not have a human capital advantage. Under identity-conscious accountability, participants exhibited pro-female and pro-minority bias, particularly in the white-male-advantage applicant pool. Under identity-blind accountability, participants exhibited no biases and candidate qualifications dominated interview recommendations. Participants exhibited greater resentment toward management under identity-conscious accountability. PMID:26660723

  15. Online Identities and Social Networking

    Science.gov (United States)

    Maheswaran, Muthucumaru; Ali, Bader; Ozguven, Hatice; Lord, Julien

    Online identities play a critical role in the social web that is taking shape on the Internet. Despite many technical proposals for creating and managing online identities, none has received widespread acceptance. Design and implementation of online identities that are socially acceptable on the Internet remains an open problem. This chapter discusses the interplay between online identities and social networking. Online social networks (OSNs) are growing at a rapid pace and has millions of members in them. While the recent trend is to create explicit OSNs such as Facebook and MySpace, we also have implicit OSNs such as interaction graphs created by email and instant messaging services. Explicit OSNs allow users to create profiles and use them to project their identities on the web. There are many interesting identity related issues in the context of social networking including how OSNs help and hinder the definition of online identities.

  16. RFID-based Electronic Identity Security Cloud Platform in Cyberspace

    OpenAIRE

    Bing Chen; Chengxiang Tan; Bo Jin; Xiang Zou; Yuebo Dai

    2012-01-01

    With the moving development of networks, especially Internet of Things, electronic identity administration in cyberspace is becoming more and more important. And personal identity management in cyberspace associated with individuals in reality has been one significant and urgent task for the further development of information construction in China. So this paper presents a RFID-based electronic identity security cloud platform in cyberspace to implement an efficient security management of cyb...

  17. Identity In and Around Organisations

    DEFF Research Database (Denmark)

    Schultz, Majken; Maguire, Steve

    2013-01-01

    concept may not be the best way of approaching and managing your organisation. Rather, Majken Schultz and Steve Maguire argue that organisations would benefit from adopting a process-based view of identity, which integrates history, ongoing change and market instability into its definition.......At the heart of any successful organisation lies a powerful conception of identity: the coherent way in which it presents itself to its stakeholders and employees, containing its purpose, goals and key characteristics. However, the traditional idea of identity as a stable, solid and reliable...

  18. Social and psychological creativity in gay male midlife identity management.

    Science.gov (United States)

    Hajek, Christopher

    2016-06-01

    This study utilizes a qualitative thematic analysis methodology and a social identity theory framework to explore ways in which early midlife gay men report enhancing their social identities through social and psychological creativity. Face-to-face, semi-structured interviews were conducted with forty early midlife gay men (aged 40-53) in four US cities. Men discussed the collective and individual essences of their age and gay identities, including attitudes, beliefs, and behaviours that they embraced to self-enhance at midlife. These discussions emphasized differences from the younger gay outgroup, often in the context of intergenerational interaction. Identified were three strategies (and seven substrategies) that summarized the ways that interviewees constructed their identities in the interest of self-enhancement, specifically in the context of intergenerational comparisons with younger gay men. These strategies may be considered as extensions to social creativity strategies presented in Tajfel and Turner's (Psychology of intergroup relations. Chicago, IL: Nelson, 1986: 7) social identity theory. © 2015 The British Psychological Society.

  19. Identity Management ToolKit (IdM TK)

    Data.gov (United States)

    Department of Veterans Affairs — With the IdM TK, authorized users can search and view identity and exception information from the Administrative Data Repository (ADR). Specifically, users can view...

  20. XSIM Final Report: Modelling the Past and Future of Identity Management for Scientific Collaborations

    Energy Technology Data Exchange (ETDEWEB)

    Cowles, Robert; Jackson, Craig; Welch, Von

    2016-08-31

    The eXtreme Science Identity Management (XSIM1) research project: collected and analyzed real world data on virtual organization (VO) identity management (IdM) representing the last 15+ years of collaborative DOE science; constructed a descriptive VO IdM model based on that data; used the model and existing trends to project the direction for IdM in the 2020 timeframe; and provided guidance to scientific collaborations and resource providers that are implementing or seeking to improve IdM functionality. XSIM conducted over 20 semi­structured interviews of representatives from scientific collaborations and resource providers, both in the US and Europe; the interviewees supported diverse set of scientific collaborations and disciplines. We developed a definition of “trust,” a key concept in IdM, to understand how varying trust models affect where IdM functions are performed. The model identifies how key IdM data elements are utilized in collaborative scientific workflows, and it has the flexibility to describe past, present and future trust relationships and IdM implementations. During the funding period, we gave more than two dozen presentations to socialize our work, encourage feedback, and improve the model; we also published four refereed papers. Additionally, we developed, presented, and received favorable feedback on three white papers providing practical advice to collaborations and/or resource providers.

  1. "Managing by Not Managing": How Gay Engineering Students Manage Sexual Orientation Identity

    Science.gov (United States)

    Hughes, Bryce E.

    2017-01-01

    From a social constructivist paradigm I explored the experiences of 7 openly gay engineering students to understand how, if at all, they made sense of the intersections between their engineering and sexual orientation identities. By eliciting stories through individual and focus group interviews, a narrative approach allowed me to capture the…

  2. ISLAM AND MINORITIES: Managing Identity in Malaysia

    Directory of Open Access Journals (Sweden)

    Ahmad Suaedy

    2010-02-01

    Full Text Available The Malaysian general election in March 2008 raised an interesting and new phenomenon. For the first time since independence in 1957, the ruling alliance known as the National Front (Barisan Nasional, BN failed to secure two thirds of seats in parliament and lost control of five of Malaysia’s 13 states. This was due to the challenge presented by the new opposition alliance known as the Alternative Front (Barisan Alternatif, BA or the People’s Alliance (Pakatan Rakyat, PK which won more than 36% of seats in parliament and gained control of the five states. In the 2004 election, BN secured the largest ever percentage of seats in parliament with 91%. What is interesting is that it seems that this significant increase in support for the opposition is  due to their offer to change the way minorities and ethnicity is managed. They  propose a move from “Bumiputera Supremacy”, or affirmative action for the approximately 65% of “Bumiputera” Malaysians (the rest being largely of Chinese or Indian ethnicity, to “The People’s Supremacy”, which involves eradicating affirmative action based on ethnicity, basing it instead on need, for  instance need due to poverty. This would potentially increase the likelihood  of justice and equality for all ethnic or racial groups. This paper connects the phenomenon of change, as seen in the about turn in the results between the  2004 and 2008 elections, to the more global trend in which minorities are standing up to demand their rights in this era of globalization, and to the challenge multiculturalism presents to parts of the Muslim world such as Malaysia. Malaysia, a Muslim majority nation that has formally declared Islam the official state religion with Yang di-Pertuan Agong (the King as  Head of the State and symbol of Islam, is one example, though not necessarily  representative, of how Islam and Muslims manage minorities and identity or  multiculturalism within the process of globalization

  3. Identity's identities

    DEFF Research Database (Denmark)

    Jensen, Kim Ebensgaard

    -specialized language in which it also serves a number of functions – some of which are quite fundamental to society as such. In other words, the lexeme identity is a polysemic word and has multiple, well, identities. Given that it appears to have a number of functions in a variety of registers, including terminologies...... in Academic English and more everyday-based English, identity as a lexeme is definitely worth having a look at. This paper presents a lexicological study of identity in which some of its senses are identified and their behaviors in actual discourse are observed. Drawing on data from the 2011 section...... of the Corpus of Contemporary American English, a behavioral profile of the distributional characteristics of identity is set up. Behavioral profiling is a lexicographical method developed by the corpus linguist Stefan Th. Gries which, by applying semantic ID tagging and statistical analysis, provides a fine...

  4. Patients' Data Management System Protected by Identity-Based Authentication and Key Exchange.

    Science.gov (United States)

    Rivero-García, Alexandra; Santos-González, Iván; Hernández-Goya, Candelaria; Caballero-Gil, Pino; Yung, Moti

    2017-03-31

    A secure and distributed framework for the management of patients' information in emergency and hospitalization services is proposed here in order to seek improvements in efficiency and security in this important area. In particular, confidentiality protection, mutual authentication, and automatic identification of patients are provided. The proposed system is based on two types of devices: Near Field Communication (NFC) wristbands assigned to patients, and mobile devices assigned to medical staff. Two other main elements of the system are an intermediate server to manage the involved data, and a second server with a private key generator to define the information required to protect communications. An identity-based authentication and key exchange scheme is essential to provide confidential communication and mutual authentication between the medical staff and the private key generator through an intermediate server. The identification of patients is carried out through a keyed-hash message authentication code. Thanks to the combination of the aforementioned tools, a secure alternative mobile health (mHealth) scheme for managing patients' data is defined for emergency and hospitalization services. Different parts of the proposed system have been implemented, including mobile application, intermediate server, private key generator and communication channels. Apart from that, several simulations have been performed, and, compared with the current system, significant improvements in efficiency have been observed.

  5. Identity Formation in Career Development for Gifted Women.

    Science.gov (United States)

    Phelps, Christine E.

    1991-01-01

    Necessary developmental tasks concerned with identity development of gifted college women include developing competence, managing emotions, developing autonomy, establishing identity, freeing interpersonal relationships, developing purpose, and developing integrity. These issues may be used as counseling interventions to raise career aspirations.…

  6. Hard Identity and Soft Identity

    Directory of Open Access Journals (Sweden)

    Hassan Rachik

    2006-04-01

    Full Text Available Often collective identities are classified depending on their contents and rarely depending on their forms. Differentiation between soft identity and hard identity is applied to diverse collective identities: religious, political, national, tribal ones, etc. This classification is made following the principal dimensions of collective identities: type of classification (univocal and exclusive or relative and contextual, the absence or presence of conflictsof loyalty, selective or totalitarian, objective or subjective conception, among others. The different characteristics analysed contribute to outlining an increasingly frequent type of identity: the authoritarian identity.

  7. Staying in the Hood: Black Lesbian and Transgender Women and Identity Management in North Philadelphia.

    Science.gov (United States)

    Brooks, Siobhan

    2016-12-01

    The concept Don't Ask, Don't Tell regarding Black LGBT sexuality in Black communities has been an acceptable form of identity management for Black LGBT people. In other words, Black LGBT people are accepted as long as they are not vocal about their sexuality. However, this is changing with the issue of gay marriage, which is creating a space where Black LGBT people are more open about their gender identity and sexuality in heterosexual Black spaces. This new form of openness allows Black LGBT people to "stay in" their communities, as opposed to coming out. In this article I examine how Black LGBT women in North Philadelphia stay in their communities: being politically active regarding LGBT issues, disengaging from LGBT issues, passing, and educating straight Black people about issues affecting the Black LGBT community. I conclude with implications of staying in and intersectionality among Black heterosexual and LGBT women fighting for social change.

  8. Identity Management and Mental Health Discourse in Social Media.

    Science.gov (United States)

    Pavalanathan, Umashanthi; De Choudhury, Munmun

    2015-05-01

    Social media is increasingly being adopted in health discourse. We examine the role played by identity in supporting discourse on socially stigmatized conditions. Specifically, we focus on mental health communities on reddit. We investigate the characteristics of mental health discourse manifested through reddit's characteristic 'throwaway' accounts, which are used as proxies of anonymity. For the purpose, we propose affective, cognitive, social, and linguistic style measures, drawing from literature in psychology. We observe that mental health discourse from throwaways is considerably disinhibiting and exhibits increased negativity, cognitive bias and self-attentional focus, and lowered self-esteem. Throwaways also seem to be six times more prevalent as an identity choice on mental health forums, compared to other reddit communities. We discuss the implications of our work in guiding mental health interventions, and in the design of online communities that can better cater to the needs of vulnerable populations. We conclude with thoughts on the role of identity manifestation on social media in behavioral therapy.

  9. Understanding family dynasty: Nurturing the corporate identity across generations

    Directory of Open Access Journals (Sweden)

    Nemilentsev, M.

    2010-01-01

    Full Text Available This study aims to analyse the Ahlstrom annual reports. The content analysis contributes to family business corporate identity. According to the results family business corporate identity is based both on history and on the future. Human resource management, customer relationships, high quality, and also family ownership reflect corporate identity in large family corporations. Modern family business corporate identity is based on continuously developing the business concept and its core competency. Meeting the needs of customers and technical quality standards combined with upgrading and developing the business idea characterises family business corporate identity.

  10. Narrating Organisational Identities by Way of Evolutionary Tales

    DEFF Research Database (Denmark)

    Backer, Lise

    2008-01-01

    The article draws on publicly available data to analyse how, since the Rio Environmental Summit in 1992, the narration of the multinational oil company Shell have projected an evolution from an oil company identity to an identity also embracing renewable energies. In analysing the narrative battles...... over Shell's organisational identity the article contributes to the field of organisational identity theory. It does so by providing a rich description of the micro processes through which individual management actors seek by telling different evolutionary tales to get the larger corporate actor...

  11. A qualitative investigation of masculine identity after traumatic brain injury.

    Science.gov (United States)

    MacQueen, Ruth; Fisher, Paul; Williams, Deirdre

    2018-04-30

    Men are twice as likely as women to experience a traumatic brain injury (TBI), suggesting that aspects of masculine identity contribute to how people acquire their brain injuries. Research also suggests that masculine identity impacts on how people manage their health experiences. The current study aimed to explore the experience of masculine identity following TBI. Individual interviews were conducted with 10 men aged 21-67 years who had experienced a TBI. All were living in the community. Interpretative phenomenological analysis was used to consider lived experiences and to explore the meaning of the TBI experience in relation to masculine identity. Three superordinate themes emerged from the analysis: doing life and relationships differently, self-perceptions and the perceived view of others, and managing the impact of TBI as a man. These themes are considered in relation to how participants' experiences interacted with dominant social ideals of masculine identity. The findings highlighted how masculine identity may be a valuable aspect of self in considering threats to and reconstruction of self-identity after TBI. Aspects of gender identity should be considered in order to promote engagement, support adjustment and achieve meaningful outcomes in rehabilitation.

  12. Patients’ Data Management System Protected by Identity-Based Authentication and Key Exchange

    Directory of Open Access Journals (Sweden)

    Alexandra Rivero-García

    2017-03-01

    Full Text Available A secure and distributed framework for the management of patients’ information in emergency and hospitalization services is proposed here in order to seek improvements in efficiency and security in this important area. In particular, confidentiality protection, mutual authentication, and automatic identification of patients are provided. The proposed system is based on two types of devices: Near Field Communication (NFC wristbands assigned to patients, and mobile devices assigned to medical staff. Two other main elements of the system are an intermediate server to manage the involved data, and a second server with a private key generator to define the information required to protect communications. An identity-based authentication and key exchange scheme is essential to provide confidential communication and mutual authentication between the medical staff and the private key generator through an intermediate server. The identification of patients is carried out through a keyed-hash message authentication code. Thanks to the combination of the aforementioned tools, a secure alternative mobile health (mHealth scheme for managing patients’ data is defined for emergency and hospitalization services. Different parts of the proposed system have been implemented, including mobile application, intermediate server, private key generator and communication channels. Apart from that, several simulations have been performed, and, compared with the current system, significant improvements in efficiency have been observed.

  13. Patients’ Data Management System Protected by Identity-Based Authentication and Key Exchange

    Science.gov (United States)

    Rivero-García, Alexandra; Santos-González, Iván; Hernández-Goya, Candelaria; Caballero-Gil, Pino; Yung, Moti

    2017-01-01

    A secure and distributed framework for the management of patients’ information in emergency and hospitalization services is proposed here in order to seek improvements in efficiency and security in this important area. In particular, confidentiality protection, mutual authentication, and automatic identification of patients are provided. The proposed system is based on two types of devices: Near Field Communication (NFC) wristbands assigned to patients, and mobile devices assigned to medical staff. Two other main elements of the system are an intermediate server to manage the involved data, and a second server with a private key generator to define the information required to protect communications. An identity-based authentication and key exchange scheme is essential to provide confidential communication and mutual authentication between the medical staff and the private key generator through an intermediate server. The identification of patients is carried out through a keyed-hash message authentication code. Thanks to the combination of the aforementioned tools, a secure alternative mobile health (mHealth) scheme for managing patients’ data is defined for emergency and hospitalization services. Different parts of the proposed system have been implemented, including mobile application, intermediate server, private key generator and communication channels. Apart from that, several simulations have been performed, and, compared with the current system, significant improvements in efficiency have been observed. PMID:28362328

  14. Popular Public Discourse at Speakers' Corner: Negotiating Cultural Identities in Interaction

    DEFF Research Database (Denmark)

    McIlvenny, Paul

    1996-01-01

    In this paper I examine how cultural identities are actively negotiated in popular debate at a multicultural public setting in London. Speakers at Speakers' Corner manage the local construction of group affiliation, audience response and argument in and through talk, within the context of ethnic...... in which participant 'citizens' in the public sphere can actively struggle over cultural representation and identities. Using transcribed examples of video data recorded at Speakers' Corner my paper will examine how cultural identity is invoked in the management of active participation. Audiences...... and their affiliations are regulated and made accountable through the routines of membership categorisation and the policing of cultural identities and their imaginary borders....

  15. DEVELOPING PLURILINGUAL IDENTITY IN THIRD LANGUAGE CLASSROOM

    Directory of Open Access Journals (Sweden)

    HACKETT-JONES A.V.

    2015-01-01

    Full Text Available The article analyzes the notions of plurilingualism and plurilingual identity through the prism of the concepts of multilingualism and multilingual identity and the perspective of the theories of bilingualism. The article suggests that plurilingual identity can be viewed as an objective in third language (second foreign language teaching and contemplates specific characteristic imposed on a third language learner by the process of third language acquisition and the necessity of managing a certain imbalance between the degrees of language command and culture experience in different target languages.

  16. DEVELOPING PLURILINGUAL IDENTITY IN THIRD LANGUAGE CLASSROOM

    Directory of Open Access Journals (Sweden)

    HACKETT-JONES A.V.

    2015-12-01

    Full Text Available The article analyzes the notions of plurilingualism and plurilingual identity through the prism of the concepts of multilingualism and multilingual identity and the perspective of the theories of bilingualism. The article suggests that plurilingual identity can be viewed as an objective in third language (second foreign language teaching and contemplates specific characteristic imposed on a third language learner by the process of third language acquisition and the necessity of managing a certain imbalance between the degrees of language command and culture experience in different target languages.

  17. Claims and Identity: On-Premise and Cloud Solutions

    Science.gov (United States)

    Bertocci, Vittorio

    Today's identity-management practices are often a patchwork of partial solutions, which somehow accommodate but never really integrate applications and entities separated by technology and organizational boundaries. The rise of Software as a Service (SaaS) and cloud computing, however, will force organizations to cross such boundaries so often that ad hoc solutions will simply be untenable. A new approach that tears down identity silos and supports a de-perimiterized IT by design is in order.This article will walk you through the principles of claims-based identity management, a model which addresses both traditional and cloud scenarios with the same efficacy. We will explore the most common token exchange patterns, highlighting the advantages and opportunities they offer when applied on cloud computing solutions and generic distributed systems.

  18. Identity threat at work: how social identity threat and situational cues contribute to racial and ethnic disparities in the workplace.

    Science.gov (United States)

    Emerson, Katherine T U; Murphy, Mary C

    2014-10-01

    Significant disparities remain between racial and ethnic minorities' and Whites' experiences of American workplaces. Traditional prejudice and discrimination approaches explain these gaps in hiring, promotion, satisfaction, and well-being by pointing to the prejudice of people within organizations such as peers, managers, and executives. Grounded in social identity threat theory, this theoretical review instead argues that particular situational cues-often communicated by well-meaning, largely unprejudiced employees and managers-signal to stigmatized groups whether their identity is threatened and devalued or respected and affirmed. First, we provide an overview of how identity threat shapes the psychological processes of racial and ethnic minorities by heightening vigilance to certain situational cues in the workplace. Next, we outline several of these cues and their role in creating and sustaining perceptions of identity threat (or safety). Finally, we provide empirically grounded suggestions that organizations may use to increase identity safety among their employees of color. Taken together, the research demonstrates how situational cues contribute to disparate psychological experiences for racial and ethnic minorities at work, and suggests that by altering threatening cues, organizations may create more equitable, respectful, and inclusive environments where all people may thrive. (PsycINFO Database Record (c) 2014 APA, all rights reserved).

  19. Connecting the dots within: creative performance and identity integration.

    Science.gov (United States)

    Cheng, Chi-Ying; Sanchez-Burks, Jeffrey; Lee, Fiona

    2008-11-01

    In two studies drawing from social identity theory and the creative-cognition approach, we found that higher levels of identity integration--perceived compatibility between two social identities--predict higher levels of creative performance in tasks that draw on both identity-relevant knowledge domains. Study 1 showed that Asian Americans with higher identity integration were more creative in developing new dishes using a given set of ingredients, but only when both Asian and American ingredients were available. Study 2 showed that female engineers with higher identity integration were more creative in designing a product, but only when the product was targeted to female users. These findings suggest that the psychological management of multiple social identities may be related to accessibility of multiple knowledge domains, which in turn influences creativity.

  20. Global business management for sustainability and competitiveness: The role of corporate branding, corporate identity and corporate reputation

    OpenAIRE

    Gupta, Suraksha; Melewar, T.C.; Czinkota, Michael C.

    2013-01-01

    This special issue of the Journal of World Business is devoted to the role of intangibles of a firm in building sustainable business for success in competitive markets. The research articles included in this issue have contributed to the on-going academic knowledge about the ability of marketing and management practices to drive business sustainability. This special issue on business sustainabili- ty focuses on the role of corporate branding, corporate identity and corporate reputation.

  1. Bringing Federated Identity to Grid Computing

    Energy Technology Data Exchange (ETDEWEB)

    Teheran, Jeny [Fermilab

    2016-03-04

    The Fermi National Accelerator Laboratory (FNAL) is facing the challenge of providing scientific data access and grid submission to scientific collaborations that span the globe but are hosted at FNAL. Users in these collaborations are currently required to register as an FNAL user and obtain FNAL credentials to access grid resources to perform their scientific computations. These requirements burden researchers with managing additional authentication credentials, and put additional load on FNAL for managing user identities. Our design integrates the existing InCommon federated identity infrastructure, CILogon Basic CA, and MyProxy with the FNAL grid submission system to provide secure access for users from diverse experiments and collab orations without requiring each user to have authentication credentials from FNAL. The design automates the handling of certificates so users do not need to manage them manually. Although the initial implementation is for FNAL's grid submission system, the design and the core of the implementation are general and could be applied to other distributed computing systems.

  2. Why do I dread looking old?: A test of social identity theory, terror management theory, and the double standard of aging.

    Science.gov (United States)

    Chonody, Jill M; Teater, Barbra

    2016-01-01

    Outward appearance is one of the means by which age is determined, and fear of looking old may stem from fears about social identity and death. This study explored how social identity theory and terror management theory may help to explain the dread of looking old. University students from the United States, England, and Australia (N = 1,042) completed a questionnaire regarding their attitudes about aging and older adults. Results indicated that sex, age, beliefs about personal aging, and death anxiety explained 30.4% of the variance for participants' dread of looking old. Theoretical hypotheses were supported by our findings.

  3. Facilitating Conversations about Managerial Identities

    DEFF Research Database (Denmark)

    Madsen, Mona Toft

    -based organization in the engineering consulting sector b) a reflection meeting, where the same three managers were gathered, and conversations were facilitated based on identity work in the context of earlier interviews. More specifically, three themes were discussed; flat organizational structure, tensions between...

  4. Developing Professional Identity in an Online Learning Environment

    DEFF Research Database (Denmark)

    Horn, Line Helverskov

    2015-01-01

    identity as the outcome for the intern. This paper describes the interactions in an online learning environment. The online platform sought to enable peer interaction between younger and older students in a discussion of the professional identity of Natural and Cultural Heritage Management (NCHM......From a socio-cultural perspective, the development of a professional identity is an on-going process that is social in nature and negotiated in communities of practice (Wenger, 1998). Internships in higher education function as such communities of practice, with an improved sense of professional...

  5. PRODUCT BRAND IDENTITY – A FACTOR OF SUCCESSFUL MARKET POSITIONING OF A BRAND

    Directory of Open Access Journals (Sweden)

    Branislav Lijović

    2012-12-01

    Full Text Available This paper begins with the term product brand identity as the new market paradigm. It aims to define the term product brand identity and its significance for realisation of the market value of a product’s brand and overall marketing goals of an economic operator. The strategy of economic operator and desired market positioning of a brand is implemented by means of product brand identity and a combination of its elements. Systematic creation and identity management of a product’s brand resulted in the uniqueness of the brand, and set the foundation for building the entire process of product brand management.

  6. Investigating of the effect of entrepreneurial orientations on formation of entrepreneurial identity

    Directory of Open Access Journals (Sweden)

    Manoochehr Parsian

    2016-10-01

    Full Text Available In today’s changing world, success belongs to the communities and organizations that make a significant relationship between scarce resources and capabilities of management and entrepreneurship of their human resource. In other words, societies and the organizations can move forward in the development path that, with creating the necessary conditions, equip their human resources to productive entrepreneurial knowledge and skills to conduct other organizations and community resources to create value and achieve the development, management. Formation of entrepreneurial identity plays an important role for the development of the entrepreneurial spirit in society. In this paper, given the importance of entrepreneurial identity, the role of entrepreneurial orientations based on Lampkin and Dess (1996 [Lumpkin, G. T., & Dess, G. G. (1996. Clarifying the entrepreneurial orientation construct and linking it to performance. Academy of Management Review, 21(1, 135-172.] is investigated on entrepreneurial identity of the municipality of Qom using a questionnaire consists of 18 items. The results show entrepreneurial orientation influences significantly on entrepreneurial identity.

  7. Expanding the disaster risk management framework: Measuring the constructed level of national identity as a factor of political risk

    Directory of Open Access Journals (Sweden)

    Barend Prinsloo

    2016-08-01

    Full Text Available Political risk is identified as a dominant risk category of disaster risk management (DRM which could negatively affect the success of those measures implemented to reduce disaster risk. Key to political risk is the construct of national identity which, if poorly constructed, could greatly contribute to political risk. This article proposed a tool to measure the construct of national identity and to provide recommendations to strengthen the construct in order to mitigate the exacerbating influence it may have on political risk and ultimately on DRM. The design of the measurement tool consisted of a mixed methodological approach employing both quantitative and qualitative data. The data collection instruments included a literature review (which is shortly provided in the previous sections and an empirical study that utilised data obtained through structured questionnaires. Although the results of the proposed measuring instrument did not include a representative sample of all the cultures in SouthAfrica, the results alluded to different levels for the construction of national identity among black and white respondents, possibly because of different ideological expectations among these groups. The results of the study should be considered as a validation of the measuring tool and not necessarily of the construct of national identity in South Africa. The measuring tool is thus promising for future studies to reduce political risk and ultimately disaster risk.

  8. Threat of the feminine identity: The emerging structure in exploring the process of women's empowerment for menopause management: A grounded theory study

    Directory of Open Access Journals (Sweden)

    Mansoureh Yazdkhasti

    2016-11-01

    Full Text Available Women empowerment in different spheres of life especially menopause is among the key elements of health promotion in all communities. However there is no realistic images of empowering women in menopausal symptoms management. The present survey aimed to explain the process of women's empowerment for menopausal symptoms management. This qualitative study is part of a larger project which was conducted using Grounded Theory between 2013 and 2015. The article's main focus was to explore the underlying conditions and factors affecting the process of women's empowerment. Using a purposive and theoretical sampling method, 25 participants were interviewed 28 times. Data was collected through some in-depth, semi-structural and open ended interviews with the participant and also memoing and field notes. The interviews were conducted in Neighborhoods House affiliated to Tehran municipality and two gynecological clinics affiliated to Tehran University of Medical Sciences. Data analysis was applied through Strauss and Corbin approach (2008 using MAXQDA10 software. Threat of the feminine identity has been noted as the women's most common concern to being empowered in menopause management. The key theme emerged in the present study (threat of the feminine identity included four main categories (consciousness about the likelihood of femininity decline, negative attitude towards herself, inadequate supportive context, latent opportunity, two subcategories and 109 first-level codes. There is a logical, coherent and integrated relationship between all these concepts and the theme of feminine identity threat. This theme is considered as an underlying social problem and a major concern for postmenopausal women in the context of this group of women's empowerment. The factors (barriers and facilitators affecting women's empowerment in menopause management are associated with social context, intensity and origin of each society. Evaluation of Iranian women

  9. Developing a workable teacher identity: Building and negotiating identity within a professional network

    Science.gov (United States)

    Rostock, Roseanne

    The challenge of attracting and retaining the next generation of teachers who are skilled and committed to meeting the growing demands of the profession is of increasing concern to researchers and policy makers, particularly since 45--50% of beginning teachers leave the profession within five years (Ingersoll & Smith, 2003). Reasons for such attrition include compensation, status and working conditions; however, there is growing evidence that a critical factor in new teacher retention hinges on teachers' ability to accomplish the difficult task of forming a workable professional identity in the midst of competing discourses about teaching (Alsup, 2006; Britzman, 2003). There is little research on professional identity development among those beginning teachers at highest risk for attrition (secondary math and science teachers, and those with strong academic backgrounds). This study explores the professional identity development of early-career math and science teachers who are part of the Knowles Science Teaching Foundation's (KSTF) teaching fellowship program, an external support network that aims to address many of the issues leading to high attrition among this particular population of teachers. Using narrative research methods, I examine three case studies of beginning teachers, exploring how they construct professional identity in relation to various discourse communities and negotiate tensions across multiple discourses. The cases identify both dominant discourses and counter-discourses that the teachers draw upon for important identity development resources. They also demonstrate that the way a teacher manages tensions across competing discourses is important to how well one can negotiate a workable professional identity. In particular, they emphasize the importance of engaging in borderland discourses (Gee, 1996) as a way of taking agency in one's own identity development as well as in transforming one's discourse communities. These cases shed light on how

  10. 'Don Fabio' and the taming of the three lions: the discursive construction of a foreign England manager's identity in the sports online written media

    Directory of Open Access Journals (Sweden)

    Dermot Brendan Heaney

    2012-11-01

    Full Text Available This article considers the appointment of a foreign manager to coach a national football team from the perspective of discursive identity construction. The data is comprised of three corpora of online versions of newspaper articles, each corresponding to a phase in Fabio Capello’s first two years of tenure. Reflecting current trends in Critical Discourse Analysis, qualitative close analysis is carried out on two articles from each corpus while quantitative analysis is extended across each corpus to identify salient and consistent aspects of discursive identity construction. Exploiting the multi-disciplinary basis of CDA, the data is examined in terms of transitivity, lexis (comprising vocabulary, collocation, deixis, and intertextuality, and narrative identity construction. Micro-analysis of grammatical and linguistic patterns is applied to indicate patterns in press coverage in each phase, and a corresponding overview considers how aspects of identity work diffused through each corpus cohere into general storylines.

  11. 'Don Fabio' and the taming of the three lions: the discursive construction of a foreign England manager's identity in the sports online written media

    Directory of Open Access Journals (Sweden)

    Dermot Brendan Heaney

    2013-06-01

    Full Text Available This article considers the appointment of a foreign manager to coach a national football team from the perspective of discursive identity construction. The data is comprised of three corpora of online versions of newspaper articles, each corresponding to a phase in Fabio Capello’s first two years of tenure. Reflecting current trends in Critical Discourse Analysis, qualitative close analysis is carried out on two articles from each corpus while quantitative analysis is extended across each corpus to identify salient and consistent aspects of discursive identity construction. Exploiting the multi-disciplinary basis of CDA, the data is examined in terms of transitivity, lexis (comprising vocabulary, collocation, deixis, and intertextuality, and narrative identity construction. Micro-analysis of grammatical and linguistic patterns is applied to indicate patterns in press coverage in each phase, and a corresponding overview considers how aspects of identity work diffused through each corpus cohere into general storylines.

  12. Organizational Identity Expressiveness and Perception Management : Principles for Expressing the Organizational Identity in Order to Manage External Stakeholders’ Perceptions of a Company

    NARCIS (Netherlands)

    M.D. van Halderen (Mignon)

    2008-01-01

    textabstractIt is especially during the past decade that stakeholders have become extremely heedful of organizations and their activities. A dominant organizational response of companies to this development is to express their organizational identity, in terms of who they are, what they stand for,

  13. Personae of interest - managers' identities and the online mirror

    NARCIS (Netherlands)

    Ranzini, G; Fieseler, C.

    2013-01-01

    Purpose - In this chapter we discuss the implications social media have for the selfrepresentation and identity formulation of professionals within organizations. Under the assumption that new, technology-mediated networking possibilities call for a reformulation of the boundaries between the

  14. Managing two cultural identities: the malleability of bicultural identity integration as a function of induced global or local processing.

    Science.gov (United States)

    Mok, Aurelia; Morris, Michael W

    2012-02-01

    Increasingly, individuals identify with two or more cultures. Prior research has found the degree to which individuals chronically integrate these identities (bicultural identity integration; BII) moderates responses to cultural cues: High BII individuals assimilate (adopting biases that are congruent with norms of the cued culture), whereas low BII individuals contrast (adopting biases that are incongruent with these norms). The authors propose BII can also be a psychological state and modulated by shifts in processing styles. In four experiments, the authors induced a global or local processing style using physical posture (Experiment 1) and cognitive manipulations (Experiments 2-4) and found that BII is enhanced in contexts facilitating a more global processing style (i.e., smiling, high-level construal, and similarity focus). The authors also found that contrastive responses to cultural cues are diminished when BII is situationally enhanced. Implications for research on processing style, identity integration, and performance in culture-based situations are discussed.

  15. Juggling identities of rheumatoid arthritis, motherhood and paid work - a grounded theory study.

    Science.gov (United States)

    Feddersen, Helle; Mechlenborg Kristiansen, Tine; Tanggaard Andersen, Pernille; Hørslev-Petersen, Kim; Primdahl, Jette

    2018-02-01

    To explore how women with rheumatoid arthritis manage their illness, motherhood, and work life. A constructivist, grounded theory approach based on individual interviews and participant observations with 20 women with rheumatoid arthritis who participated in work life and had children living at home or were pregnant. After initial and focused coding Goffman's concepts of social identity were applied. A core category: "Juggling meaningful identities" and three conceptual categories were developed: (1) Work life as the strongest identity marker; (2) Motherhood: a two-sided act; (3) Living with rheumatoid arthritis as an identity? Paid work, motherhood, and illness are linked to the women's social identities. The women construct and change their identities in interactions with children, partners, other parents, colleagues, and employers. The women attribute the highest priority to their professional identity, spending the majority of their time and energy in an effort to appear as "good stable workers". The disease is seen as a hindrance in this regard, and the illness identity is almost completely rejected. In motherhood, the women prioritize close interaction with their children, and deprioritize external activities. Extended outbreaks of the disease and issues regarding the children force the women to deprioritize working life. Implications for rehabilitation Juggling meaningful identities of rheumatoid arthritis, motherhood, and paid work challenge women in managing their everyday lives. Therefore, rehabilitation professionals should support individuals to develop new strategies to manage the challenges they experience regarding juggling motherhood and work ability. Work is a dominant identity marker for women with rheumatoid arthritis therefore, rehabilitation professionals have an important role to play in investigating possible ways for the individual to maintain employment or return to work. Living with rheumatoid arthritis and being a paid worker challenge

  16. Managing risk and marginalizing identities: on the society-of-captives thesis and the harm of social dis-ease.

    Science.gov (United States)

    Arrigo, Bruce A

    2013-06-01

    This article develops the constitutive features of the society-of-captives thesis as suggested by Arrigo and Milovanovic, and Arrigo, Bersot, and Sellers. The relevance of this thesis is briefly explored in relation to the institutional and community-based treatment philosophies that currently inform the mental health and criminal justice systems. This exploration specifies how risk (being human and doing humanness differently) is managed symbolically, linguistically, materially, and culturally. The management of this risk extends to the kept as well as to their keepers, regulators, and watchers (i.e., the society of captives). This article calls for a new clinical praxis (being/doing a critical mindfulness) designed to overcome the totalizing madness (the harm of social dis-ease) that follows from managing risk fearfully and marginalizing identities desperately as reified recursively through society's captivity. The ethical underpinnings of this clinical praxis represent an emergent direction for undertaking correctional policy reform.

  17. Secondary Uses of Personal Identity Information: Policies, Technologies and Regulatory Framework

    DEFF Research Database (Denmark)

    Adjei, Joseph K.; Olesen, Henning

    2012-01-01

    Although personal identity information must primarily be used for protecting and promoting the physical needs of individuals, it has also become central to the business models of the digital age due to its use for other secondary purposes, resulting in various innovative identity management (Id...

  18. Islamic Identity and Competitive Identities (Global, National and Ethnic Identity; A Case Study of Shiraz University Students

    Directory of Open Access Journals (Sweden)

    Mohammadtaghi Iman

    2013-06-01

    Full Text Available The verse of holy Koran "verily the most honored of you in the sight of Allah is [he who is] the most virtuous of you" directly shows that in god's willing there is no superiority of a man or a group than others except those who have piety to god. In fact, the Islamic identity focuses on the superiority of piety among humans and does not focus on superiority of a man or a group that causes Islamic identity theoretically be against other competitive identities such as ethnic, global and national identity. Therefore, this research aims to study the relationship between Islamic identity and competitive identities (ethnic, national and global. In this way based on Sheldon Stryker theory and survey method, 431 students have elected and have analyzed. The results have shown that there was positive significant relationship between Islamic identity, national and ethnic identity, and negative significant relationship between Islamic identity and global identity. In addition, multivariate regression results have shown that the variables national and global identities have explained 45 percent of the variation of Islamic identity variable. The results shows that national and ethnic identity amplify the Islamic identity and they have positive relationship with it and in fact they are not a competitive identity for Islamic identity but global identity has negative relationship with Islamic identity and therefore it is a competitive identity for Islamic identity.

  19. Material Construction of Care Workers’ Identity

    Directory of Open Access Journals (Sweden)

    Sanna Laulainen

    2016-03-01

    Full Text Available This article takes a critical look at the unconscious and unnoticed effects of materiality on care workers’ identity. The data was collected through nonactive role-playing using written accounts, in which the respondents described how they felt about working in fictitious ‘good’ or ‘bad’ elderly care homes. The data was analyzed with rhetorical analysis. Five different identity strategies were identified in the accounts. Strong professional identity was defended by downplaying the significance of materiality. Adjustment and passive compliance were used to adjust to physical shortcomings of the work environment. A ‘rebellion’ was described as an extreme course of action to resolve the contradiction between good care and poor facilities. At its best, the materiality of care homes, in particular homelikeness, seemed to support professional identity. These identity strategies illustrate how care workers balance between the physical realities of care homes and the requirements of the ethos of care, which are often incompatible with each other. It is crucial that managers as well as workers themselves recognize and acknowledge these connections affecting motivation and commitment to care work. Investments in better environments could be one way to improve the image and the attractiveness of the care branch and relieve the recruitment problems.

  20. Constructing nurses' professional identity through social identity theory.

    Science.gov (United States)

    Willetts, Georgina; Clarke, David

    2014-04-01

    The profession of nursing continues to struggle with defining and clarifying its professional identity. The definitive recognition of nursing as a profession was the moving of training from the hospital apprentice model to the tertiary sector. However, this is only part of the story of professional identity in nursing. Once training finishes and enculturation into the workplace commences, professional identity becomes a complicated social activity. This paper proposes social identity theory as a valuable research framework to assist with clarifying and describing the professional identity of nurses. The paper outlines the key elements of a profession and then goes on to describe the main concepts of social identity theory. Lastly, a connection is made between the usefulness of using social identity theory in researching professional identity in nursing, recognizing the contextual nature of the social activity of the profession within its workplace environment. © 2013 Wiley Publishing Asia Pty Ltd.

  1. The Scanfin Merger: a Matter of Culture and Identity (Case A)

    DEFF Research Database (Denmark)

    Smith, Pernille; Carugati, Andrea; Giangreco, Antonio

    and middle managers reacted to the merger. The issues in this case are culture and identity. What are the implications when companies from four different countries merge? What role does differing cultures (national or organisational) play in the process and how does this affect the identity of the company...

  2. Current management of gender identity disorder in childhood and adolescence: guidelines, barriers and areas of controversy.

    Science.gov (United States)

    Shumer, Daniel E; Spack, Norman P

    2013-02-01

    The approach to gender identity disorder (GID) in childhood and adolescence has been rapidly evolving and is in a state of flux. In an effort to form management recommendations on the basis of the available literature, The Endocrine Society published clinical practice guidelines in 2009. The guidelines recommend against sex role change in prepubertal children, but they recommend the use of gonadotropin-releasing hormone (GnRH) agonists to suppress puberty in adolescence, and the use of cross-sex hormones starting around age 16 for eligible patients. In actual practice, the approach to GID is quite variable due to continued lack of consensus and specific barriers to treatment that are unique to GID. Recent literature has focused on the mental health approach to prepubertal children with GID and short-term outcomes using pubertal suppression and cross-sex steroids in adolescents with GID. This review will describe the literature published since the release of The Endocrine Society guidelines regarding the management of GID in both children and adolescents.

  3. CAH AMPERA: HYBRID IDENTITY OF KAMPUNG YOUTHS IN NEGOTIATING CITIZENSHIP

    Directory of Open Access Journals (Sweden)

    Subando Agus Margono

    2014-06-01

    Full Text Available This article attempts to investigate the negotiating process for citizenship of a group of youths facing entrenched social, cultural, and political exclusion. It examines the phenomenon of citizenship negotiation based on stigmatized position of exluded youths. It was found that despite overwhelming odds, the youths use their hybrid identity, which is a manifestation of cah Ampera identity. They succeed in managing the antagonism and affiliation. The citizenship of cah Ampera ismanaged through symbolic capital and action in village micro politics. Success is reflected in their ability to manage their relations with adults, employment, and their young world.

  4. Role of Education in Promoting National Identity Indicators

    Directory of Open Access Journals (Sweden)

    Mohammad Baqer Alizadeh Aghdam

    2010-04-01

    Full Text Available This article reviews social identity among students of secondary school with emphasis on national identity. This paper is to answer how we can increase students` belonging to national identity. Two high school students in two areas of Zanjan city with 700 people are the sample of this study which 30 persons were selected to attend the workshop. This research, based on objective, is practical and problem solving and based on time is longitudinal and panel study. The Research method is qualitative and the technique is based on PCM (Project Cycle Management. Theoretically, Tajfle, Giddens, Jenkins and Pyter Burk`s approaches are used in addition to micro, macro and combinational perspectives. Data collection in this study is through workshop and questionnaire. Research findings showed that students` belonging to national Identity have 10 percent increases since the workshop performance. Belonging to the national identity in male students has increased to 15 percent and in female students 5 percent after the workshop. Both female and male students` belongings to national identity have doubled after the workshop. Moreover, students’ familiarity with Iranian national figures, elements of national culture, the historical and national monuments and some national myths, which are all elements of national identity, have doubled after the workshop.

  5. Brief report: The Utrecht-Management of Identity Commitments Scale (U-MICS) : Gender and age measurement invariance and convergent validity of the Turkish version

    NARCIS (Netherlands)

    Morsunbul, Umit; Crocetti, Elisabetta; Cok, Figen; Meeus, W.H.J.

    2014-01-01

    The purpose of this study was to evaluate the factor structure and convergent validity of the Turkish version of the Utrecht-Management of Identity Commitments Scale (U-MICS). Participants were 1201 (59.6% females) youth aged between 12 and 24 years (Mage = 17.53 years, SDage = 3.25). Results

  6. Resolving an identity crisis: Implicit drinking identity and implicit alcohol identity are related but not the same.

    Science.gov (United States)

    Ramirez, Jason J; Olin, Cecilia C; Lindgren, Kristen P

    2017-09-01

    Two variations of the Implicit Association Test (IAT), the Drinking Identity IAT and the Alcohol Identity IAT, assess implicit associations held in memory between one's identity and alcohol-related constructs. Both have been shown to predict numerous drinking outcomes, but these IATs have never been directly compared to one another. The purpose of this study was to compare these IATs and evaluate their incremental predictive validity. US undergraduate students (N=64, 50% female, mean age=21.98years) completed the Drinking Identity IAT, the Alcohol Identity IAT, an explicit measure of drinking identity, as well as measures of typical alcohol consumption and hazardous drinking. When evaluated in separate regression models that controlled for explicit drinking identity, results indicated that the Drinking Identity IAT and the Alcohol Identity IAT were significant, positive predictors of typical alcohol consumption, and that the Drinking Identity IAT, but not the Alcohol Identity IAT, was a significant predictor of hazardous drinking. When evaluated in the same regression models, the Drinking Identity IAT, but not the Alcohol Identity IAT, was significantly associated with typical and hazardous drinking. These results suggest that the Drinking Identity IAT and Alcohol Identity IAT are related but not redundant. Moreover, given that the Drinking Identity IAT, but not the Alcohol Identity IAT, incrementally predicted variance in drinking outcomes, identification with drinking behavior and social groups, as opposed to identification with alcohol itself, may be an especially strong predictor of drinking outcomes. Copyright © 2017 Elsevier Ltd. All rights reserved.

  7. Keeping identity private

    DEFF Research Database (Denmark)

    Adjei, Joseph K.; Olesen, Henning

    2011-01-01

    information. On the other hand, consumers have expressed concerns that their rights and ability to control their personal information are violated. Paradoxically, it appears that users provide personal data freely and willingly, as it has been observed on Facebook and other social networks. This study...... is an attempt to understand the relationship between individuals’ intentions to disclose personal information, their actual personal information disclosure behaviours, and how these can be leveraged to develop privacy-enhancing identity management systems (IDMS) that users can trust. Legal, regu...

  8. Marketing identities: Shifting circles of identification in inter-organizational relationships

    NARCIS (Netherlands)

    Ellis, N.; Ybema, S.B.

    2010-01-01

    This study explores the discursive positioning of managers involved in inter-organizational relationships (IORs) within industrial supply chains. In closely examining a series of interviews, we find a number of interpretive repertoires of boundary construction used in IOR managers' identity

  9. New nurse transition: success through aligning multiple identities.

    Science.gov (United States)

    Leong, Yee Mun Jessica; Crossman, Joanna

    2015-01-01

    The purpose of this paper is to explore the perceptions of new nurses in Singapore of their experiences of role transition and to examine the implications for managers in terms of employee training, development and retention. This qualitative study was conducted using a constructivist grounded theory approach. In total 26 novice nurses and five preceptors (n=31) from five different hospitals participated in the study. Data were collected from semi-structured interviews and reflective journal entries and analysed using the constant comparative method. The findings revealed that novice nurses remained emotionally and physically challenged when experiencing role transition. Two major constructs appear to play an important part in the transition process; learning how to Fit in and aligning personal with professional and organisational identities. The findings highlight factors that facilitate or impede Fitting in and aligning these identities. Although the concept of Fitting in and its relation to the attrition of novice nurses has been explored in global studies, that relationship has not yet been theorised as the dynamic alignment of multiple identities. Also, whilst most research around Fitting in, identity and retention has been conducted in western countries, little is known about these issues and their interrelationship in the context of Singapore. The study should inform decision making by healthcare organisations, nurse managers and nursing training institutions with respect to improving the transition experience of novice nurses.

  10. Leadership identities

    DEFF Research Database (Denmark)

    Holmgreen, Lise-Lotte

    2018-01-01

    Questioning the assumption that identities can be controlled through a shared organisational culture, the article explores the inculcation of a discourse of diversity into leadership identities in a Danish bank and building society. Thus, it intends to demonstrate that, on the one hand, discourse...... plays a significant role in identity construction and, on the other, that leaders’ constructions may have many sources of inspiration within and outside the organisation, emphasising that identity construction is a complex process in which organisational efforts to promote a common leadership identity...... to construct their leadership identities. While the respondents present comparable identities to the interviewer, the analysis reveals that the they draw on different discourses and employ a number of different discursive means to present this identity. This, the article argues, may be the result of a number...

  11. Rapid Transformation in a Dual Identity Defense University

    National Research Council Canada - National Science Library

    Sekerka, Leslie E; Zolin, Roxanne; Simon, Cary

    2005-01-01

    .... Transcripts were thematically analyzed. The findings contributed to the development of a model to depict the effects of a specialized management identity that employs a deletion strategy using coercion to effect rapid transformation...

  12. Brief report: The Utrecht-Management of Identity Commitments Scale (U-MICS): Gender and age measurement invariance and convergent validity of the Turkish version

    NARCIS (Netherlands)

    Morsunbul, Umit; Crocetti, Elisabetta; Cok, Figen; Meeus, Wim

    2014-01-01

    The purpose of this study was to evaluate the factor structure and convergent validity of the Turkish version of the Utrecht-Management of Identity Commitments Scale (U-MICS). Participants were 1201 (59.6% females) youth aged between 12 and 24 years (Mage=17.53 years, SDage=3.25). Results indicated

  13. Brief report: the Utrecht-Management of Identity Commitments Scale (U-MICS): gender and age measurement invariance and convergent validity of the Turkish version.

    Science.gov (United States)

    Morsunbul, Umit; Crocetti, Elisabetta; Cok, Figen; Meeus, Wim

    2014-08-01

    The purpose of this study was to evaluate the factor structure and convergent validity of the Turkish version of the Utrecht-Management of Identity Commitments Scale (U-MICS). Participants were 1201 (59.6% females) youth aged between 12 and 24 years (M(age) = 17.53 years, SD(age) = 3.25). Results indicated that the three-factor model consisting of commitment, in-depth exploration, and reconsideration of commitment provided a very good fit to the data and applied equally well to boys and girls as well as to three age groups (early adolescents, middle adolescents, and emerging adults). Significant relations between identity processes and self-concept clarity, personality, internalizing and externalizing problem behaviors, and parental relationships supported convergent validity. Thus, the Turkish version of U-MICS is a reliable tool for assessing identity in Turkish-speaking respondents. Copyright © 2014 The Foundation for Professionals in Services for Adolescents. Published by Elsevier Ltd. All rights reserved.

  14. Exercisers' identities and exercise dependence: the mediating effect of exercise commitment.

    Science.gov (United States)

    Lu, Frank Jing-Horng; Hsu, Eva Ya-Wen; Wang, Junn-Ming; Huang, Mei-Yao; Chang, Jo-Ning; Wang, Chien-Hsin

    2012-10-01

    The purpose of this study was to examine the associations of exercise identity, exercise commitment, exercise dependence, and, particularly, the mediating effects of exercise commitment on the relationship between exercise identity and exercise dependence. 253 Taiwanese regular exercisers completed measures, including the Exercise Dependence Scale-Revised, the Exercise Identity Scale, the Exercise Commitment Scale, and the Godin Leisure Time Exercise Questionnaire. Results showed that exercise identity, exercise dependence, and two types of exercise commitment were moderately to highly correlated. Furthermore, structural equation modelling indicated that a "have to" commitment partially mediated the relationship between exercise identity and exercise dependence. Based on the mediating role of a "have to" commitment, the findings are particularly informative to exercise instructors and for exercise program managers.

  15. National and Gender Measurement Invariance of the Utrecht-Management of Identity Commitments Scale (U-MICS): A 10-Nation Study With University Students.

    Science.gov (United States)

    Crocetti, Elisabetta; Cieciuch, Jan; Gao, Cheng-Hai; Klimstra, Theo; Lin, Ching-Ling; Matos, Paula Mena; Morsünbül, Ümit; Negru, Oana; Sugimura, Kazumi; Zimmermann, Grégoire; Meeus, Wim

    2015-12-01

    The purpose of this study was to examine the psychometric properties of the Utrecht-Management of Identity Commitments Scale (U-MICS), a self-report measure aimed at assessing identity processes of commitment, in-depth exploration, and reconsideration of commitment. We tested its factor structure in university students from a large array of cultural contexts, including 10 nations located in Europe (i.e., Italy, the Netherlands, Poland, Portugal, Romania, and Switzerland), Middle East (i.e., Turkey), and Asia (i.e., China, Japan, and Taiwan). Furthermore, we tested national and gender measurement invariance. Participants were 6,118 (63.2% females) university students aged from 18 to 25 years (Mage = 20.91 years). Results indicated that the three-factor structure of the U-MICS fitted well in the total sample, in each national group, and in gender groups. Furthermore, national and gender measurement invariance were established. Thus, the U-MICS can be fruitfully applied to study identity in university students from various Western and non-Western contexts. © The Author(s) 2015.

  16. Gender identity and the management of the transgender patient: a guide for non-specialists.

    Science.gov (United States)

    Joseph, Albert; Cliffe, Charlotte; Hillyard, Miriam; Majeed, Azeem

    2017-04-01

    In this review, we introduce the topic of transgender medicine, aimed at the non-specialist clinician working in the UK. Appropriate terminology is provided alongside practical advice on how to appropriately care for transgender people. We offer a brief theoretical discussion on transgenderism and consider how it relates to broader understandings of both gender and disease. In respect to epidemiology, while it is difficult to assess the exact size of the transgender population in the UK, population surveys suggest a prevalence of between 0.2 and 0.6% in adults, with rates of referrals to gender identity clinics in the UK increasing yearly. We outline the legal framework that protects the rights of transgender people, showing that is not legal for physicians to deny transgender people access to services based on their personal beliefs. Being transgender is often, although not always, associated with gender dysphoria, a potentially disabling condition in which the discordance between a person's natal sex (that assigned to them at birth) and gender identity results in distress, with high associated rates of self-harm, suicidality and functional impairment. We show that gender reassignment can be a safe and effective treatment for gender dysphoria with counselling, exogenous hormones and surgery being the mainstay of treatment. The role of the general practitioner in the management of transgender patients is discussed and we consider whether hormone therapy should be initiated in primary care in the absence of specialist advice, as is suggested by recent General Medical Council guidance.

  17. Identity, identity politics, and neoliberalism

    Directory of Open Access Journals (Sweden)

    Wrenn Mary

    2014-01-01

    Full Text Available With the intensification of neoliberalism, it is useful to examine how some individuals might cope with the irrationality of the system. Neoliberalism cloaks the execution of the corporate agenda behind rhetorical manipulation that advocates for limited government. The corollary absence of government involvement on behalf of the citizenry writ large disarms the means of social redress for the individual. Democracy funded and fueled by corporate power thereby disenfranchises the individual, provoking some to search for empowerment through identity politics. The argument set forth suggests that individuals construct, reinforce, or escalate allegiance to identities as a coping mechanism, some of which manifest in violent identity politics.

  18. "It Was Not Me That Was Sick, It Was the Building": Rhetorical Identity Management Strategies in the Context of Observed or Suspected Indoor Air Problems in Workplaces.

    Science.gov (United States)

    Finell, Eerika; Seppälä, Tuija; Suoninen, Eero

    2018-07-01

    Suffering from a contested illness poses a serious threat to one's identity. We analyzed the rhetorical identity management strategies respondents used when depicting their health problems and lives in the context of observed or suspected indoor air (IA) problems in the workplace. The data consisted of essays collected by the Finnish Literature Society. We used discourse-oriented methods to interpret a variety of language uses in the construction of identity strategies. Six strategies were identified: respondents described themselves as normal and good citizens with strong characters, and as IA sufferers who received acknowledge from others, offered positive meanings to their in-group, and demanded recognition. These identity strategies located on two continua: (a) individual- and collective-level strategies and (b) dissolved and emphasized (sub)category boundaries. The practical conclusion is that professionals should be aware of these complex coping strategies when aiming to interact effectively with people suffering from contested illnesses.

  19. The Process of Identity Work: Negotiating a Work Identity

    NARCIS (Netherlands)

    Crafford, A.; Adams, B.G.; Saayman, T.; Vinkenburg, C.J.; Jansen, P.G.W.; Roodt, G.

    2015-01-01

    Identity work is an important process in negotiating, regulating and maintaining a coherent sense of self-(identity). In this chapter we discuss how identity work is particularly useful in establishing a work identity. The crux of the discussion in this chapter is based on the qualitative phase of

  20. E-dating, identity and HIV prevention: theorising sexualities, risk and network society.

    Science.gov (United States)

    Davis, Mark; Hart, Graham; Bolding, Graham; Sherr, Lorraine; Elford, Jonathan

    2006-05-01

    This paper addresses how London gay men use the internet to meet sexual partners, or for e-dating. Based on qualitative interviews conducted face-to-face or via the internet, this research develops an account of how information technologies mediate the negotiation of identity and risk in connection with sexual practice. E-dating itself is a bricolage, or heterogeneous DIY practice of internet-based-communication (IBC). A central aspect of IBC is "filtering" in and out prospective e-dates based on the images and texts used to depict sexual identities. Interpretations and depictions of personal HIV risk management approaches in IBC are framed by the meanings of different identities, such as the stigma associated with being HIV positive. This paper argues for a sexualities perspective in a theory of network society. Further, HIV prevention in e-dating can potentially be addressed by considering the interplay of the HIV prevention imperatives associated with different HIV serostatus identities. There is a case for encouraging more explicit IBC about risk in e-dating and incorporating the expertise of e-daters in prevention activity. There is also a need to rethink traditional conceptions of risk management in HIV prevention to make space for the risk management bricolage of network society.

  1. Forest management in a Pukhtun community : the Constructions of Identities

    NARCIS (Netherlands)

    Southwold-Llewellyn, S.

    2006-01-01

    Description: How do we recognize and understand the interactions between nature, nationness, and nationalism? How is nature appropriated by politics when asserting identity, interests, and rights? Drawing from South Asia¿s varying regions, the essays in this pathbreaking volume answer such

  2. 12 CFR Appendix J to Part 571 - Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation

    Science.gov (United States)

    2010-01-01

    ...; service provider arrangements; significant incidents involving identity theft and management's response... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Interagency Guidelines on Identity Theft...—Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation Section 571.90 of this part...

  3. 12 CFR Appendix J to Part 222 - Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation

    Science.gov (United States)

    2010-01-01

    ... arrangements; significant incidents involving identity theft and management's response; and recommendations for... 12 Banks and Banking 3 2010-01-01 2010-01-01 false Interagency Guidelines on Identity Theft..., App. J Appendix J to Part 222—Interagency Guidelines on Identity Theft Detection, Prevention, and...

  4. 12 CFR Appendix J to Part 41 - Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation

    Science.gov (United States)

    2010-01-01

    ... arrangements; significant incidents involving identity theft and management's response; and recommendations for... 12 Banks and Banking 1 2010-01-01 2010-01-01 false Interagency Guidelines on Identity Theft... on Identity Theft Detection, Prevention, and Mitigation Section 41.90 of this part requires each...

  5. An exploratory Q study of corporate brand identity elements ...

    African Journals Online (AJOL)

    kirstam

    2014-12-09

    Dec 9, 2014 ... brand, creative marketing, effective management and administration ... (brand identity) and how the customers perceive them (brand image) .... corporate brand, which focuses on values, relationships and culture, fulfils a more.

  6. Job satisfaction and gender identity of women managers and non-managers.

    Science.gov (United States)

    Lipińska-Grobelny, Agnieszka; Wasiak, Katarzyna

    2010-01-01

    This work investigates different cognitive aspects of job satisfaction (co-workers, supervisor, job content, working facilities, organization and management, opportunities for development, income), positive and negative affect at work and their relations to gender role orientation of women occupying managerial and non-managerial positions. The sample of 122 women (60 managers and 62 non-managers) completed a battery of instruments such as: the Bem Sex Role Inventory, the Job Description Inventory by Neuberger and Allerbeck and the Job Affect Scale by Brief et al. Most women managers represented androgynous and masculine types, while women non-managers belonged to androgynous and feminine types. Moreover, women with various degrees of sex-typing showed positive and negative affect at work. The most satisfied with income were masculine women managers, the least--feminine women non-managers. These results may be applied in designing of motivational instruments to enhance job effectiveness and to eliminate unproductive behaviours such as absenteeism, high staff turnover.

  7. Medical Identity

    DEFF Research Database (Denmark)

    Musaeus, Peter

    2015-01-01

    Purpose: To examine philosophical stances underpinning medical identity and assess the conceptual relationship between physician, medical practice and culture. Argument: Medical identity is about the ideals and moral positions that physicians take when justifying themselves. Medical identity...... hedonistic versus sentimentalist approaches to medical identity. The sociocultural philosophical analysis of medical identity can shed light on what it means conceptually for a physician to harbor beliefs associated with him/her being taken to be an autonomous professional. It is important because it touches...... on the meaning of being a compassionate, good and skilled physician, making its relevance to person-centered medicine self-evident. Conclusion: Medical identity should be analyzed with reference to literature, philosophy and medical practice in order for the physician to exercise a reflective position...

  8. 16 CFR Appendix A to Part 681 - Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation

    Science.gov (United States)

    2010-01-01

    ... arrangements; significant incidents involving identity theft and management's response; and recommendations for... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Interagency Guidelines on Identity Theft... THE FAIR CREDIT REPORTING ACT IDENTITY THEFT RULES Pt. 681, App. A Appendix A to Part 681—Interagency...

  9. Social identity in the construction industry

    DEFF Research Database (Denmark)

    Andersen, L. P.; Karlsen, I. L.; Kines, P.

    2015-01-01

    sites. The organization of work fosters social identification within a crew, resulting in distancing from and social categorization of site management. Social identification influences safety behaviour in the crews, where worksite safety rules may meet resistance. Future safety initiatives at large...... construction sites should take into account the dynamics of social identification and categorization in the implementation of safety measures, e.g. by creating an alternative organization of work, thus making it easier for a work crew to identify themselves with the site management. Site/crew managers should...... consider how safety can become a salient and valued group norm by altering the social structure at the sites and/or fostering dual social identity....

  10. WEBSITES AS A PROMOTING TOOL FOR THE IDENTITY OF TOURISTIC DESTINATIONS

    Directory of Open Access Journals (Sweden)

    Francisco Vicente Sales Melo

    2013-06-01

    Full Text Available Since its advent, the Internet has become an important tool for tourism. Furthermore, some studies tend to indicate that this may contribute directly to the process of identity formation of a tourism destination. Thus, this paper investigates how websites can help in promoting the identity of tourist destinations on the Internet. The study is characterized as exploratory qualitative in nature, which is constituted from a desk research. It was possible to verify that the website is a key means for managing the identity of a tourist destination, as this can help visitors to form a positive image of the place being visited from the information that makes up the identity of the destination.

  11. Identity paradoxes

    Directory of Open Access Journals (Sweden)

    Đurić Jelena

    2010-01-01

    Full Text Available The article considers paradoxical nature of identity that emerges from: 1 the very concept of identity whose abstract generality unites various and even opposite features; 2 the processual nature of reality that is easier to express in the poetical metaphors or abstract principles than in unambiguous conceptual networks; 3 the oppose relationship between being and knowledge, mind and matter, subject and object, self and personality. Entangled in the labyrinth which evade efforts to be conceptually defined, the modern thinking of identity moves towards abandoning the idea of “self” on behalf of the “ego” and towards the misapprehension of identity as being identical. This corresponds to the “time of the lost spirit” stretched between the simultaneous need to find an identity and to give it up.

  12. Bringing social identity to work: the influence of manifestation and suppression on perceived discrimination, job satisfaction, and turnover intentions.

    Science.gov (United States)

    Madera, Juan M; King, Eden B; Hebl, Michelle R

    2012-04-01

    In the current article, we explored whether manifesting or suppressing an identity (race/ethnicity, gender, age, religion, sexual orientation, or disability) at work is related to perceived discrimination, job satisfaction, and turnover intentions. Participants included 211 working adults who completed an online survey. The results showed that efforts to suppress a group identity were positively (and behavioral manifestations of group identity negatively) related to perceived discrimination, which predicted job satisfaction and turnover intentions. These results suggest that diverse employees actively manage their nonwork identities while at work and that these identity management strategies have important consequences. PsycINFO Database Record (c) 2012 APA, all rights reserved.

  13. Social identity change: shifts in social identity during adolescence.

    Science.gov (United States)

    Tanti, Chris; Stukas, Arthur A; Halloran, Michael J; Foddy, Margaret

    2011-06-01

    This study investigated the proposition that adolescence involves significant shifts in social identity as a function of changes in social context and cognitive style. Using an experimental design, we primed either peer or gender identity with a sample of 380 early- (12-13 years), mid- (15-16 years), and late-adolescents (18-20 years) and then measured the effect of the prime on self-stereotyping and ingroup favouritism. The findings showed significant differences in social identity across adolescent groups, in that social identity effects were relatively strong in early- and late-adolescents, particularly when peer group identity rather than gender identity was salient. While these effects were consistent with the experience of change in educational social context, differences in cognitive style were only weakly related to ingroup favouritism. The implications of the findings for theory and future research on social identity during adolescence are discussed. Crown Copyright © 2010. Published by Elsevier Ltd. All rights reserved.

  14. Comparative Associations Between Achieved Bicultural Identity, Achieved Ego Identity, and Achieved Religious Identity and Adaptation Among Australian Adolescent Muslims.

    Science.gov (United States)

    Abu-Rayya, Hisham M; Abu-Rayya, Maram H; White, Fiona A; Walker, Richard

    2018-04-01

    This study examined the comparative roles of biculturalism, ego identity, and religious identity in the adaptation of Australian adolescent Muslims. A total of 504 high school Muslim students studying at high schools in metropolitan Sydney and Melbourne, Australia, took part in this study which required them to complete a self-report questionnaire. Analyses indicated that adolescent Muslims' achieved religious identity seems to play a more important role in shaping their psychological and socio-cultural adaptation compared to adolescents' achieved bicultural identity. Adolescents' achieved ego identity tended also to play a greater role in their psychological and socio-cultural adaptation than achieved bicultural identity. The relationships between the three identities and negative indicators of psychological adaptation were consistently indifferent. Based on these findings, we propose that the three identity-based forces-bicultural identity development, religious identity attainment, and ego identity formation-be amalgamated into one framework in order for researchers to more accurately examine the adaptation of Australian adolescent Muslims.

  15. Swiss identity smells like chocolate: Social identity shapes olfactory judgments

    Science.gov (United States)

    Coppin, Géraldine; Pool, Eva; Delplanque, Sylvain; Oud, Bastiaan; Margot, Christian; Sander, David; Van Bavel, Jay J.

    2016-01-01

    There is extensive evidence that social identities can shape people’s attitudes and behavior, but what about sensory judgments? We examined the possibility that social identity concerns may also shape the judgment of non-social properties—namely, olfactory judgment. In two experiments, we presented Swiss and non-Swiss participants with the odor of chocolate, for which Switzerland is world-famous, and a control odor (popcorn). Swiss participants primed with Swiss identity reported the odor of chocolate (but not popcorn) as more intense than non-Swiss participants (Experiments 1 and 2) and than Swiss participants primed with individual identity or not primed (Experiment 2). The self-reported intensity of chocolate smell tended to increase as identity accessibility increased—but only among Swiss participants (Experiment 1). These results suggest that identity priming can counter-act classic sensory habituation effects, allowing identity-relevant smells to maintain their intensity after repeated presentations. This suggests that social identity dynamically influences sensory judgment. We discuss the potential implications for models of social identity and chemosensory perception. PMID:27725715

  16. Swiss identity smells like chocolate: Social identity shapes olfactory judgments.

    Science.gov (United States)

    Coppin, Géraldine; Pool, Eva; Delplanque, Sylvain; Oud, Bastiaan; Margot, Christian; Sander, David; Van Bavel, Jay J

    2016-10-11

    There is extensive evidence that social identities can shape people's attitudes and behavior, but what about sensory judgments? We examined the possibility that social identity concerns may also shape the judgment of non-social properties-namely, olfactory judgment. In two experiments, we presented Swiss and non-Swiss participants with the odor of chocolate, for which Switzerland is world-famous, and a control odor (popcorn). Swiss participants primed with Swiss identity reported the odor of chocolate (but not popcorn) as more intense than non-Swiss participants (Experiments 1 and 2) and than Swiss participants primed with individual identity or not primed (Experiment 2). The self-reported intensity of chocolate smell tended to increase as identity accessibility increased-but only among Swiss participants (Experiment 1). These results suggest that identity priming can counter-act classic sensory habituation effects, allowing identity-relevant smells to maintain their intensity after repeated presentations. This suggests that social identity dynamically influences sensory judgment. We discuss the potential implications for models of social identity and chemosensory perception.

  17. Identity, gender and teaching English in Japan

    CERN Document Server

    Nagatomo, Diane Hawley

    2016-01-01

    How do teachers, who have chosen to settle down in one country, manage the difficulties of living and teaching English in that country? This book answers this question by investigating the personal and professional identity development of ten Western women with Japanese spouses who teach English in various educational contexts in Japan.

  18. Juggling identities of rheumatoid arthritis, motherhood and paid work

    DEFF Research Database (Denmark)

    Feddersen, Helle; Mechlenborg Kristiansen, Tine; Andersen, Pernille Tanggaard

    2018-01-01

    professionals have an important role to play in investigating possible ways for the individual to maintain employment or return to work. Living with rheumatoid arthritis and being a paid worker challenge women's role performance and thereby their identification as mothers. Therefore, rehabilitation......PURPOSE: To explore how women with rheumatoid arthritis manage their illness, motherhood, and work life. METHODS: A constructivist, grounded theory approach based on individual interviews and participant observations with 20 women with rheumatoid arthritis who participated in work life and had......-sided act; (3) Living with rheumatoid arthritis as an identity? Paid work, motherhood, and illness are linked to the women's social identities. The women construct and change their identities in interactions with children, partners, other parents, colleagues, and employers. CONCLUSION: The women attribute...

  19. Managing Digital Identity on Twitter: The Case of School Administrators

    Science.gov (United States)

    Cho, Vincent; Jimerson, Jo Beth

    2017-01-01

    What does it mean to be and to act like a school leader online? Although many school leaders might be comfortable navigating issues of identity in face-to-face environments, online environments may present new and unprecedented challenges. These challenges may range from concerns about privacy and surveillance to questions about how best to…

  20. The Supermalt identity

    DEFF Research Database (Denmark)

    Bech-Larsen, Tino; Esbjerg, Lars; Grunert, Klaus G.

    2007-01-01

    on consumers' self-identities. The second part explored the role of food and beverage products in the construction of self-identities. The final part focused on the construction of brand identity for Supermalt. Findings - The article provides information on the self-identities constructed by Afro......-Caribbean informants. The food and beverage consumption of informants reflects their mixed cultural identity. The brand identity Supermalt appears to be malleable, with ample room for consumer co-construction. Perceptions of brand identity differ markedly among informants, who are all able to construct Supermalt......Purpose - The objective of this article is to conduct a case study of the Supermalt brand of malt beer, which has become the preferred beverage of Afro-Caribbean consumers in Brixton on a very limited marketing budget. Design/methodology/approach - The article uses the concepts of personal identity...

  1. Fashioning Identity

    DEFF Research Database (Denmark)

    Mackinney-Valentin, Maria

    We dress to communicate who we are, or who we would like others to think we are, telling seductive fashion narratives through our adornment. Yet, today, fashion has been democratized through high-low collaborations, social media and real-time fashion mediation, complicating the basic dynamic...... of identity displays, and creating tension between personal statements and social performances. Fashioning Identity explores how this tension is performed through fashion production and consumption,by examining a diverse series of case studies - from ninety-year old fashion icons to the paradoxical rebellion...... by readdressing Fred Davis' seminal concept of 'identity ambivalence' in Fashion, Culture and Identity (1992), Mackinney-Valentin argues that we are in an epoch of 'status ambivalence', in which fashioning one's own identity has become increasingly complicated....

  2. Ambiguous genitalia, gender-identity problems, and sex reassignment.

    Science.gov (United States)

    Dittmann, R W

    1998-01-01

    This article discusses general issues with regard to gender-identity problems, sex reassignment, and clinical management in patients with ambiguous genitalia, based on a detailed case history of a patient with penile agenesis who has been followed more than 20 years. After initial uncertainty, the patient began to grow up as a boy, lived from the fourth year of life as a girl and young woman, and lived from late puberty on as a man. Over his lifetime he experienced extensive corrective surgery plus hormonal substitution therapy. Pre- and perinatal hormonal conditions, phenomenology of the genitalia, sex of rearing, timing of sex reassignment and corrective surgery, for example, appear to be important components for the development of gender-role behavior, gender identity, and sexual orientation of intersex patients. Findings and retrospective considerations for this patient suggest the need for careful differential activities in diagnostic workup, approaches to sex assignment and possible reassignment, and the clinical management of patients and families.

  3. Civil Identity

    DEFF Research Database (Denmark)

    Petersen, Lars Axel

    In this paper I will go through a catalogue of examples of contexts in which the term civil identity is currently used, ranging from the formal and technical process of linking a set of administrative and other events to an individual biological person by means of identity cards, fingerprints, iris...... of Israel to Luce Irigaray's Feminist agenda of elaborating gender specific civil identities. My intention is to investigate whether these different employments of 'civil identity' point towards a common, and fairly well defined object field asking questions of contemporary relevance to the philosophy...

  4. On Fay identity

    International Nuclear Information System (INIS)

    Michev, Iordan P.

    2006-01-01

    In the first part of this paper we consider the transformation of the cubic identities for general Korteweg-de Vries (KdV) tau functions from [Mishev, J. Math. Phys. 40, 2419-2428 (1999)] to the specific identities for trigonometric KdV tau functions. Afterwards, we consider the Fay identity as a functional equation and provide a wide set of solutions of this equation. The main result of this paper is Theorem 3.4, where we generalize the identities from Mishev. An open problem is the transformation of the cubic identities from Mishev to the specific identities for elliptic KdV tau functions

  5. Identical Twin Primigravid Sisters -Spontaneous Labour and ...

    African Journals Online (AJOL)

    We report 2 cases of identical twin sisters, the older sibling getting married 14 months earlier but both got pregnant for their first child at about the same time and were managed by the same Obstetrician and fell into spontaneous labour within a few hours of each other. Both were delivered by emergency caesarean section ...

  6. Identity and identity conflict in the workplace

    NARCIS (Netherlands)

    K.E. Horton (Kate); P.S. Bayerl (Saskia); G. Belschak-Jacobs (Gabriele)

    2014-01-01

    textabstractAs individuals, we define ourselves according to various characteristics that include our values and beliefs. This gives us our identity. As organisations become increasingly complex, understanding the concept of identity conflict may mean the difference between success and failure.

  7. Patient identity management for secondary use of biomedical research data in a distributed computing environment.

    Science.gov (United States)

    Nitzlnader, Michael; Schreier, Günter

    2014-01-01

    Dealing with data from different source domains is of increasing importance in today's large scale biomedical research endeavours. Within the European Network for Cancer research in Children and Adolescents (ENCCA) a solution to share such data for secondary use will be established. In this paper the solution arising from the aims of the ENCCA project and regulatory requirements concerning data protection and privacy is presented. Since the details of secondary biomedical dataset utilisation are often not known in advance, data protection regulations are met with an identity management concept that facilitates context-specific pseudonymisation and a way of data aggregation using a hidden reference table later on. Phonetic hashing is proposed to prevent duplicated patient registration and re-identification of patients is possible via a trusted third party only. Finally, the solution architecture allows for implementation in a distributed computing environment, including cloud-based elements.

  8. Mistaken identity: activating conservative political identities induces "conservative" financial decisions.

    Science.gov (United States)

    Morris, Michael W; Carranza, Erica; Fox, Craig R

    2008-11-01

    Four studies investigated whether activating a social identity can lead group members to choose options that are labeled in words associated with that identity. When political identities were made salient, Republicans (but not Democrats) became more likely to choose the gamble or investment option labeled "conservative." This shift did not occur in a condition in which the same options were unlabeled. Thus, the mechanism underlying the effect appears to be not activated identity-related values prioritizing low risk, but rather activated identity-related language (the group label "conservative"). Indeed, when political identities were salient, Republicans favored options labeled "conservative" regardless of whether the options were low or high risk. Finally, requiring participants to explain the label "conservative" before making their choice did not diminish the effect, which suggests that it does not merely reflect inattention to content or construct accessibility. We discuss the implications of these results for the literatures on identity, priming, choice, politics, and marketing.

  9. How does Accreditation Influence the Dynamics of Organizational Identity for Business Schools?

    DEFF Research Database (Denmark)

    Lejeune, Christophe; Schultz, Majken; Vas, Alain

    2015-01-01

    approach offer a comprehensive theoretical framework. Second, we illustrate it with a European Management School’s accreditation failure and its management of change related to the accreditation goal. We elaborate and discuss a model titled “Identity Change through Accreditation” (ICA). Finally, we suggest...

  10. Identity crisis: user perspectives on multiplicity and control in federated identitymanagement

    DEFF Research Database (Denmark)

    Howard, Steve; Satchell, C; Shanks, G

    2009-01-01

    Federated identity management systems synthesise complex and fragmented user information into a single entity. Literature from the provider’s perspective notes this integration extends many benefits to the end user and the privileges provided by digital identity authentication schemes have been...... well documented from this perspective. Less explored are the perceptions of federation from the user’s perspective. This study reports an empirical user study that examines the relationship between identity and technology using contextual interviews, focus groups and cultural probes. It emerges...... that while current federated systems satisfy user needs by allowing the construction of multiple digital data sets that are moored to a central identifier, they fail to provide the user with control over the capability to act in the ‘hatch’, ‘match’ and ‘dispatch’ phases of the digital identity lifecycle...

  11. Teacher educators: their identities, sub-identities and implications for professional development

    NARCIS (Netherlands)

    Swennen, J.M.H.; Jones, K.; Volman, M.L.L.

    2010-01-01

    In this article we address the question: 'What sub-identities of teacher educators emerge from the research literature about teacher educators and what are the implications of the sub-identities for the professional development of teacher educators?' Like other professional identities, the identity

  12. Navigating Identities: Subtle and Public Agency of Bicultural Gay Youth.

    Science.gov (United States)

    Cense, Marianne; Ganzevoort, R Ruard

    2017-01-01

    Young people who discover their sexual attraction to people of the same sex often go through a period of ambivalence or distress, especially when they grow up in an environment that condemns homosexuality. The Dutch sociopolitical context makes the expression of same-sex desires among those with non-Dutch roots even more complicated and risky, as prevailing schemes of interpretation render the two identities incompatible. This study explores the expressions of same-sex desires and identities as well as the different forms of agency of bicultural gay youth. In-depth interviews with 14 young adults reveal how young people negotiate bicultural identities in Dutch society that brings to the fore complexities in managing diverse sexual identities and strong religious and cultural affiliations in tandem. Their strategies have the effect of questioning dominant discourses and transcend the oppositional dichotomy between sexual and ethnic forms of sociocultural otherness.

  13. Identity after Death

    DEFF Research Database (Denmark)

    Gerstrøm, Anna

    2015-01-01

    Purpose: The purpose of this paper is to explore how legacy organizational identity and death relate to each other and, thereby, contribute to closing the gap in knowledge on organizational identity constructions in times of death. Design/methodology/approach: The paper opted for an exploratory....../value: This paper addresses an apparent gap in the literature on identity and death; exploring identity narratives in a bankrupted bank, the paper considers constructions of legacy organizational identities in times of disruptive death....

  14. Identity/Time

    Directory of Open Access Journals (Sweden)

    Nancy J. Knauer

    2013-09-01

    Full Text Available This paper engages the unspoken fourth dimension of intersectionality—time. Using the construction of lesbian, gay, bisexual, and transgender (LGBT identities as an example, it establishes that identity, as it is lived and experienced, is not only multivalent, but also historically contingent. It then raises a number of points regarding the temporal locality of identity—the influence of time on issues of identity and understanding, its implications for legal interventions, social movement building, and paradigms of progressive change. As the title suggests, the paper asks us to consider the frame of identity over time.

  15. Vocational Identity and Ego Identity Status in Korean Nursing Students

    Directory of Open Access Journals (Sweden)

    Hyun-Young Koo, PhD, RN

    2016-03-01

    Conclusions: These findings show that nursing students in identity achievement status have secure and clear vocational identities. Further longitudinal and qualitative studies are needed to find out if identity formation among nursing students changes with age.

  16. Ternutator identities

    International Nuclear Information System (INIS)

    Devchand, Chandrashekar; Fairlie, David; Nuyts, Jean; Weingart, Gregor

    2009-01-01

    The ternary commutator or ternutator, defined as the alternating sum of the product of three operators, has recently drawn much attention as an interesting structure generalizing the commutator. The ternutator satisfies cubic identities analogous to the quadratic Jacobi identity for the commutator. We present various forms of these identities and discuss the possibility of using them to define ternary algebras.

  17. Ethnic Identity in Everyday Life: The Influence of Identity Development Status

    Science.gov (United States)

    Yip, Tiffany

    2013-01-01

    The current study explores the intersection of ethnic identity development and significance in a sample of 354 diverse adolescents (mean age 14). Adolescents completed surveys 5 times a day for 1 week. Cluster analyses revealed 4 identity clusters: diffused, foreclosed, moratorium, achieved. Achieved adolescents reported the highest levels of identity salience across situations, followed by moratorium adolescents. Achieved and moratorium adolescents also reported a positive association between identity salience and private regard. For foreclosed and achieved adolescents reporting low levels of centrality, identity salience was associated with lower private regard. For foreclosed and achieved adolescents reporting high levels of centrality, identity salience was associated with higher private regard. PMID:23581701

  18. Experiencing with Identity

    DEFF Research Database (Denmark)

    Pors, Justine Grønbæk

    2012-01-01

    This article studies how a political organization begins to experiment with its identity. By use of an empirical case of the Danish Ministry of Education, I examine how a political organization supplements its identity of a legislating power with identities of a supervisor, beacon and facilitator...... of evaluation in public schools. Out of a paralysis emerge new innovative strategies of governing, aimed at the schools’ self-governing capacity. The identity of the political system thus emerges as oscillations between different roles of a legislating power and a supervising coach. The case study suggests...... that a society of experimentalism is emerging. Thus, the relevant object of study is no longer organizational identity, but the experiments with different identities that modern organizations are performing....

  19. Performance through transformation of identity in road cycling

    DEFF Research Database (Denmark)

    Stilling Olesen, Jesper

    In this paper I investigate the relationship between skills and identity of an elite cyclist, who during his career managed to become a big star in the professional peleton. This is Jesper Skibby. The paper is based on a reading of his autobiography "Forstå mig ret." In the book he reproduces his...

  20. Identity, small stories and interpretative repertoires in research interviews. An account of market researchers’ discursive positioning strategies

    Directory of Open Access Journals (Sweden)

    Cosmin Toth

    2014-12-01

    Full Text Available My main purpose in this paper is to illustrate how participants in a research interview occasioned conversation make use of two important discursive devices, namely: small stories and interpretative repertoires for positioning during interaction in order to foster certain situated identity claims. The premises I work with in this paper are that identity is a practiced situated accomplishment, that small stories are devices employed frequently for identity work that are no less important than extended autobiographical expositions, and that interpretative repertoires are practiced ways of speaking that allow participants to manage their positions in certain ways. Moreover, I will try to show that positioning by means of small stories and interpretative repertoires should be understood in direct relation with the identities and other membership categories made relevant by the interviewer. When participants’ positions are conflicting or miss-aligned, a more pronounced identity work is employed on the part of the interviewee, sustained by certain repertoires’ management strategies: alternation, nuancing, or rejecting certain repertoires.

  1. Schizophrenia masquerading as Dissociative Identity Disorder

    OpenAIRE

    Jegan Yogaratnam; Rajesh Jacob

    2012-01-01

    Dissociative symptoms can dominate the clinical picture in many psychiatric conditions and possess a huge challenge to the clinicians in management. We present a case report of a female with a strong family history of schizophrenia who initially presented with features suggestive of dissociative identity disorder, which is itself a rare clinical entity, was later diagnosed to have schizophrenia. Authors would like to emphasise that clinicians should have a high index of suspicion for schizoph...

  2. Identity Work and Emotions

    DEFF Research Database (Denmark)

    Winkler, Ingo

    2018-01-01

    This paper reviews the empirical literature on identity work and identifies two distinct approaches to incorporating emotion. The majority of empirical studies use emotion to describe the experiences of identity work. In doing so, the authors (a) mention the emotions that people feel in situations...... that trigger identity work, (b) illustrate identity work as an emotional endeavour, and (c) describe the emotional impact of successful and unsuccessful identity work. There is also an emerging literature that examines the mutual constitution of emotions and identity work. These authors address emotional...... labour, affective social identification, emotional attachment and detachment, and humour when studying identity work. This paper suggests that, to understand better the relation between emotions and identity work, future research should examine the role of emotions in problematizing identity...

  3. Spacing Identity

    DEFF Research Database (Denmark)

    Stang Våland, Marianne; Georg, Susse

    2018-01-01

    In this paper, we analyze how architectural design, and the spatial and material changes this involves, contributes to the continuous shaping of identities in an organization. Based upon a case study of organizational and architectural change in a municipal administration at a time of major public...... sector reforms, we examine how design interventions were used to (re)form work and professional relationships. The paper examines how engagements with spatial arrangements and material artifacts affected people’s sense of both occupational and organizational identity. Taking a relational approach...... to sociomateriality, the paper contributes to the further theorizing of space in organization studies by proposing the concept of spacing identity to capture the fluidity of identity performance....

  4. Perspectives on Sexual Identity Formation, Identity Practices, and Identity Transitions Among Men Who Have Sex With Men in India.

    Science.gov (United States)

    Tomori, Cecilia; Srikrishnan, Aylur K; Ridgeway, Kathleen; Solomon, Sunil S; Mehta, Shruti H; Solomon, Suniti; Celentano, David D

    2018-01-01

    Men who have sex with men (MSM) remain at high risk for HIV infection. Culturally specific sexual identities, encompassing sexual roles, behavior, and appearance, may shape MSM's experiences of stigmatization and discrimination, and affect their vulnerability to HIV. This multi-site qualitative study (n = 363) encompassing 31 focus group discussions (FGDs) and 121 in-depth interviews (IDIs) across 15 sites in India investigated sexual identity formation, identity practices, and transitions and their implications for HIV prevention. IDIs and FGDs were transcribed, translated, and underwent thematic analysis. Our findings document heterogeneous sexual identity formation, with MSM who have more gender nonconforming behaviors or appearance reporting greater family- and community-level disapproval, harassment, violence, and exclusion. Concealing feminine aspects of sexual identities was important in daily life, especially for married MSM. Some participants negotiated their identity practices in accordance with socioeconomic and cultural pressures, including taking on identity characteristics to suit consumer demand in sex work and on extended periods of joining communities of hijras (sometimes called TG or transgender women). Participants also reported that some MSM transition toward more feminine and hijra or transgender women identities, motivated by intersecting desires for feminine gender expression and by social exclusion and economic marginalization. Future studies should collect information on gender nonconformity stigma, and any changes in sexual identity practices or plans for transitions to other identities over time, in relation to HIV risk behaviors and outcomes.

  5. The Family as a Site for Gendered Ethnic Identity Work among Asian Indian Immigrants

    Science.gov (United States)

    Mehrotra, Meeta; Calasanti, Toni M.

    2010-01-01

    Research on immigrants often points to the family as a source of support and a location for oppression. Using in-depth interviews with 38 first-generation immigrant Indians, this study adds to this literature by exploring families as sites of identity work where first-generation immigrants manage their gendered ethnic identities. Relocation into a…

  6. Identity Presentation: The Construction of Identity in Asynchronous Discussion

    Directory of Open Access Journals (Sweden)

    Brian Morgan

    2008-08-01

    Full Text Available This study examines the use of e-mail as a tool for long term discussion between teachers and grade six students. E-mail messages between grade six students and teachers were collected over the course of one academic year. Methods of conversation analysis within a framework of social practice are used to examine the data. While identity is more readily constructed and more fully developed in contexts which allow for physical embodiment such as face-to-face discussion, this analysis found that identity can be constructed in a context that does not provide for the physical embodiment of identity: Identity was constructed using the social, cultural, and technological tools provided and supported by e-mail to develop social practices germane to the e-mail discussion. This study has implications for further understanding the relation between identity, goals, constraints and affordances, and the collaborative creation of social practices in asynchronous computer mediated communication. URN: urn:nbn:de:0114-fqs0803185

  7. Identity Styles and Religiosity: Examining the Role of Identity Commitment

    Science.gov (United States)

    Grajales, Tevni E.; Sommers, Brittany

    2016-01-01

    This study observed the role of identity styles, identity commitment, and identity statuses in predicting religiosity in a sample of undergraduate students attending a Seventh-day Adventist university (N = 138). Two structural models were evaluated via path analysis. Results revealed two strong models for the prediction of religiosity. Identity…

  8. Political, religious and occupational identities in context: placing identity status paradigm in context.

    Science.gov (United States)

    Solomontos-Kountouri, Olga; Hurry, Jane

    2008-04-01

    This study critically contrasts global identity with domain-specific identities (political, religious and occupational) and considers context and gender as integral parts of identity. In a cross-sectional survey, 1038 Greek Cypriot adolescents (449 boys and 589 girls, mean age 16.8) from the three different types of secondary schools (state, state technical and private) and from different SES completed part of the Extended Objective Measure of Ego Identity Status-2 (EOMEIS-2). The macro-context of Greek Cypriot society is used to understand the role of context in adolescents' identities. Results showed that Greek Cypriot young people were not in the same statuses across their global, political, religious and occupational identities. This heterogeneity in the status of global identity and of each identity domain is partially explained by differences in gender, type of school and SES (socio-economic status). The fact that identity status is found to be reactive to context suggests that developmental stage models of identity status should place greater emphasis on context.

  9. Chronic illness in the workplace: stigma, identity threat and strain.

    Science.gov (United States)

    McGonagle, Alyssa K; Barnes-Farrell, Janet L

    2014-10-01

    Chronic illness affects a large and growing number of workers in the United States and globally. Stigmatization (devaluation) at work based on chronic illness may be stressful for individuals and therefore may lead to negative psychological consequences (i.e. strains). In order to better understand stressful experiences of stigma for workers with chronic illnesses, a model of stigma-related identity threat (perceptions that one is at risk of being treated negatively at work because of chronic illness) was tested on a sample of 203 working adults with chronic illnesses. The following variables related to workers' perceptions of chronic illness-related identity threat: workers' boundary flexibility (flexibility in managing their work and life), their meta-perceptions of devaluation (perceptions of others' devaluation of them based on illness) and their job self-efficacy (feelings of confidence related to performing their job). In turn, perceptions of identity threat related to both feelings of psychological strain and (lower levels of) perceived work ability. Surprisingly, neither stigma centrality (how fundamental illness is to one's identity) nor supervisor support related to workers' identity threat perceptions. Copyright © 2013 John Wiley & Sons, Ltd.

  10. Using a generalised identity reference model with archetypes to support interoperability of demographics information in electronic health record systems.

    Science.gov (United States)

    Xu Chen; Berry, Damon; Stephens, Gaye

    2015-01-01

    Computerised identity management is in general encountered as a low-level mechanism that enables users in a particular system or region to securely access resources. In the Electronic Health Record (EHR), the identifying information of both the healthcare professionals who access the EHR and the patients whose EHR is accessed, are subject to change. Demographics services have been developed to manage federated patient and healthcare professional identities and to support challenging healthcare-specific use cases in the presence of diverse and sometimes conflicting demographic identities. Demographics services are not the only use for identities in healthcare. Nevertheless, contemporary EHR specifications limit the types of entities that can be the actor or subject of a record to health professionals and patients, thus limiting the use of two level models in other healthcare information systems. Demographics are ubiquitous in healthcare, so for a general identity model to be usable, it should be capable of managing demographic information. In this paper, we introduce a generalised identity reference model (GIRM) based on key characteristics of five surveyed demographic models. We evaluate the GIRM by using it to express the EN13606 demographics model in an extensible way at the metadata level and show how two-level modelling can support the exchange of instances of demographic identities. This use of the GIRM to express demographics information shows its application for standards-compliant two-level modelling alongside heterogeneous demographics models. We advocate this approach to facilitate the interoperability of identities between two-level model-based EHR systems and show the validity and the extensibility of using GIRM for the expression of other health-related identities.

  11. Identities as organizational practices

    DEFF Research Database (Denmark)

    Oshima, Sae; Asmuß, Birte

    Identity has been widely acknowledged as playing a central role in various organizational processes, yet there is still a need to better understand the dynamics and functions of identity work in modern organizations. The present paper is centered within this concern, and examines identity......) reveal the intersubjective, multimodal and embodied nature of identity work; 2) demonstrate identity work as organizational practices, used in order to accomplish specific actions; and 3) pose a question on the view on identity as a layered/leveled phenomenon....

  12. (Destabilizing Self-Identities in Professional Work

    Directory of Open Access Journals (Sweden)

    Anders Buch

    2013-09-01

    Full Text Available It is characteristic of much professional work that it is performed in ambiguous contexts. Thus, uncertainty, unpredictability, indeterminacy, and recurrent organizational transformations are an integral part of modern work for, e.g., engineers, lawyers, business consultants, and other professionals. Although key performance indicators and other knowledge management systems are used to set standards of excellence for professionals, the character of professional work is still flexible, open to interpretation and heterarchical. The very successfulness (or unsuccessfulness of the work is established in a complex work context where various goals, interests, and perspectives are mediated, altered, contested, mangled, and negotiated in a process of sense-making. The work context is heterogeneously populated by various actors (e.g., the customer, the manager, the colleagues and actants (e.g., quality systems and technical equipment that give “voice” to (conflicting interpretations of what constitutes successful work. Thus, the professionals must navigate in a very complex environment where the locus of governance is far from stable. These characteristics of professional work seem to have implications for the way professionals make sense of their work and their own identities. The identity work of professionals is interwoven with their professional training and career background. With an academic training and a professional career, the individual typically identifies with the profession’s values and adopts a certain way of seeing and approaching the world. This professional outlook typically will constitute the basis of the individual’s appraisal of the work and lay out a horizon of expectations in relation to fulfillment, self-realization, and job satisfaction. In this way, the construction of self-identity becomes the yardstick for the individual’s sense-making and, a fortiori, for the individual’s sense of meaningful work. In this paper

  13. Identity Federation and Its Importance for NASA's Future: The SharePoint Extranet Pilot

    Science.gov (United States)

    Baturin, Rebecca R.

    2013-01-01

    My project at Kennedy Space Center (KSC) during the spring 2013 Project Management and Systems Engineering Internship was to functionalJy test and deploy the SharePoint Extranet system and ensure successful completion of the project's various lifecycle milestones as described by NASA Procedural Requirement (NPR) 7 120.7. I worked alongside NASA Project Managers, Systems Integration Engineers, and Information Technology (IT) Professionals to pilot this collaboration capability between NASA and its External Partners. The use of identity federation allows NASA to leverage externally-issued credentials of other federal agencies and private aerospace and defense companies, versus the traditional process of granting and maintaining full NASA identities for these individuals. This is the first system of its kind at NASA and it will serve as a pilot for the Federal Government. Recognizing the novelty of this service, NASA's initial approach for deployment included a pilot period where nearby employees of Patrick Air Force Base would assist in testing and deployment. By utilizing a credential registration process, Air Force users mapped their Air Force-issued Common Access Cards (CAC) to a NASA identity for access to the External SharePoint. Once the Air Force stands up an Active Directory Federation Services (ADFS) instance within their Data Center and establishes a direct trust with NASA, true identity federation can be established. The next partner NASA is targeting for collaboration is Lockheed Martin (LMCO), since they collaborate frequently for the ORION Program. Through the use of Exostar as an identity hub, LMCO employees will be able to access NASA data on a need to know basis, with NASA ultimately managing access. In a time when every dollar and resource is being scrutinized, this capability is an exciting new way for NASA to continue its collaboration efforts in a cost and resource effective manner.

  14. Leadership identity : using artefacts (and storytelling) to discover new insights.

    OpenAIRE

    Watton, Emma Louisa; Parry, Ken

    2016-01-01

    Artefacts are used in management education to reflect upon the experiences of participants. Story-telling has a leadership influence that is long recognised in the leadership literature. However, artefacts and story-telling have not been used concurrently in leadership and management development programmes. We used artefacts combined with story-telling to help participants understand their leadership identity. Louisa’s story and artefact are the basis of this research. We found that the story...

  15. Asian American Adolescent Identity

    OpenAIRE

    Ohm, Julie Juhye

    1999-01-01

    The formation of ego identity in Asian American late adolescents attending Virginia Tech was examined within the frameworks of Erikson's psychosocial theory and Berry, Trimble, and Olmedo's model of acculturation. Ego identity was measured using the Achieved sub-scale of the Revised Version of the Extended Objective Measure of Ego Identity Status, an instrument based on the theoretical constructs of Erikson. Ethnic identity was measured using the Multigroup Ethnic Identity Measure and America...

  16. The Identity of Students Choosing Marketing Programs

    Directory of Open Access Journals (Sweden)

    Barreto, Idaly

    2009-12-01

    Full Text Available The purpose of this study is to look deeply into the identity of young students interested in training professional in marketing programs in Bogotá, Colombia. This descriptive study was conducted with the application of multidimensional surveys to 262 young people from five universities that offer training in marketing. The results show that there are differences and similarities in the lifestyles of young people who choose to study Marketing. The first, relating mainly to the identities assumed by students of daytime and nighttime that differ in their activities and more income. The second, by the increasing use and development of academic and social activities through the Internet of interest to young people today. It is hoped that these results provide the administrative and academic management of marketing programs that result in better communication and care of students as consumers.

  17. The constitution of marginalized identity in Signs of identity by Juan Goytisolo

    Directory of Open Access Journals (Sweden)

    Jelica Veljović

    2014-12-01

    Full Text Available The main objective of the article is to investigate the modes of constitution of a marginalized and exiled identity in the novel Signs of identity by Juan Goytisolo. It is categorised as a “testimony and postwar novel”, and the subjects’ constant search of themselves, of their Self and all the elements that constitute their identity is central to the work. The novel is set in the postwar socio-historical period and the protagonist – Alvaro Mendiola – searches for his identity in his childhood memories and family pictures, but also amongst all the Others whose life stories intertwine with his journey of identification. Tracing his line of identity formation, we found three different routes: the first through the genealogical records, the second through the concept of Otherness and the last one through love. We find Identity as a kaleidoscope containing all the Others who served as moulds for his Identity, yet leaving it undefined and incomplete. Therefore, the identity of an exiled and marginalized individual is always in flux, continually reinitiating the constitution of the Self that had been eradicated from its first and formative imagery: the family and the fatherland.

  18. Human identity versus gender identity: The perception of sexual addiction among Iranian women.

    Science.gov (United States)

    Moshtagh, Mozhgan; Mirlashari, Jila; Rafiey, Hassan; Azin, Ali; Farnam, Robert

    2017-07-01

    This qualitative study was conducted to explore the images of personal identity from the perspective of women with sexual addiction. The data required for the study were collected through 31 in-depth interviews. Sensing a threat to personal identity, dissatisfaction with gender identity, dissociation with the continuum of identity, and identity reconstruction in response to threat were four of the experiences that were common among women with sexual addiction. Painful emotional experiences appear to have created a sense of gender and sexual conflict or weakness in these women and thus threatened their personal identity and led to their sexual addiction.

  19. Who do we think we are? Analysing the content and form of identity work in the English National Health Service.

    Science.gov (United States)

    McDermott, Imelda; Checkland, Kath; Harrison, Stephen; Snow, Stephanie; Coleman, Anna

    2013-01-01

    The language used by National Health Service (NHS) "commissioning" managers when discussing their roles and responsibilities can be seen as a manifestation of "identity work", defined as a process of identifying. This paper aims to offer a novel approach to analysing "identity work" by triangulation of multiple analytical methods, combining analysis of the content of text with analysis of its form. Fairclough's discourse analytic methodology is used as a framework. Following Fairclough, the authors use analytical methods associated with Halliday's systemic functional linguistics. While analysis of the content of interviews provides some information about NHS Commissioners' perceptions of their roles and responsibilities, analysis of the form of discourse that they use provides a more detailed and nuanced view. Overall, the authors found that commissioning managers have a higher level of certainty about what commissioning is not rather than what commissioning is; GP managers have a high level of certainty of their identity as a GP rather than as a manager; and both GP managers and non-GP managers oscillate between multiple identities depending on the different situations they are in. This paper offers a novel approach to triangulation, based not on the usual comparison of multiple data sources, but rather based on the application of multiple analytical methods to a single source of data. This paper also shows the latent uncertainty about the nature of commissioning enterprise in the English NHS.

  20. Organizational Identity

    DEFF Research Database (Denmark)

    Hatch, Mary Jo; Schultz, Majken

    This text presents the classic works on organizational identity alongside more current thinking on the issues. Ranging from theoretical contributions to empirical studies, the readings in this volume address the key issues of organizational identity, and show how these issues have developed through...

  1. The Investigation of the Identity Attributes and Attitudes of Romanians

    Directory of Open Access Journals (Sweden)

    CODRINA ŞANDRU

    2012-04-01

    Full Text Available The object of this qualitative sociology study was to emphasize the identity attributes of Romanians today: what they think of themselves as a people and what Romanians who live in the country or in other countries in the world think about Romania. The theoretical framework was established by social identity theory and by social representations research. For the gathering of data, I used a questionnaire with open questions and the reflection-and answer-triggering method, using as stimulus patriotic-themed songs: lyrics from the national anthem and another patriotic song very well known in Romania, entitled "God, protect the Romanians!". For the analysis of qualitative data, I used a category scheme specific for social representations, and at the end of the article I synthesized the data in the form of "storytelling" representative for four social categories included in the research: students, managers, pensioners and Romanian migrants abroad. The data obtained point to an identity crisis among these categories of Romanians: this crisis takes the form of a negative national identity. In terms of the social identity theory (Tajfel, it means that Romanians have in general a negative image when comparing themselves with other nations and they feel it like a strong discomfort.

  2. Analýza komunikace v procesu změny korporátní identity organizace

    OpenAIRE

    Blanková, Barbora

    2013-01-01

    The topic of the thesis is a change of corporate identity of the company and role of communication during this process. There are components of corporate identity and relationship between corporate identity, image and reputation described in the thesis. Furthermore it is dedicated to integrated marketing communication, internal communication and role of communication in change management. The theoretical knowledge is applied on company Nicoll Česká republika, s.r.o. which have been coming thr...

  3. Identities in Harmony: Gender-Work Identity Integration Moderates Frame Switching in Cognitive Processing

    Science.gov (United States)

    Sacharin, Vera; Lee, Fiona; Gonzalez, Richard

    2009-01-01

    Professional women's identity integration--the perceived compatibility between work and gender identities--plays a role in how task or relationship information is processed. Seventy female business school students were primed with either their professional or their gender identity. Business women with higher identity integration showed an…

  4. Corporate Brand Identity in SMEs

    DEFF Research Database (Denmark)

    Mäläskä, Minna; Jones, Richard Ian

    Purpose: To study the emergence of corporate brand identity in SMEs and to develop a typology of brand identity drivers that reflects a co-creative approach to the emergence of brand identity. Design / Methodology / Approach : Existing approaches to brand identity are summarised. A narrative...... studies. The research is important since it suggests an iterative and co-creative approach to brand identity. A typology of brand identity formation for SMEs is presented: entrepreneur driven, market driven, stakeholder driven. Practical implications: The three paths to creating a strong brand identity...... challenge existing notions that brand identity is based solely on the values of the entrepreneur. This typology suggests that SMEs should be open to creating an identity that draws from their stakeholder eco-system. Originality / value: this research challenges the existing assumption that brand identity...

  5. Negotiating Contexts to Construct an Identity as a Mathematics Teacher

    Science.gov (United States)

    Hodges, Thomas E.; Cady, Jo Ann

    2012-01-01

    The authors focused on 1 middle-grades mathematics teacher's identity and her efforts to implement standards-based instructional practices. As professionals, teachers participate in multiple professional communities and must negotiate and manage conflicting agendas. The authors analyze how the contexts of these communities influence the teacher's…

  6. Professional identity formation in the transition from medical school to working life

    DEFF Research Database (Denmark)

    De Lasson, Lydia; Just, Eva; Stegeager, Nikolaj W.M.

    2016-01-01

    Background The transition from student to medical doctor is challenging and stressful to many junior doctors. To practice with confidence and professionalism the junior doctors have to develop a strong professional identity. Various suggestions on how to facilitate formation of professional ident...... and acting as a doctor), adoption to medical culture, career planning and managing a healthy work/life-balance. Further studies in different contexts are recommended as well as studies using other methods to test the results of this qualitative study....

  7. Electronic identity

    CERN Document Server

    de Andrade, Norberto Nuno Gomes; Argles, David

    2014-01-01

    With the increasing availability of electronic services, security and a reliable means by which identity is verified is essential.Written by Norberto Andrade the first chapter of this book provides an overview of the main legal and regulatory aspects regarding electronic identity in Europe and assesses the importance of electronic identity for administration (public), business (private) and, above all, citizens. It also highlights the role of eID as a key enabler of the economy.In the second chapter Lisha Chen-Wilson, David Argles, Michele Schiano di Zenise and Gary Wills discuss the user-cent

  8. Thinking identity differently: dynamics of identity in self and institutional boundary

    Science.gov (United States)

    Albrecht, Nancy J.; Fortney, Brian S.

    2011-03-01

    In research oriented universities, research and teaching are often viewed as separate. Aydeniz and Hodge present one professor's struggles to synthesize an identity from three different spaces, each with competing values and core beliefs. As Mr. G's story unfolds, and he reflects upon his negotiation between teaching and research responsibilities, we seek to expand the discussion by presenting a caution to identity researchers. The caution pertains to construction of understanding on how identities are created, and the role that individual stories take in how identities are created and enacted. In this forum contribution, we present several questions in the hopes of furthering the discussion on identity research, and our understanding of the conceptualization of institutional boundaries and objectivity, as well as questions on participant involvement in the process of research.

  9. Multicultural identity processes.

    Science.gov (United States)

    Hong, Ying-Yi; Zhan, Siran; Morris, Michael W; Benet-Martínez, Verónica

    2016-04-01

    The study of multicultural identity has gained prominence in recent decades and will be even more urgent as the mobility of individuals and social groups becomes the 'new normal'. This paper reviews the state-of-the-art theoretical advancements and empirical discoveries of multicultural identity processes at the intrapersonal, interpersonal, and collective (e.g., organizational, societal) levels. First, biculturalism has more benefits for individuals' psychological and sociocultural adjustment than monoculturalism. Bicultural individuals' racial essentialist beliefs and Bicultural Identity Integration affect cultural frame switching, racial categorization, and creativity. Second, identity denial and identity-based discrimination by other people or groups threaten multicultural individuals' psychological health and performance. Third, multiculturalism and interculturalism policies are associated with different conceptions of and attitudes toward diversity, and have distinct outcomes for multicultural individuals and societies. Copyright © 2015 Elsevier Ltd. All rights reserved.

  10. Social Identity in People with Multiple Sclerosis: An Examination of Family Identity and Mood.

    Science.gov (United States)

    Barker, Alex B; Lincoln, Nadina B; Hunt, Nigel; dasNair, Roshan

    2018-01-01

    Mood disorders are highly prevalent in people with multiple sclerosis (MS). MS causes changes to a person's sense of self. The Social Identity Model of Identity Change posits that group membership can have a positive effect on mood during identity change. The family is a social group implicated in adjustment to MS. The objectives of this study were to investigate whether family identity can predict mood in people with MS and to test whether this prediction was mediated by social support and connectedness to others. This cross-sectional survey of 195 participants comprised measures of family identity, family social support, connectedness to others, and mood. Family identity predicted mood both directly and indirectly through parallel mediators of family social support and connectedness to others. Family identity predicted mood as posited by the Social Identity Model of Identity Change. Involving the family in adjustment to MS could reduce low mood.

  11. Identity-specific motivation: How distinct identities direct self-regulation across distinct situations.

    Science.gov (United States)

    Browman, Alexander S; Destin, Mesmin; Molden, Daniel C

    2017-12-01

    Research on self-regulation has traditionally emphasized that people's thoughts and actions are guided by either (a) domain-general motivations that emerge from a cumulative history of life experiences, or (b) situation-specific motivations that emerge in immediate response to the incentives present in a particular context. However, more recent studies have illustrated the importance of understanding the interplay between such domain-general and situation-specific motivations across the types of contexts people regularly encounter. The present research, therefore, expands existing perspectives on self-regulation by investigating how people's identities -the internalized roles, relationships, and social group memberships that define who they are-systemically guide when and how different domain-general motivations are activated within specific types of situations. Using the motivational framework described by regulatory focus theory (Higgins, 1997), Studies 1 and 2 demonstrate that people indeed have distinct, identity-specific motivations that uniquely influence their current self-regulation when such identities are active. Studies 3-5 then begin to explore how identity-specific motivations are situated within people's larger self-concept. Studies 3a and 3b demonstrate that the less compatible people's specific identities, the more distinct are the motivations connected to those identities. Studies 4-5 then provide some initial, suggestive evidence that identity-specific motivations are not a separate, superordinate feature of people's identities that then alter how they pursue any subordinate, identity-relevant traits, but instead that such motivations emerge from the cumulative motivational significance of the subordinate traits to which the identities themselves become attached. Implications for understanding the role of the self-concept in self-regulation are discussed. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  12. Agile project management managing for success

    CERN Document Server

    Crowder, James A

    2015-01-01

    Management and enables them to deal with the demands and complexities of modern, agile systems/software/hardware development teams. The book examines the project/program manager beyond the concepts of leadership and aims to connect to employees' sense of identity. The text examines human psychological concepts such as "locus of control," which will help the manager understand their team members' view and how best to manage their "world" contributions. The authors cover new management tools and philosophies for agile systems/software/hardware development teams, with a specific focus on how this

  13. Memory transfer for emotionally valenced words between identities in dissociative identity disorder.

    Science.gov (United States)

    Huntjens, Rafaële J C; Peters, Madelon L; Woertman, Liesbeth; van der Hart, Onno; Postma, Albert

    2007-04-01

    The present study aimed to determine interidentity retrieval of emotionally valenced words in dissociative identity disorder (DID). Twenty-two DID patients participated together with 25 normal controls and 25 controls instructed to simulate DID. Two wordlists A and B were constructed including neutral, positive and negative material. List A was shown to one identity, while list B was shown to another identity claiming total amnesia for the words learned by the first identity. The identity claiming amnesia was tested for intrusions from list A words into the recall of words from list B and recognition of the words learned by both identities. Test results indicated no evidence of total interidentity amnesia for emotionally valenced material in DID. It is argued that dissociative amnesia in DID may more adequately be described as a disturbance in meta-memory functioning instead of an actual retrieval inability.

  14. Family physicians' professional identity formation: a study protocol to explore impression management processes in institutional academic contexts.

    Science.gov (United States)

    Rodríguez, Charo; Pawlikowska, Teresa; Schweyer, Francois-Xavier; López-Roig, Sofia; Bélanger, Emmanuelle; Burns, Jane; Hugé, Sandrine; Pastor-Mira, Maria Ángeles; Tellier, Pierre-Paul; Spencer, Sarah; Fiquet, Laure; Pereiró-Berenguer, Inmaculada

    2014-09-06

    Despite significant differences in terms of medical training and health care context, the phenomenon of medical students' declining interest in family medicine has been well documented in North America and in many other developed countries as well. As part of a research program on family physicians' professional identity formation initiated in 2007, the purpose of the present investigation is to examine in-depth how family physicians construct their professional image in academic contexts; in other words, this study will allow us to identify and understand the processes whereby family physicians with an academic appointment seek to control the ideas others form about them as a professional group, i.e. impression management. The methodology consists of a multiple case study embedded in the perspective of institutional theory. Four international cases from Canada, France, Ireland and Spain will be conducted; the "case" is the medical school. Four levels of analysis will be considered: individual family physicians, interpersonal relationships, family physician professional group, and organization (medical school). Individual interviews and focus groups with academic family physicians will constitute the main technique for data generation, which will be complemented with a variety of documentary sources. Discourse techniques, more particularly rhetorical analysis, will be used to analyze the data gathered. Within- and cross-case analysis will then be performed. This empirical study is strongly grounded in theory and will contribute to the scant body of literature on family physicians' professional identity formation processes in medical schools. Findings will potentially have important implications for the practice of family medicine, medical education and health and educational policies.

  15. Student and/or Entrepreneur? Managing Multiple Identities among Emerging University Student Entrepreneurs

    DEFF Research Database (Denmark)

    Sørensen, Suna; B. Gartner, William

    2006-01-01

    for combining the identities are proposed and discussed as a way to challenge the meaning attached to the practiced concepts of "student" and "entrepreneur" from a theoretical as well as practical perspective. The practices are organized into a conceptual framework containing the two continuums: "integration/disintegration...

  16. Gender Identity and Career Aspiration to Top Management of Malaysian Graduate Students

    Science.gov (United States)

    Karami, Roya; Ismail, Maimunah; Sail, Rahim Md.

    2011-01-01

    This article examines the relationship between gender identity and career aspirations of a group of Iranian international postgraduate students studying at a Malaysian public university. This study uses the Farmer's Achievement Motivation Theory and Astin's Sociopsychological Model of Career Choice as theoretical framework. The data were collected…

  17. Ritual Identity

    NARCIS (Netherlands)

    van der Beek, Suzanne

    2017-01-01

    Rituals are often used as opportunities for self-reflection and identity construction. The Camino to Santiago de Compostela, which has become a singularly popular pilgrimage since the late 1980s, is an example of a ritual that is explicitly used to gain a deeper understanding of one’s identity

  18. Brand Identity.

    Science.gov (United States)

    Lawlor, John

    1998-01-01

    Instead of differentiating themselves by building "brand identities," colleges and universities often focus on competing with price. As a result, fewer and fewer institutions base their identities on value, the combination of quality and price. Methods of building two concepts to influence customers' brand image and brand loyalty are…

  19. VET Manager Identities: Culture, Philosophy and Professional Practice

    Science.gov (United States)

    Foley, Annette

    2011-01-01

    Using a post-structural approach this article investigates the working lives of frontline managers in VET and how they negotiate change in their day to day practices and decision making. The article is organised around accounts made by managers from different types of Vocational Education and Training (VET) organisations, namely: Technical and…

  20. Identity and Professional Networking.

    Science.gov (United States)

    Raj, Medha; Fast, Nathanael J; Fisher, Oliver

    2017-06-01

    Despite evidence that large professional networks afford a host of financial and professional benefits, people vary in how motivated they are to build such networks. To help explain this variance, the present article moves beyond a rational self-interest account to examine the possibility that identity shapes individuals' intentions to network. Study 1 established a positive association between viewing professional networking as identity-congruent and the tendency to prioritize strengthening and expanding one's professional network. Study 2 revealed that manipulating the salience of the self affects networking intentions, but only among those high in networking identity-congruence. Study 3 further established causality by experimentally manipulating identity-congruence to increase networking intentions. Study 4 examined whether identity or self-interest is a better predictor of networking intentions, providing support for the former. These findings indicate that identity influences the networks people develop. Implications for research on the self, identity-based motivation, and professional networking are discussed.

  1. Transfer of newly acquired stimulus valence between identities in dissociative identity disorder (DID).

    Science.gov (United States)

    Huntjens, Rafaële J C; Peters, Madelon L; Postma, Albert; Woertman, Liesbeth; Effting, Marieke; van der Hart, Onno

    2005-02-01

    Patients with Dissociative Identity Disorder (DID) frequently report episodes of interidentity amnesia, that is amnesia for events experienced by other identities. The goal of the present experiment was to test the implicit transfer of trauma-related information between identities in DID. We hypothesized that whereas declarative information may transfer from one identity to another, the emotional connotation of the memory may be dissociated, especially in the case of negative, trauma-related emotional valence. An evaluative conditioning procedure was combined with an affective priming procedure, both performed by different identities. In the evaluative conditioning procedure, previously neutral stimuli come to refer to a negative or positive connotation. The affective priming procedure was used to test the transfer of this acquired valence to an identity reporting interidentity amnesia. Results indicated activation of stimulus valence in the affective priming task, that is transfer of emotional material between identities.

  2. Challenging Identities

    DEFF Research Database (Denmark)

    Identity is a keyword in a number of academic fields as well as in public debate and in politics. During the last decades, references to identity have proliferated, yet there is no simple definition available that corresponds to the use of the notion in all contexts. The significance of the notion...

  3. Men as victims: "victim" identities, gay identities, and masculinities.

    Science.gov (United States)

    Dunn, Peter

    2012-11-01

    The impact and meanings of homophobic violence on gay men's identities are explored with a particular focus on their identities as men and as gay men. Homosexuality can pose a challenge to conventional masculinities, and for some gay men, being victimized on account of sexual orientation reawakens conflicts about their masculinity that they thought they had resolved. Being victimized can reinvoke shame that is rooted in failure or unwillingness to uphold masculine norms. For some gay men, victimization therefore has connotations of nonmasculinity that make being a victim an undesirable status, yet that status must be claimed to obtain a response from criminal justice or victim services. Men who experience homophobic abuse are helped by accepting a victim identity, but only if they can quickly move on from it by reconstructing a masculine gay (nonvictim) identity. This process can be facilitated by agencies such as the police and victim services, provided they help men exercise agency in "fighting back," that is, resisting further victimization and recovering.

  4. Entrepreneurship Education as Identity Workspace

    DEFF Research Database (Denmark)

    Frederiksen, Signe Hedeboe

    2016-01-01

    Entrepreneurship education theory and practice show increasing interest in identity work as an important part of entrepreneurial learning. Entrepreneurship programs become identity workspaces where pedagogical designs stimulate entrepreneurial identity work and support individuals’ discovery...... of themselves as entrepreneurs. This article investigates how entrepreneurship education is practiced as an identity workspace, when reflective identity work is turned into a pedagogical strategy for entrepreneurial learning. I present empirical data from a qualitative fieldstudy in an eleven week mandatory...... and identities. Exposed to identity work practices in class, learners experienced conflicting demands participating as succesful students and participating as potential entrepreneurs. The study draws attention to how an education setting contextualises identity work as a social practice. It critisises...

  5. Identification of Redox and Glucose-Dependent Txnip Protein Interactions

    Directory of Open Access Journals (Sweden)

    Benjamin J. Forred

    2016-01-01

    Full Text Available Thioredoxin-interacting protein (Txnip acts as a negative regulator of thioredoxin function and is a critical modulator of several diseases including, but not limited to, diabetes, ischemia-reperfusion cardiac injury, and carcinogenesis. Therefore, Txnip has become an attractive therapeutic target to alleviate disease pathologies. Although Txnip has been implicated with numerous cellular processes such as proliferation, fatty acid and glucose metabolism, inflammation, and apoptosis, the molecular mechanisms underlying these processes are largely unknown. The objective of these studies was to identify Txnip interacting proteins using the proximity-based labeling method, BioID, to understand differential regulation of pleiotropic Txnip cellular functions. The BioID transgene fused to Txnip expressed in HEK293 identified 31 interacting proteins. Many protein interactions were redox-dependent and were disrupted through mutation of a previously described reactive cysteine (C247S. Furthermore, we demonstrate that this model can be used to identify dynamic Txnip interactions due to known physiological regulators such as hyperglycemia. These data identify novel Txnip protein interactions and demonstrate dynamic interactions dependent on redox and glucose perturbations, providing clarification to the pleiotropic cellular functions of Txnip.

  6. BRANDING AND IDENTITY BUILDING FOR A SMALL COMPANY : Focused on Visual Identity

    OpenAIRE

    Näveri, Mattea

    2015-01-01

    The topic of this thesis is branding and identity of a small business, with a focus on visual identity. The major part of this thesis focuses on the research done on visual identity and the basic ideation of branding. The other half specifically focuses on the visual identity, the creation of a logo for the company, defining typography and colour and ephemera, and particularly, the company’s business card. The main goal was to execute a unique, individualized branding, which showcases...

  7. Media identities and media-influenced indentifications Visibility and identity recognition in the media

    Directory of Open Access Journals (Sweden)

    Víctor Fco. Sampedro Blanco

    2004-10-01

    Full Text Available The media establish, in large part, the patterns of visibility and public recognition of collective identities. We define media identities as those that are the object of production and diffusion by the media. From this discourse, the communities and individuals elaborate media-influenced identifications; that is, processes of recognition or banishment; (rearticulating the identity markers that the media offer with other cognitive and emotional sources. The generation and appropriation of the identities are subjected to a media hierarchisation that influences their normalisation or marginalisation. The identities presented by the media and assumed by the audience as part of the official, hegemonic discourse are normalised, whereas the identities and identifications formulated in popular and minority terms are marginalised. After presenting this conceptual and analytical framework, this study attempts to outline the logics that condition the presentation, on the one hand, andthe public recognition, on the other hand, of contemporary identities.

  8. Critical elements in defining work-based identity in a post-apartheid South Africa

    Directory of Open Access Journals (Sweden)

    Sandra Lloyd

    2011-08-01

    Research purpose: The aim of the specific research questions was to determine which life sphere and life role elements, and which work-based identity facets were significant in forming work-based identity. Motivation for the study: The findings of the study will enable the formulation of an integrative definition of work-based identity applicable to the South African context. Research design, approach and method: Qualitative data was collected by means of unstructured interviews with 29 employees representing a range of job titles, levels and demographics in a large South African manufacturing company. A grounded theory approach (open and axial coding was used to analyse the data. Main findings: Distinctive individual self-definitions and a number of common themes integrating social and personal identity perspectives emerged from the data. These themes provided a sound basis for the proposed integrative model to define work-based identity. Practical/managerial implications: The findings of this research will assist human resource practitioners to develop training interventions and management strategies for the potential enhancement of work-based identities. This will result in a more engaged and harmonised workforce. Contribution/value-add: This was the first study of its kind to identify and delineate significant work-based identity elements for the formation of a work-based identity within a South African work context.

  9. Coming to an Asexual Identity: Negotiating Identity, Negotiating Desire.

    Science.gov (United States)

    Scherrer, Kristin S

    2008-10-01

    Sexuality is generally considered an important aspect of self-hood. Therefore, individuals who do not experience sexual attraction, and embrace an asexual identity are in a unique position to inform the social construction of sexuality. This study explores the experiences of asexual individuals utilizing open ended Internet survey data from 102 self-identified asexual people. In this paper I describe several distinct aspects of asexual identities: the meanings of sexual, and therefore, asexual behaviors, essentialist characterizations of asexuality, and lastly, interest in romance as a distinct dimension of sexuality. These findings have implications not only for asexual identities, but also for the connections of asexuality with other marginalized sexualities.

  10. Governing the ethical consumer: identity, choice and the primary care medical encounter.

    Science.gov (United States)

    McDonald, Ruth; Mead, Nicola; Cheraghi-Sohi, Sudeh; Bower, Peter; Whalley, Diane; Roland, Martin

    2007-04-01

    Government policy promoting consumerism in healthcare can be seen as offering up certain preferred identities to which its citizens are encouraged to aspire. Whilst many commentators reject the notion that health services users should be conceived of as consumers, this paper outlines the relevance of the concept to our understanding of the ways in which individuals manage their health and service use. The paper examines the identity work undertaken by individuals in relation to decisions about healthcare preferences and assesses the extent to which this is compatible with the identities promoted in Government policy. We suggest that in circumstances where individuals feel both a sense of personal entitlement and a desire to be supportive of the needs of other members of the community, 'doing' ethical consumer can be fraught with discomfort and anxiety. These anxieties are exacerbated in a context where citizenship is increasingly being defined in terms of consumer identities, and making good (health) choices might be seen as distinguishing the civilised from the marginalised.

  11. Apotemnophilia or body integrity identity disorder: a case report review.

    Science.gov (United States)

    Bou Khalil, Rami; Richa, Sami

    2012-12-01

    Apotemnophilia or body integrity identity disorder (BIID) denotes a syndrome in which a person is preoccupied with the desire to amputate a healthy limb. In this report, we review the available case reports in the literature in order to enhance psychiatrists' and physicians' comprehension of this disorder. A search for the case reports available via MEDLINE was done since the first case report published by Money et al in 1977 till May 2011, using the following terms: apotemnophilia, self-demand amputation, body integrity identity disorder, and BIID. In all, 14 case reports were found relevant to our search. The desire to amputate one's healthy limb seems to be related to a major disturbance in the person's perception of one's own identity, where limb amputation can relieve temporarily the patient's feeling of distress without necessarily and uniformly adjusting the patient's own identity misperception. More investigations are needed in this domain in order to develop noninvasive treatment strategies that approach this aspect of the patient's distress within a globalist perspective. In addition, the health professionals' awareness regarding this disorder is required to ensure professional management of patients' suffering.

  12. Ethnic identity, territory and sustainable development

    International Nuclear Information System (INIS)

    Carmona Maya, Sergio Ivan

    1998-01-01

    This article explores, within the relationship between territory and society, the various points concerning cultural, social and ethnic identity through which the social contract on sustainable development must confront its greatest contradictions. The political position taken as regards sustainable development seeks cultural unity as a necessary condition for establishing modern forms of behavior to deal with styles of development and the management of the environment, for which to reconcile cultural diversity and the permanent social interaction between different ethnic groups, which is both imperative and of the utmost urgency

  13. Determining the disease management process for epileptic patients: A qualitative study.

    Science.gov (United States)

    Hosseini, Nazafarin; Sharif, Farkhondeh; Ahmadi, Fazlollah; Zare, Mohammad

    2016-01-01

    Epilepsy exposes patients to many physical, social, and emotional challenges. Thus, it seems to portray a complex picture and needs holistic care. Medical treatment and psychosocial part of epilepsy remain central to managing and improving the patient's qualify of life through team efforts. Some studies have shown the dimensions of self-management, but its management process of epilepsy patients, especially in Iran, is not clear. This study aimed to determine the disease management process in patients with epilepsy in Iran. This qualitative approach and grounded theory study was conducted from January 2009 to February 2012 in Isfahan city (Iran). Thirty-two participants were recruited by the goal-oriented, and snowball sample selection and theoretical sampling methods. After conducting a total of 43 in-depth interviews with the participants, the researchers reached data saturation. Data were analyzed using Strauss and Corbin method. With a focus on disease management process, researchers found three main themes and seven sub-themes as a psychosocial process (PSP). The main themes were: perception of threat to self-identity, effort to preserve self-identity, and burn out. The psychosocial aspect of the disease generated one main variable "the perception of identity loss" and one central variable "searching for self-identity." Participants attributed threat to self-identity and burn out to the way their disease was managed requiring efforts to preserve their identity. Recommendations consist of support programs and strategies to improve the public perception of epilepsy in Iran, help patients accept their condition and preserve self-identity, and most importantly, enhance medical management of epilepsy.

  14. Identity Support, Identity Devaluation, and Well-Being among Lesbians

    Science.gov (United States)

    Beals, Kristin P.; Peplau, Letitia Anne

    2005-01-01

    This research tested predictions about the association of identity support and identity devaluation with psychological well-being (self-esteem, life satisfaction, and depression). Lesbian women completed baseline surveys (N=42), then provided daily experience reports during a 2-week period (n=38), and completed a 2-month follow-up survey (n=34).…

  15. Racial Identity Attitudes and Ego Identity Statuses in Dominican and Puerto Rican College Students

    Science.gov (United States)

    Sanchez, Delida

    2013-01-01

    This study explored the relation between racial identity attitudes and ego identity statuses in 94 Dominican and Puerto Rican Latino college students in an urban public college setting. Simultaneous regression analyses were conducted to test the relation between racial identity attitudes and ego identity statuses, and findings indicated that…

  16. Bridging Identities

    Science.gov (United States)

    Deaux, Kay; Burke, Peter

    2010-01-01

    Sociology and psychology are no strangers in the theoretical world of self and identity. Early works by William James (1890), a psychologist, and George Herbert Mead (1934), a sociologist, are often taken as a starting point by investigators in both fields. In more recent years, with the development of a number of identity theories in both fields,…

  17. Components of Sexual Identity

    Science.gov (United States)

    Shively, Michael G.; DeCecco, John P.

    1977-01-01

    This paper examines the four components of sexual identity: biological sex, gender identity, social sex-role, and sexual orientation. Theories about the development of each component and how they combine and conflict to form the individual's sexual identity are discussed. (Author)

  18. Korean Adoptee Identity: Adoptive and Ethnic Identity Profiles of Adopted Korean Americans

    Science.gov (United States)

    Beaupre, Adam J.; Reichwald, Reed; Zhou, Xiang; Raleigh, Elizabeth; Lee, Richard M.

    2015-01-01

    Adopted Korean adolescents face the task of grappling with their identity as Koreans and coming to terms with their adoptive status. In order to explore these dual identities, the authors conducted a person-centered study of the identity profiles of 189 adopted Korean American adolescents. Using cluster analytic procedures, the study examined…

  19. 'Everyone here wants everyone else to get better': The role of social identity in eating disorder recovery.

    Science.gov (United States)

    McNamara, Niamh; Parsons, Harriet

    2016-12-01

    Retention of a positively valued illness identity contributes to poor outcomes for individuals with eating disorders (EDs). Consequently, dis-identification from the illness identity and the adoption of a recovery identity are vital for successful recovery. While social identity processes have been shown to influence ED maintenance, their role in recovery is rarely considered. This study explores how a sense of shared identity helps individuals with EDs manage their condition and promotes recovery. Transcripts from 18 online support sessions involving 75 participants were thematically analysed. Our findings suggest that the illness identity initially operates as a social identity that forms the basis for connections with similar others. For those wishing to recover, identity-based support is then perceived to be more effective than that found outside the group. Online interactions also facilitate construction of a new shared recovery identity which promotes a shift from the illness identity as a primary source of definition and endorses group norms of illness disclosure and treatment engagement. While in the clinical literature, ED identity is seen as problematic and interventions are targeted at challenging an individual's self-concept, we suggest that interventions could instead harness identity resources to support a transition to a recovery identity. © 2016 The British Psychological Society.

  20. Regional Commonalities and Regional Identities: Forging a Normative Understanding of Southeast Asian Identity

    Directory of Open Access Journals (Sweden)

    Gürol Baba

    2016-01-01

    Full Text Available In the last two decades, most of the IR academia’s attention on Southeast Asian regionalism utilised constructivism and/or realism and has focused on ASEAN and its derivatives. This article aims to skew this angle by elaborating a possible relationship between Asian values and a normative understanding of Southeast Asian identity. The major reason for this article’s focus on a normative interpretation is that a practical application of Southeast Asian identity is not very achievable due to various ethnic, cultural, political, territorial, and historical diversities. While the region is diverse, there are also a number of commonalities among its states. Asian values, from a Confucian perspective, account for some of these commonalities. By using constructivists’ claims on both the links between norms and identity and the dynamic interaction between values and norms, this article argues that Asian values could contribute to the development of Amitav Acharya’s widely cited normative/ideational format of Southeast Asian identity. The article takes ASEAN identity as a case study and aims to show why a normative identity is more achievable than a practical identity among Southeast Asians, and how Asian values might contribute to the creation of this shared identity.

  1. Identity-driven differences in stakeholder concerns about hunting wolves.

    Science.gov (United States)

    Lute, Michelle L; Bump, Adam; Gore, Meredith L

    2014-01-01

    Whereas past wolf management in the United States was restricted to recovery, managers must now contend with publicly contentious post-recovery issues including regulated hunting seasons. Understanding stakeholder concerns associated with hunting can inform stakeholder engagement, communication, and policy development and evaluation. Social identity theory (SIT) has been used to understand how groups interact, why they conflict, and how collaboration may be achieved. Applying SIT to stakeholder conflicts about wolf hunting may help delineate groups according to their concern about, support for or opposition to the policy choice of hunting wolves. Our objective was to assess concerns about hunting as a tool to resolve conflict in Michigan, using SIT as a framework. We used a mixed-modal sampling approach (e.g., paper, Internet) with wolf hunting-related public meeting participants in March 2013. Survey questions focused on 12 concerns previously identified as associated with hunting as a management tool to resolve conflict. Respondents (n  =  666) cared greatly about wolves but were divided over hunting wolves. Wolf conflicts, use of science in policy decisions, and maintaining a wolf population were the highest ranked concerns. Principle components analysis reduced concerns into three factors that explained 50.7% of total variance; concerns crystallized over justifications for hunting. General linear models revealed a lack of geographic influence on care, fear and support for hunting related to wolves. These findings challenge assumptions about regional differences and suggest a strong role for social identity in driving dichotomized public perceptions in wildlife management.

  2. Identity-driven differences in stakeholder concerns about hunting wolves.

    Directory of Open Access Journals (Sweden)

    Michelle L Lute

    Full Text Available Whereas past wolf management in the United States was restricted to recovery, managers must now contend with publicly contentious post-recovery issues including regulated hunting seasons. Understanding stakeholder concerns associated with hunting can inform stakeholder engagement, communication, and policy development and evaluation. Social identity theory (SIT has been used to understand how groups interact, why they conflict, and how collaboration may be achieved. Applying SIT to stakeholder conflicts about wolf hunting may help delineate groups according to their concern about, support for or opposition to the policy choice of hunting wolves. Our objective was to assess concerns about hunting as a tool to resolve conflict in Michigan, using SIT as a framework. We used a mixed-modal sampling approach (e.g., paper, Internet with wolf hunting-related public meeting participants in March 2013. Survey questions focused on 12 concerns previously identified as associated with hunting as a management tool to resolve conflict. Respondents (n  =  666 cared greatly about wolves but were divided over hunting wolves. Wolf conflicts, use of science in policy decisions, and maintaining a wolf population were the highest ranked concerns. Principle components analysis reduced concerns into three factors that explained 50.7% of total variance; concerns crystallized over justifications for hunting. General linear models revealed a lack of geographic influence on care, fear and support for hunting related to wolves. These findings challenge assumptions about regional differences and suggest a strong role for social identity in driving dichotomized public perceptions in wildlife management.

  3. Social Identity Change: Shifts in Social Identity during Adolescence

    Science.gov (United States)

    Tanti, Chris; Stukas, Arthur A.; Halloran, Michael J.; Foddy, Margaret

    2011-01-01

    This study investigated the proposition that adolescence involves significant shifts in social identity as a function of changes in social context and cognitive style. Using an experimental design, we primed either peer or gender identity with a sample of 380 early- (12-13 years), mid- (15-16 years), and late-adolescents (18-20 years) and then…

  4. Inter-identity autobiographical amnesia in patients with dissociative identity disorder.

    Science.gov (United States)

    Huntjens, Rafaële J C; Verschuere, Bruno; McNally, Richard J

    2012-01-01

    A major symptom of Dissociative Identity Disorder (DID; formerly Multiple Personality Disorder) is dissociative amnesia, the inability to recall important personal information. Only two case studies have directly addressed autobiographical memory in DID. Both provided evidence suggestive of dissociative amnesia. The aim of the current study was to objectively assess transfer of autobiographical information between identities in a larger sample of DID patients. Using a concealed information task, we assessed recognition of autobiographical details in an amnesic identity. Eleven DID patients, 27 normal controls, and 23 controls simulating DID participated. Controls and simulators were matched to patients on age, education level, and type of autobiographical memory tested. Although patients subjectively reported amnesia for the autobiographical details included in the task, the results indicated transfer of information between identities. The results call for a revision of the DID definition. The amnesia criterion should be modified to emphasize its subjective nature.

  5. Being Tolerant about Identity?

    NARCIS (Netherlands)

    van Rooij, R.; Gutzmann, D.; Köpping, J.; Meier, C.

    2014-01-01

    Identity and identification are very important concepts in philosophy and logic. They are crucial for the analysis of quantification and for counting. According to some philosophers, many examples that are supposed to show that identity is contingent, in fact show that the notion of identity is

  6. Post-colonial identity in Greenland?

    DEFF Research Database (Denmark)

    Gad, Ulrik Pram

    2009-01-01

    could be furthered by bringing politics back in. Based on a discourse analysis of the Greenlandic debate on language, this paper makes three claims: First, the identity projects promoted in Greenland are based on an essentialist conception of identity. Secondly, Greenlandic identity discourse combines......In the gradual unravelling of Greenland’s colonial relationship to Denmark, an essentialist conceptualization of Greenlandic identity has played a significant role. However, both our scholarly understanding of post-colonial Greenlandic identity and the process towards independence for Greenland...... elements of traditional Inuit culture and elements of colonial modernity. Thirdly, monolingual Greenlanders are those with the most to gain from abandoning the dichotomy of essentialist identities. Strategically, the paper suggests a post-post-colonial Greenlandic identity as a means of avoiding...

  7. On the fundamentals of identity

    NARCIS (Netherlands)

    van der Gaag, Mandy

    Various new perspectives on identity have been introduced or have increased in popularity over the past two decades. These include identity as dynamic system (Kunnen & Bosma, 2001), a narrative approach to identity (McAdams, 2001), multi-dimensional models of identity formation (Luyckx et al., 2006;

  8. Personal Identity in Enhancement

    Directory of Open Access Journals (Sweden)

    Jana Podroužková

    2015-09-01

    Full Text Available The aim of this paper is to introduce the concept of human enhancement, its methods and its relation to personal identity. Also several approaches to personal identity will be described. Transhumanism is a special think tank supporting human enhancement through modern technologies and some of its representatives claim, that even great changes to human organisms will not affect their personal identity. I will briefly describe the most important means of human enhancment and consider the problem of personal identity for each of them separately.

  9. Known and Unknown Identity

    DEFF Research Database (Denmark)

    Henze-Pedersen, Sofie

    This qualitative study investigates the relationship between openness and identity among 18 adoptees. Many studies have argued that a high degree of openness is important for the identity formation of adoptees. However, few studies have explored this relationship. Two types of openness...... (biographical knowledge and communicative openness) are used to categorise the empirical material, making it possible to illuminate how different types of openness influence identity. The findings suggest that there is no direct link between a high degree of openness and positive identity formation. Instead...

  10. Construction of meaningful identities in the context of rheumatoid arthritis, motherhood and paid work

    DEFF Research Database (Denmark)

    Feddersen, Helle; Kristiansen, Tine Mechlenborg; Andersen, Pernille Tanggaard

    2017-01-01

    AIMS AND OBJECTIVES: To derive new conceptual understanding about how women with rheumatoid arthritis manage their illness, motherhood and paid work, based on a comprehensive overview of existing knowledge, gained from qualitative studies. BACKGROUND: Rheumatoid arthritis affects several social...... aspects of life; however, little is known about how women with rheumatoid arthritis simultaneously manage their illness, motherhood and paid work. DESIGN: Qualitative metasynthesis. METHODS: A qualitative metasynthesis informed by Noblit and Hare's meta-ethnography was carried out, based on studies...... identified by a systematic search in nine databases. RESULTS: Six studies were included. Social interactions in the performance of three interdependent sub-identities emerged as an overarching category, with three sub-categories: Sub-identities associated with (1) Paid work (2) Motherhood and (3) Rheumatoid...

  11. Inter-Identity Autobiographical Amnesia in Patients with Dissociative Identity Disorder

    Science.gov (United States)

    Huntjens, Rafaële J. C.; Verschuere, Bruno; McNally, Richard J.

    2012-01-01

    Background A major symptom of Dissociative Identity Disorder (DID; formerly Multiple Personality Disorder) is dissociative amnesia, the inability to recall important personal information. Only two case studies have directly addressed autobiographical memory in DID. Both provided evidence suggestive of dissociative amnesia. The aim of the current study was to objectively assess transfer of autobiographical information between identities in a larger sample of DID patients. Methods Using a concealed information task, we assessed recognition of autobiographical details in an amnesic identity. Eleven DID patients, 27 normal controls, and 23 controls simulating DID participated. Controls and simulators were matched to patients on age, education level, and type of autobiographical memory tested. Findings Although patients subjectively reported amnesia for the autobiographical details included in the task, the results indicated transfer of information between identities. Conclusion The results call for a revision of the DID definition. The amnesia criterion should be modified to emphasize its subjective nature. PMID:22815769

  12. Inter-identity autobiographical amnesia in patients with dissociative identity disorder.

    Directory of Open Access Journals (Sweden)

    Rafaële J C Huntjens

    Full Text Available BACKGROUND: A major symptom of Dissociative Identity Disorder (DID; formerly Multiple Personality Disorder is dissociative amnesia, the inability to recall important personal information. Only two case studies have directly addressed autobiographical memory in DID. Both provided evidence suggestive of dissociative amnesia. The aim of the current study was to objectively assess transfer of autobiographical information between identities in a larger sample of DID patients. METHODS: Using a concealed information task, we assessed recognition of autobiographical details in an amnesic identity. Eleven DID patients, 27 normal controls, and 23 controls simulating DID participated. Controls and simulators were matched to patients on age, education level, and type of autobiographical memory tested. FINDINGS: Although patients subjectively reported amnesia for the autobiographical details included in the task, the results indicated transfer of information between identities. CONCLUSION: The results call for a revision of the DID definition. The amnesia criterion should be modified to emphasize its subjective nature.

  13. Nature versus nurture: identical twins and bariatric surgery.

    Science.gov (United States)

    Hagedorn, Judith C; Morton, John M

    2007-06-01

    Genetics and environment both play a role in weight maintenance. Twin studies may help clarify the influence of nature vs nurture in weight loss. We present the largest U.S. experience with monozygotic (MZ) twins undergoing bariatric surgery. We retrospectively reviewed the charts of four sets of MZ twins who underwent Roux-en-Y gastric bypass (RYGBP) surgery and laparoscopic adjustable gastric band (LAGB) placement at three different institutions. BMI and co-morbidities were examined pre- and postoperatively, and laboratory values were recorded. All four sets of twins are female, live together, and have similar professions. Twin cohort 1 had near identical weight loss patterns after open RYGBP surgery in 1996 (preop 146/142 kg; 2 years 82/82; and 10 years 108/107). Twin cohort 1 also both underwent cholecystectomies within the first year postoperatively. Twin cohort 2 underwent laparoscopic RYGBP surgery and also required cholecystectomies in the first postoperative year. Cohort 2 also experienced nearly identical weight loss at 1 year (36.7% vs 37.0% BMI loss). Twin cohort 3 underwent LAGB placement with two different surgeons with differing amounts of weight loss at 6 months (6.5% vs 15.7% BMI loss). Finally, twin cohort 4 underwent laparoscopic RYGBP with 2-year BMI loss of 39% vs 34%. In twin cohort 4, the twin who lost less weight lived apart from her twin and extended family, and her weight loss was less than the twin living with her family. Two sets of MZ twins had identical responses to bariatric surgery. The other two sets of identical twins had differential weight loss results, possibly due to differences in surgical approach and social support. While genetics do exert a strong influence on weight loss and maintenance, this case series demonstrates the potential effect of social support and postoperative management upon postoperative weight loss in the presence of identical genetics.

  14. Brand Management

    OpenAIRE

    Polách, Petr

    2012-01-01

    Theoretical part of thesis on the topic "Brand management" will deal with tools for strategic brand management ifself, specifically managements instruments. Next part will be devoted to brand, its identity, image, elements, value, legal protection and eventually to methods of valuation. In practical part will be applied knowledge of strategic brand management to the selected company Vivantis a.s. Part of practical part will be surfy about public awareness of the brand Vivantis a.s. On the bas...

  15. 7 CFR 52.771 - Identity.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 2 2010-01-01 2010-01-01 false Identity. 52.771 Section 52.771 Agriculture... United States Standards for Grades of Canned Red Tart Pitted Cherries 1 Identity and Grades § 52.771 Identity. Canned red tart pitted cherries is the product represented as defined in the standard of identity...

  16. Identity style and coping strategies.

    Science.gov (United States)

    Berzonsky, M D

    1992-12-01

    This study examined the relationship between identity style and strategies used to cope with stressors that potentially threaten one's sense of identity. Identity style refers to differences in the way individuals construct and revise or maintain their sense of identity. An informational style involves actively seeking out, evaluating, and utilizing self-relevant information. A normative style highlights the expectations and standards of significant others. A diffuse/avoidant style is characterized by procrastination and situation-specific reactions. Late-adolescent college subjects were administered measures of identity style, ways of coping with academic stressors, and test anxiety. Within this self-as-student context, subjects with diffuse and normative identity styles employed avoidant-oriented coping strategies (wishful thinking, distancing, and tension reduction). An informational style was associated with deliberate, problem-focused coping. Findings are discussed in terms of a process model of identity development.

  17. Tools for Understanding Identity

    Energy Technology Data Exchange (ETDEWEB)

    Creese, Sadie; Gibson-Robinson, Thomas; Goldsmith, Michael; Hodges, Duncan; Kim, Dee DH; Love, Oriana J.; Nurse, Jason R.; Pike, William A.; Scholtz, Jean

    2013-12-28

    Identity attribution and enrichment is critical to many aspects of law-enforcement and intelligence gathering; this identity typically spans a number of domains in the natural-world such as biographic information (factual information – e.g. names, addresses), biometric information (e.g. fingerprints) and psychological information. In addition to these natural-world projections of identity, identity elements are projected in the cyber-world. Conversely, undesirable elements may use similar techniques to target individuals for spear-phishing attacks (or worse), and potential targets or their organizations may want to determine how to minimize the attack surface exposed. Our research has been exploring the construction of a mathematical model for identity that supports such holistic identities. The model captures the ways in which an identity is constructed through a combination of data elements (e.g. a username on a forum, an address, a telephone number). Some of these elements may allow new characteristics to be inferred, hence enriching the holistic view of the identity. An example use-case would be the inference of real names from usernames, the ‘path’ created by inferring new elements of identity is highlighted in the ‘critical information’ panel. Individual attribution exercises can be understood as paths through a number of elements. Intuitively the entire realizable ‘capability’ can be modeled as a directed graph, where the elements are nodes and the inferences are represented by links connecting one or more antecedents with a conclusion. The model can be operationalized with two levels of tool support described in this paper, the first is a working prototype, the second is expected to reach prototype by July 2013: Understanding the Model The tool allows a user to easily determine, given a particular set of inferences and attributes, which elements or inferences are of most value to an investigator (or an attacker). The tool is also able to take

  18. Revocable identity-based proxy re-signature against signing key exposure.

    Science.gov (United States)

    Yang, Xiaodong; Chen, Chunlin; Ma, Tingchun; Wang, Jinli; Wang, Caifen

    2018-01-01

    Identity-based proxy re-signature (IDPRS) is a novel cryptographic primitive that allows a semi-trusted proxy to convert a signature under one identity into another signature under another identity on the same message by using a re-signature key. Due to this transformation function, IDPRS is very useful in constructing privacy-preserving schemes for various information systems. Key revocation functionality is important in practical IDPRS for managing users dynamically; however, the existing IDPRS schemes do not provide revocation mechanisms that allow the removal of misbehaving or compromised users from the system. In this paper, we first introduce a notion called revocable identity-based proxy re-signature (RIDPRS) to achieve the revocation functionality. We provide a formal definition of RIDPRS as well as its security model. Then, we present a concrete RIDPRS scheme that can resist signing key exposure and prove that the proposed scheme is existentially unforgeable against adaptive chosen identity and message attacks in the standard model. To further improve the performance of signature verification in RIDPRS, we introduce a notion called server-aided revocable identity-based proxy re-signature (SA-RIDPRS). Moreover, we extend the proposed RIDPRS scheme to the SA-RIDPRS scheme and prove that this extended scheme is secure against adaptive chosen message and collusion attacks. The analysis results show that our two schemes remain efficient in terms of computational complexity when implementing user revocation procedures. In particular, in the SA-RIDPRS scheme, the verifier needs to perform only a bilinear pairing and four exponentiation operations to verify the validity of the signature. Compared with other IDPRS schemes in the standard model, our SA-RIDPRS scheme greatly reduces the computation overhead of verification.

  19. Perceived consequences of hypothetical identity-inconsistent sexual experiences: effects of perceiver's sex and sexual identity.

    Science.gov (United States)

    Preciado, Mariana A; Johnson, Kerri L

    2014-04-01

    Most people organize their sexual orientation under a single sexual identity label. However, people may have sexual experiences that are inconsistent with their categorical sexual identity label. A man might identify as heterosexual but still experience some attraction to men; a woman might identify as lesbian yet enter into a romantic relationship with a man. Identity-inconsistent experiences are likely to have consequences. In the present study, we examined lay perceptions of the consequences of identity-inconsistent sexual experiences for self-perceived sexuality and for social relationships among a sexually diverse sample (N = 283). We found that the perceived consequences of identity-inconsistent experiences for self-perception, for social stigmatization, and for social relationships varied as a function of participant sex, participant sexual identity (heterosexual, gay, lesbian), and experience type (fantasy, attraction, behavior, love). We conclude that not all identity-inconsistent sexual experiences are perceived as equally consequential and that the perceived consequences of such experiences vary predictably as a function of perceiver sex and sexual identity. We discuss the role lay perceptions of the consequences of identity-inconsistent sexual experiences may play in guiding attitudes and behavior.

  20. The change of expression configuration affects identity-dependent expression aftereffect but not identity-independent expression aftereffect

    Directory of Open Access Journals (Sweden)

    Miao eSong

    2015-12-01

    Full Text Available The present study examined the influence of expression configuration on cross-identity expression aftereffect. The expression configuration refers to the spatial arrangement of facial features in a face for conveying an emotion, e.g., an open-mouth smile versus a closed-mouth smile. In the first of two experiments, the expression aftereffect is measured using across-identity/cross-expression configuration factorial design. The facial identities of test faces were the same or different from the adaptor, while orthogonally, the expression configurations of those facial identities were also the same or different. The result shows that the change of expression configuration impaired the expression aftereffect when the facial identities of adaptor and tests were the same; however, the impairment effect disappears when facial identities were different, indicating the identity-independent expression representation is more robust to the change of the expression configuration in comparison with the identity-dependent expression representation. In the second experiment, we used schematic line faces as adaptors and real faces as tests to minimize the similarity between the adaptor and tests, which is expected to exclude the contribution from the identity-dependent expression representation to expression aftereffect. The second experiment yields a similar result as the identity-independent expression aftereffect observed in Experiment 1. The findings indicate the different neural sensitivities to expression configuration for identity-dependent and identity-independent expression systems.

  1. How the past weighs on the present: social representations of history and their role in identity politics.

    Science.gov (United States)

    Liu, James H; Hilton, Denis J

    2005-12-01

    Socially shared representations of history have been important in creating, maintaining and changing a people's identity. Their management and negotiation are central to interethnic and international relations. We present a narrative framework to represent how collectively significant events become (selectively) incorporated in social representations that enable positioning of ethnic, national and supranational identities. This perspective creates diachronic (temporal) links between the functional (e.g. realistic conflict theory), social identity, and cognitive perspectives on intergroup relations. The charters embedded in these representations condition nations with similar interests to adopt different political stances in dealing with current events, and can influence the perceived stability and legitimacy of social orders. They are also instrumental in determining social identity strategies for reacting to negative social comparisons, and can influence the relationships between national and ethnic identities.

  2. Author identities an interoperability problem solved by a collaborative solution

    Science.gov (United States)

    Fleischer, D.; Czerniak, A.; Schirnick, C.

    2012-12-01

    The identity of authors and data providers is crucial for personalized interoperability. The marketplace of available identifiers is packed and the right choice is getting more and more complicated. Even though there are more then 15 different systems available there are still some under development and proposed to come up by the end of 2012 ('PubMed Central Author ID' and ORCID). Data Management on a scale beyond the size of a single research institute but on the scale of a scientific site including a university with student education program needs to tackle this problem and so did the Kiel Data Management an Infrastructure. The main problem with the identities of researchers is the quite high frequency changes in positions during a scientist life. The required system needed to be a system that already contained the potential of preregistered people with their scientific publications from other countries, institutions and organizations. Scanning the author ID marketplace brought up, that there us a high risk of additional workload to the researcher itself or the administration due to the fact that individuals need to register an ID for themselves or the chosen register is not yet big enough to simply find the right entry. On the other hand libraries deal with authors and their publications now for centuries and they have high quality catalogs with person identities already available. Millions of records internationally mapped are available by collaboration with libraries and can be used in exactly the same scope. The international collaboration between libraries (VIAF) provides a mapping between libraries from the US, CA, UK, FR, GER and many more. The international library author identification system made it possible to actually reach at the first matching a success of 60% of all scientists. The additional advantage is that librarians can finalize the Identity system in a kind of background process. The Kiel Data Management Infrastructure initiated a web service

  3. Negotiation of identities in intercultural communication

    Directory of Open Access Journals (Sweden)

    Janík Zdeněk

    2017-01-01

    Full Text Available Negotiation of identities in communication entails affirming the identities we want others to recognize in us and ascription of identities we mutually assign to each other in communication. The study of intercultural communication focuses on cultural identity as the principal identity component that defines intercultural communication. In this article, the assumption that cultural group membership factors determine the context of intercultural communication is questioned. The article examines how intercultural interlocutors negotiate their identities in various intercultural interactions. The aims of the research presented in this paper are: 1 to examine which identities - cultural, personal, or social - intercultural interlocutors activate in intercultural communication; 2 to determine whether interlocutors’ intercultural communication is largely influenced by their cultural identities; 3 and to identify situations in which they activate their cultural identities (3. The research data were collected from 263 international students studying at Masaryk University in Brno in the years 2010 - 2016. Although the research results are not conclusive, they indicate that cultural identities predominate in the students’ ethnocentric views and that stereotypes constrain the students’ cultural identities and affect the negotiation of identities in intercultural communication.

  4. Relationship between job satisfaction, professional identity and intention to leave the profession among nurses in Turkey.

    Science.gov (United States)

    Sabanciogullari, Selma; Dogan, Selma

    2015-11-01

    The purpose of this study is to investigate the relationship between job satisfaction, professional identity and intention to leave the profession among nurses in Turkey. Although there are many studies on job satisfaction among nurses in Turkey, there is a gap in the literature in relation to professional identity, particularly for intentions to leave the profession. This cross-sectional, descriptive and correlational study was conducted with 2122 nurses from Turkey. A positive and significant correlation was determined between the nurses' job satisfaction and professional identities. It was found that 15.5% of the nurses intended to leave their profession. Intention to leave the profession was greater among the nurses with inadequate professional identity development and low job satisfaction. Professional identity is a factor affecting job satisfaction. Both professional identity and job satisfaction are important factors affecting nurses' intention leaving the profession. Given that professional identity and job satisfaction affect intention to leave the profession and professional identity affects job satisfaction, nurse managers who are mainly responsible for the quality of nursing care should develop strategies that support nurses' professional identity and increase their job satisfaction if they are to prevent nurses from leaving the profession. © 2014 John Wiley & Sons Ltd.

  5. Personal Identity Online

    DEFF Research Database (Denmark)

    Rodogno, Raffaele

    2012-01-01

    Philosophers concerned with the question of personal identity have typically been asking the so-called re-identification question: what are the conditions under which a person at one point in time is properly re-identified at another point in time? This is a rather technical question. In our...... everyday interactions, however, we do raise a number of personal identity questions that are quite distinct from it. In order to explore the variety of ways in which the Internet may affect personal identity, I propose in this study to broaden the typical philosophical horizon to other more mundane senses...... of the question. In Section 2, I describe a number of possible meanings of personal identity observed in everyday contexts and more philosophical ones. With some caveats, I argue that it is the specific context in which the question arises that disambiguates the meaning of the question. Online contexts are novel...

  6. Researcher Identity in Transition

    DEFF Research Database (Denmark)

    Castelló, Montserrat; Kobayashi, Sofie; McGinn, Michelle K.

    2015-01-01

    to reinterpretation, and ECRs need to attend to new or reimagined signals in their efforts to develop a researcher identity in this current context. In this article, we present a comprehensive framework for researcher identity in relation to the ways ECRs recognise and respond to divergent signals across spheres...... of activity. We illustrate this framework through eight identity stories drawn from our earlier research projects. Each identity story highlights the congruence (or lack of congruence) between signals across spheres of activity and emphasises the different ways ECRs respond to these signals. The proposed...... comprehensive framework allows for the analysis of researcher identity development through the complex and intertwined activities in which ECRs are involved. We advance this approach as a foundation for a sustained research agenda to understand how ECRs identify and respond to relevant signals, and...

  7. (Re)scaling identities

    DEFF Research Database (Denmark)

    Koefoed, Lasse Martin; Simonsen, Kirsten

    2012-01-01

    of Pakistani origin, the study employs theoretical ideas of estrangement, identification and recognition in order to obtain a thorough understanding of the complexity and the contradictory character of their spatial identities and affiliations. A turning point in the double processes of estrangement...... of identity....

  8. Identity without Membership?

    DEFF Research Database (Denmark)

    Dobusch, Leonhard; Schoeneborn, Dennis

    the formation of organizational identity in more fluid organizational settings. Drawing on an empirical study of the hacker collective Anonymous, we show that organizational identity is formed through public communicative events that are subject to meaning negotiation whether or not actions can be attributed...

  9. Similarly Torn, Differentially Shorn? The Experience and Management of Conflict between Multiple Roles, Relationships, and Social Categories

    Directory of Open Access Journals (Sweden)

    Janelle M. Jones

    2017-10-01

    Full Text Available In three studies we examined the experience and management of conflict between different types of multiple identities. Participants described a conflict between pairs of role, relational, or social identities before rating the experience (i.e., magnitude, stress, and growth and management of conflict on a newly developed scale assessing four strategies: reconciliation, where identities are integrated, realignment, where one identity is chosen over another, retreat, where both identities are avoided, and reflection, where fit (with others, situation determines identity selection. In general, the types of identities mattered for conflict management but not its experience: Magnitude and growth did not differ, however, stress was greater for role identity conflicts (Study 3 only and participants endorsed the use of more realignment for role conflicts (Study 2 and more retreat for relational conflicts (Study 3 relative to other types of identity conflicts. Furthermore, findings suggested that the perceived flexibility of identities, not their importance or valence, were associated with realignment and retreat for roles and with retreat for relationships. Experiencing conflicts between multiple identities leaves people similarly torn, but multiple roles and relationships may be differentially shorn to manage conflict.

  10. Similarly Torn, Differentially Shorn? The Experience and Management of Conflict between Multiple Roles, Relationships, and Social Categories

    Science.gov (United States)

    Jones, Janelle M.; Hynie, Michaela

    2017-01-01

    In three studies we examined the experience and management of conflict between different types of multiple identities. Participants described a conflict between pairs of role, relational, or social identities before rating the experience (i.e., magnitude, stress, and growth) and management of conflict on a newly developed scale assessing four strategies: reconciliation, where identities are integrated, realignment, where one identity is chosen over another, retreat, where both identities are avoided, and reflection, where fit (with others, situation) determines identity selection. In general, the types of identities mattered for conflict management but not its experience: Magnitude and growth did not differ, however, stress was greater for role identity conflicts (Study 3 only) and participants endorsed the use of more realignment for role conflicts (Study 2) and more retreat for relational conflicts (Study 3) relative to other types of identity conflicts. Furthermore, findings suggested that the perceived flexibility of identities, not their importance or valence, were associated with realignment and retreat for roles and with retreat for relationships. Experiencing conflicts between multiple identities leaves people similarly torn, but multiple roles and relationships may be differentially shorn to manage conflict. PMID:29051744

  11. Similarly Torn, Differentially Shorn? The Experience and Management of Conflict between Multiple Roles, Relationships, and Social Categories.

    Science.gov (United States)

    Jones, Janelle M; Hynie, Michaela

    2017-01-01

    In three studies we examined the experience and management of conflict between different types of multiple identities. Participants described a conflict between pairs of role, relational, or social identities before rating the experience (i.e., magnitude, stress, and growth) and management of conflict on a newly developed scale assessing four strategies: reconciliation , where identities are integrated, realignment , where one identity is chosen over another, retreat , where both identities are avoided, and reflection , where fit (with others, situation) determines identity selection. In general, the types of identities mattered for conflict management but not its experience: Magnitude and growth did not differ, however, stress was greater for role identity conflicts ( Study 3 only ) and participants endorsed the use of more realignment for role conflicts ( Study 2 ) and more retreat for relational conflicts ( Study 3 ) relative to other types of identity conflicts. Furthermore, findings suggested that the perceived flexibility of identities, not their importance or valence, were associated with realignment and retreat for roles and with retreat for relationships. Experiencing conflicts between multiple identities leaves people similarly torn, but multiple roles and relationships may be differentially shorn to manage conflict.

  12. Enacting Efficacy in Early Career: Narratives of Agency, Growth, and Identity

    Directory of Open Access Journals (Sweden)

    Elizabeth K Niehaus

    2017-01-01

    Full Text Available Aim/Purpose: To explore how early career faculty in the field of higher education administration develop and enact their personal and professional identities. Background:\tParticipants sought to understand themselves, to understand their environments and the “rules” of the academic “game,” and to reconcile conflicts between their own values and identities and the expectations and culture of their environments. Methodology: In-depth case studies of seventeen early career scholars in the field. Contribution: The participants’ experiences underscore important implications for mentoring and socialization that takes into consideration the unique motivation and identity development of aspiring and new faculty members. Findings: Identifies the early career period as one where new faculty are working to develop a strong internal foundation upon which they can manage the many challenges of their personal and professional lives. Recommendations: The findings point to implications for practice, both in graduate education and in departments hiring new faculty members.

  13. Intersectional identities and dilemmas in interactions with healthcare professionals: an interpretative phenomenological analysis of British Muslim gay men.

    Science.gov (United States)

    Semlyen, Joanna; Ali, Atif; Flowers, Paul

    2017-12-22

    Individual interviews were conducted with six self-identified Muslim gay men living in London focusing on their experience of health service use. Transcripts were analysed using interpretative phenomenological analysis. Analysis identified two major themes: the close(d) community and self-management with healthcare professionals, detailing participants' concerns regarding the risks of disclosing sexuality; and the authentic identity - 'you're either a Muslim or you're gay, you can't be both' - which delineated notions of incommensurate identity. Analysis highlights the need for health practitioners to have insight into the complexity of intersectional identities, identity disclosure dynamics and the negative consequences of assumptions made, be these heteronormative or faith-related.

  14. Identity uncertainty and commitment making across adolescence : Five-year within-person associations using daily identity reports

    NARCIS (Netherlands)

    Becht, Andrik I.; Nelemans, Stefanie A.; Branje, Susan J. T.; Vollebergh, Wilma A. M.; Koot, Hans M.; Meeus, W.H.J.

    2017-01-01

    A central assumption of identity theory is that adolescents reconsider current identity commitments and explore identity alternatives before they make new commitments in various identity domains (Erikson, 1968; Marcia, 1966). Yet, little empirical evidence is available on how commitment and

  15. DoD Identity Matching Engine for Security and Analysis (IMESA) Access to Criminal Justice Information (CJI) and Terrorist Screening Databases (TSDB)

    Science.gov (United States)

    2016-05-04

    Department of Defense INSTRUCTION NUMBER 5525.19 May 4, 2016 USD(P&R) SUBJECT: DoD Identity Matching Engine for Security and Analysis...DoD Identity Management Capability Enterprise Services Application (IMESA) Access to FBI National Crime Information Center (NCIC) Files,” April 22...Coordinates with: (1) The USD(I) for oversight and maintenance responsibilities, and for changes to digital DoD personnel identity data and

  16. Identity driven Capability based Access Control (ICAC) Scheme for the Internet of Things

    DEFF Research Database (Denmark)

    Mahalle, Parikshit N.; Anggorojati, Bayu; Prasad, Neeli R.

    2012-01-01

    Internet of Things (IoT) becomes discretionary part of everyday life. Scalability and manageability is daunting due to unbounded number of devices and services. Access control and authorization in IoT with least privilege is equally important to establish secure communication between multiple...... devices and services. In this paper, the concept of capability for access control is introduced where the identities of the involved devices are entrenched in the access capabilities. Identity driven capability based access control (ICAC) scheme presented in this paper helps to alleviate issues related...... to complexity and dynamics of device identities. ICAC is implemented for 802.11 and results shows that ICAC has less scalability issues and better performance analysis compared with other access control schemes. The ICAC evaluation by using security protocol verification tool shows that ICAC is secure against...

  17. Identity as wrapping up

    DEFF Research Database (Denmark)

    Nickelsen, Niels Christian Mossfeldt

    2015-01-01

    The aim of this paper is to provide an understanding of cross-professional collaboration and to develop a notion of professional identity based in practice. The background of the paper is science and technology studies and more precisely actor network theory. The method used: The empirical analysis...... in close relation to the making of a report concerning the cross-professional collaboration. Findings are that “Identity as wrapping up” points to the way in which certain actors, by other actors, are maneuvered into certain pockets in a network. Identity as wrapping up is emphasized as a way...... of participating, which is closely connected to the intention to control the relation towards the other. Thus identity as wrapping up is argued to be a strategy to optimize the situation of one’s own profession. Conclusion: This articulation of identity contributes to the actor network literature as well...

  18. Visual identity and rebranding

    Directory of Open Access Journals (Sweden)

    Katarzyna Wrona

    2015-06-01

    Full Text Available The goal of this article is to highlight the essence of visual identification and rebranding, as well as to discuss elements of corporate identity, which are subject to revitalization in the process of refreshing the image of a brand. In the first part the article the analysis of the term visual identification is conducted. In the analysis special attention is drawn to the role of visual identification in creating a coherent identity of an organization. In the subsequent chapters further components of corporate identity are presented in detail – starting with logotype, through business forms, advertisements, accompanying materials and Internet websites to signs on buildings. Moreover, corporate identity book as a collection of standards and guidelines for application of corporate identity rules is discussed. The deliberations are based on the study of literature. The last chapter presented the transformation of the brand of Institute of Aviation.

  19. Children's Social Identities

    Science.gov (United States)

    Bennett, Mark

    2011-01-01

    This paper provides a brief overview of recent developmental research on themes related to children's social identities. Initially, consideration is given to the capacity for social categorization, following which attention is given to children's developing conceptions of social identities, their identification with social groups, and the…

  20. An Empiric Study about the Construction of Social Identity of Toy Art Consumer´s

    Directory of Open Access Journals (Sweden)

    Renata Andreoni Barboza

    2013-12-01

    Full Text Available The existence of seemingly childish goods directed to adult consumers is a recent and growing market phenomenon. Having Toy Arts as an exemplar of such products, this investigation aims to understand how Toy Art consumers use it to build and manage their social identity, exploring the factors that trigger a process of extension of self. A qualitative study was conducted with in-depth interviews with 14 Toy collectors, male and female, between 19 and 38 years old, living in Minas Gerais, Rio de Janeiro, Rio Grande do Sul, São Paulo and Distrito Federal, during July and August 2009. Results show that informants use Toy Arts to build and manage their social identities, relying on it as a form of social expression and differentiation.

  1. When moral identity symbolization motivates prosocial behavior: the role of recognition and moral identity internalization.

    Science.gov (United States)

    Winterich, Karen Page; Aquino, Karl; Mittal, Vikas; Swartz, Richard

    2013-09-01

    This article examines the role of moral identity symbolization in motivating prosocial behaviors. We propose a 3-way interaction of moral identity symbolization, internalization, and recognition to predict prosocial behavior. When moral identity internalization is low, we hypothesize that high moral identity symbolization motivates recognized prosocial behavior due to the opportunity to present one's moral characteristics to others. In contrast, when moral identity internalization is high, prosocial behavior is motivated irrespective of the level of symbolization and recognition. Two studies provide support for this pattern examining volunteering of time. Our results provide a framework for predicting prosocial behavior by combining the 2 dimensions of moral identity with the situational factor of recognition. PsycINFO Database Record (c) 2013 APA, all rights reserved

  2. Multicultural identity integration and well-being: a qualitative exploration of variations in narrative coherence and multicultural identification.

    Science.gov (United States)

    Yampolsky, Maya A; Amiot, Catherine E; de la Sablonnière, Roxane

    2013-01-01

    Understanding the experiences of multicultural individuals is vital in our diverse populations. Multicultural people often need to navigate the different norms and values associated with their multiple cultural identities. Recent research on multicultural identification has focused on how individuals with multiple cultural groups manage these different identities within the self, and how this process predicts well-being. The current study built on this research by using a qualitative method to examine the process of configuring one's identities within the self. The present study employed three of the four different multiple identity configurations in Amiot et al. (2007) cognitive-developmental model of social identity integration: categorization, where people identify with one of their cultural groups over others; compartmentalization, where individuals maintain multiple, separate identities within themselves; and integration, where people link their multiple cultural identities. Life narratives were used to investigate the relationship between each of these configurations and well-being, as indicated by narrative coherence. It was expected that individuals with integrated cultural identities would report greater narrative coherence than individuals who compartmentalized and categorized their cultural identities. For all twenty-two participants, identity integration was significantly and positively related to narrative coherence, while compartmentalization was significantly and negatively related to narrative coherence. ANOVAs revealed that integrated and categorized participants reported significantly greater narrative coherence than compartmentalized participants. These findings are discussed in light of previous research on multicultural identity integration.

  3. Organizational restructuring and reconstruction of identity: a case study in the company of telecommunications

    Directory of Open Access Journals (Sweden)

    Daniela Cristina Soares

    2010-01-01

    Full Text Available The main objective of this research is to analyze the impacts that re-structuring the telephone operators at the cellular operators has on the identity of the workers. The theme talks about the profound transformations which occur in the world of work, derived from the link between globalization and the economy, the ongoing advancements in technology and the new immerging forms of Company management. The methodology adopted is of qualitative nature whose data was collected by means of semi-structured interviews. Theoretically speaking, this research boarders two fundamental themes; the current changes that occur in relationships at the workplace and the effects these changes have on the identity of professionals. The survey results show that the process of organizational restructuring culminated with the simultaneous resignation of 382 officials from the area of call center and was conducted in a cruel and merciless. The managers were informed of the decision by the company two days before the action occurredand the area of human resources was limited to bureaucratic aspects of care. The experience generated by the interviewees feelings of surprise, disappointment, sadness and anguish, affecting negatively the process of construction and reconstruction of identities.

  4. Reciprocal Associations between Educational Identity and Vocational Identity in Adolescence: A Three-wave Longitudinal Investigation.

    Science.gov (United States)

    Negru-Subtirica, Oana; Pop, Eleonora Ioana

    2018-04-01

    Education and vocation are core identity domains in adolescence. School is a normative social context in this developmental time frame and the formation of an educational identity is embedded in the goals that youth pursue in school. One of the main goals of education is to prepare young people for their future careers. Hence, educational identity should support the formation of vocational identity during adolescence. Considering the limited evidence on the longitudinal links between these two domain-specific identities, we conducted a three-wave investigation, testing the moderating role of age group, gender, and type of school. Participants (N = 1030; 59.3% female) were adolescents (M age  = 16.72 years, SD age  = 1.23, age range 14-19 years) who completed self-report measures of educational and vocational identity three times during an academic year. We underscored reciprocal associations between educational identity and vocational identity. The results indicate that strong educational commitments supported the formation of strong vocational commitments across time. Adolescents who were involved in the in-depth exploration of their educational choices also reported more vocational exploration during the school year. In turn, vocational identity processes also supported educational identity formation, especially the reconsideration of educational commitments. In terms of moderators, we underscored that vocational commitment making and vocational flexibility bolstered educational commitment only in early-to-middle adolescents. Educational in-depth exploration fostered the identification with vocational commitments only in girls. Educational reconsideration of commitment promoted vocational self-doubt only in adolescents attending work-bound high-schools. Implications for research and practice are discussed.

  5. Ego identity formation in middle adolescence.

    Science.gov (United States)

    Lavoie, J C

    1976-12-01

    Assumed determinants of ego identity were investigated in this study using sophomore, junior, and senior high school males and females. Subjects were administered the Marcia Ego Identity Status Scale and measures of sex-role identification, personality development, psychological functioning, self-concept, and parental socialization practices. Data analyses, using a median split on identity score, showed that high-identity adolescents obtained more positive scores on sex-role identification, personality development, psychological adjustment, and self-concept than low-identity adolescents. Socialization practices also differed for the two groups. The sex differences which emerged were congruent with the identity literature. Overall, the data supported Erikson's theory of ego identity development.

  6. Professional entrepreneurial identity construction

    DEFF Research Database (Denmark)

    Ramsgaard, Michael Breum

    The present study investigates the construction of a professional identity as an entrepreneur in a sample of people with educational background in nutrition and health. The study examines the connection between professional identity construction and entrepreneurial business emergence using...... ‘entrepreneurial preparedness’ as parameter. This research seeks to address the following questions: What significant components or characteristics do entrepreneurs rely on in the early processes of constructing an entrepreneurial identity....

  7. Identities-in-action

    DEFF Research Database (Denmark)

    Stentoft, Diana; Valero, Paola

    2009-01-01

    The notion of identity is often used in mathematics education research in an attempt to link individual and social understandings of mathematical learning. In this paper we review existing research making use of the notion of identity, and we point to some of the strengths and weaknesses in the w...

  8. Gender identity development in adolescence.

    Science.gov (United States)

    Steensma, Thomas D; Kreukels, Baudewijntje P C; de Vries, Annelou L C; Cohen-Kettenis, Peggy T

    2013-07-01

    This article is part of a Special Issue "Puberty and Adolescence".This article aims to provide an outline of what is currently known on trajectories, and contributing factors to gender identity development in adolescence. We give a historical overview of the concept of gender identity, and describe general identity development in adolescence, gender identity development in the general population and in gender variant youth. Possible psychosocial (such as child and parental characteristics) and biological factors (such as the effects of prenatal exposure to gonadal hormones and the role of genetics) contributing to a gender variant identity are discussed. Studies focusing on a number of psychosocial and biological factors separately, indicate that each of these factors influence gender identity formation, but little is known about the complex interplay between the factors, nor about the way individuals themselves contribute to the process. Research into normative and gender variant identity development of adolescents is clearly lagging behind. However, studies on persons with gender dysphoria and disorders of sex development, show that the period of adolescence, with its changing social environment and the onset of physical puberty, seems to be crucial for the development of a non-normative gender identity. Copyright © 2013 Elsevier Inc. All rights reserved.

  9. Techno-Redemption of transsexual bodies: Appropriation of technology and Self-Management of Unfinished identities

    Directory of Open Access Journals (Sweden)

    Alejandra Roca

    2015-06-01

    Full Text Available In this paper, we want to explore the modifications and procedures that delineate limits between the notions of body, sexuality, and nature. Based on ethnographic fieldwork in public institutions of Buenos Aires and La Plata (Argentina, we examine the medical-legal process concerning "sex reassignment" in transsexual people, which illuminates the unfold senses about the plasticity and precariousness of 'human essences', as well as the tensions between what human is (identity and what he/she wants to be (project. We discuss the proposals of transhumanism, accepting that the soteriological dimension of biosciences enable the hopes of techno-redemption. Finally, we intend to contribute with a reflection about the role of scientific categories and the political perspective of the emergence of identities and collective resistances about the tutelage of cognitive and material control of the biosciences.

  10. Individual identity and organisational control: empowerment and modernisation in a primary care trust.

    Science.gov (United States)

    McDonald, Ruth

    2004-11-01

    The notion of empowerment has been increasingly used within management discourses in recent years. Enthusiastic supporters conceive it as an acknowledgement of the individual employee as a talented, creative being, and hence a productive resource for contributing to organisational goals. Alternatively, more critical commentators have interpreted it as another means of exercising control over employees and their identities. Although various commentators have speculated on the management of identity as a means of organizational control, there is very little empirical work from which to draw conclusions. This paper, using participant observation and interview data, represents a contribution to the small body of empirical research in the area. It focuses on an initiative aimed ostensibly at 'empowering' staff in an English Primary Care Trust, which may be seen as an attempt at increasing organisational control by shaping employee identities. As such, these processes can be understood more readily in terms of ethics rather than empowerment. The term ethics is used here in a Foucauldian sense and is linked to the processes of self-definition and self-constraint by which individuals train themselves to become ethical persons. The paper suggests that the outcome of attempts to manufacture particular forms of subjectivity by such methods as 'empowerment' programmes may be very different from those intended.

  11. Piloting the European Unified Patient Identity Management (EUPID) Concept to Facilitate Secondary Use of Neuroblastoma Data from Clinical Trials and Biobanking.

    Science.gov (United States)

    Ebner, Hubert; Hayn, Dieter; Falgenhauer, Markus; Nitzlnader, Michael; Schleiermacher, Gudrun; Haupt, Riccardo; Erminio, Giovanni; Defferrari, Raffaella; Mazzocco, Katia; Kohler, Jan; Tonini, Gian Paolo; Ladenstein, Ruth; Schreier, Guenter

    2016-01-01

    Data from two contexts, i.e. the European Unresectable Neuroblastoma (EUNB) clinical trial and results from comparative genomic hybridisation (CGH) analyses from corresponding tumour samples shall be provided to existing repositories for secondary use. Utilizing the European Unified Patient IDentity Management (EUPID) as developed in the course of the ENCCA project, the following processes were applied to the data: standardization (providing interoperability), pseudonymization (generating distinct but linkable pseudonyms for both contexts), and linking both data sources. The applied procedures resulted in a joined dataset that did not contain any identifiers that would allow to backtrack the records to either data sources. This provided a high degree of privacy to the involved patients as required by data protection regulations, without preventing proper analysis.

  12. Social Identity and Group Contests

    OpenAIRE

    Zaunbrecher, Henrik; Riedl, Arno

    2016-01-01

    Social identity has been shown to successfully enhance cooperation and effort in cooperation and coordination games. Little is known about the causal effect of social identity on the propensity to engage in group conflict. In this paper we explore theoretically and experimentally whether social identity increases investments in group contests. We show theoretically that increased social identity with the own group implies higher investments in Tullock contests. Empirically we find that induce...

  13. Social identity process within organizations

    OpenAIRE

    Bazarov, Takhir; Kuzmina, Maria

    2005-01-01

    Expanding and complex social realities cause new types of identity. Variety in organizations and workgroups (where people are involved), implies a special kind of social identity which can be defined as professional, organizational or managerial. The study of the social identity processes in organizations is a new interdisciplinary sphere that is presented especially commonly in European Social Psychology. The result of its theoretical comprehension is Social Identity Theory. In the article l...

  14. Characteristics of Place Identity as Part of Professional Identity Development among Pre-Service Teachers

    Science.gov (United States)

    Gross, Michal; Hochberg, Nurit

    2016-01-01

    How do pre-service teachers perceive place identity, and is there a connection between their formative place identity and the development of their professional teaching identity? These questions are probed among pre-service teachers who participated in a course titled "Integrating Nature into Preschool." The design of the course was…

  15. Critical Look at Physics Identity: An Operationalized Framework for Examining Race and Physics Identity

    Science.gov (United States)

    Hyater-Adams, Simone; Fracchiolla, Claudia; Finkelstein, Noah; Hinko, Kathleen

    2018-01-01

    Studies on physics identity are appearing more frequently and often responding to increased awareness of the underrepresentation of students of color in physics. In our broader research, we focus our efforts on understanding how racial identity and physics identity are negotiated throughout the experiences of Black physicists. In this paper, we…

  16. Religiosity as identity: toward an understanding of religion from a social identity perspective.

    Science.gov (United States)

    Ysseldyk, Renate; Matheson, Kimberly; Anisman, Hymie

    2010-02-01

    As a social identity anchored in a system of guiding beliefs and symbols, religion ought to serve a uniquely powerful function in shaping psychological and social processes. Religious identification offers a distinctive "sacred" worldview and "eternal" group membership, unmatched by identification with other social groups. Thus, religiosity might be explained, at least partially, by the marked cognitive and emotional value that religious group membership provides. The uniqueness of a positive social group, grounded in a belief system that offers epistemological and ontological certainty, lends religious identity a twofold advantage for the promotion of well-being. However, that uniqueness may have equally negative impacts when religious identity itself is threatened through intergroup conflict. Such consequences are illustrated by an examination of identities ranging from religious fundamentalism to atheism. Consideration of religion's dual function as a social identity and a belief system may facilitate greater understanding of the variability in its importance across individuals and groups.

  17. Achieving Harmony among Different Social Identities within the Self-Concept: The Consequences of Internalising a Group-Based Philosophy of Life

    Science.gov (United States)

    Turner-Zwinkels, Felicity M.; Postmes, Tom; van Zomeren, Martijn

    2015-01-01

    It can be hard for individuals to manage multiple group identities within their self-concept (e.g., being a Christian and a woman). We examine how the inter-identity fit between potentially conflicting identities can become more harmonious through a self-defining group philosophy for life. Specifically, we test the hypothesis that holistic group identities (based in group philosophies for life that prescribe the behavior of their members in any situation, such as religion) become more strongly related to other identities in the self-concept (e.g., gender) when they are strongly self-defining (i.e., devotedly applied to daily life). In three studies we investigated the inter-identity fit between individuals’ (highly holistic) religious identity and (less holistic) gender identity. Results provided converging support for our hypothesis across diverging methods (explicit questionnaires, more implicit associations, and a novel network analysis of group traits). We discuss the importance of understanding how some (i.e., holistic and self-defining) group identities may harmonize otherwise less harmonious group identities within one’s self-concept. PMID:26618917

  18. Achieving Harmony among Different Social Identities within the Self-Concept: The Consequences of Internalising a Group-Based Philosophy of Life.

    Science.gov (United States)

    Turner-Zwinkels, Felicity M; Postmes, Tom; van Zomeren, Martijn

    2015-01-01

    It can be hard for individuals to manage multiple group identities within their self-concept (e.g., being a Christian and a woman). We examine how the inter-identity fit between potentially conflicting identities can become more harmonious through a self-defining group philosophy for life. Specifically, we test the hypothesis that holistic group identities (based in group philosophies for life that prescribe the behavior of their members in any situation, such as religion) become more strongly related to other identities in the self-concept (e.g., gender) when they are strongly self-defining (i.e., devotedly applied to daily life). In three studies we investigated the inter-identity fit between individuals' (highly holistic) religious identity and (less holistic) gender identity. Results provided converging support for our hypothesis across diverging methods (explicit questionnaires, more implicit associations, and a novel network analysis of group traits). We discuss the importance of understanding how some (i.e., holistic and self-defining) group identities may harmonize otherwise less harmonious group identities within one's self-concept.

  19. Gender identity, gender assignment and reassignment in individuals with disorders of sex development: a major of dilemma.

    Science.gov (United States)

    Fisher, A D; Ristori, J; Fanni, E; Castellini, G; Forti, G; Maggi, M

    2016-11-01

    Disorders of Sex Development (DSD) are a wide range of congenital conditions characterized by an incongruence of components involved in sexual differentiation, including gender psychosexual development. The management of such disorders is complex, and one of the most crucial decision is represented by gender assignment. In fact, the primary goal in DSD is to have a gender assignment consistent with the underlying gender identity in order to prevent the distress related to a forthcoming Gender Dysphoria. Historically, gender assignment was based essentially on surgical outcomes, assuming the neutrality of gender identity at birth. This policy has been challenged in the past decade refocusing on the importance of prenatal and postnatal hormonal and genetic influences on psychosexual development. (1) to update the main psychological and medical issues that surround DSD, in particular regarding gender identity and gender assignment; (2) to report specific clinical recommendations according to the different diagnosis. A systematic search of published evidence was performed using Medline (from 1972 to March 2016). Review of the relevant literature and recommendations was based on authors' expertise. A review of gender identity and assignment in DSD is provided as well as clinical recommendations for the management of individuals with DSD. Given the complexity of this management, DSD individuals and their families need to be supported by a specialized multidisciplinary team, which has been universally recognized as the best practice for intersexual conditions. In case of juvenile GD in DSD, the prescription of gonadotropin-releasing hormone analogues, following the World Professional Association for Transgender Health and the Endocrine Society guidelines, should be considered. It should always be taken into account that every DSD person is unique and has to be treated with individualized care. In this perspective, international registries are crucial to improve the

  20. John locke on personal identity.

    Science.gov (United States)

    Nimbalkar, Namita

    2011-01-01

    John Locke speaks of personal identity and survival of consciousness after death. A criterion of personal identity through time is given. Such a criterion specifies, insofar as that is possible, the necessary and sufficient conditions for the survival of persons. John Locke holds that personal identity is a matter of psychological continuity. He considered personal identity (or the self) to be founded on consciousness (viz. memory), and not on the substance of either the soul or the body.

  1. John Locke on Personal Identity**

    OpenAIRE

    Nimbalkar, Namita

    2011-01-01

    John Locke speaks of personal identity and survival of consciousness after death. A criterion of personal identity through time is given. Such a criterion specifies, insofar as that is possible, the necessary and sufficient conditions for the survival of persons. John Locke holds that personal identity is a matter of psychological continuity. He considered personal identity (or the self) to be founded on consciousness (viz. memory), and not on the substance of either the soul or the body.

  2. Traços identitários da enfermeira-gerente em hospitais privados de Belo Horizonte, Brasil The nurse manager's identity features in private hospitals of Belo Horizonte, Brazil

    Directory of Open Access Journals (Sweden)

    Maria José Menezes Brito

    2008-06-01

    Full Text Available Com o propósito de compreender aspectos subjetivos do trabalho da enfermeira-gerente, buscou-se, por meio deste estudo, analisar os traços identitários da enfermeira-gerente no contexto de instituições hospitalares a partir do questionamento fundamentado na apresentação que os sujeitos fazem de si mesmos. Trata-se de um estudo de caso, com abordagem qualitativa, do qual participaram nove enfermeiras-gerente que atuam em quatro instituições hospitalares privadas de médio e grande porte, no município de Belo Horizonte. Os traços identitários foram organizados de acordo com os planos profissional, organizacional e individual, os quais abrangem: preservação e reforço de identidade social da enfermeira, a trajetória profissional como uma evolução da prática da assistência para o exercício da gerência, valorização da experiência prática e permanência em atividades ligadas à prestação da assistência direta ao paciente; identificação com a organização; e questões relativas à vida privada e auto-imagem positiva expressa pelas gerentes. O estudo permitiu a identificação de traços marcantes de um grupo profissional específico, evidenciando a influência das questões de gênero, das relações de poder e da cultura na identidade social dos sujeitos pesquisados.Aiming to understand subjective aspects of the work of nurse managers, this study analyzed their identity features in the context of hospital institutions. These were obtained through a questioning based on the introduction that the subjects make of themselves. It is a case study carried out according to the qualitative approach, in which nine nurse managers participated. They worked at four large- and medium-sized private hospitals in the city of Belo Horizonte. The identity features were organized in accordance with the professional, institutional and individual planes, which encompass: the preservation and reinforcement of the nurse's social identity

  3. The theory of planned behaviour: self-identity, social identity and group norms.

    Science.gov (United States)

    Terry, D J; Hogg, M A; White, K M

    1999-09-01

    The aim of the present study was to examine further the role that self-identity plays in the theory of planned behaviour and, more specifically, to: (1) examine the combined effects of self-identity and social identity constructs on intention and behaviour, and (2) examine the effects of self-identity as a function of past experience of performing the behaviour. The study was concerned with the prediction of intention to engage in household recycling and reported recycling behaviour. A sample of 143 community residents participated in the study. It was prospective in design: measures of the predictors and intention were obtained at the first wave of data collection, whereas behaviour was assessed two weeks later. Self-identity significantly predicted behavioural intention, a relationship that was not dependent on the extent to which the behaviour had been performed in the past. As expected, there was also evidence that the perceived norm of a behaviourally relevant reference group was related to behavioural intention, but only for participants who identified strongly with the group, whereas the relationship between perceived behavioural control (a personal factor) and intention was strongest for low identifiers.

  4. Gender identity disorder and autism spectrum disorder in a 23-year-old female.

    Science.gov (United States)

    Lemaire, Mathieu; Thomazeau, Barbara; Bonnet-Brilhault, Frédérique

    2014-02-01

    We describe the case of a 23-year-old woman with Gender Identity Disorder (GID) asking for a cross-sex hormonal treatment with sex reassignment surgery and who was recently diagnosed with Autism Spectrum Disorder (ASD). Gender identity clinics are now reporting an overrepresentation of individuals with ASD among GID patients. The prevalence of ASD is 10-fold higher among GID patients than in general population. However, few case reports or studies have explored the co-occurrence of ASD and GID. This co-occurrence is relevant for diagnostic and clinical management and also raises important theoretical issues.

  5. Relations of Work Identity, Family Identity, Situational Demands, and Sex with Employee Work Hours

    Science.gov (United States)

    Greenhaus, Jeffrey H.; Peng, Ann C.; Allen, Tammy D.

    2012-01-01

    This study examined relations of multiple indicators of work identity and family identity with the number of weekly hours worked by 193 married business professionals. We found that men generally worked long hours regardless of the situational demands to work long hours and the strength of their work and family identities. Women's work hours, on…

  6. When dual identity becomes a liability: identity and political radicalism among migrants.

    Science.gov (United States)

    Simon, Bernd; Reichert, Frank; Grabow, Olga

    2013-03-01

    This article examines the role of dual identity in political radicalism among migrants. Dual identity is defined as identification with both one's ethnocultural minority in-group and one's society of residence. We employed a longitudinal research design using members of the two largest migrant groups in Germany (Turkish migrants and Russian migrants) as participants. We reasoned that when dual identity is burdened with incompatibility between component identifications, it may foster controversial or even destructive forms of political mobilization, such as radicalism. Multiple regression analysis controlling for other influences confirmed the hypothesized moderated relationship between dual identification and sympathy for radical action. When accompanied by high, as opposed to low, perceived identity incompatibility, dual identification predicted increases in sympathy for radical action among both Turkish migrants and Russian migrants. The implications for public life in ethnically and culturally heterogeneous societies are discussed.

  7. The Sweet Briar Way: The Search for Organizational Identity in Higher Education

    Science.gov (United States)

    Ross Haynes, Denice Katherine

    2010-01-01

    This study looked at organizational identity in higher education. First conceptualized by organizational and management theorists Stuart Albert and David Whetten in 1985, it is defined as those attributes and features members believe to be most central and enduring about their organization and that distinguish it from others. Using case study…

  8. Co-creating Stakeholder and Brand Identities

    DEFF Research Database (Denmark)

    von Wallpach, Sylvia; Voyer, Benjamin; Kastanakis, Minas

    2017-01-01

    This article introduces the special section on reciprocal co-creation of stakeholder and brand identities. Branding research and practice traditionally focus on the managerial creation and implementation of brand identity. Based on recent paradigmatic shifts from managerial to co-creative branding...... and from consumer to multi-stakeholder approaches in marketing, this special section develops a dynamic, process-oriented perspective on brand identity. Brand identity continuously emerges as a dynamic outcome of social processes of stakeholder interaction. Reciprocally, brand identity plays a potentially...... important role in ongoing interactive identity development processes of stakeholders. The special section contributes to deepening the understanding of this reciprocal co-creation of stakeholder and brand identities, through a series of conceptual and empirical articles. The Introduction reviews four...

  9. Reconceptualising "Identity Slippage": Additional Language Learning and (L2) Identity Development

    Science.gov (United States)

    Armour, William

    2009-01-01

    This paper reconsiders the theoretical concept of "identity slippage" by considering a detailed exegesis of three model conversations taught to learners of Japanese as an additional language. To inform my analysis of these conversations and how they contribute to identity slippage, I have used the work of the systemic-functional linguist Jay Lemke…

  10. Elective Identities, (Culture, Identization and Integration)

    NARCIS (Netherlands)

    S.J. Magala (Slawomir)

    2002-01-01

    textabstractMost of contemporary individual and social identities (constructed with societal, cultural and technological resources) are radically autonomous, nomadic and virtual - i.e. they are de-traditionalized, open to negotiation and not based on a single interpretation of a tradition.

  11. An 'open source' networked identity

    DEFF Research Database (Denmark)

    Larsen, Malene Charlotte

    2013-01-01

    This paper examines the concept of identity in relation to youth practices on social network sites (SNS). The paper illustrates how writing “I love you” or other emotional statements on each other’s profiles on SNS is not only a common way for Danish teenagers to communicate and practice friendship...... communicative actions – are not only performing their own identity, but are becoming co-constructors of each other's identities, which the author characterizes as an 'open source' networked identity....

  12. Quantum Type Indeterminacy in Dynamic Decision-Making: Self-Control through Identity Management

    Directory of Open Access Journals (Sweden)

    Jerome Busemeyer

    2012-05-01

    Full Text Available The Type Indeterminacy model is a theoretical framework that uses some elements of quantum formalism to model the constructive preference perspective suggested by Kahneman and Tversky. In a dynamic decision context, type indeterminacy induces a game with multiple selves associated with a state transition process. We define a Markov perfect equilibrium among the selves with individual identity (preferences as the state variable. The approach allows to characterize generic personality types and derive some comparative static results.

  13. Human Rights and the Excess of Identity

    Science.gov (United States)

    Al Tamimi, Yussef

    2017-01-01

    Identity is a central theme in contemporary politics, but legal academia lacks a rigorous analysis of this concept. The aim of this article is twofold: (i) firstly, it aims to reveal presumptions on identity in human rights law by mapping how the European Court of Human Rights approaches identity and (ii) secondly, it seeks to analyse these presumptions using theoretical insights on identity. By merging legal and theoretical analysis, this article contributes a reading of the Court’s case law which suggests that the tension between the political and apolitical is visible as a common thread in the Court’s use of identity. In case law concerning paternity, the Court appears to hold a specific view of what is presented as an unquestionable part of identity. This ostensibly pre-political notion of identity becomes untenable in cases where the nature of an identity feature, such as the headscarf, is contended or a minority has adopted a national identity that conflicts with the majoritarian national identity. The Court’s approach to identity in such cases reflects a paradox that is inherent to identity; identity is personal while simultaneously constituted and shaped by overarching power mechanisms. PMID:29881144

  14. Inter-identity autobiographical amnesia in patients with dissociative identity disorder

    OpenAIRE

    Huntjens, Rafaele JC; Verschuere, Bruno; McNally, Richard J

    2012-01-01

    Background: A major symptom of Dissociative Identity Disorder (DID; formerly Multiple Personality Disorder) is dissociative amnesia, the inability to recall important personal information. Only two case studies have directly addressed autobiographical memory in DID. Both provided evidence suggestive of dissociative amnesia. The aim of the current study was to objectively assess transfer of autobiographical information between identities in a larger sample of DID patients. Methods: Using a c...

  15. Queering Black Racial Identity Development

    Science.gov (United States)

    Johnson, Alandis A.; Quaye, Stephen John

    2017-01-01

    We used queer theory to encourage readers to think differently about previous theories about Black racial identity development. Queer theory facilitates new and deeper understandings of how Black people develop their racial identities, prompting more fluidity and nuance. Specifically, we present a queered model of Black racial identity development…

  16. Understanding Identity and Organizations

    DEFF Research Database (Denmark)

    Christensen, Lars Thøger

    2013-01-01

    The article reviews the book "Understanding Identity and Organizations," by Kate Kenny, Andrea Whitle, and Hugh Wilmott.......The article reviews the book "Understanding Identity and Organizations," by Kate Kenny, Andrea Whitle, and Hugh Wilmott....

  17. Researching Identity and Interculturality

    DEFF Research Database (Denmark)

    Lønsmann, Dorte

    2016-01-01

    Review of: Researching Identity and Interculturality / by F. Dervin and K. Risager (eds.). Routledge 2015, 245 pp.......Review of: Researching Identity and Interculturality / by F. Dervin and K. Risager (eds.). Routledge 2015, 245 pp....

  18. Professional Development in Japanese Non-Native English Speaking Teachers' Identity and Efficacy

    Science.gov (United States)

    Takayama, Hiromi

    2015-01-01

    This mixed methods study investigates how Japanese non-native English speaking teachers' (NNESTs) efficacy and identity are developed and differentiated from those of native English speaking teachers (NESTs). To explore NNESTs' efficacy, this study focuses on the contributing factors, such as student engagement, classroom management, instructional…

  19. Researcher Identities in Transition

    DEFF Research Database (Denmark)

    Castelló, Montserrat; Wisker, Gina; Kobayashi, Sofie

    as other emergent ‘signals’, the latent or clear indications from institutions and academic communities regarding career directions and necessary professional skills and attitudes should be identified and interpreted for researchers to adequately develop their new identities. The aim of this paper......Researchers are now embarked upon what we define as a ‘risk career’, rather than, as previously, a relatively more predictable academic career. In this changing context, traditional milestones that enabled early career researchers to build their identities are disappearing. Instead, what we define...... is twofold: a) to present a comprehensive framework of the notion of researcher identity by means of analysing those spheres of activity related to researcher and career development; and b) to relate researcher identities to the experiences of early career researchers with issues concerning signals...

  20. Rights of Identity

    Directory of Open Access Journals (Sweden)

    Daniel Kofman

    2017-01-01

    Full Text Available A person’s identity is their sense of who and what they are, of who stands in significant relations to them, and of what is valuable to them. This is inevitably very broad, an immediate implication of which is that the concept of identity taken alone cannot do significant normative work. In some cases a person’s identity is bound up with the evil that they do or wish to do, and cannot thereby give them any right to do it. In other cases very powerful elements of a person’s identity – such as their attachment to loved ones – is certainly related to important rights, but it is not entirely clear that one needs the concept of identity to explicate or justify these rights; the deep involvement of their identity is arguably a byproduct of other important values in these cases (such as love, and those values can do the grounding work of the rights by themselves and more simply and clearly. Nevertheless, when suitably qualified, a person’s identity is central to accounting for important political rights. These ranges from rights to participate in cultural practices of one’s group, which sometimes implies duties on governments to support minorities threatened with extinction, to – at the outer limit – rights to arrange political administration. These rights are connected to both autonomy and fairness. Cultural rights are often taken either to be opposed to autonomy, or at best instrumental to personal autonomy (by providing ‘options’, but in fact, the ideal of autonomy, expressed by Mill as being the author of one’s life, requires that one be in control of significant aspects of one’s identity. Significant aspects of one’s identity are collectively determined within a culture. Cultures are not static, and their development is particularly affected by political boundaries. A fundamental right of autonomy implies, therefore, that groups be allowed, within reasonable constraints of general feasibility and stability, to arrange

  1. The Quest for Identity in Adolescence: Heterogeneity in Daily Identity Formation and Psychosocial Adjustment across 5 Years

    Science.gov (United States)

    Becht, Andrik I.; Nelemans, Stefanie A.; Branje, Susan J. T.; Vollebergh, Wilma A. M.; Koot, Hans M.; Denissen, Jaap J. A.; Meeus, Wim H. J.

    2016-01-01

    Identity formation is one of the key developmental tasks in adolescence. According to Erikson (1968) experiencing identity uncertainty is normative in adolescence. However, empirical studies investigating identity uncertainty on a daily basis are lacking. Hence, studying individual differences in daily certainty (i.e., identity commitment levels)…

  2. Identity Development in Deaf Adolescents

    Science.gov (United States)

    Kunnen, E. Saskia

    2014-01-01

    We studied identity development during 5 years in seven deaf adolescents who attended a school for deaf children in the highest level of regular secondary education (age between 14 and 18 years), administering identity interviews every year. Identity development is conceptualized as the processes of exploration and commitment formation (Bosma,…

  3. Science Identity in Informal Education

    Science.gov (United States)

    Schon, Jennifer A.

    The national drive to increase the number of students pursuing Science Technology, Engineering, and Math (STEM) careers has brought science identity into focus for educators, with the need to determine what encourages students to pursue and persist in STEM careers. Science identity, the degree to which students think someone like them could be a scientist is a potential indicator of students pursuing and persisting in STEM related fields. Science identity, as defined by Carlone and Johnson (2007) consists of three constructs: competence, performance, and recognition. Students need to feel like they are good at science, can perform it well, and that others recognize them for these achievements in order to develop a science identity. These constructs can be bolstered by student visitation to informal education centers. Informal education centers, such as outdoor science schools, museums, and various learning centers can have a positive impact on how students view themselves as scientists by exposing them to novel and unique learning opportunities unavailable in their school. Specifically, the University of Idaho's McCall Outdoor Science School (MOSS) focuses on providing K-12 students with the opportunity to learn about science with a place-based, hands-on, inquiry-based curriculum that hopes to foster science identity development. To understand the constructs that lead to science identity formation and the impact the MOSS program has on science identity development, several questions were explored examining how students define the constructs and if the MOSS program impacted how they rate themselves within each construct. A mixed-method research approach was used consisting of focus group interviews with students and pre, post, one-month posttests for visiting students to look at change in science identity over time. Results from confirmatory factor analysis indicate that the instrument created is a good fit for examining science identity and the associated

  4. Identity and Diversity in Today's World

    Science.gov (United States)

    Gee, James Paul

    2017-01-01

    This paper develops a thesis about identity and diversity. I first look at activity-based identities, identities like being a gardener, birder, citizen scientist or fan-fiction writer. These are freely chosen identities and they are proliferating at a great rate today thanks to participatory culture, the Maker Movement and digital and social…

  5. Lift of dilogarithm to partition identities

    International Nuclear Information System (INIS)

    Terhoeven, M.

    1992-11-01

    For the whole set of dilogarithm identities found recently using the thermodynamic Bethe-Ansatz for the ADET series of purely elastic scattering theories we give partition identities which involve characters of those conformal field theories which correspond to the UV-limits of the scattering theories. These partition identities in turn allow to derive the dilogarithm identities using modular invariance and a saddle point approximation. We conjecture on possible generalizations of this correspondance, namely, a lift from dilogarithm to partition identities. (orig.)

  6. The effects of smoking self-identity and quitting self-identity on attempts to quit smoking

    NARCIS (Netherlands)

    van den Putte, B.; Yzer, M.C.; Willemsen, M.C.; de Bruijn, G.J.

    2009-01-01

    Objective: To examine the effect of two types of self-identity on attempts to quit smoking: self-identity in terms of smoking and self-identity in terms of quitting. Design: A prospective survey among an initial sample of 3,411 smokers. Smoking history variables and psychosocial variables from the

  7. Professional identity of Korean nurse practitioners in the United States.

    Science.gov (United States)

    Seo, Kumsook; Kim, Miyoung

    2017-04-01

    Despite nurse practitioners' (NPs) professional identity having important implications for the confirmation of nursing practice characteristics, few studies have examined the professional identity of NPs overlaid with the immigrant experience. The aim of this study was to explore the career characteristics of Korean nurse immigrants who became NPs in the United States. Seven Korean NPs in the United States underwent in-depth interviews from August 2013 to May 2015. Content analysis was employed for data analysis. Five themes were identified regarding their professional identity as NPs: patient-centered thinking, responsibility for patient care, dedicated life, diligence, and feelings of achievement. Of these, patient-centered thinking appeared to be the overriding theme. The findings add to nursing knowledge about immigrant nurses and their abilities and striving to develop into new roles in nursing. The participants focused on listening, interpersonal relationships, and education in patient care, which helped differentiate their roles from those of other healthcare professionals. Nurse managers should consider the study findings when making policies to assist immigrant nurses to acculturate into practice, and there is a need for the development of educational materials to guide and promote the NPs' professional role. ©2017 American Association of Nurse Practitioners.

  8. Personnel Identity Management and the Expeditionary Strike Group

    National Research Council Canada - National Science Library

    Neises, Glen E

    2007-01-01

    .... Chapter I defines IM and explains why IM is important for the Department of Defense (DoD). Chapter II provides an overview of DoD human resource management and Defense Manpower Data Center information systems...

  9. Discourse, Power Interplays and "Disordered Identities": An Intersectional Framework for Analysis and Policy Development

    Science.gov (United States)

    Liasidou, Anastasia

    2016-01-01

    While acknowledging the discursive constitution of student identities through the interplay of unequal power relations and discriminatory processes, the article discusses the ways in which social, emotional and behaviour difficulties (SEBD) are "produced" and "managed" within current schooling. SEBD are routinely framed in…

  10. 21 CFR 610.14 - Identity.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 7 2010-04-01 2010-04-01 false Identity. 610.14 Section 610.14 Food and Drugs... BIOLOGICAL PRODUCTS STANDARDS General Provisions § 610.14 Identity. The contents of a final container of each filling of each lot shall be tested for identity after all labeling operations shall have been completed...

  11. Are housing professionals born or made? The role of education and identity amongst housing professionals in Ireland.

    OpenAIRE

    Butler, Deborah

    2010-01-01

    The concept of a housing professional is a new and often disputed term. Qualitative research into the culture and identity of occupational groups involved in social housing provision and management has been relatively scarce. Research has concentrated, almost exclusively, on the individual involved in the housing construction and output side of housing provision. This neglect is surprising given the importance of housing in people‟s lives. The thesis examines the identities, experiences and e...

  12. Primary Identity in Literature

    DEFF Research Database (Denmark)

    Graham, Brian Russell

    In our times, literary criticism, as well as larger political and cultural developments, is characterized by identity politics, meaning that our discourses are structured around the notion of different socially identifiable populations in society. In relation to literature, this results in our...... viewing the characters in literature in terms of these political identities. Literature is consequently discussed in relation to political causes. Literary criticism is animated by the same causes, and is viewed as having a direct intervention in society in relation to them. In this paper, I will discuss......, in relation to Frye’s works, the idea that the primary identities of characters in literature were and, to a considerable extent, continue to be those of family-member identities. As such, literature should not be appropriated to a political context too readily. Whereas viewing characters in terms of...

  13. Intersections and Translocations: New Paradigms for Thinking about Cultural Diversity and Social Identities

    Science.gov (United States)

    Anthias, Floya

    2011-01-01

    This article reflects on the concepts of cultural diversity, belonging and identity which inform important debates for managing "difference" in contemporary European societies. These address issues relating to transnational migration, ethnic diversity and racialisation in a range of social contexts. The article also reflects on the concept of…

  14. Ethnic Identity, Bicultural Identity Integration, and Psychological Well-Being among Transracial Adoptees: A Longitudinal Study

    Science.gov (United States)

    Ferrari, Laura; Rosnati, Rosa; Manzi, Claudia; Benet-Martínez, Verònica

    2015-01-01

    The ethnic identity development plays a crucial role in adolescence and emerging adulthood and may be more complex for adoptees who do not share their ethnic identity with their adoptive families. Evidence from the studies was mixed, with strong ethnic identity not always found to be indicative of improved psychological adjustment. Recently…

  15. Biography, Identity, Improvisation, Sound: Intersections of Personal and Social Identity through Improvisation

    Science.gov (United States)

    Smilde, Rineke

    2016-01-01

    This essay addresses the relationship of improvisation and identity. Biographical research that was conducted by the author into professional musicians' lifelong learning showed the huge importance of improvisation for personal expression. Musically, the concept of "sound" appeared to serve as a strong metaphor for identity. In addition,…

  16. Optimal Experience and Optimal Identity: A Multinational Study of the Associations Between Flow and Social Identity

    Science.gov (United States)

    Mao, Yanhui; Roberts, Scott; Pagliaro, Stefano; Csikszentmihalyi, Mihaly; Bonaiuto, Marino

    2016-01-01

    Eudaimonistic identity theory posits a link between activity and identity, where a self-defining activity promotes the strength of a person’s identity. An activity engaged in with high enjoyment, full involvement, and high concentration can facilitate the subjective experience of flow. In the present paper, we hypothesized in accordance with the theory of psychological selection that beyond the promotion of individual development and complexity at the personal level, the relationship between flow and identity at the social level is also positive through participation in self-defining activities. Three different samples (i.e., American, Chinese, and Spanish) filled in measures for flow and social identity, with reference to four previously self-reported activities, characterized by four different combinations of skills (low vs. high) and challenges (low vs. high). Findings indicated that flow was positively associated with social identity across each of the above samples, regardless of participants’ gender and age. The results have implications for increasing social identity via participation in self-defining group activities that could facilitate flow. PMID:26924995

  17. Optimal Experience and Optimal Identity: A Multinational Study of the Associations Between Flow and Social Identity.

    Science.gov (United States)

    Mao, Yanhui; Roberts, Scott; Pagliaro, Stefano; Csikszentmihalyi, Mihaly; Bonaiuto, Marino

    2016-01-01

    Eudaimonistic identity theory posits a link between activity and identity, where a self-defining activity promotes the strength of a person's identity. An activity engaged in with high enjoyment, full involvement, and high concentration can facilitate the subjective experience of flow. In the present paper, we hypothesized in accordance with the theory of psychological selection that beyond the promotion of individual development and complexity at the personal level, the relationship between flow and identity at the social level is also positive through participation in self-defining activities. Three different samples (i.e., American, Chinese, and Spanish) filled in measures for flow and social identity, with reference to four previously self-reported activities, characterized by four different combinations of skills (low vs. high) and challenges (low vs. high). Findings indicated that flow was positively associated with social identity across each of the above samples, regardless of participants' gender and age. The results have implications for increasing social identity via participation in self-defining group activities that could facilitate flow.

  18. Identity theft and your practice.

    Science.gov (United States)

    Asbell, Lisa

    2010-01-01

    Medical identity theft is a growing problem in America. The federal government has passed laws to help "prevent" identity theft. However, several powerful medical associations are fighting the legislation. Americans need to know what is happening with these laws and why these laws are important to protect providers from lawsuits and consumers of healthcare from medical identity theft.

  19. Social Identity Simulation System (SISTEM)

    Science.gov (United States)

    2014-03-31

    Report Individuation Individuation refers to when an individual attempts to preserve self-esteem by psychologically separating oneself from a...its expected costs. The following subsections describe various strategies of social identity entrepreneurship in more detail. Calling for...Haslam, S. A., & Reicher, S. (2007). Identity Entrepreneurship and the consequences of identity failure: the dynamics of leadership in the BBC prison

  20. A Temporal Perspective on Organizational Identity

    DEFF Research Database (Denmark)

    Schultz, Majken; Hernes, Tor

    2013-01-01

    time perspective in the use of memory enabled a longer time perspective in formulating claims for future identity, (2) a broader scope of articulated identity claims for the future was related to the combination of a broader range of memory forms, and (3) the depth of claims for future identity...... was related to the way in which memory forms were combined. At a more general level, our paper illustrates how viewing identity construction from the perspective of an ongoing present adds a new dimension to understanding the temporal dynamics of organizational identity....

  1. Stories we live, identities we build: how are elementary teachers' science identities shaped by their lived experiences?

    Science.gov (United States)

    Avraamidou, Lucy

    2018-02-01

    The aim of this multiple case study was to uncover a series of critical events and experiences related to the formation of the science identities of four beginning elementary female teachers, through a life-history approach and a conceptualization of teacher identity as lived experience. Grounded within the theoretical framework of Figured Worlds, the study used qualitative, interpretive methods for data collection (interviews, biographies, teaching philosophies) and analysis. The analysis shed light on the ways in which various experiences situated within different Figured Worlds (science, family and childhood, schooling, out-of-school, university, professional) impacted the participants' identity trajectories. The findings provided three main insights that contribute to science identity research and have implications for elementary teacher preparation: (a) science teacher identity is multidimensional and extends beyond cognitive domains of becoming to include affective dimensions; (b) science teacher identity is relational, linked and shaped by various other constructs or sub-identities; (c) place and time, defined as a space with meaning created by experiences, and science teacher identity are inextricably bound to one another.

  2. Generalized Cherednik-Macdonald identities

    NARCIS (Netherlands)

    Stokman, J.V.

    2008-01-01

    We derive generalizations of the Cherednik-Macdonald constant term identities associated to root systems which depend, besides on the usual Multiplicity function, symmetrically on two additional parameters omega +/-. They are natural analogues of the Cherednik-Macdonald constant term q-identities in

  3. Constructing leadership identities through stories

    DEFF Research Database (Denmark)

    Frimann, Søren; Hersted, Lone

    2016-01-01

    This article analyzes the construction of leadership identities through stories found in four narrative interviews from a qualitative study and leadership development project based on social constructionism and action learning. We argue that leadership development and the construction of leadership...... that the concept of coauthoring is useful in developing leadership and leadership identities through reflexive dialogs and emerging stories....... identities in a postmodern paradigm are based on the negotiation and co-construction of meanings, relationships, and stories. The following questions are investigated: What happens when a group of leaders from different organizations construct, deconstruct, and reconstruct their identity as leaders through...

  4. Education and identity of adult educators

    Directory of Open Access Journals (Sweden)

    Zoran Jelenc

    2010-10-01

    Full Text Available Adult education and learning has because of its wide extensiveness and variability huge difficulties with its identity. Difficulties appear in all three spheres of identity: professional identity of adult education; societal identity of the field; and personal identity with the profession. In our contribution we list and describe difficulties in all three identity areas. Insufficient identity is a great obstacle for continuing education and further training of those who work or wish to work in adult education or they are obliged to carry out such education. They are all named ‘adult educators’ but their roles and tasks in education are different. Contents and ways of realization of programs have to be adapted to that. We recommend: modular programs for different target groups should be created from a wide list of contents; more sophisticated methods of marketing and recruiting should be used for the better realization of programs; programs should enable participants to get publicly recognized certificates and in this way current program of pedagogical-andragogical education which does not follow enough above-named difficulties of identity should be replaced; successful programs should be distributed all over Slovenia and performed in cooperation with another providers.

  5. Moral identity and emotion in athletes.

    Science.gov (United States)

    Kavussanu, Maria; Willoughby, Adrian; Ring, Christopher

    2012-12-01

    The purpose of this study was to investigate the effects of moral identity on physiological responses to affective pictures, namely, the startle blink reflex and pain-related evoked potential. Male (n = 48) and female (n = 46) athletes participating in contact team sports were randomly assigned to either a moral identity group or a non-moral identity group and viewed a series of unpleasant, neutral, and pleasant sport-specific pictures. During picture viewing, a noxious electrocutaneous stimulus was delivered as the startle probe and the startle blink and pain-related evoked potential were measured. Upon completion of physiological measures, participants reviewed the pictures and rated them for valence and arousal. ANOVAs revealed that participants in the moral identity group displayed larger startle blinks and smaller pain-related potentials than did those in the non-moral identity group across all picture valence categories. However, the difference in the magnitude of startle blinks between the moral and non-moral identity groups was larger in response to unpleasant than pleasant and neutral pictures. Our findings suggest that moral identity affects physiological responses to sport-specific affective pictures, thereby providing objective evidence for the link between moral identity and emotion in athletes.

  6. The emergence, structure and development of ethnic identity during childhood: the case of Roma identity.

    Science.gov (United States)

    Pnevmatikos, Dimitris; Geka, Maria; Divane, Maria

    2010-12-01

    This study investigates the emergence, development and structure of ethnic identity during childhood. Forty Roma children living in Greece aged between 2.8 and 11.9 years answered questions about their awareness/recognition of four aspects of their ethnic identity-namely place of habitation, traditional costumes, the Roma language, and early betrothal of children-their identity and their sense of stability and constancy. The study also investigates how the children feel about the abandonment of those four aspects. The evidence from the current data supports the hypothesis that awareness of ethnic identity emerges before the age of 4. Moreover, this study offers direct empirical evidence of the multidimensionality of ethnic identity. A model of three concentric rings is proposed, extending from a core containing the most highly valued aspects of ethnic identity to the outer annulus that comprises the nonpermanent and nonstable aspects of ethnic identity. The aspects in each annulus differ in terms of the development of the sense of stability and constancy and the feelings associated with loss of the aspects in question. Even the youngest participants considered the aspects in the core to be stable and constant as well as emotionally charged; and even the 11-year-olds did not consider the aspects contained in the outer, more fluid annulus as stable and constant aspects of their ethnic identity. The development of an aspect is determined by what the majority of adults in a society, at a particular time in history, consider to be most important.

  7. Intergroup Leadership Across Distinct Subgroups and Identities.

    Science.gov (United States)

    Rast, David E; Hogg, Michael A; van Knippenberg, Daan

    2018-03-01

    Resolving intergroup conflict is a significant and often arduous leadership challenge, yet existing theory and research rarely, if ever, discuss or examine this situation. Leaders confront a significant challenge when they provide leadership across deep divisions between distinct subgroups defined by self-contained identities-The challenge is to avoid provoking subgroup identity distinctiveness threat. Drawing on intergroup leadership theory, three studies were conducted to test the core hypothesis that, where identity threat exists, leaders promoting an intergroup relational identity will be better evaluated and are more effective than leaders promoting a collective identity; in the absence of threat, leaders promoting a collective identity will prevail. Studies 1 and 2 ( N = 170; N = 120) supported this general proposition. Study 3 ( N = 136) extended these findings, showing that leaders promoting an intergroup relational identity, but not a collective identity, improved intergroup attitudes when participants experienced an identity distinctiveness threat.

  8. Management Communication for the New Millennium: An Australian Perspective.

    Science.gov (United States)

    More, Elizabeth A.; Irwin, Harry T.

    2000-01-01

    Discusses management communications in the general area of identity, and the Australian situation involving management communication scholarship, management communication education, and the future of the field in Australia. (NH)

  9. Fingerprint recognition with identical twin fingerprints.

    Science.gov (United States)

    Tao, Xunqiang; Chen, Xinjian; Yang, Xin; Tian, Jie

    2012-01-01

    Fingerprint recognition with identical twins is a challenging task due to the closest genetics-based relationship existing in the identical twins. Several pioneers have analyzed the similarity between twins' fingerprints. In this work we continue to investigate the topic of the similarity of identical twin fingerprints. Our study was tested based on a large identical twin fingerprint database that contains 83 twin pairs, 4 fingers per individual and six impressions per finger: 3984 (83*2*4*6) images. Compared to the previous work, our contributions are summarized as follows: (1) Two state-of-the-art fingerprint identification methods: P071 and VeriFinger 6.1 were used, rather than one fingerprint identification method in previous studies. (2) Six impressions per finger were captured, rather than just one impression, which makes the genuine distribution of matching scores more realistic. (3) A larger sample (83 pairs) was collected. (4) A novel statistical analysis, which aims at showing the probability distribution of the fingerprint types for the corresponding fingers of identical twins which have same fingerprint type, has been conducted. (5) A novel analysis, which aims at showing which finger from identical twins has higher probability of having same fingerprint type, has been conducted. Our results showed that: (a) A state-of-the-art automatic fingerprint verification system can distinguish identical twins without drastic degradation in performance. (b) The chance that the fingerprints have the same type from identical twins is 0.7440, comparing to 0.3215 from non-identical twins. (c) For the corresponding fingers of identical twins which have same fingerprint type, the probability distribution of five major fingerprint types is similar to the probability distribution for all the fingers' fingerprint type. (d) For each of four fingers of identical twins, the probability of having same fingerprint type is similar.

  10. Fingerprint recognition with identical twin fingerprints.

    Directory of Open Access Journals (Sweden)

    Xunqiang Tao

    Full Text Available Fingerprint recognition with identical twins is a challenging task due to the closest genetics-based relationship existing in the identical twins. Several pioneers have analyzed the similarity between twins' fingerprints. In this work we continue to investigate the topic of the similarity of identical twin fingerprints. Our study was tested based on a large identical twin fingerprint database that contains 83 twin pairs, 4 fingers per individual and six impressions per finger: 3984 (83*2*4*6 images. Compared to the previous work, our contributions are summarized as follows: (1 Two state-of-the-art fingerprint identification methods: P071 and VeriFinger 6.1 were used, rather than one fingerprint identification method in previous studies. (2 Six impressions per finger were captured, rather than just one impression, which makes the genuine distribution of matching scores more realistic. (3 A larger sample (83 pairs was collected. (4 A novel statistical analysis, which aims at showing the probability distribution of the fingerprint types for the corresponding fingers of identical twins which have same fingerprint type, has been conducted. (5 A novel analysis, which aims at showing which finger from identical twins has higher probability of having same fingerprint type, has been conducted. Our results showed that: (a A state-of-the-art automatic fingerprint verification system can distinguish identical twins without drastic degradation in performance. (b The chance that the fingerprints have the same type from identical twins is 0.7440, comparing to 0.3215 from non-identical twins. (c For the corresponding fingers of identical twins which have same fingerprint type, the probability distribution of five major fingerprint types is similar to the probability distribution for all the fingers' fingerprint type. (d For each of four fingers of identical twins, the probability of having same fingerprint type is similar.

  11. Perancangan Corporate Identity Astro Rent Car Surabaya

    OpenAIRE

    Gunardi, Yohanes Calvin; Negara, I Nengah Sudika; Aryanto, Hendro

    2017-01-01

    Corporate Identity merupakan hal yang krusial dalam perkembangan sebuah Perusahaan dalam segi internal maupun eksternal. Dalam membuat perancangan Corporate identity yang efektif, perancangan ini menampilkan segala teori dan ilmu yang berhubungan dengan Corporate identity. Dengan adanya perancangan ini diharapkan para pembaca mengerti betapa pentingnya peran sebuah corporate identity yang tepat dan mengena.Kata kunci: corporate identity, Astro, logo.

  12. Māori identity signatures: A latent profile analysis of the types of Māori identity.

    Science.gov (United States)

    Greaves, Lara M; Houkamau, Carla; Sibley, Chris G

    2015-10-01

    Māori are the indigenous peoples of New Zealand. However, the term 'Māori' can refer to a wide range of people of varying ethnic compositions and cultural identity. We present a statistical model identifying 6 distinct types, or 'Māori Identity Signatures,' and estimate their proportion in the Māori population. The model is tested using a Latent Profile Analysis of a national probability sample of 686 Māori drawn from the New Zealand Attitudes and Values Study. We identify 6 distinct signatures: Traditional Essentialists (22.6%), Traditional Inclusives (16%), High Moderates (31.7%), Low Moderates (18.7%), Spiritually Orientated (4.1%), and Disassociated (6.9%). These distinct Identity Signatures predicted variation in deprivation, age, mixed-ethnic affiliation, and religion. This research presents the first formal statistical model assessing how people's identity as Māori is psychologically structured, documents the relative proportion of these different patterns of structures, and shows that these patterns reliably predict differences in core demographics. We identify a range of patterns of Māori identity far more diverse than has been previously proposed based on qualitative data, and also show that the majority of Māori fit a moderate or traditional identity pattern. The application of our model for studying Māori health and identity development is discussed. (c) 2015 APA, all rights reserved).

  13. Corporate identity. Brand designs.

    Science.gov (United States)

    Mathieson, Steve

    2004-02-19

    The past two years have seen a steadily more consistent brand identity for the NHS. Branding will become more important as foundation status and PCT commissioning makes acute hospitals more competitive. This has put pressure on some trusts that have their own strong identities.

  14. Ethnic Identities of University Students

    Directory of Open Access Journals (Sweden)

    Gözde Özdikmenli-Demir

    2014-06-01

    Full Text Available The aim of this article is to understand the relationship between ethnic identity, victimization/witnessing community violence, ethnic discrimination, and aggression in a sample of university students living in the South East Region of Turkey. The participants were 263 university students of predominantly Kurdish ethnic origin. The results showed that males had higher levels of ethnic identity in the dimensions of exploration and commitment. Males also presented higher scores for witnessing community violence and lifetime exposure to ethnic discrimination. The most important predictor of participants’ ethnic identity was witnessing community violence. Participants who witnessed violent acts in their social environment had higher ethnic identity levels. Although the predictor variables could not explain an important part of the participants’ aggression levels, only perceived ethnic discrimination was positively related to aggressive behavior. The role of native language efficiency in ethnic identity is also discussed.

  15. Self-identity as a construct

    DEFF Research Database (Denmark)

    Sudzina, Frantisek

    Self-identity is a private assessment of one’s beliefs and values. The self is an active agent in the decision process that drives people to act in accordance with the behavior that they see appropriate for themselves. According to Triandis, one’s self-definition motivates behavior that is consis......Self-identity is a private assessment of one’s beliefs and values. The self is an active agent in the decision process that drives people to act in accordance with the behavior that they see appropriate for themselves. According to Triandis, one’s self-definition motivates behavior...... that is consistent with that definition. Self-identity has been shown to influence the acceptance and use of technology. Prior research has shown that self-identity includes the factors of innovativeness, tech savviness, and opinion leadership. The aim of the research is to test the self-identity construct...

  16. Development and Validation of a Q-Sort Measure of Identity Processing Style: The Identity Processing Style Q-Sort

    Science.gov (United States)

    Pittman, Joe F.; Kerpelman, Jennifer L.; Lamke, Leanne K.; Sollie, Donna L.

    2009-01-01

    Identity styles represent strategies individuals use to explore identity-related issues. Berzonsky (Berzonsky, M. D. (1992). Identity style and coping strategies. "Journal of Personality, 60", 771-788) identified three styles: informational, normative, and diffuse. In three studies, this paper presents (a) the identity processing style Q-sort…

  17. Strengthening quitter self-identity: An experimental study.

    Science.gov (United States)

    Meijer, Eline; Gebhardt, Winifred A; van Laar, Colette; van den Putte, Bas; Evers, Andrea W M

    2018-06-10

    Smoking-related self-identity processes are important for smoking cessation. We examined whether quitter self-identity (i.e. identification with quitting smoking) could be strengthened through a writing exercise, and whether expected social support for quitting, manipulated through vignettes, could facilitate identification with quitting. Participants (N = 339 daily smokers) were randomly assigned to a 2 (identity: strengthened quitter self-identity vs. control) × 3 (social support: present vs. absent vs. neutral control) between-participants design. The main outcome was post-test quitter self-identity. Post-test quitter self-identity was not strengthened successfully. Only a small and marginally significant intervention effect was found on quitter self-identity, which did not generalise to positively influence quit-intention or behaviour. The social support manipulation did not facilitate quitter self-identity. Secondary content analyses showed that quitter self-identity was strengthened among participants who linked quitting smoking to their lifestyle, wanted to become quitters for health reasons, and whose reasons for becoming quitters included approach of positive aspects of quitting, but not among participants who linked quitter self-identity to their self-perceptions. Results provide insight into the content of smokers' self-conceptualizations as quitters. Writing exercises should be improved and tested to eventually successfully strengthen quitter identities.

  18. Perancangan Corporate Identity Brotherwood Decoration

    OpenAIRE

    Ciputra, Ongky Permana; Bangsa, Petrus Gogor; Christianna, Aniendya

    2015-01-01

    Sebagai Perusahaan interior di Surabaya, “BROTHERWOOD” sedang membangun citra positif melalui penguatan corporate identity secara menyeluruh.Oleh karena itu “Brotherwood” memerlukan corporate identity dan mengaplikasikannya pada media promosi dan informasi yang sesuai dengan karakter dari target audience dan target market-nya.Dengan menggunakan corporate identity diharapkan “Brotherwood” menjadi lebih dikenal oleh target audience dan target market-nya sehingga membuat market “Brotherwood” men...

  19. Heartcore Business? A study of the challenges social enterprises experience when communicating their corporate identity

    DEFF Research Database (Denmark)

    Schmeltz, Line

    The aim of this paper is thus to investigate social businesses’ communication of identity in their corporate communication. Institutional theory (e.g. DiMaggio & Powel, 1983), and especially the notion of legitimacy (Deephouse and Carter, 2005; Meyer and Rowan, 1977; Suchman, 1995), provides...... responsibility values, or if they are working with two, or even more, different value systems. Accordingly, the assumption put forward by this paper is that a high degree of alignment between identity and social responsibility in the enterprise’s corporate communication will enable the enterprises to communicate...... the frame for understanding and exploring the enterprises’ communication in an organizational context. Hence, through a value-theoretical framework, the study seeks to identify the extent to which these enterprises manage to create alignment between their corporate identity values and their social...

  20. Realizing the value of Family Business Identity as Corporate Brand Element — A Research Model

    OpenAIRE

    Blombäck, Anna

    2011-01-01

    Recent publications among family business scholars reveal an emerging interest to investigate questions related to marketing communications and brand management. An underlying question for this research is whether, how, and under what circumstances the portrayal of a family business identity influences corporate brand equity. Research in brand management clarifies the importance of learning how consumer behavior is influenced by brand leveraging beyond the core product or company. Such knowle...

  1. Perceived parenting dimensions and identity styles: exploring the socialization of adolescents' processing of identity-relevant information.

    Science.gov (United States)

    Smits, Ilse; Soenens, Bart; Luyckx, Koen; Duriez, Bart; Berzonsky, Michael; Goossens, Luc

    2008-04-01

    This study examined the relationships between crucial dimensions of perceived parenting (support, behavioral control, and psychological control) and the three identity styles defined by Berzonsky [Berzonsky, M. D. (1990). Self-construction over the life span: A process perspective on identity formation. Advances in Personal Construct Psychology, 1, 155-186.]. Each identity style was hypothesized to relate to a specific pattern of perceived parenting dimensions. Hypotheses were examined in a sample of middle and late adolescents (n=674). An information-oriented style was positively predicted by parental support. Contrary to expectations, however, an information-oriented style was also positively predicted by psychological control. A normative identity style was positively predicted by support and behavioral control. In line with expectations, a diffuse-avoidant identity style was positively predicted by psychological control and negatively by maternal (but not paternal) behavioral control. Findings are discussed in light of the literature on the socialization of identity formation and directions for future research are outlined.

  2. Music, culture and identity

    Directory of Open Access Journals (Sweden)

    Ilir Ramadani

    2017-03-01

    Full Text Available At the time of globalization it is difficult to pretend avoiding music culture and identity from political, cultural and social developments. Thus, it is impossible for the music to be unshakable and to represent national identity by not taking and giving nothing to culture. The dynamics of life and the rapid development of technology make it impossible for the culture to remain unaffected in terms of sharing experiences social experiences. Culture represents our current course, both in terms of politics, also in the social and human aspects. Through the technology it is possible for our children to be equal with children of all other countries, to exchange information and to connect directly with all countries of the world. Musical education is one of the main factors of cultural development and preservation of national identity. Identity consists of everything we posses and reflect. We are those who distinguish from each other and have a common denominator compared to other nations.

  3. It’s About Valence: Historical Continuity or Historical Discontinuity as a Threat to Social Identity

    Directory of Open Access Journals (Sweden)

    Jenny Roth

    2017-08-01

    Full Text Available National identity is underpinned by historical representations. Recent research shows that narratives presenting an in-group’s history as discontinuous rather than continuous raise collective angst, suggesting that historical discontinuity threatens social identity. This previous research has focused on positive aspects of an in-group’s past. The present research aims to extend the findings to go beyond positive histories. We suggest that when the in-group’s actions in the past are presented as negative, historical continuity instead of discontinuity will increase perceived identity threat because a negative, continuous history threatens group members’ need for a positive social identity in the present. In an experiment with a sample size of N = 316, we manipulated the narrated valence of in-group actions during the historical event of the approval of the German constitutional law by framing the group’s actions in either positive or negative terms. In addition, we presented the in-group’s history as connected or disconnected to the in-group’s present. Results demonstrate that historical continuity only decreased identity threat compared to historical discontinuity when the in-group’s past behavior was presented as positive. When the in-group’s past was presented as negative, continuity even increased identity threat compared to historical discontinuity. These results were particularly pronounced for people who strongly identified with their national in-group. We discuss implications of the findings for political communication and managing a nation’s perception of social identity threat.

  4. At the confluence of organisation development (OD and organisation identity theory (OIT: Enter identity interventions

    Directory of Open Access Journals (Sweden)

    C L Van Tonder

    2004-10-01

    Full Text Available The identity concept has been around in the form of “corporate identity" for some time, but its appearance as “organisation identity" is more recent. Emerging theory and initial empirical research suggest that an identity approach and “identity interventions" in particular, offer promising avenues to the organisation development practitioner for enhancing organisational focus, building resilience in the face of major change, and improving performance. Identity interventions in and of themselves, but also employed as pre-change interventions, build organisational capacity that would stave off premature organisational “death" and extend the organisation’s life expectancy. Opsomming Die identiteitskonsep is in die vorm van korporatiewe identiteit reeds ’n geruime tyd in omgang, maar die verskyning daarvan as “organisasie-identiteit? is meer onlangs. Ontluikende teorie en aanvanklike empiriese navorsing suggereer dat ’n identiteitsbenadering en "identiteitsintervensies" in die besonder, belowende geleenthede aan die organisasie- ontwikkelingspraktisyn bied om organisasiefokus te verbeter, die organisasie se veerkragtigheid ten aanskoue van omvangryke verandering te bou, en prestasie te verbeter. Identiteitsintervensies op sigself bou organisasiekapasiteit, maar kan ook as voorveranderingsintervensies aangewend word wat premature organisasie "sterftes" sal vermy en die organisasie se lewensverwagting sal verleng.

  5. G-identities of non-associative algebras

    International Nuclear Information System (INIS)

    Bakhturin, Yu A; Zaitsev, M V; Sehgal, S K

    1999-01-01

    The main class of algebras considered in this paper is the class of algebras of Lie type. This class includes, in particular, associative algebras, Lie algebras and superalgebras, Leibniz algebras, quantum Lie algebras, and many others. We prove that if a finite group G acts on such an algebra A by automorphisms and anti-automorphisms and A satisfies an essential G-identity, then A satisfies an ordinary identity of degree bounded by a function that depends on the degree of the original identity and the order of G. We show in the case of ordinary Lie algebras that if L is a Lie algebra, a finite group G acts on L by automorphisms and anti-automorphisms, and the order of G is coprime to the characteristic of the field, then the existence of an identity on skew-symmetric elements implies the existence of an identity on the whole of L, with the same kind of dependence between the degrees of the identities. Finally, we generalize Amitsur's theorem on polynomial identities in associative algebras with involution to the case of alternative algebras with involution

  6. Social Media Social Comparison of Ability (but not Opinion) Predicts Lower Identity Clarity: Identity Processing Style as a Mediator.

    Science.gov (United States)

    Yang, Chia-Chen; Holden, Sean M; Carter, Mollie D K

    2018-01-11

    Social comparison on social media has received increasing attention, but most research has focused on one type of social comparison and its psycho-emotional implications. Little is known about how different types of social comparison influence youth's identity development. Drawing on the theories of identity processing styles and social comparison, we examined how two different forms of social comparison on social media related to three identity processing styles, which in turn predicted youth's global self-esteem and identity clarity. We surveyed 219 college freshmen (M age  = 18.29; 74% female) once in the Fall and once in the Spring. Social comparison of ability on social media was related to concurrent diffuse-avoidant identity processing style, which predicted lower identity clarity months later. In contrast, social comparison of opinion on social media did not influence college freshmen's global self-esteem and identity clarity through identity processing styles. The findings clarified the implications of online social comparison for youth's identity development.

  7. Interplay of Language Policy, Ethnic Identity and National Identity in Five Different Linguistic Settings

    Directory of Open Access Journals (Sweden)

    Mehdi Gran Hemat

    2012-11-01

    Full Text Available This study, as a concise and critical literature review, examines related studies that investigated the interplay of the three constructs: ethnic identity, national identity and language policy. To do this, five related research articles were located and their similarities and differences in terms of their findings and methodologies were compared and contrasted. The literature review reveals that the researchers have utilized both quantitative and qualitative methods to obtain data. The findings show that ethnic identity is the contextualization of history, beliefs, customs, spiritual values, etc. of a speech community which practice their culture and values via the medium of language. National identity which emerges in time can be defined as an embodiment of the all common cultural values and social practices of different ethnic groups inside the borders of any country, and this is also manifested through a common language used as the formal and official language of their country. However, identity is a notion that remains rather illusive in its operationalization. Finally, language policy may be representative of a body of law, regulation and authoritative linguistic planned programs which are imposed on societies by governments. Language policies as nation building activities can improve the sense of nationality and reduce ethnic discords, and in the event may also suppress the maintenance or development of ethnic identity.

  8. Quantum entanglement of identical particles

    International Nuclear Information System (INIS)

    Shi Yu

    2003-01-01

    We consider entanglement in a system with a fixed number of identical particles. Since any operation should be symmetrized over all the identical particles and there is the precondition that the spatial wave functions overlap, the meaning of identical-particle entanglement is fundamentally different from that of distinguishable particles. The identical-particle counterpart of the Schmidt basis is shown to be the single-particle basis in which the one-particle reduced density matrix is diagonal. But it does not play a special role in the issue of entanglement, which depends on the single-particle basis chosen. The nonfactorization due to (anti)symmetrization is naturally excluded by using the (anti)symmetrized basis or, equivalently, the particle number representation. The natural degrees of freedom in quantifying the identical-particle entanglement in a chosen single-particle basis are occupation numbers of different single-particle basis states. The entanglement between effectively distinguishable spins is shown to be a special case of the occupation-number entanglement

  9. STORYTELLING AND UNIVERSITY BRANDING IDENTITY

    Directory of Open Access Journals (Sweden)

    ANDREEA MONICA STATE

    2016-08-01

    Full Text Available The present article sets out to clarify the concepts of storytelling and branding, with a focus on university branding and visual identity – the latter being a vital element to a brand’s uniqueness. Storytelling is an important method of brand construction, and it entails a strong power of seduction. Branding is increasingly more about storytelling. Practically, a story is an image made up of facts, feelings and interpretations, which are often told to us solely by the university itself. As such, the brand appears on the market accompanied by its identity. Identity is what we aim to express with help of the brand. Implementing a system of visual identity that would help to harmoniously develop a university brand requires a handbook of visual identity. The present article aims to be a starting point for such a handbook serving the University of Bucharest, which currently does not own such a handbook

  10. Leisure Time and Social Identity

    Directory of Open Access Journals (Sweden)

    Rasoul Rabbani

    2010-01-01

    Full Text Available How could patterns of leisure represent social identity? Whether they are sub-ordinate to the class identity or in the contemporary context of consumption and the post-modern cultural transformations, they could represent some other different social identities based on the patterns of consumption? Considering “leisure time” as a part of “style of life”, the present study attempts to explore social identity. There are two parts in methodology; first the qualitative one, carried through deep interview technique; and the other, surveying through questionnaire. Results distinguish the determining role “social class”, and the combination of “gender” and social class play in modeling distinctions in leisure patterns. In other words, leisure –as the arena for individual choice- is restricted to the social class and gender –as the structural and contextual variables. The strong correlation identity has with the social class and gender denies the post-modern interpretations which emphasis on consumption as the cause of social differentiations.

  11. Three Identities of the Catalan-Qi Numbers

    OpenAIRE

    Mansour Mahmoud; Feng Qi

    2016-01-01

    In the paper, the authors find three new identities of the Catalan-Qi numbers and provide alternative proofs of two identities of the Catalan numbers. The three identities of the Catalan-Qi numbers generalize three identities of the Catalan numbers.

  12. Personal Identity in Japan

    Science.gov (United States)

    Sugimura, Kazumi; Mizokami, Shinichi

    2012-01-01

    This chapter explores characteristics of identity formation among Japanese adolescents and young adults living in a cultural context where individualism has been increasingly emphasized even while maintaining collectivism. We argue that, to develop a sense of identity in Japanese culture, adolescents and young adults carefully consider others'…

  13. Positive identity entry control system with geographically distributed portals and enrollment stations

    International Nuclear Information System (INIS)

    McIntire, J.M.

    1985-01-01

    A positive identity entry control system using distributed processing to allow reliable geographically separated portals and enrollment stations has been installed and is fully operational at a large area DOE site. Identity verification requires a credential, a memorized number and measurement of a physical characteristic of the user. Additionally, all portal activity is monitored by guards. The portal system is dual redundant such that no single point failure will shut down operations. Each portal site maintains its own subset of the master data base so off-site failure of the central data base manager or its communication links will not significantly affect local portal activity. The system is suitable for installations with large populations requiring access control at several remote sites scattered over a large area

  14. Three Identities of the Catalan-Qi Numbers

    Directory of Open Access Journals (Sweden)

    Mansour Mahmoud

    2016-05-01

    Full Text Available In the paper, the authors find three new identities of the Catalan-Qi numbers and provide alternative proofs of two identities of the Catalan numbers. The three identities of the Catalan-Qi numbers generalize three identities of the Catalan numbers.

  15. Exploring Japanese university English teachers' professional identity

    CERN Document Server

    Nagatomo, Diane Hawley

    2012-01-01

    This book examines the professional identities of Japanese university English teachers. It focuses on how relatively new teachers develop their professional identities, how gender impacts the professional identities of female professors, and how teaching practices and beliefs reflect personal and professional identity.

  16. Finding Urban Identity through Culture-led Urban Regeneration

    Directory of Open Access Journals (Sweden)

    Kyu Hong Hwang

    Full Text Available ABSTRACT: A city experiencing a cycle from growth to decline cannot maintain sustainable development without the type of urban identity that could be consolidated by culture-led urban regeneration. A plan for urban regeneration in a declining urban area should be practiced partially or on the whole according to the characteristics of the community. By transforming a low-value and deteriorated area into a highly valued district, the local community can simultaneously restore its social pride, revive the local economy, and realize an urban identity.Firstly, this paper examines urban decline in order to better understand urban regeneration and the need for multidisciplinary management, and also, by considering the necessity for and universal types of urban regeneration, investigates the characteristics of culture-led urban regeneration as a tool for realizing socio-economic revival and urban identity. In particular, this study suggests the action techniques and benchmarking points for urban regeneration by analyzing cases of culture-led urban regeneration in Korea. Three subjects were considered as case studies in this paper: 1 Hanok village in Jeonju city, which changed from a twilight zone to a tourist attraction; 2 Changdong district in Changwon city, which recovered from an area of declining and dark alleyways that had been the hub for arts and culture in the 1970s to become a new artist village; and 3 Cheongju city, which is being transformed from an idle industrial facility into a cultural space. This thesis suggests the implementation process of culture-led urban regeneration to find an urban identity through analysis of the causes of urban decline, the methods of regeneration, and the results of urban regeneration in the three aforementioned cases. In the conclusion section of this paper, the implementation process for culture-led urban regeneration is summarized as consisting of 5 phases: Phase 1, the diagnosis of decline; Phase 2

  17. Foreign Language Teaching and Cultural Identity.

    Science.gov (United States)

    Nasr, Raja T., Ed.; And Others

    A collection of works on the role of cultural identity in second language learning and teaching includes: "Linguas estrangeiras e ideologia" (Roberto Ballalai); "Cultural Identity and Bilinguality" (Josiane F. Hamers, Michel Blanc); "Foreign Language Teaching and Cultural Identity" (Lakshmie K. Cumaranatunge);…

  18. Multiple Social Identities Enhance Health Post-Retirement Because They Are a Basis for Giving Social Support

    Directory of Open Access Journals (Sweden)

    Niklas K Steffens

    2016-10-01

    Full Text Available We examine the extent to which multiple social identities are associated with enhanced health and well-being in retirement because they provide a basis for giving and receiving social support. Results from a cross-sectional study show that retirees (N = 171 who had multiple social identities following (but not prior to retirement report being (a more satisfied with retirement, (b in better health, and (c more satisfied with life in general. Furthermore, mediation analyses revealed an indirect path from multiple social identities to greater satisfaction with retirement and better health through greater provision, but not receipt, of social support to others. These findings are the first to point to the value of multiple group membership post-retirement as a basis for increased opportunities to give meaningful support to others. We discuss the theoretical and practical implications for the management of multiple identities in the process of significant life transitions such as retirement.

  19. Value Conditionality of Identity

    Directory of Open Access Journals (Sweden)

    M M Yusupov

    2013-12-01

    Full Text Available The article considers theoretical approaches to the study of values and identity, and reveals the role of values in the formation of the ethnic, regional and Russian identity on the example of Chechnya and the North Caucasus, with the sociological indicators characterizing value orientations and self-identification.

  20. Self and social identity

    NARCIS (Netherlands)

    Ellemers, N; Spears, R; Doosje, B

    2002-01-01

    In this chapter, we examine the self and identity by considering the different conditions under which these are affected by the groups to which people belong. From a social identity perspective we argue that group commitment, on the one hand, and features of the social context, on the other hand,

  1. Situated influences on perceived barriers to health behavior change: cultural identity and context in Kazakhstan.

    Science.gov (United States)

    Craig, Brett J; Kapysheva, Aizhan

    2017-02-23

    The objective of this study was to identify the perceived barriers to lifestyle changes citizens of Kazakhstan suffering from cardiovascular disease and type II diabetes were experiencing. 14 focus groups were conducted with patients across two regions of Kazakhstan. Topics of discussion included accessing medical care, communicating with health care providers, and following doctor's recommendations. The text of the discussions were analysed for trends and themes across the different groups. Patients identified a series of external and internal barriers to lifestyle changes, including the environment, a dependency on health care providers, a health care system they feel powerless to change, and a low level of self-efficacy. Most notable, however, was a constructed ethnic identity whose boundaries included unhealthy behaviors, specifically diet and untimely access of health care. This identity both was blamed as a cause for the patient's condition and seen as an unchangeable barrier to health behavior change. Current provider efforts to encourage lifestyle changes to manage disease are not taking into account the broader issue of ethnic identity, namely negotiating a fragile and previously suppressed identity that mostly exists alongside other ethnicities. Therefore, maintaining distinctiveness may be a greater need than modifying health behaviors. Efforts towards healthier lifestyles for the public must include not only messages regarding health but also constructions of a Kazakh identity that allows for such lifestyles to fit within the identity framework.

  2. MULTICULTURAL LITERATURE: THE IDENTITY CONSTRUCTION IN INDONESIAN NOVELS

    Directory of Open Access Journals (Sweden)

    Akhmad Taufiq

    2014-02-01

    Full Text Available This paper examines multicultural literature as a significant and strategic object of study in response to solving national problems. In this context, multicultural literature focuses mainly on multicultural problems frequently found in literary works. One of the main issues is concerned with identity. This article examines Indonesian novels, focusing mainly on the issues of identity: (1 identity and identity problems; (2 identity articulation; (3 text representation on identity discourse in Indonesian novels. The literature sociological approach was adopted to comprehend the reality in multicultural literary texts in Indonesian novels and its relation with the phenomena of identity problems in other field of studies. The results of study indicate that the process of identity articulation and text representation on identity discourse in multicultural social phenomena deserve more serious attention. Furthermore, the problems of identity and the process of identity articulation in multicultural society also require serious attention since identity problems are closely associated with nationality. National identity is not stable but dynamic in dealing with the development of a nation. The lack of concerns on this issue may cause a serious problem of national integrity.

  3. Authoring the identity of learner before doctor in the figured world of medical school.

    Science.gov (United States)

    Stubbing, Evangeline; Helmich, Esther; Cleland, Jennifer

    2018-02-01

    Students enter the 'figured world' of medical school with preconceptions of what it means to be a doctor. The meeting of these early preconceptions and their newly developing identities can create emotional tensions. The aim of this study was to advance our understanding of how such tensions were experienced and managed. Using figured worlds as a theoretical framework we explored students' interactions of preconceptions with their newly developing professional identities in their first year at medical school. Advancing our understanding of this phenomena provided new insights into the complex process of identity formation. This was a qualitative study underpinned by a constructivist epistemology. We ran biannual focus groups with 23 first year students in one UK medical school. Data were recorded, transcribed and then template analysis used to undertake an inductive, iterative process of analysis until it was considered the template provided a detailed representation of the data. Significant preconceptions associated with the identity of a doctor were 'to help' and 'to be a leader'. These early preconceptions were in conflict with realities of the figured world of medical school creating the emotional tensions of 'being unable to help' and 'lacking power', with implications for interactions with patients. By the end of year one students' negotiated tensions and 'self-authored' their identity as a learner as opposed to an imagined 'as if' identity of a doctor. We revealed how preconceptions associated with becoming a doctor can conflict with a newly developing professional identity highlighting the importance of supporting students to embrace the formation of a 'learner' identity, a necessary part of the process of becoming a doctor.

  4. Full-Time, Part-Time Full-Time, and Part-Time Fathers: Father Identities Following Divorce

    Science.gov (United States)

    Troilo, Jessica; Coleman, Marilyn

    2012-01-01

    This grounded theory study examined how 20 newly divorced, nonresidential fathers manage their fatherhood identities. The theory created from this study proposes that fathers' perceptions of (a) father-child relationships, (b) how their children's fiscal needs are met, and (c) barriers to their physical interactions with their children influence…

  5. Generalized Jacobi identities in gauge theories

    International Nuclear Information System (INIS)

    Chaves, F.M.P.

    1990-01-01

    A spatial generalized Jacobi identity obeyed by the polarization-dependent factors of the vertices in a q q-bar - Wγ process is studied. The amplitude of a scattering gluon-gluon with five particles is worked out. By reorganizing this amplitude in analogy with an interaction process photon-pion, the non existence of the spatial generalized Jacobi identity, but instead many spatial partial identities that compose themselves, in the case of a four particle process, in one single identity is shown. A process with four particles, three of them scalar fields, but in the one loop approximation is studied. In this case also, the non existence of the spatial generalized Jacobi identity is demonstrated. (author)

  6. RELATIONSHIPS BETWEEN IDENTITY AND ACADEMIC MOTIVATION.

    Science.gov (United States)

    Matsushima, Rumi; Ozaki, Hitomi

    2015-08-01

    This study examined university students' academic motivation, focusing on individual differences in their sense of identity. The participants were 109 female Japanese students from two private universities (age range = 19-22 yr., M = 19.3, SD = 0.6). They completed four scales: the Multidimensional Ego Identity Scale, the Scale of Students' Attitude Toward Their Classes, the Academic Motivation Inventory, and the Scale of Lecture Self-Evaluation. Correlational analyses assessed the relationships between subscales. Then, path analysis was conducted to evaluate whether sense of identity affected attitude toward classes, academic motivation, and lecture self-evaluation. Differences particularly in psychosocial identity and self-identity accounted for significant variance in the students' attitudes toward classes, academic motivation, and lecture self-evaluation.

  7. The Presentation of Self in Scholarly Life: Identity and Marginalization in Academic Homepages

    Science.gov (United States)

    Hyland, Ken

    2011-01-01

    The academic homepage is now a ubiquitous genre of scholarly life, but despite considerable interest in issues of identity and the ways individuals self-consciously manage the impression they give of themselves, it has been slow to attract the attention of ESP researchers. This may be because of the institutional control exercised by employing…

  8. On an extension of a combinatorial identity

    Indian Academy of Sciences (India)

    to an infinite family of 4-way combinatorial identities. In some particular cases we get even 5-way combinatorial identities which give us four new combinatorial versions of. Göllnitz–Gordon identities. Keywords. n-Color partitions; lattice paths; Frobenius partitions; Göllnitz–Gordon identities; combinatorial interpretations. 1.

  9. Changing the Ties That Bind? The Emerging Roles and Identities of General Practitioners and Managers in the New Clinical Commissioning Groups in the English NHS

    Directory of Open Access Journals (Sweden)

    Julia Segar

    2014-10-01

    Full Text Available The English National Health Service (NHS is undergoing significant reorganization following the 2012 Health and Social Care Act. Key to these changes is the shift of responsibility for commissioning services from Primary Care Trusts (PCTs to general practitioners (GPs working together in Clinical Commissioning Groups (CCGs. This article is based on an empirical study that examined the development of emerging CCGs in eight case studies across England between September 2011 and June 2012. The findings are based on interviews with GPs and managers, observations of meetings, and reading of related documents. Scott’s notion that institutions are constituted by three pillars—the regulative, normative, and cognitive–cultural—is explored here. This approach helps to understand the changing roles and identities of doctors and managers implicated by the present reforms. This article notes the far reaching changes in the regulative pillar and questions how these changes will affect the normative and cultural–cognitive pillars.

  10. Identity approach in translation : sociocultural implications

    Directory of Open Access Journals (Sweden)

    Alicja Żuchelkowska

    2012-01-01

    Full Text Available The objective of this text consists in presenting how it is necessary for contemporary translators and interpreters (both literary and specialised to acquire and develop the ability to recognize elements of identity discourse in translated texts. Nowadays, the need for inter-cultural exchange is inevitably connected with the necessity of establishing harmonious co-existence for numerous cultures and identities. Therefore, it is crucial to educate translators in a way that enables them to pay special attention to identity and cultural perturbations present in translated texts (culture and language hybridisation, multiple identity, cultural dislocation, presence in linguistic and political discourse of minority cultures, regardless of their genre or form. Such a strong emphasis on identity problems in the translation is especially relevant in the European context, where the attention of researchers and politicians directed at identity problems stemming from ethnical and cultural issues sets the framework for a new cultural paradigm that determines the future development of the Eu. Becoming acquainted with this paradigm which emphasises fl uency, identity unmarkedness and the new model of European collectivity is indispensable for a translator aspiring to become a true cultural mediator.

  11. The Identity of Czech Deaf Roma

    OpenAIRE

    Kalousová, Josefina

    2012-01-01

    With the definition of Deaf people as a cultural and linguistic minority the research of Deaf identity became possible. Following this, questions of identity of minority deaf persons emerged. Do these persons affiliate to the Deaf community or to their ethnic minority? This bachelor thesis focuses on the topic of Czech deaf Roma identity. The underlying assumption of the paper is that identity is a continuing process dependent on the interaction of an individual and society and that it consti...

  12. 40 CFR 792.31 - Testing facility management.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 31 2010-07-01 2010-07-01 true Testing facility management. 792.31... facility management. For each study, testing facility management shall: (a) Designate a study director as... appropriately tested for identity, strength, purity, stability, and uniformity, as applicable. (e) Assure that...

  13. Human Rights and the Excess of Identity: A Legal and Theoretical Inquiry into the Notion of Identity in Strasbourg Case Law.

    Science.gov (United States)

    Al Tamimi, Yussef

    2018-06-01

    Identity is a central theme in contemporary politics, but legal academia lacks a rigorous analysis of this concept. The aim of this article is twofold: (i) firstly, it aims to reveal presumptions on identity in human rights law by mapping how the European Court of Human Rights approaches identity and (ii) secondly, it seeks to analyse these presumptions using theoretical insights on identity. By merging legal and theoretical analysis, this article contributes a reading of the Court's case law which suggests that the tension between the political and apolitical is visible as a common thread in the Court's use of identity. In case law concerning paternity, the Court appears to hold a specific view of what is presented as an unquestionable part of identity. This ostensibly pre-political notion of identity becomes untenable in cases where the nature of an identity feature, such as the headscarf, is contended or a minority has adopted a national identity that conflicts with the majoritarian national identity. The Court's approach to identity in such cases reflects a paradox that is inherent to identity; identity is personal while simultaneously constituted and shaped by overarching power mechanisms.

  14. 17 CFR 201.65 - Identity and signature.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Identity and signature. 201.65... of 1934 § 201.65 Identity and signature. Applications pursuant to this subpart may omit the identity, mailing address, and signature of the applicant; provided, that such identity, mailing address and...

  15. Theta function identities associated with Ramanujan's modular ...

    Indian Academy of Sciences (India)

    In Chapter 20 of his second notebook [6], Ramanujan recorded several theta function identities associated with modular equations of composite degree 15. These identities have previously been proved by Berndt in [3]. But he proved most of these theta function identities using modular equations. These identities can also ...

  16. On Identities in Modern Networks

    Directory of Open Access Journals (Sweden)

    Libor Polcak

    2014-09-01

    Full Text Available Communicating parties inside computer networks use different kind of identifiers. Some of these identifiers are stable, e.g., logins used to access a specific service, some are only temporary, e.g., dynamically assigned IP addresses. This paper tackles several challenges of lawful interception that emerged in modern networks. The main contribution is the graph model that links identities learnt from various sources distributed in a network. The inferred identities result into an interception of more detailed data in conformance with the issued court order. The approach deals with network address translation, short-lived identifiers and simultaneous usage of different identities. The approach was evaluated to be viable during real network testing based on various means to learn identities of users connected to a network.

  17. Assessing cultural intelligence, personality and identity amongst young white Afrikaans-speaking students: A preliminary study

    Directory of Open Access Journals (Sweden)

    Natasha Nel

    2015-04-01

    Research purpose: The objective of this research is to determine the relationship between personality, identity and CQ amongst young Afrikaans-speaking South Africans. Research approach, design and method: A quantitative research design was used in this study. This study was cross-sectional in nature. For the purpose of this study, a sample of young South African university students (N = 252 was used. The personal identity subscale from the Erickson Psychosocial Stage Inventory, the Multi-Ethnic Identity Measure, the Religious Identity Short Scale, the South African Personality Inventory questionnaire and the Four Factor Model of Cultural Intelligence Scale were applied as the measuring instruments. Main findings: Religious identity and ethnic identity have a relationship with cognitive CQ. Soft-heartedness and conscientiousness have a relationship with behavioural CQ. Also, soft-heartedness, facilitating, extroversion and religious identity have a relationship with motivational CQ. Practical/managerial implications: Organisations within South Africa will gain a better understanding of CQ and the benefits of having a culturally intelligent workforce as a strengths-based approach. Culturally intelligent employees will be able to adjust to working with co-workers from another culture, not feel threatened when interacting with co-workers and clients and be able to transfer knowledge from one culture to another, which will aid the organisation in completing overseas assignments, cross-cultural decision-making, leadership in multicultural environments and managing international careers. Contribution/value-add: CQ is a relatively new concept and empirical research on positive subjects is still very limited. Research on personality, identity and CQ within the South African context is still very limited. Therefore, this study will contribute to literature on positive psychology and cultural intelligence.

  18. The Relation of Racial Identity, Ethnic Identity, and Racial Socialization to Discrimination-Distress: A Meta-Analysis of Black Americans

    Science.gov (United States)

    Lee, Debbiesiu L.; Ahn, Soyeon

    2013-01-01

    This meta-analysis synthesized the results of 27 studies examining the relations of racial identity, ethnic identity, and racial socialization to discrimination-distress for Black Americans. The purpose was to uncover which constructs connected to racial identity, ethnic identity, and racial socialization most strongly correlate with racial…

  19. Bicultural identity, bilingualism, and psychological adjustment in multicultural societies: immigration-based and globalization-based acculturation.

    Science.gov (United States)

    Chen, Sylvia Xiaohua; Benet-Martínez, Verónica; Harris Bond, Michael

    2008-07-01

    The present investigation examined the impact of bicultural identity, bilingualism, and social context on the psychological adjustment of multicultural individuals. Our studies targeted three distinct types of biculturals: Mainland Chinese immigrants in Hong Kong, Filipino domestic workers (i.e., sojourners) in Hong Kong, and Hong Kong and Mainland Chinese college students. Individual differences in Bicultural Identity Integration (BII; Benet-Martínez, Leu, Lee, & Morris, 2002) positively predicted psychological adjustment for all the samples except sojourners even after controlling for the personality traits of neuroticism and self-efficacy. Cultural identification and language abilities also predicted adjustment, although these associations varied across the samples in meaningful ways. We concluded that, in the process of managing multiple cultural environments and group loyalties, bilingual competence, and perceiving one's two cultural identities as integrated are important antecedents of beneficial psychological outcomes.

  20. Language and Identity Explored

    Directory of Open Access Journals (Sweden)

    Thomas Rozanov

    2016-06-01

    Full Text Available The relationship between language and identity is widely discussed in applied linguistics, sociology, communications and other related scholarly fields. Furthermore, many researchers have focused on the post-Soviet region, which given its unique historical context allows for testing of this relationship. The widespread bilingualism as a result of historical russification and the linguistic transformations that occurred after the collapse of the Soviet Union make the region a ‘sociolinguistic playground’. Recent events in Ukraine have given grounds to further explore this relationship, now in attempt to link language and identity as potential forces for geopolitical change in the region. This paper presents an overview of existing research, theories, and opposing perspectives related to the relationship between language and identity, and considers complications such as historical russification, religious influence, socioeconomic factors, and education with regards to the Ukrainian and post-Soviet context.  I aim to illustrate the significance of language and its effects on socio-political change in the case of Ukraine, by presenting arguments and complications in support of the relationship between language and identity.

  1. 40 CFR 725.85 - Microorganism identity.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 30 2010-07-01 2010-07-01 false Microorganism identity. 725.85 Section... to Information § 725.85 Microorganism identity. (a) Claims applicable to the period prior to... specific microorganism identity at the time of submission of the information. This claim will apply only to...

  2. 40 CFR 720.85 - Chemical identity.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 30 2010-07-01 2010-07-01 false Chemical identity. 720.85 Section 720... PREMANUFACTURE NOTIFICATION Confidentiality and Public Access to Information § 720.85 Chemical identity. (a... submits information to EPA under this part may assert a claim of confidentiality for the chemical identity...

  3. Pre-Service Teacher Cultural Identity Development

    Science.gov (United States)

    Cunningham, Maurella Louise

    2013-01-01

    The main purpose of this study is to conduct exploratory qualitative research to investigate how PSTs and practicing teachers experience cultural and racial identity development or changes in identity. Rather than examine the "what" or contributors to identity development, I will explore the "how" or processes of identity…

  4. #MisconstruedIdentitiesMustFall collective: Identity formation in the current South African context: A practical theological perspective

    Directory of Open Access Journals (Sweden)

    Alfred R. Brunsdon

    2017-03-01

    Full Text Available In South Africa, 2015 was violently ushered out by several ‘must fall’ campaigns, of which the most prominent were the ‘fees’ and ‘Zuma must fall’ campaigns. These ‘must fall’ campaigns conveyed a new sense of urgency by the disgruntled masses towards certain institutions and individuals. Aligning with the ‘must fall’ analogy, the focus of this article is on combatting the notion of misconstrued identities in post-apartheid South Africa. Based on negative generalisation and perceptions of the ‘others’, misconstrued identities prohibit the formation of a collective identity that allows for peaceful co-existence. Consequently, the dynamics of collective identity formation and some of the possibilities for identity formation that reside within the Christian faith are investigated from a practical theological perspective. Given that a practical theological investigation takes both the context and theological reflection as points of departure, it is argued that it can contribute towards the dismantling of misconstrued identities to provide clues for the formation of a positive collective identity for South Africans.

  5. 16 CFR 500.4 - Statement of identity.

    Science.gov (United States)

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Statement of identity. 500.4 Section 500.4... PACKAGING AND LABELING ACT § 500.4 Statement of identity. (a) The principal display panel of a consumer commodity shall bear a specification of the identity of the commodity. (b) Such specification of identity...

  6. Teacher Identity Work in Mathematics Teacher Education

    Science.gov (United States)

    Neumayer-Depiper, Jill

    2013-01-01

    Becoming a teacher is not developing an identity, but is developing identity as a continuous process of constructing and deconstructing understandings within the complexities of social practice, beliefs, experiences, and social norms. I take up this stance on identity as articulated in Judith Butler's (1999) work with gender identity and…

  7. The Risky Path to a Followership Identity

    DEFF Research Database (Denmark)

    Larsson, Magnus; Nielsen, Mie Femø

    2017-01-01

    Followership research has increased recently, but little attention has been paid to the complexities and challenges of creating a followership identity. Researchers typically portray followership as a safe alternative to leadership identity, but we challenge this assumption by using naturally...... occurring workplace interactions to identify active contributions as well as risks associated with a follower identity. In this study, we use conversation analysis to examine how people collaboratively construct identities, and how identity development shapes and organizes interactions between people...

  8. [Asymmetric effect of in-group social values on identity with common-identity and common-bond in-groups].

    Science.gov (United States)

    Nakashima, Ken'ichiro; Isobe, Chikae; Toshihiko, Souma; Ura, Mitsuhiro

    2013-06-01

    Moderating effects of group type on the relationship between in-group social values and group identity were investigated. Previous research has indicated that values attached to the in-group, such as its status, privileges, and power, lead to increased group identity. However, these studies have not investigated the role of the type of in-groups on this effect. We conducted an experiment that manipulated the in-group type. In the common-identity type of in-group condition, formation of in- and out-groups on the basis of social categorization was established. In the common-bond type of in-group condition, interactions between the group members were conducted. Results indicated that in the former condition, the degree of in-group social values affected group identity; however, this effect was not found in the latter condition. These results suggest that social values of the in-group have an asymmetric effect on group identity, depending upon the in-group type as a common-identity or common-bond group.

  9. Imagining Geographies, Mapping Identities

    Directory of Open Access Journals (Sweden)

    Matthew Graves

    2015-03-01

    Full Text Available The ambition of this issue of Portal is to reach across the methodological boundaries of history, politics, literature and geography to apply their complementary perspectives to the study of identity and its relation to space and place, an aim that involves attempting to identify the many different ways the notoriously slippery concepts of identity and geography may intersect. For this issue we have selected articles that cast a fresh perspective on two areas where identity and geography intersect: the construction of identity through the imaginative recreation of place in literature: Mapping Literary Spaces; and the study of the shifting relationships of centre and periphery, exclusion and inclusion in urban settings and geopolitical confrontations: Social and Political Peripheries. Gerard Toal has written that geography is not a noun but a verb: it does not describe what space is but studies what we do with space, imaginatively and politically. The articles in this issue illustrate the exercise of the literary and political imagination and the role of materiality and memory in the creation of geographic representation. They show too a new awareness of the centrality of space in the constitution of identities, and the need for a new geocritical reading of its discourse, as the interrelations of place and community are played out on the many scales of social and political life, from the local to the global.   The special issue is organised thus: Introduction Matthew Graves (Aix-Marseille University & Liz Rechniewski (Sydney University: “Imagining Geographies, Mapping Identities.” I. Mapping Literary Spaces - Isabelle Avila (University of Paris XIII, "Les Cartes de l'Afrique au XIXe siècle et Joseph Conrad : Perceptions d'une Révolution Cartographique." - Daniela Rogobete (University of Craiova, "Global vs Glocal: Dimensions of the post-1981 Indian English Novel." II. Social and Political Peripheries - Elizabeth Rechniewski (Sydney

  10. "Do You Want Excitement? Don't Join the Army, Be a Nurse!": Identity Work and Advantage among Men in Training for the Female Professions

    OpenAIRE

    LoMascolo, Anna F.

    2008-01-01

    This study examines the identity work strategies that men students in nursing, elementary education, and social work programs employ in order to manage and assert their masculinity in the face of negative gender assessment, as well as the identity work involved in verifying their professional identities. It also examines the perceived benefits and disadvantages that men experience as numerical minorities in their fields of study. Interviews with 12 men students majoring in these disciplines...

  11. “ISLAM” IN THE GLOBAL VILLAGE: POST-TSUNAMI DIALOG AND NEGOTIATION OF ACEH IDENTITY

    Directory of Open Access Journals (Sweden)

    Ibnu Mujib Mujib

    2013-12-01

    Full Text Available This paper highlights the perspective of dialog in the negotiation of Aceh identity. If observed, the context of the tsunami followed by the development of Aceh is not without impact at all on the Acehnese entity, but in fact it has triggered a strong clash especially between local identities and influences of global construction. Among the important things offered in this paper is an attempt to reproduce and create “public space” as a productive social capital, that is, a space that is expected to build an atmosphere of openness, egalitarianism, inclusivism of many diverse groups. Therefore, in responding to the wider variety of cultural plurality which penetrates through ethnic clusters, religions, political parties, and all forms of interests, it can be managed through the deliberations of dialog. Therefore, the “public space” that can serve to discuss, hold dialog, and even negotiate the clash of the Acehnese identity forms the modus operandi of the discussion of this article, especially in the context of the development of Aceh that is currently taking place. Keywords: Islam, locality, globality, public space, dialog, negotiation of identity, diversity of Islamic groups, the other.

  12. 21 CFR 58.31 - Testing facility management.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 1 2010-04-01 2010-04-01 false Testing facility management. 58.31 Section 58.31... management. For each nonclinical laboratory study, testing facility management shall: (a) Designate a study... appropriately tested for identity, strength, purity, stability, and uniformity, as applicable. (e) Assure that...

  13. Reimagining the self at late-career transitions: how identity threat influences academic physicians' retirement considerations.

    Science.gov (United States)

    Onyura, Betty; Bohnen, John; Wasylenki, Don; Jarvis, Anna; Giblon, Barney; Hyland, Robert; Silver, Ivan; Leslie, Karen

    2015-06-01

    There is scant empirical work exploring academic physicians' psychosocial adjustment during late-career transitions or on the factors that influence their retirement decisions. The authors examine these issues through the lens of sociopsychological identity theory, specifically examining how identity threat influences academic physicians' decisions about retirement. Participants were academic physicians at a Canadian medical school and were recruited via e-mail requests for clinical faculty interested in discussing late-career and retirement planning issues. Participants included 15 males and 6 females (N = 21; mean age = 63, standard deviation = 7.54), representing eight specialties (clinical and surgical). Data were collected in October and November 2012 via facilitated focus groups, which were digitally recorded, transcribed verbatim, and anonymized, then analyzed using thematic analysis. Four primary themes were identified: centrality of occupational identity, experiences of identity threat, experiences of aging in an indifferent system, and coping with late-career transitions. Identity threats were manifested in apprehensions about self-esteem after retirement, practice continuity, and clinical competence, as well as in a loss of meaning and belonging. These identity challenges influenced decisions on whether to retire. Organizational and system support was perceived as wanting. Coping strategies included reimagining and revaluing various aspects of the self through assimilating new activities and reprioritizing others. Identity-related struggles are a significant feature of academic physicians' considerations about late-career transitions. Understanding these challenges, their antecedents, and their consequences can prepare faculty, and their institutions, to better manage late-career transitions. Individual- and institution-level implications are discussed.

  14. Personal identity and eastern thought

    Directory of Open Access Journals (Sweden)

    Correia Carlos João

    2009-01-01

    Full Text Available This paper aims to show that the problem of personal identity is a fundamental question of the classical Indian thought. Usually we tend to think that personal identity is a Western philosophical subject, and so we tend to forget the significance of the Self (Atman in Hinduism and even in Buddhism. The author shows how the Indian thought approached the question of personal identity and which was the singular solution outlined in the work consensually attributed to Gotama, the Buddha.

  15. 21 CFR 801.61 - Statement of identity.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 8 2010-04-01 2010-04-01 false Statement of identity. 801.61 Section 801.61 Food... DEVICES LABELING Labeling Requirements for Over-the-Counter Devices § 801.61 Statement of identity. (a... principal features a statement of the identity of the commodity. (b) Such statement of identity shall be in...

  16. 7 CFR 868.36 - Loss of identity.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 7 2010-01-01 2010-01-01 false Loss of identity. 868.36 Section 868.36 Agriculture... identity. (a) Lots. The identity of a packaged lot, bulk lot, or sublot of a commodity shall be considered... or location after the time of original inspection, unless the identity is preserved; or (2) More...

  17. The Meanings and Dimensions of Citizens’ Political Identity: Approaching an Understanding of the Concept of Political Identity

    DEFF Research Database (Denmark)

    Kristensen, Niels Nørgaard

    The present article seeks to explore approaches to political identity in order to discuss and suggest an understanding of the term. There are several reasons for such a focus related to the salience of political identities in political affairs, as well as how identities function in people’s lives...

  18. Políticas de identidade: perfil de DNA e a identidade genético-criminal Identity politics: DNA profile and the genetic-criminal identity

    Directory of Open Access Journals (Sweden)

    Helena Machado

    2010-01-01

    Full Text Available O DNA é visto por muitos como a “verdadeira” base da identidade humana, por se tratar de uma estrutura biológica, em princípio, única em cada indivíduo. Esta noção de “unicidade”, pilar fundamental da investigação criminal e da genética forense, tem alimentado políticas de identidade da parte dos Estados modernos pela classificação e armazenamento de informação sobre “criminosos”. Neste artigo analisam-se estratégias médico-legais e burocrático-estatais de produção da identidade “genético-criminal” relacionadas com a criação, em Portugal, de uma base de dados forense de perfis de DNA. Discutem-se os impactos desta política de identidade na gestão, categorização e vigilância de indivíduos classificados como criminosos.DNA is seen by many as the “true” basis of human identity, insofar as it is a biological structure that is, in principle, unique in each individual. This notion of “uniqueness”, a fundamental pillar of criminal investigation and forensic genetics, has fostered identity politics by modern states through the classification and storage of information about “criminals”. This article explores the alignment of science and state bureaucracy for producing the “genetic-criminal” identity in the context of the Portuguese forensic DNA database for forensic purposes. We discuss the impacts of this sort of identity politics for the management, categorization, and surveillance of individuals classified as criminals.

  19. Unskilled Work and Learner Identity

    DEFF Research Database (Denmark)

    Kondrup, Sissel

    2014-01-01

    . The main argument is that participation research must abandon the notion of motivation as an individual attribute and apply a dialectic concept of learner identity acknowledging work-life as a pivotal space for learning and formation of identity. I outline how a work-life-historical approach combining......The paper examines how unskilled work forms conditions for meeting the obligation to position oneself as an educable subject and engage in formal learning activities. Sensitivity to peoples’ work-life-experiences is necessary to understand their orientation toward different learning activities...... a critical theoretical approach inspired by Salling-Olesen’s and Archer’s concepts of identity and concerns can contribute to an understanding of the relationship between work and learner identity. Through narrative work-life interviews I examine how engagement in unskilled work in small and medium sized...

  20. Career identity in the veterinary profession.

    Science.gov (United States)

    Page-Jones, S; Abbey, G

    2015-04-25

    This research investigates vet and vet nurse career identity through the qualitative methodology of narrative enquiry. It derives learning and understanding from these empirical data to assist the veterinary profession to adjust to the changing industry landscape. Through a case series of 20 vets and vet nurses' career stories, this paper seeks understanding about career identity and its impact on individuals and organisations in the light of industry consolidation. Findings suggest that career is central to identity for many veterinary professionals who tend to have a strong sense of self; this is particularly evident around self as learner and technically competent, teacher and educator, ethical and moral and dedicated and resilient. Consequently, mismatches between 'who I am' and 'what I do' tend not to lead to identity customisation (to fit self into role or organisation) but to the search for alternative, more identity-compatible employment. This study offers a valuable insight for employers, veterinary professionals and universities. It suggests that businesses can gain competitive advantage and employees achieve validation and enrichment by working towards organisational and individual identity congruence and that teaching veterinary professionals with contemporary business in mind may develop graduates with a more sustainable identity. British Veterinary Association.

  1. Dehistoricized Cultural Identity and Cultural Othering

    Science.gov (United States)

    Weiguo, Qu

    2013-01-01

    The assumption that each culture has its own distinctive identity has been generally accepted in the discussion of cultural identities. Quite often identity formation is not perceived as a dynamic and interactive ongoing process that engages other cultures and involves change in its responses to different challenges at different times. I will…

  2. 21 CFR 201.50 - Statement of identity.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 4 2010-04-01 2010-04-01 false Statement of identity. 201.50 Section 201.50 Food... identity. (a) The label of prescription and insulin-containing drugs in package form shall bear as one of its principal features a statement of the identity of the drug. (b) Such statement of identity shall...

  3. 21 CFR 201.61 - Statement of identity.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 4 2010-04-01 2010-04-01 false Statement of identity. 201.61 Section 201.61 Food...: GENERAL LABELING Labeling Requirements for Over-the-Counter Drugs § 201.61 Statement of identity. (a) The... features a statement of the identity of the commodity. (b) Such statement of identity shall be in terms of...

  4. Biracial Japanese American identity: an evolving process.

    Science.gov (United States)

    Collins, J F

    2000-05-01

    This qualitative study explored the complexity of biracial identity development in Japanese Americans. It is based on the constant comparable method of analysis, or grounded theory. The study focused on how Japanese Americans perceived themselves in relation to other individuals, groups, and their environment. The data consisted of 15 extensive semistructured interviews with 8 men and 7 women (ages 20 to 40 years), each with 1 Japanese parent and 1 non-Asian parent. Findings relate to participants' initiating explorations of identity and perseverance in pursuing a biracial identity, which depended on the degree of support or negative experience within their social networks. Participants explored identity options attempting to develop their own meaning of identity, to develop a confident sense of themselves, and to secure a positive ethnic identity. Identity development among participants varied. It was a long-term process involving changes in the individual-environment relationship, which differed in the way individual participants influenced or selected from environmental opportunities, even creating or recreating some aspects. Within a given setting, as youths, the potential for social experiences were relatively fixed and changed only gradually. As adults, there were opportunities for participants to select their own social and geographic settings, providing opportunity for change. In their new environments, participants were exposed to new contacts and role models, acquired new behavioral repertoire, and underwent role transitions. Depending on this, new and different aspects of biracial identity developed. Participants indicated it was an emotional and conflictual process to positive assertion of identity. Before reaching this, all of the participants experienced periods of confusion. Most asserted biracial identity gradually, through a process of racial identity development consisting of the individual's changing or maintaining certain reference group

  5. The effect of professional identity on comprehensiveness in strategic decision making: physician executives in the Canadian health care context.

    Science.gov (United States)

    Karmali, Shazia

    2012-01-01

    This paper explores differences in decision-making approaches between physician executives and nonphysician executives in a managerial setting. Fredrickson and Mitchell's (1984) conceptualization of the construct of comprehensiveness in strategic decision making is the central construct of this paper. Theories of professional identity, socialization, and institutional/dominant logics are applied to illustrate their impact on strategic decision-making approaches of physician and nonphysician executives. This paper proposes that high-status professionals, specifically physicians, occupying senior management roles are likely to approach decision making in a way that is consistent with their professional identity, and by extension, that departments led by physician executives are less likely to exhibit comprehensiveness in strategic decision-making processes than departments led by nonphysician executives. This paper provides conceptual evidence that physicians and nonphysicians approach management differently, and introduces the utility of comprehensiveness as a construct for strategic decision making in the context of health care management.

  6. Special Education at the Crossroad: An Identity Crisis and the Need for a Scientific Reconstruction

    Science.gov (United States)

    Kauffman, James M.; Anastasiou, Dimitris; Maag, John W.

    2017-01-01

    Special education is losing its identity--its visibility, distinctiveness, budget, and basic functions are all at risk. Special education functions include (a) sorting, categorizing, and labeling students who need it; (b) making the right comparisons; (c) honoring diversity but changing "particular" differences; (d) managing stigma; (e)…

  7. Further Conceptualizing Ethnic and Racial Identity Research: The Social Identity Approach and Its Dynamic Model.

    Science.gov (United States)

    Verkuyten, Maykel

    2016-11-01

    This article proposes a further conceptualization of ethnic and racial identity (ERI) as a fundamental topic in developmental research. Adding to important recent efforts to conceptually integrate and synthesize this field, it is argued that ERI research will be enhanced by more fully considering the implications of the social identity approach. These implications include (a) the conceptualization of social identity, (b) the importance of identity motives, (c) systematic ways for theorizing and examining the critical role of situational and societal contexts, and (d) a dynamic model of the relation between ERI and context. These implications have not been fully considered in the developmental literature but offer important possibilities for moving the field forward in new directions. © 2016 The Author. Child Development © 2016 Society for Research in Child Development, Inc.

  8. Concealable Stigmatized Identities and Psychological Well-Being

    OpenAIRE

    Quinn, Diane M.; Earnshaw, Valerie A.

    2013-01-01

    Many people have concealable stigmatized identities: Identities that can be hidden from others and that are socially devalued and negatively stereotyped. Understanding how these concealable stigmatized identities affect psychological well-being is critical. We present our model of the components of concealable stigmatized identities including valenced content – internalized stigma, experienced discrimination, anticipated stigma, disclosure reactions, and counter-stereotypic/positive informati...

  9. Unlocking data: federated identity with LSDMA and dCache

    Science.gov (United States)

    Millar, AP; Behrmann, G.; Bernardt, C.; Fuhrmann, P.; Hardt, M.; Hayrapetyan, A.; Litvintsev, D.; Mkrtchyan, T.; Rossi, A.; Schwank, K.

    2015-12-01

    X.509, the dominant identity system from grid computing, has proved unpopular for many user communities. More popular alternatives generally assume the user is interacting via their web-browser. Such alternatives allow a user to authenticate with many services with the same credentials (user-name and password). They also allow users from different organisations form collaborations quickly and simply. Scientists generally require that their custom analysis software has direct access to the data. Such direct access is not currently supported by alternatives to X.509, as they require the use of a web-browser. Various approaches to solve this issue are being investigated as part of the Large Scale Data Management and Analysis (LSDMA) project, a German funded national R&D project. These involve dynamic credential translation (creating an X.509 credential) to allow backwards compatibility in addition to direct SAML- and OpenID Connect-based authentication. We present a summary of the current state of art and the current status of the federated identity work funded by the LSDMA project along with the future road map.

  10. Identity Politics, the Ethos of Vulnerability, and Education

    Science.gov (United States)

    Brunila, Kristiina; Rossi, Leena-Maija

    2018-01-01

    In this article, identity politics is understood as a form of politics stressing collective but malleable group identities as the basis of political action. This notion of identity politics also allows thinking of identity as intersectional. The focus of this article, and a problem related to identity politics, is that when discussed in the…

  11. Recognizing Moral Identity as a Cultural Construct.

    Science.gov (United States)

    Jia, Fanli; Krettenauer, Tobias

    2017-01-01

    Current research on moral identity shows that moral identity predicts moral action in Western cultures but not in non-Western cultures. The present paper argues that this may be due to the fact that the concept of moral identity is culturally biased. In order to remedy this situation, we argue that researchers should broaden their scopes of inquiry by adding a cultural lens to their studies of moral identity. This change is important because although some concept of moral identity likely exists in all cultures, it may function in different ways and at different levels in each place. We propose that moral identity is a context-dependent construct tied to varying social and cultural obligations. We argue that Western moral identity stresses an individually oriented morality, whereas, people from Eastern cultures consider a highly moral person to be societally oriented. We conclude by discussing the implications of this view for future research.

  12. How Places Shape Identity: The Origins of Distinctive LBQ Identities in Four Small U.S. Cities.

    Science.gov (United States)

    Brown-Saracino, Japonica

    2015-07-01

    Tools from the study of neighborhood effects, place distinction, and regional identity are employed in an ethnography of four small cities with growing populations of lesbian, bisexual, and queer-identified (LBQ) women to explain why orientations to sexual identity are relatively constant within each site, despite informants' within-city demographic heterogeneity, but vary substantially across the sites, despite common place-based attributes. The author introduces the concept of "sexual identity cultures"--and reveals the defining role of cities in shaping their contours. She finds that LBQ numbers and acceptance, place narratives, and newcomers' encounters with local social attributes serve as touchstones. The article looks beyond major categorical differences (e.g., urban/rural) to understand how and why identities evolve and vary and to reveal the fundamental interplay of demographic, cultural, and other city features previously thought isolatable. The findings challenge notions of identity as fixed and emphasize the degree to which self-understanding and group understanding remain collective accomplishments.

  13. Regional identity and family

    Directory of Open Access Journals (Sweden)

    Tripković Gordana D.

    2003-01-01

    Full Text Available This paper is a continuation of a study on regionalisation and family, within the project named Sociological Aspects of Multiculturality and Regionalisation and their influence on the development of AP Vojvodina and the Republic of Serbia. The author focuses her attention to operationalisation of the theoretical and methodological premises that were developed in the previous paper (Tripković, 2002: 111-127, which means that it represents the results of the second phase of the research plan. This phase includes adjusting of theoretical concepts to the fieldwork displaying the results of the research and the analysis of the findings that put a family in the context of confronting different identities, above all national and regional. As possible "identity difference" was emphasized in the research, theoretical and methodological apparatus was adjusted to this goal. That is why in this paper the replies of interviewees that can suggest or reject the assumption that their national identity can influence significantly the evaluation of identity specificities are presented and analyzed, concerning more or less visible aspects of family life, like welfare status, relations between spouses, respect to the elder, family harmony, number of children, connections with relatives, etc.

  14. The challenge of plural identity

    Directory of Open Access Journals (Sweden)

    Jovanović Bojan

    2005-01-01

    Full Text Available The complexity of collective existence is expressed through an awareness of its real identity, which then entails an appropriate attitude towards its own negativity. Within the hierarchically structured identity, different levels of its generality make it possible to consider them as factors of a plural reality. If negativity is raised to consciousness, then its dark side is dismantled. Thus, instead of being a factor of conflict, negativity becomes an element of complementariness and a factor in the construction of a shared identity at a higher level of generality.

  15. Smoker Identity Development among Adolescents who Smoke

    Science.gov (United States)

    Hertel, Andrew W.; Mermelstein, Robin J.

    2016-01-01

    Adolescents who smoke are more likely to escalate their smoking frequency if they believe smoking is self-defining. Knowing factors that are associated with development of a smoker identity among adolescents who smoke may help to identify who will become a regular smoker. We investigated whether smoker identity development is associated with internal and external motives for smoking. For comparison, we also investigated whether social smoker identity development is associated with internal and external motives for smoking. Adolescents who smoke (n = 292) completed measures of smoker and social smoker identity, internal motives for smoking (negative affect coping, positive affect enhancement), and external motives for smoking (social fit) at baseline, 6-, 15-, and 24-month assessments of an ongoing longitudinal study of smoking patterns. We examined whether change in smoker and social smoker identity from 6 to 24 months was associated with change in motives at earlier assessment waves. We also explored whether gender moderated these relationships. Increases in negative affect coping motives were associated with smoker identity development among both males and females. Increases in social motives were associated with smoker identity development among males, and increases in negative affect coping motives were associated with social smoker identity development among females. Smoker and social smoker identities are signaled by negative affect coping as well as social motives for smoking. PMID:27136374

  16. Identity, Victimization, and Support: Facebook Experiences and Mental Health Among LGBTQ Youth.

    Science.gov (United States)

    McConnell, Elizabeth A; Clifford, Antonia; Korpak, Aaron K; Phillips, Gregory; Birkett, Michelle

    2017-11-01

    The rise of social networking sites (SNSs) has created new contexts within which lesbian, gay, bisexual, transgender, and queer (LGBTQ) youth and young adults manage their social identities and relationships. On one hand, SNSs provide important social support; on the other, they comprise another realm for victimization and discrimination. Context collapse refers to the ways diverse subgroups (e.g., family, co-workers) are often united in Facebook networks, which presents unique challenges related to outness. In this study, we examine the Facebook contexts of a cohort of LGBTQ youth and young adults with regard to outness, victimization, social support, and psychological distress by first examining descriptive statistics and correlations, and then testing a series of multiple regressions in an analytic sample of 175 ( M age = 24.02 years) LGBTQ youth. Participants reported levels of daily Facebook use comparable to other samples of non-LGBTQ youth; however, they reported greater use of security controls, which may function as a tool for managing outness. Participants reported slightly lower outness across relational subgroups on Facebook, and associations between outness to relational subgroups were slightly stronger on Facebook, illustrating the potential impact of context collapse. Regression results showed that great victimization, cyberbullying, and the offering of support online were positively associated with psychological distress. Study findings illuminate how LGBTQ youth use and manage their identities on Facebook and highlight the importance of online contexts in shaping wellbeing for LGBtQ outh and young adults.

  17. Dissociative identity disorder (DID) in clinical practice - what you don't see may hurt you.

    Science.gov (United States)

    Leonard, David; Tiller, John

    2016-02-01

    To identify problems that interfere with the recognition, diagnosis and management of people with dissociative identity disorder (DID) presenting to psychiatric outpatient and inpatient services and suggest solutions. Problems and suggested solutions associated with clinical presentations and management of people with DID are outlined with references to relevant literature. Problems in the recognition and management of DID are described. These lead to delays in diagnosis and costly, inappropriate management, destructive to services, staff and patients alike. Problems include lack of understanding and experience and scepticism about the disorder, resulting in failure to provide appropriate treatment.Some suggestions to improve recognition and management are included. Better recognition, diagnosis and management of DID will lead to better and more cost effective outcomes. © The Royal Australian and New Zealand College of Psychiatrists 2015.

  18. The career planning, athletic identity, and student role identity of intercollegiate student athletes.

    Science.gov (United States)

    Lally, Patricia S; Kerr, Gretchen A

    2005-09-01

    The purpose of this study was to examine the career planning of university student athletes and relationships between their career planning and athletic and student role identities. Two retrospective in-depth interviews were held with four male and four female university student athletes. Participants entered university with vague or nonexistent career objectives and invested heavily in their athletic roles. In the latter years of their college career, the participants discarded their sport career ambitions and allowed the student role to become more prominent in their identity hierarchies. The current findings support Brown and Hartley's (1998) suggestion that student athletes may invest in both the athlete and student role identities simultaneously and that investing in the latter may permit the exploration of nonsport career options.

  19. Professional paradox: identity formation in qualified doctors pursuing further training.

    Science.gov (United States)

    Chan, Mercedes; Pratt, Dan; Poole, Gary; Sidhu, Ravi

    2018-03-01

    Many newly qualified specialists and subspecialists pursue additional training. Although their motivations are many, the pursuit of further training as an alternative to unemployment is an emerging trend. Paradoxically, doctors continue as trainees with a consultant's credentials, and without the guarantee of eventual employment. This study explores seven doctors' experiences, the effects of further training on their professional identity formation (PIF), and how these effects are reconciled on a personal and professional level. This phenomenological study involved interviews with seven qualified Canadian specialists (three were female) who pursued additional training in response to a lack of available positions in their respective specialties. Template analysis generated theoretical constructs of influences on their PIF, and characteristics of their lived experiences. Four themes shaped PIF: setting and context; language and communication; responsibilities and privileges; and participants' visions of their future selves. Professional identity formation (PIF) continued to develop in further training, but was inconsistently affirmed by participants' communities of practice. Four major themes characterised training experiences: prescription; managing multiple masters; limiting access to others and community ties; and constantly questioning the value of extra training. Qualified doctors traverse professional paradoxes as they seek further education with no guarantee of employment and provide consultant-level care as 'trainees'. An identity dissonance emerges that may continue until a clear identity is prescribed for them. Although disruptive to these doctors' PIF and personal and professional lives, the long-term effects of additional training are unknown. Its utility and influence on securing employment and future job satisfaction are areas for further research. © 2017 John Wiley & Sons Ltd and The Association for the Study of Medical Education.

  20. The construction of professional identity by physiotherapists: a qualitative study.

    Science.gov (United States)

    Hammond, Ralph; Cross, Vinette; Moore, Ann

    2016-03-01

    The U.K. Frances Report and increasing societal expectations of healthcare have challenged physiotherapists to reconsider professionalism. Physiotherapy has viewed identity as a fixed entity emphasising coherence, continuity and distinctiveness. Socialisation has required the acquisition of a professional identity as one necessary 'asset' for novices. Yet how do physiotherapists come to be the physiotherapists they are? Qualitative study using Collective Memory Work. Eight physiotherapists in South West England met for two hours, once a fortnight, for six months. Seventeen hours of group discussions were recorded and transcribed. Data were managed via the creation of crafted dialogues and analysed using narrative analysis. Participants shared ethical dilemmas: successes and unresolved anxiety about the limits of personal actions in social situations. These included matters of authenticity, role strain, morality, diversity. Participants made claims about their identity; claims made to support an attitude, belief, motivation or value. Professional identity in physiotherapy is more complex than traditionally thought; fluid across time and place, co-constructed within changing communities of practice. An ongoing and dynamic process, physiotherapists make sense and (re)interpret their professional self-concept based on evolving attributes, beliefs, values, and motives. Participants co-constructed the meaning of being a physiotherapist within intra-professional and inter-professional communities of practice. Patients informed this, and it was mediated by workplace and institutional discourses, boundaries and hierarchies, through an unfolding career and the contingencies of a life story. More empirical data are required to understand how physiotherapists negotiate the dilemmas they face and enact the values the profession espouses. Copyright © 2015 Chartered Society of Physiotherapy. Published by Elsevier Ltd. All rights reserved.