WorldWideScience

Sample records for identity management bioid

  1. Biometrics and Identity Management

    DEFF Research Database (Denmark)

    management. BIOID 2008. The papers are categorized in four classes. These classes represent the 4 working groups of the COST Action 2101. For more information, see http://www.cost2101.org/.   Biometric data quality and multimodal biometric templates, Unsupervised interactive interfaces for multimodal...... security and border control scenarios it is now apparent that the widespread availability of biometrics in everyday life will also spin out an ever increasing number of (private) applications in other domains. Crucial to this vision is the management of the user's identity, which does not only imply...... biometrics, Biometric attacks and countermeasures, Standards and privacy issues for biometrics in identity documents and smart cards. BIOID 2008 is an initiative of the COST Action 2101 on Biometrics for Identity Documents and Smart Cards. It is supported by the EU Framework 7 Programme. Other sponsors...

  2. Identity Management

    Data.gov (United States)

    Social Security Administration — Provides information for identity management services on the creation, modification and eventual deletion of accounts and entitlements based on user relationships on...

  3. Identity Management

    CERN Document Server

    Pace, A

    2008-01-01

    This paper introduces identity management concepts and discusses various issues associated with its implementation. It will try to highlight technical, legal, and social aspects that must been foreseen when defining the numerous processes that an identity management infrastructure must support. Grid interoperability as well as cross platform interoperability is addressed on the technical aspect, followed by a short discussion on social consequences on user’s privacy when completed traceability is enforced and some examples on how identity management has been implemented at CERN

  4. Identity management

    Energy Technology Data Exchange (ETDEWEB)

    Pace, A [CERN, Geneva (Switzerland)

    2008-07-01

    This paper introduces identity management concepts and discusses various issues associated with their implementation. It will try to highlight technical, legal, and social aspects that must been foreseen when defining the numerous processes that an identity management infrastructure must support. Grid interoperability as well as cross platform interoperability is addressed on the technical aspect, followed by a short discussion on social consequences on user's privacy when completed traceability is enforced. The paper will finally give some examples on how identity management has been implemented at CERN.

  5. Identity management

    International Nuclear Information System (INIS)

    Pace, A

    2008-01-01

    This paper introduces identity management concepts and discusses various issues associated with their implementation. It will try to highlight technical, legal, and social aspects that must been foreseen when defining the numerous processes that an identity management infrastructure must support. Grid interoperability as well as cross platform interoperability is addressed on the technical aspect, followed by a short discussion on social consequences on user's privacy when completed traceability is enforced. The paper will finally give some examples on how identity management has been implemented at CERN

  6. Federated Identity Management

    OpenAIRE

    Chadwick, David W.

    2009-01-01

    Abstract. This paper addresses the topic of federated identity management. It discusses in detail the following topics: what is digital identity, what is identity management, what is federated identity management, Kim Camerons 7 Laws of Identity, how can we protect the users privacy in a federated environment, levels of assurance, some past and present federated identity management systems, and some current research in FIM.

  7. Mobile Identity Management

    NARCIS (Netherlands)

    Hoepman, J.J.

    2011-01-01

    Identity management consists of the processes and all underlying technologies for the creation, management, and usage of digital identities. Business rely on identity management systems to simplify the management of access rights to their systems and services for both their employees and their

  8. Digital identity management

    CERN Document Server

    Laurent, Maryline

    2015-01-01

    In the past four decades, information technology has altered chains of value production, distribution, and information access at a significant rate. These changes, although they have shaken up numerous economic models, have so far not radically challenged the bases of our society.This book addresses our current progress and viewpoints on digital identity management in different fields (social networks, cloud computing, Internet of Things (IoT)), with input from experts in computer science, law, economics and sociology. Within this multidisciplinary and scientific context, having crossed analys

  9. Identity Management A Primer

    CERN Document Server

    Sharoni, Ilan; Williamson, Graham; Yip, David

    2009-01-01

    In an age in which the boundaries between the real and the virtual are becoming increasingly blurred, this timely guide teaches both the key issues of identity management as well as appropriate strategies and preventative measures for ensuring personal safety in the virtual world. In a corporate setting, it is essential to identify and control the way in which the organization deals with customers, suppliers, employees, and other users who may interact with the information systems of the company. Providing strategies for overcoming this task in real-world terms as well as questions that assist

  10. Identity and the Management Project

    DEFF Research Database (Denmark)

    Jørgensen, Kenneth Mølbjerg; Dehlin, Erlend

    The paper discusses the concept of identity in relation to management. We take our starting point in Wittgenstein’s concept language games. We argue that identity is a question of using linguistic tools to construct reality. Two elements of the language game metaphor are central here: rules...... and family resemblance. As such, managing identity in organizations is closely linked to rules and family resemblance. Organizations manage identity through the definition of norms and values for right or wrong, appropriate or inappropriate, to name but a few. Norms and values are important as reference...... points for constructing identities. Managing identity has become more important because the rules-of-the-game have become more unstable. Managing identity is important if the bonds between individuals and organizations are to be sustained. But this task is contradictory and paradoxical of its very nature...

  11. Identity, Diversity and Diversity Management

    DEFF Research Database (Denmark)

    Holck, Lotte; Muhr, Sara Louise; Villeseche, Florence

    2016-01-01

    – The work can encourage policy makers, diversity and HR managers to question their own practices and assumptions leading to more theoretical informed diversity management practices. Originality/value – The theoretical connections between identity and diversity literature have so far not been reviewed......The purpose of this paper is to examine the relationship between the identity and diversity literatures and discuss how a better understanding of the theoretical connections between the two informs both diversity research and diversity management practices. Design/methodology/approach – Literature...... and limitations – is crucial for successful diversity management research and practice. Research limitations/implications – The authors argue for a better understanding of differences, overlaps and limits of different identity perspectives, and for a stronger engagement with practice. Practical implications...

  12. 6 Keys to Identity Management

    Science.gov (United States)

    Shoham, Idan

    2011-01-01

    An Identity and Access Management (IAM) project on campus can feel like a Sisyphean task: Just when access rights have finally been sorted out, the semester ends--and users change roles, leave campus, or require new processes. IT departments face a constantly changing technical landscape: (1) integrating new applications and retiring old ones; (2)…

  13. Exhausting management work: conflicting identities.

    Science.gov (United States)

    Mischenko, Jane

    2005-01-01

    The primary purpose of this paper is to critically explore managers' experience of work identity in the National Health Service (NHS). This paper is unconventional in that it uses an auto-ethnographic approach and poetry as the empirical data from which the conceptual framework evolves. The concepts of identity, power and self are analysed in relation to the narrative utilising a post-structuralist, critical management lens, particularly drawing from Foucault. The paper reflects and critiques the challenges of undertaking auto-ethnography, not least the publication and exposure of a "vulnerable aspect" of the author but also identifies this as a powerful method to explore how one uses narrative to create meaning and constitute oneself, the challenges of such textual representation and the various ways one adapts, resists and survives the challenge of the "multiphrenic" world. The contribution this paper makes is an "outing" of the dynamics of being a manager in the NHS and an opening of a debate on current management discourse and practice. The further value of this paper is the experimentation of critically evaluating an auto-ethnographic approach to researching management identity work.

  14. integrated identity and integrated identity and access management

    African Journals Online (AJOL)

    eobe

    Management System (T-IAMS) is a fingerprint biometric database that centrally manages students' identity, course a fingerprint ... registration, library and medical services information. .... based application and a web-based application.

  15. Improving Measurement of Workplace Sexual Identity Management

    Science.gov (United States)

    Lance, Teresa S.; Anderson, Mary Z.; Croteau, James M.

    2010-01-01

    The purpose of this study was to advance measurement of sexual identity management for lesbian, gay, and bisexual workers. Psychometric properties of a revised version of the Workplace Sexual Identity Management Measure (WSIMM; Anderson, Croteau, Chung, & DiStefano, 2001) were examined on a sample of 64 predominantly White K-12 teachers.…

  16. Identity management and witness protection system

    OpenAIRE

    Paunović, Saša; Starčević, Dušan; Nešić, Lazar

    2013-01-01

    The protection of participants in criminal proceedings is one of the most important tools for prosecution of war crimes and organized crime cases. The paper presents the basic characteristics and the importance of implementing the Program of protection in criminal proceedings, with emphasis on the protection system and management of identity. Special attention was paid to challenges facing the protection system in criminal proceedings and the management of identities, which are caused by the ...

  17. Building an Identity Management Governance Process

    Science.gov (United States)

    Berg, Joanne E.; Kraemer, Ron; Raatz, Carla; Devoti, Steve

    2009-01-01

    A particular challenge in any campus environment is determining how requests for access to services and resources are managed. Who decides the technology, infrastructure, policy, business process and procedure? The involvement of key institutional leaders and stakeholders in identity management governance is the driving force behind the way the…

  18. Architectural mismatch issues in identity management deployment

    DEFF Research Database (Denmark)

    Andersen, Mads Schaarup

    2010-01-01

    Integrating Commercial Off-The-Shelf products in a company's software product portfolio offers business value, but introduces challenges from a software architecture perspective. In this paper, the research challenges in relation to identity management in the Danish municipality administration...... system called Opus, are outlined. Opus BRS is the identity management part of Opus. Opus integrates SAP, legacy mainframe systems, and other third party systems of the individual municipality. Each of these systems define their own software architecture and access control model, leading to architectural...... mismatch with an impact on security, usability, and maintainability. The research project is discussed and access control and identity provisioning are recognized as the major areas of interest in relation to the mismatch challenges. The project is carried out in close cooperation with KMD, one...

  19. Integrated Identity and Access Management System for Tertiary ...

    African Journals Online (AJOL)

    Nigerian Journal of Technology ... identity management and access control and the unavailability of actionable information on pattern of ... This Tertiary Identity and Access Management System (T-IAMS) is a fingerprint biometric database that ...

  20. Playing It Safe: Identity Management and Single Sign-On

    Science.gov (United States)

    Alawneh, John

    2012-01-01

    Whenever thousands of users need to connect seamlessly to a vast number of online resources, identity management (IDM) becomes a critical capability. Although several products on the market can deliver a robust identity management solution, there is no one-size-fits-all. Identity management requires business processes and a supporting…

  1. Federated Identity Management for Research Collaborations

    CERN Document Server

    Broeder, Daan; Kelsey, David; Kershaw, Philip; Lüders, Stefan; Lyall, Andrew; Nyrönen, Tommi; Wartel, Romain; Weyer, Heinz J

    2012-01-01

    Federated identity management (FIM) is an arrangement that can be made among multiple organisations that lets subscribers use the same identification data to obtain access to the secured resources of all organisations in the group. Identity federation offers economic advantages, as well as convenience, to organisations and their users. For example, multiple institutions can share a single application, with resultant cost savings and consolidation of resources. In order for FIM to be effective, the partners must have a sense of mutual trust. A number of laboratories including national and regional research organizations are facing the challenge of a deluge of scientific data that needs to be accessed by expanding user bases in dynamic collaborations that cross organisational and national boundaries. Driven by these needs, representatives from a variety of research communities, including photon/neutron facilities, social science & humanities, high-energy physics, atmospheric science, bioinformatics and fusi...

  2. Corporate identity: The concept, its measurement and management

    NARCIS (Netherlands)

    C.B.M. van Riel (Cees); J.M.T. Balmer (John)

    1997-01-01

    textabstractArticulates the main trends in the literature on corporate identity; defines corporate identity; explains the rationale for corporate identity management and describes the main methods used to reveal the desired and the actual corporate identity. Particular reference will be made to two

  3. Responses to professional identity threat: Identity management strategies in incident narratives of health care professionals.

    Science.gov (United States)

    van Os, Annemiek; de Gilder, Dick; van Dyck, Cathy; Groenewegen, Peter

    2015-01-01

    The purpose of this paper is to explore sensemaking of incidents by health care professionals through an analysis of the role of professional identity in narratives of incidents. Using insights from social identity theory, the authors argue that incidents may create a threat of professional identity, and that professionals make use of identity management strategies in response to this identity threat. The paper draws on a qualitative analysis of incident narratives in 14 semi-structured interviews with physicians, nurses, and residents at a Dutch specialist hospital. The authors used an existing framework of identity management strategies to categorize the narratives. The analysis yielded two main results. First, nurses and residents employed multiple types of identity management strategies simultaneously, which points to the possible benefit of combining different strategies. Second, physicians used the strategy of patronization of other professional groups, a specific form of downward comparison. The authors discuss the implications of the findings in terms of the impact of identity management strategies on the perpetuation of hierarchical differences in health care. The authors argue that efforts to manage incident handling may profit from considering social identity processes in sensemaking of incidents. This is the first study that systematically explores how health care professionals use identity management strategies to maintain a positive professional identity in the face of incidents. This study contributes to research on interdisciplinary cooperation in health care.

  4. Identity And Access Management e Federazione

    Directory of Open Access Journals (Sweden)

    Virginia Calabritto

    2012-07-01

    Full Text Available ItLa rete telematica è in costante crescita e così i servizi online che, in modo sempre più penetrante, rappresentano un aspetto della nostra quotidianità. I servizi in rete si distinguono in servizi ad accesso libero e servizi ad accesso controllato. Ogni giorno studenti, ricercatori e docenti accedono a contenuti e servizi (risorse ad accesso controllato con modalità diverse, la più diffusa è l'utilizzo dell‘informazione utenza/password, informazione diversa per ciascuna risorsa. Da questo punto di vista l’ampia disponibilità di risorse in rete crea all’utente, ma non solo a lui, diversi problemi, non ultimo quello della memorizzazione di un numero sempre più ampio di coppie utenza/password.L’articolo è teso ad illustrare, nel dettaglio, scenario e problematiche per passare quindi ad accennare alle tecnologie che possono costituire una soluzione, ovvero, l'Identity Management, il Single Sign On e le federazioni di infrastrutture di autenticazione e autorizzazione e, quindi, a degli esempi tra cui IDEM, la prima federazione italiana di Infrastrutture di Autenticazione e Autorizzazione, che coinvolge gli enti della comunità scientifica ed accademica e i fornitori di servizi.EnThe Internet is constantly growing, therefore on-line services, are becoming part of our daily life in a more and more pervasive manner. The network services are divided into two types of access: free access and controlled access. Every day students, researchers and teachers access content and services (resources through controlled access using different modes, e.g using user / password information which is different for each resource. From this perspective, the large availability of networked resources generates many problems for the users, last but not least the inconvenience of storing an increasing number of user / password.The article aims to illustrate, in detail, the context and the problems related to the management of a digital identiy in the

  5. Corporate visual identity management: current practices, impact, and assessment

    NARCIS (Netherlands)

    van den Bosch, A.L.M.

    2005-01-01

    This dissertation is about Corporate Visual Identity (CVI) management. Its purpose is to gain more insight into activities associated with managing CVI and the impact of these activities on the outcome: the degree of consistency in CVI.

  6. The Identity Crisis. Security, Privacy and Usability Issues in Identity Management

    NARCIS (Netherlands)

    Alpár, G.; Hoepman, J.H.; Siljee, B.I.J.

    2011-01-01

    This paper studies the current "identity crisis" caused by the substantial security, privacy and usability shortcomings encountered in existing systems for identity management. Some of these issues are well known, while others are much less understood. This paper brings them together in a single,

  7. Organizational Identity and Culture in the Context of Managed Change

    DEFF Research Database (Denmark)

    Hatch, Mary Jo; Schultz, Majken; Skov, Anne-Marie

    2015-01-01

    their organization’s identity led middle managers and employees both to support and resist new organizational identity claims made by top management. Within these identity activation processes we found frequent references relating new identity claims to organizational culture. Further analysis of the data revealed......This article presents top and middle managers’ experiences and understandings of how organizational identity and culture were entangled with transformational change as it unfolded over a 5-year period in Carlsberg Group. Combining ethnography and grounded theory methods with engaged scholarship......, our work sits between research and practice, speaking directly to the experience of managers at the same time that it researches both the content and processes of organizational identity and culture. The study shows that engaging in processes of reflecting, questioning, and debating about...

  8. ISLAM AND MINORITIES: Managing Identity in Malaysia

    Directory of Open Access Journals (Sweden)

    Ahmad Suaedy

    2010-02-01

    Full Text Available The Malaysian general election in March 2008 raised an interesting and new phenomenon. For the first time since independence in 1957, the ruling alliance known as the National Front (Barisan Nasional, BN failed to secure two thirds of seats in parliament and lost control of five of Malaysia’s 13 states. This was due to the challenge presented by the new opposition alliance known as the Alternative Front (Barisan Alternatif, BA or the People’s Alliance (Pakatan Rakyat, PK which won more than 36% of seats in parliament and gained control of the five states. In the 2004 election, BN secured the largest ever percentage of seats in parliament with 91%. What is interesting is that it seems that this significant increase in support for the opposition is  due to their offer to change the way minorities and ethnicity is managed. They  propose a move from “Bumiputera Supremacy”, or affirmative action for the approximately 65% of “Bumiputera” Malaysians (the rest being largely of Chinese or Indian ethnicity, to “The People’s Supremacy”, which involves eradicating affirmative action based on ethnicity, basing it instead on need, for  instance need due to poverty. This would potentially increase the likelihood  of justice and equality for all ethnic or racial groups. This paper connects the phenomenon of change, as seen in the about turn in the results between the  2004 and 2008 elections, to the more global trend in which minorities are standing up to demand their rights in this era of globalization, and to the challenge multiculturalism presents to parts of the Muslim world such as Malaysia. Malaysia, a Muslim majority nation that has formally declared Islam the official state religion with Yang di-Pertuan Agong (the King as  Head of the State and symbol of Islam, is one example, though not necessarily  representative, of how Islam and Muslims manage minorities and identity or  multiculturalism within the process of globalization

  9. Identity and Access Management and Security in Higher Education.

    Science.gov (United States)

    Bruhn, Mark; Gettes, Michael; West, Ann

    2003-01-01

    Discusses the drivers for an identity management system (IdM), components of this system, and its role within a school security strategy, focusing on: basic access management; requirements for access management; middleware support for an access management system; IdM implementation considerations (e.g., access eligibilities, authentication…

  10. Professional identity and role transitions in clinical managers.

    Science.gov (United States)

    Spehar, Ivan; Frich, Jan C; Kjekshus, Lars Erik

    2015-01-01

    The purpose of this paper is to investigate how clinicians' professional background influences their transition into the managerial role and identity as clinical managers. The authors interviewed and observed 30 clinicians in managerial positions in Norwegian hospitals. A central finding was that doctors experienced difficulties in reconciling the role as health professional with the role as manager. They maintained a health professional identity and reported to find meaning and satisfaction from clinical work. Doctors also emphasized clinical work as a way of gaining legitimacy and respect from medical colleagues. Nurses recounted a faster and more positive transition into the manager role, and were more fully engaged in the managerial aspects of the role. The authors advance that health care organizations need to focus on role, identity and need satisfaction when recruiting and developing clinicians to become clinical managers. The study suggests that the inclusion of aspects from identity and need satisfaction literature expands on and enriches the study of clinical managers.

  11. Managing corporate identity: an integrative framework of dimensions and determinants

    NARCIS (Netherlands)

    Cornelissen, Joep; Elving, Wim

    2003-01-01

    Although there has been an enduring interest in corporate identity and image management, there is relatively little systematic empirical research on the topic. Large due to the diffuse interpretations, and dubious denotation that have characterized the subject of corporate identity so far, the

  12. The Formation of Professional Identity in French "Apprenti" Managers

    Science.gov (United States)

    Angot, Jacques; Malloch, Hedley; Kleymann, Birgit

    2008-01-01

    Purpose: The paper aims to show how professional identity is constructed at a very early stage of initial management education. In so doing, it questions the notion of "le metier" in management. Design/methodology/approach: The paper is based on a study of the experiences of six French management apprentices (or apprentis) who…

  13. Strategies for managing impressions of racial identity in the workplace.

    Science.gov (United States)

    Roberts, Laura Morgan; Cha, Sandra E; Kim, Sung Soo

    2014-10-01

    This article deepens understanding of the workplace experiences of racial minorities by investigating racial identity-based impression management (RIM) by Asian American journalists. Racial centrality, directly or indirectly, predicted the use of 4 RIM strategies (avoidance, enhancement, affiliation, and racial humor). Professional centrality also predicted strategy use, which was related to life satisfaction and perceived career success. By shedding light on proactive strategies that individuals use to influence colleagues' impressions of their racial identity, we contribute to research on diversity in organizations, impression management, and racial identity. (PsycINFO Database Record (c) 2014 APA, all rights reserved).

  14. Strengthen Cloud Computing Security with Federal Identity Management Using Hierarchical Identity-Based Cryptography

    Science.gov (United States)

    Yan, Liang; Rong, Chunming; Zhao, Gansen

    More and more companies begin to provide different kinds of cloud computing services for Internet users at the same time these services also bring some security problems. Currently the majority of cloud computing systems provide digital identity for users to access their services, this will bring some inconvenience for a hybrid cloud that includes multiple private clouds and/or public clouds. Today most cloud computing system use asymmetric and traditional public key cryptography to provide data security and mutual authentication. Identity-based cryptography has some attraction characteristics that seem to fit well the requirements of cloud computing. In this paper, by adopting federated identity management together with hierarchical identity-based cryptography (HIBC), not only the key distribution but also the mutual authentication can be simplified in the cloud.

  15. A Contextual Model for Identity Management (IdM) Interfaces

    Science.gov (United States)

    Fuller, Nathaniel J.

    2014-01-01

    The usability of Identity Management (IdM) systems is highly dependent upon design that simplifies the processes of identification, authentication, and authorization. Recent findings reveal two critical problems that degrade IdM usability: (1) unfeasible techniques for managing various digital identifiers, and (2) ambiguous security interfaces.…

  16. Research Management in Portugal: A Quest for Professional Identity

    Science.gov (United States)

    Trindade, Margarida; Agostinho, Marta

    2014-01-01

    Research managers at science-intensive institutions appear as a continuously evolving group of professionals whose identity is somewhat fragmented, even to themselves. In Portugal, specialized research manager roles have rapidly emerged over the last years alongside the development of a small but consolidated scientific system. In order to get an…

  17. Dialogue, Language and Identity: Critical Issues for Networked Management Learning

    Science.gov (United States)

    Ferreday, Debra; Hodgson, Vivien; Jones, Chris

    2006-01-01

    This paper draws on the work of Mikhail Bakhtin and Norman Fairclough to show how dialogue is central to the construction of identity in networked management learning. The paper is based on a case study of a networked management learning course in higher education and attempts to illustrate how participants negotiate issues of difference,…

  18. A Federated Digital Identity Management Approach for Business Processes

    Science.gov (United States)

    Bertino, Elisa; Ferrini, Rodolfo; Musci, Andrea; Paci, Federica; Steuer, Kevin J.

    Business processes have gained a lot of attention because of the pressing need for integrating existing resources and services to better fulfill customer needs. A key feature of business processes is that they are built from composable services, referred to as component services, that may belong to different domains. In such a context, flexible multi-domain identity management solutions are crucial for increased security and user-convenience. In particular, it is important that during the execution of a business process the component services be able to verify the identity of the client to check that it has the required permissions for accessing the services. To address the problem of multi-domain identity management, we propose a multi-factor identity attribute verification protocol for business processes that assures clients privacy and handles naming heterogeneity.

  19. CILogon: An Integrated Identity and Access Management Platform for Science

    Science.gov (United States)

    Basney, J.

    2016-12-01

    When scientists work together, they use web sites and other software to share their ideas and data. To ensure the integrity of their work, these systems require the scientists to log in and verify that they are part of the team working on a particular science problem. Too often, the identity and access verification process is a stumbling block for the scientists. Scientific research projects are forced to invest time and effort into developing and supporting Identity and Access Management (IAM) services, distracting them from the core goals of their research collaboration. CILogon provides an IAM platform that enables scientists to work together to meet their IAM needs more effectively so they can allocate more time and effort to their core mission of scientific research. The CILogon platform enables federated identity management and collaborative organization management. Federated identity management enables researchers to use their home organization identities to access cyberinfrastructure, rather than requiring yet another username and password to log on. Collaborative organization management enables research projects to define user groups for authorization to collaboration platforms (e.g., wikis, mailing lists, and domain applications). CILogon's IAM platform serves the unique needs of research collaborations, namely the need to dynamically form collaboration groups across organizations and countries, sharing access to data, instruments, compute clusters, and other resources to enable scientific discovery. CILogon provides a software-as-a-service platform to ease integration with cyberinfrastructure, while making all software components publicly available under open source licenses to enable re-use. Figure 1 illustrates the components and interfaces of this platform. CILogon has been operational since 2010 and has been used by over 7,000 researchers from more than 170 identity providers to access cyberinfrastructure including Globus, LIGO, Open Science Grid

  20. Leadership as social identity management: Introducing the Identity Leadership Inventory (ILI) to assess and validate a four-dimensional model

    OpenAIRE

    Steffens, Niklas K.; Haslam, S. Alexander; Reicher, Stephen D.; Platow, Michael J.; Fransen, Katrien; Yang, Jie; Ryan, Michelle K.; Jetten, Jolanda; Peters, Kim O.; Boen, Filip

    2014-01-01

    Although nearly two decades of research has provided support for the social identity approach to leadership, most previous work has focused on leaders’ identity prototypicality while neglecting the assessment of other equally important dimensions of social identity management. However, recent theoretical developments have argued that in order to mobilize and direct followers’ energies, leaders need not only to ‘be one of us’ (identity prototypicality), but also to ‘do it for us’ (identity adv...

  1. Identity Management Framework for Internet of Things

    DEFF Research Database (Denmark)

    Mahalle, Parikshit N.

    -configuring capability and is termed as Internet of Things (IoT). The vision of IoT is to connect every object with computing, communication and sensing ability to the Internet. IoT contains varied range of devices from RFID tags, sensor nodes to the even shoes. Thus, IoT enable nomadic collaboration and communication...... between users and devices, between devices themselves and devices to services. Due to rapid technological advancements in the wireless communications, information coming from uncountable applications and services converged on user devices, communication infrastructure and the Internet are integral part...... that are public can be part of the personal space of multiple users at the same time. Secure interaction in and with IoT, secure data management and exchange, authentication, distributed access control and IdM of the devices are the main challenges. The work carried out in the scope of this thesis addresses...

  2. Integrating Identity Management With Federated Healthcare Data Models

    Science.gov (United States)

    Hu, Jun; Peyton, Liam

    In order to manage performance and provide integrated services, health care data needs to be linked and aggregated across data sources from different organizations. The Internet and secure B2B networks offer the possibility of providing near real-time integration. However, there are three major stumbling blocks. One is to standardize and agree upon a common data model across organizations. The second is to match identities between different locations in order to link and aggregate records. The third is to protect identity and ensure compliance with privacy laws. In this paper, we analyze three main approaches to the problem and use a healthcare scenario to illustrate how each one addresses different aspects of the problem while failing to address others. We then present a systematic framework in which the different approaches can be flexibly combined for a more comprehensive approach to integrate identity management with federated healthcare data models.

  3. Identity Management Mismatch Challenges in the Danish Municipality Administration System

    DEFF Research Database (Denmark)

    Andersen, Mads Schaarup; Christensen, Henrik Bærbak

    2010-01-01

    Integrating a COTS product in a company’s product portfolio is appealing from a business perspective but highly challenging from the perspective of the software architecture. In this paper we outline research challenges regarding authorization in the identity management part of the Danish...

  4. Identity Management and Trust Services: Foundations for Cloud Computing

    Science.gov (United States)

    Suess, Jack; Morooney, Kevin

    2009-01-01

    Increasingly, IT organizations will move from providing IT services locally to becoming an integrator of IT services--some provided locally and others provided outside the institution. As a result, institutions must immediately begin to plan for shared services and must understand the essential role that identity management and trust services play…

  5. Qualitative Study on the Identity of the Manager in Romania

    Directory of Open Access Journals (Sweden)

    FLORENTINA SCÂRNECI

    2011-01-01

    Full Text Available The article presents the results of a qualitative research project carried out in 2008, which aimed at identifying the identity condition of managers in Romania. The article presents part of the grounded theory on the identity of managers: the day to day circumstances in which they live - issues related to childhood and maturity (material situation, relationships, family, etc.. Also, it describes in brief the methodology applied: qualitative collection of data, theoretical sampling, theoretical saturation and the analysis of qualitative data obtained.The article presents, also in brief, the larger research framework wherefrom the presented part was extracted. The conclusion is that there are life-related issues specific to managers (and, more precisely, specific reactions to the environment and that their identification can form the basis for designing methods of managerial diagnosis and prognosis.

  6. Biometric identity management for standard mobile medical networks.

    Science.gov (United States)

    Egner, Alexandru; Soceanu, Alexandru; Moldoveanu, Florica

    2012-01-01

    The explosion of healthcare costs over the last decade has prompted the ICT industry to respond with solutions for reducing costs while improving healthcare quality. The ISO/IEEE 11073 family of standards recently released is the first step towards interoperability of mobile medical devices used in patient environments. The standards do not, however, tackle security problems, such as identity management, or the secure exchange of medical data. This paper proposes an enhancement of the ISO/IEEE 11073-20601 protocol with an identity management system based on biometry. The paper describes a novel biometric-based authentication process, together with the biometric key generation algorithm. The proposed extension of the ISO/IEEE 11073-20601 is also presented.

  7. A Reputation-Based Identity Management Model for Cloud Computing

    Directory of Open Access Journals (Sweden)

    Lifa Wu

    2015-01-01

    Full Text Available In the field of cloud computing, most research on identity management has concentrated on protecting user data. However, users typically leave a trail when they access cloud services, and the resulting user traceability can potentially lead to the leakage of sensitive user information. Meanwhile, malicious users can do harm to cloud providers through the use of pseudonyms. To solve these problems, we introduce a reputation mechanism and design a reputation-based identity management model for cloud computing. In the model, pseudonyms are generated based on a reputation signature so as to guarantee the untraceability of pseudonyms, and a mechanism that calculates user reputation is proposed, which helps cloud service providers to identify malicious users. Analysis verifies that the model can ensure that users access cloud services anonymously and that cloud providers assess the credibility of users effectively without violating user privacy.

  8. Patient privacy, consent, and identity management in health information exchange

    CERN Document Server

    Hosek, Susan D

    2013-01-01

    As a step toward improving its health information technology (IT) interoperability, the Military Health System is seeking to develop a research roadmap to better coordinate health IT research efforts, address IT capability gaps, and reduce programmatic risk for its enterprise projects. This report identifies gaps in research, policy, and practice involving patient privacy, consent, and identity management that need to be addressed to improve the quality and efficiency of care through health information exchange.

  9. Identity and access management business performance through connected intelligence

    CERN Document Server

    Osmanoglu, Ertem

    2013-01-01

    Identity and Access Management: Controlling Your Network provides you with a practical, in-depth walkthrough of how to plan, assess, design, and deploy IAM solutions. This book breaks down IAM into manageable components to ease systemwide implementation. The hands-on, end-to-end approach includes a proven step-by-step method for deploying IAM that has been used successfully in over 200 deployments. The book also provides reusable templates and source code examples in Java, XML, and SPML.Focuses on real-word implementations Provides end-to-end coverage of IAM from business drivers, requirements

  10. Management challenges in a case of gender identity disorder

    Directory of Open Access Journals (Sweden)

    Anubhav Rathi

    2014-01-01

    Full Text Available Gender identity disorder (GID is a complex disorder and can be defined as a group of disorders whose common feature is a strong and persistent preference for living as a person of the other sex. It is associated with significant impairment in social, occupational, interpersonal, and other areas of functioning. We describe the case of an adolescent, biologically male who was brought to our outpatient department primarily with symptoms of adjustment disorder with GID and the management provided. The role of a psychiatrist in the management, ethical and legal issues involved is also discussed.

  11. Developing an Assessment of Sexual Identity Management for Lesbian and Gay Workers.

    Science.gov (United States)

    Anderson, Mary Z.; Croteau, James M.; DiStefano, Teresa M.; Chung, Y. Barry

    2001-01-01

    Psychometric properties of the Workplace Sexual Identity Management Measure were tested with 172 professionals. Results suggest it successfully assesses a continuum of lesbian and gay identity management strategies (passing, covering, implicitly out, explicitly out). (Contains 27 references.) (SK)

  12. Working to reduce the effects of discrimination: Identity management strategies in organizations.

    Science.gov (United States)

    Shih, Margaret; Young, Maia J; Bucher, Amy

    2013-04-01

    Despite efforts to dispel discrimination, workplace discrimination still occurs. We introduce two classes of identity management strategies individuals use to mitigate the negative consequences of discrimination: identity switching (i.e., deemphasizing target identities and recategorizing to a more positively valued identity) and identity redefinition (i.e., stereotype reassociation and regeneration). Organizations adopting a color-blind approach may make it more difficult for individuals to use identity switching because the policies deemphasize differences in social identities. In contrast, organizations adopting a multicultural approach may make it more difficult for individuals to use identity redefinition. Multicultural approaches, applied superficially, may celebrate group differences that might actually reinforce culturally dominant stereotypes. We explore the likelihood that individuals will adopt each strategy given these organizational approaches to diversity. We outline steps organizations can take to reduce the need for identity management strategies and to facilitate identity management when necessary.

  13. OAuth 2.0 identity and access management patterns

    CERN Document Server

    Spasovski, Martin

    2013-01-01

    This is a practical and fast-paced guide that gives you all the information you need to start implementing secure OAuth 2.0 implementations in your web applications.OAuth 2.0 Identity and Access Management Patterns is intended for software developers, software architects, and enthusiasts working with the OAuth 2.0 framework.In order to learn and understand the OAuth 2.0 grant flow, it is assumed that you have some basic knowledge of HTTP communication. For the practical examples, basic knowledge of HTML templating, programming languages, and executing commands in the command line terminal is a

  14. Enterprise identity management towards an investment decision support approach

    CERN Document Server

    Royer, Denis

    2013-01-01

    ?The introduction of Enterprise Identity Management Systems (EIdMS) in organizations even beyond the purely technological level is a costly and challenging endeavor. However, for decision makers it seems difficult to fully understand the impacts and opportunities arising from the introduction of EIdMS. This book explores the relevant aspects for an ex-ante evaluation of EIdMS. Therefore it examines this domain by employing a qualitative expert interview study to better understand the nature of EIdMS, as they are situated between security and productive IT systems. To this regard, the focus is

  15. Analysis of Privacy-Enhancing Identity Management Systems

    DEFF Research Database (Denmark)

    Adjei, Joseph K.; Olesen, Henning

    Privacy has become a major issue for policy makers. This has been impelled by the rapid development of technologies that facilitate collection, distribution, storage, and manipulation of personal information. Business organizations are finding new ways of leveraging the value derived from consumer...... is an attempt to understand the relationship between individuals’ intentions to disclose personal information, their actual personal information disclosure behaviours, and how these can be leveraged to develop privacy-enhancing identity management systems (IDMS) that users can trust. Legal, regulatory...... and technological aspects of privacy and technology adoption are also discussed....

  16. Working to Reduce the Effects of Discrimination: Identity Management Strategies in Organizations

    Science.gov (United States)

    Shih, Margaret; Young, Maia J.; Bucher, Amy

    2013-01-01

    Despite efforts to dispel discrimination, workplace discrimination still occurs. We introduce two classes of identity management strategies individuals use to mitigate the negative consequences of discrimination: identity switching (i.e., deemphasizing target identities and recategorizing to a more positively valued identity) and identity…

  17. Role-meanings as a critical factor in understanding doctor managers' identity work and different role identities.

    Science.gov (United States)

    Cascón-Pereira, Rosalía; Chillas, Shiona; Hallier, Jerry

    2016-12-01

    This study examines "identity work" among hybrid doctor-managers (DMs) in the Spanish National Health System to make sense of their managerial roles. In particular, the meanings underlying DMs experience of their hybrid role are investigated using a Grounded Theory methodology, exposing distinctions in role-meanings. Our findings provide evidence that using different social sources of comparison (senior managers or clinicians) to construct the meaning of managerial roles leads to different role-meanings and role identities, which are the source of the two established types of DM in the literature, the reluctant and the enthusiast. The contribution is twofold: our findings lead us to theorize DMs' identity work processes by adding an overlooked role-meaning dimension to identity work; and raise practical reflections for those who wish to develop enthusiast doctor managers. Copyright © 2016 Elsevier Ltd. All rights reserved.

  18. Single Thing Sign On Identity Management for Internet of Things

    DEFF Research Database (Denmark)

    Zdravkova, Vanya; Mihaylov, Mihail Rumenov; Mihovska, Albena Dimitrova

    2016-01-01

    —Within the context of heterogeneous Internet of Things (IoT) network driven by Machine-to-Machine (M2M) communications there is a need for a proper user identification and Identity Management (IdM) mechanisms which to involve all of the objects in the IoT. The paper addresses user identification...... by proposing Single Thing Sign On (STSO) IdM architecture for IoT, where the end-user is in the middle of a user-centered services ecosystem. The proposed scheme enables user recognition and services access only by identification of one of the “things” related to the user such as personal computing devices...

  19. [Meanings attributed to management as an explanation for clinician managers' attitudes and professional identity].

    Science.gov (United States)

    Cascón-Pereira, Rosalía; Valverde, Mireia

    2014-01-01

    To understand the process by which clinician managers construct their professional identities and develop their attitudes toward managing. A qualitative study was performed, based on grounded theory, through in-depth interviews with 20 clinician managers selected through theoretical sampling in two public hospitals of Catalonia (Spain), participant observation, and documentation. Clinician managers' role meanings are constructed by comparing their roles with those of senior managers and clinicians. In this process, clinician managers seek to differentiate themselves from senior managers through the meanings constructed. In particular, they use proximity with reality and clinical knowledge as the main sources of differentiation. This study sheds light on why clinician managers develop adverse attitudes to managing and why they define themselves as clinicians rather than as managers. The explanation lies in the construction of the meanings they assign to managing as the basis of their attitudes to this role and professional identity. These findings have some practical implications for healthcare management. Copyright © 2014. Published by Elsevier Espana.

  20. Identity management for e-government Libya as a case study

    DEFF Research Database (Denmark)

    Elaswad, Othoman; Jensen, Christian D.

    2016-01-01

    Governments are strengthening their identity (ID) management strategies to deliver new and improved online services to their citizens. Such online services typically include applications for different types of permissions, requests for different types of official documents and management...... of different types of entitlements. The ID management scheme must therefore be able to correctly authenticate citizens and link online presence to real world identities....

  1. Open source identity management patterns and practices using OpenAM 10.x

    CERN Document Server

    Kenning, Waylon

    2013-01-01

    This is a Packt Mini in a tutorial format that provides multiple examples on Identity Management using OpenAM 10.x.Open Source Identity Management Patterns and Practices Using OpenAM 10.x is great for developers and architects who are new to Identity Management, and who want a brief overview of what's possible and how to quickly implement a prototype. It's assumed that you've had experience with web applications and some knowledge of Apache and Tomcat.

  2. Sensor management for identity fusion on a mobile robot

    DEFF Research Database (Denmark)

    Larsen, Thomas Dall; Andersen, Nils Axel; Ravn, Ole

    1998-01-01

    This paper addresses the problem of identity fusion, i.e. the problem of selecting one of several identity hypotheses concerning an observed object. Two problems are considered. Firstly the problem of preserving the information in the representation and fusion of measurements relating to identity...

  3. The importance of corporate brand identity in business management: An application to the UK banking sector

    Directory of Open Access Journals (Sweden)

    Isabel Buil

    2016-01-01

    Full Text Available Corporate brand identity management is a key issue for any organisation. Accordingly, its study is a research field of great interest. This paper seeks to broaden the understanding of this strategic activity and its effects. Specifically, it investigates the concept of corporate brand identity from the employees’ perspective in the UK financial banking sector and analyses the link between brand identity management and employees’ attitudes and behaviours. Results indicate that organisations should pay special attention to the corporate brand identity management, given its influence on employees’ commitment with their organisations, as well as their brand performance and satisfaction.

  4. Walking the tightrope: Constructing gender and professional identities in account management

    NARCIS (Netherlands)

    Gremmen, C.C.M.; Benschop, Y.W.M.

    2009-01-01

    This paper contributes to the growing stream of organization research that explores the relationship between professional identities and gender. Our central question pertains to how account managers ‘do gender’ in constructing their professional identities. While account management has been

  5. Conversations outside the Comfort Zone: Identity Formation in SME Manager Action Learning

    Science.gov (United States)

    Anderson, Lisa; Gold, Jeff

    2009-01-01

    In this paper we consider the construction of narrative identity and particularly how managers of small businesses may construct new narrative identities within the activity of the action learning situation. We build on recent work to suggest that the "world" of managers can be explored through a consideration of Vygotsky's socio-cultural theory…

  6. Object Classification based Context Management for Identity Management in Internet of Things

    DEFF Research Database (Denmark)

    Mahalle, Parikshit N.; Prasad, Neeli R.; Prasad, Ramjee

    2013-01-01

    As computing technology is becoming more tightly coupled into dynamic and mobile world of the Internet of Things (IoT), security mechanism is more stringent, flexible and less intrusive. Scalability issue in IoT makes identity management (IdM) of ubiquitous objects more challenging, and there is ......As computing technology is becoming more tightly coupled into dynamic and mobile world of the Internet of Things (IoT), security mechanism is more stringent, flexible and less intrusive. Scalability issue in IoT makes identity management (IdM) of ubiquitous objects more challenging......, and there is a need of context-aware access control solution for IdM. Confronting uncertainty of different types of objects in IoT is not easy. This paper presents the logical framework for object classification in context aware IoT, as richer contextual information creates an impact on the access control. This paper...

  7. A Case for Implementation of Citizen Centric National Identity Management Systems

    DEFF Research Database (Denmark)

    Adjei, Joseph K.

    of trust in transacting parties. Policy makers are therefore trying to implement identity policies to prevent identity abuses, promote the seamless flow of business transactions, and provide citizens the ability to exercise informational self-determination. Previously, the design of identity management...... and exposure, and a high level of literacy. But in developing countries infrastructural challenges, low literacy level, and physical verification of credentials hamper the effective use of identity management systems. This PhD study adapts the DeLone and McLean model of information systems success to the case...

  8. Personae of interest - managers' identities and the online mirror

    NARCIS (Netherlands)

    Ranzini, G; Fieseler, C.

    2013-01-01

    Purpose - In this chapter we discuss the implications social media have for the selfrepresentation and identity formulation of professionals within organizations. Under the assumption that new, technology-mediated networking possibilities call for a reformulation of the boundaries between the

  9. Identity Management ToolKit (IdM TK)

    Data.gov (United States)

    Department of Veterans Affairs — With the IdM TK, authorized users can search and view identity and exception information from the Administrative Data Repository (ADR). Specifically, users can view...

  10. Managing corporate visual identity : exploring the differences between manufacturing and service, and profit-making and nonprofit organizations

    NARCIS (Netherlands)

    van den Bosch, Annette; de Jong, Menno; Elving, Wim

    2006-01-01

    Corporate Visual Identity (CVI) is a crucial part of the identity of any organization. Most research on managing corporate identity deals with the strategic development of corporate identity and the design and effects of specific elements of the CVI. This study focuses on an aspect of CVI management

  11. Social and psychological creativity in gay male midlife identity management.

    Science.gov (United States)

    Hajek, Christopher

    2016-06-01

    This study utilizes a qualitative thematic analysis methodology and a social identity theory framework to explore ways in which early midlife gay men report enhancing their social identities through social and psychological creativity. Face-to-face, semi-structured interviews were conducted with forty early midlife gay men (aged 40-53) in four US cities. Men discussed the collective and individual essences of their age and gay identities, including attitudes, beliefs, and behaviours that they embraced to self-enhance at midlife. These discussions emphasized differences from the younger gay outgroup, often in the context of intergenerational interaction. Identified were three strategies (and seven substrategies) that summarized the ways that interviewees constructed their identities in the interest of self-enhancement, specifically in the context of intergenerational comparisons with younger gay men. These strategies may be considered as extensions to social creativity strategies presented in Tajfel and Turner's (Psychology of intergroup relations. Chicago, IL: Nelson, 1986: 7) social identity theory. © 2015 The British Psychological Society.

  12. The role of the collaboratory in enabling large-scale identity management for HEP

    International Nuclear Information System (INIS)

    Cowles, Robert; Jackson, Craig; Welch, Von

    2014-01-01

    The authors are defining a model that describes and guides existing and future scientific collaboratory identity management implementations. Our ultimate goal is to provide guidance to virtual organizations and resource providers in designing an identity management implementation. Our model is captured in previously published work. Here, we substantially extend our analysis in terms of six motivation factors (user isolation, persistence of user data, complexity of virtual organization roles, cultural and historical inertia, scaling, and incentive for collaboration), observed in interviews with community members involved in identity management, that impact implementation decisions. This analysis is a significant step towards our ultimate goal of providing guidance to virtual organizations.

  13. The Effects of Virtual Communities on Group Identity in Classroom Management

    Science.gov (United States)

    Ho, Tu-Kuang; Lin, Yu-Tzeng

    2016-01-01

    Group identity is a critical component in developing effective classroom management. While there have been numerous studies on group identity, they have primarily focused on its effects on the physical classroom entity. Advances in information technology, however, have enabled the creation of virtual communities, which have become a vital channel…

  14. Managing Digital Identity on Twitter: The Case of School Administrators

    Science.gov (United States)

    Cho, Vincent; Jimerson, Jo Beth

    2017-01-01

    What does it mean to be and to act like a school leader online? Although many school leaders might be comfortable navigating issues of identity in face-to-face environments, online environments may present new and unprecedented challenges. These challenges may range from concerns about privacy and surveillance to questions about how best to…

  15. Forest management in a Pukhtun community : the Constructions of Identities

    NARCIS (Netherlands)

    Southwold-Llewellyn, S.

    2006-01-01

    Description: How do we recognize and understand the interactions between nature, nationness, and nationalism? How is nature appropriated by politics when asserting identity, interests, and rights? Drawing from South Asia¿s varying regions, the essays in this pathbreaking volume answer such

  16. Report: Improvements Needed in CSB’s Identity and Access Management and Incident Response Security Functions

    Science.gov (United States)

    Report #18-P-0030, October 30, 2017. Weaknesses in the Identity and Access Management and Incident Response metric domains leave the CSB vulnerable to attacks occurring and not being detected in a timely manner.

  17. Covering your face on Facebook.Managing identity through untagging and deletion

    OpenAIRE

    Strano, Michele; Wattei, Jill

    2010-01-01

    This paper describes the ways in which Facebook users manage their online identities through untagging and deleting photos to make sure images are interpreted in a desirable way. Using data collected from an online survey and thirty in-depth interviews with American adult Facebook users, the authors argue that identity management can best be understood as the combination of constructive and destructive practices through which users control not only their self-presentation (p...

  18. Identity Management and Mental Health Discourse in Social Media.

    Science.gov (United States)

    Pavalanathan, Umashanthi; De Choudhury, Munmun

    2015-05-01

    Social media is increasingly being adopted in health discourse. We examine the role played by identity in supporting discourse on socially stigmatized conditions. Specifically, we focus on mental health communities on reddit. We investigate the characteristics of mental health discourse manifested through reddit's characteristic 'throwaway' accounts, which are used as proxies of anonymity. For the purpose, we propose affective, cognitive, social, and linguistic style measures, drawing from literature in psychology. We observe that mental health discourse from throwaways is considerably disinhibiting and exhibits increased negativity, cognitive bias and self-attentional focus, and lowered self-esteem. Throwaways also seem to be six times more prevalent as an identity choice on mental health forums, compared to other reddit communities. We discuss the implications of our work in guiding mental health interventions, and in the design of online communities that can better cater to the needs of vulnerable populations. We conclude with thoughts on the role of identity manifestation on social media in behavioral therapy.

  19. Identity's identities

    DEFF Research Database (Denmark)

    Jensen, Kim Ebensgaard

    -specialized language in which it also serves a number of functions – some of which are quite fundamental to society as such. In other words, the lexeme identity is a polysemic word and has multiple, well, identities. Given that it appears to have a number of functions in a variety of registers, including terminologies...... in Academic English and more everyday-based English, identity as a lexeme is definitely worth having a look at. This paper presents a lexicological study of identity in which some of its senses are identified and their behaviors in actual discourse are observed. Drawing on data from the 2011 section...... of the Corpus of Contemporary American English, a behavioral profile of the distributional characteristics of identity is set up. Behavioral profiling is a lexicographical method developed by the corpus linguist Stefan Th. Gries which, by applying semantic ID tagging and statistical analysis, provides a fine...

  20. "Managing by Not Managing": How Gay Engineering Students Manage Sexual Orientation Identity

    Science.gov (United States)

    Hughes, Bryce E.

    2017-01-01

    From a social constructivist paradigm I explored the experiences of 7 openly gay engineering students to understand how, if at all, they made sense of the intersections between their engineering and sexual orientation identities. By eliciting stories through individual and focus group interviews, a narrative approach allowed me to capture the…

  1. VET Manager Identities: Culture, Philosophy and Professional Practice

    Science.gov (United States)

    Foley, Annette

    2011-01-01

    Using a post-structural approach this article investigates the working lives of frontline managers in VET and how they negotiate change in their day to day practices and decision making. The article is organised around accounts made by managers from different types of Vocational Education and Training (VET) organisations, namely: Technical and…

  2. British-Pakistani women's perspectives of diabetes self-management: the role of identity.

    Science.gov (United States)

    Majeed-Ariss, Rabiya; Jackson, Cath; Knapp, Peter; Cheater, Francine M

    2015-09-01

    To explore the effects of type 2 diabetes on British-Pakistani women's identity and its relationship with self-management. Type 2 diabetes is more prevalent and has worse outcomes among some ethnic minority groups. This may be due to poorer self-management and an inadequate match of health services to patient needs. The influence that type 2 diabetes has on British-Pakistani women's identity and subsequent self-management has received limited attention. An explorative qualitative study. Face-to-face semi-structured English and Urdu language interviews were conducted with a purposively selected heterogeneous sample of 15 British-Pakistani women with type 2 diabetes. Transcripts were analysed thematically. Four themes emerged: Perceived change in self emphasised how British-Pakistani women underwent a conscious adaptation of identity following diagnosis; Familiarity with ill health reflected women's adjustment to their changed identity over time; Diagnosis improves social support enabled women to accept changes within themselves and Supporting family is a barrier to self-management demonstrated how family roles were an aspect of women's identities that was resilient to change. The over-arching theme Role re-alignment enables successful self-management encapsulated how self-management was a continuous process where achievements needed to be sustained. Inter-generational differences were also noted: first generation women talked about challenges associated with ageing and co-morbidities; second generation women talked about familial and work roles competing with self-management. The complex nature of British-Pakistani women's self-identification requires consideration when planning and delivering healthcare. Culturally competent practice should recognise how generational status influences self-identity and diabetes self-management in ethnically diverse women. Health professionals should remain mindful of effective self-management occurring alongside, and being

  3. Does identity shape leadership and management practice? Experiences of PHC facility managers in Cape Town, South Africa

    Science.gov (United States)

    Daire, Judith; Gilson, Lucy

    2014-01-01

    In South Africa, as elsewhere, Primary Health Care (PHC) facilities are managed by professional nurses. Little is known about the dimensions and challenges of their job, or what influences their managerial practice. Drawing on leadership and organizational theory, this study explored what the job of being a PHC manager entails, and what factors influence their managerial practice. We specifically considered whether the appointment of professional nurses as facility managers leads to an identity transition, from nurse to manager. The overall intention was to generate ideas about how to support leadership development among PHC facility managers. Adopting case study methodology, the primary researcher facilitated in-depth discussions (about their personal history and managerial experiences) with eight participating facility managers from one geographical area. Other data were collected through in-depth interviews with key informants, document review and researcher field notes/journaling. Analysis involved data triangulation, respondent and peer review and cross-case analysis. The experiences show that the PHC facility manager’s job is dominated by a range of tasks and procedures focused on clinical service management, but is expected to encompass action to address the population and public health needs of the surrounding community. Managing with and through others, and in a complex system, requiring self-management, are critical aspects of the job. A range of personal, professional and contextual factors influence managerial practice, including professional identity. The current largely facility-focused management practice reflects the strong nursing identity of managers and broader organizational influences. However, three of the eight managers appear to self-identify an emerging leadership identity and demonstrate related managerial practices. Nonetheless, there is currently limited support for an identity transition towards leadership in this context. Better

  4. Globus Nexus: A Platform-as-a-Service Provider of Research Identity, Profile, and Group Management.

    Science.gov (United States)

    Chard, Kyle; Lidman, Mattias; McCollam, Brendan; Bryan, Josh; Ananthakrishnan, Rachana; Tuecke, Steven; Foster, Ian

    2016-03-01

    Globus Nexus is a professionally hosted Platform-as-a-Service that provides identity, profile and group management functionality for the research community. Many collaborative e-Science applications need to manage large numbers of user identities, profiles, and groups. However, developing and maintaining such capabilities is often challenging given the complexity of modern security protocols and requirements for scalable, robust, and highly available implementations. By outsourcing this functionality to Globus Nexus, developers can leverage best-practice implementations without incurring development and operations overhead. Users benefit from enhanced capabilities such as identity federation, flexible profile management, and user-oriented group management. In this paper we present Globus Nexus, describe its capabilities and architecture, summarize how several e-Science applications leverage these capabilities, and present results that characterize its scalability, reliability, and availability.

  5. Globus Nexus: A Platform-as-a-Service provider of research identity, profile, and group management

    Energy Technology Data Exchange (ETDEWEB)

    Chard, Kyle; Lidman, Mattias; McCollam, Brendan; Bryan, Josh; Ananthakrishnan, Rachana; Tuecke, Steven; Foster, Ian

    2016-03-01

    Globus Nexus is a professionally hosted Platform-as-a-Service that provides identity, profile and group management functionality for the research community. Many collaborative e-Science applications need to manage large numbers of user identities, profiles, and groups. However, developing and maintaining such capabilities is often challenging given the complexity of modern security protocols and requirements for scalable, robust, and highly available implementations. By outsourcing this functionality to Globus Nexus, developers can leverage best-practice implementations without incurring development and operations overhead. Users benefit from enhanced capabilities such as identity federation, flexible profile management, and user-oriented group management. In this paper we present Globus Nexus, describe its capabilities and architecture, summarize how several e-Science applications leverage these capabilities, and present results that characterize its scalability, reliability, and availability.

  6. Spoiled Group Identities and Backstage Work: A Theory of Stigma Management Rehearsals

    Science.gov (United States)

    O'Brien, John

    2011-01-01

    How do persons with a stigmatized identity learn potential responses to discrimination and harassment? Drawing on three and a half years of ethnographic data, this paper demonstrates how members of a group of Muslim American youth are socialized in locally dominant stigma management strategies through stigma management rehearsals. Stigma…

  7. Managing Quality, Identity and Adversaries in Public Discourse with Machine Learning

    Science.gov (United States)

    Brennan, Michael

    2012-01-01

    Automation can mitigate issues when scaling and managing quality and identity in public discourse on the web. Discourse needs to be curated and filtered. Anonymous speech has to be supported while handling adversaries. Reliance on human curators or analysts does not scale and content can be missed. These scaling and management issues include the…

  8. Personnel Identity Management and the Expeditionary Strike Group

    National Research Council Canada - National Science Library

    Neises, Glen E

    2007-01-01

    .... Chapter I defines IM and explains why IM is important for the Department of Defense (DoD). Chapter II provides an overview of DoD human resource management and Defense Manpower Data Center information systems...

  9. Social identity management strategies used by workers with acquired hearing loss.

    Science.gov (United States)

    Jennings, Mary Beth; Southall, Kenneth; Gagné, Jean-Pierre

    2013-01-01

    There is a paucity of knowledge about social identity-management by persons with hearing loss. The objective of the study was to gain an understanding from the perspective of the participants, the ways in which workers with acquired hearing loss manage their identity in the workplace. Twelve persons with acquired hearing loss, who were gainfully employed in a variety of settings and occupations in three Canadian cities, participated in audio-recorded semi-structured interviews. A secondary qualitative analysis was conducted on transcripts of interviews collected in a previous study on factors that influence disclosure of hearing loss in the workplace. A qualitative descriptive research paradigm was adopted and content analyses were used to extract pertinent information from verbatim transcripts. Participants described a range of identity-management strategies enacted in the workplace. Five recurrent themes emerged as important considerations in the Art of Identity Management in the workplace: 1. Managing the situation, 2. Having a buddy system, 3. Feeling comfortable, 4. Using personal resources, 5. It gets easier with time. Social identity-management is a complex process. Although persons with acquired hearing loss experience different challenges from other persons with invisible stigmas, similarities in the range of social identity-management strategies employed were evident in our findings. In addition, the social cognitive learning model of disclosure appears to be relevant to the experiences of our participants. The implications of the findings emphasize the importance of all stakeholders working collaboratively to address the issues of the growing population of workers with hearing loss.

  10. What Has Happened to Arabs? Identity and Face Management Online

    Science.gov (United States)

    Al Zidjaly, Najma

    2012-01-01

    In this article, I draw on contemporary theorizing on the concept of face (e.g., Ting-Toomey 1994, 2004; Tracy 2008) and research on Islamic and Arabic cultures and linguistic strategies (e.g., Beeman 1986; Hegland 1998; Wilce 2005; Al Zidjaly 2006) to explore the role that the Internet plays in enabling Muslim Arabs to manage or save their…

  11. Camouflaged Collectives: Managing Stigma and Identity at Gun Events

    Directory of Open Access Journals (Sweden)

    Sarah Jane Blithe

    2017-02-01

    Full Text Available Gun violence persists in the United States, claiming lives and escalating healthcare costs. This article seeks to contribute to social justice work on the “gun problem” by studying gun collectives. To understand gun culture and to identify gun violence reduction strategies, we study places where gun owners organize – legal (and sometimes illegal settings that facilitate dialogue about gun issues. Based on participant observation and collaborative event ethnography at gun shows and a private shooting party, this analysis presents findings about the practices gun collective members use to manage stigma. We conclude that when participants in gun events attempt to subvert core stigma through everyday stigma management practices, they effectively facilitate the unfettered exchange of potentially dangerous goods, promote the invisibility of oppressive structures, and normalize violence.

  12. Identity management and privacy languages technologies: Improving user control of data privacy

    Science.gov (United States)

    García, José Enrique López; García, Carlos Alberto Gil; Pacheco, Álvaro Armenteros; Organero, Pedro Luis Muñoz

    The identity management solutions have the capability to bring confidence to internet services, but this confidence could be improved if user has more control over the privacy policy of its attributes. Privacy languages could help to this task due to its capability to define privacy policies for data in a very flexible way. So, an integration problem arises: making work together both identity management and privacy languages. Despite several proposals for accomplishing this have already been defined, this paper suggests some topics and improvements that could be considered.

  13. Building trusted national identity management systems: Presenting the privacy concern-trust (PCT) model

    DEFF Research Database (Denmark)

    Adjei, Joseph K.; Olesen, Henning

    This paper discusses the effect of trust and information privacy concerns on citizens’ attitude towards national identity management systems. We introduce the privacyconcerns- trust model, which shows the role of trust in mediating and moderating citizens’ attitude towards identity management...... systems. We adopted a qualitative research approach in our analysis of data that was gathered through a series of interviews and a stakeholder workshop in Ghana. Our findings indicate that, beyond the threshold level of trust, societal information privacy concern is low; hence, trust is high, thereby...

  14. Adaptation of the Utrecht-Management of Identity Commitments Scale (U-MICS) to the measurement of the parental identity domain.

    Science.gov (United States)

    Piotrowski, Konrad

    2018-04-01

    The present studies examined the psychometric properties of the Utrecht-Management of Identity Commitments Scale (U-MICS) adapted to the measurement of identity formation in the parental identity domain. As the parental identity domain has only been studied within the neo-Eriksonian approach to a very limited extent, the aim of these studies was to prepare a short, valid and reliable tool for the measurement of parental identity in order to fill this gap. The associations of commitment, in-depth exploration and reconsideration of commitment in the parental domain with well-being and with other identity constructs were analyzed. The results showed that parental identity formation is associated with mothers' satisfaction with life and trait anxiety and with identity formation in other areas as well. The initial results suggest that the adapted version of the U-MICS is a valid and reliable measure that can be used in future studies on parental identity formation. © 2017 The Author. Scandinavian Journal of Psychology published by Scandinavian Psychological Associations and John Wiley & Sons Ltd.

  15. Issues of E-Learning Standards and Identity Management for Mobility and Collaboration in Higher Education

    Science.gov (United States)

    Alves, Paulo; Uhomoibhi, James

    2010-01-01

    Purpose: This paper seeks to investigate and report on the status of identity management systems and e-learning standards across Europe for promoting mobility, collaboration and the sharing of contents and services in higher education institutions. Design/methodology/approach: The present research work examines existing e-learning standards and…

  16. Rewriting Dominant Narratives of the Academy: Women Faculty of Color and Identity Management

    Science.gov (United States)

    Motha, Suhanthie; Varghese, Manka M.

    2018-01-01

    Drawing on Delgado and Yosso's "counterstory," Yosso's "community cultural wealth," and Alsup's "borderland discourses," the authors, who are women of color academics, use narratives from their lives to discuss the ways in which they draw on resources in managing and reconfiguring their multiple identities within the…

  17. Leadership, New Public Management and the Re-Modelling and Regulation of Teacher Identities

    Science.gov (United States)

    Hall, David; Gunter, Helen; Bragg, Joanna

    2013-01-01

    This article examines the rapidly shifting relationship between teachers and the state and efforts to re-model teacher identities within the wider context of public sector modernization and the New Public Management. The construction and development of officially authorized and normative discursive practices relating to leadership and the…

  18. Getting the Most of Management Training - the Role of Identical Elements for Training Transfer

    NARCIS (Netherlands)

    prof. dr. Karen van Dam; drs. Martijn van der Locht; dr. Dan Chiaburu

    2013-01-01

    Purpose - Focusing on management training, this study aimed to establish whether identical elements in a training program (i.e. aspects resembling participants' work situation) can improve training transfer and whether they do so beyond the contribution of two well-established predictors --

  19. When Social Identities Collide: Commentary on "Gender in the Management Education Classroom"

    Science.gov (United States)

    Patton, Eric

    2010-01-01

    This commentary to "Gender in the Management Education Classroom" (Bilimoria, O'Neil, Hopkins, & Murphy, 2010) employs social identity and self-categorization theory to analyze the incident described in the article. In any MBA classroom, students are dealing with multiple group memberships. Similar to workplace settings, when the focus is on…

  20. Does identity shape leadership and management practice? Experiences of PHC facility managers in Cape Town, South Africa.

    Science.gov (United States)

    Daire, Judith; Gilson, Lucy

    2014-09-01

    In South Africa, as elsewhere, Primary Health Care (PHC) facilities are managed by professional nurses. Little is known about the dimensions and challenges of their job, or what influences their managerial practice. Drawing on leadership and organizational theory, this study explored what the job of being a PHC manager entails, and what factors influence their managerial practice. We specifically considered whether the appointment of professional nurses as facility managers leads to an identity transition, from nurse to manager. The overall intention was to generate ideas about how to support leadership development among PHC facility managers. Adopting case study methodology, the primary researcher facilitated in-depth discussions (about their personal history and managerial experiences) with eight participating facility managers from one geographical area. Other data were collected through in-depth interviews with key informants, document review and researcher field notes/journaling. Analysis involved data triangulation, respondent and peer review and cross-case analysis. The experiences show that the PHC facility manager's job is dominated by a range of tasks and procedures focused on clinical service management, but is expected to encompass action to address the population and public health needs of the surrounding community. Managing with and through others, and in a complex system, requiring self-management, are critical aspects of the job. A range of personal, professional and contextual factors influence managerial practice, including professional identity. The current largely facility-focused management practice reflects the strong nursing identity of managers and broader organizational influences. However, three of the eight managers appear to self-identify an emerging leadership identity and demonstrate related managerial practices. Nonetheless, there is currently limited support for an identity transition towards leadership in this context. Better

  1. Intergroup conflict management strategies as related to perceptions of dual identity and separate groups.

    Science.gov (United States)

    Bizman, Aharon; Yinon, Yoel

    2004-04-01

    The authors examined the relations between (a) the perceptions of dual identity and separate groups and (b) intergroup conflict management strategies, in two contexts: the conflict between the secular and religious sectors in Israel and the allocation of resources among organizational subunits. In both contexts, contention (i.e., forcing one's will on the other party) was associated with the perception of separate groups. Only in the organizational context, avoidance (i.e., doing nothing or discontinuing participation in the conflict) was associated with the perception of dual identity. Problem solving (i.e., finding a solution that is acceptable to both parties) was related to the perception of dual identity in the secular-religious context. In the organizational context, this relation appeared only under a low perception of separate groups. Yielding (i.e., satisfying the other party's needs at the expense of one's own) was related to the perception of dual identity in the organizational context. In the secular-religious context, this relation appeared only under a high perception of separate groups. The authors discussed the varying pattern of the associations between (a) the perceptions of dual identity and separate groups and (b) the conflict management strategies in the two contexts in terms of the Dual Concern Model and the perceived feasibility of the strategies.

  2. Academic Manager or Managed Academic? Academic Identity Schisms in Higher Education

    Science.gov (United States)

    Winter, Richard

    2009-01-01

    The relationship between values and academic identity has received scant attention in the higher education literature with some notable exceptions (Churchman, 2006; Harley, 2002; Henkel, 2005). This paper contends that the perceived need to align all academics around corporate values and goals has given rise to academic identity schisms in higher…

  3. The NSF Cybersecurity Center of Excellence: Translating Identity Management and Cybersecurity into Scientific Collaboration

    Science.gov (United States)

    Welch, V.

    2016-12-01

    Scientists care deeply about their collaborations: who is a member, who can access, produce, and correct data, and manager instruments critical to their science missions. The communities of cybersecurity and identity management professionals develop tools to support collaborations and the undertaking of trustworthy science, but there are large cultural and linguistic gaps between these communities and the scientists they service. The National Science Foundation has recently funded a NSF Cybersecurity Center of Excellence to help its community of projects by providing leadership and addressing the challenges of trustworthy science. A key goal of this NSF Center has been translating between the goals of the science community into requirements and risks understood by identity management and cybersecurity communities. This talk will give an update on the Center's efforts and other services it provides to the NSF community to bridge these cultures.

  4. Campus Single Sign-On und hochschulübergreifendes Identity Management

    Science.gov (United States)

    Hommel, Wolfgang

    Das im Rahmen von IntegraTUM für die TUM geschaffene Identity & Access Management System setzt das Paradigma unified login um, d. h. ein Benutzer kann alle für ihn relevanten Dienste innerhalb der Hochschule mit derselben Loginname-/Passwortkombination nutzen. Dieser Artikel zeigt, wie auf Basis der Software Shibboleth und der deutschlandweiten Hochschulföderation DFN-AAI als weitere Mehrwerte das campusweite web single sign-on und die nahtlose Nutzung zahlreicher externer Web-Anwendungen erreicht werden. Als Beispiel für die Abläufe bei der Erschließung neuer Dienste für die hochschulübergreifende Nutzung wird die Anbindung von Learning Management Systemen auf Basis des DFN-AAI E-Learning-Profils diskutiert. Den umfassenden Vorteilen werden schließlich die aktuellen technischen Grenzen bei der Umsetzung des hochschulübergreifenden Identity Management gegenübergestellt.

  5. A framework for implementation of user-centric identity management systems

    DEFF Research Database (Denmark)

    Adjei, Joseph K.; Olesen, Henning

    2010-01-01

    Users increasingly become part of electronic transactions, which take place instantaneously without direct user involvement. This leads to the risk of data manipulation, identity theft and privacy violation, and it has become a major concern for individuals and businesses around the world. Gov......-ernments in many countries are implementing identity man-agement systems (IdMS) to curtail these incidences and to offer citizens the power to exercise informational self-determination. Using concepts from technology adoption and fit-viability theo-ries as well as the laws of identity, this paper analyzes...... the crite-ria for successful implementation and defines a framework for a citizen-centric national IdMS. Results from a survey con-ducted in Ghana are also included....

  6. Identity management strategies among HIV-positive Colombian gay men in London.

    Science.gov (United States)

    Jaspal, Rusi; Williamson, Iain

    2017-12-01

    This study set out to explore the social-psychological aspects of living with HIV among a group of HIV-positive Colombian gay men in London, and the strategies that they deployed to manage ensuing threats to their identities. Focus group and individual interview data were collected from 14 Colombian gay men living with HIV, and were analysed using qualitative thematic analysis and identity process theory. The following themes are discussed: (1) identity struggles and conflicts in Colombia, (2), managing multiple layers of social stigma in England, and (3) changing interpersonal and intergroup dynamics, which highlight the inter-connections between sexual prejudice, sexual risk-taking and HIV stigma. Identity may be chronically threatened due to the multiple layers of stigma, which can limit the coping strategies available to individuals. Findings strongly support the need for action and programmes to highlight and tackle both racism and HIV stigma on the gay scene and to fund more specific resources for sub-communities of gay, bisexual and other men who have sex with men, which employ appropriately trained and culturally competent staff.

  7. User-centred and context-aware identity management in mobile ad-hoc networks

    CERN Document Server

    Arabo, Abdullahi

    2013-01-01

    The emergent notion of ubiquitous computing makes it possible for mobile devices to communicate and provide services via networks connected in an ad-hoc manner. These have resulted in the proliferation of wireless technologies such as Mobile Ad-hoc Networks (MANets), which offer attractive solutions for services that need flexible setup as well as dynamic and low cost wireless connectivity. However, the growing trend outlined above also raises serious concerns over Identity Management (IM) du...

  8. Managing corporate identities of non-profit organisations in the social welfare sector

    Directory of Open Access Journals (Sweden)

    Lida Holtzhausen

    2013-03-01

    Full Text Available Present-day South Africa is characterised by many societal and developmental issues, such as HIV awareness and prevention, child-headed households, environmental protection, poverty alleviation, violence and victim aid. However, it is widely acknowledged that government alone cannot address these issues effectively. The role of non-profit organisations (NPOs in addressing social and development issues is increasingly emphasised. NPOs work at grass-roots level and they can therefore, on the whole, identify societal vulnerabilities and risks earlier than the government sector. However, due to the economic recession, NPOs operate in a competitive environment where an increasing number of NPOs rely on a small number of donors and other resources. NPOs should therefore differentiate themselves from the competition in order to obtain public legitimacy and funding. Corporate identity management is important for NPOs to fulfil their role in social welfare and thus contribute to disaster risk reduction. The exploratory nature of this study dictates a qualitative research approach. Semi-structured interviews with management of five NPOs in the social welfare sector were conducted in order to provide an answer to the study’s research question: ‘To what extent do NPOs in the social welfare sector practise corporate identity management, in order to prevent and address social welfare risks?’ The research found that NPOs do not realise the full potential of managing their corporate identities. NPOs therefore do not take advantage of a strong and distinct corporate identity which would allow them to ensure their ability to assess, address, reduce and/or alleviate vulnerabilities and disaster risks.

  9. "Managing identities" and parental disclosure of HIV sero-status in Zimbabwe.

    Science.gov (United States)

    Muparamoto, Nelson; Chiweshe, Manase Kudzai

    2015-01-01

    Drawing from a small sample of HIV infected respondents, this paper examines parents' perceptions on the decision to disclose or not to disclose their HIV sero-status to their children. It explores how parents control the information in the interactional ritual with their children. The paper uses Goffman's concept of dramaturgy to analyse how parents manage and control disclosure within a context where HIV and AIDS is associated with stigma. Disclosure is a strategic encounter in which the interactants (parents) manage to create a desired identity or spoil an identity. Qualitative research incorporating focus group discussions and in-depth interviews was used to examine the perceptions of parents who are HIV positive on disclosure of their status to their children. Such a methodological approach allows for a nuanced understanding of the context in which decision to disclose status happens. The study findings show that in a social context involving parents and children as actors there are complex expectations which affect parental disclosure of HIV sero-status to their children. The desire to manage an expected identity militated or enabled disclosure in a parental relationship.

  10. The identity management practices of beauty-bloggers: a multimodal approach to the deprofessionalization’s analysis

    Directory of Open Access Journals (Sweden)

    Martyanova Natalia Alexandrovna

    2015-04-01

    Full Text Available The article analyses the identity management practices of beauty-bloggers who on YouTube. The authors relies on the theory of deprofessionalization and show how bloggers gain the symbolic power and authority, which professionals previously had. Exploring the forms and methods of Internet communication the authors reveal the latent common identity management practices questioning the authority of professionals, and creating new managed space.

  11. The identity management practices of beauty-bloggers: a multimodal approach to the deprofessionalization’s analysis

    OpenAIRE

    Martyanova Natalia Alexandrovna; Rubtcova Maria Vladimirovna

    2015-01-01

    The article analyses the identity management practices of beauty-bloggers who on YouTube. The authors relies on the theory of deprofessionalization and show how bloggers gain the symbolic power and authority, which professionals previously had. Exploring the forms and methods of Internet communication the authors reveal the latent common identity management practices questioning the authority of professionals, and creating new managed space.

  12. Managing corporate visual identity: use and effects of organizational measures to support a consistent self-presentation

    NARCIS (Netherlands)

    van den Bosch, Annette; de Jong, Menno; Elving, Wim

    2004-01-01

    It is generally acknowledged that corporate visual identity (CVI) is an important element of identity, reputation, and relationship management. Academic research has focused strongly on the strategic and design aspects of CVI, and neglected the operational level. This article addresses one of the

  13. Managing corporate visual identity: Use and effects of organizational measures to support a consistent self-presentation.

    NARCIS (Netherlands)

    van den Bosch, A.L.M.; de Jong, Menno D.T.; Elving, W.J.L.

    2004-01-01

    It is generally acknowledged that corporate visual identity (CVI) is an important element of identity, reputation, and relationship management. Academic research has focused strongly on the strategic and design aspects of CVI, and neglected the operational level. This article addresses one of the

  14. Managing two cultural identities: the malleability of bicultural identity integration as a function of induced global or local processing.

    Science.gov (United States)

    Mok, Aurelia; Morris, Michael W

    2012-02-01

    Increasingly, individuals identify with two or more cultures. Prior research has found the degree to which individuals chronically integrate these identities (bicultural identity integration; BII) moderates responses to cultural cues: High BII individuals assimilate (adopting biases that are congruent with norms of the cued culture), whereas low BII individuals contrast (adopting biases that are incongruent with these norms). The authors propose BII can also be a psychological state and modulated by shifts in processing styles. In four experiments, the authors induced a global or local processing style using physical posture (Experiment 1) and cognitive manipulations (Experiments 2-4) and found that BII is enhanced in contexts facilitating a more global processing style (i.e., smiling, high-level construal, and similarity focus). The authors also found that contrastive responses to cultural cues are diminished when BII is situationally enhanced. Implications for research on processing style, identity integration, and performance in culture-based situations are discussed.

  15. Staying in the Hood: Black Lesbian and Transgender Women and Identity Management in North Philadelphia.

    Science.gov (United States)

    Brooks, Siobhan

    2016-12-01

    The concept Don't Ask, Don't Tell regarding Black LGBT sexuality in Black communities has been an acceptable form of identity management for Black LGBT people. In other words, Black LGBT people are accepted as long as they are not vocal about their sexuality. However, this is changing with the issue of gay marriage, which is creating a space where Black LGBT people are more open about their gender identity and sexuality in heterosexual Black spaces. This new form of openness allows Black LGBT people to "stay in" their communities, as opposed to coming out. In this article I examine how Black LGBT women in North Philadelphia stay in their communities: being politically active regarding LGBT issues, disengaging from LGBT issues, passing, and educating straight Black people about issues affecting the Black LGBT community. I conclude with implications of staying in and intersectionality among Black heterosexual and LGBT women fighting for social change.

  16. A National Identity Management Strategy to Enhance the Brazilian Electronic Government

    Directory of Open Access Journals (Sweden)

    José Alberto Sousa Torres

    2017-12-01

    Full Text Available Amongst the several problems with the Brazilian e-government services (e-Gov, many of them are related to the fact that Brazil does not have a National Strategy for Digital Identity Management (IdM. To design a  national strategy, it is crucial to analyze the solutions adopted in other countries and take into account Brazilian characteristics, such as its area, population, digital inclusion index, socio-political and economic profile, the current national identity registration system and the fraud rate. In this context, this paper aims to propose a national strategy for IdM for the Brazilian e-Gov program. This strategy was built upon by a literature review of the experiences of European countries and, mainly, the peculiarities inherent to Brazil.

  17. The Interaction of Control Systems and Stakeholder Networks in Shaping the Identities of Self-managed Teams

    DEFF Research Database (Denmark)

    Annosi, Maria Carmela; Foss, Nicolai Juul; Brunetta, Federica

    2017-01-01

    -based firms. We argue that managerial and stakeholder interventions shape the self-construction of team identity as well as the team’s commitment to specific work objectives. We also suggest that team identity becomes isomorphic to organizational identity because of pressures related to: (1) the presence...... of a dense network of managers and stakeholders, which orients teams towards a focus on certain aspects of the higher-order identity; (2) the use of team routines and regular feedback loops, which force alignment with the organizational identity; and (3) the use of coordinating roles aimed at promoting......, ratifying and reinforcing the convergence of identity within the team. We analyse multiple cases from a major multinational corporation in the telecommunications industry, which we examine through the lens of a multi-level model of controls involving the micro, meso and macro organizational levels. We...

  18. 'Even though it's a small checkbox, it's a big deal': stresses and strains of managing sexual identity(s) on Facebook.

    Science.gov (United States)

    Rubin, Jennifer D; McClelland, Sara I

    2015-01-01

    Facebook offers a socialisation context in which young people from ethnic, gender and sexual minorities must continually manage the potential for prejudice and discrimination in the form of homophobia and racism. In-depth interviews were conducted with eight young women, aged 16-19 years, who self-identified as queer and as women of colour. A detailed analysis of these interviews--focusing in particular on how young people described navigating expectations of rejection from family and friends--offered insight into the psychological and health consequences associated with managing sexual identity(s) while online. The 'closet' ultimately takes on new meaning in this virtual space: participants described trying to develop social relationships within Facebook, which demands sharing one's thoughts, behaviours and ideas, while also hiding and silencing their emerging sexuality. In this 'virtual closet', tempering self-presentation to offset social exclusion has become a continuous, yet personally treacherous, activity during the daily practice of using Facebook.

  19. Group affiliation in self-management: support or threat to identity?

    Science.gov (United States)

    Bossy, Dagmara; Knutsen, Ingrid Ruud; Rogers, Anne; Foss, Christina

    2017-02-01

    Self-management is considered important in chronic illness, and contemporary health policy recommends participation in support groups for individuals with chronic conditions. Although withdrawal from or non-participation in support groups is an important problem, there is limited knowledge about individuals' own motivation for participation in or withdrawal from self-management support groups. To investigate how individuals with type 2 diabetes perceive participation in group-based self-management support. This is a qualitative focus group study using a semi-structured interview guide. Sixteen participants diagnosed with type 2 diabetes were included in the study. Individuals with and without group affiliations were mixed in three focus groups to trigger discussions. In the analysis, reoccurring themes of engagement and discussions between participants were focused within a theoretical frame of institutional logic. The focus groups are seen as social spaces where participants construct identity. Both participation and non-participation in group-based self-management support are associated with dealing with the stigma of having type 2 diabetes. Negotiations contribute to constructing an illness dignity as a response to the logic of moral responsibility for the disease. Contemporary policy contributes to societal understandings of individuals with type 2 diabetes as morally inadequate. Our study shows that group-based self-management support may counteract blame and contribute in negotiations of identity for individuals with type 2 diabetes. This mechanism makes participation in groups beneficial for some but stigma inducing for others. © 2016 The Authors. Health Expectations Published by John Wiley & Sons Ltd.

  20. Job satisfaction and gender identity of women managers and non-managers.

    Science.gov (United States)

    Lipińska-Grobelny, Agnieszka; Wasiak, Katarzyna

    2010-01-01

    This work investigates different cognitive aspects of job satisfaction (co-workers, supervisor, job content, working facilities, organization and management, opportunities for development, income), positive and negative affect at work and their relations to gender role orientation of women occupying managerial and non-managerial positions. The sample of 122 women (60 managers and 62 non-managers) completed a battery of instruments such as: the Bem Sex Role Inventory, the Job Description Inventory by Neuberger and Allerbeck and the Job Affect Scale by Brief et al. Most women managers represented androgynous and masculine types, while women non-managers belonged to androgynous and feminine types. Moreover, women with various degrees of sex-typing showed positive and negative affect at work. The most satisfied with income were masculine women managers, the least--feminine women non-managers. These results may be applied in designing of motivational instruments to enhance job effectiveness and to eliminate unproductive behaviours such as absenteeism, high staff turnover.

  1. Holistic Privacy-Preserving Identity Management System for the Internet of Things

    Directory of Open Access Journals (Sweden)

    Jorge Bernal Bernabe

    2017-01-01

    Full Text Available Security and privacy concerns are becoming an important barrier for large scale adoption and deployment of the Internet of Things. To address this issue, the identity management system defined herein provides a novel holistic and privacy-preserving solution aiming to cope with heterogeneous scenarios that requires both traditional online access control and authentication, along with claim-based approach for M2M (machine to machine interactions required in IoT. It combines a cryptographic approach for claim-based authentication using the Idemix anonymous credential system, together with classic IdM mechanisms by relying on the FIWARE IdM (Keyrock. This symbiosis endows the IdM system with advanced features such as privacy-preserving, minimal disclosure, zero-knowledge proofs, unlikability, confidentiality, pseudonymity, strong authentication, user consent, and offline M2M transactions. The IdM system has been specially tailored for the Internet of Things bearing in mind the management of both users’ and smart objects’ identity. Moreover, the IdM system has been successfully implemented, deployed, and tested in the scope of SocIoTal European research project.

  2. XSIM Final Report: Modelling the Past and Future of Identity Management for Scientific Collaborations

    Energy Technology Data Exchange (ETDEWEB)

    Cowles, Robert; Jackson, Craig; Welch, Von

    2016-08-31

    The eXtreme Science Identity Management (XSIM1) research project: collected and analyzed real world data on virtual organization (VO) identity management (IdM) representing the last 15+ years of collaborative DOE science; constructed a descriptive VO IdM model based on that data; used the model and existing trends to project the direction for IdM in the 2020 timeframe; and provided guidance to scientific collaborations and resource providers that are implementing or seeking to improve IdM functionality. XSIM conducted over 20 semi­structured interviews of representatives from scientific collaborations and resource providers, both in the US and Europe; the interviewees supported diverse set of scientific collaborations and disciplines. We developed a definition of “trust,” a key concept in IdM, to understand how varying trust models affect where IdM functions are performed. The model identifies how key IdM data elements are utilized in collaborative scientific workflows, and it has the flexibility to describe past, present and future trust relationships and IdM implementations. During the funding period, we gave more than two dozen presentations to socialize our work, encourage feedback, and improve the model; we also published four refereed papers. Additionally, we developed, presented, and received favorable feedback on three white papers providing practical advice to collaborations and/or resource providers.

  3. Globus Identity, Access, and Data Management: Platform Services for Collaborative Science

    Science.gov (United States)

    Ananthakrishnan, R.; Foster, I.; Wagner, R.

    2016-12-01

    Globus is software-as-a-service for research data management, developed at, and operated by, the University of Chicago. Globus, accessible at www.globus.org, provides high speed, secure file transfer; file sharing directly from existing storage systems; and data publication to institutional repositories. 40,000 registered users have used Globus to transfer tens of billions of files totaling hundreds of petabytes between more than 10,000 storage systems within campuses and national laboratories in the US and internationally. Web, command line, and REST interfaces support both interactive use and integration into applications and infrastructures. An important component of the Globus system is its foundational identity and access management (IAM) platform service, Globus Auth. Both Globus research data management and other applications use Globus Auth for brokering authentication and authorization interactions between end-users, identity providers, resource servers (services), and a range of clients, including web, mobile, and desktop applications, and other services. Compliant with important standards such as OAuth, OpenID, and SAML, Globus Auth provides mechanisms required for an extensible, integrated ecosystem of services and clients for the research and education community. It underpins projects such as the US National Science Foundation's XSEDE system, NCAR's Research Data Archive, and the DOE Systems Biology Knowledge Base. Current work is extending Globus services to be compliant with FEDRAMP standards for security assessment, authorization, and monitoring for cloud services. We will present Globus IAM solutions and give examples of Globus use in various projects for federated access to resources. We will also describe how Globus Auth and Globus research data management capabilities enable rapid development and low-cost operations of secure data sharing platforms that leverage Globus services and integrate them with local policy and security.

  4. Identity Assemblages

    DEFF Research Database (Denmark)

    Horn, Line Helverskov

    The study aims at exploring how identity is enacted within the context of a two-year programme in Service, Hospitality, and Tourism Management (SHTM). This research thus investigates how students and educators go about their daily lives in different educational contexts both on and off campus...... as a contribution to the body of literature of ANT-based studies. Second, it contributes to existing identity theories by exemplifying a socio-material approach to identity issues. Third, the study enables reflections upon how educational institutions as fundamentally identity-producing organisations acknowledge...

  5. The Ineffectiveness of "Effective" Management Strategies: First-Year Teachers, Behavior Management, and Identity

    Science.gov (United States)

    Dugas, Daryl

    2016-01-01

    This article presents a research project that challenges the skills-based approach to classroom management in teacher education, particularly in the domain of responding to student misbehaviors. In 90-minute narrative-based interviews, 16 first-year Chicago Public School (CPS) teachers were prompted for narratives of their experiences responding…

  6. Gender identity and the management of the transgender patient: a guide for non-specialists.

    Science.gov (United States)

    Joseph, Albert; Cliffe, Charlotte; Hillyard, Miriam; Majeed, Azeem

    2017-04-01

    In this review, we introduce the topic of transgender medicine, aimed at the non-specialist clinician working in the UK. Appropriate terminology is provided alongside practical advice on how to appropriately care for transgender people. We offer a brief theoretical discussion on transgenderism and consider how it relates to broader understandings of both gender and disease. In respect to epidemiology, while it is difficult to assess the exact size of the transgender population in the UK, population surveys suggest a prevalence of between 0.2 and 0.6% in adults, with rates of referrals to gender identity clinics in the UK increasing yearly. We outline the legal framework that protects the rights of transgender people, showing that is not legal for physicians to deny transgender people access to services based on their personal beliefs. Being transgender is often, although not always, associated with gender dysphoria, a potentially disabling condition in which the discordance between a person's natal sex (that assigned to them at birth) and gender identity results in distress, with high associated rates of self-harm, suicidality and functional impairment. We show that gender reassignment can be a safe and effective treatment for gender dysphoria with counselling, exogenous hormones and surgery being the mainstay of treatment. The role of the general practitioner in the management of transgender patients is discussed and we consider whether hormone therapy should be initiated in primary care in the absence of specialist advice, as is suggested by recent General Medical Council guidance.

  7. Patient identity management for secondary use of biomedical research data in a distributed computing environment.

    Science.gov (United States)

    Nitzlnader, Michael; Schreier, Günter

    2014-01-01

    Dealing with data from different source domains is of increasing importance in today's large scale biomedical research endeavours. Within the European Network for Cancer research in Children and Adolescents (ENCCA) a solution to share such data for secondary use will be established. In this paper the solution arising from the aims of the ENCCA project and regulatory requirements concerning data protection and privacy is presented. Since the details of secondary biomedical dataset utilisation are often not known in advance, data protection regulations are met with an identity management concept that facilitates context-specific pseudonymisation and a way of data aggregation using a hidden reference table later on. Phonetic hashing is proposed to prevent duplicated patient registration and re-identification of patients is possible via a trusted third party only. Finally, the solution architecture allows for implementation in a distributed computing environment, including cloud-based elements.

  8. Patients’ Data Management System Protected by Identity-Based Authentication and Key Exchange

    Directory of Open Access Journals (Sweden)

    Alexandra Rivero-García

    2017-03-01

    Full Text Available A secure and distributed framework for the management of patients’ information in emergency and hospitalization services is proposed here in order to seek improvements in efficiency and security in this important area. In particular, confidentiality protection, mutual authentication, and automatic identification of patients are provided. The proposed system is based on two types of devices: Near Field Communication (NFC wristbands assigned to patients, and mobile devices assigned to medical staff. Two other main elements of the system are an intermediate server to manage the involved data, and a second server with a private key generator to define the information required to protect communications. An identity-based authentication and key exchange scheme is essential to provide confidential communication and mutual authentication between the medical staff and the private key generator through an intermediate server. The identification of patients is carried out through a keyed-hash message authentication code. Thanks to the combination of the aforementioned tools, a secure alternative mobile health (mHealth scheme for managing patients’ data is defined for emergency and hospitalization services. Different parts of the proposed system have been implemented, including mobile application, intermediate server, private key generator and communication channels. Apart from that, several simulations have been performed, and, compared with the current system, significant improvements in efficiency have been observed.

  9. Patients' Data Management System Protected by Identity-Based Authentication and Key Exchange.

    Science.gov (United States)

    Rivero-García, Alexandra; Santos-González, Iván; Hernández-Goya, Candelaria; Caballero-Gil, Pino; Yung, Moti

    2017-03-31

    A secure and distributed framework for the management of patients' information in emergency and hospitalization services is proposed here in order to seek improvements in efficiency and security in this important area. In particular, confidentiality protection, mutual authentication, and automatic identification of patients are provided. The proposed system is based on two types of devices: Near Field Communication (NFC) wristbands assigned to patients, and mobile devices assigned to medical staff. Two other main elements of the system are an intermediate server to manage the involved data, and a second server with a private key generator to define the information required to protect communications. An identity-based authentication and key exchange scheme is essential to provide confidential communication and mutual authentication between the medical staff and the private key generator through an intermediate server. The identification of patients is carried out through a keyed-hash message authentication code. Thanks to the combination of the aforementioned tools, a secure alternative mobile health (mHealth) scheme for managing patients' data is defined for emergency and hospitalization services. Different parts of the proposed system have been implemented, including mobile application, intermediate server, private key generator and communication channels. Apart from that, several simulations have been performed, and, compared with the current system, significant improvements in efficiency have been observed.

  10. Patients’ Data Management System Protected by Identity-Based Authentication and Key Exchange

    Science.gov (United States)

    Rivero-García, Alexandra; Santos-González, Iván; Hernández-Goya, Candelaria; Caballero-Gil, Pino; Yung, Moti

    2017-01-01

    A secure and distributed framework for the management of patients’ information in emergency and hospitalization services is proposed here in order to seek improvements in efficiency and security in this important area. In particular, confidentiality protection, mutual authentication, and automatic identification of patients are provided. The proposed system is based on two types of devices: Near Field Communication (NFC) wristbands assigned to patients, and mobile devices assigned to medical staff. Two other main elements of the system are an intermediate server to manage the involved data, and a second server with a private key generator to define the information required to protect communications. An identity-based authentication and key exchange scheme is essential to provide confidential communication and mutual authentication between the medical staff and the private key generator through an intermediate server. The identification of patients is carried out through a keyed-hash message authentication code. Thanks to the combination of the aforementioned tools, a secure alternative mobile health (mHealth) scheme for managing patients’ data is defined for emergency and hospitalization services. Different parts of the proposed system have been implemented, including mobile application, intermediate server, private key generator and communication channels. Apart from that, several simulations have been performed, and, compared with the current system, significant improvements in efficiency have been observed. PMID:28362328

  11. The Role of Individual Differences and Situational Variables in the Use of Workplace Sexual Identity Management Strategies.

    Science.gov (United States)

    Reed, Louren; Leuty, Melanie E

    2016-07-01

    Examination of individual difference variables have been largely ignored within research on the use of workplace sexual identity management strategies. The current study examined personality traits (extraversion, openness, and neuroticism), facets of sexual identity development (identity confusion, internalized heterosexism), and situational variables (e.g., perceptions of workplace climate and heterosexism) in explaining the use of management strategies, as well as possible interactions between individual and situational factors. Perceptions of the workplace climate toward lesbian and gay individuals significantly related to the use each of the management strategies, and Internalized Heterosexism was found to significantly predict the use of the Explicitly Out strategy. Most interactions between individual difference and situational variables were not supported, with the exception of an interaction between workplace heterosexism and internalized homophobia in explaining the use of the Explicitly Out strategy.

  12. Current management of gender identity disorder in childhood and adolescence: guidelines, barriers and areas of controversy.

    Science.gov (United States)

    Shumer, Daniel E; Spack, Norman P

    2013-02-01

    The approach to gender identity disorder (GID) in childhood and adolescence has been rapidly evolving and is in a state of flux. In an effort to form management recommendations on the basis of the available literature, The Endocrine Society published clinical practice guidelines in 2009. The guidelines recommend against sex role change in prepubertal children, but they recommend the use of gonadotropin-releasing hormone (GnRH) agonists to suppress puberty in adolescence, and the use of cross-sex hormones starting around age 16 for eligible patients. In actual practice, the approach to GID is quite variable due to continued lack of consensus and specific barriers to treatment that are unique to GID. Recent literature has focused on the mental health approach to prepubertal children with GID and short-term outcomes using pubertal suppression and cross-sex steroids in adolescents with GID. This review will describe the literature published since the release of The Endocrine Society guidelines regarding the management of GID in both children and adolescents.

  13. Organizational Identity Expressiveness and Perception Management : Principles for Expressing the Organizational Identity in Order to Manage External Stakeholders’ Perceptions of a Company

    NARCIS (Netherlands)

    M.D. van Halderen (Mignon)

    2008-01-01

    textabstractIt is especially during the past decade that stakeholders have become extremely heedful of organizations and their activities. A dominant organizational response of companies to this development is to express their organizational identity, in terms of who they are, what they stand for,

  14. Brief Report: The Identity Style Inventory (ISI-3) and the Utrecht-Management of Identity Commitments Scale (U-MICS)--Factor Structure, Reliability, and Convergent Validity in French-Speaking University Students

    Science.gov (United States)

    Zimmermann, Gregoire; Mahaim, Elodie Biermann; Mantzouranis, Gregory; Genoud, Philippe A.; Crocetti, Elisabetta

    2012-01-01

    The purpose of this study was to evaluate the factor structure and the reliability of the French versions of the Identity Style Inventory (ISI-3) and the Utrecht-Management of Identity Commitments Scale (U-MICS) in a sample of college students (N = 457, 18-25 years old). Confirmatory factor analyses confirmed the hypothesized three-factor solution…

  15. Use of standardized multidimensional evaluation tools and the emergence of the case manager's professional identity in France.

    Science.gov (United States)

    Nugue, Mathilde; De Stampa, Matthieu; Couturier, Yves; Somme, Dominique

    2012-01-01

    In France, the national public health plan proposes a group of innovations including the initiation of case management for older adults in complex situations, particularly those with cognitive disorders. In this context, public authorities asked case managers to use a standardized multidimensional evaluation tool. The results of a qualitative study on the pertinence of such a tool relative to the emergence of this new professional field are described. Early use of an evaluation tool seems to be linked to the emergence of a new professional identity for recently recruited case managers. Factors determining the strength of this link are training tool standardization, computerization, and local structure's involvement. Our results contribute to identifying one of the ways by which professional identity can be changed to become a case manager.

  16. An exploration of mothers' and fathers' views of their identities in chronic-kidney-disease management: parents as students?

    Science.gov (United States)

    Swallow, Veronica

    2008-12-01

    To explore parents' views of their identities as they learn to manage their child's chronic kidney disease. Parents are expected to participate in management and usually learn necessary skills from the multidisciplinary team. Research highlights the importance of professionals defining parents' management roles in chronic disease; but little is known about parents' views on their own identities as the complex and dynamic process of teaching and learning unfolds around their child's condition. According to positioning theory, identity development is a dynamic and fluid process that occurs during interaction, with each person positioning themselves while simultaneously positioning the other person, yet this concept has not been considered in relation to parents' contributions to disease management. A longitudinal, grounded theory study conducted in a UK Children's Kidney Unit. This paper focuses on one aspect of a larger study exploring family learning in disease management. Six mothers and two fathers of six children with a recently diagnosed chronic kidney disease participated in a total of 21 semi-structured interviews during the 18 months after referral to the unit. Interviews included discussion about the parts they played in relation to professionals during the management process. Findings were interpreted within a framework of positioning theory. Parents participated in teaching/learning/assessment that was both planned (involving allocated clinical lessons and tasks) and spontaneous (in response to current situations), to facilitate their participation. They positioned multidisciplinary team members as teachers as well as professionals, simultaneously positioning themselves as students as well as parents. Parents' clinical duties and obligations are not an automatic part of parenting but become part of the broader process of sharing disease management, this can lead to them assuming the additional identity of a 'student'. Involving parents in ongoing

  17. Contributions of the Life Story Method for Studies on Identity: the example of study about female professors in management positions

    Directory of Open Access Journals (Sweden)

    Adílio Renê Almeida Miranda

    2014-12-01

    Full Text Available Recently, the Life Story Method has been used in the area of Business Administration as an important methodological strategy in qualitative research. The purpose is to understand groups or collective bodies based on individual paths of life. Thus, the goal of this study was to show the contribution of the life story method in understanding the identity dynamics of female professors managing a public university, by means of an example derived from an empirical study. It was observed from the reports of four female professors involved in management that recovery of past memories, as well as of values, facts, standards and occurrences connected with the primary and organizational socialization of the interviewees, contributes to understanding of their identity dynamics. Some categories of analysis emerged that express relationships between life story and identity, e.g., discontinuity, subjectivity and the importance of allowing an individual/subject to speak; the individual and the social sphere and socio-historical transformations, a dynamic interaction in construction of identities; and temporal analysis in construction of identities.

  18. Adequate Security Protocols Adopt in a Conceptual Model in Identity Management for the Civil Registry of Ecuador

    Science.gov (United States)

    Toapanta, Moisés; Mafla, Enrique; Orizaga, Antonio

    2017-08-01

    We analyzed the problems of security of the information of the civil registries and identification at world level that are considered strategic. The objective is to adopt the appropriate security protocols in a conceptual model in the identity management for the Civil Registry of Ecuador. In this phase, the appropriate security protocols were determined in a Conceptual Model in Identity Management with Authentication, Authorization and Auditing (AAA). We used the deductive method and exploratory research to define the appropriate security protocols to be adopted in the identity model: IPSec, DNSsec, Radius, SSL, TLS, IEEE 802.1X EAP, Set. It was a prototype of the location of the security protocols adopted in the logical design of the technological infrastructure considering the conceptual model for Identity, Authentication, Authorization, and Audit management. It was concluded that the adopted protocols are appropriate for a distributed database and should have a direct relationship with the algorithms, which allows vulnerability and risk mitigation taking into account confidentiality, integrity and availability (CIA).

  19. Global business management for sustainability and competitiveness: The role of corporate branding, corporate identity and corporate reputation

    OpenAIRE

    Gupta, Suraksha; Melewar, T.C.; Czinkota, Michael C.

    2013-01-01

    This special issue of the Journal of World Business is devoted to the role of intangibles of a firm in building sustainable business for success in competitive markets. The research articles included in this issue have contributed to the on-going academic knowledge about the ability of marketing and management practices to drive business sustainability. This special issue on business sustainabili- ty focuses on the role of corporate branding, corporate identity and corporate reputation.

  20. "Everybody Puts Their Whole Life on Facebook": Identity Management and the Online Social Networks of LGBTQ Youth.

    Science.gov (United States)

    McConnell, Elizabeth; Néray, Bálint; Hogan, Bernie; Korpak, Aaron; Clifford, Antonia; Birkett, Michelle

    2018-05-26

    Lesbian, gay, bisexual, transgender, and queer (LGBTQ) youth and young adults almost inevitably "come out", or self-disclose their identity to others. Some LGBTQ youth are more uniformly "out", while others may disclose to some groups but not others. This selective disclosure is complicated on real name social media sites, which tend to encourage a unified presentation of self across social contexts. We explore these complications with a cohort of LBGTQ youth on Facebook ( N = 199, M age = 24.13). Herein we ask: How do LBGTQ youth manage the disclosure of their sexual orientation and/or gender identity to different people in their lives? Further, are there identifiable differences in the online social network structure for LGBTQ youth who manage outness in different ways? Finally, how do LGBTQ young people describe their experiences on Facebook? We answer these questions using a mixed methods approach, combining statistical cluster analysis, network visualization, and qualitative data. Our findings illustrate patterns in network structure by outness cluster type, highlighting both the work involved in managing one's online identity as well as the costs to (semi-) closeted individuals including a considerably lower overall network connectivity. In particular, outness to family characterized LGBTQ young people's experiences on Facebook.

  1. “Everybody Puts Their Whole Life on Facebook”: Identity Management and the Online Social Networks of LGBTQ Youth

    Directory of Open Access Journals (Sweden)

    Elizabeth McConnell

    2018-05-01

    Full Text Available Lesbian, gay, bisexual, transgender, and queer (LGBTQ youth and young adults almost inevitably “come out”, or self-disclose their identity to others. Some LGBTQ youth are more uniformly “out”, while others may disclose to some groups but not others. This selective disclosure is complicated on real name social media sites, which tend to encourage a unified presentation of self across social contexts. We explore these complications with a cohort of LBGTQ youth on Facebook (N = 199, Mage = 24.13. Herein we ask: How do LBGTQ youth manage the disclosure of their sexual orientation and/or gender identity to different people in their lives? Further, are there identifiable differences in the online social network structure for LGBTQ youth who manage outness in different ways? Finally, how do LGBTQ young people describe their experiences on Facebook? We answer these questions using a mixed methods approach, combining statistical cluster analysis, network visualization, and qualitative data. Our findings illustrate patterns in network structure by outness cluster type, highlighting both the work involved in managing one’s online identity as well as the costs to (semi- closeted individuals including a considerably lower overall network connectivity. In particular, outness to family characterized LGBTQ young people’s experiences on Facebook.

  2. "I'm Scared of the Disappointment": Young Adult Smokers' Relational Identity Gaps and Management Strategies as Sites of Communication Intervention.

    Science.gov (United States)

    Stanley, Samantha J; Pitts, Margaret Jane

    2018-02-22

    While cigarette smoking is decreasing among young adults, rates of nicotine consumption through other devices, most notably electronic cigarettes, are on the rise. Framed by communication theory of identity, this study examines young adult smokers' experiences with relational others in regard to their smoking. Focus group discussions and individual interviews convened with 20 young adult cigarette and electronic cigarette smokers revealed identity gaps implicating the relational layer of identity, including personal-relational, enacted-relational, and personal-enacted-relational identity gaps. Participants used communicative and behavioral strategies to manage relational discrepancies. The documented identity gaps and management strategies present opportunities for targeted smoking cessation interventions that amplify dissonance created through identity gaps as a motivational tactic.

  3. Expanding the disaster risk management framework: Measuring the constructed level of national identity as a factor of political risk

    Directory of Open Access Journals (Sweden)

    Barend Prinsloo

    2016-08-01

    Full Text Available Political risk is identified as a dominant risk category of disaster risk management (DRM which could negatively affect the success of those measures implemented to reduce disaster risk. Key to political risk is the construct of national identity which, if poorly constructed, could greatly contribute to political risk. This article proposed a tool to measure the construct of national identity and to provide recommendations to strengthen the construct in order to mitigate the exacerbating influence it may have on political risk and ultimately on DRM. The design of the measurement tool consisted of a mixed methodological approach employing both quantitative and qualitative data. The data collection instruments included a literature review (which is shortly provided in the previous sections and an empirical study that utilised data obtained through structured questionnaires. Although the results of the proposed measuring instrument did not include a representative sample of all the cultures in SouthAfrica, the results alluded to different levels for the construction of national identity among black and white respondents, possibly because of different ideological expectations among these groups. The results of the study should be considered as a validation of the measuring tool and not necessarily of the construct of national identity in South Africa. The measuring tool is thus promising for future studies to reduce political risk and ultimately disaster risk.

  4. National and gender measurement invariance of the Utrecht-Management of Identity Commitments Scale (U-MICS) : A 10-nation study with university students

    NARCIS (Netherlands)

    Crocetti, E.; Cieciuch, J.; Gao, C.-H.; Klimstra, T.A.; Lin, C.-L.; Mena de Matos, P.; Morsünbül, U.; Negru, O.; Sugimura, K.; Zimmermann, G.; Meeus, W.H.J.

    2015-01-01

    The purpose of this study was to examine the psychometric properties of the Utrecht-Management of Identity Commitments Scale (U-MICS), a self-report measure aimed at assessing identity processes of commitment, in-depth exploration, and reconsideration of commitment. We tested its factor structure in

  5. National and Gender Measurement Invariance of the Utrecht-Management of Identity Commitments Scale (U-MICS) : A 10-Nation Study With University Students

    NARCIS (Netherlands)

    Crocetti, Elisabetta; Cieciuch, Jan; Gao, Cheng Hai; Klimstra, Theo; Lin, Ching Ling; Matos, Paula Mena; Morsünbül, Ümit; Negru, Oana; Sugimura, Kazumi; Zimmermann, Grégoire; Meeus, Wim

    2015-01-01

    The purpose of this study was to examine the psychometric properties of the Utrecht-Management of Identity Commitments Scale (U-MICS), a self-report measure aimed at assessing identity processes of commitment, in-depth exploration, and reconsideration of commitment. We tested its factor structure in

  6. Student and/or Entrepreneur? Managing Multiple Identities among Emerging University Student Entrepreneurs

    DEFF Research Database (Denmark)

    Sørensen, Suna; B. Gartner, William

    2006-01-01

    for combining the identities are proposed and discussed as a way to challenge the meaning attached to the practiced concepts of "student" and "entrepreneur" from a theoretical as well as practical perspective. The practices are organized into a conceptual framework containing the two continuums: "integration/disintegration...

  7. Gender Identity and Career Aspiration to Top Management of Malaysian Graduate Students

    Science.gov (United States)

    Karami, Roya; Ismail, Maimunah; Sail, Rahim Md.

    2011-01-01

    This article examines the relationship between gender identity and career aspirations of a group of Iranian international postgraduate students studying at a Malaysian public university. This study uses the Farmer's Achievement Motivation Theory and Astin's Sociopsychological Model of Career Choice as theoretical framework. The data were collected…

  8. [Effects of an integrated self-management program on self-management, glycemic control, and maternal identity in women with gestational diabetes mellitus].

    Science.gov (United States)

    Kim, HeeSook; Kim, Sue

    2013-02-01

    The purpose of the study was to investigate the effects of an integrated self-management program on self-management, glycemic control, and maternal identity in women with gestational diabetes mellitus (GDM). A non-equivalent control group non-synchronized quasi-experimental design was used. A total of 55 women with GDM were recruited from Cheil General Hospital, Seoul, Korea and were assigned to an experimental (n=28) or control group (n=27). The participants were 24-30 weeks pregnant women who had been diagnosed with GDM as of July 30, 2010. The program was conducted as a 1 hour small group meeting 3 out of 5 times and by telephone-counseling 2 out of 5 times. The integrated self-management program was verified by an expert panel. Although there was no significant reduction in HbA1c (U= -1.17, p=.238), there were statistically significant increases in self-management (U= -3.80, pidentity (U= -4.48, pmanagement program for women with GDM improves self-management, maternal identity, and glycemic control. Further studies are needed to identify the effects of an integrated self-management program on pregnancy and neonatal outcomes.

  9. Managing risk and marginalizing identities: on the society-of-captives thesis and the harm of social dis-ease.

    Science.gov (United States)

    Arrigo, Bruce A

    2013-06-01

    This article develops the constitutive features of the society-of-captives thesis as suggested by Arrigo and Milovanovic, and Arrigo, Bersot, and Sellers. The relevance of this thesis is briefly explored in relation to the institutional and community-based treatment philosophies that currently inform the mental health and criminal justice systems. This exploration specifies how risk (being human and doing humanness differently) is managed symbolically, linguistically, materially, and culturally. The management of this risk extends to the kept as well as to their keepers, regulators, and watchers (i.e., the society of captives). This article calls for a new clinical praxis (being/doing a critical mindfulness) designed to overcome the totalizing madness (the harm of social dis-ease) that follows from managing risk fearfully and marginalizing identities desperately as reified recursively through society's captivity. The ethical underpinnings of this clinical praxis represent an emergent direction for undertaking correctional policy reform.

  10. Techno-Redemption of transsexual bodies: Appropriation of technology and Self-Management of Unfinished identities

    Directory of Open Access Journals (Sweden)

    Alejandra Roca

    2015-06-01

    Full Text Available In this paper, we want to explore the modifications and procedures that delineate limits between the notions of body, sexuality, and nature. Based on ethnographic fieldwork in public institutions of Buenos Aires and La Plata (Argentina, we examine the medical-legal process concerning "sex reassignment" in transsexual people, which illuminates the unfold senses about the plasticity and precariousness of 'human essences', as well as the tensions between what human is (identity and what he/she wants to be (project. We discuss the proposals of transhumanism, accepting that the soteriological dimension of biosciences enable the hopes of techno-redemption. Finally, we intend to contribute with a reflection about the role of scientific categories and the political perspective of the emergence of identities and collective resistances about the tutelage of cognitive and material control of the biosciences.

  11. Quantum Type Indeterminacy in Dynamic Decision-Making: Self-Control through Identity Management

    Directory of Open Access Journals (Sweden)

    Jerome Busemeyer

    2012-05-01

    Full Text Available The Type Indeterminacy model is a theoretical framework that uses some elements of quantum formalism to model the constructive preference perspective suggested by Kahneman and Tversky. In a dynamic decision context, type indeterminacy induces a game with multiple selves associated with a state transition process. We define a Markov perfect equilibrium among the selves with individual identity (preferences as the state variable. The approach allows to characterize generic personality types and derive some comparative static results.

  12. The Services Identity and Their Management in the Actual Economic Context

    Directory of Open Access Journals (Sweden)

    Bărăgan Laura Georgeta

    2017-01-01

    Full Text Available This article is an introduction to the unique characteristics of services and to their overall management within a dynamic context. The article highlights the economic and social significance of services, the differences between services and goods and the importance of management services.

  13. Exploring medical identity theft.

    Science.gov (United States)

    Mancilla, Desla; Moczygemba, Jackie

    2009-09-16

    The crime of medical identity theft is a growing concern in healthcare institutions. A mixed-method study design including a two-stage electronic survey, telephone survey follow-up, and on-site observations was used to evaluate current practices in admitting and registration departments to reduce the occurrence of medical identity theft. Survey participants were chief compliance officers in acute healthcare organizations and members of the Health Care Compliance Association. Study results indicate variance in whether or how patient identity is confirmed in healthcare settings. The findings of this study suggest that information systems need to be designed for more efficient identity management. Admitting and registration staff must be trained, and compliance with medical identity theft policies and procedures must be monitored. Finally, biometric identity management solutions should be considered for stronger patient identification verification.

  14. 'Don Fabio' and the taming of the three lions: the discursive construction of a foreign England manager's identity in the sports online written media

    Directory of Open Access Journals (Sweden)

    Dermot Brendan Heaney

    2012-11-01

    Full Text Available This article considers the appointment of a foreign manager to coach a national football team from the perspective of discursive identity construction. The data is comprised of three corpora of online versions of newspaper articles, each corresponding to a phase in Fabio Capello’s first two years of tenure. Reflecting current trends in Critical Discourse Analysis, qualitative close analysis is carried out on two articles from each corpus while quantitative analysis is extended across each corpus to identify salient and consistent aspects of discursive identity construction. Exploiting the multi-disciplinary basis of CDA, the data is examined in terms of transitivity, lexis (comprising vocabulary, collocation, deixis, and intertextuality, and narrative identity construction. Micro-analysis of grammatical and linguistic patterns is applied to indicate patterns in press coverage in each phase, and a corresponding overview considers how aspects of identity work diffused through each corpus cohere into general storylines.

  15. 'Don Fabio' and the taming of the three lions: the discursive construction of a foreign England manager's identity in the sports online written media

    Directory of Open Access Journals (Sweden)

    Dermot Brendan Heaney

    2013-06-01

    Full Text Available This article considers the appointment of a foreign manager to coach a national football team from the perspective of discursive identity construction. The data is comprised of three corpora of online versions of newspaper articles, each corresponding to a phase in Fabio Capello’s first two years of tenure. Reflecting current trends in Critical Discourse Analysis, qualitative close analysis is carried out on two articles from each corpus while quantitative analysis is extended across each corpus to identify salient and consistent aspects of discursive identity construction. Exploiting the multi-disciplinary basis of CDA, the data is examined in terms of transitivity, lexis (comprising vocabulary, collocation, deixis, and intertextuality, and narrative identity construction. Micro-analysis of grammatical and linguistic patterns is applied to indicate patterns in press coverage in each phase, and a corresponding overview considers how aspects of identity work diffused through each corpus cohere into general storylines.

  16. "It Was Not Me That Was Sick, It Was the Building": Rhetorical Identity Management Strategies in the Context of Observed or Suspected Indoor Air Problems in Workplaces.

    Science.gov (United States)

    Finell, Eerika; Seppälä, Tuija; Suoninen, Eero

    2018-07-01

    Suffering from a contested illness poses a serious threat to one's identity. We analyzed the rhetorical identity management strategies respondents used when depicting their health problems and lives in the context of observed or suspected indoor air (IA) problems in the workplace. The data consisted of essays collected by the Finnish Literature Society. We used discourse-oriented methods to interpret a variety of language uses in the construction of identity strategies. Six strategies were identified: respondents described themselves as normal and good citizens with strong characters, and as IA sufferers who received acknowledge from others, offered positive meanings to their in-group, and demanded recognition. These identity strategies located on two continua: (a) individual- and collective-level strategies and (b) dissolved and emphasized (sub)category boundaries. The practical conclusion is that professionals should be aware of these complex coping strategies when aiming to interact effectively with people suffering from contested illnesses.

  17. Family physicians' professional identity formation: a study protocol to explore impression management processes in institutional academic contexts.

    Science.gov (United States)

    Rodríguez, Charo; Pawlikowska, Teresa; Schweyer, Francois-Xavier; López-Roig, Sofia; Bélanger, Emmanuelle; Burns, Jane; Hugé, Sandrine; Pastor-Mira, Maria Ángeles; Tellier, Pierre-Paul; Spencer, Sarah; Fiquet, Laure; Pereiró-Berenguer, Inmaculada

    2014-09-06

    Despite significant differences in terms of medical training and health care context, the phenomenon of medical students' declining interest in family medicine has been well documented in North America and in many other developed countries as well. As part of a research program on family physicians' professional identity formation initiated in 2007, the purpose of the present investigation is to examine in-depth how family physicians construct their professional image in academic contexts; in other words, this study will allow us to identify and understand the processes whereby family physicians with an academic appointment seek to control the ideas others form about them as a professional group, i.e. impression management. The methodology consists of a multiple case study embedded in the perspective of institutional theory. Four international cases from Canada, France, Ireland and Spain will be conducted; the "case" is the medical school. Four levels of analysis will be considered: individual family physicians, interpersonal relationships, family physician professional group, and organization (medical school). Individual interviews and focus groups with academic family physicians will constitute the main technique for data generation, which will be complemented with a variety of documentary sources. Discourse techniques, more particularly rhetorical analysis, will be used to analyze the data gathered. Within- and cross-case analysis will then be performed. This empirical study is strongly grounded in theory and will contribute to the scant body of literature on family physicians' professional identity formation processes in medical schools. Findings will potentially have important implications for the practice of family medicine, medical education and health and educational policies.

  18. Hard Identity and Soft Identity

    Directory of Open Access Journals (Sweden)

    Hassan Rachik

    2006-04-01

    Full Text Available Often collective identities are classified depending on their contents and rarely depending on their forms. Differentiation between soft identity and hard identity is applied to diverse collective identities: religious, political, national, tribal ones, etc. This classification is made following the principal dimensions of collective identities: type of classification (univocal and exclusive or relative and contextual, the absence or presence of conflictsof loyalty, selective or totalitarian, objective or subjective conception, among others. The different characteristics analysed contribute to outlining an increasingly frequent type of identity: the authoritarian identity.

  19. Brief report: The Utrecht-Management of Identity Commitments Scale (U-MICS): Gender and age measurement invariance and convergent validity of the Turkish version

    NARCIS (Netherlands)

    Morsunbul, Umit; Crocetti, Elisabetta; Cok, Figen; Meeus, Wim

    2014-01-01

    The purpose of this study was to evaluate the factor structure and convergent validity of the Turkish version of the Utrecht-Management of Identity Commitments Scale (U-MICS). Participants were 1201 (59.6% females) youth aged between 12 and 24 years (Mage=17.53 years, SDage=3.25). Results indicated

  20. Brief report: The Utrecht-Management of Identity Commitments Scale (U-MICS) : Gender and age measurement invariance and convergent validity of the Turkish version

    NARCIS (Netherlands)

    Morsunbul, Umit; Crocetti, Elisabetta; Cok, Figen; Meeus, W.H.J.

    2014-01-01

    The purpose of this study was to evaluate the factor structure and convergent validity of the Turkish version of the Utrecht-Management of Identity Commitments Scale (U-MICS). Participants were 1201 (59.6% females) youth aged between 12 and 24 years (Mage = 17.53 years, SDage = 3.25). Results

  1. Leadership identities

    DEFF Research Database (Denmark)

    Holmgreen, Lise-Lotte

    2018-01-01

    Questioning the assumption that identities can be controlled through a shared organisational culture, the article explores the inculcation of a discourse of diversity into leadership identities in a Danish bank and building society. Thus, it intends to demonstrate that, on the one hand, discourse...... plays a significant role in identity construction and, on the other, that leaders’ constructions may have many sources of inspiration within and outside the organisation, emphasising that identity construction is a complex process in which organisational efforts to promote a common leadership identity...... to construct their leadership identities. While the respondents present comparable identities to the interviewer, the analysis reveals that the they draw on different discourses and employ a number of different discursive means to present this identity. This, the article argues, may be the result of a number...

  2. Why do I dread looking old?: A test of social identity theory, terror management theory, and the double standard of aging.

    Science.gov (United States)

    Chonody, Jill M; Teater, Barbra

    2016-01-01

    Outward appearance is one of the means by which age is determined, and fear of looking old may stem from fears about social identity and death. This study explored how social identity theory and terror management theory may help to explain the dread of looking old. University students from the United States, England, and Australia (N = 1,042) completed a questionnaire regarding their attitudes about aging and older adults. Results indicated that sex, age, beliefs about personal aging, and death anxiety explained 30.4% of the variance for participants' dread of looking old. Theoretical hypotheses were supported by our findings.

  3. Family support in the transition to adulthood in Portugal--its effects on identity capital development, uncertainty management and psychological well-being.

    Science.gov (United States)

    Oliveira, José Egídio; Mendonça, Marina; Coimbra, Susana; Fontaine, Anne Marie

    2014-12-01

    In a familistic southern European society such as the Portuguese, the family has historically played a prominent role in supporting the negotiation of transition pathways into adulthood. The present study aimed at capturing (1) the relative weight of parental financial support and autonomy support in contributing to the youngsters' psychological well-being (PWB), and (2) the mediating role of identity capital and uncertainty management in this relationship. A total of 620 participants completed measures of parental support, identity capital, uncertainty management and PWB. Autonomy support was found to be the strongest predictor of PWB, both directly and indirectly through its effects on identity capital and the use of target focused uncertainty management strategies. Conversely, financial support evidenced only a minor indirect impact through the mediation of tangible identity capital. Autonomy stimulation may constitute one of the most developmentally determinant family challenges in assisting the process of coming of age in Portugal. Copyright © 2014 The Foundation for Professionals in Services for Adolescents. Published by Elsevier Ltd. All rights reserved.

  4. Ternutator identities

    International Nuclear Information System (INIS)

    Devchand, Chandrashekar; Fairlie, David; Nuyts, Jean; Weingart, Gregor

    2009-01-01

    The ternary commutator or ternutator, defined as the alternating sum of the product of three operators, has recently drawn much attention as an interesting structure generalizing the commutator. The ternutator satisfies cubic identities analogous to the quadratic Jacobi identity for the commutator. We present various forms of these identities and discuss the possibility of using them to define ternary algebras.

  5. Emotion, power and identity. Emotional display of envy when taking on management roles in a professional hierarchy.

    Science.gov (United States)

    Sebrant, Ulla

    2014-01-01

    Drawing on a previous study of organising processes and the construction of identity in a Swedish geriatric clinic, the impact of emotions is brought to the fore in the interpretation of power relations among professional groups. The purpose of this paper is to find a way to interpret emotions as discursively constructed in organising processes. A sequence of critical events is described where leading positions were negotiated at the clinic. Senior physicians and head nurses are highlighted as opposing forces in a struggle where envious emotions seemed to be a driving force in the political interplay. The empirical material in this paper comes from the previous study. It is a set of participant observations and parts of interviews that took place before and after the implementation of a new organisational plan for the clinic. The envious and regressive undertone in the relationships between the actors made them act for egocentric reasons instead of creating new ways of collaborating and learning new leading roles. The power relations of the medical hierarchy were reproduced, which made new ways of relating threatening and difficult to achieve. The results of the study confirm that people involved and perhaps in conflict with each other have to be able to, or get help to, make sense of their emotional experiences to employ them constructively. Otherwise they fall back into well-known patterns in order to feel secure. A vital part of learning in change processes is the support to individuals and groups in gaining emotional understanding of themselves and others. Leaders and managers who often are initiators of change ought to be aware of the importance of emotional support in change processes. If they are not, they are destined to be a part of the confusion and unable to lead or support their staff in change processes.

  6. Medical Identity

    DEFF Research Database (Denmark)

    Musaeus, Peter

    2015-01-01

    Purpose: To examine philosophical stances underpinning medical identity and assess the conceptual relationship between physician, medical practice and culture. Argument: Medical identity is about the ideals and moral positions that physicians take when justifying themselves. Medical identity...... hedonistic versus sentimentalist approaches to medical identity. The sociocultural philosophical analysis of medical identity can shed light on what it means conceptually for a physician to harbor beliefs associated with him/her being taken to be an autonomous professional. It is important because it touches...... on the meaning of being a compassionate, good and skilled physician, making its relevance to person-centered medicine self-evident. Conclusion: Medical identity should be analyzed with reference to literature, philosophy and medical practice in order for the physician to exercise a reflective position...

  7. Identity paradoxes

    Directory of Open Access Journals (Sweden)

    Đurić Jelena

    2010-01-01

    Full Text Available The article considers paradoxical nature of identity that emerges from: 1 the very concept of identity whose abstract generality unites various and even opposite features; 2 the processual nature of reality that is easier to express in the poetical metaphors or abstract principles than in unambiguous conceptual networks; 3 the oppose relationship between being and knowledge, mind and matter, subject and object, self and personality. Entangled in the labyrinth which evade efforts to be conceptually defined, the modern thinking of identity moves towards abandoning the idea of “self” on behalf of the “ego” and towards the misapprehension of identity as being identical. This corresponds to the “time of the lost spirit” stretched between the simultaneous need to find an identity and to give it up.

  8. Civil Identity

    DEFF Research Database (Denmark)

    Petersen, Lars Axel

    In this paper I will go through a catalogue of examples of contexts in which the term civil identity is currently used, ranging from the formal and technical process of linking a set of administrative and other events to an individual biological person by means of identity cards, fingerprints, iris...... of Israel to Luce Irigaray's Feminist agenda of elaborating gender specific civil identities. My intention is to investigate whether these different employments of 'civil identity' point towards a common, and fairly well defined object field asking questions of contemporary relevance to the philosophy...

  9. Linguistic identity matching

    CERN Document Server

    Lisbach, Bertrand

    2013-01-01

    Regulation, risk awareness and technological advances are increasingly drawing identity search functionality into business, security and data management processes, as well as fraud investigations and counter-terrorist measures.Over the years, a number of techniques have been developed for searching identity data, traditionally focusing on logical algorithms. These techniques often failed to take into account the complexities of language and culture that provide the rich variations  seen in names used around the world. A new paradigm has now emerged for understanding the way that identity data

  10. Bridging Identities

    Science.gov (United States)

    Deaux, Kay; Burke, Peter

    2010-01-01

    Sociology and psychology are no strangers in the theoretical world of self and identity. Early works by William James (1890), a psychologist, and George Herbert Mead (1934), a sociologist, are often taken as a starting point by investigators in both fields. In more recent years, with the development of a number of identity theories in both fields,…

  11. Brand Identity.

    Science.gov (United States)

    Lawlor, John

    1998-01-01

    Instead of differentiating themselves by building "brand identities," colleges and universities often focus on competing with price. As a result, fewer and fewer institutions base their identities on value, the combination of quality and price. Methods of building two concepts to influence customers' brand image and brand loyalty are…

  12. Ritual Identity

    NARCIS (Netherlands)

    van der Beek, Suzanne

    2017-01-01

    Rituals are often used as opportunities for self-reflection and identity construction. The Camino to Santiago de Compostela, which has become a singularly popular pilgrimage since the late 1980s, is an example of a ritual that is explicitly used to gain a deeper understanding of one’s identity

  13. Organizational Identity

    DEFF Research Database (Denmark)

    Hatch, Mary Jo; Schultz, Majken

    This text presents the classic works on organizational identity alongside more current thinking on the issues. Ranging from theoretical contributions to empirical studies, the readings in this volume address the key issues of organizational identity, and show how these issues have developed through...

  14. Challenging Identities

    DEFF Research Database (Denmark)

    Identity is a keyword in a number of academic fields as well as in public debate and in politics. During the last decades, references to identity have proliferated, yet there is no simple definition available that corresponds to the use of the notion in all contexts. The significance of the notion...

  15. Fashioning Identity

    DEFF Research Database (Denmark)

    Mackinney-Valentin, Maria

    We dress to communicate who we are, or who we would like others to think we are, telling seductive fashion narratives through our adornment. Yet, today, fashion has been democratized through high-low collaborations, social media and real-time fashion mediation, complicating the basic dynamic...... of identity displays, and creating tension between personal statements and social performances. Fashioning Identity explores how this tension is performed through fashion production and consumption,by examining a diverse series of case studies - from ninety-year old fashion icons to the paradoxical rebellion...... by readdressing Fred Davis' seminal concept of 'identity ambivalence' in Fashion, Culture and Identity (1992), Mackinney-Valentin argues that we are in an epoch of 'status ambivalence', in which fashioning one's own identity has become increasingly complicated....

  16. Electronic identity

    CERN Document Server

    de Andrade, Norberto Nuno Gomes; Argles, David

    2014-01-01

    With the increasing availability of electronic services, security and a reliable means by which identity is verified is essential.Written by Norberto Andrade the first chapter of this book provides an overview of the main legal and regulatory aspects regarding electronic identity in Europe and assesses the importance of electronic identity for administration (public), business (private) and, above all, citizens. It also highlights the role of eID as a key enabler of the economy.In the second chapter Lisha Chen-Wilson, David Argles, Michele Schiano di Zenise and Gary Wills discuss the user-cent

  17. Possible selves and identity in relation to career development: evidence from Chilean male middle-aged managers' career narratives

    NARCIS (Netherlands)

    Nazar, Gabriela; van der Heijden, Beatrice

    2014-01-01

    Social and economic conditions, as well as the dynamism of the Chilean labour market, place new demands on middle-aged workers who have to explore both internal and external opportunities to develop successful careers. We assumed that possible self and identity in future states are core organizing

  18. The Intention and Reflection Model of Self-Disclosure: Social Work Education for Student Identity Management in Gay Men

    Science.gov (United States)

    Satterly, Brent A.

    2007-01-01

    Little research exists on how self-disclosure is taught in social work education (Pianko, 2001). Few social work education programs include precontemplative components of exploring identity for gay male students. In this study, the data from 4 focus groups of gay male therapists, who discussed their self-disclosure, decision-making processes, were…

  19. Spacing Identity

    DEFF Research Database (Denmark)

    Stang Våland, Marianne; Georg, Susse

    2018-01-01

    In this paper, we analyze how architectural design, and the spatial and material changes this involves, contributes to the continuous shaping of identities in an organization. Based upon a case study of organizational and architectural change in a municipal administration at a time of major public...... sector reforms, we examine how design interventions were used to (re)form work and professional relationships. The paper examines how engagements with spatial arrangements and material artifacts affected people’s sense of both occupational and organizational identity. Taking a relational approach...... to sociomateriality, the paper contributes to the further theorizing of space in organization studies by proposing the concept of spacing identity to capture the fluidity of identity performance....

  20. Identity, identity politics, and neoliberalism

    Directory of Open Access Journals (Sweden)

    Wrenn Mary

    2014-01-01

    Full Text Available With the intensification of neoliberalism, it is useful to examine how some individuals might cope with the irrationality of the system. Neoliberalism cloaks the execution of the corporate agenda behind rhetorical manipulation that advocates for limited government. The corollary absence of government involvement on behalf of the citizenry writ large disarms the means of social redress for the individual. Democracy funded and fueled by corporate power thereby disenfranchises the individual, provoking some to search for empowerment through identity politics. The argument set forth suggests that individuals construct, reinforce, or escalate allegiance to identities as a coping mechanism, some of which manifest in violent identity politics.

  1. Validitas Utrecht-Management Of Identity Commitments Scale (U-MICS) Versi Indonesia: Struktur Faktor, Invariansi Pengukuran Gender, dan Usia

    OpenAIRE

    Muttaqin, Darmawan

    2017-01-01

    The purpose of this study was to examine the psychometric properties of Indonesian version of the U-MICS, a measure three identity dimensions. Participants were 910 adolescents (12-21 years old). The Confirmatory Factor Analyses and Multi-Group Analyses were used to examine the factor structure, gender, and age measurement invariance of Indonesian version of the U-MICS. We further tested the gender and age differences using Multivariate Analysis of Variance. The results indicated that the fac...

  2. Identity negotiations in meetings

    DEFF Research Database (Denmark)

    Asmuß, Birte; Oshima, Sae

    of the company, and all members know (and display) that he holds some information that the rest don’t have access to. Our analysis shows that the participants evoke various identities of the manager, sometimes orienting to the structure of the organization, and other times orienting to wider social categories......Meetings are places, where identity negotiation is a central activity and where members’ local practices recurrently inform and are informed by larger categories (Antaki and Widdicombe 1998). Correspondingly, the approach to understanding organization (macro) by way of identity work (micro) has...... company, and in the data recorded over 10 days, the employees frequently complain about the many changes that have taken place. Our focus lies in a unique occasion where one of the managers makes an unusual appearance at the lunchroom. In this situation, he is the only one that is on the business side...

  3. Predicting Chinese human resource managers' strategic competence : roles of identity, career variety, organizational support and career adaptability.

    OpenAIRE

    Guan, Y.; Yang, W.; Zhou, X.; Tian, Z.; Eves, A.

    2016-01-01

    Based on career construction theory, the predictors of human resource managers' strategic competence in the Chinese context were examined. Results from a survey administered to Chinese HR managers (N = 220) showed that professional identification, career variety and organizational support for strategic human resource management positively predicted Chinese human resource managers' strategic competence. In addition, career adaptability served as a significant mediator for the above relations. ...

  4. Brief report: the Utrecht-Management of Identity Commitments Scale (U-MICS): gender and age measurement invariance and convergent validity of the Turkish version.

    Science.gov (United States)

    Morsunbul, Umit; Crocetti, Elisabetta; Cok, Figen; Meeus, Wim

    2014-08-01

    The purpose of this study was to evaluate the factor structure and convergent validity of the Turkish version of the Utrecht-Management of Identity Commitments Scale (U-MICS). Participants were 1201 (59.6% females) youth aged between 12 and 24 years (M(age) = 17.53 years, SD(age) = 3.25). Results indicated that the three-factor model consisting of commitment, in-depth exploration, and reconsideration of commitment provided a very good fit to the data and applied equally well to boys and girls as well as to three age groups (early adolescents, middle adolescents, and emerging adults). Significant relations between identity processes and self-concept clarity, personality, internalizing and externalizing problem behaviors, and parental relationships supported convergent validity. Thus, the Turkish version of U-MICS is a reliable tool for assessing identity in Turkish-speaking respondents. Copyright © 2014 The Foundation for Professionals in Services for Adolescents. Published by Elsevier Ltd. All rights reserved.

  5. National and Gender Measurement Invariance of the Utrecht-Management of Identity Commitments Scale (U-MICS): A 10-Nation Study With University Students.

    Science.gov (United States)

    Crocetti, Elisabetta; Cieciuch, Jan; Gao, Cheng-Hai; Klimstra, Theo; Lin, Ching-Ling; Matos, Paula Mena; Morsünbül, Ümit; Negru, Oana; Sugimura, Kazumi; Zimmermann, Grégoire; Meeus, Wim

    2015-12-01

    The purpose of this study was to examine the psychometric properties of the Utrecht-Management of Identity Commitments Scale (U-MICS), a self-report measure aimed at assessing identity processes of commitment, in-depth exploration, and reconsideration of commitment. We tested its factor structure in university students from a large array of cultural contexts, including 10 nations located in Europe (i.e., Italy, the Netherlands, Poland, Portugal, Romania, and Switzerland), Middle East (i.e., Turkey), and Asia (i.e., China, Japan, and Taiwan). Furthermore, we tested national and gender measurement invariance. Participants were 6,118 (63.2% females) university students aged from 18 to 25 years (Mage = 20.91 years). Results indicated that the three-factor structure of the U-MICS fitted well in the total sample, in each national group, and in gender groups. Furthermore, national and gender measurement invariance were established. Thus, the U-MICS can be fruitfully applied to study identity in university students from various Western and non-Western contexts. © The Author(s) 2015.

  6. Research Trends and Issues in the Study of Identity of Multi-ethnic Persons

    OpenAIRE

    TABA, Ayumi; TAKAI, Jiro

    2016-01-01

    In this article, concepts of identity are considered and surveyed researches of ego identity and group identity in social identity theory, self-categorization theory. It indicates ethnic identity is related to selfconcept, well-being, academic achievement, mental health, and so on. Furthermore, identity management theory reveals that cross- cultural communication occurs depending on management of cultural identity as group identity and relational identity as personal identity. However, there ...

  7. Online Identities and Social Networking

    Science.gov (United States)

    Maheswaran, Muthucumaru; Ali, Bader; Ozguven, Hatice; Lord, Julien

    Online identities play a critical role in the social web that is taking shape on the Internet. Despite many technical proposals for creating and managing online identities, none has received widespread acceptance. Design and implementation of online identities that are socially acceptable on the Internet remains an open problem. This chapter discusses the interplay between online identities and social networking. Online social networks (OSNs) are growing at a rapid pace and has millions of members in them. While the recent trend is to create explicit OSNs such as Facebook and MySpace, we also have implicit OSNs such as interaction graphs created by email and instant messaging services. Explicit OSNs allow users to create profiles and use them to project their identities on the web. There are many interesting identity related issues in the context of social networking including how OSNs help and hinder the definition of online identities.

  8. Threat of the feminine identity: The emerging structure in exploring the process of women's empowerment for menopause management: A grounded theory study

    Directory of Open Access Journals (Sweden)

    Mansoureh Yazdkhasti

    2016-11-01

    Full Text Available Women empowerment in different spheres of life especially menopause is among the key elements of health promotion in all communities. However there is no realistic images of empowering women in menopausal symptoms management. The present survey aimed to explain the process of women's empowerment for menopausal symptoms management. This qualitative study is part of a larger project which was conducted using Grounded Theory between 2013 and 2015. The article's main focus was to explore the underlying conditions and factors affecting the process of women's empowerment. Using a purposive and theoretical sampling method, 25 participants were interviewed 28 times. Data was collected through some in-depth, semi-structural and open ended interviews with the participant and also memoing and field notes. The interviews were conducted in Neighborhoods House affiliated to Tehran municipality and two gynecological clinics affiliated to Tehran University of Medical Sciences. Data analysis was applied through Strauss and Corbin approach (2008 using MAXQDA10 software. Threat of the feminine identity has been noted as the women's most common concern to being empowered in menopause management. The key theme emerged in the present study (threat of the feminine identity included four main categories (consciousness about the likelihood of femininity decline, negative attitude towards herself, inadequate supportive context, latent opportunity, two subcategories and 109 first-level codes. There is a logical, coherent and integrated relationship between all these concepts and the theme of feminine identity threat. This theme is considered as an underlying social problem and a major concern for postmenopausal women in the context of this group of women's empowerment. The factors (barriers and facilitators affecting women's empowerment in menopause management are associated with social context, intensity and origin of each society. Evaluation of Iranian women

  9. Changing the Ties That Bind? The Emerging Roles and Identities of General Practitioners and Managers in the New Clinical Commissioning Groups in the English NHS

    Directory of Open Access Journals (Sweden)

    Julia Segar

    2014-10-01

    Full Text Available The English National Health Service (NHS is undergoing significant reorganization following the 2012 Health and Social Care Act. Key to these changes is the shift of responsibility for commissioning services from Primary Care Trusts (PCTs to general practitioners (GPs working together in Clinical Commissioning Groups (CCGs. This article is based on an empirical study that examined the development of emerging CCGs in eight case studies across England between September 2011 and June 2012. The findings are based on interviews with GPs and managers, observations of meetings, and reading of related documents. Scott’s notion that institutions are constituted by three pillars—the regulative, normative, and cognitive–cultural—is explored here. This approach helps to understand the changing roles and identities of doctors and managers implicated by the present reforms. This article notes the far reaching changes in the regulative pillar and questions how these changes will affect the normative and cultural–cognitive pillars.

  10. Identity Activities

    Science.gov (United States)

    2016-08-03

    in reaction to their environment. They reflect an individual’s internal or external, conscious or subconscious , overt or covert, voluntary or...identity activities under a range of legal authorities, policy constraints, transnational threats, regional concerns and biases , and most likely...Biography. A baseline and descriptive analytic product that supports the development of the behavioral influences analysis ( BIA ) individual behavioral

  11. [Identity theft

    CERN Multimedia

    Wolinksy, H

    2003-01-01

    "A new survey by the Federal Trade Commission indicates that over the last five years one in four American households has been hit by identity theft, which can result in thieves tapping their victims' credit cards or bank accounts" (1 page).

  12. Designer's Identity

    DEFF Research Database (Denmark)

    Kunrath, Kamila; Cash, Philip; Li-Ying, Jason

    2016-01-01

    A designer’s professional identity (DPI) develops through both education and professional experience, building on core personality traits and innate skills. In this paper a systematic literature review and a secondary narrative review were developed in order to map personal attributes and design...

  13. Challenging Identities

    DEFF Research Database (Denmark)

    depends on the conceptual or ideological constellation in which it takes part. This volume on one hand demonstrates the role of notions of identity in a variety of European contexts, and on the other hand highlights how there may be reasons to challenge the use of the term and corresponding social...

  14. Design and Development of an Identity Management System: The Minnesota State College-Southeast Technical Case Study

    Science.gov (United States)

    Elhindi, Mohamed A.

    2010-01-01

    Historically, managing access to information systems (ISs) required direct interaction with a limited number of users. Increasingly, managing access involves handling an increased numbers of internal and external students, faculty, and staff as well as partners such as workforce development centers, the U.S. Department of Education, and the…

  15. Reciprocal Benefits, Legacy and Risk: Applying Ellinger and Bostrom's Model of Line Manager Role Identity as Facilitators of Learning

    Science.gov (United States)

    Campbell, Paul; Evans, Peter

    2016-01-01

    Purpose: The purpose of this paper is to explore the beliefs held by managers about their roles as facilitators of learning with their employees in a public utilities organisation. Design/methodology/approach: The research was based on Ellinger and Bostrom's (2002) study on managers' beliefs on their role as facilitators of learning in…

  16. Identity transformation

    DEFF Research Database (Denmark)

    Neergaard, Helle; Robinson, Sarah; Jones, Sally

    , as well as the resources they have when they come to the classroom. It also incorporates perspectives from (ii) transformational learning and explores the concept of (iii) nudging from a pedagogical viewpoint, proposing it as an important tool in entrepreneurship education. The study incorporates......This paper develops the concept of ‘pedagogical nudging’ and examines four interventions in an entrepreneurship classroom and the potential it has for student identity transformation. Pedagogical nudging is positioned as a tool, which in the hands of a reflective, professional......) assists students in straddling the divide between identities, the emotions and tensions this elicits, and (iv) transform student understanding. We extend nudging theory into a new territory. Pedagogical nudging techniques may be able to unlock doors and bring our students beyond the unacknowledged...

  17. Placing Science for Natural Resource Management and Climate Variability : Lessons from Narratives of Risk, Place and Identity

    NARCIS (Netherlands)

    Leith, Peat; Vanclay, Francis

    Making salient, credible and legitimate knowledge for natural resource management (NRM) and adaptation to climate change is achievable when scientific knowledge is grounded in place. Making scientific knowledge locally relevant can be assisted by an understanding of the way ` placed knowledge' comes

  18. Design and Construction of an Entity Resolution System that Supports Entity Identity Information Management and Asserted Resolution

    Science.gov (United States)

    Nelson, Eric Derrand

    2011-01-01

    This work describes the design and construction of an open source, entity resolution system that enables users to assign and maintain persistent identifiers for master data items. Two key features of this system that are not available in current ER systems and that make persistent identification possible are (1) The capture and management of…

  19. Piloting the European Unified Patient Identity Management (EUPID) Concept to Facilitate Secondary Use of Neuroblastoma Data from Clinical Trials and Biobanking.

    Science.gov (United States)

    Ebner, Hubert; Hayn, Dieter; Falgenhauer, Markus; Nitzlnader, Michael; Schleiermacher, Gudrun; Haupt, Riccardo; Erminio, Giovanni; Defferrari, Raffaella; Mazzocco, Katia; Kohler, Jan; Tonini, Gian Paolo; Ladenstein, Ruth; Schreier, Guenter

    2016-01-01

    Data from two contexts, i.e. the European Unresectable Neuroblastoma (EUNB) clinical trial and results from comparative genomic hybridisation (CGH) analyses from corresponding tumour samples shall be provided to existing repositories for secondary use. Utilizing the European Unified Patient IDentity Management (EUPID) as developed in the course of the ENCCA project, the following processes were applied to the data: standardization (providing interoperability), pseudonymization (generating distinct but linkable pseudonyms for both contexts), and linking both data sources. The applied procedures resulted in a joined dataset that did not contain any identifiers that would allow to backtrack the records to either data sources. This provided a high degree of privacy to the involved patients as required by data protection regulations, without preventing proper analysis.

  20. Mediating Identity

    DEFF Research Database (Denmark)

    Kjærgaard, Annemette Leonhardt; Morsing, Mette; Ravasi, Davide

    2011-01-01

    This paper reports a longitudinal field study on the effects of positive media coverage on the reconstruction of organizational identity. The study highlights how intense positive coverage – to the point of turning an organization into a ‘celebrity’– influences both the way members understand...... their organization (sensemaking effect) and the gratification they derive from its positive representation (self-enhancement effect). Our findings suggest that positive media representations foster members' alignment around an emergent new understanding of what their organization is. Over time, however, celebrity...

  1. Unravelling identities

    OpenAIRE

    2007-01-01

    Abstract The decision to go to war by the government of the day is assumed to be a decision taken on behalf of all citizens of the nation, conceived as a collective united by a harmony of interests. Yet in the case of the Iraq War, there is clearly no unified voice of support from the British people. There is division between the state and its citizens, and the latter also reflect the multilayered identities of an increasingly multicultural society. How do individuals displaying mu...

  2. Identity at work: Exploring strategies for Identity Work

    Directory of Open Access Journals (Sweden)

    Byron G. Adams

    2012-01-01

    Full Text Available Orientation: This study explored strategies for identity work that are central to the negotiation and regulation of employee work identity.Research purpose: The main aim of this study was to explore employee narratives and identify the strategies available to them in the process of identity work, as they defined themselves at work.Motivation for the study: As there is a scarcity of research on identity work in South Africa, this study wanted to advance knowledge about identity work and the strategies used for regulating and negotiating an identity at work by exploring these constructs in this context.Research design, approach and method: A qualitative research process formed the basis for this study. Nineteen employees from a global manufacturing company participated in two semi-structured in-depth interviews. Grounded theory was applied to analyse and interpret the data.Main findings: Nine strategies for identity work were identified and categorised into four broad themes (personal philosophies; relationships; career management and negotiating balance.Practical/managerial implications: Employees followed various strategies for defining themselves at work and this may have some implications for employee work engagement and productivity.Contribution/value-add: This study expands on current theoretical knowledge of identity work, and provides insights into the strategies people use to regulate and negotiate their identities at work. 

  3. Assessment and Management of the Geomorphological Heritage of Monte Pindo (NW Spain: A Landscape as a Symbol of Identity

    Directory of Open Access Journals (Sweden)

    Manuela Costa-Casais

    2015-06-01

    Full Text Available This study focuses on the granite mountain known as Monte Pindo (627 m above sea level in the Autonomous Community of Galicia (NW Spain. This territory is included in the area classified as “Costa da Morte” in the “Politica de Ordenación Litoral” (POL (Coastal Planning Policy for the region of Galicia. This coastal unit, located between “Rías Baixas” and “Cape Fisterra” has great potential for demonstrating geological processes and its geomorphological heritage is characterized by a high degree of geodiversity of granite landforms. The main objective of our work is to assess the geomorphological heritage of the site, thus revealing its wide geodiversity. We shall analyze and highlight: its scientific value, developing an inventory of granite landforms; its educational valuel and its geotouristic potential. It must be ensured that the Administration understands that natural diversity is composed of both geodiversity and biodiversity. Only then will the sustainable management of Monte Pindo become possible by integrating natural and cultural heritage values. The goal is to ensure that Monte Pindo and its immediate surroundings become a geopark with the aim of promoting local development projects based on the conservation and valorization of its geological heritage.

  4. Identical and shifted identical bands

    International Nuclear Information System (INIS)

    Dodder, R.S; Jones, E.F.; Hamilton, J.H.

    1997-01-01

    Spontaneous fission of 252 Cm was studied with 72 large Compton suppressed Ge detectors in Gamma sphere. New isotopes 160 Sm and 162 Gd were identified. Through X-ray-γ and γ-γ-γ) coincidence measurements, level energies were established to spins 14 + to 20 + in 152 , 154 156 60 Nd 92 94 96 , 156 , 158 , 160 62 Sm 94 , 96 , 98 , and 160 , 162 64 Gd 96 , 98 . These nuclei exhibit a remarkable variety of identical bands and bands where the energies and moments of inertia are shifted by the same constant amount for every spin state from 2 + to 12 + for various combinations of nuclei differing by 2n, 4n, 2p, 4p, and α

  5. Identity In and Around Organisations

    DEFF Research Database (Denmark)

    Schultz, Majken; Maguire, Steve

    2013-01-01

    concept may not be the best way of approaching and managing your organisation. Rather, Majken Schultz and Steve Maguire argue that organisations would benefit from adopting a process-based view of identity, which integrates history, ongoing change and market instability into its definition.......At the heart of any successful organisation lies a powerful conception of identity: the coherent way in which it presents itself to its stakeholders and employees, containing its purpose, goals and key characteristics. However, the traditional idea of identity as a stable, solid and reliable...

  6. Survivorship and discourses of identity.

    Science.gov (United States)

    Little, Miles; Paul, Kim; Jordens, Christopher F C; Sayers, Emma-Jane

    2002-01-01

    Personal identity is self-evidently important to us all. Identity is a philosophically complex subject, but there is some agreement that memory, embodiment and continuity are essential components. The sense of memory includes 'future memory', the kind of memory we would like to construct for ourselves as our lives proceed. While the sense of personal identity is internal to the individual, a sense of that person's identity exists in the minds of others. Extreme experiences threaten the element of continuity, because they may bring bodily changes as well as cognitive changes that challenge central values. Restoring or preserving continuity is a major task for survivors. The ways in which people experience discontinuity because of cancer illness, and the ways in which they manage this experience emerges from the narratives of the survivors of cancer and in the narratives of health care workers who look after them. People manage discontinuity by reference to stable 'anchor points' in their beliefs and values; by re-constructing versions of their pre-experience identities, drawing on past memory and finding ways to preserve a continuity between past memory, present experience and constructions of the future; by using the experience to develop established facets of identity; and by imbuing the experience with meaning and recognising the enlarged identity made possible by survival. Those who cannot achieve a sense of continuity may feel alienated from themselves, their friends and family. All these methods of management may be used by one person to negotiate the post-experience identity in its different social interactions. The experience of the survivor can be further understood by recognising the challenge posed by extreme experience to the sense of continuity of both embodied self and memory. A satisfactory discourse of survival has yet to enter the public domain. This lack adds to the burdens of survivors, including those who have survived cancer. Copyright 2002 John

  7. Economic, Political and Symbolic Management of “Traditional Knowledge”: The Construction of a Self-Identity in a Globalized World

    Directory of Open Access Journals (Sweden)

    Marc Lenaerts

    2010-11-01

    Full Text Available This paper is the introduction to the dossier with three articles resulting from the Symposium “Economic, Political and Symbolic Management of ‘Traditional Knowledge’: Indigenous Criteria and External Redefinitions” of the 53rd International Congress of Americanists (Mexico, 2009. We have modified the subtitle of the Symposium, adopting in exchange for this dossier the subtitle of the Congress’ motto: “The Construction of a Self-Identity in a Globalized World”. The first part of the text remembers Ana María Spadafora, co-organizer of the Symposium and editor of the dossier, who passed away in 2010. The second part presents the aim of the Symposium and the contribution of the three articles in the dossier, plus Ana María Spadafora’s article, which was published earlier in this journal. Even though they touch on quite different research fields—bio-trade in Mexico and Peru, commercialization of handicrafts in French Guiana, modifications of traditional knowledge among the Ashéninka of Peru, and dreams of Pilagá women of the Chaco as practical action—all four papers show that the emphasis on relational aspects, the polyvalence of thoughts and practices or the imbrication of speaking, thinking and doing are stronger constants than the persistence of this or that emblematic element of “ethnic tradition.”

  8. Identity at work: Exploring strategies for Identity Work

    Directory of Open Access Journals (Sweden)

    Byron G. Adams

    2012-09-01

    Research purpose: The main aim of this study was to explore employee narratives and identify the strategies available to them in the process of identity work, as they defined themselves at work. Motivation for the study: As there is a scarcity of research on identity work in South Africa, this study wanted to advance knowledge about identity work and the strategies used for regulating and negotiating an identity at work by exploring these constructs in this context. Research design, approach and method: A qualitative research process formed the basis for this study. Nineteen employees from a global manufacturing company participated in two semi-structured in-depth interviews. Grounded theory was applied to analyse and interpret the data. Main findings: Nine strategies for identity work were identified and categorised into four broad themes (personal philosophies; relationships; career management and negotiating balance. Practical/managerial implications: Employees followed various strategies for defining themselves at work and this may have some implications for employee work engagement and productivity. Contribution/value-add: This study expands on current theoretical knowledge of identity work, and provides insights into the strategies people use to regulate and negotiate their identities at work.

  9. Keeping identity private

    DEFF Research Database (Denmark)

    Adjei, Joseph K.; Olesen, Henning

    2011-01-01

    information. On the other hand, consumers have expressed concerns that their rights and ability to control their personal information are violated. Paradoxically, it appears that users provide personal data freely and willingly, as it has been observed on Facebook and other social networks. This study...... is an attempt to understand the relationship between individuals’ intentions to disclose personal information, their actual personal information disclosure behaviours, and how these can be leveraged to develop privacy-enhancing identity management systems (IDMS) that users can trust. Legal, regu...

  10. Privacy-preserving Identity Management

    OpenAIRE

    Milutinovic, Milica

    2015-01-01

    With the technological advances and the evolution of online services, user privacy is becoming a crucial issue in the modern day society. Privacy in the general sense refers to individuals’ ability to protect information about themselves and selectively present it to other entities. This concept is nowadays strongly affected by everyday practices that assume personal data disclosure, such as online shopping and participation in loyalty schemes. This makes it difficult for an individual to con...

  11. Exploiting OAuth 2.0: from User Delegation for OGC Services to a Generic Federation-as-a-Service Solution for Federated Identity Management

    Science.gov (United States)

    Kershaw, Philip; Jensen, Jens; Stephens, Ag; van Engen, Willem

    2013-04-01

    We explore an application of OAuth to enable user delegation for OGC-based services and the evolution of this solution to form part of a wider Federation-as-a-Service offering for federated identity management. OAuth has established itself in the commercial sector as a means for users to delegate access to secured resources under their control to third parties. It has also found its way into the academic and research domains as a solution for user delegation. Notable examples including the CILogon project for Teragrid in the US, and also, closer to the Earth Sciences, as part of the OGC Web Services, Phase 6 Testbed. Both are examples of OAuth 1.0 implementations. Version 2.0 has seen significant changes to this original specification which have not been without controversy but it has arguably provided a greater degree of flexibility in how it can be applied and the use cases that it can address. At CEDA (Centre for Environmental Data Archival, STFC), a Python implementation of OAuth 2.0 was made to explore these capabilities with a focus on providing a solution for user delegation for data access, processing and visualisation services for the Earth Observation and Climate sciences domains. The initial goal was to provide a means of delegating short-lived user credentials to trusted services along the same lines as the established approach of Proxy certificates widely used in Grid computing. For the OGC and other HTTP-based services employed by CEDA, OAuth makes a natural fit for this role, integrating with minimal impact on existing interfaces. Working implementations have been made for CEDA's COWS Web Processing Service and Web Map Service. Packaging the software and making it available in Open Source repositories together with the generic nature of the solution have made it readily exploitable in other application domains. At the Max Planck Institute for Psycholinguistics (Nijmegen, The Netherlands), the software will be used to integrate some tools in the

  12. A User-Centric System for Verified Identities on the Bitcoin Blockchain

    OpenAIRE

    Augot, Daniel; Chabanne, Hervé; Chenevier, Thomas; George, William; Lamber, Laurent

    2017-01-01

    International audience; We present an identity management scheme built into the Bitcoin blockchain, allowing for identities that are as indelible as the blockchain itself. Moreover, we take advantage of Bitcoin's decentralized nature to facilitate a shared control between users and identity providers, allowing users to directly manage their own identities, fluidly coordinating identities from different providers, even as identity providers can revoke identities and impose controls.

  13. Experiences and Lessons Learnt with Collaborative e-Research Infrastructure and the application of Identity Management and Access Control for the Centre for Environmental Data Analysis

    Science.gov (United States)

    Kershaw, P.

    2016-12-01

    CEDA, the Centre for Environmental Data Analysis, hosts a range of services on behalf of NERC (Natural Environment Research Council) for the UK environmental sciences community and its work with international partners. It is host to four data centres covering atmospheric science, earth observation, climate and space data domain areas. It holds this data on behalf of a number of different providers each with their own data policies which has thus required the development of a comprehensive system to manage access. With the advent of CMIP5, CEDA committed to be one of a number of centres to host the climate model outputs and make them available through the Earth System Grid Federation, a globally distributed software infrastructure developed for this purpose. From the outset, a means for restricting access to datasets was required, necessitating the development a federated system for authentication and authorisation so that access to data could be managed across multiple providers around the world. From 2012, CEDA has seen a further evolution with the development of JASMIN, a multi-petabyte data analysis facility. Hosted alongside the CEDA archive, it provides a range of services for users including a batch compute cluster, group workspaces and a community cloud. This has required significant changes and enhancements to the access control system. In common with many other examples in the research community, the experiences of the above underline the difficulties of developing collaborative e-Research infrastructures. Drawing from these there are some recurring themes: Clear requirements need to be established at the outset recognising that implementing strict access policies can incur additional development and administrative overhead. An appropriate balance is needed between ease of access desired by end users and metrics and monitoring required by resource providers. The major technical challenge is not with security technologies themselves but their effective

  14. Facilitating Conversations about Managerial Identities

    DEFF Research Database (Denmark)

    Madsen, Mona Toft

    -based organization in the engineering consulting sector b) a reflection meeting, where the same three managers were gathered, and conversations were facilitated based on identity work in the context of earlier interviews. More specifically, three themes were discussed; flat organizational structure, tensions between...

  15. Interplay Between Intended Brand Identity and Identities in a Nike Related Brand Community

    DEFF Research Database (Denmark)

    Kornum, Niels; Gyrd-Jones, Richard; Al Zagir, Nadia

    2017-01-01

    While branding research traditionally views brand identity as an inside-out management controlled phenomenon, recent research emphasizes that a wide variety of stakeholders in the brand ecosystem enact and co-create brand identity. Following this theoretical perspective, management forms the inte...

  16. Identity after Death

    DEFF Research Database (Denmark)

    Gerstrøm, Anna

    2015-01-01

    Purpose: The purpose of this paper is to explore how legacy organizational identity and death relate to each other and, thereby, contribute to closing the gap in knowledge on organizational identity constructions in times of death. Design/methodology/approach: The paper opted for an exploratory....../value: This paper addresses an apparent gap in the literature on identity and death; exploring identity narratives in a bankrupted bank, the paper considers constructions of legacy organizational identities in times of disruptive death....

  17. Asian American Adolescent Identity

    OpenAIRE

    Ohm, Julie Juhye

    1999-01-01

    The formation of ego identity in Asian American late adolescents attending Virginia Tech was examined within the frameworks of Erikson's psychosocial theory and Berry, Trimble, and Olmedo's model of acculturation. Ego identity was measured using the Achieved sub-scale of the Revised Version of the Extended Objective Measure of Ego Identity Status, an instrument based on the theoretical constructs of Erikson. Ethnic identity was measured using the Multigroup Ethnic Identity Measure and America...

  18. Exploring the identity and "sense of identity" of organisations

    Directory of Open Access Journals (Sweden)

    C L Van Tonder

    2006-04-01

    Full Text Available During the past two decades a steady increase in scholarly contributions in the area of organisation identity have been observed – to the point that the phenomenon is now the subject of a sustainable discourse in several disciplines. Many theoretical and conceptual dilemmas however remain, largely as a result of the low incidence of empirical research in the area. This study reports the results of an exploratory investigation that adapted Schley and Wagenfield’s (1979 concept of identity for use in an organisational setting. Interviews were conducted with 152 top managers representing 10 companies. The results indicate that organisational responses to the question “who am I?�? elicit distinctive organisational self-descriptions and some awareness of identity issues.

  19. Identity Work and Emotions

    DEFF Research Database (Denmark)

    Winkler, Ingo

    2018-01-01

    This paper reviews the empirical literature on identity work and identifies two distinct approaches to incorporating emotion. The majority of empirical studies use emotion to describe the experiences of identity work. In doing so, the authors (a) mention the emotions that people feel in situations...... that trigger identity work, (b) illustrate identity work as an emotional endeavour, and (c) describe the emotional impact of successful and unsuccessful identity work. There is also an emerging literature that examines the mutual constitution of emotions and identity work. These authors address emotional...... labour, affective social identification, emotional attachment and detachment, and humour when studying identity work. This paper suggests that, to understand better the relation between emotions and identity work, future research should examine the role of emotions in problematizing identity...

  20. Identity and identity conflict in the workplace

    NARCIS (Netherlands)

    K.E. Horton (Kate); P.S. Bayerl (Saskia); G. Belschak-Jacobs (Gabriele)

    2014-01-01

    textabstractAs individuals, we define ourselves according to various characteristics that include our values and beliefs. This gives us our identity. As organisations become increasingly complex, understanding the concept of identity conflict may mean the difference between success and failure.

  1. On Fay identity

    International Nuclear Information System (INIS)

    Michev, Iordan P.

    2006-01-01

    In the first part of this paper we consider the transformation of the cubic identities for general Korteweg-de Vries (KdV) tau functions from [Mishev, J. Math. Phys. 40, 2419-2428 (1999)] to the specific identities for trigonometric KdV tau functions. Afterwards, we consider the Fay identity as a functional equation and provide a wide set of solutions of this equation. The main result of this paper is Theorem 3.4, where we generalize the identities from Mishev. An open problem is the transformation of the cubic identities from Mishev to the specific identities for elliptic KdV tau functions

  2. Identities as organizational practices

    DEFF Research Database (Denmark)

    Oshima, Sae; Asmuß, Birte

    Identity has been widely acknowledged as playing a central role in various organizational processes, yet there is still a need to better understand the dynamics and functions of identity work in modern organizations. The present paper is centered within this concern, and examines identity......) reveal the intersubjective, multimodal and embodied nature of identity work; 2) demonstrate identity work as organizational practices, used in order to accomplish specific actions; and 3) pose a question on the view on identity as a layered/leveled phenomenon....

  3. Monitoring migrants or making migrants ‘misfit’? : Data protection and human rights perspectives on Dutch identity management practices regarding migrants

    NARCIS (Netherlands)

    La Fors, Karolina

    2016-01-01

    Record numbers of migrants and refugees fleeing violence and poverty in parts of Africa and the Middle East present the European Union with unprecedented challenges, including in determining their identity as well as status. In recent years problems of identifying immigrants have been addressed in

  4. The Supermalt identity

    DEFF Research Database (Denmark)

    Bech-Larsen, Tino; Esbjerg, Lars; Grunert, Klaus G.

    2007-01-01

    on consumers' self-identities. The second part explored the role of food and beverage products in the construction of self-identities. The final part focused on the construction of brand identity for Supermalt. Findings - The article provides information on the self-identities constructed by Afro......-Caribbean informants. The food and beverage consumption of informants reflects their mixed cultural identity. The brand identity Supermalt appears to be malleable, with ample room for consumer co-construction. Perceptions of brand identity differ markedly among informants, who are all able to construct Supermalt......Purpose - The objective of this article is to conduct a case study of the Supermalt brand of malt beer, which has become the preferred beverage of Afro-Caribbean consumers in Brixton on a very limited marketing budget. Design/methodology/approach - The article uses the concepts of personal identity...

  5. Researching Identity and Interculturality

    DEFF Research Database (Denmark)

    Lønsmann, Dorte

    2016-01-01

    Review of: Researching Identity and Interculturality / by F. Dervin and K. Risager (eds.). Routledge 2015, 245 pp.......Review of: Researching Identity and Interculturality / by F. Dervin and K. Risager (eds.). Routledge 2015, 245 pp....

  6. Understanding Identity and Organizations

    DEFF Research Database (Denmark)

    Christensen, Lars Thøger

    2013-01-01

    The article reviews the book "Understanding Identity and Organizations," by Kate Kenny, Andrea Whitle, and Hugh Wilmott.......The article reviews the book "Understanding Identity and Organizations," by Kate Kenny, Andrea Whitle, and Hugh Wilmott....

  7. Components of Sexual Identity

    Science.gov (United States)

    Shively, Michael G.; DeCecco, John P.

    1977-01-01

    This paper examines the four components of sexual identity: biological sex, gender identity, social sex-role, and sexual orientation. Theories about the development of each component and how they combine and conflict to form the individual's sexual identity are discussed. (Author)

  8. Being Tolerant about Identity?

    NARCIS (Netherlands)

    van Rooij, R.; Gutzmann, D.; Köpping, J.; Meier, C.

    2014-01-01

    Identity and identification are very important concepts in philosophy and logic. They are crucial for the analysis of quantification and for counting. According to some philosophers, many examples that are supposed to show that identity is contingent, in fact show that the notion of identity is

  9. The medical leadership challenge in healthcare is an identity challenge.

    Science.gov (United States)

    Andersson, Thomas

    2015-01-01

    The purpose of this article is to describe and analyse the identity challenges that physicians with medical leadership positions face. Four qualitative case studies were performed to address the fact that identity is processual, relational and situational. Physicians with managerial roles were interviewed, as well as their peers, supervisors and subordinates. Furthermore, observations were made to understand how different identities are displayed in action. This study illustrates that medical leadership implies identity struggles when physicians have manager positions, because of the different characteristics of the social identities of managers and physicians. Major differences are related between physicians as autonomous individuals in a system and managers as subordinates to the organizational system. There are psychological mechanisms that evoke the physician identity more often than the managerial identity among physicians who are managers, which explains why physicians who are managers tend to remain foremost physicians. The implications of the findings, that there are major identity challenges by being both a physician and manager, suggest that managerial physicians might not be the best prerequisite for medical leadership, but instead, cooperative relationships between physicians and non-physician managers might be a less difficult way to support medical leadership. Acknowledging and addressing identity challenges can be important both in creating structures in organizations and designing the training for managers in healthcare (both physicians and non-physicians) to support medical leadership. Medical leadership is most often related to organizational structure and/or leadership skills, but this paper discusses identity requirements and challenges related to medical leadership.

  10. Management of a Concealable Stigmatized Identity: A Qualitative Study of Concealment, Disclosure, and Role Flexing Among Young, Resilient Sexual and Gender Minority Individuals.

    Science.gov (United States)

    Bry, Laura Jane; Mustanski, Brian; Garofalo, Robert; Burns, Michelle Nicole

    2017-01-01

    Disclosure of a sexual or gender minority status has been associated with both positive and negative effects on wellbeing. Few studies have explored the disclosure and concealment process in young people. Interviews were conducted with 10 sexual and/or gender minority individuals, aged 18-22 years, of male birth sex. Data were analyzed qualitatively, yielding determinants and effects of disclosure and concealment. Determinants of disclosure included holding positive attitudes about one's identity and an implicit devaluation of acceptance by society. Coming out was shown to have both positive and negative effects on communication and social support and was associated with both increases and decreases in experiences of stigma. Determinants of concealment included lack of comfort with one's identity and various motivations to avoid discrimination. Concealment was also related to hypervigilance and unique strategies of accessing social support. Results are discussed in light of their clinical implications.

  11. Identity and Professional Networking.

    Science.gov (United States)

    Raj, Medha; Fast, Nathanael J; Fisher, Oliver

    2017-06-01

    Despite evidence that large professional networks afford a host of financial and professional benefits, people vary in how motivated they are to build such networks. To help explain this variance, the present article moves beyond a rational self-interest account to examine the possibility that identity shapes individuals' intentions to network. Study 1 established a positive association between viewing professional networking as identity-congruent and the tendency to prioritize strengthening and expanding one's professional network. Study 2 revealed that manipulating the salience of the self affects networking intentions, but only among those high in networking identity-congruence. Study 3 further established causality by experimentally manipulating identity-congruence to increase networking intentions. Study 4 examined whether identity or self-interest is a better predictor of networking intentions, providing support for the former. These findings indicate that identity influences the networks people develop. Implications for research on the self, identity-based motivation, and professional networking are discussed.

  12. Short forms of the Utrecht-Management of Identity Commitments Scale (U-MICS) with the domains of job, romantic relationship, and region.

    Science.gov (United States)

    Schubach, Elisabeth; Zimmermann, Julia; Noack, Peter; Neyer, Franz J

    2017-01-01

    The U-MICS is a self-report questionnaire designed to assess the identity dimensions from a domain-specific perspective. The present study reports on the development of a short-form version for the domains of job and romantic relationship in young adults from Germany and extends this scale to include the domain of region (n Sample1  = 95, 84% female, mean age 22.45 years; n Sample2  = 1,795, 71% female, mean age 24.53 years). We found the short form to possess adequate psychometric properties and to demonstrate a factor structure congruent to the long-form version. Regarding validity, the small correlations across domains within dimensions support a domain-specific approach to identity. The associations between the different identity domains with personality traits are similar, indicating a consistent pattern of convergent validity for all domains. We conclude that "region" provides a valuable complement to the established domains that can all be reliably assessed with the U-MICS-Short Form. Copyright © 2016 The Foundation for Professionals in Services for Adolescents. Published by Elsevier Ltd. All rights reserved.

  13. "You Worry, 'cause You Want to Give a Reasonable Account of Yourself": Gender, Identity Management, and the Discursive Positioning of "Risk" in Men's and Women's Talk About Heterosexual Casual Sex.

    Science.gov (United States)

    Farvid, Panteá; Braun, Virginia

    2018-07-01

    Heterosexual casual sex is routinely depicted as a physically, socially, and psychologically "risky" practice. This is the case in media accounts, psychological research, and other academic work. In this article, we examine 15 men's and 15 women's talk about casual sex from a discursive psychological stance to achieve two objectives. Firstly, we confirm the categories of risk typically associated with casual sex but expand these to include a domain of risks related to (gendered) identities and representation. Men's talk of risk centered on concerns about sexual performance, whereas women's talk centered on keeping safe from violence and sexual coercion. The notion of a sexual reputation was also identified as a risk and again manifested differently for men and women. While women were concerned about being deemed promiscuous, men displayed concern about the quality of their sexual performance. Secondly, within this talk about risks of casual sex, the participants' identities were identified as "at risk" and requiring careful management within the interview context. This was demonstrated by instances of: keeping masculinity intact in accounts of no erection, negotiating a responsible subject position, and crafting agency in accounts of sexual coercion-in the participants' talk. We argue that casual sex, as situated within dominant discourses of gendered heterosexuality, is a fraught practice for both men and women and subject to the demands of identity representation within co-present interactions.

  14. Experiencing with Identity

    DEFF Research Database (Denmark)

    Pors, Justine Grønbæk

    2012-01-01

    This article studies how a political organization begins to experiment with its identity. By use of an empirical case of the Danish Ministry of Education, I examine how a political organization supplements its identity of a legislating power with identities of a supervisor, beacon and facilitator...... of evaluation in public schools. Out of a paralysis emerge new innovative strategies of governing, aimed at the schools’ self-governing capacity. The identity of the political system thus emerges as oscillations between different roles of a legislating power and a supervising coach. The case study suggests...... that a society of experimentalism is emerging. Thus, the relevant object of study is no longer organizational identity, but the experiments with different identities that modern organizations are performing....

  15. Professional entrepreneurial identity construction

    DEFF Research Database (Denmark)

    Ramsgaard, Michael Breum

    The present study investigates the construction of a professional identity as an entrepreneur in a sample of people with educational background in nutrition and health. The study examines the connection between professional identity construction and entrepreneurial business emergence using...... ‘entrepreneurial preparedness’ as parameter. This research seeks to address the following questions: What significant components or characteristics do entrepreneurs rely on in the early processes of constructing an entrepreneurial identity....

  16. Personal Identity in Enhancement

    Directory of Open Access Journals (Sweden)

    Jana Podroužková

    2015-09-01

    Full Text Available The aim of this paper is to introduce the concept of human enhancement, its methods and its relation to personal identity. Also several approaches to personal identity will be described. Transhumanism is a special think tank supporting human enhancement through modern technologies and some of its representatives claim, that even great changes to human organisms will not affect their personal identity. I will briefly describe the most important means of human enhancment and consider the problem of personal identity for each of them separately.

  17. Known and Unknown Identity

    DEFF Research Database (Denmark)

    Henze-Pedersen, Sofie

    This qualitative study investigates the relationship between openness and identity among 18 adoptees. Many studies have argued that a high degree of openness is important for the identity formation of adoptees. However, few studies have explored this relationship. Two types of openness...... (biographical knowledge and communicative openness) are used to categorise the empirical material, making it possible to illuminate how different types of openness influence identity. The findings suggest that there is no direct link between a high degree of openness and positive identity formation. Instead...

  18. Identity/Time

    Directory of Open Access Journals (Sweden)

    Nancy J. Knauer

    2013-09-01

    Full Text Available This paper engages the unspoken fourth dimension of intersectionality—time. Using the construction of lesbian, gay, bisexual, and transgender (LGBT identities as an example, it establishes that identity, as it is lived and experienced, is not only multivalent, but also historically contingent. It then raises a number of points regarding the temporal locality of identity—the influence of time on issues of identity and understanding, its implications for legal interventions, social movement building, and paradigms of progressive change. As the title suggests, the paper asks us to consider the frame of identity over time.

  19. 'I don't view myself as a woman politician, I view myself as a politician who's a woman': The discursive management of gender identity in political leadership.

    Science.gov (United States)

    Sorrentino, Jasmin; Augoustinos, Martha

    2016-09-01

    Former Prime Minister Julia Gillard's speech in the Australian parliament on sexism and misogyny received considerable public attention and controversy. However, less attention has been paid to how Gillard attended and oriented to issues related to her status as a woman during the period between her elevation to the position of Prime Minister in June 2010 and the delivery of the misogyny speech in October 2012. Using a discursive psychological approach, this article examines a corpus of interview transcripts in which gender was occasioned both explicitly and implicitly by speakers, thus requiring Gillard to attend to her gender identity. The analysis demonstrates that far from making gender a salient and relevant membership category, Gillard worked strategically to mitigate her gender as merely inconsequential to her role as Prime Minister. These findings are discussed in relation to existing research examining how gender is oriented to, negotiated, and resisted in talk to accomplish social actions, and more specifically what may be at stake for women in leadership positions who explicitly orient to gender as an identity category. © 2016 The British Psychological Society.

  20. Collective Endeavors to Address Institutional Contradiction between Gender Identity and Occupational Identity

    DEFF Research Database (Denmark)

    Villeseche, Florence

    or leaders and their social identity as women. Accordingly, I here seek to answer the following question: what dilemmas arise from the collective institutional work performed by actors facing institutional contradiction between their occupational and gender identity, and how are those dilemmas addressed? I......Women’s presence in the labor market is one of the major institutional changes of the past century. However, in particular at higher hierarchical levels, gender equality still remains a distant objective. The ideal-type of the worker, manager or leader is this largely a masculine one, thus...... associating the related occupational identity to a masculine gender social identity. Thus, it can be argued that women in organizations can face an “institutional contradiction” between their occupation and their gender – i.e a perceived discordancy between their social occupational identity as managers...

  1. DEVELOPING PLURILINGUAL IDENTITY IN THIRD LANGUAGE CLASSROOM

    Directory of Open Access Journals (Sweden)

    HACKETT-JONES A.V.

    2015-01-01

    Full Text Available The article analyzes the notions of plurilingualism and plurilingual identity through the prism of the concepts of multilingualism and multilingual identity and the perspective of the theories of bilingualism. The article suggests that plurilingual identity can be viewed as an objective in third language (second foreign language teaching and contemplates specific characteristic imposed on a third language learner by the process of third language acquisition and the necessity of managing a certain imbalance between the degrees of language command and culture experience in different target languages.

  2. DEVELOPING PLURILINGUAL IDENTITY IN THIRD LANGUAGE CLASSROOM

    Directory of Open Access Journals (Sweden)

    HACKETT-JONES A.V.

    2015-12-01

    Full Text Available The article analyzes the notions of plurilingualism and plurilingual identity through the prism of the concepts of multilingualism and multilingual identity and the perspective of the theories of bilingualism. The article suggests that plurilingual identity can be viewed as an objective in third language (second foreign language teaching and contemplates specific characteristic imposed on a third language learner by the process of third language acquisition and the necessity of managing a certain imbalance between the degrees of language command and culture experience in different target languages.

  3. Elective Identities, (Culture, Identization and Integration)

    NARCIS (Netherlands)

    S.J. Magala (Slawomir)

    2002-01-01

    textabstractMost of contemporary individual and social identities (constructed with societal, cultural and technological resources) are radically autonomous, nomadic and virtual - i.e. they are de-traditionalized, open to negotiation and not based on a single interpretation of a tradition.

  4. RFID-based Electronic Identity Security Cloud Platform in Cyberspace

    OpenAIRE

    Bing Chen; Chengxiang Tan; Bo Jin; Xiang Zou; Yuebo Dai

    2012-01-01

    With the moving development of networks, especially Internet of Things, electronic identity administration in cyberspace is becoming more and more important. And personal identity management in cyberspace associated with individuals in reality has been one significant and urgent task for the further development of information construction in China. So this paper presents a RFID-based electronic identity security cloud platform in cyberspace to implement an efficient security management of cyb...

  5. (Re)scaling identities

    DEFF Research Database (Denmark)

    Koefoed, Lasse Martin; Simonsen, Kirsten

    2012-01-01

    of Pakistani origin, the study employs theoretical ideas of estrangement, identification and recognition in order to obtain a thorough understanding of the complexity and the contradictory character of their spatial identities and affiliations. A turning point in the double processes of estrangement...... of identity....

  6. Value Conditionality of Identity

    Directory of Open Access Journals (Sweden)

    M M Yusupov

    2013-12-01

    Full Text Available The article considers theoretical approaches to the study of values and identity, and reveals the role of values in the formation of the ethnic, regional and Russian identity on the example of Chechnya and the North Caucasus, with the sociological indicators characterizing value orientations and self-identification.

  7. Self and social identity

    NARCIS (Netherlands)

    Ellemers, N; Spears, R; Doosje, B

    2002-01-01

    In this chapter, we examine the self and identity by considering the different conditions under which these are affected by the groups to which people belong. From a social identity perspective we argue that group commitment, on the one hand, and features of the social context, on the other hand,

  8. Children's Social Identities

    Science.gov (United States)

    Bennett, Mark

    2011-01-01

    This paper provides a brief overview of recent developmental research on themes related to children's social identities. Initially, consideration is given to the capacity for social categorization, following which attention is given to children's developing conceptions of social identities, their identification with social groups, and the…

  9. Corporate identity. Brand designs.

    Science.gov (United States)

    Mathieson, Steve

    2004-02-19

    The past two years have seen a steadily more consistent brand identity for the NHS. Branding will become more important as foundation status and PCT commissioning makes acute hospitals more competitive. This has put pressure on some trusts that have their own strong identities.

  10. Identities-in-action

    DEFF Research Database (Denmark)

    Stentoft, Diana; Valero, Paola

    2009-01-01

    The notion of identity is often used in mathematics education research in an attempt to link individual and social understandings of mathematical learning. In this paper we review existing research making use of the notion of identity, and we point to some of the strengths and weaknesses in the w...

  11. Identity without Membership?

    DEFF Research Database (Denmark)

    Dobusch, Leonhard; Schoeneborn, Dennis

    the formation of organizational identity in more fluid organizational settings. Drawing on an empirical study of the hacker collective Anonymous, we show that organizational identity is formed through public communicative events that are subject to meaning negotiation whether or not actions can be attributed...

  12. Personal Identity in Japan

    Science.gov (United States)

    Sugimura, Kazumi; Mizokami, Shinichi

    2012-01-01

    This chapter explores characteristics of identity formation among Japanese adolescents and young adults living in a cultural context where individualism has been increasingly emphasized even while maintaining collectivism. We argue that, to develop a sense of identity in Japanese culture, adolescents and young adults carefully consider others'…

  13. Multicultural identity processes.

    Science.gov (United States)

    Hong, Ying-Yi; Zhan, Siran; Morris, Michael W; Benet-Martínez, Verónica

    2016-04-01

    The study of multicultural identity has gained prominence in recent decades and will be even more urgent as the mobility of individuals and social groups becomes the 'new normal'. This paper reviews the state-of-the-art theoretical advancements and empirical discoveries of multicultural identity processes at the intrapersonal, interpersonal, and collective (e.g., organizational, societal) levels. First, biculturalism has more benefits for individuals' psychological and sociocultural adjustment than monoculturalism. Bicultural individuals' racial essentialist beliefs and Bicultural Identity Integration affect cultural frame switching, racial categorization, and creativity. Second, identity denial and identity-based discrimination by other people or groups threaten multicultural individuals' psychological health and performance. Third, multiculturalism and interculturalism policies are associated with different conceptions of and attitudes toward diversity, and have distinct outcomes for multicultural individuals and societies. Copyright © 2015 Elsevier Ltd. All rights reserved.

  14. Identity as wrapping up

    DEFF Research Database (Denmark)

    Nickelsen, Niels Christian Mossfeldt

    2015-01-01

    The aim of this paper is to provide an understanding of cross-professional collaboration and to develop a notion of professional identity based in practice. The background of the paper is science and technology studies and more precisely actor network theory. The method used: The empirical analysis...... in close relation to the making of a report concerning the cross-professional collaboration. Findings are that “Identity as wrapping up” points to the way in which certain actors, by other actors, are maneuvered into certain pockets in a network. Identity as wrapping up is emphasized as a way...... of participating, which is closely connected to the intention to control the relation towards the other. Thus identity as wrapping up is argued to be a strategy to optimize the situation of one’s own profession. Conclusion: This articulation of identity contributes to the actor network literature as well...

  15. Researcher Identity in Transition

    DEFF Research Database (Denmark)

    Castelló, Montserrat; Kobayashi, Sofie; McGinn, Michelle K.

    2015-01-01

    to reinterpretation, and ECRs need to attend to new or reimagined signals in their efforts to develop a researcher identity in this current context. In this article, we present a comprehensive framework for researcher identity in relation to the ways ECRs recognise and respond to divergent signals across spheres...... of activity. We illustrate this framework through eight identity stories drawn from our earlier research projects. Each identity story highlights the congruence (or lack of congruence) between signals across spheres of activity and emphasises the different ways ECRs respond to these signals. The proposed...... comprehensive framework allows for the analysis of researcher identity development through the complex and intertwined activities in which ECRs are involved. We advance this approach as a foundation for a sustained research agenda to understand how ECRs identify and respond to relevant signals, and...

  16. Visual identity and rebranding

    Directory of Open Access Journals (Sweden)

    Katarzyna Wrona

    2015-06-01

    Full Text Available The goal of this article is to highlight the essence of visual identification and rebranding, as well as to discuss elements of corporate identity, which are subject to revitalization in the process of refreshing the image of a brand. In the first part the article the analysis of the term visual identification is conducted. In the analysis special attention is drawn to the role of visual identification in creating a coherent identity of an organization. In the subsequent chapters further components of corporate identity are presented in detail – starting with logotype, through business forms, advertisements, accompanying materials and Internet websites to signs on buildings. Moreover, corporate identity book as a collection of standards and guidelines for application of corporate identity rules is discussed. The deliberations are based on the study of literature. The last chapter presented the transformation of the brand of Institute of Aviation.

  17. Vocational Identity and Ego Identity Status in Korean Nursing Students

    Directory of Open Access Journals (Sweden)

    Hyun-Young Koo, PhD, RN

    2016-03-01

    Conclusions: These findings show that nursing students in identity achievement status have secure and clear vocational identities. Further longitudinal and qualitative studies are needed to find out if identity formation among nursing students changes with age.

  18. Gender identity disorder.

    LENUS (Irish Health Repository)

    De Gascun, C

    2006-05-01

    Gender Identity Disorder (GID) is a relatively rare condition of atypical gender development in which there is a psychological perception of self as masculine or feminine which is incongruent with ones phenotype. GID replaced the term Transsexualism in DSM-IV in 1994. The demographics of GID in Ireland have not been established. Since 2000 we have received 52 referrals of individuals with confirmed GID to our endocrine service for consideration for hormonal treatment (HT). Of the 52 patients 45 have male to female (MTF) GID (mean age 38.9 years) and 7 have female to male (FTM) GID (mean age 30.7 years). The age at presentation in this group is approximately 9 years older than in international series for both MTF (39 years v 30yrs) and FTM (31 yrs v 22yrs). The karyotype where analysed has been normal for their phenotypic sex. Twenty-three of the patients had received HT prior to attending our clinic that in only one case had been prescribed by a specialist. A number of patients had obtained HT via the internet or from overseas sources without medical review. Eighteen of the patients have been or are married and 14 of the group have children. The scale of referrals confirms that GID exists in the Irish population to a significant degree. Thus an appropriate care pathway for people with the condition needs to be established. This will facilitate optimum medical management of the patient group and a coherent approach to the many difficult social issues faced individuals with this disorder.

  19. Understanding family dynasty: Nurturing the corporate identity across generations

    Directory of Open Access Journals (Sweden)

    Nemilentsev, M.

    2010-01-01

    Full Text Available This study aims to analyse the Ahlstrom annual reports. The content analysis contributes to family business corporate identity. According to the results family business corporate identity is based both on history and on the future. Human resource management, customer relationships, high quality, and also family ownership reflect corporate identity in large family corporations. Modern family business corporate identity is based on continuously developing the business concept and its core competency. Meeting the needs of customers and technical quality standards combined with upgrading and developing the business idea characterises family business corporate identity.

  20. Personal number Management : personal numbers and identity fraud – number strategies for security and privacy in an information society - part 1

    NARCIS (Netherlands)

    Grijpink, J.H.A.M.

    2002-01-01

    For the sake of clarity and manageability, this article is in the form of a checklist. It will be published in two parts. The first part in this issue presents some practical and juridical characteristics of personal number systems. But at the end of the day, it is the number strategy that

  1. Population genetics of traditionally managed maize : farming practice as a determinant of genetic structure and identity of maize landraces in Mexico

    NARCIS (Netherlands)

    Heerwaarden, van J.

    2007-01-01

    A large amount of crop genetic diversity is being maintained in farmers' fields worldwide. The population genetics of traditionally managed landraces is therefore of interest to the conservation of genetic resources. The growing trend towards agricultural modernization and the prospect of

  2. Personal Identity Online

    DEFF Research Database (Denmark)

    Rodogno, Raffaele

    2012-01-01

    Philosophers concerned with the question of personal identity have typically been asking the so-called re-identification question: what are the conditions under which a person at one point in time is properly re-identified at another point in time? This is a rather technical question. In our...... everyday interactions, however, we do raise a number of personal identity questions that are quite distinct from it. In order to explore the variety of ways in which the Internet may affect personal identity, I propose in this study to broaden the typical philosophical horizon to other more mundane senses...... of the question. In Section 2, I describe a number of possible meanings of personal identity observed in everyday contexts and more philosophical ones. With some caveats, I argue that it is the specific context in which the question arises that disambiguates the meaning of the question. Online contexts are novel...

  3. Researcher Identities in Transition

    DEFF Research Database (Denmark)

    Castelló, Montserrat; Wisker, Gina; Kobayashi, Sofie

    as other emergent ‘signals’, the latent or clear indications from institutions and academic communities regarding career directions and necessary professional skills and attitudes should be identified and interpreted for researchers to adequately develop their new identities. The aim of this paper......Researchers are now embarked upon what we define as a ‘risk career’, rather than, as previously, a relatively more predictable academic career. In this changing context, traditional milestones that enabled early career researchers to build their identities are disappearing. Instead, what we define...... is twofold: a) to present a comprehensive framework of the notion of researcher identity by means of analysing those spheres of activity related to researcher and career development; and b) to relate researcher identities to the experiences of early career researchers with issues concerning signals...

  4. Primary Identity in Literature

    DEFF Research Database (Denmark)

    Graham, Brian Russell

    In our times, literary criticism, as well as larger political and cultural developments, is characterized by identity politics, meaning that our discourses are structured around the notion of different socially identifiable populations in society. In relation to literature, this results in our...... viewing the characters in literature in terms of these political identities. Literature is consequently discussed in relation to political causes. Literary criticism is animated by the same causes, and is viewed as having a direct intervention in society in relation to them. In this paper, I will discuss......, in relation to Frye’s works, the idea that the primary identities of characters in literature were and, to a considerable extent, continue to be those of family-member identities. As such, literature should not be appropriated to a political context too readily. Whereas viewing characters in terms of...

  5. Music, culture and identity

    Directory of Open Access Journals (Sweden)

    Ilir Ramadani

    2017-03-01

    Full Text Available At the time of globalization it is difficult to pretend avoiding music culture and identity from political, cultural and social developments. Thus, it is impossible for the music to be unshakable and to represent national identity by not taking and giving nothing to culture. The dynamics of life and the rapid development of technology make it impossible for the culture to remain unaffected in terms of sharing experiences social experiences. Culture represents our current course, both in terms of politics, also in the social and human aspects. Through the technology it is possible for our children to be equal with children of all other countries, to exchange information and to connect directly with all countries of the world. Musical education is one of the main factors of cultural development and preservation of national identity. Identity consists of everything we posses and reflect. We are those who distinguish from each other and have a common denominator compared to other nations.

  6. WORK AND LEARNER IDENTITY

    DEFF Research Database (Denmark)

    Kondrup, Sissel

    2015-01-01

    The aim of this article is to suggest a theoretical framework than can assess to how people’s engagement in specific historical and social work practices are significant to their development, maintenance or transformation of a learner identity. Such a framework is crucial in order to grasp how...... different groups have distinctive conditions for meeting the obligation of forming a proactive learner identity and engage in lifelong learning prevalent in both national and transnational policies on lifelong learning....

  7. Introduction: Discourses of Identity

    DEFF Research Database (Denmark)

    Madsen, Peter

    2016-01-01

    Analysis of usages of ideas of 'identity' in relation to migration in Britain, France, and Germany, as well as in the Serbian anti-muslim war - with a view of demonstrating conceptual context of the usages.......Analysis of usages of ideas of 'identity' in relation to migration in Britain, France, and Germany, as well as in the Serbian anti-muslim war - with a view of demonstrating conceptual context of the usages....

  8. Developing Identity for Lawyers

    OpenAIRE

    Høedt-Rasmussen, Inger

    2014-01-01

    The role of the lawyer is in transition and the formerly predominantly homogeneous profes-sion has become a heterogeneous group of lawyers with diverging perceptions of the lawyer’s identity and of the main characteristics of the profession. The European Union has extended the perception of democracy and the fundamental rights to include more collective rights, social concerns, global responsibility and sustainability. The dissertation’s main question is: How can the identity and competen...

  9. Traços identitários da enfermeira-gerente em hospitais privados de Belo Horizonte, Brasil The nurse manager's identity features in private hospitals of Belo Horizonte, Brazil

    Directory of Open Access Journals (Sweden)

    Maria José Menezes Brito

    2008-06-01

    Full Text Available Com o propósito de compreender aspectos subjetivos do trabalho da enfermeira-gerente, buscou-se, por meio deste estudo, analisar os traços identitários da enfermeira-gerente no contexto de instituições hospitalares a partir do questionamento fundamentado na apresentação que os sujeitos fazem de si mesmos. Trata-se de um estudo de caso, com abordagem qualitativa, do qual participaram nove enfermeiras-gerente que atuam em quatro instituições hospitalares privadas de médio e grande porte, no município de Belo Horizonte. Os traços identitários foram organizados de acordo com os planos profissional, organizacional e individual, os quais abrangem: preservação e reforço de identidade social da enfermeira, a trajetória profissional como uma evolução da prática da assistência para o exercício da gerência, valorização da experiência prática e permanência em atividades ligadas à prestação da assistência direta ao paciente; identificação com a organização; e questões relativas à vida privada e auto-imagem positiva expressa pelas gerentes. O estudo permitiu a identificação de traços marcantes de um grupo profissional específico, evidenciando a influência das questões de gênero, das relações de poder e da cultura na identidade social dos sujeitos pesquisados.Aiming to understand subjective aspects of the work of nurse managers, this study analyzed their identity features in the context of hospital institutions. These were obtained through a questioning based on the introduction that the subjects make of themselves. It is a case study carried out according to the qualitative approach, in which nine nurse managers participated. They worked at four large- and medium-sized private hospitals in the city of Belo Horizonte. The identity features were organized in accordance with the professional, institutional and individual planes, which encompass: the preservation and reinforcement of the nurse's social identity

  10. Tools for Understanding Identity

    Energy Technology Data Exchange (ETDEWEB)

    Creese, Sadie; Gibson-Robinson, Thomas; Goldsmith, Michael; Hodges, Duncan; Kim, Dee DH; Love, Oriana J.; Nurse, Jason R.; Pike, William A.; Scholtz, Jean

    2013-12-28

    Identity attribution and enrichment is critical to many aspects of law-enforcement and intelligence gathering; this identity typically spans a number of domains in the natural-world such as biographic information (factual information – e.g. names, addresses), biometric information (e.g. fingerprints) and psychological information. In addition to these natural-world projections of identity, identity elements are projected in the cyber-world. Conversely, undesirable elements may use similar techniques to target individuals for spear-phishing attacks (or worse), and potential targets or their organizations may want to determine how to minimize the attack surface exposed. Our research has been exploring the construction of a mathematical model for identity that supports such holistic identities. The model captures the ways in which an identity is constructed through a combination of data elements (e.g. a username on a forum, an address, a telephone number). Some of these elements may allow new characteristics to be inferred, hence enriching the holistic view of the identity. An example use-case would be the inference of real names from usernames, the ‘path’ created by inferring new elements of identity is highlighted in the ‘critical information’ panel. Individual attribution exercises can be understood as paths through a number of elements. Intuitively the entire realizable ‘capability’ can be modeled as a directed graph, where the elements are nodes and the inferences are represented by links connecting one or more antecedents with a conclusion. The model can be operationalized with two levels of tool support described in this paper, the first is a working prototype, the second is expected to reach prototype by July 2013: Understanding the Model The tool allows a user to easily determine, given a particular set of inferences and attributes, which elements or inferences are of most value to an investigator (or an attacker). The tool is also able to take

  11. The Process of Identity Work: Negotiating a Work Identity

    NARCIS (Netherlands)

    Crafford, A.; Adams, B.G.; Saayman, T.; Vinkenburg, C.J.; Jansen, P.G.W.; Roodt, G.

    2015-01-01

    Identity work is an important process in negotiating, regulating and maintaining a coherent sense of self-(identity). In this chapter we discuss how identity work is particularly useful in establishing a work identity. The crux of the discussion in this chapter is based on the qualitative phase of

  12. Connecting the dots within: creative performance and identity integration.

    Science.gov (United States)

    Cheng, Chi-Ying; Sanchez-Burks, Jeffrey; Lee, Fiona

    2008-11-01

    In two studies drawing from social identity theory and the creative-cognition approach, we found that higher levels of identity integration--perceived compatibility between two social identities--predict higher levels of creative performance in tasks that draw on both identity-relevant knowledge domains. Study 1 showed that Asian Americans with higher identity integration were more creative in developing new dishes using a given set of ingredients, but only when both Asian and American ingredients were available. Study 2 showed that female engineers with higher identity integration were more creative in designing a product, but only when the product was targeted to female users. These findings suggest that the psychological management of multiple social identities may be related to accessibility of multiple knowledge domains, which in turn influences creativity.

  13. Identical Twin Primigravid Sisters -Spontaneous Labour and ...

    African Journals Online (AJOL)

    We report 2 cases of identical twin sisters, the older sibling getting married 14 months earlier but both got pregnant for their first child at about the same time and were managed by the same Obstetrician and fell into spontaneous labour within a few hours of each other. Both were delivered by emergency caesarean section ...

  14. Identity, gender and teaching English in Japan

    CERN Document Server

    Nagatomo, Diane Hawley

    2016-01-01

    How do teachers, who have chosen to settle down in one country, manage the difficulties of living and teaching English in that country? This book answers this question by investigating the personal and professional identity development of ten Western women with Japanese spouses who teach English in various educational contexts in Japan.

  15. Identity Expansion and Transcendence

    Directory of Open Access Journals (Sweden)

    William Sims Bainbridge

    2014-05-01

    Full Text Available Emerging developments in communications and computing technology may transform the nature of human identity, in the process rendering obsolete the traditional philosophical and scientific frameworks for understanding the nature of individuals and groups.  Progress toward an evaluation of this possibility and an appropriate conceptual basis for analyzing it may be derived from two very different but ultimately connected social movements that promote this radical change. One is the governmentally supported exploration of Converging Technologies, based in the unification of nanoscience, biology, information science and cognitive science (NBIC. The other is the Transhumanist movement, which has been criticized as excessively radical yet is primarily conducted as a dignified intellectual discussion within a new school of philosophy about human enhancement.  Together, NBIC and Transhumanism suggest the immense transformative power of today’s technologies, through which individuals may explore multiple identities by means of online avatars, semi-autonomous intelligent agents, and other identity expansions.

  16. Learning as Negotiating Identities

    DEFF Research Database (Denmark)

    Jørgensen, Kenneth Mølbjerg; Keller, Hanne Dauer

    The paper explores the contribution of Communities of Practice (COP) to Human Resource Development (HRD). Learning as negotiating identities captures the contribution of COP to HRD. In COP the development of practice happens through negotiation of meaning. The learning process also involves modes...... of belonging constitutive of our identities. We suggest that COP makes a significant contribution by linking learning and identification. This means that learning becomes much less instrumental and much more linked to fundamental questions of being. We argue that the COP-framework links learning with the issue...... of time - caught in the notion of trajectories of learning - that integrate past, present and future. Working with the learners' notion of time is significant because it is here that new learning possibilities become visible and meaningful for individuals. Further, we argue that the concept of identity...

  17. On the fundamentals of identity

    NARCIS (Netherlands)

    van der Gaag, Mandy

    Various new perspectives on identity have been introduced or have increased in popularity over the past two decades. These include identity as dynamic system (Kunnen & Bosma, 2001), a narrative approach to identity (McAdams, 2001), multi-dimensional models of identity formation (Luyckx et al., 2006;

  18. Balancing Fairness and Efficiency: The Impact of Identity-Blind and Identity-Conscious Accountability on Applicant Screening

    Science.gov (United States)

    Self, William T.; Mitchell, Gregory; Mellers, Barbara A.; Tetlock, Philip E.; Hildreth, J. Angus D.

    2015-01-01

    This study compared two forms of accountability that can be used to promote diversity and fairness in personnel selections: identity-conscious accountability (holding decision makers accountable for which groups are selected) versus identity-blind accountability (holding decision makers accountable for making fair selections). In a simulated application screening process, undergraduate participants (majority female) sorted applicants under conditions of identity-conscious accountability, identity-blind accountability, or no accountability for an applicant pool in which white males either did or did not have a human capital advantage. Under identity-conscious accountability, participants exhibited pro-female and pro-minority bias, particularly in the white-male-advantage applicant pool. Under identity-blind accountability, participants exhibited no biases and candidate qualifications dominated interview recommendations. Participants exhibited greater resentment toward management under identity-conscious accountability. PMID:26660723

  19. Splitting Ward identity

    Energy Technology Data Exchange (ETDEWEB)

    Safari, Mahmoud [Institute for Research in Fundamental Sciences (IPM), School of Particles and Accelerators, P.O. Box 19395-5531, Tehran (Iran, Islamic Republic of)

    2016-04-15

    Within the background-field framework we present a path integral derivation of the splitting Ward identity for the one-particle irreducible effective action in the presence of an infrared regulator, and make connection with earlier works on the subject. The approach is general in the sense that it does not rely on how the splitting is performed. This identity is then used to address the problem of background dependence of the effective action at an arbitrary energy scale. We next introduce the modified master equation and emphasize its role in constraining the effective action. Finally, application to general gauge theories within the geometric approach is discussed. (orig.)

  20. Social identities and risk

    DEFF Research Database (Denmark)

    Blok, Anders; Jensen, Mette; Kaltoft, Pernille

    2008-01-01

    Expert-based environmental and health risk regulation is widely believed to suffer from a lack of public understanding and legitimacy. On controversial issues such as genetically modified organisms and food-related chemicals, a "lay-expert discrepancy" in the assessment of risks is clearly visible...... of social identities. On the basis of qualitative interviews with citizens and experts, respectively, we focus on the multiple ways in which identities come to be employed in actors' risk accounts. Empirically, we identify salient characteristics of "typical" imagined experts and lay-people, while arguing...

  1. Splitting Ward identity

    International Nuclear Information System (INIS)

    Safari, Mahmoud

    2016-01-01

    Within the background-field framework we present a path integral derivation of the splitting Ward identity for the one-particle irreducible effective action in the presence of an infrared regulator, and make connection with earlier works on the subject. The approach is general in the sense that it does not rely on how the splitting is performed. This identity is then used to address the problem of background dependence of the effective action at an arbitrary energy scale. We next introduce the modified master equation and emphasize its role in constraining the effective action. Finally, application to general gauge theories within the geometric approach is discussed. (orig.)

  2. Law and Identity

    DEFF Research Database (Denmark)

    Schmidt, Garbi

    2011-01-01

    processes of social integration. Within media-based and political debates, transnational marriages are frequently described as practices destructive both to individual freedom and to Danish national identity. Nonetheless, it is a practice in which both minority and majority citizens engage, one that frames...... both their family lives and their lives as citizens. This article analyses the dynamic relationship between public discourse and practices of transnational marriage. The first part describes how political and legislative perceptions of transnational (arranged) marriages are situated within a discussion......' expressions of autonomy and choice and their adaptations of such concepts to understandings of social belonging, inclusion and identity formation vis--vis the Danish nation-state....

  3. Editorial: Negotiating Gamer Identities

    Directory of Open Access Journals (Sweden)

    Matthew Barr

    2016-07-01

    Full Text Available The term ‘gamer identity’ is hotly contested, and certainly not understood as a broadly accepted term. From the outdated stereotype of white, heterosexual, teenage boys playing Nintendo in their parents’ basement to the equally contested proclamation that “‘gamers’ are over”, the current game culture climate is such that movements as divisive and controversial as #gamergate can flourish. For this latest special issue of Press Start, we invited submissions regarding the recent controversies surrounding the notion of player identities, with the aim of receiving papers from different viewpoints on gamer identity and culture.

  4. Corporate Brand Identity in SMEs

    DEFF Research Database (Denmark)

    Mäläskä, Minna; Jones, Richard Ian

    Purpose: To study the emergence of corporate brand identity in SMEs and to develop a typology of brand identity drivers that reflects a co-creative approach to the emergence of brand identity. Design / Methodology / Approach : Existing approaches to brand identity are summarised. A narrative...... studies. The research is important since it suggests an iterative and co-creative approach to brand identity. A typology of brand identity formation for SMEs is presented: entrepreneur driven, market driven, stakeholder driven. Practical implications: The three paths to creating a strong brand identity...... challenge existing notions that brand identity is based solely on the values of the entrepreneur. This typology suggests that SMEs should be open to creating an identity that draws from their stakeholder eco-system. Originality / value: this research challenges the existing assumption that brand identity...

  5. Language, Identity, and Exile

    Science.gov (United States)

    Erdinast-Vulcan, Daphna

    2010-01-01

    The exilic mode of being, a living on boundary-lines, produces a constant relativization of one's home, one's culture, one's language, and one's self, through the acknowledgement of otherness. It is a homesickness without nostalgia, without the desire to return to the same, to be identical to oneself. The encounter with the other which produces a…

  6. Bilingualism versus identity

    DEFF Research Database (Denmark)

    Hermann, Jesper

    1988-01-01

    During the last hundred years psychologists, philosophers and theologians have developed two different conceptions of personal identity. One of them insists that each person is a unique and transcendental being, whereas the other finds the personality deriving from interaction with other persons....... (This is the prevailing view today.) These theories are placed in relation to the difficulties an immigrant encounters....

  7. Language and Identity Explored

    Directory of Open Access Journals (Sweden)

    Thomas Rozanov

    2016-06-01

    Full Text Available The relationship between language and identity is widely discussed in applied linguistics, sociology, communications and other related scholarly fields. Furthermore, many researchers have focused on the post-Soviet region, which given its unique historical context allows for testing of this relationship. The widespread bilingualism as a result of historical russification and the linguistic transformations that occurred after the collapse of the Soviet Union make the region a ‘sociolinguistic playground’. Recent events in Ukraine have given grounds to further explore this relationship, now in attempt to link language and identity as potential forces for geopolitical change in the region. This paper presents an overview of existing research, theories, and opposing perspectives related to the relationship between language and identity, and considers complications such as historical russification, religious influence, socioeconomic factors, and education with regards to the Ukrainian and post-Soviet context.  I aim to illustrate the significance of language and its effects on socio-political change in the case of Ukraine, by presenting arguments and complications in support of the relationship between language and identity.

  8. Shifting Design Consultancy Identities

    DEFF Research Database (Denmark)

    Larsen, Henry; Huijboom, Nina; Holm Nielsen, Anne

    2014-01-01

    and identities that resonate more with freelancing and portfolio careers than with the intention of creating firms that are intended to expand. We recognized a pattern where freelancers build up their work as a portfolio by moving from one engagement to another, a process that we will call sequential freelancing...

  9. Migration, Narration, Identity

    DEFF Research Database (Denmark)

    Leese, Peter

    three consecutive summers from 2010 to 2012. The articles focus on various aspects of the migrant experience and try to answer questions about migrant identity and its representations in literature and the media. The book closes with an original play by Carlos Morton, the Chicano playwright working...

  10. The Visual Identity Project

    Science.gov (United States)

    Tennant-Gadd, Laurie; Sansone, Kristina Lamour

    2008-01-01

    Identity is the focus of the middle-school visual arts program at Cambridge Friends School (CFS) in Cambridge, Massachusetts. Sixth graders enter the middle school and design a personal logo as their first major project in the art studio. The logo becomes a way for students to introduce themselves to their teachers and to represent who they are…

  11. Work and Female Identity.

    Science.gov (United States)

    Reohr, Janet R.

    In climbing an organizational ladder dominated by males, the professional woman encounters obstacles to the more traditional feminine behaviors and mannerisms to which she may be accustomed. These obstacles may erode her sense of identity, creating difficulties both inside and outside of her work environment. Traditional distinctions between…

  12. Positioning health professional identity

    DEFF Research Database (Denmark)

    Lund, Ole; Krogh Christensen, Mette; Mørcke, Anne Mette

    2017-01-01

    Drawing on positioning theory, the purpose of this paper is to characterize the activities and positions of students and supervisors at workplaces and on-campus skills training sites across the higher health professional educations of medicine, sports science, and nursing. Furthermore, the study ...... explored the impact of work-based learning (WBL) and skills training on students’ personal professional identity development....

  13. Dissociative Identity Disorder

    Science.gov (United States)

    Schmidt, Tom

    2007-01-01

    Few psychological disorders in the Diagnostic Statistical Manual have generated as much controversy as Dissociative Identity Disorder (DID). For the past 35 years diagnoses of DID, previously referred to as Multiple Personality Disorder (MPD), have increased exponentially, causing various psychological researchers and clinicians to question the…

  14. Spatial Identity in Gagauzia

    Directory of Open Access Journals (Sweden)

    A. V. Salavatova

    2015-01-01

    Full Text Available Historically the gagauz developed a self-perception based on their difference from Moldova as well as the ‘Turkish world’. The article argues that this fact has determined their pro-Russian political orientation as the only possible way of maintaining their identity

  15. Body Integrity Identity Disorder

    NARCIS (Netherlands)

    Blom, Rianne M.; Hennekam, Raoul C.; Denys, Damiaan

    2012-01-01

    Introduction: Body Integrity Identity Disorder (BIID) is a rare, infrequently studied and highly secretive condition in which there is a mismatch between the mental body image and the physical body. Subjects suffering from BIID have an intense desire to amputate a major limb or severe the spinal

  16. Fluidity, Identity, and Organizationality

    DEFF Research Database (Denmark)

    Dobusch, Leonhard; Schoeneborn, Dennis

    2015-01-01

    that the organizationality of a social collective is accomplished through “identity claims”—i.e., speech acts that concern what the social collective is or does—and negotiations on whether or not these claims have been made on the collective's behalf. We empirically examine the case of the hacker collective Anonymous...

  17. Professions and their Identities

    DEFF Research Database (Denmark)

    Krejsler, John

    2005-01-01

    analytical strategies can frame in sufficiently complex ways what it means to be a professional today. It is assumed that at least four main issues must be dealt with in order to conduct a satisfactory analysis of professions and their identities. Firstly, it is of fundamental strategic importance that one...

  18. Regional identity and family

    Directory of Open Access Journals (Sweden)

    Tripković Gordana D.

    2003-01-01

    Full Text Available This paper is a continuation of a study on regionalisation and family, within the project named Sociological Aspects of Multiculturality and Regionalisation and their influence on the development of AP Vojvodina and the Republic of Serbia. The author focuses her attention to operationalisation of the theoretical and methodological premises that were developed in the previous paper (Tripković, 2002: 111-127, which means that it represents the results of the second phase of the research plan. This phase includes adjusting of theoretical concepts to the fieldwork displaying the results of the research and the analysis of the findings that put a family in the context of confronting different identities, above all national and regional. As possible "identity difference" was emphasized in the research, theoretical and methodological apparatus was adjusted to this goal. That is why in this paper the replies of interviewees that can suggest or reject the assumption that their national identity can influence significantly the evaluation of identity specificities are presented and analyzed, concerning more or less visible aspects of family life, like welfare status, relations between spouses, respect to the elder, family harmony, number of children, connections with relatives, etc.

  19. Identity Formation in Career Development for Gifted Women.

    Science.gov (United States)

    Phelps, Christine E.

    1991-01-01

    Necessary developmental tasks concerned with identity development of gifted college women include developing competence, managing emotions, developing autonomy, establishing identity, freeing interpersonal relationships, developing purpose, and developing integrity. These issues may be used as counseling interventions to raise career aspirations.…

  20. Imagining Geographies, Mapping Identities

    Directory of Open Access Journals (Sweden)

    Matthew Graves

    2015-03-01

    Full Text Available The ambition of this issue of Portal is to reach across the methodological boundaries of history, politics, literature and geography to apply their complementary perspectives to the study of identity and its relation to space and place, an aim that involves attempting to identify the many different ways the notoriously slippery concepts of identity and geography may intersect. For this issue we have selected articles that cast a fresh perspective on two areas where identity and geography intersect: the construction of identity through the imaginative recreation of place in literature: Mapping Literary Spaces; and the study of the shifting relationships of centre and periphery, exclusion and inclusion in urban settings and geopolitical confrontations: Social and Political Peripheries. Gerard Toal has written that geography is not a noun but a verb: it does not describe what space is but studies what we do with space, imaginatively and politically. The articles in this issue illustrate the exercise of the literary and political imagination and the role of materiality and memory in the creation of geographic representation. They show too a new awareness of the centrality of space in the constitution of identities, and the need for a new geocritical reading of its discourse, as the interrelations of place and community are played out on the many scales of social and political life, from the local to the global.   The special issue is organised thus: Introduction Matthew Graves (Aix-Marseille University & Liz Rechniewski (Sydney University: “Imagining Geographies, Mapping Identities.” I. Mapping Literary Spaces - Isabelle Avila (University of Paris XIII, "Les Cartes de l'Afrique au XIXe siècle et Joseph Conrad : Perceptions d'une Révolution Cartographique." - Daniela Rogobete (University of Craiova, "Global vs Glocal: Dimensions of the post-1981 Indian English Novel." II. Social and Political Peripheries - Elizabeth Rechniewski (Sydney

  1. Rights of Identity

    Directory of Open Access Journals (Sweden)

    Daniel Kofman

    2017-01-01

    Full Text Available A person’s identity is their sense of who and what they are, of who stands in significant relations to them, and of what is valuable to them. This is inevitably very broad, an immediate implication of which is that the concept of identity taken alone cannot do significant normative work. In some cases a person’s identity is bound up with the evil that they do or wish to do, and cannot thereby give them any right to do it. In other cases very powerful elements of a person’s identity – such as their attachment to loved ones – is certainly related to important rights, but it is not entirely clear that one needs the concept of identity to explicate or justify these rights; the deep involvement of their identity is arguably a byproduct of other important values in these cases (such as love, and those values can do the grounding work of the rights by themselves and more simply and clearly. Nevertheless, when suitably qualified, a person’s identity is central to accounting for important political rights. These ranges from rights to participate in cultural practices of one’s group, which sometimes implies duties on governments to support minorities threatened with extinction, to – at the outer limit – rights to arrange political administration. These rights are connected to both autonomy and fairness. Cultural rights are often taken either to be opposed to autonomy, or at best instrumental to personal autonomy (by providing ‘options’, but in fact, the ideal of autonomy, expressed by Mill as being the author of one’s life, requires that one be in control of significant aspects of one’s identity. Significant aspects of one’s identity are collectively determined within a culture. Cultures are not static, and their development is particularly affected by political boundaries. A fundamental right of autonomy implies, therefore, that groups be allowed, within reasonable constraints of general feasibility and stability, to arrange

  2. Narrating Organisational Identities by Way of Evolutionary Tales

    DEFF Research Database (Denmark)

    Backer, Lise

    2008-01-01

    The article draws on publicly available data to analyse how, since the Rio Environmental Summit in 1992, the narration of the multinational oil company Shell have projected an evolution from an oil company identity to an identity also embracing renewable energies. In analysing the narrative battles...... over Shell's organisational identity the article contributes to the field of organisational identity theory. It does so by providing a rich description of the micro processes through which individual management actors seek by telling different evolutionary tales to get the larger corporate actor...

  3. An exploratory Q study of corporate brand identity elements ...

    African Journals Online (AJOL)

    kirstam

    2014-12-09

    Dec 9, 2014 ... brand, creative marketing, effective management and administration ... (brand identity) and how the customers perceive them (brand image) .... corporate brand, which focuses on values, relationships and culture, fulfils a more.

  4. Rapid Transformation in a Dual Identity Defense University

    National Research Council Canada - National Science Library

    Sekerka, Leslie E; Zolin, Roxanne; Simon, Cary

    2005-01-01

    .... Transcripts were thematically analyzed. The findings contributed to the development of a model to depict the effects of a specialized management identity that employs a deletion strategy using coercion to effect rapid transformation...

  5. Constructing nurses' professional identity through social identity theory.

    Science.gov (United States)

    Willetts, Georgina; Clarke, David

    2014-04-01

    The profession of nursing continues to struggle with defining and clarifying its professional identity. The definitive recognition of nursing as a profession was the moving of training from the hospital apprentice model to the tertiary sector. However, this is only part of the story of professional identity in nursing. Once training finishes and enculturation into the workplace commences, professional identity becomes a complicated social activity. This paper proposes social identity theory as a valuable research framework to assist with clarifying and describing the professional identity of nurses. The paper outlines the key elements of a profession and then goes on to describe the main concepts of social identity theory. Lastly, a connection is made between the usefulness of using social identity theory in researching professional identity in nursing, recognizing the contextual nature of the social activity of the profession within its workplace environment. © 2013 Wiley Publishing Asia Pty Ltd.

  6. Scripting Professional Identities

    DEFF Research Database (Denmark)

    Bévort, Frans; Suddaby, Roy

    2016-01-01

    on a longitudinal ethnography of professionals in a Big Four accounting firm we analyse the process by which individual professionals make sense of their new roles and integrate the conflicting demands of professional and managerial logics. We find that individuals are active authors of their own identity scripts......This article examines how individual accountants subjectively interpret competing logics of professionalism as they transform from practicing accountants to managerial roles and as their organizations transform from traditional professional partnerships to more corporate organizational forms. Based....... We further observe considerable interpretive variation in how identity scripts are reproduced and enacted. We contribute to the emerging understanding of institutions as ‘inhabited’ by individuals and extend this literature by demonstrating that the institutional work of reinterpreting competing...

  7. LITERATURE AND IDENTITY

    Directory of Open Access Journals (Sweden)

    Dragana Litričin Dunić

    2015-04-01

    Full Text Available Literature can represent, on the one hand, the establishment of cultural and national identity, and, on the other hand, a constant indicator of the differences. Self-image and the image of the Other in literature is very important not only for understanding national character and preservation of cultural identity, but also for the release from ideological reading and stereotyping. Analyzing the image of the Other, research into the representation of the Balkans symbolically represents in the popular literature of the West, study of the cultural context and the processes that formed the writer’s perceptions that determine the establishment of stereotypes about Homo Balcanicus and many others, are all important tasks of imagological research, as well as the key research tasks conducted nowadays. In this paper we shall discuss some of these issues in the field of comparative literature.

  8. A general integral identity

    Energy Technology Data Exchange (ETDEWEB)

    Glasser, M L, E-mail: laryg@clarkson.edu [Department of Physics, Clarkson University, Potsdam, NY 13699-5820 (United States); Departamento de Fisica Teorica, Atomica y Optica, Universidad de Valladolid, Valladolid 470071 (Spain)

    2011-06-03

    The identity {integral}{sub 0}{sup {pi}/2}d{Phi}{integral}{sub 0}{sup {pi}/2}d{Theta} sin{Phi} F(x sn{Phi} sin{Phi})={pi}/2 {integral}{sub 0}{sup 1}F(xt)dt, where F is any function, is derived. Several extensions are given and a few examples of physical interest are described.

  9. Identity, History, Tolerance

    Directory of Open Access Journals (Sweden)

    Surovtsev V.A.

    2016-01-01

    Full Text Available The article discusses the role of historical narratives in the formation of identity. Rüsen’s thesis on the contradiction of traditional historical identities that suggest an ethnocentric position with the processes of intercultural communication is analyzed. The potential of historical narratives in overcoming (or restricting ethnocentrism is considered. It is shown that ethnocentrism is constituted by kinds of the configuration of historical writing rather than by a subjective position of historical narrative authors. The types of stories suggest a the way of making history using only the criteria of success and failure in the interpretation of the past; b interpretation of history as teleological continuity; c merely the necessity to justify (to substantiate claims or to discredit something. It is alleged that the realization that the form of historical knowledge constructs, not discovers, can facilitate liberation from referential fallacy on the whole and enslavement by certain kinds of stories in particular. It is concluded that the recognition of the constitutive nature of historical narratives allows being independent from the traditional forms of historical knowledge and traditional ideas about their cultural value. In particular, it allows reconsidering the need to apply historical knowledge when constructing identity.

  10. Identity Styles and Religiosity: Examining the Role of Identity Commitment

    Science.gov (United States)

    Grajales, Tevni E.; Sommers, Brittany

    2016-01-01

    This study observed the role of identity styles, identity commitment, and identity statuses in predicting religiosity in a sample of undergraduate students attending a Seventh-day Adventist university (N = 138). Two structural models were evaluated via path analysis. Results revealed two strong models for the prediction of religiosity. Identity…

  11. Material Construction of Care Workers’ Identity

    Directory of Open Access Journals (Sweden)

    Sanna Laulainen

    2016-03-01

    Full Text Available This article takes a critical look at the unconscious and unnoticed effects of materiality on care workers’ identity. The data was collected through nonactive role-playing using written accounts, in which the respondents described how they felt about working in fictitious ‘good’ or ‘bad’ elderly care homes. The data was analyzed with rhetorical analysis. Five different identity strategies were identified in the accounts. Strong professional identity was defended by downplaying the significance of materiality. Adjustment and passive compliance were used to adjust to physical shortcomings of the work environment. A ‘rebellion’ was described as an extreme course of action to resolve the contradiction between good care and poor facilities. At its best, the materiality of care homes, in particular homelikeness, seemed to support professional identity. These identity strategies illustrate how care workers balance between the physical realities of care homes and the requirements of the ethos of care, which are often incompatible with each other. It is crucial that managers as well as workers themselves recognize and acknowledge these connections affecting motivation and commitment to care work. Investments in better environments could be one way to improve the image and the attractiveness of the care branch and relieve the recruitment problems.

  12. Entrepreneurship Education as Identity Workspace

    DEFF Research Database (Denmark)

    Frederiksen, Signe Hedeboe

    2016-01-01

    Entrepreneurship education theory and practice show increasing interest in identity work as an important part of entrepreneurial learning. Entrepreneurship programs become identity workspaces where pedagogical designs stimulate entrepreneurial identity work and support individuals’ discovery...... of themselves as entrepreneurs. This article investigates how entrepreneurship education is practiced as an identity workspace, when reflective identity work is turned into a pedagogical strategy for entrepreneurial learning. I present empirical data from a qualitative fieldstudy in an eleven week mandatory...... and identities. Exposed to identity work practices in class, learners experienced conflicting demands participating as succesful students and participating as potential entrepreneurs. The study draws attention to how an education setting contextualises identity work as a social practice. It critisises...

  13. An 'open source' networked identity

    DEFF Research Database (Denmark)

    Larsen, Malene Charlotte

    2013-01-01

    This paper examines the concept of identity in relation to youth practices on social network sites (SNS). The paper illustrates how writing “I love you” or other emotional statements on each other’s profiles on SNS is not only a common way for Danish teenagers to communicate and practice friendship...... communicative actions – are not only performing their own identity, but are becoming co-constructors of each other's identities, which the author characterizes as an 'open source' networked identity....

  14. Social Identity and Group Contests

    OpenAIRE

    Zaunbrecher, Henrik; Riedl, Arno

    2016-01-01

    Social identity has been shown to successfully enhance cooperation and effort in cooperation and coordination games. Little is known about the causal effect of social identity on the propensity to engage in group conflict. In this paper we explore theoretically and experimentally whether social identity increases investments in group contests. We show theoretically that increased social identity with the own group implies higher investments in Tullock contests. Empirically we find that induce...

  15. Social identity process within organizations

    OpenAIRE

    Bazarov, Takhir; Kuzmina, Maria

    2005-01-01

    Expanding and complex social realities cause new types of identity. Variety in organizations and workgroups (where people are involved), implies a special kind of social identity which can be defined as professional, organizational or managerial. The study of the social identity processes in organizations is a new interdisciplinary sphere that is presented especially commonly in European Social Psychology. The result of its theoretical comprehension is Social Identity Theory. In the article l...

  16. John locke on personal identity.

    Science.gov (United States)

    Nimbalkar, Namita

    2011-01-01

    John Locke speaks of personal identity and survival of consciousness after death. A criterion of personal identity through time is given. Such a criterion specifies, insofar as that is possible, the necessary and sufficient conditions for the survival of persons. John Locke holds that personal identity is a matter of psychological continuity. He considered personal identity (or the self) to be founded on consciousness (viz. memory), and not on the substance of either the soul or the body.

  17. John Locke on Personal Identity**

    OpenAIRE

    Nimbalkar, Namita

    2011-01-01

    John Locke speaks of personal identity and survival of consciousness after death. A criterion of personal identity through time is given. Such a criterion specifies, insofar as that is possible, the necessary and sufficient conditions for the survival of persons. John Locke holds that personal identity is a matter of psychological continuity. He considered personal identity (or the self) to be founded on consciousness (viz. memory), and not on the substance of either the soul or the body.

  18. Identity Development in Deaf Adolescents

    Science.gov (United States)

    Kunnen, E. Saskia

    2014-01-01

    We studied identity development during 5 years in seven deaf adolescents who attended a school for deaf children in the highest level of regular secondary education (age between 14 and 18 years), administering identity interviews every year. Identity development is conceptualized as the processes of exploration and commitment formation (Bosma,…

  19. Queering Black Racial Identity Development

    Science.gov (United States)

    Johnson, Alandis A.; Quaye, Stephen John

    2017-01-01

    We used queer theory to encourage readers to think differently about previous theories about Black racial identity development. Queer theory facilitates new and deeper understandings of how Black people develop their racial identities, prompting more fluidity and nuance. Specifically, we present a queered model of Black racial identity development…

  20. Social Identity Simulation System (SISTEM)

    Science.gov (United States)

    2014-03-31

    Report Individuation Individuation refers to when an individual attempts to preserve self-esteem by psychologically separating oneself from a...its expected costs. The following subsections describe various strategies of social identity entrepreneurship in more detail. Calling for...Haslam, S. A., & Reicher, S. (2007). Identity Entrepreneurship and the consequences of identity failure: the dynamics of leadership in the BBC prison

  1. Identity theft and your practice.

    Science.gov (United States)

    Asbell, Lisa

    2010-01-01

    Medical identity theft is a growing problem in America. The federal government has passed laws to help "prevent" identity theft. However, several powerful medical associations are fighting the legislation. Americans need to know what is happening with these laws and why these laws are important to protect providers from lawsuits and consumers of healthcare from medical identity theft.

  2. Social identity change: shifts in social identity during adolescence.

    Science.gov (United States)

    Tanti, Chris; Stukas, Arthur A; Halloran, Michael J; Foddy, Margaret

    2011-06-01

    This study investigated the proposition that adolescence involves significant shifts in social identity as a function of changes in social context and cognitive style. Using an experimental design, we primed either peer or gender identity with a sample of 380 early- (12-13 years), mid- (15-16 years), and late-adolescents (18-20 years) and then measured the effect of the prime on self-stereotyping and ingroup favouritism. The findings showed significant differences in social identity across adolescent groups, in that social identity effects were relatively strong in early- and late-adolescents, particularly when peer group identity rather than gender identity was salient. While these effects were consistent with the experience of change in educational social context, differences in cognitive style were only weakly related to ingroup favouritism. The implications of the findings for theory and future research on social identity during adolescence are discussed. Crown Copyright © 2010. Published by Elsevier Ltd. All rights reserved.

  3. Mistaken identity: activating conservative political identities induces "conservative" financial decisions.

    Science.gov (United States)

    Morris, Michael W; Carranza, Erica; Fox, Craig R

    2008-11-01

    Four studies investigated whether activating a social identity can lead group members to choose options that are labeled in words associated with that identity. When political identities were made salient, Republicans (but not Democrats) became more likely to choose the gamble or investment option labeled "conservative." This shift did not occur in a condition in which the same options were unlabeled. Thus, the mechanism underlying the effect appears to be not activated identity-related values prioritizing low risk, but rather activated identity-related language (the group label "conservative"). Indeed, when political identities were salient, Republicans favored options labeled "conservative" regardless of whether the options were low or high risk. Finally, requiring participants to explain the label "conservative" before making their choice did not diminish the effect, which suggests that it does not merely reflect inattention to content or construct accessibility. We discuss the implications of these results for the literatures on identity, priming, choice, politics, and marketing.

  4. Sensing and Efficient Inference for Identity Management

    Science.gov (United States)

    2015-12-20

    because of its high computational cost. Nonetheless, the development of this method has led to many improvements in the motion analysis aspects of...fps (117 seconds). The scene is not heavily crowded, but the low predictability in people’s motion and a few long occlusions behind a lamp post makes... uv wuv1[lu 6=lv ] (25) where 1[P ] is 1 when P is true and 0 otherwise. This energy is lowered when observations supported by negative

  5. Identity Management Task Force Report 2008

    Science.gov (United States)

    2008-01-01

    ecommunication infrastructures, • Identify and mitigate opportunities for exploitation, • Increase adversaries’ cost and risk of exposure...there is significant federal participation. The International Telecommunication Union. The International Tel- ecommunication Union (ITU) is a UN

  6. Identity Management issues in Cloud Computing

    OpenAIRE

    Saini, Smita; Mann, Deep

    2014-01-01

    Cloud computing is providing a low cost on demand services to the users, omnipresent network,large storage capacity due to these features of cloud computing web applications are moving towards the cloud and due to this migration of the web application,cloud computing platform is raised many issues like privacy, security etc. Privacy issue are major concern for the cloud computing. Privacy is to preserve the sensitive information of the cloud consumer and the major issues to the privacy are un...

  7. Face and identity management in negotiation

    NARCIS (Netherlands)

    Planken, Brigitte Chantal

    2002-01-01

    This dissertation reports on a comparative study of the verbal behaviour of experienced negotiators (professionals) and inexperienced negotiators (students), negotiating in a lingua franca (English). The study centred around two corpora of speech data generated in a series of intercultural sales

  8. An identity management monitoring system | Imouokhome | Scientia ...

    African Journals Online (AJOL)

    Username, Password, Remember me, or Register ... An identification system, which employs the use of fingerprint biometric that conducts a ... Key Words: Biometrics, Pattern-matching Identification, Verification, Authentication, Fingerprints ...

  9. ISLAM AND MINORITIES: Managing Identity in Malaysia

    OpenAIRE

    Ahmad Suaedy

    2010-01-01

    The Malaysian general election in March 2008 raised an interesting and new phenomenon. For the first time since independence in 1957, the ruling alliance known as the National Front (Barisan Nasional, BN) failed to secure two thirds of seats in parliament and lost control of five of Malaysia’s 13 states. This was due to the challenge presented by the new opposition alliance known as the Alternative Front (Barisan Alternatif, BA) or the People’s Alliance (Pakatan Rakyat, PK) which won more tha...

  10. Identities at Odds

    DEFF Research Database (Denmark)

    Hazel, Spencer

    2015-01-01

    This study offers an interaction analytic account of how linguistic identities in internationalized workplaces in Denmark are indexed against members’ institutional positions in particular interactional settings. Where language policy may not be explicitly articulated between members, it is still....... The study uses recordings of naturally occurring interaction in different international workplace settings, and argues for greater attention to be paid to the actual language-policy practices in international workplace settings, as a entry point into developing a more nuanced understanding of the practices...

  11. Identities in Migration

    Directory of Open Access Journals (Sweden)

    Montserrat Clua i Fainé

    2017-08-01

    Full Text Available Young Catalans in London build their identity as immigrants in a close dialectic between their own imaginary about immigration in their country of origin and British perceptions of them. Given the negative stigma attached to the category of «immigrant», not all recognise themselves as such. Some simply refuse to acknowledge they belong to this category, while others use the projection of prejudices on immigrants towards Spaniards as a strategy from which they distance themselves by establishing a distinction between Catalans and Spaniards.

  12. Schizophrenia masquerading as Dissociative Identity Disorder

    OpenAIRE

    Jegan Yogaratnam; Rajesh Jacob

    2012-01-01

    Dissociative symptoms can dominate the clinical picture in many psychiatric conditions and possess a huge challenge to the clinicians in management. We present a case report of a female with a strong family history of schizophrenia who initially presented with features suggestive of dissociative identity disorder, which is itself a rare clinical entity, was later diagnosed to have schizophrenia. Authors would like to emphasise that clinicians should have a high index of suspicion for schizoph...

  13. Identity style and coping strategies.

    Science.gov (United States)

    Berzonsky, M D

    1992-12-01

    This study examined the relationship between identity style and strategies used to cope with stressors that potentially threaten one's sense of identity. Identity style refers to differences in the way individuals construct and revise or maintain their sense of identity. An informational style involves actively seeking out, evaluating, and utilizing self-relevant information. A normative style highlights the expectations and standards of significant others. A diffuse/avoidant style is characterized by procrastination and situation-specific reactions. Late-adolescent college subjects were administered measures of identity style, ways of coping with academic stressors, and test anxiety. Within this self-as-student context, subjects with diffuse and normative identity styles employed avoidant-oriented coping strategies (wishful thinking, distancing, and tension reduction). An informational style was associated with deliberate, problem-focused coping. Findings are discussed in terms of a process model of identity development.

  14. A qualitative investigation of masculine identity after traumatic brain injury.

    Science.gov (United States)

    MacQueen, Ruth; Fisher, Paul; Williams, Deirdre

    2018-04-30

    Men are twice as likely as women to experience a traumatic brain injury (TBI), suggesting that aspects of masculine identity contribute to how people acquire their brain injuries. Research also suggests that masculine identity impacts on how people manage their health experiences. The current study aimed to explore the experience of masculine identity following TBI. Individual interviews were conducted with 10 men aged 21-67 years who had experienced a TBI. All were living in the community. Interpretative phenomenological analysis was used to consider lived experiences and to explore the meaning of the TBI experience in relation to masculine identity. Three superordinate themes emerged from the analysis: doing life and relationships differently, self-perceptions and the perceived view of others, and managing the impact of TBI as a man. These themes are considered in relation to how participants' experiences interacted with dominant social ideals of masculine identity. The findings highlighted how masculine identity may be a valuable aspect of self in considering threats to and reconstruction of self-identity after TBI. Aspects of gender identity should be considered in order to promote engagement, support adjustment and achieve meaningful outcomes in rehabilitation.

  15. 12 CFR Appendix J to Part 571 - Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation

    Science.gov (United States)

    2010-01-01

    ...; service provider arrangements; significant incidents involving identity theft and management's response... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Interagency Guidelines on Identity Theft...—Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation Section 571.90 of this part...

  16. 12 CFR Appendix J to Part 222 - Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation

    Science.gov (United States)

    2010-01-01

    ... arrangements; significant incidents involving identity theft and management's response; and recommendations for... 12 Banks and Banking 3 2010-01-01 2010-01-01 false Interagency Guidelines on Identity Theft..., App. J Appendix J to Part 222—Interagency Guidelines on Identity Theft Detection, Prevention, and...

  17. 12 CFR Appendix J to Part 41 - Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation

    Science.gov (United States)

    2010-01-01

    ... arrangements; significant incidents involving identity theft and management's response; and recommendations for... 12 Banks and Banking 1 2010-01-01 2010-01-01 false Interagency Guidelines on Identity Theft... on Identity Theft Detection, Prevention, and Mitigation Section 41.90 of this part requires each...

  18. 16 CFR Appendix A to Part 681 - Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation

    Science.gov (United States)

    2010-01-01

    ... arrangements; significant incidents involving identity theft and management's response; and recommendations for... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Interagency Guidelines on Identity Theft... THE FAIR CREDIT REPORTING ACT IDENTITY THEFT RULES Pt. 681, App. A Appendix A to Part 681—Interagency...

  19. Gestão pública, formação e identidade de profissionais de educação infantil Public management, education and identity of early child education professionals

    Directory of Open Access Journals (Sweden)

    Sonia Kramer

    2007-08-01

    Full Text Available O artigo trata da gestão da educação infantil e das políticas de formação de profissionais da área. Buscou resgatar histórias de formação das profissionais responsáveis pela gestão da educação infantil nas Secretarias Municipais de Educação do Estado do Rio de Janeiro. O texto está estruturado em três partes. A primeira contextualiza a pesquisa, traz questões de natureza metodológica sobre o questionário aplicado nos municípios e sintetiza dados obtidos com esse instrumento. A segunda aborda as entrevistas realizadas com as profissionais no que diz respeito ao referencial teórico-metodológico, traz aspectos práticos da sua realização e apresenta uma síntese das principais categorias que emergiram dos relatos. A terceira parte focaliza o tema da gestão, identidade e formação. As entre vistadas falam do contexto em que atuam, de hierarquia e poder, revelando situações em que a precariedade, a falta de condições materiais e humanas, o despreparo e o improviso convivem com a dedicação, o idealismo e o compromisso profissional.The article addresses early child education and the policies set forth for the professional formation in this field. It sought to rescue stories about the education of professionals in charge of the management of early child education at the Municipal Secretariats of Education of the State of Rio de Janeiro. The text consists of three sections. The first contextualizes the research, addressing issues of methodological nature related to the questionnaire employed in the municipalities and summarizes the data thus obtained. The second section deals with the interviews conducted with these professionals, discussing the theoretic-methodological framework employed, practical aspects related to the conduction of the interviews, and the main categories that emerged from the reports. The third part focuses on the themes of management, identity and education. The interviewed speak about the context

  20. Swiss identity smells like chocolate: Social identity shapes olfactory judgments.

    Science.gov (United States)

    Coppin, Géraldine; Pool, Eva; Delplanque, Sylvain; Oud, Bastiaan; Margot, Christian; Sander, David; Van Bavel, Jay J

    2016-10-11

    There is extensive evidence that social identities can shape people's attitudes and behavior, but what about sensory judgments? We examined the possibility that social identity concerns may also shape the judgment of non-social properties-namely, olfactory judgment. In two experiments, we presented Swiss and non-Swiss participants with the odor of chocolate, for which Switzerland is world-famous, and a control odor (popcorn). Swiss participants primed with Swiss identity reported the odor of chocolate (but not popcorn) as more intense than non-Swiss participants (Experiments 1 and 2) and than Swiss participants primed with individual identity or not primed (Experiment 2). The self-reported intensity of chocolate smell tended to increase as identity accessibility increased-but only among Swiss participants (Experiment 1). These results suggest that identity priming can counter-act classic sensory habituation effects, allowing identity-relevant smells to maintain their intensity after repeated presentations. This suggests that social identity dynamically influences sensory judgment. We discuss the potential implications for models of social identity and chemosensory perception.

  1. Swiss identity smells like chocolate: Social identity shapes olfactory judgments

    Science.gov (United States)

    Coppin, Géraldine; Pool, Eva; Delplanque, Sylvain; Oud, Bastiaan; Margot, Christian; Sander, David; Van Bavel, Jay J.

    2016-01-01

    There is extensive evidence that social identities can shape people’s attitudes and behavior, but what about sensory judgments? We examined the possibility that social identity concerns may also shape the judgment of non-social properties—namely, olfactory judgment. In two experiments, we presented Swiss and non-Swiss participants with the odor of chocolate, for which Switzerland is world-famous, and a control odor (popcorn). Swiss participants primed with Swiss identity reported the odor of chocolate (but not popcorn) as more intense than non-Swiss participants (Experiments 1 and 2) and than Swiss participants primed with individual identity or not primed (Experiment 2). The self-reported intensity of chocolate smell tended to increase as identity accessibility increased—but only among Swiss participants (Experiment 1). These results suggest that identity priming can counter-act classic sensory habituation effects, allowing identity-relevant smells to maintain their intensity after repeated presentations. This suggests that social identity dynamically influences sensory judgment. We discuss the potential implications for models of social identity and chemosensory perception. PMID:27725715

  2. Nostalgia and lost identity.

    Science.gov (United States)

    Pourtova, Elena

    2013-02-01

    Nostalgia for the Soviet Union is a major social phenomenon in Russia today due to the irrevocable losses of the recent past in which Soviet citizens involuntarily became immigrants in their own country. With reference to discussions of nostalgia in philosophical and psychoanalytic literature, I suggest that nostalgia may represent either a defensive regression to the past or a progressive striving for wholeness through re-connecting with what has been lost in the service of a greater integration. I compare this with the processes of adaptation seen in immigrants and provide a clinical illustration of a young man coming to terms with loss and change in the post-Soviet era. When nostalgia is recognized as a legitimate emotional experience it may facilitate mourning and enable the integration of the past with the present and the development of a new identity. © 2013, The Society of Analytical Psychology.

  3. Forging a Black identity

    Directory of Open Access Journals (Sweden)

    Barry Chevannes

    1992-07-01

    Full Text Available [First paragraph] The Rastafarians: sounds of cultural dissonance [revised and updated editionj. LEONARD E. BARRETT, SR. Boston: Beacon Press, 1988. xviii + 302 pp. (Paper US$ 11.95 Rasta and resistance: from Marcus Garvey to Walter Rodney. HORACE CAMPBELL. Trenton NJ: Africa World Press, 1987. xiii + 236 pp. (Cloth US$32.95, Paper US$ 10.95 Garvey's children: the legacy of Marcus Garvey. TONY SEWELL. London: Macmillan Caribbean, 1990. 128 pp. (Paper £ 17.95 The central theme linking these three titles is the evolution of a black identity among English-speaking Caribbean peoples, in particular Jamaicans. Consequently all three authors cover the two most important historical phenomena in Caribbean black nationalism, namely Garveyism and Rastafari, one focusing on the former and the other two focusing on the latter.

  4. National and Transnational Identities

    DEFF Research Database (Denmark)

    Jørgensen, Martin Bak

    within the Turkish minority in the three countries with special attention to the influence of transnational social transformation. Social communities and organisations such as trade unions, political parties or religious and cultural association have usually been ascribed the capability to enhance...... relations between individuals and to extend trust, values, identity and social belonging. Whether we focus on the individual and the value of face to face contact or we focus on the role of the organisation as an intervening institution between the state, the political system and the citizen...... in prolongation of the previous development. Conversely do the analyses of the Danish and German case show that models are not static. Denmark followed Sweden shortly after in introducing local voting rights for non-citizens and generally non-citizens enjoy considerable political, social and civic rights...

  5. Creation, Identity and Reflection

    Directory of Open Access Journals (Sweden)

    Alina Beatrice Cheşcă

    2015-05-01

    Full Text Available The paper “Creation, Identity and Reflection” approaches the identification in the “mirror” of reality with creation, in other words seeking the authors’ identity in the reflected images. Reflection means attempting to find oneself, the mirror being the main principle of creation. Many characters become interesting only when they step into the world beyond the mirror, when their faces are doubled by the other self or when their selves are returned by other characters. The narcissistic concept of the mirror, i.e. the reflection in the mirror and the representation of the mirror itself, is a recurrent one in literature, but the reflection of the self which is not the self (as it is a reflection does not necessarily appear in a mirror or in a photograph or portrait. Sometimes, the not-self is returned to the self by another person or character. As far as Oscar Wilde’s theories are concerned, the main idea is that people are interesting for their masks, not for their inner nature. What Wilde calls “inner nature” is the characters’ un-reflected self and the mask is the reflection, the self in the mirror. Some characters’ relationships develop within a fiction that they dramatically try to preserve and protect with the risk of suffering. They refuse to take off the masks which define them in the others’ minds and hearts; the narcissistic individuals (both artists and characters seek and love their own image which they project upon facts, thus creating a fictive realm.

  6. Perancangan Corporate Identity Brotherwood Decoration

    OpenAIRE

    Ciputra, Ongky Permana; Bangsa, Petrus Gogor; Christianna, Aniendya

    2015-01-01

    Sebagai Perusahaan interior di Surabaya, “BROTHERWOOD” sedang membangun citra positif melalui penguatan corporate identity secara menyeluruh.Oleh karena itu “Brotherwood” memerlukan corporate identity dan mengaplikasikannya pada media promosi dan informasi yang sesuai dengan karakter dari target audience dan target market-nya.Dengan menggunakan corporate identity diharapkan “Brotherwood” menjadi lebih dikenal oleh target audience dan target market-nya sehingga membuat market “Brotherwood” men...

  7. Personal identity and eastern thought

    Directory of Open Access Journals (Sweden)

    Correia Carlos João

    2009-01-01

    Full Text Available This paper aims to show that the problem of personal identity is a fundamental question of the classical Indian thought. Usually we tend to think that personal identity is a Western philosophical subject, and so we tend to forget the significance of the Self (Atman in Hinduism and even in Buddhism. The author shows how the Indian thought approached the question of personal identity and which was the singular solution outlined in the work consensually attributed to Gotama, the Buddha.

  8. Constructing leadership identities through stories

    DEFF Research Database (Denmark)

    Frimann, Søren; Hersted, Lone

    2016-01-01

    This article analyzes the construction of leadership identities through stories found in four narrative interviews from a qualitative study and leadership development project based on social constructionism and action learning. We argue that leadership development and the construction of leadership...... that the concept of coauthoring is useful in developing leadership and leadership identities through reflexive dialogs and emerging stories....... identities in a postmodern paradigm are based on the negotiation and co-construction of meanings, relationships, and stories. The following questions are investigated: What happens when a group of leaders from different organizations construct, deconstruct, and reconstruct their identity as leaders through...

  9. Identity Support, Identity Devaluation, and Well-Being among Lesbians

    Science.gov (United States)

    Beals, Kristin P.; Peplau, Letitia Anne

    2005-01-01

    This research tested predictions about the association of identity support and identity devaluation with psychological well-being (self-esteem, life satisfaction, and depression). Lesbian women completed baseline surveys (N=42), then provided daily experience reports during a 2-week period (n=38), and completed a 2-month follow-up survey (n=34).…

  10. Social Identity Change: Shifts in Social Identity during Adolescence

    Science.gov (United States)

    Tanti, Chris; Stukas, Arthur A.; Halloran, Michael J.; Foddy, Margaret

    2011-01-01

    This study investigated the proposition that adolescence involves significant shifts in social identity as a function of changes in social context and cognitive style. Using an experimental design, we primed either peer or gender identity with a sample of 380 early- (12-13 years), mid- (15-16 years), and late-adolescents (18-20 years) and then…

  11. Developing Professional Identity in an Online Learning Environment

    DEFF Research Database (Denmark)

    Horn, Line Helverskov

    2015-01-01

    identity as the outcome for the intern. This paper describes the interactions in an online learning environment. The online platform sought to enable peer interaction between younger and older students in a discussion of the professional identity of Natural and Cultural Heritage Management (NCHM......From a socio-cultural perspective, the development of a professional identity is an on-going process that is social in nature and negotiated in communities of practice (Wenger, 1998). Internships in higher education function as such communities of practice, with an improved sense of professional...

  12. The Identity of Students Choosing Marketing Programs

    Directory of Open Access Journals (Sweden)

    Barreto, Idaly

    2009-12-01

    Full Text Available The purpose of this study is to look deeply into the identity of young students interested in training professional in marketing programs in Bogotá, Colombia. This descriptive study was conducted with the application of multidimensional surveys to 262 young people from five universities that offer training in marketing. The results show that there are differences and similarities in the lifestyles of young people who choose to study Marketing. The first, relating mainly to the identities assumed by students of daytime and nighttime that differ in their activities and more income. The second, by the increasing use and development of academic and social activities through the Internet of interest to young people today. It is hoped that these results provide the administrative and academic management of marketing programs that result in better communication and care of students as consumers.

  13. Bricolage and Identity Work

    NARCIS (Netherlands)

    Visscher, Klaasjan; Heusinkveld, Stefan; O'Mahoney, Joe

    Lévi-Strauss’ concept of bricolage has been used widely in a variety of management and organizational studies to highlight creative ‘situational tinkering’. Yet, we know little about ‘the bricoleur’ beyond the assumption of a functional agent responding to conditions of resource scarcity or

  14. Identity Theft - The National Guard

    Science.gov (United States)

    Legislative Liaison Small Business Programs Social Media State Websites Videos Featured Videos On Every Front identity theft you discover someone is still fraudulently using your Social Security Number, you can Features Blended Retirement System Diversity Features by Year Identity Theft Posture Statement State

  15. Play Memories and Place Identity.

    Science.gov (United States)

    Sandberg, Anette

    2003-01-01

    This retrospective study examined play memories from childhood to adulthood of 478 university students between ages 20 and 62 as exhibited in drawings of play memories and questionnaire responses. The study focused on the role of the physical environment and place identity in play memories and individual identity development. Findings showed that…

  16. Social Identity and Group Contests

    NARCIS (Netherlands)

    Zaunbrecher, Henrik; Riedl, Arno

    2016-01-01

    Social identity has been shown to successfully enhance cooperation and effort in cooperation and coordination games. Little is known about the causal effect of social identity on the propensity to engage in group conflict. In this paper we explore theoretically and experimentally whether social

  17. Identity development in deaf adolescents

    NARCIS (Netherlands)

    Kunnen, E. Saskia

    2014-01-01

    We studied identity development during 5 years in 11 deaf adolescents who attend a school for deaf children in the highest level of regular secondary education (age between 14 and 19 years). Identity development is conceptualized by the processes of exploration and commitment formation, as

  18. Exploring Leader Identity and Development.

    Science.gov (United States)

    Priest, Kerry L; Middleton, Eric

    2016-01-01

    Taking on a leader identity can be a motivating force for pursuing leader development. This chapter explores the reciprocal and recursive nature of identity development and leader development, emphasizing how shifting views of self influence one's motivation to develop as a leader. © 2016 Wiley Periodicals, Inc., A Wiley Company.

  19. Gender identity development in adolescence.

    Science.gov (United States)

    Steensma, Thomas D; Kreukels, Baudewijntje P C; de Vries, Annelou L C; Cohen-Kettenis, Peggy T

    2013-07-01

    This article is part of a Special Issue "Puberty and Adolescence".This article aims to provide an outline of what is currently known on trajectories, and contributing factors to gender identity development in adolescence. We give a historical overview of the concept of gender identity, and describe general identity development in adolescence, gender identity development in the general population and in gender variant youth. Possible psychosocial (such as child and parental characteristics) and biological factors (such as the effects of prenatal exposure to gonadal hormones and the role of genetics) contributing to a gender variant identity are discussed. Studies focusing on a number of psychosocial and biological factors separately, indicate that each of these factors influence gender identity formation, but little is known about the complex interplay between the factors, nor about the way individuals themselves contribute to the process. Research into normative and gender variant identity development of adolescents is clearly lagging behind. However, studies on persons with gender dysphoria and disorders of sex development, show that the period of adolescence, with its changing social environment and the onset of physical puberty, seems to be crucial for the development of a non-normative gender identity. Copyright © 2013 Elsevier Inc. All rights reserved.

  20. Generalized Cherednik-Macdonald identities

    NARCIS (Netherlands)

    Stokman, J.V.

    2008-01-01

    We derive generalizations of the Cherednik-Macdonald constant term identities associated to root systems which depend, besides on the usual Multiplicity function, symmetrically on two additional parameters omega +/-. They are natural analogues of the Cherednik-Macdonald constant term q-identities in

  1. Ward identities at finite temperature

    International Nuclear Information System (INIS)

    DOlivo, J.C.; Torres, M.; Tututi, E.

    1996-01-01

    The Ward identities for QED at finite temperature are derived using the functional real-time formalism. They are verified by an explicit one-loop calculation. An effective causal vertex is constructed which satisfy the Ward identity with the associated retarded self-energy. copyright 1996 American Institute of Physics

  2. STORYTELLING AND UNIVERSITY BRANDING IDENTITY

    Directory of Open Access Journals (Sweden)

    ANDREEA MONICA STATE

    2016-08-01

    Full Text Available The present article sets out to clarify the concepts of storytelling and branding, with a focus on university branding and visual identity – the latter being a vital element to a brand’s uniqueness. Storytelling is an important method of brand construction, and it entails a strong power of seduction. Branding is increasingly more about storytelling. Practically, a story is an image made up of facts, feelings and interpretations, which are often told to us solely by the university itself. As such, the brand appears on the market accompanied by its identity. Identity is what we aim to express with help of the brand. Implementing a system of visual identity that would help to harmoniously develop a university brand requires a handbook of visual identity. The present article aims to be a starting point for such a handbook serving the University of Bucharest, which currently does not own such a handbook

  3. Ethnic Identities of University Students

    Directory of Open Access Journals (Sweden)

    Gözde Özdikmenli-Demir

    2014-06-01

    Full Text Available The aim of this article is to understand the relationship between ethnic identity, victimization/witnessing community violence, ethnic discrimination, and aggression in a sample of university students living in the South East Region of Turkey. The participants were 263 university students of predominantly Kurdish ethnic origin. The results showed that males had higher levels of ethnic identity in the dimensions of exploration and commitment. Males also presented higher scores for witnessing community violence and lifetime exposure to ethnic discrimination. The most important predictor of participants’ ethnic identity was witnessing community violence. Participants who witnessed violent acts in their social environment had higher ethnic identity levels. Although the predictor variables could not explain an important part of the participants’ aggression levels, only perceived ethnic discrimination was positively related to aggressive behavior. The role of native language efficiency in ethnic identity is also discussed.

  4. Body integrity identity disorder.

    Science.gov (United States)

    Blom, Rianne M; Hennekam, Raoul C; Denys, Damiaan

    2012-01-01

    Body Integrity Identity Disorder (BIID) is a rare, infrequently studied and highly secretive condition in which there is a mismatch between the mental body image and the physical body. Subjects suffering from BIID have an intense desire to amputate a major limb or severe the spinal cord in order to become paralyzed. Aim of the study is to broaden the knowledge of BIID amongst medical professionals, by describing all who deal with BIID. Somatic, psychiatric and BIID characteristic data were collected from 54 BIID individuals using a detailed questionnaire. Subsequently, data of different subtypes of BIID (i.e. wish for amputation or paralyzation) were evaluated. Finally, disruption in work, social and family life due to BIID in subjects with and without amputation were compared. Based on the subjects' reports we found that BIID has an onset in early childhood. The main rationale given for their desire for body modification is to feel complete or to feel satisfied inside. Somatic and severe psychiatric co-morbidity is unusual, but depressive symptoms and mood disorders can be present, possibly secondary to the enormous distress BIID puts upon a person. Amputation and paralyzation variant do not differ in any clinical variable. Surgery is found helpful in all subjects who underwent amputation and those subjects score significantly lower on a disability scale than BIID subjects without body modification. The amputation variant and paralyzation variant of BIID are to be considered as one of the same condition. Amputation of the healthy body part appears to result in remission of BIID and an impressive improvement of quality of life. Knowledge of and respect for the desires of BIID individuals are the first steps in providing care and may decrease the huge burden they experience.

  5. Body integrity identity disorder.

    Directory of Open Access Journals (Sweden)

    Rianne M Blom

    Full Text Available INTRODUCTION: Body Integrity Identity Disorder (BIID is a rare, infrequently studied and highly secretive condition in which there is a mismatch between the mental body image and the physical body. Subjects suffering from BIID have an intense desire to amputate a major limb or severe the spinal cord in order to become paralyzed. Aim of the study is to broaden the knowledge of BIID amongst medical professionals, by describing all who deal with BIID. METHODS: Somatic, psychiatric and BIID characteristic data were collected from 54 BIID individuals using a detailed questionnaire. Subsequently, data of different subtypes of BIID (i.e. wish for amputation or paralyzation were evaluated. Finally, disruption in work, social and family life due to BIID in subjects with and without amputation were compared. RESULTS: Based on the subjects' reports we found that BIID has an onset in early childhood. The main rationale given for their desire for body modification is to feel complete or to feel satisfied inside. Somatic and severe psychiatric co-morbidity is unusual, but depressive symptoms and mood disorders can be present, possibly secondary to the enormous distress BIID puts upon a person. Amputation and paralyzation variant do not differ in any clinical variable. Surgery is found helpful in all subjects who underwent amputation and those subjects score significantly lower on a disability scale than BIID subjects without body modification. CONCLUSIONS: The amputation variant and paralyzation variant of BIID are to be considered as one of the same condition. Amputation of the healthy body part appears to result in remission of BIID and an impressive improvement of quality of life. Knowledge of and respect for the desires of BIID individuals are the first steps in providing care and may decrease the huge burden they experience.

  6. Coming to an Asexual Identity: Negotiating Identity, Negotiating Desire.

    Science.gov (United States)

    Scherrer, Kristin S

    2008-10-01

    Sexuality is generally considered an important aspect of self-hood. Therefore, individuals who do not experience sexual attraction, and embrace an asexual identity are in a unique position to inform the social construction of sexuality. This study explores the experiences of asexual individuals utilizing open ended Internet survey data from 102 self-identified asexual people. In this paper I describe several distinct aspects of asexual identities: the meanings of sexual, and therefore, asexual behaviors, essentialist characterizations of asexuality, and lastly, interest in romance as a distinct dimension of sexuality. These findings have implications not only for asexual identities, but also for the connections of asexuality with other marginalized sexualities.

  7. Islamic Identity and Competitive Identities (Global, National and Ethnic Identity; A Case Study of Shiraz University Students

    Directory of Open Access Journals (Sweden)

    Mohammadtaghi Iman

    2013-06-01

    Full Text Available The verse of holy Koran "verily the most honored of you in the sight of Allah is [he who is] the most virtuous of you" directly shows that in god's willing there is no superiority of a man or a group than others except those who have piety to god. In fact, the Islamic identity focuses on the superiority of piety among humans and does not focus on superiority of a man or a group that causes Islamic identity theoretically be against other competitive identities such as ethnic, global and national identity. Therefore, this research aims to study the relationship between Islamic identity and competitive identities (ethnic, national and global. In this way based on Sheldon Stryker theory and survey method, 431 students have elected and have analyzed. The results have shown that there was positive significant relationship between Islamic identity, national and ethnic identity, and negative significant relationship between Islamic identity and global identity. In addition, multivariate regression results have shown that the variables national and global identities have explained 45 percent of the variation of Islamic identity variable. The results shows that national and ethnic identity amplify the Islamic identity and they have positive relationship with it and in fact they are not a competitive identity for Islamic identity but global identity has negative relationship with Islamic identity and therefore it is a competitive identity for Islamic identity.

  8. Social identity in the construction industry

    DEFF Research Database (Denmark)

    Andersen, L. P.; Karlsen, I. L.; Kines, P.

    2015-01-01

    sites. The organization of work fosters social identification within a crew, resulting in distancing from and social categorization of site management. Social identification influences safety behaviour in the crews, where worksite safety rules may meet resistance. Future safety initiatives at large...... construction sites should take into account the dynamics of social identification and categorization in the implementation of safety measures, e.g. by creating an alternative organization of work, thus making it easier for a work crew to identify themselves with the site management. Site/crew managers should...... consider how safety can become a salient and valued group norm by altering the social structure at the sites and/or fostering dual social identity....

  9. Developing a workable teacher identity: Building and negotiating identity within a professional network

    Science.gov (United States)

    Rostock, Roseanne

    The challenge of attracting and retaining the next generation of teachers who are skilled and committed to meeting the growing demands of the profession is of increasing concern to researchers and policy makers, particularly since 45--50% of beginning teachers leave the profession within five years (Ingersoll & Smith, 2003). Reasons for such attrition include compensation, status and working conditions; however, there is growing evidence that a critical factor in new teacher retention hinges on teachers' ability to accomplish the difficult task of forming a workable professional identity in the midst of competing discourses about teaching (Alsup, 2006; Britzman, 2003). There is little research on professional identity development among those beginning teachers at highest risk for attrition (secondary math and science teachers, and those with strong academic backgrounds). This study explores the professional identity development of early-career math and science teachers who are part of the Knowles Science Teaching Foundation's (KSTF) teaching fellowship program, an external support network that aims to address many of the issues leading to high attrition among this particular population of teachers. Using narrative research methods, I examine three case studies of beginning teachers, exploring how they construct professional identity in relation to various discourse communities and negotiate tensions across multiple discourses. The cases identify both dominant discourses and counter-discourses that the teachers draw upon for important identity development resources. They also demonstrate that the way a teacher manages tensions across competing discourses is important to how well one can negotiate a workable professional identity. In particular, they emphasize the importance of engaging in borderland discourses (Gee, 1996) as a way of taking agency in one's own identity development as well as in transforming one's discourse communities. These cases shed light on how

  10. Brand Management

    OpenAIRE

    Polách, Petr

    2012-01-01

    Theoretical part of thesis on the topic "Brand management" will deal with tools for strategic brand management ifself, specifically managements instruments. Next part will be devoted to brand, its identity, image, elements, value, legal protection and eventually to methods of valuation. In practical part will be applied knowledge of strategic brand management to the selected company Vivantis a.s. Part of practical part will be surfy about public awareness of the brand Vivantis a.s. On the bas...

  11. Bringing Federated Identity to Grid Computing

    Energy Technology Data Exchange (ETDEWEB)

    Teheran, Jeny [Fermilab

    2016-03-04

    The Fermi National Accelerator Laboratory (FNAL) is facing the challenge of providing scientific data access and grid submission to scientific collaborations that span the globe but are hosted at FNAL. Users in these collaborations are currently required to register as an FNAL user and obtain FNAL credentials to access grid resources to perform their scientific computations. These requirements burden researchers with managing additional authentication credentials, and put additional load on FNAL for managing user identities. Our design integrates the existing InCommon federated identity infrastructure, CILogon Basic CA, and MyProxy with the FNAL grid submission system to provide secure access for users from diverse experiments and collab orations without requiring each user to have authentication credentials from FNAL. The design automates the handling of certificates so users do not need to manage them manually. Although the initial implementation is for FNAL's grid submission system, the design and the core of the implementation are general and could be applied to other distributed computing systems.

  12. Perancangan Corporate Identity Astro Rent Car Surabaya

    OpenAIRE

    Gunardi, Yohanes Calvin; Negara, I Nengah Sudika; Aryanto, Hendro

    2017-01-01

    Corporate Identity merupakan hal yang krusial dalam perkembangan sebuah Perusahaan dalam segi internal maupun eksternal. Dalam membuat perancangan Corporate identity yang efektif, perancangan ini menampilkan segala teori dan ilmu yang berhubungan dengan Corporate identity. Dengan adanya perancangan ini diharapkan para pembaca mengerti betapa pentingnya peran sebuah corporate identity yang tepat dan mengena.Kata kunci: corporate identity, Astro, logo.

  13. The challenge of plural identity

    Directory of Open Access Journals (Sweden)

    Jovanović Bojan

    2005-01-01

    Full Text Available The complexity of collective existence is expressed through an awareness of its real identity, which then entails an appropriate attitude towards its own negativity. Within the hierarchically structured identity, different levels of its generality make it possible to consider them as factors of a plural reality. If negativity is raised to consciousness, then its dark side is dismantled. Thus, instead of being a factor of conflict, negativity becomes an element of complementariness and a factor in the construction of a shared identity at a higher level of generality.

  14. Ethnic identity, territory and sustainable development

    International Nuclear Information System (INIS)

    Carmona Maya, Sergio Ivan

    1998-01-01

    This article explores, within the relationship between territory and society, the various points concerning cultural, social and ethnic identity through which the social contract on sustainable development must confront its greatest contradictions. The political position taken as regards sustainable development seeks cultural unity as a necessary condition for establishing modern forms of behavior to deal with styles of development and the management of the environment, for which to reconcile cultural diversity and the permanent social interaction between different ethnic groups, which is both imperative and of the utmost urgency

  15. CAH AMPERA: HYBRID IDENTITY OF KAMPUNG YOUTHS IN NEGOTIATING CITIZENSHIP

    Directory of Open Access Journals (Sweden)

    Subando Agus Margono

    2014-06-01

    Full Text Available This article attempts to investigate the negotiating process for citizenship of a group of youths facing entrenched social, cultural, and political exclusion. It examines the phenomenon of citizenship negotiation based on stigmatized position of exluded youths. It was found that despite overwhelming odds, the youths use their hybrid identity, which is a manifestation of cah Ampera identity. They succeed in managing the antagonism and affiliation. The citizenship of cah Ampera ismanaged through symbolic capital and action in village micro politics. Success is reflected in their ability to manage their relations with adults, employment, and their young world.

  16. Role of Education in Promoting National Identity Indicators

    Directory of Open Access Journals (Sweden)

    Mohammad Baqer Alizadeh Aghdam

    2010-04-01

    Full Text Available This article reviews social identity among students of secondary school with emphasis on national identity. This paper is to answer how we can increase students` belonging to national identity. Two high school students in two areas of Zanjan city with 700 people are the sample of this study which 30 persons were selected to attend the workshop. This research, based on objective, is practical and problem solving and based on time is longitudinal and panel study. The Research method is qualitative and the technique is based on PCM (Project Cycle Management. Theoretically, Tajfle, Giddens, Jenkins and Pyter Burk`s approaches are used in addition to micro, macro and combinational perspectives. Data collection in this study is through workshop and questionnaire. Research findings showed that students` belonging to national Identity have 10 percent increases since the workshop performance. Belonging to the national identity in male students has increased to 15 percent and in female students 5 percent after the workshop. Both female and male students` belongings to national identity have doubled after the workshop. Moreover, students’ familiarity with Iranian national figures, elements of national culture, the historical and national monuments and some national myths, which are all elements of national identity, have doubled after the workshop.

  17. (Destabilizing Self-Identities in Professional Work

    Directory of Open Access Journals (Sweden)

    Anders Buch

    2013-09-01

    Full Text Available It is characteristic of much professional work that it is performed in ambiguous contexts. Thus, uncertainty, unpredictability, indeterminacy, and recurrent organizational transformations are an integral part of modern work for, e.g., engineers, lawyers, business consultants, and other professionals. Although key performance indicators and other knowledge management systems are used to set standards of excellence for professionals, the character of professional work is still flexible, open to interpretation and heterarchical. The very successfulness (or unsuccessfulness of the work is established in a complex work context where various goals, interests, and perspectives are mediated, altered, contested, mangled, and negotiated in a process of sense-making. The work context is heterogeneously populated by various actors (e.g., the customer, the manager, the colleagues and actants (e.g., quality systems and technical equipment that give “voice” to (conflicting interpretations of what constitutes successful work. Thus, the professionals must navigate in a very complex environment where the locus of governance is far from stable. These characteristics of professional work seem to have implications for the way professionals make sense of their work and their own identities. The identity work of professionals is interwoven with their professional training and career background. With an academic training and a professional career, the individual typically identifies with the profession’s values and adopts a certain way of seeing and approaching the world. This professional outlook typically will constitute the basis of the individual’s appraisal of the work and lay out a horizon of expectations in relation to fulfillment, self-realization, and job satisfaction. In this way, the construction of self-identity becomes the yardstick for the individual’s sense-making and, a fortiori, for the individual’s sense of meaningful work. In this paper

  18. Unhealthy Paradoxes of Healthy Identities

    NARCIS (Netherlands)

    S.J. Magala (Slawomir)

    2003-01-01

    textabstractComparative cross-cultural studies and identity research in social psychology focused on national and organizational differences, clashes and dimensions (Hofstede, Barsoux & Schneider, Jackson, Ward, Bochner & Furnham, Capoza & Brown). Mapping cultural software of individuals and

  19. On Identities in Modern Networks

    Directory of Open Access Journals (Sweden)

    Libor Polcak

    2014-09-01

    Full Text Available Communicating parties inside computer networks use different kind of identifiers. Some of these identifiers are stable, e.g., logins used to access a specific service, some are only temporary, e.g., dynamically assigned IP addresses. This paper tackles several challenges of lawful interception that emerged in modern networks. The main contribution is the graph model that links identities learnt from various sources distributed in a network. The inferred identities result into an interception of more detailed data in conformance with the issued court order. The approach deals with network address translation, short-lived identifiers and simultaneous usage of different identities. The approach was evaluated to be viable during real network testing based on various means to learn identities of users connected to a network.

  20. Unskilled Work and Learner Identity

    DEFF Research Database (Denmark)

    Kondrup, Sissel

    2014-01-01

    . The main argument is that participation research must abandon the notion of motivation as an individual attribute and apply a dialectic concept of learner identity acknowledging work-life as a pivotal space for learning and formation of identity. I outline how a work-life-historical approach combining......The paper examines how unskilled work forms conditions for meeting the obligation to position oneself as an educable subject and engage in formal learning activities. Sensitivity to peoples’ work-life-experiences is necessary to understand their orientation toward different learning activities...... a critical theoretical approach inspired by Salling-Olesen’s and Archer’s concepts of identity and concerns can contribute to an understanding of the relationship between work and learner identity. Through narrative work-life interviews I examine how engagement in unskilled work in small and medium sized...

  1. Culture, Identity and the Curriculum.

    Science.gov (United States)

    Burtonwood, Neil

    1996-01-01

    Critiques recent versions of pluralism by examining the concepts of culture and identity underlying them. Proposes a model of education that rejects cultural transmission in favor of a transformational curriculum that goes beyond culture. (SK)

  2. Human Rights and Cultural Identity

    Directory of Open Access Journals (Sweden)

    John-Stewart Gordon

    2015-12-01

    Full Text Available Universal human rights and particular cultural identities, which are relativistic by nature, seem to stand in conflict with each other. It is commonly suggested that the relativistic natures of cultural identities undermine universal human rights and that human rights might compromise particular cultural identities in a globalised world. This article examines this supposed clash and suggests that it is possible to frame a human rights approach in such a way that it becomes the starting point and constraining framework for all non-deficient cultural identities. In other words, it is possible to depict human rights in a culturally sensitive way so that universal human rights can meet the demands of a moderate version of meta-ethical relativism which acknowledges a small universal core of objectively true or false moral statements and avers that, beyond that small core, all other moral statements are neither objectively true nor false.

  3. Science Identity in Informal Education

    Science.gov (United States)

    Schon, Jennifer A.

    The national drive to increase the number of students pursuing Science Technology, Engineering, and Math (STEM) careers has brought science identity into focus for educators, with the need to determine what encourages students to pursue and persist in STEM careers. Science identity, the degree to which students think someone like them could be a scientist is a potential indicator of students pursuing and persisting in STEM related fields. Science identity, as defined by Carlone and Johnson (2007) consists of three constructs: competence, performance, and recognition. Students need to feel like they are good at science, can perform it well, and that others recognize them for these achievements in order to develop a science identity. These constructs can be bolstered by student visitation to informal education centers. Informal education centers, such as outdoor science schools, museums, and various learning centers can have a positive impact on how students view themselves as scientists by exposing them to novel and unique learning opportunities unavailable in their school. Specifically, the University of Idaho's McCall Outdoor Science School (MOSS) focuses on providing K-12 students with the opportunity to learn about science with a place-based, hands-on, inquiry-based curriculum that hopes to foster science identity development. To understand the constructs that lead to science identity formation and the impact the MOSS program has on science identity development, several questions were explored examining how students define the constructs and if the MOSS program impacted how they rate themselves within each construct. A mixed-method research approach was used consisting of focus group interviews with students and pre, post, one-month posttests for visiting students to look at change in science identity over time. Results from confirmatory factor analysis indicate that the instrument created is a good fit for examining science identity and the associated

  4. Ward identities for conformal models

    International Nuclear Information System (INIS)

    Lazzarini, S.; Stora, R.

    1988-01-01

    Ward identities which express the symmetry of conformal models are treated. Diffeomorphism invariance or locally holomorphic coordinate transformations are used. Diffeomorphism invariance is then understood in terms of Riemannian geometry. Two different sets of Ward identities expressing diffeomorphism invariance in a conformally invariant way are found for the free bosonic string. Using a geometrical argument, the correct invariance for a large class of conformal models is given

  5. Understanding American Identity: An Introduction

    Science.gov (United States)

    2017-12-01

    this leads to is, how can we begin this transformation ? D. HOW TO GET THERE: PATRIOTIC BUILDING BLOCKS 1. Civic Education Many have argued that civic... transformation of the U.S. public education system and writes, “High schools brought young people together into an adolescent world that helped to obscure...Revamped civic education and national service programs can serve to form those cross-cutting ties. 14. SUBJECT TERMS American identity, national identity

  6. The ambiguous identity of auditing

    DEFF Research Database (Denmark)

    Lindeberg, Tobias

    2007-01-01

    This paper analyses the identity of auditing by comparing performance auditing to financial auditing and programme evaluation. Based on an analysis of textbooks, it is concluded that these evaluative practices are situated on a continuum. This implies that studies that rely on ‘audit’ as a label...... to attribute identity to a distinct evaluative practice become insensitive to issues concerning the relevance of their results to evaluative practices in general and their relation to specific characteristic of certain evaluative practices...

  7. Navigating Identities: Subtle and Public Agency of Bicultural Gay Youth.

    Science.gov (United States)

    Cense, Marianne; Ganzevoort, R Ruard

    2017-01-01

    Young people who discover their sexual attraction to people of the same sex often go through a period of ambivalence or distress, especially when they grow up in an environment that condemns homosexuality. The Dutch sociopolitical context makes the expression of same-sex desires among those with non-Dutch roots even more complicated and risky, as prevailing schemes of interpretation render the two identities incompatible. This study explores the expressions of same-sex desires and identities as well as the different forms of agency of bicultural gay youth. In-depth interviews with 14 young adults reveal how young people negotiate bicultural identities in Dutch society that brings to the fore complexities in managing diverse sexual identities and strong religious and cultural affiliations in tandem. Their strategies have the effect of questioning dominant discourses and transcend the oppositional dichotomy between sexual and ethnic forms of sociocultural otherness.

  8. Popular Public Discourse at Speakers' Corner: Negotiating Cultural Identities in Interaction

    DEFF Research Database (Denmark)

    McIlvenny, Paul

    1996-01-01

    In this paper I examine how cultural identities are actively negotiated in popular debate at a multicultural public setting in London. Speakers at Speakers' Corner manage the local construction of group affiliation, audience response and argument in and through talk, within the context of ethnic...... in which participant 'citizens' in the public sphere can actively struggle over cultural representation and identities. Using transcribed examples of video data recorded at Speakers' Corner my paper will examine how cultural identity is invoked in the management of active participation. Audiences...... and their affiliations are regulated and made accountable through the routines of membership categorisation and the policing of cultural identities and their imaginary borders....

  9. PRODUCT BRAND IDENTITY – A FACTOR OF SUCCESSFUL MARKET POSITIONING OF A BRAND

    Directory of Open Access Journals (Sweden)

    Branislav Lijović

    2012-12-01

    Full Text Available This paper begins with the term product brand identity as the new market paradigm. It aims to define the term product brand identity and its significance for realisation of the market value of a product’s brand and overall marketing goals of an economic operator. The strategy of economic operator and desired market positioning of a brand is implemented by means of product brand identity and a combination of its elements. Systematic creation and identity management of a product’s brand resulted in the uniqueness of the brand, and set the foundation for building the entire process of product brand management.

  10. Resolving an identity crisis: Implicit drinking identity and implicit alcohol identity are related but not the same.

    Science.gov (United States)

    Ramirez, Jason J; Olin, Cecilia C; Lindgren, Kristen P

    2017-09-01

    Two variations of the Implicit Association Test (IAT), the Drinking Identity IAT and the Alcohol Identity IAT, assess implicit associations held in memory between one's identity and alcohol-related constructs. Both have been shown to predict numerous drinking outcomes, but these IATs have never been directly compared to one another. The purpose of this study was to compare these IATs and evaluate their incremental predictive validity. US undergraduate students (N=64, 50% female, mean age=21.98years) completed the Drinking Identity IAT, the Alcohol Identity IAT, an explicit measure of drinking identity, as well as measures of typical alcohol consumption and hazardous drinking. When evaluated in separate regression models that controlled for explicit drinking identity, results indicated that the Drinking Identity IAT and the Alcohol Identity IAT were significant, positive predictors of typical alcohol consumption, and that the Drinking Identity IAT, but not the Alcohol Identity IAT, was a significant predictor of hazardous drinking. When evaluated in the same regression models, the Drinking Identity IAT, but not the Alcohol Identity IAT, was significantly associated with typical and hazardous drinking. These results suggest that the Drinking Identity IAT and Alcohol Identity IAT are related but not redundant. Moreover, given that the Drinking Identity IAT, but not the Alcohol Identity IAT, incrementally predicted variance in drinking outcomes, identification with drinking behavior and social groups, as opposed to identification with alcohol itself, may be an especially strong predictor of drinking outcomes. Copyright © 2017 Elsevier Ltd. All rights reserved.

  11. Identity Presentation: The Construction of Identity in Asynchronous Discussion

    Directory of Open Access Journals (Sweden)

    Brian Morgan

    2008-08-01

    Full Text Available This study examines the use of e-mail as a tool for long term discussion between teachers and grade six students. E-mail messages between grade six students and teachers were collected over the course of one academic year. Methods of conversation analysis within a framework of social practice are used to examine the data. While identity is more readily constructed and more fully developed in contexts which allow for physical embodiment such as face-to-face discussion, this analysis found that identity can be constructed in a context that does not provide for the physical embodiment of identity: Identity was constructed using the social, cultural, and technological tools provided and supported by e-mail to develop social practices germane to the e-mail discussion. This study has implications for further understanding the relation between identity, goals, constraints and affordances, and the collaborative creation of social practices in asynchronous computer mediated communication. URN: urn:nbn:de:0114-fqs0803185

  12. Gestão Democrática: Abertura para a Acessibilidade do Sujeito de Identidade Surda Múltipla e Multifacetada nas Instituições de Ensino. Democratic Management: Opening accessibility for subject of deaf identity multiple and multi-faceted in the regular education

    Directory of Open Access Journals (Sweden)

    Santos, Sheila Batista Maia

    2010-05-01

    Full Text Available No presente artigo refletimos sobre Gestão Democrática, Projeto Político Pedagógico e Currículo na interface das representações linguísticas e sócio-antropológicas dos Sujeitos de Identidades Surdas Múltiplas e Multifacetadas no processo de inclusão. Para isto foi feito um levantamento bibliográfico com autores que referendam as temáticas: coordenação pedagógica, educação e surdez - na perspectiva das identidades culturais na pós-modernidade -, Lei 10.436/2002 e do Decreto 5626/2005. Assim, as implementações apontadas fundamentam-se nas idiossincrasias destes sujeitos: língua materna - Língua de Sinais -, historicidade, cultura, identidade, pedagogia surda, e Língua Portuguesa como segunda língua.In this article we reflect on Democratic Management, Political Pedagogical Project and Curriculum at the interface representations and socio-anthropological Subjects’ Identity Deaf multiple and multifaceted process of inclusion. To this was done a literature with authors who endorse the following themes: education supervision, education and deafness - from the perspective of cultural identities in post-modernity, of Decree Law 10436/2002 and 5626/2005. Thus, the implementations identified based upon the idiosyncrasies of these subjects: native language - sign language - history, culture, identity, pedagogy deaf, and Portuguese as a second language.

  13. Claims and Identity: On-Premise and Cloud Solutions

    Science.gov (United States)

    Bertocci, Vittorio

    Today's identity-management practices are often a patchwork of partial solutions, which somehow accommodate but never really integrate applications and entities separated by technology and organizational boundaries. The rise of Software as a Service (SaaS) and cloud computing, however, will force organizations to cross such boundaries so often that ad hoc solutions will simply be untenable. A new approach that tears down identity silos and supports a de-perimiterized IT by design is in order.This article will walk you through the principles of claims-based identity management, a model which addresses both traditional and cloud scenarios with the same efficacy. We will explore the most common token exchange patterns, highlighting the advantages and opportunities they offer when applied on cloud computing solutions and generic distributed systems.

  14. Hierarchy of modular graph identities

    International Nuclear Information System (INIS)

    D’Hoker, Eric; Kaidi, Justin

    2016-01-01

    The low energy expansion of Type II superstring amplitudes at genus one is organized in terms of modular graph functions associated with Feynman graphs of a conformal scalar field on the torus. In earlier work, surprising identities between two-loop graphs at all weights, and between higher-loop graphs of weights four and five were constructed. In the present paper, these results are generalized in two complementary directions. First, all identities at weight six and all dihedral identities at weight seven are obtained and proven. Whenever the Laurent polynomial at the cusp is available, the form of these identities confirms the pattern by which the vanishing of the Laurent polynomial governs the full modular identity. Second, the family of modular graph functions is extended to include all graphs with derivative couplings and worldsheet fermions. These extended families of modular graph functions are shown to obey a hierarchy of inhomogeneous Laplace eigenvalue equations. The eigenvalues are calculated analytically for the simplest infinite sub-families and obtained by Maple for successively more complicated sub-families. The spectrum is shown to consist solely of eigenvalues s(s−1) for positive integers s bounded by the weight, with multiplicities which exhibit rich representation-theoretic patterns.

  15. Hierarchy of modular graph identities

    Energy Technology Data Exchange (ETDEWEB)

    D’Hoker, Eric; Kaidi, Justin [Mani L. Bhaumik Institute for Theoretical Physics, Department of Physics and Astronomy,University of California,Los Angeles, CA 90095 (United States)

    2016-11-09

    The low energy expansion of Type II superstring amplitudes at genus one is organized in terms of modular graph functions associated with Feynman graphs of a conformal scalar field on the torus. In earlier work, surprising identities between two-loop graphs at all weights, and between higher-loop graphs of weights four and five were constructed. In the present paper, these results are generalized in two complementary directions. First, all identities at weight six and all dihedral identities at weight seven are obtained and proven. Whenever the Laurent polynomial at the cusp is available, the form of these identities confirms the pattern by which the vanishing of the Laurent polynomial governs the full modular identity. Second, the family of modular graph functions is extended to include all graphs with derivative couplings and worldsheet fermions. These extended families of modular graph functions are shown to obey a hierarchy of inhomogeneous Laplace eigenvalue equations. The eigenvalues are calculated analytically for the simplest infinite sub-families and obtained by Maple for successively more complicated sub-families. The spectrum is shown to consist solely of eigenvalues s(s−1) for positive integers s bounded by the weight, with multiplicities which exhibit rich representation-theoretic patterns.

  16. PERSONAL IDENTITY IN DEAF ADOLESCENTS

    Directory of Open Access Journals (Sweden)

    Joanna KOSSEWSKA

    2008-06-01

    Full Text Available The purpose of this study was to investigate the factors influencing the identity deaf adolescents. The study involved 67 deaf adolescents (38 boys and 29 girls aged 16 to 19 students of secondary school. Ninety-three hearing children constituted a comparison group. The structure of identity was explored on the basis of identification references given by the subjects who were to reply in writing, 20 times running, to the question: „Who Am I?” the test, adapted from M. H. Kuhn and T. S. McPartland by Martines and Silvestre (1995 given in written and signed mode.Results showed that the hearing status as well as mode of communication influence the description of personal identity. It was found that deaf adoles­cents used more descriptions especially in the fol­lowing categories: Civil Status, Body and Physical Appearance, Tastes and Activities, Friendship and Relationships, Personal and Social Situation, Negative Personal Traits, and Neutral Personality Traits. Although this study could demonstrate im­pact independent variables on identity, the data raise the need for further, preferably longitudinal, research. This complex phenomenon has to be examined more closely.Combined self-descriptive processes lead to the development of an organized, learned and dynamic identity, and subjective description of an individ­ual has strong emotional consequences for the in­dividual in question.

  17. Quantum entanglement of identical particles

    International Nuclear Information System (INIS)

    Shi Yu

    2003-01-01

    We consider entanglement in a system with a fixed number of identical particles. Since any operation should be symmetrized over all the identical particles and there is the precondition that the spatial wave functions overlap, the meaning of identical-particle entanglement is fundamentally different from that of distinguishable particles. The identical-particle counterpart of the Schmidt basis is shown to be the single-particle basis in which the one-particle reduced density matrix is diagonal. But it does not play a special role in the issue of entanglement, which depends on the single-particle basis chosen. The nonfactorization due to (anti)symmetrization is naturally excluded by using the (anti)symmetrized basis or, equivalently, the particle number representation. The natural degrees of freedom in quantifying the identical-particle entanglement in a chosen single-particle basis are occupation numbers of different single-particle basis states. The entanglement between effectively distinguishable spins is shown to be a special case of the occupation-number entanglement

  18. Leisure Time and Social Identity

    Directory of Open Access Journals (Sweden)

    Rasoul Rabbani

    2010-01-01

    Full Text Available How could patterns of leisure represent social identity? Whether they are sub-ordinate to the class identity or in the contemporary context of consumption and the post-modern cultural transformations, they could represent some other different social identities based on the patterns of consumption? Considering “leisure time” as a part of “style of life”, the present study attempts to explore social identity. There are two parts in methodology; first the qualitative one, carried through deep interview technique; and the other, surveying through questionnaire. Results distinguish the determining role “social class”, and the combination of “gender” and social class play in modeling distinctions in leisure patterns. In other words, leisure –as the arena for individual choice- is restricted to the social class and gender –as the structural and contextual variables. The strong correlation identity has with the social class and gender denies the post-modern interpretations which emphasis on consumption as the cause of social differentiations.

  19. Bringing social identity to work: the influence of manifestation and suppression on perceived discrimination, job satisfaction, and turnover intentions.

    Science.gov (United States)

    Madera, Juan M; King, Eden B; Hebl, Michelle R

    2012-04-01

    In the current article, we explored whether manifesting or suppressing an identity (race/ethnicity, gender, age, religion, sexual orientation, or disability) at work is related to perceived discrimination, job satisfaction, and turnover intentions. Participants included 211 working adults who completed an online survey. The results showed that efforts to suppress a group identity were positively (and behavioral manifestations of group identity negatively) related to perceived discrimination, which predicted job satisfaction and turnover intentions. These results suggest that diverse employees actively manage their nonwork identities while at work and that these identity management strategies have important consequences. PsycINFO Database Record (c) 2012 APA, all rights reserved.

  20. Negotiating Contexts to Construct an Identity as a Mathematics Teacher

    Science.gov (United States)

    Hodges, Thomas E.; Cady, Jo Ann

    2012-01-01

    The authors focused on 1 middle-grades mathematics teacher's identity and her efforts to implement standards-based instructional practices. As professionals, teachers participate in multiple professional communities and must negotiate and manage conflicting agendas. The authors analyze how the contexts of these communities influence the teacher's…

  1. Performance through transformation of identity in road cycling

    DEFF Research Database (Denmark)

    Stilling Olesen, Jesper

    In this paper I investigate the relationship between skills and identity of an elite cyclist, who during his career managed to become a big star in the professional peleton. This is Jesper Skibby. The paper is based on a reading of his autobiography "Forstå mig ret." In the book he reproduces his...

  2. IDENTITY AND THE EUROPEAN UNION

    Directory of Open Access Journals (Sweden)

    Abrudan Cristina

    2008-05-01

    Full Text Available The purpose of this article is to throw some light on the question of identity in the European Union. The challenge is to understand how identity formation takes place in the contemporary world. The European integration has to be understood both as a process of socio-economic convergence among European states but also as a process of co-operation on different other levels, too. It seems that cultures, traditions and interests are more and more interconnected as societies become increasingly multicultural. This is the reason why people are concerned with the concept of identity and the recognition of their uniqueness in terms of traditions, values and ways of lives.

  3. National identity in multicultural environment

    Directory of Open Access Journals (Sweden)

    Milena Öbrink Hobzová

    2017-11-01

    Full Text Available In today's globalized world, it is important to find a relationship to our own culture as well as to the other cultures which we encounter due to migration. This goal should be met in multicultural education. As a result of the so-called migration crisis, effectiveness of multicultural education was discussed on social networks and in media. At the same time, national interests and security began to appear in the programmes of political parties. It seems that, due to the fear of refugees, national identity started becoming more important. The situation is reflected in the research presented below. It aimed to determine whether there was a link between the sense of national identity and attitudes to foreigners. The investigation was carried out in 2015 on a sample of 245 respondents. The results showed that the growing sense of national identity deepened the negative attitude to foreigners. It is necessary to work with this fact in multicultural education at schools.

  4. CORPORATE IDENTITY SEJARAH DAN APLIKASINYA

    Directory of Open Access Journals (Sweden)

    Christine Suharto Cenadi

    1999-01-01

    Full Text Available In the recent globalization era%2C and the developed market%2C many companies compete to attract consumers to buy their products. One of the keys to compete and survive in this developing market is by creating an image and graphic identity. This paper will discuss about corporate identity%2C image%2C its purpose and applications. Abstract in Bahasa Indonesia : Dalam era globalisasi dewasa ini%2C dan dengan berkembangnya pasar (market%2C banyak perusahaan bersaing untuk menarik perhatian konsumen untuk membeli produknya. Salah satu cara untuk bersaing dan dapat bertahan di dalam pasar yang terus berkembang ini adalah dengan menciptakan suatu image dan identitas graphic. Tulisan ini akan membahas tentang corporate identity%2C image%2C fungsi dan aplikasinya

  5. Leadership identity : using artefacts (and storytelling) to discover new insights.

    OpenAIRE

    Watton, Emma Louisa; Parry, Ken

    2016-01-01

    Artefacts are used in management education to reflect upon the experiences of participants. Story-telling has a leadership influence that is long recognised in the leadership literature. However, artefacts and story-telling have not been used concurrently in leadership and management development programmes. We used artefacts combined with story-telling to help participants understand their leadership identity. Louisa’s story and artefact are the basis of this research. We found that the story...

  6. Theta function identities associated with Ramanujan's modular ...

    Indian Academy of Sciences (India)

    In Chapter 20 of his second notebook [6], Ramanujan recorded several theta function identities associated with modular equations of composite degree 15. These identities have previously been proved by Berndt in [3]. But he proved most of these theta function identities using modular equations. These identities can also ...

  7. On an extension of a combinatorial identity

    Indian Academy of Sciences (India)

    to an infinite family of 4-way combinatorial identities. In some particular cases we get even 5-way combinatorial identities which give us four new combinatorial versions of. Göllnitz–Gordon identities. Keywords. n-Color partitions; lattice paths; Frobenius partitions; Göllnitz–Gordon identities; combinatorial interpretations. 1.

  8. Exploring Japanese university English teachers' professional identity

    CERN Document Server

    Nagatomo, Diane Hawley

    2012-01-01

    This book examines the professional identities of Japanese university English teachers. It focuses on how relatively new teachers develop their professional identities, how gender impacts the professional identities of female professors, and how teaching practices and beliefs reflect personal and professional identity.

  9. 7 CFR 52.771 - Identity.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 2 2010-01-01 2010-01-01 false Identity. 52.771 Section 52.771 Agriculture... United States Standards for Grades of Canned Red Tart Pitted Cherries 1 Identity and Grades § 52.771 Identity. Canned red tart pitted cherries is the product represented as defined in the standard of identity...

  10. Teacher Identity Work in Mathematics Teacher Education

    Science.gov (United States)

    Neumayer-Depiper, Jill

    2013-01-01

    Becoming a teacher is not developing an identity, but is developing identity as a continuous process of constructing and deconstructing understandings within the complexities of social practice, beliefs, experiences, and social norms. I take up this stance on identity as articulated in Judith Butler's (1999) work with gender identity and…

  11. Identity and Diversity in Today's World

    Science.gov (United States)

    Gee, James Paul

    2017-01-01

    This paper develops a thesis about identity and diversity. I first look at activity-based identities, identities like being a gardener, birder, citizen scientist or fan-fiction writer. These are freely chosen identities and they are proliferating at a great rate today thanks to participatory culture, the Maker Movement and digital and social…

  12. Integrating Identities: Ethnic and Academic Identities among Diverse College Students

    Science.gov (United States)

    Walker, Lovey H. M.; Syed, Moin

    2013-01-01

    Background/Context: Students of Color continue to be underrepresented at the undergraduate level. Recent research has demonstrated the importance of non-academic psychosocial factors for understanding college experiences. One factor, identity, is a broad, multidimensional construct that comprises numerous distinct domains, including political,…

  13. Blended Identities: Identity Work, Equity and Marginalization in Blended Learning

    Science.gov (United States)

    Heikoop, Will

    2013-01-01

    This article is a theoretical study of the self-presentation strategies employed by higher education students online; it examines student identity work via profile information and avatars in a blended learning environment delivered through social networking sites and virtual worlds. It argues that students are faced with difficult choices when…

  14. Men as victims: "victim" identities, gay identities, and masculinities.

    Science.gov (United States)

    Dunn, Peter

    2012-11-01

    The impact and meanings of homophobic violence on gay men's identities are explored with a particular focus on their identities as men and as gay men. Homosexuality can pose a challenge to conventional masculinities, and for some gay men, being victimized on account of sexual orientation reawakens conflicts about their masculinity that they thought they had resolved. Being victimized can reinvoke shame that is rooted in failure or unwillingness to uphold masculine norms. For some gay men, victimization therefore has connotations of nonmasculinity that make being a victim an undesirable status, yet that status must be claimed to obtain a response from criminal justice or victim services. Men who experience homophobic abuse are helped by accepting a victim identity, but only if they can quickly move on from it by reconstructing a masculine gay (nonvictim) identity. This process can be facilitated by agencies such as the police and victim services, provided they help men exercise agency in "fighting back," that is, resisting further victimization and recovering.

  15. Layering spatial identities: the identity discourses of new regions

    NARCIS (Netherlands)

    Terlouw, K.; van Gorp, B.H.

    2014-01-01

    The number and importance of regions are increasing at the same time as traditional regional identities are undermined through processes like globalisation and individualisation. Local and other administrations increasingly cooperate and create new regions which are too changeable for a distinct

  16. Contested identities: Identity constructions in a youth recreational drug culture

    DEFF Research Database (Denmark)

    Ravn, Signe

    2012-01-01

    as responsible drug users. The article studies this recreational drug culture and its internal distinctions, conceptions and norms as they are expressed discursively. The analysis identifies six dimensions of the identity as a responsible, recreational drug user: drug practice, general drug knowledge, context...

  17. Status of personnel identity verifiers

    International Nuclear Information System (INIS)

    Maxwell, R.L.

    1985-01-01

    Identity verification devices based on the interrogation of six different human biometric features or actions now exist and in general have been in development for about ten years. The capability of these devices to meet the cost and operational requirements of speed, accuracy, ease of use and reliability has generally increased although the verifier industry is still immature. Sandia Laboratories makes a continuing effort to stay abreast of identity verifier developments and to assess the capabilities and improvements of each device. Operating environment and procedures more typical of field use can often reveal performance results substantially different from laboratory tests. An evaluation of several recently available verifiers is herein reported

  18. Saving Face and Group Identity

    DEFF Research Database (Denmark)

    Eriksson, Tor; Mao, Lei; Villeval, Marie-Claire

    2015-01-01

    their self- but also other group members' image. This behavior is frequent even in the absence of group identity. When group identity is more salient, individuals help regardless of whether the least performer is an in-group or an out-group. This suggests that saving others' face is a strong social norm.......Are people willing to sacrifice resources to save one's and others' face? In a laboratory experiment, we study whether individuals forego resources to avoid the public exposure of the least performer in their group. We show that a majority of individuals are willing to pay to preserve not only...

  19. Ego identity formation in middle adolescence.

    Science.gov (United States)

    Lavoie, J C

    1976-12-01

    Assumed determinants of ego identity were investigated in this study using sophomore, junior, and senior high school males and females. Subjects were administered the Marcia Ego Identity Status Scale and measures of sex-role identification, personality development, psychological functioning, self-concept, and parental socialization practices. Data analyses, using a median split on identity score, showed that high-identity adolescents obtained more positive scores on sex-role identification, personality development, psychological adjustment, and self-concept than low-identity adolescents. Socialization practices also differed for the two groups. The sex differences which emerged were congruent with the identity literature. Overall, the data supported Erikson's theory of ego identity development.

  20. The Risky Path to a Followership Identity

    DEFF Research Database (Denmark)

    Larsson, Magnus; Nielsen, Mie Femø

    2017-01-01

    Followership research has increased recently, but little attention has been paid to the complexities and challenges of creating a followership identity. Researchers typically portray followership as a safe alternative to leadership identity, but we challenge this assumption by using naturally...... occurring workplace interactions to identify active contributions as well as risks associated with a follower identity. In this study, we use conversation analysis to examine how people collaboratively construct identities, and how identity development shapes and organizes interactions between people...

  1. Lift of dilogarithm to partition identities

    International Nuclear Information System (INIS)

    Terhoeven, M.

    1992-11-01

    For the whole set of dilogarithm identities found recently using the thermodynamic Bethe-Ansatz for the ADET series of purely elastic scattering theories we give partition identities which involve characters of those conformal field theories which correspond to the UV-limits of the scattering theories. These partition identities in turn allow to derive the dilogarithm identities using modular invariance and a saddle point approximation. We conjecture on possible generalizations of this correspondance, namely, a lift from dilogarithm to partition identities. (orig.)

  2. Identity threat at work: how social identity threat and situational cues contribute to racial and ethnic disparities in the workplace.

    Science.gov (United States)

    Emerson, Katherine T U; Murphy, Mary C

    2014-10-01

    Significant disparities remain between racial and ethnic minorities' and Whites' experiences of American workplaces. Traditional prejudice and discrimination approaches explain these gaps in hiring, promotion, satisfaction, and well-being by pointing to the prejudice of people within organizations such as peers, managers, and executives. Grounded in social identity threat theory, this theoretical review instead argues that particular situational cues-often communicated by well-meaning, largely unprejudiced employees and managers-signal to stigmatized groups whether their identity is threatened and devalued or respected and affirmed. First, we provide an overview of how identity threat shapes the psychological processes of racial and ethnic minorities by heightening vigilance to certain situational cues in the workplace. Next, we outline several of these cues and their role in creating and sustaining perceptions of identity threat (or safety). Finally, we provide empirically grounded suggestions that organizations may use to increase identity safety among their employees of color. Taken together, the research demonstrates how situational cues contribute to disparate psychological experiences for racial and ethnic minorities at work, and suggests that by altering threatening cues, organizations may create more equitable, respectful, and inclusive environments where all people may thrive. (PsycINFO Database Record (c) 2014 APA, all rights reserved).

  3. Brand: Identity, Image, and Relationships

    Science.gov (United States)

    Danker, Stephanie Harvey

    2014-01-01

    Adolescents face complex dilemmas such as challenging issues of identity and self-concept, and struggles with building and maintaining relationships. These issues must be embraced in the art classroom. This Instructional Resource will focus on the concept of brand--connecting visual art, marketing, and psychology--and center on ideas found in the…

  4. Cultural heritage and identity politics

    NARCIS (Netherlands)

    During, R.

    2011-01-01

    ‘As the authors in this fascinating volume point out, both heritage and identity discourse can be instrumentalized, by proponents and opponents of European integration, as they can be commodified, in branding efforts with various implementations. Just as in Macchiavelli’s Europe, political and

  5. Developing Students' Professional Digital Identity

    Science.gov (United States)

    Cochrane, Thomas; Antonczak, Laurent

    2015-01-01

    In contrast to the myth of the "Digital Native" and the ubiquity of Facebook use, we have found that students' digital identities are predominantly social with their online activity beyond Facebook limited to being social media consumers rather than producers. Within a global economy students need to learn new digital literacy skills to…

  6. Cultural Identity in Korean English

    Science.gov (United States)

    Chang, Bok-Myung

    2010-01-01

    This study aims to investigate the cultural identity of Korean English and to make the intercultural communications among non-native speakers successful. The purposes of this study can be summarized as follows: 1) to recognize the concept of English as an International Language (EIL), 2) to emphasize cross-cultural understanding in the globalized…

  7. Feminist Identity among Latina Adolescents

    Science.gov (United States)

    Manago, Adriana M.; Brown, Christia Spears; Leaper, Campbell

    2009-01-01

    This study explores developing conceptions of feminism among Latina adolescents, their prevalence of feminist endorsement, and whether home environment and well-being are related to feminist identity. One hundred and forty Latina girls (Grades 9 to 12, M age = 15) wrote personal narratives of their understanding of feminism and whether they…

  8. On 3-way combinatorial identities

    Indian Academy of Sciences (India)

    A K Agarwal

    2018-03-19

    Mar 19, 2018 ... Math. 79 (2009) 145–155), and Agarwal (J. Number Theory 28 (1988) 299–305). Keywords. Basic series; n-color partitions; lattice paths; associated lattice paths; ...... J. Math. 136(2) (1989) 209–228. [5] Agarwal A K and Goyal M, Lattice paths and Rogers identities, Open J. Discrete Math. 1. (2011) 89–95.

  9. Identity Representations in Visual Texts

    Science.gov (United States)

    Hayik, Rawia

    2012-01-01

    In an attempt to address minority issues with Israeli Arab English-as-a-foreign-language ninth-grade students, I as a teacher researcher introduced picture books on the issue and invited students to respond in different modes, one of which was artistic. In one of the lessons, students created collages to represent their identities. In this…

  10. [Identity and narration: autobiographical quests].

    Science.gov (United States)

    Arfuch, Leonor

    2013-01-01

    This paper aims to tackle the subtle relation between autobiographical narratives and identity construction, from a non essentialist conception of identity. In a perspective that articulates philosophy of language, psychoanalysis, semiotics and literary critique, we posit the concept of biographical space as an analytical instrument to make a critical update of the reconfiguration of identities and subjectivities in contemporary culture, marked by the predominance of the biographical, the private and a kind of "public intimacy". This look is more symptomatic than descriptive: it intends to account for the rise of auto/biographical narratives and life-stories, from canonic genres to their multiple derivations in the media, social networks and the most diverse artistic practices, a phenomenon that seems to reaffirm the notion of narrative identities by Ricoeur. Our analysis here, from an ethic, aesthetic and political point of view, will focus on two visual arts experiences that have recently taken place for the first time in Buenos Aires: Christian Boltanski's and Tracey Emin's, solo exhibitions, each of them with a different biographical approach.

  11. Rethinking Materiality, Memory and Identity

    Directory of Open Access Journals (Sweden)

    Tracy Ireland

    2016-12-01

    Full Text Available This introductory article  considers and questions exactly how materials and people constitute social worlds and relationships which sustain identity and memory and, in turn, the social and political structures or norms that these attachments invest in, stabilise and maintain.

  12. Identity, causality, and pronoun ambiguity.

    Science.gov (United States)

    Sagi, Eyal; Rips, Lance J

    2014-10-01

    This article looks at the way people determine the antecedent of a pronoun in sentence pairs, such as: Albert invited Ron to dinner. He spent hours cleaning the house. The experiment reported here is motivated by the idea that such judgments depend on reasoning about identity (e.g., the identity of the he who cleaned the house). Because the identity of an individual over time depends on the causal-historical path connecting the stages of the individual, the correct antecedent will also depend on causal connections. The experiment varied how likely it is that the event of the first sentence (e.g., the invitation) would cause the event of the second (the house cleaning) for each of the two individuals (the likelihood that if Albert invited Ron to dinner, this would cause Albert to clean the house, versus cause Ron to clean the house). Decisions about the antecedent followed causal likelihood. A mathematical model of causal identity accounted for most of the key aspects of the data from the individual sentence pairs. Copyright © 2014 Cognitive Science Society, Inc.

  13. Constructing and Reconstructing Narrative Identity

    Directory of Open Access Journals (Sweden)

    Gabriele Lucius-Hoene

    2000-06-01

    Full Text Available The research work done by the author investigates a phenomenological field—the subjective experience of chronic illness and disability—by means of a specific research instrument, the autobiographical narrative interview. It focuses on the concept of narrative identity and its empirical substrate in the scientifically generated texts. Narrative identity is regarded as a situated, pragmatic, autoepistemic and interactive activity drawing on culturally transmitted narrative conventions which is performed within the research context. We have been working with a systematic analytic approach which covers interactive and contextual aspects of the interview situation as well as rhetoric and positioning strategies in the act of telling. Other research questions concern the concept of "narrative coping" and the comparison of partner's narratives on problems of illness and disability, especially on scrutinizing aspects of identity and alterity (self and other in the texts. This work can be understood as combining aspects of the research domains of narratology, identity and coping on the background of a qualitative methodology. URN: urn:nbn:de:0114-fqs0002189

  14. FRAGMENTED IDENTITIES: THE CULTURAL COLLISION ...

    African Journals Online (AJOL)

    User

    Born in the former French and German colony of. Togo, Komla-Ebri ... of how cultural barriers not only lead to isolation and fragmented identities, but also ..... and, in recreating bits of Italy, in the form of music, cinema and food, absorbs parts of ...

  15. Identity and sortals (and Caesar)

    Czech Academy of Sciences Publication Activity Database

    Klev, Ansten

    2017-01-01

    Roč. 82, č. 1 (2017), s. 1-16 ISSN 0165-0106 Institutional support: RVO:67985955 Keywords : identity * neo-logicism * type theory * Julius Caesar problem Subject RIV: AA - Philosophy ; Religion OBOR OECD: Philosophy, History and Philosophy of science and technology

  16. Arla and Danish National Identity

    DEFF Research Database (Denmark)

    Mordhorst, Mads

    2014-01-01

    into modernity that is more democratic than the traditional process of industrialisation seen in other European countries. Thus the narrative of the co-operatives has become part of Danish memory and identity. In the post-war years, however, and especially in the last two decades, the process of globalisation...

  17. Monetary Organization and National Identity

    DEFF Research Database (Denmark)

    Ravn Sørensen, Anders

    2016-01-01

    This article develops a detailed overview of literature on the relationship between monetary organization, understood as currencies and central banks, and issues of national identity and nationalism. It demonstrates how the literature on this subject for the past 20 years has developed into a dis......This article develops a detailed overview of literature on the relationship between monetary organization, understood as currencies and central banks, and issues of national identity and nationalism. It demonstrates how the literature on this subject for the past 20 years has developed...... into a distinct research field and the article sketches a set of different methodological approaches as well as geographical and thematical variations within the field. In particular, the overview points to a recent shift in focus from a preoccupation with the identity-cultivating qualities of monetary...... organization to an emphasis on how collective identities legitimize monetary organization. Based on the literature review, the article points to two underdeveloped themes for future research to investigate: (1) further studies on the interrelation between the legitimacy of monetary organization and national...

  18. An 'open source' networked identity

    DEFF Research Database (Denmark)

    Larsen, Malene Charlotte

    2016-01-01

    This chapter examines the concept of identity in relation to youth practices on social network sites (SNSs). The chapter illustrates how writing “I love you” or other emotional statements on each other’s profiles on SNSs is not only a common way for Danish teenagers to communicate and practice...

  19. Identity Transformation of Korean Immigrants.

    Science.gov (United States)

    Kim, Saekyung; Gaa, John; Swank, Paul; Liberman, Dov

    Immigration is one of the most significant changes which can occur in one's lifetime. Immigrants struggle with their foreign environment and renewed crises; they suffer from "uprootedness" and "missed embeddedness" and have difficulty integrating their identity roles. Erikson's psychosocial development theory and Marcia's…

  20. Digital photography: communication, identity, memory

    NARCIS (Netherlands)

    van Dijck, J.

    2008-01-01

    Taking photographs seems no longer primarily an act of memory intended to safeguard a family's pictorial heritage, but is increasingly becoming a tool for an individual's identity formation and communication. Digital cameras, cameraphones, photoblogs and other multipurpose devices are used to

  1. Counselor Identity: Conformity or Distinction?

    Science.gov (United States)

    McLaughlin, Jerry E.; Boettcher, Kathryn

    2009-01-01

    The authors explore 3 debates in other disciplines similar to counseling's identity debate in order to learn about common themes and outcomes. Conformity, distinction, and cohesion emerged as common themes. They conclude that counselors should retain their distinctive, humanistic approach rather than conforming to the dominant, medical approach.

  2. The Scanfin Merger: a Matter of Culture and Identity (Case A)

    DEFF Research Database (Denmark)

    Smith, Pernille; Carugati, Andrea; Giangreco, Antonio

    and middle managers reacted to the merger. The issues in this case are culture and identity. What are the implications when companies from four different countries merge? What role does differing cultures (national or organisational) play in the process and how does this affect the identity of the company...

  3. Secondary Uses of Personal Identity Information: Policies, Technologies and Regulatory Framework

    DEFF Research Database (Denmark)

    Adjei, Joseph K.; Olesen, Henning

    2012-01-01

    Although personal identity information must primarily be used for protecting and promoting the physical needs of individuals, it has also become central to the business models of the digital age due to its use for other secondary purposes, resulting in various innovative identity management (Id...

  4. The Family as a Site for Gendered Ethnic Identity Work among Asian Indian Immigrants

    Science.gov (United States)

    Mehrotra, Meeta; Calasanti, Toni M.

    2010-01-01

    Research on immigrants often points to the family as a source of support and a location for oppression. Using in-depth interviews with 38 first-generation immigrant Indians, this study adds to this literature by exploring families as sites of identity work where first-generation immigrants manage their gendered ethnic identities. Relocation into a…

  5. Management

    OpenAIRE

    Daft, Richard L.; Kendrick, Martyn; Vershinina, Natalia

    2010-01-01

    The market-leading textbook for principles of management courses reaches a new level with Richard L. Daft being joined by Martyn Kendrick and Natalia Vershinina (both Leicester Business School) to provide an unparalleled resource for students in Europe, the Middle East and Africa (EMEA). After listening to the requirements of lecturers, the authors have maintained the same comprehensive coverage and structure of the original work but carefully threaded in new EMEA and wider global examples an...

  6. Bridging Identity Gaps : Supporting Identity Performance in Citizen Service Encounters

    DEFF Research Database (Denmark)

    Borchorst, Nikolaj Gandrup; McPhail, Brenda; Smith, Karen Louise

    2012-01-01

    administrative processes and the quality and swiftness of the service they receive. As we bring to light in this paper, this “fitting in” with rigid bureaucratic procedures and IT systems interestingly requires a substantial collaborative effort between the receiver(s) of the service and a complex constellation...... of surrounding stakeholders and intermediaries. This collaboration and the performing of multiple identities raises challenges for the design of e-government systems aimed at supporting physical and digital citizen service provision, as well as issues regarding privacy, citizenship, and public service quality......This paper explores in situ citizen service encounters in government offices. Drawing upon ethnographically informed fieldwork in Canada and Denmark, we discuss the challenges to supporting citizens in constructing and performing identities in public service settings. Our data suggests...

  7. Intergroup Leadership Across Distinct Subgroups and Identities.

    Science.gov (United States)

    Rast, David E; Hogg, Michael A; van Knippenberg, Daan

    2018-03-01

    Resolving intergroup conflict is a significant and often arduous leadership challenge, yet existing theory and research rarely, if ever, discuss or examine this situation. Leaders confront a significant challenge when they provide leadership across deep divisions between distinct subgroups defined by self-contained identities-The challenge is to avoid provoking subgroup identity distinctiveness threat. Drawing on intergroup leadership theory, three studies were conducted to test the core hypothesis that, where identity threat exists, leaders promoting an intergroup relational identity will be better evaluated and are more effective than leaders promoting a collective identity; in the absence of threat, leaders promoting a collective identity will prevail. Studies 1 and 2 ( N = 170; N = 120) supported this general proposition. Study 3 ( N = 136) extended these findings, showing that leaders promoting an intergroup relational identity, but not a collective identity, improved intergroup attitudes when participants experienced an identity distinctiveness threat.

  8. Creating Identity in Interaction with Business Media

    DEFF Research Database (Denmark)

    Strandgaard Pedersen, Jesper; Boutaiba, Sami

    2004-01-01

    In contemporary society, it is believed that things are changing at an increasingly rapid pace. We see this in newspapers, books, or every speech we listen to that modern (business) life is a race towards new horizons, or towards newness tout court. No matter which standpoint one engages vis......-mentioned observation that economic transformation and globalization continue to alter how organizations and employees view work, and that these transformations require that workers and managers understand and adjust to major changes in definitions of and approaches to work, organizational structures, and relationships...... more specifically on the way in which Zentropa performs an identity in interaction with one of its very significant others, namely the written press. This paper is in particular interested in studying how organizations through different forms of interaction and communication with the business media...

  9. Juggling identities of rheumatoid arthritis, motherhood and paid work

    DEFF Research Database (Denmark)

    Feddersen, Helle; Mechlenborg Kristiansen, Tine; Andersen, Pernille Tanggaard

    2018-01-01

    professionals have an important role to play in investigating possible ways for the individual to maintain employment or return to work. Living with rheumatoid arthritis and being a paid worker challenge women's role performance and thereby their identification as mothers. Therefore, rehabilitation......PURPOSE: To explore how women with rheumatoid arthritis manage their illness, motherhood, and work life. METHODS: A constructivist, grounded theory approach based on individual interviews and participant observations with 20 women with rheumatoid arthritis who participated in work life and had......-sided act; (3) Living with rheumatoid arthritis as an identity? Paid work, motherhood, and illness are linked to the women's social identities. The women construct and change their identities in interactions with children, partners, other parents, colleagues, and employers. CONCLUSION: The women attribute...

  10. Absorption properties of identical atoms

    International Nuclear Information System (INIS)

    Sancho, Pedro

    2013-01-01

    Emission rates and other optical properties of multi-particle systems in collective and entangled states differ from those in product ones. We show the existence of similar effects in the absorption probabilities for (anti)symmetrized states of two identical atoms. The effects strongly depend on the overlapping between the atoms and differ for bosons and fermions. We propose a viable experimental verification of these ideas. -- Highlights: •The absorption rates of a pair of identical atoms in product and (anti)symmetrized states are different. •The modifications of the optical properties are essentially determined by the overlapping between the atoms. •The absorption properties differ, in some cases, for bosons and fermions

  11. Variational identities and Hamiltonian structures

    International Nuclear Information System (INIS)

    Ma Wenxiu

    2010-01-01

    This report is concerned with Hamiltonian structures of classical and super soliton hierarchies. In the classical case, basic tools are variational identities associated with continuous and discrete matrix spectral problems, targeted to soliton equations derived from zero curvature equations over general Lie algebras, both semisimple and non-semisimple. In the super case, a supertrace identity is presented for constructing Hamiltonian structures of super soliton equations associated with Lie superalgebras. We illustrate the general theories by the KdV hierarchy, the Volterra lattice hierarchy, the super AKNS hierarchy, and two hierarchies of dark KdV equations and dark Volterra lattices. The resulting Hamiltonian structures show the commutativity of each hierarchy discussed and thus the existence of infinitely many commuting symmetries and conservation laws.

  12. Context-Aware Identity Delegation

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.

    2009-01-01

    In emerging ubiquitous computing, related nomadic users often perform similar tasks and share the same computing infrastructure.This means that security of the shared resources is of prime importance.Frequent delegation of tasks among users must be anticipated as most nomadic environments...... are hectic and very dynamic. A delegation mechanism with a slightly complicated user interface will not only reduce the productivity but also provide nomadic users with a strong motivation to circumvent the mechanism itself. Delegation in access control domain is not practical for the most of nomadic users...... due to its complicated and complex structure. Identity delegation at authentication level provides improved usability, which reduces the risk of circumventing the delegation mechanism; at the same time, however, identity delegation violates the principle of least privileges. We use contextual...

  13. About identities: What is "hinchada"?

    Directory of Open Access Journals (Sweden)

    Daniel Zambaglione

    2008-11-01

    Full Text Available This text belongs to Chapter I of the master's hesis "The endurance in the body" Building identity of the fans of a club of Argentine football. Such work investigation was developing on a predominantly qualitative approach, involve different methods such as e-depth interviews, participant observation and not a participant and focus groups. In this chapter, we will present to the fans, their practices and performances. Showing the subjects and their actions. , Exhibiting the main mechanisms of association to the group "The stamina." Also, as it conforms rebuild on the one hand as a symbol of prestige and honor. And for another, as one of the most important factors in the formation of identity, understood this from a position constructivita traveling in reverse strict sense of the essential sights

  14. Othering, identity formation and agency

    Directory of Open Access Journals (Sweden)

    Sune Qvotrup Jensen

    2011-10-01

    Full Text Available The article examines the potentials of the concept of othering to describe identity formation among ethnic minorities. First, it outlines the history of the concept, its contemporary use, as well as some criticisms. Then it is argued that young ethnic minority men in Denmark are subject to intersectional othering, which contains elements of exoticist fascination of the other. On the basis of ethnographic material, it is analysed how young marginalized ethnic minority men react to othering. Two types of reactions are illustrated: 1 capitalization on being positioned as the other, and 2 refusing to occupy the position of the other by disidentification and claims to normality. Finally, it is argued that the concept of othering is well suited for understanding the power structures as well as the historic symbolic meanings conditioning such identity formation, but problematic in terms of agency.

  15. Fannish tattooing and sacred identity

    Directory of Open Access Journals (Sweden)

    Bethan Jones

    2015-03-01

    Full Text Available Pleasure is an important motivation for fans to adopt texts. Fannish tattoos function to demonstrate affective investments in a text; they are also a performance of fandom and an example of sacred fan identity. Like engaging in cosplay or wearing clothing that features logos, fannish tattoos mark people as fans of a text. Furthermore, the more obscure the logo or fannish reference, the more performative the tattoo. Fannish tattoos help to construct a sacred fan identity. The sacred experience (as theorized by Émile Durkheim and his concept of the totem is imbued with meaning through choices that set it aside from the mundane. Within the context of fannish tattoos, fan affect gains similar significance.

  16. Vacceans, Past or future identity?

    Directory of Open Access Journals (Sweden)

    Rosalía Hernández García

    2011-06-01

    Full Text Available Nowadays, when talking about the vaccei, discussions focus on the debate of geographic and cultural boundaries and on the definition of their identity, but bearing in mind that the life of this people was sold for thousands of years by the Roman assimilation. A further reflection makes us wonder if this identity has survived to some extension up to the present: concepts such as the controversial “vaccean collectivism” were used to support various ideological discourses, furthermore it shouldn’t be missed the popular uptake of this ancient people today through Rugby’s team (vacceos cavaliers, partnerships, trademarks and wines with the name of vaccei, among many others. The aim of this paper is to study how the various factors that determine or define that culture have been used over recent history.

  17. Organizational Identity, Culture, and Image

    OpenAIRE

    Ravasi, D.

    2016-01-01

    The concept of organizational identity is often confused with similar concepts such as organizational culture or organizational image. This confusion depends in part on the inconsistent use that scholars have made of these terms in the past. This chapter reviews the literature that has discussed how these concepts differ and how they are interrelated, and proposes an integrative framework that summarizes the most widely accepted definitions. It focuses in particular on research on dynamic int...

  18. Communicating a Renewed Brand Identity

    OpenAIRE

    Marttila, Oona

    2017-01-01

    This thesis aims to help the commissioning company in finding a suitable approach to efficiently communicate the renewed brand identity of the company. Theories applied to this research include rebranding, segmentation, as well as theories on customer relationships, service encounters and online marketing. This is complemented by the identification of the company potential through SWOT analysis as well as identifying differentiating factors within the company, in order to gain competitive adv...

  19. Building Place Identity through Heritage

    OpenAIRE

    Alexandra PACESCU; Vlad THIERY

    2015-01-01

    In an increasingly globalized world, the fading specificity is producing homogeneous images that make cities more and more difficult to tell apart. The market economy tends to commodify each and every aspect of urban life, even those belonging to the cultural realm. As a consequence, a need for differentiators arises, which can be best embodied by the local heritage. The present paper is trying to establish a link between the concept of Place Identity, seen from a marketing point of view, ...

  20. Autonoesis and dissociative identity disorder.

    Science.gov (United States)

    Morton, John

    2018-01-01

    Dissociative identity disorder is characterised by the presence in one individual of two or more alternative personality states (alters). For such individuals, the memory representation of a particular event can have full episodic, autonoetic status for one alter, while having the status of knowledge or even being inaccessible to a second alter. This phenomenon appears to create difficulties for a purely representational theory and is presented to Mahr & Csibra (M&C) for their consideration.

  1. Music teacher identity and professionalism

    DEFF Research Database (Denmark)

    Holgersen, Sven-Erik

    2017-01-01

    The present article is concerned with transformative learning and identity formation in student music teachers acting as researchers of a music education practice as part of their MA study programme. More specific, the aim is to discuss how engaging in a research perspective may serve as an eye......-opener for student music teachers and widen their perspective on subject didactics, teaching/learning issues and professional practice....

  2. Gauge invariance and Nielsen identities

    International Nuclear Information System (INIS)

    Lima, A.F. de; Bazaia, D.

    1989-01-01

    The one-loop contribution to the effective potential and mass are computed within the context of scalar electrodynamics for the class of general R gauges in the MS scheme. These calculations are performed in order to construct a non-trivial verification of the corresponding Nielsen identities within the context of the Higgs model. Some brief comments on the Coleman-Weinberg model are also included. (author) [pt

  3. Codimensions of generalized polynomial identities

    International Nuclear Information System (INIS)

    Gordienko, Aleksei S

    2010-01-01

    It is proved that for every finite-dimensional associative algebra A over a field of characteristic zero there are numbers C element of Q + and t element of Z + such that gc n (A)∼Cn t d n as n→∞, where d=PI exp(A) element of Z + . Thus, Amitsur's and Regev's conjectures hold for the codimensions gc n (A) of the generalized polynomial identities. Bibliography: 6 titles.

  4. Ectodermal dysplasia in identical twins

    OpenAIRE

    Puttaraju, Gurkar Haraswarupa; Visveswariah, Paranjyothi Magadi

    2013-01-01

    Hereditary hypohidrotic ectodermal dysplasia (HED) is typically inherited as an X-linked recessive trait, characterized by deformity of at least two or more of the ectodermal structures - hair, teeth, nails and sweat glands. Two cases of hereditary HED involving identical male twins, is being documented for the rarity of its occurrence with special attention given to genetics, pathophysiology, clinical, intraoral manifestations and to the methods to improve the masticatory function, the facia...

  5. Human Rights and the Excess of Identity

    Science.gov (United States)

    Al Tamimi, Yussef

    2017-01-01

    Identity is a central theme in contemporary politics, but legal academia lacks a rigorous analysis of this concept. The aim of this article is twofold: (i) firstly, it aims to reveal presumptions on identity in human rights law by mapping how the European Court of Human Rights approaches identity and (ii) secondly, it seeks to analyse these presumptions using theoretical insights on identity. By merging legal and theoretical analysis, this article contributes a reading of the Court’s case law which suggests that the tension between the political and apolitical is visible as a common thread in the Court’s use of identity. In case law concerning paternity, the Court appears to hold a specific view of what is presented as an unquestionable part of identity. This ostensibly pre-political notion of identity becomes untenable in cases where the nature of an identity feature, such as the headscarf, is contended or a minority has adopted a national identity that conflicts with the majoritarian national identity. The Court’s approach to identity in such cases reflects a paradox that is inherent to identity; identity is personal while simultaneously constituted and shaped by overarching power mechanisms. PMID:29881144

  6. Identity vicissitudes in work organizations

    Directory of Open Access Journals (Sweden)

    Giovanni Di Stefano

    2014-09-01

    Full Text Available Today’s pressing scientific and technological changes, while having an impact on the organizational life of our post-industrial world, are producing drastic transformations within organizations, creating in workers new feelings of anxiety and uncertainty. The features of the present state of crises - instability, uncertainty, weakening of family bonds – define a peculiar social and psychological uneasiness, proper of our time, as a consequence of the technological business culture prevailing today, which is destabilizing the institutional role of organizations, namely fixing the various forms of personal identity. This contribution offers, also by presenting a training experience in a business setting, a critical psycho-socio-analysis of the roles that individuals and organizations must presently face to foster development and, at the same time, provides directions to avoid the perverse drift of today’s culture and promote the identity process through the reactivation of the learning/changing capacity aimed at the definition of new shared meanings.Keywords: identity, organization, psycho-socio-analysis

  7. Identity vicissitudes in work organizations

    Directory of Open Access Journals (Sweden)

    Giovanni Di Stefano

    2014-10-01

    Full Text Available Today’s pressing scientific and technological changes, while having an impact on the organizational life of our post-industrial world, are producing drastic transformations within organizations, creating in workers new feelings of anxiety and uncertainty. The features of the present state of crises - instability, uncertainty, weakening of family bonds – define a peculiar social and psychological uneasiness, proper of our time, as a consequence of the technological business culture prevailing today, which is destabilizing the institutional role of organizations, namely fixing the various forms of personal identity. This contribution offers, also by presenting a training experience in a business setting, a critical psycho-socio-analysis of the roles that individuals and organizations must presently face to foster development and, at the same time, provides directions to avoid the perverse drift of today’s culture and promote the identity process through the reactivation of the learning/changing capacity aimed at the definition of new shared meanings.Keywords: Identity; Organization; Psycho-socio-analysis

  8. The Investigation of the Identity Attributes and Attitudes of Romanians

    Directory of Open Access Journals (Sweden)

    CODRINA ŞANDRU

    2012-04-01

    Full Text Available The object of this qualitative sociology study was to emphasize the identity attributes of Romanians today: what they think of themselves as a people and what Romanians who live in the country or in other countries in the world think about Romania. The theoretical framework was established by social identity theory and by social representations research. For the gathering of data, I used a questionnaire with open questions and the reflection-and answer-triggering method, using as stimulus patriotic-themed songs: lyrics from the national anthem and another patriotic song very well known in Romania, entitled "God, protect the Romanians!". For the analysis of qualitative data, I used a category scheme specific for social representations, and at the end of the article I synthesized the data in the form of "storytelling" representative for four social categories included in the research: students, managers, pensioners and Romanian migrants abroad. The data obtained point to an identity crisis among these categories of Romanians: this crisis takes the form of a negative national identity. In terms of the social identity theory (Tajfel, it means that Romanians have in general a negative image when comparing themselves with other nations and they feel it like a strong discomfort.

  9. Chronic illness in the workplace: stigma, identity threat and strain.

    Science.gov (United States)

    McGonagle, Alyssa K; Barnes-Farrell, Janet L

    2014-10-01

    Chronic illness affects a large and growing number of workers in the United States and globally. Stigmatization (devaluation) at work based on chronic illness may be stressful for individuals and therefore may lead to negative psychological consequences (i.e. strains). In order to better understand stressful experiences of stigma for workers with chronic illnesses, a model of stigma-related identity threat (perceptions that one is at risk of being treated negatively at work because of chronic illness) was tested on a sample of 203 working adults with chronic illnesses. The following variables related to workers' perceptions of chronic illness-related identity threat: workers' boundary flexibility (flexibility in managing their work and life), their meta-perceptions of devaluation (perceptions of others' devaluation of them based on illness) and their job self-efficacy (feelings of confidence related to performing their job). In turn, perceptions of identity threat related to both feelings of psychological strain and (lower levels of) perceived work ability. Surprisingly, neither stigma centrality (how fundamental illness is to one's identity) nor supervisor support related to workers' identity threat perceptions. Copyright © 2013 John Wiley & Sons, Ltd.

  10. Identity and power in Ukraine

    Directory of Open Access Journals (Sweden)

    Karina V. Korostelina

    2013-01-01

    Full Text Available This paper analyzes the coercive and legitimate forms of power in Ukraine. It describes the crisis of legitimacy in Ukraine as a contradiction between a blatantly cruel system of capitalism dominated by a few oligarchs, and the lingering remnants of a Soviet mentality. Two strategies are used by the Government to stoke the crisis. First, increased identification with ethnic or regional groups are instrumentally used by the Government to take attention from economic and class issues. Second, the incorporation of a Soviet meaning of power into the new national identity and presentation of it as core norms, believes, and values of the people of Ukraine competes with alternative Ukrainian identity concepts. The paper analyzes five main features of the Soviet meanings of power – political, social, and economic paternalism, perception of power as source of profit and violence, and the dual reality of power with the gap between official narratives of power and a real life. The process of incorporation of the Soviet concept of power into national identity is facilitated by the process of national identity formation that helped to preserve the Soviet perception of power, because of the absence of a new ideology, a lack of critical assessment of the Soviet past, an absence of the vision of outcome, an embryonic culture of democracy, and contributions of all the presidents to the preservation of the Soviet meaning of power. People justify the system as legitimate and fair for many reasons: out of historic habit and deemed moral obligations, self-interests and/or a fear of sanctions, identification with the ruler, zones of indifference, an absence of will and self-confidence, desire to support a strong leader based on ambiguity intolerance, hierarchy – enhancing ideologies, and a general tolerance of injustice. The obedience of subjects is connected with the strength of will of the subjects and the social structures of the society. In Ukraine, the

  11. Christian identity of secular Europe

    Directory of Open Access Journals (Sweden)

    Malešević Miroslava

    2006-01-01

    Full Text Available The Jyllands-Posten Muhammad cartoons controversy began after twelve editorial cartoons, most of which depicted the Islamic prophet Muhammad, were published in the Danish newspaper Jyllands-Posten on September 30, 2005. The newspaper explained that this publication was a contribution to debate regarding criticism of Islam and self-censorship. In response, Danish Muslim organizations held public protests and spread knowledge of Jyllands-Postens publication. As the controversy grew, some or all of the cartoons were reprinted in newspapers in more than fifty other countries, which led to violent protests, particularly in the Muslim world. Critics of the cartoons describe them as islamophobic and argue that they are blasphemous, intended to humiliate a marginalized Danish minority, and a manifestation of ignorance about the history of western imperialism, from colonialism to the current conflicts in the Middle East. Supporters of the cartoons claim they illustrate an important issue in an age of Islamic extremist terrorism and that their publication is a legitimate exercise of the right of free speech. They also note that similar cartoons about other religions are frequently printed, arguing that the followers of Islam were not targeted in a discriminatory way. The dispute has again pointed out to the relevance of religion and religious differences in the contemporary world. Again, several questions presented themselves as significant: citizen freedom, values and the rights to exercise them, secularism, tolerance, multiculturalism majority-minority relationships and so on. The resolution to these issues appears as of the outmost importance, considering the existing tendencies of united Europe to even more firmly establish cultural, economic, and political associations, in order to launch a one, joined European identity with vanishing national, ethnic and religious differences. Therefore, the question becomes: what could serve as a foundation for

  12. Authenticity in Leadership: Intersectionality of Identities.

    Science.gov (United States)

    Jones, Susan R

    2016-12-01

    This chapter situates leadership and the process of becoming a leader within an understanding of identity, particularly intersecting social identities and intersectionality. © 2016 Wiley Periodicals, Inc., A Wiley Company.

  13. Idendity and identity conflict in the workplace

    NARCIS (Netherlands)

    K.E. Horton (Kate); P.S. Bayerl (Saskia); G. Belschak-Jacobs (Gabriele)

    2014-01-01

    markdownabstract__Abstract__ As individuals, we define ourselves according to various characteristics that include our values and beliefs. This gives us our identity. As organisations become increasingly complex, understanding the concept of identity conflict may mean the difference

  14. Superconformal Ward identities and the supertorus

    International Nuclear Information System (INIS)

    Grundberg, J.; Nakayama, R.

    1987-12-01

    We derive superconformal Ward identities in the context of superspace supergravity. From these Ward identities we extract operator product expansions and the case of a supertorus is studied in some detail. (orig.)

  15. Perception, experience and body identity.

    Science.gov (United States)

    López-Ibor, Juan J; Ortiz, Tomás; López-Ibor, María I

    2011-12-01

    Physician has to know the patient in the disease and not only the disease in the patient, from the dual perspective of the body as object and the body as subject. This also affects the patient who has to cope with the reality of having a body that bursts into the subject's consciousness as a vital threat, as source of discomfort and inability and being a body (Marcel). The human body in its dual aspect has been and is a great unknown, if not a great outrage in spite of the fact that we are our body and our body is each of us. We sometimes do not feel as we are and thus a confrontation arises, sometimes more normal, others more morbid. This forces the physician to face complex ethics considerations and the scientist to accept a personal identity disorder. Dualism considers that there are two substances in us, one that distinguishes us from other beings and from the rest of the individuals of the human species, the soul, the psychic life, mind or consciousness, and another more insubstancial one, the body. The aim of the first substance is to dominate the body, to survive it after death when it is, already a corpse is meant to become putrefied, is buried, incinerated or thrown to the depth of the sea. This dualism aims to explain the origin of the evil and the attitude to defeat it and it does so efficiently. This anthropology has very ancient roots (the Upvanishads, in the orphic texts, in Plato), it is the core of Gnostic thought and the foundation of the modern science since Descartes. Some monist perspectives are a masked dualism or a mereologic fallacy, according to which, the brain is conscious, when that what is conscious is the subject, although the subject, with the brain could not be conscious. Therefore, a new perspective is proposed, chiasmatic or janicular monism, that considers the adaptive value of focusing on the reality from two perspectives, as physical universe and the world of interpersonal relationships. In the agnosias and in the phantom limb

  16. 'Everyone here wants everyone else to get better': The role of social identity in eating disorder recovery.

    Science.gov (United States)

    McNamara, Niamh; Parsons, Harriet

    2016-12-01

    Retention of a positively valued illness identity contributes to poor outcomes for individuals with eating disorders (EDs). Consequently, dis-identification from the illness identity and the adoption of a recovery identity are vital for successful recovery. While social identity processes have been shown to influence ED maintenance, their role in recovery is rarely considered. This study explores how a sense of shared identity helps individuals with EDs manage their condition and promotes recovery. Transcripts from 18 online support sessions involving 75 participants were thematically analysed. Our findings suggest that the illness identity initially operates as a social identity that forms the basis for connections with similar others. For those wishing to recover, identity-based support is then perceived to be more effective than that found outside the group. Online interactions also facilitate construction of a new shared recovery identity which promotes a shift from the illness identity as a primary source of definition and endorses group norms of illness disclosure and treatment engagement. While in the clinical literature, ED identity is seen as problematic and interventions are targeted at challenging an individual's self-concept, we suggest that interventions could instead harness identity resources to support a transition to a recovery identity. © 2016 The British Psychological Society.

  17. Reorienting Deliberation: Identity Politics in Multicultural Societies

    Directory of Open Access Journals (Sweden)

    Rebecca Mason

    2010-03-01

    Full Text Available Many political theorists argue that cross-cultural communication within multicultural democracies is not best served by a commitment to identity politics. In response, I argue that identity politics only interfere with democratic participation according to an erroneous interpretation of the relationship between identity and reasoning. I argue that recognizing the importance of identity to the intelligibility of reasons offered in the context of civic deliberation is the first step towards the kind of dialogue that democratic participation requires.

  18. The Identity of Czech Deaf Roma

    OpenAIRE

    Kalousová, Josefina

    2012-01-01

    With the definition of Deaf people as a cultural and linguistic minority the research of Deaf identity became possible. Following this, questions of identity of minority deaf persons emerged. Do these persons affiliate to the Deaf community or to their ethnic minority? This bachelor thesis focuses on the topic of Czech deaf Roma identity. The underlying assumption of the paper is that identity is a continuing process dependent on the interaction of an individual and society and that it consti...

  19. New nurse transition: success through aligning multiple identities.

    Science.gov (United States)

    Leong, Yee Mun Jessica; Crossman, Joanna

    2015-01-01

    The purpose of this paper is to explore the perceptions of new nurses in Singapore of their experiences of role transition and to examine the implications for managers in terms of employee training, development and retention. This qualitative study was conducted using a constructivist grounded theory approach. In total 26 novice nurses and five preceptors (n=31) from five different hospitals participated in the study. Data were collected from semi-structured interviews and reflective journal entries and analysed using the constant comparative method. The findings revealed that novice nurses remained emotionally and physically challenged when experiencing role transition. Two major constructs appear to play an important part in the transition process; learning how to Fit in and aligning personal with professional and organisational identities. The findings highlight factors that facilitate or impede Fitting in and aligning these identities. Although the concept of Fitting in and its relation to the attrition of novice nurses has been explored in global studies, that relationship has not yet been theorised as the dynamic alignment of multiple identities. Also, whilst most research around Fitting in, identity and retention has been conducted in western countries, little is known about these issues and their interrelationship in the context of Singapore. The study should inform decision making by healthcare organisations, nurse managers and nursing training institutions with respect to improving the transition experience of novice nurses.

  20. Retirees' Social Identity and Satisfaction with Retirement

    Science.gov (United States)

    Michinov, Estelle; Fouquereau, Evelyne; Fernandez, Anne

    2008-01-01

    The purpose of this study was to examine the structure of retirees' social identity and its impact on satisfaction with retirement. From social identity theory formulations, we assumed that (1) retiree-identity was comprised of three distinct components (cognitive, evaluative, and affective), and (2) only the affective component would play a role…

  1. Fibonacci Identities via the Determinant Sum Property

    Science.gov (United States)

    Spivey, Michael

    2006-01-01

    We use the sum property for determinants of matrices to give a three-stage proof of an identity involving Fibonacci numbers. Cassini's and d'Ocagne's Fibonacci identities are obtained at the ends of stages one and two, respectively. Catalan's Fibonacci identity is also a special case.

  2. Pre-Service Teacher Cultural Identity Development

    Science.gov (United States)

    Cunningham, Maurella Louise

    2013-01-01

    The main purpose of this study is to conduct exploratory qualitative research to investigate how PSTs and practicing teachers experience cultural and racial identity development or changes in identity. Rather than examine the "what" or contributors to identity development, I will explore the "how" or processes of identity…

  3. Dehistoricized Cultural Identity and Cultural Othering

    Science.gov (United States)

    Weiguo, Qu

    2013-01-01

    The assumption that each culture has its own distinctive identity has been generally accepted in the discussion of cultural identities. Quite often identity formation is not perceived as a dynamic and interactive ongoing process that engages other cultures and involves change in its responses to different challenges at different times. I will…

  4. Strengthening National Identity through National Symbols and ...

    African Journals Online (AJOL)

    South Africans vacillate in their national identity and remain largely attached to their racial and ethnic group identities. The aim of this article is to illustrate the manner in which a sense of understanding, familiarity and pride with regard to national symbols and thus to national identity can be attained. The objective is that the ...

  5. Convolution identities for quasiprobabilities for Bose functions

    International Nuclear Information System (INIS)

    Haake, F.; Lewenstein, M.

    1982-01-01

    We present identities relating the equations of motion of various quasiprobabilities for quantum oscillators. These identities turn out useful for checking the consistency of approximations made in constructing the equations of motion with the basic Bose commutator. Moreover, our identities allow to identify the quasiprobability distributions which have the easiest-to-solve equations of motion. (orig.)

  6. 40 CFR 725.85 - Microorganism identity.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 30 2010-07-01 2010-07-01 false Microorganism identity. 725.85 Section... to Information § 725.85 Microorganism identity. (a) Claims applicable to the period prior to... specific microorganism identity at the time of submission of the information. This claim will apply only to...

  7. 40 CFR 720.85 - Chemical identity.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 30 2010-07-01 2010-07-01 false Chemical identity. 720.85 Section 720... PREMANUFACTURE NOTIFICATION Confidentiality and Public Access to Information § 720.85 Chemical identity. (a... submits information to EPA under this part may assert a claim of confidentiality for the chemical identity...

  8. 21 CFR 610.14 - Identity.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 7 2010-04-01 2010-04-01 false Identity. 610.14 Section 610.14 Food and Drugs... BIOLOGICAL PRODUCTS STANDARDS General Provisions § 610.14 Identity. The contents of a final container of each filling of each lot shall be tested for identity after all labeling operations shall have been completed...

  9. Foreign Language Teaching and Cultural Identity.

    Science.gov (United States)

    Nasr, Raja T., Ed.; And Others

    A collection of works on the role of cultural identity in second language learning and teaching includes: "Linguas estrangeiras e ideologia" (Roberto Ballalai); "Cultural Identity and Bilinguality" (Josiane F. Hamers, Michel Blanc); "Foreign Language Teaching and Cultural Identity" (Lakshmie K. Cumaranatunge);…

  10. Developing a Leadership Identity: A Grounded Theory

    Science.gov (United States)

    Komives, Susan R.; Owen, Julie E; Longerbeam, Susan D.; Mainella, Felicia C.; Osteen, Laura

    2005-01-01

    This grounded theory study on developing a leadership identity revealed a 6-stage developmental process. The thirteen diverse students in this study described their leadership identity as moving from a leader-centric view to one that embraced leadership as a collaborative, relational process. Developing a leadership identity was connected to the…

  11. Shifting identities : the musician as theatrical perfomer

    NARCIS (Netherlands)

    Hübner, Falk

    2013-01-01

    The artistic PhD research "Shifting Identities" investigates the musicians' professional identity and how this identity might shift when musicians start acting as theatrical performers. In most of the theatrical situations where musicians "perform", their profession is extended by additional tasks

  12. Negotiation of identities in intercultural communication

    Directory of Open Access Journals (Sweden)

    Janík Zdeněk

    2017-01-01

    Full Text Available Negotiation of identities in communication entails affirming the identities we want others to recognize in us and ascription of identities we mutually assign to each other in communication. The study of intercultural communication focuses on cultural identity as the principal identity component that defines intercultural communication. In this article, the assumption that cultural group membership factors determine the context of intercultural communication is questioned. The article examines how intercultural interlocutors negotiate their identities in various intercultural interactions. The aims of the research presented in this paper are: 1 to examine which identities - cultural, personal, or social - intercultural interlocutors activate in intercultural communication; 2 to determine whether interlocutors’ intercultural communication is largely influenced by their cultural identities; 3 and to identify situations in which they activate their cultural identities (3. The research data were collected from 263 international students studying at Masaryk University in Brno in the years 2010 - 2016. Although the research results are not conclusive, they indicate that cultural identities predominate in the students’ ethnocentric views and that stereotypes constrain the students’ cultural identities and affect the negotiation of identities in intercultural communication.

  13. Comparative Associations Between Achieved Bicultural Identity, Achieved Ego Identity, and Achieved Religious Identity and Adaptation Among Australian Adolescent Muslims.

    Science.gov (United States)

    Abu-Rayya, Hisham M; Abu-Rayya, Maram H; White, Fiona A; Walker, Richard

    2018-04-01

    This study examined the comparative roles of biculturalism, ego identity, and religious identity in the adaptation of Australian adolescent Muslims. A total of 504 high school Muslim students studying at high schools in metropolitan Sydney and Melbourne, Australia, took part in this study which required them to complete a self-report questionnaire. Analyses indicated that adolescent Muslims' achieved religious identity seems to play a more important role in shaping their psychological and socio-cultural adaptation compared to adolescents' achieved bicultural identity. Adolescents' achieved ego identity tended also to play a greater role in their psychological and socio-cultural adaptation than achieved bicultural identity. The relationships between the three identities and negative indicators of psychological adaptation were consistently indifferent. Based on these findings, we propose that the three identity-based forces-bicultural identity development, religious identity attainment, and ego identity formation-be amalgamated into one framework in order for researchers to more accurately examine the adaptation of Australian adolescent Muslims.

  14. Practicing Identity: A Crafty Ideal?

    Science.gov (United States)

    Brysbaert, A.; Vetters, M.

    This paper focuses on the materialization of technological practices as a form of identity expression. Contextual analyses of a Mycenaean workshop area in the Late Bronze Age citadel of Tiryns (Argolis, Greece) are presented to investigate the interaction of different artisans under changing socio-political and economic circumstances. The case study indicates that although certain technological practices are often linked to specific crafts, they do not necessarily imply the separation of job tasks related to the working of one specific material versus another. Shared technological practices and activities, therefore, may be a factor in shaping cohesive group identities of specialized artisans. Since tracing artisans' identities is easier said than done on the basis of excavated materials alone, we employ the concepts of multiple chaînes opératoires combined with cross-craft interactions as a methodology in order to retrieve distinctive sets of both social and technological practices from the archaeological remains. These methodological concepts are not restricted to a specific set of steps in the production cycle, but ideally encompass reconstructing contexts of extraction, manufacture, distribution and discard/reuse for a range of artefacts. Therefore, these concepts reveal both technological practices, and, by contextualising these technological practices in their spatial layout, equally focus on social contacts that would have taken place during any of these actions. Our detailed contextual study demonstrates that the material remains when analysed in their entirety are complementary to textual evidence. In this case study they even form a source of information on palatial spheres of life about which the fragmentary Linear B texts, so far, remain silent.

  15. Ambiguous genitalia, gender-identity problems, and sex reassignment.

    Science.gov (United States)

    Dittmann, R W

    1998-01-01

    This article discusses general issues with regard to gender-identity problems, sex reassignment, and clinical management in patients with ambiguous genitalia, based on a detailed case history of a patient with penile agenesis who has been followed more than 20 years. After initial uncertainty, the patient began to grow up as a boy, lived from the fourth year of life as a girl and young woman, and lived from late puberty on as a man. Over his lifetime he experienced extensive corrective surgery plus hormonal substitution therapy. Pre- and perinatal hormonal conditions, phenomenology of the genitalia, sex of rearing, timing of sex reassignment and corrective surgery, for example, appear to be important components for the development of gender-role behavior, gender identity, and sexual orientation of intersex patients. Findings and retrospective considerations for this patient suggest the need for careful differential activities in diagnostic workup, approaches to sex assignment and possible reassignment, and the clinical management of patients and families.

  16. [Dissociative identity disorder or schizophrenia?].

    Science.gov (United States)

    Tschöke, S; Steinert, T

    2010-01-01

    We present a case of dissociative identity disorder in which Schneiderian first rank symptoms were present besides of various states of consciousness. Thus the diagnosis of schizophrenia had to be considered. Formally, the symptoms met ICD-10 criteria for schizophrenia. However, taking into account the lack of formal thought disorder and of negative symptoms as well as a typical history of severe and prolonged traumatisation, we did not diagnose a co-morbid schizophrenic disorder. There is good evidence for the existence of psychotic symptoms among patients with dissociative disorders. However, in clinical practice this differential diagnosis is rarely considered.

  17. Ectodermal dysplasia in identical twins

    Directory of Open Access Journals (Sweden)

    Gurkar Haraswarupa Puttaraju

    2013-01-01

    Full Text Available Hereditary hypohidrotic ectodermal dysplasia (HED is typically inherited as an X-linked recessive trait, characterized by deformity of at least two or more of the ectodermal structures - hair, teeth, nails and sweat glands. Two cases of hereditary HED involving identical male twins, is being documented for the rarity of its occurrence with special attention given to genetics, pathophysiology, clinical, intraoral manifestations and to the methods to improve the masticatory function, the facial esthetics and psychology of patients affected by this disease.

  18. Microsoft Windows Identity Foundation Cookbook

    CERN Document Server

    Chanda, Sandeep

    2012-01-01

    This book is written in a simple, easy to understand format, with lots of screenshots and step-by-step explanations.If you are a .NET developer looking forward to building access control in your applications using claims-based identity, then this is the best guide for you. This book is also an excellent choice for professionals and IT administrators trying to enable Single Sign-On across applications within the enterprise, and in the cloud spanning interoperable platforms. No previous knowledge on the subject is necessary, however a strong foundation in the C# programming language and .NET Fra

  19. Teacher educators: their identities, sub-identities and implications for professional development

    NARCIS (Netherlands)

    Swennen, J.M.H.; Jones, K.; Volman, M.L.L.

    2010-01-01

    In this article we address the question: 'What sub-identities of teacher educators emerge from the research literature about teacher educators and what are the implications of the sub-identities for the professional development of teacher educators?' Like other professional identities, the identity

  20. Racial Identity Attitudes and Ego Identity Statuses in Dominican and Puerto Rican College Students

    Science.gov (United States)

    Sanchez, Delida

    2013-01-01

    This study explored the relation between racial identity attitudes and ego identity statuses in 94 Dominican and Puerto Rican Latino college students in an urban public college setting. Simultaneous regression analyses were conducted to test the relation between racial identity attitudes and ego identity statuses, and findings indicated that…