WorldWideScience

Sample records for identity management systems

  1. Identity management and witness protection system

    OpenAIRE

    Paunović, Saša; Starčević, Dušan; Nešić, Lazar

    2013-01-01

    The protection of participants in criminal proceedings is one of the most important tools for prosecution of war crimes and organized crime cases. The paper presents the basic characteristics and the importance of implementing the Program of protection in criminal proceedings, with emphasis on the protection system and management of identity. Special attention was paid to challenges facing the protection system in criminal proceedings and the management of identities, which are caused by the ...

  2. Mobile Identity Management

    NARCIS (Netherlands)

    Hoepman, J.J.

    2011-01-01

    Identity management consists of the processes and all underlying technologies for the creation, management, and usage of digital identities. Business rely on identity management systems to simplify the management of access rights to their systems and services for both their employees and their

  3. Integrated Identity and Access Management System for Tertiary ...

    African Journals Online (AJOL)

    Nigerian Journal of Technology ... identity management and access control and the unavailability of actionable information on pattern of ... This Tertiary Identity and Access Management System (T-IAMS) is a fingerprint biometric database that ...

  4. Federated Identity Management

    OpenAIRE

    Chadwick, David W.

    2009-01-01

    Abstract. This paper addresses the topic of federated identity management. It discusses in detail the following topics: what is digital identity, what is identity management, what is federated identity management, Kim Camerons 7 Laws of Identity, how can we protect the users privacy in a federated environment, levels of assurance, some past and present federated identity management systems, and some current research in FIM.

  5. A Case for Implementation of Citizen Centric National Identity Management Systems

    DEFF Research Database (Denmark)

    Adjei, Joseph K.

    of trust in transacting parties. Policy makers are therefore trying to implement identity policies to prevent identity abuses, promote the seamless flow of business transactions, and provide citizens the ability to exercise informational self-determination. Previously, the design of identity management...... and exposure, and a high level of literacy. But in developing countries infrastructural challenges, low literacy level, and physical verification of credentials hamper the effective use of identity management systems. This PhD study adapts the DeLone and McLean model of information systems success to the case...

  6. integrated identity and integrated identity and access management

    African Journals Online (AJOL)

    eobe

    Management System (T-IAMS) is a fingerprint biometric database that centrally manages students' identity, course a fingerprint ... registration, library and medical services information. .... based application and a web-based application.

  7. Identity Management

    CERN Document Server

    Pace, A

    2008-01-01

    This paper introduces identity management concepts and discusses various issues associated with its implementation. It will try to highlight technical, legal, and social aspects that must been foreseen when defining the numerous processes that an identity management infrastructure must support. Grid interoperability as well as cross platform interoperability is addressed on the technical aspect, followed by a short discussion on social consequences on user’s privacy when completed traceability is enforced and some examples on how identity management has been implemented at CERN

  8. Identity management

    International Nuclear Information System (INIS)

    Pace, A

    2008-01-01

    This paper introduces identity management concepts and discusses various issues associated with their implementation. It will try to highlight technical, legal, and social aspects that must been foreseen when defining the numerous processes that an identity management infrastructure must support. Grid interoperability as well as cross platform interoperability is addressed on the technical aspect, followed by a short discussion on social consequences on user's privacy when completed traceability is enforced. The paper will finally give some examples on how identity management has been implemented at CERN

  9. Identity management

    Energy Technology Data Exchange (ETDEWEB)

    Pace, A [CERN, Geneva (Switzerland)

    2008-07-01

    This paper introduces identity management concepts and discusses various issues associated with their implementation. It will try to highlight technical, legal, and social aspects that must been foreseen when defining the numerous processes that an identity management infrastructure must support. Grid interoperability as well as cross platform interoperability is addressed on the technical aspect, followed by a short discussion on social consequences on user's privacy when completed traceability is enforced. The paper will finally give some examples on how identity management has been implemented at CERN.

  10. Building trusted national identity management systems: Presenting the privacy concern-trust (PCT) model

    DEFF Research Database (Denmark)

    Adjei, Joseph K.; Olesen, Henning

    This paper discusses the effect of trust and information privacy concerns on citizens’ attitude towards national identity management systems. We introduce the privacyconcerns- trust model, which shows the role of trust in mediating and moderating citizens’ attitude towards identity management...... systems. We adopted a qualitative research approach in our analysis of data that was gathered through a series of interviews and a stakeholder workshop in Ghana. Our findings indicate that, beyond the threshold level of trust, societal information privacy concern is low; hence, trust is high, thereby...

  11. Analysis of Privacy-Enhancing Identity Management Systems

    DEFF Research Database (Denmark)

    Adjei, Joseph K.; Olesen, Henning

    Privacy has become a major issue for policy makers. This has been impelled by the rapid development of technologies that facilitate collection, distribution, storage, and manipulation of personal information. Business organizations are finding new ways of leveraging the value derived from consumer...... is an attempt to understand the relationship between individuals’ intentions to disclose personal information, their actual personal information disclosure behaviours, and how these can be leveraged to develop privacy-enhancing identity management systems (IDMS) that users can trust. Legal, regulatory...... and technological aspects of privacy and technology adoption are also discussed....

  12. A framework for implementation of user-centric identity management systems

    DEFF Research Database (Denmark)

    Adjei, Joseph K.; Olesen, Henning

    2010-01-01

    Users increasingly become part of electronic transactions, which take place instantaneously without direct user involvement. This leads to the risk of data manipulation, identity theft and privacy violation, and it has become a major concern for individuals and businesses around the world. Gov......-ernments in many countries are implementing identity man-agement systems (IdMS) to curtail these incidences and to offer citizens the power to exercise informational self-determination. Using concepts from technology adoption and fit-viability theo-ries as well as the laws of identity, this paper analyzes...... the crite-ria for successful implementation and defines a framework for a citizen-centric national IdMS. Results from a survey con-ducted in Ghana are also included....

  13. Holistic Privacy-Preserving Identity Management System for the Internet of Things

    Directory of Open Access Journals (Sweden)

    Jorge Bernal Bernabe

    2017-01-01

    Full Text Available Security and privacy concerns are becoming an important barrier for large scale adoption and deployment of the Internet of Things. To address this issue, the identity management system defined herein provides a novel holistic and privacy-preserving solution aiming to cope with heterogeneous scenarios that requires both traditional online access control and authentication, along with claim-based approach for M2M (machine to machine interactions required in IoT. It combines a cryptographic approach for claim-based authentication using the Idemix anonymous credential system, together with classic IdM mechanisms by relying on the FIWARE IdM (Keyrock. This symbiosis endows the IdM system with advanced features such as privacy-preserving, minimal disclosure, zero-knowledge proofs, unlikability, confidentiality, pseudonymity, strong authentication, user consent, and offline M2M transactions. The IdM system has been specially tailored for the Internet of Things bearing in mind the management of both users’ and smart objects’ identity. Moreover, the IdM system has been successfully implemented, deployed, and tested in the scope of SocIoTal European research project.

  14. The Identity Crisis. Security, Privacy and Usability Issues in Identity Management

    NARCIS (Netherlands)

    Alpár, G.; Hoepman, J.H.; Siljee, B.I.J.

    2011-01-01

    This paper studies the current "identity crisis" caused by the substantial security, privacy and usability shortcomings encountered in existing systems for identity management. Some of these issues are well known, while others are much less understood. This paper brings them together in a single,

  15. Architectural mismatch issues in identity management deployment

    DEFF Research Database (Denmark)

    Andersen, Mads Schaarup

    2010-01-01

    Integrating Commercial Off-The-Shelf products in a company's software product portfolio offers business value, but introduces challenges from a software architecture perspective. In this paper, the research challenges in relation to identity management in the Danish municipality administration...... system called Opus, are outlined. Opus BRS is the identity management part of Opus. Opus integrates SAP, legacy mainframe systems, and other third party systems of the individual municipality. Each of these systems define their own software architecture and access control model, leading to architectural...... mismatch with an impact on security, usability, and maintainability. The research project is discussed and access control and identity provisioning are recognized as the major areas of interest in relation to the mismatch challenges. The project is carried out in close cooperation with KMD, one...

  16. Identity and the Management Project

    DEFF Research Database (Denmark)

    Jørgensen, Kenneth Mølbjerg; Dehlin, Erlend

    The paper discusses the concept of identity in relation to management. We take our starting point in Wittgenstein’s concept language games. We argue that identity is a question of using linguistic tools to construct reality. Two elements of the language game metaphor are central here: rules...... and family resemblance. As such, managing identity in organizations is closely linked to rules and family resemblance. Organizations manage identity through the definition of norms and values for right or wrong, appropriate or inappropriate, to name but a few. Norms and values are important as reference...... points for constructing identities. Managing identity has become more important because the rules-of-the-game have become more unstable. Managing identity is important if the bonds between individuals and organizations are to be sustained. But this task is contradictory and paradoxical of its very nature...

  17. Identity and Access Management and Security in Higher Education.

    Science.gov (United States)

    Bruhn, Mark; Gettes, Michael; West, Ann

    2003-01-01

    Discusses the drivers for an identity management system (IdM), components of this system, and its role within a school security strategy, focusing on: basic access management; requirements for access management; middleware support for an access management system; IdM implementation considerations (e.g., access eligibilities, authentication…

  18. Identity Management

    Data.gov (United States)

    Social Security Administration — Provides information for identity management services on the creation, modification and eventual deletion of accounts and entitlements based on user relationships on...

  19. Strengthen Cloud Computing Security with Federal Identity Management Using Hierarchical Identity-Based Cryptography

    Science.gov (United States)

    Yan, Liang; Rong, Chunming; Zhao, Gansen

    More and more companies begin to provide different kinds of cloud computing services for Internet users at the same time these services also bring some security problems. Currently the majority of cloud computing systems provide digital identity for users to access their services, this will bring some inconvenience for a hybrid cloud that includes multiple private clouds and/or public clouds. Today most cloud computing system use asymmetric and traditional public key cryptography to provide data security and mutual authentication. Identity-based cryptography has some attraction characteristics that seem to fit well the requirements of cloud computing. In this paper, by adopting federated identity management together with hierarchical identity-based cryptography (HIBC), not only the key distribution but also the mutual authentication can be simplified in the cloud.

  20. Role-meanings as a critical factor in understanding doctor managers' identity work and different role identities.

    Science.gov (United States)

    Cascón-Pereira, Rosalía; Chillas, Shiona; Hallier, Jerry

    2016-12-01

    This study examines "identity work" among hybrid doctor-managers (DMs) in the Spanish National Health System to make sense of their managerial roles. In particular, the meanings underlying DMs experience of their hybrid role are investigated using a Grounded Theory methodology, exposing distinctions in role-meanings. Our findings provide evidence that using different social sources of comparison (senior managers or clinicians) to construct the meaning of managerial roles leads to different role-meanings and role identities, which are the source of the two established types of DM in the literature, the reluctant and the enthusiast. The contribution is twofold: our findings lead us to theorize DMs' identity work processes by adding an overlooked role-meaning dimension to identity work; and raise practical reflections for those who wish to develop enthusiast doctor managers. Copyright © 2016 Elsevier Ltd. All rights reserved.

  1. Identity, Diversity and Diversity Management

    DEFF Research Database (Denmark)

    Holck, Lotte; Muhr, Sara Louise; Villeseche, Florence

    2016-01-01

    – The work can encourage policy makers, diversity and HR managers to question their own practices and assumptions leading to more theoretical informed diversity management practices. Originality/value – The theoretical connections between identity and diversity literature have so far not been reviewed......The purpose of this paper is to examine the relationship between the identity and diversity literatures and discuss how a better understanding of the theoretical connections between the two informs both diversity research and diversity management practices. Design/methodology/approach – Literature...... and limitations – is crucial for successful diversity management research and practice. Research limitations/implications – The authors argue for a better understanding of differences, overlaps and limits of different identity perspectives, and for a stronger engagement with practice. Practical implications...

  2. Biometrics and Identity Management

    DEFF Research Database (Denmark)

    management. BIOID 2008. The papers are categorized in four classes. These classes represent the 4 working groups of the COST Action 2101. For more information, see http://www.cost2101.org/.   Biometric data quality and multimodal biometric templates, Unsupervised interactive interfaces for multimodal...... security and border control scenarios it is now apparent that the widespread availability of biometrics in everyday life will also spin out an ever increasing number of (private) applications in other domains. Crucial to this vision is the management of the user's identity, which does not only imply...... biometrics, Biometric attacks and countermeasures, Standards and privacy issues for biometrics in identity documents and smart cards. BIOID 2008 is an initiative of the COST Action 2101 on Biometrics for Identity Documents and Smart Cards. It is supported by the EU Framework 7 Programme. Other sponsors...

  3. Responses to professional identity threat: Identity management strategies in incident narratives of health care professionals.

    Science.gov (United States)

    van Os, Annemiek; de Gilder, Dick; van Dyck, Cathy; Groenewegen, Peter

    2015-01-01

    The purpose of this paper is to explore sensemaking of incidents by health care professionals through an analysis of the role of professional identity in narratives of incidents. Using insights from social identity theory, the authors argue that incidents may create a threat of professional identity, and that professionals make use of identity management strategies in response to this identity threat. The paper draws on a qualitative analysis of incident narratives in 14 semi-structured interviews with physicians, nurses, and residents at a Dutch specialist hospital. The authors used an existing framework of identity management strategies to categorize the narratives. The analysis yielded two main results. First, nurses and residents employed multiple types of identity management strategies simultaneously, which points to the possible benefit of combining different strategies. Second, physicians used the strategy of patronization of other professional groups, a specific form of downward comparison. The authors discuss the implications of the findings in terms of the impact of identity management strategies on the perpetuation of hierarchical differences in health care. The authors argue that efforts to manage incident handling may profit from considering social identity processes in sensemaking of incidents. This is the first study that systematically explores how health care professionals use identity management strategies to maintain a positive professional identity in the face of incidents. This study contributes to research on interdisciplinary cooperation in health care.

  4. Identity Management A Primer

    CERN Document Server

    Sharoni, Ilan; Williamson, Graham; Yip, David

    2009-01-01

    In an age in which the boundaries between the real and the virtual are becoming increasingly blurred, this timely guide teaches both the key issues of identity management as well as appropriate strategies and preventative measures for ensuring personal safety in the virtual world. In a corporate setting, it is essential to identify and control the way in which the organization deals with customers, suppliers, employees, and other users who may interact with the information systems of the company. Providing strategies for overcoming this task in real-world terms as well as questions that assist

  5. Patients' Data Management System Protected by Identity-Based Authentication and Key Exchange.

    Science.gov (United States)

    Rivero-García, Alexandra; Santos-González, Iván; Hernández-Goya, Candelaria; Caballero-Gil, Pino; Yung, Moti

    2017-03-31

    A secure and distributed framework for the management of patients' information in emergency and hospitalization services is proposed here in order to seek improvements in efficiency and security in this important area. In particular, confidentiality protection, mutual authentication, and automatic identification of patients are provided. The proposed system is based on two types of devices: Near Field Communication (NFC) wristbands assigned to patients, and mobile devices assigned to medical staff. Two other main elements of the system are an intermediate server to manage the involved data, and a second server with a private key generator to define the information required to protect communications. An identity-based authentication and key exchange scheme is essential to provide confidential communication and mutual authentication between the medical staff and the private key generator through an intermediate server. The identification of patients is carried out through a keyed-hash message authentication code. Thanks to the combination of the aforementioned tools, a secure alternative mobile health (mHealth) scheme for managing patients' data is defined for emergency and hospitalization services. Different parts of the proposed system have been implemented, including mobile application, intermediate server, private key generator and communication channels. Apart from that, several simulations have been performed, and, compared with the current system, significant improvements in efficiency have been observed.

  6. Identity Management Mismatch Challenges in the Danish Municipality Administration System

    DEFF Research Database (Denmark)

    Andersen, Mads Schaarup; Christensen, Henrik Bærbak

    2010-01-01

    Integrating a COTS product in a company’s product portfolio is appealing from a business perspective but highly challenging from the perspective of the software architecture. In this paper we outline research challenges regarding authorization in the identity management part of the Danish...

  7. A Contextual Model for Identity Management (IdM) Interfaces

    Science.gov (United States)

    Fuller, Nathaniel J.

    2014-01-01

    The usability of Identity Management (IdM) systems is highly dependent upon design that simplifies the processes of identification, authentication, and authorization. Recent findings reveal two critical problems that degrade IdM usability: (1) unfeasible techniques for managing various digital identifiers, and (2) ambiguous security interfaces.…

  8. Exhausting management work: conflicting identities.

    Science.gov (United States)

    Mischenko, Jane

    2005-01-01

    The primary purpose of this paper is to critically explore managers' experience of work identity in the National Health Service (NHS). This paper is unconventional in that it uses an auto-ethnographic approach and poetry as the empirical data from which the conceptual framework evolves. The concepts of identity, power and self are analysed in relation to the narrative utilising a post-structuralist, critical management lens, particularly drawing from Foucault. The paper reflects and critiques the challenges of undertaking auto-ethnography, not least the publication and exposure of a "vulnerable aspect" of the author but also identifies this as a powerful method to explore how one uses narrative to create meaning and constitute oneself, the challenges of such textual representation and the various ways one adapts, resists and survives the challenge of the "multiphrenic" world. The contribution this paper makes is an "outing" of the dynamics of being a manager in the NHS and an opening of a debate on current management discourse and practice. The further value of this paper is the experimentation of critically evaluating an auto-ethnographic approach to researching management identity work.

  9. Biometric identity management for standard mobile medical networks.

    Science.gov (United States)

    Egner, Alexandru; Soceanu, Alexandru; Moldoveanu, Florica

    2012-01-01

    The explosion of healthcare costs over the last decade has prompted the ICT industry to respond with solutions for reducing costs while improving healthcare quality. The ISO/IEEE 11073 family of standards recently released is the first step towards interoperability of mobile medical devices used in patient environments. The standards do not, however, tackle security problems, such as identity management, or the secure exchange of medical data. This paper proposes an enhancement of the ISO/IEEE 11073-20601 protocol with an identity management system based on biometry. The paper describes a novel biometric-based authentication process, together with the biometric key generation algorithm. The proposed extension of the ISO/IEEE 11073-20601 is also presented.

  10. Research Management in Portugal: A Quest for Professional Identity

    Science.gov (United States)

    Trindade, Margarida; Agostinho, Marta

    2014-01-01

    Research managers at science-intensive institutions appear as a continuously evolving group of professionals whose identity is somewhat fragmented, even to themselves. In Portugal, specialized research manager roles have rapidly emerged over the last years alongside the development of a small but consolidated scientific system. In order to get an…

  11. Patients’ Data Management System Protected by Identity-Based Authentication and Key Exchange

    Directory of Open Access Journals (Sweden)

    Alexandra Rivero-García

    2017-03-01

    Full Text Available A secure and distributed framework for the management of patients’ information in emergency and hospitalization services is proposed here in order to seek improvements in efficiency and security in this important area. In particular, confidentiality protection, mutual authentication, and automatic identification of patients are provided. The proposed system is based on two types of devices: Near Field Communication (NFC wristbands assigned to patients, and mobile devices assigned to medical staff. Two other main elements of the system are an intermediate server to manage the involved data, and a second server with a private key generator to define the information required to protect communications. An identity-based authentication and key exchange scheme is essential to provide confidential communication and mutual authentication between the medical staff and the private key generator through an intermediate server. The identification of patients is carried out through a keyed-hash message authentication code. Thanks to the combination of the aforementioned tools, a secure alternative mobile health (mHealth scheme for managing patients’ data is defined for emergency and hospitalization services. Different parts of the proposed system have been implemented, including mobile application, intermediate server, private key generator and communication channels. Apart from that, several simulations have been performed, and, compared with the current system, significant improvements in efficiency have been observed.

  12. Patients’ Data Management System Protected by Identity-Based Authentication and Key Exchange

    Science.gov (United States)

    Rivero-García, Alexandra; Santos-González, Iván; Hernández-Goya, Candelaria; Caballero-Gil, Pino; Yung, Moti

    2017-01-01

    A secure and distributed framework for the management of patients’ information in emergency and hospitalization services is proposed here in order to seek improvements in efficiency and security in this important area. In particular, confidentiality protection, mutual authentication, and automatic identification of patients are provided. The proposed system is based on two types of devices: Near Field Communication (NFC) wristbands assigned to patients, and mobile devices assigned to medical staff. Two other main elements of the system are an intermediate server to manage the involved data, and a second server with a private key generator to define the information required to protect communications. An identity-based authentication and key exchange scheme is essential to provide confidential communication and mutual authentication between the medical staff and the private key generator through an intermediate server. The identification of patients is carried out through a keyed-hash message authentication code. Thanks to the combination of the aforementioned tools, a secure alternative mobile health (mHealth) scheme for managing patients’ data is defined for emergency and hospitalization services. Different parts of the proposed system have been implemented, including mobile application, intermediate server, private key generator and communication channels. Apart from that, several simulations have been performed, and, compared with the current system, significant improvements in efficiency have been observed. PMID:28362328

  13. Social identity management strategies used by workers with acquired hearing loss.

    Science.gov (United States)

    Jennings, Mary Beth; Southall, Kenneth; Gagné, Jean-Pierre

    2013-01-01

    There is a paucity of knowledge about social identity-management by persons with hearing loss. The objective of the study was to gain an understanding from the perspective of the participants, the ways in which workers with acquired hearing loss manage their identity in the workplace. Twelve persons with acquired hearing loss, who were gainfully employed in a variety of settings and occupations in three Canadian cities, participated in audio-recorded semi-structured interviews. A secondary qualitative analysis was conducted on transcripts of interviews collected in a previous study on factors that influence disclosure of hearing loss in the workplace. A qualitative descriptive research paradigm was adopted and content analyses were used to extract pertinent information from verbatim transcripts. Participants described a range of identity-management strategies enacted in the workplace. Five recurrent themes emerged as important considerations in the Art of Identity Management in the workplace: 1. Managing the situation, 2. Having a buddy system, 3. Feeling comfortable, 4. Using personal resources, 5. It gets easier with time. Social identity-management is a complex process. Although persons with acquired hearing loss experience different challenges from other persons with invisible stigmas, similarities in the range of social identity-management strategies employed were evident in our findings. In addition, the social cognitive learning model of disclosure appears to be relevant to the experiences of our participants. The implications of the findings emphasize the importance of all stakeholders working collaboratively to address the issues of the growing population of workers with hearing loss.

  14. Playing It Safe: Identity Management and Single Sign-On

    Science.gov (United States)

    Alawneh, John

    2012-01-01

    Whenever thousands of users need to connect seamlessly to a vast number of online resources, identity management (IDM) becomes a critical capability. Although several products on the market can deliver a robust identity management solution, there is no one-size-fits-all. Identity management requires business processes and a supporting…

  15. CILogon: An Integrated Identity and Access Management Platform for Science

    Science.gov (United States)

    Basney, J.

    2016-12-01

    When scientists work together, they use web sites and other software to share their ideas and data. To ensure the integrity of their work, these systems require the scientists to log in and verify that they are part of the team working on a particular science problem. Too often, the identity and access verification process is a stumbling block for the scientists. Scientific research projects are forced to invest time and effort into developing and supporting Identity and Access Management (IAM) services, distracting them from the core goals of their research collaboration. CILogon provides an IAM platform that enables scientists to work together to meet their IAM needs more effectively so they can allocate more time and effort to their core mission of scientific research. The CILogon platform enables federated identity management and collaborative organization management. Federated identity management enables researchers to use their home organization identities to access cyberinfrastructure, rather than requiring yet another username and password to log on. Collaborative organization management enables research projects to define user groups for authorization to collaboration platforms (e.g., wikis, mailing lists, and domain applications). CILogon's IAM platform serves the unique needs of research collaborations, namely the need to dynamically form collaboration groups across organizations and countries, sharing access to data, instruments, compute clusters, and other resources to enable scientific discovery. CILogon provides a software-as-a-service platform to ease integration with cyberinfrastructure, while making all software components publicly available under open source licenses to enable re-use. Figure 1 illustrates the components and interfaces of this platform. CILogon has been operational since 2010 and has been used by over 7,000 researchers from more than 170 identity providers to access cyberinfrastructure including Globus, LIGO, Open Science Grid

  16. Improving Measurement of Workplace Sexual Identity Management

    Science.gov (United States)

    Lance, Teresa S.; Anderson, Mary Z.; Croteau, James M.

    2010-01-01

    The purpose of this study was to advance measurement of sexual identity management for lesbian, gay, and bisexual workers. Psychometric properties of a revised version of the Workplace Sexual Identity Management Measure (WSIMM; Anderson, Croteau, Chung, & DiStefano, 2001) were examined on a sample of 64 predominantly White K-12 teachers.…

  17. Professional identity and role transitions in clinical managers.

    Science.gov (United States)

    Spehar, Ivan; Frich, Jan C; Kjekshus, Lars Erik

    2015-01-01

    The purpose of this paper is to investigate how clinicians' professional background influences their transition into the managerial role and identity as clinical managers. The authors interviewed and observed 30 clinicians in managerial positions in Norwegian hospitals. A central finding was that doctors experienced difficulties in reconciling the role as health professional with the role as manager. They maintained a health professional identity and reported to find meaning and satisfaction from clinical work. Doctors also emphasized clinical work as a way of gaining legitimacy and respect from medical colleagues. Nurses recounted a faster and more positive transition into the manager role, and were more fully engaged in the managerial aspects of the role. The authors advance that health care organizations need to focus on role, identity and need satisfaction when recruiting and developing clinicians to become clinical managers. The study suggests that the inclusion of aspects from identity and need satisfaction literature expands on and enriches the study of clinical managers.

  18. Corporate identity: The concept, its measurement and management

    NARCIS (Netherlands)

    C.B.M. van Riel (Cees); J.M.T. Balmer (John)

    1997-01-01

    textabstractArticulates the main trends in the literature on corporate identity; defines corporate identity; explains the rationale for corporate identity management and describes the main methods used to reveal the desired and the actual corporate identity. Particular reference will be made to two

  19. Does identity shape leadership and management practice? Experiences of PHC facility managers in Cape Town, South Africa

    Science.gov (United States)

    Daire, Judith; Gilson, Lucy

    2014-01-01

    In South Africa, as elsewhere, Primary Health Care (PHC) facilities are managed by professional nurses. Little is known about the dimensions and challenges of their job, or what influences their managerial practice. Drawing on leadership and organizational theory, this study explored what the job of being a PHC manager entails, and what factors influence their managerial practice. We specifically considered whether the appointment of professional nurses as facility managers leads to an identity transition, from nurse to manager. The overall intention was to generate ideas about how to support leadership development among PHC facility managers. Adopting case study methodology, the primary researcher facilitated in-depth discussions (about their personal history and managerial experiences) with eight participating facility managers from one geographical area. Other data were collected through in-depth interviews with key informants, document review and researcher field notes/journaling. Analysis involved data triangulation, respondent and peer review and cross-case analysis. The experiences show that the PHC facility manager’s job is dominated by a range of tasks and procedures focused on clinical service management, but is expected to encompass action to address the population and public health needs of the surrounding community. Managing with and through others, and in a complex system, requiring self-management, are critical aspects of the job. A range of personal, professional and contextual factors influence managerial practice, including professional identity. The current largely facility-focused management practice reflects the strong nursing identity of managers and broader organizational influences. However, three of the eight managers appear to self-identify an emerging leadership identity and demonstrate related managerial practices. Nonetheless, there is currently limited support for an identity transition towards leadership in this context. Better

  20. Does identity shape leadership and management practice? Experiences of PHC facility managers in Cape Town, South Africa.

    Science.gov (United States)

    Daire, Judith; Gilson, Lucy

    2014-09-01

    In South Africa, as elsewhere, Primary Health Care (PHC) facilities are managed by professional nurses. Little is known about the dimensions and challenges of their job, or what influences their managerial practice. Drawing on leadership and organizational theory, this study explored what the job of being a PHC manager entails, and what factors influence their managerial practice. We specifically considered whether the appointment of professional nurses as facility managers leads to an identity transition, from nurse to manager. The overall intention was to generate ideas about how to support leadership development among PHC facility managers. Adopting case study methodology, the primary researcher facilitated in-depth discussions (about their personal history and managerial experiences) with eight participating facility managers from one geographical area. Other data were collected through in-depth interviews with key informants, document review and researcher field notes/journaling. Analysis involved data triangulation, respondent and peer review and cross-case analysis. The experiences show that the PHC facility manager's job is dominated by a range of tasks and procedures focused on clinical service management, but is expected to encompass action to address the population and public health needs of the surrounding community. Managing with and through others, and in a complex system, requiring self-management, are critical aspects of the job. A range of personal, professional and contextual factors influence managerial practice, including professional identity. The current largely facility-focused management practice reflects the strong nursing identity of managers and broader organizational influences. However, three of the eight managers appear to self-identify an emerging leadership identity and demonstrate related managerial practices. Nonetheless, there is currently limited support for an identity transition towards leadership in this context. Better

  1. Campus Single Sign-On und hochschulübergreifendes Identity Management

    Science.gov (United States)

    Hommel, Wolfgang

    Das im Rahmen von IntegraTUM für die TUM geschaffene Identity & Access Management System setzt das Paradigma unified login um, d. h. ein Benutzer kann alle für ihn relevanten Dienste innerhalb der Hochschule mit derselben Loginname-/Passwortkombination nutzen. Dieser Artikel zeigt, wie auf Basis der Software Shibboleth und der deutschlandweiten Hochschulföderation DFN-AAI als weitere Mehrwerte das campusweite web single sign-on und die nahtlose Nutzung zahlreicher externer Web-Anwendungen erreicht werden. Als Beispiel für die Abläufe bei der Erschließung neuer Dienste für die hochschulübergreifende Nutzung wird die Anbindung von Learning Management Systemen auf Basis des DFN-AAI E-Learning-Profils diskutiert. Den umfassenden Vorteilen werden schließlich die aktuellen technischen Grenzen bei der Umsetzung des hochschulübergreifenden Identity Management gegenübergestellt.

  2. Organizational Identity and Culture in the Context of Managed Change

    DEFF Research Database (Denmark)

    Hatch, Mary Jo; Schultz, Majken; Skov, Anne-Marie

    2015-01-01

    their organization’s identity led middle managers and employees both to support and resist new organizational identity claims made by top management. Within these identity activation processes we found frequent references relating new identity claims to organizational culture. Further analysis of the data revealed......This article presents top and middle managers’ experiences and understandings of how organizational identity and culture were entangled with transformational change as it unfolded over a 5-year period in Carlsberg Group. Combining ethnography and grounded theory methods with engaged scholarship......, our work sits between research and practice, speaking directly to the experience of managers at the same time that it researches both the content and processes of organizational identity and culture. The study shows that engaging in processes of reflecting, questioning, and debating about...

  3. Building an Identity Management Governance Process

    Science.gov (United States)

    Berg, Joanne E.; Kraemer, Ron; Raatz, Carla; Devoti, Steve

    2009-01-01

    A particular challenge in any campus environment is determining how requests for access to services and resources are managed. Who decides the technology, infrastructure, policy, business process and procedure? The involvement of key institutional leaders and stakeholders in identity management governance is the driving force behind the way the…

  4. Digital identity management

    CERN Document Server

    Laurent, Maryline

    2015-01-01

    In the past four decades, information technology has altered chains of value production, distribution, and information access at a significant rate. These changes, although they have shaken up numerous economic models, have so far not radically challenged the bases of our society.This book addresses our current progress and viewpoints on digital identity management in different fields (social networks, cloud computing, Internet of Things (IoT)), with input from experts in computer science, law, economics and sociology. Within this multidisciplinary and scientific context, having crossed analys

  5. Working to reduce the effects of discrimination: Identity management strategies in organizations.

    Science.gov (United States)

    Shih, Margaret; Young, Maia J; Bucher, Amy

    2013-04-01

    Despite efforts to dispel discrimination, workplace discrimination still occurs. We introduce two classes of identity management strategies individuals use to mitigate the negative consequences of discrimination: identity switching (i.e., deemphasizing target identities and recategorizing to a more positively valued identity) and identity redefinition (i.e., stereotype reassociation and regeneration). Organizations adopting a color-blind approach may make it more difficult for individuals to use identity switching because the policies deemphasize differences in social identities. In contrast, organizations adopting a multicultural approach may make it more difficult for individuals to use identity redefinition. Multicultural approaches, applied superficially, may celebrate group differences that might actually reinforce culturally dominant stereotypes. We explore the likelihood that individuals will adopt each strategy given these organizational approaches to diversity. We outline steps organizations can take to reduce the need for identity management strategies and to facilitate identity management when necessary.

  6. The Interaction of Control Systems and Stakeholder Networks in Shaping the Identities of Self-managed Teams

    DEFF Research Database (Denmark)

    Annosi, Maria Carmela; Foss, Nicolai Juul; Brunetta, Federica

    2017-01-01

    -based firms. We argue that managerial and stakeholder interventions shape the self-construction of team identity as well as the team’s commitment to specific work objectives. We also suggest that team identity becomes isomorphic to organizational identity because of pressures related to: (1) the presence...... of a dense network of managers and stakeholders, which orients teams towards a focus on certain aspects of the higher-order identity; (2) the use of team routines and regular feedback loops, which force alignment with the organizational identity; and (3) the use of coordinating roles aimed at promoting......, ratifying and reinforcing the convergence of identity within the team. We analyse multiple cases from a major multinational corporation in the telecommunications industry, which we examine through the lens of a multi-level model of controls involving the micro, meso and macro organizational levels. We...

  7. Identity management for e-government Libya as a case study

    DEFF Research Database (Denmark)

    Elaswad, Othoman; Jensen, Christian D.

    2016-01-01

    Governments are strengthening their identity (ID) management strategies to deliver new and improved online services to their citizens. Such online services typically include applications for different types of permissions, requests for different types of official documents and management...... of different types of entitlements. The ID management scheme must therefore be able to correctly authenticate citizens and link online presence to real world identities....

  8. A Federated Digital Identity Management Approach for Business Processes

    Science.gov (United States)

    Bertino, Elisa; Ferrini, Rodolfo; Musci, Andrea; Paci, Federica; Steuer, Kevin J.

    Business processes have gained a lot of attention because of the pressing need for integrating existing resources and services to better fulfill customer needs. A key feature of business processes is that they are built from composable services, referred to as component services, that may belong to different domains. In such a context, flexible multi-domain identity management solutions are crucial for increased security and user-convenience. In particular, it is important that during the execution of a business process the component services be able to verify the identity of the client to check that it has the required permissions for accessing the services. To address the problem of multi-domain identity management, we propose a multi-factor identity attribute verification protocol for business processes that assures clients privacy and handles naming heterogeneity.

  9. 6 Keys to Identity Management

    Science.gov (United States)

    Shoham, Idan

    2011-01-01

    An Identity and Access Management (IAM) project on campus can feel like a Sisyphean task: Just when access rights have finally been sorted out, the semester ends--and users change roles, leave campus, or require new processes. IT departments face a constantly changing technical landscape: (1) integrating new applications and retiring old ones; (2)…

  10. A User-Centric System for Verified Identities on the Bitcoin Blockchain

    OpenAIRE

    Augot, Daniel; Chabanne, Hervé; Chenevier, Thomas; George, William; Lamber, Laurent

    2017-01-01

    International audience; We present an identity management scheme built into the Bitcoin blockchain, allowing for identities that are as indelible as the blockchain itself. Moreover, we take advantage of Bitcoin's decentralized nature to facilitate a shared control between users and identity providers, allowing users to directly manage their own identities, fluidly coordinating identities from different providers, even as identity providers can revoke identities and impose controls.

  11. Walking the tightrope: Constructing gender and professional identities in account management

    NARCIS (Netherlands)

    Gremmen, C.C.M.; Benschop, Y.W.M.

    2009-01-01

    This paper contributes to the growing stream of organization research that explores the relationship between professional identities and gender. Our central question pertains to how account managers ‘do gender’ in constructing their professional identities. While account management has been

  12. Open source identity management patterns and practices using OpenAM 10.x

    CERN Document Server

    Kenning, Waylon

    2013-01-01

    This is a Packt Mini in a tutorial format that provides multiple examples on Identity Management using OpenAM 10.x.Open Source Identity Management Patterns and Practices Using OpenAM 10.x is great for developers and architects who are new to Identity Management, and who want a brief overview of what's possible and how to quickly implement a prototype. It's assumed that you've had experience with web applications and some knowledge of Apache and Tomcat.

  13. Enterprise identity management towards an investment decision support approach

    CERN Document Server

    Royer, Denis

    2013-01-01

    ?The introduction of Enterprise Identity Management Systems (EIdMS) in organizations even beyond the purely technological level is a costly and challenging endeavor. However, for decision makers it seems difficult to fully understand the impacts and opportunities arising from the introduction of EIdMS. This book explores the relevant aspects for an ex-ante evaluation of EIdMS. Therefore it examines this domain by employing a qualitative expert interview study to better understand the nature of EIdMS, as they are situated between security and productive IT systems. To this regard, the focus is

  14. Integrating Identity Management With Federated Healthcare Data Models

    Science.gov (United States)

    Hu, Jun; Peyton, Liam

    In order to manage performance and provide integrated services, health care data needs to be linked and aggregated across data sources from different organizations. The Internet and secure B2B networks offer the possibility of providing near real-time integration. However, there are three major stumbling blocks. One is to standardize and agree upon a common data model across organizations. The second is to match identities between different locations in order to link and aggregate records. The third is to protect identity and ensure compliance with privacy laws. In this paper, we analyze three main approaches to the problem and use a healthcare scenario to illustrate how each one addresses different aspects of the problem while failing to address others. We then present a systematic framework in which the different approaches can be flexibly combined for a more comprehensive approach to integrate identity management with federated healthcare data models.

  15. Strategies for managing impressions of racial identity in the workplace.

    Science.gov (United States)

    Roberts, Laura Morgan; Cha, Sandra E; Kim, Sung Soo

    2014-10-01

    This article deepens understanding of the workplace experiences of racial minorities by investigating racial identity-based impression management (RIM) by Asian American journalists. Racial centrality, directly or indirectly, predicted the use of 4 RIM strategies (avoidance, enhancement, affiliation, and racial humor). Professional centrality also predicted strategy use, which was related to life satisfaction and perceived career success. By shedding light on proactive strategies that individuals use to influence colleagues' impressions of their racial identity, we contribute to research on diversity in organizations, impression management, and racial identity. (PsycINFO Database Record (c) 2014 APA, all rights reserved).

  16. [Meanings attributed to management as an explanation for clinician managers' attitudes and professional identity].

    Science.gov (United States)

    Cascón-Pereira, Rosalía; Valverde, Mireia

    2014-01-01

    To understand the process by which clinician managers construct their professional identities and develop their attitudes toward managing. A qualitative study was performed, based on grounded theory, through in-depth interviews with 20 clinician managers selected through theoretical sampling in two public hospitals of Catalonia (Spain), participant observation, and documentation. Clinician managers' role meanings are constructed by comparing their roles with those of senior managers and clinicians. In this process, clinician managers seek to differentiate themselves from senior managers through the meanings constructed. In particular, they use proximity with reality and clinical knowledge as the main sources of differentiation. This study sheds light on why clinician managers develop adverse attitudes to managing and why they define themselves as clinicians rather than as managers. The explanation lies in the construction of the meanings they assign to managing as the basis of their attitudes to this role and professional identity. These findings have some practical implications for healthcare management. Copyright © 2014. Published by Elsevier Espana.

  17. Globus Identity, Access, and Data Management: Platform Services for Collaborative Science

    Science.gov (United States)

    Ananthakrishnan, R.; Foster, I.; Wagner, R.

    2016-12-01

    Globus is software-as-a-service for research data management, developed at, and operated by, the University of Chicago. Globus, accessible at www.globus.org, provides high speed, secure file transfer; file sharing directly from existing storage systems; and data publication to institutional repositories. 40,000 registered users have used Globus to transfer tens of billions of files totaling hundreds of petabytes between more than 10,000 storage systems within campuses and national laboratories in the US and internationally. Web, command line, and REST interfaces support both interactive use and integration into applications and infrastructures. An important component of the Globus system is its foundational identity and access management (IAM) platform service, Globus Auth. Both Globus research data management and other applications use Globus Auth for brokering authentication and authorization interactions between end-users, identity providers, resource servers (services), and a range of clients, including web, mobile, and desktop applications, and other services. Compliant with important standards such as OAuth, OpenID, and SAML, Globus Auth provides mechanisms required for an extensible, integrated ecosystem of services and clients for the research and education community. It underpins projects such as the US National Science Foundation's XSEDE system, NCAR's Research Data Archive, and the DOE Systems Biology Knowledge Base. Current work is extending Globus services to be compliant with FEDRAMP standards for security assessment, authorization, and monitoring for cloud services. We will present Globus IAM solutions and give examples of Globus use in various projects for federated access to resources. We will also describe how Globus Auth and Globus research data management capabilities enable rapid development and low-cost operations of secure data sharing platforms that leverage Globus services and integrate them with local policy and security.

  18. Developing an Assessment of Sexual Identity Management for Lesbian and Gay Workers.

    Science.gov (United States)

    Anderson, Mary Z.; Croteau, James M.; DiStefano, Teresa M.; Chung, Y. Barry

    2001-01-01

    Psychometric properties of the Workplace Sexual Identity Management Measure were tested with 172 professionals. Results suggest it successfully assesses a continuum of lesbian and gay identity management strategies (passing, covering, implicitly out, explicitly out). (Contains 27 references.) (SK)

  19. Leadership as social identity management: Introducing the Identity Leadership Inventory (ILI) to assess and validate a four-dimensional model

    OpenAIRE

    Steffens, Niklas K.; Haslam, S. Alexander; Reicher, Stephen D.; Platow, Michael J.; Fransen, Katrien; Yang, Jie; Ryan, Michelle K.; Jetten, Jolanda; Peters, Kim O.; Boen, Filip

    2014-01-01

    Although nearly two decades of research has provided support for the social identity approach to leadership, most previous work has focused on leaders’ identity prototypicality while neglecting the assessment of other equally important dimensions of social identity management. However, recent theoretical developments have argued that in order to mobilize and direct followers’ energies, leaders need not only to ‘be one of us’ (identity prototypicality), but also to ‘do it for us’ (identity adv...

  20. British-Pakistani women's perspectives of diabetes self-management: the role of identity.

    Science.gov (United States)

    Majeed-Ariss, Rabiya; Jackson, Cath; Knapp, Peter; Cheater, Francine M

    2015-09-01

    To explore the effects of type 2 diabetes on British-Pakistani women's identity and its relationship with self-management. Type 2 diabetes is more prevalent and has worse outcomes among some ethnic minority groups. This may be due to poorer self-management and an inadequate match of health services to patient needs. The influence that type 2 diabetes has on British-Pakistani women's identity and subsequent self-management has received limited attention. An explorative qualitative study. Face-to-face semi-structured English and Urdu language interviews were conducted with a purposively selected heterogeneous sample of 15 British-Pakistani women with type 2 diabetes. Transcripts were analysed thematically. Four themes emerged: Perceived change in self emphasised how British-Pakistani women underwent a conscious adaptation of identity following diagnosis; Familiarity with ill health reflected women's adjustment to their changed identity over time; Diagnosis improves social support enabled women to accept changes within themselves and Supporting family is a barrier to self-management demonstrated how family roles were an aspect of women's identities that was resilient to change. The over-arching theme Role re-alignment enables successful self-management encapsulated how self-management was a continuous process where achievements needed to be sustained. Inter-generational differences were also noted: first generation women talked about challenges associated with ageing and co-morbidities; second generation women talked about familial and work roles competing with self-management. The complex nature of British-Pakistani women's self-identification requires consideration when planning and delivering healthcare. Culturally competent practice should recognise how generational status influences self-identity and diabetes self-management in ethnically diverse women. Health professionals should remain mindful of effective self-management occurring alongside, and being

  1. Working to Reduce the Effects of Discrimination: Identity Management Strategies in Organizations

    Science.gov (United States)

    Shih, Margaret; Young, Maia J.; Bucher, Amy

    2013-01-01

    Despite efforts to dispel discrimination, workplace discrimination still occurs. We introduce two classes of identity management strategies individuals use to mitigate the negative consequences of discrimination: identity switching (i.e., deemphasizing target identities and recategorizing to a more positively valued identity) and identity…

  2. Patient privacy, consent, and identity management in health information exchange

    CERN Document Server

    Hosek, Susan D

    2013-01-01

    As a step toward improving its health information technology (IT) interoperability, the Military Health System is seeking to develop a research roadmap to better coordinate health IT research efforts, address IT capability gaps, and reduce programmatic risk for its enterprise projects. This report identifies gaps in research, policy, and practice involving patient privacy, consent, and identity management that need to be addressed to improve the quality and efficiency of care through health information exchange.

  3. Corporate visual identity management: current practices, impact, and assessment

    NARCIS (Netherlands)

    van den Bosch, A.L.M.

    2005-01-01

    This dissertation is about Corporate Visual Identity (CVI) management. Its purpose is to gain more insight into activities associated with managing CVI and the impact of these activities on the outcome: the degree of consistency in CVI.

  4. Managing corporate identity: an integrative framework of dimensions and determinants

    NARCIS (Netherlands)

    Cornelissen, Joep; Elving, Wim

    2003-01-01

    Although there has been an enduring interest in corporate identity and image management, there is relatively little systematic empirical research on the topic. Large due to the diffuse interpretations, and dubious denotation that have characterized the subject of corporate identity so far, the

  5. The Formation of Professional Identity in French "Apprenti" Managers

    Science.gov (United States)

    Angot, Jacques; Malloch, Hedley; Kleymann, Birgit

    2008-01-01

    Purpose: The paper aims to show how professional identity is constructed at a very early stage of initial management education. In so doing, it questions the notion of "le metier" in management. Design/methodology/approach: The paper is based on a study of the experiences of six French management apprentices (or apprentis) who…

  6. Exploring medical identity theft.

    Science.gov (United States)

    Mancilla, Desla; Moczygemba, Jackie

    2009-09-16

    The crime of medical identity theft is a growing concern in healthcare institutions. A mixed-method study design including a two-stage electronic survey, telephone survey follow-up, and on-site observations was used to evaluate current practices in admitting and registration departments to reduce the occurrence of medical identity theft. Survey participants were chief compliance officers in acute healthcare organizations and members of the Health Care Compliance Association. Study results indicate variance in whether or how patient identity is confirmed in healthcare settings. The findings of this study suggest that information systems need to be designed for more efficient identity management. Admitting and registration staff must be trained, and compliance with medical identity theft policies and procedures must be monitored. Finally, biometric identity management solutions should be considered for stronger patient identification verification.

  7. Conversations outside the Comfort Zone: Identity Formation in SME Manager Action Learning

    Science.gov (United States)

    Anderson, Lisa; Gold, Jeff

    2009-01-01

    In this paper we consider the construction of narrative identity and particularly how managers of small businesses may construct new narrative identities within the activity of the action learning situation. We build on recent work to suggest that the "world" of managers can be explored through a consideration of Vygotsky's socio-cultural theory…

  8. A National Identity Management Strategy to Enhance the Brazilian Electronic Government

    Directory of Open Access Journals (Sweden)

    José Alberto Sousa Torres

    2017-12-01

    Full Text Available Amongst the several problems with the Brazilian e-government services (e-Gov, many of them are related to the fact that Brazil does not have a National Strategy for Digital Identity Management (IdM. To design a  national strategy, it is crucial to analyze the solutions adopted in other countries and take into account Brazilian characteristics, such as its area, population, digital inclusion index, socio-political and economic profile, the current national identity registration system and the fraud rate. In this context, this paper aims to propose a national strategy for IdM for the Brazilian e-Gov program. This strategy was built upon by a literature review of the experiences of European countries and, mainly, the peculiarities inherent to Brazil.

  9. Covering your face on Facebook.Managing identity through untagging and deletion

    OpenAIRE

    Strano, Michele; Wattei, Jill

    2010-01-01

    This paper describes the ways in which Facebook users manage their online identities through untagging and deleting photos to make sure images are interpreted in a desirable way. Using data collected from an online survey and thirty in-depth interviews with American adult Facebook users, the authors argue that identity management can best be understood as the combination of constructive and destructive practices through which users control not only their self-presentation (p...

  10. Synchronization of identical chaotic systems through external chaotic driving

    International Nuclear Information System (INIS)

    Patidar, V.; Sud, K.K.

    2005-11-01

    In recent years, the study of synchronization of identical chaotic systems subjected to a common fluctuating random driving signal has drawn considerable interest. In this communication, we report that it is possible to achieve synchronization between two identical chaotic systems, which are not coupled directly but subjected to an external chaotic signal. The external chaotic signal may be obtained from any chaotic system identical or non-identical to both identical chaotic systems. Results of numerical simulations on well known Roessler and jerk dynamical systems have been presented. (author)

  11. Positive identity entry control system with geographically distributed portals and enrollment stations

    International Nuclear Information System (INIS)

    McIntire, J.M.

    1985-01-01

    A positive identity entry control system using distributed processing to allow reliable geographically separated portals and enrollment stations has been installed and is fully operational at a large area DOE site. Identity verification requires a credential, a memorized number and measurement of a physical characteristic of the user. Additionally, all portal activity is monitored by guards. The portal system is dual redundant such that no single point failure will shut down operations. Each portal site maintains its own subset of the master data base so off-site failure of the central data base manager or its communication links will not significantly affect local portal activity. The system is suitable for installations with large populations requiring access control at several remote sites scattered over a large area

  12. The role of the collaboratory in enabling large-scale identity management for HEP

    International Nuclear Information System (INIS)

    Cowles, Robert; Jackson, Craig; Welch, Von

    2014-01-01

    The authors are defining a model that describes and guides existing and future scientific collaboratory identity management implementations. Our ultimate goal is to provide guidance to virtual organizations and resource providers in designing an identity management implementation. Our model is captured in previously published work. Here, we substantially extend our analysis in terms of six motivation factors (user isolation, persistence of user data, complexity of virtual organization roles, cultural and historical inertia, scaling, and incentive for collaboration), observed in interviews with community members involved in identity management, that impact implementation decisions. This analysis is a significant step towards our ultimate goal of providing guidance to virtual organizations.

  13. Using a generalised identity reference model with archetypes to support interoperability of demographics information in electronic health record systems.

    Science.gov (United States)

    Xu Chen; Berry, Damon; Stephens, Gaye

    2015-01-01

    Computerised identity management is in general encountered as a low-level mechanism that enables users in a particular system or region to securely access resources. In the Electronic Health Record (EHR), the identifying information of both the healthcare professionals who access the EHR and the patients whose EHR is accessed, are subject to change. Demographics services have been developed to manage federated patient and healthcare professional identities and to support challenging healthcare-specific use cases in the presence of diverse and sometimes conflicting demographic identities. Demographics services are not the only use for identities in healthcare. Nevertheless, contemporary EHR specifications limit the types of entities that can be the actor or subject of a record to health professionals and patients, thus limiting the use of two level models in other healthcare information systems. Demographics are ubiquitous in healthcare, so for a general identity model to be usable, it should be capable of managing demographic information. In this paper, we introduce a generalised identity reference model (GIRM) based on key characteristics of five surveyed demographic models. We evaluate the GIRM by using it to express the EN13606 demographics model in an extensible way at the metadata level and show how two-level modelling can support the exchange of instances of demographic identities. This use of the GIRM to express demographics information shows its application for standards-compliant two-level modelling alongside heterogeneous demographics models. We advocate this approach to facilitate the interoperability of identities between two-level model-based EHR systems and show the validity and the extensibility of using GIRM for the expression of other health-related identities.

  14. Federated Identity Management for Research Collaborations

    CERN Document Server

    Broeder, Daan; Kelsey, David; Kershaw, Philip; Lüders, Stefan; Lyall, Andrew; Nyrönen, Tommi; Wartel, Romain; Weyer, Heinz J

    2012-01-01

    Federated identity management (FIM) is an arrangement that can be made among multiple organisations that lets subscribers use the same identification data to obtain access to the secured resources of all organisations in the group. Identity federation offers economic advantages, as well as convenience, to organisations and their users. For example, multiple institutions can share a single application, with resultant cost savings and consolidation of resources. In order for FIM to be effective, the partners must have a sense of mutual trust. A number of laboratories including national and regional research organizations are facing the challenge of a deluge of scientific data that needs to be accessed by expanding user bases in dynamic collaborations that cross organisational and national boundaries. Driven by these needs, representatives from a variety of research communities, including photon/neutron facilities, social science & humanities, high-energy physics, atmospheric science, bioinformatics and fusi...

  15. Object Classification based Context Management for Identity Management in Internet of Things

    DEFF Research Database (Denmark)

    Mahalle, Parikshit N.; Prasad, Neeli R.; Prasad, Ramjee

    2013-01-01

    As computing technology is becoming more tightly coupled into dynamic and mobile world of the Internet of Things (IoT), security mechanism is more stringent, flexible and less intrusive. Scalability issue in IoT makes identity management (IdM) of ubiquitous objects more challenging, and there is ......As computing technology is becoming more tightly coupled into dynamic and mobile world of the Internet of Things (IoT), security mechanism is more stringent, flexible and less intrusive. Scalability issue in IoT makes identity management (IdM) of ubiquitous objects more challenging......, and there is a need of context-aware access control solution for IdM. Confronting uncertainty of different types of objects in IoT is not easy. This paper presents the logical framework for object classification in context aware IoT, as richer contextual information creates an impact on the access control. This paper...

  16. The Effects of Virtual Communities on Group Identity in Classroom Management

    Science.gov (United States)

    Ho, Tu-Kuang; Lin, Yu-Tzeng

    2016-01-01

    Group identity is a critical component in developing effective classroom management. While there have been numerous studies on group identity, they have primarily focused on its effects on the physical classroom entity. Advances in information technology, however, have enabled the creation of virtual communities, which have become a vital channel…

  17. Adaptation of the Utrecht-Management of Identity Commitments Scale (U-MICS) to the measurement of the parental identity domain.

    Science.gov (United States)

    Piotrowski, Konrad

    2018-04-01

    The present studies examined the psychometric properties of the Utrecht-Management of Identity Commitments Scale (U-MICS) adapted to the measurement of identity formation in the parental identity domain. As the parental identity domain has only been studied within the neo-Eriksonian approach to a very limited extent, the aim of these studies was to prepare a short, valid and reliable tool for the measurement of parental identity in order to fill this gap. The associations of commitment, in-depth exploration and reconsideration of commitment in the parental domain with well-being and with other identity constructs were analyzed. The results showed that parental identity formation is associated with mothers' satisfaction with life and trait anxiety and with identity formation in other areas as well. The initial results suggest that the adapted version of the U-MICS is a valid and reliable measure that can be used in future studies on parental identity formation. © 2017 The Author. Scandinavian Journal of Psychology published by Scandinavian Psychological Associations and John Wiley & Sons Ltd.

  18. Issues of E-Learning Standards and Identity Management for Mobility and Collaboration in Higher Education

    Science.gov (United States)

    Alves, Paulo; Uhomoibhi, James

    2010-01-01

    Purpose: This paper seeks to investigate and report on the status of identity management systems and e-learning standards across Europe for promoting mobility, collaboration and the sharing of contents and services in higher education institutions. Design/methodology/approach: The present research work examines existing e-learning standards and…

  19. Managing corporate visual identity : exploring the differences between manufacturing and service, and profit-making and nonprofit organizations

    NARCIS (Netherlands)

    van den Bosch, Annette; de Jong, Menno; Elving, Wim

    2006-01-01

    Corporate Visual Identity (CVI) is a crucial part of the identity of any organization. Most research on managing corporate identity deals with the strategic development of corporate identity and the design and effects of specific elements of the CVI. This study focuses on an aspect of CVI management

  20. Qualitative Study on the Identity of the Manager in Romania

    Directory of Open Access Journals (Sweden)

    FLORENTINA SCÂRNECI

    2011-01-01

    Full Text Available The article presents the results of a qualitative research project carried out in 2008, which aimed at identifying the identity condition of managers in Romania. The article presents part of the grounded theory on the identity of managers: the day to day circumstances in which they live - issues related to childhood and maturity (material situation, relationships, family, etc.. Also, it describes in brief the methodology applied: qualitative collection of data, theoretical sampling, theoretical saturation and the analysis of qualitative data obtained.The article presents, also in brief, the larger research framework wherefrom the presented part was extracted. The conclusion is that there are life-related issues specific to managers (and, more precisely, specific reactions to the environment and that their identification can form the basis for designing methods of managerial diagnosis and prognosis.

  1. The medical leadership challenge in healthcare is an identity challenge.

    Science.gov (United States)

    Andersson, Thomas

    2015-01-01

    The purpose of this article is to describe and analyse the identity challenges that physicians with medical leadership positions face. Four qualitative case studies were performed to address the fact that identity is processual, relational and situational. Physicians with managerial roles were interviewed, as well as their peers, supervisors and subordinates. Furthermore, observations were made to understand how different identities are displayed in action. This study illustrates that medical leadership implies identity struggles when physicians have manager positions, because of the different characteristics of the social identities of managers and physicians. Major differences are related between physicians as autonomous individuals in a system and managers as subordinates to the organizational system. There are psychological mechanisms that evoke the physician identity more often than the managerial identity among physicians who are managers, which explains why physicians who are managers tend to remain foremost physicians. The implications of the findings, that there are major identity challenges by being both a physician and manager, suggest that managerial physicians might not be the best prerequisite for medical leadership, but instead, cooperative relationships between physicians and non-physician managers might be a less difficult way to support medical leadership. Acknowledging and addressing identity challenges can be important both in creating structures in organizations and designing the training for managers in healthcare (both physicians and non-physicians) to support medical leadership. Medical leadership is most often related to organizational structure and/or leadership skills, but this paper discusses identity requirements and challenges related to medical leadership.

  2. Identity management strategies among HIV-positive Colombian gay men in London.

    Science.gov (United States)

    Jaspal, Rusi; Williamson, Iain

    2017-12-01

    This study set out to explore the social-psychological aspects of living with HIV among a group of HIV-positive Colombian gay men in London, and the strategies that they deployed to manage ensuing threats to their identities. Focus group and individual interview data were collected from 14 Colombian gay men living with HIV, and were analysed using qualitative thematic analysis and identity process theory. The following themes are discussed: (1) identity struggles and conflicts in Colombia, (2), managing multiple layers of social stigma in England, and (3) changing interpersonal and intergroup dynamics, which highlight the inter-connections between sexual prejudice, sexual risk-taking and HIV stigma. Identity may be chronically threatened due to the multiple layers of stigma, which can limit the coping strategies available to individuals. Findings strongly support the need for action and programmes to highlight and tackle both racism and HIV stigma on the gay scene and to fund more specific resources for sub-communities of gay, bisexual and other men who have sex with men, which employ appropriately trained and culturally competent staff.

  3. The importance of corporate brand identity in business management: An application to the UK banking sector

    Directory of Open Access Journals (Sweden)

    Isabel Buil

    2016-01-01

    Full Text Available Corporate brand identity management is a key issue for any organisation. Accordingly, its study is a research field of great interest. This paper seeks to broaden the understanding of this strategic activity and its effects. Specifically, it investigates the concept of corporate brand identity from the employees’ perspective in the UK financial banking sector and analyses the link between brand identity management and employees’ attitudes and behaviours. Results indicate that organisations should pay special attention to the corporate brand identity management, given its influence on employees’ commitment with their organisations, as well as their brand performance and satisfaction.

  4. Dialogue, Language and Identity: Critical Issues for Networked Management Learning

    Science.gov (United States)

    Ferreday, Debra; Hodgson, Vivien; Jones, Chris

    2006-01-01

    This paper draws on the work of Mikhail Bakhtin and Norman Fairclough to show how dialogue is central to the construction of identity in networked management learning. The paper is based on a case study of a networked management learning course in higher education and attempts to illustrate how participants negotiate issues of difference,…

  5. The identity management practices of beauty-bloggers: a multimodal approach to the deprofessionalization’s analysis

    OpenAIRE

    Martyanova Natalia Alexandrovna; Rubtcova Maria Vladimirovna

    2015-01-01

    The article analyses the identity management practices of beauty-bloggers who on YouTube. The authors relies on the theory of deprofessionalization and show how bloggers gain the symbolic power and authority, which professionals previously had. Exploring the forms and methods of Internet communication the authors reveal the latent common identity management practices questioning the authority of professionals, and creating new managed space.

  6. A Reputation-Based Identity Management Model for Cloud Computing

    Directory of Open Access Journals (Sweden)

    Lifa Wu

    2015-01-01

    Full Text Available In the field of cloud computing, most research on identity management has concentrated on protecting user data. However, users typically leave a trail when they access cloud services, and the resulting user traceability can potentially lead to the leakage of sensitive user information. Meanwhile, malicious users can do harm to cloud providers through the use of pseudonyms. To solve these problems, we introduce a reputation mechanism and design a reputation-based identity management model for cloud computing. In the model, pseudonyms are generated based on a reputation signature so as to guarantee the untraceability of pseudonyms, and a mechanism that calculates user reputation is proposed, which helps cloud service providers to identify malicious users. Analysis verifies that the model can ensure that users access cloud services anonymously and that cloud providers assess the credibility of users effectively without violating user privacy.

  7. "Managing identities" and parental disclosure of HIV sero-status in Zimbabwe.

    Science.gov (United States)

    Muparamoto, Nelson; Chiweshe, Manase Kudzai

    2015-01-01

    Drawing from a small sample of HIV infected respondents, this paper examines parents' perceptions on the decision to disclose or not to disclose their HIV sero-status to their children. It explores how parents control the information in the interactional ritual with their children. The paper uses Goffman's concept of dramaturgy to analyse how parents manage and control disclosure within a context where HIV and AIDS is associated with stigma. Disclosure is a strategic encounter in which the interactants (parents) manage to create a desired identity or spoil an identity. Qualitative research incorporating focus group discussions and in-depth interviews was used to examine the perceptions of parents who are HIV positive on disclosure of their status to their children. Such a methodological approach allows for a nuanced understanding of the context in which decision to disclose status happens. The study findings show that in a social context involving parents and children as actors there are complex expectations which affect parental disclosure of HIV sero-status to their children. The desire to manage an expected identity militated or enabled disclosure in a parental relationship.

  8. Identity management and privacy languages technologies: Improving user control of data privacy

    Science.gov (United States)

    García, José Enrique López; García, Carlos Alberto Gil; Pacheco, Álvaro Armenteros; Organero, Pedro Luis Muñoz

    The identity management solutions have the capability to bring confidence to internet services, but this confidence could be improved if user has more control over the privacy policy of its attributes. Privacy languages could help to this task due to its capability to define privacy policies for data in a very flexible way. So, an integration problem arises: making work together both identity management and privacy languages. Despite several proposals for accomplishing this have already been defined, this paper suggests some topics and improvements that could be considered.

  9. The identity management practices of beauty-bloggers: a multimodal approach to the deprofessionalization’s analysis

    Directory of Open Access Journals (Sweden)

    Martyanova Natalia Alexandrovna

    2015-04-01

    Full Text Available The article analyses the identity management practices of beauty-bloggers who on YouTube. The authors relies on the theory of deprofessionalization and show how bloggers gain the symbolic power and authority, which professionals previously had. Exploring the forms and methods of Internet communication the authors reveal the latent common identity management practices questioning the authority of professionals, and creating new managed space.

  10. Managing corporate identities of non-profit organisations in the social welfare sector

    Directory of Open Access Journals (Sweden)

    Lida Holtzhausen

    2013-03-01

    Full Text Available Present-day South Africa is characterised by many societal and developmental issues, such as HIV awareness and prevention, child-headed households, environmental protection, poverty alleviation, violence and victim aid. However, it is widely acknowledged that government alone cannot address these issues effectively. The role of non-profit organisations (NPOs in addressing social and development issues is increasingly emphasised. NPOs work at grass-roots level and they can therefore, on the whole, identify societal vulnerabilities and risks earlier than the government sector. However, due to the economic recession, NPOs operate in a competitive environment where an increasing number of NPOs rely on a small number of donors and other resources. NPOs should therefore differentiate themselves from the competition in order to obtain public legitimacy and funding. Corporate identity management is important for NPOs to fulfil their role in social welfare and thus contribute to disaster risk reduction. The exploratory nature of this study dictates a qualitative research approach. Semi-structured interviews with management of five NPOs in the social welfare sector were conducted in order to provide an answer to the study’s research question: ‘To what extent do NPOs in the social welfare sector practise corporate identity management, in order to prevent and address social welfare risks?’ The research found that NPOs do not realise the full potential of managing their corporate identities. NPOs therefore do not take advantage of a strong and distinct corporate identity which would allow them to ensure their ability to assess, address, reduce and/or alleviate vulnerabilities and disaster risks.

  11. Globus Nexus: A Platform-as-a-Service Provider of Research Identity, Profile, and Group Management.

    Science.gov (United States)

    Chard, Kyle; Lidman, Mattias; McCollam, Brendan; Bryan, Josh; Ananthakrishnan, Rachana; Tuecke, Steven; Foster, Ian

    2016-03-01

    Globus Nexus is a professionally hosted Platform-as-a-Service that provides identity, profile and group management functionality for the research community. Many collaborative e-Science applications need to manage large numbers of user identities, profiles, and groups. However, developing and maintaining such capabilities is often challenging given the complexity of modern security protocols and requirements for scalable, robust, and highly available implementations. By outsourcing this functionality to Globus Nexus, developers can leverage best-practice implementations without incurring development and operations overhead. Users benefit from enhanced capabilities such as identity federation, flexible profile management, and user-oriented group management. In this paper we present Globus Nexus, describe its capabilities and architecture, summarize how several e-Science applications leverage these capabilities, and present results that characterize its scalability, reliability, and availability.

  12. Globus Nexus: A Platform-as-a-Service provider of research identity, profile, and group management

    Energy Technology Data Exchange (ETDEWEB)

    Chard, Kyle; Lidman, Mattias; McCollam, Brendan; Bryan, Josh; Ananthakrishnan, Rachana; Tuecke, Steven; Foster, Ian

    2016-03-01

    Globus Nexus is a professionally hosted Platform-as-a-Service that provides identity, profile and group management functionality for the research community. Many collaborative e-Science applications need to manage large numbers of user identities, profiles, and groups. However, developing and maintaining such capabilities is often challenging given the complexity of modern security protocols and requirements for scalable, robust, and highly available implementations. By outsourcing this functionality to Globus Nexus, developers can leverage best-practice implementations without incurring development and operations overhead. Users benefit from enhanced capabilities such as identity federation, flexible profile management, and user-oriented group management. In this paper we present Globus Nexus, describe its capabilities and architecture, summarize how several e-Science applications leverage these capabilities, and present results that characterize its scalability, reliability, and availability.

  13. Identity Management and Trust Services: Foundations for Cloud Computing

    Science.gov (United States)

    Suess, Jack; Morooney, Kevin

    2009-01-01

    Increasingly, IT organizations will move from providing IT services locally to becoming an integrator of IT services--some provided locally and others provided outside the institution. As a result, institutions must immediately begin to plan for shared services and must understand the essential role that identity management and trust services play…

  14. Managing Quality, Identity and Adversaries in Public Discourse with Machine Learning

    Science.gov (United States)

    Brennan, Michael

    2012-01-01

    Automation can mitigate issues when scaling and managing quality and identity in public discourse on the web. Discourse needs to be curated and filtered. Anonymous speech has to be supported while handling adversaries. Reliance on human curators or analysts does not scale and content can be missed. These scaling and management issues include the…

  15. XCPU2 process management system

    Energy Technology Data Exchange (ETDEWEB)

    Ionkov, Latchesar [Los Alamos National Laboratory; Van Hensbergen, Eric [IBM AUSTIN RESEARCH LAB

    2009-01-01

    Xcpu2 is a new process management system that allows the users to specify custom file system for a running job. Most cluster management systems enforce single software distribution running on all nodes. Xcpu2 allows programs running on the cluster to work in environment identical to the user's desktop, using the same versions of the libraries and tools the user installed locally, and accessing the configuration file in the same places they are located on the desktop. Xcpu2 builds on our earlier work with the Xcpu system. Like Xcpu, Xcpu2's process management interface is represented as a set of files exported by a 9P file server. It supports heterogeneous clusters and multiple head nodes. Unlike Xcpu, it uses pull instead of push model. In this paper we describe the Xcpu2 clustering model, its operation and how the per-job filesystem configuration can be used to solve some of the common problems when running a cluster.

  16. Identity and access management business performance through connected intelligence

    CERN Document Server

    Osmanoglu, Ertem

    2013-01-01

    Identity and Access Management: Controlling Your Network provides you with a practical, in-depth walkthrough of how to plan, assess, design, and deploy IAM solutions. This book breaks down IAM into manageable components to ease systemwide implementation. The hands-on, end-to-end approach includes a proven step-by-step method for deploying IAM that has been used successfully in over 200 deployments. The book also provides reusable templates and source code examples in Java, XML, and SPML.Focuses on real-word implementations Provides end-to-end coverage of IAM from business drivers, requirements

  17. Spoiled Group Identities and Backstage Work: A Theory of Stigma Management Rehearsals

    Science.gov (United States)

    O'Brien, John

    2011-01-01

    How do persons with a stigmatized identity learn potential responses to discrimination and harassment? Drawing on three and a half years of ethnographic data, this paper demonstrates how members of a group of Muslim American youth are socialized in locally dominant stigma management strategies through stigma management rehearsals. Stigma…

  18. Ultrasonic identity data storage and archival system

    International Nuclear Information System (INIS)

    Mc Kenzie, J.M.; Self, B.G.; Walker, J.E.

    1987-01-01

    Ultrasonic seals are being used to determine if an underwater stored spent fuel container has been compromised and can be used to determine if a nuclear material container has been compromised. The Seal Pattern Reader (SPAR) is a microprocessor controlled instrument which interrogates an ultrasonic seal to obtain its identity. The SPAR can compare the present identity with a previous identity, which it obtains from a magnetic bubble cassette memory. A system has been developed which allows an IAEA inspector to transfer seal information obtained at a facility by the SPAR to an IAEA-based data storage and retrieval system, using the bubble cassette memory. Likewise, magnetic bubbles can be loaded at the IAEA with seal signature data needed at a facility for comparison purposes. The archived signatures can be retrieved from the data base for relevant statistical manipulation and for plotting

  19. Identity And Access Management e Federazione

    Directory of Open Access Journals (Sweden)

    Virginia Calabritto

    2012-07-01

    Full Text Available ItLa rete telematica è in costante crescita e così i servizi online che, in modo sempre più penetrante, rappresentano un aspetto della nostra quotidianità. I servizi in rete si distinguono in servizi ad accesso libero e servizi ad accesso controllato. Ogni giorno studenti, ricercatori e docenti accedono a contenuti e servizi (risorse ad accesso controllato con modalità diverse, la più diffusa è l'utilizzo dell‘informazione utenza/password, informazione diversa per ciascuna risorsa. Da questo punto di vista l’ampia disponibilità di risorse in rete crea all’utente, ma non solo a lui, diversi problemi, non ultimo quello della memorizzazione di un numero sempre più ampio di coppie utenza/password.L’articolo è teso ad illustrare, nel dettaglio, scenario e problematiche per passare quindi ad accennare alle tecnologie che possono costituire una soluzione, ovvero, l'Identity Management, il Single Sign On e le federazioni di infrastrutture di autenticazione e autorizzazione e, quindi, a degli esempi tra cui IDEM, la prima federazione italiana di Infrastrutture di Autenticazione e Autorizzazione, che coinvolge gli enti della comunità scientifica ed accademica e i fornitori di servizi.EnThe Internet is constantly growing, therefore on-line services, are becoming part of our daily life in a more and more pervasive manner. The network services are divided into two types of access: free access and controlled access. Every day students, researchers and teachers access content and services (resources through controlled access using different modes, e.g using user / password information which is different for each resource. From this perspective, the large availability of networked resources generates many problems for the users, last but not least the inconvenience of storing an increasing number of user / password.The article aims to illustrate, in detail, the context and the problems related to the management of a digital identiy in the

  20. Management challenges in a case of gender identity disorder

    Directory of Open Access Journals (Sweden)

    Anubhav Rathi

    2014-01-01

    Full Text Available Gender identity disorder (GID is a complex disorder and can be defined as a group of disorders whose common feature is a strong and persistent preference for living as a person of the other sex. It is associated with significant impairment in social, occupational, interpersonal, and other areas of functioning. We describe the case of an adolescent, biologically male who was brought to our outpatient department primarily with symptoms of adjustment disorder with GID and the management provided. The role of a psychiatrist in the management, ethical and legal issues involved is also discussed.

  1. Bringing Federated Identity to Grid Computing

    Energy Technology Data Exchange (ETDEWEB)

    Teheran, Jeny [Fermilab

    2016-03-04

    The Fermi National Accelerator Laboratory (FNAL) is facing the challenge of providing scientific data access and grid submission to scientific collaborations that span the globe but are hosted at FNAL. Users in these collaborations are currently required to register as an FNAL user and obtain FNAL credentials to access grid resources to perform their scientific computations. These requirements burden researchers with managing additional authentication credentials, and put additional load on FNAL for managing user identities. Our design integrates the existing InCommon federated identity infrastructure, CILogon Basic CA, and MyProxy with the FNAL grid submission system to provide secure access for users from diverse experiments and collab orations without requiring each user to have authentication credentials from FNAL. The design automates the handling of certificates so users do not need to manage them manually. Although the initial implementation is for FNAL's grid submission system, the design and the core of the implementation are general and could be applied to other distributed computing systems.

  2. Group affiliation in self-management: support or threat to identity?

    Science.gov (United States)

    Bossy, Dagmara; Knutsen, Ingrid Ruud; Rogers, Anne; Foss, Christina

    2017-02-01

    Self-management is considered important in chronic illness, and contemporary health policy recommends participation in support groups for individuals with chronic conditions. Although withdrawal from or non-participation in support groups is an important problem, there is limited knowledge about individuals' own motivation for participation in or withdrawal from self-management support groups. To investigate how individuals with type 2 diabetes perceive participation in group-based self-management support. This is a qualitative focus group study using a semi-structured interview guide. Sixteen participants diagnosed with type 2 diabetes were included in the study. Individuals with and without group affiliations were mixed in three focus groups to trigger discussions. In the analysis, reoccurring themes of engagement and discussions between participants were focused within a theoretical frame of institutional logic. The focus groups are seen as social spaces where participants construct identity. Both participation and non-participation in group-based self-management support are associated with dealing with the stigma of having type 2 diabetes. Negotiations contribute to constructing an illness dignity as a response to the logic of moral responsibility for the disease. Contemporary policy contributes to societal understandings of individuals with type 2 diabetes as morally inadequate. Our study shows that group-based self-management support may counteract blame and contribute in negotiations of identity for individuals with type 2 diabetes. This mechanism makes participation in groups beneficial for some but stigma inducing for others. © 2016 The Authors. Health Expectations Published by John Wiley & Sons Ltd.

  3. designing a framework for a unified electronic identity system

    African Journals Online (AJOL)

    DJFLEX

    In this paper, a Unified Identity System is proposed where single electronic identity (eID) is issued that can be used ... online commerce and public sector organizations. Because ..... SearchUnifiedCommunications.com Definitions, Access date.

  4. Intergroup conflict management strategies as related to perceptions of dual identity and separate groups.

    Science.gov (United States)

    Bizman, Aharon; Yinon, Yoel

    2004-04-01

    The authors examined the relations between (a) the perceptions of dual identity and separate groups and (b) intergroup conflict management strategies, in two contexts: the conflict between the secular and religious sectors in Israel and the allocation of resources among organizational subunits. In both contexts, contention (i.e., forcing one's will on the other party) was associated with the perception of separate groups. Only in the organizational context, avoidance (i.e., doing nothing or discontinuing participation in the conflict) was associated with the perception of dual identity. Problem solving (i.e., finding a solution that is acceptable to both parties) was related to the perception of dual identity in the secular-religious context. In the organizational context, this relation appeared only under a low perception of separate groups. Yielding (i.e., satisfying the other party's needs at the expense of one's own) was related to the perception of dual identity in the organizational context. In the secular-religious context, this relation appeared only under a high perception of separate groups. The authors discussed the varying pattern of the associations between (a) the perceptions of dual identity and separate groups and (b) the conflict management strategies in the two contexts in terms of the Dual Concern Model and the perceived feasibility of the strategies.

  5. Towards Scalability for Federated Identity Systems for Cloud-Based Environments

    Directory of Open Access Journals (Sweden)

    André Albino Pereira

    2015-12-01

    Full Text Available As multi-tenant authorization and federated identity management systems for cloud computing matures, the provisioning of services using this paradigm allows maximum efficiency on business that requires access control. However, regarding scalability support, mainly horizontal, some characteristics of those approaches based on central authentication protocols are problematic. The objective of this work is to address these issues by providing an adapted sticky-session mechanism for a Shibboleth architecture using JASIG CAS. This alternative, compared with the recommended distributed memory approach, shown improved efficiency and less overall infrastructure complexity, as well as demanding less 58% of computational resources and improving throughput (requests per second by 11%.

  6. Adequate Security Protocols Adopt in a Conceptual Model in Identity Management for the Civil Registry of Ecuador

    Science.gov (United States)

    Toapanta, Moisés; Mafla, Enrique; Orizaga, Antonio

    2017-08-01

    We analyzed the problems of security of the information of the civil registries and identification at world level that are considered strategic. The objective is to adopt the appropriate security protocols in a conceptual model in the identity management for the Civil Registry of Ecuador. In this phase, the appropriate security protocols were determined in a Conceptual Model in Identity Management with Authentication, Authorization and Auditing (AAA). We used the deductive method and exploratory research to define the appropriate security protocols to be adopted in the identity model: IPSec, DNSsec, Radius, SSL, TLS, IEEE 802.1X EAP, Set. It was a prototype of the location of the security protocols adopted in the logical design of the technological infrastructure considering the conceptual model for Identity, Authentication, Authorization, and Audit management. It was concluded that the adopted protocols are appropriate for a distributed database and should have a direct relationship with the algorithms, which allows vulnerability and risk mitigation taking into account confidentiality, integrity and availability (CIA).

  7. Cybersecurity managing systems, conducting testing, and investigating intrusions

    CERN Document Server

    Mowbray, Thomas J

    2013-01-01

    A must-have, hands-on guide for working in the cybersecurity profession Cybersecurity involves preventative methods to protect information from attacks. It requires a thorough understanding of potential threats, such as viruses and other malicious code, as well as system vulnerability and security architecture. This essential book addresses cybersecurity strategies that include identity management, risk management, and incident management, and also serves as a detailed guide for anyone looking to enter the security profession. Doubling as the text for a cybersecurity course, it is also a usef

  8. Function Projective Synchronization of Two Identical New Hyperchaotic Systems

    International Nuclear Information System (INIS)

    Li Xin; Chen Yong

    2007-01-01

    A function projective synchronization of two identical hyperchaotic systems is defined and the theorem of sufficient condition is given. Based on the active control method and symbolic computation Maple, the scheme of function projective synchronization is developed to synchronize the two identical new hyperchaotic systems constructed by Yan up to a scaling function matrix with different initial values. Numerical simulations are used to verify the effectiveness of the scheme.

  9. Managing corporate visual identity: use and effects of organizational measures to support a consistent self-presentation

    NARCIS (Netherlands)

    van den Bosch, Annette; de Jong, Menno; Elving, Wim

    2004-01-01

    It is generally acknowledged that corporate visual identity (CVI) is an important element of identity, reputation, and relationship management. Academic research has focused strongly on the strategic and design aspects of CVI, and neglected the operational level. This article addresses one of the

  10. Managing corporate visual identity: Use and effects of organizational measures to support a consistent self-presentation.

    NARCIS (Netherlands)

    van den Bosch, A.L.M.; de Jong, Menno D.T.; Elving, W.J.L.

    2004-01-01

    It is generally acknowledged that corporate visual identity (CVI) is an important element of identity, reputation, and relationship management. Academic research has focused strongly on the strategic and design aspects of CVI, and neglected the operational level. This article addresses one of the

  11. "I'm Scared of the Disappointment": Young Adult Smokers' Relational Identity Gaps and Management Strategies as Sites of Communication Intervention.

    Science.gov (United States)

    Stanley, Samantha J; Pitts, Margaret Jane

    2018-02-22

    While cigarette smoking is decreasing among young adults, rates of nicotine consumption through other devices, most notably electronic cigarettes, are on the rise. Framed by communication theory of identity, this study examines young adult smokers' experiences with relational others in regard to their smoking. Focus group discussions and individual interviews convened with 20 young adult cigarette and electronic cigarette smokers revealed identity gaps implicating the relational layer of identity, including personal-relational, enacted-relational, and personal-enacted-relational identity gaps. Participants used communicative and behavioral strategies to manage relational discrepancies. The documented identity gaps and management strategies present opportunities for targeted smoking cessation interventions that amplify dissonance created through identity gaps as a motivational tactic.

  12. The Role of Individual Differences and Situational Variables in the Use of Workplace Sexual Identity Management Strategies.

    Science.gov (United States)

    Reed, Louren; Leuty, Melanie E

    2016-07-01

    Examination of individual difference variables have been largely ignored within research on the use of workplace sexual identity management strategies. The current study examined personality traits (extraversion, openness, and neuroticism), facets of sexual identity development (identity confusion, internalized heterosexism), and situational variables (e.g., perceptions of workplace climate and heterosexism) in explaining the use of management strategies, as well as possible interactions between individual and situational factors. Perceptions of the workplace climate toward lesbian and gay individuals significantly related to the use each of the management strategies, and Internalized Heterosexism was found to significantly predict the use of the Explicitly Out strategy. Most interactions between individual difference and situational variables were not supported, with the exception of an interaction between workplace heterosexism and internalized homophobia in explaining the use of the Explicitly Out strategy.

  13. 'Even though it's a small checkbox, it's a big deal': stresses and strains of managing sexual identity(s) on Facebook.

    Science.gov (United States)

    Rubin, Jennifer D; McClelland, Sara I

    2015-01-01

    Facebook offers a socialisation context in which young people from ethnic, gender and sexual minorities must continually manage the potential for prejudice and discrimination in the form of homophobia and racism. In-depth interviews were conducted with eight young women, aged 16-19 years, who self-identified as queer and as women of colour. A detailed analysis of these interviews--focusing in particular on how young people described navigating expectations of rejection from family and friends--offered insight into the psychological and health consequences associated with managing sexual identity(s) while online. The 'closet' ultimately takes on new meaning in this virtual space: participants described trying to develop social relationships within Facebook, which demands sharing one's thoughts, behaviours and ideas, while also hiding and silencing their emerging sexuality. In this 'virtual closet', tempering self-presentation to offset social exclusion has become a continuous, yet personally treacherous, activity during the daily practice of using Facebook.

  14. Interplay Between Intended Brand Identity and Identities in a Nike Related Brand Community

    DEFF Research Database (Denmark)

    Kornum, Niels; Gyrd-Jones, Richard; Al Zagir, Nadia

    2017-01-01

    While branding research traditionally views brand identity as an inside-out management controlled phenomenon, recent research emphasizes that a wide variety of stakeholders in the brand ecosystem enact and co-create brand identity. Following this theoretical perspective, management forms the inte...

  15. The NSF Cybersecurity Center of Excellence: Translating Identity Management and Cybersecurity into Scientific Collaboration

    Science.gov (United States)

    Welch, V.

    2016-12-01

    Scientists care deeply about their collaborations: who is a member, who can access, produce, and correct data, and manager instruments critical to their science missions. The communities of cybersecurity and identity management professionals develop tools to support collaborations and the undertaking of trustworthy science, but there are large cultural and linguistic gaps between these communities and the scientists they service. The National Science Foundation has recently funded a NSF Cybersecurity Center of Excellence to help its community of projects by providing leadership and addressing the challenges of trustworthy science. A key goal of this NSF Center has been translating between the goals of the science community into requirements and risks understood by identity management and cybersecurity communities. This talk will give an update on the Center's efforts and other services it provides to the NSF community to bridge these cultures.

  16. OAuth 2.0 identity and access management patterns

    CERN Document Server

    Spasovski, Martin

    2013-01-01

    This is a practical and fast-paced guide that gives you all the information you need to start implementing secure OAuth 2.0 implementations in your web applications.OAuth 2.0 Identity and Access Management Patterns is intended for software developers, software architects, and enthusiasts working with the OAuth 2.0 framework.In order to learn and understand the OAuth 2.0 grant flow, it is assumed that you have some basic knowledge of HTTP communication. For the practical examples, basic knowledge of HTML templating, programming languages, and executing commands in the command line terminal is a

  17. Systemic Case Formulation, Individualized Process Monitoring, and State Dynamics in a Case of Dissociative Identity Disorder.

    Science.gov (United States)

    Schiepek, Günter K; Stöger-Schmidinger, Barbara; Aichhorn, Wolfgang; Schöller, Helmut; Aas, Benjamin

    2016-01-01

    Objective: The aim of this case report is to demonstrate the feasibility of a systemic procedure (synergetic process management) including modeling of the idiographic psychological system and continuous high-frequency monitoring of change dynamics in a case of dissociative identity disorder. The psychotherapy was realized in a day treatment center with a female client diagnosed with borderline personality disorder (BPD) and dissociative identity disorder. Methods: A three hour long co-creative session at the beginning of the treatment period allowed for modeling the systemic network of the client's dynamics of cognitions, emotions, and behavior. The components (variables) of this idiographic system model (ISM) were used to create items for an individualized process questionnaire for the client. The questionnaire was administered daily through an internet-based monitoring tool (Synergetic Navigation System, SNS), to capture the client's individual change process continuously throughout the therapy and after-care period. The resulting time series were reflected by therapist and client in therapeutic feedback sessions. Results: For the client it was important to see how the personality states dominating her daily life were represented by her idiographic system model and how the transitions between each state could be explained and understood by the activating and inhibiting relations between the cognitive-emotional components of that system. Continuous monitoring of her cognitions, emotions, and behavior via SNS allowed for identification of important triggers, dynamic patterns, and psychological mechanisms behind seemingly erratic state fluctuations. These insights enabled a change in management of the dynamics and an intensified trauma-focused therapy. Conclusion: By making use of the systemic case formulation technique and subsequent daily online monitoring, client and therapist continuously refer to detailed visualizations of the mental and behavioral network and

  18. Systemic Case Formulation, Individualized Process Monitoring, and State Dynamics in a Case of Dissociative Identity Disorder.

    Directory of Open Access Journals (Sweden)

    Guenter Karl Schiepek

    2016-10-01

    Full Text Available Objective. The aim of this case report is to demonstrate the feasibility of a systemic procedure (synergetic process management including modeling of the idiographic psychological system and continuous high-frequency monitoring of change dynamics in a case of dissociative identity disorder. The psychotherapy was realized in a day treatment center with a female client diagnosed with borderline personality disorder (BPD and dissociative identity disorder. Methods. A three hour long co-creative session at the beginning of the treatment period allowed for modeling the systemic network of the client’s dynamics of cognitions, emotions, and behavior. The components (variables of this idiographic system model (ISM were used to create items for an individualized process questionnaire for the client. The questionnaire was administered daily through an internet-based monitoring tool (Synergetic Navigation System, SNS, to capture the client’s individual change process continuously throughout the therapy and after-care period. The resulting time series were reflected by therapist and client in therapeutic feedback sessions. Results. For the client it was important to see how the personality states dominating her daily life were represented by her idiographic system model and how the transitions between each state could be explained and understood by the activating and inhibiting relations between the cognitive-emotional components of that system. Continuous monitoring of her cognitions, emotions, and behavior via SNS allowed for identification of important triggers, dynamic patterns, and psychological mechanisms behind seemingly erratic state fluctuations. These insights enabled a change in management of the dynamics and an intensified trauma-focused therapy. Conclusion. By making use of the systemic case formulation technique and subsequent daily online monitoring, client and therapist continuously refer to detailed visualizations of the mental and

  19. Designing a framework for a unified electronic identity system ...

    African Journals Online (AJOL)

    In this paper, a Unified Identity System is proposed where single electronic identity (eID) is issued that can be used across the various platforms of business transaction. The activity/state diagram of the model is presented, and the means of authentication is based on the Secure Assertion Markup Language (SAML) ...

  20. Identity Assemblages

    DEFF Research Database (Denmark)

    Horn, Line Helverskov

    The study aims at exploring how identity is enacted within the context of a two-year programme in Service, Hospitality, and Tourism Management (SHTM). This research thus investigates how students and educators go about their daily lives in different educational contexts both on and off campus...... as a contribution to the body of literature of ANT-based studies. Second, it contributes to existing identity theories by exemplifying a socio-material approach to identity issues. Third, the study enables reflections upon how educational institutions as fundamentally identity-producing organisations acknowledge...

  1. Chapter 14. Systems of identical particles

    International Nuclear Information System (INIS)

    Anon.

    1977-01-01

    For the systems of identical particles it is necessary to introduce the postulate of symmetrization to describe quantum systems. Physical implications of this postulate are presented: bosons, fermions and Pauli exclusion principle; quantum statistics; interferences between direct process and exchange process. Permutation operators are also exposed. In complement are studied: approximation of central field, electron configurations, energy levels of helium atom (configurations, terms, multiplets), physical properties of electron gas (application to solids) [fr

  2. A FPGA-based identity authority method in quantum key distribution system

    International Nuclear Information System (INIS)

    Cui Ke; Luo Chunli; Zhang Hongfei; Lin Shengzhao; Jin Ge; Wang Jian

    2012-01-01

    In this article, an identity authority method realized in hardware is developed which is used in quantum key distribution (QKD) systems. This method is based on LFSR-Teoplitz hashing matrix. Its benefits relay on its easy implementation in hardware and high secure coefficient. It can gain very high security by means of splitting part of the final key generated from QKD systems as the seed where it is required in the identity authority method. We propose an specific flow of the identity authority method according to the problems and features of the hardware. The proposed method can satisfy many kinds of QKD systems. (authors)

  3. Evaluation and implementation of QR Code Identity Tag system for Healthcare in Turkey

    OpenAIRE

    Uzun, Vassilya; Bilgin, Sami

    2016-01-01

    For this study, we designed a QR Code Identity Tag system to integrate into the Turkish healthcare system. This system provides QR code-based medical identification alerts and an in-hospital patient identification system. Every member of the medical system is assigned a unique QR Code Tag; to facilitate medical identification alerts, the QR Code Identity Tag can be worn as a bracelet or necklace or carried as an ID card. Patients must always possess the QR Code Identity bracelets within hospi...

  4. A network identity authentication protocol of bank account system based on fingerprint identification and mixed encryption

    Science.gov (United States)

    Zhu, Lijuan; Liu, Jingao

    2013-07-01

    This paper describes a network identity authentication protocol of bank account system based on fingerprint identification and mixed encryption. This protocol can provide every bank user a safe and effective way to manage his own bank account, and also can effectively prevent the hacker attacks and bank clerk crime, so that it is absolute to guarantee the legitimate rights and interests of bank users.

  5. Evaluation and implementation of QR Code Identity Tag system for Healthcare in Turkey.

    Science.gov (United States)

    Uzun, Vassilya; Bilgin, Sami

    2016-01-01

    For this study, we designed a QR Code Identity Tag system to integrate into the Turkish healthcare system. This system provides QR code-based medical identification alerts and an in-hospital patient identification system. Every member of the medical system is assigned a unique QR Code Tag; to facilitate medical identification alerts, the QR Code Identity Tag can be worn as a bracelet or necklace or carried as an ID card. Patients must always possess the QR Code Identity bracelets within hospital grounds. These QR code bracelets link to the QR Code Identity website, where detailed information is stored; a smartphone or standalone QR code scanner can be used to scan the code. The design of this system allows authorized personnel (e.g., paramedics, firefighters, or police) to access more detailed patient information than the average smartphone user: emergency service professionals are authorized to access patient medical histories to improve the accuracy of medical treatment. In Istanbul, we tested the self-designed system with 174 participants. To analyze the QR Code Identity Tag system's usability, the participants completed the System Usability Scale questionnaire after using the system.

  6. Collective Endeavors to Address Institutional Contradiction between Gender Identity and Occupational Identity

    DEFF Research Database (Denmark)

    Villeseche, Florence

    or leaders and their social identity as women. Accordingly, I here seek to answer the following question: what dilemmas arise from the collective institutional work performed by actors facing institutional contradiction between their occupational and gender identity, and how are those dilemmas addressed? I......Women’s presence in the labor market is one of the major institutional changes of the past century. However, in particular at higher hierarchical levels, gender equality still remains a distant objective. The ideal-type of the worker, manager or leader is this largely a masculine one, thus...... associating the related occupational identity to a masculine gender social identity. Thus, it can be argued that women in organizations can face an “institutional contradiction” between their occupation and their gender – i.e a perceived discordancy between their social occupational identity as managers...

  7. Parametric Ward-Takahashi identity in disordered systems and the integral identity associated with the Calogero-Sutherland model

    International Nuclear Information System (INIS)

    Taniguchi, N.

    1997-01-01

    By utilizing the symmetric property known as the Ward-Takahashi identity in disordered systems, we explore the novel symmetry relations which hold in one-dimensional systems with inverse square interaction (the Calogero-Sutherland model). The identities emerge totally from the algebraic structure of the model. They show that the dynamical correlators are connected with one another, involving the higher-order integrals of motion. We obtain the result for the coupling strengths λ=1/2, 1, and 2, and conjecture that a similar relation may hold for arbitrary rational λ. copyright 1997 The American Physical Society

  8. When Social Identities Collide: Commentary on "Gender in the Management Education Classroom"

    Science.gov (United States)

    Patton, Eric

    2010-01-01

    This commentary to "Gender in the Management Education Classroom" (Bilimoria, O'Neil, Hopkins, & Murphy, 2010) employs social identity and self-categorization theory to analyze the incident described in the article. In any MBA classroom, students are dealing with multiple group memberships. Similar to workplace settings, when the focus is on…

  9. [Effects of an integrated self-management program on self-management, glycemic control, and maternal identity in women with gestational diabetes mellitus].

    Science.gov (United States)

    Kim, HeeSook; Kim, Sue

    2013-02-01

    The purpose of the study was to investigate the effects of an integrated self-management program on self-management, glycemic control, and maternal identity in women with gestational diabetes mellitus (GDM). A non-equivalent control group non-synchronized quasi-experimental design was used. A total of 55 women with GDM were recruited from Cheil General Hospital, Seoul, Korea and were assigned to an experimental (n=28) or control group (n=27). The participants were 24-30 weeks pregnant women who had been diagnosed with GDM as of July 30, 2010. The program was conducted as a 1 hour small group meeting 3 out of 5 times and by telephone-counseling 2 out of 5 times. The integrated self-management program was verified by an expert panel. Although there was no significant reduction in HbA1c (U= -1.17, p=.238), there were statistically significant increases in self-management (U= -3.80, pidentity (U= -4.48, pmanagement program for women with GDM improves self-management, maternal identity, and glycemic control. Further studies are needed to identify the effects of an integrated self-management program on pregnancy and neonatal outcomes.

  10. Social Identity Simulation System (SISTEM)

    Science.gov (United States)

    2014-03-31

    Report Individuation Individuation refers to when an individual attempts to preserve self-esteem by psychologically separating oneself from a...its expected costs. The following subsections describe various strategies of social identity entrepreneurship in more detail. Calling for...Haslam, S. A., & Reicher, S. (2007). Identity Entrepreneurship and the consequences of identity failure: the dynamics of leadership in the BBC prison

  11. The quadratic-form identity for constructing the Hamiltonian structure of integrable systems

    International Nuclear Information System (INIS)

    Guo Fukui; Zhang Yufeng

    2005-01-01

    A usual loop algebra, not necessarily the matrix form of the loop algebra A-tilde n-1 , is also made use of for constructing linear isospectral problems, whose compatibility conditions exhibit a zero-curvature equation from which integrable systems are derived. In order to look for the Hamiltonian structure of such integrable systems, a quadratic-form identity is created in the present paper whose special case is just the trace identity; that is, when taking the loop algebra A-tilde 1 , the quadratic-form identity presented in this paper is completely consistent with the trace identity

  12. Claims and Identity: On-Premise and Cloud Solutions

    Science.gov (United States)

    Bertocci, Vittorio

    Today's identity-management practices are often a patchwork of partial solutions, which somehow accommodate but never really integrate applications and entities separated by technology and organizational boundaries. The rise of Software as a Service (SaaS) and cloud computing, however, will force organizations to cross such boundaries so often that ad hoc solutions will simply be untenable. A new approach that tears down identity silos and supports a de-perimiterized IT by design is in order.This article will walk you through the principles of claims-based identity management, a model which addresses both traditional and cloud scenarios with the same efficacy. We will explore the most common token exchange patterns, highlighting the advantages and opportunities they offer when applied on cloud computing solutions and generic distributed systems.

  13. System reliability prediction using data from non-identical environments

    International Nuclear Information System (INIS)

    Bergman, B.; Ringi, M.

    1997-01-01

    Since information changes one's mind and probability assessments reflect one's degree of beliefs, a reliability prediction model should enclose all relevant information. Almost always ignored in existing reliability models is the dependence on component life lengths, induced by a common but unknown environment. Furthermore, existing models seldom permit learning from components' performance in similar systems, under the knowledge of non-identical operating environments. In an earlier paper by the present authors the first type of aspects were taken into account and in this paper that model is generalised so that failure data generated from several similar systems in non-identical environments may be used for the prediction of any similar system in its specific environment

  14. An exploration of mothers' and fathers' views of their identities in chronic-kidney-disease management: parents as students?

    Science.gov (United States)

    Swallow, Veronica

    2008-12-01

    To explore parents' views of their identities as they learn to manage their child's chronic kidney disease. Parents are expected to participate in management and usually learn necessary skills from the multidisciplinary team. Research highlights the importance of professionals defining parents' management roles in chronic disease; but little is known about parents' views on their own identities as the complex and dynamic process of teaching and learning unfolds around their child's condition. According to positioning theory, identity development is a dynamic and fluid process that occurs during interaction, with each person positioning themselves while simultaneously positioning the other person, yet this concept has not been considered in relation to parents' contributions to disease management. A longitudinal, grounded theory study conducted in a UK Children's Kidney Unit. This paper focuses on one aspect of a larger study exploring family learning in disease management. Six mothers and two fathers of six children with a recently diagnosed chronic kidney disease participated in a total of 21 semi-structured interviews during the 18 months after referral to the unit. Interviews included discussion about the parts they played in relation to professionals during the management process. Findings were interpreted within a framework of positioning theory. Parents participated in teaching/learning/assessment that was both planned (involving allocated clinical lessons and tasks) and spontaneous (in response to current situations), to facilitate their participation. They positioned multidisciplinary team members as teachers as well as professionals, simultaneously positioning themselves as students as well as parents. Parents' clinical duties and obligations are not an automatic part of parenting but become part of the broader process of sharing disease management, this can lead to them assuming the additional identity of a 'student'. Involving parents in ongoing

  15. Use of standardized multidimensional evaluation tools and the emergence of the case manager's professional identity in France.

    Science.gov (United States)

    Nugue, Mathilde; De Stampa, Matthieu; Couturier, Yves; Somme, Dominique

    2012-01-01

    In France, the national public health plan proposes a group of innovations including the initiation of case management for older adults in complex situations, particularly those with cognitive disorders. In this context, public authorities asked case managers to use a standardized multidimensional evaluation tool. The results of a qualitative study on the pertinence of such a tool relative to the emergence of this new professional field are described. Early use of an evaluation tool seems to be linked to the emergence of a new professional identity for recently recruited case managers. Factors determining the strength of this link are training tool standardization, computerization, and local structure's involvement. Our results contribute to identifying one of the ways by which professional identity can be changed to become a case manager.

  16. Rewriting Dominant Narratives of the Academy: Women Faculty of Color and Identity Management

    Science.gov (United States)

    Motha, Suhanthie; Varghese, Manka M.

    2018-01-01

    Drawing on Delgado and Yosso's "counterstory," Yosso's "community cultural wealth," and Alsup's "borderland discourses," the authors, who are women of color academics, use narratives from their lives to discuss the ways in which they draw on resources in managing and reconfiguring their multiple identities within the…

  17. A hand held photo identity verification system for mobile applications

    International Nuclear Information System (INIS)

    Kumar, Ranajit; Upreti, Anil; Mahaptra, U.; Bhattacharya, S.; Srivastava, G.P.

    2009-01-01

    A handheld portable system has been developed for mobile personnel identity verification. The system consists of a contact less RF smart card reader integrated to a Simputer through serial link. The simputer verifies the card data, with the data base and aids the security operator in identifying the persons by providing the facial image of the verified person along with other personal details like name, designation, division etc. All transactions are recorded in the Simputer with time and date for future record. This system finds extensive applications in mobile identity verification in nuclear or other industries. (author)

  18. Dynamics of nonholonomic systems from variational principles embedded variation identity

    International Nuclear Information System (INIS)

    Guo Yongxin; Liu Shixing; Liu Chang; Chang Peng

    2009-01-01

    Nondeterminacy of dynamics, i.e., the nonholonomic or the vakonomic, fundamental variational principles, e.g., the Lagrange-d'Alembert or Hamiltonian, and variational operators, etc., of nonholonomic mechanical systems can be attributed to the non-uniqueness of ways how to realize nonholonomic constraints. Making use of a variation identity of nonholonomic constraints embedded into the Hamilton's principle with the method of Lagrange undetermined multipliers, three kinds of dynamics for the nonholonomic systems including the vakonomic and nonholonomic ones and a new one are obtained if the variation is respectively reduced to three conditional variations: vakonomic variation, Hoelder's variation and Suslov's variation, defined by the identity. Therefore, different dynamics of nonholonomic systems can be derived from an integral variational principle, utilizing one way of embedding constraints into the principle, with different variations. It is verified that the similar embedding of the identity into the Lagrange-d'Alembert principle gives rise to the nonholonomic dynamics but fails to give the vakonomic one unless the constraints are integrable.

  19. Leadership, New Public Management and the Re-Modelling and Regulation of Teacher Identities

    Science.gov (United States)

    Hall, David; Gunter, Helen; Bragg, Joanna

    2013-01-01

    This article examines the rapidly shifting relationship between teachers and the state and efforts to re-model teacher identities within the wider context of public sector modernization and the New Public Management. The construction and development of officially authorized and normative discursive practices relating to leadership and the…

  20. A network identity authentication system based on Fingerprint identification technology

    Science.gov (United States)

    Xia, Hong-Bin; Xu, Wen-Bo; Liu, Yuan

    2005-10-01

    Fingerprint verification is one of the most reliable personal identification methods. However, most of the automatic fingerprint identification system (AFIS) is not run via Internet/Intranet environment to meet today's increasing Electric commerce requirements. This paper describes the design and implementation of the archetype system of identity authentication based on fingerprint biometrics technology, and the system can run via Internet environment. And in our system the COM and ASP technology are used to integrate Fingerprint technology with Web database technology, The Fingerprint image preprocessing algorithms are programmed into COM, which deployed on the internet information server. The system's design and structure are proposed, and the key points are discussed. The prototype system of identity authentication based on Fingerprint have been successfully tested and evaluated on our university's distant education applications in an internet environment.

  1. Getting the Most of Management Training - the Role of Identical Elements for Training Transfer

    NARCIS (Netherlands)

    prof. dr. Karen van Dam; drs. Martijn van der Locht; dr. Dan Chiaburu

    2013-01-01

    Purpose - Focusing on management training, this study aimed to establish whether identical elements in a training program (i.e. aspects resembling participants' work situation) can improve training transfer and whether they do so beyond the contribution of two well-established predictors --

  2. 76 FR 35483 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2011-06-17

    ... Records: 500.050 HSPD-12: Identity Management System is being established to support implementation of...: USPS 500.050 SYSTEM NAME: HSPD-12: Identity Management System (IDMS). Accordingly, the Postal Service... Management System (IDMS). SYSTEM LOCATION: Records relating to the Identity Management System are maintained...

  3. Brief Report: The Identity Style Inventory (ISI-3) and the Utrecht-Management of Identity Commitments Scale (U-MICS)--Factor Structure, Reliability, and Convergent Validity in French-Speaking University Students

    Science.gov (United States)

    Zimmermann, Gregoire; Mahaim, Elodie Biermann; Mantzouranis, Gregory; Genoud, Philippe A.; Crocetti, Elisabetta

    2012-01-01

    The purpose of this study was to evaluate the factor structure and the reliability of the French versions of the Identity Style Inventory (ISI-3) and the Utrecht-Management of Identity Commitments Scale (U-MICS) in a sample of college students (N = 457, 18-25 years old). Confirmatory factor analyses confirmed the hypothesized three-factor solution…

  4. Identity at work: Exploring strategies for Identity Work

    Directory of Open Access Journals (Sweden)

    Byron G. Adams

    2012-09-01

    Research purpose: The main aim of this study was to explore employee narratives and identify the strategies available to them in the process of identity work, as they defined themselves at work. Motivation for the study: As there is a scarcity of research on identity work in South Africa, this study wanted to advance knowledge about identity work and the strategies used for regulating and negotiating an identity at work by exploring these constructs in this context. Research design, approach and method: A qualitative research process formed the basis for this study. Nineteen employees from a global manufacturing company participated in two semi-structured in-depth interviews. Grounded theory was applied to analyse and interpret the data. Main findings: Nine strategies for identity work were identified and categorised into four broad themes (personal philosophies; relationships; career management and negotiating balance. Practical/managerial implications: Employees followed various strategies for defining themselves at work and this may have some implications for employee work engagement and productivity. Contribution/value-add: This study expands on current theoretical knowledge of identity work, and provides insights into the strategies people use to regulate and negotiate their identities at work.

  5. Identity at work: Exploring strategies for Identity Work

    Directory of Open Access Journals (Sweden)

    Byron G. Adams

    2012-01-01

    Full Text Available Orientation: This study explored strategies for identity work that are central to the negotiation and regulation of employee work identity.Research purpose: The main aim of this study was to explore employee narratives and identify the strategies available to them in the process of identity work, as they defined themselves at work.Motivation for the study: As there is a scarcity of research on identity work in South Africa, this study wanted to advance knowledge about identity work and the strategies used for regulating and negotiating an identity at work by exploring these constructs in this context.Research design, approach and method: A qualitative research process formed the basis for this study. Nineteen employees from a global manufacturing company participated in two semi-structured in-depth interviews. Grounded theory was applied to analyse and interpret the data.Main findings: Nine strategies for identity work were identified and categorised into four broad themes (personal philosophies; relationships; career management and negotiating balance.Practical/managerial implications: Employees followed various strategies for defining themselves at work and this may have some implications for employee work engagement and productivity.Contribution/value-add: This study expands on current theoretical knowledge of identity work, and provides insights into the strategies people use to regulate and negotiate their identities at work. 

  6. Report: Improvements Needed in CSB’s Identity and Access Management and Incident Response Security Functions

    Science.gov (United States)

    Report #18-P-0030, October 30, 2017. Weaknesses in the Identity and Access Management and Incident Response metric domains leave the CSB vulnerable to attacks occurring and not being detected in a timely manner.

  7. Dynamics of nonholonomic systems from variational principles embedded variation identity

    Energy Technology Data Exchange (ETDEWEB)

    Guo Yongxin, E-mail: yxguo@lnu.edu.c [College of Physics, Liaoning University, Shenyang 110036 (China); Liu Shixing [College of Physics, Liaoning University, Shenyang 110036 (China); Liu Chang; Chang Peng [Department of Applied Mechanics, Beijing Institute of Technology, Beijing 100081 (China)

    2009-10-19

    Nondeterminacy of dynamics, i.e., the nonholonomic or the vakonomic, fundamental variational principles, e.g., the Lagrange-d'Alembert or Hamiltonian, and variational operators, etc., of nonholonomic mechanical systems can be attributed to the non-uniqueness of ways how to realize nonholonomic constraints. Making use of a variation identity of nonholonomic constraints embedded into the Hamilton's principle with the method of Lagrange undetermined multipliers, three kinds of dynamics for the nonholonomic systems including the vakonomic and nonholonomic ones and a new one are obtained if the variation is respectively reduced to three conditional variations: vakonomic variation, Hoelder's variation and Suslov's variation, defined by the identity. Therefore, different dynamics of nonholonomic systems can be derived from an integral variational principle, utilizing one way of embedding constraints into the principle, with different variations. It is verified that the similar embedding of the identity into the Lagrange-d'Alembert principle gives rise to the nonholonomic dynamics but fails to give the vakonomic one unless the constraints are integrable.

  8. Comparison between different synchronization methods of identical chaotic systems

    International Nuclear Information System (INIS)

    Haeri, Mohammad; Khademian, Behzad

    2006-01-01

    This paper studies and compares three nonadaptive (bidirectional, unidirectional, and sliding mode) and two adaptive (active control and backstepping) synchronization methods on the synchronizing of four pairs of identical chaotic systems (Chua's circuit, Roessler system, Lorenz system, and Lue system). Results from computer simulations are presented in order to illustrate the effectiveness of the methods and to compare them based on different criteria

  9. Keeping identity private

    DEFF Research Database (Denmark)

    Adjei, Joseph K.; Olesen, Henning

    2011-01-01

    information. On the other hand, consumers have expressed concerns that their rights and ability to control their personal information are violated. Paradoxically, it appears that users provide personal data freely and willingly, as it has been observed on Facebook and other social networks. This study...... is an attempt to understand the relationship between individuals’ intentions to disclose personal information, their actual personal information disclosure behaviours, and how these can be leveraged to develop privacy-enhancing identity management systems (IDMS) that users can trust. Legal, regu...

  10. Comparison between different synchronization methods of identical chaotic systems

    Energy Technology Data Exchange (ETDEWEB)

    Haeri, Mohammad [Advanced Control System Laboratory, Electrical Engineering Department, Sharif University of Technology, Azadi Avenue, P.O. Box 11365-9363 Tehran (Iran, Islamic Republic of)]. E-mail: haeri@sina.sharif.edu; Khademian, Behzad [Advanced Control System Laboratory, Electrical Engineering Department, Sharif University of Technology, Azadi Avenue, P.O. Box 11365-9363 Tehran (Iran, Islamic Republic of)

    2006-08-15

    This paper studies and compares three nonadaptive (bidirectional, unidirectional, and sliding mode) and two adaptive (active control and backstepping) synchronization methods on the synchronizing of four pairs of identical chaotic systems (Chua's circuit, Roessler system, Lorenz system, and Lue system). Results from computer simulations are presented in order to illustrate the effectiveness of the methods and to compare them based on different criteria.

  11. Linguistic identity matching

    CERN Document Server

    Lisbach, Bertrand

    2013-01-01

    Regulation, risk awareness and technological advances are increasingly drawing identity search functionality into business, security and data management processes, as well as fraud investigations and counter-terrorist measures.Over the years, a number of techniques have been developed for searching identity data, traditionally focusing on logical algorithms. These techniques often failed to take into account the complexities of language and culture that provide the rich variations  seen in names used around the world. A new paradigm has now emerged for understanding the way that identity data

  12. Contributions of the Life Story Method for Studies on Identity: the example of study about female professors in management positions

    Directory of Open Access Journals (Sweden)

    Adílio Renê Almeida Miranda

    2014-12-01

    Full Text Available Recently, the Life Story Method has been used in the area of Business Administration as an important methodological strategy in qualitative research. The purpose is to understand groups or collective bodies based on individual paths of life. Thus, the goal of this study was to show the contribution of the life story method in understanding the identity dynamics of female professors managing a public university, by means of an example derived from an empirical study. It was observed from the reports of four female professors involved in management that recovery of past memories, as well as of values, facts, standards and occurrences connected with the primary and organizational socialization of the interviewees, contributes to understanding of their identity dynamics. Some categories of analysis emerged that express relationships between life story and identity, e.g., discontinuity, subjectivity and the importance of allowing an individual/subject to speak; the individual and the social sphere and socio-historical transformations, a dynamic interaction in construction of identities; and temporal analysis in construction of identities.

  13. Managing risk and marginalizing identities: on the society-of-captives thesis and the harm of social dis-ease.

    Science.gov (United States)

    Arrigo, Bruce A

    2013-06-01

    This article develops the constitutive features of the society-of-captives thesis as suggested by Arrigo and Milovanovic, and Arrigo, Bersot, and Sellers. The relevance of this thesis is briefly explored in relation to the institutional and community-based treatment philosophies that currently inform the mental health and criminal justice systems. This exploration specifies how risk (being human and doing humanness differently) is managed symbolically, linguistically, materially, and culturally. The management of this risk extends to the kept as well as to their keepers, regulators, and watchers (i.e., the society of captives). This article calls for a new clinical praxis (being/doing a critical mindfulness) designed to overcome the totalizing madness (the harm of social dis-ease) that follows from managing risk fearfully and marginalizing identities desperately as reified recursively through society's captivity. The ethical underpinnings of this clinical praxis represent an emergent direction for undertaking correctional policy reform.

  14. Identity crisis: user perspectives on multiplicity and control in federated identitymanagement

    DEFF Research Database (Denmark)

    Howard, Steve; Satchell, C; Shanks, G

    2009-01-01

    Federated identity management systems synthesise complex and fragmented user information into a single entity. Literature from the provider’s perspective notes this integration extends many benefits to the end user and the privileges provided by digital identity authentication schemes have been...... well documented from this perspective. Less explored are the perceptions of federation from the user’s perspective. This study reports an empirical user study that examines the relationship between identity and technology using contextual interviews, focus groups and cultural probes. It emerges...... that while current federated systems satisfy user needs by allowing the construction of multiple digital data sets that are moored to a central identifier, they fail to provide the user with control over the capability to act in the ‘hatch’, ‘match’ and ‘dispatch’ phases of the digital identity lifecycle...

  15. Family support in the transition to adulthood in Portugal--its effects on identity capital development, uncertainty management and psychological well-being.

    Science.gov (United States)

    Oliveira, José Egídio; Mendonça, Marina; Coimbra, Susana; Fontaine, Anne Marie

    2014-12-01

    In a familistic southern European society such as the Portuguese, the family has historically played a prominent role in supporting the negotiation of transition pathways into adulthood. The present study aimed at capturing (1) the relative weight of parental financial support and autonomy support in contributing to the youngsters' psychological well-being (PWB), and (2) the mediating role of identity capital and uncertainty management in this relationship. A total of 620 participants completed measures of parental support, identity capital, uncertainty management and PWB. Autonomy support was found to be the strongest predictor of PWB, both directly and indirectly through its effects on identity capital and the use of target focused uncertainty management strategies. Conversely, financial support evidenced only a minor indirect impact through the mediation of tangible identity capital. Autonomy stimulation may constitute one of the most developmentally determinant family challenges in assisting the process of coming of age in Portugal. Copyright © 2014 The Foundation for Professionals in Services for Adolescents. Published by Elsevier Ltd. All rights reserved.

  16. Efficient Key Management System for Large-scale Smart RFID Applications

    Directory of Open Access Journals (Sweden)

    Mohammad Fal Sadikin

    2015-08-01

    Full Text Available Due to low-cost and its practical solution, the integration of RFID tag to the sensor node called smart RFID has become prominent solution in various fields including industrial applications. Nevertheless, the constrained nature of smart RFID system introduces tremendous security and privacy problem. One of them is the problem in key management system. Indeed, it is not feasible to recall all RFID tags in order to update their security properties (e.g. update their private keys. On the other hand, using common key management solution like standard TLS/SSL is too heavy-weight that can drain and overload the limited resources. Furthermore, most of existing solutions are highly susceptible to various threats reaching from privacy threats, physical attacks to various technics of Man-in-the-Middle attacks. This paper introduces novel key management system, tailored to the limited resources of smart RFID system. It proposes light-weight mutual authentication and identity protection to mitigate the existing threats.

  17. "Everybody Puts Their Whole Life on Facebook": Identity Management and the Online Social Networks of LGBTQ Youth.

    Science.gov (United States)

    McConnell, Elizabeth; Néray, Bálint; Hogan, Bernie; Korpak, Aaron; Clifford, Antonia; Birkett, Michelle

    2018-05-26

    Lesbian, gay, bisexual, transgender, and queer (LGBTQ) youth and young adults almost inevitably "come out", or self-disclose their identity to others. Some LGBTQ youth are more uniformly "out", while others may disclose to some groups but not others. This selective disclosure is complicated on real name social media sites, which tend to encourage a unified presentation of self across social contexts. We explore these complications with a cohort of LBGTQ youth on Facebook ( N = 199, M age = 24.13). Herein we ask: How do LBGTQ youth manage the disclosure of their sexual orientation and/or gender identity to different people in their lives? Further, are there identifiable differences in the online social network structure for LGBTQ youth who manage outness in different ways? Finally, how do LGBTQ young people describe their experiences on Facebook? We answer these questions using a mixed methods approach, combining statistical cluster analysis, network visualization, and qualitative data. Our findings illustrate patterns in network structure by outness cluster type, highlighting both the work involved in managing one's online identity as well as the costs to (semi-) closeted individuals including a considerably lower overall network connectivity. In particular, outness to family characterized LGBTQ young people's experiences on Facebook.

  18. User-centred and context-aware identity management in mobile ad-hoc networks

    CERN Document Server

    Arabo, Abdullahi

    2013-01-01

    The emergent notion of ubiquitous computing makes it possible for mobile devices to communicate and provide services via networks connected in an ad-hoc manner. These have resulted in the proliferation of wireless technologies such as Mobile Ad-hoc Networks (MANets), which offer attractive solutions for services that need flexible setup as well as dynamic and low cost wireless connectivity. However, the growing trend outlined above also raises serious concerns over Identity Management (IM) du...

  19. Academic Manager or Managed Academic? Academic Identity Schisms in Higher Education

    Science.gov (United States)

    Winter, Richard

    2009-01-01

    The relationship between values and academic identity has received scant attention in the higher education literature with some notable exceptions (Churchman, 2006; Harley, 2002; Henkel, 2005). This paper contends that the perceived need to align all academics around corporate values and goals has given rise to academic identity schisms in higher…

  20. Sensor management for identity fusion on a mobile robot

    DEFF Research Database (Denmark)

    Larsen, Thomas Dall; Andersen, Nils Axel; Ravn, Ole

    1998-01-01

    This paper addresses the problem of identity fusion, i.e. the problem of selecting one of several identity hypotheses concerning an observed object. Two problems are considered. Firstly the problem of preserving the information in the representation and fusion of measurements relating to identity...

  1. Integration of Standardized Management Systems: A Dilemma?

    Directory of Open Access Journals (Sweden)

    Manuel Ferreira Rebelo

    2015-06-01

    Full Text Available The growing proliferation of management systems standards (MSSs, and their individualized implementation, is a real problem faced by organizations. On the other hand, MSSs are aimed at improving efficiency and effectiveness of organizational responses in order to satisfy the requirements, needs and expectations of the stakeholders. Each organization has its own identity and this is an issue that cannot be neglected; hence, two possible approaches can be attended. First, continue with the implementation of individualized management systems (MSs; or, integrate the several MSSs versus related MSs into an integrated management system (IMS. Therefore, in this context, organizations are faced with a dilemma, as a result of the increasing proliferation and diversity of MSSs. This paper takes into account the knowledge gained through a case study conducted in the context of a Portuguese company and unveils some of the advantages and disadvantages of integration. A methodology is also proposed and presented to support organizations in developing and structuring the integration process of their individualized MSs, and consequently minimize problems that are generators of inefficiencies, value destruction and loss of competitiveness. The obtained results provide relevant information that can support Top Management decision in solving that dilemma and consequently promote a successful integration, including a better control of business risks associated to MSSs requirements and enhancing sustainable performance, considering the context in which organizations operate.

  2. Examining Technology, Structure and Identity During an Enterprise System Implementation

    Energy Technology Data Exchange (ETDEWEB)

    Alvarez, Rosio

    2008-11-12

    This paper presents a longitudinal study of an Enterprise System (ES) implementation by critically examining the discursive context in which an ES implementation unfolds. The findings show that users strongly supported the ES in the earlier stage of implementation when the technology was an imaginary phenomenon. However, in later stages, when the technology is in use, user support was not consistent. In this phase the ES produces loss of control and an inability to function as an arbiter of fairness (in allocating resources associated with the system) thereby directly challenging existing professional identities and roles. These outcomes, in turn, generate acts of resistance on the part of workers. Users reach inside the technology and reshape it by devising creative workarounds that produce a sense of reskilling to counter the deskilling produced by the loss of control and power. The analysis also shows that an ES is a complex social phenomenon that is intricately linked to and complicit in shaping organizational structure and identity. In particular this study shows how technology, structure, and identity are in a mutually constitutive relationship.

  3. Single Thing Sign On Identity Management for Internet of Things

    DEFF Research Database (Denmark)

    Zdravkova, Vanya; Mihaylov, Mihail Rumenov; Mihovska, Albena Dimitrova

    2016-01-01

    —Within the context of heterogeneous Internet of Things (IoT) network driven by Machine-to-Machine (M2M) communications there is a need for a proper user identification and Identity Management (IdM) mechanisms which to involve all of the objects in the IoT. The paper addresses user identification...... by proposing Single Thing Sign On (STSO) IdM architecture for IoT, where the end-user is in the middle of a user-centered services ecosystem. The proposed scheme enables user recognition and services access only by identification of one of the “things” related to the user such as personal computing devices...

  4. Some exact identities connecting one- and two-particle Green's functions in spin-orbit coupling systems

    International Nuclear Information System (INIS)

    Yang Huatong

    2007-01-01

    Some exact identities connecting one- and two-particle Green's functions in the presence of spin-orbit coupling have been derived. These identities are similar to the Ward identity in usual quantum transport theory of electrons. A satisfying approximate calculation of the spin transport in spin-orbit coupling system should also preserve these identities, just as the Ward identities should be remained in the usual electronic transport theory

  5. Identity, identity politics, and neoliberalism

    Directory of Open Access Journals (Sweden)

    Wrenn Mary

    2014-01-01

    Full Text Available With the intensification of neoliberalism, it is useful to examine how some individuals might cope with the irrationality of the system. Neoliberalism cloaks the execution of the corporate agenda behind rhetorical manipulation that advocates for limited government. The corollary absence of government involvement on behalf of the citizenry writ large disarms the means of social redress for the individual. Democracy funded and fueled by corporate power thereby disenfranchises the individual, provoking some to search for empowerment through identity politics. The argument set forth suggests that individuals construct, reinforce, or escalate allegiance to identities as a coping mechanism, some of which manifest in violent identity politics.

  6. Canonical symmetry of a constrained Hamiltonian system and canonical Ward identity

    International Nuclear Information System (INIS)

    Li, Zi-ping

    1995-01-01

    An algorithm for the construction of the generators of the gauge transformation of a constrained Hamiltonian system is given. The relationships among the coefficients connecting the first constraints in the generator are made clear. Starting from the phase space generating function of the Green function, the Ward identity in canonical formalism is deduced. We point out that the quantum equations of motion in canonical form for a system with singular Lagrangian differ from the classical ones whether Dirac's conjecture holds true or not. Applications of the present formulation to the Abelian and non-Abelian gauge theories are given. The expressions for PCAC and generalized PCAC of the AVV vertex are derived exactly from another point of view. A new form of the Ward identity for gauge-ghost proper vertices is obtained which differs from the usual Ward-Takahashi identity arising from the BRS invariance

  7. Identification of Staphylococcus species with the API STAPH-IDENT system.

    Science.gov (United States)

    Kloos, W E; Wolfshohl, J F

    1982-01-01

    The API STAPH-IDENT system was compared with conventional methods for the identification of 14 Staphylococcus species. Conventional methods included the Kloos and Schleifer simplified scheme and DNA-DNA hybridization. The API STAPH-IDENT strip utilizes a battery of 10 miniaturized biochemical tests, including alkaline phosphatase, urease, beta-glucosidase, beta-glucuronidase, and beta-galactosidase activity, aerobic acid formation from D-(+)-mannose, D-mannitol, D-(+)-trehalose, and salicin, and utilization of arginine. Reactions of cultures were determined after 5 h of incubation at 35 degrees C. Results indicated a high degree of congruence (greater than 90%) between the expedient API system and conventional methods for most species. The addition of a test for novobiocin susceptibility to the API system increased the accuracy of identification of S. saprophyticus, S. cohnii, and S. hominis, significantly. Several strains of S. hominis, S. haemolyticus, and S. warneri which were difficult to separate with the Kloos and Schleifer simplified scheme were accurately resolved by the API system. PMID:6752190

  8. Identity Federation and Its Importance for NASA's Future: The SharePoint Extranet Pilot

    Science.gov (United States)

    Baturin, Rebecca R.

    2013-01-01

    My project at Kennedy Space Center (KSC) during the spring 2013 Project Management and Systems Engineering Internship was to functionalJy test and deploy the SharePoint Extranet system and ensure successful completion of the project's various lifecycle milestones as described by NASA Procedural Requirement (NPR) 7 120.7. I worked alongside NASA Project Managers, Systems Integration Engineers, and Information Technology (IT) Professionals to pilot this collaboration capability between NASA and its External Partners. The use of identity federation allows NASA to leverage externally-issued credentials of other federal agencies and private aerospace and defense companies, versus the traditional process of granting and maintaining full NASA identities for these individuals. This is the first system of its kind at NASA and it will serve as a pilot for the Federal Government. Recognizing the novelty of this service, NASA's initial approach for deployment included a pilot period where nearby employees of Patrick Air Force Base would assist in testing and deployment. By utilizing a credential registration process, Air Force users mapped their Air Force-issued Common Access Cards (CAC) to a NASA identity for access to the External SharePoint. Once the Air Force stands up an Active Directory Federation Services (ADFS) instance within their Data Center and establishes a direct trust with NASA, true identity federation can be established. The next partner NASA is targeting for collaboration is Lockheed Martin (LMCO), since they collaborate frequently for the ORION Program. Through the use of Exostar as an identity hub, LMCO employees will be able to access NASA data on a need to know basis, with NASA ultimately managing access. In a time when every dollar and resource is being scrutinized, this capability is an exciting new way for NASA to continue its collaboration efforts in a cost and resource effective manner.

  9. On adaptive modified projective synchronization of a supply chain management system

    Science.gov (United States)

    Tirandaz, Hamed

    2017-12-01

    In this paper, the synchronization problem of a chaotic supply chain management system is studied. A novel adaptive modified projective synchronization method is introduced to control the behaviour of the leader supply chain system by a follower chaotic system and to adjust the leader system parameters until the measurable errors of the system parameters converge to zero. The stability evaluation and convergence analysis are carried out by the Lyapanov stability theorem. The proposed synchronization and antisynchronization techniques are studied for identical supply chain chaotic systems. Finally, some numerical simulations are presented to verify the effectiveness of the theoretical discussions.

  10. Design and Development of an Identity Management System: The Minnesota State College-Southeast Technical Case Study

    Science.gov (United States)

    Elhindi, Mohamed A.

    2010-01-01

    Historically, managing access to information systems (ISs) required direct interaction with a limited number of users. Increasingly, managing access involves handling an increased numbers of internal and external students, faculty, and staff as well as partners such as workforce development centers, the U.S. Department of Education, and the…

  11. Exploring the identity and "sense of identity" of organisations

    Directory of Open Access Journals (Sweden)

    C L Van Tonder

    2006-04-01

    Full Text Available During the past two decades a steady increase in scholarly contributions in the area of organisation identity have been observed – to the point that the phenomenon is now the subject of a sustainable discourse in several disciplines. Many theoretical and conceptual dilemmas however remain, largely as a result of the low incidence of empirical research in the area. This study reports the results of an exploratory investigation that adapted Schley and Wagenfield’s (1979 concept of identity for use in an organisational setting. Interviews were conducted with 152 top managers representing 10 companies. The results indicate that organisational responses to the question “who am I?�? elicit distinctive organisational self-descriptions and some awareness of identity issues.

  12. “Everybody Puts Their Whole Life on Facebook”: Identity Management and the Online Social Networks of LGBTQ Youth

    Directory of Open Access Journals (Sweden)

    Elizabeth McConnell

    2018-05-01

    Full Text Available Lesbian, gay, bisexual, transgender, and queer (LGBTQ youth and young adults almost inevitably “come out”, or self-disclose their identity to others. Some LGBTQ youth are more uniformly “out”, while others may disclose to some groups but not others. This selective disclosure is complicated on real name social media sites, which tend to encourage a unified presentation of self across social contexts. We explore these complications with a cohort of LBGTQ youth on Facebook (N = 199, Mage = 24.13. Herein we ask: How do LBGTQ youth manage the disclosure of their sexual orientation and/or gender identity to different people in their lives? Further, are there identifiable differences in the online social network structure for LGBTQ youth who manage outness in different ways? Finally, how do LGBTQ young people describe their experiences on Facebook? We answer these questions using a mixed methods approach, combining statistical cluster analysis, network visualization, and qualitative data. Our findings illustrate patterns in network structure by outness cluster type, highlighting both the work involved in managing one’s online identity as well as the costs to (semi- closeted individuals including a considerably lower overall network connectivity. In particular, outness to family characterized LGBTQ young people’s experiences on Facebook.

  13. Agile project management managing for success

    CERN Document Server

    Crowder, James A

    2015-01-01

    Management and enables them to deal with the demands and complexities of modern, agile systems/software/hardware development teams. The book examines the project/program manager beyond the concepts of leadership and aims to connect to employees' sense of identity. The text examines human psychological concepts such as "locus of control," which will help the manager understand their team members' view and how best to manage their "world" contributions. The authors cover new management tools and philosophies for agile systems/software/hardware development teams, with a specific focus on how this

  14. The effects of driver identity on driving safety in a retrospective feedback system.

    Science.gov (United States)

    Zhao, Guozhen; Wu, Changxu

    2012-03-01

    Retrospective feedback that provides detailed information on a driver's performance in critical driving situations at the end of a trip enhances his/her driving behaviors and safe driving habits. Although this has been demonstrated by a previous study, retrospective feedback can be further improved and applied to non-critical driving situations, which is needed for transportation safety. To propose a new retrospective feedback system that uses driver identity (i.e., a driver's name) and to experimentally study its effects on measures of driving performance and safety in a driving simulator. We conducted a behavioral experimental study with 30 participants. "Feedback type" was a between-subject variable with three conditions: no feedback (control group), feedback without driver identity, and feedback with driver identity. We measured multiple aspects of participants' driving behavior. To control for potential confounds, factors that were significantly correlated with driving behavior (e.g., age and driving experience) were all entered as covariates into a multivariate analysis of variance. To examine the effects of speeding on collision severity in driving simulation studies, we also developed a new index - momentum of potential collision - with a set of equations. Subjects who used a feedback system with driver identity had the fewest speeding violations and central-line crossings, spent the least amount of time speeding and crossing the central line, had the lowest speeding and central-line crossing magnitude, ran the fewest red lights, and had the smallest momentum of potential collision compared to the groups with feedback without driver identity and without feedback (control group). The new retrospective feedback system with driver identity has the potential to enhance a person's driving safety (e.g., speeding, central-line crossing, momentum of potential collision), which is an indication of the valence of one's name in a feedback system design. Copyright

  15. Research Trends and Issues in the Study of Identity of Multi-ethnic Persons

    OpenAIRE

    TABA, Ayumi; TAKAI, Jiro

    2016-01-01

    In this article, concepts of identity are considered and surveyed researches of ego identity and group identity in social identity theory, self-categorization theory. It indicates ethnic identity is related to selfconcept, well-being, academic achievement, mental health, and so on. Furthermore, identity management theory reveals that cross- cultural communication occurs depending on management of cultural identity as group identity and relational identity as personal identity. However, there ...

  16. Survivorship and discourses of identity.

    Science.gov (United States)

    Little, Miles; Paul, Kim; Jordens, Christopher F C; Sayers, Emma-Jane

    2002-01-01

    Personal identity is self-evidently important to us all. Identity is a philosophically complex subject, but there is some agreement that memory, embodiment and continuity are essential components. The sense of memory includes 'future memory', the kind of memory we would like to construct for ourselves as our lives proceed. While the sense of personal identity is internal to the individual, a sense of that person's identity exists in the minds of others. Extreme experiences threaten the element of continuity, because they may bring bodily changes as well as cognitive changes that challenge central values. Restoring or preserving continuity is a major task for survivors. The ways in which people experience discontinuity because of cancer illness, and the ways in which they manage this experience emerges from the narratives of the survivors of cancer and in the narratives of health care workers who look after them. People manage discontinuity by reference to stable 'anchor points' in their beliefs and values; by re-constructing versions of their pre-experience identities, drawing on past memory and finding ways to preserve a continuity between past memory, present experience and constructions of the future; by using the experience to develop established facets of identity; and by imbuing the experience with meaning and recognising the enlarged identity made possible by survival. Those who cannot achieve a sense of continuity may feel alienated from themselves, their friends and family. All these methods of management may be used by one person to negotiate the post-experience identity in its different social interactions. The experience of the survivor can be further understood by recognising the challenge posed by extreme experience to the sense of continuity of both embodied self and memory. A satisfactory discourse of survival has yet to enter the public domain. This lack adds to the burdens of survivors, including those who have survived cancer. Copyright 2002 John

  17. Identity negotiations in meetings

    DEFF Research Database (Denmark)

    Asmuß, Birte; Oshima, Sae

    of the company, and all members know (and display) that he holds some information that the rest don’t have access to. Our analysis shows that the participants evoke various identities of the manager, sometimes orienting to the structure of the organization, and other times orienting to wider social categories......Meetings are places, where identity negotiation is a central activity and where members’ local practices recurrently inform and are informed by larger categories (Antaki and Widdicombe 1998). Correspondingly, the approach to understanding organization (macro) by way of identity work (micro) has...... company, and in the data recorded over 10 days, the employees frequently complain about the many changes that have taken place. Our focus lies in a unique occasion where one of the managers makes an unusual appearance at the lunchroom. In this situation, he is the only one that is on the business side...

  18. On the synchronization of identical and non-identical 4-D chaotic systems using arrow form matrix

    International Nuclear Information System (INIS)

    Hammami, S.; Ben Saad, K.; Benrejeb, M.

    2009-01-01

    Using the Borne and Gentina practical criterion associated with the Benrejeb canonical arrow form matrix, to derive the stability property of dynamic complex systems, a new strategy of control is formulated for chaos synchronization of two identical Lorenz Stenflo systems and two new four-dimensional chaotic systems, namely the Qi chaotic systems. The designed controller ensures that the state variables of both controlled chaotic slave Lorenz Stenflo and Qi systems globally synchronizes with the state variables of the master systems, respectively. It is also shown that Qi system globally synchronizes with Lorenz Stenflo system under the afforded generalized strategy of control. Numerical simulations are carried out to assess the performance of the proposed contributions in the important field of chaotic synchronization.

  19. Light-front Ward-Takahashi identity for two-fermion systems

    International Nuclear Information System (INIS)

    Marinho, J. A. O.; Frederico, T.; Pace, E.; Salme, G.; Sauer, P. U.

    2008-01-01

    We propose a three-dimensional electromagnetic current operator within light-front dynamics that satisfies a light-front Ward-Takahashi identity for two-fermion systems. The light-front current operator is obtained by a quasipotential reduction of the four-dimensional current operator and acts on the light-front valence component of bound or scattering states. A relation between the light-front valence wave function and the four-dimensional Bethe-Salpeter amplitude both for bound or scattering states is also derived, such that the matrix elements of the four-dimensional current operator can be fully recovered from the corresponding light-front ones. The light-front current operator can be perturbatively calculated through a quasipotential expansion, and the divergence of the proposed current satisfies a Ward-Takahashi identity at any given order of the expansion. In the quasipotential expansion the instantaneous terms of the fermion propagator are accounted for by the effective interaction and two-body currents. We exemplify our theoretical construction in the Yukawa model in the ladder approximation, investigating in detail the current operator at the lowest nontrivial order of the quasipotential expansion of the Bethe-Salpeter equation. The explicit realization of the light-front form of the Ward-Takahashi identity is verified. We also show the relevance of instantaneous terms and of the pair contribution to the two-body current and the Ward-Takahashi identity

  20. Secure stand alone positive personnel identity verification system (SSA-PPIV)

    International Nuclear Information System (INIS)

    Merillat, P.D.

    1979-03-01

    The properties of a secure stand-alone positive personnel identity verification system are detailed. The system is designed to operate without the aid of a central computing facility and the verification function is performed in the absence of security personnel. Security is primarily achieved by means of data encryption on a magnetic stripe badge. Several operational configurations are discussed. Advantages and disadvantages of this system compared to a central computer driven system are detailed

  1. National and gender measurement invariance of the Utrecht-Management of Identity Commitments Scale (U-MICS) : A 10-nation study with university students

    NARCIS (Netherlands)

    Crocetti, E.; Cieciuch, J.; Gao, C.-H.; Klimstra, T.A.; Lin, C.-L.; Mena de Matos, P.; Morsünbül, U.; Negru, O.; Sugimura, K.; Zimmermann, G.; Meeus, W.H.J.

    2015-01-01

    The purpose of this study was to examine the psychometric properties of the Utrecht-Management of Identity Commitments Scale (U-MICS), a self-report measure aimed at assessing identity processes of commitment, in-depth exploration, and reconsideration of commitment. We tested its factor structure in

  2. National and Gender Measurement Invariance of the Utrecht-Management of Identity Commitments Scale (U-MICS) : A 10-Nation Study With University Students

    NARCIS (Netherlands)

    Crocetti, Elisabetta; Cieciuch, Jan; Gao, Cheng Hai; Klimstra, Theo; Lin, Ching Ling; Matos, Paula Mena; Morsünbül, Ümit; Negru, Oana; Sugimura, Kazumi; Zimmermann, Grégoire; Meeus, Wim

    2015-01-01

    The purpose of this study was to examine the psychometric properties of the Utrecht-Management of Identity Commitments Scale (U-MICS), a self-report measure aimed at assessing identity processes of commitment, in-depth exploration, and reconsideration of commitment. We tested its factor structure in

  3. Distributed Cooperative Control of Nonlinear and Non-identical Multi-agent Systems

    DEFF Research Database (Denmark)

    Bidram, Ali; Lewis, Frank; Davoudi, Ali

    2013-01-01

    This paper exploits input-output feedback linearization technique to implement distributed cooperative control of multi-agent systems with nonlinear and non-identical dynamics. Feedback linearization transforms the synchronization problem for a nonlinear and heterogeneous multi-agent system...... for electric power microgrids. The effectiveness of the proposed control is verified by simulating a microgrid test system....

  4. Balancing Fairness and Efficiency: The Impact of Identity-Blind and Identity-Conscious Accountability on Applicant Screening

    Science.gov (United States)

    Self, William T.; Mitchell, Gregory; Mellers, Barbara A.; Tetlock, Philip E.; Hildreth, J. Angus D.

    2015-01-01

    This study compared two forms of accountability that can be used to promote diversity and fairness in personnel selections: identity-conscious accountability (holding decision makers accountable for which groups are selected) versus identity-blind accountability (holding decision makers accountable for making fair selections). In a simulated application screening process, undergraduate participants (majority female) sorted applicants under conditions of identity-conscious accountability, identity-blind accountability, or no accountability for an applicant pool in which white males either did or did not have a human capital advantage. Under identity-conscious accountability, participants exhibited pro-female and pro-minority bias, particularly in the white-male-advantage applicant pool. Under identity-blind accountability, participants exhibited no biases and candidate qualifications dominated interview recommendations. Participants exhibited greater resentment toward management under identity-conscious accountability. PMID:26660723

  5. Transition to Postgraduate Study: Postgraduate Ecological Systems and Identity

    Science.gov (United States)

    Tobbell, Jane; O'Donnell, Victoria L.

    2013-01-01

    This paper explores and examines the distal and proximal systems which construct social science postgraduate study in the UK and analyses the emergent identities of postgraduate students as they negotiate the multiple and interacting practices in their transition to study. The data represent part of a one-year research project, funded by the…

  6. Online Identities and Social Networking

    Science.gov (United States)

    Maheswaran, Muthucumaru; Ali, Bader; Ozguven, Hatice; Lord, Julien

    Online identities play a critical role in the social web that is taking shape on the Internet. Despite many technical proposals for creating and managing online identities, none has received widespread acceptance. Design and implementation of online identities that are socially acceptable on the Internet remains an open problem. This chapter discusses the interplay between online identities and social networking. Online social networks (OSNs) are growing at a rapid pace and has millions of members in them. While the recent trend is to create explicit OSNs such as Facebook and MySpace, we also have implicit OSNs such as interaction graphs created by email and instant messaging services. Explicit OSNs allow users to create profiles and use them to project their identities on the web. There are many interesting identity related issues in the context of social networking including how OSNs help and hinder the definition of online identities.

  7. 77 FR 15024 - Privacy Act of 1974; Revised System of Records

    Science.gov (United States)

    2012-03-14

    ...-on capability for USDA applications, management of user credentials, and verification of identity... address: Program Manager--Identity and Access Management, 301 South Howes Street, Suite 309, Fort Collins... interests, identity theft or fraud, or harm to the security or integrity of this system or other systems or...

  8. Author identities an interoperability problem solved by a collaborative solution

    Science.gov (United States)

    Fleischer, D.; Czerniak, A.; Schirnick, C.

    2012-12-01

    The identity of authors and data providers is crucial for personalized interoperability. The marketplace of available identifiers is packed and the right choice is getting more and more complicated. Even though there are more then 15 different systems available there are still some under development and proposed to come up by the end of 2012 ('PubMed Central Author ID' and ORCID). Data Management on a scale beyond the size of a single research institute but on the scale of a scientific site including a university with student education program needs to tackle this problem and so did the Kiel Data Management an Infrastructure. The main problem with the identities of researchers is the quite high frequency changes in positions during a scientist life. The required system needed to be a system that already contained the potential of preregistered people with their scientific publications from other countries, institutions and organizations. Scanning the author ID marketplace brought up, that there us a high risk of additional workload to the researcher itself or the administration due to the fact that individuals need to register an ID for themselves or the chosen register is not yet big enough to simply find the right entry. On the other hand libraries deal with authors and their publications now for centuries and they have high quality catalogs with person identities already available. Millions of records internationally mapped are available by collaboration with libraries and can be used in exactly the same scope. The international collaboration between libraries (VIAF) provides a mapping between libraries from the US, CA, UK, FR, GER and many more. The international library author identification system made it possible to actually reach at the first matching a success of 60% of all scientists. The additional advantage is that librarians can finalize the Identity system in a kind of background process. The Kiel Data Management Infrastructure initiated a web service

  9. An identity management monitoring system | Imouokhome | Scientia ...

    African Journals Online (AJOL)

    Username, Password, Remember me, or Register ... An identification system, which employs the use of fingerprint biometric that conducts a ... Key Words: Biometrics, Pattern-matching Identification, Verification, Authentication, Fingerprints ...

  10. RFID-based Electronic Identity Security Cloud Platform in Cyberspace

    OpenAIRE

    Bing Chen; Chengxiang Tan; Bo Jin; Xiang Zou; Yuebo Dai

    2012-01-01

    With the moving development of networks, especially Internet of Things, electronic identity administration in cyberspace is becoming more and more important. And personal identity management in cyberspace associated with individuals in reality has been one significant and urgent task for the further development of information construction in China. So this paper presents a RFID-based electronic identity security cloud platform in cyberspace to implement an efficient security management of cyb...

  11. Quality management system

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Mu Sung

    2009-08-15

    This book deals with ISO9001 quality management system which includes summary of this system such as classification of quality, principle of quality management, and definition, requirement and procedure of quality management system, introduction of ISO9001 system like model of ISO9001 quality management system, ISO certificate system, structure of ISO9001 standard, requirement of ISO9001 quality management system, process approach and documentation of system, propel cases of ISO9001 quality management system.

  12. Quality management system

    International Nuclear Information System (INIS)

    Lee, Mu Sung

    2009-08-01

    This book deals with ISO9001 quality management system which includes summary of this system such as classification of quality, principle of quality management, and definition, requirement and procedure of quality management system, introduction of ISO9001 system like model of ISO9001 quality management system, ISO certificate system, structure of ISO9001 standard, requirement of ISO9001 quality management system, process approach and documentation of system, propel cases of ISO9001 quality management system.

  13. Experiencing with Identity

    DEFF Research Database (Denmark)

    Pors, Justine Grønbæk

    2012-01-01

    This article studies how a political organization begins to experiment with its identity. By use of an empirical case of the Danish Ministry of Education, I examine how a political organization supplements its identity of a legislating power with identities of a supervisor, beacon and facilitator...... of evaluation in public schools. Out of a paralysis emerge new innovative strategies of governing, aimed at the schools’ self-governing capacity. The identity of the political system thus emerges as oscillations between different roles of a legislating power and a supervising coach. The case study suggests...... that a society of experimentalism is emerging. Thus, the relevant object of study is no longer organizational identity, but the experiments with different identities that modern organizations are performing....

  14. Identity In and Around Organisations

    DEFF Research Database (Denmark)

    Schultz, Majken; Maguire, Steve

    2013-01-01

    concept may not be the best way of approaching and managing your organisation. Rather, Majken Schultz and Steve Maguire argue that organisations would benefit from adopting a process-based view of identity, which integrates history, ongoing change and market instability into its definition.......At the heart of any successful organisation lies a powerful conception of identity: the coherent way in which it presents itself to its stakeholders and employees, containing its purpose, goals and key characteristics. However, the traditional idea of identity as a stable, solid and reliable...

  15. Design and Construction of an Entity Resolution System that Supports Entity Identity Information Management and Asserted Resolution

    Science.gov (United States)

    Nelson, Eric Derrand

    2011-01-01

    This work describes the design and construction of an open source, entity resolution system that enables users to assign and maintain persistent identifiers for master data items. Two key features of this system that are not available in current ER systems and that make persistent identification possible are (1) The capture and management of…

  16. Social and psychological creativity in gay male midlife identity management.

    Science.gov (United States)

    Hajek, Christopher

    2016-06-01

    This study utilizes a qualitative thematic analysis methodology and a social identity theory framework to explore ways in which early midlife gay men report enhancing their social identities through social and psychological creativity. Face-to-face, semi-structured interviews were conducted with forty early midlife gay men (aged 40-53) in four US cities. Men discussed the collective and individual essences of their age and gay identities, including attitudes, beliefs, and behaviours that they embraced to self-enhance at midlife. These discussions emphasized differences from the younger gay outgroup, often in the context of intergenerational interaction. Identified were three strategies (and seven substrategies) that summarized the ways that interviewees constructed their identities in the interest of self-enhancement, specifically in the context of intergenerational comparisons with younger gay men. These strategies may be considered as extensions to social creativity strategies presented in Tajfel and Turner's (Psychology of intergroup relations. Chicago, IL: Nelson, 1986: 7) social identity theory. © 2015 The British Psychological Society.

  17. Religiosity as identity: toward an understanding of religion from a social identity perspective.

    Science.gov (United States)

    Ysseldyk, Renate; Matheson, Kimberly; Anisman, Hymie

    2010-02-01

    As a social identity anchored in a system of guiding beliefs and symbols, religion ought to serve a uniquely powerful function in shaping psychological and social processes. Religious identification offers a distinctive "sacred" worldview and "eternal" group membership, unmatched by identification with other social groups. Thus, religiosity might be explained, at least partially, by the marked cognitive and emotional value that religious group membership provides. The uniqueness of a positive social group, grounded in a belief system that offers epistemological and ontological certainty, lends religious identity a twofold advantage for the promotion of well-being. However, that uniqueness may have equally negative impacts when religious identity itself is threatened through intergroup conflict. Such consequences are illustrated by an examination of identities ranging from religious fundamentalism to atheism. Consideration of religion's dual function as a social identity and a belief system may facilitate greater understanding of the variability in its importance across individuals and groups.

  18. Identity Management ToolKit (IdM TK)

    Data.gov (United States)

    Department of Veterans Affairs — With the IdM TK, authorized users can search and view identity and exception information from the Administrative Data Repository (ADR). Specifically, users can view...

  19. On the fundamentals of identity

    NARCIS (Netherlands)

    van der Gaag, Mandy

    Various new perspectives on identity have been introduced or have increased in popularity over the past two decades. These include identity as dynamic system (Kunnen & Bosma, 2001), a narrative approach to identity (McAdams, 2001), multi-dimensional models of identity formation (Luyckx et al., 2006;

  20. Coupled transverse and torsional vibrations in a mechanical system with two identical beams

    Science.gov (United States)

    Vlase, S.; Marin, M.; Scutaru, M. L.; Munteanu, R.

    2017-06-01

    The paper aims to study a plane system with bars, with certain symmetries. Such problems can be encountered frequently in industry and civil engineering. Considerations related to the economy of the design process, constructive simplicity, cost and logistics make the use of identical parts a frequent procedure. The paper aims to determine the properties of the eigenvalues and eigenmodes for transverse and torsional vibrations of a mechanical system where two of the three component bars are identical. The determination of these properties allows the calculus effort and the computation time and thus increases the accuracy of the results in such matters.

  1. XSIM Final Report: Modelling the Past and Future of Identity Management for Scientific Collaborations

    Energy Technology Data Exchange (ETDEWEB)

    Cowles, Robert; Jackson, Craig; Welch, Von

    2016-08-31

    The eXtreme Science Identity Management (XSIM1) research project: collected and analyzed real world data on virtual organization (VO) identity management (IdM) representing the last 15+ years of collaborative DOE science; constructed a descriptive VO IdM model based on that data; used the model and existing trends to project the direction for IdM in the 2020 timeframe; and provided guidance to scientific collaborations and resource providers that are implementing or seeking to improve IdM functionality. XSIM conducted over 20 semi­structured interviews of representatives from scientific collaborations and resource providers, both in the US and Europe; the interviewees supported diverse set of scientific collaborations and disciplines. We developed a definition of “trust,” a key concept in IdM, to understand how varying trust models affect where IdM functions are performed. The model identifies how key IdM data elements are utilized in collaborative scientific workflows, and it has the flexibility to describe past, present and future trust relationships and IdM implementations. During the funding period, we gave more than two dozen presentations to socialize our work, encourage feedback, and improve the model; we also published four refereed papers. Additionally, we developed, presented, and received favorable feedback on three white papers providing practical advice to collaborations and/or resource providers.

  2. Synchronization of chaos in non-identical parametrically excited systems

    International Nuclear Information System (INIS)

    Idowu, B.A.; Vincent, U.E.; Njah, A.N.

    2009-01-01

    In this paper, we investigate the synchronization of chaotic systems consisting of non-identical parametrically excited oscillators. The active control technique is employed to design control functions based on Lyapunov stability theory and Routh-Hurwitz criteria so as to achieve global chaos synchronization between a parametrically excited gyroscope and each of the parametrically excited pendulum and Duffing oscillator. Numerical simulations are implemented to verify the results.

  3. Securing the Global Airspace System Via Identity-Based Security

    Science.gov (United States)

    Ivancic, William D.

    2015-01-01

    Current telecommunications systems have very good security architectures that include authentication and authorization as well as accounting. These three features enable an edge system to obtain access into a radio communication network, request specific Quality-of-Service (QoS) requirements and ensure proper billing for service. Furthermore, the links are secure. Widely used telecommunication technologies are Long Term Evolution (LTE) and Worldwide Interoperability for Microwave Access (WiMAX) This paper provides a system-level view of network-centric operations for the global airspace system and the problems and issues with deploying new technologies into the system. The paper then focuses on applying the basic security architectures of commercial telecommunication systems and deployment of federated Authentication, Authorization and Accounting systems to provide a scalable, evolvable reliable and maintainable solution to enable a globally deployable identity-based secure airspace system.

  4. "Managing by Not Managing": How Gay Engineering Students Manage Sexual Orientation Identity

    Science.gov (United States)

    Hughes, Bryce E.

    2017-01-01

    From a social constructivist paradigm I explored the experiences of 7 openly gay engineering students to understand how, if at all, they made sense of the intersections between their engineering and sexual orientation identities. By eliciting stories through individual and focus group interviews, a narrative approach allowed me to capture the…

  5. Contrasting differences in identity and agency between narrative and autopoietic systems

    Directory of Open Access Journals (Sweden)

    Nico Buitendag

    2013-07-01

    Full Text Available The article aims at contrasting the autopoietic understanding of an individual and her or his actions as described by Niklas Luhmann with Paul Ricoeur’s notion of narrative identity, focusing on people as legal subjects. The article assumes that when legal subjects necessitate ethical engagement and evaluation, the law could cease to deal with problems in a mere legalistic fashion but is allowed the freedom to appeal to norms of justice external to itself as in other natural law theories. Through narrative identity the deeds of role players are to be understood in greater complexity than what a self-referential legal system is comfortable in dealing with.

  6. Security extension for the Canetti-Krawczyk model in identity-based systems

    Institute of Scientific and Technical Information of China (English)

    LI Xinghua; MA Jianfeng; SangJae Moon

    2005-01-01

    The Canetti-Krawczyk (CK) model is a formalism for the analysis of keyexchange protocols, which can guarantee many security properties for the protocols proved secure by this model. But we find this model lacks the ability to guarantee key generation center (KGC) forward secrecy, which is an important security property for key-agreement protocols based on Identity. The essential reason leading to this weakness is that it does not fully consider the attacker's capabilities. In this paper, the CK model is accordingly extended with a new additional attacker's capability of the KGC corruption in Identity-based systems, which enables it to support KGC forward secrecy.

  7. ISLAM AND MINORITIES: Managing Identity in Malaysia

    Directory of Open Access Journals (Sweden)

    Ahmad Suaedy

    2010-02-01

    Full Text Available The Malaysian general election in March 2008 raised an interesting and new phenomenon. For the first time since independence in 1957, the ruling alliance known as the National Front (Barisan Nasional, BN failed to secure two thirds of seats in parliament and lost control of five of Malaysia’s 13 states. This was due to the challenge presented by the new opposition alliance known as the Alternative Front (Barisan Alternatif, BA or the People’s Alliance (Pakatan Rakyat, PK which won more than 36% of seats in parliament and gained control of the five states. In the 2004 election, BN secured the largest ever percentage of seats in parliament with 91%. What is interesting is that it seems that this significant increase in support for the opposition is  due to their offer to change the way minorities and ethnicity is managed. They  propose a move from “Bumiputera Supremacy”, or affirmative action for the approximately 65% of “Bumiputera” Malaysians (the rest being largely of Chinese or Indian ethnicity, to “The People’s Supremacy”, which involves eradicating affirmative action based on ethnicity, basing it instead on need, for  instance need due to poverty. This would potentially increase the likelihood  of justice and equality for all ethnic or racial groups. This paper connects the phenomenon of change, as seen in the about turn in the results between the  2004 and 2008 elections, to the more global trend in which minorities are standing up to demand their rights in this era of globalization, and to the challenge multiculturalism presents to parts of the Muslim world such as Malaysia. Malaysia, a Muslim majority nation that has formally declared Islam the official state religion with Yang di-Pertuan Agong (the King as  Head of the State and symbol of Islam, is one example, though not necessarily  representative, of how Islam and Muslims manage minorities and identity or  multiculturalism within the process of globalization

  8. Environmental Management System

    Science.gov (United States)

    Goals Recycling Green Purchasing Pollution Prevention Reusing Water Resources Environmental Management Stewardship » Environmental Protection » Environmental Management System Environmental Management System An Environmental Management System is a systematic method for assessing mission activities, determining the

  9. Identity's identities

    DEFF Research Database (Denmark)

    Jensen, Kim Ebensgaard

    -specialized language in which it also serves a number of functions – some of which are quite fundamental to society as such. In other words, the lexeme identity is a polysemic word and has multiple, well, identities. Given that it appears to have a number of functions in a variety of registers, including terminologies...... in Academic English and more everyday-based English, identity as a lexeme is definitely worth having a look at. This paper presents a lexicological study of identity in which some of its senses are identified and their behaviors in actual discourse are observed. Drawing on data from the 2011 section...... of the Corpus of Contemporary American English, a behavioral profile of the distributional characteristics of identity is set up. Behavioral profiling is a lexicographical method developed by the corpus linguist Stefan Th. Gries which, by applying semantic ID tagging and statistical analysis, provides a fine...

  10. 75 FR 8088 - Privacy Act of 1974; Department of Homeland Security/ALL-023 Personnel Security Management System...

    Science.gov (United States)

    2010-02-23

    ... risk of harm to economic or property interests, identity theft or fraud, or harm to the security or... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2009-0041] Privacy Act of 1974; Department of Homeland Security/ALL--023 Personnel Security Management System of Records AGENCY...

  11. Corporate Brand Identity in SMEs

    DEFF Research Database (Denmark)

    Mäläskä, Minna; Jones, Richard Ian

    Purpose: To study the emergence of corporate brand identity in SMEs and to develop a typology of brand identity drivers that reflects a co-creative approach to the emergence of brand identity. Design / Methodology / Approach : Existing approaches to brand identity are summarised. A narrative...... studies. The research is important since it suggests an iterative and co-creative approach to brand identity. A typology of brand identity formation for SMEs is presented: entrepreneur driven, market driven, stakeholder driven. Practical implications: The three paths to creating a strong brand identity...... challenge existing notions that brand identity is based solely on the values of the entrepreneur. This typology suggests that SMEs should be open to creating an identity that draws from their stakeholder eco-system. Originality / value: this research challenges the existing assumption that brand identity...

  12. Identity Formation in Career Development for Gifted Women.

    Science.gov (United States)

    Phelps, Christine E.

    1991-01-01

    Necessary developmental tasks concerned with identity development of gifted college women include developing competence, managing emotions, developing autonomy, establishing identity, freeing interpersonal relationships, developing purpose, and developing integrity. These issues may be used as counseling interventions to raise career aspirations.…

  13. Maintenance management systems

    International Nuclear Information System (INIS)

    Rohan, M. de

    1989-01-01

    This paper is concerned principally with Maintenance Management systems and their effective introduction into organisations. Maintenance improvement is basically a problem of managing the maintenance department in the broadest sense. Improvement does not only lie in the area of special techniques, systems or procedures; although they are valuable tools, but rather in a balanced attack, carefully guided by management. Over recent years, maintenance systems have received the major emphasis and in many instances the selection of the system has become a pre-occupation, whereas the importance of each maintenance function must be recognised and good management practices applied to all maintenance activities. The ingredients for success in the implementation of maintenance management systems are summarised as: having a management committee, clear objectives, project approach using project management techniques and an enthusiastic leader, user managed and data processing supported project, realistic budget and an understanding of the financial audit requirements. (author)

  14. (Destabilizing Self-Identities in Professional Work

    Directory of Open Access Journals (Sweden)

    Anders Buch

    2013-09-01

    Full Text Available It is characteristic of much professional work that it is performed in ambiguous contexts. Thus, uncertainty, unpredictability, indeterminacy, and recurrent organizational transformations are an integral part of modern work for, e.g., engineers, lawyers, business consultants, and other professionals. Although key performance indicators and other knowledge management systems are used to set standards of excellence for professionals, the character of professional work is still flexible, open to interpretation and heterarchical. The very successfulness (or unsuccessfulness of the work is established in a complex work context where various goals, interests, and perspectives are mediated, altered, contested, mangled, and negotiated in a process of sense-making. The work context is heterogeneously populated by various actors (e.g., the customer, the manager, the colleagues and actants (e.g., quality systems and technical equipment that give “voice” to (conflicting interpretations of what constitutes successful work. Thus, the professionals must navigate in a very complex environment where the locus of governance is far from stable. These characteristics of professional work seem to have implications for the way professionals make sense of their work and their own identities. The identity work of professionals is interwoven with their professional training and career background. With an academic training and a professional career, the individual typically identifies with the profession’s values and adopts a certain way of seeing and approaching the world. This professional outlook typically will constitute the basis of the individual’s appraisal of the work and lay out a horizon of expectations in relation to fulfillment, self-realization, and job satisfaction. In this way, the construction of self-identity becomes the yardstick for the individual’s sense-making and, a fortiori, for the individual’s sense of meaningful work. In this paper

  15. Personnel Identity Management and the Expeditionary Strike Group

    National Research Council Canada - National Science Library

    Neises, Glen E

    2007-01-01

    .... Chapter I defines IM and explains why IM is important for the Department of Defense (DoD). Chapter II provides an overview of DoD human resource management and Defense Manpower Data Center information systems...

  16. A Review of Supply Chain Management using Multi-Agent System

    OpenAIRE

    Vivek Kumar; S Srinivasan

    2010-01-01

    Supply chain consist of various components/ identities like supplier, manufacturer, factories, warehouses, distributions agents etc. These identities are involved for supplying raw materials, components which reassembles in factory to produce a finished product. With the increasing importance of computerbased communication technologies, communication networks are becoming crucial in supply chain management. Given the objectives of the supply chain: to have the right products in the right quan...

  17. Bridge Management Systems

    DEFF Research Database (Denmark)

    Thoft-Christensen, Palle

    In this paper bridge management systems are discussed with special emphasis on management systems for reinforced concrete bridges. Management systems for prestressed concrete bridges, steel bridges, or composite bridges can be developed in a similar way....

  18. Hard Identity and Soft Identity

    Directory of Open Access Journals (Sweden)

    Hassan Rachik

    2006-04-01

    Full Text Available Often collective identities are classified depending on their contents and rarely depending on their forms. Differentiation between soft identity and hard identity is applied to diverse collective identities: religious, political, national, tribal ones, etc. This classification is made following the principal dimensions of collective identities: type of classification (univocal and exclusive or relative and contextual, the absence or presence of conflictsof loyalty, selective or totalitarian, objective or subjective conception, among others. The different characteristics analysed contribute to outlining an increasingly frequent type of identity: the authoritarian identity.

  19. Conceptualizing Teacher Identity as a Complex Dynamic System: The Inner Dynamics of Transformations during a Practicum

    Science.gov (United States)

    Henry, Alastair

    2016-01-01

    Currently, the inner dynamics of teacher identity transformations remain a "black box." Conceptualizing preservice teacher identity as a complex dynamic system, and the notion of "being someone who teaches" in dialogical terms as involving shifts between different teacher voices, the study investigates the dynamical processes…

  20. Fighting the Whole System: Dissociative Identity Disorder, Labeling Theory, and Iatrogenic Doubting.

    Science.gov (United States)

    Floris, Jessica; McPherson, Susan

    2015-01-01

    This research examines how individuals diagnosed with dissociative identity disorder construe their experiences of being labeled with a contested diagnosis. Semistructured interviews were conducted in the United Kingdom with 5 women and 2 men diagnosed with dissociative identity disorder. A framework analysis was conducted. The analysis identified 2 overarching themes: diagnosis cross-examined and navigating care systems. The diagnosis appeared to be continually assessed by participants for its fit with symptoms, and the doubt among professionals seemed to be unhelpfully reflected in participants' attempts to understand and come to terms with their experiences. The findings are considered in light of labeling theory, the iatrogenic effects of professional doubt, and current debates concerning the reliability and validity of psychiatric diagnostic systems that have been reinvigorated by the publication of the Diagnostic and Statistical Manual of Mental Disorders, Fifth Edition.

  1. Staying in the Hood: Black Lesbian and Transgender Women and Identity Management in North Philadelphia.

    Science.gov (United States)

    Brooks, Siobhan

    2016-12-01

    The concept Don't Ask, Don't Tell regarding Black LGBT sexuality in Black communities has been an acceptable form of identity management for Black LGBT people. In other words, Black LGBT people are accepted as long as they are not vocal about their sexuality. However, this is changing with the issue of gay marriage, which is creating a space where Black LGBT people are more open about their gender identity and sexuality in heterosexual Black spaces. This new form of openness allows Black LGBT people to "stay in" their communities, as opposed to coming out. In this article I examine how Black LGBT women in North Philadelphia stay in their communities: being politically active regarding LGBT issues, disengaging from LGBT issues, passing, and educating straight Black people about issues affecting the Black LGBT community. I conclude with implications of staying in and intersectionality among Black heterosexual and LGBT women fighting for social change.

  2. Reconceptualising "Identity Slippage": Additional Language Learning and (L2) Identity Development

    Science.gov (United States)

    Armour, William

    2009-01-01

    This paper reconsiders the theoretical concept of "identity slippage" by considering a detailed exegesis of three model conversations taught to learners of Japanese as an additional language. To inform my analysis of these conversations and how they contribute to identity slippage, I have used the work of the systemic-functional linguist Jay Lemke…

  3. Identity Management and Mental Health Discourse in Social Media.

    Science.gov (United States)

    Pavalanathan, Umashanthi; De Choudhury, Munmun

    2015-05-01

    Social media is increasingly being adopted in health discourse. We examine the role played by identity in supporting discourse on socially stigmatized conditions. Specifically, we focus on mental health communities on reddit. We investigate the characteristics of mental health discourse manifested through reddit's characteristic 'throwaway' accounts, which are used as proxies of anonymity. For the purpose, we propose affective, cognitive, social, and linguistic style measures, drawing from literature in psychology. We observe that mental health discourse from throwaways is considerably disinhibiting and exhibits increased negativity, cognitive bias and self-attentional focus, and lowered self-esteem. Throwaways also seem to be six times more prevalent as an identity choice on mental health forums, compared to other reddit communities. We discuss the implications of our work in guiding mental health interventions, and in the design of online communities that can better cater to the needs of vulnerable populations. We conclude with thoughts on the role of identity manifestation on social media in behavioral therapy.

  4. Maintenance and management system

    International Nuclear Information System (INIS)

    Ando, Yasumasa.

    1992-01-01

    Since highly reliable operation is required in a nuclear power plant, monitoring during operation and periodical inspection are conducted carefully. The present invention provides maintenance and management systems for providing an aid so that these systems are combined effectively and operated rationally based on unified information management. That is, the system contains data bases comprising information for the design of the equipments and pipelines of a plant, information for the exchange of equipment parts, information for the history of plant operation, information for the monitoring and inspection, and information for the management of repair operation. In addition, it has an equipment part history management sub-system for managing equipment part exchange information, an operation history management sub-system for managing the operation state of the plant, an operation history management sub-system for managing equipment monitoring inspection data and operation management sub-system for managing periodical inspection/ repairing operation. These sub-systems are collectively combined to manage the maintenance and management jobs of the plant unitarily. (I.S.)

  5. Multi-vehicle detection with identity awareness using cascade Adaboost and Adaptive Kalman filter for driver assistant system.

    Science.gov (United States)

    Wang, Baofeng; Qi, Zhiquan; Chen, Sizhong; Liu, Zhaodu; Ma, Guocheng

    2017-01-01

    Vision-based vehicle detection is an important issue for advanced driver assistance systems. In this paper, we presented an improved multi-vehicle detection and tracking method using cascade Adaboost and Adaptive Kalman filter(AKF) with target identity awareness. A cascade Adaboost classifier using Haar-like features was built for vehicle detection, followed by a more comprehensive verification process which could refine the vehicle hypothesis in terms of both location and dimension. In vehicle tracking, each vehicle was tracked with independent identity by an Adaptive Kalman filter in collaboration with a data association approach. The AKF adaptively adjusted the measurement and process noise covariance through on-line stochastic modelling to compensate the dynamics changes. The data association correctly assigned different detections with tracks using global nearest neighbour(GNN) algorithm while considering the local validation. During tracking, a temporal context based track management was proposed to decide whether to initiate, maintain or terminate the tracks of different objects, thus suppressing the sparse false alarms and compensating the temporary detection failures. Finally, the proposed method was tested on various challenging real roads, and the experimental results showed that the vehicle detection performance was greatly improved with higher accuracy and robustness.

  6. Generalized Cherednik-Macdonald identities

    NARCIS (Netherlands)

    Stokman, J.V.

    2008-01-01

    We derive generalizations of the Cherednik-Macdonald constant term identities associated to root systems which depend, besides on the usual Multiplicity function, symmetrically on two additional parameters omega +/-. They are natural analogues of the Cherednik-Macdonald constant term q-identities in

  7. Understanding family dynasty: Nurturing the corporate identity across generations

    Directory of Open Access Journals (Sweden)

    Nemilentsev, M.

    2010-01-01

    Full Text Available This study aims to analyse the Ahlstrom annual reports. The content analysis contributes to family business corporate identity. According to the results family business corporate identity is based both on history and on the future. Human resource management, customer relationships, high quality, and also family ownership reflect corporate identity in large family corporations. Modern family business corporate identity is based on continuously developing the business concept and its core competency. Meeting the needs of customers and technical quality standards combined with upgrading and developing the business idea characterises family business corporate identity.

  8. Narrating Organisational Identities by Way of Evolutionary Tales

    DEFF Research Database (Denmark)

    Backer, Lise

    2008-01-01

    The article draws on publicly available data to analyse how, since the Rio Environmental Summit in 1992, the narration of the multinational oil company Shell have projected an evolution from an oil company identity to an identity also embracing renewable energies. In analysing the narrative battles...... over Shell's organisational identity the article contributes to the field of organisational identity theory. It does so by providing a rich description of the micro processes through which individual management actors seek by telling different evolutionary tales to get the larger corporate actor...

  9. A qualitative investigation of masculine identity after traumatic brain injury.

    Science.gov (United States)

    MacQueen, Ruth; Fisher, Paul; Williams, Deirdre

    2018-04-30

    Men are twice as likely as women to experience a traumatic brain injury (TBI), suggesting that aspects of masculine identity contribute to how people acquire their brain injuries. Research also suggests that masculine identity impacts on how people manage their health experiences. The current study aimed to explore the experience of masculine identity following TBI. Individual interviews were conducted with 10 men aged 21-67 years who had experienced a TBI. All were living in the community. Interpretative phenomenological analysis was used to consider lived experiences and to explore the meaning of the TBI experience in relation to masculine identity. Three superordinate themes emerged from the analysis: doing life and relationships differently, self-perceptions and the perceived view of others, and managing the impact of TBI as a man. These themes are considered in relation to how participants' experiences interacted with dominant social ideals of masculine identity. The findings highlighted how masculine identity may be a valuable aspect of self in considering threats to and reconstruction of self-identity after TBI. Aspects of gender identity should be considered in order to promote engagement, support adjustment and achieve meaningful outcomes in rehabilitation.

  10. A Secure Dynamic Identity and Chaotic Maps Based User Authentication and Key Agreement Scheme for e-Healthcare Systems.

    Science.gov (United States)

    Li, Chun-Ta; Lee, Cheng-Chi; Weng, Chi-Yao; Chen, Song-Jhih

    2016-11-01

    Secure user authentication schemes in many e-Healthcare applications try to prevent unauthorized users from intruding the e-Healthcare systems and a remote user and a medical server can establish session keys for securing the subsequent communications. However, many schemes does not mask the users' identity information while constructing a login session between two or more parties, even though personal privacy of users is a significant topic for e-Healthcare systems. In order to preserve personal privacy of users, dynamic identity based authentication schemes are hiding user's real identity during the process of network communications and only the medical server knows login user's identity. In addition, most of the existing dynamic identity based authentication schemes ignore the inputs verification during login condition and this flaw may subject to inefficiency in the case of incorrect inputs in the login phase. Regarding the use of secure authentication mechanisms for e-Healthcare systems, this paper presents a new dynamic identity and chaotic maps based authentication scheme and a secure data protection approach is employed in every session to prevent illegal intrusions. The proposed scheme can not only quickly detect incorrect inputs during the phases of login and password change but also can invalidate the future use of a lost/stolen smart card. Compared the functionality and efficiency with other authentication schemes recently, the proposed scheme satisfies desirable security attributes and maintains acceptable efficiency in terms of the computational overheads for e-Healthcare systems.

  11. Small supermarket management system

    Institute of Scientific and Technical Information of China (English)

    曹正

    2016-01-01

    This system USES the Java language in the MyEclipse platform development tool, SQL2005 as the database platform for data and data, the SQL2005 required for the user operating system. It mainly implements the daily management of goods, including purchase management, inventory management, sales management, personnel management and supplier management. The system can also complete the functions of browsing, querying, adding, deleting and modifying relevant information. This topic is the core of the stock management, inventory management and sales management, at the same time, the system also has the full user management and permissions management function..

  12. Identical and Nonidentical Synchronization of Hyperchaotic Systems by Active Backstepping Method

    Directory of Open Access Journals (Sweden)

    A. Abooee

    2012-09-01

    Full Text Available This paper focuses on the tracking and synchronization problems of hyperchaotic systems based on active backstepping method. The method consists of a recursive approach that interlaces the choice of a Lyapunov function with the design of feedback control. First, a nonlinear recursive active backstepping control vector is designed to track any desired trajectory in hyperchaotic Wang system. Furthermore, this method is applied to achieve hyperchaos synchronization of two identical hyperchaotic Wang systems. Also, it is used to implement global asymptotic synchronization between hyperchaotic Wang system and hyperchaotic Rössler system. Numerical simulations have been employed to verify the effectiveness of the three designed active backstepping control vectors.

  13. Popular Public Discourse at Speakers' Corner: Negotiating Cultural Identities in Interaction

    DEFF Research Database (Denmark)

    McIlvenny, Paul

    1996-01-01

    In this paper I examine how cultural identities are actively negotiated in popular debate at a multicultural public setting in London. Speakers at Speakers' Corner manage the local construction of group affiliation, audience response and argument in and through talk, within the context of ethnic...... in which participant 'citizens' in the public sphere can actively struggle over cultural representation and identities. Using transcribed examples of video data recorded at Speakers' Corner my paper will examine how cultural identity is invoked in the management of active participation. Audiences...... and their affiliations are regulated and made accountable through the routines of membership categorisation and the policing of cultural identities and their imaginary borders....

  14. Revocable identity-based proxy re-signature against signing key exposure.

    Science.gov (United States)

    Yang, Xiaodong; Chen, Chunlin; Ma, Tingchun; Wang, Jinli; Wang, Caifen

    2018-01-01

    Identity-based proxy re-signature (IDPRS) is a novel cryptographic primitive that allows a semi-trusted proxy to convert a signature under one identity into another signature under another identity on the same message by using a re-signature key. Due to this transformation function, IDPRS is very useful in constructing privacy-preserving schemes for various information systems. Key revocation functionality is important in practical IDPRS for managing users dynamically; however, the existing IDPRS schemes do not provide revocation mechanisms that allow the removal of misbehaving or compromised users from the system. In this paper, we first introduce a notion called revocable identity-based proxy re-signature (RIDPRS) to achieve the revocation functionality. We provide a formal definition of RIDPRS as well as its security model. Then, we present a concrete RIDPRS scheme that can resist signing key exposure and prove that the proposed scheme is existentially unforgeable against adaptive chosen identity and message attacks in the standard model. To further improve the performance of signature verification in RIDPRS, we introduce a notion called server-aided revocable identity-based proxy re-signature (SA-RIDPRS). Moreover, we extend the proposed RIDPRS scheme to the SA-RIDPRS scheme and prove that this extended scheme is secure against adaptive chosen message and collusion attacks. The analysis results show that our two schemes remain efficient in terms of computational complexity when implementing user revocation procedures. In particular, in the SA-RIDPRS scheme, the verifier needs to perform only a bilinear pairing and four exponentiation operations to verify the validity of the signature. Compared with other IDPRS schemes in the standard model, our SA-RIDPRS scheme greatly reduces the computation overhead of verification.

  15. DEVELOPING PLURILINGUAL IDENTITY IN THIRD LANGUAGE CLASSROOM

    Directory of Open Access Journals (Sweden)

    HACKETT-JONES A.V.

    2015-01-01

    Full Text Available The article analyzes the notions of plurilingualism and plurilingual identity through the prism of the concepts of multilingualism and multilingual identity and the perspective of the theories of bilingualism. The article suggests that plurilingual identity can be viewed as an objective in third language (second foreign language teaching and contemplates specific characteristic imposed on a third language learner by the process of third language acquisition and the necessity of managing a certain imbalance between the degrees of language command and culture experience in different target languages.

  16. DEVELOPING PLURILINGUAL IDENTITY IN THIRD LANGUAGE CLASSROOM

    Directory of Open Access Journals (Sweden)

    HACKETT-JONES A.V.

    2015-12-01

    Full Text Available The article analyzes the notions of plurilingualism and plurilingual identity through the prism of the concepts of multilingualism and multilingual identity and the perspective of the theories of bilingualism. The article suggests that plurilingual identity can be viewed as an objective in third language (second foreign language teaching and contemplates specific characteristic imposed on a third language learner by the process of third language acquisition and the necessity of managing a certain imbalance between the degrees of language command and culture experience in different target languages.

  17. New Management Tools – From Video Management Systems to Business Decision Systems

    Directory of Open Access Journals (Sweden)

    Emilian Cristian IRIMESCU

    2015-06-01

    Full Text Available In the last decades management was characterized by the increased use of Business Decision Systems, also called Decision Support Systems. More than that, systems that were until now used in a traditional way, for some simple activities (like security, migrated to the decision area of management. Some examples are the Video Management Systems from the physical security activity. This article will underline the way Video Management Systems passed to Business Decision Systems, which are the advantages of use thereof and which are the trends in this industry. The article will also analyze if at this moment Video Management Systems are real Business Decision Systems or if there are some functions missing to rank them at this level.

  18. DEVELOPMENT OF A COMPUTER SYSTEM FOR IDENTITY AUTHENTICATION USING ARTIFICIAL NEURAL NETWORKS

    Directory of Open Access Journals (Sweden)

    Timur Kartbayev

    2017-03-01

    Full Text Available The aim of the study is to increase the effectiveness of automated face recognition to authenticate identity, considering features of change of the face parameters over time. The improvement of the recognition accuracy, as well as consideration of the features of temporal changes in a human face can be based on the methodology of artificial neural networks. Hybrid neural networks, combining the advantages of classical neural networks and fuzzy logic systems, allow using the network learnability along with the explanation of the findings. The structural scheme of intelligent system for identification based on artificial neural networks is proposed in this work. It realizes the principles of digital information processing and identity recognition taking into account the forecast of key characteristics’ changes over time (e.g., due to aging. The structural scheme has a three-tier architecture and implements preliminary processing, recognition and identification of images obtained as a result of monitoring. On the basis of expert knowledge, the fuzzy base of products is designed. It allows assessing possible changes in key characteristics, used to authenticate identity based on the image. To take this possibility into consideration, a neuro-fuzzy network of ANFIS type was used, which implements the algorithm of Tagaki-Sugeno. The conducted experiments showed high efficiency of the developed neural network and a low value of learning errors, which allows recommending this approach for practical implementation. Application of the developed system of fuzzy production rules that allow predicting changes in individuals over time, will improve the recognition accuracy, reduce the number of authentication failures and improve the efficiency of information processing and decision-making in applications, such as authentication of bank customers, users of mobile applications, or in video monitoring systems of sensitive sites.

  19. PALESTINE AUTOMOTIVE LICENSE IDENTITY RECOGNITION FOR INTELLIGENT PARKING SYSTEM

    Directory of Open Access Journals (Sweden)

    ANEES ABU SNEINEH

    2017-05-01

    Full Text Available Providing employees with protection and security is one of the key concerns of any organization. This goal can be implemented mainly by managing and protecting employees’ cars in the parking area. Therefore, a parking area must be managed and organized with smart technologies and tools that can be applied and integrated in an intelligent parking system. This paper presents the tools based on image recognition technology that can be used to effectively control various parts of a parking system. An intelligent automotive parking system is effectively implemented by integrating image processing technologies and an Arduino controller. Results show that intelligent parking is successfully implemented based on car ID image capture to meet the need for managing and organizing car parking systems.

  20. Personal and Interpersonal Value System, Self-Perception and Identity of Spanish Nurses: A Cross-Sectional Study

    Science.gov (United States)

    Losa Iglesias, Marta Elena; de Bengoa Vallejo, Ricardo Becerro

    2011-01-01

    The aim of this research is to identify the predominant values system among a sample of Spanish nurses, to identify how values are tied to professional nursing identity and determine differences in values and identity between socio-demographic variables as a gender, citizenship and/or nursing service. Cross-sectional study was performed with a…

  1. Two barriers to realizing the benefits of biometrics: a chain perspective on biometrics and identity fraud as biometrics' real challenge

    Science.gov (United States)

    Grijpink, Jan

    2004-06-01

    Along at least twelve dimensions biometric systems might vary. We need to exploit this variety to manoeuvre biometrics into place to be able to realise its social potential. Subsequently, two perspectives on biometrics are proposed revealing that biometrics will probably be ineffective in combating identity fraud, organised crime and terrorism: (1) the value chain perspective explains the first barrier: our strong preference for large scale biometric systems for general compulsory use. These biometric systems cause successful infringements to spread unnoticed. A biometric system will only function adequately if biometrics is indispensable for solving the dominant chain problem. Multi-chain use of biometrics takes it beyond the boundaries of good manageability. (2) the identity fraud perspective exposes the second barrier: our traditional approach to identity verification. We focus on identity documents, neglecting the person and the situation involved. Moreover, western legal cultures have made identity verification procedures known, transparent, uniform and predictable. Thus, we have developed a blind spot to identity fraud. Biometrics provides good potential to better checking persons, but will probably be used to enhance identity documents. Biometrics will only pay off if it confronts the identity fraudster with less predictable verification processes and more risks of his identity fraud being spotted. Standardised large scale applications of biometrics for general compulsory use without countervailing measures will probably produce the reverse. This contribution tentatively presents a few headlines for an overall biometrics strategy that could better resist identity fraud.

  2. [Gender identity, a factor of inequality forgotten by Spanish health information systems].

    Science.gov (United States)

    Gil-Borrelli, Christian; Velasco, César; Martí-Pastor, Marc; Latasa, Pello

    The Spanish Health Information System (HIS) collects health information. Trans people have poorer health status. This paper aimed to assess the adequacy of the HIS to collect the health data on trans individuals. The HIS sources available in the Statistical Portal of the National Health System were reviewed. The sources containing population health data were selected. The variables "sex" and "gender identity" were searched. Nineteen sources were identified. In all of them the variable "sex" was found, whereas "gender identify" did not appear in any of the 19. In two sources, the variable "sex" allowed values of "transsexual". The SIS contains little information regarding gender identity. This leads to the invisibility of trans people in Spanish health statistics. Obtaining this information would allow for a better understanding of the barriers to health care access, and the health needs of one of the most discriminated groups in our society. Copyright © 2017 SESPAS. Publicado por Elsevier España, S.L.U. All rights reserved.

  3. Who do we think we are? Analysing the content and form of identity work in the English National Health Service.

    Science.gov (United States)

    McDermott, Imelda; Checkland, Kath; Harrison, Stephen; Snow, Stephanie; Coleman, Anna

    2013-01-01

    The language used by National Health Service (NHS) "commissioning" managers when discussing their roles and responsibilities can be seen as a manifestation of "identity work", defined as a process of identifying. This paper aims to offer a novel approach to analysing "identity work" by triangulation of multiple analytical methods, combining analysis of the content of text with analysis of its form. Fairclough's discourse analytic methodology is used as a framework. Following Fairclough, the authors use analytical methods associated with Halliday's systemic functional linguistics. While analysis of the content of interviews provides some information about NHS Commissioners' perceptions of their roles and responsibilities, analysis of the form of discourse that they use provides a more detailed and nuanced view. Overall, the authors found that commissioning managers have a higher level of certainty about what commissioning is not rather than what commissioning is; GP managers have a high level of certainty of their identity as a GP rather than as a manager; and both GP managers and non-GP managers oscillate between multiple identities depending on the different situations they are in. This paper offers a novel approach to triangulation, based not on the usual comparison of multiple data sources, but rather based on the application of multiple analytical methods to a single source of data. This paper also shows the latent uncertainty about the nature of commissioning enterprise in the English NHS.

  4. Identity threat at work: how social identity threat and situational cues contribute to racial and ethnic disparities in the workplace.

    Science.gov (United States)

    Emerson, Katherine T U; Murphy, Mary C

    2014-10-01

    Significant disparities remain between racial and ethnic minorities' and Whites' experiences of American workplaces. Traditional prejudice and discrimination approaches explain these gaps in hiring, promotion, satisfaction, and well-being by pointing to the prejudice of people within organizations such as peers, managers, and executives. Grounded in social identity threat theory, this theoretical review instead argues that particular situational cues-often communicated by well-meaning, largely unprejudiced employees and managers-signal to stigmatized groups whether their identity is threatened and devalued or respected and affirmed. First, we provide an overview of how identity threat shapes the psychological processes of racial and ethnic minorities by heightening vigilance to certain situational cues in the workplace. Next, we outline several of these cues and their role in creating and sustaining perceptions of identity threat (or safety). Finally, we provide empirically grounded suggestions that organizations may use to increase identity safety among their employees of color. Taken together, the research demonstrates how situational cues contribute to disparate psychological experiences for racial and ethnic minorities at work, and suggests that by altering threatening cues, organizations may create more equitable, respectful, and inclusive environments where all people may thrive. (PsycINFO Database Record (c) 2014 APA, all rights reserved).

  5. Operations management system

    Science.gov (United States)

    Brandli, A. E.; Eckelkamp, R. E.; Kelly, C. M.; Mccandless, W.; Rue, D. L.

    1990-01-01

    The objective of an operations management system is to provide an orderly and efficient method to operate and maintain aerospace vehicles. Concepts are described for an operations management system and the key technologies are highlighted which will be required if this capability is brought to fruition. Without this automation and decision aiding capability, the growing complexity of avionics will result in an unmanageable workload for the operator, ultimately threatening mission success or survivability of the aircraft or space system. The key technologies include expert system application to operational tasks such as replanning, equipment diagnostics and checkout, global system management, and advanced man machine interfaces. The economical development of operations management systems, which are largely software, will require advancements in other technological areas such as software engineering and computer hardware.

  6. Quadratic integrals of motion for identical particle systems in quantum case

    International Nuclear Information System (INIS)

    Brije, I.; Gonera, S.; Kosinski, P.; Maslanka, P.; Giller, S.

    2005-01-01

    One studied quantum dynamic systems of identical particles allowing for additional integral of motion being quadratic in pulses. It was found that there was an appropriate way to ensure order that enabled to convert the classical integrals of motion into their quantum analogues. One analyzed relation of the mentioned integrals with splitting of the variables in the Schroedinger equation [ru

  7. 78 FR 4408 - Privacy Act of 1974, as Amended; System of Records

    Science.gov (United States)

    2013-01-22

    ... FDIC 30-64-0035, Identity, Credential and Access Management Records. We hereby publish this notice for... Web page. The Identity, Credential and Access Management Records system will contain records collected or generated in the process of producing Personal Identity Verification (PIV) cards issued by the...

  8. Connecting the dots within: creative performance and identity integration.

    Science.gov (United States)

    Cheng, Chi-Ying; Sanchez-Burks, Jeffrey; Lee, Fiona

    2008-11-01

    In two studies drawing from social identity theory and the creative-cognition approach, we found that higher levels of identity integration--perceived compatibility between two social identities--predict higher levels of creative performance in tasks that draw on both identity-relevant knowledge domains. Study 1 showed that Asian Americans with higher identity integration were more creative in developing new dishes using a given set of ingredients, but only when both Asian and American ingredients were available. Study 2 showed that female engineers with higher identity integration were more creative in designing a product, but only when the product was targeted to female users. These findings suggest that the psychological management of multiple social identities may be related to accessibility of multiple knowledge domains, which in turn influences creativity.

  9. Systems Engineering Management Plan

    International Nuclear Information System (INIS)

    1994-01-01

    The purpose of this Monitored Retrievable Storage (MRS) Project Systems Engineering Management Plan (SEMP) is to define and establish the MRS Project Systems Engineering process that implements the approved policy and requirements of the Office of Civilian Radioactive Waste Management (OCRWM) for the US Department of Energy (DOE). This plan is Volume 5 of the MRS Project Management Plan (PMP). This plan provides the framework for implementation of systems engineering on the MRS Project consistent with DOE Order 4700.1, the OCRWM Program Management System Manual (PMSM), and the OCRWM Systems Engineering Management Plan (SEMP)

  10. Global business management for sustainability and competitiveness: The role of corporate branding, corporate identity and corporate reputation

    OpenAIRE

    Gupta, Suraksha; Melewar, T.C.; Czinkota, Michael C.

    2013-01-01

    This special issue of the Journal of World Business is devoted to the role of intangibles of a firm in building sustainable business for success in competitive markets. The research articles included in this issue have contributed to the on-going academic knowledge about the ability of marketing and management practices to drive business sustainability. This special issue on business sustainabili- ty focuses on the role of corporate branding, corporate identity and corporate reputation.

  11. Multi-vehicle detection with identity awareness using cascade Adaboost and Adaptive Kalman filter for driver assistant system.

    Directory of Open Access Journals (Sweden)

    Baofeng Wang

    Full Text Available Vision-based vehicle detection is an important issue for advanced driver assistance systems. In this paper, we presented an improved multi-vehicle detection and tracking method using cascade Adaboost and Adaptive Kalman filter(AKF with target identity awareness. A cascade Adaboost classifier using Haar-like features was built for vehicle detection, followed by a more comprehensive verification process which could refine the vehicle hypothesis in terms of both location and dimension. In vehicle tracking, each vehicle was tracked with independent identity by an Adaptive Kalman filter in collaboration with a data association approach. The AKF adaptively adjusted the measurement and process noise covariance through on-line stochastic modelling to compensate the dynamics changes. The data association correctly assigned different detections with tracks using global nearest neighbour(GNN algorithm while considering the local validation. During tracking, a temporal context based track management was proposed to decide whether to initiate, maintain or terminate the tracks of different objects, thus suppressing the sparse false alarms and compensating the temporary detection failures. Finally, the proposed method was tested on various challenging real roads, and the experimental results showed that the vehicle detection performance was greatly improved with higher accuracy and robustness.

  12. Why do I dread looking old?: A test of social identity theory, terror management theory, and the double standard of aging.

    Science.gov (United States)

    Chonody, Jill M; Teater, Barbra

    2016-01-01

    Outward appearance is one of the means by which age is determined, and fear of looking old may stem from fears about social identity and death. This study explored how social identity theory and terror management theory may help to explain the dread of looking old. University students from the United States, England, and Australia (N = 1,042) completed a questionnaire regarding their attitudes about aging and older adults. Results indicated that sex, age, beliefs about personal aging, and death anxiety explained 30.4% of the variance for participants' dread of looking old. Theoretical hypotheses were supported by our findings.

  13. Facilitating Conversations about Managerial Identities

    DEFF Research Database (Denmark)

    Madsen, Mona Toft

    -based organization in the engineering consulting sector b) a reflection meeting, where the same three managers were gathered, and conversations were facilitated based on identity work in the context of earlier interviews. More specifically, three themes were discussed; flat organizational structure, tensions between...

  14. Adaptive Backstepping Controller Design for the Anti-Synchronization of Identical WINDMI Chaotic Systems with Unknown Parameters and its SPICE Implementation

    Directory of Open Access Journals (Sweden)

    S. Vaidyanathan

    2014-11-01

    Full Text Available This paper derives new results for the adaptive backstepping controller design for the anti-synchronization of identical WINDMI systems (Wind-Magnetosphere-Ionosphere models with unknown parameters and also details the SPICE implementation of the proposed adaptive backstepping controller. In the anti-synchronization of chaotic systems, the sum of the outputs of master and slave systems is made to converge asymptotically to zero with time. The adaptive controller design for the anti-synchronization of identical WINDMI systems with unknown parameters has been established by applying Lyapunov stability theory. MATLAB simulations have been shown for the illustration of the adaptive anti-synchronizing backstepping controller for identical WINDMI chaotic systems. Finally, the proposed controller has been implemented using SPICE and circuit simulation results have been detailed.

  15. Integrating the radioactive waste management system into other management systems

    International Nuclear Information System (INIS)

    Silva, Ana Cristina Lourenco da; Nunes Neto, Carlos Antonio

    2007-01-01

    Radioactive waste management is to be included in the Integrated Management System (IMS) which pursues the continuous improvement of the company's quality, occupational safety and health, and environment protection processes. Radioactive waste management is based on the following aspects: optimization of human and material resources for execution of tasks, including the provision of a radiation protection supervisor to watch over the management of radioactive waste; improved documentation (management plan and procedures); optimization of operational levels for waste classification and release; maintenance of generation records and history through a database that facilitates traceability of information; implementation of radioactive waste segregation at source (source identification, monitoring and decontamination) activities intended to reduce the amount of radioactive waste; licensing of initial storage site for radioactive waste control and storage; employee awareness training on radioactive waste generation; identification and evaluation of emergency situations and response planning; implementation of preventive maintenance program for safety related items; development and application of new, advanced treatment methodologies or systems. These aspects are inherent in the concepts underlying quality management (establishment of administrative controls and performance indicators), environment protection (establishment of operational levels and controls for release), occupational health and safety (establishment of operational controls for exposure in emergency and routine situations and compliance with strict legal requirements and standards). It is noted that optimizing the addressed aspects of a radioactive waste management system further enhances the efficiency of the Integrated Management System for Quality, Environment, and Occupational Safety and Health. (author)

  16. Learning Content Management Systems

    Directory of Open Access Journals (Sweden)

    Tache JURUBESCU

    2008-01-01

    Full Text Available The paper explains the evolution of e-Learning and related concepts and tools and its connection with other concepts such as Knowledge Management, Human Resources Management, Enterprise Resource Planning, and Information Technology. The paper also distinguished Learning Content Management Systems from Learning Management Systems and Content Management Systems used for general web-based content. The newest Learning Content Management System, very expensive and yet very little implemented is one of the best tools that helps us to cope with the realities of the 21st Century in what learning concerns. The debates over how beneficial one or another system is for an organization, can be driven by costs involved, efficiency envisaged, and availability of the product on the market.

  17. Lighting system with thermal management system

    Science.gov (United States)

    Arik, Mehmet; Weaver, Stanton; Stecher, Thomas; Seeley, Charles; Kuenzler, Glenn; Wolfe, Jr., Charles; Utturkar, Yogen; Sharma, Rajdeep; Prabhakaran, Satish; Icoz, Tunc

    2013-05-07

    Lighting systems having unique configurations are provided. For instance, the lighting system may include a light source, a thermal management system and driver electronics, each contained within a housing structure. The light source is configured to provide illumination visible through an opening in the housing structure. The thermal management system is configured to provide an air flow, such as a unidirectional air flow, through the housing structure in order to cool the light source. The driver electronics are configured to provide power to each of the light source and the thermal management system.

  18. Managing hybrid marketing systems.

    Science.gov (United States)

    Moriarty, R T; Moran, U

    1990-01-01

    As competition increases and costs become critical, companies that once went to market only one way are adding new channels and using new methods - creating hybrid marketing systems. These hybrid marketing systems hold the promise of greater coverage and reduced costs. But they are also hard to manage; they inevitably raise questions of conflict and control: conflict because marketing units compete for customers; control because new indirect channels are less subject to management authority. Hard as they are to manage, however, hybrid marketing systems promise to become the dominant design, replacing the "purebred" channel strategy in all kinds of businesses. The trick to managing the hybrid is to analyze tasks and channels within and across a marketing system. A map - the hybrid grid - can help managers make sense of their hybrid system. What the chart reveals is that channels are not the basic building blocks of a marketing system; marketing tasks are. The hybrid grid forces managers to consider various combinations of channels and tasks that will optimize both cost and coverage. Managing conflict is also an important element of a successful hybrid system. Managers should first acknowledge the inevitability of conflict. Then they should move to bound it by creating guidelines that spell out which customers to serve through which methods. Finally, a marketing and sales productivity (MSP) system, consisting of a central marketing database, can act as the central nervous system of a hybrid marketing system, helping managers create customized channels and service for specific customer segments.

  19. Identity Theft - The National Guard

    Science.gov (United States)

    Legislative Liaison Small Business Programs Social Media State Websites Videos Featured Videos On Every Front identity theft you discover someone is still fraudulently using your Social Security Number, you can Features Blended Retirement System Diversity Features by Year Identity Theft Posture Statement State

  20. Identity-specific motivation: How distinct identities direct self-regulation across distinct situations.

    Science.gov (United States)

    Browman, Alexander S; Destin, Mesmin; Molden, Daniel C

    2017-12-01

    Research on self-regulation has traditionally emphasized that people's thoughts and actions are guided by either (a) domain-general motivations that emerge from a cumulative history of life experiences, or (b) situation-specific motivations that emerge in immediate response to the incentives present in a particular context. However, more recent studies have illustrated the importance of understanding the interplay between such domain-general and situation-specific motivations across the types of contexts people regularly encounter. The present research, therefore, expands existing perspectives on self-regulation by investigating how people's identities -the internalized roles, relationships, and social group memberships that define who they are-systemically guide when and how different domain-general motivations are activated within specific types of situations. Using the motivational framework described by regulatory focus theory (Higgins, 1997), Studies 1 and 2 demonstrate that people indeed have distinct, identity-specific motivations that uniquely influence their current self-regulation when such identities are active. Studies 3-5 then begin to explore how identity-specific motivations are situated within people's larger self-concept. Studies 3a and 3b demonstrate that the less compatible people's specific identities, the more distinct are the motivations connected to those identities. Studies 4-5 then provide some initial, suggestive evidence that identity-specific motivations are not a separate, superordinate feature of people's identities that then alter how they pursue any subordinate, identity-relevant traits, but instead that such motivations emerge from the cumulative motivational significance of the subordinate traits to which the identities themselves become attached. Implications for understanding the role of the self-concept in self-regulation are discussed. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  1. Developing Professional Identity in an Online Learning Environment

    DEFF Research Database (Denmark)

    Horn, Line Helverskov

    2015-01-01

    identity as the outcome for the intern. This paper describes the interactions in an online learning environment. The online platform sought to enable peer interaction between younger and older students in a discussion of the professional identity of Natural and Cultural Heritage Management (NCHM......From a socio-cultural perspective, the development of a professional identity is an on-going process that is social in nature and negotiated in communities of practice (Wenger, 1998). Internships in higher education function as such communities of practice, with an improved sense of professional...

  2. Information Security Management - Part Of The Integrated Management System

    Science.gov (United States)

    Manea, Constantin Adrian

    2015-07-01

    The international management standards allow their integrated approach, thereby combining aspects of particular importance to the activity of any organization, from the quality management systems or the environmental management of the information security systems or the business continuity management systems. Although there is no national or international regulation, nor a defined standard for the Integrated Management System, the need to implement an integrated system occurs within the organization, which feels the opportunity to integrate the management components into a cohesive system, in agreement with the purpose and mission publicly stated. The issues relating to information security in the organization, from the perspective of the management system, raise serious questions to any organization in the current context of electronic information, reason for which we consider not only appropriate but necessary to promote and implement an Integrated Management System Quality - Environment - Health and Operational Security - Information Security

  3. Integrated management systems

    CERN Document Server

    Bugdol, Marek

    2015-01-01

    Examining the challenges of integrated management, this book explores the importance and potential benefits of using an integrated approach as a cross-functional concept of management. It covers not only standardized management systems (e.g. International Organization for Standardization), but also models of self-assessment, as well as different types of integration. Furthermore, it demonstrates how processes and systems can be integrated, and how management efficiency can be increased. The major part of this book focuses on management concepts which use integration as a key tool of management processes (e.g. the systematic approach, supply chain management, virtual and network organizations, processes management and total quality management). Case studies, illustrations, and tables are also provided to exemplify and illuminate the content, as well as examples of successful and failed integrations. Providing a particularly useful resource to managers and specialists involved in the improvement of organization...

  4. New type radiation management system

    International Nuclear Information System (INIS)

    Mogi, Kenichi; Uranaka, Yasuo; Fujita, Kazuhiko

    2001-01-01

    The radiation management system is a system to carry out entrance and leaving room management of peoples into radiation management area, information management on radiation obtained from a radiation testing apparatus, and so on. New type radiation management system developed by the Mitsubishi Electric Corp. is designed by concepts of superior maintenance and system practice by using apparatus and its interface with standard specification, upgrading of processing response by separating exposure management processing from radiation monitoring processing on a computer, and a backup system not so as to lose its function by a single accident of the constructed computer. Therefore, the system is applied by the newest hardware, package software, and general use LAN, and can carry out a total system filled with requirements and functions for various radiation management of customers by preparing a basic system from radiation testing apparatus to entrance and leaving room management system. Here were described on outline of the new type management system, concept of the system, and functions of every testing apparatus. (G.K.)

  5. A computational model of the development of separate representations of facial identity and expression in the primate visual system.

    Science.gov (United States)

    Tromans, James Matthew; Harris, Mitchell; Stringer, Simon Maitland

    2011-01-01

    Experimental studies have provided evidence that the visual processing areas of the primate brain represent facial identity and facial expression within different subpopulations of neurons. For example, in non-human primates there is evidence that cells within the inferior temporal gyrus (TE) respond primarily to facial identity, while cells within the superior temporal sulcus (STS) respond to facial expression. More recently, it has been found that the orbitofrontal cortex (OFC) of non-human primates contains some cells that respond exclusively to changes in facial identity, while other cells respond exclusively to facial expression. How might the primate visual system develop physically separate representations of facial identity and expression given that the visual system is always exposed to simultaneous combinations of facial identity and expression during learning? In this paper, a biologically plausible neural network model, VisNet, of the ventral visual pathway is trained on a set of carefully-designed cartoon faces with different identities and expressions. The VisNet model architecture is composed of a hierarchical series of four Self-Organising Maps (SOMs), with associative learning in the feedforward synaptic connections between successive layers. During learning, the network develops separate clusters of cells that respond exclusively to either facial identity or facial expression. We interpret the performance of the network in terms of the learning properties of SOMs, which are able to exploit the statistical indendependence between facial identity and expression.

  6. A computational model of the development of separate representations of facial identity and expression in the primate visual system.

    Directory of Open Access Journals (Sweden)

    James Matthew Tromans

    Full Text Available Experimental studies have provided evidence that the visual processing areas of the primate brain represent facial identity and facial expression within different subpopulations of neurons. For example, in non-human primates there is evidence that cells within the inferior temporal gyrus (TE respond primarily to facial identity, while cells within the superior temporal sulcus (STS respond to facial expression. More recently, it has been found that the orbitofrontal cortex (OFC of non-human primates contains some cells that respond exclusively to changes in facial identity, while other cells respond exclusively to facial expression. How might the primate visual system develop physically separate representations of facial identity and expression given that the visual system is always exposed to simultaneous combinations of facial identity and expression during learning? In this paper, a biologically plausible neural network model, VisNet, of the ventral visual pathway is trained on a set of carefully-designed cartoon faces with different identities and expressions. The VisNet model architecture is composed of a hierarchical series of four Self-Organising Maps (SOMs, with associative learning in the feedforward synaptic connections between successive layers. During learning, the network develops separate clusters of cells that respond exclusively to either facial identity or facial expression. We interpret the performance of the network in terms of the learning properties of SOMs, which are able to exploit the statistical indendependence between facial identity and expression.

  7. THE PLACE OF OCCUPATIONAL HEALTH AND SAFETY MANAGEMENT SYSTEM IN THE INTEGRATED MANAGEMENT SYSTEM

    Directory of Open Access Journals (Sweden)

    Piotr Kafel

    2016-06-01

    Full Text Available The purpose of this paper is to analyze the place of occupational health and safety management system (OHSMS within the integrated management system. Implementation aspects of management systems are discussed, namely the different management system standards used for registration, for example ISO 14001, ISO 9001, OHSAS 18001, ISO 27001, the order in which they were implemented, the time required for each implementation, as well as the scope of integration of these management system standards into a single Integrated Management System and the level of integration. In order to do so, some of the results of a survey carried out in 81 organizations registered to at least two management systems selected from popular international standards, e.g.: ISO 9001, ISO 14001, OHSAS 18001, ISO/IEC 27001, ISO 22000 were used. OHSMS is not the system that is implemented as a first one. Usually it is implemented after or simultaneously with ISO 9001 and ISO 14001 standards. Time of implementation of MSSs in second and further round of implementation is shorter than during the implementation of first standards. There is a higher level of integration of implemented management standards in organizations where one of the standards in OHSMS, than in a companies without OHSMS. The paper analyses those sequences of management systems implementation of safety management systems with other system, that allow organizations to achieve higher levels of integration and presents a possible pattern for the companies initiating the integration process.

  8. PRODUCT BRAND IDENTITY – A FACTOR OF SUCCESSFUL MARKET POSITIONING OF A BRAND

    Directory of Open Access Journals (Sweden)

    Branislav Lijović

    2012-12-01

    Full Text Available This paper begins with the term product brand identity as the new market paradigm. It aims to define the term product brand identity and its significance for realisation of the market value of a product’s brand and overall marketing goals of an economic operator. The strategy of economic operator and desired market positioning of a brand is implemented by means of product brand identity and a combination of its elements. Systematic creation and identity management of a product’s brand resulted in the uniqueness of the brand, and set the foundation for building the entire process of product brand management.

  9. Investigating of the effect of entrepreneurial orientations on formation of entrepreneurial identity

    Directory of Open Access Journals (Sweden)

    Manoochehr Parsian

    2016-10-01

    Full Text Available In today’s changing world, success belongs to the communities and organizations that make a significant relationship between scarce resources and capabilities of management and entrepreneurship of their human resource. In other words, societies and the organizations can move forward in the development path that, with creating the necessary conditions, equip their human resources to productive entrepreneurial knowledge and skills to conduct other organizations and community resources to create value and achieve the development, management. Formation of entrepreneurial identity plays an important role for the development of the entrepreneurial spirit in society. In this paper, given the importance of entrepreneurial identity, the role of entrepreneurial orientations based on Lampkin and Dess (1996 [Lumpkin, G. T., & Dess, G. G. (1996. Clarifying the entrepreneurial orientation construct and linking it to performance. Academy of Management Review, 21(1, 135-172.] is investigated on entrepreneurial identity of the municipality of Qom using a questionnaire consists of 18 items. The results show entrepreneurial orientation influences significantly on entrepreneurial identity.

  10. Harvesting influences functional identity and diversity over time in forests of the northeastern U.S.A.

    Science.gov (United States)

    M.T. Curzon; A.W. D' Amato; S. Fraver; B.J. Palik; A. Bottero; J.R. Foster; K.E. Gleason

    2017-01-01

    Concern over global environmental change and associated uncertainty has given rise to greater emphasis on fostering resilience through forest management. We examined the impact of standard silvicultural systems (including clearcutting, shelterwood, and selection) compared with unharvested controls on tree functional identity and functional diversity in three forest...

  11. Expanding the disaster risk management framework: Measuring the constructed level of national identity as a factor of political risk

    Directory of Open Access Journals (Sweden)

    Barend Prinsloo

    2016-08-01

    Full Text Available Political risk is identified as a dominant risk category of disaster risk management (DRM which could negatively affect the success of those measures implemented to reduce disaster risk. Key to political risk is the construct of national identity which, if poorly constructed, could greatly contribute to political risk. This article proposed a tool to measure the construct of national identity and to provide recommendations to strengthen the construct in order to mitigate the exacerbating influence it may have on political risk and ultimately on DRM. The design of the measurement tool consisted of a mixed methodological approach employing both quantitative and qualitative data. The data collection instruments included a literature review (which is shortly provided in the previous sections and an empirical study that utilised data obtained through structured questionnaires. Although the results of the proposed measuring instrument did not include a representative sample of all the cultures in SouthAfrica, the results alluded to different levels for the construction of national identity among black and white respondents, possibly because of different ideological expectations among these groups. The results of the study should be considered as a validation of the measuring tool and not necessarily of the construct of national identity in South Africa. The measuring tool is thus promising for future studies to reduce political risk and ultimately disaster risk.

  12. A systems engineering management approach to resource management applications

    Science.gov (United States)

    Hornstein, Rhoda Shaller

    1989-01-01

    The author presents a program management response to the following question: How can the traditional practice of systems engineering management, including requirements specification, be adapted, enhanced, or modified to build future planning and scheduling systems for effective operations? The systems engineering management process, as traditionally practiced, is examined. Extensible resource management systems are discussed. It is concluded that extensible systems are a partial solution to problems presented by requirements that are incomplete, partially immeasurable, and often dynamic. There are positive indications that resource management systems have been characterized and modeled sufficiently to allow their implementation as extensible systems.

  13. Threat of the feminine identity: The emerging structure in exploring the process of women's empowerment for menopause management: A grounded theory study

    Directory of Open Access Journals (Sweden)

    Mansoureh Yazdkhasti

    2016-11-01

    Full Text Available Women empowerment in different spheres of life especially menopause is among the key elements of health promotion in all communities. However there is no realistic images of empowering women in menopausal symptoms management. The present survey aimed to explain the process of women's empowerment for menopausal symptoms management. This qualitative study is part of a larger project which was conducted using Grounded Theory between 2013 and 2015. The article's main focus was to explore the underlying conditions and factors affecting the process of women's empowerment. Using a purposive and theoretical sampling method, 25 participants were interviewed 28 times. Data was collected through some in-depth, semi-structural and open ended interviews with the participant and also memoing and field notes. The interviews were conducted in Neighborhoods House affiliated to Tehran municipality and two gynecological clinics affiliated to Tehran University of Medical Sciences. Data analysis was applied through Strauss and Corbin approach (2008 using MAXQDA10 software. Threat of the feminine identity has been noted as the women's most common concern to being empowered in menopause management. The key theme emerged in the present study (threat of the feminine identity included four main categories (consciousness about the likelihood of femininity decline, negative attitude towards herself, inadequate supportive context, latent opportunity, two subcategories and 109 first-level codes. There is a logical, coherent and integrated relationship between all these concepts and the theme of feminine identity threat. This theme is considered as an underlying social problem and a major concern for postmenopausal women in the context of this group of women's empowerment. The factors (barriers and facilitators affecting women's empowerment in menopause management are associated with social context, intensity and origin of each society. Evaluation of Iranian women

  14. Canonical ward identities in generalized QCD

    International Nuclear Information System (INIS)

    Li Ziping

    1995-01-01

    The canonical Ward identities for a system with singular higher-order Lagrangian are derived and some application to the generalized QCD are given. The new relations of the Ward identities for gauge ghost field proper vertices are obtained which differ from the usual Ward-Takahashi identities arising from BRS invariance. The expressions for PCAC and generalized PCAC of AVV vertices are also obtained

  15. The systemic roles of SKI and SSI in the Swedish nuclear waste management system. Syncho's report for project RISCOM

    International Nuclear Information System (INIS)

    Espejo, R.; Gill, A.

    1998-01-01

    The purpose of this report is to share and summarize our findings about the regulatory roles of SKI/SSI in the context of the Swedish Nuclear System (SNS), with an emphasis on nuclear waste management. The driving force in this review is to make decision processes more transparent. What is reported is based on interviews conducted with employees at SKI/SSI/SKB during early December 1996, the presentation to SKI/SSI in January 1997, discussions during the Shap Wells meeting in Cumbria during March 1997 and RISCOM internal discussions. We offer two hypotheses about the way the Nuclear Waste Management System (NWMS) appears to work. We choose one and derive from it a view about structural issues in SNS and NWMS. The conclusion is a set of systemic roles for the regulators. It is the comparison between these systemic roles and the actual situation that may trigger some adjustments in the system. Our hope is that these findings will make apparent feasible and desirable changes in the system in order to increase the chances for transparent decisions in the Nuclear Waste Management System. In summary, Section 2 includes a general background of the NWMS based on interviews and general information. Section 3 makes a more focused attempt to work out the issues expressed by people in the interviews. Section 4 discusses at a more conceptual level systemic ideas such as the unfolding of complexity. Section 5 is an attempt to organize viewpoints about the NWMS and offers hypotheses to support a preliminary diagnosis of the system in Section 6. We call this section 'A problem of identity'. It is only in Section 7 that basic systemic arguments are unfolded with the intention of supporting an appreciation of SKI/SSI's regulatory roles in the nuclear industry as a whole and nuclear waste management in particular. Section 8 offers a summary of conclusions

  16. Developing a workable teacher identity: Building and negotiating identity within a professional network

    Science.gov (United States)

    Rostock, Roseanne

    The challenge of attracting and retaining the next generation of teachers who are skilled and committed to meeting the growing demands of the profession is of increasing concern to researchers and policy makers, particularly since 45--50% of beginning teachers leave the profession within five years (Ingersoll & Smith, 2003). Reasons for such attrition include compensation, status and working conditions; however, there is growing evidence that a critical factor in new teacher retention hinges on teachers' ability to accomplish the difficult task of forming a workable professional identity in the midst of competing discourses about teaching (Alsup, 2006; Britzman, 2003). There is little research on professional identity development among those beginning teachers at highest risk for attrition (secondary math and science teachers, and those with strong academic backgrounds). This study explores the professional identity development of early-career math and science teachers who are part of the Knowles Science Teaching Foundation's (KSTF) teaching fellowship program, an external support network that aims to address many of the issues leading to high attrition among this particular population of teachers. Using narrative research methods, I examine three case studies of beginning teachers, exploring how they construct professional identity in relation to various discourse communities and negotiate tensions across multiple discourses. The cases identify both dominant discourses and counter-discourses that the teachers draw upon for important identity development resources. They also demonstrate that the way a teacher manages tensions across competing discourses is important to how well one can negotiate a workable professional identity. In particular, they emphasize the importance of engaging in borderland discourses (Gee, 1996) as a way of taking agency in one's own identity development as well as in transforming one's discourse communities. These cases shed light on how

  17. 76 FR 73604 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2011-11-29

    ... Defense. Deletion: K890.12 Identity Management (IDM) (March 18, 2010, 75 FR 13090). Reason: Due to policy... (SAAM) project (formerly known as Identity Management). [FR Doc. 2011-30698 Filed 11-28-11; 8:45 am... Docket Management System Office, 4800 Mark Center Drive, East Tower, 2nd floor, Suite 02G09, Alexandria...

  18. Canonical symmetry in a system with singular Lagrangian and ward identities

    International Nuclear Information System (INIS)

    Li Ziping

    1994-01-01

    An algorithm to construct the generator of gauge transformation for a constrained Hamiltonian system is given. The relationships among the coefficients connecting with first-class constraints in the generator is cleared. Based on the phase space generating function, the corresponding Ward identities in canonical formalism is deduced. The preliminary applications of above results to a model in field theory which is functionally equivalent to the mixed Chern-Simons Lagrangian is discussed in detail

  19. 'Don Fabio' and the taming of the three lions: the discursive construction of a foreign England manager's identity in the sports online written media

    Directory of Open Access Journals (Sweden)

    Dermot Brendan Heaney

    2012-11-01

    Full Text Available This article considers the appointment of a foreign manager to coach a national football team from the perspective of discursive identity construction. The data is comprised of three corpora of online versions of newspaper articles, each corresponding to a phase in Fabio Capello’s first two years of tenure. Reflecting current trends in Critical Discourse Analysis, qualitative close analysis is carried out on two articles from each corpus while quantitative analysis is extended across each corpus to identify salient and consistent aspects of discursive identity construction. Exploiting the multi-disciplinary basis of CDA, the data is examined in terms of transitivity, lexis (comprising vocabulary, collocation, deixis, and intertextuality, and narrative identity construction. Micro-analysis of grammatical and linguistic patterns is applied to indicate patterns in press coverage in each phase, and a corresponding overview considers how aspects of identity work diffused through each corpus cohere into general storylines.

  20. 'Don Fabio' and the taming of the three lions: the discursive construction of a foreign England manager's identity in the sports online written media

    Directory of Open Access Journals (Sweden)

    Dermot Brendan Heaney

    2013-06-01

    Full Text Available This article considers the appointment of a foreign manager to coach a national football team from the perspective of discursive identity construction. The data is comprised of three corpora of online versions of newspaper articles, each corresponding to a phase in Fabio Capello’s first two years of tenure. Reflecting current trends in Critical Discourse Analysis, qualitative close analysis is carried out on two articles from each corpus while quantitative analysis is extended across each corpus to identify salient and consistent aspects of discursive identity construction. Exploiting the multi-disciplinary basis of CDA, the data is examined in terms of transitivity, lexis (comprising vocabulary, collocation, deixis, and intertextuality, and narrative identity construction. Micro-analysis of grammatical and linguistic patterns is applied to indicate patterns in press coverage in each phase, and a corresponding overview considers how aspects of identity work diffused through each corpus cohere into general storylines.

  1. Organizational Identity Expressiveness and Perception Management : Principles for Expressing the Organizational Identity in Order to Manage External Stakeholders’ Perceptions of a Company

    NARCIS (Netherlands)

    M.D. van Halderen (Mignon)

    2008-01-01

    textabstractIt is especially during the past decade that stakeholders have become extremely heedful of organizations and their activities. A dominant organizational response of companies to this development is to express their organizational identity, in terms of who they are, what they stand for,

  2. Bridging Identity Gaps : Supporting Identity Performance in Citizen Service Encounters

    DEFF Research Database (Denmark)

    Borchorst, Nikolaj Gandrup; McPhail, Brenda; Smith, Karen Louise

    2012-01-01

    administrative processes and the quality and swiftness of the service they receive. As we bring to light in this paper, this “fitting in” with rigid bureaucratic procedures and IT systems interestingly requires a substantial collaborative effort between the receiver(s) of the service and a complex constellation...... of surrounding stakeholders and intermediaries. This collaboration and the performing of multiple identities raises challenges for the design of e-government systems aimed at supporting physical and digital citizen service provision, as well as issues regarding privacy, citizenship, and public service quality......This paper explores in situ citizen service encounters in government offices. Drawing upon ethnographically informed fieldwork in Canada and Denmark, we discuss the challenges to supporting citizens in constructing and performing identities in public service settings. Our data suggests...

  3. The change of expression configuration affects identity-dependent expression aftereffect but not identity-independent expression aftereffect

    Directory of Open Access Journals (Sweden)

    Miao eSong

    2015-12-01

    Full Text Available The present study examined the influence of expression configuration on cross-identity expression aftereffect. The expression configuration refers to the spatial arrangement of facial features in a face for conveying an emotion, e.g., an open-mouth smile versus a closed-mouth smile. In the first of two experiments, the expression aftereffect is measured using across-identity/cross-expression configuration factorial design. The facial identities of test faces were the same or different from the adaptor, while orthogonally, the expression configurations of those facial identities were also the same or different. The result shows that the change of expression configuration impaired the expression aftereffect when the facial identities of adaptor and tests were the same; however, the impairment effect disappears when facial identities were different, indicating the identity-independent expression representation is more robust to the change of the expression configuration in comparison with the identity-dependent expression representation. In the second experiment, we used schematic line faces as adaptors and real faces as tests to minimize the similarity between the adaptor and tests, which is expected to exclude the contribution from the identity-dependent expression representation to expression aftereffect. The second experiment yields a similar result as the identity-independent expression aftereffect observed in Experiment 1. The findings indicate the different neural sensitivities to expression configuration for identity-dependent and identity-independent expression systems.

  4. Incorporating co-management within your environmental management system

    International Nuclear Information System (INIS)

    Melton, D.A.; Maher, S.

    1998-01-01

    The meaning of co-management in the renewable resource sector in terms of government and First Nations relations was explained. Co-management is a short term for co-operative management and has a formative history in the Northwest Territories, particularly in wildlife management. For example, co-management bridged the gap between the aboriginal way of hunting with those of the government. The aboriginal system was associated by self regulation based on traditional knowledge whereas the government system emphasized science, laws and regulations. At present, there are few examples of co-management in the oil and gas sector. This paper described the lessons that could be learned from previous examples of co-management and how those lessons might apply to an Environmental Management System (EMS) for the private oil and gas sector. 3 refs

  5. Protecting Mobile Crowd Sensing against Sybil Attacks Using Cloud Based Trust Management System

    Directory of Open Access Journals (Sweden)

    Shih-Hao Chang

    2016-01-01

    Full Text Available Mobile crowd sensing (MCS arises as a new sensing paradigm, which leverages citizens for large-scale sensing by various mobile devices to efficiently collect and share local information. Unlike other MCS application challenges that consider user privacy and data trustworthiness, this study focuses on the network trustworthiness problem, namely, Sybil attacks in MCS network. The Sybil attack in computer security is a type of security attack, which illegally forges multiple identities in peer-to-peer networks, namely, Sybil identities. These Sybil identities will falsify multiple identities that negatively influence the effectiveness of sensing data in this MCS network or degrading entire network performance. To cope with this problem, a cloud based trust management scheme (CbTMS was proposed to detect Sybil attacks in the MCS network. The CbTMS was proffered for performing active and passive checking scheme, in addition to the mobile PCS trustworthiness management, and includes a decision tree algorithm, to verify the covered nodes in the MCS network. Simulation studies show that our CbTMS can efficiently detect the malicious Sybil nodes in the network and cause 6.87 Wh power reduction compared with other malicious Sybil node attack mode.

  6. Personae of interest - managers' identities and the online mirror

    NARCIS (Netherlands)

    Ranzini, G; Fieseler, C.

    2013-01-01

    Purpose - In this chapter we discuss the implications social media have for the selfrepresentation and identity formulation of professionals within organizations. Under the assumption that new, technology-mediated networking possibilities call for a reformulation of the boundaries between the

  7. Choosing fatherhood: how teens in the justice system embrace or reject a father identity.

    Science.gov (United States)

    Shade, Kate; Kools, Susan; Pinderhughes, Howard; Weiss, Sandra J

    2012-01-01

    The purpose of this qualitative study was to further the understanding of father identity and role development among adolescents involved in the justice system. Youth who were expecting a child or parenting an infant and who were incarcerated, arrested, or had admitted to criminal behavior participated in interviews and observations in a juvenile detention center and in the community. Data analysis revealed 4 patterns of fathering intentions: (a) embracing fatherhood, (b) being barred from fatherhood, (c) being ambivalent about fatherhood, or (d) rejecting fatherhood. Community health nurses can use this information to assess father identity status and address factors that interfere with father engagement. Copyright © Taylor & Francis Group, LLC

  8. Reimagining the self at late-career transitions: how identity threat influences academic physicians' retirement considerations.

    Science.gov (United States)

    Onyura, Betty; Bohnen, John; Wasylenki, Don; Jarvis, Anna; Giblon, Barney; Hyland, Robert; Silver, Ivan; Leslie, Karen

    2015-06-01

    There is scant empirical work exploring academic physicians' psychosocial adjustment during late-career transitions or on the factors that influence their retirement decisions. The authors examine these issues through the lens of sociopsychological identity theory, specifically examining how identity threat influences academic physicians' decisions about retirement. Participants were academic physicians at a Canadian medical school and were recruited via e-mail requests for clinical faculty interested in discussing late-career and retirement planning issues. Participants included 15 males and 6 females (N = 21; mean age = 63, standard deviation = 7.54), representing eight specialties (clinical and surgical). Data were collected in October and November 2012 via facilitated focus groups, which were digitally recorded, transcribed verbatim, and anonymized, then analyzed using thematic analysis. Four primary themes were identified: centrality of occupational identity, experiences of identity threat, experiences of aging in an indifferent system, and coping with late-career transitions. Identity threats were manifested in apprehensions about self-esteem after retirement, practice continuity, and clinical competence, as well as in a loss of meaning and belonging. These identity challenges influenced decisions on whether to retire. Organizational and system support was perceived as wanting. Coping strategies included reimagining and revaluing various aspects of the self through assimilating new activities and reprioritizing others. Identity-related struggles are a significant feature of academic physicians' considerations about late-career transitions. Understanding these challenges, their antecedents, and their consequences can prepare faculty, and their institutions, to better manage late-career transitions. Individual- and institution-level implications are discussed.

  9. Noether identities at the quantum level

    International Nuclear Information System (INIS)

    Li Ziping

    2002-01-01

    Based on the phase-space generating functional of Green function, the canonical Noether identities under the local transformation at the quantum level have been derived. For the gauge-invariant system, the quantal Noether identities in configuration space have been also deduced. It is pointed out that in certain cases the quantal Noether identities may be converted to quantal conservation laws of the system. This method for obtaining the quantal conservation laws is significantly different from the first Noether theorem at the quantum level. The application to non-Abelian CS theories is studied, the quantal conserved BRS and PBRS charges are obtained, and these two conserved charges are totally different

  10. Managing two cultural identities: the malleability of bicultural identity integration as a function of induced global or local processing.

    Science.gov (United States)

    Mok, Aurelia; Morris, Michael W

    2012-02-01

    Increasingly, individuals identify with two or more cultures. Prior research has found the degree to which individuals chronically integrate these identities (bicultural identity integration; BII) moderates responses to cultural cues: High BII individuals assimilate (adopting biases that are congruent with norms of the cued culture), whereas low BII individuals contrast (adopting biases that are incongruent with these norms). The authors propose BII can also be a psychological state and modulated by shifts in processing styles. In four experiments, the authors induced a global or local processing style using physical posture (Experiment 1) and cognitive manipulations (Experiments 2-4) and found that BII is enhanced in contexts facilitating a more global processing style (i.e., smiling, high-level construal, and similarity focus). The authors also found that contrastive responses to cultural cues are diminished when BII is situationally enhanced. Implications for research on processing style, identity integration, and performance in culture-based situations are discussed.

  11. Heartcore Business? A study of the challenges social enterprises experience when communicating their corporate identity

    DEFF Research Database (Denmark)

    Schmeltz, Line

    The aim of this paper is thus to investigate social businesses’ communication of identity in their corporate communication. Institutional theory (e.g. DiMaggio & Powel, 1983), and especially the notion of legitimacy (Deephouse and Carter, 2005; Meyer and Rowan, 1977; Suchman, 1995), provides...... responsibility values, or if they are working with two, or even more, different value systems. Accordingly, the assumption put forward by this paper is that a high degree of alignment between identity and social responsibility in the enterprise’s corporate communication will enable the enterprises to communicate...... the frame for understanding and exploring the enterprises’ communication in an organizational context. Hence, through a value-theoretical framework, the study seeks to identify the extent to which these enterprises manage to create alignment between their corporate identity values and their social...

  12. Juggling identities of rheumatoid arthritis, motherhood and paid work - a grounded theory study.

    Science.gov (United States)

    Feddersen, Helle; Mechlenborg Kristiansen, Tine; Tanggaard Andersen, Pernille; Hørslev-Petersen, Kim; Primdahl, Jette

    2018-02-01

    To explore how women with rheumatoid arthritis manage their illness, motherhood, and work life. A constructivist, grounded theory approach based on individual interviews and participant observations with 20 women with rheumatoid arthritis who participated in work life and had children living at home or were pregnant. After initial and focused coding Goffman's concepts of social identity were applied. A core category: "Juggling meaningful identities" and three conceptual categories were developed: (1) Work life as the strongest identity marker; (2) Motherhood: a two-sided act; (3) Living with rheumatoid arthritis as an identity? Paid work, motherhood, and illness are linked to the women's social identities. The women construct and change their identities in interactions with children, partners, other parents, colleagues, and employers. The women attribute the highest priority to their professional identity, spending the majority of their time and energy in an effort to appear as "good stable workers". The disease is seen as a hindrance in this regard, and the illness identity is almost completely rejected. In motherhood, the women prioritize close interaction with their children, and deprioritize external activities. Extended outbreaks of the disease and issues regarding the children force the women to deprioritize working life. Implications for rehabilitation Juggling meaningful identities of rheumatoid arthritis, motherhood, and paid work challenge women in managing their everyday lives. Therefore, rehabilitation professionals should support individuals to develop new strategies to manage the challenges they experience regarding juggling motherhood and work ability. Work is a dominant identity marker for women with rheumatoid arthritis therefore, rehabilitation professionals have an important role to play in investigating possible ways for the individual to maintain employment or return to work. Living with rheumatoid arthritis and being a paid worker challenge

  13. Management information systems

    Energy Technology Data Exchange (ETDEWEB)

    Crump, K.

    1978-01-01

    An Australian university architect studying management information systems programs at academic institutions in the United States visited 26 universities and colleges and nine educational and professional associations, including extended visits at the University of Wisconsin and the National Center of Higher Education Management Systems. During these visits, he investigated university and college space utilization programs, gained operational and developmental experience at institutions with education philosophies similar to those in Australia, and examined trends in low cost student housing. This report of his observations focusses on management information systems projects throughout the academic community, resource accountability, energy conservation, facilities planning for the handicapped, student housing, and interdisciplinary approaches to education.

  14. 21 CFR 21.44 - Verification of identity.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 1 2010-04-01 2010-04-01 false Verification of identity. 21.44 Section 21.44 Food... Verification of identity. (a) An individual seeking access to records in a Privacy Act Record System may be... identity. The identification required shall be suitable considering the nature of the records sought. No...

  15. Managing Conflict in Temporary Management Systems

    Science.gov (United States)

    Wilemon, David L.

    1973-01-01

    As organizational tasks have grown more complex, several innovative temporary management systems such as matrix management have been developed. The Apollo space program has been an important contribution to the development of matrix management techniques. Discusses the role of conflict within the matrix, its determinants, and the process of…

  16. Secondary Uses of Personal Identity Information: Policies, Technologies and Regulatory Framework

    DEFF Research Database (Denmark)

    Adjei, Joseph K.; Olesen, Henning

    2012-01-01

    Although personal identity information must primarily be used for protecting and promoting the physical needs of individuals, it has also become central to the business models of the digital age due to its use for other secondary purposes, resulting in various innovative identity management (Id...

  17. Recognition of social identity in ants

    DEFF Research Database (Denmark)

    Bos, Nick; d'Ettorre, Patrizia

    2012-01-01

    Recognizing the identity of others, from the individual to the group level, is a hallmark of society. Ants, and other social insects, have evolved advanced societies characterized by efficient social recognition systems. Colony identity is mediated by colony specific signature mixtures, a blend...

  18. Management systems in production operations

    International Nuclear Information System (INIS)

    Walters, K.B.; Henderson, G.

    1993-01-01

    The Cullen Enquiry into the Piper Alpha disaster in the U.K. North Sea recommended that an operator should formally present it's company Management System and demonstrate how safety is achieved throughout the life cycle of a platform, from design through operation to abandonment. Brunei Shell Petroleum has prepared a corporate level Safety Management System. As part of Safety Case work, the corporate system is being extended to include the development of specific Management Systems with particular emphasis on offshore production operations involving integrated oil and gas facilities. This paper will describe the development of Management Systems, which includes an intensive Business Process Analysis and will comment upon it's applicability and relationship to ISO 9000. The paper will further describe the applicability and benefits of Management Systems and offer guidance on required effort. The paper will conclude that development of structured Management Systems for safety critical business processes is worthwhile but prioritization of effort will be necessary. As such the full adoption of Management Systems will be directional in nature

  19. Management Information Systems Research.

    Science.gov (United States)

    Research on management information systems is illusive in many respects. Part of the basic research problem in MIS stems from the absence of standard...decision making. But the transition from these results to the realization of ’satisfactory’ management information systems remains difficult indeed. The...paper discusses several aspects of research on management information systems and reviews a selection of efforts that appear significant for future progress. (Author)

  20. Distinctive identity claims in federal systems: Judicial policing of subnational variance

    DEFF Research Database (Denmark)

    Abat Ninet, Antoni; Gardner, James A.

    2016-01-01

    nationally imposed limits on their power typically have at their disposal many tools with which to press against formal boundaries. Federal systems, moreover, frequently display a surprising degree of tolerance for subnational obstruction, disobedience, and other behaviors intended to expand subnational...... authority and influence, even over national objection. This tolerance, however, has limits. In this article, we examine a set of rulings by national constitutional courts invalidating formalized claims by subnational units to a distinctive subnational identity. The emphatically negative reactions...

  1. Construction Management Risk System (CMRS for Construction Management (CM Firms

    Directory of Open Access Journals (Sweden)

    Kyungmo Park

    2017-02-01

    Full Text Available After the global financial crisis of 2008, the need for risk management arose because it was necessary to minimize the losses in construction management (CM firms. This was caused by a decreased amount of orders in the Korean CM market, which intensified order competition between companies. However, research results revealed that risks were not being systematically managed owing to the absence of risk management systems. Thus, it was concluded that it was necessary to develop standard operating systems and implement risk management systems in order to manage risks effectively. Therefore, the purpose of this study was to develop a construction risk management system (CRMS for systematically managing risks. For this purpose, the field operation managers of CM firms were interviewed and surveyed in order to define risk factors. Upon this, a risk assessment priority analysis was performed. Finally, a risk management system that comprised seven modules and 20 sub-modules and was capable of responding systematically to risks was proposed. Furthermore, the effectiveness of this system was verified through on-site inspection. This system allows early response to risks, accountability verification and immediate response to legal disputes with clients by managing risk records.

  2. Development of Information Management System for Plant Life Cycle Management

    International Nuclear Information System (INIS)

    Byon, SuJin; Lee, SangHyun; Kim, WooJoong

    2015-01-01

    The study subjects are S. Korean NPP(Nuclear Power Plant) construction projects. Design, construction, operations companies have different nuclear power plant construction project structures, and each company has its own Information Management System. In this study, the end user developed an Information Management System early in the project, and developed a management structure that systematically integrates and interfaces with information in each lifecycle phase. The main perspective of Information Management is moving from the existent document-centric management to the data-centric management. To do so, we intend to integrate information with interfaces among systems. Integrated information management structure and management system are essential for an effective management of the lifecycle information of nuclear power plants that have a lifespan over as much as 80 years. The concept of integration management adopted by the defence, ocean industries or various PLM solution providers is important. Although the NPP project has application systems in each key lifecycle phase, it is more effective to develop and use PLIMS in consideration of the interface and compatibility of information among systems. As an initial study for development of that integrated information management structure, this study is building the system and has interfaced it with a design-stage system

  3. Development of Information Management System for Plant Life Cycle Management

    Energy Technology Data Exchange (ETDEWEB)

    Byon, SuJin; Lee, SangHyun; Kim, WooJoong [KOREA HYDRO and NUCLEAR POWER CO. LTD, Daejeon (Korea, Republic of)

    2015-10-15

    The study subjects are S. Korean NPP(Nuclear Power Plant) construction projects. Design, construction, operations companies have different nuclear power plant construction project structures, and each company has its own Information Management System. In this study, the end user developed an Information Management System early in the project, and developed a management structure that systematically integrates and interfaces with information in each lifecycle phase. The main perspective of Information Management is moving from the existent document-centric management to the data-centric management. To do so, we intend to integrate information with interfaces among systems. Integrated information management structure and management system are essential for an effective management of the lifecycle information of nuclear power plants that have a lifespan over as much as 80 years. The concept of integration management adopted by the defence, ocean industries or various PLM solution providers is important. Although the NPP project has application systems in each key lifecycle phase, it is more effective to develop and use PLIMS in consideration of the interface and compatibility of information among systems. As an initial study for development of that integrated information management structure, this study is building the system and has interfaced it with a design-stage system.

  4. Islamic Identity and Competitive Identities (Global, National and Ethnic Identity; A Case Study of Shiraz University Students

    Directory of Open Access Journals (Sweden)

    Mohammadtaghi Iman

    2013-06-01

    Full Text Available The verse of holy Koran "verily the most honored of you in the sight of Allah is [he who is] the most virtuous of you" directly shows that in god's willing there is no superiority of a man or a group than others except those who have piety to god. In fact, the Islamic identity focuses on the superiority of piety among humans and does not focus on superiority of a man or a group that causes Islamic identity theoretically be against other competitive identities such as ethnic, global and national identity. Therefore, this research aims to study the relationship between Islamic identity and competitive identities (ethnic, national and global. In this way based on Sheldon Stryker theory and survey method, 431 students have elected and have analyzed. The results have shown that there was positive significant relationship between Islamic identity, national and ethnic identity, and negative significant relationship between Islamic identity and global identity. In addition, multivariate regression results have shown that the variables national and global identities have explained 45 percent of the variation of Islamic identity variable. The results shows that national and ethnic identity amplify the Islamic identity and they have positive relationship with it and in fact they are not a competitive identity for Islamic identity but global identity has negative relationship with Islamic identity and therefore it is a competitive identity for Islamic identity.

  5. Material Construction of Care Workers’ Identity

    Directory of Open Access Journals (Sweden)

    Sanna Laulainen

    2016-03-01

    Full Text Available This article takes a critical look at the unconscious and unnoticed effects of materiality on care workers’ identity. The data was collected through nonactive role-playing using written accounts, in which the respondents described how they felt about working in fictitious ‘good’ or ‘bad’ elderly care homes. The data was analyzed with rhetorical analysis. Five different identity strategies were identified in the accounts. Strong professional identity was defended by downplaying the significance of materiality. Adjustment and passive compliance were used to adjust to physical shortcomings of the work environment. A ‘rebellion’ was described as an extreme course of action to resolve the contradiction between good care and poor facilities. At its best, the materiality of care homes, in particular homelikeness, seemed to support professional identity. These identity strategies illustrate how care workers balance between the physical realities of care homes and the requirements of the ethos of care, which are often incompatible with each other. It is crucial that managers as well as workers themselves recognize and acknowledge these connections affecting motivation and commitment to care work. Investments in better environments could be one way to improve the image and the attractiveness of the care branch and relieve the recruitment problems.

  6. Identity and Conflict: Personality, Sociality and Culturality

    Directory of Open Access Journals (Sweden)

    Rik Pinxten

    1997-05-01

    Full Text Available We presented a model which describes the field of questions on identity as a field of dynamics. It is structured by means of particular, temporal configurations of identity through time and space. The theory of dynamic systems provides us with precise models for the representation of forms of identity, or of their evolution towards types of so-called chaos, given certain conditions. The model allows us to work in a comparative perspective, which is a sure advantage in conflict analysis. The complexity of identity phenomena is captured covering individual, group and community dynamics of identity.

  7. Corporate Brand Identity Development in SMEs

    DEFF Research Database (Denmark)

    Gyrd-Jones, Richard; Törmälä, Minna

    2016-01-01

    We study the interactive narratives that underpin the emergence of corporate brand identity in new venture SMEs. We apply a process perspective that considers the complex interactions between layers of identities and sense-making in and around the organisation in the stakeholder eco-system. We...

  8. Integrated Approach to User Account Management

    Science.gov (United States)

    Kesselman, Glenn; Smith, William

    2007-01-01

    IT environments consist of both Windows and other platforms. Providing user account management for this model has become increasingly diffi cult. If Microsoft#s Active Directory could be enhanced to extend a W indows identity for authentication services for Unix, Linux, Java and Macintosh systems, then an integrated approach to user account manag ement could be realized.

  9. Strategic management of health care information systems: nurse managers' perceptions.

    Science.gov (United States)

    Lammintakanen, Johanna; Kivinen, Tuula; Saranto, Kaija; Kinnunen, Juha

    2009-01-01

    The aim of this study is to describe nurse managers' perceptions of the strategic management of information systems in health care. Lack of strategic thinking is a typical feature in health care and this may also concern information systems. The data for this study was collected by eight focus group interviews including altogether 48 nurse managers from primary and specialised health care. Five main categories described the strategic management of information systems in health care; IT as an emphasis of strategy; lack of strategic management of information systems; the importance of management; problems in privacy protection; and costs of IT. Although IT was emphasised in the strategies of many health care organisations, a typical feature was a lack of strategic management of information systems. This was seen both as an underutilisation of IT opportunities in health care organisations and as increased workload from nurse managers' perspective. Furthermore, the nurse managers reported that implementation of IT strengthened their managerial roles but also required stronger management. In conclusion, strategic management of information systems needs to be strengthened in health care and nurse managers should be more involved in this process.

  10. Universality of Schmidt decomposition and particle identity

    Science.gov (United States)

    Sciara, Stefania; Lo Franco, Rosario; Compagno, Giuseppe

    2017-03-01

    Schmidt decomposition is a widely employed tool of quantum theory which plays a key role for distinguishable particles in scenarios such as entanglement characterization, theory of measurement and state purification. Yet, its formulation for identical particles remains controversial, jeopardizing its application to analyze general many-body quantum systems. Here we prove, using a newly developed approach, a universal Schmidt decomposition which allows faithful quantification of the physical entanglement due to the identity of particles. We find that it is affected by single-particle measurement localization and state overlap. We study paradigmatic two-particle systems where identical qubits and qutrits are located in the same place or in separated places. For the case of two qutrits in the same place, we show that their entanglement behavior, whose physical interpretation is given, differs from that obtained before by different methods. Our results are generalizable to multiparticle systems and open the way for further developments in quantum information processing exploiting particle identity as a resource.

  11. Medical-Information-Management System

    Science.gov (United States)

    Alterescu, Sidney; Friedman, Carl A.; Frankowski, James W.

    1989-01-01

    Medical Information Management System (MIMS) computer program interactive, general-purpose software system for storage and retrieval of information. Offers immediate assistance where manipulation of large data bases required. User quickly and efficiently extracts, displays, and analyzes data. Used in management of medical data and handling all aspects of data related to care of patients. Other applications include management of data on occupational safety in public and private sectors, handling judicial information, systemizing purchasing and procurement systems, and analyses of cost structures of organizations. Written in Microsoft FORTRAN 77.

  12. Cognitive Hacking and Digital Government: Digital Identity

    Directory of Open Access Journals (Sweden)

    Paul Thompson

    2004-04-01

    Full Text Available Recently the National Center for Digital Government held a workshop on "The Virtual Citizen: Identity, Autonomy, and Accountability: A Civic Scenario Exploration of the Role of Identity in On-Line. Discussions at the workshop focused on five scenarios for future authentication policies with respect to digital identity. The underlying technologies considered for authentication were: biometrics: cryptography, with a focus on digital signatures; secure processing/computation; and reputation systems. Most discussion at the workshop focused on issues related to authentication of users of digital government, but, as implied by the inclusion of a scenario related to ubiquitous identity theft, there was also discussion of problems related to misinformation, including cognitive hacking. Cognitive hacking refers to a computer or information system attack that relies on changing human users' perceptions and corresponding behaviors in order to succeed. This paper describes cognitive hacking, suggests countermeasures, and discusses the implications of cognitive hacking for identity in digital government. In particular, spoofing of government websites and insider misuse are considered.

  13. Illness Identity in Adults with a Chronic Illness.

    Science.gov (United States)

    Oris, Leen; Luyckx, Koen; Rassart, Jessica; Goubert, Liesbet; Goossens, Eva; Apers, Silke; Arat, Seher; Vandenberghe, Joris; Westhovens, René; Moons, Philip

    2018-02-21

    The present study examines the concept of illness identity, the degree to which a chronic illness is integrated into one's identity, in adults with a chronic illness by validating a new self-report questionnaire, the Illness Identity Questionnaire (IIQ). Self-report questionnaires on illness identity, psychological, and physical functioning were assessed in two samples: adults with congenital heart disease (22-78 year old; n = 276) and with multisystem connective tissue disorders (systemic lupus erythematosus or systemic sclerosis; 17-81 year old; n = 241). The IIQ could differentiate four illness identity states (i.e., engulfment, rejection, acceptance, and enrichment) in both samples, based on exploratory and confirmatory factor analysis. All four subscales proved to be reliable. Rejection and engulfment were related to maladaptive psychological and physical functioning, whereas acceptance and enrichment were related to adaptive psychological and physical functioning. The present findings underscore the importance of the concept of illness identity. The IIQ, a self-report questionnaire, is introduced to measure four different illness identity states in adults with a chronic illness.

  14. Constructing nurses' professional identity through social identity theory.

    Science.gov (United States)

    Willetts, Georgina; Clarke, David

    2014-04-01

    The profession of nursing continues to struggle with defining and clarifying its professional identity. The definitive recognition of nursing as a profession was the moving of training from the hospital apprentice model to the tertiary sector. However, this is only part of the story of professional identity in nursing. Once training finishes and enculturation into the workplace commences, professional identity becomes a complicated social activity. This paper proposes social identity theory as a valuable research framework to assist with clarifying and describing the professional identity of nurses. The paper outlines the key elements of a profession and then goes on to describe the main concepts of social identity theory. Lastly, a connection is made between the usefulness of using social identity theory in researching professional identity in nursing, recognizing the contextual nature of the social activity of the profession within its workplace environment. © 2013 Wiley Publishing Asia Pty Ltd.

  15. OpenADAM: an open source genome-wide association data management system for Affymetrix SNP arrays

    Directory of Open Access Journals (Sweden)

    Sham P C

    2008-12-01

    Full Text Available Abstract Background Large scale genome-wide association studies have become popular since the introduction of high throughput genotyping platforms. Efficient management of the vast array of data generated poses many challenges. Description We have developed an open source web-based data management system for the large amount of genotype data generated from the Affymetrix GeneChip® Mapping Array and Affymetrix Genome-Wide Human SNP Array platforms. The database supports genotype calling using DM, BRLMM, BRLMM-P or Birdseed algorithms provided by the Affymetrix Power Tools. The genotype and corresponding pedigree data are stored in a relational database for efficient downstream data manipulation and analysis, such as calculation of allele and genotype frequencies, sample identity checking, and export of genotype data in various file formats for analysis using commonly-available software. A novel method for genotyping error estimation is implemented using linkage disequilibrium information from the HapMap project. All functionalities are accessible via a web-based user interface. Conclusion OpenADAM provides an open source database system for management of Affymetrix genome-wide association SNP data.

  16. Integrated management system

    International Nuclear Information System (INIS)

    Florescu, N.

    2003-01-01

    A management system is developed in order to reflect the needs of the business and to ensure that the objectives of the organization will be achieved. The process model and each individual process within the system then needs to identify the drives or requirements from external customers and stakeholders, regulations, and standards such as ISO and 50-C-Q. The processes are then developed to address these drivers. Developing the process in this way makes it fully integrated and capable of incorporating any new requirements. The International Standard (ISO 9000:2000) promotes the adoption of a process approach when developing, implementing and improving the effectiveness of a quality management system to enhance customer satisfaction by meeting customer requirements. The IAEA Code recognizes that the entire work is a process which can be planned, assessed and improved. For an organization to function effectively, numerous linked activities have to be identified and managed. By definition a process is an activity that using resources and taking into account all the constraints imposed executes the necessary operations which transform the inputs in outcomes. Running a system of processes within an organization, identification of the interaction between the processes and their management can be referred to as a 'process approach'. The advantage of such an approach is the ensuring of the ongoing control over the linkage between the individual processes composing the system as well as over their combination and interaction. Developing a management system implies: identification of the process which delivers Critical Success Factor (CSFs) of the business; identifying the support processes enabling the CSFs to be accomplished; identifying the processes that deliver the business fundamentals. An integrated management system should include all activities not only those related to Quality, Health and Safety. When developing an IMS it is necessary to identify all of the drivers

  17. Quantum entanglement of identical particles

    International Nuclear Information System (INIS)

    Shi Yu

    2003-01-01

    We consider entanglement in a system with a fixed number of identical particles. Since any operation should be symmetrized over all the identical particles and there is the precondition that the spatial wave functions overlap, the meaning of identical-particle entanglement is fundamentally different from that of distinguishable particles. The identical-particle counterpart of the Schmidt basis is shown to be the single-particle basis in which the one-particle reduced density matrix is diagonal. But it does not play a special role in the issue of entanglement, which depends on the single-particle basis chosen. The nonfactorization due to (anti)symmetrization is naturally excluded by using the (anti)symmetrized basis or, equivalently, the particle number representation. The natural degrees of freedom in quantifying the identical-particle entanglement in a chosen single-particle basis are occupation numbers of different single-particle basis states. The entanglement between effectively distinguishable spins is shown to be a special case of the occupation-number entanglement

  18. STORYTELLING AND UNIVERSITY BRANDING IDENTITY

    Directory of Open Access Journals (Sweden)

    ANDREEA MONICA STATE

    2016-08-01

    Full Text Available The present article sets out to clarify the concepts of storytelling and branding, with a focus on university branding and visual identity – the latter being a vital element to a brand’s uniqueness. Storytelling is an important method of brand construction, and it entails a strong power of seduction. Branding is increasingly more about storytelling. Practically, a story is an image made up of facts, feelings and interpretations, which are often told to us solely by the university itself. As such, the brand appears on the market accompanied by its identity. Identity is what we aim to express with help of the brand. Implementing a system of visual identity that would help to harmoniously develop a university brand requires a handbook of visual identity. The present article aims to be a starting point for such a handbook serving the University of Bucharest, which currently does not own such a handbook

  19. The Scanfin Merger: a Matter of Culture and Identity (Case A)

    DEFF Research Database (Denmark)

    Smith, Pernille; Carugati, Andrea; Giangreco, Antonio

    and middle managers reacted to the merger. The issues in this case are culture and identity. What are the implications when companies from four different countries merge? What role does differing cultures (national or organisational) play in the process and how does this affect the identity of the company...

  20. Current management of gender identity disorder in childhood and adolescence: guidelines, barriers and areas of controversy.

    Science.gov (United States)

    Shumer, Daniel E; Spack, Norman P

    2013-02-01

    The approach to gender identity disorder (GID) in childhood and adolescence has been rapidly evolving and is in a state of flux. In an effort to form management recommendations on the basis of the available literature, The Endocrine Society published clinical practice guidelines in 2009. The guidelines recommend against sex role change in prepubertal children, but they recommend the use of gonadotropin-releasing hormone (GnRH) agonists to suppress puberty in adolescence, and the use of cross-sex hormones starting around age 16 for eligible patients. In actual practice, the approach to GID is quite variable due to continued lack of consensus and specific barriers to treatment that are unique to GID. Recent literature has focused on the mental health approach to prepubertal children with GID and short-term outcomes using pubertal suppression and cross-sex steroids in adolescents with GID. This review will describe the literature published since the release of The Endocrine Society guidelines regarding the management of GID in both children and adolescents.

  1. Implementation of an RBF neural network on embedded systems: real-time face tracking and identity verification.

    Science.gov (United States)

    Yang, Fan; Paindavoine, M

    2003-01-01

    This paper describes a real time vision system that allows us to localize faces in video sequences and verify their identity. These processes are image processing techniques based on the radial basis function (RBF) neural network approach. The robustness of this system has been evaluated quantitatively on eight video sequences. We have adapted our model for an application of face recognition using the Olivetti Research Laboratory (ORL), Cambridge, UK, database so as to compare the performance against other systems. We also describe three hardware implementations of our model on embedded systems based on the field programmable gate array (FPGA), zero instruction set computer (ZISC) chips, and digital signal processor (DSP) TMS320C62, respectively. We analyze the algorithm complexity and present results of hardware implementations in terms of the resources used and processing speed. The success rates of face tracking and identity verification are 92% (FPGA), 85% (ZISC), and 98.2% (DSP), respectively. For the three embedded systems, the processing speeds for images size of 288 /spl times/ 352 are 14 images/s, 25 images/s, and 4.8 images/s, respectively.

  2. Business advertisements management system

    OpenAIRE

    Rekel, Ernest

    2017-01-01

    Business Advertisements Management System The main goal of the project was to create a business advertisements management system, where users could easily create and find business advertisements. To accomplish this goal exist- ing systems were analyzed as well as their limitations. The end result is a working system which is able to store and proccess huge amount of data.

  3. Pembangunan Model Restaurant Management System

    OpenAIRE

    Fredy Jingga; Natalia Limantara

    2014-01-01

    Model design for Restaurant Management System aims to help in restaurant business process, where Restaurant Management System (RMS) help the waitress and chef could interact each other without paper limitation.  This Restaurant Management System Model develop using Agile Methodology and developed based on PHP Programming Langguage. The database management system is using MySQL. This web-based application model will enable the waitress and the chef to interact in realtime, from the time they a...

  4. CAH AMPERA: HYBRID IDENTITY OF KAMPUNG YOUTHS IN NEGOTIATING CITIZENSHIP

    Directory of Open Access Journals (Sweden)

    Subando Agus Margono

    2014-06-01

    Full Text Available This article attempts to investigate the negotiating process for citizenship of a group of youths facing entrenched social, cultural, and political exclusion. It examines the phenomenon of citizenship negotiation based on stigmatized position of exluded youths. It was found that despite overwhelming odds, the youths use their hybrid identity, which is a manifestation of cah Ampera identity. They succeed in managing the antagonism and affiliation. The citizenship of cah Ampera ismanaged through symbolic capital and action in village micro politics. Success is reflected in their ability to manage their relations with adults, employment, and their young world.

  5. Senior Management Use of Management Control Systems in Large Companies

    DEFF Research Database (Denmark)

    Willert, Jeanette; Israelsen, Poul; Rohde, Carsten

    2017-01-01

    Ferreira and Otley’s (2009) conceptual and holistic framework for performance management systems, supplemented by elements of contextual factors and organisational culture. Further, selected researchers’ perceptions of the purpose of using management control systems are related to practitioners’ ideas......The use of management control systems in large companies remains relatively unexplored. Indeed, only a few studies of senior managers’ use of management control systems consider multiple controls in companies. This paper explores data from a comprehensive survey of the use of management control...... systems in 120 strategic business units at some of the largest companies in Denmark. The paper identifies how senior management guides and controls their subordinates to meet their companies’ objectives. The presentation and discussion of the results, including citations from executive managers, use...

  6. Materials management information systems.

    Science.gov (United States)

    1996-01-01

    The hospital materials management function--ensuring that goods and services get from a source to an end user--encompasses many areas of the hospital and can significantly affect hospital costs. Performing this function in a manner that will keep costs down and ensure adequate cash flow requires effective management of a large amount of information from a variety of sources. To effectively coordinate such information, most hospitals have implemented some form of materials management information system (MMIS). These systems can be used to automate or facilitate functions such as purchasing, accounting, inventory management, and patient supply charges. In this study, we evaluated seven MMISs from seven vendors, focusing on the functional capabilities of each system and the quality of the service and support provided by the vendor. This Evaluation is intended to (1) assist hospitals purchasing an MMIS by educating materials managers about the capabilities, benefits, and limitations of MMISs and (2) educate clinical engineers and information system managers about the scope of materials management within a healthcare facility. Because software products cannot be evaluated in the same manner as most devices typically included in Health Devices Evaluations, our standard Evaluation protocol was not applicable for this technology. Instead, we based our ratings on our observations (e.g., during site visits), interviews we conducted with current users of each system, and information provided by the vendor (e.g., in response to a request for information [RFI]). We divided the Evaluation into the following sections: Section 1. Responsibilities and Information Requirements of Materials Management: Provides an overview of typical materials management functions and describes the capabilities, benefits, and limitations of MMISs. Also includes the supplementary article, "Inventory Cost and Reimbursement Issues" and the glossary, "Materials Management Terminology." Section 2. The

  7. The Stress Management in the Enterprise Management System

    Directory of Open Access Journals (Sweden)

    Kuzmin Oleh Ye.

    2017-05-01

    Full Text Available The article systematizes the classification of the type of management by a number of attributes: horizon of ambition, priority style of interaction between management and managed systems, level of centralization, orientation, consideration of environmental impact, contents, type of activity, and response to deviation. Within terms of the attribute of response to deviations, place of the stress management is allocated near to the harmonic and the risk management. It has been substantiated that the stress management is the enterprise management system aimed at overcoming unwanted deviations that are significant, extreme, and have a significant negative impact on the operation of enterprise. In the structure of the stress management, the following integral components have been allocated and characterized: crisis, adaptive, reactive, fears, and anticipative.

  8. Role of Education in Promoting National Identity Indicators

    Directory of Open Access Journals (Sweden)

    Mohammad Baqer Alizadeh Aghdam

    2010-04-01

    Full Text Available This article reviews social identity among students of secondary school with emphasis on national identity. This paper is to answer how we can increase students` belonging to national identity. Two high school students in two areas of Zanjan city with 700 people are the sample of this study which 30 persons were selected to attend the workshop. This research, based on objective, is practical and problem solving and based on time is longitudinal and panel study. The Research method is qualitative and the technique is based on PCM (Project Cycle Management. Theoretically, Tajfle, Giddens, Jenkins and Pyter Burk`s approaches are used in addition to micro, macro and combinational perspectives. Data collection in this study is through workshop and questionnaire. Research findings showed that students` belonging to national Identity have 10 percent increases since the workshop performance. Belonging to the national identity in male students has increased to 15 percent and in female students 5 percent after the workshop. Both female and male students` belongings to national identity have doubled after the workshop. Moreover, students’ familiarity with Iranian national figures, elements of national culture, the historical and national monuments and some national myths, which are all elements of national identity, have doubled after the workshop.

  9. Brief report: The Utrecht-Management of Identity Commitments Scale (U-MICS) : Gender and age measurement invariance and convergent validity of the Turkish version

    NARCIS (Netherlands)

    Morsunbul, Umit; Crocetti, Elisabetta; Cok, Figen; Meeus, W.H.J.

    2014-01-01

    The purpose of this study was to evaluate the factor structure and convergent validity of the Turkish version of the Utrecht-Management of Identity Commitments Scale (U-MICS). Participants were 1201 (59.6% females) youth aged between 12 and 24 years (Mage = 17.53 years, SDage = 3.25). Results

  10. Resolving an identity crisis: Implicit drinking identity and implicit alcohol identity are related but not the same.

    Science.gov (United States)

    Ramirez, Jason J; Olin, Cecilia C; Lindgren, Kristen P

    2017-09-01

    Two variations of the Implicit Association Test (IAT), the Drinking Identity IAT and the Alcohol Identity IAT, assess implicit associations held in memory between one's identity and alcohol-related constructs. Both have been shown to predict numerous drinking outcomes, but these IATs have never been directly compared to one another. The purpose of this study was to compare these IATs and evaluate their incremental predictive validity. US undergraduate students (N=64, 50% female, mean age=21.98years) completed the Drinking Identity IAT, the Alcohol Identity IAT, an explicit measure of drinking identity, as well as measures of typical alcohol consumption and hazardous drinking. When evaluated in separate regression models that controlled for explicit drinking identity, results indicated that the Drinking Identity IAT and the Alcohol Identity IAT were significant, positive predictors of typical alcohol consumption, and that the Drinking Identity IAT, but not the Alcohol Identity IAT, was a significant predictor of hazardous drinking. When evaluated in the same regression models, the Drinking Identity IAT, but not the Alcohol Identity IAT, was significantly associated with typical and hazardous drinking. These results suggest that the Drinking Identity IAT and Alcohol Identity IAT are related but not redundant. Moreover, given that the Drinking Identity IAT, but not the Alcohol Identity IAT, incrementally predicted variance in drinking outcomes, identification with drinking behavior and social groups, as opposed to identification with alcohol itself, may be an especially strong predictor of drinking outcomes. Copyright © 2017 Elsevier Ltd. All rights reserved.

  11. Marketing identities: Shifting circles of identification in inter-organizational relationships

    NARCIS (Netherlands)

    Ellis, N.; Ybema, S.B.

    2010-01-01

    This study explores the discursive positioning of managers involved in inter-organizational relationships (IORs) within industrial supply chains. In closely examining a series of interviews, we find a number of interpretive repertoires of boundary construction used in IOR managers' identity

  12. A Formal Model of Identity Mixer

    DEFF Research Database (Denmark)

    Camenisch, Jan; Mödersheim, Sebastian Alexander; Sommer, Dieter

    2010-01-01

    Identity Mixer is an anonymous credential system developed at IBM that allows users for instance to prove that they are over 18 years old without revealing their name or birthdate. This privacy-friendly tech- nology is realized using zero-knowledge proofs. We describe a formal model of Identity...

  13. Management systems for regulatory authorities

    International Nuclear Information System (INIS)

    Mpandanyama, Rujeko Lynette

    2015-02-01

    For a regulatory body to fulfil its statutory obligations, there is need to develop and implement a regulatory management system that has the necessary arrangements for achieving and maintaining high quality performance in regulating the safety of nuclear and radiation facilities under its authority. Hence, the regulatory management system needs to fully integrate the human resources, processes and physical resources of the organization. This study sought to provide an understanding of the concept, principles, policies and fundamentals of management systems as they relate to regulatory systems in the field of radiation protection and to make appropriate recommendations to ensure that an effective management system exists for the control of ionizing radiation and radiation sources and addresses all relevant stakeholders in Zimbabwe. A comparative analysis was done on the current management status and the ideal management system, which led to the identification of the gaps existing. The main key that was found to be of significance was lack of linkages between processes and management tools within the institution. (au)

  14. OCRWM Systems Engineering Management Plan (SEMP)

    International Nuclear Information System (INIS)

    1990-03-01

    The Nuclear Waste Policy Act of 1982 established the Office of Civilian Radioactive Waste Management (OCRWM) in the Department of Energy (DOE) to implement a program for the safe and permanent disposal of spent nuclear fuel and high-level radioactive waste. To achieve this objective, the OCRWM is developing an integrated waste-management system consisting of three elements: the transportation system, the monitored retrievable storage (MRS) facility, and the mined geologic disposal system (MGDS). The development of such a system requires management of many diverse disciplines that are involved in research, siting, design, licensing, and external interactions. The purpose of this Systems Engineering Management Plan (SEMP) is to prescribe how the systems-engineering process will be implemented in the development of the waste-management system. Systems engineering will be used by the OCRWM to manage, integrate, and document all aspects of the technical development of the waste-management system and its system elements to ensure that the requirements of the waste-management program are met. It will be applied to all technical activities of the OCRWM program. It will be used by the OCRWM to specify the sequence of technical activities necessary to define the requirements the waste-management system must satisfy, to develop the waste-management system, to relate system elements to each other, and to determine how the waste-management system can be optimized to most effectively satisfy the requirements. Furthermore, systems engineering will be used in the management of Program activities at the program, program-element, and project levels by specifying procedures, studies, reviews, and documentation requirements. 9 refs., 1 fig

  15. Potential of Computerized Maintenance Management System in Facilities Management

    Directory of Open Access Journals (Sweden)

    Noor Farisya Azahar

    2014-07-01

    Full Text Available For some time it has been clear that managing buildings or estates has been carried out in the context of what has become known as facilities management. British Institute of Facilities Management defined facilities management is the integration of multi-disciplinary activities within the built environment and the management of their impact upon people and the workplace. Effective facilities management is vital to the success of an organisation by contributing to the delivery of its strategic and operational objectives. Maintenance of buildings should be given serious attention before (stage design, during and after a building is completed. But total involvement in building maintenance is after the building is completed and during its operations. Residents of and property owners require their building to look attractive, durable and have a peaceful indoor environment and efficient. The objective of the maintenance management system is to stream line the vast maintenance information system to improve the productivity of an industrial plant. a good maintenance management system makes equipment and facilities available. This paper will discuss the fundamental steps of maintenance management program and Computerized Maintenance Management System (CMMS

  16. Generalized ward identities for non-local transformation

    International Nuclear Information System (INIS)

    Li Ziping; Li Ruijie

    2002-01-01

    Based on the phase-space generating functional of Green function for a system with a singular higher-order Lagrangian, the generalized canonical Ward identities under the local and non-local transformation in phase space for such a system have been derived. Starting from the configuration-space generating functional for a gauge-invariant system, the generalized Ward identities were deduced under the local, non-local and global transformation, respectively. The applications to the non-Abelian Chern-Simons theories with higher derivatives were given. Some relationships among the proper vertices have been deduced, in which one does not need to carry out the integration over canonical momenta in phase-space generating functional. The Ward-Takahashi identities for BRS transformation are also obtained

  17. New nurse transition: success through aligning multiple identities.

    Science.gov (United States)

    Leong, Yee Mun Jessica; Crossman, Joanna

    2015-01-01

    The purpose of this paper is to explore the perceptions of new nurses in Singapore of their experiences of role transition and to examine the implications for managers in terms of employee training, development and retention. This qualitative study was conducted using a constructivist grounded theory approach. In total 26 novice nurses and five preceptors (n=31) from five different hospitals participated in the study. Data were collected from semi-structured interviews and reflective journal entries and analysed using the constant comparative method. The findings revealed that novice nurses remained emotionally and physically challenged when experiencing role transition. Two major constructs appear to play an important part in the transition process; learning how to Fit in and aligning personal with professional and organisational identities. The findings highlight factors that facilitate or impede Fitting in and aligning these identities. Although the concept of Fitting in and its relation to the attrition of novice nurses has been explored in global studies, that relationship has not yet been theorised as the dynamic alignment of multiple identities. Also, whilst most research around Fitting in, identity and retention has been conducted in western countries, little is known about these issues and their interrelationship in the context of Singapore. The study should inform decision making by healthcare organisations, nurse managers and nursing training institutions with respect to improving the transition experience of novice nurses.

  18. On creating macroscopically identical granular systems with different numbers of particles

    Science.gov (United States)

    van der Meer, Devaraj; Rivas, Nicolas

    2015-11-01

    One of the fundamental differences between granular and molecular hydrodynamics is the enormous difference in the total number of constituents. The small number of particles implies that the role of fluctuations in granular dynamics is of paramount importance. To obtain more insight in these fluctuations, we investigate to what extent it is possible to create identical granular hydrodynamic states with different number of particles. A definition is given of macroscopically equivalent systems, and the dependency of the conservation equations on the particle size is studied. We show that, in certain cases, and by appropriately scaling the microscopic variables, we are able to compare systems with significantly different number of particles that present the same macroscopic phenomenology. We apply these scalings in simulations of a vertically vibrated system, namely the density inverted granular Leidenfrost state and its transition to a buoyancy-driven convective state.

  19. Configuration Management Program - a part of Integrated Management System

    International Nuclear Information System (INIS)

    Mancev, Bogomil; Yordanova, Vanja; Nenkova, Boyka

    2014-01-01

    The recently issued International Atomic Energy Agency (IAEA) publications (GS-R-3, GS-G-3.1 and GS-G-3.5) regarding Management Systems for Facilities and Activities define requirements for creation, introduction, evaluation and continuously improvement of the Management System, which unifies the safety, health, environment, security, quality and economic elements. According to GS-R-3 the Integrated Management System is based on defined processes identified in the enterprises: Managing, Basic and Supporting processes. At implementation of their activities, the organizations often apply other standards in their interrelations with suppliers and the parties concerned - ISO 9001:2008, ISO 14001:2004 and OHSAS 18001:2007, regarding quality, environment and occupational health and safety management. The integration of the standards of both series ensure the observance of the common management principles that reflect the best practices of management as leadership, participation of the people, process approach, continuously improvement, systematical approach to the management and approach based on facts used at the making decisions. The main objective of the Integrated Management System introduction is to ensure safety considering the influence of all additional impacts taken together. The Integrated Management System is based on the process approach at implementation of the activities in nuclear power plant. The transition to the process oriented approach require long period of time, during which the distribution of the responsibilities is optimized up to the level that will satisfy the requirements, reach and maintain the stipulated objectives. The Configuration Management (CM) is an integrated management process by means of which conformity between design requirements, physical configuration and the plant documentation is ascertained and maintained during the entire life cycle of the facility. Processes within configuration management are not isolated, but are part of

  20. Leadership identities

    DEFF Research Database (Denmark)

    Holmgreen, Lise-Lotte

    2018-01-01

    Questioning the assumption that identities can be controlled through a shared organisational culture, the article explores the inculcation of a discourse of diversity into leadership identities in a Danish bank and building society. Thus, it intends to demonstrate that, on the one hand, discourse...... plays a significant role in identity construction and, on the other, that leaders’ constructions may have many sources of inspiration within and outside the organisation, emphasising that identity construction is a complex process in which organisational efforts to promote a common leadership identity...... to construct their leadership identities. While the respondents present comparable identities to the interviewer, the analysis reveals that the they draw on different discourses and employ a number of different discursive means to present this identity. This, the article argues, may be the result of a number...

  1. 14 CFR 1212.704 - System manager.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 5 2010-01-01 2010-01-01 false System manager. 1212.704 Section 1212.704... Authority and Responsibilities § 1212.704 System manager. (a) Each system manager is responsible for the following with regard to the system of records over which the system manager has cognizance: (1) Overall...

  2. Rapid Transformation in a Dual Identity Defense University

    National Research Council Canada - National Science Library

    Sekerka, Leslie E; Zolin, Roxanne; Simon, Cary

    2005-01-01

    .... Transcripts were thematically analyzed. The findings contributed to the development of a model to depict the effects of a specialized management identity that employs a deletion strategy using coercion to effect rapid transformation...

  3. Exploring the link between environmental identity, behaviors and decision making

    Science.gov (United States)

    Freed, Allison

    This study was conducted with undergraduate students at a large university to investigate the association between environmental identity, pro-environmental behaviors and environmental decision-making. This study explored how environmental identity as defined by Clayton (2003) influenced the type of pro-environmental behaviors individuals choose to participate in. Environmental decision-making based on Kahneman's (2003, 2011) System 1 and System 2 framework was also assessed in association with environmental identity. A survey including the Environmental Identity Survey (Clayton, 2003), the Environmentally Responsible Behaviors Index (Smith-Sebasto & D'Acosta, 1995), and a Decision Making Questionnaire were administered. After administering the surveys, eight participants were chosen for a 60-minute interview. The quantitative results of the study showed there was a significant relationship between environmental identity and participating in environmental behaviors more often. There was also a significant relation between environmental identity and making the decision to recycle in a fast and automatic way. The interview results showed that participants with both a strong and a weak environmental identity recycled often and thought it was a fast decision. The results of this study show that certain components of environmental identity are important, but other factors like the physical environment and social norms influence the thinking that goes into recycling more than environmental identity alone. This study provides evidence of the importance of social norms and environmental structures in fostering pro-environmental behaviors and influencing the type of thinking that goes into making environmental decisions. Keywords: environmental identity, environmental behaviors, System 1, System 2, recycling.

  4. Brief report: The Utrecht-Management of Identity Commitments Scale (U-MICS): Gender and age measurement invariance and convergent validity of the Turkish version

    NARCIS (Netherlands)

    Morsunbul, Umit; Crocetti, Elisabetta; Cok, Figen; Meeus, Wim

    2014-01-01

    The purpose of this study was to evaluate the factor structure and convergent validity of the Turkish version of the Utrecht-Management of Identity Commitments Scale (U-MICS). Participants were 1201 (59.6% females) youth aged between 12 and 24 years (Mage=17.53 years, SDage=3.25). Results indicated

  5. Program management system manual

    International Nuclear Information System (INIS)

    1989-08-01

    OCRWM has developed a program management system (PMS) to assist in organizing, planning, directing and controlling the Civilian Radioactive Waste Management Program. A well defined management system is necessary because: (1) the Program is a complex technical undertaking with a large number of participants, (2) the disposal and storage facilities to be developed by the Program must be licensed by the Nuclear Regulatory Commission (NRC) and hence are subject to rigorous quality assurance (QA) requirements, (3) the legislation mandating the Program creates a dichotomy between demanding schedules of performance and a requirement for close and continuous consultation and cooperation with external entities, (4) the various elements of the Program must be managed as parts of an integrated waste management system, (5) the Program has an estimated total system life cycle cost of over $30 billion, and (6) the Program has a unique fiduciary responsibility to the owners and generators of the nuclear waste for controlling costs and minimizing the user fees paid into the Nuclear Waste Fund. This PMS Manual is designed and structured to facilitate strong, effective Program management by providing policies and requirements for organizing, planning, directing and controlling the major Program functions

  6. Ways to integrate document management systems with industrial plant configuration management systems

    International Nuclear Information System (INIS)

    Munoz, M.

    1995-01-01

    Based on experience gained from tasks carried out for Almaraz Nuclear Power Plant, this paper describes computer platforms used both at the power plant and in the main offices of the engineering company. Subsequently, a description is given of the procedure followed for the continuous up-dating of plant documentation, in order to maintain consistency with other information stored in data bases in the Operation Management System, Maintenance System, Modification Management System, etc. The work method used for the unitary updating of all information (document images and attributes corresponding to the different data bases), following refuelling procedures is also described. Lastly, the paper describes the functions and the user interface of the system used in the power plant for document management. (Author)

  7. Management Information Systems at CERN

    CERN Document Server

    Ferguson, J

    1986-01-01

    The specific areas addressed in the study are 1.Management decision support (data presentation, data base management systems â" DBMS, modeling) 2.Text processing, 3.Electronic communication for management purposes, 4.Office automation, 5.Administrative use of Management Information Systems (MIS) and in particular Administrative Data Processing (ADP).

  8. Disaster Management: AN Integral Part of Science & Technology System and Land Administration-Management System

    Science.gov (United States)

    Ghawana, T.; Zlatanova, S.

    2016-06-01

    Disaster management is a multidisciplinary field, which requires a general coordination approach as well as specialist approaches. Science and Technology system of a country allows to create policies and execution of technical inputs required which provide services for the specific types of disasters management. Land administration and management agencies, as the administrative and management bodies, focus more on the coordination of designated tasks to various agencies responsible for their dedicated roles. They get help from Scientific and technical inputs & policies which require to be implemented in a professional manner. The paper provides an example of such integration from India where these two systems complement each other with their dedicated services. Delhi, the Capital of India, has such a disaster management system which has lot of technical departments of government which are mandated to provide their services as Emergency Service Functionaries. Thus, it is shown that disaster management is a job which is an integral part of Science & Technology system of a country while being implemented primarily with the help of land administration and management agencies. It is required that new policies or mandates for the Science and technology organizations of government should give a primary space to disaster management

  9. Integration of project management and systems engineering: Tools for a total-cycle environmental management system

    International Nuclear Information System (INIS)

    Blacker, P.B.; Winston, R.

    1997-01-01

    An expedited environmental management process has been developed at the Idaho National Engineering and Environmental Laboratory (INEEL). This process is one result of the Lockheed Martin commitment to the US Department of Energy to incorporate proven systems engineering practices with project management and program controls practices at the INEEL. Lockheed Martin uses a graded approach of its management, operations, and systems activities to tailor the level of control to the needs of the individual projects. The Lockheed Martin definition of systems engineering is: ''''Systems Engineering is a proven discipline that defines and manages program requirements, controls risk, ensures program efficiency, supports informed decision making, and verifies that products and services meet customer needs.'''' This paper discusses: the need for an expedited environmental management process; how the system was developed; what the system is; what the system does; and an overview of key components of the process

  10. CIMS: The Cartographic Information Management System,

    Science.gov (United States)

    1981-01-01

    use. Large-scale information systems may cover large amounts of information such as the Land Identification and Information Management System (LIMS...small computer in managing the information holdings of a mapping institute. The result is the Cartographic Information Management System (CIMS), a...American countrie.s. 1 .- - _ _ _ _. = _ m m m THE CARTOGRAPHIC INFORMATION MANAGEMENT SYSTEM System Rationale Interactive computer-assisted cartography

  11. Lithium battery management system

    Science.gov (United States)

    Dougherty, Thomas J [Waukesha, WI

    2012-05-08

    Provided is a system for managing a lithium battery system having a plurality of cells. The battery system comprises a variable-resistance element electrically connected to a cell and located proximate a portion of the cell; and a device for determining, utilizing the variable-resistance element, whether the temperature of the cell has exceeded a predetermined threshold. A method of managing the temperature of a lithium battery system is also included.

  12. Brief report: the Utrecht-Management of Identity Commitments Scale (U-MICS): gender and age measurement invariance and convergent validity of the Turkish version.

    Science.gov (United States)

    Morsunbul, Umit; Crocetti, Elisabetta; Cok, Figen; Meeus, Wim

    2014-08-01

    The purpose of this study was to evaluate the factor structure and convergent validity of the Turkish version of the Utrecht-Management of Identity Commitments Scale (U-MICS). Participants were 1201 (59.6% females) youth aged between 12 and 24 years (M(age) = 17.53 years, SD(age) = 3.25). Results indicated that the three-factor model consisting of commitment, in-depth exploration, and reconsideration of commitment provided a very good fit to the data and applied equally well to boys and girls as well as to three age groups (early adolescents, middle adolescents, and emerging adults). Significant relations between identity processes and self-concept clarity, personality, internalizing and externalizing problem behaviors, and parental relationships supported convergent validity. Thus, the Turkish version of U-MICS is a reliable tool for assessing identity in Turkish-speaking respondents. Copyright © 2014 The Foundation for Professionals in Services for Adolescents. Published by Elsevier Ltd. All rights reserved.

  13. Web Based Project Management System

    OpenAIRE

    Aadamsoo, Anne-Mai

    2010-01-01

    To increase an efficiency of a product, nowadays many web development companies are using different project management systems. A company may run a number of projects at a time, and requires input from a number of individuals, or teams for a multi level development plan, whereby a good project management system is needed. Project management systems represent a rapidly growing technology in IT industry. As the number of users, who utilize project management applications continues to grow, w...

  14. Exercisers' identities and exercise dependence: the mediating effect of exercise commitment.

    Science.gov (United States)

    Lu, Frank Jing-Horng; Hsu, Eva Ya-Wen; Wang, Junn-Ming; Huang, Mei-Yao; Chang, Jo-Ning; Wang, Chien-Hsin

    2012-10-01

    The purpose of this study was to examine the associations of exercise identity, exercise commitment, exercise dependence, and, particularly, the mediating effects of exercise commitment on the relationship between exercise identity and exercise dependence. 253 Taiwanese regular exercisers completed measures, including the Exercise Dependence Scale-Revised, the Exercise Identity Scale, the Exercise Commitment Scale, and the Godin Leisure Time Exercise Questionnaire. Results showed that exercise identity, exercise dependence, and two types of exercise commitment were moderately to highly correlated. Furthermore, structural equation modelling indicated that a "have to" commitment partially mediated the relationship between exercise identity and exercise dependence. Based on the mediating role of a "have to" commitment, the findings are particularly informative to exercise instructors and for exercise program managers.

  15. Archival Information Management System.

    Science.gov (United States)

    1995-02-01

    management system named Archival Information Management System (AIMS), designed to meet the audit trail requirement for studies completed under the...are to be archived to the extent that future reproducibility and interrogation of results will exist. This report presents a prototype information

  16. Distinguishing Identical Particles and the Correct Counting of States

    Science.gov (United States)

    de la Torre, A. C.; Martin, H. O.

    2009-01-01

    It is shown that quantum systems of identical particles can be treated as different when they are in well-differentiated states. This simplifying assumption allows for the consideration of quantum systems isolated from the rest of the universe and justifies many intuitive statements about identical systems. However, it is shown that this…

  17. RELIABILITY ASSESSMENT OF ENTROPY METHOD FOR SYSTEM CONSISTED OF IDENTICAL EXPONENTIAL UNITS

    Institute of Scientific and Technical Information of China (English)

    Sun Youchao; Shi Jun

    2004-01-01

    The reliability assessment of unit-system near two levels is the most important content in the reliability multi-level synthesis of complex systems. Introducing the information theory into system reliability assessment, using the addible characteristic of information quantity and the principle of equivalence of information quantity, an entropy method of data information conversion is presented for the system consisted of identical exponential units. The basic conversion formulae of entropy method of unit test data are derived based on the principle of information quantity equivalence. The general models of entropy method synthesis assessment for system reliability approximate lower limits are established according to the fundamental principle of the unit reliability assessment. The applications of the entropy method are discussed by way of practical examples. Compared with the traditional methods, the entropy method is found to be valid and practicable and the assessment results are very satisfactory.

  18. System Security Management in SNMP

    OpenAIRE

    P. Deivendran; Dr. R. Dhanapal Ph.D

    2010-01-01

    We present a framework for managing system security, based on a SNMP Management Information Base (MIB), namely the System Security MIB (SSEC MIB), We have defined managed objects and completed the ASN.1 description of the MIB that embeds them. The related security management functions are mainly focused on monitoring external script execution for system security scanning and access control. The main goal of this work is to introduce the semantics and a standard interface that will allow the r...

  19. MAINTENANCE MANAGEMENT ACCOUNTING SYSTEM OF WASTE WATER DISPOSAL SYSTEMS

    Science.gov (United States)

    Hori, Michihiro; Tsuruta, Takashi; Kaito, Kiyoyuki; Kobayashi, Kiyoshi

    Sewage works facilities consist of various assets groups. And there are many kinds of financial resources. In order to optimize the maintenance plan, and to secure the stability and sustainability of sewage works management, it is necessary to carry out financial simulation based on the life-cycle cost analysis. Furthermore, it is important to develop management accounting system that is interlinked with the financial accounting system, because many sewage administration bodies have their financial accounting systems as public enterprises. In this paper, a management accounting system, which is designed to provide basic information for asset management of sewage works facilities, is presented. Also the applicability of the management accounting system presented in this paper is examined through financial simulations.

  20. National and Gender Measurement Invariance of the Utrecht-Management of Identity Commitments Scale (U-MICS): A 10-Nation Study With University Students.

    Science.gov (United States)

    Crocetti, Elisabetta; Cieciuch, Jan; Gao, Cheng-Hai; Klimstra, Theo; Lin, Ching-Ling; Matos, Paula Mena; Morsünbül, Ümit; Negru, Oana; Sugimura, Kazumi; Zimmermann, Grégoire; Meeus, Wim

    2015-12-01

    The purpose of this study was to examine the psychometric properties of the Utrecht-Management of Identity Commitments Scale (U-MICS), a self-report measure aimed at assessing identity processes of commitment, in-depth exploration, and reconsideration of commitment. We tested its factor structure in university students from a large array of cultural contexts, including 10 nations located in Europe (i.e., Italy, the Netherlands, Poland, Portugal, Romania, and Switzerland), Middle East (i.e., Turkey), and Asia (i.e., China, Japan, and Taiwan). Furthermore, we tested national and gender measurement invariance. Participants were 6,118 (63.2% females) university students aged from 18 to 25 years (Mage = 20.91 years). Results indicated that the three-factor structure of the U-MICS fitted well in the total sample, in each national group, and in gender groups. Furthermore, national and gender measurement invariance were established. Thus, the U-MICS can be fruitfully applied to study identity in university students from various Western and non-Western contexts. © The Author(s) 2015.

  1. Program Management System manual

    International Nuclear Information System (INIS)

    1986-01-01

    The Program Management System (PMS), as detailed in this manual, consists of all the plans, policies, procedure, systems, and processes that, taken together, serve as a mechanism for managing the various subprograms and program elements in a cohesive, cost-effective manner. The PMS is consistent with the requirements of the Nuclear Waste Policy Act of 1982 and the ''Mission Plan for the Civilian Radioactive Waste Management Program'' (DOE/RW-0005). It is based on, but goes beyond, the Department of Energy (DOE) management policies and procedures applicable to all DOE programs by adapting these directives to the specific needs of the Civilian Radioactive Waste Management program. This PMS Manual describes the hierarchy of plans required to develop and maintain the cost, schedule, and technical baselines at the various organizational levels of the Civilian Radioactive Waste Management Program. It also establishes the management policies and procedures used in the implementation of the Program. These include requirements for internal reports, data, and other information; systems engineering management; regulatory compliance; safety; quality assurance; and institutional affairs. Although expanded versions of many of these plans, policies, and procedures are found in separate documents, they are an integral part of this manual. The PMS provides the basis for the effective management that is needed to ensure that the Civilian Radioactive Waste Management Program fulfills the mandate of the Nuclear Waste Policy Act of 1982. 5 figs., 2 tabs

  2. Managing Temporal Knowledge in Port Management Systems

    Directory of Open Access Journals (Sweden)

    Anita Gudelj

    2006-05-01

    Full Text Available Large ports need to deal with a number of disparate activities:the movement of ships, containers and other cargo, theloading and unloading of ships and containers, customs activities.As well as human resources, anchorages, channels, lighters,tugs, berths, warehouse and other storage spaces have to beallocated and released. The efficient management of a port involvesmanaging these activities and resources, managing theflows of money involved between the agents providing and usingthese resources, and providing management information.Many information systems will be involved.Many applications have to deal with a large amount of datawhich not only represent the perceived state of the real world atpresent, but also past and/or future states. These applicationsare not served adequately by today's computer managementand database systems. In particular, deletions and updates insuch systems have destructive semantics. This means that previousdatabase contents (representing previous perceived statesof the real world cannot be accessed anymore.A review of how define temporal data models, based ongeneralizing a non-temporal data model in to a temporal one toimprove port management is presented. This paper describes apractical experiment which supports managing temporal dataalong with the corresponding prototype implementations.

  3. Environmental asset management: Risk management systems

    CSIR Research Space (South Africa)

    Naudé, Brian

    2017-07-01

    Full Text Available bnaude@csir.co.za Charl Petzer Council for Scientific and Industrial Research PO Box 395 Pretoria 0001 South Africa +2712 841 4292 CPetzer1@csir.co.za Copyright © 2017 by B Naudé, C Petzer. Published and used by INCOSE with permission.... Charl Petzer is registered professional engineer with 30 years of programme/project management as well as systems engineering experience in military and other environments. He has been the lead systems engineer, as well as programme manager on several...

  4. Gender identity and the management of the transgender patient: a guide for non-specialists.

    Science.gov (United States)

    Joseph, Albert; Cliffe, Charlotte; Hillyard, Miriam; Majeed, Azeem

    2017-04-01

    In this review, we introduce the topic of transgender medicine, aimed at the non-specialist clinician working in the UK. Appropriate terminology is provided alongside practical advice on how to appropriately care for transgender people. We offer a brief theoretical discussion on transgenderism and consider how it relates to broader understandings of both gender and disease. In respect to epidemiology, while it is difficult to assess the exact size of the transgender population in the UK, population surveys suggest a prevalence of between 0.2 and 0.6% in adults, with rates of referrals to gender identity clinics in the UK increasing yearly. We outline the legal framework that protects the rights of transgender people, showing that is not legal for physicians to deny transgender people access to services based on their personal beliefs. Being transgender is often, although not always, associated with gender dysphoria, a potentially disabling condition in which the discordance between a person's natal sex (that assigned to them at birth) and gender identity results in distress, with high associated rates of self-harm, suicidality and functional impairment. We show that gender reassignment can be a safe and effective treatment for gender dysphoria with counselling, exogenous hormones and surgery being the mainstay of treatment. The role of the general practitioner in the management of transgender patients is discussed and we consider whether hormone therapy should be initiated in primary care in the absence of specialist advice, as is suggested by recent General Medical Council guidance.

  5. Water management - management actions applied to water resources system

    International Nuclear Information System (INIS)

    Petkovski, Ljupcho; Tanchev, Ljubomir

    2001-01-01

    In this paper are presented a general description of water resource systems, a systematisation of the management tasks and the approaches for solution, including a review of methods used for solution of water management tasks and the fundamental postulates in the management. The management of water resources is a synonym for the management actions applied to water resource systems. It is a general term that unites planning and exploitation of the systems. The modern planning assumes separating the water racecourse part from the hydro technical part of the project. The water resource study is concerned with the solution for the resource problem. This means the parameters of the system are determined in parallel with the definition of the water utilisation regime. The hydro-technical part of the project is the design of structures necessary for the water resource solution. (Original)

  6. Ward identity for non-equilibrium Fermi systems

    Czech Academy of Sciences Publication Activity Database

    Velický, B.; Kalvová, Anděla; Špička, Václav

    2008-01-01

    Roč. 77, č. 4 (2008), 041201/1-041201/4 ISSN 1098-0121 R&D Projects: GA ČR GC202/07/J051 Institutional research plan: CEZ:AV0Z10100520; CEZ:AV0Z10100521 Keywords : non-equilibrium * Green’s functions * quantum transport equations * Ward identity Subject RIV: BE - Theoretical Physics Impact factor: 3.322, year: 2008

  7. The development of KAERI management information system (II) -The development of Time Sheet Management System-

    International Nuclear Information System (INIS)

    Kang, Sin Bok; Kim, Yeong Taek; Park, Soo Jin; Ko, Yeong Cheol; Lee, Jong Bok; Han, Eun Sook; Kim, Hyeon Jeong

    1994-01-01

    The purpose of this report is to describe the work done for the development, operation and maintenance of Time Sheet Management System. This work is a part of the development KAERI management information system. Manpower management is essential to cope with the external circumstances promptly and to maximize the productivity of the organization. This work aims at setting up a basis for the manpower management system. It is widely recognized that neither timely decision making nor competitive edge can be secured with the traditional management technology in so a rapidly changing situations home and abroad, which can be characterized by openness and informality. The necessity of efficient and scientific man-power management by time-study has emerged on the reorganization of KAERI by expanding matrix system in order to enhance the R and D productivity. (Author)

  8. Credit Management System

    Data.gov (United States)

    US Agency for International Development — Credit Management System. Outsourced Internet-based application. CMS stores and processes data related to USAID credit programs. The system provides information...

  9. Understanding American Identity: An Introduction

    Science.gov (United States)

    2017-12-01

    this leads to is, how can we begin this transformation ? D. HOW TO GET THERE: PATRIOTIC BUILDING BLOCKS 1. Civic Education Many have argued that civic... transformation of the U.S. public education system and writes, “High schools brought young people together into an adolescent world that helped to obscure...Revamped civic education and national service programs can serve to form those cross-cutting ties. 14. SUBJECT TERMS American identity, national identity

  10. "It Was Not Me That Was Sick, It Was the Building": Rhetorical Identity Management Strategies in the Context of Observed or Suspected Indoor Air Problems in Workplaces.

    Science.gov (United States)

    Finell, Eerika; Seppälä, Tuija; Suoninen, Eero

    2018-07-01

    Suffering from a contested illness poses a serious threat to one's identity. We analyzed the rhetorical identity management strategies respondents used when depicting their health problems and lives in the context of observed or suspected indoor air (IA) problems in the workplace. The data consisted of essays collected by the Finnish Literature Society. We used discourse-oriented methods to interpret a variety of language uses in the construction of identity strategies. Six strategies were identified: respondents described themselves as normal and good citizens with strong characters, and as IA sufferers who received acknowledge from others, offered positive meanings to their in-group, and demanded recognition. These identity strategies located on two continua: (a) individual- and collective-level strategies and (b) dissolved and emphasized (sub)category boundaries. The practical conclusion is that professionals should be aware of these complex coping strategies when aiming to interact effectively with people suffering from contested illnesses.

  11. Medical Information Management System

    Science.gov (United States)

    Alterescu, S.; Hipkins, K. R.; Friedman, C. A.

    1979-01-01

    On-line interactive information processing system easily and rapidly handles all aspects of data management related to patient care. General purpose system is flexible enough to be applied to other data management situations found in areas such as occupational safety data, judicial information, or personnel records.

  12. Application and the Identity of Mathematics

    DEFF Research Database (Denmark)

    Jensen, Kasper Bjering Søby

    In the paper a conceptual framework for discussing the identity of mathematics as a school subject is constructed with particular emphasize on application of mathematics. The framework is used to analyze the identity of mathematics, as it appears on two different kinds of domains: the political s...... system and the teachers. At the end it is discussed whether this frameworks gives us new insights into mathematics teaching. It is concluded that the framework can articulates important aspects.......In the paper a conceptual framework for discussing the identity of mathematics as a school subject is constructed with particular emphasize on application of mathematics. The framework is used to analyze the identity of mathematics, as it appears on two different kinds of domains: the political...

  13. Systems management of facilities agreements

    International Nuclear Information System (INIS)

    Blundell, A.

    1998-01-01

    The various types of facilities agreements, the historical obstacles to implementation of agreement management systems and the new opportunities emerging as industry is beginning to make an effort to overcome these obstacles, are reviewed. Barriers to computerized agreement management systems (lack of consistency, lack of standards, scarcity of appropriate computer software) are discussed. Characteristic features of a model facilities agreement management system and the forces driving the changing attitudes towards such systems (e.g. mergers) are also described

  14. Senior Management Use of Management Control Systems in Large Companies

    DEFF Research Database (Denmark)

    Willert, Jeanette; Israelsen, Poul; Rohde, Carsten

    2017-01-01

    The use of management control systems in large companies remains relatively unexplored. Indeed, only a few studies of senior managers’ use of management control systems consider multiple controls in companies. This paper explores data from a comprehensive survey of the use of management control...... systems in 120 strategic business units at some of the largest companies in Denmark. The paper identifies how senior management guides and controls their subordinates to meet their companies’ objectives. The presentation and discussion of the results, including citations from executive managers, use...

  15. The Process of Identity Work: Negotiating a Work Identity

    NARCIS (Netherlands)

    Crafford, A.; Adams, B.G.; Saayman, T.; Vinkenburg, C.J.; Jansen, P.G.W.; Roodt, G.

    2015-01-01

    Identity work is an important process in negotiating, regulating and maintaining a coherent sense of self-(identity). In this chapter we discuss how identity work is particularly useful in establishing a work identity. The crux of the discussion in this chapter is based on the qualitative phase of

  16. E-dating, identity and HIV prevention: theorising sexualities, risk and network society.

    Science.gov (United States)

    Davis, Mark; Hart, Graham; Bolding, Graham; Sherr, Lorraine; Elford, Jonathan

    2006-05-01

    This paper addresses how London gay men use the internet to meet sexual partners, or for e-dating. Based on qualitative interviews conducted face-to-face or via the internet, this research develops an account of how information technologies mediate the negotiation of identity and risk in connection with sexual practice. E-dating itself is a bricolage, or heterogeneous DIY practice of internet-based-communication (IBC). A central aspect of IBC is "filtering" in and out prospective e-dates based on the images and texts used to depict sexual identities. Interpretations and depictions of personal HIV risk management approaches in IBC are framed by the meanings of different identities, such as the stigma associated with being HIV positive. This paper argues for a sexualities perspective in a theory of network society. Further, HIV prevention in e-dating can potentially be addressed by considering the interplay of the HIV prevention imperatives associated with different HIV serostatus identities. There is a case for encouraging more explicit IBC about risk in e-dating and incorporating the expertise of e-daters in prevention activity. There is also a need to rethink traditional conceptions of risk management in HIV prevention to make space for the risk management bricolage of network society.

  17. Forest management in a Pukhtun community : the Constructions of Identities

    NARCIS (Netherlands)

    Southwold-Llewellyn, S.

    2006-01-01

    Description: How do we recognize and understand the interactions between nature, nationness, and nationalism? How is nature appropriated by politics when asserting identity, interests, and rights? Drawing from South Asia¿s varying regions, the essays in this pathbreaking volume answer such

  18. Unlocking data: federated identity with LSDMA and dCache

    Science.gov (United States)

    Millar, AP; Behrmann, G.; Bernardt, C.; Fuhrmann, P.; Hardt, M.; Hayrapetyan, A.; Litvintsev, D.; Mkrtchyan, T.; Rossi, A.; Schwank, K.

    2015-12-01

    X.509, the dominant identity system from grid computing, has proved unpopular for many user communities. More popular alternatives generally assume the user is interacting via their web-browser. Such alternatives allow a user to authenticate with many services with the same credentials (user-name and password). They also allow users from different organisations form collaborations quickly and simply. Scientists generally require that their custom analysis software has direct access to the data. Such direct access is not currently supported by alternatives to X.509, as they require the use of a web-browser. Various approaches to solve this issue are being investigated as part of the Large Scale Data Management and Analysis (LSDMA) project, a German funded national R&D project. These involve dynamic credential translation (creating an X.509 credential) to allow backwards compatibility in addition to direct SAML- and OpenID Connect-based authentication. We present a summary of the current state of art and the current status of the federated identity work funded by the LSDMA project along with the future road map.

  19. Segmented Spiral Waves and Anti-phase Synchronization in a Model System with Two Identical Time-Delayed Coupled Layers

    International Nuclear Information System (INIS)

    Yuan Guoyong; Yang Shiping; Wang Guangrui; Chen Shigang

    2008-01-01

    In this paper, we consider a model system with two identical time-delayed coupled layers. Synchronization and anti-phase synchronization are exhibited in the reactive system without diffusion term. New segmented spiral waves, which are constituted by many thin trips, are found in each layer of two identical time-delayed coupled layers, and are different from the segmented spiral waves in a water-in-oil aerosol sodium bis(2-ethylhexyl) sulfosuccinate (AOT) micro-emulsion (ME) (BZ-AOT system), which consists of many small segments. 'Anti-phase spiral wave synchronization' can be realized between the first layer and the second one. For different excitable parameters, we also give the minimum values of the coupling strength to generate segmented spiral waves and the tip orbits of spiral waves in the whole bilayer.

  20. 75 FR 6622 - The U.S. Department of Agriculture (USDA) Proposes to Revise Three of Its Privacy Act Systems of...

    Science.gov (United States)

    2010-02-10

    ... property interests, identity theft or fraud, or harm to the security or integrity of this system or other... accordance with a tape library management schedule. Manual records are transferred to the Federal Records... system manager may require the individual to provide proof of identity or require the requester to...

  1. Preferred names, preferred pronouns, and gender identity in the electronic medical record and laboratory information system: Is pathology ready?

    Directory of Open Access Journals (Sweden)

    Katherine L Imborek

    2017-01-01

    Full Text Available Background: Electronic medical records (EMRs and laboratory information systems (LISs commonly utilize patient identifiers such as legal name, sex, medical record number, and date of birth. There have been recommendations from some EMR working groups (e.g., the World Professional Association for Transgender Health to include preferred name, pronoun preference, assigned sex at birth, and gender identity in the EMR. These practices are currently uncommon in the United States. There has been little published on the potential impact of these changes on pathology and LISs. Methods: We review the available literature and guidelines on the use of preferred name and gender identity on pathology, including data on changes in laboratory testing following gender transition treatments. We also describe pathology and clinical laboratory challenges in the implementation of preferred name at our institution. Results: Preferred name, pronoun preference, and gender identity have the most immediate impact on the areas of pathology with direct patient contact such as phlebotomy and transfusion medicine, both in terms of interaction with patients and policies for patient identification. Gender identity affects the regulation and policies within transfusion medicine including blood donor risk assessment and eligibility. There are limited studies on the impact of gender transition treatments on laboratory tests, but multiple studies have demonstrated complex changes in chemistry and hematology tests. A broader challenge is that, even as EMRs add functionality, pathology computer systems (e.g., LIS, middleware, reference laboratory, and outreach interfaces may not have functionality to store or display preferred name and gender identity. Conclusions: Implementation of preferred name, pronoun preference, and gender identity presents multiple challenges and opportunities for pathology.

  2. 12 CFR Appendix J to Part 571 - Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation

    Science.gov (United States)

    2010-01-01

    ...; service provider arrangements; significant incidents involving identity theft and management's response... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Interagency Guidelines on Identity Theft...—Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation Section 571.90 of this part...

  3. 12 CFR Appendix J to Part 222 - Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation

    Science.gov (United States)

    2010-01-01

    ... arrangements; significant incidents involving identity theft and management's response; and recommendations for... 12 Banks and Banking 3 2010-01-01 2010-01-01 false Interagency Guidelines on Identity Theft..., App. J Appendix J to Part 222—Interagency Guidelines on Identity Theft Detection, Prevention, and...

  4. 12 CFR Appendix J to Part 41 - Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation

    Science.gov (United States)

    2010-01-01

    ... arrangements; significant incidents involving identity theft and management's response; and recommendations for... 12 Banks and Banking 1 2010-01-01 2010-01-01 false Interagency Guidelines on Identity Theft... on Identity Theft Detection, Prevention, and Mitigation Section 41.90 of this part requires each...

  5. Networked inventory management systems: materializing supply chain management

    NARCIS (Netherlands)

    Verwijmeren, M.A.A.P.; Vlist, van der P.; Donselaar, van K.H.

    1996-01-01

    Aims to explain the driving forces for networked inventory management. Discusses major developments with respect to customer requirements, networked organizations and networked inventory management. Presents high level specifications of networked inventory management information systems (NIMISs).

  6. System analysis for radwaste management

    International Nuclear Information System (INIS)

    Lennemann, W.L.

    1987-01-01

    The most logical approach to evaluating radioactive waste management processes and their options is to consider radioactive waste management, handling, and disposal as a complete and complex system from the waste arisings to their disposition. The principal elements that should be considered or taken into account when making a decision involving one or more components of a radwaste management system essentially concern radiation doses or detriments- both radiological and industrial safety and both capital investments and operating costs. This paper discusses the system analysis of the low- and medium-level radioactive waste management

  7. Electrical distribution system management

    International Nuclear Information System (INIS)

    Hajos, L.; Mortarulo, M.; Chang, K.; Sparks, T.

    1990-01-01

    This paper reports that maintenance of electrical system data is essential to the operation, maintenance, and modification of a nuclear station. Load and equipment changes affect equipment sizing, available short-circuit currents and protection coordination. System parameters must be maintained in a controlled manner to enable evaluation of proposed modifications and provide adequate verification and traceability. For this purpose, Public Service Electric and Gas Company has implemented a Verified and Validated Electric Distribution System Management (EDSM) program at the Hope Creek and Salem Nuclear Power Stations. EDSM program integrates computerized configuration management of electrical systems with calculational software the Technical Standard procedures. The software platform is PC-based. The Database Manager and Calculational programs have been linked together through a user friendly menu system. The database management nodule enable s assembly and maintenance of databases for individual loads, buses, and branches within the electrical systems with system access and approval controlled through electronic security incorporated within the database manger. Reports drawn from the database serve as the as-built and/or as-designed record of the system configurations. This module also creates input data files of network parameters in a format readable by the calculational modules. Calculations modules provide load flow, voltage drop, motor starting, and short-circuit analyses, as well as dynamic analyses of bus transfers

  8. Intelligent Integrated System Health Management

    Science.gov (United States)

    Figueroa, Fernando

    2012-01-01

    Intelligent Integrated System Health Management (ISHM) is the management of data, information, and knowledge (DIaK) with the purposeful objective of determining the health of a system (Management: storage, distribution, sharing, maintenance, processing, reasoning, and presentation). Presentation discusses: (1) ISHM Capability Development. (1a) ISHM Knowledge Model. (1b) Standards for ISHM Implementation. (1c) ISHM Domain Models (ISHM-DM's). (1d) Intelligent Sensors and Components. (2) ISHM in Systems Design, Engineering, and Integration. (3) Intelligent Control for ISHM-Enabled Systems

  9. Environmental management system in companies

    International Nuclear Information System (INIS)

    Bonanno, C.

    1995-01-01

    The environmental management system, as the whole coordinated initiatives 'environmental oriented' introduced by companies in their organization, is discussed. Strategic weight that companies have to be present at the environmental management system is enlisted. Finally, the new professional figures of environmental technicians and environmental manager is discussed

  10. Situated influences on perceived barriers to health behavior change: cultural identity and context in Kazakhstan.

    Science.gov (United States)

    Craig, Brett J; Kapysheva, Aizhan

    2017-02-23

    The objective of this study was to identify the perceived barriers to lifestyle changes citizens of Kazakhstan suffering from cardiovascular disease and type II diabetes were experiencing. 14 focus groups were conducted with patients across two regions of Kazakhstan. Topics of discussion included accessing medical care, communicating with health care providers, and following doctor's recommendations. The text of the discussions were analysed for trends and themes across the different groups. Patients identified a series of external and internal barriers to lifestyle changes, including the environment, a dependency on health care providers, a health care system they feel powerless to change, and a low level of self-efficacy. Most notable, however, was a constructed ethnic identity whose boundaries included unhealthy behaviors, specifically diet and untimely access of health care. This identity both was blamed as a cause for the patient's condition and seen as an unchangeable barrier to health behavior change. Current provider efforts to encourage lifestyle changes to manage disease are not taking into account the broader issue of ethnic identity, namely negotiating a fragile and previously suppressed identity that mostly exists alongside other ethnicities. Therefore, maintaining distinctiveness may be a greater need than modifying health behaviors. Efforts towards healthier lifestyles for the public must include not only messages regarding health but also constructions of a Kazakh identity that allows for such lifestyles to fit within the identity framework.

  11. A distribution management system

    Energy Technology Data Exchange (ETDEWEB)

    Verho, P.; Jaerventausta, P.; Kaerenlampi, M.; Paulasaari, H. [Tampere Univ. of Technology (Finland); Partanen, J. [Lappeenranta Univ. of Technology (Finland)

    1996-12-31

    The development of new distribution automation applications is considerably wide nowadays. One of the most interesting areas is the development of a distribution management system (DMS) as an expansion of the traditional SCADA system. At the power transmission level such a system is called an energy management system (EMS). The idea of these expansions is to provide supporting tools for control center operators in system analysis and operation planning. The needed data for new applications is mainly available in some existing systems. Thus the computer systems of utilities must be integrated. The main data source for the new applications in the control center are the AM/FM/GIS (i.e. the network database system), the SCADA, and the customer information system (CIS). The new functions can be embedded in some existing computer system. This means a strong dependency on the vendor of the existing system. An alternative strategy is to develop an independent system which is integrated with other computer systems using well-defined interfaces. The latter approach makes it possible to use the new applications in various computer environments, having only a weak dependency on the vendors of the other systems. In the research project this alternative is preferred and used in developing an independent distribution management system

  12. A distribution management system

    Energy Technology Data Exchange (ETDEWEB)

    Verho, P; Jaerventausta, P; Kaerenlampi, M; Paulasaari, H [Tampere Univ. of Technology (Finland); Partanen, J [Lappeenranta Univ. of Technology (Finland)

    1997-12-31

    The development of new distribution automation applications is considerably wide nowadays. One of the most interesting areas is the development of a distribution management system (DMS) as an expansion of the traditional SCADA system. At the power transmission level such a system is called an energy management system (EMS). The idea of these expansions is to provide supporting tools for control center operators in system analysis and operation planning. The needed data for new applications is mainly available in some existing systems. Thus the computer systems of utilities must be integrated. The main data source for the new applications in the control center are the AM/FM/GIS (i.e. the network database system), the SCADA, and the customer information system (CIS). The new functions can be embedded in some existing computer system. This means a strong dependency on the vendor of the existing system. An alternative strategy is to develop an independent system which is integrated with other computer systems using well-defined interfaces. The latter approach makes it possible to use the new applications in various computer environments, having only a weak dependency on the vendors of the other systems. In the research project this alternative is preferred and used in developing an independent distribution management system

  13. Management analysis for special competitions based on ISO 9001:2008 Quality management systems, ISO 1400:2004 Environmental management systems and OHSAS 18001:2007 Occupational health and safety management systems

    OpenAIRE

    Alcalá Ortiz, Gabriela José

    2015-01-01

    ABSTRACT: This paper aims to analyze the managing condition of the participating projects in the competition Solar Decathlon Europe 2014, depart from that, a suitable integrated management system is proposed. The analysis was accomplished due to the design and application of a questionnaire based in ISO standards, concerning quality, environmental and health and safety management. The results showed the weakness regarding management system, this means the lack of integrated policy, inte...

  14. An exploratory Q study of corporate brand identity elements ...

    African Journals Online (AJOL)

    kirstam

    2014-12-09

    Dec 9, 2014 ... brand, creative marketing, effective management and administration ... (brand identity) and how the customers perceive them (brand image) .... corporate brand, which focuses on values, relationships and culture, fulfils a more.

  15. Design of distributed systems of hydrolithosphere processes management. A synthesis of distributed management systems

    Science.gov (United States)

    Pershin, I. M.; Pervukhin, D. A.; Ilyushin, Y. V.; Afanaseva, O. V.

    2017-10-01

    The paper considers an important problem of designing distributed systems of hydrolithosphere processes management. The control actions on the hydrolithosphere processes under consideration are implemented by a set of extractive wells. The article shows the method of defining the approximation links for description of the dynamic characteristics of hydrolithosphere processes. The structure of distributed regulators, used in the management systems by the considered processes, is presented. The paper analyses the results of the synthesis of the distributed management system and the results of modelling the closed-loop control system by the parameters of the hydrolithosphere process.

  16. Job satisfaction and gender identity of women managers and non-managers.

    Science.gov (United States)

    Lipińska-Grobelny, Agnieszka; Wasiak, Katarzyna

    2010-01-01

    This work investigates different cognitive aspects of job satisfaction (co-workers, supervisor, job content, working facilities, organization and management, opportunities for development, income), positive and negative affect at work and their relations to gender role orientation of women occupying managerial and non-managerial positions. The sample of 122 women (60 managers and 62 non-managers) completed a battery of instruments such as: the Bem Sex Role Inventory, the Job Description Inventory by Neuberger and Allerbeck and the Job Affect Scale by Brief et al. Most women managers represented androgynous and masculine types, while women non-managers belonged to androgynous and feminine types. Moreover, women with various degrees of sex-typing showed positive and negative affect at work. The most satisfied with income were masculine women managers, the least--feminine women non-managers. These results may be applied in designing of motivational instruments to enhance job effectiveness and to eliminate unproductive behaviours such as absenteeism, high staff turnover.

  17. Medical Identity

    DEFF Research Database (Denmark)

    Musaeus, Peter

    2015-01-01

    Purpose: To examine philosophical stances underpinning medical identity and assess the conceptual relationship between physician, medical practice and culture. Argument: Medical identity is about the ideals and moral positions that physicians take when justifying themselves. Medical identity...... hedonistic versus sentimentalist approaches to medical identity. The sociocultural philosophical analysis of medical identity can shed light on what it means conceptually for a physician to harbor beliefs associated with him/her being taken to be an autonomous professional. It is important because it touches...... on the meaning of being a compassionate, good and skilled physician, making its relevance to person-centered medicine self-evident. Conclusion: Medical identity should be analyzed with reference to literature, philosophy and medical practice in order for the physician to exercise a reflective position...

  18. Nova laser assurance-management system

    International Nuclear Information System (INIS)

    Levy, A.J.

    1983-01-01

    In a well managed project, Quality Assurance is an integral part of the management activities performed on a daily basis. Management assures successful performance within budget and on schedule by using all the good business, scientific, engineering, quality assurance, and safety practices available. Quality assurance and safety practices employed on Nova are put in perspective by integrating them into the overall function of good project management. The Nova assurance management system was developed using the quality assurance (QA) approach first implemented at LLNL in early 1978. The LLNL QA program is described as an introduction to the Nova assurance management system. The Nova system is described pictorially through the Nova configuration, subsystems and major components, interjecting the QA techniques which are being pragmatically used to assure the successful completion of the project

  19. 75 FR 13090 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2010-03-18

    ... Federal Register Liaison Officer, Department of Defense. K890.12 System name: Identity Management (IDM... . Follow the instructions for submitting comments. Mail: Federal Docket Management System Office, 1160... Office of Management and Budget (OMB) pursuant to paragraph 4c of Appendix I to OMB Circular No. A-130...

  20. Pembangunan Model Restaurant Management System

    Directory of Open Access Journals (Sweden)

    Fredy Jingga

    2014-12-01

    Full Text Available Model design for Restaurant Management System aims to help in restaurant business process, where Restaurant Management System (RMS help the waitress and chef could interact each other without paper limitation.  This Restaurant Management System Model develop using Agile Methodology and developed based on PHP Programming Langguage. The database management system is using MySQL. This web-based application model will enable the waitress and the chef to interact in realtime, from the time they accept the customer order until the chef could know what to cook and checklist for the waitress wheter the order is fullfill or not, until the cahsier that will calculate the bill and the payment that they accep from the customer.

  1. 16 CFR Appendix A to Part 681 - Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation

    Science.gov (United States)

    2010-01-01

    ... arrangements; significant incidents involving identity theft and management's response; and recommendations for... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Interagency Guidelines on Identity Theft... THE FAIR CREDIT REPORTING ACT IDENTITY THEFT RULES Pt. 681, App. A Appendix A to Part 681—Interagency...

  2. Site systems engineering: Systems engineering management plan

    Energy Technology Data Exchange (ETDEWEB)

    Grygiel, M.L. [Westinghouse Hanford Co., Richland, WA (United States)

    1996-05-03

    The Site Systems Engineering Management Plan (SEMP) is the Westinghouse Hanford Company (WHC) implementation document for the Hanford Site Systems Engineering Policy, (RLPD 430.1) and Systems Engineering Criteria Document and Implementing Directive, (RLID 430.1). These documents define the US Department of Energy (DOE), Richland Operations Office (RL) processes and products to be used at Hanford to implement the systems engineering process at the site level. This SEMP describes the products being provided by the site systems engineering activity in fiscal year (FY) 1996 and the associated schedule. It also includes the procedural approach being taken by the site level systems engineering activity in the development of these products and the intended uses for the products in the integrated planning process in response to the DOE policy and implementing directives. The scope of the systems engineering process is to define a set of activities and products to be used at the site level during FY 1996 or until the successful Project Hanford Management Contractor (PHMC) is onsite as a result of contract award from Request For Proposal DE-RP06-96RL13200. Following installation of the new contractor, a long-term set of systems engineering procedures and products will be defined for management of the Hanford Project. The extent to which each project applies the systems engineering process and the specific tools used are determined by the project`s management.

  3. Social identity in the construction industry

    DEFF Research Database (Denmark)

    Andersen, L. P.; Karlsen, I. L.; Kines, P.

    2015-01-01

    sites. The organization of work fosters social identification within a crew, resulting in distancing from and social categorization of site management. Social identification influences safety behaviour in the crews, where worksite safety rules may meet resistance. Future safety initiatives at large...... construction sites should take into account the dynamics of social identification and categorization in the implementation of safety measures, e.g. by creating an alternative organization of work, thus making it easier for a work crew to identify themselves with the site management. Site/crew managers should...... consider how safety can become a salient and valued group norm by altering the social structure at the sites and/or fostering dual social identity....

  4. PALESTINE AUTOMOTIVE LICENSE IDENTITY RECOGNITION FOR INTELLIGENT PARKING SYSTEM

    OpenAIRE

    ANEES ABU SNEINEH; WAEL A. SALAH

    2017-01-01

    Providing employees with protection and security is one of the key concerns of any organization. This goal can be implemented mainly by managing and protecting employees’ cars in the parking area. Therefore, a parking area must be managed and organized with smart technologies and tools that can be applied and integrated in an intelligent parking system. This paper presents the tools based on image recognition technology that can be used to effectively control various parts of a parking sys...

  5. WEBSITES AS A PROMOTING TOOL FOR THE IDENTITY OF TOURISTIC DESTINATIONS

    Directory of Open Access Journals (Sweden)

    Francisco Vicente Sales Melo

    2013-06-01

    Full Text Available Since its advent, the Internet has become an important tool for tourism. Furthermore, some studies tend to indicate that this may contribute directly to the process of identity formation of a tourism destination. Thus, this paper investigates how websites can help in promoting the identity of tourist destinations on the Internet. The study is characterized as exploratory qualitative in nature, which is constituted from a desk research. It was possible to verify that the website is a key means for managing the identity of a tourist destination, as this can help visitors to form a positive image of the place being visited from the information that makes up the identity of the destination.

  6. Examining Game Design Features for Identity Exploration and Change

    Science.gov (United States)

    Foster, Aroutis; Shah, Mamta

    2016-01-01

    This study used the Dynamic Systems Model of Role Identity (DSMRI) to examine the extent to which a game, Land Science, afforded identity change opportunities as exploration of science identities, science content knowledge, science confidence, action possibilities, and interest/valuing in an intentional manner. Analysis of the game and existing…

  7. Integrated Management System Incorporating Quality Management and Management of Environment, Health and Occupational Safety

    International Nuclear Information System (INIS)

    Manchev, B.; Nenkova, B.; Tomov, E.

    2012-01-01

    Risk Engineering Ltd is a Bulgarian private company founded in 1990 to provide engineering and consulting services applicable to each and every field of the energy sector. Since its establishment Risk Engineering Ltd develops, implement and apply a System for quality assurance, certified for the first time by BVQI (now Bureau Veritas Certification) in 1999 for conformity with the standard ISO 9001:1994. Later on, in connection with the revision of the standards of ISO 9000 series and introduction of the standard ISO 9001:2000 a Quality Management System in conformity with the standard ISO 9001:2000 was developed, introduced and certified. At present, Risk Engineering Ltd has got developed, documented, introduced and certified by Lloyd's Register Quality Assurance (LRQA) Quality Management System in compliance with ISO 9001:2008 on the process approach basis. On this basis and including the requirements of the ISO 14001:2004 (regarding the environment) and OHSAS 18001:2007 (regarding the health and occupational safety), Risk Engineering Ltd has developed and introduced Integrated Management System aim at achieving and demonstrating good results regarding protection of the environment, health and occupational safety. The processes under control by the Integrated Management System and applicable at the company are divided in two general types: A) Management processes: Strategic management and Management of the human resources. B) Processes describing the main activities: design/development process; project management; management of industrial projects and technical infrastructure project; construction, installation, repair and operation of power industry facilities; commercial activities and marketing; investigation of energy efficiency of industrial systems and certification of buildings regarding energy efficiency; consulting activity in the field of industry and energy as well as consultant in accordance with the Law of the Spatial Planning; management of the

  8. Knowledge-based systems for power management

    Science.gov (United States)

    Lollar, L. F.

    1992-01-01

    NASA-Marshall's Electrical Power Branch has undertaken the development of expert systems in support of further advancements in electrical power system automation. Attention is given to the features (1) of the Fault Recovery and Management Expert System, (2) a resource scheduler or Master of Automated Expert Scheduling Through Resource Orchestration, and (3) an adaptive load-priority manager, or Load Priority List Management System. The characteristics of an advisory battery manager for the Hubble Space Telescope, designated the 'nickel-hydrogen expert system', are also noted.

  9. CEFR information management system solution

    International Nuclear Information System (INIS)

    Lu Fei; Zhao Jia'ning

    2011-01-01

    Based on finished information resources planning scheme for China sodium cooled experimental fast breeder reactor and the advanced information resources management solution concepts were applied, we got the building solution of CEFR information management systems. At the same time, the technical solutions of systems structures, logic structures, physical structures, development platforms and operation platforms for information resources management system in fast breeder reactors were developed, which provided programmatic introductions for development works in future. (authors)

  10. Identity paradoxes

    Directory of Open Access Journals (Sweden)

    Đurić Jelena

    2010-01-01

    Full Text Available The article considers paradoxical nature of identity that emerges from: 1 the very concept of identity whose abstract generality unites various and even opposite features; 2 the processual nature of reality that is easier to express in the poetical metaphors or abstract principles than in unambiguous conceptual networks; 3 the oppose relationship between being and knowledge, mind and matter, subject and object, self and personality. Entangled in the labyrinth which evade efforts to be conceptually defined, the modern thinking of identity moves towards abandoning the idea of “self” on behalf of the “ego” and towards the misapprehension of identity as being identical. This corresponds to the “time of the lost spirit” stretched between the simultaneous need to find an identity and to give it up.

  11. Management control system description

    Energy Technology Data Exchange (ETDEWEB)

    Bence, P. J.

    1990-10-01

    This Management Control System (MCS) description describes the processes used to manage the cost and schedule of work performed by Westinghouse Hanford Company (Westinghouse Hanford) for the US Department of Energy, Richland Operations Office (DOE-RL), Richland, Washington. Westinghouse Hanford will maintain and use formal cost and schedule management control systems, as presented in this document, in performing work for the DOE-RL. This MCS description is a controlled document and will be modified or updated as required. This document must be approved by the DOE-RL; thereafter, any significant change will require DOE-RL concurrence. Westinghouse Hanford is the DOE-RL operations and engineering contractor at the Hanford Site. Activities associated with this contract (DE-AC06-87RL10930) include operating existing plant facilities, managing defined projects and programs, and planning future enhancements. This document is designed to comply with Section I-13 of the contract by providing a description of Westinghouse Hanford's cost and schedule control systems used in managing the above activities. 5 refs., 22 figs., 1 tab.

  12. OCRWM [Office of Civilian Radioactive Waste Management] System Engineering Management Plant (SEMP)

    International Nuclear Information System (INIS)

    1990-02-01

    The Nuclear Waste Policy Act of 1982 established the Office of Civilian Radioactive Waste Management (OCRWM) in the Department of Energy (DOE) to implement a program for the safe and permanent disposal of spent nuclear fuel and high-level radioactive waste. To achieve this objective, the OCRWM is developing an integrated waste-management system consisting of three elements: the transportation system, the monitored retrievable storage (MRS) facility, and the mined geologic disposal system (MGDS). The development of such a system requires management of many diverse disciplines that are involved in research, siting, design, licensing, and external interactions. The purpose of this Systems Engineering Management Plan (SEMP) is to prescribe how the systems-engineering process will be implemented in the development of the waste-management system. Systems engineering will be used by the OCRWM to manage, integrate, and document all aspects of the technical development of the waste-management system and its system elements to ensure that the requirements of the waste-management program are met. It will be applied to all technical activities of the OCRWM program. It will be used by the OCRWM (1) to specify the sequence of technical activities necessary to define the requirements the waste-management system must satisfy, (2) to develop the waste-management system, can be optimized to most effectively satisfy the requirements. Furthermore, systems engineering will be used in the management of Program activities at the program, program-element, and project levels by specifying procedures, studies, reviews, and documentation requirements. 9 refs., 1 fig

  13. Bringing social identity to work: the influence of manifestation and suppression on perceived discrimination, job satisfaction, and turnover intentions.

    Science.gov (United States)

    Madera, Juan M; King, Eden B; Hebl, Michelle R

    2012-04-01

    In the current article, we explored whether manifesting or suppressing an identity (race/ethnicity, gender, age, religion, sexual orientation, or disability) at work is related to perceived discrimination, job satisfaction, and turnover intentions. Participants included 211 working adults who completed an online survey. The results showed that efforts to suppress a group identity were positively (and behavioral manifestations of group identity negatively) related to perceived discrimination, which predicted job satisfaction and turnover intentions. These results suggest that diverse employees actively manage their nonwork identities while at work and that these identity management strategies have important consequences. PsycINFO Database Record (c) 2012 APA, all rights reserved.

  14. Tank waste remediation system systems engineering management plan

    International Nuclear Information System (INIS)

    Peck, L.G.

    1998-01-01

    This Systems Engineering Management Plan (SEMP) describes the Tank Waste Remediation System (TWRS) implementation of the US Department of Energy (DOE) systems engineering policy provided in 97-IMSD-193. The SEMP defines the products, process, organization, and procedures used by the TWRS Project to implement the policy. The SEMP will be used as the basis for tailoring the systems engineering applications to the development of the physical systems and processes necessary to achieve the desired end states of the program. It is a living document that will be revised as necessary to reflect changes in systems engineering guidance as the program evolves. The US Department of Energy-Headquarters has issued program management guidance, DOE Order 430. 1, Life Cycle Asset Management, and associated Good Practice Guides that include substantial systems engineering guidance

  15. Improvement of management systems for nuclear facilities

    International Nuclear Information System (INIS)

    2005-01-01

    The area of Quality Management/ Quality Assurance has been changed dramatically over the past years. The nuclear facilities moved from the 'traditional' Quality Assurance approach towards Quality Management Systems, and later a new concept of Integrated Management Systems was introduced. The IAEA is developing a new set of Standards on Integrated Management Systems, which will replace the current 50-C-Q/SG-Q1-Q14 Code. The new set of document will require the integration of all management areas into one coherent management system. The new set of standards on Management Systems promotes the concept of the Integrated Management Systems. Based on new set a big number of documents are under preparation. These documents will address the current issues in the management systems area, e.g. Management of Change, Continuous Improvement, Self-assessment, and Attributes of effective management, etc. Currently NPES is providing a number of TC projects and Extra Budgetary Programmes to assist Member States in this area. The new Standards on Management Systems will be published in 2006. A number of Regulatory bodies already indicated that they would take the new Management System Standards as a basis for the national regulation. This fact will motivate a considerable change in the management of nuclear utilities, requiring a new approach. This activity is suitable for all IAEA Members States with large or limited nuclear capabilities. The service is directed to provide assistance for the management of all organizations carrying on or regulating nuclear activities and facilities

  16. Planning and Resource Management in an Intelligent Automated Power Management System

    Science.gov (United States)

    Morris, Robert A.

    1991-01-01

    Power system management is a process of guiding a power system towards the objective of continuous supply of electrical power to a set of loads. Spacecraft power system management requires planning and scheduling, since electrical power is a scarce resource in space. The automation of power system management for future spacecraft has been recognized as an important R&D goal. Several automation technologies have emerged including the use of expert systems for automating human problem solving capabilities such as rule based expert system for fault diagnosis and load scheduling. It is questionable whether current generation expert system technology is applicable for power system management in space. The objective of the ADEPTS (ADvanced Electrical Power management Techniques for Space systems) is to study new techniques for power management automation. These techniques involve integrating current expert system technology with that of parallel and distributed computing, as well as a distributed, object-oriented approach to software design. The focus of the current study is the integration of new procedures for automatically planning and scheduling loads with procedures for performing fault diagnosis and control. The objective is the concurrent execution of both sets of tasks on separate transputer processors, thus adding parallelism to the overall management process.

  17. Energy Management of Smart Distribution Systems

    Science.gov (United States)

    Ansari, Bananeh

    Electric power distribution systems interface the end-users of electricity with the power grid. Traditional distribution systems are operated in a centralized fashion with the distribution system owner or operator being the only decision maker. The management and control architecture of distribution systems needs to gradually transform to accommodate the emerging smart grid technologies, distributed energy resources, and active electricity end-users or prosumers. The content of this document concerns with developing multi-task multi-objective energy management schemes for: 1) commercial/large residential prosumers, and 2) distribution system operator of a smart distribution system. The first part of this document describes a method of distributed energy management of multiple commercial/ large residential prosumers. These prosumers not only consume electricity, but also generate electricity using their roof-top solar photovoltaics systems. When photovoltaics generation is larger than local consumption, excess electricity will be fed into the distribution system, creating a voltage rise along the feeder. Distribution system operator cannot tolerate a significant voltage rise. ES can help the prosumers manage their electricity exchanges with the distribution system such that minimal voltage fluctuation occurs. The proposed distributed energy management scheme sizes and schedules each prosumer's ES to reduce the electricity bill and mitigate voltage rise along the feeder. The second part of this document focuses on emergency energy management and resilience assessment of a distribution system. The developed emergency energy management system uses available resources and redundancy to restore the distribution system's functionality fully or partially. The success of the restoration maneuver depends on how resilient the distribution system is. Engineering resilience terminology is used to evaluate the resilience of distribution system. The proposed emergency energy

  18. Social identity change: shifts in social identity during adolescence.

    Science.gov (United States)

    Tanti, Chris; Stukas, Arthur A; Halloran, Michael J; Foddy, Margaret

    2011-06-01

    This study investigated the proposition that adolescence involves significant shifts in social identity as a function of changes in social context and cognitive style. Using an experimental design, we primed either peer or gender identity with a sample of 380 early- (12-13 years), mid- (15-16 years), and late-adolescents (18-20 years) and then measured the effect of the prime on self-stereotyping and ingroup favouritism. The findings showed significant differences in social identity across adolescent groups, in that social identity effects were relatively strong in early- and late-adolescents, particularly when peer group identity rather than gender identity was salient. While these effects were consistent with the experience of change in educational social context, differences in cognitive style were only weakly related to ingroup favouritism. The implications of the findings for theory and future research on social identity during adolescence are discussed. Crown Copyright © 2010. Published by Elsevier Ltd. All rights reserved.

  19. Fingerprint recognition with identical twin fingerprints.

    Science.gov (United States)

    Tao, Xunqiang; Chen, Xinjian; Yang, Xin; Tian, Jie

    2012-01-01

    Fingerprint recognition with identical twins is a challenging task due to the closest genetics-based relationship existing in the identical twins. Several pioneers have analyzed the similarity between twins' fingerprints. In this work we continue to investigate the topic of the similarity of identical twin fingerprints. Our study was tested based on a large identical twin fingerprint database that contains 83 twin pairs, 4 fingers per individual and six impressions per finger: 3984 (83*2*4*6) images. Compared to the previous work, our contributions are summarized as follows: (1) Two state-of-the-art fingerprint identification methods: P071 and VeriFinger 6.1 were used, rather than one fingerprint identification method in previous studies. (2) Six impressions per finger were captured, rather than just one impression, which makes the genuine distribution of matching scores more realistic. (3) A larger sample (83 pairs) was collected. (4) A novel statistical analysis, which aims at showing the probability distribution of the fingerprint types for the corresponding fingers of identical twins which have same fingerprint type, has been conducted. (5) A novel analysis, which aims at showing which finger from identical twins has higher probability of having same fingerprint type, has been conducted. Our results showed that: (a) A state-of-the-art automatic fingerprint verification system can distinguish identical twins without drastic degradation in performance. (b) The chance that the fingerprints have the same type from identical twins is 0.7440, comparing to 0.3215 from non-identical twins. (c) For the corresponding fingers of identical twins which have same fingerprint type, the probability distribution of five major fingerprint types is similar to the probability distribution for all the fingers' fingerprint type. (d) For each of four fingers of identical twins, the probability of having same fingerprint type is similar.

  20. Fingerprint recognition with identical twin fingerprints.

    Directory of Open Access Journals (Sweden)

    Xunqiang Tao

    Full Text Available Fingerprint recognition with identical twins is a challenging task due to the closest genetics-based relationship existing in the identical twins. Several pioneers have analyzed the similarity between twins' fingerprints. In this work we continue to investigate the topic of the similarity of identical twin fingerprints. Our study was tested based on a large identical twin fingerprint database that contains 83 twin pairs, 4 fingers per individual and six impressions per finger: 3984 (83*2*4*6 images. Compared to the previous work, our contributions are summarized as follows: (1 Two state-of-the-art fingerprint identification methods: P071 and VeriFinger 6.1 were used, rather than one fingerprint identification method in previous studies. (2 Six impressions per finger were captured, rather than just one impression, which makes the genuine distribution of matching scores more realistic. (3 A larger sample (83 pairs was collected. (4 A novel statistical analysis, which aims at showing the probability distribution of the fingerprint types for the corresponding fingers of identical twins which have same fingerprint type, has been conducted. (5 A novel analysis, which aims at showing which finger from identical twins has higher probability of having same fingerprint type, has been conducted. Our results showed that: (a A state-of-the-art automatic fingerprint verification system can distinguish identical twins without drastic degradation in performance. (b The chance that the fingerprints have the same type from identical twins is 0.7440, comparing to 0.3215 from non-identical twins. (c For the corresponding fingers of identical twins which have same fingerprint type, the probability distribution of five major fingerprint types is similar to the probability distribution for all the fingers' fingerprint type. (d For each of four fingers of identical twins, the probability of having same fingerprint type is similar.

  1. Management information systems. [United Kingdom

    Energy Technology Data Exchange (ETDEWEB)

    Hartley, D.; Spence, A.C.

    1985-02-01

    The successful application in the United Kingdom of the real time monitoring and control systems (MINOS) for underground mining operations, particularly in coal transport and the development of coalface monitoring (FIDO) in 1980 led naturally to the design of an operational data base for management. A User Group of experienced colliery managers produced a Management Information System (MIS) requirements specification and began the evolution of the systems of today. Twenty-four mines operate MIS in different ways from total dependency to a means of checking their manual reporting system. MIS collects useful data from all the major MINOS applications and provides a means of manually inputting other, relevant information. A wide variety of displays and reports are available to management, adjusted to meet individual requirements. The benefits from the use of MIS are difficult to quantify, since they become part of the management process. Further developments are taking place based on operational experience and requirements and taking advantage of the recent advances in computer technology. MIS is the modern management tool in British coal mining, collecting, storing, analysing and presenting accurate information upon which management decision making is based.

  2. Operational Management System for Regulated Water Systems

    Science.gov (United States)

    van Loenen, A.; van Dijk, M.; van Verseveld, W.; Berger, H.

    2012-04-01

    Most of the Dutch large rivers, canals and lakes are controlled by the Dutch water authorities. The main reasons concern safety, navigation and fresh water supply. Historically the separate water bodies have been controlled locally. For optimizating management of these water systems an integrated approach was required. Presented is a platform which integrates data from all control objects for monitoring and control purposes. The Operational Management System for Regulated Water Systems (IWP) is an implementation of Delft-FEWS which supports operational control of water systems and actively gives advice. One of the main characteristics of IWP is that is real-time collects, transforms and presents different types of data, which all add to the operational water management. Next to that, hydrodynamic models and intelligent decision support tools are added to support the water managers during their daily control activities. An important advantage of IWP is that it uses the Delft-FEWS framework, therefore processes like central data collection, transformations, data processing and presentation are simply configured. At all control locations the same information is readily available. The operational water management itself gains from this information, but it can also contribute to cost efficiency (no unnecessary pumping), better use of available storage and advise during (water polution) calamities.

  3. Comparative Associations Between Achieved Bicultural Identity, Achieved Ego Identity, and Achieved Religious Identity and Adaptation Among Australian Adolescent Muslims.

    Science.gov (United States)

    Abu-Rayya, Hisham M; Abu-Rayya, Maram H; White, Fiona A; Walker, Richard

    2018-04-01

    This study examined the comparative roles of biculturalism, ego identity, and religious identity in the adaptation of Australian adolescent Muslims. A total of 504 high school Muslim students studying at high schools in metropolitan Sydney and Melbourne, Australia, took part in this study which required them to complete a self-report questionnaire. Analyses indicated that adolescent Muslims' achieved religious identity seems to play a more important role in shaping their psychological and socio-cultural adaptation compared to adolescents' achieved bicultural identity. Adolescents' achieved ego identity tended also to play a greater role in their psychological and socio-cultural adaptation than achieved bicultural identity. The relationships between the three identities and negative indicators of psychological adaptation were consistently indifferent. Based on these findings, we propose that the three identity-based forces-bicultural identity development, religious identity attainment, and ego identity formation-be amalgamated into one framework in order for researchers to more accurately examine the adaptation of Australian adolescent Muslims.

  4. Toward a general theory of conical intersections in systems of identical nuclei

    Science.gov (United States)

    Keating, Sean P.; Mead, C. Alden

    1987-02-01

    It has been shown previously that the Herzberg-Longuet-Higgins sign change produced in Born-Oppenheimer electronic wave functions when the nuclei traverse a closed path around a conical intersection has implications for the symmetry of wave functions under permutations of identical nuclei. For systems of three or four identical nuclei, there are special features present which have facilitated the detailed analysis. The present paper reports progress toward a general theory for systems of n nuclei. For n=3 or 4, the two key functions which locate conical intersections and define compensating phase factors can conveniently be defined so as to transform under permutations according to a two-dimensional irreducible representation of the permutation group. Since such representations do not exist for n>4, we have chosen to develop a formalism in terms of lab-fixed electronic basis functions, and we show how to define the two key functions in principle. The functions so defined both turn out to be totally symmetric under permutations. We show how they can be used to define compensating phase factors so that all modified electronic wave functions are either totally symmetric or totally antisymmetric under permutations. A detailed analysis is made to cyclic permutations in the neighborhood of Dnh symmetry, which can be extended by continuity arguments to more general configurations, and criteria are obtained for sign changes. There is a qualitative discussion of the treatment of more general permutations.

  5. INTEGRATIVE AUGMENTATION OF STANDARDIZED MANAGEMENT SYSTEMS

    Directory of Open Access Journals (Sweden)

    Stanislav Karapetrovic

    2008-03-01

    Full Text Available The development, features and integrating abilities of different international standards related to management systems are discussed. A group of such standards that augment the performance of quality management systems in organizations is specifically focused on. The concept, characteristics and an illustrative example of one augmenting standard, namely ISO 10001, are addressed. Integration of standardized augmenting systems, both by themselves and within the overall management system, is examined. It is argued that, in research and practice alike, integrative augmentation represents the future of standardized quality and other management systems.

  6. Swiss identity smells like chocolate: Social identity shapes olfactory judgments

    Science.gov (United States)

    Coppin, Géraldine; Pool, Eva; Delplanque, Sylvain; Oud, Bastiaan; Margot, Christian; Sander, David; Van Bavel, Jay J.

    2016-01-01

    There is extensive evidence that social identities can shape people’s attitudes and behavior, but what about sensory judgments? We examined the possibility that social identity concerns may also shape the judgment of non-social properties—namely, olfactory judgment. In two experiments, we presented Swiss and non-Swiss participants with the odor of chocolate, for which Switzerland is world-famous, and a control odor (popcorn). Swiss participants primed with Swiss identity reported the odor of chocolate (but not popcorn) as more intense than non-Swiss participants (Experiments 1 and 2) and than Swiss participants primed with individual identity or not primed (Experiment 2). The self-reported intensity of chocolate smell tended to increase as identity accessibility increased—but only among Swiss participants (Experiment 1). These results suggest that identity priming can counter-act classic sensory habituation effects, allowing identity-relevant smells to maintain their intensity after repeated presentations. This suggests that social identity dynamically influences sensory judgment. We discuss the potential implications for models of social identity and chemosensory perception. PMID:27725715

  7. Swiss identity smells like chocolate: Social identity shapes olfactory judgments.

    Science.gov (United States)

    Coppin, Géraldine; Pool, Eva; Delplanque, Sylvain; Oud, Bastiaan; Margot, Christian; Sander, David; Van Bavel, Jay J

    2016-10-11

    There is extensive evidence that social identities can shape people's attitudes and behavior, but what about sensory judgments? We examined the possibility that social identity concerns may also shape the judgment of non-social properties-namely, olfactory judgment. In two experiments, we presented Swiss and non-Swiss participants with the odor of chocolate, for which Switzerland is world-famous, and a control odor (popcorn). Swiss participants primed with Swiss identity reported the odor of chocolate (but not popcorn) as more intense than non-Swiss participants (Experiments 1 and 2) and than Swiss participants primed with individual identity or not primed (Experiment 2). The self-reported intensity of chocolate smell tended to increase as identity accessibility increased-but only among Swiss participants (Experiment 1). These results suggest that identity priming can counter-act classic sensory habituation effects, allowing identity-relevant smells to maintain their intensity after repeated presentations. This suggests that social identity dynamically influences sensory judgment. We discuss the potential implications for models of social identity and chemosensory perception.

  8. Configuration Management File Manager Developed for Numerical Propulsion System Simulation

    Science.gov (United States)

    Follen, Gregory J.

    1997-01-01

    One of the objectives of the High Performance Computing and Communication Project's (HPCCP) Numerical Propulsion System Simulation (NPSS) is to provide a common and consistent way to manage applications, data, and engine simulations. The NPSS Configuration Management (CM) File Manager integrated with the Common Desktop Environment (CDE) window management system provides a common look and feel for the configuration management of data, applications, and engine simulations for U.S. engine companies. In addition, CM File Manager provides tools to manage a simulation. Features include managing input files, output files, textual notes, and any other material normally associated with simulation. The CM File Manager includes a generic configuration management Application Program Interface (API) that can be adapted for the configuration management repositories of any U.S. engine company.

  9. Managing geometric information with a data base management system

    Science.gov (United States)

    Dube, R. P.

    1984-01-01

    The strategies for managing computer based geometry are described. The computer model of geometry is the basis for communication, manipulation, and analysis of shape information. The research on integrated programs for aerospace-vehicle design (IPAD) focuses on the use of data base management system (DBMS) technology to manage engineering/manufacturing data. The objectives of IPAD is to develop a computer based engineering complex which automates the storage, management, protection, and retrieval of engineering data. In particular, this facility must manage geometry information as well as associated data. The approach taken on the IPAD project to achieve this objective is discussed. Geometry management in current systems and the approach taken in the early IPAD prototypes are examined.

  10. dCache, towards Federated Identities & Anonymized Delegation

    Science.gov (United States)

    Ashish, A.; Millar, AP; Mkrtchyan, T.; Fuhrmann, P.; Behrmann, G.; Sahakyan, M.; Adeyemi, O. S.; Starek, J.; Litvintsev, D.; Rossi, A.

    2017-10-01

    For over a decade, dCache has relied on the authentication and authorization infrastructure (AAI) offered by VOMS, Kerberos, Xrootd etc. Although the established infrastructure has worked well and provided sufficient security, the implementation of procedures and the underlying software is often seen as a burden, especially by smaller communities trying to adopt existing HEP software stacks [1]. Moreover, scientists are increasingly dependent on service portals for data access [2]. In this paper, we describe how federated identity management systems can facilitate the transition from traditional AAI infrastructure to novel solutions like OpenID Connect. We investigate the advantages offered by OpenID Connect in regards to ‘delegation of authentication’ and ‘credential delegation for offline access’. Additionally, we demonstrate how macaroons can provide a more fine-granular authorization mechanism that supports anonymized delegation.

  11. Management of radioactive wastes at nuclear power plants

    International Nuclear Information System (INIS)

    1968-01-01

    Design data and operating experience with waste management systems at nuclear power stations in Canada, France, the United Kingdom and the United States of America are described. Although the specific designs and operating practices vary between nations, the underlying philosophies are essentially identical, being based on the protection principles of ICRP. The operating experience with different waste management systems has been excellent in maintaining the radiation exposures in the environment well below the accepted dose standards.

  12. OCRWM Systems Engineering Management Plan (SEMP)

    International Nuclear Information System (INIS)

    1994-06-01

    The Office of Civilian Radioactive Waste Management Systems Engineering Management Plan (OCRWM SEMP) specifies the technical management approach for the development of the waste management system, and specifies the approach for the development of each of the system elements -- the waste acceptance system, the transportation system, the Monitored Retrievable Storage (MRS) facility, and the mined geologic disposal system, which includes site characterization activity. The SEMP also delineates how systems engineering will be used by OCRWM to describe the system development process; it identifies responsibilities for its implementation, and specifies the minimum requirements for systems engineering. It also identifies the close interrelationship of system engineering and licensing processes. This SEMP, which is a combined OCRWM and M ampersand O SEMP, is part of the top-level program documentation and is prepared in accordance with the direction provided in the Program Management System Manual (PMSM). The relationship of this document to other top level documents in the CRWMS document hierarchy is defined in the PMSM. A systems engineering management plan for each project, which specifies the actions to be taken in implementing systems engineering at the project level, shall be prepared by the respective project managers. [''Program'' refers to the CRWMS-wide activity and ''project'' refers to that level responsible for accomplishing the specific activities of that segment of the program.] The requirements for the project level SEMPs are addressed in Section 4.2.2.2. They represent the minimum set of requirements, and do not preclude the broadening of systems engineering activities to meet the specific needs of each project

  13. FEATURES OF LOGISTIC SYSTEM ADAPTIVE MANAGEMENT

    Directory of Open Access Journals (Sweden)

    Natalya VOZNENKO

    2015-08-01

    Full Text Available The study presents literature survey on enterprise logistic system adaptive management place and structure in the general enterprise management system. The theoretical basics of logistic system functioning, levels of its management and its effectiveness had been investigated. The role of adaptive management and its types had been scrutinized. The necessity of creating company’s adaptive regulator such as its economic mechanism had been proved.

  14. Construction of test-bed system of voltage management system to ...

    African Journals Online (AJOL)

    Construction of test-bed system of voltage management system to apply physical power system. ... Journal of Fundamental and Applied Sciences ... system of voltage management system (VMS) in order to apply physical power system.

  15. Implementation of integrated management system

    International Nuclear Information System (INIS)

    Gaspar Junior, Joao Carlos A.; Fonseca, Victor Zidan da

    2007-01-01

    In present day exist quality assurance system, environment, occupational health and safety such as ISO9001, ISO14001 and OHSAS18001 and others standards will can create. These standards can be implemented and certified they guarantee one record system, quality assurance, documents control, operational control, responsibility definition, training, preparing and serve to emergency, monitoring, internal audit, corrective action, continual improvement, prevent of pollution, write procedure, reduce costs, impact assessment, risk assessment , standard, decree, legal requirements of municipal, state, federal and local scope. These procedure and systems when isolate applied cause many management systems and bureaucracy. Integration Management System reduce to bureaucracy, excess of documents, documents storage and conflict documents and easy to others standards implementation in future. The Integrated Management System (IMS) will be implemented in 2007. INB created a management group for implementation, this group decides planing, works, policy and advertisement. Legal requirements were surveyed, internal audits, pre-audits and audits were realized. INB is partially in accordance with ISO14001, OSHAS18001 standards. But very soon, it will be totally in accordance with this norms. Many studies and works were contracted to deal with legal requirements. This work have intention of show implementation process of ISO14001, OHSAS18001 and Integrated Management System on INB. (author)

  16. 23 CFR 972.204 - Management systems requirements.

    Science.gov (United States)

    2010-04-01

    ... to operate and maintain the management systems and their associated databases; and (5) A process for... analyses and coordination of all management system outputs to systematically operate, maintain, and upgrade...) The management systems shall be operated so investment decisions based on management system outputs...

  17. The decommissioning information management system

    International Nuclear Information System (INIS)

    Park, Seung-Kook; Moon, Jei-Kwon

    2015-01-01

    At the Korea Atomic Energy Research Institute (KAERI), the Korea Research Reactor (KRR-2) and one uranium conversion plant (UCP) were decommissioned. A project was launched in 1997, for the decommissioning of KRR-2 reactor with the goal of completion by 2008. Another project for the decommissioning of the UCP was launched in 2001. The physical dismantling works were started in August 2003 and the entire project was completed by the end of 2010. KAERI has developed a computer information system, named DECOMMIS, for an information management with an increased effectiveness for decommissioning projects and for record keeping for the future decommissioning projects. This decommissioning information system consists of three sub-systems; code management system, data input system (DDIS) and data processing and output system (DDPS). Through the DDIS, the data can be directly inputted at sites to minimize the time gap between the dismantling activities and the evaluation of the data by the project staff. The DDPS provides useful information to the staff for more effective project management and this information includes several fields, such as project progress management, man power management, waste management, and radiation dose control of workers and so on. The DECOMMIS was applied to the decommissioning projects of the KRR-2 and the UCP, and was utilized to give information to the staff for making decisions regarding the progress of projects. It is also to prepare the reference data for the R and D program which is for the development of the decommissioning engineering system tools and to maintain the decommissioning data for the next projects. In this paper, the overall system will be explained and the several examples of its utilization, focused on waste management and manpower control, will be introduced. (author)

  18. Identity, gender and teaching English in Japan

    CERN Document Server

    Nagatomo, Diane Hawley

    2016-01-01

    How do teachers, who have chosen to settle down in one country, manage the difficulties of living and teaching English in that country? This book answers this question by investigating the personal and professional identity development of ten Western women with Japanese spouses who teach English in various educational contexts in Japan.

  19. Juggling identities of rheumatoid arthritis, motherhood and paid work

    DEFF Research Database (Denmark)

    Feddersen, Helle; Mechlenborg Kristiansen, Tine; Andersen, Pernille Tanggaard

    2018-01-01

    professionals have an important role to play in investigating possible ways for the individual to maintain employment or return to work. Living with rheumatoid arthritis and being a paid worker challenge women's role performance and thereby their identification as mothers. Therefore, rehabilitation......PURPOSE: To explore how women with rheumatoid arthritis manage their illness, motherhood, and work life. METHODS: A constructivist, grounded theory approach based on individual interviews and participant observations with 20 women with rheumatoid arthritis who participated in work life and had......-sided act; (3) Living with rheumatoid arthritis as an identity? Paid work, motherhood, and illness are linked to the women's social identities. The women construct and change their identities in interactions with children, partners, other parents, colleagues, and employers. CONCLUSION: The women attribute...

  20. LCA of Solid Waste Management Systems

    DEFF Research Database (Denmark)

    Bakas, Ioannis; Laurent, Alexis; Clavreul, Julie

    2018-01-01

    The chapter explores the application of LCA to solid waste management systems through the review of published studies on the subject. The environmental implications of choices involved in the modelling setup of waste management systems are increasingly in the spotlight, due to public health...... concerns and new legislation addressing the impacts from managing our waste. The application of LCA to solid waste management systems, sometimes called “waste LCA”, is distinctive in that system boundaries are rigorously defined to exclude all life cycle stages except from the end-of-life. Moreover...... LCA on solid waste systems....

  1. IMPLEMENTING AN INTEGRATED HEALTH, SAFETY, AND ENVIRONMENTAL MANAGEMENT SYSTEM: THE CASE OF A CONSTRUCTION COMPANY

    Directory of Open Access Journals (Sweden)

    Filippos Tepaskoualos

    2017-12-01

    Full Text Available Over the past two decades, there has been an increasing trend of organizations implementing simultaneously two or more management systems. The structural similarities of these systems - despite the diversity of their fields of application, such as occupational health and safety for OHSAS 18001, and environmental management for ISO 14001 - have enabled many organizations to integrate different systems into a single one, rather than implementing them separately from one another. The purpose of this paper is to examine in depth a case of integration of the ISO 14001 and OHSAS 18001 systems, using a construction company as a research setting, in order to draw conclusions about the level of integration achieved, as well as the benefits, the problems, and the critical success factors of this endeavour. The findings of this study show that both the company's devotion to the fulfillment of the critical success factors and the identical structure of the two systems under consideration have facilitated the successful outcome of integration. However, this does not automatically imply that the company adopted the idea of full integration. Instead, the maximization of integration benefits and the elimination of related problems was achieved through the company's conscious choice to proceed with partial integration, keeping separate manuals, policies, and risk management procedures for each system. This study will be useful in order to understand that partial integration is a perfectly acceptable and realistic solution that, under certain circumstances, may even have a better cost-benefit ratio than full integration.

  2. Audit Information Management System

    Data.gov (United States)

    US Agency for International Development — USAID/OIG has initiated its new Audit Information Management System (AIMS) to track OIG's audit recommendations and USAID's management decisions. OIG's in-house...

  3. JAX Colony Management System (JCMS): an extensible colony and phenotype data management system

    OpenAIRE

    Donnelly, Chuck J.; McFarland, Mike; Ames, Abigail; Sundberg, Beth; Springer, Dave; Blauth, Peter; Bult, Carol J.

    2010-01-01

    The Jackson Laboratory Colony Management System (JCMS) is a software application for managing data and information related to research mouse colonies, associated biospecimens, and experimental protocols. JCMS runs directly on computers that run one of the PC Windows® operating systems, but can be accessed via web browser interfaces from any computer running a Windows, Macintosh®, or Linux® operating system. JCMS can be configured for a single user or multiple users in small- to medium-size wo...

  4. The quality management system applied at PRPN

    International Nuclear Information System (INIS)

    Benar Bukit

    2007-01-01

    The ISO 9001-2000 is an International standard for quality management systems. The application of this quality management system is for guaranteeing that the organizations products will fulfill requirements set by its customers. Here the steps taken to apply the quality management system at PRPN are expounded in five main parts, namely quality management system, responsibilities of the management, resources, product realization, measurement, analysis and repair. (author)

  5. gLExec and MyProxy integration in the ATLAS/OSG PanDA workload management system

    International Nuclear Information System (INIS)

    Caballero, J; Hover, J; Maeno, T; Potekhin, M; Wenaus, T; Zhao, X; Litmaath, M; Nilsson, P

    2010-01-01

    Worker nodes on the grid exhibit great diversity, making it difficult to offer uniform processing resources. A pilot job architecture, which probes the environment on the remote worker node before pulling down a payload job, can help. Pilot jobs become smart wrappers, preparing an appropriate environment for job execution and providing logging and monitoring capabilities. PanDA (Production and Distributed Analysis), an ATLAS and OSG workload management system, follows this design. However, in the simplest (and most efficient) pilot submission approach of identical pilots carrying the same identifying grid proxy, end-user accounting by the site can only be done with application-level information (PanDA maintains its own end-user accounting), and end-user jobs run with the identity and privileges of the proxy carried by the pilots, which may be seen as a security risk. To address these issues, we have enabled PanDA to use gLExec, a tool provided by EGEE which runs payload jobs under an end-user's identity. End-user proxies are pre-staged in a credential caching service, MyProxy, and the information needed by the pilots to access them is stored in the PanDA DB. gLExec then extracts from the user's proxy the proper identity under which to run. We describe the deployment, installation, and configuration of gLExec, and how PanDA components have been augmented to use it. We describe how difficulties were overcome, and how security risks have been mitigated. Results are presented from OSG and EGEE Grid environments performing ATLAS analysis using PanDA and gLExec.

  6. Work flow management systems applied in nuclear power plants management system to a new computer platform

    International Nuclear Information System (INIS)

    Rodriguez Lorite, M.; Martin Lopez-Suevos, C.

    1996-01-01

    Activities performed in most companies are based on the flow of information between their different departments and personnel. Most of this information is on paper (delivery notes, invoices, reports, etc). The percentage of information transmitted electronically (electronic transactions, spread sheets, files from word processors, etc) is usually low. The implementation of systems to control and speed up this work flow is the aim of work flow management systems. This article presents a prototype for applying work flow management systems to a specific area: the basic life cycle of a purchase order in a nuclear power plant, which requires the involvement of various computer applications: purchase order management, warehouse management, accounting, etc. Once implemented, work flow management systems allow optimisation of the execution of different tasks included in the managed life cycles and provide parameters to, if necessary, control work cycles, allowing their temporary or definitive modification. (Author)

  7. Unlimited Gender: The Discursive Construction of the Travesti Identity Through the Manipulation of the Grammatical Gender System

    Directory of Open Access Journals (Sweden)

    Rodrigo Borba

    2008-05-01

    Full Text Available This study investigates Southern Brazilian traveestis’ manipulation of the Portuguese grammatical gender system. During field work, it was verified that feminine forms are the preferred choice in the group. However, ideological and bodily tensions that surround travestis seem to force them to make use of masculine forms in specific discursive contexts. Travestis use masculine forms 1 to produce narratives about the time before their body modifications took place; 2 to report speech produced by others when talking about transvestites; 3 to talk about themselves within their family relationships; and 4 to distinguish themselves from ‘other’ travestis they do not identify with. Thus, the study shows how Southern Brazilian travestis use the Brazilian Portuguese grammatical gender system as a resource to manipulate their identities and the identities of the community they belong to.

  8. Management systems for service providers

    International Nuclear Information System (INIS)

    Bolokonya, Herbert Chiwalo

    2015-02-01

    In the field of radiation safety and protection there are a number of institutions that are involved in achieving different goals and strategies. These strategies and objectives are achieved based on a number of tools and systems, one of these tools and systems is the use of a management system. This study aimed at reviewing the management system concept for Technical Service Providers in the field of radiation safety and protection. The main focus was on personal monitoring services provided by personal dosimetry laboratories. A number of key issues were found to be prominent to make the management system efficient. These are laboratory accreditation, approval; having a customer driven operating criteria; and controlling of records and good reporting. (au)

  9. Integrating Process Management with Archival Management Systems: Lessons Learned

    Directory of Open Access Journals (Sweden)

    J. Gordon Daines, III

    2009-03-01

    Full Text Available The Integrated Digital Special Collections (INDI system is a prototype of a database-driven, Web application designed to automate and manage archival workflow for large institutions and consortia. This article discusses the how the INDI project enabled the successful implementation of a process to manage large technology projects in the Harold B. Lee Library at Brigham Young University. It highlights how the scope of these technology projects is set and how the major deliverables for each project are defined. The article also talks about how the INDI system followed the process and still failed to be completed. It examines why the process itself is successful and why the INDI project failed. It further underscores the importance of process management in archival management systems.

  10. 15 CFR 995.25 - Quality management system.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 3 2010-01-01 2010-01-01 false Quality management system. 995.25... § 995.25 Quality management system. (a) Quality management system for CEVADs. (1) CEVAD shall operate a quality management system, based on ISO 9001-2000 or equivalent, which embraces all elements of the...

  11. Device configuration-management system

    International Nuclear Information System (INIS)

    Nowell, D.M.

    1981-01-01

    The Fusion Chamber System, a major component of the Magnetic Fusion Test Facility, contains several hundred devices which report status to the Supervisory Control and Diagnostic System for control and monitoring purposes. To manage the large number of diversity of devices represented, a device configuration management system was required and developed. Key components of this software tool include the MFTF Data Base; a configuration editor; and a tree structure defining the relationships between the subsystem devices. This paper will describe how the configuration system easily accomodates recognizing new devices, restructuring existing devices, and modifying device profile information

  12. A distribution management system

    Energy Technology Data Exchange (ETDEWEB)

    Jaerventausta, P; Verho, P; Kaerenlampi, M; Pitkaenen, M [Tampere Univ. of Technology (Finland); Partanen, J [Lappeenranta Univ. of Technology (Finland)

    1998-08-01

    The development of new distribution automation applications is considerably wide nowadays. One of the most interesting areas is the development of a distribution management system (DMS) as an expansion to the traditional SCADA system. At the power transmission level such a system is called an energy management system (EMS). The idea of these expansions is to provide supporting tools for control center operators in system analysis and operation planning. Nowadays the SCADA is the main computer system (and often the only) in the control center. However, the information displayed by the SCADA is often inadequate, and several tasks cannot be solved by a conventional SCADA system. A need for new computer applications in control center arises from the insufficiency of the SCADA and some other trends. The latter means that the overall importance of the distribution networks is increasing. The slowing down of load-growth has often made network reinforcements unprofitable. Thus the existing network must be operated more efficiently. At the same time larger distribution areas are for economical reasons being monitored at one control center and the size of the operation staff is decreasing. The quality of supply requirements are also becoming stricter. The needed data for new applications is mainly available in some existing systems. Thus the computer systems of utilities must be integrated. The main data source for the new applications in the control center are the AM/FM/GIS (i.e. the network database system), the SCADA, and the customer information system (CIS). The new functions can be embedded in some existing computer system. This means a strong dependency on the vendor of the existing system. An alternative strategy is to develop an independent system which is integrated with other computer systems using well-defined interfaces. The latter approach makes it possible to use the new applications in various computer environments, having only a weak dependency on the

  13. JAX Colony Management System (JCMS): an extensible colony and phenotype data management system.

    Science.gov (United States)

    Donnelly, Chuck J; McFarland, Mike; Ames, Abigail; Sundberg, Beth; Springer, Dave; Blauth, Peter; Bult, Carol J

    2010-04-01

    The Jackson Laboratory Colony Management System (JCMS) is a software application for managing data and information related to research mouse colonies, associated biospecimens, and experimental protocols. JCMS runs directly on computers that run one of the PC Windows operating systems, but can be accessed via web browser interfaces from any computer running a Windows, Macintosh, or Linux operating system. JCMS can be configured for a single user or multiple users in small- to medium-size work groups. The target audience for JCMS includes laboratory technicians, animal colony managers, and principal investigators. The application provides operational support for colony management and experimental workflows, sample and data tracking through transaction-based data entry forms, and date-driven work reports. Flexible query forms allow researchers to retrieve database records based on user-defined criteria. Recent advances in handheld computers with integrated barcode readers, middleware technologies, web browsers, and wireless networks add to the utility of JCMS by allowing real-time access to the database from any networked computer.

  14. Managing Digital Identity on Twitter: The Case of School Administrators

    Science.gov (United States)

    Cho, Vincent; Jimerson, Jo Beth

    2017-01-01

    What does it mean to be and to act like a school leader online? Although many school leaders might be comfortable navigating issues of identity in face-to-face environments, online environments may present new and unprecedented challenges. These challenges may range from concerns about privacy and surveillance to questions about how best to…

  15. University Performance Management

    DEFF Research Database (Denmark)

    For the last two decades the Danish Universities have felt the impact of the international trend towards implementation of New Public Management. The results are seen in the implementation of new hierarchical governance structures and contractual governance system including market based quantitat......For the last two decades the Danish Universities have felt the impact of the international trend towards implementation of New Public Management. The results are seen in the implementation of new hierarchical governance structures and contractual governance system including market based...... quantitative measurement systems for resource allocation and performance evaluation. Compared to other countries the changes in performance measurements and governance of the Danish universities are radical and the Minister of Science heralded them as "the greatest change in university management since...... the founding of Copenhagen University in 1479". The changes took place with surprisingly little resistance from university scholars. The articles in this anthology investigate the origins and rationales for the silent managerial revolution at Danish Universities and the radical implications for the identity...

  16. Integrated Computer System of Management in Logistics

    Science.gov (United States)

    Chwesiuk, Krzysztof

    2011-06-01

    This paper aims at presenting a concept of an integrated computer system of management in logistics, particularly in supply and distribution chains. Consequently, the paper includes the basic idea of the concept of computer-based management in logistics and components of the system, such as CAM and CIM systems in production processes, and management systems for storage, materials flow, and for managing transport, forwarding and logistics companies. The platform which integrates computer-aided management systems is that of electronic data interchange.

  17. Y-12 Integrated Materials Management System

    Energy Technology Data Exchange (ETDEWEB)

    Alspaugh, D. H.; Hickerson, T. W.

    2002-06-03

    The Integrated Materials Management System, when fully implemented, will provide the Y-12 National Security Complex with advanced inventory information and analysis capabilities and enable effective assessment, forecasting and management of nuclear materials, critical non-nuclear materials, and certified supplies. These capabilities will facilitate future Y-12 stockpile management work, enhance interfaces to existing National Nuclear Security Administration (NNSA) corporate-level information systems, and enable interfaces to planned NNSA systems. In the current national nuclear defense environment where, for example, weapons testing is not permitted, material managers need better, faster, more complete information about material properties and characteristics. They now must manage non-special nuclear material at the same high-level they have managed SNM, and information capabilities about both must be improved. The full automation and integration of business activities related to nuclear and non-nuclear materials that will be put into effect by the Integrated Materials Management System (IMMS) will significantly improve and streamline the process of providing vital information to Y-12 and NNSA managers. This overview looks at the kinds of information improvements targeted by the IMMS project, related issues, the proposed information architecture, and the progress to date in implementing the system.

  18. Y-12 Integrated Materials Management System

    International Nuclear Information System (INIS)

    Alspaugh, D. H.; Hickerson, T. W.

    2002-01-01

    The Integrated Materials Management System, when fully implemented, will provide the Y-12 National Security Complex with advanced inventory information and analysis capabilities and enable effective assessment, forecasting and management of nuclear materials, critical non-nuclear materials, and certified supplies. These capabilities will facilitate future Y-12 stockpile management work, enhance interfaces to existing National Nuclear Security Administration (NNSA) corporate-level information systems, and enable interfaces to planned NNSA systems. In the current national nuclear defense environment where, for example, weapons testing is not permitted, material managers need better, faster, more complete information about material properties and characteristics. They now must manage non-special nuclear material at the same high-level they have managed SNM, and information capabilities about both must be improved. The full automation and integration of business activities related to nuclear and non-nuclear materials that will be put into effect by the Integrated Materials Management System (IMMS) will significantly improve and streamline the process of providing vital information to Y-12 and NNSA managers. This overview looks at the kinds of information improvements targeted by the IMMS project, related issues, the proposed information architecture, and the progress to date in implementing the system

  19. Implementing Management Systems-Based Assessments

    International Nuclear Information System (INIS)

    Campisi, John A.; Reese, Robert T.

    1999-01-01

    A management system approach for evaluating environment, safety, health, and quality is in use at Sandia National Laboratories (SNL). Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department of Energy under contract DE-AC04-94AL85000. As a multi-program national laboratory, SNL has many diverse operations including research, engineering development and applications, production, and central services supporting all activities and operations. Basic research examples include fusion power generation, nuclear reactor experiments, and investigation of combustion processes. Engineering development examples are design, testing, and prototype developments of micro-mechanical systems for safe'arding computer systems, air bags for automobiles, satellite systems, design of transportation systems for nuclear materials, and systems for use in medical applications such as diagnostics and surgery. Production operations include manufacture of instrumented detection devices, radioisotopes, and replacement parts for previously produced engineered systems. Support services include facilities engineering, construction, and site management, site security, packaging and transportation of hazardous materials wastes, ES ampersand H functional programs to establish requirements and guidance to comply with federal, state, local, and contractual requirements and work safety. In this diverse environment, unlike more traditional single function business units, an integrated consistent management system is not typical. Instead, each type of diverse activity has its own management system designed and distributed around the operations, personnel, customers, and facilities (e.g., hazards involved, security, regulatory requirements, and locations). Laboratory managers are not likely to have experience in the more traditional hierarchical or command and control structures and thus do not share oversight expectations found in

  20. Implementing Management Systems-Based Assessments

    Energy Technology Data Exchange (ETDEWEB)

    Campisi, John A.; Reese, Robert T.

    1999-05-03

    A management system approach for evaluating environment, safety, health, and quality is in use at Sandia National Laboratories (SNL). Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department of Energy under contract DE-AC04-94AL85000. As a multi-program national laboratory, SNL has many diverse operations including research, engineering development and applications, production, and central services supporting all activities and operations. Basic research examples include fusion power generation, nuclear reactor experiments, and investigation of combustion processes. Engineering development examples are design, testing, and prototype developments of micro-mechanical systems for safe'~arding computer systems, air bags for automobiles, satellite systems, design of transportation systems for nuclear materials, and systems for use in medical applications such as diagnostics and surgery. Production operations include manufacture of instrumented detection devices, radioisotopes, and replacement parts for previously produced engineered systems. Support services include facilities engineering, construction, and site management, site security, packaging and transportation of hazardous materials wastes, ES&H functional programs to establish requirements and guidance to comply with federal, state, local, and contractual requirements and work safety. In this diverse environment, unlike more traditional single function business units, an integrated consistent management system is not typical. Instead, each type of diverse activity has its own management system designed and distributed around the operations, personnel, customers, and facilities (e.g., hazards involved, security, regulatory requirements, and locations). Laboratory managers are not likely to have experience in the more traditional hierarchical or command and control structures and thus do not share oversight expectations found in

  1. FORMATION OF THE ENTERPRISE COSTS MANAGEMENT SYSTEM

    Directory of Open Access Journals (Sweden)

    Borysiuk Iryna

    2018-01-01

    Full Text Available Introduction. The paper deals with the actual issues of formation of the enterprise management system costs, because in the conditions of an unstable market environment the financial performance depends on the efficiency of the cost management system, competitiveness, financial sustainability and investment attractiveness of any subject of economic activity. Purpose of the article is consolidation of approaches to cost management, theoretical substantiation and development of recommendations regarding the formation of the enterprise cost management system. Results. Development of an enterprise cost management system based on research on the essence and cost management approaches. The goals, tasks, principles, methods, tools, functions and main elements of the cost management system were determined, factors of the external and internal environment of the enterprise, that affect the system of its costs management. Conclusions. Formation of integrated cost management system ensures the successful company operation on the market, production of competitive products based on costs and prices optimization and making a profit, increase of the reasonableness of making managerial decisions.

  2. The Supermalt identity

    DEFF Research Database (Denmark)

    Bech-Larsen, Tino; Esbjerg, Lars; Grunert, Klaus G.

    2007-01-01

    on consumers' self-identities. The second part explored the role of food and beverage products in the construction of self-identities. The final part focused on the construction of brand identity for Supermalt. Findings - The article provides information on the self-identities constructed by Afro......-Caribbean informants. The food and beverage consumption of informants reflects their mixed cultural identity. The brand identity Supermalt appears to be malleable, with ample room for consumer co-construction. Perceptions of brand identity differ markedly among informants, who are all able to construct Supermalt......Purpose - The objective of this article is to conduct a case study of the Supermalt brand of malt beer, which has become the preferred beverage of Afro-Caribbean consumers in Brixton on a very limited marketing budget. Design/methodology/approach - The article uses the concepts of personal identity...

  3. Fashioning Identity

    DEFF Research Database (Denmark)

    Mackinney-Valentin, Maria

    We dress to communicate who we are, or who we would like others to think we are, telling seductive fashion narratives through our adornment. Yet, today, fashion has been democratized through high-low collaborations, social media and real-time fashion mediation, complicating the basic dynamic...... of identity displays, and creating tension between personal statements and social performances. Fashioning Identity explores how this tension is performed through fashion production and consumption,by examining a diverse series of case studies - from ninety-year old fashion icons to the paradoxical rebellion...... by readdressing Fred Davis' seminal concept of 'identity ambivalence' in Fashion, Culture and Identity (1992), Mackinney-Valentin argues that we are in an epoch of 'status ambivalence', in which fashioning one's own identity has become increasingly complicated....

  4. Energy management systems in buildings

    Energy Technology Data Exchange (ETDEWEB)

    Lush, D. M.

    1979-07-01

    An investigation is made of the range of possibilities available from three types of systems (automatic control devices, building envelope, and the occupants) in buildings. The following subjects are discussed: general (buildings, design and personnel); new buildings (envelope, designers, energy and load calculations, plant design, general design parameters); existing buildings (conservation measures, general energy management, air conditioned buildings, industrial buildings); man and motivation (general, energy management and documentation, maintenance, motivation); automatic energy management systems (thermostatic controls, optimized plant start up, air conditioned and industrial buildings, building automatic systems). (MCW)

  5. Non-local quantal Noether identities and their applications

    International Nuclear Information System (INIS)

    Li Ziping

    2002-01-01

    Based on the phase-space generating functional for a system with a singular high-order Lagrangian, the quantal canonical Noether identities under the local and non-local transformation in phase space for such system have been derived. For a gauge-invariant system with a higher-order Lagrangian, the quantal Noether identities under the local and non-local transformation in configuration space have also been derived. it has been pointed out that in certain cases the quantal Noether identities may be converted to the conservation laws at the quantum level. This algorithm to derive the quantal conservation laws is significantly different from the first quantal Noether theorem. The applications to the non-Abelian CS theories with higher-order derivatives are given. The conserved quantities at the quantum level for some local and non-local transformation are found respectively

  6. The importance of management information systems in a managed care environment.

    Science.gov (United States)

    Porro, M R; Brill, K R

    1995-06-01

    Keys to successful information systems for home care providers are planning and control. With managed care's emphasis on data, agencies need to have information systems that can handle the demands managed care puts on agencies today--planning before hurrying to install a system will ensure control as the managed care contracts add up.

  7. Ambiguous genitalia, gender-identity problems, and sex reassignment.

    Science.gov (United States)

    Dittmann, R W

    1998-01-01

    This article discusses general issues with regard to gender-identity problems, sex reassignment, and clinical management in patients with ambiguous genitalia, based on a detailed case history of a patient with penile agenesis who has been followed more than 20 years. After initial uncertainty, the patient began to grow up as a boy, lived from the fourth year of life as a girl and young woman, and lived from late puberty on as a man. Over his lifetime he experienced extensive corrective surgery plus hormonal substitution therapy. Pre- and perinatal hormonal conditions, phenomenology of the genitalia, sex of rearing, timing of sex reassignment and corrective surgery, for example, appear to be important components for the development of gender-role behavior, gender identity, and sexual orientation of intersex patients. Findings and retrospective considerations for this patient suggest the need for careful differential activities in diagnostic workup, approaches to sex assignment and possible reassignment, and the clinical management of patients and families.

  8. Underground risk management information systems

    Energy Technology Data Exchange (ETDEWEB)

    Matsuyama, S.; Inoue, M.; Sakai, T.

    2006-03-15

    JCOAL has conducted Joint Research on an Underground Communication and Risk Management Information System with CSIRO of Australia under a commissioned study project for the promotion of coal use starting in fiscal 2002. The goal of this research project is the establishment of a new Safety System focusing on the comprehensive risk management information system by the name of Nexsys. The main components of the system are the Ethernet type underground communication system that represents the data communication base, and the risk management information system that permits risk analysis in real-time and provides decision support based on the collected data. The Nexsys is an open system and is a core element of the underground monitoring system. Using a vast amount of underground data, it is capable of accommodating a wide range of functions that were not available in the past. Because of it, it is possible to construct an advanced underground safety system. 14 figs., 4 tabs.

  9. Knowledge management: processes and systems | Igbinovia ...

    African Journals Online (AJOL)

    Knowledge management: processes and systems. ... Information Impact: Journal of Information and Knowledge Management ... observation, role reversal technique, and discussion forums as well as the forms of knowledge representation to include report writing, database management system and institutional repositories.

  10. Environmental management: A system approach

    Science.gov (United States)

    Petak, William J.

    1981-05-01

    This paper presents a system framework whose purpose is to improve understanding of environmental management. By analyzing the links between elements of the environmental management system, it is possible to construct a model that aids thinking systematically about the decision-making subsystem, and other subsystems, of the entire environmental management system. Through a multidisciplinary environmental approach, each of the individual subsystems is able to adapt to threats and opportunities. The fields of government, market economics, social responsibility and ecology, for example, are so complex that it is extremely difficult to develop a framework that gives full consideration to all aspects. This paper, through the application of a highly idealized system framework, attempts to show the general relationships that exist between complex system elements.

  11. Civil Identity

    DEFF Research Database (Denmark)

    Petersen, Lars Axel

    In this paper I will go through a catalogue of examples of contexts in which the term civil identity is currently used, ranging from the formal and technical process of linking a set of administrative and other events to an individual biological person by means of identity cards, fingerprints, iris...... of Israel to Luce Irigaray's Feminist agenda of elaborating gender specific civil identities. My intention is to investigate whether these different employments of 'civil identity' point towards a common, and fairly well defined object field asking questions of contemporary relevance to the philosophy...

  12. Maternal identity of women in the postpartum period

    OpenAIRE

    Maria B. Perun

    2013-01-01

    The article provides a theoretical analysis of the notions of “maternity”, “maternal sphere”, “maternal role” and “maternal identity”. The place of maternal identity in the system of a woman’s identities is determined. This article provides a brief description of the structural elements (cognitive, emotional, behavioural and axiological) of maternal identity. It also emphasizes the significance of the postpartum period in a women’s psychic life and stresses its pivotal role in the devel...

  13. Integrated Services Management System (ISMS): A management and decision making tool

    Energy Technology Data Exchange (ETDEWEB)

    Barber, D.S.; Brockman, D.L.; Buxton, L.D. [and others

    1995-10-01

    This document provides information concerning the Integrated Services Management System (ISMS) that was developed for the Laboratories Services Division during the period February 1994 through May 1995. ISMS was developed as a formal method for centralized management of programs within the Division. With minor modifications, this system can be adapted for management of all overhead functions at SNL or for sector level program management. Included in this document are the reasons for the creation of this system as well as the resulting benefits. The ISMS consists of six interlinked processes; Issues Management, Task/Activity Planning, Work Decision, Commitment Management, Process/Project Management, and Performance Assessment. Those processes are described in detail within this document. Additionally, lessons learned and suggestions for future improvements are indicated.

  14. Searching your site's management information systems

    International Nuclear Information System (INIS)

    Marquez, W.; Rollin, C.

    1994-01-01

    The Department of Energy's guidelines for the Baseline Environmental Management Report (BEMR) encourage the use of existing data when compiling information. Specific systems mentioned include the Progress Tracking System, the Mixed-Waste Inventory Report, the Waste Management Information System, DOE 4700.1-related systems, Programmatic Environmental Impact Statement (PEIS) data, and existing Work Breakdown Structures. In addition to these DOE-Headquarters tracking and reporting systems, there are a number of site systems that will be relied upon to produce the BEMR, including: (1) site management control and cost tracking systems; (2) commitment/issues tracking systems; (3) program-specific internal tracking systems; (4) Site material/equipment inventory systems. New requirements have often prompted the creation of new, customized tracking systems. This is a very time and money consuming process. As the BEMR Management Plan emphasizes, an effort should be made to use the information in existing tracking systems. Because of the wealth of information currently available from in-place systems, development of a new tracking system should be a last resort

  15. On Fay identity

    International Nuclear Information System (INIS)

    Michev, Iordan P.

    2006-01-01

    In the first part of this paper we consider the transformation of the cubic identities for general Korteweg-de Vries (KdV) tau functions from [Mishev, J. Math. Phys. 40, 2419-2428 (1999)] to the specific identities for trigonometric KdV tau functions. Afterwards, we consider the Fay identity as a functional equation and provide a wide set of solutions of this equation. The main result of this paper is Theorem 3.4, where we generalize the identities from Mishev. An open problem is the transformation of the cubic identities from Mishev to the specific identities for elliptic KdV tau functions

  16. Identical Twin Primigravid Sisters -Spontaneous Labour and ...

    African Journals Online (AJOL)

    We report 2 cases of identical twin sisters, the older sibling getting married 14 months earlier but both got pregnant for their first child at about the same time and were managed by the same Obstetrician and fell into spontaneous labour within a few hours of each other. Both were delivered by emergency caesarean section ...

  17. INTEGRATED HSEQ MANAGEMENT SYSTEMS: DEVELOPMENTS AND TRENDS

    OpenAIRE

    Osmo Kauppila; Janne Härkönen; Seppo Väyrynen

    2015-01-01

    The integration of health and safety, environmental and quality (HSEQ) management systems has become a current topic in the 21st century, as the need for systems thinking has grown along with the number of management system standards. This study aims to map current developments and trends in integrated HSEQ management. Three viewpoints are taken: the current state of the main HSEQ management standards, research literature on integrated management systems (IMS), and a case study of an industry...

  18. INTEGRATED HSEQ MANAGEMENT SYSTEMS: DEVELOPMENTS AND TRENDS

    Directory of Open Access Journals (Sweden)

    Osmo Kauppila

    2015-06-01

    Full Text Available The integration of health and safety, environmental and quality (HSEQ management systems has become a current topic in the 21st century, as the need for systems thinking has grown along with the number of management system standards. This study aims to map current developments and trends in integrated HSEQ management. Three viewpoints are taken: the current state of the main HSEQ management standards, research literature on integrated management systems (IMS, and a case study of an industry-led HSEQ cluster in Northern Finland. The results demonstrate that some of the most prominent current trends are the harmonization of the high level structure of management systems by ISO, the evaluation of IMS, accounting for the supply chain in HSEQ issues, and sustainability and risk management. The results of the study can be used by practitioners to get a view of the current state of HSEQ management systems and their integration, and by researchers to seek out potential directions for HSEQ and IMS related research.

  19. Identity and identity conflict in the workplace

    NARCIS (Netherlands)

    K.E. Horton (Kate); P.S. Bayerl (Saskia); G. Belschak-Jacobs (Gabriele)

    2014-01-01

    textabstractAs individuals, we define ourselves according to various characteristics that include our values and beliefs. This gives us our identity. As organisations become increasingly complex, understanding the concept of identity conflict may mean the difference between success and failure.

  20. Patient identity management for secondary use of biomedical research data in a distributed computing environment.

    Science.gov (United States)

    Nitzlnader, Michael; Schreier, Günter

    2014-01-01

    Dealing with data from different source domains is of increasing importance in today's large scale biomedical research endeavours. Within the European Network for Cancer research in Children and Adolescents (ENCCA) a solution to share such data for secondary use will be established. In this paper the solution arising from the aims of the ENCCA project and regulatory requirements concerning data protection and privacy is presented. Since the details of secondary biomedical dataset utilisation are often not known in advance, data protection regulations are met with an identity management concept that facilitates context-specific pseudonymisation and a way of data aggregation using a hidden reference table later on. Phonetic hashing is proposed to prevent duplicated patient registration and re-identification of patients is possible via a trusted third party only. Finally, the solution architecture allows for implementation in a distributed computing environment, including cloud-based elements.

  1. Mistaken identity: activating conservative political identities induces "conservative" financial decisions.

    Science.gov (United States)

    Morris, Michael W; Carranza, Erica; Fox, Craig R

    2008-11-01

    Four studies investigated whether activating a social identity can lead group members to choose options that are labeled in words associated with that identity. When political identities were made salient, Republicans (but not Democrats) became more likely to choose the gamble or investment option labeled "conservative." This shift did not occur in a condition in which the same options were unlabeled. Thus, the mechanism underlying the effect appears to be not activated identity-related values prioritizing low risk, but rather activated identity-related language (the group label "conservative"). Indeed, when political identities were salient, Republicans favored options labeled "conservative" regardless of whether the options were low or high risk. Finally, requiring participants to explain the label "conservative" before making their choice did not diminish the effect, which suggests that it does not merely reflect inattention to content or construct accessibility. We discuss the implications of these results for the literatures on identity, priming, choice, politics, and marketing.

  2. Innerarity and Immunology: Difference and Identity in selves, bodies and communities

    Directory of Open Access Journals (Sweden)

    Germán Bula

    2013-06-01

    Full Text Available Daniel Innerarity’s Ethics of Hospitality highlights a tension in both communities and individuals between embracing difference and protecting identity, while recognizing that difference is constitutive of identity (the fear that dominates contemporary society is above all a fear of difference, of contamination. This dynamical relation between difference and identity can be seen in the workings of the human immune system, as explained by Chilean biologist and philosopher Francisco Varela: the immune system is a process of perpetual construction of bodily identity through self-referential cognition and distinction between self and non-self. This similarity allows for interesting analogies: for example, a society torn apart by xenophobia and chauvinism can be seen as analogous to a body ravaged by an autoimmune disease such as lupus. With the working hypothesis that the similarities respond to what Stafford Beer calls “systemic invariance”,   this paper explores the similarities between the activity of the immune system and the relation between identity and difference in the work of Innerarity.

  3. How does Accreditation Influence the Dynamics of Organizational Identity for Business Schools?

    DEFF Research Database (Denmark)

    Lejeune, Christophe; Schultz, Majken; Vas, Alain

    2015-01-01

    approach offer a comprehensive theoretical framework. Second, we illustrate it with a European Management School’s accreditation failure and its management of change related to the accreditation goal. We elaborate and discuss a model titled “Identity Change through Accreditation” (ICA). Finally, we suggest...

  4. Software And Systems Engineering Risk Management

    Science.gov (United States)

    2010-04-01

    RSKM 2004 COSO Enterprise RSKM Framework 2006 ISO/IEC 16085 Risk Management Process 2008 ISO/IEC 12207 Software Lifecycle Processes 2009 ISO/IEC...1 Software And Systems Engineering Risk Management John Walz VP Technical and Conferences Activities, IEEE Computer Society Vice-Chair Planning...Software & Systems Engineering Standards Committee, IEEE Computer Society US TAG to ISO TMB Risk Management Working Group Systems and Software

  5. Description of identical particles via gauged matrix models: a generalization of the Calogero-Sutherland system

    International Nuclear Information System (INIS)

    Park, Jeong-Hyuck

    2003-01-01

    We elaborate the idea that the matrix models equipped with the gauge symmetry provide a natural framework to describe identical particles. After demonstrating the general prescription, we study an exactly solvable harmonic oscillator type gauged matrix model. The model gives a generalization of the Calogero-Sutherland system where the strength of the inverse square potential is not fixed but dynamical bounded by below

  6. I-15 integrated corridor management system : project management plan.

    Science.gov (United States)

    2011-06-01

    The Project Management Plan (PMP) assists the San Diego ICM Team by defining a procedural framework for : management and control of the I-15 Integrated Corridor Management Demonstration Project, and development and : deployment of the ICM System. The...

  7. Teacher educators: their identities, sub-identities and implications for professional development

    NARCIS (Netherlands)

    Swennen, J.M.H.; Jones, K.; Volman, M.L.L.

    2010-01-01

    In this article we address the question: 'What sub-identities of teacher educators emerge from the research literature about teacher educators and what are the implications of the sub-identities for the professional development of teacher educators?' Like other professional identities, the identity

  8. Database management system for large container inspection system

    International Nuclear Information System (INIS)

    Gao Wenhuan; Li Zheng; Kang Kejun; Song Binshan; Liu Fang

    1998-01-01

    Large Container Inspection System (LCIS) based on radiation imaging technology is a powerful tool for the Customs to check the contents inside a large container without opening it. The author has discussed a database application system, as a part of Signal and Image System (SIS), for the LCIS. The basic requirements analysis was done first. Then the selections of computer hardware, operating system, and database management system were made according to the technology and market products circumstance. Based on the above considerations, a database application system with central management and distributed operation features has been implemented

  9. Switched generalized function projective synchronization of two identical/different hyperchaotic systems with uncertain parameters

    International Nuclear Information System (INIS)

    Li Hongmin; Li Chunlai

    2012-01-01

    In this paper, we investigate two switched synchronization schemes, namely partial and complete switched generalized function projective synchronization, by using the adaptive control method. Partial switched synchronization of chaotic systems means that the state variables of the drive system synchronize with partial different state variables of the response system, whereas complete switched synchronization of chaotic systems means that all the state variables of the drive system synchronize with complete different state variables of the response system. Because the switched synchronization scheme exists in many combinations, it is a promising type of synchronization as it provides greater security in secure communications. Based on the Lyapunov stability theory, the adaptive control laws and the parameter update laws are derived to make the states of two identical/different hyperchaotic systems asymptotically synchronized up to a desired scaling function. Finally, numerical simulations are performed to verify and illustrate the analytical results.

  10. Essentials of Project and Systems Engineering Management

    CERN Document Server

    Eisner, Howard S

    2008-01-01

    The Third Edition of Essentials of Project and Systems Engineering Management enables readers to manage the design, development, and engineering of systems effectively and efficiently. The book both defines and describes the essentials of project and systems engineering management and, moreover, shows the critical relationship and interconnection between project management and systems engineering. The author's comprehensive presentation has proven successful in enabling both engineers and project managers to understand their roles, collaborate, and quickly grasp and apply all the basic princip

  11. Car insurance information management system

    OpenAIRE

    Sun, Yu

    2015-01-01

    A customer information system is a typical information management system. It involves three aspects, the backstage database establishment, the application development and the system maintenance. A car insurance information management system is based on browser/server structure. Microsoft SQL Server establishes the backstage database. Active Server Pages, from Microsoft as well is used as the interface layer. The objective of this thesis was to apply ASP to the dynamic storage of a web page...

  12. HTR-10 management information system

    International Nuclear Information System (INIS)

    Liu Ruoxiao; Wu Zhongwang; Xi Shuren

    2000-01-01

    The HTR-10 Management information system (REMIS) strengthens the managerial level and usage of the information of HTR-10, thereby enhances the ability and efficiency of the design and management work. REMIS is designed based on the Client/Server framework. Database management system is SQL Server 6.5 for NT, While the client side is developed by Borland C ++ Builder, and it is based on Windows 95/98. The network protocol is TCP/IP. REMIS collects date of the HTR-10 at four parameters: Reactor properties, Design parameters, Equipment properties Reactor system flow charts. Final discussing extended prospect of REMIS

  13. The CMS workload management system

    Energy Technology Data Exchange (ETDEWEB)

    Cinquilli, M. [CERN; Evans, D. [Fermilab; Foulkes, S. [Fermilab; Hufnagel, D. [Fermilab; Mascheroni, M. [CERN; Norman, M. [UC, San Diego; Maxa, Z. [Caltech; Melo, A. [Vanderbilt U.; Metson, S. [Bristol U.; Riahi, H. [INFN, Perugia; Ryu, S. [Fermilab; Spiga, D. [CERN; Vaandering, E. [Fermilab; Wakefield, Stuart [Imperial Coll., London; Wilkinson, R. [Caltech

    2012-01-01

    CMS has started the process of rolling out a new workload management system. This system is currently used for reprocessing and Monte Carlo production with tests under way using it for user analysis. It was decided to combine, as much as possible, the production/processing, analysis and T0 codebases so as to reduce duplicated functionality and make best use of limited developer and testing resources. This system now includes central request submission and management (Request Manager), a task queue for parcelling up and distributing work (WorkQueue) and agents which process requests by interfacing with disparate batch and storage resources (WMAgent).

  14. The CMS workload management system

    International Nuclear Information System (INIS)

    Cinquilli, M; Mascheroni, M; Spiga, D; Evans, D; Foulkes, S; Hufnagel, D; Ryu, S; Vaandering, E; Norman, M; Maxa, Z; Wilkinson, R; Melo, A; Metson, S; Riahi, H; Wakefield, S

    2012-01-01

    CMS has started the process of rolling out a new workload management system. This system is currently used for reprocessing and Monte Carlo production with tests under way using it for user analysis. It was decided to combine, as much as possible, the production/processing, analysis and T0 codebases so as to reduce duplicated functionality and make best use of limited developer and testing resources. This system now includes central request submission and management (Request Manager); a task queue for parcelling up and distributing work (WorkQueue) and agents which process requests by interfacing with disparate batch and storage resources (WMAgent).

  15. Navigating Identities: Subtle and Public Agency of Bicultural Gay Youth.

    Science.gov (United States)

    Cense, Marianne; Ganzevoort, R Ruard

    2017-01-01

    Young people who discover their sexual attraction to people of the same sex often go through a period of ambivalence or distress, especially when they grow up in an environment that condemns homosexuality. The Dutch sociopolitical context makes the expression of same-sex desires among those with non-Dutch roots even more complicated and risky, as prevailing schemes of interpretation render the two identities incompatible. This study explores the expressions of same-sex desires and identities as well as the different forms of agency of bicultural gay youth. In-depth interviews with 14 young adults reveal how young people negotiate bicultural identities in Dutch society that brings to the fore complexities in managing diverse sexual identities and strong religious and cultural affiliations in tandem. Their strategies have the effect of questioning dominant discourses and transcend the oppositional dichotomy between sexual and ethnic forms of sociocultural otherness.

  16. Identity after Death

    DEFF Research Database (Denmark)

    Gerstrøm, Anna

    2015-01-01

    Purpose: The purpose of this paper is to explore how legacy organizational identity and death relate to each other and, thereby, contribute to closing the gap in knowledge on organizational identity constructions in times of death. Design/methodology/approach: The paper opted for an exploratory....../value: This paper addresses an apparent gap in the literature on identity and death; exploring identity narratives in a bankrupted bank, the paper considers constructions of legacy organizational identities in times of disruptive death....

  17. Radiation management computer system for Monju

    International Nuclear Information System (INIS)

    Aoyama, Kei; Yasutomo, Katsumi; Sudou, Takayuki; Yamashita, Masahiro; Hayata, Kenichi; Ueda, Hajime; Hosokawa, Hideo

    2002-01-01

    Radiation management of nuclear power research institutes, nuclear power stations and other such facilities are strictly managed under Japanese laws and management policies. Recently, the momentous issues of more accurate radiation dose management and increased work efficiency has been discussed. Up to now, Fuji Electric Company has supplied a large number of Radiation Management Systems to nuclear power stations and related nuclear facilities. We introduce the new radiation management computer system with adopted WWW technique for Japan Nuclear Cycle Development Institute, MONJU Fast Breeder Reactor (MONJU). (author)

  18. Identity/Time

    Directory of Open Access Journals (Sweden)

    Nancy J. Knauer

    2013-09-01

    Full Text Available This paper engages the unspoken fourth dimension of intersectionality—time. Using the construction of lesbian, gay, bisexual, and transgender (LGBT identities as an example, it establishes that identity, as it is lived and experienced, is not only multivalent, but also historically contingent. It then raises a number of points regarding the temporal locality of identity—the influence of time on issues of identity and understanding, its implications for legal interventions, social movement building, and paradigms of progressive change. As the title suggests, the paper asks us to consider the frame of identity over time.

  19. Transport concept of new waste management system (inner packaging system)

    International Nuclear Information System (INIS)

    Hakozaki, K.; Wada, R.

    2004-01-01

    Kobe Steel, Ltd. (KSL) and Transnuclear Tokyo (TNT) have jointly developed a new waste management system concept (called ''Inner packaging system'') for high dose rate wastes generated from nuclear power plants under cooperation with Tokyo Electric Power Company (TEPCO). The inner packaging system is designed as a total management system dedicated to the wastes from nuclear plants in Japan, covering from the wastes conditioning in power plants up to the disposal in final repository. This paper presents the new waste management system concept

  20. Waste Management System Description Document (WMSD)

    International Nuclear Information System (INIS)

    1992-02-01

    This report is an appendix of the ''Waste Management Description Project, Revision 1''. This appendix is about the interim approach for the technical baseline of the waste management system. It describes the documentation and regulations of the waste management system requirements and description. (MB)