Claims and Identity: On-Premise and Cloud Solutions
Bertocci, Vittorio
Today's identity-management practices are often a patchwork of partial solutions, which somehow accommodate but never really integrate applications and entities separated by technology and organizational boundaries. The rise of Software as a Service (SaaS) and cloud computing, however, will force organizations to cross such boundaries so often that ad hoc solutions will simply be untenable. A new approach that tears down identity silos and supports a de-perimiterized IT by design is in order.This article will walk you through the principles of claims-based identity management, a model which addresses both traditional and cloud scenarios with the same efficacy. We will explore the most common token exchange patterns, highlighting the advantages and opportunities they offer when applied on cloud computing solutions and generic distributed systems.
Playing It Safe: Identity Management and Single Sign-On
Alawneh, John
2012-01-01
Whenever thousands of users need to connect seamlessly to a vast number of online resources, identity management (IDM) becomes a critical capability. Although several products on the market can deliver a robust identity management solution, there is no one-size-fits-all. Identity management requires business processes and a supporting…
Chadwick, David W.
2009-01-01
Abstract. This paper addresses the topic of federated identity management. It discusses in detail the following topics: what is digital identity, what is identity management, what is federated identity management, Kim Camerons 7 Laws of Identity, how can we protect the users privacy in a federated environment, levels of assurance, some past and present federated identity management systems, and some current research in FIM.
Modified Bateman solution for identical eigenvalues
International Nuclear Information System (INIS)
Dreher, Raymond
2013-01-01
Highlights: ► Solving indeterminacies due to identical eigenvalues in Bateman’s solution. ► Exact analytical solution of Bateman’s equations for identical eigenvalues. ► Algorithm calculating higher order derivatives appearing in this solution. ► Alternative evaluation of the derivatives through the Taylor polynomial. ► Implementation of an example program demonstrating the developed solution. - Abstract: In this paper we develop a general solution to the Bateman equations taking into account the special case of identical eigenvalues. A characteristic of this new solution is the presence of higher order derivatives. It is shown that the derivatives can be obtained analytically and also computed in an efficient manner
Hoepman, J.J.
2011-01-01
Identity management consists of the processes and all underlying technologies for the creation, management, and usage of digital identities. Business rely on identity management systems to simplify the management of access rights to their systems and services for both their employees and their
Pace, A
2008-01-01
This paper introduces identity management concepts and discusses various issues associated with its implementation. It will try to highlight technical, legal, and social aspects that must been foreseen when defining the numerous processes that an identity management infrastructure must support. Grid interoperability as well as cross platform interoperability is addressed on the technical aspect, followed by a short discussion on social consequences on userâs privacy when completed traceability is enforced and some examples on how identity management has been implemented at CERN
International Nuclear Information System (INIS)
Pace, A
2008-01-01
This paper introduces identity management concepts and discusses various issues associated with their implementation. It will try to highlight technical, legal, and social aspects that must been foreseen when defining the numerous processes that an identity management infrastructure must support. Grid interoperability as well as cross platform interoperability is addressed on the technical aspect, followed by a short discussion on social consequences on user's privacy when completed traceability is enforced. The paper will finally give some examples on how identity management has been implemented at CERN
Energy Technology Data Exchange (ETDEWEB)
Pace, A [CERN, Geneva (Switzerland)
2008-07-01
This paper introduces identity management concepts and discusses various issues associated with their implementation. It will try to highlight technical, legal, and social aspects that must been foreseen when defining the numerous processes that an identity management infrastructure must support. Grid interoperability as well as cross platform interoperability is addressed on the technical aspect, followed by a short discussion on social consequences on user's privacy when completed traceability is enforced. The paper will finally give some examples on how identity management has been implemented at CERN.
A Federated Digital Identity Management Approach for Business Processes
Bertino, Elisa; Ferrini, Rodolfo; Musci, Andrea; Paci, Federica; Steuer, Kevin J.
Business processes have gained a lot of attention because of the pressing need for integrating existing resources and services to better fulfill customer needs. A key feature of business processes is that they are built from composable services, referred to as component services, that may belong to different domains. In such a context, flexible multi-domain identity management solutions are crucial for increased security and user-convenience. In particular, it is important that during the execution of a business process the component services be able to verify the identity of the client to check that it has the required permissions for accessing the services. To address the problem of multi-domain identity management, we propose a multi-factor identity attribute verification protocol for business processes that assures clients privacy and handles naming heterogeneity.
Identity and the Management Project
DEFF Research Database (Denmark)
Jørgensen, Kenneth Mølbjerg; Dehlin, Erlend
The paper discusses the concept of identity in relation to management. We take our starting point in Wittgenstein’s concept language games. We argue that identity is a question of using linguistic tools to construct reality. Two elements of the language game metaphor are central here: rules...... and family resemblance. As such, managing identity in organizations is closely linked to rules and family resemblance. Organizations manage identity through the definition of norms and values for right or wrong, appropriate or inappropriate, to name but a few. Norms and values are important as reference...... points for constructing identities. Managing identity has become more important because the rules-of-the-game have become more unstable. Managing identity is important if the bonds between individuals and organizations are to be sustained. But this task is contradictory and paradoxical of its very nature...
Biometric identity management for standard mobile medical networks.
Egner, Alexandru; Soceanu, Alexandru; Moldoveanu, Florica
2012-01-01
The explosion of healthcare costs over the last decade has prompted the ICT industry to respond with solutions for reducing costs while improving healthcare quality. The ISO/IEEE 11073 family of standards recently released is the first step towards interoperability of mobile medical devices used in patient environments. The standards do not, however, tackle security problems, such as identity management, or the secure exchange of medical data. This paper proposes an enhancement of the ISO/IEEE 11073-20601 protocol with an identity management system based on biometry. The paper describes a novel biometric-based authentication process, together with the biometric key generation algorithm. The proposed extension of the ISO/IEEE 11073-20601 is also presented.
Social Security Administration — Provides information for identity management services on the creation, modification and eventual deletion of accounts and entitlements based on user relationships on...
Identity management and privacy languages technologies: Improving user control of data privacy
García, José Enrique López; García, Carlos Alberto Gil; Pacheco, Álvaro Armenteros; Organero, Pedro Luis Muñoz
The identity management solutions have the capability to bring confidence to internet services, but this confidence could be improved if user has more control over the privacy policy of its attributes. Privacy languages could help to this task due to its capability to define privacy policies for data in a very flexible way. So, an integration problem arises: making work together both identity management and privacy languages. Despite several proposals for accomplishing this have already been defined, this paper suggests some topics and improvements that could be considered.
Identity, Diversity and Diversity Management
DEFF Research Database (Denmark)
Holck, Lotte; Muhr, Sara Louise; Villeseche, Florence
2016-01-01
– The work can encourage policy makers, diversity and HR managers to question their own practices and assumptions leading to more theoretical informed diversity management practices. Originality/value – The theoretical connections between identity and diversity literature have so far not been reviewed......The purpose of this paper is to examine the relationship between the identity and diversity literatures and discuss how a better understanding of the theoretical connections between the two informs both diversity research and diversity management practices. Design/methodology/approach – Literature...... and limitations – is crucial for successful diversity management research and practice. Research limitations/implications – The authors argue for a better understanding of differences, overlaps and limits of different identity perspectives, and for a stronger engagement with practice. Practical implications...
Object Classification based Context Management for Identity Management in Internet of Things
DEFF Research Database (Denmark)
Mahalle, Parikshit N.; Prasad, Neeli R.; Prasad, Ramjee
2013-01-01
As computing technology is becoming more tightly coupled into dynamic and mobile world of the Internet of Things (IoT), security mechanism is more stringent, flexible and less intrusive. Scalability issue in IoT makes identity management (IdM) of ubiquitous objects more challenging, and there is ......As computing technology is becoming more tightly coupled into dynamic and mobile world of the Internet of Things (IoT), security mechanism is more stringent, flexible and less intrusive. Scalability issue in IoT makes identity management (IdM) of ubiquitous objects more challenging......, and there is a need of context-aware access control solution for IdM. Confronting uncertainty of different types of objects in IoT is not easy. This paper presents the logical framework for object classification in context aware IoT, as richer contextual information creates an impact on the access control. This paper...
integrated identity and integrated identity and access management
African Journals Online (AJOL)
eobe
Management System (T-IAMS) is a fingerprint biometric database that centrally manages students' identity, course a fingerprint ... registration, library and medical services information. .... based application and a web-based application.
Identity and access management business performance through connected intelligence
Osmanoglu, Ertem
2013-01-01
Identity and Access Management: Controlling Your Network provides you with a practical, in-depth walkthrough of how to plan, assess, design, and deploy IAM solutions. This book breaks down IAM into manageable components to ease systemwide implementation. The hands-on, end-to-end approach includes a proven step-by-step method for deploying IAM that has been used successfully in over 200 deployments. The book also provides reusable templates and source code examples in Java, XML, and SPML.Focuses on real-word implementations Provides end-to-end coverage of IAM from business drivers, requirements
2011-03-14
...., Mailing Solutions Management, Global Engineering Group, Including On-Site Leased Workers From Guidant... workers and former workers of Pitney Bowes, Inc., Mailing Solutions Management Division, Engineering... reviewed the certification to clarify the subject worker group's identity. Additional information revealed...
Biometrics and Identity Management
DEFF Research Database (Denmark)
management. BIOID 2008. The papers are categorized in four classes. These classes represent the 4 working groups of the COST Action 2101. For more information, see http://www.cost2101.org/. Biometric data quality and multimodal biometric templates, Unsupervised interactive interfaces for multimodal...... security and border control scenarios it is now apparent that the widespread availability of biometrics in everyday life will also spin out an ever increasing number of (private) applications in other domains. Crucial to this vision is the management of the user's identity, which does not only imply...... biometrics, Biometric attacks and countermeasures, Standards and privacy issues for biometrics in identity documents and smart cards. BIOID 2008 is an initiative of the COST Action 2101 on Biometrics for Identity Documents and Smart Cards. It is supported by the EU Framework 7 Programme. Other sponsors...
van Os, Annemiek; de Gilder, Dick; van Dyck, Cathy; Groenewegen, Peter
2015-01-01
The purpose of this paper is to explore sensemaking of incidents by health care professionals through an analysis of the role of professional identity in narratives of incidents. Using insights from social identity theory, the authors argue that incidents may create a threat of professional identity, and that professionals make use of identity management strategies in response to this identity threat. The paper draws on a qualitative analysis of incident narratives in 14 semi-structured interviews with physicians, nurses, and residents at a Dutch specialist hospital. The authors used an existing framework of identity management strategies to categorize the narratives. The analysis yielded two main results. First, nurses and residents employed multiple types of identity management strategies simultaneously, which points to the possible benefit of combining different strategies. Second, physicians used the strategy of patronization of other professional groups, a specific form of downward comparison. The authors discuss the implications of the findings in terms of the impact of identity management strategies on the perpetuation of hierarchical differences in health care. The authors argue that efforts to manage incident handling may profit from considering social identity processes in sensemaking of incidents. This is the first study that systematically explores how health care professionals use identity management strategies to maintain a positive professional identity in the face of incidents. This study contributes to research on interdisciplinary cooperation in health care.
Exhausting management work: conflicting identities.
Mischenko, Jane
2005-01-01
The primary purpose of this paper is to critically explore managers' experience of work identity in the National Health Service (NHS). This paper is unconventional in that it uses an auto-ethnographic approach and poetry as the empirical data from which the conceptual framework evolves. The concepts of identity, power and self are analysed in relation to the narrative utilising a post-structuralist, critical management lens, particularly drawing from Foucault. The paper reflects and critiques the challenges of undertaking auto-ethnography, not least the publication and exposure of a "vulnerable aspect" of the author but also identifies this as a powerful method to explore how one uses narrative to create meaning and constitute oneself, the challenges of such textual representation and the various ways one adapts, resists and survives the challenge of the "multiphrenic" world. The contribution this paper makes is an "outing" of the dynamics of being a manager in the NHS and an opening of a debate on current management discourse and practice. The further value of this paper is the experimentation of critically evaluating an auto-ethnographic approach to researching management identity work.
2011-01-14
...., Mailing Solutions Management Division Including On-Site Leased Workers of Guidant Group, and Teleworkers... Bowes, Inc., Mailing Solutions Management Division, Engineering Quality Assurance, Shelton, Connecticut... identity of the subject worker group. The worker group consists of workers of Pitney Bowes, Inc., the...
Superconformal Ward identities and their solution
International Nuclear Information System (INIS)
Nirschl, M.; Osborn, H.
2005-01-01
Superconformal Ward identities are derived for the four point functions of chiral primary BPS operators for N=2,4 superconformal symmetry in four dimensions. Manipulations of arbitrary tensorial fields are simplified by introducing a null vector so that the four point functions depend on two internal R-symmetry invariants as well as two conformal invariants. The solutions of these identities are interpreted in terms of the operator product expansion and are shown to accommodate long supermultiplets with free scale dimensions and also short and semi-short multiplets with protected dimensions. The decomposition into R-symmetry representations is achieved by an expansion in terms of two variable harmonic polynomials which can be expressed also in terms of Legendre polynomials. Crossing symmetry conditions on the four point functions are also discussed
The Identity Crisis. Security, Privacy and Usability Issues in Identity Management
Alpár, G.; Hoepman, J.H.; Siljee, B.I.J.
2011-01-01
This paper studies the current "identity crisis" caused by the substantial security, privacy and usability shortcomings encountered in existing systems for identity management. Some of these issues are well known, while others are much less understood. This paper brings them together in a single,
Identity management and witness protection system
Paunović, Saša; Starčević, Dušan; Nešić, Lazar
2013-01-01
The protection of participants in criminal proceedings is one of the most important tools for prosecution of war crimes and organized crime cases. The paper presents the basic characteristics and the importance of implementing the Program of protection in criminal proceedings, with emphasis on the protection system and management of identity. Special attention was paid to challenges facing the protection system in criminal proceedings and the management of identities, which are caused by the ...
Improving Measurement of Workplace Sexual Identity Management
Lance, Teresa S.; Anderson, Mary Z.; Croteau, James M.
2010-01-01
The purpose of this study was to advance measurement of sexual identity management for lesbian, gay, and bisexual workers. Psychometric properties of a revised version of the Workplace Sexual Identity Management Measure (WSIMM; Anderson, Croteau, Chung, & DiStefano, 2001) were examined on a sample of 64 predominantly White K-12 teachers.…
Integrated Identity and Access Management System for Tertiary ...
African Journals Online (AJOL)
Nigerian Journal of Technology ... identity management and access control and the unavailability of actionable information on pattern of ... This Tertiary Identity and Access Management System (T-IAMS) is a fingerprint biometric database that ...
Professional identity and role transitions in clinical managers.
Spehar, Ivan; Frich, Jan C; Kjekshus, Lars Erik
2015-01-01
The purpose of this paper is to investigate how clinicians' professional background influences their transition into the managerial role and identity as clinical managers. The authors interviewed and observed 30 clinicians in managerial positions in Norwegian hospitals. A central finding was that doctors experienced difficulties in reconciling the role as health professional with the role as manager. They maintained a health professional identity and reported to find meaning and satisfaction from clinical work. Doctors also emphasized clinical work as a way of gaining legitimacy and respect from medical colleagues. Nurses recounted a faster and more positive transition into the manager role, and were more fully engaged in the managerial aspects of the role. The authors advance that health care organizations need to focus on role, identity and need satisfaction when recruiting and developing clinicians to become clinical managers. The study suggests that the inclusion of aspects from identity and need satisfaction literature expands on and enriches the study of clinical managers.
Corporate identity: The concept, its measurement and management
C.B.M. van Riel (Cees); J.M.T. Balmer (John)
1997-01-01
textabstractArticulates the main trends in the literature on corporate identity; defines corporate identity; explains the rationale for corporate identity management and describes the main methods used to reveal the desired and the actual corporate identity. Particular reference will be made to two
Exploring medical identity theft.
Mancilla, Desla; Moczygemba, Jackie
2009-09-16
The crime of medical identity theft is a growing concern in healthcare institutions. A mixed-method study design including a two-stage electronic survey, telephone survey follow-up, and on-site observations was used to evaluate current practices in admitting and registration departments to reduce the occurrence of medical identity theft. Survey participants were chief compliance officers in acute healthcare organizations and members of the Health Care Compliance Association. Study results indicate variance in whether or how patient identity is confirmed in healthcare settings. The findings of this study suggest that information systems need to be designed for more efficient identity management. Admitting and registration staff must be trained, and compliance with medical identity theft policies and procedures must be monitored. Finally, biometric identity management solutions should be considered for stronger patient identification verification.
A National Identity Management Strategy to Enhance the Brazilian Electronic Government
Directory of Open Access Journals (Sweden)
José Alberto Sousa Torres
2017-12-01
Full Text Available Amongst the several problems with the Brazilian e-government services (e-Gov, many of them are related to the fact that Brazil does not have a National Strategy for Digital Identity Management (IdM. To design a national strategy, it is crucial to analyze the solutions adopted in other countries and take into account Brazilian characteristics, such as its area, population, digital inclusion index, socio-political and economic profile, the current national identity registration system and the fraud rate. In this context, this paper aims to propose a national strategy for IdM for the Brazilian e-Gov program. This strategy was built upon by a literature review of the experiences of European countries and, mainly, the peculiarities inherent to Brazil.
Bizman, Aharon; Yinon, Yoel
2004-04-01
The authors examined the relations between (a) the perceptions of dual identity and separate groups and (b) intergroup conflict management strategies, in two contexts: the conflict between the secular and religious sectors in Israel and the allocation of resources among organizational subunits. In both contexts, contention (i.e., forcing one's will on the other party) was associated with the perception of separate groups. Only in the organizational context, avoidance (i.e., doing nothing or discontinuing participation in the conflict) was associated with the perception of dual identity. Problem solving (i.e., finding a solution that is acceptable to both parties) was related to the perception of dual identity in the secular-religious context. In the organizational context, this relation appeared only under a low perception of separate groups. Yielding (i.e., satisfying the other party's needs at the expense of one's own) was related to the perception of dual identity in the organizational context. In the secular-religious context, this relation appeared only under a high perception of separate groups. The authors discussed the varying pattern of the associations between (a) the perceptions of dual identity and separate groups and (b) the conflict management strategies in the two contexts in terms of the Dual Concern Model and the perceived feasibility of the strategies.
User-centred and context-aware identity management in mobile ad-hoc networks
Arabo, Abdullahi
2013-01-01
The emergent notion of ubiquitous computing makes it possible for mobile devices to communicate and provide services via networks connected in an ad-hoc manner. These have resulted in the proliferation of wireless technologies such as Mobile Ad-hoc Networks (MANets), which offer attractive solutions for services that need flexible setup as well as dynamic and low cost wireless connectivity. However, the growing trend outlined above also raises serious concerns over Identity Management (IM) du...
Organizational Identity and Culture in the Context of Managed Change
DEFF Research Database (Denmark)
Hatch, Mary Jo; Schultz, Majken; Skov, Anne-Marie
2015-01-01
their organization’s identity led middle managers and employees both to support and resist new organizational identity claims made by top management. Within these identity activation processes we found frequent references relating new identity claims to organizational culture. Further analysis of the data revealed......This article presents top and middle managers’ experiences and understandings of how organizational identity and culture were entangled with transformational change as it unfolded over a 5-year period in Carlsberg Group. Combining ethnography and grounded theory methods with engaged scholarship......, our work sits between research and practice, speaking directly to the experience of managers at the same time that it researches both the content and processes of organizational identity and culture. The study shows that engaging in processes of reflecting, questioning, and debating about...
Holistic Privacy-Preserving Identity Management System for the Internet of Things
Directory of Open Access Journals (Sweden)
Jorge Bernal Bernabe
2017-01-01
Full Text Available Security and privacy concerns are becoming an important barrier for large scale adoption and deployment of the Internet of Things. To address this issue, the identity management system defined herein provides a novel holistic and privacy-preserving solution aiming to cope with heterogeneous scenarios that requires both traditional online access control and authentication, along with claim-based approach for M2M (machine to machine interactions required in IoT. It combines a cryptographic approach for claim-based authentication using the Idemix anonymous credential system, together with classic IdM mechanisms by relying on the FIWARE IdM (Keyrock. This symbiosis endows the IdM system with advanced features such as privacy-preserving, minimal disclosure, zero-knowledge proofs, unlikability, confidentiality, pseudonymity, strong authentication, user consent, and offline M2M transactions. The IdM system has been specially tailored for the Internet of Things bearing in mind the management of both users’ and smart objects’ identity. Moreover, the IdM system has been successfully implemented, deployed, and tested in the scope of SocIoTal European research project.
Building an Identity Management Governance Process
Berg, Joanne E.; Kraemer, Ron; Raatz, Carla; Devoti, Steve
2009-01-01
A particular challenge in any campus environment is determining how requests for access to services and resources are managed. Who decides the technology, infrastructure, policy, business process and procedure? The involvement of key institutional leaders and stakeholders in identity management governance is the driving force behind the way the…
Cascón-Pereira, Rosalía; Chillas, Shiona; Hallier, Jerry
2016-12-01
This study examines "identity work" among hybrid doctor-managers (DMs) in the Spanish National Health System to make sense of their managerial roles. In particular, the meanings underlying DMs experience of their hybrid role are investigated using a Grounded Theory methodology, exposing distinctions in role-meanings. Our findings provide evidence that using different social sources of comparison (senior managers or clinicians) to construct the meaning of managerial roles leads to different role-meanings and role identities, which are the source of the two established types of DM in the literature, the reluctant and the enthusiast. The contribution is twofold: our findings lead us to theorize DMs' identity work processes by adding an overlooked role-meaning dimension to identity work; and raise practical reflections for those who wish to develop enthusiast doctor managers. Copyright © 2016 Elsevier Ltd. All rights reserved.
Architectural mismatch issues in identity management deployment
DEFF Research Database (Denmark)
Andersen, Mads Schaarup
2010-01-01
Integrating Commercial Off-The-Shelf products in a company's software product portfolio offers business value, but introduces challenges from a software architecture perspective. In this paper, the research challenges in relation to identity management in the Danish municipality administration...... system called Opus, are outlined. Opus BRS is the identity management part of Opus. Opus integrates SAP, legacy mainframe systems, and other third party systems of the individual municipality. Each of these systems define their own software architecture and access control model, leading to architectural...... mismatch with an impact on security, usability, and maintainability. The research project is discussed and access control and identity provisioning are recognized as the major areas of interest in relation to the mismatch challenges. The project is carried out in close cooperation with KMD, one...
Laurent, Maryline
2015-01-01
In the past four decades, information technology has altered chains of value production, distribution, and information access at a significant rate. These changes, although they have shaken up numerous economic models, have so far not radically challenged the bases of our society.This book addresses our current progress and viewpoints on digital identity management in different fields (social networks, cloud computing, Internet of Things (IoT)), with input from experts in computer science, law, economics and sociology. Within this multidisciplinary and scientific context, having crossed analys
Kershaw, Philip; Jensen, Jens; Stephens, Ag; van Engen, Willem
2013-04-01
We explore an application of OAuth to enable user delegation for OGC-based services and the evolution of this solution to form part of a wider Federation-as-a-Service offering for federated identity management. OAuth has established itself in the commercial sector as a means for users to delegate access to secured resources under their control to third parties. It has also found its way into the academic and research domains as a solution for user delegation. Notable examples including the CILogon project for Teragrid in the US, and also, closer to the Earth Sciences, as part of the OGC Web Services, Phase 6 Testbed. Both are examples of OAuth 1.0 implementations. Version 2.0 has seen significant changes to this original specification which have not been without controversy but it has arguably provided a greater degree of flexibility in how it can be applied and the use cases that it can address. At CEDA (Centre for Environmental Data Archival, STFC), a Python implementation of OAuth 2.0 was made to explore these capabilities with a focus on providing a solution for user delegation for data access, processing and visualisation services for the Earth Observation and Climate sciences domains. The initial goal was to provide a means of delegating short-lived user credentials to trusted services along the same lines as the established approach of Proxy certificates widely used in Grid computing. For the OGC and other HTTP-based services employed by CEDA, OAuth makes a natural fit for this role, integrating with minimal impact on existing interfaces. Working implementations have been made for CEDA's COWS Web Processing Service and Web Map Service. Packaging the software and making it available in Open Source repositories together with the generic nature of the solution have made it readily exploitable in other application domains. At the Max Planck Institute for Psycholinguistics (Nijmegen, The Netherlands), the software will be used to integrate some tools in the
Working to reduce the effects of discrimination: Identity management strategies in organizations.
Shih, Margaret; Young, Maia J; Bucher, Amy
2013-04-01
Despite efforts to dispel discrimination, workplace discrimination still occurs. We introduce two classes of identity management strategies individuals use to mitigate the negative consequences of discrimination: identity switching (i.e., deemphasizing target identities and recategorizing to a more positively valued identity) and identity redefinition (i.e., stereotype reassociation and regeneration). Organizations adopting a color-blind approach may make it more difficult for individuals to use identity switching because the policies deemphasize differences in social identities. In contrast, organizations adopting a multicultural approach may make it more difficult for individuals to use identity redefinition. Multicultural approaches, applied superficially, may celebrate group differences that might actually reinforce culturally dominant stereotypes. We explore the likelihood that individuals will adopt each strategy given these organizational approaches to diversity. We outline steps organizations can take to reduce the need for identity management strategies and to facilitate identity management when necessary.
Identity And Access Management e Federazione
Directory of Open Access Journals (Sweden)
Virginia Calabritto
2012-07-01
first part, then it moves on to describe the technologies offering a possible solution, such as the Identity Management, the Single Sing On and the federations of authentication and authorization infrastructure and of some interesting initiatives, among which there is IDEM, the first Italian federation of Authentication and Authorization Infrastructure, which involves the scientific community / academic institutions and service providers.
Identity management for e-government Libya as a case study
DEFF Research Database (Denmark)
Elaswad, Othoman; Jensen, Christian D.
2016-01-01
Governments are strengthening their identity (ID) management strategies to deliver new and improved online services to their citizens. Such online services typically include applications for different types of permissions, requests for different types of official documents and management...... of different types of entitlements. The ID management scheme must therefore be able to correctly authenticate citizens and link online presence to real world identities....
Shoham, Idan
2011-01-01
An Identity and Access Management (IAM) project on campus can feel like a Sisyphean task: Just when access rights have finally been sorted out, the semester ends--and users change roles, leave campus, or require new processes. IT departments face a constantly changing technical landscape: (1) integrating new applications and retiring old ones; (2)…
Social identity management strategies used by workers with acquired hearing loss.
Jennings, Mary Beth; Southall, Kenneth; Gagné, Jean-Pierre
2013-01-01
There is a paucity of knowledge about social identity-management by persons with hearing loss. The objective of the study was to gain an understanding from the perspective of the participants, the ways in which workers with acquired hearing loss manage their identity in the workplace. Twelve persons with acquired hearing loss, who were gainfully employed in a variety of settings and occupations in three Canadian cities, participated in audio-recorded semi-structured interviews. A secondary qualitative analysis was conducted on transcripts of interviews collected in a previous study on factors that influence disclosure of hearing loss in the workplace. A qualitative descriptive research paradigm was adopted and content analyses were used to extract pertinent information from verbatim transcripts. Participants described a range of identity-management strategies enacted in the workplace. Five recurrent themes emerged as important considerations in the Art of Identity Management in the workplace: 1. Managing the situation, 2. Having a buddy system, 3. Feeling comfortable, 4. Using personal resources, 5. It gets easier with time. Social identity-management is a complex process. Although persons with acquired hearing loss experience different challenges from other persons with invisible stigmas, similarities in the range of social identity-management strategies employed were evident in our findings. In addition, the social cognitive learning model of disclosure appears to be relevant to the experiences of our participants. The implications of the findings emphasize the importance of all stakeholders working collaboratively to address the issues of the growing population of workers with hearing loss.
Yan, Liang; Rong, Chunming; Zhao, Gansen
More and more companies begin to provide different kinds of cloud computing services for Internet users at the same time these services also bring some security problems. Currently the majority of cloud computing systems provide digital identity for users to access their services, this will bring some inconvenience for a hybrid cloud that includes multiple private clouds and/or public clouds. Today most cloud computing system use asymmetric and traditional public key cryptography to provide data security and mutual authentication. Identity-based cryptography has some attraction characteristics that seem to fit well the requirements of cloud computing. In this paper, by adopting federated identity management together with hierarchical identity-based cryptography (HIBC), not only the key distribution but also the mutual authentication can be simplified in the cloud.
CILogon: An Integrated Identity and Access Management Platform for Science
Basney, J.
2016-12-01
When scientists work together, they use web sites and other software to share their ideas and data. To ensure the integrity of their work, these systems require the scientists to log in and verify that they are part of the team working on a particular science problem. Too often, the identity and access verification process is a stumbling block for the scientists. Scientific research projects are forced to invest time and effort into developing and supporting Identity and Access Management (IAM) services, distracting them from the core goals of their research collaboration. CILogon provides an IAM platform that enables scientists to work together to meet their IAM needs more effectively so they can allocate more time and effort to their core mission of scientific research. The CILogon platform enables federated identity management and collaborative organization management. Federated identity management enables researchers to use their home organization identities to access cyberinfrastructure, rather than requiring yet another username and password to log on. Collaborative organization management enables research projects to define user groups for authorization to collaboration platforms (e.g., wikis, mailing lists, and domain applications). CILogon's IAM platform serves the unique needs of research collaborations, namely the need to dynamically form collaboration groups across organizations and countries, sharing access to data, instruments, compute clusters, and other resources to enable scientific discovery. CILogon provides a software-as-a-service platform to ease integration with cyberinfrastructure, while making all software components publicly available under open source licenses to enable re-use. Figure 1 illustrates the components and interfaces of this platform. CILogon has been operational since 2010 and has been used by over 7,000 researchers from more than 170 identity providers to access cyberinfrastructure including Globus, LIGO, Open Science Grid
Walking the tightrope: Constructing gender and professional identities in account management
Gremmen, C.C.M.; Benschop, Y.W.M.
2009-01-01
This paper contributes to the growing stream of organization research that explores the relationship between professional identities and gender. Our central question pertains to how account managers ‘do gender’ in constructing their professional identities. While account management has been
A Case for Implementation of Citizen Centric National Identity Management Systems
DEFF Research Database (Denmark)
Adjei, Joseph K.
of trust in transacting parties. Policy makers are therefore trying to implement identity policies to prevent identity abuses, promote the seamless flow of business transactions, and provide citizens the ability to exercise informational self-determination. Previously, the design of identity management...... and exposure, and a high level of literacy. But in developing countries infrastructural challenges, low literacy level, and physical verification of credentials hamper the effective use of identity management systems. This PhD study adapts the DeLone and McLean model of information systems success to the case...
Open source identity management patterns and practices using OpenAM 10.x
Kenning, Waylon
2013-01-01
This is a Packt Mini in a tutorial format that provides multiple examples on Identity Management using OpenAM 10.x.Open Source Identity Management Patterns and Practices Using OpenAM 10.x is great for developers and architects who are new to Identity Management, and who want a brief overview of what's possible and how to quickly implement a prototype. It's assumed that you've had experience with web applications and some knowledge of Apache and Tomcat.
Identity and Access Management and Security in Higher Education.
Bruhn, Mark; Gettes, Michael; West, Ann
2003-01-01
Discusses the drivers for an identity management system (IdM), components of this system, and its role within a school security strategy, focusing on: basic access management; requirements for access management; middleware support for an access management system; IdM implementation considerations (e.g., access eligibilities, authentication…
Integrating Identity Management With Federated Healthcare Data Models
Hu, Jun; Peyton, Liam
In order to manage performance and provide integrated services, health care data needs to be linked and aggregated across data sources from different organizations. The Internet and secure B2B networks offer the possibility of providing near real-time integration. However, there are three major stumbling blocks. One is to standardize and agree upon a common data model across organizations. The second is to match identities between different locations in order to link and aggregate records. The third is to protect identity and ensure compliance with privacy laws. In this paper, we analyze three main approaches to the problem and use a healthcare scenario to illustrate how each one addresses different aspects of the problem while failing to address others. We then present a systematic framework in which the different approaches can be flexibly combined for a more comprehensive approach to integrate identity management with federated healthcare data models.
Strategies for managing impressions of racial identity in the workplace.
Roberts, Laura Morgan; Cha, Sandra E; Kim, Sung Soo
2014-10-01
This article deepens understanding of the workplace experiences of racial minorities by investigating racial identity-based impression management (RIM) by Asian American journalists. Racial centrality, directly or indirectly, predicted the use of 4 RIM strategies (avoidance, enhancement, affiliation, and racial humor). Professional centrality also predicted strategy use, which was related to life satisfaction and perceived career success. By shedding light on proactive strategies that individuals use to influence colleagues' impressions of their racial identity, we contribute to research on diversity in organizations, impression management, and racial identity. (PsycINFO Database Record (c) 2014 APA, all rights reserved).
Cascón-Pereira, Rosalía; Valverde, Mireia
2014-01-01
To understand the process by which clinician managers construct their professional identities and develop their attitudes toward managing. A qualitative study was performed, based on grounded theory, through in-depth interviews with 20 clinician managers selected through theoretical sampling in two public hospitals of Catalonia (Spain), participant observation, and documentation. Clinician managers' role meanings are constructed by comparing their roles with those of senior managers and clinicians. In this process, clinician managers seek to differentiate themselves from senior managers through the meanings constructed. In particular, they use proximity with reality and clinical knowledge as the main sources of differentiation. This study sheds light on why clinician managers develop adverse attitudes to managing and why they define themselves as clinicians rather than as managers. The explanation lies in the construction of the meanings they assign to managing as the basis of their attitudes to this role and professional identity. These findings have some practical implications for healthcare management. Copyright © 2014. Published by Elsevier Espana.
Sharoni, Ilan; Williamson, Graham; Yip, David
2009-01-01
In an age in which the boundaries between the real and the virtual are becoming increasingly blurred, this timely guide teaches both the key issues of identity management as well as appropriate strategies and preventative measures for ensuring personal safety in the virtual world. In a corporate setting, it is essential to identify and control the way in which the organization deals with customers, suppliers, employees, and other users who may interact with the information systems of the company. Providing strategies for overcoming this task in real-world terms as well as questions that assist
Developing an Assessment of Sexual Identity Management for Lesbian and Gay Workers.
Anderson, Mary Z.; Croteau, James M.; DiStefano, Teresa M.; Chung, Y. Barry
2001-01-01
Psychometric properties of the Workplace Sexual Identity Management Measure were tested with 172 professionals. Results suggest it successfully assesses a continuum of lesbian and gay identity management strategies (passing, covering, implicitly out, explicitly out). (Contains 27 references.) (SK)
Steffens, Niklas K.; Haslam, S. Alexander; Reicher, Stephen D.; Platow, Michael J.; Fransen, Katrien; Yang, Jie; Ryan, Michelle K.; Jetten, Jolanda; Peters, Kim O.; Boen, Filip
2014-01-01
Although nearly two decades of research has provided support for the social identity approach to leadership, most previous work has focused on leaders’ identity prototypicality while neglecting the assessment of other equally important dimensions of social identity management. However, recent theoretical developments have argued that in order to mobilize and direct followers’ energies, leaders need not only to ‘be one of us’ (identity prototypicality), but also to ‘do it for us’ (identity adv...
British-Pakistani women's perspectives of diabetes self-management: the role of identity.
Majeed-Ariss, Rabiya; Jackson, Cath; Knapp, Peter; Cheater, Francine M
2015-09-01
To explore the effects of type 2 diabetes on British-Pakistani women's identity and its relationship with self-management. Type 2 diabetes is more prevalent and has worse outcomes among some ethnic minority groups. This may be due to poorer self-management and an inadequate match of health services to patient needs. The influence that type 2 diabetes has on British-Pakistani women's identity and subsequent self-management has received limited attention. An explorative qualitative study. Face-to-face semi-structured English and Urdu language interviews were conducted with a purposively selected heterogeneous sample of 15 British-Pakistani women with type 2 diabetes. Transcripts were analysed thematically. Four themes emerged: Perceived change in self emphasised how British-Pakistani women underwent a conscious adaptation of identity following diagnosis; Familiarity with ill health reflected women's adjustment to their changed identity over time; Diagnosis improves social support enabled women to accept changes within themselves and Supporting family is a barrier to self-management demonstrated how family roles were an aspect of women's identities that was resilient to change. The over-arching theme Role re-alignment enables successful self-management encapsulated how self-management was a continuous process where achievements needed to be sustained. Inter-generational differences were also noted: first generation women talked about challenges associated with ageing and co-morbidities; second generation women talked about familial and work roles competing with self-management. The complex nature of British-Pakistani women's self-identification requires consideration when planning and delivering healthcare. Culturally competent practice should recognise how generational status influences self-identity and diabetes self-management in ethnically diverse women. Health professionals should remain mindful of effective self-management occurring alongside, and being
Daire, Judith; Gilson, Lucy
2014-01-01
In South Africa, as elsewhere, Primary Health Care (PHC) facilities are managed by professional nurses. Little is known about the dimensions and challenges of their job, or what influences their managerial practice. Drawing on leadership and organizational theory, this study explored what the job of being a PHC manager entails, and what factors influence their managerial practice. We specifically considered whether the appointment of professional nurses as facility managers leads to an identity transition, from nurse to manager. The overall intention was to generate ideas about how to support leadership development among PHC facility managers. Adopting case study methodology, the primary researcher facilitated in-depth discussions (about their personal history and managerial experiences) with eight participating facility managers from one geographical area. Other data were collected through in-depth interviews with key informants, document review and researcher field notes/journaling. Analysis involved data triangulation, respondent and peer review and cross-case analysis. The experiences show that the PHC facility manager’s job is dominated by a range of tasks and procedures focused on clinical service management, but is expected to encompass action to address the population and public health needs of the surrounding community. Managing with and through others, and in a complex system, requiring self-management, are critical aspects of the job. A range of personal, professional and contextual factors influence managerial practice, including professional identity. The current largely facility-focused management practice reflects the strong nursing identity of managers and broader organizational influences. However, three of the eight managers appear to self-identify an emerging leadership identity and demonstrate related managerial practices. Nonetheless, there is currently limited support for an identity transition towards leadership in this context. Better
Working to Reduce the Effects of Discrimination: Identity Management Strategies in Organizations
Shih, Margaret; Young, Maia J.; Bucher, Amy
2013-01-01
Despite efforts to dispel discrimination, workplace discrimination still occurs. We introduce two classes of identity management strategies individuals use to mitigate the negative consequences of discrimination: identity switching (i.e., deemphasizing target identities and recategorizing to a more positively valued identity) and identity…
Corporate visual identity management: current practices, impact, and assessment
van den Bosch, A.L.M.
2005-01-01
This dissertation is about Corporate Visual Identity (CVI) management. Its purpose is to gain more insight into activities associated with managing CVI and the impact of these activities on the outcome: the degree of consistency in CVI.
CEFR information management system solution
International Nuclear Information System (INIS)
Lu Fei; Zhao Jia'ning
2011-01-01
Based on finished information resources planning scheme for China sodium cooled experimental fast breeder reactor and the advanced information resources management solution concepts were applied, we got the building solution of CEFR information management systems. At the same time, the technical solutions of systems structures, logic structures, physical structures, development platforms and operation platforms for information resources management system in fast breeder reactors were developed, which provided programmatic introductions for development works in future. (authors)
Managing corporate identity: an integrative framework of dimensions and determinants
Cornelissen, Joep; Elving, Wim
2003-01-01
Although there has been an enduring interest in corporate identity and image management, there is relatively little systematic empirical research on the topic. Large due to the diffuse interpretations, and dubious denotation that have characterized the subject of corporate identity so far, the
The Formation of Professional Identity in French "Apprenti" Managers
Angot, Jacques; Malloch, Hedley; Kleymann, Birgit
2008-01-01
Purpose: The paper aims to show how professional identity is constructed at a very early stage of initial management education. In so doing, it questions the notion of "le metier" in management. Design/methodology/approach: The paper is based on a study of the experiences of six French management apprentices (or apprentis) who…
Globus Identity, Access, and Data Management: Platform Services for Collaborative Science
Ananthakrishnan, R.; Foster, I.; Wagner, R.
2016-12-01
Globus is software-as-a-service for research data management, developed at, and operated by, the University of Chicago. Globus, accessible at www.globus.org, provides high speed, secure file transfer; file sharing directly from existing storage systems; and data publication to institutional repositories. 40,000 registered users have used Globus to transfer tens of billions of files totaling hundreds of petabytes between more than 10,000 storage systems within campuses and national laboratories in the US and internationally. Web, command line, and REST interfaces support both interactive use and integration into applications and infrastructures. An important component of the Globus system is its foundational identity and access management (IAM) platform service, Globus Auth. Both Globus research data management and other applications use Globus Auth for brokering authentication and authorization interactions between end-users, identity providers, resource servers (services), and a range of clients, including web, mobile, and desktop applications, and other services. Compliant with important standards such as OAuth, OpenID, and SAML, Globus Auth provides mechanisms required for an extensible, integrated ecosystem of services and clients for the research and education community. It underpins projects such as the US National Science Foundation's XSEDE system, NCAR's Research Data Archive, and the DOE Systems Biology Knowledge Base. Current work is extending Globus services to be compliant with FEDRAMP standards for security assessment, authorization, and monitoring for cloud services. We will present Globus IAM solutions and give examples of Globus use in various projects for federated access to resources. We will also describe how Globus Auth and Globus research data management capabilities enable rapid development and low-cost operations of secure data sharing platforms that leverage Globus services and integrate them with local policy and security.
Daire, Judith; Gilson, Lucy
2014-09-01
In South Africa, as elsewhere, Primary Health Care (PHC) facilities are managed by professional nurses. Little is known about the dimensions and challenges of their job, or what influences their managerial practice. Drawing on leadership and organizational theory, this study explored what the job of being a PHC manager entails, and what factors influence their managerial practice. We specifically considered whether the appointment of professional nurses as facility managers leads to an identity transition, from nurse to manager. The overall intention was to generate ideas about how to support leadership development among PHC facility managers. Adopting case study methodology, the primary researcher facilitated in-depth discussions (about their personal history and managerial experiences) with eight participating facility managers from one geographical area. Other data were collected through in-depth interviews with key informants, document review and researcher field notes/journaling. Analysis involved data triangulation, respondent and peer review and cross-case analysis. The experiences show that the PHC facility manager's job is dominated by a range of tasks and procedures focused on clinical service management, but is expected to encompass action to address the population and public health needs of the surrounding community. Managing with and through others, and in a complex system, requiring self-management, are critical aspects of the job. A range of personal, professional and contextual factors influence managerial practice, including professional identity. The current largely facility-focused management practice reflects the strong nursing identity of managers and broader organizational influences. However, three of the eight managers appear to self-identify an emerging leadership identity and demonstrate related managerial practices. Nonetheless, there is currently limited support for an identity transition towards leadership in this context. Better
Conversations outside the Comfort Zone: Identity Formation in SME Manager Action Learning
Anderson, Lisa; Gold, Jeff
2009-01-01
In this paper we consider the construction of narrative identity and particularly how managers of small businesses may construct new narrative identities within the activity of the action learning situation. We build on recent work to suggest that the "world" of managers can be explored through a consideration of Vygotsky's socio-cultural theory…
A Contextual Model for Identity Management (IdM) Interfaces
Fuller, Nathaniel J.
2014-01-01
The usability of Identity Management (IdM) systems is highly dependent upon design that simplifies the processes of identification, authentication, and authorization. Recent findings reveal two critical problems that degrade IdM usability: (1) unfeasible techniques for managing various digital identifiers, and (2) ambiguous security interfaces.…
Project Management Plan Solution Stabilization
International Nuclear Information System (INIS)
SATO, P.K.
1999-01-01
This plan presents the overall objectives, description, justification and planning for the Plutonium Finishing Plant (PFP) Solutions Stabilization subproject. The intent of this plan is to describe how this project will be managed and integrated with other facility stabilization and deactivation activities. This plan supplements the overall integrated plan presented in the Integrated Project Management Plan (IPMP) for the Plutonium Finishing Plant Stabilization and Deactivation Project, HNF-3617. This project plan is the top-level definitive project management document for the PFP Solution Stabilization subproject. It specifies the technical, schedule, requirements and the cost baselines to manage the execution of the Solution Stabilization subproject. Any deviations to the document must be authorized through the appropriate change control process
Project Management Plan Solution Stabilization
Energy Technology Data Exchange (ETDEWEB)
SATO, P.K.
1999-08-31
This plan presents the overall objectives, description, justification and planning for the Plutonium Finishing Plant (PFP) Solutions Stabilization subproject. The intent of this plan is to describe how this project will be managed and integrated with other facility stabilization and deactivation activities. This plan supplements the overall integrated plan presented in the Integrated Project Management Plan (IPMP) for the Plutonium Finishing Plant Stabilization and Deactivation Project, HNF-3617. This project plan is the top-level definitive project management document for the PFP Solution Stabilization subproject. It specifies the technical, schedule, requirements and the cost baselines to manage the execution of the Solution Stabilization subproject. Any deviations to the document must be authorized through the appropriate change control process.
Covering your face on Facebook.Managing identity through untagging and deletion
Strano, Michele; Wattei, Jill
2010-01-01
This paper describes the ways in which Facebook users manage their online identities through untagging and deleting photos to make sure images are interpreted in a desirable way. Using data collected from an online survey and thirty in-depth interviews with American adult Facebook users, the authors argue that identity management can best be understood as the combination of constructive and destructive practices through which users control not only their self-presentation (p...
Nitzlnader, Michael; Schreier, Günter
2014-01-01
Dealing with data from different source domains is of increasing importance in today's large scale biomedical research endeavours. Within the European Network for Cancer research in Children and Adolescents (ENCCA) a solution to share such data for secondary use will be established. In this paper the solution arising from the aims of the ENCCA project and regulatory requirements concerning data protection and privacy is presented. Since the details of secondary biomedical dataset utilisation are often not known in advance, data protection regulations are met with an identity management concept that facilitates context-specific pseudonymisation and a way of data aggregation using a hidden reference table later on. Phonetic hashing is proposed to prevent duplicated patient registration and re-identification of patients is possible via a trusted third party only. Finally, the solution architecture allows for implementation in a distributed computing environment, including cloud-based elements.
Research Management in Portugal: A Quest for Professional Identity
Trindade, Margarida; Agostinho, Marta
2014-01-01
Research managers at science-intensive institutions appear as a continuously evolving group of professionals whose identity is somewhat fragmented, even to themselves. In Portugal, specialized research manager roles have rapidly emerged over the last years alongside the development of a small but consolidated scientific system. In order to get an…
Author identities an interoperability problem solved by a collaborative solution
Fleischer, D.; Czerniak, A.; Schirnick, C.
2012-12-01
The identity of authors and data providers is crucial for personalized interoperability. The marketplace of available identifiers is packed and the right choice is getting more and more complicated. Even though there are more then 15 different systems available there are still some under development and proposed to come up by the end of 2012 ('PubMed Central Author ID' and ORCID). Data Management on a scale beyond the size of a single research institute but on the scale of a scientific site including a university with student education program needs to tackle this problem and so did the Kiel Data Management an Infrastructure. The main problem with the identities of researchers is the quite high frequency changes in positions during a scientist life. The required system needed to be a system that already contained the potential of preregistered people with their scientific publications from other countries, institutions and organizations. Scanning the author ID marketplace brought up, that there us a high risk of additional workload to the researcher itself or the administration due to the fact that individuals need to register an ID for themselves or the chosen register is not yet big enough to simply find the right entry. On the other hand libraries deal with authors and their publications now for centuries and they have high quality catalogs with person identities already available. Millions of records internationally mapped are available by collaboration with libraries and can be used in exactly the same scope. The international collaboration between libraries (VIAF) provides a mapping between libraries from the US, CA, UK, FR, GER and many more. The international library author identification system made it possible to actually reach at the first matching a success of 60% of all scientists. The additional advantage is that librarians can finalize the Identity system in a kind of background process. The Kiel Data Management Infrastructure initiated a web service
The role of the collaboratory in enabling large-scale identity management for HEP
International Nuclear Information System (INIS)
Cowles, Robert; Jackson, Craig; Welch, Von
2014-01-01
The authors are defining a model that describes and guides existing and future scientific collaboratory identity management implementations. Our ultimate goal is to provide guidance to virtual organizations and resource providers in designing an identity management implementation. Our model is captured in previously published work. Here, we substantially extend our analysis in terms of six motivation factors (user isolation, persistence of user data, complexity of virtual organization roles, cultural and historical inertia, scaling, and incentive for collaboration), observed in interviews with community members involved in identity management, that impact implementation decisions. This analysis is a significant step towards our ultimate goal of providing guidance to virtual organizations.
Federated Identity Management for Research Collaborations
Broeder, Daan; Kelsey, David; Kershaw, Philip; Lüders, Stefan; Lyall, Andrew; Nyrönen, Tommi; Wartel, Romain; Weyer, Heinz J
2012-01-01
Federated identity management (FIM) is an arrangement that can be made among multiple organisations that lets subscribers use the same identification data to obtain access to the secured resources of all organisations in the group. Identity federation offers economic advantages, as well as convenience, to organisations and their users. For example, multiple institutions can share a single application, with resultant cost savings and consolidation of resources. In order for FIM to be effective, the partners must have a sense of mutual trust. A number of laboratories including national and regional research organizations are facing the challenge of a deluge of scientific data that needs to be accessed by expanding user bases in dynamic collaborations that cross organisational and national boundaries. Driven by these needs, representatives from a variety of research communities, including photon/neutron facilities, social science & humanities, high-energy physics, atmospheric science, bioinformatics and fusi...
The Effects of Virtual Communities on Group Identity in Classroom Management
Ho, Tu-Kuang; Lin, Yu-Tzeng
2016-01-01
Group identity is a critical component in developing effective classroom management. While there have been numerous studies on group identity, they have primarily focused on its effects on the physical classroom entity. Advances in information technology, however, have enabled the creation of virtual communities, which have become a vital channel…
Piotrowski, Konrad
2018-04-01
The present studies examined the psychometric properties of the Utrecht-Management of Identity Commitments Scale (U-MICS) adapted to the measurement of identity formation in the parental identity domain. As the parental identity domain has only been studied within the neo-Eriksonian approach to a very limited extent, the aim of these studies was to prepare a short, valid and reliable tool for the measurement of parental identity in order to fill this gap. The associations of commitment, in-depth exploration and reconsideration of commitment in the parental domain with well-being and with other identity constructs were analyzed. The results showed that parental identity formation is associated with mothers' satisfaction with life and trait anxiety and with identity formation in other areas as well. The initial results suggest that the adapted version of the U-MICS is a valid and reliable measure that can be used in future studies on parental identity formation. © 2017 The Author. Scandinavian Journal of Psychology published by Scandinavian Psychological Associations and John Wiley & Sons Ltd.
van den Bosch, Annette; de Jong, Menno; Elving, Wim
2006-01-01
Corporate Visual Identity (CVI) is a crucial part of the identity of any organization. Most research on managing corporate identity deals with the strategic development of corporate identity and the design and effects of specific elements of the CVI. This study focuses on an aspect of CVI management
Qualitative Study on the Identity of the Manager in Romania
Directory of Open Access Journals (Sweden)
FLORENTINA SCÂRNECI
2011-01-01
Full Text Available The article presents the results of a qualitative research project carried out in 2008, which aimed at identifying the identity condition of managers in Romania. The article presents part of the grounded theory on the identity of managers: the day to day circumstances in which they live - issues related to childhood and maturity (material situation, relationships, family, etc.. Also, it describes in brief the methodology applied: qualitative collection of data, theoretical sampling, theoretical saturation and the analysis of qualitative data obtained.The article presents, also in brief, the larger research framework wherefrom the presented part was extracted. The conclusion is that there are life-related issues specific to managers (and, more precisely, specific reactions to the environment and that their identification can form the basis for designing methods of managerial diagnosis and prognosis.
Campus Single Sign-On und hochschulübergreifendes Identity Management
Hommel, Wolfgang
Das im Rahmen von IntegraTUM für die TUM geschaffene Identity & Access Management System setzt das Paradigma unified login um, d. h. ein Benutzer kann alle für ihn relevanten Dienste innerhalb der Hochschule mit derselben Loginname-/Passwortkombination nutzen. Dieser Artikel zeigt, wie auf Basis der Software Shibboleth und der deutschlandweiten Hochschulföderation DFN-AAI als weitere Mehrwerte das campusweite web single sign-on und die nahtlose Nutzung zahlreicher externer Web-Anwendungen erreicht werden. Als Beispiel für die Abläufe bei der Erschließung neuer Dienste für die hochschulübergreifende Nutzung wird die Anbindung von Learning Management Systemen auf Basis des DFN-AAI E-Learning-Profils diskutiert. Den umfassenden Vorteilen werden schließlich die aktuellen technischen Grenzen bei der Umsetzung des hochschulübergreifenden Identity Management gegenübergestellt.
Identity management strategies among HIV-positive Colombian gay men in London.
Jaspal, Rusi; Williamson, Iain
2017-12-01
This study set out to explore the social-psychological aspects of living with HIV among a group of HIV-positive Colombian gay men in London, and the strategies that they deployed to manage ensuing threats to their identities. Focus group and individual interview data were collected from 14 Colombian gay men living with HIV, and were analysed using qualitative thematic analysis and identity process theory. The following themes are discussed: (1) identity struggles and conflicts in Colombia, (2), managing multiple layers of social stigma in England, and (3) changing interpersonal and intergroup dynamics, which highlight the inter-connections between sexual prejudice, sexual risk-taking and HIV stigma. Identity may be chronically threatened due to the multiple layers of stigma, which can limit the coping strategies available to individuals. Findings strongly support the need for action and programmes to highlight and tackle both racism and HIV stigma on the gay scene and to fund more specific resources for sub-communities of gay, bisexual and other men who have sex with men, which employ appropriately trained and culturally competent staff.
Directory of Open Access Journals (Sweden)
Isabel Buil
2016-01-01
Full Text Available Corporate brand identity management is a key issue for any organisation. Accordingly, its study is a research field of great interest. This paper seeks to broaden the understanding of this strategic activity and its effects. Specifically, it investigates the concept of corporate brand identity from the employees’ perspective in the UK financial banking sector and analyses the link between brand identity management and employees’ attitudes and behaviours. Results indicate that organisations should pay special attention to the corporate brand identity management, given its influence on employees’ commitment with their organisations, as well as their brand performance and satisfaction.
Dialogue, Language and Identity: Critical Issues for Networked Management Learning
Ferreday, Debra; Hodgson, Vivien; Jones, Chris
2006-01-01
This paper draws on the work of Mikhail Bakhtin and Norman Fairclough to show how dialogue is central to the construction of identity in networked management learning. The paper is based on a case study of a networked management learning course in higher education and attempts to illustrate how participants negotiate issues of difference,…
Martyanova Natalia Alexandrovna; Rubtcova Maria Vladimirovna
2015-01-01
The article analyses the identity management practices of beauty-bloggers who on YouTube. The authors relies on the theory of deprofessionalization and show how bloggers gain the symbolic power and authority, which professionals previously had. Exploring the forms and methods of Internet communication the authors reveal the latent common identity management practices questioning the authority of professionals, and creating new managed space.
A Reputation-Based Identity Management Model for Cloud Computing
Directory of Open Access Journals (Sweden)
Lifa Wu
2015-01-01
Full Text Available In the field of cloud computing, most research on identity management has concentrated on protecting user data. However, users typically leave a trail when they access cloud services, and the resulting user traceability can potentially lead to the leakage of sensitive user information. Meanwhile, malicious users can do harm to cloud providers through the use of pseudonyms. To solve these problems, we introduce a reputation mechanism and design a reputation-based identity management model for cloud computing. In the model, pseudonyms are generated based on a reputation signature so as to guarantee the untraceability of pseudonyms, and a mechanism that calculates user reputation is proposed, which helps cloud service providers to identify malicious users. Analysis verifies that the model can ensure that users access cloud services anonymously and that cloud providers assess the credibility of users effectively without violating user privacy.
"Managing identities" and parental disclosure of HIV sero-status in Zimbabwe.
Muparamoto, Nelson; Chiweshe, Manase Kudzai
2015-01-01
Drawing from a small sample of HIV infected respondents, this paper examines parents' perceptions on the decision to disclose or not to disclose their HIV sero-status to their children. It explores how parents control the information in the interactional ritual with their children. The paper uses Goffman's concept of dramaturgy to analyse how parents manage and control disclosure within a context where HIV and AIDS is associated with stigma. Disclosure is a strategic encounter in which the interactants (parents) manage to create a desired identity or spoil an identity. Qualitative research incorporating focus group discussions and in-depth interviews was used to examine the perceptions of parents who are HIV positive on disclosure of their status to their children. Such a methodological approach allows for a nuanced understanding of the context in which decision to disclose status happens. The study findings show that in a social context involving parents and children as actors there are complex expectations which affect parental disclosure of HIV sero-status to their children. The desire to manage an expected identity militated or enabled disclosure in a parental relationship.
A framework for implementation of user-centric identity management systems
DEFF Research Database (Denmark)
Adjei, Joseph K.; Olesen, Henning
2010-01-01
Users increasingly become part of electronic transactions, which take place instantaneously without direct user involvement. This leads to the risk of data manipulation, identity theft and privacy violation, and it has become a major concern for individuals and businesses around the world. Gov......-ernments in many countries are implementing identity man-agement systems (IdMS) to curtail these incidences and to offer citizens the power to exercise informational self-determination. Using concepts from technology adoption and fit-viability theo-ries as well as the laws of identity, this paper analyzes...... the crite-ria for successful implementation and defines a framework for a citizen-centric national IdMS. Results from a survey con-ducted in Ghana are also included....
Directory of Open Access Journals (Sweden)
Martyanova Natalia Alexandrovna
2015-04-01
Full Text Available The article analyses the identity management practices of beauty-bloggers who on YouTube. The authors relies on the theory of deprofessionalization and show how bloggers gain the symbolic power and authority, which professionals previously had. Exploring the forms and methods of Internet communication the authors reveal the latent common identity management practices questioning the authority of professionals, and creating new managed space.
Managing corporate identities of non-profit organisations in the social welfare sector
Directory of Open Access Journals (Sweden)
Lida Holtzhausen
2013-03-01
Full Text Available Present-day South Africa is characterised by many societal and developmental issues, such as HIV awareness and prevention, child-headed households, environmental protection, poverty alleviation, violence and victim aid. However, it is widely acknowledged that government alone cannot address these issues effectively. The role of non-profit organisations (NPOs in addressing social and development issues is increasingly emphasised. NPOs work at grass-roots level and they can therefore, on the whole, identify societal vulnerabilities and risks earlier than the government sector. However, due to the economic recession, NPOs operate in a competitive environment where an increasing number of NPOs rely on a small number of donors and other resources. NPOs should therefore differentiate themselves from the competition in order to obtain public legitimacy and funding. Corporate identity management is important for NPOs to fulfil their role in social welfare and thus contribute to disaster risk reduction. The exploratory nature of this study dictates a qualitative research approach. Semi-structured interviews with management of five NPOs in the social welfare sector were conducted in order to provide an answer to the study’s research question: ‘To what extent do NPOs in the social welfare sector practise corporate identity management, in order to prevent and address social welfare risks?’ The research found that NPOs do not realise the full potential of managing their corporate identities. NPOs therefore do not take advantage of a strong and distinct corporate identity which would allow them to ensure their ability to assess, address, reduce and/or alleviate vulnerabilities and disaster risks.
Globus Nexus: A Platform-as-a-Service Provider of Research Identity, Profile, and Group Management.
Chard, Kyle; Lidman, Mattias; McCollam, Brendan; Bryan, Josh; Ananthakrishnan, Rachana; Tuecke, Steven; Foster, Ian
2016-03-01
Globus Nexus is a professionally hosted Platform-as-a-Service that provides identity, profile and group management functionality for the research community. Many collaborative e-Science applications need to manage large numbers of user identities, profiles, and groups. However, developing and maintaining such capabilities is often challenging given the complexity of modern security protocols and requirements for scalable, robust, and highly available implementations. By outsourcing this functionality to Globus Nexus, developers can leverage best-practice implementations without incurring development and operations overhead. Users benefit from enhanced capabilities such as identity federation, flexible profile management, and user-oriented group management. In this paper we present Globus Nexus, describe its capabilities and architecture, summarize how several e-Science applications leverage these capabilities, and present results that characterize its scalability, reliability, and availability.
Globus Nexus: A Platform-as-a-Service provider of research identity, profile, and group management
Energy Technology Data Exchange (ETDEWEB)
Chard, Kyle; Lidman, Mattias; McCollam, Brendan; Bryan, Josh; Ananthakrishnan, Rachana; Tuecke, Steven; Foster, Ian
2016-03-01
Globus Nexus is a professionally hosted Platform-as-a-Service that provides identity, profile and group management functionality for the research community. Many collaborative e-Science applications need to manage large numbers of user identities, profiles, and groups. However, developing and maintaining such capabilities is often challenging given the complexity of modern security protocols and requirements for scalable, robust, and highly available implementations. By outsourcing this functionality to Globus Nexus, developers can leverage best-practice implementations without incurring development and operations overhead. Users benefit from enhanced capabilities such as identity federation, flexible profile management, and user-oriented group management. In this paper we present Globus Nexus, describe its capabilities and architecture, summarize how several e-Science applications leverage these capabilities, and present results that characterize its scalability, reliability, and availability.
Identity Management and Trust Services: Foundations for Cloud Computing
Suess, Jack; Morooney, Kevin
2009-01-01
Increasingly, IT organizations will move from providing IT services locally to becoming an integrator of IT services--some provided locally and others provided outside the institution. As a result, institutions must immediately begin to plan for shared services and must understand the essential role that identity management and trust services play…
DEFF Research Database (Denmark)
Adjei, Joseph K.; Olesen, Henning
This paper discusses the effect of trust and information privacy concerns on citizens’ attitude towards national identity management systems. We introduce the privacyconcerns- trust model, which shows the role of trust in mediating and moderating citizens’ attitude towards identity management...... systems. We adopted a qualitative research approach in our analysis of data that was gathered through a series of interviews and a stakeholder workshop in Ghana. Our findings indicate that, beyond the threshold level of trust, societal information privacy concern is low; hence, trust is high, thereby...
Managing Quality, Identity and Adversaries in Public Discourse with Machine Learning
Brennan, Michael
2012-01-01
Automation can mitigate issues when scaling and managing quality and identity in public discourse on the web. Discourse needs to be curated and filtered. Anonymous speech has to be supported while handling adversaries. Reliance on human curators or analysts does not scale and content can be missed. These scaling and management issues include the…
Identity Management Mismatch Challenges in the Danish Municipality Administration System
DEFF Research Database (Denmark)
Andersen, Mads Schaarup; Christensen, Henrik Bærbak
2010-01-01
Integrating a COTS product in a company’s product portfolio is appealing from a business perspective but highly challenging from the perspective of the software architecture. In this paper we outline research challenges regarding authorization in the identity management part of the Danish...
Analysis of Privacy-Enhancing Identity Management Systems
DEFF Research Database (Denmark)
Adjei, Joseph K.; Olesen, Henning
Privacy has become a major issue for policy makers. This has been impelled by the rapid development of technologies that facilitate collection, distribution, storage, and manipulation of personal information. Business organizations are finding new ways of leveraging the value derived from consumer...... is an attempt to understand the relationship between individuals’ intentions to disclose personal information, their actual personal information disclosure behaviours, and how these can be leveraged to develop privacy-enhancing identity management systems (IDMS) that users can trust. Legal, regulatory...... and technological aspects of privacy and technology adoption are also discussed....
Spoiled Group Identities and Backstage Work: A Theory of Stigma Management Rehearsals
O'Brien, John
2011-01-01
How do persons with a stigmatized identity learn potential responses to discrimination and harassment? Drawing on three and a half years of ethnographic data, this paper demonstrates how members of a group of Muslim American youth are socialized in locally dominant stigma management strategies through stigma management rehearsals. Stigma…
No Solutions: Resisting Certainty in Water Supply Management
Cockerill, K.; Armstrong, M.; Richter, J.; Okie, J. G.
2017-12-01
Although most scholars and water managers implicitly understand that managing water resources is an ongoing need, both popular and academic literature routinely use the words `solution' and `solve' in discussing water management concerns. The word `solution' reflects a quest for certainty, stability, permanence. A focus on `solving' creates a simplistic expectation that some person or institution is responsible for implementing a solution and that once `solved' the issue no longer requires attention. The reality, however, is water management is a wicked problem, meaning it is amorphous, involves multiple definitions, is embedded in complex systems, and hence is intractable. By definition, wicked problems defy solution. Our interdisciplinary project integrates research from across a broad spectrum of biological, physical, and social sciences. We find that framing a problem in terms of `solving' affects how people think, feel, behave toward the problem. Further, our work suggests that the prevalence of solution- based language has simultaneously generated expectations that science / scientists can predict and control biophysical systems and that science is not to be trusted because it has failed to deliver on previous promises to permanently `solve' events like floods or droughts. Hydrologic systems, are, of course highly uncertain. Hence, reiterating a simplistic insistence on `solving' water management concerns may result in decreased public attention to or support for more complex policy discussions that could provide long-term management strategies. Using the language of `solutions' with expectations of certainty sets hydrologic researchers and water managers up to fail. Managing water is a social responsibility and it will require consistent attention in the future, just as it has throughout human history. Scientists have a key role to play in explaining how various hydrologic systems function, but they should not be expected to `solve' pressing water management
Management challenges in a case of gender identity disorder
Directory of Open Access Journals (Sweden)
Anubhav Rathi
2014-01-01
Full Text Available Gender identity disorder (GID is a complex disorder and can be defined as a group of disorders whose common feature is a strong and persistent preference for living as a person of the other sex. It is associated with significant impairment in social, occupational, interpersonal, and other areas of functioning. We describe the case of an adolescent, biologically male who was brought to our outpatient department primarily with symptoms of adjustment disorder with GID and the management provided. The role of a psychiatrist in the management, ethical and legal issues involved is also discussed.
International Nuclear Information System (INIS)
Michev, Iordan P.
2006-01-01
In the first part of this paper we consider the transformation of the cubic identities for general Korteweg-de Vries (KdV) tau functions from [Mishev, J. Math. Phys. 40, 2419-2428 (1999)] to the specific identities for trigonometric KdV tau functions. Afterwards, we consider the Fay identity as a functional equation and provide a wide set of solutions of this equation. The main result of this paper is Theorem 3.4, where we generalize the identities from Mishev. An open problem is the transformation of the cubic identities from Mishev to the specific identities for elliptic KdV tau functions
Group affiliation in self-management: support or threat to identity?
Bossy, Dagmara; Knutsen, Ingrid Ruud; Rogers, Anne; Foss, Christina
2017-02-01
Self-management is considered important in chronic illness, and contemporary health policy recommends participation in support groups for individuals with chronic conditions. Although withdrawal from or non-participation in support groups is an important problem, there is limited knowledge about individuals' own motivation for participation in or withdrawal from self-management support groups. To investigate how individuals with type 2 diabetes perceive participation in group-based self-management support. This is a qualitative focus group study using a semi-structured interview guide. Sixteen participants diagnosed with type 2 diabetes were included in the study. Individuals with and without group affiliations were mixed in three focus groups to trigger discussions. In the analysis, reoccurring themes of engagement and discussions between participants were focused within a theoretical frame of institutional logic. The focus groups are seen as social spaces where participants construct identity. Both participation and non-participation in group-based self-management support are associated with dealing with the stigma of having type 2 diabetes. Negotiations contribute to constructing an illness dignity as a response to the logic of moral responsibility for the disease. Contemporary policy contributes to societal understandings of individuals with type 2 diabetes as morally inadequate. Our study shows that group-based self-management support may counteract blame and contribute in negotiations of identity for individuals with type 2 diabetes. This mechanism makes participation in groups beneficial for some but stigma inducing for others. © 2016 The Authors. Health Expectations Published by John Wiley & Sons Ltd.
Toapanta, Moisés; Mafla, Enrique; Orizaga, Antonio
2017-08-01
We analyzed the problems of security of the information of the civil registries and identification at world level that are considered strategic. The objective is to adopt the appropriate security protocols in a conceptual model in the identity management for the Civil Registry of Ecuador. In this phase, the appropriate security protocols were determined in a Conceptual Model in Identity Management with Authentication, Authorization and Auditing (AAA). We used the deductive method and exploratory research to define the appropriate security protocols to be adopted in the identity model: IPSec, DNSsec, Radius, SSL, TLS, IEEE 802.1X EAP, Set. It was a prototype of the location of the security protocols adopted in the logical design of the technological infrastructure considering the conceptual model for Identity, Authentication, Authorization, and Audit management. It was concluded that the adopted protocols are appropriate for a distributed database and should have a direct relationship with the algorithms, which allows vulnerability and risk mitigation taking into account confidentiality, integrity and availability (CIA).
Solutions to Improve Educational Management Quality
Ramezan Jahanian; Masoomeh Motahari
2013-01-01
Nowadays, enhancing the quality in educational systems of different countries has gained especial importance and stand. Improving utilizing and increasing the quality in our country’s educational system is felt too. One of the utilizing factors in education system is to improve the educational management quality.In this article, effective factors in educational management quality and one of its improving solutions, thorough management quality, is analyzed.
van den Bosch, Annette; de Jong, Menno; Elving, Wim
2004-01-01
It is generally acknowledged that corporate visual identity (CVI) is an important element of identity, reputation, and relationship management. Academic research has focused strongly on the strategic and design aspects of CVI, and neglected the operational level. This article addresses one of the
van den Bosch, A.L.M.; de Jong, Menno D.T.; Elving, W.J.L.
2004-01-01
It is generally acknowledged that corporate visual identity (CVI) is an important element of identity, reputation, and relationship management. Academic research has focused strongly on the strategic and design aspects of CVI, and neglected the operational level. This article addresses one of the
Stanley, Samantha J; Pitts, Margaret Jane
2018-02-22
While cigarette smoking is decreasing among young adults, rates of nicotine consumption through other devices, most notably electronic cigarettes, are on the rise. Framed by communication theory of identity, this study examines young adult smokers' experiences with relational others in regard to their smoking. Focus group discussions and individual interviews convened with 20 young adult cigarette and electronic cigarette smokers revealed identity gaps implicating the relational layer of identity, including personal-relational, enacted-relational, and personal-enacted-relational identity gaps. Participants used communicative and behavioral strategies to manage relational discrepancies. The documented identity gaps and management strategies present opportunities for targeted smoking cessation interventions that amplify dissonance created through identity gaps as a motivational tactic.
Reed, Louren; Leuty, Melanie E
2016-07-01
Examination of individual difference variables have been largely ignored within research on the use of workplace sexual identity management strategies. The current study examined personality traits (extraversion, openness, and neuroticism), facets of sexual identity development (identity confusion, internalized heterosexism), and situational variables (e.g., perceptions of workplace climate and heterosexism) in explaining the use of management strategies, as well as possible interactions between individual and situational factors. Perceptions of the workplace climate toward lesbian and gay individuals significantly related to the use each of the management strategies, and Internalized Heterosexism was found to significantly predict the use of the Explicitly Out strategy. Most interactions between individual difference and situational variables were not supported, with the exception of an interaction between workplace heterosexism and internalized homophobia in explaining the use of the Explicitly Out strategy.
Rubin, Jennifer D; McClelland, Sara I
2015-01-01
Facebook offers a socialisation context in which young people from ethnic, gender and sexual minorities must continually manage the potential for prejudice and discrimination in the form of homophobia and racism. In-depth interviews were conducted with eight young women, aged 16-19 years, who self-identified as queer and as women of colour. A detailed analysis of these interviews--focusing in particular on how young people described navigating expectations of rejection from family and friends--offered insight into the psychological and health consequences associated with managing sexual identity(s) while online. The 'closet' ultimately takes on new meaning in this virtual space: participants described trying to develop social relationships within Facebook, which demands sharing one's thoughts, behaviours and ideas, while also hiding and silencing their emerging sexuality. In this 'virtual closet', tempering self-presentation to offset social exclusion has become a continuous, yet personally treacherous, activity during the daily practice of using Facebook.
Areva solutions for management of defective fuel
International Nuclear Information System (INIS)
Morlaes, I.; Vo Van, V.
2014-01-01
Defective fuel management is a major challenge for nuclear operators when all fuel must be long-term managed. This paper describes AREVA solutions for managing defective fuel. Transport AREVA performs shipments of defective fuel in Europe and proposes casks that are licensed for that purpose in Europe and in the USA. The paper presents the transport experience and the new European licensing approach of defective fuel transport. Dry Interim Storage AREVA is implementing the defective fuel storage in the USA, compliant with the Safety Authority's requirements. In Europe, AREVA is developing a new, more long-term oriented storage solution for defective fuel, the best available technology regarding safety requirements. The paper describes these storage solutions. Treatment Various types of defective fuel coming from around the world have been treated in the AREVA La Hague plant. Specific treatment procedures were developed when needed. The paper presents operational elements related to this experience. (authors)
Defining collaborative business rules management solutions : framework and method
dr. Martijn Zoet; Johan Versendaal
2014-01-01
From the publishers' website: The goal of this research is to define a method for configuring a collaborative business rules management solution from a value proposition perspective. In an earlier published study (Business rules management solutions: added value by means of business
Interplay Between Intended Brand Identity and Identities in a Nike Related Brand Community
DEFF Research Database (Denmark)
Kornum, Niels; Gyrd-Jones, Richard; Al Zagir, Nadia
2017-01-01
While branding research traditionally views brand identity as an inside-out management controlled phenomenon, recent research emphasizes that a wide variety of stakeholders in the brand ecosystem enact and co-create brand identity. Following this theoretical perspective, management forms the inte...
INTEGRATED DOCUMENT MANAGEMENT SOLUTION FOR THE LOCAL GOVERNMENT
Directory of Open Access Journals (Sweden)
Nistor Razvan
2013-07-01
Full Text Available In this paper we present system analysis and design elements for the integrated document management solution at local governing authorities in the rural areas. While specifically dealing with the actual management of the Agricultural Register, an important primary unitary evidence document, we also keep a general character of the discussion, in order to argue for the generality of the proposed solution. Hence, for the identified and described problem space we propose an administrative and software infrastructure solution. This work is an empirical research in which our aim is primarily to identify key problems within the local governing authorities from several perspectives concerning the management of the Agricultural Register then to address those problems with an integrated document management system. For the proposed solution we give and argue the general system architecture and describe the key-mechanisms that support quality requirements. The relevance of this research concern is given by the impact of the actual Agricultural Register management on important stakeholders. This can be measured as the satisfaction felt by taxpayers and the performance of the local governing authorities, the Financial Administration, the Agency of Payments and Intervention in Agriculture and the Ministry of Agriculture and Rural Development. This work is also intended as a start-point for a new, modern thinking of the governing authorities in their pursue to improve public services. For this, in our work we highlight the importance of complete system analysis at all administrative levels as a main priority concern for all public managers. Our aim is the improvement of the public service by rising the awareness of the decision makers on the necessity of using integrated document management solutions for the provided services. Also, our work aims at increasing the efficiency with which nowadays, governing authorities invest public funds in various IT projects
Welch, V.
2016-12-01
Scientists care deeply about their collaborations: who is a member, who can access, produce, and correct data, and manager instruments critical to their science missions. The communities of cybersecurity and identity management professionals develop tools to support collaborations and the undertaking of trustworthy science, but there are large cultural and linguistic gaps between these communities and the scientists they service. The National Science Foundation has recently funded a NSF Cybersecurity Center of Excellence to help its community of projects by providing leadership and addressing the challenges of trustworthy science. A key goal of this NSF Center has been translating between the goals of the science community into requirements and risks understood by identity management and cybersecurity communities. This talk will give an update on the Center's efforts and other services it provides to the NSF community to bridge these cultures.
OAuth 2.0 identity and access management patterns
Spasovski, Martin
2013-01-01
This is a practical and fast-paced guide that gives you all the information you need to start implementing secure OAuth 2.0 implementations in your web applications.OAuth 2.0 Identity and Access Management Patterns is intended for software developers, software architects, and enthusiasts working with the OAuth 2.0 framework.In order to learn and understand the OAuth 2.0 grant flow, it is assumed that you have some basic knowledge of HTTP communication. For the practical examples, basic knowledge of HTML templating, programming languages, and executing commands in the command line terminal is a
Radioactive waste management solutions
International Nuclear Information System (INIS)
Siemann, Michael
2015-01-01
One of the more frequent questions that arise when discussing nuclear energy's potential contribution to mitigating climate change concerns that of how to manage radioactive waste. Radioactive waste is produced through nuclear power generation, but also - although to a significantly lesser extent - in a variety of other sectors including medicine, agriculture, research, industry and education. The amount, type and physical form of radioactive waste varies considerably. Some forms of radioactive waste, for example, need only be stored for a relatively short period while their radioactivity naturally decays to safe levels. Others remain radioactive for hundreds or even hundreds of thousands of years. Public concerns surrounding radioactive waste are largely related to long-lived high-level radioactive waste. Countries around the world with existing nuclear programmes are developing longer-term plans for final disposal of such waste, with an international consensus developing that the geological disposal of high-level waste (HLW) is the most technically feasible and safe solution. This article provides a brief overview of the different forms of radioactive waste, examines storage and disposal solutions, and briefly explores fuel recycling and stakeholder involvement in radioactive waste management decision making
Solutions in radiology services management: a literature review.
Pereira, Aline Garcia; Vergara, Lizandra Garcia Lupi; Merino, Eugenio Andrés Díaz; Wagner, Adriano
2015-01-01
The present study was aimed at reviewing the literature to identify solutions for problems observed in radiology services. Basic, qualitative, exploratory literature review at Scopus and SciELO databases, utilizing the Mendeley and Illustrator CC Adobe softwares. In the databases, 565 papers - 120 out of them, pdf free - were identified. Problems observed in the radiology sector are related to procedures scheduling, humanization, lack of training, poor knowledge and use of management techniques, and interaction with users. The design management provides the services with interesting solutions such as Benchmarking, CRM, Lean Approach, ServiceBlueprinting, continued education, among others. Literature review is an important tool to identify problems and respective solutions. However, considering the small number of studies approaching management of radiology services, this is a great field of research for the development of deeper studies.
DEFF Research Database (Denmark)
Horn, Line Helverskov
The study aims at exploring how identity is enacted within the context of a two-year programme in Service, Hospitality, and Tourism Management (SHTM). This research thus investigates how students and educators go about their daily lives in different educational contexts both on and off campus...... as a contribution to the body of literature of ANT-based studies. Second, it contributes to existing identity theories by exemplifying a socio-material approach to identity issues. Third, the study enables reflections upon how educational institutions as fundamentally identity-producing organisations acknowledge...
Data management for the internet of things: design primitives and solution.
Abu-Elkheir, Mervat; Hayajneh, Mohammad; Ali, Najah Abu
2013-11-14
The Internet of Things (IoT) is a networking paradigm where interconnected, smart objects continuously generate data and transmit it over the Internet. Much of the IoT initiatives are geared towards manufacturing low-cost and energy-efficient hardware for these objects, as well as the communication technologies that provide objects interconnectivity. However, the solutions to manage and utilize the massive volume of data produced by these objects are yet to mature. Traditional database management solutions fall short in satisfying the sophisticated application needs of an IoT network that has a truly global-scale. Current solutions for IoT data management address partial aspects of the IoT environment with special focus on sensor networks. In this paper, we survey the data management solutions that are proposed for IoT or subsystems of the IoT. We highlight the distinctive design primitives that we believe should be addressed in an IoT data management solution, and discuss how they are approached by the proposed solutions. We finally propose a data management framework for IoT that takes into consideration the discussed design elements and acts as a seed to a comprehensive IoT data management solution. The framework we propose adapts a federated, data- and sources-centric approach to link the diverse Things with their abundance of data to the potential applications and services that are envisioned for IoT.
Patient privacy, consent, and identity management in health information exchange
Hosek, Susan D
2013-01-01
As a step toward improving its health information technology (IT) interoperability, the Military Health System is seeking to develop a research roadmap to better coordinate health IT research efforts, address IT capability gaps, and reduce programmatic risk for its enterprise projects. This report identifies gaps in research, policy, and practice involving patient privacy, consent, and identity management that need to be addressed to improve the quality and efficiency of care through health information exchange.
DEFF Research Database (Denmark)
Villeseche, Florence
or leaders and their social identity as women. Accordingly, I here seek to answer the following question: what dilemmas arise from the collective institutional work performed by actors facing institutional contradiction between their occupational and gender identity, and how are those dilemmas addressed? I......Women’s presence in the labor market is one of the major institutional changes of the past century. However, in particular at higher hierarchical levels, gender equality still remains a distant objective. The ideal-type of the worker, manager or leader is this largely a masculine one, thus...... associating the related occupational identity to a masculine gender social identity. Thus, it can be argued that women in organizations can face an “institutional contradiction” between their occupation and their gender – i.e a perceived discordancy between their social occupational identity as managers...
DEFF Research Database (Denmark)
Annosi, Maria Carmela; Foss, Nicolai Juul; Brunetta, Federica
2017-01-01
-based firms. We argue that managerial and stakeholder interventions shape the self-construction of team identity as well as the team’s commitment to specific work objectives. We also suggest that team identity becomes isomorphic to organizational identity because of pressures related to: (1) the presence...... of a dense network of managers and stakeholders, which orients teams towards a focus on certain aspects of the higher-order identity; (2) the use of team routines and regular feedback loops, which force alignment with the organizational identity; and (3) the use of coordinating roles aimed at promoting......, ratifying and reinforcing the convergence of identity within the team. We analyse multiple cases from a major multinational corporation in the telecommunications industry, which we examine through the lens of a multi-level model of controls involving the micro, meso and macro organizational levels. We...
When Social Identities Collide: Commentary on "Gender in the Management Education Classroom"
Patton, Eric
2010-01-01
This commentary to "Gender in the Management Education Classroom" (Bilimoria, O'Neil, Hopkins, & Murphy, 2010) employs social identity and self-categorization theory to analyze the incident described in the article. In any MBA classroom, students are dealing with multiple group memberships. Similar to workplace settings, when the focus is on…
Solutions in radiology services management: a literature review
Directory of Open Access Journals (Sweden)
Aline Garcia Pereira
2015-10-01
Full Text Available AbstractObjective:The present study was aimed at reviewing the literature to identify solutions for problems observed in radiology services.Materials and Methods:Basic, qualitative, exploratory literature review at Scopus and SciELO databases, utilizing the Mendeley and Illustrator CC Adobe softwares.Results:In the databases, 565 papers – 120 out of them, pdf free – were identified. Problems observed in the radiology sector are related to procedures scheduling, humanization, lack of training, poor knowledge and use of management techniques, and interaction with users. The design management provides the services with interesting solutions such as Benchmarking, CRM, Lean Approach, ServiceBlueprinting, continued education, among others.Conclusion:Literature review is an important tool to identify problems and respective solutions. However, considering the small number of studies approaching management of radiology services, this is a great field of research for the development of deeper studies.
Solutions in radiology services management: a literature review*
Pereira, Aline Garcia; Vergara, Lizandra Garcia Lupi; Merino, Eugenio Andrés Díaz; Wagner, Adriano
2015-01-01
Objective The present study was aimed at reviewing the literature to identify solutions for problems observed in radiology services. Materials and Methods Basic, qualitative, exploratory literature review at Scopus and SciELO databases, utilizing the Mendeley and Illustrator CC Adobe softwares. Results In the databases, 565 papers – 120 out of them, pdf free – were identified. Problems observed in the radiology sector are related to procedures scheduling, humanization, lack of training, poor knowledge and use of management techniques, and interaction with users. The design management provides the services with interesting solutions such as Benchmarking, CRM, Lean Approach, ServiceBlueprinting, continued education, among others. Conclusion Literature review is an important tool to identify problems and respective solutions. However, considering the small number of studies approaching management of radiology services, this is a great field of research for the development of deeper studies. PMID:26543281
Kim, HeeSook; Kim, Sue
2013-02-01
The purpose of the study was to investigate the effects of an integrated self-management program on self-management, glycemic control, and maternal identity in women with gestational diabetes mellitus (GDM). A non-equivalent control group non-synchronized quasi-experimental design was used. A total of 55 women with GDM were recruited from Cheil General Hospital, Seoul, Korea and were assigned to an experimental (n=28) or control group (n=27). The participants were 24-30 weeks pregnant women who had been diagnosed with GDM as of July 30, 2010. The program was conducted as a 1 hour small group meeting 3 out of 5 times and by telephone-counseling 2 out of 5 times. The integrated self-management program was verified by an expert panel. Although there was no significant reduction in HbA1c (U= -1.17, p=.238), there were statistically significant increases in self-management (U= -3.80, pidentity (U= -4.48, pmanagement program for women with GDM improves self-management, maternal identity, and glycemic control. Further studies are needed to identify the effects of an integrated self-management program on pregnancy and neonatal outcomes.
Data Management for the Internet of Things: Design Primitives and Solution
Abu-Elkheir, Mervat; Hayajneh, Mohammad; Ali, Najah Abu
2013-01-01
The Internet of Things (IoT) is a networking paradigm where interconnected, smart objects continuously generate data and transmit it over the Internet. Much of the IoT initiatives are geared towards manufacturing low-cost and energy-efficient hardware for these objects, as well as the communication technologies that provide objects interconnectivity. However, the solutions to manage and utilize the massive volume of data produced by these objects are yet to mature. Traditional database management solutions fall short in satisfying the sophisticated application needs of an IoT network that has a truly global-scale. Current solutions for IoT data management address partial aspects of the IoT environment with special focus on sensor networks. In this paper, we survey the data management solutions that are proposed for IoT or subsystems of the IoT. We highlight the distinctive design primitives that we believe should be addressed in an IoT data management solution, and discuss how they are approached by the proposed solutions. We finally propose a data management framework for IoT that takes into consideration the discussed design elements and acts as a seed to a comprehensive IoT data management solution. The framework we propose adapts a federated, data- and sources-centric approach to link the diverse Things with their abundance of data to the potential applications and services that are envisioned for IoT. PMID:24240599
Dissociative identity disorder (DID) in clinical practice - what you don't see may hurt you.
Leonard, David; Tiller, John
2016-02-01
To identify problems that interfere with the recognition, diagnosis and management of people with dissociative identity disorder (DID) presenting to psychiatric outpatient and inpatient services and suggest solutions. Problems and suggested solutions associated with clinical presentations and management of people with DID are outlined with references to relevant literature. Problems in the recognition and management of DID are described. These lead to delays in diagnosis and costly, inappropriate management, destructive to services, staff and patients alike. Problems include lack of understanding and experience and scepticism about the disorder, resulting in failure to provide appropriate treatment.Some suggestions to improve recognition and management are included. Better recognition, diagnosis and management of DID will lead to better and more cost effective outcomes. © The Royal Australian and New Zealand College of Psychiatrists 2015.
Swallow, Veronica
2008-12-01
To explore parents' views of their identities as they learn to manage their child's chronic kidney disease. Parents are expected to participate in management and usually learn necessary skills from the multidisciplinary team. Research highlights the importance of professionals defining parents' management roles in chronic disease; but little is known about parents' views on their own identities as the complex and dynamic process of teaching and learning unfolds around their child's condition. According to positioning theory, identity development is a dynamic and fluid process that occurs during interaction, with each person positioning themselves while simultaneously positioning the other person, yet this concept has not been considered in relation to parents' contributions to disease management. A longitudinal, grounded theory study conducted in a UK Children's Kidney Unit. This paper focuses on one aspect of a larger study exploring family learning in disease management. Six mothers and two fathers of six children with a recently diagnosed chronic kidney disease participated in a total of 21 semi-structured interviews during the 18 months after referral to the unit. Interviews included discussion about the parts they played in relation to professionals during the management process. Findings were interpreted within a framework of positioning theory. Parents participated in teaching/learning/assessment that was both planned (involving allocated clinical lessons and tasks) and spontaneous (in response to current situations), to facilitate their participation. They positioned multidisciplinary team members as teachers as well as professionals, simultaneously positioning themselves as students as well as parents. Parents' clinical duties and obligations are not an automatic part of parenting but become part of the broader process of sharing disease management, this can lead to them assuming the additional identity of a 'student'. Involving parents in ongoing
Nugue, Mathilde; De Stampa, Matthieu; Couturier, Yves; Somme, Dominique
2012-01-01
In France, the national public health plan proposes a group of innovations including the initiation of case management for older adults in complex situations, particularly those with cognitive disorders. In this context, public authorities asked case managers to use a standardized multidimensional evaluation tool. The results of a qualitative study on the pertinence of such a tool relative to the emergence of this new professional field are described. Early use of an evaluation tool seems to be linked to the emergence of a new professional identity for recently recruited case managers. Factors determining the strength of this link are training tool standardization, computerization, and local structure's involvement. Our results contribute to identifying one of the ways by which professional identity can be changed to become a case manager.
The Role of Green Infrastructure Solutions in Urban Flood Risk Management
Soz, Salman Anees; Kryspin-Watson, Jolanta; Stanton-Geddes, Zuzana
2016-01-01
This Knowledge Note explores the role of green infrastructure solutions in urban flood risk management. Green infrastructure solutions represent an approach that focuses on using natural processes for managing wet weather impacts while delivering environmental, social, and economic benefits. Green infrastructure solutions, such as wetlands, bioshields, buffer zones, green roofing, street s...
Enterprise identity management towards an investment decision support approach
Royer, Denis
2013-01-01
?The introduction of Enterprise Identity Management Systems (EIdMS) in organizations even beyond the purely technological level is a costly and challenging endeavor. However, for decision makers it seems difficult to fully understand the impacts and opportunities arising from the introduction of EIdMS. This book explores the relevant aspects for an ex-ante evaluation of EIdMS. Therefore it examines this domain by employing a qualitative expert interview study to better understand the nature of EIdMS, as they are situated between security and productive IT systems. To this regard, the focus is
Rewriting Dominant Narratives of the Academy: Women Faculty of Color and Identity Management
Motha, Suhanthie; Varghese, Manka M.
2018-01-01
Drawing on Delgado and Yosso's "counterstory," Yosso's "community cultural wealth," and Alsup's "borderland discourses," the authors, who are women of color academics, use narratives from their lives to discuss the ways in which they draw on resources in managing and reconfiguring their multiple identities within the…
Enterprise security IT security solutions : concepts, practical experiences, technologies
Fumy, Walter
2013-01-01
Addressing IT managers and staff, as well as CIOs and other executives dealing with corporate IT security, this book provides a broad knowledge on the major security issues affecting today's corporations and organizations, and presents state-of-the-art concepts and current trends for securing an enterprise.Areas covered include information security management, network and system security, identity and access management (IAM), authentication (including smart card based solutions and biometrics), and security certification. In-depth discussion of relevant technologies and standards (including cr
Leadership, New Public Management and the Re-Modelling and Regulation of Teacher Identities
Hall, David; Gunter, Helen; Bragg, Joanna
2013-01-01
This article examines the rapidly shifting relationship between teachers and the state and efforts to re-model teacher identities within the wider context of public sector modernization and the New Public Management. The construction and development of officially authorized and normative discursive practices relating to leadership and the…
Anomalous N=2 superconformal Ward identities
International Nuclear Information System (INIS)
Ketov, Sergei V.
2000-01-01
The N=2 superconformal Ward identities and their anomalies are discussed in N=2 superspace (including N=2 harmonic superspace), at the level of the low-energy effective action (LEEA) in four-dimensional N=2 supersymmetric field theories. The (first) chiral N=2 supergravity compensator is related to the known N=2 anomalous Ward identity in the N=2 (abelian) vector mulitplet sector. As regards the hypermultiplet LEEA given by the N=2 non-linear sigma-model (NLSM), a new anomalous N=2 superconformal Ward identity is found, whose existence is related to the (second) analytic compensator in N=2 supergravity. The celebrated solution of Seiberg and Witten is known to obey the (first) anomalous Ward identity in the Coulomb branch. We find a few solutions to the new anomalous Ward identity, after making certain assumptions about unbroken internal symmetries. Amongst the N=2 NLSM target space metrics governing the hypermultiplet LEEA are the SU(2)-Yang-Mills-Higgs monopole moduli-space metrics that can be encoded in terms of the spectral curves (Riemann surfaces), similarly to the Seiberg-Witten-type solutions. After a dimensional reduction to three spacetime dimensions (3d), our results support the mirror symmetry between the Coulomb and Higgs branches in 3d, N=4 gauge theories
Getting the Most of Management Training - the Role of Identical Elements for Training Transfer
prof. dr. Karen van Dam; drs. Martijn van der Locht; dr. Dan Chiaburu
2013-01-01
Purpose - Focusing on management training, this study aimed to establish whether identical elements in a training program (i.e. aspects resembling participants' work situation) can improve training transfer and whether they do so beyond the contribution of two well-established predictors --
Zimmermann, Gregoire; Mahaim, Elodie Biermann; Mantzouranis, Gregory; Genoud, Philippe A.; Crocetti, Elisabetta
2012-01-01
The purpose of this study was to evaluate the factor structure and the reliability of the French versions of the Identity Style Inventory (ISI-3) and the Utrecht-Management of Identity Commitments Scale (U-MICS) in a sample of college students (N = 457, 18-25 years old). Confirmatory factor analyses confirmed the hypothesized three-factor solution…
Identity at work: Exploring strategies for Identity Work
Directory of Open Access Journals (Sweden)
Byron G. Adams
2012-09-01
Research purpose: The main aim of this study was to explore employee narratives and identify the strategies available to them in the process of identity work, as they defined themselves at work. Motivation for the study: As there is a scarcity of research on identity work in South Africa, this study wanted to advance knowledge about identity work and the strategies used for regulating and negotiating an identity at work by exploring these constructs in this context. Research design, approach and method: A qualitative research process formed the basis for this study. Nineteen employees from a global manufacturing company participated in two semi-structured in-depth interviews. Grounded theory was applied to analyse and interpret the data. Main findings: Nine strategies for identity work were identified and categorised into four broad themes (personal philosophies; relationships; career management and negotiating balance. Practical/managerial implications: Employees followed various strategies for defining themselves at work and this may have some implications for employee work engagement and productivity. Contribution/value-add: This study expands on current theoretical knowledge of identity work, and provides insights into the strategies people use to regulate and negotiate their identities at work.
Identity at work: Exploring strategies for Identity Work
Directory of Open Access Journals (Sweden)
Byron G. Adams
2012-01-01
Full Text Available Orientation: This study explored strategies for identity work that are central to the negotiation and regulation of employee work identity.Research purpose: The main aim of this study was to explore employee narratives and identify the strategies available to them in the process of identity work, as they defined themselves at work.Motivation for the study: As there is a scarcity of research on identity work in South Africa, this study wanted to advance knowledge about identity work and the strategies used for regulating and negotiating an identity at work by exploring these constructs in this context.Research design, approach and method: A qualitative research process formed the basis for this study. Nineteen employees from a global manufacturing company participated in two semi-structured in-depth interviews. Grounded theory was applied to analyse and interpret the data.Main findings: Nine strategies for identity work were identified and categorised into four broad themes (personal philosophies; relationships; career management and negotiating balance.Practical/managerial implications: Employees followed various strategies for defining themselves at work and this may have some implications for employee work engagement and productivity.Contribution/value-add: This study expands on current theoretical knowledge of identity work, and provides insights into the strategies people use to regulate and negotiate their identities at work.
Report #18-P-0030, October 30, 2017. Weaknesses in the Identity and Access Management and Incident Response metric domains leave the CSB vulnerable to attacks occurring and not being detected in a timely manner.
Lisbach, Bertrand
2013-01-01
Regulation, risk awareness and technological advances are increasingly drawing identity search functionality into business, security and data management processes, as well as fraud investigations and counter-terrorist measures.Over the years, a number of techniques have been developed for searching identity data, traditionally focusing on logical algorithms. These techniques often failed to take into account the complexities of language and culture that provide the rich variations seen in names used around the world. A new paradigm has now emerged for understanding the way that identity data
Personal identity and eastern thought
Directory of Open Access Journals (Sweden)
Correia Carlos João
2009-01-01
Full Text Available This paper aims to show that the problem of personal identity is a fundamental question of the classical Indian thought. Usually we tend to think that personal identity is a Western philosophical subject, and so we tend to forget the significance of the Self (Atman in Hinduism and even in Buddhism. The author shows how the Indian thought approached the question of personal identity and which was the singular solution outlined in the work consensually attributed to Gotama, the Buddha.
The medical leadership challenge in healthcare is an identity challenge.
Andersson, Thomas
2015-01-01
The purpose of this article is to describe and analyse the identity challenges that physicians with medical leadership positions face. Four qualitative case studies were performed to address the fact that identity is processual, relational and situational. Physicians with managerial roles were interviewed, as well as their peers, supervisors and subordinates. Furthermore, observations were made to understand how different identities are displayed in action. This study illustrates that medical leadership implies identity struggles when physicians have manager positions, because of the different characteristics of the social identities of managers and physicians. Major differences are related between physicians as autonomous individuals in a system and managers as subordinates to the organizational system. There are psychological mechanisms that evoke the physician identity more often than the managerial identity among physicians who are managers, which explains why physicians who are managers tend to remain foremost physicians. The implications of the findings, that there are major identity challenges by being both a physician and manager, suggest that managerial physicians might not be the best prerequisite for medical leadership, but instead, cooperative relationships between physicians and non-physician managers might be a less difficult way to support medical leadership. Acknowledging and addressing identity challenges can be important both in creating structures in organizations and designing the training for managers in healthcare (both physicians and non-physicians) to support medical leadership. Medical leadership is most often related to organizational structure and/or leadership skills, but this paper discusses identity requirements and challenges related to medical leadership.
New solutions for data management on the horizon
Adrian Giordani
2012-01-01
Almost all large-scale scientific experiments, including those at CERN, manage their data using relational databases, accessible with a programming language called SQL (Structured Query Language). But, as the amount of data continues to grow, there are also growing doubts that relational databases are the best solution. New types of databases, called NoSQL, are promising a different way to access large amounts of data. The languages used in NoSQL are far less complicated, making the initial set-up much easier. In addition, data can be stored in a more flexible way, promising a faster way to access and manage data. The CERN Database Group in the IT Department is participating in small-scale tests of NoSQL solutions with three of the four large detectors (CMS, ATLAS and LHCb). Over the past few months, non-relational database vendors – including Google, Hadapt, and Oracle – have also been presenting their NoSQL solutions to the IT Department. “We have used the Orac...
Directory of Open Access Journals (Sweden)
Adílio Renê Almeida Miranda
2014-12-01
Full Text Available Recently, the Life Story Method has been used in the area of Business Administration as an important methodological strategy in qualitative research. The purpose is to understand groups or collective bodies based on individual paths of life. Thus, the goal of this study was to show the contribution of the life story method in understanding the identity dynamics of female professors managing a public university, by means of an example derived from an empirical study. It was observed from the reports of four female professors involved in management that recovery of past memories, as well as of values, facts, standards and occurrences connected with the primary and organizational socialization of the interviewees, contributes to understanding of their identity dynamics. Some categories of analysis emerged that express relationships between life story and identity, e.g., discontinuity, subjectivity and the importance of allowing an individual/subject to speak; the individual and the social sphere and socio-historical transformations, a dynamic interaction in construction of identities; and temporal analysis in construction of identities.
Compliance Principles for Decision Management Solutions at the Dutch Government
dr. Martijn Zoet; Koen Smit; Dr.ir. Raymond Slot
2016-01-01
From the article: Abstract Since decision management is becoming an integrated part of business process management, more and more decision management implementations are realized. Therefore, organizations search for guidance to design such solutions. Principles are often applied to guide the design
A durable and dependable solution for RTR spent fuel management
International Nuclear Information System (INIS)
Thomasson, J.
1999-01-01
RTR Operators need efficient and cost-effective services for the management of their spent fuel and this, for the full lifetime of their facility. Thanks to the integration of transport, reprocessing and conditioning services, COGEMA provides a cogent solution, with the utmost respect for safety and preservation of the environment, for the short, medium and long terms. As demonstrated in this paper, this option offers the only durable and dependable solution for the RTR spent fuel management, leading to a conditioning for the final residues directly suitable for final disposal. The main advantage of such an option is obviously the significant reduction in terms of volume and radiotoxicity of the ultimate waste when compared to direct disposal of spent fuels. The efficiency of such a solution has been proven, some RTR operators having already trusted COGEMA for the management of their aluminide fuel. With its commitment in R and D activities for the development of a high performance and reprocessable LEU fuels, COGEMA will be able to propose a solution for all types of fuels, HEU and LEU
Oliveira, José Egídio; Mendonça, Marina; Coimbra, Susana; Fontaine, Anne Marie
2014-12-01
In a familistic southern European society such as the Portuguese, the family has historically played a prominent role in supporting the negotiation of transition pathways into adulthood. The present study aimed at capturing (1) the relative weight of parental financial support and autonomy support in contributing to the youngsters' psychological well-being (PWB), and (2) the mediating role of identity capital and uncertainty management in this relationship. A total of 620 participants completed measures of parental support, identity capital, uncertainty management and PWB. Autonomy support was found to be the strongest predictor of PWB, both directly and indirectly through its effects on identity capital and the use of target focused uncertainty management strategies. Conversely, financial support evidenced only a minor indirect impact through the mediation of tangible identity capital. Autonomy stimulation may constitute one of the most developmentally determinant family challenges in assisting the process of coming of age in Portugal. Copyright © 2014 The Foundation for Professionals in Services for Adolescents. Published by Elsevier Ltd. All rights reserved.
McConnell, Elizabeth; Néray, Bálint; Hogan, Bernie; Korpak, Aaron; Clifford, Antonia; Birkett, Michelle
2018-05-26
Lesbian, gay, bisexual, transgender, and queer (LGBTQ) youth and young adults almost inevitably "come out", or self-disclose their identity to others. Some LGBTQ youth are more uniformly "out", while others may disclose to some groups but not others. This selective disclosure is complicated on real name social media sites, which tend to encourage a unified presentation of self across social contexts. We explore these complications with a cohort of LBGTQ youth on Facebook ( N = 199, M age = 24.13). Herein we ask: How do LBGTQ youth manage the disclosure of their sexual orientation and/or gender identity to different people in their lives? Further, are there identifiable differences in the online social network structure for LGBTQ youth who manage outness in different ways? Finally, how do LGBTQ young people describe their experiences on Facebook? We answer these questions using a mixed methods approach, combining statistical cluster analysis, network visualization, and qualitative data. Our findings illustrate patterns in network structure by outness cluster type, highlighting both the work involved in managing one's online identity as well as the costs to (semi-) closeted individuals including a considerably lower overall network connectivity. In particular, outness to family characterized LGBTQ young people's experiences on Facebook.
Academic Manager or Managed Academic? Academic Identity Schisms in Higher Education
Winter, Richard
2009-01-01
The relationship between values and academic identity has received scant attention in the higher education literature with some notable exceptions (Churchman, 2006; Harley, 2002; Henkel, 2005). This paper contends that the perceived need to align all academics around corporate values and goals has given rise to academic identity schisms in higher…
Sensor management for identity fusion on a mobile robot
DEFF Research Database (Denmark)
Larsen, Thomas Dall; Andersen, Nils Axel; Ravn, Ole
1998-01-01
This paper addresses the problem of identity fusion, i.e. the problem of selecting one of several identity hypotheses concerning an observed object. Two problems are considered. Firstly the problem of preserving the information in the representation and fusion of measurements relating to identity...
A User-Centric System for Verified Identities on the Bitcoin Blockchain
Augot, Daniel; Chabanne, Hervé; Chenevier, Thomas; George, William; Lamber, Laurent
2017-01-01
International audience; We present an identity management scheme built into the Bitcoin blockchain, allowing for identities that are as indelible as the blockchain itself. Moreover, we take advantage of Bitcoin's decentralized nature to facilitate a shared control between users and identity providers, allowing users to directly manage their own identities, fluidly coordinating identities from different providers, even as identity providers can revoke identities and impose controls.
Single Thing Sign On Identity Management for Internet of Things
DEFF Research Database (Denmark)
Zdravkova, Vanya; Mihaylov, Mihail Rumenov; Mihovska, Albena Dimitrova
2016-01-01
—Within the context of heterogeneous Internet of Things (IoT) network driven by Machine-to-Machine (M2M) communications there is a need for a proper user identification and Identity Management (IdM) mechanisms which to involve all of the objects in the IoT. The paper addresses user identification...... by proposing Single Thing Sign On (STSO) IdM architecture for IoT, where the end-user is in the middle of a user-centered services ecosystem. The proposed scheme enables user recognition and services access only by identification of one of the “things” related to the user such as personal computing devices...
International Nuclear Information System (INIS)
Luehr, Anneke
2011-08-01
This Thesis describes the implementation of a Change Management solution based on a Product Lifecycle Management System (PLM System) for a large international project. The objective of Change Management is to ensure a systematic line of action for approving and implementing changes in the project. The Deutsches Elektronen-Synchrotron DESY is one of the world's leading accelerator centres with locations in Hamburg and Zeuthen. Currently, DESY participates in the realization of the international research facility European X-Ray Free-Electron Laser (XFEL) at the Hamburg site. DESY was responsible for the planning of the XFEL. When the project entered the construction phase it was internationalized and now comprises project groups in 12 countries. Thus the requirements on Change Management have changed, as participants from several labs at many different locations are now involved. First the project scope is described and then a target process for the Change Management solution is developed by a requirement analysis. Afterwards the technical implementation of this process in DESY's PLM System is described and the Change Management solution is tested. The process is visualized using the Unified Modeling Language (UML). Finally a description is given of how to transfer the solution to the project
Curricular Management of the Internet: Beyond the Blocking Solution.
Lynch, Paul J.
2000-01-01
Focuses on managed Internet use as a curricular challenge and alternate solution to blocking software. Suggests that by making curricular choices for students and directing the medium towards curricular goals, teachers can manage students' time and provide a safe environment where students can communicate and collaborate on projects. (AEF)
Alves, Paulo; Uhomoibhi, James
2010-01-01
Purpose: This paper seeks to investigate and report on the status of identity management systems and e-learning standards across Europe for promoting mobility, collaboration and the sharing of contents and services in higher education institutions. Design/methodology/approach: The present research work examines existing e-learning standards and…
Exploring the identity and "sense of identity" of organisations
Directory of Open Access Journals (Sweden)
C L Van Tonder
2006-04-01
Full Text Available During the past two decades a steady increase in scholarly contributions in the area of organisation identity have been observed – to the point that the phenomenon is now the subject of a sustainable discourse in several disciplines. Many theoretical and conceptual dilemmas however remain, largely as a result of the low incidence of empirical research in the area. This study reports the results of an exploratory investigation that adapted Schley and Wagenfield’s (1979 concept of identity for use in an organisational setting. Interviews were conducted with 152 top managers representing 10 companies. The results indicate that organisational responses to the question “who am I?�? elicit distinctive organisational self-descriptions and some awareness of identity issues.
Directory of Open Access Journals (Sweden)
Elizabeth McConnell
2018-05-01
Full Text Available Lesbian, gay, bisexual, transgender, and queer (LGBTQ youth and young adults almost inevitably “come out”, or self-disclose their identity to others. Some LGBTQ youth are more uniformly “out”, while others may disclose to some groups but not others. This selective disclosure is complicated on real name social media sites, which tend to encourage a unified presentation of self across social contexts. We explore these complications with a cohort of LBGTQ youth on Facebook (N = 199, Mage = 24.13. Herein we ask: How do LBGTQ youth manage the disclosure of their sexual orientation and/or gender identity to different people in their lives? Further, are there identifiable differences in the online social network structure for LGBTQ youth who manage outness in different ways? Finally, how do LGBTQ young people describe their experiences on Facebook? We answer these questions using a mixed methods approach, combining statistical cluster analysis, network visualization, and qualitative data. Our findings illustrate patterns in network structure by outness cluster type, highlighting both the work involved in managing one’s online identity as well as the costs to (semi- closeted individuals including a considerably lower overall network connectivity. In particular, outness to family characterized LGBTQ young people’s experiences on Facebook.
Signcryption-Based Key Management for MANETs Applications in Mobile Commerce
Institute of Scientific and Technical Information of China (English)
LI Jingfeng; ZHU Yuefei; ZHANG Yajuan; PAN Heng
2006-01-01
Mobile commerce uses wireless device and wireless link to result in the transfer of values in exchange of information, services or goods. Wireless mobile ad hoc networks (MANETs) will bring a revolution to the business model of mobile commerce if such networks are used as the underlying network technology for mobile commerce. Mobile commerce will remain in a niche market until the security issue is properly addressed. Hence, security is also very important for MANET applications in mobile commerce. Robust key management is one of the most crucial technologies for security of MANETs. In this paper, a new solution for key management is proposed using identity-based (ID-based) signcryption and threshold secret sharing. It enables flexible and efficient key management while respecting the constraints of MANETs. In our solution, each mobile host uses its globally unique identity as its public key. It greatly decreases the computation and storage costs of mobile hosts, as well as communication cost for system key management.
A complete solution of the Bianchi identities in superspace with supergravity constraints
International Nuclear Information System (INIS)
Grimm, R.; Wess, J.; Zumino, B.
1979-01-01
A short discussion of the superspace formulation of supergravity is given and the Bianchi identities are derived. The supergravity constraints are imposed and the identities are solved in terms of superfields and their covariant derivatives. (Auth.)
Waste management outlook for mountain regions: Sources and solutions.
Semernya, Larisa; Ramola, Aditi; Alfthan, Björn; Giacovelli, Claudia
2017-09-01
Following the release of the global waste management outlook in 2015, the United Nations Environment Programme (UN Environment), through its International Environmental Technology Centre, is elaborating a series of region-specific and thematic waste management outlooks that provide policy recommendations and solutions based on current practices in developing and developed countries. The Waste Management Outlook for Mountain Regions is the first report in this series. Mountain regions present unique challenges to waste management; while remoteness is often associated with costly and difficult transport of waste, the potential impact of waste pollutants is higher owing to the steep terrain and rivers transporting waste downstream. The Outlook shows that waste management in mountain regions is a cross-sectoral issue of global concern that deserves immediate attention. Noting that there is no 'one solution fits all', there is a need for a more landscape-type specific and regional research on waste management, the enhancement of policy and regulatory frameworks, and increased stakeholder engagement and awareness to achieve sustainable waste management in mountain areas. This short communication provides an overview of the key findings of the Outlook and highlights aspects that need further research. These are grouped per source of waste: Mountain communities, tourism, and mining. Issues such as waste crime, plastic pollution, and the linkages between exposure to natural disasters and waste are also presented.
Research Trends and Issues in the Study of Identity of Multi-ethnic Persons
TABA, Ayumi; TAKAI, Jiro
2016-01-01
In this article, concepts of identity are considered and surveyed researches of ego identity and group identity in social identity theory, self-categorization theory. It indicates ethnic identity is related to selfconcept, well-being, academic achievement, mental health, and so on. Furthermore, identity management theory reveals that cross- cultural communication occurs depending on management of cultural identity as group identity and relational identity as personal identity. However, there ...
Decision Exploration Lab : A Visual Analytics Solution for Decision Management
Broeksema, Bertjan; Baudel, Thomas; Telea, Alex; Crisafulli, Paolo
2013-01-01
We present a visual analytics solution designed to address prevalent issues in the area of Operational Decision Management (ODM). In ODM, which has its roots in Artificial Intelligence (Expert Systems) and Management Science, it is increasingly important to align business decisions with business
Survivorship and discourses of identity.
Little, Miles; Paul, Kim; Jordens, Christopher F C; Sayers, Emma-Jane
2002-01-01
Personal identity is self-evidently important to us all. Identity is a philosophically complex subject, but there is some agreement that memory, embodiment and continuity are essential components. The sense of memory includes 'future memory', the kind of memory we would like to construct for ourselves as our lives proceed. While the sense of personal identity is internal to the individual, a sense of that person's identity exists in the minds of others. Extreme experiences threaten the element of continuity, because they may bring bodily changes as well as cognitive changes that challenge central values. Restoring or preserving continuity is a major task for survivors. The ways in which people experience discontinuity because of cancer illness, and the ways in which they manage this experience emerges from the narratives of the survivors of cancer and in the narratives of health care workers who look after them. People manage discontinuity by reference to stable 'anchor points' in their beliefs and values; by re-constructing versions of their pre-experience identities, drawing on past memory and finding ways to preserve a continuity between past memory, present experience and constructions of the future; by using the experience to develop established facets of identity; and by imbuing the experience with meaning and recognising the enlarged identity made possible by survival. Those who cannot achieve a sense of continuity may feel alienated from themselves, their friends and family. All these methods of management may be used by one person to negotiate the post-experience identity in its different social interactions. The experience of the survivor can be further understood by recognising the challenge posed by extreme experience to the sense of continuity of both embodied self and memory. A satisfactory discourse of survival has yet to enter the public domain. This lack adds to the burdens of survivors, including those who have survived cancer. Copyright 2002 John
Identity negotiations in meetings
DEFF Research Database (Denmark)
Asmuß, Birte; Oshima, Sae
of the company, and all members know (and display) that he holds some information that the rest don’t have access to. Our analysis shows that the participants evoke various identities of the manager, sometimes orienting to the structure of the organization, and other times orienting to wider social categories......Meetings are places, where identity negotiation is a central activity and where members’ local practices recurrently inform and are informed by larger categories (Antaki and Widdicombe 1998). Correspondingly, the approach to understanding organization (macro) by way of identity work (micro) has...... company, and in the data recorded over 10 days, the employees frequently complain about the many changes that have taken place. Our focus lies in a unique occasion where one of the managers makes an unusual appearance at the lunchroom. In this situation, he is the only one that is on the business side...
Crocetti, E.; Cieciuch, J.; Gao, C.-H.; Klimstra, T.A.; Lin, C.-L.; Mena de Matos, P.; Morsünbül, U.; Negru, O.; Sugimura, K.; Zimmermann, G.; Meeus, W.H.J.
2015-01-01
The purpose of this study was to examine the psychometric properties of the Utrecht-Management of Identity Commitments Scale (U-MICS), a self-report measure aimed at assessing identity processes of commitment, in-depth exploration, and reconsideration of commitment. We tested its factor structure in
Crocetti, Elisabetta; Cieciuch, Jan; Gao, Cheng Hai; Klimstra, Theo; Lin, Ching Ling; Matos, Paula Mena; Morsünbül, Ümit; Negru, Oana; Sugimura, Kazumi; Zimmermann, Grégoire; Meeus, Wim
2015-01-01
The purpose of this study was to examine the psychometric properties of the Utrecht-Management of Identity Commitments Scale (U-MICS), a self-report measure aimed at assessing identity processes of commitment, in-depth exploration, and reconsideration of commitment. We tested its factor structure in
International Nuclear Information System (INIS)
Warnaar, S.O.
1996-01-01
We compute the one-dimensional configuration sums of the AFB model using the fermionic techniques introduced in part I of this paper. Combined with the results of Andrews, Baxter, and Forrester, we prove polynominal identities for finitizations of the Virasoro characters χb, a (r-1, r) (q) as conjectured by Melzer. In the thermodynamic limit these identities reproduce Rogers-Ramanujan-type identities for the unitary minimal Virasoro characters conjectured by the Stony Brook group. We also present a list of additional Virasoro character identities which follow from our proof of Melzer's identities and application of Bailey's lemma
Efficiency potential of management and technical solutions for a construction object
Directory of Open Access Journals (Sweden)
Lapidus Azariy Abramovich
2014-01-01
Full Text Available The authors investigate the models of efficiency potential of management and technical solutions for a construction object, which allows accounting for the influence of management-technological and administrative solutions in the process of implementing construction project. The solutions are represented by various factors – solitary integral potentials. The factors, which should be taken into account in the process of developing an integral model, are: development of general contracting structure, project decisions, management decisions, administrative decisions and ecological impact. In is necessary to develop the model, which will integrally put together the above mentioned factors of a construction project, observe and investigate other factors, create a model and get the opportunity not only to predict the endpoint of the future construction object on the stage of formulating technological requirements, but also to monitor the changes of this prognosis in time. The parameters of the integral potential will allow the system to obtain flexibility, which makes it possible to adjust to the changes usually taking place on a construction object and at the same time to aim for optimization of organizational, technological and administrative solutions in the process of reaching endpoint of construction.
E-Learning Barriers and Solutions to Knowledge Management and Transfer
Oye, Nathaniel David; Salleh, Mazleena
2013-01-01
This paper present a systematic overview of barriers and solutions of e-learning in knowledge management (KM) and knowledge transfer (KT) with more focus on organizations. The paper also discusses KT in organizational settings and KT in the field of e-learning. Here, an e-learning initiative shows adaptive solutions to overcome knowledge transfer…
Self, William T.; Mitchell, Gregory; Mellers, Barbara A.; Tetlock, Philip E.; Hildreth, J. Angus D.
2015-01-01
This study compared two forms of accountability that can be used to promote diversity and fairness in personnel selections: identity-conscious accountability (holding decision makers accountable for which groups are selected) versus identity-blind accountability (holding decision makers accountable for making fair selections). In a simulated application screening process, undergraduate participants (majority female) sorted applicants under conditions of identity-conscious accountability, identity-blind accountability, or no accountability for an applicant pool in which white males either did or did not have a human capital advantage. Under identity-conscious accountability, participants exhibited pro-female and pro-minority bias, particularly in the white-male-advantage applicant pool. Under identity-blind accountability, participants exhibited no biases and candidate qualifications dominated interview recommendations. Participants exhibited greater resentment toward management under identity-conscious accountability. PMID:26660723
Online Identities and Social Networking
Maheswaran, Muthucumaru; Ali, Bader; Ozguven, Hatice; Lord, Julien
Online identities play a critical role in the social web that is taking shape on the Internet. Despite many technical proposals for creating and managing online identities, none has received widespread acceptance. Design and implementation of online identities that are socially acceptable on the Internet remains an open problem. This chapter discusses the interplay between online identities and social networking. Online social networks (OSNs) are growing at a rapid pace and has millions of members in them. While the recent trend is to create explicit OSNs such as Facebook and MySpace, we also have implicit OSNs such as interaction graphs created by email and instant messaging services. Explicit OSNs allow users to create profiles and use them to project their identities on the web. There are many interesting identity related issues in the context of social networking including how OSNs help and hinder the definition of online identities.
Solute Response To Arid-Climate Managed-River Flow During Storm Events
McLean, B.; Shock, E.
2006-12-01
Storm pulses are widely used in unmanaged, temperate and subtropical river systems to resolve in-stream surface and subsurface flow components. Resulting catchment-scale hydrochemical mixing models yield insight into mechanisms of solute transport. Managed systems are far more complicated due to the human need for high quality water resources, which drives processes that are superimposed on most, if not all, of the unmanaged components. As an example, an increasingly large portion of the water supply for the Phoenix metropolitan area is derived from multiple surface water sources that are impounded, diverted and otherwise managed upstream from the urban core that consumes the water and produces anthropogenic impacts. During large storm events this managed system is perturbed towards natural behavior as it receives inputs from natural hydrologic pathways in addition to impervious surfaces and storm water drainage channels. Our goals in studying managed river systems during this critical transition state are to determine how the well- characterized behavior of natural systems break down as the system responds then returns to its managed state. Using storm events as perturbations we can contrast an arid managed system with the unmanaged system it approaches during the storm event. In the process, we can extract geochemical consequences specifically related to unknown urban components in the form of chemical fingerprints. The effects of river management on solute behavior were assessed by taking advantage of several anomalously heavy winter storm events in late 2004 and early 2005 using a rigorous sampling routine. Several hundred samples collected between January and October 2005 were analyzed for major ion, isotopic, and trace metal concentrations with 78 individual measurements for each sample. The data are used to resolve managed watershed processes, mechanisms of solute transport and river mixing from anthropogenic inputs. Our results show that concentrations of
Massive-scale data management using standards-based solutions
Shiers, J
1999-01-01
In common with many large institutes, CERN has traditionally developed and maintained its own data management solutions. Recently, a significant change of direction has taken place and we have now adopted commercial tools, together with a small amount of site- specific code, for this task. The solutions chosen were originally studied as part of research and development projects oriented towards the Large Hadron Collider (LHC), which is currently under construction at CERN. They have since been adopted not only by the LHC collaborations, which are due to take production data starting in 2005, but also by numerous current experiments, both at CERN and at other High Energy Physics laboratories. Previous experiments, that used data management tools developed in-house, are also studying a possible move to the new environment. To meet the needs of today's experiments, data rates of up to 35 MB/second and data volumes of many hundred TB per experiment must be supported. Data distribution to multiple sites must be pr...
Selection of Technical Solutions for the Management of Radioactive Waste
International Nuclear Information System (INIS)
2017-07-01
The objectives of this publication are to identify and critically review the criteria to be considered while selecting waste management technologies; summarize, evaluate, rank and compare the different technical solutions; and offer a systematic approach for selecting the best matching solution. This publication covers the management of radioactive waste from all nuclear operations, including waste generated from research reactors, power reactors, and nuclear fuel cycle activities including high level waste (HLW) arising from reprocessing and spent nuclear fuel declared as waste (SFW), as well as low level waste (LLW) and intermediate level waste (ILW) arising from the production and use of radionuclides in industry, agriculture, medicine, education and research.
International Nuclear Information System (INIS)
Ormancey, E
2008-01-01
The need for Single Sign On has always been restricted by the absence of cross platform solutions: a single sign on working only on one platform or technology is nearly useless. The recent improvements in Web Services Federation (WS-Federation) standard enabling federation of identity, attribute, authentication and authorization information can now provide real extended Single Sign On solutions. Various solutions have been investigated at CERN and now, a Web SSO solution using some parts of WS-Federation technology is available. Using the Shibboleth Service Provider module for Apache hosted web sites and Microsoft ADFS as the identity provider linked to Active Directory user, users can now authenticate on any web application using a single authentication platform, providing identity, user information (building, phone...) as well as group membership enabling authorization possibilities. A typical scenario: a CERN user can now authenticate on a Linux/Apache website using Windows Integrated credentials, and his Active Directory group membership can be checked before allowing access to a specific web page
RFID-based Electronic Identity Security Cloud Platform in Cyberspace
Bing Chen; Chengxiang Tan; Bo Jin; Xiang Zou; Yuebo Dai
2012-01-01
With the moving development of networks, especially Internet of Things, electronic identity administration in cyberspace is becoming more and more important. And personal identity management in cyberspace associated with individuals in reality has been one significant and urgent task for the further development of information construction in China. So this paper presents a RFID-based electronic identity security cloud platform in cyberspace to implement an efficient security management of cyb...
Analysis of Current Supplier Relationship Management Practices: A Solution Proposal
Gomes Campelo Filho, Eulalio
2009-01-01
The work contributes with the existing literature by investigating current SRM practices. Based on the research, the author has designed an information system framework, which provides companies with an innovative SRM solution to manage their indirect material purchasing process through an environment that supports companies entire plan-to-order activities, including functionalities such as central data management, spend data management, e-sourcing and the usual e-procurement features.
GE Hitachi's parts asset management solutions (PAMS)
International Nuclear Information System (INIS)
Varno, M.; Lancaster, K.; Detamore, B.; Dinh, H.; Danielsson, J.; Vitaback, F.
2014-01-01
To ensure operational excellence and improve plant reliability, GE Hitachi Nuclear Energy (GEH) has partnered with its customers to develop PARTS Asset Management Solutions (PAMS). PAMS is a comprehensive set of services that enable plants to proactively manage inventory, obtain after-market replacement parts quickly, and resolve obsolescence issues, ensuring operation of equipment is maintained. PAMS includes: - Electronics Exchange Service Program (EESP) - On-demand exchange service program for GE electronics parts that guarantees rapid shipment of parts, results in cost savings and eliminates all obsolescence risk. - Engineering Services (ES) - Service that finds replacement electronics parts for customers encountering obsolescence. - System Assessment Report (SAR) - Comprehensive, customised report for customer systems that provides all information needed to minimise part availability risk. - Inventory Management (IM) - Visual application based on OEM drawings and decades of industry operational experience that enables customers to proactively identify obsolescence and inventory management issues. - Material Solutions (MS) - Fixed price and lead time model that allows the customer to set-up blanket contracts or purchase orders for obtaining needed parts with a focus on reduced overall cycle time. This paper will provide an overview of PAMS and showcase a case study of the PAMS Digitized deployment for an existing GEH customer. (authors)
Solution of the gauge identities in the axial gauge
International Nuclear Information System (INIS)
Delbourgo, R.
1981-01-01
Starting from the spectral representation of the two-point functions in the axial gauge, the gauge identities are solved so as to express the higher-point Green functions linearly in terms of the two-point spectral function. The four-point functions are an important input for investigations of scalar electrodynamics and vector chromodynamics based on the gauge technique. (author)
Export channel pricing management for integrated solutions
Roine, Henna; Sainio, Liisa-Maija; Saarenketo, Sami
2012-01-01
This article studies systems integrators' export channel pricing management for integrated solutions. We find support from our empirical case study for the notion that a systems integrator's export channel pricing strategy is multidimensional and dependent on international pricing environment and partner characteristics and that export partnerships have unique implications on a systems integrator's pricing process. The results show that giving up pricing control in export channel context may ...
Radioactive waste management turning options into solution
International Nuclear Information System (INIS)
Neubauer, J.
2000-10-01
Most of the statements from representatives of different countries and institutions focused on the status of high level radioactive waste management, including spent fuel repositories. Speakers dealing with such topics were representatives from countries applying nuclear power for electricity production. They all reported about there national programs on technical and safety aspects of radioactive waste management. The panel discussion extended to questions on political sensitivities and public acceptance; in this respect, interesting developments are taking place in Finland and Sweden. It is expected that Finland will operate a final repository for spent fuel in 10 - 15 years from now, followed close by Sweden. Other countries, however, face decisions by policy makers and elected officials to postpone dealing with waste disposal concerns. In this connection there is relevant experience in our country, too - even in the absence of spent fuel or other high level waste to be dealt with. During personal discussions with representatives of other countries not using nuclear power it was confirmed that there are similar or shared experiences. Development of publicly -accepted solutions to radioactive waste management remains an important issue. Independent of the amount or the activity of radioactive waste, the public at large remains skeptical despite the agreement among experts that disposal can be safe, technically feasible and environmentally sound. In countries not using nuclear power there are only small quantities of low and intermediate level radioactive waste. Therefore, international co-operation among such countries should be an option. There was common understanding by representatives from Norway, Italy and Austria that international co-operation should be developed for treatment and disposal of such waste. For the moment however it has to be accepted that, for political reasons, it is not possible. Forced to deal with the lack of near-term solutions, the
Identity In and Around Organisations
DEFF Research Database (Denmark)
Schultz, Majken; Maguire, Steve
2013-01-01
concept may not be the best way of approaching and managing your organisation. Rather, Majken Schultz and Steve Maguire argue that organisations would benefit from adopting a process-based view of identity, which integrates history, ongoing change and market instability into its definition.......At the heart of any successful organisation lies a powerful conception of identity: the coherent way in which it presents itself to its stakeholders and employees, containing its purpose, goals and key characteristics. However, the traditional idea of identity as a stable, solid and reliable...
Social and psychological creativity in gay male midlife identity management.
Hajek, Christopher
2016-06-01
This study utilizes a qualitative thematic analysis methodology and a social identity theory framework to explore ways in which early midlife gay men report enhancing their social identities through social and psychological creativity. Face-to-face, semi-structured interviews were conducted with forty early midlife gay men (aged 40-53) in four US cities. Men discussed the collective and individual essences of their age and gay identities, including attitudes, beliefs, and behaviours that they embraced to self-enhance at midlife. These discussions emphasized differences from the younger gay outgroup, often in the context of intergenerational interaction. Identified were three strategies (and seven substrategies) that summarized the ways that interviewees constructed their identities in the interest of self-enhancement, specifically in the context of intergenerational comparisons with younger gay men. These strategies may be considered as extensions to social creativity strategies presented in Tajfel and Turner's (Psychology of intergroup relations. Chicago, IL: Nelson, 1986: 7) social identity theory. © 2015 The British Psychological Society.
The waste management at research laboratories - problems and solutions
International Nuclear Information System (INIS)
Dellamano, Jose Claudio; Vicente, Roberto
2011-01-01
The radioactive management in radioactive installations must be planned and controlled. However, in the case of research laboratories, that management is compromised due to the common use of materials and installations, the lack of trained personnel and the nonexistence of clear and objective orientations by the regulator organism. Such failures cause an increasing of generated radioactive wastes and the imprecision or nonexistence of record of radioactive substances, occasioning a financial wastage, and the cancelling of licences for use of radioactive substances. This paper discusses and proposes solutions for the problems found at radioactive waste management in research laboratories
Identity Management ToolKit (IdM TK)
Department of Veterans Affairs — With the IdM TK, authorized users can search and view identity and exception information from the Administrative Data Repository (ADR). Specifically, users can view...
Identity Politics, Institutional Multiculturalism, and the Global Artworld
DEFF Research Database (Denmark)
Petersen, Anne Ring
2012-01-01
that the critical discourse on identity politics has not been able to come up with solutions, either. In fact, it is marred by the same binary thinking and mechanisms of exclusion that it aims to deconstruct. To get beyond the deadlock of the critical discourse on identity politics, the article suggests......Questions of cultural identity and the status of non-Western artists in the West have been important to the discourses on contemporary art for at least two decades. This article considers the connections between the critical discourse on cultural identity, the globalisation of the art world...
2017-06-30
ER D C/ EL S R- 17 -3 Levee Setbacks: An Innovative , Cost-Effective, and Sustainable Solution for Improved Flood Risk Management En vi...EL SR-17-3 June 2017 Levee Setbacks: An Innovative , Cost-Effective, and Sustainable Solution for Improved Flood Risk Management David L. Smith...alternative view point is necessary. ERDC/EL SR-17-3 4 Levee setbacks are a relatively recent innovation in Corps flood risk management practice
A Spatio-Temporal Building Exposure Database and Information Life-Cycle Management Solution
Directory of Open Access Journals (Sweden)
Marc Wieland
2017-04-01
Full Text Available With an ever-increasing volume and complexity of data collected from a variety of sources, the efficient management of geospatial information becomes a key topic in disaster risk management. For example, the representation of assets exposed to natural disasters is subjected to changes throughout the different phases of risk management reaching from pre-disaster mitigation to the response after an event and the long-term recovery of affected assets. Spatio-temporal changes need to be integrated into a sound conceptual and technological framework able to deal with data coming from different sources, at varying scales, and changing in space and time. Especially managing the information life-cycle, the integration of heterogeneous information and the distributed versioning and release of geospatial information are important topics that need to become essential parts of modern exposure modelling solutions. The main purpose of this study is to provide a conceptual and technological framework to tackle the requirements implied by disaster risk management for describing exposed assets in space and time. An information life-cycle management solution is proposed, based on a relational spatio-temporal database model coupled with Git and GeoGig repositories for distributed versioning. Two application scenarios focusing on the modelling of residential building stocks are presented to show the capabilities of the implemented solution. A prototype database model is shared on GitHub along with the necessary scenario data.
Nehrke, G.
2007-01-01
The morphology of vaterite precipitated by bubbling CO2 through a CaCl2 solution is framboidal aggregates. It is not possible, even when using the identical experimental setup and conditions, to reproduce aggregates having identical morphology. The density of the aggregates and crystallite size can
An Intensional Solution to the Bike Puzzle of Intentional Identity
Czech Academy of Sciences Publication Activity Database
Jespersen, Bjorn
2011-01-01
Roč. 39, č. 2 (2011), s. 297-307 ISSN 0048-3893 Institutional research plan: CEZ:AV0Z90090514 Keywords : intentional identity * intensional logic * notional attitude Subject RIV: AA - Philosophy ; Religion http://www.springerlink.com/content/0048-3893/39/2/
Energy Technology Data Exchange (ETDEWEB)
Cowles, Robert; Jackson, Craig; Welch, Von
2016-08-31
The eXtreme Science Identity Management (XSIM1) research project: collected and analyzed real world data on virtual organization (VO) identity management (IdM) representing the last 15+ years of collaborative DOE science; constructed a descriptive VO IdM model based on that data; used the model and existing trends to project the direction for IdM in the 2020 timeframe; and provided guidance to scientific collaborations and resource providers that are implementing or seeking to improve IdM functionality. XSIM conducted over 20 semistructured interviews of representatives from scientific collaborations and resource providers, both in the US and Europe; the interviewees supported diverse set of scientific collaborations and disciplines. We developed a definition of “trust,” a key concept in IdM, to understand how varying trust models affect where IdM functions are performed. The model identifies how key IdM data elements are utilized in collaborative scientific workflows, and it has the flexibility to describe past, present and future trust relationships and IdM implementations. During the funding period, we gave more than two dozen presentations to socialize our work, encourage feedback, and improve the model; we also published four refereed papers. Additionally, we developed, presented, and received favorable feedback on three white papers providing practical advice to collaborations and/or resource providers.
dCache, towards Federated Identities & Anonymized Delegation
Ashish, A.; Millar, AP; Mkrtchyan, T.; Fuhrmann, P.; Behrmann, G.; Sahakyan, M.; Adeyemi, O. S.; Starek, J.; Litvintsev, D.; Rossi, A.
2017-10-01
For over a decade, dCache has relied on the authentication and authorization infrastructure (AAI) offered by VOMS, Kerberos, Xrootd etc. Although the established infrastructure has worked well and provided sufficient security, the implementation of procedures and the underlying software is often seen as a burden, especially by smaller communities trying to adopt existing HEP software stacks [1]. Moreover, scientists are increasingly dependent on service portals for data access [2]. In this paper, we describe how federated identity management systems can facilitate the transition from traditional AAI infrastructure to novel solutions like OpenID Connect. We investigate the advantages offered by OpenID Connect in regards to ‘delegation of authentication’ and ‘credential delegation for offline access’. Additionally, we demonstrate how macaroons can provide a more fine-granular authorization mechanism that supports anonymized delegation.
Data Security in Smart Cities: Challenges and Solutions
Directory of Open Access Journals (Sweden)
Daniela POPESCUL
2016-01-01
Full Text Available The purpose of this paper is to provide an extensive overview of security-related problems in the context of smart cities, seen as huge data consumers and producers. Trends as hyper connectivity, messy complexity, loss of boundary and industrialized hacking transform smart cities in complex environments in which the already-existing security analysis are not useful anymore. Specific data-security requirements and solutions are approached in a four-layer framework, with elements considered to be critical to the operation of a smart city: smart things, smart spaces, smart systems and smart citizens. As urban management should pay close attention to security and privacy protection, network protocols, identity management, standardization, trusted architecture etc., the paper will serve them as a start point for better decisions in security design and management.
"Managing by Not Managing": How Gay Engineering Students Manage Sexual Orientation Identity
Hughes, Bryce E.
2017-01-01
From a social constructivist paradigm I explored the experiences of 7 openly gay engineering students to understand how, if at all, they made sense of the intersections between their engineering and sexual orientation identities. By eliciting stories through individual and focus group interviews, a narrative approach allowed me to capture the…
Industrial open source solutions for product life cycle management
Directory of Open Access Journals (Sweden)
Jaime Campos
2014-12-01
Full Text Available The authors go through the open source for product life cycle management (PLM and the efforts done from communities such as the open source initiative. The characteristics of the open source solutions are highlighted as well. Next, the authors go through the requirements for PLM. This is an area where more attention has been given as the manufacturers are competing with the quality and life cycle costs of their products. Especially, the need of companies to try to get a strong position in providing services for their products and thus to make themselves less vulnerable to changes in the market has led to high interest in product life cycle simulation. The potential of applying semantic data management to solve these problems discussed in the light of recent developments. In addition, a basic roadmap is presented as to how the above-described problems could be tackled with open software solutions.
Commutator identities on associative algebras and integrability of nonlinear pde's
Pogrebkov, A. K.
2007-01-01
It is shown that commutator identities on associative algebras generate solutions of linearized integrable equations. Next, a special kind of the dressing procedure is suggested that in a special class of integral operators enables to associate to such commutator identity both nonlinear equation and its Lax pair. Thus problem of construction of new integrable pde's reduces to construction of commutator identities on associative algebras.
ISLAM AND MINORITIES: Managing Identity in Malaysia
Directory of Open Access Journals (Sweden)
Ahmad Suaedy
2010-02-01
Full Text Available The Malaysian general election in March 2008 raised an interesting and new phenomenon. For the first time since independence in 1957, the ruling alliance known as the National Front (Barisan Nasional, BN failed to secure two thirds of seats in parliament and lost control of five of Malaysia’s 13 states. This was due to the challenge presented by the new opposition alliance known as the Alternative Front (Barisan Alternatif, BA or the People’s Alliance (Pakatan Rakyat, PK which won more than 36% of seats in parliament and gained control of the five states. In the 2004 election, BN secured the largest ever percentage of seats in parliament with 91%. What is interesting is that it seems that this significant increase in support for the opposition is due to their offer to change the way minorities and ethnicity is managed. They propose a move from “Bumiputera Supremacy”, or affirmative action for the approximately 65% of “Bumiputera” Malaysians (the rest being largely of Chinese or Indian ethnicity, to “The People’s Supremacy”, which involves eradicating affirmative action based on ethnicity, basing it instead on need, for instance need due to poverty. This would potentially increase the likelihood of justice and equality for all ethnic or racial groups. This paper connects the phenomenon of change, as seen in the about turn in the results between the 2004 and 2008 elections, to the more global trend in which minorities are standing up to demand their rights in this era of globalization, and to the challenge multiculturalism presents to parts of the Muslim world such as Malaysia. Malaysia, a Muslim majority nation that has formally declared Islam the official state religion with Yang di-Pertuan Agong (the King as Head of the State and symbol of Islam, is one example, though not necessarily representative, of how Islam and Muslims manage minorities and identity or multiculturalism within the process of globalization
Close pairs of relative equilibria for identical point vortices
DEFF Research Database (Denmark)
Dirksen, Tobias; Aref, Hassan
2011-01-01
Numerical solution of the classical problem of relative equilibria for identical point vortices on the unbounded plane reveals configurations that are very close to the analytically known, centered, symmetrically arranged, nested equilateral triangles. New numerical solutions of this kind are fou...
Una Hakika: Scaling Digital Solutions for Conflict Management in ...
International Development Research Centre (IDRC) Digital Library (Canada)
Una Hakika: Scaling Digital Solutions for Conflict Management in Kenya and Burma ... local government officials, and funders involved in peacebuilding, security, and ... its 2017 call for proposals to establish Cyber Policy Centres in the Global South. ... partnering on a new initiative, aimed at reducing the emerging risk that.
DEFF Research Database (Denmark)
Jensen, Kim Ebensgaard
-specialized language in which it also serves a number of functions – some of which are quite fundamental to society as such. In other words, the lexeme identity is a polysemic word and has multiple, well, identities. Given that it appears to have a number of functions in a variety of registers, including terminologies...... in Academic English and more everyday-based English, identity as a lexeme is definitely worth having a look at. This paper presents a lexicological study of identity in which some of its senses are identified and their behaviors in actual discourse are observed. Drawing on data from the 2011 section...... of the Corpus of Contemporary American English, a behavioral profile of the distributional characteristics of identity is set up. Behavioral profiling is a lexicographical method developed by the corpus linguist Stefan Th. Gries which, by applying semantic ID tagging and statistical analysis, provides a fine...
Patients' Data Management System Protected by Identity-Based Authentication and Key Exchange.
Rivero-García, Alexandra; Santos-González, Iván; Hernández-Goya, Candelaria; Caballero-Gil, Pino; Yung, Moti
2017-03-31
A secure and distributed framework for the management of patients' information in emergency and hospitalization services is proposed here in order to seek improvements in efficiency and security in this important area. In particular, confidentiality protection, mutual authentication, and automatic identification of patients are provided. The proposed system is based on two types of devices: Near Field Communication (NFC) wristbands assigned to patients, and mobile devices assigned to medical staff. Two other main elements of the system are an intermediate server to manage the involved data, and a second server with a private key generator to define the information required to protect communications. An identity-based authentication and key exchange scheme is essential to provide confidential communication and mutual authentication between the medical staff and the private key generator through an intermediate server. The identification of patients is carried out through a keyed-hash message authentication code. Thanks to the combination of the aforementioned tools, a secure alternative mobile health (mHealth) scheme for managing patients' data is defined for emergency and hospitalization services. Different parts of the proposed system have been implemented, including mobile application, intermediate server, private key generator and communication channels. Apart from that, several simulations have been performed, and, compared with the current system, significant improvements in efficiency have been observed.
The Financial Supply Chain Management: a New Solution for Supply Chain Resilience
Directory of Open Access Journals (Sweden)
Virgil Popa
2013-02-01
Full Text Available In the present article, the author aims to find solutions to optimize the supply chain for the cash flow – a flow of products reversed from the physical one and the two-ways flow of information. In the last 15-20 years, academics and practitioners were oriented towards increasing the speed, cost reduction on supply chain material’s flow, oriented towards 3RP (3 Resource Planning logistics solutions and management solutions such as outsourcing or collaborative management. In terms of information flow, there has been a real revolution with the rise of the Internet and information technology standards introduced by the VICS (Voluntary Interindustry Commerce Standards, CSCMP (Council of Supply Chain Management Professionals, SCC (Supply Chain Council şi ECR Europe (Efficient Consumer Respons. The objective of this paper is to identify new ways of working together on supply chain financial flows. Methods used are the documentation in the literature and the practices of transnational companies under recession. Results refer to the identification of new solutions such as reverse factoring. A comparative analysis regarding the european and national regulations gets us to the conclusion that Romania is still tributary to traditional commercial credit. We propose that the Collaborative management, as a modus vivendi in a globalized and super computerized world, must be included within all Romanian organizations life, within the Supply Chain, but also those which are 3PL (Third Part Logistics and 4PL (Four Part Logistics organizations, where not only information services are included, but also financial services (banks and specialized financial institutions.
Identity Formation in Career Development for Gifted Women.
Phelps, Christine E.
1991-01-01
Necessary developmental tasks concerned with identity development of gifted college women include developing competence, managing emotions, developing autonomy, establishing identity, freeing interpersonal relationships, developing purpose, and developing integrity. These issues may be used as counseling interventions to raise career aspirations.…
Integrating Records Management (RM) and Information Technology (IT)
Energy Technology Data Exchange (ETDEWEB)
NUSBAUM,ANNA W.; CUSIMANO,LINDA J.
2000-03-02
Records Managers are continually exploring ways to integrate their services with those offered by Information Technology-related professions to capitalize on the advantages of providing customers a total solution to managing their records and information. In this day and age, where technology abounds, there often exists a fear on the part of records management that this integration will result in a loss of identity and the focus of one's own mission - a fear that records management may become subordinated to the fast-paced technology fields. They need to remember there is strength in numbers and it benefits RM, IT, and the customer when they can bring together the unique offerings each possess to reach synergy for the benefit of all the corporations. Records Managers, need to continually strive to move ''outside the records management box'', network, expand their knowledge, and influence the IT disciplines to incorporate the concept of ''management'' into their customer solutions.
Hard Identity and Soft Identity
Directory of Open Access Journals (Sweden)
Hassan Rachik
2006-04-01
Full Text Available Often collective identities are classified depending on their contents and rarely depending on their forms. Differentiation between soft identity and hard identity is applied to diverse collective identities: religious, political, national, tribal ones, etc. This classification is made following the principal dimensions of collective identities: type of classification (univocal and exclusive or relative and contextual, the absence or presence of conflictsof loyalty, selective or totalitarian, objective or subjective conception, among others. The different characteristics analysed contribute to outlining an increasingly frequent type of identity: the authoritarian identity.
Brooks, Siobhan
2016-12-01
The concept Don't Ask, Don't Tell regarding Black LGBT sexuality in Black communities has been an acceptable form of identity management for Black LGBT people. In other words, Black LGBT people are accepted as long as they are not vocal about their sexuality. However, this is changing with the issue of gay marriage, which is creating a space where Black LGBT people are more open about their gender identity and sexuality in heterosexual Black spaces. This new form of openness allows Black LGBT people to "stay in" their communities, as opposed to coming out. In this article I examine how Black LGBT women in North Philadelphia stay in their communities: being politically active regarding LGBT issues, disengaging from LGBT issues, passing, and educating straight Black people about issues affecting the Black LGBT community. I conclude with implications of staying in and intersectionality among Black heterosexual and LGBT women fighting for social change.
Identity Management and Mental Health Discourse in Social Media.
Pavalanathan, Umashanthi; De Choudhury, Munmun
2015-05-01
Social media is increasingly being adopted in health discourse. We examine the role played by identity in supporting discourse on socially stigmatized conditions. Specifically, we focus on mental health communities on reddit. We investigate the characteristics of mental health discourse manifested through reddit's characteristic 'throwaway' accounts, which are used as proxies of anonymity. For the purpose, we propose affective, cognitive, social, and linguistic style measures, drawing from literature in psychology. We observe that mental health discourse from throwaways is considerably disinhibiting and exhibits increased negativity, cognitive bias and self-attentional focus, and lowered self-esteem. Throwaways also seem to be six times more prevalent as an identity choice on mental health forums, compared to other reddit communities. We discuss the implications of our work in guiding mental health interventions, and in the design of online communities that can better cater to the needs of vulnerable populations. We conclude with thoughts on the role of identity manifestation on social media in behavioral therapy.
Efficient Key Management System for Large-scale Smart RFID Applications
Directory of Open Access Journals (Sweden)
Mohammad Fal Sadikin
2015-08-01
Full Text Available Due to low-cost and its practical solution, the integration of RFID tag to the sensor node called smart RFID has become prominent solution in various fields including industrial applications. Nevertheless, the constrained nature of smart RFID system introduces tremendous security and privacy problem. One of them is the problem in key management system. Indeed, it is not feasible to recall all RFID tags in order to update their security properties (e.g. update their private keys. On the other hand, using common key management solution like standard TLS/SSL is too heavy-weight that can drain and overload the limited resources. Furthermore, most of existing solutions are highly susceptible to various threats reaching from privacy threats, physical attacks to various technics of Man-in-the-Middle attacks. This paper introduces novel key management system, tailored to the limited resources of smart RFID system. It proposes light-weight mutual authentication and identity protection to mitigate the existing threats.
Understanding family dynasty: Nurturing the corporate identity across generations
Directory of Open Access Journals (Sweden)
Nemilentsev, M.
2010-01-01
Full Text Available This study aims to analyse the Ahlstrom annual reports. The content analysis contributes to family business corporate identity. According to the results family business corporate identity is based both on history and on the future. Human resource management, customer relationships, high quality, and also family ownership reflect corporate identity in large family corporations. Modern family business corporate identity is based on continuously developing the business concept and its core competency. Meeting the needs of customers and technical quality standards combined with upgrading and developing the business idea characterises family business corporate identity.
Narrating Organisational Identities by Way of Evolutionary Tales
DEFF Research Database (Denmark)
Backer, Lise
2008-01-01
The article draws on publicly available data to analyse how, since the Rio Environmental Summit in 1992, the narration of the multinational oil company Shell have projected an evolution from an oil company identity to an identity also embracing renewable energies. In analysing the narrative battles...... over Shell's organisational identity the article contributes to the field of organisational identity theory. It does so by providing a rich description of the micro processes through which individual management actors seek by telling different evolutionary tales to get the larger corporate actor...
A qualitative investigation of masculine identity after traumatic brain injury.
MacQueen, Ruth; Fisher, Paul; Williams, Deirdre
2018-04-30
Men are twice as likely as women to experience a traumatic brain injury (TBI), suggesting that aspects of masculine identity contribute to how people acquire their brain injuries. Research also suggests that masculine identity impacts on how people manage their health experiences. The current study aimed to explore the experience of masculine identity following TBI. Individual interviews were conducted with 10 men aged 21-67 years who had experienced a TBI. All were living in the community. Interpretative phenomenological analysis was used to consider lived experiences and to explore the meaning of the TBI experience in relation to masculine identity. Three superordinate themes emerged from the analysis: doing life and relationships differently, self-perceptions and the perceived view of others, and managing the impact of TBI as a man. These themes are considered in relation to how participants' experiences interacted with dominant social ideals of masculine identity. The findings highlighted how masculine identity may be a valuable aspect of self in considering threats to and reconstruction of self-identity after TBI. Aspects of gender identity should be considered in order to promote engagement, support adjustment and achieve meaningful outcomes in rehabilitation.
Agent Based Knowledge Management Solution using Ontology, Semantic Web Services and GIS
Directory of Open Access Journals (Sweden)
Andreea DIOSTEANU
2009-01-01
Full Text Available The purpose of our research is to develop an agent based knowledge management application framework using a specific type of ontology that is able to facilitate semantic web service search and automatic composition. This solution can later on be used to develop complex solutions for location based services, supply chain management, etc. This application for modeling knowledge highlights the importance of agent interaction that leads to efficient enterprise interoperability. Furthermore, it proposes an "agent communication language" ontology that extends the OWL Lite standard approach and makes it more flexible in retrieving proper data for identifying the agents that can best communicate and negotiate.
Engineering solutions to the management of solid radioactive waste
International Nuclear Information System (INIS)
1991-01-01
The management of radioactive waste, its safe handling and ultimate disposal, is of vital concern to engineers in the nuclear industry. The international conference 'Engineering Solutions to the Management of Solid Radioactive Waste', organized by the Institution of Mechanical Engineers and held in Manchester in November 1991, provided a forum for the discussion and comparison of the different methods of waste management used in Europe and America. Papers presented and discussed included: the interaction between the design of containers for low level radioactive waste and the design of a deep repository, commercial low level waste disposal sites in the United States, and the development of radioactive waste monitoring systems at the Sellafield reprocessing complex. This volume is a collection of 22 papers presented at the conference. All are indexed separately. (author)
Patients’ Data Management System Protected by Identity-Based Authentication and Key Exchange
Directory of Open Access Journals (Sweden)
Alexandra Rivero-García
2017-03-01
Full Text Available A secure and distributed framework for the management of patients’ information in emergency and hospitalization services is proposed here in order to seek improvements in efficiency and security in this important area. In particular, confidentiality protection, mutual authentication, and automatic identification of patients are provided. The proposed system is based on two types of devices: Near Field Communication (NFC wristbands assigned to patients, and mobile devices assigned to medical staff. Two other main elements of the system are an intermediate server to manage the involved data, and a second server with a private key generator to define the information required to protect communications. An identity-based authentication and key exchange scheme is essential to provide confidential communication and mutual authentication between the medical staff and the private key generator through an intermediate server. The identification of patients is carried out through a keyed-hash message authentication code. Thanks to the combination of the aforementioned tools, a secure alternative mobile health (mHealth scheme for managing patients’ data is defined for emergency and hospitalization services. Different parts of the proposed system have been implemented, including mobile application, intermediate server, private key generator and communication channels. Apart from that, several simulations have been performed, and, compared with the current system, significant improvements in efficiency have been observed.
Patients’ Data Management System Protected by Identity-Based Authentication and Key Exchange
Rivero-García, Alexandra; Santos-González, Iván; Hernández-Goya, Candelaria; Caballero-Gil, Pino; Yung, Moti
2017-01-01
A secure and distributed framework for the management of patients’ information in emergency and hospitalization services is proposed here in order to seek improvements in efficiency and security in this important area. In particular, confidentiality protection, mutual authentication, and automatic identification of patients are provided. The proposed system is based on two types of devices: Near Field Communication (NFC) wristbands assigned to patients, and mobile devices assigned to medical staff. Two other main elements of the system are an intermediate server to manage the involved data, and a second server with a private key generator to define the information required to protect communications. An identity-based authentication and key exchange scheme is essential to provide confidential communication and mutual authentication between the medical staff and the private key generator through an intermediate server. The identification of patients is carried out through a keyed-hash message authentication code. Thanks to the combination of the aforementioned tools, a secure alternative mobile health (mHealth) scheme for managing patients’ data is defined for emergency and hospitalization services. Different parts of the proposed system have been implemented, including mobile application, intermediate server, private key generator and communication channels. Apart from that, several simulations have been performed, and, compared with the current system, significant improvements in efficiency have been observed. PMID:28362328
Popular Public Discourse at Speakers' Corner: Negotiating Cultural Identities in Interaction
DEFF Research Database (Denmark)
McIlvenny, Paul
1996-01-01
In this paper I examine how cultural identities are actively negotiated in popular debate at a multicultural public setting in London. Speakers at Speakers' Corner manage the local construction of group affiliation, audience response and argument in and through talk, within the context of ethnic...... in which participant 'citizens' in the public sphere can actively struggle over cultural representation and identities. Using transcribed examples of video data recorded at Speakers' Corner my paper will examine how cultural identity is invoked in the management of active participation. Audiences...... and their affiliations are regulated and made accountable through the routines of membership categorisation and the policing of cultural identities and their imaginary borders....
Energy Technology Data Exchange (ETDEWEB)
Luehr, Anneke
2011-10-15
This Thesis describes the implementation of a Change Management solution based on a Product Lifecycle Management System (PLM System) for a large international project. The objective of Change Management is to ensure a systematic line of action for approving and implementing changes in the project. The Deutsches Elektronen-Synchrotron DESY is one of the world's leading accelerator centres with locations in Hamburg and Zeuthen. Currently, DESY participates in the realization of the international research facility European X-Ray Free-Electron Laser (XFEL) at the Hamburg site. DESY was responsible for the planning of the XFEL. When the project entered the construction phase it was internationalized and now comprises project groups in 12 countries. Thus the requirements on Change Management have changed, as participants from several labs at many different locations are now involved. First the project scope is described and then a target process for the Change Management solution is developed by a requirement analysis. Afterwards the technical implementation of this process in DESY's PLM System is described and the Change Management solution is tested. The process is visualized using the Unified Modeling Language (UML). Finally a description is given of how to transfer the solution to the project environment. (orig.)
Villaire, Michael; Gonzalez, Diana Peña; Johnson, Kirby L
2017-01-01
This chapter discusses the need for innovative health literacy solutions to combat extensive chronic disease prevalence and costs. The authors explore the intersection of chronic disease management and health literacy. They provide specific examples of successful health literacy interventions for managing several highly prevalent chronic diseases. This is followed by suggestions on pairing research and practice to support effective disease management programs. In addition, the authors discuss strategies for collection and dissemination of knowledge gained from collaborations between researchers and practitioners. They identify current challenges specific to disseminating information from the health literacy field and offer potential solutions. The chapter concludes with a brief look at future directions and organizational opportunities to integrate health literacy practices to address the need for effective chronic disease management.
DEVELOPING PLURILINGUAL IDENTITY IN THIRD LANGUAGE CLASSROOM
Directory of Open Access Journals (Sweden)
HACKETT-JONES A.V.
2015-01-01
Full Text Available The article analyzes the notions of plurilingualism and plurilingual identity through the prism of the concepts of multilingualism and multilingual identity and the perspective of the theories of bilingualism. The article suggests that plurilingual identity can be viewed as an objective in third language (second foreign language teaching and contemplates specific characteristic imposed on a third language learner by the process of third language acquisition and the necessity of managing a certain imbalance between the degrees of language command and culture experience in different target languages.
DEVELOPING PLURILINGUAL IDENTITY IN THIRD LANGUAGE CLASSROOM
Directory of Open Access Journals (Sweden)
HACKETT-JONES A.V.
2015-12-01
Full Text Available The article analyzes the notions of plurilingualism and plurilingual identity through the prism of the concepts of multilingualism and multilingual identity and the perspective of the theories of bilingualism. The article suggests that plurilingual identity can be viewed as an objective in third language (second foreign language teaching and contemplates specific characteristic imposed on a third language learner by the process of third language acquisition and the necessity of managing a certain imbalance between the degrees of language command and culture experience in different target languages.
Ferguson, J; Koivula, T; Livan, M; Nordberg, M; Salmia, T; Vuola, O
2003-01-01
In today's global organisations and networks, a critical factor for effective innovation and project execution is appropriate competence and skills management. The challenges include selection of strategic competences, competence development, and leveraging the competences and skills to drive innovation and collaboration for shared goals. This paper presents a new industrial web-enabled competence management and networking solution and its implementation and piloting in a complex big-science ...
A discrete variational identity on semi-direct sums of Lie algebras
Energy Technology Data Exchange (ETDEWEB)
M, Wenxiu [Department of Mathematics and Statistics, University of South Florida, Tampa, FL 33620-5700 (United States)
2007-12-14
The discrete variational identity under general bilinear forms on semi-direct sums of Lie algebras is established. The constant {gamma} involved in the variational identity is determined through the corresponding solution to the stationary discrete zero-curvature equation. An application of the resulting variational identity to a class of semi-direct sums of Lie algebras in the Volterra lattice case furnishes Hamiltonian structures for the associated integrable couplings of the Volterra lattice hierarchy.
A discrete variational identity on semi-direct sums of Lie algebras
International Nuclear Information System (INIS)
M, Wenxiu
2007-01-01
The discrete variational identity under general bilinear forms on semi-direct sums of Lie algebras is established. The constant γ involved in the variational identity is determined through the corresponding solution to the stationary discrete zero-curvature equation. An application of the resulting variational identity to a class of semi-direct sums of Lie algebras in the Volterra lattice case furnishes Hamiltonian structures for the associated integrable couplings of the Volterra lattice hierarchy
A Solution Based on Bluetooth Low Energy for Smart Home Energy Management
Directory of Open Access Journals (Sweden)
Mario Collotta
2015-10-01
Full Text Available The research and the implementation of home automation are getting more popular because the Internet of Things holds promise for making homes smarter through wireless technologies. The installation of systems based on wireless networks can play a key role also in the extension of the smart grid towards smart homes, that can be deemed as one of the most important components of smart grids. This paper proposes a fuzzy-based solution for smart energy management in a home automation wireless network. The approach, by using Bluetooth Low Energy (BLE, introduces a Fuzzy Logic Controller (FLC in order to improve a Home Energy Management (HEM scheme, addressing the power load of standby appliances and their loads in different hours of the day. Since the consumer is involved in the choice of switching on/off of home appliances, the approach introduced in this work proposes a fuzzy-based solution in order to manage the consumer feedbacks. Simulation results show that the proposed solution is efficient in terms of reducing peak load demand, electricity consumption charges with an increase comfort level of consumers. The performance of the proposed BLE-based wireless network scenario are validated in terms of packet delivery ratio, delay, and jitter and are compared to IEEE 802.15.4 technology.
Distance Management of SMEs Using ICT Solutions
Directory of Open Access Journals (Sweden)
Zdzislaw Polkowski
2017-06-01
Full Text Available The paper contains a description of a research conducted in collaboration with some Erasmus for Young Entrepreneurs program Romanian students, concerning the use and implementation of ICT (Information and Telecommunication Technology, especially in distance managing Small and Medium Enterprises (SMEs. The paper is a response to the nature of contemporary business management, with the constantly increasing amount of work, bureaucracy and the necessity to travel on business combined with the need to manage the company being away. In the research the students assumed the roles of the employees and entrepreneurs simultaneously, to gain the perspective from both points of view – supervised by the authors. The aim was to find and test the effectiveness of the available ICT remote management instruments in the context of SMEs. The aim was to create a study of implementation in real-life conditions, considering the advantages and disadvantages of the solutions tested, including possible future trends. The result was a set of recommendations for business people. Apart from the educational value of the research, the unique, dual perspective assumed by the students participating in it, provided them with a practical insight and skills to better understand and make a better use of the conditions of managing and being managed. The results described here both practical and academic value. The resulting recommendations may constitute the basis of positive changes and improvement in the use of advanced technology in business activities. It is worth noting with its international character the study focuses not only on selected Polish enterprises, but the resulting contents reflects the situation in SMEs in the EU as well, thus it may be a starting point for analyzing other regions worldwide.
Facing information management solutions for SAT applications: A Tecnatom's perspective
International Nuclear Information System (INIS)
Batuecas, T.
2002-01-01
Facing the development of Information Management Solutions for SAT applications implies to cope with different technological, methodological and services aspects. A chronological overview of the major projects in this area where Tecnatom, s.a has been involved up to present is presented. Firstly a brief explanation of Tecnatom's Training Management (GESFORM) and Training Area Intranet applications main features is provided, to focus next in the e-learning approach which has been followed to develop Tecnatom's Virtual Campus. Finally some R and D topics of interest in the field of SAT implementation are outlined. (author)
Development of autonomic management solutions for the military application domain
Werkman, E.; Schoonhoven, B. van; Jonge, M. de; Matthijssen, E.
2010-01-01
The Dutch Ministry of Defence is faced with ICT management problems, due to the increased use of complex ICT systems in the battle field. Solutions in the industry, such as remote assistance, cannot be applied in a domain with unreliable, low-bandwidth connections. In a case study performed at the
Sustainable solutions for solid waste management in Southeast Asian countries
International Nuclear Information System (INIS)
Uyen Nguyen Ngoc; Schnitzer, Hans
2009-01-01
Human activities generate waste and the amounts tend to increase as the demand for quality of life increases. Today's rate in the Southeast Asian Nations (ASEANs) is alarming, posing a challenge to governments regarding environmental pollution in the recent years. The expectation is that eventually waste treatment and waste prevention approaches will develop towards sustainable waste management solutions. This expectation is for instance reflected in the term 'zero emission systems'. The concept of zero emissions can be applied successfully with today's technical possibilities in the agro-based processing industry. First, the state-of-the-art of waste management in Southeast Asian countries will be outlined in this paper, followed by waste generation rates, sources, and composition, as well as future trends of waste. Further on, solutions for solid waste management will be reviewed in the discussions of sustainable waste management. The paper emphasizes the concept of waste prevention through utilization of all wastes as process inputs, leading to the possibility of creating an ecosystem in a loop of materials. Also, a case study, focusing on the citrus processing industry, is displayed to illustrate the application of the aggregated material input-output model in a widespread processing industry in ASEAN. The model can be shown as a closed cluster, which permits an identification of opportunities for reducing environmental impacts at the process level in the food processing industry. Throughout the discussion in this paper, the utilization of renewable energy and economic aspects are considered to adapt to environmental and economic issues and the aim of eco-efficiency. Additionally, the opportunities and constraints of waste management will be discussed.
Emerson, Katherine T U; Murphy, Mary C
2014-10-01
Significant disparities remain between racial and ethnic minorities' and Whites' experiences of American workplaces. Traditional prejudice and discrimination approaches explain these gaps in hiring, promotion, satisfaction, and well-being by pointing to the prejudice of people within organizations such as peers, managers, and executives. Grounded in social identity threat theory, this theoretical review instead argues that particular situational cues-often communicated by well-meaning, largely unprejudiced employees and managers-signal to stigmatized groups whether their identity is threatened and devalued or respected and affirmed. First, we provide an overview of how identity threat shapes the psychological processes of racial and ethnic minorities by heightening vigilance to certain situational cues in the workplace. Next, we outline several of these cues and their role in creating and sustaining perceptions of identity threat (or safety). Finally, we provide empirically grounded suggestions that organizations may use to increase identity safety among their employees of color. Taken together, the research demonstrates how situational cues contribute to disparate psychological experiences for racial and ethnic minorities at work, and suggests that by altering threatening cues, organizations may create more equitable, respectful, and inclusive environments where all people may thrive. (PsycINFO Database Record (c) 2014 APA, all rights reserved).
Managing Written Directives: A Software Solution to Streamline Workflow.
Wagner, Robert H; Savir-Baruch, Bital; Gabriel, Medhat S; Halama, James R; Bova, Davide
2017-06-01
A written directive is required by the U.S. Nuclear Regulatory Commission for any use of 131 I above 1.11 MBq (30 μCi) and for patients receiving radiopharmaceutical therapy. This requirement has also been adopted and must be enforced by the agreement states. As the introduction of new radiopharmaceuticals increases therapeutic options in nuclear medicine, time spent on regulatory paperwork also increases. The pressure of managing these time-consuming regulatory requirements may heighten the potential for inaccurate or incomplete directive data and subsequent regulatory violations. To improve on the paper-trail method of directive management, we created a software tool using a Health Insurance Portability and Accountability Act (HIPAA)-compliant database. This software allows for secure data-sharing among physicians, technologists, and managers while saving time, reducing errors, and eliminating the possibility of loss and duplication. Methods: The software tool was developed using Visual Basic, which is part of the Visual Studio development environment for the Windows platform. Patient data are deposited in an Access database on a local HIPAA-compliant secure server or hard disk. Once a working version had been developed, it was installed at our institution and used to manage directives. Updates and modifications of the software were released regularly until no more significant problems were found with its operation. Results: The software has been used at our institution for over 2 y and has reliably kept track of all directives. All physicians and technologists use the software daily and find it superior to paper directives. They can retrieve active directives at any stage of completion, as well as completed directives. Conclusion: We have developed a software solution for the management of written directives that streamlines and structures the departmental workflow. This solution saves time, centralizes the information for all staff to share, and decreases
Drowning in PC Management: Could a Linux Solution Save Us?
Peters, Kathleen A.
2004-01-01
Short on funding and IT staff, a Western Canada library struggled to provide adequate public computing resources. Staff turned to a Linux-based solution that supports up to 10 users from a single computer, and blends Web browsing and productivity applications with session management, Internet filtering, and user authentication. In this article,…
Directory of Open Access Journals (Sweden)
Swaminathan Ganesan
2017-09-01
Full Text Available In this paper, a robust energy management solution which will facilitate the optimum and economic control of energy flows throughout a microgrid network is proposed. The increased penetration of renewable energy sources is highly intermittent in nature; the proposed solution demonstrates highly efficient energy management. This study enables precise management of power flows by forecasting of renewable energy generation, estimating the availability of energy at storage batteries, and invoking the appropriate mode of operation, based on the load demand to achieve efficient and economic operation. The predefined mode of operation is derived out of an expert rule set and schedules the load and distributed energy sources along with utility grid.
Connecting the dots within: creative performance and identity integration.
Cheng, Chi-Ying; Sanchez-Burks, Jeffrey; Lee, Fiona
2008-11-01
In two studies drawing from social identity theory and the creative-cognition approach, we found that higher levels of identity integration--perceived compatibility between two social identities--predict higher levels of creative performance in tasks that draw on both identity-relevant knowledge domains. Study 1 showed that Asian Americans with higher identity integration were more creative in developing new dishes using a given set of ingredients, but only when both Asian and American ingredients were available. Study 2 showed that female engineers with higher identity integration were more creative in designing a product, but only when the product was targeted to female users. These findings suggest that the psychological management of multiple social identities may be related to accessibility of multiple knowledge domains, which in turn influences creativity.
Gupta, Suraksha; Melewar, T.C.; Czinkota, Michael C.
2013-01-01
This special issue of the Journal of World Business is devoted to the role of intangibles of a firm in building sustainable business for success in competitive markets. The research articles included in this issue have contributed to the on-going academic knowledge about the ability of marketing and management practices to drive business sustainability. This special issue on business sustainabili- ty focuses on the role of corporate branding, corporate identity and corporate reputation.
Algorithms for synthesizing management solutions based on OLAP-technologies
Pishchukhin, A. M.; Akhmedyanova, G. F.
2018-05-01
OLAP technologies are a convenient means of analyzing large amounts of information. An attempt was made in their work to improve the synthesis of optimal management decisions. The developed algorithms allow forecasting the needs and accepted management decisions on the main types of the enterprise resources. Their advantage is the efficiency, based on the simplicity of quadratic functions and differential equations of only the first order. At the same time, the optimal redistribution of resources between different types of products from the assortment of the enterprise is carried out, and the optimal allocation of allocated resources in time. The proposed solutions can be placed on additional specially entered coordinates of the hypercube representing the data warehouse.
Bringing Federated Identity to Grid Computing
Energy Technology Data Exchange (ETDEWEB)
Teheran, Jeny [Fermilab
2016-03-04
The Fermi National Accelerator Laboratory (FNAL) is facing the challenge of providing scientific data access and grid submission to scientific collaborations that span the globe but are hosted at FNAL. Users in these collaborations are currently required to register as an FNAL user and obtain FNAL credentials to access grid resources to perform their scientific computations. These requirements burden researchers with managing additional authentication credentials, and put additional load on FNAL for managing user identities. Our design integrates the existing InCommon federated identity infrastructure, CILogon Basic CA, and MyProxy with the FNAL grid submission system to provide secure access for users from diverse experiments and collab orations without requiring each user to have authentication credentials from FNAL. The design automates the handling of certificates so users do not need to manage them manually. Although the initial implementation is for FNAL's grid submission system, the design and the core of the implementation are general and could be applied to other distributed computing systems.
The Dynamics of Networks of Identical Theta Neurons.
Laing, Carlo R
2018-02-05
We consider finite and infinite all-to-all coupled networks of identical theta neurons. Two types of synaptic interactions are investigated: instantaneous and delayed (via first-order synaptic processing). Extensive use is made of the Watanabe/Strogatz (WS) ansatz for reducing the dimension of networks of identical sinusoidally-coupled oscillators. As well as the degeneracy associated with the constants of motion of the WS ansatz, we also find continuous families of solutions for instantaneously coupled neurons, resulting from the reversibility of the reduced model and the form of the synaptic input. We also investigate a number of similar related models. We conclude that the dynamics of networks of all-to-all coupled identical neurons can be surprisingly complicated.
Ferguson, J; Livan, M; Nordberg, M; Salmia, T; Vuola, O
2003-01-01
In today's global organisations and networks, a critical factor for effective innovation and project execution is appropriate competence and skills management. The challenges include selection of strategic competences, competence development, and leveraging the competences and skills to drive innovation and collaboration for shared goals. This paper presents a new industrial web-enabled competence management and networking solution and its implementation and piloting in a complex big-science environment of globally distributed competences.
Chonody, Jill M; Teater, Barbra
2016-01-01
Outward appearance is one of the means by which age is determined, and fear of looking old may stem from fears about social identity and death. This study explored how social identity theory and terror management theory may help to explain the dread of looking old. University students from the United States, England, and Australia (N = 1,042) completed a questionnaire regarding their attitudes about aging and older adults. Results indicated that sex, age, beliefs about personal aging, and death anxiety explained 30.4% of the variance for participants' dread of looking old. Theoretical hypotheses were supported by our findings.
Facilitating Conversations about Managerial Identities
DEFF Research Database (Denmark)
Madsen, Mona Toft
-based organization in the engineering consulting sector b) a reflection meeting, where the same three managers were gathered, and conversations were facilitated based on identity work in the context of earlier interviews. More specifically, three themes were discussed; flat organizational structure, tensions between...
Directory of Open Access Journals (Sweden)
Fawzia Cassim
2015-07-01
Full Text Available Identity theft has become one of the fastest growing white collar crimes in the world. It occurs when an individual's personal information such as inter alia his or her name, date of birth or credit card details is used by another individual to commit identity fraud. Identity theft can be committed via physical means or online. The increased use of the Internet for business and financial transactions, social networking and the storage of personal information has facilitated the work of identity thieves. Identity theft has an impact on the personal finances and emotional well-being of victims, and on the financial institutions and economies of countries. It presents challenges for law enforcement agencies and governments worldwide. This article examines how identity thieves use the personal information of individuals to commit identity fraud and theft, and looks at legislative solutions introduced in South Africa, the United States of America, the United Kingdom and India to combat identity theft crimes. The article examines measures introduced by the respective governments in these countries to counteract such crimes. Finally, the article will propose a way forward to counteract such crimes in the future. The study reveals that identity theft is a growing and evolving problem that requires a multi-faceted and multi-disciplinary approach by law enforcement agencies, businesses, individuals and collaboration between countries. It is advocated that businesses and institutions should take measures to protect personal information better and that individuals should be educated about their rights, and be vigilant and protect their personal information offline and in cyberspace.
The Need for a Strategic Foundation for Digital Learning and Knowledge Management Solutions
Asgarkhani, Mehdi
2004-01-01
This paper elaborates on the importance of a strategic foundation when digital learning or knowledge management (KM) solutions are planned and developed. It looks at some key issues of e-Learning and knowledge management (KM) through discussing the various stages (technologies) and potential benefits of e-Learning; the state of the e-Learning…
Developing Professional Identity in an Online Learning Environment
DEFF Research Database (Denmark)
Horn, Line Helverskov
2015-01-01
identity as the outcome for the intern. This paper describes the interactions in an online learning environment. The online platform sought to enable peer interaction between younger and older students in a discussion of the professional identity of Natural and Cultural Heritage Management (NCHM......From a socio-cultural perspective, the development of a professional identity is an on-going process that is social in nature and negotiated in communities of practice (Wenger, 1998). Internships in higher education function as such communities of practice, with an improved sense of professional...
Yu, Fajun
2015-03-01
We present the nonautonomous discrete bright soliton solutions and their interactions in the discrete Ablowitz-Ladik (DAL) equation with variable coefficients, which possesses complicated wave propagation in time and differs from the usual bright soliton waves. The differential-difference similarity transformation allows us to relate the discrete bright soliton solutions of the inhomogeneous DAL equation to the solutions of the homogeneous DAL equation. Propagation and interaction behaviors of the nonautonomous discrete solitons are analyzed through the one- and two-soliton solutions. We study the discrete snaking behaviors, parabolic behaviors, and interaction behaviors of the discrete solitons. In addition, the interaction management with free functions and dynamic behaviors of these solutions is investigated analytically, which have certain applications in electrical and optical systems.
The Nielsen identities for the two-point functions of QED and QCD
International Nuclear Information System (INIS)
Breckenridge, J.C.; Sasketchewan Univ., Saskatoon, SK; Lavelle, M.J.; Steele, T.G.; Sasketchewan Univ., Saskatoon, SK
1995-01-01
We consider the Nielsen identities for the two-point functions of full QCD and QED in the class of Lorentz gauges. For pedagogical reasons the identities are first derived in QED to demonstrate the gauge independence of the photon self-energy, and of the electron mass shell. In QCD we derive the general identity and hence the identities for the quark, gluon and ghost propagators. The explicit contributions to the gluon and ghost identities are calculated to one-loop order, and then we show that the quark identity requires that in on-shell schemes the quark mass renormalisation must be gauge independent. Furthermore, we obtain formal solutions for the gluon self-energy and ghost propagator in terms of the gauge dependence of other, independent Green functions. (orig.)
Action recognition is sensitive to the identity of the actor.
Ferstl, Ylva; Bülthoff, Heinrich; de la Rosa, Stephan
2017-09-01
Recognizing who is carrying out an action is essential for successful human interaction. The cognitive mechanisms underlying this ability are little understood and have been subject of discussions in embodied approaches to action recognition. Here we examine one solution, that visual action recognition processes are at least partly sensitive to the actor's identity. We investigated the dependency between identity information and action related processes by testing the sensitivity of neural action recognition processes to clothing and facial identity information with a behavioral adaptation paradigm. Our results show that action adaptation effects are in fact modulated by both clothing information and the actor's facial identity. The finding demonstrates that neural processes underlying action recognition are sensitive to identity information (including facial identity) and thereby not exclusively tuned to actions. We suggest that such response properties are useful to help humans in knowing who carried out an action. Copyright © 2017 The Author(s). Published by Elsevier B.V. All rights reserved.
PRODUCT BRAND IDENTITY – A FACTOR OF SUCCESSFUL MARKET POSITIONING OF A BRAND
Directory of Open Access Journals (Sweden)
Branislav Lijović
2012-12-01
Full Text Available This paper begins with the term product brand identity as the new market paradigm. It aims to define the term product brand identity and its significance for realisation of the market value of a product’s brand and overall marketing goals of an economic operator. The strategy of economic operator and desired market positioning of a brand is implemented by means of product brand identity and a combination of its elements. Systematic creation and identity management of a product’s brand resulted in the uniqueness of the brand, and set the foundation for building the entire process of product brand management.
Investigating of the effect of entrepreneurial orientations on formation of entrepreneurial identity
Directory of Open Access Journals (Sweden)
Manoochehr Parsian
2016-10-01
Full Text Available In today’s changing world, success belongs to the communities and organizations that make a significant relationship between scarce resources and capabilities of management and entrepreneurship of their human resource. In other words, societies and the organizations can move forward in the development path that, with creating the necessary conditions, equip their human resources to productive entrepreneurial knowledge and skills to conduct other organizations and community resources to create value and achieve the development, management. Formation of entrepreneurial identity plays an important role for the development of the entrepreneurial spirit in society. In this paper, given the importance of entrepreneurial identity, the role of entrepreneurial orientations based on Lampkin and Dess (1996 [Lumpkin, G. T., & Dess, G. G. (1996. Clarifying the entrepreneurial orientation construct and linking it to performance. Academy of Management Review, 21(1, 135-172.] is investigated on entrepreneurial identity of the municipality of Qom using a questionnaire consists of 18 items. The results show entrepreneurial orientation influences significantly on entrepreneurial identity.
ARCHITECTURE SOFTWARE SOLUTION TO SUPPORT AND DOCUMENT MANAGEMENT QUALITY SYSTEM
Directory of Open Access Journals (Sweden)
Milan Eric
2010-12-01
Full Text Available One of the basis of a series of standards JUS ISO 9000 is quality system documentation. An architecture of the quality system documentation depends on the complexity of business system. An establishment of an efficient management documentation of system of quality is of a great importance for the business system, as well as in the phase of introducing the quality system and in further stages of its improvement. The study describes the architecture and capability of software solutions to support and manage the quality system documentation in accordance with the requirements of standards ISO 9001:2001, ISO 14001:2005 HACCP etc.
Directory of Open Access Journals (Sweden)
Barend Prinsloo
2016-08-01
Full Text Available Political risk is identified as a dominant risk category of disaster risk management (DRM which could negatively affect the success of those measures implemented to reduce disaster risk. Key to political risk is the construct of national identity which, if poorly constructed, could greatly contribute to political risk. This article proposed a tool to measure the construct of national identity and to provide recommendations to strengthen the construct in order to mitigate the exacerbating influence it may have on political risk and ultimately on DRM. The design of the measurement tool consisted of a mixed methodological approach employing both quantitative and qualitative data. The data collection instruments included a literature review (which is shortly provided in the previous sections and an empirical study that utilised data obtained through structured questionnaires. Although the results of the proposed measuring instrument did not include a representative sample of all the cultures in SouthAfrica, the results alluded to different levels for the construction of national identity among black and white respondents, possibly because of different ideological expectations among these groups. The results of the study should be considered as a validation of the measuring tool and not necessarily of the construct of national identity in South Africa. The measuring tool is thus promising for future studies to reduce political risk and ultimately disaster risk.
Directory of Open Access Journals (Sweden)
Mansoureh Yazdkhasti
2016-11-01
Full Text Available Women empowerment in different spheres of life especially menopause is among the key elements of health promotion in all communities. However there is no realistic images of empowering women in menopausal symptoms management. The present survey aimed to explain the process of women's empowerment for menopausal symptoms management. This qualitative study is part of a larger project which was conducted using Grounded Theory between 2013 and 2015. The article's main focus was to explore the underlying conditions and factors affecting the process of women's empowerment. Using a purposive and theoretical sampling method, 25 participants were interviewed 28 times. Data was collected through some in-depth, semi-structural and open ended interviews with the participant and also memoing and field notes. The interviews were conducted in Neighborhoods House affiliated to Tehran municipality and two gynecological clinics affiliated to Tehran University of Medical Sciences. Data analysis was applied through Strauss and Corbin approach (2008 using MAXQDA10 software. Threat of the feminine identity has been noted as the women's most common concern to being empowered in menopause management. The key theme emerged in the present study (threat of the feminine identity included four main categories (consciousness about the likelihood of femininity decline, negative attitude towards herself, inadequate supportive context, latent opportunity, two subcategories and 109 first-level codes. There is a logical, coherent and integrated relationship between all these concepts and the theme of feminine identity threat. This theme is considered as an underlying social problem and a major concern for postmenopausal women in the context of this group of women's empowerment. The factors (barriers and facilitators affecting women's empowerment in menopause management are associated with social context, intensity and origin of each society. Evaluation of Iranian women
Rostock, Roseanne
The challenge of attracting and retaining the next generation of teachers who are skilled and committed to meeting the growing demands of the profession is of increasing concern to researchers and policy makers, particularly since 45--50% of beginning teachers leave the profession within five years (Ingersoll & Smith, 2003). Reasons for such attrition include compensation, status and working conditions; however, there is growing evidence that a critical factor in new teacher retention hinges on teachers' ability to accomplish the difficult task of forming a workable professional identity in the midst of competing discourses about teaching (Alsup, 2006; Britzman, 2003). There is little research on professional identity development among those beginning teachers at highest risk for attrition (secondary math and science teachers, and those with strong academic backgrounds). This study explores the professional identity development of early-career math and science teachers who are part of the Knowles Science Teaching Foundation's (KSTF) teaching fellowship program, an external support network that aims to address many of the issues leading to high attrition among this particular population of teachers. Using narrative research methods, I examine three case studies of beginning teachers, exploring how they construct professional identity in relation to various discourse communities and negotiate tensions across multiple discourses. The cases identify both dominant discourses and counter-discourses that the teachers draw upon for important identity development resources. They also demonstrate that the way a teacher manages tensions across competing discourses is important to how well one can negotiate a workable professional identity. In particular, they emphasize the importance of engaging in borderland discourses (Gee, 1996) as a way of taking agency in one's own identity development as well as in transforming one's discourse communities. These cases shed light on how
Creating An Alternative Design for Asita Corporate Identity
Directory of Open Access Journals (Sweden)
Michelle Elise
2015-10-01
Full Text Available The objective of the study is to find the solution to the problem outlined, which is to create an alternative design for corporate identity of ASITA. ASITA is a non-profit organization to foster tours and travel agencies in Indonesia. The writer conducted interview to the ASITA Jakarta Chapter, which was appointed to represent ASITA in providing the data needed by the writer. The writer interviewed the advisor of the organization, which had once served as chairperson of ASITA. The result of the research is new corporate identity system of ASITA based on a concept that ASITA as an organization, serves as a compass that guides and assists in every direction. The writer found that corporate identity is an important element to define an organization as well as giving impact on its first impression. To create good corporate identity, several things such as elements of design, color, typography, etc need to be put into attention.
Directory of Open Access Journals (Sweden)
Dermot Brendan Heaney
2012-11-01
Full Text Available This article considers the appointment of a foreign manager to coach a national football team from the perspective of discursive identity construction. The data is comprised of three corpora of online versions of newspaper articles, each corresponding to a phase in Fabio Capello’s first two years of tenure. Reflecting current trends in Critical Discourse Analysis, qualitative close analysis is carried out on two articles from each corpus while quantitative analysis is extended across each corpus to identify salient and consistent aspects of discursive identity construction. Exploiting the multi-disciplinary basis of CDA, the data is examined in terms of transitivity, lexis (comprising vocabulary, collocation, deixis, and intertextuality, and narrative identity construction. Micro-analysis of grammatical and linguistic patterns is applied to indicate patterns in press coverage in each phase, and a corresponding overview considers how aspects of identity work diffused through each corpus cohere into general storylines.
Directory of Open Access Journals (Sweden)
Dermot Brendan Heaney
2013-06-01
Full Text Available This article considers the appointment of a foreign manager to coach a national football team from the perspective of discursive identity construction. The data is comprised of three corpora of online versions of newspaper articles, each corresponding to a phase in Fabio Capello’s first two years of tenure. Reflecting current trends in Critical Discourse Analysis, qualitative close analysis is carried out on two articles from each corpus while quantitative analysis is extended across each corpus to identify salient and consistent aspects of discursive identity construction. Exploiting the multi-disciplinary basis of CDA, the data is examined in terms of transitivity, lexis (comprising vocabulary, collocation, deixis, and intertextuality, and narrative identity construction. Micro-analysis of grammatical and linguistic patterns is applied to indicate patterns in press coverage in each phase, and a corresponding overview considers how aspects of identity work diffused through each corpus cohere into general storylines.
M.D. van Halderen (Mignon)
2008-01-01
textabstractIt is especially during the past decade that stakeholders have become extremely heedful of organizations and their activities. A dominant organizational response of companies to this development is to express their organizational identity, in terms of who they are, what they stand for,
Evaluation of baobab (gonglase) solution for home management of diarrhoea in sudanese children
International Nuclear Information System (INIS)
Abdel Galil, Nour Elhuda
1996-06-01
A randomized controlled study was carried out in Khartoum North during the year 1994-1995 at Ahmed Gasim children teaching hospital, khatmia, and shabia health centres to evaluate acceptability, safety and efficiency of three formulated baobab home oral rehydration solutions in children with diarrhoeal diseases. 113 children 6-60 months of age were enrolled in the study with mild or no dehydration and without associated diseases. Three baobab solutions were administered beside the control WHO/oral rehydration solution (ORS). 32 were allocated to solution A (baobab pulp extract+home sugar), 35 patients to solution B (baobab pulp extract+domestic salt+sugar), 25 to solution C (baobab pulp extract+WHO/ORS) and 21 to the control solution (WHO/ORS). The solutions were administered for three successive days to the children with diarrhoea. A questionnaire was filled for each child including attitudes and practices of mother regarding diarrhoeal diseases, socioeconomic status of parents, history of the patient health and past nutritional intake during the present diarrhoea. The clinical data were studied. The study showed that the solutions were acceptable, effective and safer than the control. The three solutions A, B and C were good as therapeutic solutions and exceeded that of the WHO/ORS. Clinical data demonstrated that after 24 hours of management of the diarrhoeal diseases with baobab solutions, the recovery rate was 60% for solution A group, 20% for solution B group and 28% for solution C where as the recovery rate for solution D was 5%. By the second 24 hours of management the cumulative recovery rate was 100% for A, 77% for B, 84% for C and 24% for D. None was considered a treatment failure or developed dehydration and all the patients were satisfactorily treated with marked effect on children with diarrhoea , specially bloody diarrhoea. The molar concentration of K in the baobab solution was 21 mmol/litre very close to the molar concentration of K in the WHO
Personae of interest - managers' identities and the online mirror
Ranzini, G; Fieseler, C.
2013-01-01
Purpose - In this chapter we discuss the implications social media have for the selfrepresentation and identity formulation of professionals within organizations. Under the assumption that new, technology-mediated networking possibilities call for a reformulation of the boundaries between the
End-To-End Solution for Integrated Workload and Data Management using GlideinWMS and Globus Online
International Nuclear Information System (INIS)
Mhashilkar, Parag; Miller, Zachary; Weiss, Cathrin; Kettimuthu, Rajkumar; Garzoglio, Gabriele; Holzman, Burt; Duan, Xi; Lacinski, Lukasz
2012-01-01
Grid computing has enabled scientific communities to effectively share computing resources distributed over many independent sites. Several such communities, or Virtual Organizations (VO), in the Open Science Grid and the European Grid Infrastructure use the GlideinWMS system to run complex application work-flows. GlideinWMS is a pilot-based workload management system (WMS) that creates an on-demand, dynamically-sized overlay Condor batch system on Grid resources. While the WMS addresses the management of compute resources, however, data management in the Grid is still the responsibility of the VO. In general, large VOs have resources to develop complex custom solutions, while small VOs would rather push this responsibility to the infrastructure. The latter requires a tight integration of the WMS and the data management layers, an approach still not common in modern Grids. In this paper we describe a solution developed to address this shortcoming in the context of Center for Enabling Distributed Peta-scale Science (CEDPS) by integrating GlideinWMS with Globus Online (GO). Globus Online is a fast, reliable file transfer service that makes it easy for any user to move data. The solution eliminates the need for the users to provide custom data transfer solutions in the application by making this functionality part of the GlideinWMS infrastructure. To achieve this, GlideinWMS uses the file transfer plug-in architecture of Condor. The paper describes the system architecture and how this solution can be extended to support data transfer services other than Globus Online when used with Condor or GlideinWMS.
INTERCULTURAL MISUNDERSTANDINGS: CAUSES AND SOLUTIONS
Directory of Open Access Journals (Sweden)
Майкл Б Хиннер
2017-12-01
Full Text Available Intercultural misunderstandings involve a number of complex causes which can easily escalate into conflicts. Since conflicts are also complex, it is not easy to find solutions because there is no one solution for all problems. Systems Theory, transdisciplinarity, and the social ecological model take a holistic approach in investigating complex phenomena. They permit the creation of a theoretical framework based on previous empirical research and theories across scientific disciplines to identify the relevant elements of complex phenomena and to understand the interrelationship of these elements. Intercultural misunderstandings and conflicts are very complex phenomena because they include culture, perception, identity, ethnocentrism, relationships, trust building and conflict management as well as intercultural commu-nication competence which entails cognition, metacognition, and social metacognition. Since most em-pirical studies focus on isolated, individual elements in specific contexts, this article describes the theoretical framework of how the various findings and theories developed in different scientific disciplines can be used to form a cohesive framework to help circumvent intercultural misunderstandings and conflicts. In so doing, it follows the general principles of Systems Theory, transdisciplinarity, and the social ecological model.
Mok, Aurelia; Morris, Michael W
2012-02-01
Increasingly, individuals identify with two or more cultures. Prior research has found the degree to which individuals chronically integrate these identities (bicultural identity integration; BII) moderates responses to cultural cues: High BII individuals assimilate (adopting biases that are congruent with norms of the cued culture), whereas low BII individuals contrast (adopting biases that are incongruent with these norms). The authors propose BII can also be a psychological state and modulated by shifts in processing styles. In four experiments, the authors induced a global or local processing style using physical posture (Experiment 1) and cognitive manipulations (Experiments 2-4) and found that BII is enhanced in contexts facilitating a more global processing style (i.e., smiling, high-level construal, and similarity focus). The authors also found that contrastive responses to cultural cues are diminished when BII is situationally enhanced. Implications for research on processing style, identity integration, and performance in culture-based situations are discussed.
Juggling identities of rheumatoid arthritis, motherhood and paid work - a grounded theory study.
Feddersen, Helle; Mechlenborg Kristiansen, Tine; Tanggaard Andersen, Pernille; Hørslev-Petersen, Kim; Primdahl, Jette
2018-02-01
To explore how women with rheumatoid arthritis manage their illness, motherhood, and work life. A constructivist, grounded theory approach based on individual interviews and participant observations with 20 women with rheumatoid arthritis who participated in work life and had children living at home or were pregnant. After initial and focused coding Goffman's concepts of social identity were applied. A core category: "Juggling meaningful identities" and three conceptual categories were developed: (1) Work life as the strongest identity marker; (2) Motherhood: a two-sided act; (3) Living with rheumatoid arthritis as an identity? Paid work, motherhood, and illness are linked to the women's social identities. The women construct and change their identities in interactions with children, partners, other parents, colleagues, and employers. The women attribute the highest priority to their professional identity, spending the majority of their time and energy in an effort to appear as "good stable workers". The disease is seen as a hindrance in this regard, and the illness identity is almost completely rejected. In motherhood, the women prioritize close interaction with their children, and deprioritize external activities. Extended outbreaks of the disease and issues regarding the children force the women to deprioritize working life. Implications for rehabilitation Juggling meaningful identities of rheumatoid arthritis, motherhood, and paid work challenge women in managing their everyday lives. Therefore, rehabilitation professionals should support individuals to develop new strategies to manage the challenges they experience regarding juggling motherhood and work ability. Work is a dominant identity marker for women with rheumatoid arthritis therefore, rehabilitation professionals have an important role to play in investigating possible ways for the individual to maintain employment or return to work. Living with rheumatoid arthritis and being a paid worker challenge
Online benefits solutions--a new trend in managing employee benefits programs.
Ala, Mohammad; Brunaczki, Bernadette
2003-01-01
This article focuses on the array of online benefits solutions offered by technology companies and reports the benefits to both employers and employees. Some of the benefits include reduced paperwork, reduced errors, and reduced administration costs. Companies that can deliver these benefits will be in great demand to help manage benefits programs and streamline the administrative processes.
An integrative solution for managing, tracing and citing sensor-related information
Koppe, Roland; Gerchow, Peter; Macario, Ana; Schewe, Ingo; Rehmcke, Steven; Düde, Tobias
2017-04-01
In a data-driven scientific world, the need to capture information on sensors used in the data acquisition process has become increasingly important. Following the recommendations of the Open Geospatial Consortium (OGC), we started by adopting the SensorML standard for describing platforms, devices and sensors. However, it soon became obvious to us that understanding, implementing and filling such standards costs significant effort and cannot be expected from every scientist individually. So we developed a web-based sensor management solution (https://sensor.awi.de) for describing platforms, devices and sensors as hierarchy of systems which supports tracing changes to a system whereas hiding complexity. Each platform contains devices where each device can have sensors associated with specific identifiers, contacts, events, related online resources (e.g. manufacturer factsheets, calibration documentation, data processing documentation), sensor output parameters and geo-location. In order to better understand and address real world requirements, we have closely interacted with field-going scientists in the context of the key national infrastructure project "FRontiers in Arctic marine Monitoring ocean observatory" (FRAM) during the software development. We learned that not only the lineage of observations is crucial for scientists but also alert services using value ranges, flexible output formats and information on data providers (e.g. FTP sources) for example. Mostly important, persistent and citable versions of sensor descriptions are required for traceability and reproducibility allowing seamless integration with existing information systems, e.g. PANGAEA. Within the context of the EU-funded Ocean Data Interoperability Platform project (ODIP II) and in cooperation with 52north we are proving near real-time data via Sensor Observation Services (SOS) along with sensor descriptions based on our sensor management solution. ODIP II also aims to develop a harmonized
Arrigo, Bruce A
2013-06-01
This article develops the constitutive features of the society-of-captives thesis as suggested by Arrigo and Milovanovic, and Arrigo, Bersot, and Sellers. The relevance of this thesis is briefly explored in relation to the institutional and community-based treatment philosophies that currently inform the mental health and criminal justice systems. This exploration specifies how risk (being human and doing humanness differently) is managed symbolically, linguistically, materially, and culturally. The management of this risk extends to the kept as well as to their keepers, regulators, and watchers (i.e., the society of captives). This article calls for a new clinical praxis (being/doing a critical mindfulness) designed to overcome the totalizing madness (the harm of social dis-ease) that follows from managing risk fearfully and marginalizing identities desperately as reified recursively through society's captivity. The ethical underpinnings of this clinical praxis represent an emergent direction for undertaking correctional policy reform.
Secondary Uses of Personal Identity Information: Policies, Technologies and Regulatory Framework
DEFF Research Database (Denmark)
Adjei, Joseph K.; Olesen, Henning
2012-01-01
Although personal identity information must primarily be used for protecting and promoting the physical needs of individuals, it has also become central to the business models of the digital age due to its use for other secondary purposes, resulting in various innovative identity management (Id...
Evaluation of baobab (gonglase) solution for home management of diarrhoea in sudanese children
Energy Technology Data Exchange (ETDEWEB)
Abdel Galil, Nour Elhuda [Department of Biochemistry and Soil Science, Faculty of Agriculture, University of Khartoum, Khartoum (Sudan)
1996-06-01
A randomized controlled study was carried out in Khartoum North during the year 1994-1995 at Ahmed Gasim children teaching hospital, khatmia, and shabia health centres to evaluate acceptability, safety and efficiency of three formulated baobab home oral rehydration solutions in children with diarrhoeal diseases. 113 children 6-60 months of age were enrolled in the study with mild or no dehydration and without associated diseases. Three baobab solutions were administered beside the control WHO/oral rehydration solution (ORS). 32 were allocated to solution A (baobab pulp extract+home sugar), 35 patients to solution B (baobab pulp extract+domestic salt+sugar), 25 to solution C (baobab pulp extract+WHO/ORS) and 21 to the control solution (WHO/ORS). The solutions were administered for three successive days to the children with diarrhoea. A questionnaire was filled for each child including attitudes and practices of mother regarding diarrhoeal diseases, socioeconomic status of parents, history of the patient health and past nutritional intake during the present diarrhoea. The clinical data were studied. The study showed that the solutions were acceptable, effective and safer than the control. The three solutions A, B and C were good as therapeutic solutions and exceeded that of the WHO/ORS. Clinical data demonstrated that after 24 hours of management of the diarrhoeal diseases with baobab solutions, the recovery rate was 60% for solution A group, 20% for solution B group and 28% for solution C where as the recovery rate for solution D was 5%. By the second 24 hours of management the cumulative recovery rate was 100% for A, 77% for B, 84% for C and 24% for D. None was considered a treatment failure or developed dehydration and all the patients were satisfactorily treated with marked effect on children with diarrhoea , specially bloody diarrhoea. The molar concentration of K in the baobab solution was 21 mmol/litre very close to the molar concentration of K in the WHO
Directory of Open Access Journals (Sweden)
Mohammadtaghi Iman
2013-06-01
Full Text Available The verse of holy Koran "verily the most honored of you in the sight of Allah is [he who is] the most virtuous of you" directly shows that in god's willing there is no superiority of a man or a group than others except those who have piety to god. In fact, the Islamic identity focuses on the superiority of piety among humans and does not focus on superiority of a man or a group that causes Islamic identity theoretically be against other competitive identities such as ethnic, global and national identity. Therefore, this research aims to study the relationship between Islamic identity and competitive identities (ethnic, national and global. In this way based on Sheldon Stryker theory and survey method, 431 students have elected and have analyzed. The results have shown that there was positive significant relationship between Islamic identity, national and ethnic identity, and negative significant relationship between Islamic identity and global identity. In addition, multivariate regression results have shown that the variables national and global identities have explained 45 percent of the variation of Islamic identity variable. The results shows that national and ethnic identity amplify the Islamic identity and they have positive relationship with it and in fact they are not a competitive identity for Islamic identity but global identity has negative relationship with Islamic identity and therefore it is a competitive identity for Islamic identity.
Material Construction of Care Workers’ Identity
Directory of Open Access Journals (Sweden)
Sanna Laulainen
2016-03-01
Full Text Available This article takes a critical look at the unconscious and unnoticed effects of materiality on care workers’ identity. The data was collected through nonactive role-playing using written accounts, in which the respondents described how they felt about working in fictitious ‘good’ or ‘bad’ elderly care homes. The data was analyzed with rhetorical analysis. Five different identity strategies were identified in the accounts. Strong professional identity was defended by downplaying the significance of materiality. Adjustment and passive compliance were used to adjust to physical shortcomings of the work environment. A ‘rebellion’ was described as an extreme course of action to resolve the contradiction between good care and poor facilities. At its best, the materiality of care homes, in particular homelikeness, seemed to support professional identity. These identity strategies illustrate how care workers balance between the physical realities of care homes and the requirements of the ethos of care, which are often incompatible with each other. It is crucial that managers as well as workers themselves recognize and acknowledge these connections affecting motivation and commitment to care work. Investments in better environments could be one way to improve the image and the attractiveness of the care branch and relieve the recruitment problems.
Constructing nurses' professional identity through social identity theory.
Willetts, Georgina; Clarke, David
2014-04-01
The profession of nursing continues to struggle with defining and clarifying its professional identity. The definitive recognition of nursing as a profession was the moving of training from the hospital apprentice model to the tertiary sector. However, this is only part of the story of professional identity in nursing. Once training finishes and enculturation into the workplace commences, professional identity becomes a complicated social activity. This paper proposes social identity theory as a valuable research framework to assist with clarifying and describing the professional identity of nurses. The paper outlines the key elements of a profession and then goes on to describe the main concepts of social identity theory. Lastly, a connection is made between the usefulness of using social identity theory in researching professional identity in nursing, recognizing the contextual nature of the social activity of the profession within its workplace environment. © 2013 Wiley Publishing Asia Pty Ltd.
The Scanfin Merger: a Matter of Culture and Identity (Case A)
DEFF Research Database (Denmark)
Smith, Pernille; Carugati, Andrea; Giangreco, Antonio
and middle managers reacted to the merger. The issues in this case are culture and identity. What are the implications when companies from four different countries merge? What role does differing cultures (national or organisational) play in the process and how does this affect the identity of the company...
Albright, Rebecca; Anthony, Kenneth R N; Baird, Mark; Beeden, Roger; Byrne, Maria; Collier, Catherine; Dove, Sophie; Fabricius, Katharina; Hoegh-Guldberg, Ove; Kelly, Ryan P; Lough, Janice; Mongin, Mathieu; Munday, Philip L; Pears, Rachel J; Russell, Bayden D; Tilbrook, Bronte; Abal, Eva
2016-11-01
Coral reefs are one of the most vulnerable ecosystems to ocean acidification. While our understanding of the potential impacts of ocean acidification on coral reef ecosystems is growing, gaps remain that limit our ability to translate scientific knowledge into management action. To guide solution-based research, we review the current knowledge of ocean acidification impacts on coral reefs alongside management needs and priorities. We use the world's largest continuous reef system, Australia's Great Barrier Reef (GBR), as a case study. We integrate scientific knowledge gained from a variety of approaches (e.g., laboratory studies, field observations, and ecosystem modelling) and scales (e.g., cell, organism, ecosystem) that underpin a systems-level understanding of how ocean acidification is likely to impact the GBR and associated goods and services. We then discuss local and regional management options that may be effective to help mitigate the effects of ocean acidification on the GBR, with likely application to other coral reef systems. We develop a research framework for linking solution-based ocean acidification research to practical management options. The framework assists in identifying effective and cost-efficient options for supporting ecosystem resilience. The framework enables on-the-ground OA management to be the focus, while not losing sight of CO2 mitigation as the ultimate solution. Copyright © 2016 Elsevier Ltd. All rights reserved.
Shumer, Daniel E; Spack, Norman P
2013-02-01
The approach to gender identity disorder (GID) in childhood and adolescence has been rapidly evolving and is in a state of flux. In an effort to form management recommendations on the basis of the available literature, The Endocrine Society published clinical practice guidelines in 2009. The guidelines recommend against sex role change in prepubertal children, but they recommend the use of gonadotropin-releasing hormone (GnRH) agonists to suppress puberty in adolescence, and the use of cross-sex hormones starting around age 16 for eligible patients. In actual practice, the approach to GID is quite variable due to continued lack of consensus and specific barriers to treatment that are unique to GID. Recent literature has focused on the mental health approach to prepubertal children with GID and short-term outcomes using pubertal suppression and cross-sex steroids in adolescents with GID. This review will describe the literature published since the release of The Endocrine Society guidelines regarding the management of GID in both children and adolescents.
Co-Leadership - A Management Solution for Integrated Health and Social Care.
Klinga, Charlotte; Hansson, Johan; Hasson, Henna; Sachs, Magna Andreen
2016-05-23
Co-leadership has been identified as one approach to meet the managerial challenges of integrated services, but research on the topic is limited. In the present study, co-leadership, practised by pairs of managers - each manager representing one of the two principal organizations in integrated health and social care services - was explored. To investigate co-leadership in integrated health and social care, identify essential preconditions in fulfilling the management assignment, its operationalization and impact on provision of sustainable integration of health and social care. Interviews with eight managers exercising co-leadership were analysed using directed content analysis. Respondent validation was conducted through additional interviews with the same managers. Key contextual preconditions were an organization-wide model supporting co-leadership and co-location of services. Perception of the management role as a collective activity, continuous communication and lack of prestige were essential personal and interpersonal preconditions. In daily practice, office sharing, being able to give and take and support each other contributed to provision of sustainable integration of health and social care. Co-leadership promoted robust management by providing broader competence, continuous learning and joint responsibility for services. Integrated health and social care services should consider employing co-leadership as a managerial solution to achieve sustainability.
CAH AMPERA: HYBRID IDENTITY OF KAMPUNG YOUTHS IN NEGOTIATING CITIZENSHIP
Directory of Open Access Journals (Sweden)
Subando Agus Margono
2014-06-01
Full Text Available This article attempts to investigate the negotiating process for citizenship of a group of youths facing entrenched social, cultural, and political exclusion. It examines the phenomenon of citizenship negotiation based on stigmatized position of exluded youths. It was found that despite overwhelming odds, the youths use their hybrid identity, which is a manifestation of cah Ampera identity. They succeed in managing the antagonism and affiliation. The citizenship of cah Ampera ismanaged through symbolic capital and action in village micro politics. Success is reflected in their ability to manage their relations with adults, employment, and their young world.
78 FR 24752 - Agency Information Collection Activities: Submission for OMB Review; Comment Request
2013-04-26
...: New collection; Title of Information Collection: CMS Enterprise Identity Management System; Use: The Enterprise Identity Management (EIDM) solution will provide an enterprise-wide solution that will also support CMS' senior management goal to improve the Provider and Health Information Exchange experience by...
77 FR 70445 - Agency Information Collection Activities: Proposed Collection; Comment Request
2012-11-26
...; Title of Information Collection: CMS Enterprise Identity Management System; Use: The Enterprise Identity Management (EIDM) solution will provide an enterprise-wide solution that will also support CMS' senior management goal to improve the Provider and Health Information Exchange experience by providing an enterprise...
Role of Education in Promoting National Identity Indicators
Directory of Open Access Journals (Sweden)
Mohammad Baqer Alizadeh Aghdam
2010-04-01
Full Text Available This article reviews social identity among students of secondary school with emphasis on national identity. This paper is to answer how we can increase students` belonging to national identity. Two high school students in two areas of Zanjan city with 700 people are the sample of this study which 30 persons were selected to attend the workshop. This research, based on objective, is practical and problem solving and based on time is longitudinal and panel study. The Research method is qualitative and the technique is based on PCM (Project Cycle Management. Theoretically, Tajfle, Giddens, Jenkins and Pyter Burk`s approaches are used in addition to micro, macro and combinational perspectives. Data collection in this study is through workshop and questionnaire. Research findings showed that students` belonging to national Identity have 10 percent increases since the workshop performance. Belonging to the national identity in male students has increased to 15 percent and in female students 5 percent after the workshop. Both female and male students` belongings to national identity have doubled after the workshop. Moreover, students’ familiarity with Iranian national figures, elements of national culture, the historical and national monuments and some national myths, which are all elements of national identity, have doubled after the workshop.
Morsunbul, Umit; Crocetti, Elisabetta; Cok, Figen; Meeus, W.H.J.
2014-01-01
The purpose of this study was to evaluate the factor structure and convergent validity of the Turkish version of the Utrecht-Management of Identity Commitments Scale (U-MICS). Participants were 1201 (59.6% females) youth aged between 12 and 24 years (Mage = 17.53 years, SDage = 3.25). Results
Ramirez, Jason J; Olin, Cecilia C; Lindgren, Kristen P
2017-09-01
Two variations of the Implicit Association Test (IAT), the Drinking Identity IAT and the Alcohol Identity IAT, assess implicit associations held in memory between one's identity and alcohol-related constructs. Both have been shown to predict numerous drinking outcomes, but these IATs have never been directly compared to one another. The purpose of this study was to compare these IATs and evaluate their incremental predictive validity. US undergraduate students (N=64, 50% female, mean age=21.98years) completed the Drinking Identity IAT, the Alcohol Identity IAT, an explicit measure of drinking identity, as well as measures of typical alcohol consumption and hazardous drinking. When evaluated in separate regression models that controlled for explicit drinking identity, results indicated that the Drinking Identity IAT and the Alcohol Identity IAT were significant, positive predictors of typical alcohol consumption, and that the Drinking Identity IAT, but not the Alcohol Identity IAT, was a significant predictor of hazardous drinking. When evaluated in the same regression models, the Drinking Identity IAT, but not the Alcohol Identity IAT, was significantly associated with typical and hazardous drinking. These results suggest that the Drinking Identity IAT and Alcohol Identity IAT are related but not redundant. Moreover, given that the Drinking Identity IAT, but not the Alcohol Identity IAT, incrementally predicted variance in drinking outcomes, identification with drinking behavior and social groups, as opposed to identification with alcohol itself, may be an especially strong predictor of drinking outcomes. Copyright © 2017 Elsevier Ltd. All rights reserved.
DEFF Research Database (Denmark)
Adjei, Joseph K.; Olesen, Henning
2011-01-01
information. On the other hand, consumers have expressed concerns that their rights and ability to control their personal information are violated. Paradoxically, it appears that users provide personal data freely and willingly, as it has been observed on Facebook and other social networks. This study...... is an attempt to understand the relationship between individuals’ intentions to disclose personal information, their actual personal information disclosure behaviours, and how these can be leveraged to develop privacy-enhancing identity management systems (IDMS) that users can trust. Legal, regu...
Marketing identities: Shifting circles of identification in inter-organizational relationships
Ellis, N.; Ybema, S.B.
2010-01-01
This study explores the discursive positioning of managers involved in inter-organizational relationships (IORs) within industrial supply chains. In closely examining a series of interviews, we find a number of interpretive repertoires of boundary construction used in IOR managers' identity
Privacy-preserving security solution for cloud services
L. Malina; J. Hajny; P. Dzurenda; V. Zeman
2015-01-01
We propose a novel privacy-preserving security solution for cloud services. Our solution is based on an efficient non-bilinear group signature scheme providing the anonymous access to cloud services and shared storage servers. The novel solution offers anonymous authenticationfor registered users. Thus, users' personal attributes (age, valid registration, successful payment) can be proven without revealing users' identity, and users can use cloud services without any threat of profiling their...
New nurse transition: success through aligning multiple identities.
Leong, Yee Mun Jessica; Crossman, Joanna
2015-01-01
The purpose of this paper is to explore the perceptions of new nurses in Singapore of their experiences of role transition and to examine the implications for managers in terms of employee training, development and retention. This qualitative study was conducted using a constructivist grounded theory approach. In total 26 novice nurses and five preceptors (n=31) from five different hospitals participated in the study. Data were collected from semi-structured interviews and reflective journal entries and analysed using the constant comparative method. The findings revealed that novice nurses remained emotionally and physically challenged when experiencing role transition. Two major constructs appear to play an important part in the transition process; learning how to Fit in and aligning personal with professional and organisational identities. The findings highlight factors that facilitate or impede Fitting in and aligning these identities. Although the concept of Fitting in and its relation to the attrition of novice nurses has been explored in global studies, that relationship has not yet been theorised as the dynamic alignment of multiple identities. Also, whilst most research around Fitting in, identity and retention has been conducted in western countries, little is known about these issues and their interrelationship in the context of Singapore. The study should inform decision making by healthcare organisations, nurse managers and nursing training institutions with respect to improving the transition experience of novice nurses.
A Conditions Data Management System for HEP Experiments
Energy Technology Data Exchange (ETDEWEB)
Laycock, P. J. [CERN; Dykstra, D. [Fermilab; Formica, A. [Saclay; Govi, G. [Fermilab; Pfeiffer, A. [CERN; Roe, S. [CERN; Sipos, R. [Eotvos U.
2017-01-01
Conditions data infrastructure for both ATLAS and CMS have to deal with the management of several Terabytes of data. Distributed computing access to this data requires particular care and attention to manage request-rates of up to several tens of kHz. Thanks to the large overlap in use cases and requirements, ATLAS and CMS have worked towards a common solution for conditions data management with the aim of using this design for data-taking in Run 3. In the meantime other experiments, including NA62, have expressed an interest in this cross- experiment initiative. For experiments with a smaller payload volume and complexity, there is particular interest in simplifying the payload storage. The conditions data management model is implemented in a small set of relational database tables. A prototype access toolkit consisting of an intermediate web server has been implemented, using standard technologies available in the Java community. Access is provided through a set of REST services for which the API has been described in a generic way using standard Open API specications, implemented in Swagger. Such a solution allows the automatic generation of client code and server stubs and further allows changes in the backend technology transparently. An important advantage of using a REST API for conditions access is the possibility of caching identical URLs, addressing one of the biggest challenges that large distributed computing solutions impose on conditions data access, avoiding direct DB access by means of standard web proxy solutions.
DEFF Research Database (Denmark)
Holmgreen, Lise-Lotte
2018-01-01
Questioning the assumption that identities can be controlled through a shared organisational culture, the article explores the inculcation of a discourse of diversity into leadership identities in a Danish bank and building society. Thus, it intends to demonstrate that, on the one hand, discourse...... plays a significant role in identity construction and, on the other, that leaders’ constructions may have many sources of inspiration within and outside the organisation, emphasising that identity construction is a complex process in which organisational efforts to promote a common leadership identity...... to construct their leadership identities. While the respondents present comparable identities to the interviewer, the analysis reveals that the they draw on different discourses and employ a number of different discursive means to present this identity. This, the article argues, may be the result of a number...
An SNMP-based solution to enable remote ISO/IEEE 11073 technical management.
Lasierra, Nelia; Alesanco, Alvaro; García, José
2012-07-01
This paper presents the design and implementation of an architecture based on the integration of simple network management protocol version 3 (SNMPv3) and the standard ISO/IEEE 11073 (X73) to manage technical information in home-based telemonitoring scenarios. This architecture includes the development of an SNMPv3-proxyX73 agent which comprises a management information base (MIB) module adapted to X73. In the proposed scenario, medical devices (MDs) send information to a concentrator device [designated as compute engine (CE)] using the X73 standard. This information together with extra information collected in the CE is stored in the developed MIB. Finally, the information collected is available for remote access via SNMP connection. Moreover, alarms and events can be configured by an external manager in order to provide warnings of irregularities in the MDs' technical performance evaluation. This proposed SNMPv3 agent provides a solution to integrate and unify technical device management in home-based telemonitoring scenarios fully adapted to X73.
Rapid Transformation in a Dual Identity Defense University
National Research Council Canada - National Science Library
Sekerka, Leslie E; Zolin, Roxanne; Simon, Cary
2005-01-01
.... Transcripts were thematically analyzed. The findings contributed to the development of a model to depict the effects of a specialized management identity that employs a deletion strategy using coercion to effect rapid transformation...
Product Lifecycle Management and the Quest for Sustainable Space Exploration Solutions
Caruso, Pamela W.; Dumbacher, Daniel L.; Grieves, Michael
2011-01-01
Product Lifecycle Management (PLM) is an outcome of lean thinking to eliminate waste and increase productivity. PLM is inextricably tied to the systems engineering business philosophy, coupled with a methodology by which personnel, processes and practices, and information technology combine to form an architecture platform for product design, development, manufacturing, operations, and decommissioning. In this model, which is being implemented by the Marshall Space Flight Center (MSFC) Engineering Directorate, total lifecycle costs are important variables for critical decision-making. With the ultimate goal to deliver quality products that meet or exceed requirements on time and within budget, PLM is a powerful concept to shape everything from engineering trade studies and testing goals, to integrated vehicle operations and retirement scenarios. This briefing will demonstrate how the MSFC Engineering Directorate is implementing PLM as part of an overall strategy to deliver safe, reliable, and affordable space exploration solutions and how that strategy aligns with the Agency and Center systems engineering policies and processes. Sustainable space exploration solutions demand that all lifecycle phases be optimized, and engineering the next generation space transportation system requires a paradigm shift such that digital tools and knowledge management, which are central elements of PLM, are used consistently to maximum effect. Adopting PLM, which has been used by the aerospace and automotive industry for many years, for spacecraft applications provides a foundation for strong, disciplined systems engineering and accountable return on investment. PLM enables better solutions using fewer resources by making lifecycle considerations in an integrative decision-making process.
The physical properties of generic latanoprost ophthalmic solutions are not identical
DEFF Research Database (Denmark)
Kolko, Miriam; Koch Jensen, Peter
2017-01-01
was determined by linear regression of timed gravity flow from a vertical syringe through a 21-G cannula. The hardness of the bottles was evaluated by gradually increasing tension on a hook placed around each bottle until a drop was expelled reading the tension on an attached spring scale. RESULTS: Drop sizes...... products. Finally, the viscosity revealed a significant variability between brands. Remarkable differences were found in bottle shapes, bottle hardness and costs of the latanoprost generics. CONCLUSION: Generic latanoprost eye drops should not be considered identical to the original brand version...
Morsunbul, Umit; Crocetti, Elisabetta; Cok, Figen; Meeus, Wim
2014-01-01
The purpose of this study was to evaluate the factor structure and convergent validity of the Turkish version of the Utrecht-Management of Identity Commitments Scale (U-MICS). Participants were 1201 (59.6% females) youth aged between 12 and 24 years (Mage=17.53 years, SDage=3.25). Results indicated
Munthe, John; Brorström-Lundén, Eva; Rahmberg, Magnus; Posthuma, Leo; Altenburger, Rolf; Brack, Werner; Bunke, Dirk; Engelen, Guy; Gawlik, Bernd Manfred; van Gils, Jos; Herráez, David López; Rydberg, Tomas; Slobodnik, Jaroslav; van Wezel, Annemarie
2017-01-01
This paper describes a conceptual framework for solutions-focused management of chemical contaminants built on novel and systematic approaches for identifying, quantifying and reducing risks of these substances. The conceptual framework was developed in interaction with stakeholders representing relevant authorities and organisations responsible for managing environmental quality of water bodies. Stakeholder needs were compiled via a survey and dialogue. The content of the conceptual framework was thereafter developed with inputs from relevant scientific disciplines. The conceptual framework consists of four access points: Chemicals, Environment, Abatement and Society, representing different aspects and approaches to engaging in the issue of chemical contamination of surface waters. It widens the scope for assessment and management of chemicals in comparison to a traditional (mostly) perchemical risk assessment approaches by including abatement- and societal approaches as optional solutions. The solution-focused approach implies an identification of abatement- and policy options upfront in the risk assessment process. The conceptual framework was designed for use in current and future chemical pollution assessments for the aquatic environment, including the specific challenges encountered in prioritising individual chemicals and mixtures, and is applicable for the development of approaches for safe chemical management in a broader sense. The four access points of the conceptual framework are interlinked by four key topics representing the main scientific challenges that need to be addressed, i.e.: identifying and prioritising hazardous chemicals at different scales; selecting relevant and efficient abatement options; providing regulatory support for chemicals management; predicting and prioritising future chemical risks. The conceptual framework aligns current challenges in the safe production and use of chemicals. The current state of knowledge and implementation
Islam, Woman and Trumps of the Identity Imaginary
Directory of Open Access Journals (Sweden)
Lahcen Haddad
2006-04-01
Full Text Available At a time when women are beginning to assert their rights as citizens, one also observes a clear tendency to highlight signs and meanings that denote a referent that advocates not for submission but for abnegation with respect to the social order. This self-denial refers to a certain acute sense of belonging and also to a strong need for salvation, both social and metaphysical. There is the temptation to explain this paradox by affirming, with FatimaMernissi, that the veil, which for her symbolises the clearest sign of the identity trump, is the balancing entry that women find themselves obliged to contribute in order to pay for a citizenship right, in a society that is undoubtedly patriarchal but post-traditional. This hypothesis of Mernissi’s is limited when it is a matter of explaining how women become active agents of an ideology that, if it does not alienate them, at least justifies the inequalitythat turns them into subordinates in a social order that they do not control. On the other hand, if the concept of the price of the right of citizenship is merely hypothetical, are we not perhaps seeing the acts of pious women in terms of unfortunate conscience, when it isconsidered that the sign which means piety or identity, or both at the same time, is found at the antipodes of the “true interests” of women? Would it not be more prudent, from the methodological and analytical point of view, to see in these signs a certain search for imaginary solutions (in the other world, in identity membership to real problems of poverty, precariousness and vulnerability? The fact that these solutions are imaginary does not mean that they are not real for these women, that they constitute solutions that they imagine, that they desire, that they dream of achieving. The sign of identity or piety is a decision, the objective of which is to activate the process in order to achieve that dream. But, at the same time, it is a political sign, not because it
Morsunbul, Umit; Crocetti, Elisabetta; Cok, Figen; Meeus, Wim
2014-08-01
The purpose of this study was to evaluate the factor structure and convergent validity of the Turkish version of the Utrecht-Management of Identity Commitments Scale (U-MICS). Participants were 1201 (59.6% females) youth aged between 12 and 24 years (M(age) = 17.53 years, SD(age) = 3.25). Results indicated that the three-factor model consisting of commitment, in-depth exploration, and reconsideration of commitment provided a very good fit to the data and applied equally well to boys and girls as well as to three age groups (early adolescents, middle adolescents, and emerging adults). Significant relations between identity processes and self-concept clarity, personality, internalizing and externalizing problem behaviors, and parental relationships supported convergent validity. Thus, the Turkish version of U-MICS is a reliable tool for assessing identity in Turkish-speaking respondents. Copyright © 2014 The Foundation for Professionals in Services for Adolescents. Published by Elsevier Ltd. All rights reserved.
Analytic study of nonperturbative solutions in open string field theory
International Nuclear Information System (INIS)
Bars, I.; Kishimoto, I.; Matsuo, Y.
2003-01-01
We propose an analytic framework to study the nonperturbative solutions of Witten's open string field theory. The method is based on the Moyal star formulation where the kinetic term can be split into two parts. The first one describes the spectrum of two identical half strings which are independent from each other. The second one, which we call midpoint correction, shifts the half string spectrum to that of the standard open string. We show that the nonlinear equation of motion of string field theory is exactly solvable at zeroth order in the midpoint correction. An infinite number of solutions are classified in terms of projection operators. Among them, there exists only one stable solution which is identical to the standard butterfly state. We include the effect of the midpoint correction around each exact zeroth order solution as a perturbation expansion which can be formally summed to the complete exact solution
Exercisers' identities and exercise dependence: the mediating effect of exercise commitment.
Lu, Frank Jing-Horng; Hsu, Eva Ya-Wen; Wang, Junn-Ming; Huang, Mei-Yao; Chang, Jo-Ning; Wang, Chien-Hsin
2012-10-01
The purpose of this study was to examine the associations of exercise identity, exercise commitment, exercise dependence, and, particularly, the mediating effects of exercise commitment on the relationship between exercise identity and exercise dependence. 253 Taiwanese regular exercisers completed measures, including the Exercise Dependence Scale-Revised, the Exercise Identity Scale, the Exercise Commitment Scale, and the Godin Leisure Time Exercise Questionnaire. Results showed that exercise identity, exercise dependence, and two types of exercise commitment were moderately to highly correlated. Furthermore, structural equation modelling indicated that a "have to" commitment partially mediated the relationship between exercise identity and exercise dependence. Based on the mediating role of a "have to" commitment, the findings are particularly informative to exercise instructors and for exercise program managers.
Directory of Open Access Journals (Sweden)
Anişoara CIOCAN
2010-05-01
Full Text Available The development of steel industry is subject to solve major problems arising from industry-nature relationship, strictly targeted on pollution control and protection of natural resources and energy. In this paper we discussed about the management of solid waste generated by an integrated steelwork located near a major urban area and the adopted solutions for the reduction of environmental impact. There are summarized technical solutions that are currently applied and were proposed some solutions that can be applied in accordance with the environmental legislations. The new solutions are proposed for integrated management of solid wastes in accordance with: the exact quantification (quantitative, qualitative and the generation sources of emissions and solid wastes; controlled storage; minimization of the wastes and its harmfulness; transformation of the wastes into valuable by-products used directly by the company in a subsequent process, or by external down-stream user.
End-To-End Solution for Integrated Workload and Data Management using glideinWMS and Globus Online
CERN. Geneva
2012-01-01
Grid computing has enabled scientific communities to effectively share computing resources distributed over many independent sites. Several such communities, or Virtual Organizations (VO), in the Open Science Grid and the European Grid Infrastructure use the glideinWMS system to run complex application work-flows. GlideinWMS is a pilot-based workload management system (WMS) that creates on demand, dynamically-sized overlay Condor batch system on Grid resources. While the WMS addresses the management of compute resources, however, data management in the Grid is still the responsibility of the VO. In general, large VOs have resources to develop complex custom solutions, while small VOs would rather push this responsibility to the infrastructure. The latter requires a tight integration of the WMS and the data management layers, an approach still not common in modern Grids. In this paper we describe a solution developed to address this shortcoming in the context of Center for Enabling Distributed Petascale Scienc...
International Nuclear Information System (INIS)
Deniau, Helene; Gagner, Laurent; Gendreau, Francoise; Presta, Anne
2006-01-01
With major projects ongoing or being planned, and also with the daily management of radioactive waste from nuclear facilities, the role of transport and/or storage packaging has been often overlooked. Indeed, the packaging development process and transport solutions implemented are a key part of the waste management challenge: protection of people and environment. During over four decades, the AREVA Group has developed a complete and coherent system for the transport of waste produced by nuclear industries. The transport solutions integrate the factors to consider, as industrial transportation needs, various waste forms, associated hazards and current regulations. Thus, COGEMA LOGISTICS has designed, licensed and manufactured a large number of different transport, storage and dual purpose cask models for residues and all kinds of radioactive wastes. The present paper proposes to illustrate how a company acting both as a cask designer and a carrier is key to the waste management issue and how it can support the waste management policy of nuclear producers through their operational choices. We will focus on the COGEMA LOGISTICS technical solutions implemented to guarantee safe and secure transportation and storage solutions. We will describe different aspects of the cask design process, insisting on how it enables to fulfill both customer needs and regulation requirements. We will also mention the associated services developed by the AREVA Business Unit Logistics (COGEMA LOGISTICS, TRANSNUCLEAR, MAINCO, and LEMARECHAL CELESTIN) in order to manage transportation of liquid and solid waste towards interim or final storage sites. The paper has the following contents: About radioactive waste; - Radioactive waste classification; - High level activity waste and long-lived intermediate level waste; - Long-lived low level waste; - Short-lived low- and intermediate level waste; - Very low level waste; - The radioactive waste in nuclear fuel cycle; - Packaging design and
An infinite number of stationary soliton solutions to the five-dimensional vacuum Einstein equation
International Nuclear Information System (INIS)
Azuma, Takahiro; Koikawa, Takao
2006-01-01
We obtain an infinite number of soliton solutions to the five-dimensional stationary Einstein equation with axial symmetry by using the inverse scattering method. We start with the five-dimensional Minkowski space as a seed metric to obtain these solutions. The solutions are characterized by two soliton numbers and a constant appearing in the normalization factor which is related to a coordinate condition. We show that the (2, 0)-soliton solution is identical to the Myers-Perry solution with one angular momentum variable by imposing a condition on the relation between parameters. We also show that the (2, 2)-soliton solution is different from the black ring solution discovered by Emparan and Reall, although one component of the two metrics can be identical. (author)
Revisiting the two formulations of Bianchi identities and their implications on moduli stabilization
Energy Technology Data Exchange (ETDEWEB)
Shukla, Pramod [ICTP - International Centre for Theoretical Physics,Strada Costiera 11, Trieste 34151 (Italy)
2016-08-24
In the context of non-geometric type II orientifold compactifications, there have been two formulations for representing the various NS-NS Bianchi-identities. In the first formulation, the standard three-form flux (H{sub 3}), the geometric flux (ω) and the non-geometric fluxes (Q and R) are expressed by using the real six-dimensional indices (e.g. H{sub ijk},ω{sub ij}{sup k},Q{sub i}{sup jk} and R{sup ijk}), and this formulation has been heavily utilized for simplifying the scalar potentials in toroidal-orientifolds. On the other hand, relevant for the studies beyond toroidal backgrounds, a second formulation is utilized in which all flux components are written in terms of various involutively even/odd (2,1)- and (1,1)-cohomologies of the complex threefold. In the lights of recent model building interests and some observations made in http://dx.doi.org/10.1088/1126-6708/2007/08/043, http://dx.doi.org/10.1088/1126-6708/2007/12/058, in this article, we revisit two most commonly studied toroidal examples in detail to illustrate that the present forms of these two formulations are not completely equivalent. To demonstrate the same, we translate all the identities of the first formulation into cohomology ingredients, and after a tedious reshuffling of the subsequent constraints, interestingly we find that all the identities of the second formulation are embedded into the first formulation which has some additional constraints. In addition, we look for the possible solutions of these Bianchi identities in a detailed analysis, and we find that some solutions can reduce the size of scalar potential very significantly, and in some cases are too strong to break the no-scale structure completely. Finally, we also comment on the influence of imposing some of the solutions of Bianchi identities in studying moduli stabilization.
Crocetti, Elisabetta; Cieciuch, Jan; Gao, Cheng-Hai; Klimstra, Theo; Lin, Ching-Ling; Matos, Paula Mena; Morsünbül, Ümit; Negru, Oana; Sugimura, Kazumi; Zimmermann, Grégoire; Meeus, Wim
2015-12-01
The purpose of this study was to examine the psychometric properties of the Utrecht-Management of Identity Commitments Scale (U-MICS), a self-report measure aimed at assessing identity processes of commitment, in-depth exploration, and reconsideration of commitment. We tested its factor structure in university students from a large array of cultural contexts, including 10 nations located in Europe (i.e., Italy, the Netherlands, Poland, Portugal, Romania, and Switzerland), Middle East (i.e., Turkey), and Asia (i.e., China, Japan, and Taiwan). Furthermore, we tested national and gender measurement invariance. Participants were 6,118 (63.2% females) university students aged from 18 to 25 years (Mage = 20.91 years). Results indicated that the three-factor structure of the U-MICS fitted well in the total sample, in each national group, and in gender groups. Furthermore, national and gender measurement invariance were established. Thus, the U-MICS can be fruitfully applied to study identity in university students from various Western and non-Western contexts. © The Author(s) 2015.
Gender identity and the management of the transgender patient: a guide for non-specialists.
Joseph, Albert; Cliffe, Charlotte; Hillyard, Miriam; Majeed, Azeem
2017-04-01
In this review, we introduce the topic of transgender medicine, aimed at the non-specialist clinician working in the UK. Appropriate terminology is provided alongside practical advice on how to appropriately care for transgender people. We offer a brief theoretical discussion on transgenderism and consider how it relates to broader understandings of both gender and disease. In respect to epidemiology, while it is difficult to assess the exact size of the transgender population in the UK, population surveys suggest a prevalence of between 0.2 and 0.6% in adults, with rates of referrals to gender identity clinics in the UK increasing yearly. We outline the legal framework that protects the rights of transgender people, showing that is not legal for physicians to deny transgender people access to services based on their personal beliefs. Being transgender is often, although not always, associated with gender dysphoria, a potentially disabling condition in which the discordance between a person's natal sex (that assigned to them at birth) and gender identity results in distress, with high associated rates of self-harm, suicidality and functional impairment. We show that gender reassignment can be a safe and effective treatment for gender dysphoria with counselling, exogenous hormones and surgery being the mainstay of treatment. The role of the general practitioner in the management of transgender patients is discussed and we consider whether hormone therapy should be initiated in primary care in the absence of specialist advice, as is suggested by recent General Medical Council guidance.
Identity, identity politics, and neoliberalism
Directory of Open Access Journals (Sweden)
Wrenn Mary
2014-01-01
Full Text Available With the intensification of neoliberalism, it is useful to examine how some individuals might cope with the irrationality of the system. Neoliberalism cloaks the execution of the corporate agenda behind rhetorical manipulation that advocates for limited government. The corollary absence of government involvement on behalf of the citizenry writ large disarms the means of social redress for the individual. Democracy funded and fueled by corporate power thereby disenfranchises the individual, provoking some to search for empowerment through identity politics. The argument set forth suggests that individuals construct, reinforce, or escalate allegiance to identities as a coping mechanism, some of which manifest in violent identity politics.
Finell, Eerika; Seppälä, Tuija; Suoninen, Eero
2018-07-01
Suffering from a contested illness poses a serious threat to one's identity. We analyzed the rhetorical identity management strategies respondents used when depicting their health problems and lives in the context of observed or suspected indoor air (IA) problems in the workplace. The data consisted of essays collected by the Finnish Literature Society. We used discourse-oriented methods to interpret a variety of language uses in the construction of identity strategies. Six strategies were identified: respondents described themselves as normal and good citizens with strong characters, and as IA sufferers who received acknowledge from others, offered positive meanings to their in-group, and demanded recognition. These identity strategies located on two continua: (a) individual- and collective-level strategies and (b) dissolved and emphasized (sub)category boundaries. The practical conclusion is that professionals should be aware of these complex coping strategies when aiming to interact effectively with people suffering from contested illnesses.
Munthe, John; Brorström-Lundén, Eva; Rahmberg, Magnus; Posthuma, Leo; Altenburger, Rolf; Brack, Werner; Bunke, Dirk; Engelen, Guy; Gawlik, Bernd Manfred; van Gils, Jos; Herráez, David López; Rydberg, Tomas; Slobodnik, Jaroslav; van Wezel, Annemarie
2017-01-01
Background: This paper describes a conceptual framework for solutions-focused management of chemical contaminants built on novel and systematic approaches for identifying, quantifying and reducing risks of these substances. Methods: The conceptual framework was developed in interaction with
The Process of Identity Work: Negotiating a Work Identity
Crafford, A.; Adams, B.G.; Saayman, T.; Vinkenburg, C.J.; Jansen, P.G.W.; Roodt, G.
2015-01-01
Identity work is an important process in negotiating, regulating and maintaining a coherent sense of self-(identity). In this chapter we discuss how identity work is particularly useful in establishing a work identity. The crux of the discussion in this chapter is based on the qualitative phase of
E-dating, identity and HIV prevention: theorising sexualities, risk and network society.
Davis, Mark; Hart, Graham; Bolding, Graham; Sherr, Lorraine; Elford, Jonathan
2006-05-01
This paper addresses how London gay men use the internet to meet sexual partners, or for e-dating. Based on qualitative interviews conducted face-to-face or via the internet, this research develops an account of how information technologies mediate the negotiation of identity and risk in connection with sexual practice. E-dating itself is a bricolage, or heterogeneous DIY practice of internet-based-communication (IBC). A central aspect of IBC is "filtering" in and out prospective e-dates based on the images and texts used to depict sexual identities. Interpretations and depictions of personal HIV risk management approaches in IBC are framed by the meanings of different identities, such as the stigma associated with being HIV positive. This paper argues for a sexualities perspective in a theory of network society. Further, HIV prevention in e-dating can potentially be addressed by considering the interplay of the HIV prevention imperatives associated with different HIV serostatus identities. There is a case for encouraging more explicit IBC about risk in e-dating and incorporating the expertise of e-daters in prevention activity. There is also a need to rethink traditional conceptions of risk management in HIV prevention to make space for the risk management bricolage of network society.
Fielding, Kelly S; Hornsey, Matthew J
2016-01-01
Environmental challenges are often marked by an intergroup dimension. Political conservatives and progressives are divided on their beliefs about climate change, farmers come into conflict with scientists and environmentalists over water allocation or species protection, and communities oppose big business and mining companies that threaten their local environment. These intergroup tensions are reminders of the powerful influence social contexts and group memberships can have on attitudes, beliefs, and actions relating to climate change and the environment more broadly. In this paper, we use social identity theory to help describe and explain these processes. We review literature showing, how conceiving of oneself in terms of a particular social identity influences our environmental attitudes and behaviors, how relations between groups can impact on environmental outcomes, and how the content of social identities can direct group members to act in more or less pro-environmental ways. We discuss the similarities and differences between the social identity approach to these phenomena and related theories, such as cultural cognition theory, the theory of planned behavior, and value-belief-norm theory. Importantly, we also advance social-identity based strategies to foster more sustainable environmental attitudes and behaviors. Although this theoretical approach can provide important insights and potential solutions, more research is needed to build the empirical base, especially in relation to testing social identity solutions.
Fielding, Kelly S.; Hornsey, Matthew J.
2016-01-01
Environmental challenges are often marked by an intergroup dimension. Political conservatives and progressives are divided on their beliefs about climate change, farmers come into conflict with scientists and environmentalists over water allocation or species protection, and communities oppose big business and mining companies that threaten their local environment. These intergroup tensions are reminders of the powerful influence social contexts and group memberships can have on attitudes, beliefs, and actions relating to climate change and the environment more broadly. In this paper, we use social identity theory to help describe and explain these processes. We review literature showing, how conceiving of oneself in terms of a particular social identity influences our environmental attitudes and behaviors, how relations between groups can impact on environmental outcomes, and how the content of social identities can direct group members to act in more or less pro-environmental ways. We discuss the similarities and differences between the social identity approach to these phenomena and related theories, such as cultural cognition theory, the theory of planned behavior, and value-belief-norm theory. Importantly, we also advance social-identity based strategies to foster more sustainable environmental attitudes and behaviors. Although this theoretical approach can provide important insights and potential solutions, more research is needed to build the empirical base, especially in relation to testing social identity solutions. PMID:26903924
Directory of Open Access Journals (Sweden)
Kelly Shanene Fielding
2016-02-01
Full Text Available Environmental challenges are often marked by an intergroup dimension. Political conservatives and progressives are divided on their beliefs about climate change, farmers come into conflict with scientists and environmentalists over water allocation or species protection, and communities oppose big business and mining companies that threaten their local environment. These intergroup tensions are reminders of the powerful influence social contexts and group memberships can have on attitudes, beliefs, and actions relating to climate change and the environment more broadly. In this paper we use social identity theory to help describe and explain these processes. We review literature showing how conceiving of oneself in terms of a particular social identity influences our environmental attitudes and behaviors, how relations between groups can impact on environmental outcomes, and how the content of social identities can direct group members to act in more or less pro-environmental ways. We discuss the similarities and differences between the social identity approach to these phenomena and related theories such as cultural cognition theory, the theory of planned behavior and value-belief-norm theory. Importantly, we also advance social-identity based strategies to foster more sustainable environmental attitudes and behaviors. Although this theoretical approach can provide important insights and potential solutions, more research is needed to build the empirical base, especially in relation to testing social identity solutions.
Forest management in a Pukhtun community : the Constructions of Identities
Southwold-Llewellyn, S.
2006-01-01
Description: How do we recognize and understand the interactions between nature, nationness, and nationalism? How is nature appropriated by politics when asserting identity, interests, and rights? Drawing from South Asia¿s varying regions, the essays in this pathbreaking volume answer such
2010-01-01
...; service provider arrangements; significant incidents involving identity theft and management's response... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Interagency Guidelines on Identity Theft...—Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation Section 571.90 of this part...
2010-01-01
... arrangements; significant incidents involving identity theft and management's response; and recommendations for... 12 Banks and Banking 3 2010-01-01 2010-01-01 false Interagency Guidelines on Identity Theft..., App. J Appendix J to Part 222—Interagency Guidelines on Identity Theft Detection, Prevention, and...
2010-01-01
... arrangements; significant incidents involving identity theft and management's response; and recommendations for... 12 Banks and Banking 1 2010-01-01 2010-01-01 false Interagency Guidelines on Identity Theft... on Identity Theft Detection, Prevention, and Mitigation Section 41.90 of this part requires each...
An exploratory Q study of corporate brand identity elements ...
African Journals Online (AJOL)
kirstam
2014-12-09
Dec 9, 2014 ... brand, creative marketing, effective management and administration ... (brand identity) and how the customers perceive them (brand image) .... corporate brand, which focuses on values, relationships and culture, fulfils a more.
A targeted management of the nutrient solution in a soilless tomato crop according to plant needs
Directory of Open Access Journals (Sweden)
Angelo eSignore
2016-03-01
Full Text Available The adoption of closed soilless systems is useful in minimizing the environmental impact of the greenhouse crops. Instead, a significant problem in closed soilless systems is represented by the accumulation of ions in the recycled nutrient solution, in particular the unabsorbed or poorly absorbed ones. To overcome such problem, we: 1 studied the effect of several values of the electrical conductivity (EC of nutrient solution in a NFT (Nutrient Film Technique system on a cherry type tomato crop, and 2 define a NS (called recovery solution, based on the concept of uptake concentration and transpiration-biomass ratio, that fits the real needs of the plant with respect to water and nutrients. Three levels of EC set point (SP, above which the NS was completely replaced (SP5, SP7.5, and SP10 for the EC limit of 5, 7.5 and 10 dS m-1, respectively, were established. The SP10 treatment yield was not different from other treatments, and it allowed a better quality of the berries (for dry matter and total soluble solids and higher environmental sustainability due to a lower discharge of total nutrients into the environment (37 and 59% with respect to SP7.5 and SP5, respectively.The recovery solution used in the second trial allowed a more punctual NS management, by adapting to the real needs of the crop. Moreover, it allowed a lesser amount of water and nutrients to be discharged into the environment and a better use of brackish water, due to a more accurate management of the EC of the NS. The targeted management, based on transpiration-biomass ratio, indicates that, in some stages of the plant cycle, the nutrient solution used can be diluted, in order to save water and nutrients. With such management a closed cycle can be realized without affecting the yield, but improving the quality of the tomato berries.
Job satisfaction and gender identity of women managers and non-managers.
Lipińska-Grobelny, Agnieszka; Wasiak, Katarzyna
2010-01-01
This work investigates different cognitive aspects of job satisfaction (co-workers, supervisor, job content, working facilities, organization and management, opportunities for development, income), positive and negative affect at work and their relations to gender role orientation of women occupying managerial and non-managerial positions. The sample of 122 women (60 managers and 62 non-managers) completed a battery of instruments such as: the Bem Sex Role Inventory, the Job Description Inventory by Neuberger and Allerbeck and the Job Affect Scale by Brief et al. Most women managers represented androgynous and masculine types, while women non-managers belonged to androgynous and feminine types. Moreover, women with various degrees of sex-typing showed positive and negative affect at work. The most satisfied with income were masculine women managers, the least--feminine women non-managers. These results may be applied in designing of motivational instruments to enhance job effectiveness and to eliminate unproductive behaviours such as absenteeism, high staff turnover.
Directory of Open Access Journals (Sweden)
Greg Wolfond
2017-10-01
Full Text Available Blockchain-based solutions have the potential to make government operations more efficient and improve the delivery of services in the public and private sectors. Identity verification and authentication technologies, as one of the applications of blockchain-based solutions – and the focus of our own efforts at SecureKey Technologies – have been critical components in service delivery in both sectors due to their power to increase trust between citizens and the services they access. To convert trust into solid value added, identities must be validated through highly-reliable technologies, such as blockchain, that have the capacity to reduce cost and fraud and to simplify the experience for customers while also keeping out the bad actors. With identities migrating to digital platforms, organizations and citizens need to be able to transact with reduced friction even as more counter-bound services move to online delivery. In this article, drawing on our own experiences with an ecosystem approach to digital identity, we describe the potential value of using blockchain technology to address the present and future challenges of identity verification and authentication within a Canadian context.
DEFF Research Database (Denmark)
Musaeus, Peter
2015-01-01
Purpose: To examine philosophical stances underpinning medical identity and assess the conceptual relationship between physician, medical practice and culture. Argument: Medical identity is about the ideals and moral positions that physicians take when justifying themselves. Medical identity...... hedonistic versus sentimentalist approaches to medical identity. The sociocultural philosophical analysis of medical identity can shed light on what it means conceptually for a physician to harbor beliefs associated with him/her being taken to be an autonomous professional. It is important because it touches...... on the meaning of being a compassionate, good and skilled physician, making its relevance to person-centered medicine self-evident. Conclusion: Medical identity should be analyzed with reference to literature, philosophy and medical practice in order for the physician to exercise a reflective position...
Iterative solution to the optimal poison management problem in pressurized water reactors
International Nuclear Information System (INIS)
Colletti, J.P.; Levine, S.H.; Lewis, J.B.
1983-01-01
A new method for solving the optimal poison management problem for a multiregion pressurized water reactor has been developed. The optimization objective is to maximize the end-of-cycle core excess reactivity for any given beginning-of-cycle fuel loading. The problem is treated as an optimal control problem with the region burnup and control absorber concentrations acting as the state and control variables, respectively. Constraints are placed on the power peaking, soluble boron concentration, and control absorber concentrations. The solution method consists of successive relinearizations of the system equations resulting in a sequence of nonlinear programming problems whose solutions converge to the desired optimal control solution. Application of the method to several test problems based on a simplified three-region reactor suggests a bang-bang optimal control strategy with the peak power location switching between the inner and outer regions of the core and the critical soluble boron concentration as low as possible throughout the cycle
Reducing the risk of cyber threats in utilities through log management
Energy Technology Data Exchange (ETDEWEB)
Patnaik, A. [ArcSight, Cupertino, CA (United States)
2010-01-15
Electrical blackouts caused by terrorists hacking into targeted control systems have already occurred in Brazil. A patchwork of security tools is needed to reduce potential threats. The continuous collection and analysis of data is also needed to detect cyber threats. The real time correlation of logs across all systems, applications and users is needed to ensure the reliability and security of the power grid. Solutions must also integrate well with identity management sources in order to prevent remote access account hijacking. Effective log management can be used to detect threats and reduce the risk of power outages. 1 fig.
2010-01-01
... arrangements; significant incidents involving identity theft and management's response; and recommendations for... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Interagency Guidelines on Identity Theft... THE FAIR CREDIT REPORTING ACT IDENTITY THEFT RULES Pt. 681, App. A Appendix A to Part 681—Interagency...
Management of chronic pain in osteoporosis: challenges and solutions
Directory of Open Access Journals (Sweden)
Paolucci T
2016-04-01
Full Text Available Teresa Paolucci,* Vincenzo Maria Saraceni, Giulia Piccinini* Physical Medicine and Rehabilitation Unit, Azienda Policlinico Umberto I, Rome, Italy *These authors contributed equally to this work Abstract: Osteoporosis (OP is a pathological condition that manifests clinically as pain, fractures, and physical disability, resulting in the loss of independence and the need for long-term care. Chronic pain is a multidimensional experience with sensory, affective, and cognitive aspects. Age can affect each of these dimensions and the pain that is experienced. In OP, chronic pain appears to have sensory characteristics and properties of nociceptive and neuropathic pain. Its evaluation and treatment thus require a holistic approach that focuses on the specific characteristics of this population. Pain management must therefore include pharmacological approaches, physiotherapy interventions, educational measures, and, in rare cases, surgical treatment. Most rehabilitative treatments in the management of patients with OP do not evaluate pain or physical function, and there is no consensus on the effects of rehabilitation therapy on back pain or quality of life in women with OP. Pharmacological treatment of pain in patients with OP is usually insufficient. The management of chronic pain in patients with OP is complicated with regard to its diagnosis, the search for reversible secondary causes, the efficacy and duration of oral bisphosphonates, and the function of calcium and vitamin D. The aim of this review is to discuss the most appropriate solutions in the management of chronic pain in OP. Keywords: physical therapy, exercise, pharmacological treatment, posture and balance
The Question of Identity in Gary Shteyngart’s Little Failure
Directory of Open Access Journals (Sweden)
Maior Enikő
2015-12-01
Full Text Available In my paper I want to deal with the question of identity and Gary Shteyngart’s last novel, Little Failure (2014. The novel is a memoir that deals with young Gary’s struggle as an individual of Russian Jewish origins trying to accommodate himself to the American way of life. America with its multicultural and multiethnic environment puts the immigrant Gary in a very sensitive position. He does not know how to deal with African Americans; shall he avoid them or rim away? Shall he befriend Asian colleagues or not? Are Jewish friends more valuable than others? These are the questions that Gary Shteyngart has to answer and find his own voice. The protagonist of the novel under discussion tries to find his identity which is in continuous change. He tries to figure out in a world filled with cultural, racial and urban conflicts his own identity from the perspective of a former immigrant and as a member of a minority group. The task of my paper is to show how the question of identity has changed and what solution Shteyngart’s novel can offer for the protagonist in the process of identity formation.
Social identity in the construction industry
DEFF Research Database (Denmark)
Andersen, L. P.; Karlsen, I. L.; Kines, P.
2015-01-01
sites. The organization of work fosters social identification within a crew, resulting in distancing from and social categorization of site management. Social identification influences safety behaviour in the crews, where worksite safety rules may meet resistance. Future safety initiatives at large...... construction sites should take into account the dynamics of social identification and categorization in the implementation of safety measures, e.g. by creating an alternative organization of work, thus making it easier for a work crew to identify themselves with the site management. Site/crew managers should...... consider how safety can become a salient and valued group norm by altering the social structure at the sites and/or fostering dual social identity....
Some exact solutions to the translation-invariant N-body problem
International Nuclear Information System (INIS)
Hall, R.L.
1978-01-01
It is shown that Schroedinger's equation for a translation-invariant system consisting of N particles with arbitrary masses interacting via Hooke's law pair potentials with the same coupling constant can be solved exactly; explicit solutions are found for the case N = 3. Exact solutions are also found explicitly for the translation-invariant problem in which a particle with mass m 0 interacts with N identical particles of mass m 1 via Hooke's law pair potential with coupling constant k 0 2 , and the identical particles interact with each other via Hooke's law pair potentials with coupling constant k 1 2 . The latter solution provides a basis problem for an energy lower-bound method for translation-invariant atom-like systems. (author)
Verifying Parentage and Confirming Identity in Blackberry with a Fingerprinting Set
Parentage and identity confirmation is an important aspect of clonally propagated crops outcrossing. Potential errors resulting misidentification include off-type pollination events, labeling errors, or sports of clones. DNA fingerprinting sets are an excellent solution to quickly identify off-type ...
WEBSITES AS A PROMOTING TOOL FOR THE IDENTITY OF TOURISTIC DESTINATIONS
Directory of Open Access Journals (Sweden)
Francisco Vicente Sales Melo
2013-06-01
Full Text Available Since its advent, the Internet has become an important tool for tourism. Furthermore, some studies tend to indicate that this may contribute directly to the process of identity formation of a tourism destination. Thus, this paper investigates how websites can help in promoting the identity of tourist destinations on the Internet. The study is characterized as exploratory qualitative in nature, which is constituted from a desk research. It was possible to verify that the website is a key means for managing the identity of a tourist destination, as this can help visitors to form a positive image of the place being visited from the information that makes up the identity of the destination.
Dispersion approach to anomalies in the axial-vector Ward-Takahashi identities
Energy Technology Data Exchange (ETDEWEB)
Nishijima, K. Sasaki, R. (Tokyo Univ. (Japan). Dept. of Physic)
1975-01-01
On the basis of dispersion relations and unitarity anomalous Ward-Takahashi identities for the axial-vector current are derived in quantum electrodynamics. In this derivation use of divergent unrenormalized expressions is intentionally avoided, and only finite renormalized expressions are employed from the start. The origin of the anormalies is attributed to a mismatch of the subtraction conditions present in the naive Ward-Takahashi identities. The resulting anomalous Ward-Takahashi identities are valid in every order of the perturbation expansion and can be cast in the form of an operator equation. In the course of this derivation we encounter the problem of how to regularize operator products and a possible solution of this problem is provided in terms of subtraction conditions.
Dispersion approach to anomalies in the axial-vector Ward-Takahashi identities
International Nuclear Information System (INIS)
Nishijima, Kazuhiko; Sasaki, Ryu
1975-01-01
On the basis of dispersion relations and unitarity anomalous Ward-Takahashi identities for the axial-vector current are derived in quantum electrodynamics. In this derivation use of divergent unrenormalized expressions is intentionally avoided, and only finite renormalized expressions are employed from the start. The origin of the anormalies is attributed to a mismatch of the subtraction conditions present in the naive Ward-Takahashi identities. The resulting anomalous Ward-Takahashi identities are valid in every order of the perturbation expansion and can be cast in the form of an operator equation. In the course of this derivation we encounter the problem of how to regularize operator products and a possible solution of this problem is provided in terms of subtraction conditions. (auth.)
Strategic asset management in municipalities: challenges, and solutions to enhance performance
CSIR Research Space (South Africa)
Wall, K
2008-08-01
Full Text Available : “Strategic public sector asset management” Johannesburg, 25 August 2008 Strategic asset management in municipalities: challenges, and solutions to enhance performance Sequence of presentation: 1. Introduction 2. Integrated delivery process – weakest... link – report card 3. Legislation and strategies 4. Basic IAM cycle – and needs 5. What should be done 6. To conclude Chapter 1: If below par, why (short version)? What should be done (summary)? Reasons for below-par performance: • The priority...
Directory of Open Access Journals (Sweden)
Đurić Jelena
2010-01-01
Full Text Available The article considers paradoxical nature of identity that emerges from: 1 the very concept of identity whose abstract generality unites various and even opposite features; 2 the processual nature of reality that is easier to express in the poetical metaphors or abstract principles than in unambiguous conceptual networks; 3 the oppose relationship between being and knowledge, mind and matter, subject and object, self and personality. Entangled in the labyrinth which evade efforts to be conceptually defined, the modern thinking of identity moves towards abandoning the idea of “self” on behalf of the “ego” and towards the misapprehension of identity as being identical. This corresponds to the “time of the lost spirit” stretched between the simultaneous need to find an identity and to give it up.
Madera, Juan M; King, Eden B; Hebl, Michelle R
2012-04-01
In the current article, we explored whether manifesting or suppressing an identity (race/ethnicity, gender, age, religion, sexual orientation, or disability) at work is related to perceived discrimination, job satisfaction, and turnover intentions. Participants included 211 working adults who completed an online survey. The results showed that efforts to suppress a group identity were positively (and behavioral manifestations of group identity negatively) related to perceived discrimination, which predicted job satisfaction and turnover intentions. These results suggest that diverse employees actively manage their nonwork identities while at work and that these identity management strategies have important consequences. PsycINFO Database Record (c) 2012 APA, all rights reserved.
Social identity change: shifts in social identity during adolescence.
Tanti, Chris; Stukas, Arthur A; Halloran, Michael J; Foddy, Margaret
2011-06-01
This study investigated the proposition that adolescence involves significant shifts in social identity as a function of changes in social context and cognitive style. Using an experimental design, we primed either peer or gender identity with a sample of 380 early- (12-13 years), mid- (15-16 years), and late-adolescents (18-20 years) and then measured the effect of the prime on self-stereotyping and ingroup favouritism. The findings showed significant differences in social identity across adolescent groups, in that social identity effects were relatively strong in early- and late-adolescents, particularly when peer group identity rather than gender identity was salient. While these effects were consistent with the experience of change in educational social context, differences in cognitive style were only weakly related to ingroup favouritism. The implications of the findings for theory and future research on social identity during adolescence are discussed. Crown Copyright © 2010. Published by Elsevier Ltd. All rights reserved.
Abu-Rayya, Hisham M; Abu-Rayya, Maram H; White, Fiona A; Walker, Richard
2018-04-01
This study examined the comparative roles of biculturalism, ego identity, and religious identity in the adaptation of Australian adolescent Muslims. A total of 504 high school Muslim students studying at high schools in metropolitan Sydney and Melbourne, Australia, took part in this study which required them to complete a self-report questionnaire. Analyses indicated that adolescent Muslims' achieved religious identity seems to play a more important role in shaping their psychological and socio-cultural adaptation compared to adolescents' achieved bicultural identity. Adolescents' achieved ego identity tended also to play a greater role in their psychological and socio-cultural adaptation than achieved bicultural identity. The relationships between the three identities and negative indicators of psychological adaptation were consistently indifferent. Based on these findings, we propose that the three identity-based forces-bicultural identity development, religious identity attainment, and ego identity formation-be amalgamated into one framework in order for researchers to more accurately examine the adaptation of Australian adolescent Muslims.
Slavnov-Taylor identities for primordial perturbations
International Nuclear Information System (INIS)
Berezhiani, Lasha; Khoury, Justin
2014-01-01
Correlation functions of adiabatic modes in cosmology are constrained by an infinite number of consistency relations, which relate N + 1-point correlation functions with a soft-momentum scalar or tensor mode to a symmetry transformation on N-point correlation functions of hard-momentum modes. They constrain, at each order n, the q n behavior of the soft limits. In this paper we show that all consistency relations derive from a single, master identity, which follows from the Slavnov-Taylor identity for spatial diffeomorphisms. This master identity is valid at any value of q and therefore goes beyond the soft limit. By differentiating it n times with respect to the soft momentum, we recover the consistency relations at each q order. Our approach underscores the role of spatial diffeomorphism invariance at the root of cosmological consistency relations. It also offers new insights on the necessary conditions for their validity: a physical contribution to the vertex functional must satisfy certain analyticity properties in the soft limit in order for the consistency relations to hold. For standard inflationary models, this is equivalent to requiring that mode functions have constant growing-mode solutions. For more exotic models in which modes do not ''freeze'' in the usual sense, the analyticity requirement offers an unambiguous criterion
Uniqueness of Solutions to Schrödinger Equations on Complex ...
Indian Academy of Sciences (India)
2006-09-05
simple Lie groups. We show that if the initial data is a bi-invariant function that has sufficient decay and the solution has sufficient decay at another fixed value of time, then the solution has to be identically zero for all time.
Directory of Open Access Journals (Sweden)
Pingping He
2018-04-01
Full Text Available A series of carbon aerogels were synthesized by polycondensation of resorcinol and formaldehyde, and their structure was adjusted by managing solution concentration of precursors. Carbon aerogels were characterized by X-ray diffraction (XRD, Raman, Fourier transform infrared spectroscopy (FTIR, N2 adsorption/desorption and scanning electron microscope (SEM technologies. It was found that the pore structure and morphology of carbon aerogels can be efficiently manipulated by managing solution concentration. The relative micropore volume of carbon aerogels, defined by Vmicro/Vtol, first increased and then decreased with the increase of solution concentration, leading to the same trend of CO2 adsorption capacity. Specifically, the CA-45 (the solution concentration of precursors is 45 wt% sample had the highest CO2 adsorption capacity (83.71 cm3/g and the highest selectivity of CO2/N2 (53 at 1 bar and 0 °C.
Swiss identity smells like chocolate: Social identity shapes olfactory judgments
Coppin, Géraldine; Pool, Eva; Delplanque, Sylvain; Oud, Bastiaan; Margot, Christian; Sander, David; Van Bavel, Jay J.
2016-01-01
There is extensive evidence that social identities can shape people’s attitudes and behavior, but what about sensory judgments? We examined the possibility that social identity concerns may also shape the judgment of non-social properties—namely, olfactory judgment. In two experiments, we presented Swiss and non-Swiss participants with the odor of chocolate, for which Switzerland is world-famous, and a control odor (popcorn). Swiss participants primed with Swiss identity reported the odor of chocolate (but not popcorn) as more intense than non-Swiss participants (Experiments 1 and 2) and than Swiss participants primed with individual identity or not primed (Experiment 2). The self-reported intensity of chocolate smell tended to increase as identity accessibility increased—but only among Swiss participants (Experiment 1). These results suggest that identity priming can counter-act classic sensory habituation effects, allowing identity-relevant smells to maintain their intensity after repeated presentations. This suggests that social identity dynamically influences sensory judgment. We discuss the potential implications for models of social identity and chemosensory perception. PMID:27725715
Swiss identity smells like chocolate: Social identity shapes olfactory judgments.
Coppin, Géraldine; Pool, Eva; Delplanque, Sylvain; Oud, Bastiaan; Margot, Christian; Sander, David; Van Bavel, Jay J
2016-10-11
There is extensive evidence that social identities can shape people's attitudes and behavior, but what about sensory judgments? We examined the possibility that social identity concerns may also shape the judgment of non-social properties-namely, olfactory judgment. In two experiments, we presented Swiss and non-Swiss participants with the odor of chocolate, for which Switzerland is world-famous, and a control odor (popcorn). Swiss participants primed with Swiss identity reported the odor of chocolate (but not popcorn) as more intense than non-Swiss participants (Experiments 1 and 2) and than Swiss participants primed with individual identity or not primed (Experiment 2). The self-reported intensity of chocolate smell tended to increase as identity accessibility increased-but only among Swiss participants (Experiment 1). These results suggest that identity priming can counter-act classic sensory habituation effects, allowing identity-relevant smells to maintain their intensity after repeated presentations. This suggests that social identity dynamically influences sensory judgment. We discuss the potential implications for models of social identity and chemosensory perception.
International Nuclear Information System (INIS)
Ghannadi, M.; Asgharizadeh, F.; Assadi, M. R.
2008-01-01
Radioactive waste is produced in the generation of nuclear power and the production and use of radioactive materials in the industry, research, and medicine. The nuclear waste management facilities need to perform a safety assessment in order to ensure the safety of a facility. Nuclear safety assessment is a structured and systematic way of examining a proposed facility, process, operation and activity. In nuclear waste management point of view, safety assessment is a process which is used to evaluate the safety of radioactive waste management and disposal facilities. In this regard the International Atomic Energy Agency is planed to implement an international project with cooperation of some member states. The Safety Assessment Driving Radioactive Waste Management Solutions Project is an international programme of work to examine international approaches to safety assessment in aspects of p redisposal r adioactive waste management, including waste conditioning and storage. This study is described the rationale, common aspects, scope, objectives, work plan and anticipated outcomes of the project with refer to International Atomic Energy Agency's documents, such as International Atomic Energy Agency's Safety Standards, as well as the Safety Assessment Driving Radioactive Waste Management Solutions project reports
Concentrated Polymer Solutions are Different from Melts: Role of Entanglement Molecular Weight
DEFF Research Database (Denmark)
Huang, Qian; Mednova, Olga; Rasmussen, Henrik K.
2013-01-01
We compare viscoelastic properties of several polystyrene solutions and melts with the same number of entanglements. It is demonstrated that the modulus and time can be shifted such that the linear viscoelastic properties are identical provided the number of entanglements are identical. However...
New two- and three-parameter solutions of the MPST equation
International Nuclear Information System (INIS)
Krori, K.D.; Chaudhury, T.; Bhattacharjee, R.
1981-01-01
Some new two- and three-parameter solutions of the MPST (Misra et al. Phys. Rev.; D7:1587 (1973)) equation are presented. All the three-parameter solutions are physical in the sense of asymptotic flatness. The simplest member of the three-parameter series of solutions is identical with a three-parameter solution of the static Einstein-Maxwell equations recently discovered by Bonnor (J. Phys. A.; 12:853 (1979)). (author)
Identity, gender and teaching English in Japan
Nagatomo, Diane Hawley
2016-01-01
How do teachers, who have chosen to settle down in one country, manage the difficulties of living and teaching English in that country? This book answers this question by investigating the personal and professional identity development of ten Western women with Japanese spouses who teach English in various educational contexts in Japan.
Juggling identities of rheumatoid arthritis, motherhood and paid work
DEFF Research Database (Denmark)
Feddersen, Helle; Mechlenborg Kristiansen, Tine; Andersen, Pernille Tanggaard
2018-01-01
professionals have an important role to play in investigating possible ways for the individual to maintain employment or return to work. Living with rheumatoid arthritis and being a paid worker challenge women's role performance and thereby their identification as mothers. Therefore, rehabilitation......PURPOSE: To explore how women with rheumatoid arthritis manage their illness, motherhood, and work life. METHODS: A constructivist, grounded theory approach based on individual interviews and participant observations with 20 women with rheumatoid arthritis who participated in work life and had......-sided act; (3) Living with rheumatoid arthritis as an identity? Paid work, motherhood, and illness are linked to the women's social identities. The women construct and change their identities in interactions with children, partners, other parents, colleagues, and employers. CONCLUSION: The women attribute...
Co-Leadership – A Management Solution for Integrated Health and Social Care
Directory of Open Access Journals (Sweden)
Charlotte Klinga
2016-05-01
Full Text Available Introduction: Co-leadership has been identified as one approach to meet the managerial challenges of integrated services, but research on the topic is limited. In the present study, co-leadership, practised by pairs of managers – each manager representing one of the two principal organizations in integrated health and social care services – was explored. Aim: To investigate co-leadership in integrated health and social care, identify essential preconditions in fulfilling the management assignment, its operationalization and impact on provision of sustainable integration of health and social care. Method: Interviews with eight managers exercising co-leadership were analysed using directed content analysis. Respondent validation was conducted through additional interviews with the same managers. Results: Key contextual preconditions were an organization-wide model supporting co-leadership and co-location of services. Perception of the management role as a collective activity, continuous communication and lack of prestige were essential personal and interpersonal preconditions. In daily practice, office sharing, being able to give and take and support each other contributed to provision of sustainable integration of health and social care. Conclusion and discussion: Co-leadership promoted robust management by providing broader competence, continuous learning and joint responsibility for services. Integrated health and social care services should consider employing co-leadership as a managerial solution to achieve sustainability.
Real-time management solutions for a smart polygeneration microgrid
International Nuclear Information System (INIS)
Rossi, Iacopo; Banta, Larry; Cuneo, Alessandra; Ferrari, Mario Luigi; Traverso, Alberto Nicola; Traverso, Alberto
2016-01-01
Highlights: • Different management systems are compared on the basis of experimental results. • Target system is a real smart microgrid composed by different co-generative systems. • A complex demand scenario was used to test decision-making of the controllers. • Experimental results were analyzed from both economic and reliability viewpoints. - Abstract: In recent years, many different concepts to manage smart distributed systems were proposed and solutions developed. Smart grids and the increasing influence of renewable sources on energy production lead to concerns about grid stability and load balance. Combined Heat and Power (CHP) generators coupled with solar or other renewable sources offer the opportunity to satisfy both electric and thermal power economically. Both electric and thermal demand and supply change continuously, and sources such as solar and wind are not dispatchable or accurately predictable. At the same time, it is essential to use the most efficient and cost effective sources to satisfy the demand. This problem has been studied at the University of Genoa (UNIGE), Italy, using different generators and energy storage device that can supply both electric and thermal energy to consumer buildings. Here the problem is formulated as a constrained Multi-Input Multi-Output (MIMO) problem with sometimes conflicting requests that must be satisfied. The results come from experiments carried out on the test rig located at the Innovative Energy System Laboratories (IESL) of the Thermochemical Power Group (TPG) of UNIGE. This paper compares three different control approaches to manage the distributed generation system: Simplified Management Control (SMC), Model Predictive Control (MPC), and Multi-Commodity Matcher (MCM). Control systems and their control actions are evaluated through economic and performance key indicators.
General solution of linear vector supersymmetry
International Nuclear Information System (INIS)
Blasi, Alberto; Maggiore, Nicola
2007-01-01
We give the general solution of the Ward identity for the linear vector supersymmetry which characterizes all topological models. Such a solution, whose expression is quite compact and simple, greatly simplifies the study of theories displaying a supersymmetric algebraic structure, reducing to a few lines the proof of their possible finiteness. In particular, the cohomology technology, usually involved for the quantum extension of these theories, is completely bypassed. The case of Chern-Simons theory is taken as an example
Medical management of epileptic seizures: challenges and solutions
Directory of Open Access Journals (Sweden)
Sarma AK
2016-02-01
Full Text Available Anand K Sarma,1 Nabil Khandker,1 Lisa Kurczewski,2 Gretchen M Brophy2 1Department of Neurology, 2Departments of Pharmacotherapy & Outcomes Science and Neurosurgery, Virginia Commonwealth University, Richmond, VA, USA Abstract: Epilepsy is one of the most common neurologic illnesses. This condition afflicts 2.9 million adults and children in the US, leading to an economic impact amounting to $15.5 billion. Despite the significant burden epilepsy places on the population, it is not very well understood. As this understanding continues to evolve, it is important for clinicians to stay up to date with the latest advances to provide the best care for patients. In the last 20 years, the US Food and Drug Administration has approved 15 new antiepileptic drugs (AEDs, with many more currently in development. Other advances have been achieved in terms of diagnostic modalities like electroencephalography technology, treatment devices like vagal nerve and deep-brain stimulators, novel alternate routes of drug administration, and improvement in surgical techniques. Specific patient populations, such as the pregnant, elderly, those with HIV/AIDS, and those with psychiatric illness, present their own unique challenges, with AED side effects, drug interactions, and medical–psychiatric comorbidities adding to the conundrum. The purpose of this article is to review the latest literature guiding the management of acute epileptic seizures, focusing on the current challenges across different practice settings, and it discusses studies in various patient populations, including the pregnant, geriatric, those with HIV/AIDS, comatose, psychiatric, and “pseudoseizure” patients, and offers possible evidence-based solutions or the expert opinion of the authors. Also included is information on newer AEDs, routes of administration, and significant AED-related drug-interaction tables. This review has tried to address only some of these issues that any practitioner who
Managing Digital Identity on Twitter: The Case of School Administrators
Cho, Vincent; Jimerson, Jo Beth
2017-01-01
What does it mean to be and to act like a school leader online? Although many school leaders might be comfortable navigating issues of identity in face-to-face environments, online environments may present new and unprecedented challenges. These challenges may range from concerns about privacy and surveillance to questions about how best to…
DEFF Research Database (Denmark)
Bech-Larsen, Tino; Esbjerg, Lars; Grunert, Klaus G.
2007-01-01
on consumers' self-identities. The second part explored the role of food and beverage products in the construction of self-identities. The final part focused on the construction of brand identity for Supermalt. Findings - The article provides information on the self-identities constructed by Afro......-Caribbean informants. The food and beverage consumption of informants reflects their mixed cultural identity. The brand identity Supermalt appears to be malleable, with ample room for consumer co-construction. Perceptions of brand identity differ markedly among informants, who are all able to construct Supermalt......Purpose - The objective of this article is to conduct a case study of the Supermalt brand of malt beer, which has become the preferred beverage of Afro-Caribbean consumers in Brixton on a very limited marketing budget. Design/methodology/approach - The article uses the concepts of personal identity...
DEFF Research Database (Denmark)
Mackinney-Valentin, Maria
We dress to communicate who we are, or who we would like others to think we are, telling seductive fashion narratives through our adornment. Yet, today, fashion has been democratized through high-low collaborations, social media and real-time fashion mediation, complicating the basic dynamic...... of identity displays, and creating tension between personal statements and social performances. Fashioning Identity explores how this tension is performed through fashion production and consumption,by examining a diverse series of case studies - from ninety-year old fashion icons to the paradoxical rebellion...... by readdressing Fred Davis' seminal concept of 'identity ambivalence' in Fashion, Culture and Identity (1992), Mackinney-Valentin argues that we are in an epoch of 'status ambivalence', in which fashioning one's own identity has become increasingly complicated....
Management of radioactive waste in France-policy, issues, and solutions
International Nuclear Information System (INIS)
Tamborini, J.
1996-01-01
The French nuclear industry has conducted a study to define a policy and an organization to deal with the waste generated from nuclear power plants, the fuel cycle industries, and medicine, research, and other industrial nuclear applications. This has resulted in the introduction of an organization which, by appropriate and responsible management, can guarantee to protect people and the environment while ensuring industrial effectiveness. The body in charge of waste management in France is the National Radioactive Waste Management Agency (ANDRA) created in 1979. The French policy is based on waste classification and the related solutions for the evacuation of these wastes. High-level and long-lived waste management is regulated by a law passed Dec 30, 1991. The law outlines the research program to be conducted. Three main research objectives are prescribed: 1. reduction of the waste volumes and toxicity (partitioning and transmutation); 2. assessment of the waste isolation properties of deep geologic formations by underground research laboratories; 3. development of solidification processes and storage techniques for long-term interim storage in near-surface facilities. This research will be implemented within a 15 yr period. At present, applications are submitted to the authorities for the construction of underground research laboratories. At the end of this period, reports will be submitted to parliament. It will have to choose among various options. The construction of a deep geologic repository, if this option is chosen, will need the passage of a new law
A singular one-parameter family of solutions in cubic superstring field theory
Energy Technology Data Exchange (ETDEWEB)
Arroyo, E. Aldo [Centro de Ciências Naturais e Humanas, Universidade Federal do ABC, Santo André, 09210-170 São Paulo, SP (Brazil)
2016-05-03
Performing a gauge transformation of a simple identity-like solution of superstring field theory, we construct a one-parameter family of solutions, and by evaluating the energy associated to this family, we show that for most of the values of the parameter the solution represents the tachyon vacuum, except for two isolated singular points where the solution becomes the perturbative vacuum and the half brane solution.
Review on Malaysian Rail Transit Operation and Management System: Issues and Solution in Integration
Masirin, Mohd Idrus Mohd; Salin, Aminah Mohd; Zainorabidin, Adnan; Martin, David; Samsuddin, Norshakina
2017-08-01
In any context, operation and management of transportation systems are key issues which may affect both life quality and economic development. In large urban agglomerations, an efficient public transportation system may help abate the negative externalities of private car use such as congestion, air and noise pollution, accident and fuel consumption, without excessively penalizing user travel times or zone accessibility. Thus, this study is conducted to appraise the Malaysian rural rail transit operation and management system, which are considered important as there are many issues and solution in integration of the services that need to be tackled more conscientiously. The purpose of this paper is to describe some of the most important issues on integration of services and rail transit system in Malaysian and how to solve or reduce these problems and conflicts. In this paper, it consists of the historical development of rail transit construction in Malaysia. This paper also attempts to identify the important issues related to rail transit services and integration in Malaysian rural rail operation and management system. Comparison is also conducted with other countries such as UK, France, and Japan. Finally, a critical analysis is presented in this paper by looking at the possible application for future Malaysian rail transit operation system and management, especially focusing on enhancing the quality of Malaysian rural rail transit. In conclusion, this paper is expected to successfully review and appraise the existing Malaysian rural rail transit operation and management system pertaining to issues & solution in integration. It is also hoped that reformation or transformation of present service delivery quality of the rail transit operation and management will enable Malaysia to succeed in transforming Malaysian transportation system to greater heights.
Ambiguous genitalia, gender-identity problems, and sex reassignment.
Dittmann, R W
1998-01-01
This article discusses general issues with regard to gender-identity problems, sex reassignment, and clinical management in patients with ambiguous genitalia, based on a detailed case history of a patient with penile agenesis who has been followed more than 20 years. After initial uncertainty, the patient began to grow up as a boy, lived from the fourth year of life as a girl and young woman, and lived from late puberty on as a man. Over his lifetime he experienced extensive corrective surgery plus hormonal substitution therapy. Pre- and perinatal hormonal conditions, phenomenology of the genitalia, sex of rearing, timing of sex reassignment and corrective surgery, for example, appear to be important components for the development of gender-role behavior, gender identity, and sexual orientation of intersex patients. Findings and retrospective considerations for this patient suggest the need for careful differential activities in diagnostic workup, approaches to sex assignment and possible reassignment, and the clinical management of patients and families.
DEFF Research Database (Denmark)
Petersen, Lars Axel
In this paper I will go through a catalogue of examples of contexts in which the term civil identity is currently used, ranging from the formal and technical process of linking a set of administrative and other events to an individual biological person by means of identity cards, fingerprints, iris...... of Israel to Luce Irigaray's Feminist agenda of elaborating gender specific civil identities. My intention is to investigate whether these different employments of 'civil identity' point towards a common, and fairly well defined object field asking questions of contemporary relevance to the philosophy...
Identical Twin Primigravid Sisters -Spontaneous Labour and ...
African Journals Online (AJOL)
We report 2 cases of identical twin sisters, the older sibling getting married 14 months earlier but both got pregnant for their first child at about the same time and were managed by the same Obstetrician and fell into spontaneous labour within a few hours of each other. Both were delivered by emergency caesarean section ...
Quality risk management during pharmaceutical ‘good distribution practices’ – A plausible solution
Directory of Open Access Journals (Sweden)
Nirmal Kumar
2018-06-01
Full Text Available Quality of medicinal product is an important facet throughout lifecycle owing to its importance as acceptance criteria at customer’s end. Drugs regulatory agencies have issued guidelines for quality risk evaluation, mitigation and review management. Quality risk management has become an integral part of quality management system at manufacturing plants. Procedures for deviation control, change control, investigations of market complaints and batch failures are dealt with the principle of quality risk management at the manufacturing facility. The exploratory study shows a dearth of research on quality risk management during supply chain operation, however, a few study has been carried out by keeping financial risk into account. This study addresses the gap in literature on quality risk management during supply chain operations. There are cases of unresolved customer complaints and batch failures originated due to inadequacies during distribution of pharmaceutical products. In absence of established quality risk management system during product shipment, there is no effective preventive plan related to risk factors. A corollary of manufacturing quality risk management has been drawn to the distribution of pharmaceutical products through this study. The quality risk management during pharmaceutical distribution may be useful to avoid market complaints, drug recalls, and regulatory actions. This study produces one unique model solution for industry professionals and policymakers opening a scope to reduce the product rejection thereby paving the way for substantial business growth.
Identity and identity conflict in the workplace
K.E. Horton (Kate); P.S. Bayerl (Saskia); G. Belschak-Jacobs (Gabriele)
2014-01-01
textabstractAs individuals, we define ourselves according to various characteristics that include our values and beliefs. This gives us our identity. As organisations become increasingly complex, understanding the concept of identity conflict may mean the difference between success and failure.
Morris, Michael W; Carranza, Erica; Fox, Craig R
2008-11-01
Four studies investigated whether activating a social identity can lead group members to choose options that are labeled in words associated with that identity. When political identities were made salient, Republicans (but not Democrats) became more likely to choose the gamble or investment option labeled "conservative." This shift did not occur in a condition in which the same options were unlabeled. Thus, the mechanism underlying the effect appears to be not activated identity-related values prioritizing low risk, but rather activated identity-related language (the group label "conservative"). Indeed, when political identities were salient, Republicans favored options labeled "conservative" regardless of whether the options were low or high risk. Finally, requiring participants to explain the label "conservative" before making their choice did not diminish the effect, which suggests that it does not merely reflect inattention to content or construct accessibility. We discuss the implications of these results for the literatures on identity, priming, choice, politics, and marketing.
Directory of Open Access Journals (Sweden)
Niki Amiri
2017-06-01
Full Text Available Architecture and urbanism in Iran during the contemporary period have been influenced by inside and outside social and economic developments. These changes are so fundamental that have caused many challenges and styles in architectural space of Iran, both in conceptual and physical space. Indeed, objectified areas caused by intellectual movements such as: West-oriented, economic-oriented can be known as the root of identity crisis for Iranian cities from the architecture and urbanism perspective. The most important weaknesses and problems in today Iranian architecture include: lack of attention to cultural infrastructures, capability of integrating all cultural spheres, paying too much attention to the economic aspects in the constructions, lack of commitment in some of the builders, weakness of the management system and monitoring in the field of architecture and urbanism, lack of explanation of Iranian traditional architecture patterns, consumable culture of Iranian society, lack of attention to the potential of traditional tissues to integrate with today's architecture and more. While this article is presenting and checking the list of factors affecting this process - identity crisis - attempts to seek its causes and ultimately preparing the ground for achieving overcoming solutions of this crisis.
How does Accreditation Influence the Dynamics of Organizational Identity for Business Schools?
DEFF Research Database (Denmark)
Lejeune, Christophe; Schultz, Majken; Vas, Alain
2015-01-01
approach offer a comprehensive theoretical framework. Second, we illustrate it with a European Management School’s accreditation failure and its management of change related to the accreditation goal. We elaborate and discuss a model titled “Identity Change through Accreditation” (ICA). Finally, we suggest...
Strategies and solutions in the temporary management of spent fuel in Spain
International Nuclear Information System (INIS)
Martinez Abad, J. E.; Rivera, M. I.
2009-01-01
The basic strategy for the spent fuel and HLW management contemplated in the Sixth General Radioactive Waste Plan focused on the centralised interim storage of spent fuel, based on proved dry storage system technologies, over the time periods required until their definitive or very long term management. Specially, the solution proposed as the most suitable for the Spanish case is the construction of a centralised interim spent fuel and HLW storage facility (ATC) for which as site is being searched. Until it becomes in operation, the interim spent fuel storage will be safety performed in the NPP reracked spent fuel pools or individual ISFSI constructed in the NPP site, in those cases additional storage capacity is required. (Author) 22 refs
Importance of waste composition for Life Cycle Assessment of waste management solutions
DEFF Research Database (Denmark)
Bisinella, Valentina; Götze, Ramona; Conradsen, Knut
2017-01-01
The composition of waste materials has fundamental influence on environmental emissions associated with waste treatment, recycling and disposal, and may play an important role also for the Life Cycle Assessment (LCA) of waste management solutions. However, very few assessments include effects...... of the waste composition and waste LCAs often rely on poorly justified data from secondary sources. This study systematically quantifiesy the influence and uncertainty on LCA results associated with selection of waste composition data. Three archetypal waste management scenarios were modelled with the waste...... LCA model EASETECH based on detailed waste composition data from the literature. The influence from waste composition data on the LCA results was quantified with a step-wise Global Sensitivity Analysis (GSA) approach involving contribution, sensitivity, uncertainty and discernibility analyses...
Identity crisis: user perspectives on multiplicity and control in federated identitymanagement
DEFF Research Database (Denmark)
Howard, Steve; Satchell, C; Shanks, G
2009-01-01
Federated identity management systems synthesise complex and fragmented user information into a single entity. Literature from the provider’s perspective notes this integration extends many benefits to the end user and the privileges provided by digital identity authentication schemes have been...... well documented from this perspective. Less explored are the perceptions of federation from the user’s perspective. This study reports an empirical user study that examines the relationship between identity and technology using contextual interviews, focus groups and cultural probes. It emerges...... that while current federated systems satisfy user needs by allowing the construction of multiple digital data sets that are moored to a central identifier, they fail to provide the user with control over the capability to act in the ‘hatch’, ‘match’ and ‘dispatch’ phases of the digital identity lifecycle...
Teacher educators: their identities, sub-identities and implications for professional development
Swennen, J.M.H.; Jones, K.; Volman, M.L.L.
2010-01-01
In this article we address the question: 'What sub-identities of teacher educators emerge from the research literature about teacher educators and what are the implications of the sub-identities for the professional development of teacher educators?' Like other professional identities, the identity
Directory of Open Access Journals (Sweden)
Mohamed Hesham Madbouly Hussein Khalil
2017-11-01
Full Text Available Heritage communities in Egypt have continuously developed to sustain a history of millenniums. Developments have been focused on sustaining the physical heritage such as buildings and cities, yet ignoring the intangible heritage such as stories, memories and traditions of people. The results are deterioration of the developed physical heritage as a natural response of ignorance. Architectural Design Firms (ADFs are responsible for developing innovative solutions that translate intangible heritage into sustainable projects. Such solutions require talented architects who are in need of being treated in a talented manner. Therefore, this paper aims to investigate the role of Talent Management (TM as a novel approach for developing innovative solutions for Egyptian heritage communities’ development. In order to achieve this aim, a qualitative approach based on (1 literature review is used to investigate heritage development, creative industries, ADFs, motivation and TM and (2 a case study is collected and analysed to study the relationship between TM and intangible heritage preservation.
Navigating Identities: Subtle and Public Agency of Bicultural Gay Youth.
Cense, Marianne; Ganzevoort, R Ruard
2017-01-01
Young people who discover their sexual attraction to people of the same sex often go through a period of ambivalence or distress, especially when they grow up in an environment that condemns homosexuality. The Dutch sociopolitical context makes the expression of same-sex desires among those with non-Dutch roots even more complicated and risky, as prevailing schemes of interpretation render the two identities incompatible. This study explores the expressions of same-sex desires and identities as well as the different forms of agency of bicultural gay youth. In-depth interviews with 14 young adults reveal how young people negotiate bicultural identities in Dutch society that brings to the fore complexities in managing diverse sexual identities and strong religious and cultural affiliations in tandem. Their strategies have the effect of questioning dominant discourses and transcend the oppositional dichotomy between sexual and ethnic forms of sociocultural otherness.
DEFF Research Database (Denmark)
Gerstrøm, Anna
2015-01-01
Purpose: The purpose of this paper is to explore how legacy organizational identity and death relate to each other and, thereby, contribute to closing the gap in knowledge on organizational identity constructions in times of death. Design/methodology/approach: The paper opted for an exploratory....../value: This paper addresses an apparent gap in the literature on identity and death; exploring identity narratives in a bankrupted bank, the paper considers constructions of legacy organizational identities in times of disruptive death....
Directory of Open Access Journals (Sweden)
Nancy J. Knauer
2013-09-01
Full Text Available This paper engages the unspoken fourth dimension of intersectionality—time. Using the construction of lesbian, gay, bisexual, and transgender (LGBT identities as an example, it establishes that identity, as it is lived and experienced, is not only multivalent, but also historically contingent. It then raises a number of points regarding the temporal locality of identity—the influence of time on issues of identity and understanding, its implications for legal interventions, social movement building, and paradigms of progressive change. As the title suggests, the paper asks us to consider the frame of identity over time.
Vocational Identity and Ego Identity Status in Korean Nursing Students
Directory of Open Access Journals (Sweden)
Hyun-Young Koo, PhD, RN
2016-03-01
Conclusions: These findings show that nursing students in identity achievement status have secure and clear vocational identities. Further longitudinal and qualitative studies are needed to find out if identity formation among nursing students changes with age.
Alternative Framings, Countervailing Visions: Locating the "P" in Professional Identity Formation.
Hafferty, Frederic W; Michalec, Barret; Martimianakis, Maria Athina Tina; Tilburt, Jon C
2016-02-01
Professional identity formation in medical education is referenced increasingly as an object for educational reform. The authors introduce core concepts from two largely untapped literatures on identity and formation, contrasting framings on occupational preparation from within the organizational socialization literature with issues of socialization and professional acculturation from a military sciences perspective.The organizational sciences literature emphasizes socializing a workforce to "fit in," raising questions about how organization values might clash with core professional values concerning patient primary and social justice. The military literature, in turn, advances the notions of professional identity as a collective property, and that a particular social other (the public) must participate in shaping the group's identity as a profession.The authors extrapolate from these reviews that the training of physicians-as-professionals, and thus issues of socialization and identity formation, require intentionality and specificity around these contrasting issues. In turn, they argue that medical educators must attend to socializing trainees to a professional group identity while at the same time producing health care professionals who retain the capacity to resist the bureaucratic application of standardized solutions to contemporary problems. Educators must thus strive to identify the skills, knowledge, and attitudes necessary that will allow physicians-qua-professionals to function as a quasi-subversive work force and to disrupt the very system that helped to shape their identity, so that they may fulfill their mission to their patients.
International Nuclear Information System (INIS)
Devchand, Chandrashekar; Fairlie, David; Nuyts, Jean; Weingart, Gregor
2009-01-01
The ternary commutator or ternutator, defined as the alternating sum of the product of three operators, has recently drawn much attention as an interesting structure generalizing the commutator. The ternutator satisfies cubic identities analogous to the quadratic Jacobi identity for the commutator. We present various forms of these identities and discuss the possibility of using them to define ternary algebras.
Collaborative eHealth Meets Security: Privacy-Enhancing Patient Profile Management.
Sanchez-Guerrero, Rosa; Mendoza, Florina Almenarez; Diaz-Sanchez, Daniel; Cabarcos, Patricia Arias; Lopez, Andres Marin
2017-11-01
Collaborative healthcare environments offer potential benefits, including enhancing the healthcare quality delivered to patients and reducing costs. As a direct consequence, sharing of electronic health records (EHRs) among healthcare providers has experienced a noteworthy growth in the last years, since it enables physicians to remotely monitor patients' health and enables individuals to manage their own health data more easily. However, these scenarios face significant challenges regarding security and privacy of the extremely sensitive information contained in EHRs. Thus, a flexible, efficient, and standards-based solution is indispensable to guarantee selective identity information disclosure and preserve patient's privacy. We propose a privacy-aware profile management approach that empowers the patient role, enabling him to bring together various healthcare providers as well as user-generated claims into an unique credential. User profiles are represented through an adaptive Merkle Tree, for which we formalize the underlying mathematical model. Furthermore, performance of the proposed solution is empirically validated through simulation experiments.
Ethnic Identity in Everyday Life: The Influence of Identity Development Status
Yip, Tiffany
2013-01-01
The current study explores the intersection of ethnic identity development and significance in a sample of 354 diverse adolescents (mean age 14). Adolescents completed surveys 5 times a day for 1 week. Cluster analyses revealed 4 identity clusters: diffused, foreclosed, moratorium, achieved. Achieved adolescents reported the highest levels of identity salience across situations, followed by moratorium adolescents. Achieved and moratorium adolescents also reported a positive association between identity salience and private regard. For foreclosed and achieved adolescents reporting low levels of centrality, identity salience was associated with lower private regard. For foreclosed and achieved adolescents reporting high levels of centrality, identity salience was associated with higher private regard. PMID:23581701
Directory of Open Access Journals (Sweden)
A. M. RIAD
2009-10-01
Full Text Available To help universities achieve their goals, it is important to align managerial functionalities side by side with educational aspects. Universities consume University Management Information Systems (UMIS to handle managerial aspects as they do with Learning Management Systems (LMS to achieve learning objectives. UMIS advances LMS by decades and has reached stable and mature consistency level. LMS is the newly acquired solution in Universities; compared to UMIS, and so adopting LMSs in universities can be achieved via three different deployment approaches. First approach believes in LMS ability to replace UMIS and performing its functionalities. Second approach presents the idea of extending UMIS to include LMS functionalities. Third approach arises from the shortages of the two proposed approaches and present integration between both as the appropriate deployment approach. Service Oriented Architecture (SOA is a design pattern that can be used as a suitable architectural solution to align UMIS and LMS. SOA can be utilized in universities to overcome some of information systems’ challenges like the integration between UMIS and LMS. This paper presents the current situation at Mansoura University; Egypt, presents integration as the most suitable solution, and evaluates three different implementation techniques: Dynamic Query, Stored Procedure, and Web services. Evaluation concludes that though SOA enhanced many different aspects of both UMIS and LMS; and consequently university overall. It is not recommended to adopt SOA via Web services as the building unit of the system, but as the interdisciplinary interface between systems.
Phase-space quantum mechanics study of two identical particles in an external oscillatory potential
Nieto, Luis M.; Gadella, Manuel
1993-01-01
This simple example is used to show how the formalism of Moyal works when it is applied to systems of identical particles. The symmetric and antisymmetric Moyal propagators are evaluated for this case; from them, the correct energy levels of energy are obtained, as well as the Wigner functions for the symmetric and antisymmetric states of the two identical particle system. Finally, the solution of the Bloch equation is straightforwardly obtained from the expressions of the Moyal propagators.
Regional identity and the renewal of spatial administrative structures: The case of Podolia, Ukraine
Directory of Open Access Journals (Sweden)
Melnychuk Anatoliy
2018-03-01
Full Text Available The relationships between territorial identities and administrative divisions are investigated in this article, in an attempt to reveal the possible role of territorial identity as an instrument for administrative-territorial reform. The study focuses on Podolia – a key Ukrainian geographical region with a long and complicated history. A survey of residents living throughout the region showed that the majority of respondents had developed strong identification with both historical regions and modern administrative units. The close interaction between “old” and “new” identities, however, caused their mutual alterations, especially in changes in the perceived borders of historical regions. This means that the “old” historical identities have strong persistence but simultaneously survive constant transformations, incorporating the so-called “thin” elements, which fits the concept of dynamic regional institutionalisation and the formation of hybrid territorial identities. Consequently, although territorial identity may be used to make administrative territorial units more comprehensible for people, the development of modern administrative units based on hybrid identities, which include both thick and thin elements, may be another feasible solution that involves stakeholders in regional development.
2017-03-01
solution, sufficient charge carriers to counteract the applied but not cause ion- lock , are energy densities at their maximum. For the salt identities and...OF ANODIZED TITANIUM- BASED NOVEL PARADIGM SUPERCAPACITORS: IMPACT OF SALT IDENTITY AND FREQUENCY ON DIELECTRIC VALUES, POWER, AND ENERGY DENSITIES...SUBTITLE CHARACTERIZATION OF ANODIZED TITANIUM-BASED NOVEL PARADIGM SUPERCAPACITORS: IMPACT OF SALT IDENTITY AND FREQUENCY ON DIELECTRIC VALUES, POWER
Directory of Open Access Journals (Sweden)
J. Carmona-Murillo
2017-01-01
Full Text Available Mobile Internet data traffic has experienced an exponential growth over the last few years due to the rise of demanding multimedia content and the increasing number of mobile devices. Seamless mobility support at the IP level is envisioned as a key architectural requirement in order to deal with the ever-increasing demand for data and to efficiently utilize a plethora of different wireless access networks. Current efforts from both industry and academia aim to evolve the mobility management protocols towards a more distributed operation to tackle shortcomings of fully centralized approaches. However, distributed solutions face several challenges that can result in lower performance which might affect real-time and multimedia applications. In this paper, we conduct an analytical and simulated evaluation of the main centralized and proposed Distributed Mobility Management (DMM solutions. Our results show that, in some scenarios, when users move at high speed and/or when the mobile node is running long-lasting applications, the DMM approaches incur high signaling cost and long handover latency.
Directory of Open Access Journals (Sweden)
TUTUNEA MIHAELA FILOFTEIA
2012-09-01
Full Text Available The integration of activities, the business processes as well as their optimization, bring the perspective of profitable growth and create significant and competitive advantages in any company. The adoption of some ERP integrated software solutions, from SMEs’ perspective, must be considered as a very important management decision in medium and long term. ERP solutions, along with the transparent and optimized management of all internal processes, also offer an intra and inter companies collaborative platform, which allows a rapid expansion of activities towards e- business and mobile-business environments. This material introduces ERP solutions for SMEs from commercial offer and open source perspective; the results of comparative analysis of the solutions on the specific market, can be an useful aid to the management of the companies, in making the decision to integrate business processes, using ERP as a support.
DEFF Research Database (Denmark)
Pors, Justine Grønbæk
2012-01-01
This article studies how a political organization begins to experiment with its identity. By use of an empirical case of the Danish Ministry of Education, I examine how a political organization supplements its identity of a legislating power with identities of a supervisor, beacon and facilitator...... of evaluation in public schools. Out of a paralysis emerge new innovative strategies of governing, aimed at the schools’ self-governing capacity. The identity of the political system thus emerges as oscillations between different roles of a legislating power and a supervising coach. The case study suggests...... that a society of experimentalism is emerging. Thus, the relevant object of study is no longer organizational identity, but the experiments with different identities that modern organizations are performing....
Performance through transformation of identity in road cycling
DEFF Research Database (Denmark)
Stilling Olesen, Jesper
In this paper I investigate the relationship between skills and identity of an elite cyclist, who during his career managed to become a big star in the professional peleton. This is Jesper Skibby. The paper is based on a reading of his autobiography "Forstå mig ret." In the book he reproduces his...
Directory of Open Access Journals (Sweden)
Cosmin Toth
2014-12-01
Full Text Available My main purpose in this paper is to illustrate how participants in a research interview occasioned conversation make use of two important discursive devices, namely: small stories and interpretative repertoires for positioning during interaction in order to foster certain situated identity claims. The premises I work with in this paper are that identity is a practiced situated accomplishment, that small stories are devices employed frequently for identity work that are no less important than extended autobiographical expositions, and that interpretative repertoires are practiced ways of speaking that allow participants to manage their positions in certain ways. Moreover, I will try to show that positioning by means of small stories and interpretative repertoires should be understood in direct relation with the identities and other membership categories made relevant by the interviewer. When participants’ positions are conflicting or miss-aligned, a more pronounced identity work is employed on the part of the interviewee, sustained by certain repertoires’ management strategies: alternation, nuancing, or rejecting certain repertoires.
Manager, Information Management and Application Solutions ...
International Development Research Centre (IDRC) Digital Library (Canada)
... specialists who provide information management services that support the mandate and ... sets objectives and goals and timetable; monitors and evaluates the quality, ... Represents the division and Centre at internal and external meetings, ...
Smartphone User Identity Verification Using Gait Characteristics
Directory of Open Access Journals (Sweden)
Robertas Damaševičius
2016-09-01
Full Text Available Smartphone-based biometrics offers a wide range of possible solutions, which could be used to authenticate users and thus to provide an extra level of security and theft prevention. We propose a method for positive identification of smartphone user’s identity using user’s gait characteristics captured by embedded smartphone sensors (gyroscopes, accelerometers. The method is based on the application of the Random Projections method for feature dimensionality reduction to just two dimensions. Then, a probability distribution function (PDF of derived features is calculated, which is compared against known user PDF. The Jaccard distance is used to evaluate distance between two distributions, and the decision is taken based on thresholding. The results for subject recognition are at an acceptable level: we have achieved a grand mean Equal Error Rate (ERR for subject identification of 5.7% (using the USC-HAD dataset. Our findings represent a step towards improving the performance of gait-based user identity verification technologies.
AdS solutions through transgression
International Nuclear Information System (INIS)
Donos, Aristomenis; Gauntlett, Jerome P.; Kim, Nakwoo
2008-01-01
We present new classes of explicit supersymmetric AdS 3 solutions of type IIB supergravity with non-vanishing five-form flux and AdS 2 solutions of D = 11 supergravity with electric four-form flux. The former are dual to two-dimensional SCFTs with (0,2) supersymmetry and the latter to supersymmetric quantum mechanics with two supercharges. We also investigate more general classes of AdS 3 solutions of type IIB supergravity and AdS 2 solutions of D = 11 supergravity which in addition have non-vanishing three-form flux and magnetic four-form flux, respectively. The construction of these more general solutions makes essential use of the Chern-Simons or 'transgression' terms in the Bianchi identity or the equation of motion of the field strengths in the supergravity theories. We construct infinite new classes of explicit examples and for some of the type IIB solutions determine the central charge of the dual SCFTs. The type IIB solutions with non-vanishing three-form flux that we construct include a two-torus, and after two T-dualities and an S-duality, we obtain new AdS 3 solutions with only the NS fields being non-trivial.
Schizophrenia masquerading as Dissociative Identity Disorder
Jegan Yogaratnam; Rajesh Jacob
2012-01-01
Dissociative symptoms can dominate the clinical picture in many psychiatric conditions and possess a huge challenge to the clinicians in management. We present a case report of a female with a strong family history of schizophrenia who initially presented with features suggestive of dissociative identity disorder, which is itself a rare clinical entity, was later diagnosed to have schizophrenia. Authors would like to emphasise that clinicians should have a high index of suspicion for schizoph...
DEFF Research Database (Denmark)
Winkler, Ingo
2018-01-01
This paper reviews the empirical literature on identity work and identifies two distinct approaches to incorporating emotion. The majority of empirical studies use emotion to describe the experiences of identity work. In doing so, the authors (a) mention the emotions that people feel in situations...... that trigger identity work, (b) illustrate identity work as an emotional endeavour, and (c) describe the emotional impact of successful and unsuccessful identity work. There is also an emerging literature that examines the mutual constitution of emotions and identity work. These authors address emotional...... labour, affective social identification, emotional attachment and detachment, and humour when studying identity work. This paper suggests that, to understand better the relation between emotions and identity work, future research should examine the role of emotions in problematizing identity...
DEFF Research Database (Denmark)
Stang Våland, Marianne; Georg, Susse
2018-01-01
In this paper, we analyze how architectural design, and the spatial and material changes this involves, contributes to the continuous shaping of identities in an organization. Based upon a case study of organizational and architectural change in a municipal administration at a time of major public...... sector reforms, we examine how design interventions were used to (re)form work and professional relationships. The paper examines how engagements with spatial arrangements and material artifacts affected people’s sense of both occupational and organizational identity. Taking a relational approach...... to sociomateriality, the paper contributes to the further theorizing of space in organization studies by proposing the concept of spacing identity to capture the fluidity of identity performance....
Micro channels in macro thermal management solutions
Directory of Open Access Journals (Sweden)
Kosoy Boris V.
2006-01-01
Full Text Available Modern progress in electronics is associated with increase in computing ability and processing speed, as well as decrease in size. Future applications of electronic devices in aviation, aero space and high performance consumer products’ industry demand on very stringent specifications concerning miniaturization, component density, power density and reliability. Excess heat produces stresses on internal components inside the electronic device, thus creating reliability problems. Thus, a problem of heat generation and its efficient removal arises and it has led to the development of advanced thermal control systems. Present research analyses a thermodynamic feasibility of micro capillary heat pumped net works in thermal management of electronic systems, considers basic technological constrains and de sign availability, and identifies perspective directions for the further studies. Computer Fluid Dynamics studies have been per formed on the laminar convective heat transfer and pressure drop of working fluid in silicon micro channels. Surface roughness is simulated via regular constructal, and stochastic models. Three-dimensional numerical solution shows significant effects of surface roughness in terms of the rough element geometry such as height, size, spacing and the channel height on the velocity and pressure fields.
Tomori, Cecilia; Srikrishnan, Aylur K; Ridgeway, Kathleen; Solomon, Sunil S; Mehta, Shruti H; Solomon, Suniti; Celentano, David D
2018-01-01
Men who have sex with men (MSM) remain at high risk for HIV infection. Culturally specific sexual identities, encompassing sexual roles, behavior, and appearance, may shape MSM's experiences of stigmatization and discrimination, and affect their vulnerability to HIV. This multi-site qualitative study (n = 363) encompassing 31 focus group discussions (FGDs) and 121 in-depth interviews (IDIs) across 15 sites in India investigated sexual identity formation, identity practices, and transitions and their implications for HIV prevention. IDIs and FGDs were transcribed, translated, and underwent thematic analysis. Our findings document heterogeneous sexual identity formation, with MSM who have more gender nonconforming behaviors or appearance reporting greater family- and community-level disapproval, harassment, violence, and exclusion. Concealing feminine aspects of sexual identities was important in daily life, especially for married MSM. Some participants negotiated their identity practices in accordance with socioeconomic and cultural pressures, including taking on identity characteristics to suit consumer demand in sex work and on extended periods of joining communities of hijras (sometimes called TG or transgender women). Participants also reported that some MSM transition toward more feminine and hijra or transgender women identities, motivated by intersecting desires for feminine gender expression and by social exclusion and economic marginalization. Future studies should collect information on gender nonconformity stigma, and any changes in sexual identity practices or plans for transitions to other identities over time, in relation to HIV risk behaviors and outcomes.
Representations and Classification of Traveling Wave Solutions to sinh-Goerdon Equation
International Nuclear Information System (INIS)
Liu Chengshi
2008-01-01
Two concepts named atom solution and combinatory solution are defined. The classification of all single traveling wave atom solutions to sinh-Goerdon equation is obtained, and qualitative properties of solutions are discussed. In particular, we point out that some qualitative properties derived intuitively from dynamic system method are not true. Finally, we prove that our solutions to sinh-Goerdon equation include all solutions obtained in the paper [Z.T. Fu, et al., Commun. Theor. Phys. (Beijing, China) 45 (2006) 55]. Through an example, we show how to give some new identities on Jacobian elliptic functions.
The Family as a Site for Gendered Ethnic Identity Work among Asian Indian Immigrants
Mehrotra, Meeta; Calasanti, Toni M.
2010-01-01
Research on immigrants often points to the family as a source of support and a location for oppression. Using in-depth interviews with 38 first-generation immigrant Indians, this study adds to this literature by exploring families as sites of identity work where first-generation immigrants manage their gendered ethnic identities. Relocation into a…
Andrés Vuotto; María Carolina Rojas; Gladys Vanesa Fernández
2013-01-01
Initially raised the main points to consider and develop the planning and construction of an online publication of a scientific nature, emphasizing the process and editorial functions, document preservation, access management, indexing and visibility. In the second part of the paper presents a proposed solution to every aspect previously described, highlighting the work of the information professional and optimizing time, cost and results offered free software, from a concrete experience with...
Identity Presentation: The Construction of Identity in Asynchronous Discussion
Directory of Open Access Journals (Sweden)
Brian Morgan
2008-08-01
Full Text Available This study examines the use of e-mail as a tool for long term discussion between teachers and grade six students. E-mail messages between grade six students and teachers were collected over the course of one academic year. Methods of conversation analysis within a framework of social practice are used to examine the data. While identity is more readily constructed and more fully developed in contexts which allow for physical embodiment such as face-to-face discussion, this analysis found that identity can be constructed in a context that does not provide for the physical embodiment of identity: Identity was constructed using the social, cultural, and technological tools provided and supported by e-mail to develop social practices germane to the e-mail discussion. This study has implications for further understanding the relation between identity, goals, constraints and affordances, and the collaborative creation of social practices in asynchronous computer mediated communication. URN: urn:nbn:de:0114-fqs0803185
Latent Class Analysis of Criminal Social Identity in a Prison Sample
Directory of Open Access Journals (Sweden)
Boduszek Daniel
2014-06-01
Full Text Available This study aimed to examine the number of latent classes of criminal social identity that exist among male recidivistic prisoners. Latent class analysis was used to identify homogeneous groups of criminal social identity. Multinomial logistic regression was used to interpret the nature of the latent classes, or groups, by estimating the associationsto number of police arrests, recidivism, and violent offending while controlling for current age. The best fitting latent class model was a five-class solution: ‘High criminal social identity’ (17%, ‘High Centrality, Moderate Affect, Low Ties’ (21.7%, ‘Low Centrality, Moderate Affect, High Ties’ (13.3%,‘Low Cognitive, High Affect, Low Ties’ (24.6%, and ‘Low criminal social identity’ (23.4%. Each of the latent classes was predicted by differing external variables. Criminal social identity is best explained by five homogenous classes that display qualitative and quantitative differences.
Identity Styles and Religiosity: Examining the Role of Identity Commitment
Grajales, Tevni E.; Sommers, Brittany
2016-01-01
This study observed the role of identity styles, identity commitment, and identity statuses in predicting religiosity in a sample of undergraduate students attending a Seventh-day Adventist university (N = 138). Two structural models were evaluated via path analysis. Results revealed two strong models for the prediction of religiosity. Identity…
Solomontos-Kountouri, Olga; Hurry, Jane
2008-04-01
This study critically contrasts global identity with domain-specific identities (political, religious and occupational) and considers context and gender as integral parts of identity. In a cross-sectional survey, 1038 Greek Cypriot adolescents (449 boys and 589 girls, mean age 16.8) from the three different types of secondary schools (state, state technical and private) and from different SES completed part of the Extended Objective Measure of Ego Identity Status-2 (EOMEIS-2). The macro-context of Greek Cypriot society is used to understand the role of context in adolescents' identities. Results showed that Greek Cypriot young people were not in the same statuses across their global, political, religious and occupational identities. This heterogeneity in the status of global identity and of each identity domain is partially explained by differences in gender, type of school and SES (socio-economic status). The fact that identity status is found to be reactive to context suggests that developmental stage models of identity status should place greater emphasis on context.
Chronic illness in the workplace: stigma, identity threat and strain.
McGonagle, Alyssa K; Barnes-Farrell, Janet L
2014-10-01
Chronic illness affects a large and growing number of workers in the United States and globally. Stigmatization (devaluation) at work based on chronic illness may be stressful for individuals and therefore may lead to negative psychological consequences (i.e. strains). In order to better understand stressful experiences of stigma for workers with chronic illnesses, a model of stigma-related identity threat (perceptions that one is at risk of being treated negatively at work because of chronic illness) was tested on a sample of 203 working adults with chronic illnesses. The following variables related to workers' perceptions of chronic illness-related identity threat: workers' boundary flexibility (flexibility in managing their work and life), their meta-perceptions of devaluation (perceptions of others' devaluation of them based on illness) and their job self-efficacy (feelings of confidence related to performing their job). In turn, perceptions of identity threat related to both feelings of psychological strain and (lower levels of) perceived work ability. Surprisingly, neither stigma centrality (how fundamental illness is to one's identity) nor supervisor support related to workers' identity threat perceptions. Copyright © 2013 John Wiley & Sons, Ltd.
Solute redistribution studies in oxidised zirconium alloys
Energy Technology Data Exchange (ETDEWEB)
Khera, S K; Kale, G B; Gadiyar, H S [Bhabha Atomic Research Centre, Bombay (India). Metallurgy Div.
1977-01-01
Electron microprobe studies on solute distribution in oxide layers and in the regions near oxide metal interface have been carried out in the case of zircaloy-2 and zirconium binary alloys containing niobium, tin, iron, copper, chromium and nickel and oxidised in steam at 550 deg C. In the case of alloys having higher oxidation rates, the oxide of solute element was found to dissolve in ZrO/sub 2/ without any composition variation. However, for solute addition with limited solubility like Cr, Cu and Fe, solute enrichment at metal/oxide interface and depletion of the same matrix has been observed. The intensity profiles for nickel distribution were also found to be identical to Fe or Cr distribution. The mode of solute distribution has been discussed in relation to oxidation behaviour of these alloys.
Xu Chen; Berry, Damon; Stephens, Gaye
2015-01-01
Computerised identity management is in general encountered as a low-level mechanism that enables users in a particular system or region to securely access resources. In the Electronic Health Record (EHR), the identifying information of both the healthcare professionals who access the EHR and the patients whose EHR is accessed, are subject to change. Demographics services have been developed to manage federated patient and healthcare professional identities and to support challenging healthcare-specific use cases in the presence of diverse and sometimes conflicting demographic identities. Demographics services are not the only use for identities in healthcare. Nevertheless, contemporary EHR specifications limit the types of entities that can be the actor or subject of a record to health professionals and patients, thus limiting the use of two level models in other healthcare information systems. Demographics are ubiquitous in healthcare, so for a general identity model to be usable, it should be capable of managing demographic information. In this paper, we introduce a generalised identity reference model (GIRM) based on key characteristics of five surveyed demographic models. We evaluate the GIRM by using it to express the EN13606 demographics model in an extensible way at the metadata level and show how two-level modelling can support the exchange of instances of demographic identities. This use of the GIRM to express demographics information shows its application for standards-compliant two-level modelling alongside heterogeneous demographics models. We advocate this approach to facilitate the interoperability of identities between two-level model-based EHR systems and show the validity and the extensibility of using GIRM for the expression of other health-related identities.
Identities as organizational practices
DEFF Research Database (Denmark)
Oshima, Sae; Asmuß, Birte
Identity has been widely acknowledged as playing a central role in various organizational processes, yet there is still a need to better understand the dynamics and functions of identity work in modern organizations. The present paper is centered within this concern, and examines identity......) reveal the intersubjective, multimodal and embodied nature of identity work; 2) demonstrate identity work as organizational practices, used in order to accomplish specific actions; and 3) pose a question on the view on identity as a layered/leveled phenomenon....
(Destabilizing Self-Identities in Professional Work
Directory of Open Access Journals (Sweden)
Anders Buch
2013-09-01
Full Text Available It is characteristic of much professional work that it is performed in ambiguous contexts. Thus, uncertainty, unpredictability, indeterminacy, and recurrent organizational transformations are an integral part of modern work for, e.g., engineers, lawyers, business consultants, and other professionals. Although key performance indicators and other knowledge management systems are used to set standards of excellence for professionals, the character of professional work is still flexible, open to interpretation and heterarchical. The very successfulness (or unsuccessfulness of the work is established in a complex work context where various goals, interests, and perspectives are mediated, altered, contested, mangled, and negotiated in a process of sense-making. The work context is heterogeneously populated by various actors (e.g., the customer, the manager, the colleagues and actants (e.g., quality systems and technical equipment that give “voice” to (conflicting interpretations of what constitutes successful work. Thus, the professionals must navigate in a very complex environment where the locus of governance is far from stable. These characteristics of professional work seem to have implications for the way professionals make sense of their work and their own identities. The identity work of professionals is interwoven with their professional training and career background. With an academic training and a professional career, the individual typically identifies with the profession’s values and adopts a certain way of seeing and approaching the world. This professional outlook typically will constitute the basis of the individual’s appraisal of the work and lay out a horizon of expectations in relation to fulfillment, self-realization, and job satisfaction. In this way, the construction of self-identity becomes the yardstick for the individual’s sense-making and, a fortiori, for the individual’s sense of meaningful work. In this paper
International Nuclear Information System (INIS)
2015-12-01
Report of the Results of the International Project on Safety Assessment Driving Radioactive Waste Management Solutions (SADRWMS) (2004–2010) The IAEA’s progamme on Safety Assessment Driving Radioactive Waste Management Solutions (SADRWMS) focused on approaches and mechanisms for application of safety assessment methodologies for the predisposal management of radioactive waste. The initial outcome of the SADRWMS Project was achieved through the development of flowcharts, which have since been incorporated into IAEA Safety Standards Series No. GSG-3, Safety Case and Safety Assessment for Predisposal Management of Radioactive Waste. In 2005, an initial specification was developed for the Safety Assessment Framework (SAFRAN) software tool to apply the SADRWMS flowcharts. In 2008, an in-depth application of the SAFRAN tool and the SADRWMS methodology was carried out on the predisposal management facilities of the Thailand Institute of Nuclear Technology Radioactive Waste Management Centre (TINT Facility). This publication summarizes the content and outcomes of the SADRWMS programme. The Chairman’s Report of the SADRWMS Project and the Report of the TINT test case are provided on the CD-ROM which accompanies this report
Manager, Human Resources Business Solutions | IDRC ...
International Development Research Centre (IDRC) Digital Library (Canada)
The incumbent acts as Chief of Staffing in the organization and makes authoritative ... 1 Talent Management Specialist and 1 Learning and Development Officer, ... Manage the application of the talent management strategy to define roles and ... the allocation of financial and human resources, performance management, etc.
On the spectral analysis of iterative solutions of the discretized one-group transport equation
International Nuclear Information System (INIS)
Sanchez, Richard
2004-01-01
We analyze the Fourier-mode technique used for the spectral analysis of iterative solutions of the one-group discretized transport equation. We introduce a direct spectral analysis for the iterative solution of finite difference approximations for finite slabs composed of identical layers, providing thus a complementary analysis that is more appropriate for reactor applications. Numerical calculations for the method of characteristics and with the diamond difference approximation show the appearance of antisymmetric modes generated by the iteration on boundary data. We have also utilized the discrete Fourier transform to compute the spectrum for a periodic slab containing N identical layers and shown that at the limit N → ∞ one obtains the familiar Fourier-mode solution
DEFF Research Database (Denmark)
Gani, Rafiqul
This paper provides a perspective on model-data based solution approaches for chemical product-process design, which consists of finding the identity of the candidate chemical product, designing the process that can sustainably manufacture it and verifying the performance of the product during...... framework can manage the complexity associated with product-process problems very efficiently. Three specific computer-aided tools (ICAS, Sustain-Pro and VPPDLab) have been presented and their applications to product-process design, highlighted....
Tanque, Marcus M.
2012-01-01
The research conducted in this study inquires about Information Technology (IT) managers' and executives' attitudes, beliefs, and knowledge on Cloud Computing (CC) security. The study evaluated how these factors affect IT managers' and executives' willingness to adopt CC solutions in their organizations. Confidentiality,…
Identity Federation and Its Importance for NASA's Future: The SharePoint Extranet Pilot
Baturin, Rebecca R.
2013-01-01
My project at Kennedy Space Center (KSC) during the spring 2013 Project Management and Systems Engineering Internship was to functionalJy test and deploy the SharePoint Extranet system and ensure successful completion of the project's various lifecycle milestones as described by NASA Procedural Requirement (NPR) 7 120.7. I worked alongside NASA Project Managers, Systems Integration Engineers, and Information Technology (IT) Professionals to pilot this collaboration capability between NASA and its External Partners. The use of identity federation allows NASA to leverage externally-issued credentials of other federal agencies and private aerospace and defense companies, versus the traditional process of granting and maintaining full NASA identities for these individuals. This is the first system of its kind at NASA and it will serve as a pilot for the Federal Government. Recognizing the novelty of this service, NASA's initial approach for deployment included a pilot period where nearby employees of Patrick Air Force Base would assist in testing and deployment. By utilizing a credential registration process, Air Force users mapped their Air Force-issued Common Access Cards (CAC) to a NASA identity for access to the External SharePoint. Once the Air Force stands up an Active Directory Federation Services (ADFS) instance within their Data Center and establishes a direct trust with NASA, true identity federation can be established. The next partner NASA is targeting for collaboration is Lockheed Martin (LMCO), since they collaborate frequently for the ORION Program. Through the use of Exostar as an identity hub, LMCO employees will be able to access NASA data on a need to know basis, with NASA ultimately managing access. In a time when every dollar and resource is being scrutinized, this capability is an exciting new way for NASA to continue its collaboration efforts in a cost and resource effective manner.
ICT Solutions for Highly-Customized Water Demand Management Strategies
Giuliani, M.; Cominola, A.; Castelletti, A.; Fraternali, P.; Guardiola, J.; Barba, J.; Pulido-Velazquez, M.; Rizzoli, A. E.
2016-12-01
The recent deployment of smart metering networks is opening new opportunities for advancing the design of residential water demand management strategies (WDMS) relying on improved understanding of water consumers' behaviors. Recent applications showed that retrieving information on users' consumption behaviors, along with their explanatory and/or causal factors, is key to spot potential areas where targeting water saving efforts, and to design user-tailored WDMS. In this study, we explore the potential of ICT-based solutions in supporting the design and implementation of highly customized WDMS. On one side, the collection of consumption data at high spatial and temporal resolutions requires big data analytics and machine learning techniques to extract typical consumption features from the metered population of water users. On the other side, ICT solutions and gamifications can be used as effective means for facilitating both users' engagement and the collection of socio-psychographic users' information. This latter allows interpreting and improving the extracted profiles, ultimately supporting the customization of WDMS, such as awareness campaigns or personalized recommendations. Our approach is implemented in the SmartH2O platform and demonstrated in a pilot application in Valencia, Spain. Results show how the analysis of the smart metered consumption data, combined with the information retrieved from an ICT gamified web user portal, successfully identify the typical consumption profiles of the metered users and supports the design of alternative WDMS targeting the different users' profiles.
SAVAH: Source Address Validation with Host Identity Protocol
Kuptsov, Dmitriy; Gurtov, Andrei
Explosive growth of the Internet and lack of mechanisms that validate the authenticity of a packet source produced serious security and accounting issues. In this paper, we propose validating source addresses in LAN using Host Identity Protocol (HIP) deployed in a first-hop router. Compared to alternative solutions such as CGA, our approach is suitable both for IPv4 and IPv6. We have implemented SAVAH in Wi-Fi access points and evaluated its overhead for clients and the first-hop router.
OPTIMAL SOLUTIONS FOR IMPLEMENTING THE SUPPLY-SALES CHAIN MANAGEMENT
Directory of Open Access Journals (Sweden)
Elena COFAS
2014-04-01
Full Text Available The supply chain represents all physical flows , information and financial flows linking suppliers and customers. It leads on the one hand, the idea of the chain in which the various elements of an industrial production system are interrelated and secondly to a broad definition of supply (flow between plants, flow between a supplier and a customer, flow between two workstations etc.. For a number of enterprise managers, supply chain is a topic of major interest. In contrast, non-chain coordination, losses may result for the enterprise: obsolete inventory devaluation, impairment etc. Since the 1980’s, several companies came together in the same service all functions dealing logistic flow from supply to distribution, through production management and resource planning. At the same time it was developed the notion of “time" to expand these flows and to increase quality and reduce inventory. 1990’s promotes the trend of broadening the concept of integrated logistics to a more open organization, "supply chain" in which is contained the whole organization of the enterprise, designed around streams: sales, distribution, manufacturing, purchasing, and supply. This is the area where, through this work, I try to make a contribution towards finding practical solutions to implement an efficient supply chain that contribute to increased economic performance of companies.
International Nuclear Information System (INIS)
Lee, Dong Uk; Lee, Yong Bum; Won, Byung Chool; Kim, Young In; Hahn, Do Hee
2008-04-01
This report is a manual on enterprise project management solution for R and D and technology monitoring system that is applicable for managing the generation IV sodium-cooled fast reactor development. The prime goal of this system is to provide project manager with reliable and accurate information of status of progress, performance and resource allocation, and attain traceability and visibility of project implementation for effective project management. This report is composed of the three part. The first part is an introduction on microsoft project professional software that was used to monitor the progress, evaluate the results and analyze the resource distribution of the activities. The second makes a description of project plan and control, and the third part describes on collaboration and teamwork
Energy Technology Data Exchange (ETDEWEB)
Lee, Dong Uk; Lee, Yong Bum; Won, Byung Chool; Kim, Young In; Hahn, Do Hee
2008-04-15
This report is a manual on enterprise project management solution for R and D and technology monitoring system that is applicable for managing the generation IV sodium-cooled fast reactor development. The prime goal of this system is to provide project manager with reliable and accurate information of status of progress, performance and resource allocation, and attain traceability and visibility of project implementation for effective project management. This report is composed of the three part. The first part is an introduction on microsoft project professional software that was used to monitor the progress, evaluate the results and analyze the resource distribution of the activities. The second makes a description of project plan and control, and the third part describes on collaboration and teamwork.
Leadership identity : using artefacts (and storytelling) to discover new insights.
Watton, Emma Louisa; Parry, Ken
2016-01-01
Artefacts are used in management education to reflect upon the experiences of participants. Story-telling has a leadership influence that is long recognised in the leadership literature. However, artefacts and story-telling have not been used concurrently in leadership and management development programmes. We used artefacts combined with story-telling to help participants understand their leadership identity. Louisa’s story and artefact are the basis of this research. We found that the story...
Acidities of Water and Methanol in Aqueous Solution and DMSO
Gao, Daqing
2009-01-01
The relative acidities of water and methanol have been a nagging issue. In gas phase, methanol is more acidic than water by 36.0 kJ/mol; however, in aqueous solution, the acidities of methanol and water are almost identical. The acidity of an acid in solution is determined by both the intrinsic gas-phase ionization Gibbs energy and the solvent…
Zhao, Hongyu; Zhang, Xiaohui
2017-01-01
The current study used mixed methods to research pre-service teachers’ professional identity. Ninety-eight pre-service teachers were investigated and twelve teachers were interviewed in China. The results were as follows: (1) The results of quantitative data showed that compared with before the field teaching practice, pre-service teachers’ professional identity increased after the field teaching practice—specifically, intrinsic value identity increased, and extrinsic value identity did not significantly change; (2) The results of qualitative data validated and elaborated the results of quantitative data in more detail with regard to changes in professional identity. Specifically, compared with before the field teaching practice, intrinsic value identity including work content, work pattern, etc., increased and extrinsic value identity including work environment, income, and social status, etc., did not significantly change after experiencing teaching practice; (3) The results of qualitative data also showed that mentor support at field school promoted the development of pre-service teachers’ professional identity. Moreover, the development of pre-service teachers’ professional identity during field teaching practice further promoted their professional commitment; that is, it promoted their emotional evaluation and belief in the teaching profession. The study discussed these results and proposed solutions and suggestions for future studies. PMID:28790956
Zebrafish Database: Customizable, Free, and Open-Source Solution for Facility Management.
Yakulov, Toma Antonov; Walz, Gerd
2015-12-01
Zebrafish Database is a web-based customizable database solution, which can be easily adapted to serve both single laboratories and facilities housing thousands of zebrafish lines. The database allows the users to keep track of details regarding the various genomic features, zebrafish lines, zebrafish batches, and their respective locations. Advanced search and reporting options are available. Unique features are the ability to upload files and images that are associated with the respective records and an integrated calendar component that supports multiple calendars and categories. Built on the basis of the Joomla content management system, the Zebrafish Database is easily extendable without the need for advanced programming skills.
Asian American Adolescent Identity
Ohm, Julie Juhye
1999-01-01
The formation of ego identity in Asian American late adolescents attending Virginia Tech was examined within the frameworks of Erikson's psychosocial theory and Berry, Trimble, and Olmedo's model of acculturation. Ego identity was measured using the Achieved sub-scale of the Revised Version of the Extended Objective Measure of Ego Identity Status, an instrument based on the theoretical constructs of Erikson. Ethnic identity was measured using the Multigroup Ethnic Identity Measure and America...
The Identity of Students Choosing Marketing Programs
Directory of Open Access Journals (Sweden)
Barreto, Idaly
2009-12-01
Full Text Available The purpose of this study is to look deeply into the identity of young students interested in training professional in marketing programs in Bogotá, Colombia. This descriptive study was conducted with the application of multidimensional surveys to 262 young people from five universities that offer training in marketing. The results show that there are differences and similarities in the lifestyles of young people who choose to study Marketing. The first, relating mainly to the identities assumed by students of daytime and nighttime that differ in their activities and more income. The second, by the increasing use and development of academic and social activities through the Internet of interest to young people today. It is hoped that these results provide the administrative and academic management of marketing programs that result in better communication and care of students as consumers.
The constitution of marginalized identity in Signs of identity by Juan Goytisolo
Directory of Open Access Journals (Sweden)
Jelica Veljović
2014-12-01
Full Text Available The main objective of the article is to investigate the modes of constitution of a marginalized and exiled identity in the novel Signs of identity by Juan Goytisolo. It is categorised as a “testimony and postwar novel”, and the subjects’ constant search of themselves, of their Self and all the elements that constitute their identity is central to the work. The novel is set in the postwar socio-historical period and the protagonist – Alvaro Mendiola – searches for his identity in his childhood memories and family pictures, but also amongst all the Others whose life stories intertwine with his journey of identification. Tracing his line of identity formation, we found three different routes: the first through the genealogical records, the second through the concept of Otherness and the last one through love. We find Identity as a kaleidoscope containing all the Others who served as moulds for his Identity, yet leaving it undefined and incomplete. Therefore, the identity of an exiled and marginalized individual is always in flux, continually reinitiating the constitution of the Self that had been eradicated from its first and formative imagery: the family and the fatherland.
Human identity versus gender identity: The perception of sexual addiction among Iranian women.
Moshtagh, Mozhgan; Mirlashari, Jila; Rafiey, Hassan; Azin, Ali; Farnam, Robert
2017-07-01
This qualitative study was conducted to explore the images of personal identity from the perspective of women with sexual addiction. The data required for the study were collected through 31 in-depth interviews. Sensing a threat to personal identity, dissatisfaction with gender identity, dissociation with the continuum of identity, and identity reconstruction in response to threat were four of the experiences that were common among women with sexual addiction. Painful emotional experiences appear to have created a sense of gender and sexual conflict or weakness in these women and thus threatened their personal identity and led to their sexual addiction.
McDermott, Imelda; Checkland, Kath; Harrison, Stephen; Snow, Stephanie; Coleman, Anna
2013-01-01
The language used by National Health Service (NHS) "commissioning" managers when discussing their roles and responsibilities can be seen as a manifestation of "identity work", defined as a process of identifying. This paper aims to offer a novel approach to analysing "identity work" by triangulation of multiple analytical methods, combining analysis of the content of text with analysis of its form. Fairclough's discourse analytic methodology is used as a framework. Following Fairclough, the authors use analytical methods associated with Halliday's systemic functional linguistics. While analysis of the content of interviews provides some information about NHS Commissioners' perceptions of their roles and responsibilities, analysis of the form of discourse that they use provides a more detailed and nuanced view. Overall, the authors found that commissioning managers have a higher level of certainty about what commissioning is not rather than what commissioning is; GP managers have a high level of certainty of their identity as a GP rather than as a manager; and both GP managers and non-GP managers oscillate between multiple identities depending on the different situations they are in. This paper offers a novel approach to triangulation, based not on the usual comparison of multiple data sources, but rather based on the application of multiple analytical methods to a single source of data. This paper also shows the latent uncertainty about the nature of commissioning enterprise in the English NHS.
DEFF Research Database (Denmark)
Hatch, Mary Jo; Schultz, Majken
This text presents the classic works on organizational identity alongside more current thinking on the issues. Ranging from theoretical contributions to empirical studies, the readings in this volume address the key issues of organizational identity, and show how these issues have developed through...
The Investigation of the Identity Attributes and Attitudes of Romanians
Directory of Open Access Journals (Sweden)
CODRINA ŞANDRU
2012-04-01
Full Text Available The object of this qualitative sociology study was to emphasize the identity attributes of Romanians today: what they think of themselves as a people and what Romanians who live in the country or in other countries in the world think about Romania. The theoretical framework was established by social identity theory and by social representations research. For the gathering of data, I used a questionnaire with open questions and the reflection-and answer-triggering method, using as stimulus patriotic-themed songs: lyrics from the national anthem and another patriotic song very well known in Romania, entitled "God, protect the Romanians!". For the analysis of qualitative data, I used a category scheme specific for social representations, and at the end of the article I synthesized the data in the form of "storytelling" representative for four social categories included in the research: students, managers, pensioners and Romanian migrants abroad. The data obtained point to an identity crisis among these categories of Romanians: this crisis takes the form of a negative national identity. In terms of the social identity theory (Tajfel, it means that Romanians have in general a negative image when comparing themselves with other nations and they feel it like a strong discomfort.
Analýza komunikace v procesu změny korporátní identity organizace
Blanková, Barbora
2013-01-01
The topic of the thesis is a change of corporate identity of the company and role of communication during this process. There are components of corporate identity and relationship between corporate identity, image and reputation described in the thesis. Furthermore it is dedicated to integrated marketing communication, internal communication and role of communication in change management. The theoretical knowledge is applied on company Nicoll Česká republika, s.r.o. which have been coming thr...
Sacharin, Vera; Lee, Fiona; Gonzalez, Richard
2009-01-01
Professional women's identity integration--the perceived compatibility between work and gender identities--plays a role in how task or relationship information is processed. Seventy female business school students were primed with either their professional or their gender identity. Business women with higher identity integration showed an…
Harvey, J; Dopson, S; McManus, R J; Powell, J
2015-11-13
In a research context, self-management solutions, which may range from simple book diaries to complex telehealth packages, designed to facilitate patients in managing their long-term conditions, have often shown cost-effectiveness, but their implementation in practice has frequently been challenging. We conducted an interpretive qualitative synthesis of relevant articles identified through systematic searches of bibliographic databases in July 2014. We searched PubMed (Medline/NLM), Web of Science, LISTA (EBSCO), CINAHL, Embase and PsycINFO. Coding and analysis was inductive, using the framework method to code and to categorise themes. We took a sensemaking approach to the interpretation of findings. Fifty-eight articles were selected for synthesis. Results showed that during adoption, factors identified as facilitators by some were experienced as barriers by others, and facilitators could change to barriers for the same adopter, depending on how adopters rationalise the solutions within their context when making decisions about (retaining) adoption. Sometimes, when adopters saw and experienced benefits of a solution, they continued using the solution but changed their minds when they could no longer see the benefits. Thus, adopters placed a positive value on the solution if they could constructively rationalise it (which increased adoption) and attached a negative rationale (decreasing adoption) if the solution did not meet their expectations. Key factors that influenced the way adopters rationalised the solutions consisted of costs and the added value of the solution to them and moral, social, motivational and cultural factors. Considering 'barriers' and 'facilitators' for implementation may be too simplistic. Implementers could instead iteratively re-evaluate how potential facilitators and barriers are being experienced by adopters throughout the implementation process, to help adopters to retain constructive evaluations of the solution. Implementers need to pay
Corporate Brand Identity in SMEs
DEFF Research Database (Denmark)
Mäläskä, Minna; Jones, Richard Ian
Purpose: To study the emergence of corporate brand identity in SMEs and to develop a typology of brand identity drivers that reflects a co-creative approach to the emergence of brand identity. Design / Methodology / Approach : Existing approaches to brand identity are summarised. A narrative...... studies. The research is important since it suggests an iterative and co-creative approach to brand identity. A typology of brand identity formation for SMEs is presented: entrepreneur driven, market driven, stakeholder driven. Practical implications: The three paths to creating a strong brand identity...... challenge existing notions that brand identity is based solely on the values of the entrepreneur. This typology suggests that SMEs should be open to creating an identity that draws from their stakeholder eco-system. Originality / value: this research challenges the existing assumption that brand identity...
Negotiating Contexts to Construct an Identity as a Mathematics Teacher
Hodges, Thomas E.; Cady, Jo Ann
2012-01-01
The authors focused on 1 middle-grades mathematics teacher's identity and her efforts to implement standards-based instructional practices. As professionals, teachers participate in multiple professional communities and must negotiate and manage conflicting agendas. The authors analyze how the contexts of these communities influence the teacher's…
Efficient Fair Exchange from Identity-Based Signature
Yum, Dae Hyun; Lee, Pil Joong
A fair exchange scheme is a protocol by which two parties Alice and Bob exchange items or services without allowing either party to gain advantages by quitting prematurely or otherwise misbehaving. To this end, modern cryptographic solutions use a semi-trusted arbitrator who involves only in cases where one party attempts to cheat or simply crashes. We call such a fair exchange scheme optimistic. When no registration is required between the signer and the arbitrator, we say that the fair exchange scheme is setup free. To date, the setup-free optimist fair exchange scheme under the standard RSA assumption was only possible from the generic construction of [12], which uses ring signatures. In this paper, we introduce a new setup-free optimistic fair exchange scheme under the standard RSA assumption. Our scheme uses the GQ identity-based signature and is more efficient than [12]. The construction can also be generalized by using various identity-based signature schemes. Our main technique is to allow each user to choose his (or her) own “random” public key in the identitybased signature scheme.
Professional identity formation in the transition from medical school to working life
DEFF Research Database (Denmark)
De Lasson, Lydia; Just, Eva; Stegeager, Nikolaj W.M.
2016-01-01
Background The transition from student to medical doctor is challenging and stressful to many junior doctors. To practice with confidence and professionalism the junior doctors have to develop a strong professional identity. Various suggestions on how to facilitate formation of professional ident...... and acting as a doctor), adoption to medical culture, career planning and managing a healthy work/life-balance. Further studies in different contexts are recommended as well as studies using other methods to test the results of this qualitative study....
de Andrade, Norberto Nuno Gomes; Argles, David
2014-01-01
With the increasing availability of electronic services, security and a reliable means by which identity is verified is essential.Written by Norberto Andrade the first chapter of this book provides an overview of the main legal and regulatory aspects regarding electronic identity in Europe and assesses the importance of electronic identity for administration (public), business (private) and, above all, citizens. It also highlights the role of eID as a key enabler of the economy.In the second chapter Lisha Chen-Wilson, David Argles, Michele Schiano di Zenise and Gary Wills discuss the user-cent
Thinking identity differently: dynamics of identity in self and institutional boundary
Albrecht, Nancy J.; Fortney, Brian S.
2011-03-01
In research oriented universities, research and teaching are often viewed as separate. Aydeniz and Hodge present one professor's struggles to synthesize an identity from three different spaces, each with competing values and core beliefs. As Mr. G's story unfolds, and he reflects upon his negotiation between teaching and research responsibilities, we seek to expand the discussion by presenting a caution to identity researchers. The caution pertains to construction of understanding on how identities are created, and the role that individual stories take in how identities are created and enacted. In this forum contribution, we present several questions in the hopes of furthering the discussion on identity research, and our understanding of the conceptualization of institutional boundaries and objectivity, as well as questions on participant involvement in the process of research.
Multicultural identity processes.
Hong, Ying-Yi; Zhan, Siran; Morris, Michael W; Benet-Martínez, Verónica
2016-04-01
The study of multicultural identity has gained prominence in recent decades and will be even more urgent as the mobility of individuals and social groups becomes the 'new normal'. This paper reviews the state-of-the-art theoretical advancements and empirical discoveries of multicultural identity processes at the intrapersonal, interpersonal, and collective (e.g., organizational, societal) levels. First, biculturalism has more benefits for individuals' psychological and sociocultural adjustment than monoculturalism. Bicultural individuals' racial essentialist beliefs and Bicultural Identity Integration affect cultural frame switching, racial categorization, and creativity. Second, identity denial and identity-based discrimination by other people or groups threaten multicultural individuals' psychological health and performance. Third, multiculturalism and interculturalism policies are associated with different conceptions of and attitudes toward diversity, and have distinct outcomes for multicultural individuals and societies. Copyright © 2015 Elsevier Ltd. All rights reserved.
Social Identity in People with Multiple Sclerosis: An Examination of Family Identity and Mood.
Barker, Alex B; Lincoln, Nadina B; Hunt, Nigel; dasNair, Roshan
2018-01-01
Mood disorders are highly prevalent in people with multiple sclerosis (MS). MS causes changes to a person's sense of self. The Social Identity Model of Identity Change posits that group membership can have a positive effect on mood during identity change. The family is a social group implicated in adjustment to MS. The objectives of this study were to investigate whether family identity can predict mood in people with MS and to test whether this prediction was mediated by social support and connectedness to others. This cross-sectional survey of 195 participants comprised measures of family identity, family social support, connectedness to others, and mood. Family identity predicted mood both directly and indirectly through parallel mediators of family social support and connectedness to others. Family identity predicted mood as posited by the Social Identity Model of Identity Change. Involving the family in adjustment to MS could reduce low mood.
Browman, Alexander S; Destin, Mesmin; Molden, Daniel C
2017-12-01
Research on self-regulation has traditionally emphasized that people's thoughts and actions are guided by either (a) domain-general motivations that emerge from a cumulative history of life experiences, or (b) situation-specific motivations that emerge in immediate response to the incentives present in a particular context. However, more recent studies have illustrated the importance of understanding the interplay between such domain-general and situation-specific motivations across the types of contexts people regularly encounter. The present research, therefore, expands existing perspectives on self-regulation by investigating how people's identities -the internalized roles, relationships, and social group memberships that define who they are-systemically guide when and how different domain-general motivations are activated within specific types of situations. Using the motivational framework described by regulatory focus theory (Higgins, 1997), Studies 1 and 2 demonstrate that people indeed have distinct, identity-specific motivations that uniquely influence their current self-regulation when such identities are active. Studies 3-5 then begin to explore how identity-specific motivations are situated within people's larger self-concept. Studies 3a and 3b demonstrate that the less compatible people's specific identities, the more distinct are the motivations connected to those identities. Studies 4-5 then provide some initial, suggestive evidence that identity-specific motivations are not a separate, superordinate feature of people's identities that then alter how they pursue any subordinate, identity-relevant traits, but instead that such motivations emerge from the cumulative motivational significance of the subordinate traits to which the identities themselves become attached. Implications for understanding the role of the self-concept in self-regulation are discussed. (PsycINFO Database Record (c) 2017 APA, all rights reserved).
Agile project management managing for success
Crowder, James A
2015-01-01
Management and enables them to deal with the demands and complexities of modern, agile systems/software/hardware development teams. The book examines the project/program manager beyond the concepts of leadership and aims to connect to employees' sense of identity. The text examines human psychological concepts such as "locus of control," which will help the manager understand their team members' view and how best to manage their "world" contributions. The authors cover new management tools and philosophies for agile systems/software/hardware development teams, with a specific focus on how this
Memory transfer for emotionally valenced words between identities in dissociative identity disorder.
Huntjens, Rafaële J C; Peters, Madelon L; Woertman, Liesbeth; van der Hart, Onno; Postma, Albert
2007-04-01
The present study aimed to determine interidentity retrieval of emotionally valenced words in dissociative identity disorder (DID). Twenty-two DID patients participated together with 25 normal controls and 25 controls instructed to simulate DID. Two wordlists A and B were constructed including neutral, positive and negative material. List A was shown to one identity, while list B was shown to another identity claiming total amnesia for the words learned by the first identity. The identity claiming amnesia was tested for intrusions from list A words into the recall of words from list B and recognition of the words learned by both identities. Test results indicated no evidence of total interidentity amnesia for emotionally valenced material in DID. It is argued that dissociative amnesia in DID may more adequately be described as a disturbance in meta-memory functioning instead of an actual retrieval inability.
Rodríguez, Charo; Pawlikowska, Teresa; Schweyer, Francois-Xavier; López-Roig, Sofia; Bélanger, Emmanuelle; Burns, Jane; Hugé, Sandrine; Pastor-Mira, Maria Ángeles; Tellier, Pierre-Paul; Spencer, Sarah; Fiquet, Laure; Pereiró-Berenguer, Inmaculada
2014-09-06
Despite significant differences in terms of medical training and health care context, the phenomenon of medical students' declining interest in family medicine has been well documented in North America and in many other developed countries as well. As part of a research program on family physicians' professional identity formation initiated in 2007, the purpose of the present investigation is to examine in-depth how family physicians construct their professional image in academic contexts; in other words, this study will allow us to identify and understand the processes whereby family physicians with an academic appointment seek to control the ideas others form about them as a professional group, i.e. impression management. The methodology consists of a multiple case study embedded in the perspective of institutional theory. Four international cases from Canada, France, Ireland and Spain will be conducted; the "case" is the medical school. Four levels of analysis will be considered: individual family physicians, interpersonal relationships, family physician professional group, and organization (medical school). Individual interviews and focus groups with academic family physicians will constitute the main technique for data generation, which will be complemented with a variety of documentary sources. Discourse techniques, more particularly rhetorical analysis, will be used to analyze the data gathered. Within- and cross-case analysis will then be performed. This empirical study is strongly grounded in theory and will contribute to the scant body of literature on family physicians' professional identity formation processes in medical schools. Findings will potentially have important implications for the practice of family medicine, medical education and health and educational policies.
DEFF Research Database (Denmark)
Sørensen, Suna; B. Gartner, William
2006-01-01
for combining the identities are proposed and discussed as a way to challenge the meaning attached to the practiced concepts of "student" and "entrepreneur" from a theoretical as well as practical perspective. The practices are organized into a conceptual framework containing the two continuums: "integration/disintegration...
Gender Identity and Career Aspiration to Top Management of Malaysian Graduate Students
Karami, Roya; Ismail, Maimunah; Sail, Rahim Md.
2011-01-01
This article examines the relationship between gender identity and career aspirations of a group of Iranian international postgraduate students studying at a Malaysian public university. This study uses the Farmer's Achievement Motivation Theory and Astin's Sociopsychological Model of Career Choice as theoretical framework. The data were collected…
Hennig, Teresa; Linson, Larry; Purvis, Leigh; Spaulding, Brent
2010-01-01
Database models developed by a team of leading Microsoft Access MVPs that provide ready-to-use solutions for sales, marketing, customer management and other key business activities for most small businesses. As the most popular relational database in the world, Microsoft Access is widely used by small business owners. This book responds to the growing need for resources that help business managers and end users design and build effective Access database solutions for specific business functions. Coverage includes::; Elements of a Microsoft Access Database; Relational Data Model; Dealing with C
International Nuclear Information System (INIS)
Yao Zhenzhi; Zhu Hongwu; Meng Xianghua; Lue Xing; Shan Wenrui; Tian Bo; Zhang Chunyi
2008-01-01
In this paper, we derive the bilinear form for a variable-coefficient Kadomtsev-Petviashvili-typed equation. Based on the bilinear form, we obtain the Wronskian determinant solution, which is proved to be indeed an exact solution of this equation through the Wronskian technique. In addition, we testify that this equation can be reduced to a Jacobi identity by considering its solution as a Grammian determinant by means of Pfaffian derivative formulae
Professional cluster management by a small scientific team: challenges, solutions and perspectives
International Nuclear Information System (INIS)
Silva, Vitor V.A.; Santos, Andre A.C. dos; Cunha, Renan O.
2017-01-01
The specification, configuration and management of a professional computer cluster are specialized tasks usually hold by well trained teams, often full-time hired computer scientists. However, in many situations and for widely different reasons, these very specific technical tasks must be carried on by no other than the user itself. This is the situation at Centro de Desenvolvimento da Tecnologia Nuclear - and in many nuclear research and educational centres in developing countries - where the scientists are the users of the cluster but also the technical team responsible to keep the system running. This paper presents the process of planning and installing the whole operating system and scientific software of a professional cluster aimed to be used in the nuclear engineering eld from the point of view of its users. The drawbacks of lack of expertise and technical skills to manage such type of technology are opposed to the advantages of freedom to chose the solutions which best t to the problems to be solved. The details of selected methods or technologies chosen for addressing a specific matter are presented together with other possible options, offering a broader view of the whole process of cluster's configuration. Specificities of dealing with closed, restricted and open software, common in the nuclear engineering eld, are also put in perspective. The ideas and solutions presented in this paper can be a valuable reference to other research teams found in a similar situation: being scientists and its own technical staff at the same time. (author)
Professional cluster management by a small scientific team: challenges, solutions and perspectives
Energy Technology Data Exchange (ETDEWEB)
Silva, Vitor V.A.; Santos, Andre A.C. dos; Cunha, Renan O., E-mail: vitors@cdtn.br, E-mail: aacs@cdtn.br, E-mail: roc@cdtn.br [Centro de Desenvolvimento da Tecnologia Nuclear (CDTN/CNEN-MG), Belo Horizonte, MG (Brazil)
2017-11-01
The specification, configuration and management of a professional computer cluster are specialized tasks usually hold by well trained teams, often full-time hired computer scientists. However, in many situations and for widely different reasons, these very specific technical tasks must be carried on by no other than the user itself. This is the situation at Centro de Desenvolvimento da Tecnologia Nuclear - and in many nuclear research and educational centres in developing countries - where the scientists are the users of the cluster but also the technical team responsible to keep the system running. This paper presents the process of planning and installing the whole operating system and scientific software of a professional cluster aimed to be used in the nuclear engineering eld from the point of view of its users. The drawbacks of lack of expertise and technical skills to manage such type of technology are opposed to the advantages of freedom to chose the solutions which best t to the problems to be solved. The details of selected methods or technologies chosen for addressing a specific matter are presented together with other possible options, offering a broader view of the whole process of cluster's configuration. Specificities of dealing with closed, restricted and open software, common in the nuclear engineering eld, are also put in perspective. The ideas and solutions presented in this paper can be a valuable reference to other research teams found in a similar situation: being scientists and its own technical staff at the same time. (author)
van der Beek, Suzanne
2017-01-01
Rituals are often used as opportunities for self-reflection and identity construction. The Camino to Santiago de Compostela, which has become a singularly popular pilgrimage since the late 1980s, is an example of a ritual that is explicitly used to gain a deeper understanding of one’s identity
Lawlor, John
1998-01-01
Instead of differentiating themselves by building "brand identities," colleges and universities often focus on competing with price. As a result, fewer and fewer institutions base their identities on value, the combination of quality and price. Methods of building two concepts to influence customers' brand image and brand loyalty are…
Integrated Practice Improvement Solutions-Practical Steps to Operating Room Management.
Chernov, Mikhail; Pullockaran, Janet; Vick, Angela; Leyvi, Galina; Delphin, Ellise
2016-10-01
Perioperative productivity is a vital concern for surgeons, anesthesiologists, and administrators as the OR is a major source of hospital elective admissions and revenue. Based on elements of existing Practice Improvement Methodologies (PIMs), "Integrated Practice Improvement Solutions" (IPIS) is a practical and simple solution incorporating aspects of multiple management approaches into a single open source framework to increase OR efficiency and productivity by better utilization of existing resources. OR efficiency was measured both before and after IPIS implementation using the total number of cases versus room utilization, OR/anesthesia revenue and staff overtime (OT) costs. Other parameters of efficiency, such as the first case on-time start and the turnover time (TOT) were measured in parallel. IPIS implementation resulted in increased numbers of surgical procedures performed by an average of 10.7%, and OR and anesthesia revenue increases of 18.5% and 6.9%, respectively, with a simultaneous decrease in TOT (15%) and OT for anesthesia staff (26%). The number of perioperative adverse events was stable during the two-year study period which involved a total of 20,378 patients. IPIS, an effective and flexible practice improvement model, was designed to quickly, significantly, and sustainably improve OR efficiency by better utilization of existing resources. Success of its implementation directly correlates with the involvement of and acceptance by the entire OR team and hospital administration.
VET Manager Identities: Culture, Philosophy and Professional Practice
Foley, Annette
2011-01-01
Using a post-structural approach this article investigates the working lives of frontline managers in VET and how they negotiate change in their day to day practices and decision making. The article is organised around accounts made by managers from different types of Vocational Education and Training (VET) organisations, namely: Technical and…
Storage management solutions and performance tests at the INFN Tier-1
International Nuclear Information System (INIS)
Bencivenni, M; Carbone, A; Chierici, A; D'Apice, A; Girolamo, D D; Dell'Agnello, L; Donatelli, M; Fella, A; Forti, A; Ghiselli, A; Italiano, A; Re, G L; Magnoni, L; Martelli, B; Mazzucato, M; Donvito, G; Furano, F; Marconi, U; Galli, D; Lanciotti, E
2008-01-01
Performance, reliability and scalability in data access are key issues in the context of HEP data processing and analysis applications. In this paper we present the results of a large scale performance measurement performed at the INFN-CNAF Tier-1, employing some storage solutions presently available for HEP computing, namely CASTOR, GPFS, Scalla/Xrootd and dCache. The storage infrastructure was based on Fibre Channel systems organized in a Storage Area Network, providing 260 TB of total disk space, and 24 disk servers connected to the computing farm (280 worker nodes) via Gigabit LAN. We also describe the deployment of a StoRM SRM instance at CNAF, configured to manage a GPFS file system, presenting and discussing its performances
Identity and Professional Networking.
Raj, Medha; Fast, Nathanael J; Fisher, Oliver
2017-06-01
Despite evidence that large professional networks afford a host of financial and professional benefits, people vary in how motivated they are to build such networks. To help explain this variance, the present article moves beyond a rational self-interest account to examine the possibility that identity shapes individuals' intentions to network. Study 1 established a positive association between viewing professional networking as identity-congruent and the tendency to prioritize strengthening and expanding one's professional network. Study 2 revealed that manipulating the salience of the self affects networking intentions, but only among those high in networking identity-congruence. Study 3 further established causality by experimentally manipulating identity-congruence to increase networking intentions. Study 4 examined whether identity or self-interest is a better predictor of networking intentions, providing support for the former. These findings indicate that identity influences the networks people develop. Implications for research on the self, identity-based motivation, and professional networking are discussed.
Huntjens, Rafaële J C; Peters, Madelon L; Postma, Albert; Woertman, Liesbeth; Effting, Marieke; van der Hart, Onno
2005-02-01
Patients with Dissociative Identity Disorder (DID) frequently report episodes of interidentity amnesia, that is amnesia for events experienced by other identities. The goal of the present experiment was to test the implicit transfer of trauma-related information between identities in DID. We hypothesized that whereas declarative information may transfer from one identity to another, the emotional connotation of the memory may be dissociated, especially in the case of negative, trauma-related emotional valence. An evaluative conditioning procedure was combined with an affective priming procedure, both performed by different identities. In the evaluative conditioning procedure, previously neutral stimuli come to refer to a negative or positive connotation. The affective priming procedure was used to test the transfer of this acquired valence to an identity reporting interidentity amnesia. Results indicated activation of stimulus valence in the affective priming task, that is transfer of emotional material between identities.
Managing neurocysticercosis: challenges and solutions
Directory of Open Access Journals (Sweden)
Fogang YF
2015-10-01
Full Text Available Yannick Fogoum Fogang, Abdoul Aziz Savadogo, Massaman Camara, Dènahin Hinnoutondji Toffa, Anna Basse, Adjaratou Djeynabou Sow, Mouhamadou Mansour Ndiaye Neurology Department, Fann Teaching Hospital, Cheikh Anta Diop University, Dakar, Senegal Abstract: Taenia solium neurocysticercosis (NCC is a major cause of neurological morbidity in the world. Variability in the neuropathology and clinical presentation of NCC often make it difficult to diagnose and manage. Diagnosis of NCC can be challenging especially in endemic and resource-limited countries where laboratory and imaging techniques are often lacking. NCC management can also be challenging as current treatment options are limited and involve symptomatic agents, antiparasitic agents, or surgery. Although antiparasitic treatment probably reduces the number of active lesions and long-term seizure frequency, its efficacy is limited and strategies to improve treatment regimens are warranted. Treatment decisions should be individualized in relation to the type of NCC. Initial measures should focus on symptomatic management, with antiparasitic therapy only to be considered later on, when appropriate. Symptomatic treatment remains the cornerstone in NCC management which should not only focuses on epilepsy, but also on other manifestations that cause considerable burden (recurrent headaches, cognitive decline. Accurate patients' categorization, better antiparasitic regimens, and definition of new clinical outcomes for trials on NCC could improve management quality and prognosis of NCC. Prevention strategies targeting tapeworm carriers and infected pigs are yielding good results in local models. If local elimination of transmission is confirmed and replicated, this will open the door to cysticercosis eradication efforts worldwide. Keywords: neurocysticercosis, Taenia solium, epilepsy, headache, albendazole, praziquantel
Georgescu, Dan I; Higham, Nicholas J; Peters, Gareth W
2018-03-01
We derive explicit solutions to the problem of completing a partially specified correlation matrix. Our results apply to several block structures for the unspecified entries that arise in insurance and risk management, where an insurance company with many lines of business is required to satisfy certain capital requirements but may have incomplete knowledge of the underlying correlation matrix. Among the many possible completions, we focus on the one with maximal determinant. This has attractive properties and we argue that it is suitable for use in the insurance application. Our explicit formulae enable easy solution of practical problems and are useful for testing more general algorithms for the maximal determinant correlation matrix completion problem.
DEFF Research Database (Denmark)
Identity is a keyword in a number of academic fields as well as in public debate and in politics. During the last decades, references to identity have proliferated, yet there is no simple definition available that corresponds to the use of the notion in all contexts. The significance of the notion...
Men as victims: "victim" identities, gay identities, and masculinities.
Dunn, Peter
2012-11-01
The impact and meanings of homophobic violence on gay men's identities are explored with a particular focus on their identities as men and as gay men. Homosexuality can pose a challenge to conventional masculinities, and for some gay men, being victimized on account of sexual orientation reawakens conflicts about their masculinity that they thought they had resolved. Being victimized can reinvoke shame that is rooted in failure or unwillingness to uphold masculine norms. For some gay men, victimization therefore has connotations of nonmasculinity that make being a victim an undesirable status, yet that status must be claimed to obtain a response from criminal justice or victim services. Men who experience homophobic abuse are helped by accepting a victim identity, but only if they can quickly move on from it by reconstructing a masculine gay (nonvictim) identity. This process can be facilitated by agencies such as the police and victim services, provided they help men exercise agency in "fighting back," that is, resisting further victimization and recovering.
Entrepreneurship Education as Identity Workspace
DEFF Research Database (Denmark)
Frederiksen, Signe Hedeboe
2016-01-01
Entrepreneurship education theory and practice show increasing interest in identity work as an important part of entrepreneurial learning. Entrepreneurship programs become identity workspaces where pedagogical designs stimulate entrepreneurial identity work and support individuals’ discovery...... of themselves as entrepreneurs. This article investigates how entrepreneurship education is practiced as an identity workspace, when reflective identity work is turned into a pedagogical strategy for entrepreneurial learning. I present empirical data from a qualitative fieldstudy in an eleven week mandatory...... and identities. Exposed to identity work practices in class, learners experienced conflicting demands participating as succesful students and participating as potential entrepreneurs. The study draws attention to how an education setting contextualises identity work as a social practice. It critisises...
BRANDING AND IDENTITY BUILDING FOR A SMALL COMPANY : Focused on Visual Identity
Näveri, Mattea
2015-01-01
The topic of this thesis is branding and identity of a small business, with a focus on visual identity. The major part of this thesis focuses on the research done on visual identity and the basic ideation of branding. The other half specifically focuses on the visual identity, the creation of a logo for the company, defining typography and colour and ephemera, and particularly, the company’s business card. The main goal was to execute a unique, individualized branding, which showcases...
Schilpzand, Pauline; Huang, Lei
2018-04-16
In this article we build on relational Sociometer Theory (Leary, 2005; Leary & Baumeister, 2000) to posit the impact of the belongingness threat of experienced incivility in one's work team on employee feelings of ostracism and subsequent engagement in proactive performance. Integrating the social-relational framework of Self-Identity Orientation Theory (Brewer & Gardner, 1996; Cooper & Thatcher, 2010), we nuance our predictions by hypothesizing that chronic self-identification orientations influence both the effect that experiencing incivility in one's work team exerts on feeling ostracized, and the impact that feeling ostracized has on subsequent employee proactive performance. Using a sample of 212 employees and their 51 supervising managers employed in an Internet service and solution company in China, we found support for our hypothesized model. Implications for theory and practice are discussed. (PsycINFO Database Record (c) 2018 APA, all rights reserved).
Directory of Open Access Journals (Sweden)
Víctor Fco. Sampedro Blanco
2004-10-01
Full Text Available The media establish, in large part, the patterns of visibility and public recognition of collective identities. We define media identities as those that are the object of production and diffusion by the media. From this discourse, the communities and individuals elaborate media-influenced identifications; that is, processes of recognition or banishment; (rearticulating the identity markers that the media offer with other cognitive and emotional sources. The generation and appropriation of the identities are subjected to a media hierarchisation that influences their normalisation or marginalisation. The identities presented by the media and assumed by the audience as part of the official, hegemonic discourse are normalised, whereas the identities and identifications formulated in popular and minority terms are marginalised. After presenting this conceptual and analytical framework, this study attempts to outline the logics that condition the presentation, on the one hand, andthe public recognition, on the other hand, of contemporary identities.
Choosing Software Solution for Inventory Management in the Firm Privošči si d.o.o.
Ban, Klemen
2010-01-01
Choosing software that supports the business process in firms is a demanding problem. On the software market there is a lot to choose from and the chosen solution has to meet the firm's requirements. The decision about which software to use has a direct influence on company's profit or loss. The thesis discusses the process of choosing a software solution for inventory management in the firm Privošči si d.o.o.. The firm Privošči si sells healthy snacks in vending machines. In the first cha...
Critical elements in defining work-based identity in a post-apartheid South Africa
Directory of Open Access Journals (Sweden)
Sandra Lloyd
2011-08-01
Research purpose: The aim of the specific research questions was to determine which life sphere and life role elements, and which work-based identity facets were significant in forming work-based identity. Motivation for the study: The findings of the study will enable the formulation of an integrative definition of work-based identity applicable to the South African context. Research design, approach and method: Qualitative data was collected by means of unstructured interviews with 29 employees representing a range of job titles, levels and demographics in a large South African manufacturing company. A grounded theory approach (open and axial coding was used to analyse the data. Main findings: Distinctive individual self-definitions and a number of common themes integrating social and personal identity perspectives emerged from the data. These themes provided a sound basis for the proposed integrative model to define work-based identity. Practical/managerial implications: The findings of this research will assist human resource practitioners to develop training interventions and management strategies for the potential enhancement of work-based identities. This will result in a more engaged and harmonised workforce. Contribution/value-add: This was the first study of its kind to identify and delineate significant work-based identity elements for the formation of a work-based identity within a South African work context.
Coming to an Asexual Identity: Negotiating Identity, Negotiating Desire.
Scherrer, Kristin S
2008-10-01
Sexuality is generally considered an important aspect of self-hood. Therefore, individuals who do not experience sexual attraction, and embrace an asexual identity are in a unique position to inform the social construction of sexuality. This study explores the experiences of asexual individuals utilizing open ended Internet survey data from 102 self-identified asexual people. In this paper I describe several distinct aspects of asexual identities: the meanings of sexual, and therefore, asexual behaviors, essentialist characterizations of asexuality, and lastly, interest in romance as a distinct dimension of sexuality. These findings have implications not only for asexual identities, but also for the connections of asexuality with other marginalized sexualities.
Governing the ethical consumer: identity, choice and the primary care medical encounter.
McDonald, Ruth; Mead, Nicola; Cheraghi-Sohi, Sudeh; Bower, Peter; Whalley, Diane; Roland, Martin
2007-04-01
Government policy promoting consumerism in healthcare can be seen as offering up certain preferred identities to which its citizens are encouraged to aspire. Whilst many commentators reject the notion that health services users should be conceived of as consumers, this paper outlines the relevance of the concept to our understanding of the ways in which individuals manage their health and service use. The paper examines the identity work undertaken by individuals in relation to decisions about healthcare preferences and assesses the extent to which this is compatible with the identities promoted in Government policy. We suggest that in circumstances where individuals feel both a sense of personal entitlement and a desire to be supportive of the needs of other members of the community, 'doing' ethical consumer can be fraught with discomfort and anxiety. These anxieties are exacerbated in a context where citizenship is increasingly being defined in terms of consumer identities, and making good (health) choices might be seen as distinguishing the civilised from the marginalised.
Apotemnophilia or body integrity identity disorder: a case report review.
Bou Khalil, Rami; Richa, Sami
2012-12-01
Apotemnophilia or body integrity identity disorder (BIID) denotes a syndrome in which a person is preoccupied with the desire to amputate a healthy limb. In this report, we review the available case reports in the literature in order to enhance psychiatrists' and physicians' comprehension of this disorder. A search for the case reports available via MEDLINE was done since the first case report published by Money et al in 1977 till May 2011, using the following terms: apotemnophilia, self-demand amputation, body integrity identity disorder, and BIID. In all, 14 case reports were found relevant to our search. The desire to amputate one's healthy limb seems to be related to a major disturbance in the person's perception of one's own identity, where limb amputation can relieve temporarily the patient's feeling of distress without necessarily and uniformly adjusting the patient's own identity misperception. More investigations are needed in this domain in order to develop noninvasive treatment strategies that approach this aspect of the patient's distress within a globalist perspective. In addition, the health professionals' awareness regarding this disorder is required to ensure professional management of patients' suffering.
Ethnic identity, territory and sustainable development
International Nuclear Information System (INIS)
Carmona Maya, Sergio Ivan
1998-01-01
This article explores, within the relationship between territory and society, the various points concerning cultural, social and ethnic identity through which the social contract on sustainable development must confront its greatest contradictions. The political position taken as regards sustainable development seeks cultural unity as a necessary condition for establishing modern forms of behavior to deal with styles of development and the management of the environment, for which to reconcile cultural diversity and the permanent social interaction between different ethnic groups, which is both imperative and of the utmost urgency
Air quality management: challenges and solutions in delivering air quality action plans
Energy Technology Data Exchange (ETDEWEB)
Beattie, C.I.; Longhurst, J.W.S.; Woodfield, N.K.
2000-07-01
The Air Quality Strategy for England, Scotland, Wales and Northern Ireland (DETR, 2001) has the aim of showing how improved local air quality in the UK may be delivered. Through a process of reviewing and assessing local air quality in both urban and rural localities, a clear picture is emerging of areas of the UK where air quality objectives are not likely to be met. The next challenge will be the identification of the required actions and new ways of working to achieve specific air quality objectives. The declaration of air quality management areas, where objectives are not predicted to be met by their target years, involves co-ordinated local action and collaborative working, which can only be effective with support across local authority departments and external stake holders. This paper provides a background to the relevant legislation underpinning, local air quality management and summarises the review and assessment process. It then comments on future directions in relation to the designation of Air Quality Management Areas and considers the requirements of action plans to deliver the goal of cleaner air in the UK. It is concluded that the UK has developed a highly sophisticated system of air quality management over a relatively short period of time, and with it has brought a new way of local authority working. The challenge of the next stage of the process is likely to be in implementing cost effective and proportional solutions to identified problems at the local level. (Author)
Determining the disease management process for epileptic patients: A qualitative study.
Hosseini, Nazafarin; Sharif, Farkhondeh; Ahmadi, Fazlollah; Zare, Mohammad
2016-01-01
Epilepsy exposes patients to many physical, social, and emotional challenges. Thus, it seems to portray a complex picture and needs holistic care. Medical treatment and psychosocial part of epilepsy remain central to managing and improving the patient's qualify of life through team efforts. Some studies have shown the dimensions of self-management, but its management process of epilepsy patients, especially in Iran, is not clear. This study aimed to determine the disease management process in patients with epilepsy in Iran. This qualitative approach and grounded theory study was conducted from January 2009 to February 2012 in Isfahan city (Iran). Thirty-two participants were recruited by the goal-oriented, and snowball sample selection and theoretical sampling methods. After conducting a total of 43 in-depth interviews with the participants, the researchers reached data saturation. Data were analyzed using Strauss and Corbin method. With a focus on disease management process, researchers found three main themes and seven sub-themes as a psychosocial process (PSP). The main themes were: perception of threat to self-identity, effort to preserve self-identity, and burn out. The psychosocial aspect of the disease generated one main variable "the perception of identity loss" and one central variable "searching for self-identity." Participants attributed threat to self-identity and burn out to the way their disease was managed requiring efforts to preserve their identity. Recommendations consist of support programs and strategies to improve the public perception of epilepsy in Iran, help patients accept their condition and preserve self-identity, and most importantly, enhance medical management of epilepsy.
A parent-report gender identity questionnaire for children.
Johnson, Laurel L; Bradley, Susan J; Birkenfeld-Adams, Andrea S; Kuksis, Myra A Radzins; Maing, Dianne M; Mitchell, Janet N; Zucker, Kenneth J
2004-04-01
This paper reports on the psychometric properties of a 16-item parent-report Gender Identity Questionnaire, originally developed by P. H. Elizabeth and R. Green (1984), to aid in the assessment of children with potential problems in their gender identity development. The questionnaire, which covered aspects of the core phenomenology of gender identity disorder (GID), was completed by parents of gender-referred children (N = 325) and controls (siblings, clinic-referred, and nonreferred; N = 504), who ranged in age from 2.5-12 years (mean age, 7.6 years). Factor-analysis indicated that a one-factor solution, containing 14 of the 16 items with factor loadings > or =.30, best fit the data, accounting for 43.7% of the variance. The gender-referred children had a significantly more deviant total score than did the controls, with a large effect size of 3.70. The GIQ total score had negligible age effects, indicating that the questionnaire has utility for assessing change over time. The gender-referred children who met the complete DSM criteria for GID had a significantly more deviant total score than did the children who were subthreshold for GID, although the latter group had a mean score that was closer to the threshold cases than to the controls. With a specificity rate set at 95% for the controls, the sensitivity rate for the probands was 86.8%. It is concluded that this parent-report gender identity questionnaire has excellent psychometric properties and can serve as a useful screening device for front-line clinicians, for whom more extensive, expensive, and time-consuming assessment procedures may be precluded.
Identity Support, Identity Devaluation, and Well-Being among Lesbians
Beals, Kristin P.; Peplau, Letitia Anne
2005-01-01
This research tested predictions about the association of identity support and identity devaluation with psychological well-being (self-esteem, life satisfaction, and depression). Lesbian women completed baseline surveys (N=42), then provided daily experience reports during a 2-week period (n=38), and completed a 2-month follow-up survey (n=34).…
Racial Identity Attitudes and Ego Identity Statuses in Dominican and Puerto Rican College Students
Sanchez, Delida
2013-01-01
This study explored the relation between racial identity attitudes and ego identity statuses in 94 Dominican and Puerto Rican Latino college students in an urban public college setting. Simultaneous regression analyses were conducted to test the relation between racial identity attitudes and ego identity statuses, and findings indicated that…
Deaux, Kay; Burke, Peter
2010-01-01
Sociology and psychology are no strangers in the theoretical world of self and identity. Early works by William James (1890), a psychologist, and George Herbert Mead (1934), a sociologist, are often taken as a starting point by investigators in both fields. In more recent years, with the development of a number of identity theories in both fields,…
Shively, Michael G.; DeCecco, John P.
1977-01-01
This paper examines the four components of sexual identity: biological sex, gender identity, social sex-role, and sexual orientation. Theories about the development of each component and how they combine and conflict to form the individual's sexual identity are discussed. (Author)
Korean Adoptee Identity: Adoptive and Ethnic Identity Profiles of Adopted Korean Americans
Beaupre, Adam J.; Reichwald, Reed; Zhou, Xiang; Raleigh, Elizabeth; Lee, Richard M.
2015-01-01
Adopted Korean adolescents face the task of grappling with their identity as Koreans and coming to terms with their adoptive status. In order to explore these dual identities, the authors conducted a person-centered study of the identity profiles of 189 adopted Korean American adolescents. Using cluster analytic procedures, the study examined…
McNamara, Niamh; Parsons, Harriet
2016-12-01
Retention of a positively valued illness identity contributes to poor outcomes for individuals with eating disorders (EDs). Consequently, dis-identification from the illness identity and the adoption of a recovery identity are vital for successful recovery. While social identity processes have been shown to influence ED maintenance, their role in recovery is rarely considered. This study explores how a sense of shared identity helps individuals with EDs manage their condition and promotes recovery. Transcripts from 18 online support sessions involving 75 participants were thematically analysed. Our findings suggest that the illness identity initially operates as a social identity that forms the basis for connections with similar others. For those wishing to recover, identity-based support is then perceived to be more effective than that found outside the group. Online interactions also facilitate construction of a new shared recovery identity which promotes a shift from the illness identity as a primary source of definition and endorses group norms of illness disclosure and treatment engagement. While in the clinical literature, ED identity is seen as problematic and interventions are targeted at challenging an individual's self-concept, we suggest that interventions could instead harness identity resources to support a transition to a recovery identity. © 2016 The British Psychological Society.
Directory of Open Access Journals (Sweden)
Gürol Baba
2016-01-01
Full Text Available In the last two decades, most of the IR academia’s attention on Southeast Asian regionalism utilised constructivism and/or realism and has focused on ASEAN and its derivatives. This article aims to skew this angle by elaborating a possible relationship between Asian values and a normative understanding of Southeast Asian identity. The major reason for this article’s focus on a normative interpretation is that a practical application of Southeast Asian identity is not very achievable due to various ethnic, cultural, political, territorial, and historical diversities. While the region is diverse, there are also a number of commonalities among its states. Asian values, from a Confucian perspective, account for some of these commonalities. By using constructivists’ claims on both the links between norms and identity and the dynamic interaction between values and norms, this article argues that Asian values could contribute to the development of Amitav Acharya’s widely cited normative/ideational format of Southeast Asian identity. The article takes ASEAN identity as a case study and aims to show why a normative identity is more achievable than a practical identity among Southeast Asians, and how Asian values might contribute to the creation of this shared identity.
On generalized Melvin solution for the Lie algebra E6
International Nuclear Information System (INIS)
Bolokhov, S.V.; Ivashchuk, V.D.
2017-01-01
A multidimensional generalization of Melvin's solution for an arbitrary simple Lie algebra G is considered. The gravitational model in D dimensions, D ≥ 4, contains n 2-forms and l ≥ n scalar fields, where n is the rank of G. The solution is governed by a set of n functions H s (z) obeying n ordinary differential equations with certain boundary conditions imposed. It was conjectured earlier that these functions should be polynomials (the so-called fluxbrane polynomials). The polynomials H s (z), s = 1,.., 6, for the Lie algebra E 6 are obtained and a corresponding solution for l = n = 6 is presented. The polynomials depend upon integration constants Q s , s = 1,.., 6. They obey symmetry and duality identities. The latter ones are used in deriving asymptotic relations for solutions at large distances. The power-law asymptotic relations for E 6 -polynomials at large z are governed by the integer-valued matrix ν = A -1 (I + P), where A -1 is the inverse Cartan matrix, I is the identity matrix and P is a permutation matrix, corresponding to a generator of the Z 2 -group of symmetry of the Dynkin diagram. The 2-form fluxes Φ s , s = 1,.., 6, are calculated. (orig.)
Identity-driven differences in stakeholder concerns about hunting wolves.
Lute, Michelle L; Bump, Adam; Gore, Meredith L
2014-01-01
Whereas past wolf management in the United States was restricted to recovery, managers must now contend with publicly contentious post-recovery issues including regulated hunting seasons. Understanding stakeholder concerns associated with hunting can inform stakeholder engagement, communication, and policy development and evaluation. Social identity theory (SIT) has been used to understand how groups interact, why they conflict, and how collaboration may be achieved. Applying SIT to stakeholder conflicts about wolf hunting may help delineate groups according to their concern about, support for or opposition to the policy choice of hunting wolves. Our objective was to assess concerns about hunting as a tool to resolve conflict in Michigan, using SIT as a framework. We used a mixed-modal sampling approach (e.g., paper, Internet) with wolf hunting-related public meeting participants in March 2013. Survey questions focused on 12 concerns previously identified as associated with hunting as a management tool to resolve conflict. Respondents (n = 666) cared greatly about wolves but were divided over hunting wolves. Wolf conflicts, use of science in policy decisions, and maintaining a wolf population were the highest ranked concerns. Principle components analysis reduced concerns into three factors that explained 50.7% of total variance; concerns crystallized over justifications for hunting. General linear models revealed a lack of geographic influence on care, fear and support for hunting related to wolves. These findings challenge assumptions about regional differences and suggest a strong role for social identity in driving dichotomized public perceptions in wildlife management.
Identity-driven differences in stakeholder concerns about hunting wolves.
Directory of Open Access Journals (Sweden)
Michelle L Lute
Full Text Available Whereas past wolf management in the United States was restricted to recovery, managers must now contend with publicly contentious post-recovery issues including regulated hunting seasons. Understanding stakeholder concerns associated with hunting can inform stakeholder engagement, communication, and policy development and evaluation. Social identity theory (SIT has been used to understand how groups interact, why they conflict, and how collaboration may be achieved. Applying SIT to stakeholder conflicts about wolf hunting may help delineate groups according to their concern about, support for or opposition to the policy choice of hunting wolves. Our objective was to assess concerns about hunting as a tool to resolve conflict in Michigan, using SIT as a framework. We used a mixed-modal sampling approach (e.g., paper, Internet with wolf hunting-related public meeting participants in March 2013. Survey questions focused on 12 concerns previously identified as associated with hunting as a management tool to resolve conflict. Respondents (n = 666 cared greatly about wolves but were divided over hunting wolves. Wolf conflicts, use of science in policy decisions, and maintaining a wolf population were the highest ranked concerns. Principle components analysis reduced concerns into three factors that explained 50.7% of total variance; concerns crystallized over justifications for hunting. General linear models revealed a lack of geographic influence on care, fear and support for hunting related to wolves. These findings challenge assumptions about regional differences and suggest a strong role for social identity in driving dichotomized public perceptions in wildlife management.
Metropolis Parking Problems and Management Planning Solutions for Traffic Operation Effectiveness
Directory of Open Access Journals (Sweden)
Yuejun Liu
2012-01-01
Full Text Available Advances in mobility are clearly illustrated by the rapid development of urbanization and motorization in developing countries. Following the dramatic incensement of traffic demand, the parking problem has been becoming much more seriously important in many metropolises. With the aim of seeking solutions as to how the parking system could operate more efficiently by using new technologies and new methodologies, this paper discusses the application of geographic information system into the parking planning and management for traffic operation effectiveness in metropolis. The concentration of this paper includes the characteristics of parking demand and the causations of parking problems, especially the basic parking principle and strategies for solving parking problems from the perspective of geographic information system are discussed in enough detail in this paper.
Social Identity Change: Shifts in Social Identity during Adolescence
Tanti, Chris; Stukas, Arthur A.; Halloran, Michael J.; Foddy, Margaret
2011-01-01
This study investigated the proposition that adolescence involves significant shifts in social identity as a function of changes in social context and cognitive style. Using an experimental design, we primed either peer or gender identity with a sample of 380 early- (12-13 years), mid- (15-16 years), and late-adolescents (18-20 years) and then…
Inter-identity autobiographical amnesia in patients with dissociative identity disorder.
Huntjens, Rafaële J C; Verschuere, Bruno; McNally, Richard J
2012-01-01
A major symptom of Dissociative Identity Disorder (DID; formerly Multiple Personality Disorder) is dissociative amnesia, the inability to recall important personal information. Only two case studies have directly addressed autobiographical memory in DID. Both provided evidence suggestive of dissociative amnesia. The aim of the current study was to objectively assess transfer of autobiographical information between identities in a larger sample of DID patients. Using a concealed information task, we assessed recognition of autobiographical details in an amnesic identity. Eleven DID patients, 27 normal controls, and 23 controls simulating DID participated. Controls and simulators were matched to patients on age, education level, and type of autobiographical memory tested. Although patients subjectively reported amnesia for the autobiographical details included in the task, the results indicated transfer of information between identities. The results call for a revision of the DID definition. The amnesia criterion should be modified to emphasize its subjective nature.
Being Tolerant about Identity?
van Rooij, R.; Gutzmann, D.; Köpping, J.; Meier, C.
2014-01-01
Identity and identification are very important concepts in philosophy and logic. They are crucial for the analysis of quantification and for counting. According to some philosophers, many examples that are supposed to show that identity is contingent, in fact show that the notion of identity is
Post-colonial identity in Greenland?
DEFF Research Database (Denmark)
Gad, Ulrik Pram
2009-01-01
could be furthered by bringing politics back in. Based on a discourse analysis of the Greenlandic debate on language, this paper makes three claims: First, the identity projects promoted in Greenland are based on an essentialist conception of identity. Secondly, Greenlandic identity discourse combines......In the gradual unravelling of Greenland’s colonial relationship to Denmark, an essentialist conceptualization of Greenlandic identity has played a significant role. However, both our scholarly understanding of post-colonial Greenlandic identity and the process towards independence for Greenland...... elements of traditional Inuit culture and elements of colonial modernity. Thirdly, monolingual Greenlanders are those with the most to gain from abandoning the dichotomy of essentialist identities. Strategically, the paper suggests a post-post-colonial Greenlandic identity as a means of avoiding...
Analytic solution to variance optimization with no short positions
Kondor, Imre; Papp, Gábor; Caccioli, Fabio
2017-12-01
We consider the variance portfolio optimization problem with a ban on short selling. We provide an analytical solution by means of the replica method for the case of a portfolio of independent, but not identically distributed, assets. We study the behavior of the solution as a function of the ratio r between the number N of assets and the length T of the time series of returns used to estimate risk. The no-short-selling constraint acts as an asymmetric \
On the fundamentals of identity
van der Gaag, Mandy
Various new perspectives on identity have been introduced or have increased in popularity over the past two decades. These include identity as dynamic system (Kunnen & Bosma, 2001), a narrative approach to identity (McAdams, 2001), multi-dimensional models of identity formation (Luyckx et al., 2006;
Designing Business Solutions for Plastic Waste Management to Enhance Circular Transitions in Kenya
Directory of Open Access Journals (Sweden)
Balint Horvath
2018-05-01
Full Text Available Least-developed countries face many challenges regarding their plastic waste management systems. In 2017, Kenya imposed a selective ban targeting manufacturers and consumers of plastic carrier bags. However, this selectivity does not avoid the continuous use of other plastic products. The present paper states that circular priorities, which have been defined to advanced economies, would not be entirely valid for the rest of the world. While high-income countries face only the impacts of their own consumption, developing nations must endure the externalities of these developed economies. Thus, the focus of the least developed part of the world must not be on reducing its relatively normal (or even low consumption, but to manage its surplus material flow. According to the employed circular evaluation methodology (CEV—Circular Economic Value, the circularity level in Kenya’s plastic material flow stands on a rather low stage with 32.72%. This result outlines the linear deficiencies of the plastic waste management system and urges the prevention of further material leakage (such as energy use. Through the Business Model Canvas (BMC approach this study offers a holistic business solution which can improve the system’s sustainability.
Wheldon, Christopher W; Kolar, Stephanie K; Hernandez, Natalie D; Daley, Ellen M
2017-01-01
The objective of this study was to assess the factorial invariance and convergent validity of the Group-Based Medical Mistrust Scale (GBMMS) across gender (male and female) and ethnoracial identity (Latino and Black). Minority students (N = 686) attending a southeastern university were surveyed in the fall of 2011. Psychometric analysis of the GBMMS was performed. A three-factor solution fit the data after the omission of two problematic items. This revised version of the GBMMS exhibited sufficient configural, metric, and scalar invariance. Convergence of the GBMMS with conceptually related measures provided further evidence of validity; however, there was variation across ethnoracial identity. The GBMMS has viable psychometric properties across gender and ethnoracial identity in Black and Latino populations.
Personal Identity in Enhancement
Directory of Open Access Journals (Sweden)
Jana Podroužková
2015-09-01
Full Text Available The aim of this paper is to introduce the concept of human enhancement, its methods and its relation to personal identity. Also several approaches to personal identity will be described. Transhumanism is a special think tank supporting human enhancement through modern technologies and some of its representatives claim, that even great changes to human organisms will not affect their personal identity. I will briefly describe the most important means of human enhancment and consider the problem of personal identity for each of them separately.
DEFF Research Database (Denmark)
Henze-Pedersen, Sofie
This qualitative study investigates the relationship between openness and identity among 18 adoptees. Many studies have argued that a high degree of openness is important for the identity formation of adoptees. However, few studies have explored this relationship. Two types of openness...... (biographical knowledge and communicative openness) are used to categorise the empirical material, making it possible to illuminate how different types of openness influence identity. The findings suggest that there is no direct link between a high degree of openness and positive identity formation. Instead...
DEFF Research Database (Denmark)
Feddersen, Helle; Kristiansen, Tine Mechlenborg; Andersen, Pernille Tanggaard
2017-01-01
AIMS AND OBJECTIVES: To derive new conceptual understanding about how women with rheumatoid arthritis manage their illness, motherhood and paid work, based on a comprehensive overview of existing knowledge, gained from qualitative studies. BACKGROUND: Rheumatoid arthritis affects several social...... aspects of life; however, little is known about how women with rheumatoid arthritis simultaneously manage their illness, motherhood and paid work. DESIGN: Qualitative metasynthesis. METHODS: A qualitative metasynthesis informed by Noblit and Hare's meta-ethnography was carried out, based on studies...... identified by a systematic search in nine databases. RESULTS: Six studies were included. Social interactions in the performance of three interdependent sub-identities emerged as an overarching category, with three sub-categories: Sub-identities associated with (1) Paid work (2) Motherhood and (3) Rheumatoid...
Inter-Identity Autobiographical Amnesia in Patients with Dissociative Identity Disorder
Huntjens, Rafaële J. C.; Verschuere, Bruno; McNally, Richard J.
2012-01-01
Background A major symptom of Dissociative Identity Disorder (DID; formerly Multiple Personality Disorder) is dissociative amnesia, the inability to recall important personal information. Only two case studies have directly addressed autobiographical memory in DID. Both provided evidence suggestive of dissociative amnesia. The aim of the current study was to objectively assess transfer of autobiographical information between identities in a larger sample of DID patients. Methods Using a concealed information task, we assessed recognition of autobiographical details in an amnesic identity. Eleven DID patients, 27 normal controls, and 23 controls simulating DID participated. Controls and simulators were matched to patients on age, education level, and type of autobiographical memory tested. Findings Although patients subjectively reported amnesia for the autobiographical details included in the task, the results indicated transfer of information between identities. Conclusion The results call for a revision of the DID definition. The amnesia criterion should be modified to emphasize its subjective nature. PMID:22815769
Inter-identity autobiographical amnesia in patients with dissociative identity disorder.
Directory of Open Access Journals (Sweden)
Rafaële J C Huntjens
Full Text Available BACKGROUND: A major symptom of Dissociative Identity Disorder (DID; formerly Multiple Personality Disorder is dissociative amnesia, the inability to recall important personal information. Only two case studies have directly addressed autobiographical memory in DID. Both provided evidence suggestive of dissociative amnesia. The aim of the current study was to objectively assess transfer of autobiographical information between identities in a larger sample of DID patients. METHODS: Using a concealed information task, we assessed recognition of autobiographical details in an amnesic identity. Eleven DID patients, 27 normal controls, and 23 controls simulating DID participated. Controls and simulators were matched to patients on age, education level, and type of autobiographical memory tested. FINDINGS: Although patients subjectively reported amnesia for the autobiographical details included in the task, the results indicated transfer of information between identities. CONCLUSION: The results call for a revision of the DID definition. The amnesia criterion should be modified to emphasize its subjective nature.
Nature versus nurture: identical twins and bariatric surgery.
Hagedorn, Judith C; Morton, John M
2007-06-01
Genetics and environment both play a role in weight maintenance. Twin studies may help clarify the influence of nature vs nurture in weight loss. We present the largest U.S. experience with monozygotic (MZ) twins undergoing bariatric surgery. We retrospectively reviewed the charts of four sets of MZ twins who underwent Roux-en-Y gastric bypass (RYGBP) surgery and laparoscopic adjustable gastric band (LAGB) placement at three different institutions. BMI and co-morbidities were examined pre- and postoperatively, and laboratory values were recorded. All four sets of twins are female, live together, and have similar professions. Twin cohort 1 had near identical weight loss patterns after open RYGBP surgery in 1996 (preop 146/142 kg; 2 years 82/82; and 10 years 108/107). Twin cohort 1 also both underwent cholecystectomies within the first year postoperatively. Twin cohort 2 underwent laparoscopic RYGBP surgery and also required cholecystectomies in the first postoperative year. Cohort 2 also experienced nearly identical weight loss at 1 year (36.7% vs 37.0% BMI loss). Twin cohort 3 underwent LAGB placement with two different surgeons with differing amounts of weight loss at 6 months (6.5% vs 15.7% BMI loss). Finally, twin cohort 4 underwent laparoscopic RYGBP with 2-year BMI loss of 39% vs 34%. In twin cohort 4, the twin who lost less weight lived apart from her twin and extended family, and her weight loss was less than the twin living with her family. Two sets of MZ twins had identical responses to bariatric surgery. The other two sets of identical twins had differential weight loss results, possibly due to differences in surgical approach and social support. While genetics do exert a strong influence on weight loss and maintenance, this case series demonstrates the potential effect of social support and postoperative management upon postoperative weight loss in the presence of identical genetics.