WorldWideScience

Sample records for personal identity card

  1. 22 CFR 50.9 - Card of identity.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Card of identity. 50.9 Section 50.9 Foreign... of United States Nationality of a Person Abroad § 50.9 Card of identity. When authorized by the Department, consular offices or designated nationality examiners may issue a card of identity for travel to...

  2. 76 FR 12712 - Announcing Draft Federal Information Processing Standard (FIPS) 201-2, Personal Identity...

    Science.gov (United States)

    2011-03-08

    ...-02] Announcing Draft Federal Information Processing Standard (FIPS) 201-2, Personal Identity..., ``Personal Identity Verification of Federal Employees and Contractors Standard.'' Draft FIPS 201-2 amends... Issuing Personal Identity Verification Cards under HSPD-12.'' The purpose of this change is to update the...

  3. Protecting Personal Information in the Era of Identity Theft: Just how Safe is Our Personal Information from Identity Thieves?

    Directory of Open Access Journals (Sweden)

    Fawzia Cassim

    2015-07-01

    Full Text Available Identity theft has become one of the fastest growing white collar crimes in the world. It occurs when an individual's personal information such as inter alia his or her name, date of birth or credit card details is used by another individual to commit identity fraud. Identity theft can be committed via physical means or online. The increased use of the Internet for business and financial transactions, social networking and the storage of personal information has facilitated the work of identity thieves. Identity theft has an impact on the personal finances and emotional well-being of victims, and on the financial institutions and economies of countries. It presents challenges for law enforcement agencies and governments worldwide. This article examines how identity thieves use the personal information of individuals to commit identity fraud and theft, and looks at legislative solutions introduced in South Africa, the United States of America, the United Kingdom and India to combat identity theft crimes. The article examines measures introduced by the respective governments in these countries to counteract such crimes. Finally, the article will propose a way forward to counteract such crimes in the future. The study reveals that identity theft is a growing and evolving problem that requires a multi-faceted and multi-disciplinary approach by law enforcement agencies, businesses, individuals and collaboration between countries. It is advocated that businesses and institutions should take measures to protect personal information better and that individuals should be educated about their rights, and be vigilant and protect their personal information offline and in cyberspace.

  4. Integrating Fingerprint Verification into the Smart Card-Based Healthcare Information System

    OpenAIRE

    Jin-Won Park; Sung Bum Pan; Yongwha Chung; Daesung Moon

    2009-01-01

    As VLSI technology has been improved, a smart card employing 32-bit processors has been released, and more personal information such as medical, financial data can be stored in the card. Thus, it becomes important to protect personal information stored in the card. Verification of the card holder's identity using a fingerprint has advantages over the present practices of Personal Identification Numbers (PINs) and passwords. However, the computational workload of fingerprint verification i...

  5. REPLACEMENT OF FRENCH CARDS

    CERN Multimedia

    Human Resources Division

    2001-01-01

    The French Ministry of Foreign Affairs has informed the Organization that it is shortly to replace all diplomatic cards, special cards and employment permits ('attestations de fonctions') now held by members of the personnel and their families. Between 2 July and 31 December 2001, these cards are to be replaced by secure, computerized equivalents. A 'personnel office' stamped photocopy of the old cards may continue to be used until 31 December 2001. For the purposes of the handover, members of the personnel must go personally to the cards office (33/1-015), between 8:30 and 12:30, in order to fill a 'fiche individuelle' form (in black ink only), which has to be personally signed by themselves and another separately signed by members of their family, taking the following documents for themselves and members of their families already in possession of a French card : A recent identity photograph in 4.5 cm x 3.5 cm format (signed on the back) The French card in their possession an A4 photocopy of the same Fre...

  6. 75 FR 28771 - Federal Acquisition Regulation; FAR Case 2009-027, Personal Identity Verification of Contractor...

    Science.gov (United States)

    2010-05-24

    ... Acquisition Regulation; FAR Case 2009-027, Personal Identity Verification of Contractor Personnel AGENCIES... of collecting from contractors all forms of Government provided identification once they are no..., titled Controls Over the Contractor Common Access Card (CAC) Life Cycle, was performed to determine...

  7. Using medical history embedded in biometrics medical card for user identity authentication: data representation by AVT hierarchical data tree.

    Science.gov (United States)

    Fong, Simon; Zhuang, Yan

    2012-01-01

    User authentication has been widely used by biometric applications that work on unique bodily features, such as fingerprints, retina scan, and palm vessels recognition. This paper proposes a novel concept of biometric authentication by exploiting a user's medical history. Although medical history may not be absolutely unique to every individual person, the chances of having two persons who share an exactly identical trail of medical and prognosis history are slim. Therefore, in addition to common biometric identification methods, medical history can be used as ingredients for generating Q&A challenges upon user authentication. This concept is motivated by a recent advancement on smart-card technology that future identity cards are able to carry patents' medical history like a mobile database. Privacy, however, may be a concern when medical history is used for authentication. Therefore in this paper, a new method is proposed for abstracting the medical data by using attribute value taxonomies, into a hierarchical data tree (h-Data). Questions can be abstracted to various level of resolution (hence sensitivity of private data) for use in the authentication process. The method is described and a case study is given in this paper.

  8. Using Medical History Embedded in Biometrics Medical Card for User Identity Authentication: Data Representation by AVT Hierarchical Data Tree

    Directory of Open Access Journals (Sweden)

    Simon Fong

    2012-01-01

    Full Text Available User authentication has been widely used by biometric applications that work on unique bodily features, such as fingerprints, retina scan, and palm vessels recognition. This paper proposes a novel concept of biometric authentication by exploiting a user’s medical history. Although medical history may not be absolutely unique to every individual person, the chances of having two persons who share an exactly identical trail of medical and prognosis history are slim. Therefore, in addition to common biometric identification methods, medical history can be used as ingredients for generating Q&A challenges upon user authentication. This concept is motivated by a recent advancement on smart-card technology that future identity cards are able to carry patents’ medical history like a mobile database. Privacy, however, may be a concern when medical history is used for authentication. Therefore in this paper, a new method is proposed for abstracting the medical data by using attribute value taxonomies, into a hierarchical data tree (h-Data. Questions can be abstracted to various level of resolution (hence sensitivity of private data for use in the authentication process. The method is described and a case study is given in this paper.

  9. John Locke on persons and personal identity

    OpenAIRE

    Boeker, Ruth

    2013-01-01

    John Locke claims both that ‘person’ is a forensic term and that personal identity consists in sameness of consciousness. The aim of my dissertation is to explain and critically assess how Locke links his moral and legal account of personhood to his account of personal identity in terms of sameness of consciousness. My interpretation of Locke’s account of persons and personal identity is embedded in Locke’s sortal-dependent account of identity. Locke’s sortal-dependent ac...

  10. Personal Identity Online

    DEFF Research Database (Denmark)

    Rodogno, Raffaele

    2012-01-01

    Philosophers concerned with the question of personal identity have typically been asking the so-called re-identification question: what are the conditions under which a person at one point in time is properly re-identified at another point in time? This is a rather technical question. In our...... everyday interactions, however, we do raise a number of personal identity questions that are quite distinct from it. In order to explore the variety of ways in which the Internet may affect personal identity, I propose in this study to broaden the typical philosophical horizon to other more mundane senses...... of the question. In Section 2, I describe a number of possible meanings of personal identity observed in everyday contexts and more philosophical ones. With some caveats, I argue that it is the specific context in which the question arises that disambiguates the meaning of the question. Online contexts are novel...

  11. Personal Identity in Enhancement

    Directory of Open Access Journals (Sweden)

    Jana Podroužková

    2015-09-01

    Full Text Available The aim of this paper is to introduce the concept of human enhancement, its methods and its relation to personal identity. Also several approaches to personal identity will be described. Transhumanism is a special think tank supporting human enhancement through modern technologies and some of its representatives claim, that even great changes to human organisms will not affect their personal identity. I will briefly describe the most important means of human enhancment and consider the problem of personal identity for each of them separately.

  12. John locke on personal identity.

    Science.gov (United States)

    Nimbalkar, Namita

    2011-01-01

    John Locke speaks of personal identity and survival of consciousness after death. A criterion of personal identity through time is given. Such a criterion specifies, insofar as that is possible, the necessary and sufficient conditions for the survival of persons. John Locke holds that personal identity is a matter of psychological continuity. He considered personal identity (or the self) to be founded on consciousness (viz. memory), and not on the substance of either the soul or the body.

  13. John Locke on Personal Identity**

    OpenAIRE

    Nimbalkar, Namita

    2011-01-01

    John Locke speaks of personal identity and survival of consciousness after death. A criterion of personal identity through time is given. Such a criterion specifies, insofar as that is possible, the necessary and sufficient conditions for the survival of persons. John Locke holds that personal identity is a matter of psychological continuity. He considered personal identity (or the self) to be founded on consciousness (viz. memory), and not on the substance of either the soul or the body.

  14. An advanced mutual-authentication algorithm using 3DES for smart card systems

    CSIR Research Space (South Africa)

    Tsague, HD

    2012-11-01

    Full Text Available One of the most commonly used two-factor user authentication mechanisms nowadays is based on smart card and personal identity number or password. A scheme of this type is usually known as, a smart card based password authentication. The core feature...

  15. Towards non-repudiable authentication through biometrics and smart cards

    CSIR Research Space (South Africa)

    Msiza, I

    2012-10-01

    Full Text Available ? biometrics and smart cards Part B: Biometrics ? CSIR 2012 Slide 7 Biometric Authentication ? CSIR 2012 Slide 8 ? A science that uses a person?s behavioral and/or physiological traits to establish their identify, or verify their claimed identity.../or characteristics of some thing ? This thing can be anything, however in the context of this discussion, this thing could be a person, a network device, or even an identity authentication device itself ? This act or process of verifying these attributes could...

  16. Integrating Fingerprint Verification into the Smart Card-Based Healthcare Information System

    Directory of Open Access Journals (Sweden)

    Jin-Won Park

    2009-01-01

    Full Text Available As VLSI technology has been improved, a smart card employing 32-bit processors has been released, and more personal information such as medical, financial data can be stored in the card. Thus, it becomes important to protect personal information stored in the card. Verification of the card holder's identity using a fingerprint has advantages over the present practices of Personal Identification Numbers (PINs and passwords. However, the computational workload of fingerprint verification is much heavier than that of the typical PIN-based solution. In this paper, we consider three strategies to implement fingerprint verification in a smart card environment and how to distribute the modules of fingerprint verification between the smart card and the card reader. We first evaluate the number of instructions of each step of a typical fingerprint verification algorithm, and estimate the execution time of several cryptographic algorithms to guarantee the security/privacy of the fingerprint data transmitted in the smart card with the client-server environment. Based on the evaluation results, we analyze each scenario with respect to the security level and the real-time execution requirements in order to implement fingerprint verification in the smart card with the client-server environment.

  17. Integrating Fingerprint Verification into the Smart Card-Based Healthcare Information System

    Science.gov (United States)

    Moon, Daesung; Chung, Yongwha; Pan, Sung Bum; Park, Jin-Won

    2009-12-01

    As VLSI technology has been improved, a smart card employing 32-bit processors has been released, and more personal information such as medical, financial data can be stored in the card. Thus, it becomes important to protect personal information stored in the card. Verification of the card holder's identity using a fingerprint has advantages over the present practices of Personal Identification Numbers (PINs) and passwords. However, the computational workload of fingerprint verification is much heavier than that of the typical PIN-based solution. In this paper, we consider three strategies to implement fingerprint verification in a smart card environment and how to distribute the modules of fingerprint verification between the smart card and the card reader. We first evaluate the number of instructions of each step of a typical fingerprint verification algorithm, and estimate the execution time of several cryptographic algorithms to guarantee the security/privacy of the fingerprint data transmitted in the smart card with the client-server environment. Based on the evaluation results, we analyze each scenario with respect to the security level and the real-time execution requirements in order to implement fingerprint verification in the smart card with the client-server environment.

  18. Civil Identity

    DEFF Research Database (Denmark)

    Petersen, Lars Axel

    In this paper I will go through a catalogue of examples of contexts in which the term civil identity is currently used, ranging from the formal and technical process of linking a set of administrative and other events to an individual biological person by means of identity cards, fingerprints, iris...... of Israel to Luce Irigaray's Feminist agenda of elaborating gender specific civil identities. My intention is to investigate whether these different employments of 'civil identity' point towards a common, and fairly well defined object field asking questions of contemporary relevance to the philosophy...

  19. Bacterial contamination of fabric and metal-bead identity card lanyards: A cross-sectional study

    Directory of Open Access Journals (Sweden)

    Thomas Pepper

    2014-11-01

    Full Text Available Summary: In healthcare, fabric or metal-bead lanyards are universally used for carrying identity cards. However there is little information on microbial contamination with potential pathogens that may readily re-contaminate disinfected hands. We examined 108 lanyards from hospital staff. Most grew skin flora but 7/108 (6% had potentially pathogenic bacteria: four grew methicillin-susceptible Staphylococcus aureus, and four grew probable fecal flora: 3 Clostridium perfringens and 1 Clostridium bifermentans (one lanyard grew both S. aureus and C. bifermentans. Unused (control lanyards had little or no such contamination. The median duration of lanyard wear was 12 months (interquartile range 3–36 months. 17/108 (16% of the lanyards had reportedly undergone decontamination including wiping with alcohol, chlorhexidine or chlorine dioxide; and washing with soap and water or by washing machine. Metal-bead lanyards had significantly lower median bacterial counts than those from fabric lanyards (1 vs. 4 CFU/cm2; Mann–Whitney U = 300.5; P < 0.001. 12/32 (38% of the metal-bead lanyards grew no bacteria, compared with 2/76 (3% of fabric lanyards. We recommend that an effective decontamination regimen be instituted by those who use fabric lanyards, or that fabric lanyards be discarded altogether in preference for metal-bead lanyards or clip-on identity cards. Keywords: Lanyard, Contamination, Identity card, Metal, Fabric

  20. A hand held photo identity verification system for mobile applications

    International Nuclear Information System (INIS)

    Kumar, Ranajit; Upreti, Anil; Mahaptra, U.; Bhattacharya, S.; Srivastava, G.P.

    2009-01-01

    A handheld portable system has been developed for mobile personnel identity verification. The system consists of a contact less RF smart card reader integrated to a Simputer through serial link. The simputer verifies the card data, with the data base and aids the security operator in identifying the persons by providing the facial image of the verified person along with other personal details like name, designation, division etc. All transactions are recorded in the Simputer with time and date for future record. This system finds extensive applications in mobile identity verification in nuclear or other industries. (author)

  1. Personal identity and eastern thought

    Directory of Open Access Journals (Sweden)

    Correia Carlos João

    2009-01-01

    Full Text Available This paper aims to show that the problem of personal identity is a fundamental question of the classical Indian thought. Usually we tend to think that personal identity is a Western philosophical subject, and so we tend to forget the significance of the Self (Atman in Hinduism and even in Buddhism. The author shows how the Indian thought approached the question of personal identity and which was the singular solution outlined in the work consensually attributed to Gotama, the Buddha.

  2. Ergonomics issues in national identity card for homeland security.

    Science.gov (United States)

    Yeow, Paul H P; Yuen, Y Y; Loo, W H

    2013-09-01

    Ever since the 9/11 terrorist attack, many countries are considering the use of smart national identity card (SNIC) which has the ability to identify terrorists due to its biometric verification function. However, there are many ergonomics issues in the use of SNIC, e.g. card credibility. This research presents a case study survey of Malaysian users. Although most citizens (>96%) own MyKad (Malaysia SNIC), many do not carry it around and use its applications. This defeats one of its main purposes, i.e. combating terrorism. Thus, the research investigates ergonomics issues affecting the citizens' Intention to Use (ITU) MyKad for homeland security by using an extended technology acceptance model. Five hundred questionnaires were collected and analysed using structural equation modelling. Results show that perceived credibility and performance expectancy are the key issues. The findings provide many countries with insights into methods of addressing ergonomics issues and increasing adoption of SNIC for homeland security. Copyright © 2012 Elsevier Ltd and The Ergonomics Society. All rights reserved.

  3. Gharibi_FaceCard for Contacts and Easy Personal - Information Exchange

    OpenAIRE

    Gharibi, Wajeb; Gharibi, Gharib

    2014-01-01

    In this paper, we discuss a new contact way for exchanging personal information using mobile phones. The idea of this invention depends on allocating a special code called Gharibi Code (GC) for each personal mobile and creating a personal information file called Gharibi Face Card (GFC), which has all specified personal data of the mobile phone user. When you request someone's GC code, the other party's phone will send you the GFC of that person. We think that this approach will facilitate the...

  4. Citizen empowerment using healthcare and welfare cards.

    Science.gov (United States)

    Cheshire, Paul

    2006-01-01

    Cards are used in health and welfare to establish the identity of the person presenting the card; to prove their entitlement to a welfare or healthcare service; to store data needed within the care process; and to store data to use in the administration process. There is a desire to empower citizens - to give them greater control over their lives, their health and wellbeing. How can a healthcare and welfare card support this aim? Does having a card empower the citizen? What can a citizen do more easily, reliably, securely or cost-effectively because they have a card? A number of possibilities include: Choice of service provider; Mobility across regional and national boundaries; Privacy; and Anonymity. But in all of these possibilities a card is just one component of a total system and process, and there may be other solutions--technological and manual. There are risks and problems from relying on a card; and issues of Inclusion for people who are unable use a card. The article concludes that: cards need to be viewed in the context of the whole solution; cards are not the only technological mechanism; cards are not the best mechanism in all circumstances; but cards are very convenient method in very many situations.

  5. PERSONAL IDENTITY IN DEAF ADOLESCENTS

    Directory of Open Access Journals (Sweden)

    Joanna KOSSEWSKA

    2008-06-01

    Full Text Available The purpose of this study was to investigate the factors influencing the identity deaf adolescents. The study involved 67 deaf adolescents (38 boys and 29 girls aged 16 to 19 students of secondary school. Ninety-three hearing children constituted a comparison group. The structure of identity was explored on the basis of identification references given by the subjects who were to reply in writing, 20 times running, to the question: „Who Am I?” the test, adapted from M. H. Kuhn and T. S. McPartland by Martines and Silvestre (1995 given in written and signed mode.Results showed that the hearing status as well as mode of communication influence the description of personal identity. It was found that deaf adoles­cents used more descriptions especially in the fol­lowing categories: Civil Status, Body and Physical Appearance, Tastes and Activities, Friendship and Relationships, Personal and Social Situation, Negative Personal Traits, and Neutral Personality Traits. Although this study could demonstrate im­pact independent variables on identity, the data raise the need for further, preferably longitudinal, research. This complex phenomenon has to be examined more closely.Combined self-descriptive processes lead to the development of an organized, learned and dynamic identity, and subjective description of an individ­ual has strong emotional consequences for the in­dividual in question.

  6. Transforming Mobile Platform with KI-SIM Card into an Open Mobile Identity Tool

    Science.gov (United States)

    Hyppönen, Konstantin; Hassinen, Marko; Trichina, Elena

    Recent introduction of Near Field Communication (NFC) in mobile phones has stimulated the development of new proximity payment and identification services. We present an architecture that facilitates the use of the mobile phone as a personalised electronic identity tool. The tool can work as a replacement for numerous ID cards and licenses. Design for privacy principles have been applied, such as minimisation of data collection and informed consent of the user. We describe an implementation of a lightweight version of the of the mobile identity tool using currently available handset technology and off-the-shelf development tools.

  7. Adolescent personality development and identity formation

    NARCIS (Netherlands)

    Klimstra, T.A.

    2013-01-01

    Personality development is not only about changes in traits but also about changes in other layers of the self, such as the identity layer. Forming one's identity is thought to be the key developmental task of adolescence, but profound changes in personality traits also occur in this period. In this

  8. Advance directives and personal identity: what is the problem?

    Science.gov (United States)

    Furberg, Elisabeth

    2012-02-01

    The personal identity problem expresses the worry that due to disrupted psychological continuity, one person's advance directive could be used to determine the care of a different person. Even ethicists, who strongly question the possibility of the scenario depicted by the proponents of the personal identity problem, often consider it to be a very potent objection to the use of advance directives. Aiming to question this assumption, I, in this paper, discuss the personal identity problem's relevance to the moral force of advance directives. By putting the personal identity argument in relation to two different normative frameworks, I aim to show that whether or not the personal identity problem is relevant to the moral force of advance directives, and further, in what way it is relevant, depends entirely on what normative reasons we have for respecting advance directives in the first place.

  9. Identity theory and personality theory: mutual relevance.

    Science.gov (United States)

    Stryker, Sheldon

    2007-12-01

    Some personality psychologists have found a structural symbolic interactionist frame and identity theory relevant to their work. This frame and theory, developed in sociology, are first reviewed. Emphasized in the review are a multiple identity conception of self, identities as internalized expectations derived from roles embedded in organized networks of social interaction, and a view of social structures as facilitators in bringing people into networks or constraints in keeping them out, subsequently, attention turns to a discussion of the mutual relevance of structural symbolic interactionism/identity theory and personality theory, looking to extensions of the current literature on these topics.

  10. Life Stories, Cultural Métissage, and Personal Identities

    Directory of Open Access Journals (Sweden)

    Ricardo Vieira

    2014-01-01

    Full Text Available This article encompasses an underlying notion of personal identities and processes of interaction, which distinguish essentialist identity from relational identity in contexts involving subjects, fields of possibilities, and cultural metamorphosis. It addresses the idea of the individual and her/his transformations: “I am who I want to be if I can be that person.” Any one of us could hypothetically have been someone else. The question of the reconstruction of individual identities is a vital aspect in the relationship between objective social conditions and what each person subjectively does with them, in terms of auto-construction. The complexity of this question reflects the idea of a cultural kaleidoscope, in which similar social conditions experienced by different individuals can produce differentiated identities. The title and structure of this text also seek to encompass the idea that in a personal life story, the subject lives between various spheres and sociocultural contexts, with a composite, mestizo, and superimposed or displaced identity, in each context. This occurs as the result of a cultural metamorphosis, which is constructed both by the individual as well as by heterogeneous influences between the context of the starting and finishing points at a given moment. This complex process of cultural metamorphosis—the fruit of interweaving subjective and objective forces—reveals a new dimension: the truly composite nature of personal identities.

  11. Fingerprint match-on-card: review and outlook

    CSIR Research Space (South Africa)

    Shabalala, MB

    2015-03-01

    Full Text Available the statistics on identity theft. This has been achieved by predominantly implementing biometrics matching algorithms inside smart card technology. The biometric matching inside a smart card is known as Match-on-Card/On-Card comparison. However compared...

  12. The dynamics of personality and identity in adolescence

    NARCIS (Netherlands)

    Klimstra, T.A.

    2010-01-01

    The current dissertation focused on adolescent identity formation and personality development. We focused on how these aspects of individuality develop through adolescence, and how individual differences in (the development of) personality and identity relate to problem behavior. For that purpose,

  13. How is Civic Engagement Related to Personal Identity and Social Identity in Late Adolescents and Emerging Adults? A Person-Oriented Approach.

    Science.gov (United States)

    Lannegrand-Willems, Lyda; Chevrier, Basilie; Perchec, Cyrille; Carrizales, Alexia

    2018-04-01

    Adolescence and emerging adulthood are periods in life when individuals both question and define their place in society and form their identity. Meanwhile, active youth civic engagement represents a challenge for each democracy. The purpose of this study was to analyze the different forms of civic engagement among late adolescents and emerging adults and how they are related to personal identity and social identity, while adopting an integrative perspective through the lens of a person-oriented approach. The participants were 1217 (62.3% female) 16-24 year-old French students (M age  = 19.17; SD age  = 1.83). First, derived from cluster analyses, the findings emphasized diversity in civic engagement, from strong civic participation (in different formal and informal ways) to various forms of passivity. Diversity was also highlighted for personal identity and social identity profiles. Second, a Configural Frequency Analysis revealed a typical pattern associating passivity in civic engagement, personal carefree diffusion and rejection of social identity. Overall, these findings highlight an absence of general youth disaffection and provide a meaningful specific pattern for the understanding of passivity in political and civic matters in late adolescence and emerging adulthood.

  14. Investigation of Personality Disordes and Personality Traits in Men with Gender Identity Disorder

    Directory of Open Access Journals (Sweden)

    Nahid Noorian

    2008-04-01

    Full Text Available Objective: The purpose of this study is to investigation of personality disorders and personality traits in men who have gender identity disorder (GID. Identification of personality disorders can be useful for enhancement of the quality of help to the patients. Materials & Methods: This analytical and cross-sectional study was a comparative and case – control research. 40 men with gender identity disorder were selected by convenient sampling from individuals who have been referred to Tehran Navab Safavi welfare center. Also, 40 available individuals who have no any diagnostic criteria about gender identity disorder in DSM-IV-TR and worked in Islamic Azad University (Tehran Sciences and Researches Unit were selected as control group and matched with patients. Personality disorders and those frequencies were evaluated with Millon Clinical Multiaxial Inventory-II (MCMI-II. Data were analyzed using by Chi-square and Independent T tests. Results: The results showed that gender identity disorder patients get higher scores as compared to control group in scales “Dependent” (P=0/038, “Histrionic” (P<0/001, “Antisocial” (P=0/017, “Passive – aggressive” (P=0/007, “Borderline” (P<0/001 and “Paranoid” (P=0/021 and their difference was significant. Conclusion: Generally, the results of this study showed persons who have gender identity disorder also have some symptoms of personality disorders more than normal people.

  15. Goal-directedness and personal identity as correlates of life outcomes.

    Science.gov (United States)

    Goldman, Barry M; Masterson, Suzanne S; Locke, Edwin A; Groth, Markus; Jensen, David G

    2002-08-01

    Although much research has been conducted on goal setting, researchers have not examined goal-directedness or propensity to set goals as a stable human characteristic in adults. In this study, a survey was developed and distributed to 104 adult participants to assess their goal-directedness, personal identity, and various life outcomes. A theoretical model was developed and tested using structural equation modeling that proposed that both goal-directedness and personal identity should positivcly influence important life outcomes. Analysis showed that goal-directedness and personal identity are positively related to personal well-being, salary, and marital satisfaction. Further, personal identity was positively related to job satisfaction but, contrary to related research, goal-directedness did not predict job satisfaction.

  16. Functions of personal and vicarious life stories: Identity and empathy

    DEFF Research Database (Denmark)

    Lind, Majse; Thomsen, Dorthe Kirkegaard

    2018-01-01

    The present study investigates functions of personal and vicarious life stories focusing on identity and empathy. Two-hundred-and-forty Danish high school students completed two life story questionnaires: One for their personal life story and one for a close other’s life story. In both...... questionnaires, they identified up to 10 chapters and self-rated the chapters on valence and valence of causal connections. In addition, they completed measures of identity disturbance and empathy. More positive personal life stories were related to lower identity disturbance and higher empathy. Vicarious life...... stories showed a similar pattern with respect to identity but surprisingly were unrelated to empathy. In addition, we found positive correlations between personal and vicarious life stories for number of chapters, chapter valence, and valence of causal connections. The study indicates that both personal...

  17. Noninvasive Brain Stimulation and Personal Identity: Ethical Considerations.

    Science.gov (United States)

    Iwry, Jonathan; Yaden, David B; Newberg, Andrew B

    2017-01-01

    As noninvasive brain stimulation (NIBS) technology advances, these methods may become increasingly capable of influencing complex networks of mental functioning. We suggest that these might include cognitive and affective processes underlying personality and belief systems, which would raise important questions concerning personal identity and autonomy. We give particular attention to the relationship between personal identity and belief, emphasizing the importance of respecting users' personal values. We posit that research participants and patients should be encouraged to take an active approach to considering the personal implications of altering their own cognition, particularly in cases of neurocognitive "enhancement." We suggest that efforts to encourage careful consideration through the informed consent process would contribute usefully to studies and treatments that use NIBS.

  18. Individual TL detector characteristics in automated processing of personnel dosemeters: correction factors as extension to identity codes of dosemeter cards

    International Nuclear Information System (INIS)

    Toivonen, Matti.

    1979-07-01

    One, two and three-component dosemeter cards and their associated processing equipment were developed for personnel monitoring. A novel feature of the TLD system is that the individual sensitivity correction factors of TL detectors for β/γ radiation dosimetry and special timing factors for the readout of neutron detectors are stored on dosemeter cards as an extension of the identity codes. These data are utilized in the automatic TL reading process with the aim of cancelling out the influence of the individual detector characteristics on the measuring results. Stimulation of TL is done with hot nitrogen without removing the detectors from their cards and without any metal contact. Changes in detector characteristics are thus improbable. The reading process can be adjusted in a variety of ways. For example, each detector in the same card can be processed with optimal heating and the specific 250 deg C glow peak of neutron radiation can be roughly separated from the main LiF glow peaks. (author)

  19. Co-occurrence of dissociative identity disorder and borderline personality disorder.

    Science.gov (United States)

    Ross, Colin A; Ferrell, Lynn; Schroeder, Elizabeth

    2014-01-01

    The literature indicates that, among individuals with borderline personality disorder, pathological dissociation correlates with a wide range of impairments and difficulties in psychological function. It also predicts a poorer response to dialectical behavior therapy for borderline personality disorder. We hypothesized that (a) dissociative identity disorder commonly co-occurs with borderline personality disorder and vice versa, and (b) individuals who meet criteria for both disorders have more comorbidity and trauma than individuals who meet criteria for only 1 disorder. We interviewed a sample of inpatients in a hospital trauma program using 3 measures of dissociation. The most symptomatic group was those participants who met criteria for both borderline personality disorder and dissociative identity disorder on the Dissociative Disorders Interview Schedule, followed by those who met criteria for dissociative identity disorder only, then those with borderline personality disorder only, and finally those with neither disorder. Greater attention should be paid to the relationship between borderline personality disorder and dissociative identity disorder.

  20. Biography, Identity, Improvisation, Sound: Intersections of Personal and Social Identity through Improvisation

    Science.gov (United States)

    Smilde, Rineke

    2016-01-01

    This essay addresses the relationship of improvisation and identity. Biographical research that was conducted by the author into professional musicians' lifelong learning showed the huge importance of improvisation for personal expression. Musically, the concept of "sound" appeared to serve as a strong metaphor for identity. In addition,…

  1. Noninvasive Brain Stimulation and Personal Identity: Ethical Considerations

    Directory of Open Access Journals (Sweden)

    Jonathan Iwry

    2017-06-01

    Full Text Available As noninvasive brain stimulation (NIBS technology advances, these methods may become increasingly capable of influencing complex networks of mental functioning. We suggest that these might include cognitive and affective processes underlying personality and belief systems, which would raise important questions concerning personal identity and autonomy. We give particular attention to the relationship between personal identity and belief, emphasizing the importance of respecting users' personal values. We posit that research participants and patients should be encouraged to take an active approach to considering the personal implications of altering their own cognition, particularly in cases of neurocognitive “enhancement.” We suggest that efforts to encourage careful consideration through the informed consent process would contribute usefully to studies and treatments that use NIBS.

  2. Personality disorders in persons with gender identity disorder.

    Science.gov (United States)

    Duišin, Dragana; Batinić, Borjanka; Barišić, Jasmina; Djordjevic, Miroslav L; Vujović, Svetlana; Bizic, Marta

    2014-01-01

    Investigations in the field of gender identity disorder (GID) have been mostly related to psychiatric comorbidity and severe psychiatric disorders, but have focused less on personality and personality disorders (PDs). The aim of the study was to assess the presence of PDs in persons with GID as compared to cisgendered (a cisgender person is a person who is content to remain the gender they were assigned at birth) heterosexuals, as well as to biological sex. The study sample consisted of 30 persons with GID and 30 cisgendered heterosexuals from the general population. The assessment of PDs was conducted by application of the self-administered Structured Clinical Interview for DSM-IV Axis II PDs (SCID-II). Persons with GID compared to cisgender heterosexuals have higher presence of PDs, particularly Paranoid PD, avoidant PDs, and comorbid PDs. In addition, MtF (transwomen are people assigned male at birth who identify as women) persons are characterized by a more severe psychopathological profile. Assessment of PDs in persons with GID is of great importance as it comprises a key part of personalized treatment plan tailoring, as well as a prognostic factor for sex-reassignment surgery (SRS) outcome.

  3. Trajectories of Identity Formation Modes and Their Personality Context in Adolescence.

    Science.gov (United States)

    Topolewska-Siedzik, Ewa; Cieciuch, Jan

    2018-04-01

    Identity formation is a dynamic process during adolescence. Trajectories of identity formation were assessed longitudinally in early and middle adolescents, taking into account the personality underpinnings of this process. Identity formation was conceptualized according to the circumplex of identity formation modes. The model distinguishes basic modes rooted in Marcia's categories of exploration and commitment. Plasticity and stability, the two higher order Big Five meta-traits, were used to assess personality underpinnings. This study includes five measurement waves over 1.5 years and involves 1,839 Polish participants; 914 early adolescents (53.9% girls) and 925 middle adolescents (63.8% girls). The results suggest that (1) the four identity formation modes change dynamically, showing linear and curvilinear growth and that (2) identity formation mode trajectories are more dynamic in middle adolescence than in early adolescence. The results also showed that, in the conditional model, (3) the higher-order personality factors and gender affect the growth factors of identity formation modes. Overall, trajectories of identity formation modes are more linear during early adolescence and more curvilinear during middle adolescence. The initial levels in identity trajectories are influenced by the personality metatraits but only plasticity is related to change among early adolescents.

  4. 46 CFR 154.1814 - Cargo information cards.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 5 2010-10-01 2010-10-01 false Cargo information cards. 154.1814 Section 154.1814... cards. (a) No person may operate a vessel unless a cargo information card for each cargo being... accessible to the person in charge of the watch. (b) When a vessel is moored at a terminal, the master shall...

  5. Personality Disorders in Persons with Gender Identity Disorder

    Directory of Open Access Journals (Sweden)

    Dragana Duišin

    2014-01-01

    Full Text Available Background. Investigations in the field of gender identity disorder (GID have been mostly related to psychiatric comorbidity and severe psychiatric disorders, but have focused less on personality and personality disorders (PDs. Aims. The aim of the study was to assess the presence of PDs in persons with GID as compared to cisgendered (a cisgender person is a person who is content to remain the gender they were assigned at birth heterosexuals, as well as to biological sex. Methods. The study sample consisted of 30 persons with GID and 30 cisgendered heterosexuals from the general population. The assessment of PDs was conducted by application of the self-administered Structured Clinical Interview for DSM-IV Axis II PDs (SCID-II. Results. Persons with GID compared to cisgender heterosexuals have higher presence of PDs, particularly Paranoid PD, avoidant PDs, and comorbid PDs. In addition, MtF (transwomen are people assigned male at birth who identify as women persons are characterized by a more severe psychopathological profile. Conclusions. Assessment of PDs in persons with GID is of great importance as it comprises a key part of personalized treatment plan tailoring, as well as a prognostic factor for sex-reassignment surgery (SRS outcome.

  6. Overcoming credit card fraud in South Africa

    African Journals Online (AJOL)

    A credit card is a convenient method of payment, but it does carry risks. The enormous ... Identity theft and the exponential ... Unique Security Features of a Credit Card with the Aim of Identifying ..... technology in an attempt to try and curb the.

  7. Authentication techniques for smart cards

    International Nuclear Information System (INIS)

    Nelson, R.A.

    1994-02-01

    Smart card systems are most cost efficient when implemented as a distributed system, which is a system without central host interaction or a local database of card numbers for verifying transaction approval. A distributed system, as such, presents special card and user authentication problems. Fortunately, smart cards offer processing capabilities that provide solutions to authentication problems, provided the system is designed with proper data integrity measures. Smart card systems maintain data integrity through a security design that controls data sources and limits data changes. A good security design is usually a result of a system analysis that provides a thorough understanding of the application needs. Once designers understand the application, they may specify authentication techniques that mitigate the risk of system compromise or failure. Current authentication techniques include cryptography, passwords, challenge/response protocols, and biometrics. The security design includes these techniques to help prevent counterfeit cards, unauthorized use, or information compromise. This paper discusses card authentication and user identity techniques that enhance security for microprocessor card systems. It also describes the analysis process used for determining proper authentication techniques for a system

  8. Laminated dosimetric card

    International Nuclear Information System (INIS)

    Cox, F.M.; Chamberlain, J.D.; Shrader, E.F.; Shoffner, B.M.; Szalanczy, A.

    1975-01-01

    A laminated card with one or more apertures, each adapted to peripherally seal an encapsulated dosimeter, is formed by bonding a foraminous, code-adaptable, rigid sheet of low-Z material with a codedly transparent sheet of low-Z material in light-transmitting registry with particular code-holes of the rigid sheet. The laminated card may be coded to identify the person carrying it, and/or the location or circumstances related to its exposure to radiation. This card is particularly adapted for use in an instrument capable of evaluating a multiplicity of cards, substantially continuously. The coded identification from the card may be displayed by an appropriate machine, and if desired an evaluation may be recorded because of a ''parity checking'' system incorporated in each card, which permits ''auto-correction.'' Alternatively, where means for effecting the correction automatically are available, the operation of the machine may be interrupted to permit visual examination of a rejected card. The card of this invention is also coded for identifying the type of card with respect to its specific function, and whether or not a card is correctly positioned at any predetermined location during its sequential progress through the instrument in which it is evaluated. Dosimeters are evaluated and the card identified in one pass through the instrument. (auth)

  9. Smart Cards and remote entrusting

    Science.gov (United States)

    Aussel, Jean-Daniel; D'Annoville, Jerome; Castillo, Laurent; Durand, Stephane; Fabre, Thierry; Lu, Karen; Ali, Asad

    Smart cards are widely used to provide security in end-to-end communication involving servers and a variety of terminals, including mobile handsets or payment terminals. Sometime, end-to-end server to smart card security is not applicable, and smart cards must communicate directly with an application executing on a terminal, like a personal computer, without communicating with a server. In this case, the smart card must somehow trust the terminal application before performing some secure operation it was designed for. This paper presents a novel method to remotely trust a terminal application from the smart card. For terminals such as personal computers, this method is based on an advanced secure device connected through the USB and consisting of a smart card bundled with flash memory. This device, or USB dongle, can be used in the context of remote untrusting to secure portable applications conveyed in the dongle flash memory. White-box cryptography is used to set the secure channel and a mechanism based on thumbprint is described to provide external authentication when session keys need to be renewed. Although not as secure as end-to-end server to smart card security, remote entrusting with smart cards is easy to deploy for mass-market applications and can provide a reasonable level of security.

  10. Relationship between Consumer Identity and Brand Personality as a Factor of Brand Commitment

    Directory of Open Access Journals (Sweden)

    Antonova N. V.

    2015-12-01

    Full Text Available The article analyzes the relationship between consumer identity and brand personality as a factor of consumer commitment to the brand. We hypothesized that: a there is a link between consumer identity and preferred brand’s personality; b the higher the similarity between the consumer identity and preferred brand’s personality, the higher the brand commitment. The sample included 150 subjects aged 18—25. Methods: the method of J. Aaker was used to study brand personality, and its modification was used to study consumer identity. The questionnaire of J. Brovkina was used to study brand loyalty. Results: high correlations between consumer identity and brand personality were obtained on the scales Ruggedness, Sophistication, Excitement, and high correlations between brand loyalty and deltas of the values of consumer identity and brand personality on the same scales were also discovered. On the scales of Competence and Sincerity the correlations were lower, although important as well. Thus, the hypotheses were confirmed: a it is shown that there is a correlation between consumer identity and brand personality; b the higher this correlation is, the higher is the commitment to the preferred brand.

  11. Head Transplants and Personal Identity: A Philosophical and Literary Survey.

    Science.gov (United States)

    Mori, Giuliano

    2016-04-01

    The criterion of personal identity is clearly called into question by the project to perform a human head transplant. Is identity provided by psychological continuity alone, or does it depend on bodily continuity as well? And how do these different perspectives interface with our notion of mind and mind-body relationship? The reader will be provided with a discussion concerning these problems, together with a philosophical and literary survey about the conception of body-mind relationship from the Greek thought to contemporary philosophy. The analysis will conclude with a discussion concerning the possibility to consider the issue of personal identity from a statistic point of view, which privileges the general perception of identity, so as it has been shaped by the cultural trends of the last four centuries. It could hence be argued that personal identity is not something which can be defined once and for all. On the contrary, the general perception of identity is subject to significant alterations resulting from one's cultural environment. However, the cultural environment itself can be changed by particularly notable events, such as, hypothetically, the successful outcome of a human head transplant. © 2016 John Wiley & Sons Ltd.

  12. New OVDs for Personalized Documents Based on Color Holography and Lippmann Photography

    Science.gov (United States)

    Bjelkhagen, Hans I.

    Optical variable devices (OVDs), such as holograms, are now common in the field of document security. Up until now mass-produced embossed holograms or other types of mass-produced OVDs are used not only for banknotes but also for personalized documents, such as passports, identification cards, travel documents, driving licenses, credit cards, etc. This means that identical OVDs are used on documents issued to individuals. Today, there is a need for a higher degree of security on such documents and this chapter covers new techniques to make personalized OVDs.

  13. Associations of identity dimensions with Big Five personality domains and facets

    NARCIS (Netherlands)

    Klimstra, T.A.; Luyckx, K.; Goossens, L.; Teppers, E.; De Fruyt, F.

    2013-01-01

    Personality is among the most important factors contributing to individual differences in identity formation. However, previous studies mainly focused on broad personality domains and neglected more specific facets. In addition, it has only recently been recognized that identity formation is guided

  14. Credit card spending limit and personal finance: system dynamics approach

    Directory of Open Access Journals (Sweden)

    Mirjana Pejić Bach

    2014-03-01

    Full Text Available Credit cards have become one of the major ways for conducting cashless transactions. However, they have a long term impact on the well being of their owner through the debt generated by credit card usage. Credit card issuers approve high credit limits to credit card owners, thereby influencing their credit burden. A system dynamics model has been used to model behavior of a credit card owner in different scenarios according to the size of a credit limit. Experiments with the model demonstrated that a higher credit limit approved on the credit card decreases the budget available for spending in the long run. This is a contribution toward the evaluation of action for credit limit control based on their consequences.

  15. [AIT (Adolescent Identity Treatment) - an Integrative Treatment Model for the Treatment of Personality Disorders].

    Science.gov (United States)

    Schlüter-Müller, Susanne

    2017-07-01

    AIT (Adolescent Identity Treatment) - an Integrative Treatment Model for the Treatment of Personality Disorders Personality disorders are patterns of maladaptive personality traits that have an impact on the individual throughout the life span. Borderline Personality Disorder (BPD) is a very severe, but treatable mental disorder. Identity disturbance is seen as the central construct for detecting severe personality pathology - and, most notably, borderline personality disorder - in adults and adolescents. Crises in the development of identity usually resolve into a normal and consolidated identity with flexible and adaptive functioning whereas identity diffusion is viewed as a lack of integration of the concept of the self and significant others. It is seen as the basis for subsequent personality pathology, including that of borderline personality disorder. Although BPD has its onset in adolescence and emerging adulthood the diagnosis is often delayed. In most cases, specific treatment is only offered late in the course of the disorder and to relatively few individuals. Adolescent Identity Treatment (AIT) is a treatment model that focuses on identity pathology as the core characteristic of personality disorders. This model integrates specific techniques for the treatment of adolescent personality pathology on the background of object-relation theories and modified elements of Transference-Focused Psychotherapy. Moreover, psychoeducation, a behavior-oriented homeplan and intensive family work is part of AIT.

  16. Features of the differential diagnosis of persons with gender identity disorders

    Directory of Open Access Journals (Sweden)

    Z.D. Novikova

    2013-10-01

    Full Text Available We presented a study of the features of gender identity in people undergoing gender, psychological and psychiatric examination to address the issue of gender reassignment. We analyze the specifics of gender identity, levels of masculinity and femininity, the similarities and differentiation within four nosological groups, which include persons with gender identity disorders (GID with transsexualism, personality disorders, diseases of the schizophrenia spectrum, and with organic mental disorders. We address the question of the differential diagnosis in the process of psychological screening of people with transsexualism and other types of GID. The analytical description of the four algorithms and their comparison are psychologically specific, qualitative research, almost impossible using statistical method of data processing. The data presented may be useful to specialists involved in the study of persons with gender identity disorders

  17. Optimal Experience and Personal Growth: Flow and the Consolidation of Place Identity.

    Science.gov (United States)

    Bonaiuto, Marino; Mao, Yanhui; Roberts, Scott; Psalti, Anastasia; Ariccio, Silvia; Ganucci Cancellieri, Uberta; Csikszentmihalyi, Mihaly

    2016-01-01

    This study examined the relationship between flow experience and place identity, based on eudaimonistic identity theory (EIT) which prioritizes self-defining activities as important for an individual's identification of his/her goals, values, beliefs, and interests corresponding to one's own identity development or enhancement. This study focuses on place identity, the identity's features relating to a person's relation with her/his place. The study is also based on flow theory, according to which some salient features of an activity experience are important for happiness and well-being. Questionnaire surveys on Italian and Greek residents focused on their perceived flow and place identity in relation to their own specific local place experiences. The overall findings revealed that flow experience occurring in one's own preferred place is widely reported as resulting from a range of self-defining activities, irrespective of gender or age, and it is positively and significantly associated with one's own place identity. Such findings provide the first quantitative evidence about the link between flow experienced during meaningfully located self-defining activities and identity experienced at the place level, similarly to the corresponding personal and social levels that had been previously already empirically tested. Results are also discussed in terms of their implications for EIT's understanding and enrichment, especially by its generalization from the traditional, personal identity level up to that of place identity. More generally, this study has implications for maintaining or enhancing one's own place identity, and therefore people-place relations, by means of facilitating a person's flow experience within psychologically meaningful places.

  18. Social Identification in Sports Teams: The Role of Personal, Social, and Collective Identity Motives.

    Science.gov (United States)

    Thomas, William E; Brown, Rupert; Easterbrook, Matthew J; Vignoles, Vivian L; Manzi, Claudia; D'Angelo, Chiara; Holt, Jeremy J

    2017-04-01

    Based on motivated identity construction theory (MICT; Vignoles, 2011), we offer an integrative approach examining the combined roles of six identity motives (self-esteem, distinctiveness, belonging, meaning, continuity, and efficacy) instantiated at three different motivational levels (personal, social, and collective identity) as predictors of group identification. These identity processes were investigated among 369 members of 45 sports teams from England and Italy in a longitudinal study over 6 months with four time points. Multilevel change modeling and cross-lagged analyses showed that satisfaction of four personal identity motives (individuals' personal feelings of self-esteem, distinctiveness, meaning, and efficacy derived from team membership), three social identity motives (individuals' feelings that the team identity carries a sense of belonging, meaning, and continuity), and one collective identity motive (a shared belief in group distinctiveness) significantly predicted group identification. Motivational processes underlying group identification are complex, multilayered, and not reducible to personal needs.

  19. Biography, identity, improvisation, sound: intersections of personal and social identity through improvisation

    NARCIS (Netherlands)

    Smilde, Rineke

    2016-01-01

    This essay addresses the relationship of improvisation and identity. Biographical research that was conducted by the author into professional musicians’ lifelong learning showed the huge importance of improvisation for personal expression. Musically, the concept of sound appeared to serve as a

  20. Validation of a novel attentional bias modification task: the future may be in the cards.

    Science.gov (United States)

    Notebaert, Lies; Clarke, Patrick J F; Grafton, Ben; MacLeod, Colin

    2015-02-01

    Attentional bias modification (ABM) is a promising therapeutic tool aimed at changing patterns of attentional selectivity associated with heightened anxiety. A number of studies have successfully implemented ABM using the modified dot-probe task. However others have not achieved the attentional change required to achieve emotional benefits, highlighting the need for new ABM methods. The current study compared the effectiveness of a newly developed ABM task against the traditional dot-probe ABM task. The new person-identity-matching (PIM) task presented participants with virtual cards, each depicting a happy and angry person. The task encourages selective attention toward or away from threat by requiring participants to make matching judgements between two cards, based either on the identities of the happy faces, or of the angry faces. Change in attentional bias achieved by both ABM tasks was measured by a dot-probe assessment task. Their impact on emotional vulnerability was assessed by measuring negative emotional reactions to a video stressor. The PIM task succeeded in modifying attentional bias, and exerting an impact on emotional reactivity, whereas this was not the case for the dot-probe task. These results are considered in relation to the potential clinical utility of the current task in comparison to traditional ABM methodologies. Copyright © 2014 Elsevier Ltd. All rights reserved.

  1. Out of mind - out of sight : studies on clinical and psychophysiological characteristics of dissociative identity disorder

    OpenAIRE

    Dale, Karl Yngvar

    2008-01-01

    Dissociative identity disorder (DID; APA, 1994), previously labeled Multiple personality (APA, 1980) and Multiple Personality Disorder (APA, 1987), has good diagnostic validity (Gleaves, May, & Cardeña, 2001) and is supported by taxometric research, whereby two types of dissociation have been identified: Pathological dissociation, whose features are consistent with DID, and nonpathological dissociation (Waller, Putnam, & Carlson, 1996). On these grounds, we aimed to contribute to a further...

  2. Person-first and identity-first language: Developing psychologists' cultural competence using disability language.

    Science.gov (United States)

    Dunn, Dana S; Andrews, Erin E

    2015-04-01

    The American Psychological Association (APA) advocates the use of person-first language (e.g., people with disabilities) to refer to individuals with disabilities in daily discourse and to reduce bias in psychological writing. Disability culture advocates and disability studies scholars have challenged the rationale for and implications of exclusive person-first language use, promoting use of identity-first language (e.g., disabled people). We argue that psychologists should adopt identity-first language alongside person-first constructions to address the concerns of disability groups while promoting human dignity and maintaining scientific and professional rigor. We review the evolution of disability language and then discuss the major models used to characterize disability and people with disabilities. The rationale for person-first language and the emergence of identity-first language, respectively, are linked to particular models. We then discuss some language challenges posed by identity-first language and the current intent of person-first language, suggesting that psychologists make judicious use of the former when it is possible to do so. We conclude by offering five observations of ways that use of both person-first and identity-first language could enhance psychologists' cultural competence regarding disability issues in personal and scientific communications. (c) 2015 APA, all rights reserved).

  3. "It's in the Cards": The Contribution of Illustrated Metaphor Cards to Exploring Values Within Narratives.

    Science.gov (United States)

    Karnieli-Miller, Orit; Nissim, Geffen; Goldberg, Miriam

    2017-01-01

    In this article, we present the use of illustrated metaphorical cards as a technique to enrich the qualitative narrative interview. We examine the advantages of incorporating a projective tool to assist in constructing and understanding personal narratives of people living with severe mental illness. We interviewed 25 participants-staff and members of a clubhouse in Israel (an international community model of rehabilitation in mental health)-and sought to understand their stories focused on personal and organizational values. The findings revealed that, in most cases, the cards contributed to data collection by enhancing the interviewees' ability for expression and by facilitating richer, more comprehensive stories and descriptions. This in turn enhanced the researcher's ability to understand the messages and stories presented. The research conclusions discuss the cards' potential contribution to improving data collection and analysis. The cards became an additional channel for expressing participants' experiences, emotions, and unique voice. © The Author(s) 2015.

  4. Self-Determination and Personal Identity in University Students: The Mediating Role of Future Orientation.

    Science.gov (United States)

    Zhou, Mingming; Kam, Chester Chun Seng

    2018-05-17

    In this study, we sought to extend the research on self-determination, future orientation, and personal identity construction by integrating the theories on self-determination and future orientation to provide a conceptual framework for understanding the relations between personal identity and the following individual characteristics: Hope, optimism, awareness of self, and perceived choice. 191 university students in China responded surveys in hardcopies on an individual basis. Our SEM results revealed that proximal future orientation influenced the mechanisms through which distal psychological traits affected identity construction. Specifically, hope mediated the effects of self-awareness on the participants' personal identity ratings (b = .45, p identity. This study suggested an extended framework through which we could understand how the interaction between future orientation and self-determination can predict personal identity. The findings have significant implications for interventions in educational settings.

  5. The relationships of personal and cultural identity to adaptive and maladaptive psychosocial functioning in emerging adults.

    Science.gov (United States)

    Schwartz, Seth J; Zamboanga, Byron L; Weisskirch, Robert S; Wang, Sherry C

    2010-01-01

    The present study examined the extent to which cultural identity would be associated with adaptive and maladaptive psychosocial functioning, both directly and indirectly through a personal identity consolidation. A sample of 773 White, Black, and Hispanic university students completed measures of cultural identity, personal identity consolidation, adaptive psychosocial functioning, internalizing symptoms, and proclivity toward externalizing symptoms. Both heritage and American cultural identity were positively related to adaptive psychosocial functioning; American-culture identity was negatively associated with internalizing symptoms; and heritage-culture identity was negatively related to proclivity toward externalizing symptoms. All of these findings were mediated by personal identity consolidation and were fully consistent across ethnic groups. We discuss implications in terms of broadening the study of identity to include both personal and cultural dimensions of self.

  6. The Game as the Way of Personal Identity Development

    Directory of Open Access Journals (Sweden)

    L. A. Belyayeva

    2012-01-01

    Full Text Available  The paper suggests the game interpretation as the universal and phenomenal way of developing personal identity by a relaxed participation in game activity. Unlike the extended definitions of game as a culturalogical and pedagogical phenomenon, the authors suggest the game analysis in philosophical perspective revealing its existential status. Being the active form of personal existence, the game facilitates self-awareness by means of self-understanding and self-determination in the course of game activity developing the attitude of «I am another one», and giving a chance to experiment with personal identity, taking and playing various social and cultural roles. The existential significance of games activating self-understanding and meaning of self-existence is growing nowadays, given pluralism and reassessment of values. 

  7. The Survey of Personal and National Identity on Cell Phone Addicts and Non-Addicts.

    Science.gov (United States)

    Alavi, Seyyed Salman; Ghanizadeh, Maryam; Mohammadi, Mohammad Reza; Mohammadi Kalhory, Soroush; Jannatifard, Fereshteh; Sepahbodi, Ghazal

    2018-01-01

    Objective: Smart phones have rapidly become an integral, and for some, an essential communication device worldwide. The issue of identity has always been a subject of interest among psychologists. The present study was conducted to compare personal and national identity and their subscales between cell phone addicts and non-addicts. Method : In this cross-sectional study, 500 student cell phone users from various universities in Tehran were recruited using stratified sampling. Participants completed cell phone addiction questionnaires including Mobile Phone Problematic Use Scale (MPPUS), Cell Phone Dependency Questionnaire (CPDQ), Personal Identity Development Questionnaire, Extended Objective Measure of Ego Identity Status (EOMEIS) and National Identity Questionnaire. Then, the subscales of these instruments were analyzed using SPSS Version 20. Results: Results of this study revealed significant differences between cell phone addicts and non-addicts in the scores of national identity, personal identity, and most subscales, except for some subscales (Pphone addiction (r=-0.35, -0.33, respectively).On the other hand, after controlling for the confounder variables, we found that national identity had an effect on cell phone addiction(OR=0.05, CI=0.92-0.98). Conclusion: The results of this study indicated that cell phone overuse may be correlated with defects in some aspects of national and personal identity.

  8. Which came first, personality traits or identity processes during early and middle adolescence?

    NARCIS (Netherlands)

    Hatano, Kai; Sugimura, Kazumi; Klimstra, T.A.

    No previous studies examined longitudinal associations between personality facets and identity dimensions in early and middle adolescence. To uncover these relationships; we test the direction of effects of domain-and facet-level personality traits with identity dimensions in early and middle

  9. Associations between identity diffusion, Axis II disorder, and psychopathology in inpatients with borderline personality disorder.

    Science.gov (United States)

    Sollberger, Daniel; Gremaud-Heitz, Daniela; Riemenschneider, Anke; Küchenhoff, Joachim; Dammann, Gerhard; Walter, Marc

    2012-01-01

    Patients with borderline personality disorder (BPD) suffer from instability in their relationships, their affectivity, and their identity. However, the associations between these dimensions are not clear. The purpose of the present study was to investigate the relation between identity diffusion and psychopathology in BPD. In the second week of inpatient treatment, 52 patients with BPD were assessed with the Inventory of Personality Organization (IPO) and questionnaires measuring general psychiatric symptoms, mood states, and negative affects (SCL-90-R, BDI, STAI, and STAXI). A median split was examined to differentiate BPD patients with high identity diffusion from those with low identity diffusion. BPD patients with high identity diffusion did not differ in their social data from BPD patients with low identity diffusion. However, BPD patients with high identity diffusion showed significantly higher levels of psychiatric symptoms, as well as higher anxiety, anger, and depression scores (p personality disorders (p identity diffusion with psychopathological symptoms and features of personality disorder and emphasize the clinical significance of identity diffusion for patients with BPD. Copyright © 2011 S. Karger AG, Basel.

  10. THE EFFECT OF MEDIA LITERACY ON THE SOCIAL IDENTITY OF VOLLEYBALL SPECTATORS THROUGH PERSONAL IDENTITY

    OpenAIRE

    Mahsa Nematzadeh

    2017-01-01

    This research aim was investigating the effect of media literacy on volleyball spectator's social identity through personal identity. The present study, psychologically, is divided in to 8 layers of view paradigm, the main type of applied research: deductive research approaches, quantity research strategies theories, field research tone, cross sectional survey methods, research objectives, description and finally data collection methods, library resource reviews, and questionnaires. The stati...

  11. Using Efficient TRNGs for PSEUDO Profile in National eID Card

    Directory of Open Access Journals (Sweden)

    Blerim Rexha

    2018-03-01

    Full Text Available Applications that requires true random number generator (TRNG, which uses raw analog data generated from any noise source in nature, must convert the source normal distribution to uniform distribution. Many up to date implementations convert the raw analog data into digital data by employing a comparator or a Schmitt trigger. This method wastes a large amount of random input data, lowering the throughput of the TRNG. In new national electronic identity card (eID beyond the true identity of his bearer and to address the increasing concern of user privacy while doing business in Internet an additional pseudo profile is set. This pseudo profile uses 20-byte random value generated by database server, using a script during personalization process. In this paper, we present a novel algorithm that enables efficient distribution conversion in low power devices. The low memory requirements and efficient processing make it suitable for implementation low power cryptographic devices but also in complex personalization systems. Furthermore, we compare the random data generated by our efficient TRNG vs. those generated by database server.

  12. Research Trends and Issues in the Study of Identity of Multi-ethnic Persons

    OpenAIRE

    TABA, Ayumi; TAKAI, Jiro

    2016-01-01

    In this article, concepts of identity are considered and surveyed researches of ego identity and group identity in social identity theory, self-categorization theory. It indicates ethnic identity is related to selfconcept, well-being, academic achievement, mental health, and so on. Furthermore, identity management theory reveals that cross- cultural communication occurs depending on management of cultural identity as group identity and relational identity as personal identity. However, there ...

  13. The association of personal semantic memory to identity representations: insight into higher-order networks of autobiographical contents.

    Science.gov (United States)

    Grilli, Matthew D

    2017-11-01

    Identity representations are higher-order knowledge structures that organise autobiographical memories on the basis of personality and role-based themes of one's self-concept. In two experiments, the extent to which different types of personal semantic content are reflected in these higher-order networks of memories was investigated. Healthy, young adult participants generated identity representations that varied in remoteness of formation and verbally reflected on these themes in an open-ended narrative task. The narrative responses were scored for retrieval of episodic, experience-near personal semantic and experience-far (i.e., abstract) personal semantic contents. Results revealed that to reflect on remotely formed identity representations, experience-far personal semantic contents were retrieved more than experience-near personal semantic contents. In contrast, to reflect on recently formed identity representations, experience-near personal semantic contents were retrieved more than experience-far personal semantic contents. Although episodic memory contents were retrieved less than both personal semantic content types to reflect on remotely formed identity representations, this content type was retrieved at a similar frequency as experience-far personal semantic content to reflect on recently formed identity representations. These findings indicate that the association of personal semantic content to identity representations is robust and related to time since acquisition of these knowledge structures.

  14. Change and persistence of personal identities after the transition to retirement.

    Science.gov (United States)

    Teuscher, Ursina

    2010-01-01

    This study addresses the question of how retired people's self-image differs from that of working people, and what factors predict people's self-definition as professionals or retirees. Seven hundred ninety-two Swiss persons aged 58-70 (386 men, 406 women; 349 not retired, 443 retired) were asked to rate the importance of different self-description domains (such as profession, family-roles, personal values, etc.). Results indicated that the profession domain remains important for self-description even after retirement, to the extent that retirement status does not predict the importance of the professional identity at all. Rather, consistent with social identity theory, the importance of the profession for self-description is best predicted by the status of the (former or current) job. The importance of the retirement status for self-definition is predicted best by a positive attitude toward aging. In general, retired respondents rated more domains of self-description as important than did not-yet-retired respondents, and no domain was less important after retirement. In other words, identity diversity was higher for the retired than for the not-yet-retired persons. In addition, high identity diversity correlated with a high satisfaction across different life domains.

  15. I and Us: A Longitudinal Study on the Interplay of Personal and Social Identity in Adolescence.

    Science.gov (United States)

    Albarello, Flavia; Crocetti, Elisabetta; Rubini, Monica

    2018-04-01

    The development of personal and social identity is crucial in adolescence. On the one hand, adolescents face the task of forming and consolidating their personal identity in multiple domains, with educational and interpersonal domains particularly salient. On the other hand, they enlarge their social horizon and increasingly define themselves as members of multiple peer groups, such as groups of classmates and friends met outside school. There is however a lack of integrative research on the interplay among and between personal and social identity processes. Hence the purpose of this study was threefold. First, we examined how personal identity processes in the educational and interpersonal domains are associated longitudinally. Second, we investigated to what extent social identifications with classmates and with the group of friends are associated over time. Third, with an original approach we examined the longitudinal interplay between personal and social identity processes, to connect theoretical contributions that have so far proceeded largely in parallel. Participants were 304 adolescents (61.84% female, M age  = 17.49) involved in a three-wave longitudinal study. We found that (a) the ways in which adolescents develop their identity in the educational and interpersonal domains become more closely intertwined over time; (b) identifications with classmates and with the group of friends are interconnected; and (c) personal and social identity processes are associated both concurrently and longitudinally, with most cross-lagged effects showing that social identifications influence personal identity formation and consolidation in the interpersonal identity domain. Theoretical implications are discussed.

  16. Secondary Uses of Personal Identity Information: Policies, Technologies and Regulatory Framework

    DEFF Research Database (Denmark)

    Adjei, Joseph K.; Olesen, Henning

    2012-01-01

    Although personal identity information must primarily be used for protecting and promoting the physical needs of individuals, it has also become central to the business models of the digital age due to its use for other secondary purposes, resulting in various innovative identity management (Id...

  17. Relationships between Personal and Collective Place Identity and Well-Being in Mountain Communities.

    Science.gov (United States)

    Knez, Igor; Eliasson, Ingegärd

    2017-01-01

    The aim was to investigate the relationships between landscape-related personal and collective identity and well-being of residents living in a Swedish mountain county ( N = 850). It was shown that their most valued mountain activities were viewing and experiencing nature and landscape, outdoor recreation, rest and leisure, and socializing with friends/family. Qualitative analyses showed that the most valued aspects of the sites were landscape and outdoor restoration for personal favorite sites, and tourism and alpine for collective favorite sites. According to quantitative analyses the stronger the attachment/closeness/belonging (emotional component of place identity) residents felt to favorite personal and collective sites the more well-being they perceived when visiting these places. Similarly, the more remembrance, thinking and mental travel (cognitive component of place identity) residents directed to these sites the more well-being they perceived in these places. In both types of sites well-being was more strongly predicted by emotional than cognitive component of place-identity. All this indicates the importance of person-place bonds in beneficial experiences of the outdoors, over and above simply being in outdoor environments.

  18. Young Generation Attitudes and Awareness Towards the Implementation of Smart Card in Bahrain: An Exploratory Study

    OpenAIRE

    Adel I. Al-Alawi; Mohammed A. Al-Amer

    2006-01-01

    SmartCards are one of the latest additions to the continuing list of advancements and innovations in the world of information and communication technology. A SmartCard resembles in size and shape to a normal credit card or bank ATM card, with a microprocessor chip implanted into the plastic card. These cards are used not just as identity cards, like the earliest versions of such cards, but hold a relatively huge amount of editable information including the card holder's bank data, e-purse, fi...

  19. 77 FR 37558 - Disclosure of Certain Credit Card Complaint Data

    Science.gov (United States)

    2012-06-22

    ... Certain Credit Card Complaint Data AGENCY: Bureau of Consumer Financial Protection. ACTION: Notice of... Bureau plans to exercise its discretion to publicly disclose certain credit card complaint data that do not include personally identifiable information. The Bureau receives credit card complaints from...

  20. The impact of corporate visual identity on brand personality

    OpenAIRE

    Jabbar, Zeenat

    2014-01-01

    This thesis was submitted for the degree of Doctor of Philosophy and awarded by Brunel University. It is argued that there is a need to extend our understanding and knowledge of the magnitude to which the elements of corporate visual identity (CVI) are perceived as the communicators of brand personality and hence corporate image, by the consumers. This thesis extends the knowledge about corporate visual identity (CVI) factors, particularly, name, logo, and colours, by developing a comprehe...

  1. Sistem Pencatatan Kehadiran Berbasis Java Card

    Directory of Open Access Journals (Sweden)

    Lidya Octarina

    2010-12-01

    Full Text Available The purposes of this research are to prevent jockey in exams, reduce the occurrence of error in attendance record at practicum or exams, and reduce error in filling students' attendance status to the attendance system. Three main parts of software development method are used; analysis, design, and literature method. Current system survey, analysis of the survey findings, identify the information, and identifying system requirements are implemented in analysis method. The design method that is used in this research is Unified Modeling Language (UML. The using of attendance recording system that uses Java Card-based application makes students identity card has a new function as the tool to make attendance. Conclusion of the research has shown that it can prevent identity fraud, minimize the time wasted in attendance system, reduce the printing paper, and reduce tagging errors eligibility status exam of students. 

  2. Sex-typed personality traits and gender identity as predictors of young adults' career interests.

    Science.gov (United States)

    Dinella, Lisa M; Fulcher, Megan; Weisgram, Erica S

    2014-04-01

    Gender segregation of careers is still prominent in the U.S. workforce. The current study was designed to investigate the role of sex-typed personality traits and gender identity in predicting emerging adults' interests in sex-typed careers. Participants included 586 university students (185 males, 401 females). Participants reported their sex-typed personality traits (masculine and feminine traits), gender identities (gender typicality, contentment, felt pressure to conform, and intergroup bias), and interests in sex-typed careers. Results indicated both sex-typed personality traits and gender identity were important predictors of young adults' career interests, but in varying degrees and differentially for men and women. Men's sex-typed personality traits and gender typicality were predictive of their masculine career interests even more so when the interaction of their masculine traits and gender typicality were considered. When gender typicality and sex-typed personality traits were considered simultaneously, gender typicality was negatively related to men's feminine career interests and gender typicality was the only significant predictor of men's feminine career interests. For women, sex-typed personality traits and gender typicality were predictive of their sex-typed career interests. The level of pressure they felt to conform to their gender also positively predicted interest in feminine careers. The interaction of sex-typed personality traits and gender typicality did not predict women's career interests more than when these variables were considered as main effects. Results of the multidimensional assessment of gender identity confirmed that various dimensions of gender identity played different roles in predicting career interests and gender typicality was the strongest predictor of career interests.

  3. Design and implementation of a smart card based healthcare information system.

    Science.gov (United States)

    Kardas, Geylani; Tunali, E Turhan

    2006-01-01

    Smart cards are used in information technologies as portable integrated devices with data storage and data processing capabilities. As in other fields, smart card use in health systems became popular due to their increased capacity and performance. Their efficient use with easy and fast data access facilities leads to implementation particularly widespread in security systems. In this paper, a smart card based healthcare information system is developed. The system uses smart card for personal identification and transfer of health data and provides data communication via a distributed protocol which is particularly developed for this study. Two smart card software modules are implemented that run on patient and healthcare professional smart cards, respectively. In addition to personal information, general health information about the patient is also loaded to patient smart card. Health care providers use their own smart cards to be authenticated on the system and to access data on patient cards. Encryption keys and digital signature keys stored on smart cards of the system are used for secure and authenticated data communication between clients and database servers over distributed object protocol. System is developed on Java platform by using object oriented architecture and design patterns.

  4. Biometrics and Identity Management

    DEFF Research Database (Denmark)

    management. BIOID 2008. The papers are categorized in four classes. These classes represent the 4 working groups of the COST Action 2101. For more information, see http://www.cost2101.org/.   Biometric data quality and multimodal biometric templates, Unsupervised interactive interfaces for multimodal...... security and border control scenarios it is now apparent that the widespread availability of biometrics in everyday life will also spin out an ever increasing number of (private) applications in other domains. Crucial to this vision is the management of the user's identity, which does not only imply...... biometrics, Biometric attacks and countermeasures, Standards and privacy issues for biometrics in identity documents and smart cards. BIOID 2008 is an initiative of the COST Action 2101 on Biometrics for Identity Documents and Smart Cards. It is supported by the EU Framework 7 Programme. Other sponsors...

  5. 25 CFR 11.422 - Unauthorized use of credit cards.

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false Unauthorized use of credit cards. 11.422 Section 11.422... LAW AND ORDER CODE Criminal Offenses § 11.422 Unauthorized use of credit cards. (a) A person commits a misdemeanor if he or she uses a credit card for the purpose of obtaining property or services with knowledge...

  6. The possibility of using "Job Card" for career education

    OpenAIRE

    横山, 裕; ヨコヤマ, ユタカ; Yutaka, YOKOYAMA

    2009-01-01

    This paper described the advantage of using a "job card" for career education. "The job card system" is a new system that began this year. The original purpose of "the job card system" is to support a person looking for a job. When a job seeker writes a "job card", the job seeker can understand his own work experience and employment possibilities while getting the advice of the career counselor. If a teacher utilized a "job card" for career education in this way, the student can understand hi...

  7. Identity processes and personality traits and types in adolescence : Directionality of effects and developmental trajectories

    NARCIS (Netherlands)

    Luyckx, K.; Teppers, E.; Klimstra, T.A.; Rassart, J.

    2014-01-01

    Personality traits are hypothesized to be among the most important factors contributing to individual differences in identity development. However, longitudinal studies linking Big Five personality traits to contemporary identity models (in which multiple exploration and commitment processes are

  8. BRANDING AND IDENTITY BUILDING FOR A SMALL COMPANY : Focused on Visual Identity

    OpenAIRE

    Näveri, Mattea

    2015-01-01

    The topic of this thesis is branding and identity of a small business, with a focus on visual identity. The major part of this thesis focuses on the research done on visual identity and the basic ideation of branding. The other half specifically focuses on the visual identity, the creation of a logo for the company, defining typography and colour and ephemera, and particularly, the company’s business card. The main goal was to execute a unique, individualized branding, which showcases...

  9. Credit Cards: What You Don't Know Can Cost You!

    Science.gov (United States)

    Detweiler, Gerri

    1993-01-01

    The role of credit cards in personal finance has increased dramatically over the past two decades. Complex interest computation methods and additional fees often boost the price of credit card loans and help make credit cards the most profitable type of consumer loan for many lenders. (Author/JOW)

  10. The Survey personal and national identity between individual with cell phone addiction disorder and normal smartphone users

    Directory of Open Access Journals (Sweden)

    Seyyed Salman Alavi

    2018-02-01

    Full Text Available Objective: Smart phones have rapidly become an integral, and for some, an essential communication device worldwide. The issue of identity has always been a subject of interest among psychologists. The present study was conducted to compare personal and national identity and their subscales between cell phone addicts and non-addicts.Method: In this cross-sectional study, 500 student cell phone users from various universities in Tehran were recruited using stratified sampling. Participants completed cell phone addiction questionnaires including Mobile Phone Problematic Use Scale (MPPUS, Cell Phone Dependency Questionnaire (CPDQ, Personal Identity Development Questionnaire, Extended Objective Measure of Ego Identity Status (EOMEIS and National Identity Questionnaire. Then, the subscales of these instruments were analyzed using SPSS Version 20.Results: Results of this study revealed significant differences between cell phone addicts and non-addicts in the scores of national identity, personal identity, and most subscales, except for some subscales (P<0.05. In addition, a negative and significant relationship was found between personal and national identity and cell phone addiction (r=-0.35, -0.33, respectively.On the other hand, after controlling for the confounder variables, we found that national identity had an effect on cell phone addiction(OR=0.05, CI=0.92-0.98.Conclusion: The results of this study indicated that cell phone overuse may be correlated with defects in some aspects of national and personal identity.

  11. Gender identity and sexual orientation in women with borderline personality disorder.

    Science.gov (United States)

    Singh, Devita; McMain, Shelley; Zucker, Kenneth J

    2011-02-01

    In the Diagnostic and Statistical Manual of Mental Disorders, Fourth Edition, text revision (DSM-IV-TR) (and earlier editions), a disturbance in "identity" is one of the defining features of borderline personality disorder (BPD). Gender identity, a person's sense of self as a male or a female, constitutes an important aspect of identity formation, but this construct has rarely been examined in patients with BPD. In the present study, the presence of gender identity disorder or confusion was examined in women diagnosed with BPD. We used a validated dimensional measure of gender dysphoria. Recalled gender identity and gender role behavior from childhood was also assessed with a validated dimensional measure, and current sexual orientation was assessed by two self-report measures. A consecutive series of 100 clinic-referred women (mean age, 34 years) with BPD participated in the study. The women were diagnosed with BPD using the International Personality Disorder Exam-BPD Section. None of the women with BPD met the criterion for caseness on the dimensional measure of gender dysphoria. Women who self-reported either a bisexual or a homosexual sexual orientation had a significantly higher score on the dimensional measure of gender dysphoria than the women who self-reported a heterosexual sexual orientation, and they also recalled significantly more cross-gender behavior during childhood. Results were compared with a previous study on a diagnostically heterogeneous group of women with other clinical problems. The importance of psychosexual assessment in the clinical evaluation of patients with BPD is discussed. © 2010 International Society for Sexual Medicine.

  12. [Identity theft

    CERN Multimedia

    Wolinksy, H

    2003-01-01

    "A new survey by the Federal Trade Commission indicates that over the last five years one in four American households has been hit by identity theft, which can result in thieves tapping their victims' credit cards or bank accounts" (1 page).

  13. Pragmatics of the Development of Personal Identity in Adolescents in the Latin American Context.

    Science.gov (United States)

    Tapia, Javier; Rojas, Adrián; Picado, Karol

    2017-03-01

    The present work proposes a pragmatic perspective of the development of personal identity. Such perspective is based on a unifying vision that incorporates the contribution of communicative pragmatics and becomes aware of the contribution of semiotics to psychology, without leaving aside the eriksonian point of view and other significant contributions in the field. The article defines identity in adolescence from a development approach, and adopts a systemic perspective concerning the insertion of adolescents in their context of formation as individuals. It then proposes a way to understand identity from a pragmatic-communicative perspective. Finally, it introduces two communicative use contexts from which personal identity can emerge, showing the importance of communication and language in the formation and development of identity.

  14. Motivation and Justice at Work: The Role of Emotion and Cognition Components of Personal and Collective Work Identity.

    Science.gov (United States)

    Nordhall, Ola; Knez, Igor

    2017-01-01

    The aim of this study was to investigate the role of personal and collective work identity (including emotion and cognition components), in predicting work motivation (operationalized as work self-determined motivation) and organizational justice (operationalized as organizational pay justice). Digitized questionnaires were distributed by e-mail to 2905 members, teachers, of a Swedish trade union. A total of 768 individuals answered the questionnaire and by that participated in this study. Personal- compared to collective work identity was shown to positively associate with self-determined motivation accounted for by the emotion component of personal work identity. Collective compared to personal work identity was reported to positively associate with organizational pay justice accounted for by the cognition component of collective work identity. All this suggests that both work-related motivation and organizational justice might be, to some extent, accounted for by the psychological mechanisms of work identity and that, as predicted, different types of work identity, play different significant roles in predicting motivation and justice at work. More precisely, the emotion component of work identity was more pronounced in personal work-bonding relationships, and the cognitive component, of work identity in contrast, was more pronounced in collective work-bonding relationships.

  15. Identity Processes and Personality Traits and Types in Adolescence: Directionality of Effects and Developmental Trajectories

    Science.gov (United States)

    Luyckx, Koen; Teppers, Eveline; Klimstra, Theo A.; Rassart, Jessica

    2014-01-01

    Personality traits are hypothesized to be among the most important factors contributing to individual differences in identity development. However, longitudinal studies linking Big Five personality traits to contemporary identity models (in which multiple exploration and commitment processes are distinguished) are largely lacking. To gain more…

  16. Perspectivism and Intersubjective Criteria for Personal Identity: A Defense of Bernard Williams’ Criterion of Bodily Continuity

    OpenAIRE

    Torriani, Tristan Guillermo

    2010-01-01

    In this article I revisit earlier stages of the discussion of personal identity, before Neo-Lockean psychological continuity views became prevalent. In particular, I am interested in Bernard Williams’ initial proposal of bodily identity as a necessary, although not sufficient, criterion of personal identity. It was at this point that psychological continuity views came to the fore arguing that bodily identity was not necessary because brain transplants were logically possible, even if physica...

  17. SD card projects using the PIC microcontroller

    CERN Document Server

    Ibrahim, Dogan

    2010-01-01

    PIC Microcontrollers are a favorite in industry and with hobbyists. These microcontrollers are versatile, simple, and low cost making them perfect for many different applications. The 8-bit PIC is widely used in consumer electronic goods, office automation, and personal projects. Author, Dogan Ibrahim, author of several PIC books has now written a book using the PIC18 family of microcontrollers to create projects with SD cards. This book is ideal for those practicing engineers, advanced students, and PIC enthusiasts that want to incorporate SD Cards into their devices. SD cards are che

  18. Motivation and Justice at Work: The Role of Emotion and Cognition Components of Personal and Collective Work Identity

    Directory of Open Access Journals (Sweden)

    Ola Nordhall

    2018-01-01

    Full Text Available The aim of this study was to investigate the role of personal and collective work identity (including emotion and cognition components, in predicting work motivation (operationalized as work self-determined motivation and organizational justice (operationalized as organizational pay justice. Digitized questionnaires were distributed by e-mail to 2905 members, teachers, of a Swedish trade union. A total of 768 individuals answered the questionnaire and by that participated in this study. Personal- compared to collective work identity was shown to positively associate with self-determined motivation accounted for by the emotion component of personal work identity. Collective compared to personal work identity was reported to positively associate with organizational pay justice accounted for by the cognition component of collective work identity. All this suggests that both work-related motivation and organizational justice might be, to some extent, accounted for by the psychological mechanisms of work identity and that, as predicted, different types of work identity, play different significant roles in predicting motivation and justice at work. More precisely, the emotion component of work identity was more pronounced in personal work-bonding relationships, and the cognitive component, of work identity in contrast, was more pronounced in collective work-bonding relationships.

  19. Motivation and Justice at Work: The Role of Emotion and Cognition Components of Personal and Collective Work Identity

    Science.gov (United States)

    Nordhall, Ola; Knez, Igor

    2018-01-01

    The aim of this study was to investigate the role of personal and collective work identity (including emotion and cognition components), in predicting work motivation (operationalized as work self-determined motivation) and organizational justice (operationalized as organizational pay justice). Digitized questionnaires were distributed by e-mail to 2905 members, teachers, of a Swedish trade union. A total of 768 individuals answered the questionnaire and by that participated in this study. Personal- compared to collective work identity was shown to positively associate with self-determined motivation accounted for by the emotion component of personal work identity. Collective compared to personal work identity was reported to positively associate with organizational pay justice accounted for by the cognition component of collective work identity. All this suggests that both work-related motivation and organizational justice might be, to some extent, accounted for by the psychological mechanisms of work identity and that, as predicted, different types of work identity, play different significant roles in predicting motivation and justice at work. More precisely, the emotion component of work identity was more pronounced in personal work-bonding relationships, and the cognitive component, of work identity in contrast, was more pronounced in collective work-bonding relationships. PMID:29379454

  20. Contribution of past and future self-defining event networks to personal identity.

    Science.gov (United States)

    Demblon, Julie; D'Argembeau, Arnaud

    2017-05-01

    Personal identity is nourished by memories of significant past experiences and by the imagination of meaningful events that one anticipates to happen in the future. The organisation of such self-defining memories and prospective thoughts in the cognitive system has received little empirical attention, however. In the present study, our aims were to investigate to what extent self-defining memories and future projections are organised in networks of related events, and to determine the nature of the connections linking these events. Our results reveal the existence of self-defining event networks, composed of both memories and future events of similar centrality for identity and characterised by similar identity motives. These self-defining networks expressed a strong internal coherence and frequently organised events in meaningful themes and sequences (i.e., event clusters). Finally, we found that the satisfaction of identity motives in represented events and the presence of clustering across events both contributed to increase in the perceived centrality of events for the sense of identity. Overall, these findings suggest that personal identity is not only nourished by representations of significant past and future events, but also depends on the formation of coherent networks of related events that provide an overarching meaning to specific life experiences.

  1. Optimal Experience and Personal Growth: Flow and the Consolidation of Place Identity

    Science.gov (United States)

    Bonaiuto, Marino; Mao, Yanhui; Roberts, Scott; Psalti, Anastasia; Ariccio, Silvia; Ganucci Cancellieri, Uberta; Csikszentmihalyi, Mihaly

    2016-01-01

    This study examined the relationship between flow experience and place identity, based on eudaimonistic identity theory (EIT) which prioritizes self-defining activities as important for an individual’s identification of his/her goals, values, beliefs, and interests corresponding to one’s own identity development or enhancement. This study focuses on place identity, the identity’s features relating to a person’s relation with her/his place. The study is also based on flow theory, according to which some salient features of an activity experience are important for happiness and well-being. Questionnaire surveys on Italian and Greek residents focused on their perceived flow and place identity in relation to their own specific local place experiences. The overall findings revealed that flow experience occurring in one’s own preferred place is widely reported as resulting from a range of self-defining activities, irrespective of gender or age, and it is positively and significantly associated with one’s own place identity. Such findings provide the first quantitative evidence about the link between flow experienced during meaningfully located self-defining activities and identity experienced at the place level, similarly to the corresponding personal and social levels that had been previously already empirically tested. Results are also discussed in terms of their implications for EIT’s understanding and enrichment, especially by its generalization from the traditional, personal identity level up to that of place identity. More generally, this study has implications for maintaining or enhancing one’s own place identity, and therefore people–place relations, by means of facilitating a person’s flow experience within psychologically meaningful places. PMID:27872600

  2. Perspectivism and Intersubjective Criteria for Personal Identity: A Defense of Bernard Williams’ Criterion of Bodily Continuity

    Directory of Open Access Journals (Sweden)

    Tristan Guillermo Torriani

    2008-06-01

    Full Text Available In this article I revisit earlier stages of the discussion of personal identity, before Neo-Lockean psychological continuity views became prevalent. In particular, I am interested in Bernard Williams’ initial proposal of bodily identity as a necessary, although not sufficient, criterion of personal identity. It was at this point that psychological continuity views came to the fore arguing that bodily identity was not necessary because brain transplants were logically possible, even if physically impossible. Further proposals by Shoemaker of causal relations between mental states in our memory and Parfit’s discussion of branching causal chains created additional complications. My contention in this paper is that psychological continuity views deflected our attention from what should have remained in the spotlight all the time: the intersubjective character (or not of criteria proposed to decide personal identity in our language game, and ultimately our form of life concerning ourselves as persons. B. Williams’ emphasis on the body was not just common sense. It was also recognition of the importance of giving priority to criteria that could be kept under intersubjective control.

  3. Perspectivism and Intersubjective Criteria for Personal Identity: A Defense of Bernard Williams’ Criterion of Bodily Continuity

    Directory of Open Access Journals (Sweden)

    Tristan Guillermo Torriani

    2010-09-01

    Full Text Available In this article I revisit earlier stages of the discussion of personal identity, before Neo-Lockean psychological continuity views became prevalent. In particular, I am interested in Bernard Williams’ initial proposal of bodily identity as a necessary, although not sufficient, criterion of personal identity. It was at this point that psychological continuity views came to the fore arguing that bodily identity was not necessary because brain transplants were logically possible, even if physically impossible. Further proposals by Shoemaker of causal relations between mental states in our memory and Parfit’s discussion of branching causal chains created additional complications. My contention in this paper is that psychological continuity views deflected our attention from what should have remained in the spotlight all the time: the intersubjective character (or not of criteria proposed to decide personal identity in our language game, and ultimately our form of life concerning ourselves as persons. B. Williams’ emphasis on the body was not just common sense. It was also recognition of the importance of giving priority to criteria that could be kept under intersubjective control.

  4. Pedagogic Approach to the Mechanisms of Personality Identity Development

    Science.gov (United States)

    Shakurova, Marina V.

    2016-01-01

    The article addresses the problem of defining and attributing pedagogic essence to the mechanisms of personality identity development. It is based on the general mechanism of social interaction. Its structure contains, on the one hand, pedagogic interaction, including the forms of pedagogic assistance and pedagogic support; on the other hand, it…

  5. Assessing cultural intelligence, personality and identity amongst young white Afrikaans-speaking students: A preliminary study

    Directory of Open Access Journals (Sweden)

    Natasha Nel

    2015-04-01

    Research purpose: The objective of this research is to determine the relationship between personality, identity and CQ amongst young Afrikaans-speaking South Africans. Research approach, design and method: A quantitative research design was used in this study. This study was cross-sectional in nature. For the purpose of this study, a sample of young South African university students (N = 252 was used. The personal identity subscale from the Erickson Psychosocial Stage Inventory, the Multi-Ethnic Identity Measure, the Religious Identity Short Scale, the South African Personality Inventory questionnaire and the Four Factor Model of Cultural Intelligence Scale were applied as the measuring instruments. Main findings: Religious identity and ethnic identity have a relationship with cognitive CQ. Soft-heartedness and conscientiousness have a relationship with behavioural CQ. Also, soft-heartedness, facilitating, extroversion and religious identity have a relationship with motivational CQ. Practical/managerial implications: Organisations within South Africa will gain a better understanding of CQ and the benefits of having a culturally intelligent workforce as a strengths-based approach. Culturally intelligent employees will be able to adjust to working with co-workers from another culture, not feel threatened when interacting with co-workers and clients and be able to transfer knowledge from one culture to another, which will aid the organisation in completing overseas assignments, cross-cultural decision-making, leadership in multicultural environments and managing international careers. Contribution/value-add: CQ is a relatively new concept and empirical research on positive subjects is still very limited. Research on personality, identity and CQ within the South African context is still very limited. Therefore, this study will contribute to literature on positive psychology and cultural intelligence.

  6. Reproductive autonomy, the non-identity problem, and the non-person problem.

    Science.gov (United States)

    DiSilvestro, Russell

    2009-01-01

    The Non-Identity Problem is the problem of explaining the apparent wrongness of a decision that does not harm people, especially since some of the people affected by the decision would not exist at all were it not for the decision. One approach to this problem, in the context of reproductive decisions, is to focus on wronging, rather than harming, one's offspring. But a Non-Person Problem emerges for any view that claims (1) that only persons can be wronged and (2) that the person-making properties allow for there to be human non-persons. Consider an individual human organism that is prevented from ever possessing the person-making properties. On person-only accounts of the victims of wronging, this organism cannot be wronged by anyone. Hence even individuals whose decisions prevent it from ever possessing the person-making properties cannot wrong it. But this is counter-intuitive. We can think of examples where a human organism is wronged by precisely those decisions that prevent it from possessing the person-making properties. The best solution to this problem, in the case where the person-making property is rational self-governance in pursuit of a meaningful life, is to adjust the concept of a person so that it refers, not merely to those with the immediate capacity for rational self-governance in pursuit of a meaningful life, but also to those with a higher-order capacity for such self-governance. Any solution to the Non-Identity Problem that focuses on wronging rather than harming should incorporate this sort of solution to the Non-Person Problem.

  7. Personal identity in college and the work context : Developmental trajectories and psychosocial functioning

    NARCIS (Netherlands)

    Luyckx, K.; Klimstra, T.A.; Schwartz, S.J.; Duriez, B.

    2013-01-01

    Personal identity formation represents a core developmental challenge for adolescents and young adults. Because much of the identity literature focuses on college students, it is necessary to conduct a detailed inquiry into the ways in which specific commitment and exploration processes develop over

  8. A smart card based student card system

    OpenAIRE

    2009-01-01

    M.Sc. A Smart Card looks like a normal plastic card that we use every day, but its capabilities and advantages are huge. Inside the card there is a small microprocessor capable of doing operations on data. With memory available on the card, data can be stored in a safe and secure location. This card can be used for various applications and is a big improvement on all of its predecessors. These applications can be anything from SIM cards in a cell phone to credit cards and cards used for ac...

  9. Using smart card technology to prevent sales of alcohol to underage persons

    Science.gov (United States)

    2001-07-01

    This report documents the results of a demonstration and evaluation project to examine the effectiveness of smart card technology (i.e., magnetic stripe on the driver's license and a card reader system) as a means of providing alcohol retailers with ...

  10. When I equals we: exploring the relation between social and personal identity of extreme right-wing political party members.

    Science.gov (United States)

    Baray, Gamze; Postmes, Tom; Jetten, Jolanda

    2009-12-01

    This paper introduces the concept of self-defining groups to explain how personal and social aspects of identity relate to each other among members of an extreme right-wing political party. Two studies were conducted. Study 1 examined how affiliation with a social group that has clear-cut, rigid norms and values affects the personal and social self-concept. Participants were members of a (self-defining) Turkish nationalist organisation (N=66) and a control group of Turkish university students (N=58). Paradoxically, high levels of national identification were associated with stronger personal identity. Study 2 used the same participant population (N=177) and manipulated self-focused attention by means of a mirror. Self-aware members reported the highest levels of identification with the nationalist organisation. Results suggest that members of this groups show no signs of 'vanishing individuality': although boundaries between personal and social identities are blurred, extremist group members retain a distinct and strengthened sense of personal identity. This raises some interesting questions for the concept of personal identity and how it can be informed by the content of one's social identity.

  11. Cracking the code: a decode strategy for the international business machines punch cards of Korean war soldiers.

    Science.gov (United States)

    Mitsunaga, Erin M

    2006-05-01

    During the Korean War, International Business Machines (IBM) punch cards were created for every individual involved in military combat. Each card contained all pertinent personal information about the individual and was utilized to keep track of all soldiers involved. However, at present, all of the information known about these punch cards reveals only their format and their significance; there is little to no information on how these cards were created or how to interpret the information contained without the aid of the computer system used during the war. Today, it is believed there is no one available to explain this computerized system, nor do the original computers exist. This decode strategy is the result of an attempt to decipher the information on these cards through the use of all available medical and dental records for each individual examined. By cross-referencing the relevant personal information with the known format of the cards, a basic guess-and-check method was utilized. After examining hundreds of IBM punch cards, however, it has become clear that the punch card method of recording information was not infallible. In some cases, there are gaps of information on cards where there are data recorded on personal records; in others, information is punched incorrectly onto the cards, perhaps as the result of a transcription error. Taken all together, it is clear that the information contained on each individual's card should be taken solely as another form of personal documentation.

  12. Using medical history embedded in biometrics medical card for user identity authentication: privacy preserving authentication model by features matching.

    Science.gov (United States)

    Fong, Simon; Zhuang, Yan

    2012-01-01

    Many forms of biometrics have been proposed and studied for biometrics authentication. Recently researchers are looking into longitudinal pattern matching that based on more than just a singular biometrics; data from user's activities are used to characterise the identity of a user. In this paper we advocate a novel type of authentication by using a user's medical history which can be electronically stored in a biometric security card. This is a sequel paper from our previous work about defining abstract format of medical data to be queried and tested upon authentication. The challenge to overcome is preserving the user's privacy by choosing only the useful features from the medical data for use in authentication. The features should contain less sensitive elements and they are implicitly related to the target illness. Therefore exchanging questions and answers about a few carefully chosen features in an open channel would not easily or directly expose the illness, but yet it can verify by inference whether the user has a record of it stored in his smart card. The design of a privacy preserving model by backward inference is introduced in this paper. Some live medical data are used in experiments for validation and demonstration.

  13. Using Medical History Embedded in Biometrics Medical Card for User Identity Authentication: Privacy Preserving Authentication Model by Features Matching

    Directory of Open Access Journals (Sweden)

    Simon Fong

    2012-01-01

    Full Text Available Many forms of biometrics have been proposed and studied for biometrics authentication. Recently researchers are looking into longitudinal pattern matching that based on more than just a singular biometrics; data from user’s activities are used to characterise the identity of a user. In this paper we advocate a novel type of authentication by using a user’s medical history which can be electronically stored in a biometric security card. This is a sequel paper from our previous work about defining abstract format of medical data to be queried and tested upon authentication. The challenge to overcome is preserving the user’s privacy by choosing only the useful features from the medical data for use in authentication. The features should contain less sensitive elements and they are implicitly related to the target illness. Therefore exchanging questions and answers about a few carefully chosen features in an open channel would not easily or directly expose the illness, but yet it can verify by inference whether the user has a record of it stored in his smart card. The design of a privacy preserving model by backward inference is introduced in this paper. Some live medical data are used in experiments for validation and demonstration.

  14. Deployment of German Electronic Citizen Cards in Banking: Opportunities and Challenges

    Science.gov (United States)

    Büger, Matthias

    The German federal government plans to issue an electronic citizen card (eID) in 2009, replacing the current identity card (Personalausweis). Since the eID should be good for identification in E-government as well as E-business applications, it is aimed to be used in the banking environment. One application would be opening a bank account in the internet. If this was possible, the process would be much easier than today. However, German law still requires a physical ID card. We will discuss the opportunities and the challenges of possible usage of eID in banking.

  15. Smart Cards and Card Operating Systems

    NARCIS (Netherlands)

    Hartel, Pieter H.; Bartlett, J.; de Jong, Eduard K.

    The operating system of an IC card should provide an appropriate interface to applications using IC cards. An incorrect choice of operations and data renders the card inefficient and cumbersome. The design principles of the UNIX operating system are most appropriate for IC card operating system

  16. 25 CFR 249.3 - Identification cards.

    Science.gov (United States)

    2010-04-01

    ... the issuance of an appropriate identification card to any Indian entitled thereto as prima facie... any Federal, State, or tribal enforcement officer shall be prima facie evidence that the person is not...

  17. Biometrics and smart cards combine to offer high security

    International Nuclear Information System (INIS)

    Seidman, S.

    1986-01-01

    This paper discusses the Smart Card a plastic credit card sized package with an embedded computer chip which encompasses a level of technical sophistication which makes it virtually impossible to counterfeit. The question of legitimacy of the person using the Card for physical, computer, or network access can be answered by storing a biometric template of the authorized user in the Smart Card's unalterable memory. The bimetric template can be based upon a retina print, a hand print, a finger print, a wrist-vein print, a voice print, or pseudo-biometrics, such as signature dynamics, gait dynamics or keyboard typing patterns. These Cards will function only when they are being used by the authorized individuals to whom they are issued

  18. Change in Identity Diffusion and Psychopathology in a Specialized Inpatient Treatment for Borderline Personality Disorder.

    Science.gov (United States)

    Sollberger, Daniel; Gremaud-Heitz, Daniela; Riemenschneider, Anke; Agarwalla, Puspa; Benecke, Cord; Schwald, Oliver; Küchenhoff, Joachim; Walter, Marc; Dammann, Gerhard

    2015-01-01

    Patients with borderline personality disorder (BPD) show various psychopathological symptoms and suffer especially from disturbance in their identity. The purpose of the study was to investigate changes-particularly in affective BPD symptoms and identity diffusion-during a structured, disorder-specific inpatient treatment (DST) that combined a psychodynamic transference-focused psychotherapy approach with modules of dialectical behavioural skills training. In a prospective, two-group comparison trial, 44 patients with BPD were assessed with questionnaires addressing identity diffusion and state, as well as trait affective psychopathology, before and after 12 weeks of inpatient treatment. Thirty-two patients received DST, whereas 12 patients were given inpatient treatment-as-usual (TAU). The patients were allocated in a non-random procedure for two groups, in order of admission and availability of treatment options in the DST unit. In the pre-post-comparison, the DST group showed a significant decrease in identity diffusion (p borderline symptomatology and in the personality structure feature of identity diffusion. This highlights the significance of a short-term specific inpatient therapy for BPD. A structured, disorder-specific inpatient treatment of patients diagnosed with borderline personality disorder (BPD) combined a psychodynamic transference-focused psychotherapy treatment approach (focusing on pathological features in personality organization, particularly on non-integrated images of self and others) with modules of dialectical behavioural skills training. This treatment is associated with a decrease in identity diffusion of these patients after 12 weeks of treatment. The treatment is also related to a significant decrease in borderline typical psychopathological symptoms such as depressive symptoms, as well as an improvement in state anger. The outcomes of this structured, disorder-specific inpatient treatment of severely ill BPD patients indicated

  19. 31 CFR 546.409 - Credit extended and cards issued by U.S. financial institutions.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Credit extended and cards issued by U... SANCTIONS REGULATIONS Interpretations § 546.409 Credit extended and cards issued by U.S. financial..., charge cards, debit cards, or other credit facilities issued by a U.S. financial institution to a person...

  20. 31 CFR 548.409 - Credit extended and cards issued by U.S. financial institutions.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Credit extended and cards issued by U... SANCTIONS REGULATIONS Interpretations § 548.409 Credit extended and cards issued by U.S. financial..., charge cards, debit cards, or other credit facilities issued by a U.S. financial institution to a person...

  1. 31 CFR 542.409 - Credit extended and cards issued by U.S. financial institutions.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Credit extended and cards issued by U... SANCTIONS REGULATIONS Interpretations § 542.409 Credit extended and cards issued by U.S. financial..., charge cards, debit cards, or other credit facilities issued by a U.S. financial institution to a person...

  2. The Personal and Professional Selves of Teachers: Stable and Unstable Identities

    OpenAIRE

    Day, C.; Kington, Alison; Stobart, G.; Sammons, P.

    2006-01-01

    In much educational literature it is recognised that the broader social conditions in which teachers live and work, and the personal and professional elements of teachers' lives, experiences, beliefs and practices are integral to one another, and that there are often tensions between these which impact to a greater or lesser extent upon teachers' sense of self or identity. If identity is a key influencing factor on teachers' sense of purpose, self‐efficacy, motivation, commitment, job satisfa...

  3. 'Person' seeks 'Man'. A very quick immersion in, and evaluation of, the philosophical debate on personal identity since Locke

    OpenAIRE

    De Vleeschouwer, Gregory

    2009-01-01

    Traditionally, the question of how a person can be a unity throughout his life was answered by referring to the objective realm: the cartesian soul guaranteed our personal unity. But for Locke, the soul was considered irrelevant to the real question of personal identity, which was: how can I know that I am the same person throughout my life? For Locke that question was not answerable from an objective point of view, but only by a 'person', which for Locke meant as much as 'consciousness' or t...

  4. 31 CFR 541.408 - Credit extended and cards issued by U.S. financial institutions.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Credit extended and cards issued by U... ZIMBABWE SANCTIONS REGULATIONS Interpretations § 541.408 Credit extended and cards issued by U.S. financial..., charge cards, debit cards, or other credit facilities issued by a U.S. financial institution to a person...

  5. 31 CFR 543.409 - Credit extended and cards issued by U.S. financial institutions.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Credit extended and cards issued by U...'IVOIRE SANCTIONS REGULATIONS Interpretations § 543.409 Credit extended and cards issued by U.S. financial..., charge cards, debit cards, or other credit facilities issued by a U.S. financial institution to a person...

  6. Personal and cultural identity development in recently immigrated Hispanic adolescents: Links with psychosocial functioning.

    Science.gov (United States)

    Meca, Alan; Sabet, Raha F; Farrelly, Colleen M; Benitez, Cynthia G; Schwartz, Seth J; Gonzales-Backen, Melinda; Lorenzo-Blanco, Elma I; Unger, Jennifer B; Zamboanga, Byron L; Baezconde-Garbanati, Lourdes; Picariello, Simona; Des Rosiers, Sabrina E; Soto, Daniel W; Pattarroyo, Monica; Villamar, Juan A; Lizzi, Karina M

    2017-07-01

    This study examined directionality between personal (i.e., coherence and confusion) and cultural identity (i.e., ethnic and U.S.) as well as their additive effects on psychosocial functioning in a sample of recently immigrated Hispanic adolescents. The sample consisted of 302 recent (identity coherence and both ethnic and U.S. identity. Ethnic and U.S. affirmation/commitment (A/C) positively and indirectly predicted optimism and negatively predicted rule breaking and aggression through coherence. However, confusion predicted lower self-esteem and optimism and higher depressive symptoms, rule breaking, unprotected sex, and cigarette use. Results further indicated significant site differences. In Los Angeles (but not Miami), ethnic A/C also negatively predicted confusion. Given the direct effects of coherence and confusion on nearly every outcome, it may be beneficial for interventions to target personal identity. However, in contexts such as Los Angeles, which has at least some ambivalence toward recently immigrated Hispanic adolescents, it may be more beneficial for interventions to also target cultural identity to reduce confusion and thus promote positive development. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  7. Big Five Personality Traits as the Predictors of Creative Self-Efficacy and Creative Personal Identity: Does Gender Matter?

    Science.gov (United States)

    Karwowski, Maciej; Lebuda, Izabela; Wisniewska, Ewa; Gralewski, Jacek

    2013-01-01

    The aim of this study was to examine the relation of the Big Five personality factors to two self-concept variables of growing importance in creativity literature: creative self-efficacy (CSE) and creative personal identity (CPI). The analysis, conducted on a large (N = 2674, 49.6% women) and varied-in-age (15-59 years old) nationwide sample of…

  8. Personality traits, interpersonal identity, and relationship stability : Longitudinal linkages in late adolescence and young adulthood

    NARCIS (Netherlands)

    Klimstra, T.A.; Luyckx, K.; Branje, S.T.J.; Teppers, E.; Goossens, L.; Meeus, W.H.J.

    2013-01-01

    Adolescence and young adulthood are characterized by important changes in personality, changes toward a more stable identity, and the establishment of intimate relationships. We examined the role of personality traits in establishing intimate relationships, the interplay between personality traits

  9. The Use of Personal Identity Numbers in Sweden and Denmark

    DEFF Research Database (Denmark)

    Hyltén-Cavallius, Katarina

    2015-01-01

    The paper of Katarina Hyltén-Cavallius focuses on personal identity numbers in Sweden and Denmark. This paper looks into formal and informal structures, which organise society in a host member state and which can make it difficult for a non-national Union citizen to, in practice, access public an...

  10. Personal identity processes and self-esteem : Temporal sequences in high school and college students

    NARCIS (Netherlands)

    Luyckx, K.; Klimstra, T.A.; Duriez, B.; Van Petegem, S.; Beyers, W.; Teppers, E.; Goossens, L.

    2013-01-01

    Personal identity formation constitutes a crucial developmental task during the teens and 20s. Using a recently developed five-dimensional identity model, this cross-sectional study (N = 5834) investigated age trends from ages 14 to 30 for different commitment and exploration processes. As expected,

  11. Consumer response to a report card comparing healthcare systems.

    Science.gov (United States)

    Braun, Barbara L; Kind, Elizabeth A; Fowles, Jinnet B; Suarez, Walter G

    2002-06-01

    Report cards to date have focused on quality of care in health plans rather than within healthcare delivery systems. The purpose of this study was to evaluate consumer response to the first healthcare system-level report card. Qualitative assessment of consumer response. We conducted 5 focus groups of community members to evaluate consumer response to the report card; 2 included community club members, 3 included community-dwelling retired persons. Discussions were audiotaped and transcribed; comments were categorized by topic area from the script, and common themes identified. Focus group participants, in general, were unaware of the current emphasis on medical quality improvement initiatives. However, they believed that the opinion that the descriptive clinic information and patient survey data contained in the report card would be most useful mainly for choosing a healthcare system if they were dissatisfied with current medical care, if their healthcare options changed, or if they were in poor health. Personal experience was considered a more trustworthy measure of healthcare quality than were patient survey results. Trustworthiness was perceived to be higher if the report card sponsor was not affiliated with the healthcare systems being evaluated. Participants also believed care system administrators should use the data to enact positive clinic-level and physician-level changes. Healthcare consumers appreciated the attention to patient experiences and supported healthcare quality improvement initiatives. Report cards were considered important for choosing a healthcare system in certain circumstances and for guiding quality improvement efforts at all levels.

  12. High-throughput sequencing of forensic genetic samples using punches of FTA cards with buccal swabs

    DEFF Research Database (Denmark)

    Kampmann, Marie-Louise; Buchard, Anders; Børsting, Claus

    2016-01-01

    Here, we demonstrate that punches from buccal swab samples preserved on FTA cards can be used for high-throughput DNA sequencing, also known as massively parallel sequencing (MPS). We typed 44 reference samples with the HID-Ion AmpliSeq Identity Panel using washed 1.2 mm punches from FTA cards...

  13. Attitudes of Consumers Towards Islamic and Conventional Credit Cards in Indonesia

    Directory of Open Access Journals (Sweden)

    Sylva Alif Rusmita

    2017-07-01

    Full Text Available This study aims to analyze the attitudes of consumers towards Islamic and conventional credit cards. Using online questionnaire survey data from 51 respondents in Surabaya, East Java, the study revealed that most consumers possessed credit cards because of their convenience factor, relationship with their existing bank, and card salesmen. Therefore, the sale is the most powerful way to invite the community to have an Islamic credit card. Many customers do not care whether their credit cards are Islamic based or not, as long as the salesman promoted cards to them and the cards are able to meet their personal needs, especially for sales and purchase transactions online, they will utilize the cards. The large number of Muslims in Surabaya should be a share of the lucrative market for Islamic credit cards. Therefore, the education about the Islamic manner of consumption and the dangers of usury should be promoted in Surabaya.DOI: 10.15408/etk.v16i2.5519

  14. A counting-card circuit based on PCI bus

    International Nuclear Information System (INIS)

    Shi Jing; Li Yong; Chinese Academy of Sciences, Lanzhou; Su Hong; Dong Chengfu; Li Xiaogang; Ma Xiaoli

    2004-01-01

    A counting-card circuit based on PCI bus that we developed recently used for advanced personal computer will be introduced in this paper briefly. The maximum count capacity of this counting-card is 10 9 -1, ranging from 0 to 999 999 999, the maximum counting time range, 1 x 10 6 s, can be set in 1 cycle, the maximum counting rate is 20 MHz for positive input. (authors)

  15. Beliefs About the Causal Structure of the Self-Concept Determine Which Changes Disrupt Personal Identity.

    Science.gov (United States)

    Chen, Stephanie Y; Urminsky, Oleg; Bartels, Daniel M

    2016-10-01

    Personal identity is an important determinant of behavior, yet how people mentally represent their self-concepts and their concepts of other people is not well understood. In the current studies, we examined the age-old question of what makes people who they are. We propose a novel approach to identity that suggests that the answer lies in people's beliefs about how the features of identity (e.g., memories, moral qualities, personality traits) are causally related to each other. We examined the impact of the causal centrality of a feature, a key determinant of the extent to which a feature defines a concept, on judgments of identity continuity. We found support for this approach in three experiments using both measured and manipulated causal centrality. For judgments both of one's self and of others, we found that some features are perceived to be more causally central than others and that changes in such causally central features are believed to be more disruptive to identity.

  16. [Evaluation of a registration card for logging electrocardiographic records into standard personal computers].

    Science.gov (United States)

    Pizzuti, A; Baralis, G; Bassignana, A; Antonielli, E; Di Leo, M

    1997-01-01

    The MS200 Cardioscope, from MRT Micro as., Norway, is a 12 channel ECG card to be directly inserted into a standard personal computer (PC). The standard ISA Bus compatible half length card comes with a set of 10 cables with electrodes and the software for recording, displaying and saving ECG signals. The system is supplied with DOS or Windows software. The goal of the present work was to evaluate the affordability and usability of the MS200 in a clinical setting. We tested the 1.5 DOS version of the software. In 30 patients with various cardiac diseases the ECG signal has been recorded with MS200 and with standard Hellige CardioSmart equipment. The saved ECGs were recalled and printed using an Epson Stylus 800 ink-jet printer. Two cardiologists reviewed the recordings for a looking at output quality, amplitude and speed precision, artifacts, etc. 1) Installation: the card has proven to be totally compatible with the hardware; no changes in default settings had to be made. 2) Usage: the screens are clear; the commands and menus are intuitive and easy to use. Due to the boot-strap and software loading procedures and, most important, off-line printing, the time needed to obtain a complete ECG printout has been longer than that of the reference machine. 3) Archiving and retrieval of ECG: the ECG curves can be saved in original or compressed form: selecting the latter, the noise and non-ECG information is filtered away and the space consumption on disk is reduced: on average, 20 Kb are needed for 10 seconds of signal. The MS200 can be run on a Local Area Network and is prepared for integrating with an existing informative system: we are currently testing the system in this scenery. 4) MS200 includes options for on-line diagnosis, a technology we have not tested in the present work. 5) The only setting allowed for printing full pages is letter size (A4): the quality of printouts is good, with a resolution of 180 DPI. In conclusion, the MS200 system seems reliable and

  17. Owning Up to Negative Ingroup Traits: How Personal Autonomy Promotes the Integration of Group Identity.

    Science.gov (United States)

    Legault, Lisa; Weinstein, Netta; Mitchell, Jahlil; Inzlicht, Michael; Pyke, Kristen; Upal, Afzal

    2017-10-01

    Our experiences, attributes, and behaviors are diverse, inconsistent, and often negative. Consequently, our capacity to assimilate divergent experiences-particularly negative aspects-is important to the development of a unified self. Whereas this process of integration has received attention at the level of personal identity, it has not been assessed at the level of group identity. We examined the mechanisms involved in integrating positive and negative ingroup identities, as well as related outcomes. In three experiments, participants (N = 332) high and low in autonomy identified either positive or negative aspects of their ingroup and then indicated the extent to which they integrated the attribute. Those high in personal autonomy integrated both positive and negative identities, whereas those low in autonomy acknowledged only positive identities. Study 2 showed that, regardless of identity valence, those high in autonomy felt satisfied and close with their group. Conversely, those low in autonomy felt less close and more dissatisfied with their group after reflecting on negative identities. Finally, reflecting on a negative identity reduced prejudice, but only for those high in autonomy. Owning up to negative group traits is facilitated by autonomy and demonstrates benefits for ingroup and intergroup processes. © 2016 Wiley Periodicals, Inc.

  18. Politicization during the 2012 U.S. Presidential Elections: bridging the personal and the political through an identity content approach.

    Science.gov (United States)

    Turner-Zwinkels, Felicity; van Zomeren, Martijn; Postmes, Tom

    2015-03-01

    We investigated U.S. citizens' politicization (i.e., switching from not self-defining to self-defining as an active political party supporter) during the 2012 U.S. Presidential Elections. We used a novel identity content approach to explore qualitative changes in overlap between personal and politicized identity traits. We collected longitudinal data from a community sample of U.S. citizens (N = 760), tracking whether and how personal and politicized identity content developed: two months before (T1), immediately before (T2), and 2 months after (T3) the election. We explored a subsample of participants who met inclusion criteria (n = 115), comparing 87 participants who did not politicize with 28 participants who self-labeled as unpoliticized at T1, but politicized at T2/T3. Results confirmed hypotheses: Only politicizers showed greater integration between their personal and politicized identity content over time; moreover, identity content was a significant positive predictor of politicization and action engagement. We discuss the value of identity content for politicization research. © 2015 by the Society for Personality and Social Psychology, Inc.

  19. Towards an open sound card

    DEFF Research Database (Denmark)

    Dimitrov, Smilen; Serafin, Stefania

    2011-01-01

    The architecture of a sound card can, in simple terms, be described as an electronic board containing a digital bus interface hardware, and analog-to-digital (A/D) and digital-to-analog (D/A) converters; then, a soundcard driver software on a personal computer's (PC) operating system (OS) can con...

  20. Self and identity in borderline personality disorder: Agency and mental time travel.

    Science.gov (United States)

    Gold, Natalie; Kyratsous, Michalis

    2017-10-01

    We consider how conceptions of the self and identity from the philosophical literature can help us to understand identity disturbance in borderline personality disorder (BPD). We present 3 philosophical approaches: connectedness, narrative, and agency. We show how these map on to 3 different ways in which the self can be temporally extended. The connectedness approach is dominant in philosophy, and the narrative approach has been used by psychiatry, but we argue that the lesser-known agency approach provides a promising way to theorize some aspects of identity disturbance in BPD. It relates the 2 diagnostic criteria of identity disturbance and disinhibition and is consistent with evidence of memory deficits and altered self-processing in BPD patients. © 2017 The Authors. Journal of Evaluation in Clinical Practice Published by John Wiley & Sons Ltd.

  1. Multi parametric card to personal computers interface based in ispLSI1016 circuits

    International Nuclear Information System (INIS)

    Osorio Deliz, J.F.; Toledo Acosta, R.B.; Arista Romeu, E.

    1997-01-01

    It is described the design and principal characteristic of the interface circuit for a 16 bit multi parametric add on card for IBM or compatible microcomputer which content two communication channels of direct memory access and bidirectional between the card and the computer, an interrupt controller, a programmable address register, a default add res register of the card, a four channels multiplexer, as well as the decoder logic of the 80C186 and computer. The circuit was designed with two programmable logic devices ispL1016, which allowed drastically to diminish the quantity of utilized components and get a more flexible design in less time better characteristics

  2. Taking aim at medical identity theft. Document security key element to comply with government regulations.

    Science.gov (United States)

    Raymond, Colette

    2010-01-01

    Sensitive paper documents, such as patient records, customer data, and legal information, must be securely stored and destroyed when no longer needed. This is not only a good business practice that reduces costs and protects reputations, but also a legal and regulatory imperative. According to some experts, medical identity theft is the fastest-growing form of identity theft in North America. The Federal Trade Commission's Red Flags Rule, due to take effect June 1, 2010, requires banks; credit card companies; and, in some situations, retailers, hospitals, insurance companies, health clinics, and other organizations to store confidential personal information that can expose consumers to significant identity theft risks. This also includes healthcare providers and other organizations that are considered creditors according to their billing/payment procedures. This article highlights the steps healthcare providers must take to ensure data security.

  3. An investigation into credit card information disclosure through point of sale purchases

    CSIR Research Space (South Africa)

    Von Solms, S

    2015-08-01

    Full Text Available The use of debit and credit cards has become indispensable to consumers worldwide. This cashless method of payment offers flexibility and convenience. It eliminates the safety risk of carrying large cash amounts in person and cards can be cancelled...

  4. Personal Identity in Japan

    Science.gov (United States)

    Sugimura, Kazumi; Mizokami, Shinichi

    2012-01-01

    This chapter explores characteristics of identity formation among Japanese adolescents and young adults living in a cultural context where individualism has been increasingly emphasized even while maintaining collectivism. We argue that, to develop a sense of identity in Japanese culture, adolescents and young adults carefully consider others'…

  5. Patient health record on a smart card.

    Science.gov (United States)

    Naszlady, A; Naszlady, J

    1998-02-01

    A validated health questionnaire has been used for the documentation of a patient's history (826 items) and of the findings from physical examination (591 items) in our clinical ward for 25 years. This computerized patient record has been completed in EUCLIDES code (CEN TC/251) for laboratory tests and an ATC and EAN code listing for the names of the drugs permanently required by the patient. In addition, emergency data were also included on an EEPROM chipcard with a 24 kb capacity. The program is written in FOX-PRO language. A group of 5000 chronically ill in-patients received these cards which contain their health data. For security reasons the contents of the smart card is only accessible by a doctor's PIN coded key card. The personalization of each card was carried out in our health center and the depersonalized alphanumeric data were collected for further statistical evaluation. This information served as a basis for a real need assessment of health care and for the calculation of its cost. Code-combined with an optical card, a completely paperless electronic patient record system has been developed containing all three information carriers in medicine: Texts, Curves and Pictures.

  6. The effect of dialectical behavior therapy skills use on borderline personality disorder features.

    Science.gov (United States)

    Stepp, Stephanie D; Epler, Amee J; Jahng, Seungmin; Trull, Timothy J

    2008-12-01

    We assessed the effect of DBT skills utilization on features of borderline personality disorder as measured by the Personality Assessment Inventory-Borderline Features Scale (PAI-BOR). Participants were outpatients (N = 27) enrolled in a dialectical behavior therapy (DBT) program in a university-affiliated community mental health clinic. Diary cards were collected each week to track self-reported skills use. At the beginning of each new skills training module, patients completed another PAI-BOR. Univariate and multilevel analyses indicated significant improvement on the total PAI-BOR score and on several PAI-BOR subscale scores. Results also revealed that overall DBT skills use increased significantly over time, as did individual skills related to mindfulness, interpersonal effectiveness, emotion regulation, and distress tolerance. Multilevel modeling results indicated that overall skills use showed a significant effect on PAI-BOR total scores, Affective Instability scores, Identity Problems scores, and Negative Relationships scores, even after controlling for initial levels of distress and diary card compliance.

  7. An approach to discussing personal and social identity terminology with patients.

    Science.gov (United States)

    Sloboda, Alexander; Mustafa, Aesha; Schober, Justine

    2018-03-01

    As the United States of America becomes more socially diverse, it is more important now than ever for health care providers to become more aware of their patients' social identities. It is imperative that providers engage with their patients and see how each of them identifies personally in relation to social construction terminology. As with the terminology of human anatomy, there is a vast and diverse vocabulary concerning the anatomy of society, which is also clinically relevant to health care providers. If health care providers take the initiative to discuss how their patients identify, they can understand better how those patients experience the world, and this can significantly affect many facets of their health and health care experience. Giving respect fosters the creation of a strong relationship within which patients can share very personal and intimate information, which in turn allows health care providers the possibility of providing the best healthcare. This discussion will build upon and integrate current academic research and opinion for tangible clinical use while discussing various social and personal identities, including but not limited to race, gender, gender expression, sex, sexual orientation, religion, ethnicity, socioeconomic class, and physical and mental abilities. Clin. Anat. 31:136-139, 2018. © 2017 Wiley Periodicals, Inc. © 2017 Wiley Periodicals, Inc.

  8. Rorschach Assessment of Two Distinctive Personality States of a Person With Dissociative Identity Disorder.

    Science.gov (United States)

    Hartmann, Ellen; Benum, Kirsten

    2017-12-13

    This case study used test data from a patient with Dissociative Identity Disorder (DID; American Psychiatric Association, 2013 ) to illustrate how two main personality states of the patient ("Ann" and "Ben") seemed to function. The Rorschach Performance Assessment System (R-PAS; Meyer, Viglione, Mihura, Erard, & Erdberg, 2011 ) and the Inventory of Interpersonal Problems-Circumplex (IIP-64; Horowitz, Alden, Wiggins, & Pincus, 2000 ), administered to Ann and Ben in separate settings, exposed two diverse R-PAS and IIP-64 profiles. Ann's R-PAS profile suggested an intellectualized style of information processing with few indications of psychological problems. Ben's profile indicated severe perceptual, cognitive, and interpersonal difficulties combined with suspicion and anxiety. Ann's IIP-64 profile suggested minor interpersonal problems, whereas Ben's indicated serious relational difficulties. The findings were discussed in relation to the theory of trauma-related structural dissociation of the personality (van der Hart, Nijenhuis, & Steele, 2006 ), which implies an enduring split in the organization of the personality with more or less separate entities with their own sense of self, perception of the world, and ways of organizing emotional, cognitive, and social functions. The DID personality structure is seen as a defense strategy and as a pathway in the personality development producing serious psychological pain and symptoms.

  9. Awareness of identity alteration and diagnostic preference between borderline personality disorder and dissociative disorders.

    Science.gov (United States)

    Sar, Vedat; Alioğlu, Firdevs; Akyuz, Gamze; Tayakısı, Emre; Öğülmüş, Ezgi F; Sönmez, Doğuş

    2017-01-01

    This study inquires into identity alteration among college students and its relationship to borderline personality disorder (BPD) and/or dissociative disorders (DDs). Steinberg Identity Alteration Questionnaire (SIAQ), Childhood Trauma Questionnaire (CTQ), and self-report screening tool of the BPD section of the Structured Clinical Interview for DSM-IV (SCID-BPD) were administered to 1301 college students. Participants who fit the diagnostic criteria of BPD (n = 80) according to the clinician-administered SCID-BPD and 111 non-BPD controls were evaluated using the Structured Clinical Interview for DSM-IV DDs (SCID-D) by two psychiatrists blind to the group membership and scale scores. Test-retest evaluations and internal consistency analyses suggested that SIAQ was a reliable instrument. Of the participants, 11.3% reported a SIAQ score 25 or above alongside some impairment. SIAQ scores differentiated participants who fit the diagnostic criteria for a DD from those who did not. While self-report identity alteration was correlated with all childhood trauma types, clinician-assessed identity alteration was correlated with childhood sexual abuse only. Those who fit criteria for both disorders had the highest identity alteration scores in self-report and clinician-assessment. Although both syndromes had significant effect on self-report identity alteration total scores, in contrast to DD, BPD did not have an effect on the clinician-administered evaluation. An impression of personality disorder rather than a DD may seem more likely when identity alteration remains subtle in clinical assessment, notwithstanding its presence in self-report. Lack of recognition of identity alteration may lead to overdiagnosis of BPD among individuals who have a DD.

  10. Personality Traits and Educational Identity Formation in Late Adolescents: Longitudinal Associations and Academic Progress

    Science.gov (United States)

    Klimstra, Theo A.; Luyckx, Koen; Germeijs, Veerle; Meeus, Wim H. J.; Goossens, Luc

    2012-01-01

    Changes in personality traits in late adolescence and young adulthood are believed to co-occur with changes in identity, but little research is available that supports this hypothesis. The present study addressed this relatively understudied area of research by examining longitudinal associations of Big Five personality traits (i.e., Neuroticism,…

  11. Collecting Social Network Data from Mobile Phone SIM Cards

    Science.gov (United States)

    Peseckas, Ryan

    2016-01-01

    I used a subscriber identity module card reader to copy the lists of saved contacts from 170 mobile phones in Fiji. This approach has both advantages and disadvantages compared to other techniques for collecting telephone network data. Copying phone contacts avoids recall biases associated with survey-based name generators. It also obviates the…

  12. Self and identity in women with symptoms of borderline personality: A qualitative study

    Directory of Open Access Journals (Sweden)

    Gillian Agnew

    2016-03-01

    Full Text Available Identity disturbance has been suggested to be a core feature of borderline personality disorder (BPD. However, there is little known about the identity of individuals with symptoms of BPD from the participant's perspective. This study availed of in-depth lightly structured life story interviews with five female participants. Thematic analysis was utilized to derive three themes of identity: connection, distance between us, and hurt and healing. Results provided support for multiple and flexible conceptualizations of identity in comparison to the idea of a unitary self/identity. Results also suggested that participants were able to establish differing connections to others ranging from disconnection to intimacy and care. Participants reported that their identities were impacted upon by historical and current family/relationship dysfunction, but life stories also illustrated the positive impact of healing relationship experiences. Findings provide support for psychological theories that consider a multiple and relational self/identity and the empowerment of healthy aspects of the self in BPD recovery. Studies that assess the association between insight and change may further our knowledge into this complex population.

  13. A SECURE MESSAGE TRANSMISSION SYSTEM ARCHITECTURE FOR COMPUTER NETWORKS EMPLOYING SMART CARDS

    Directory of Open Access Journals (Sweden)

    Geylani KARDAŞ

    2008-01-01

    Full Text Available In this study, we introduce a mobile system architecture which employs smart cards for secure message transmission in computer networks. The use of smart card provides two security services as authentication and confidentiality in our design. The security of the system is provided by asymmetric encryption. Hence, smart cards are used to store personal account information as well as private key of each user for encryption / decryption operations. This offers further security, authentication and mobility to the system architecture. A real implementation of the proposed architecture which utilizes the JavaCard technology is also discussed in this study.

  14. "Irreplaceable": Exploring Identity and Relationships through the Discussion of Invaluable Personal Objects

    Science.gov (United States)

    Scharp, Kristina M.; Canfield, Clair

    2017-01-01

    Courses: Interpersonal Communication, Family Communication, Relational Communication. Objectives: Students reflect on and discuss how personal objects are connected to their identity and relationships with others. This activity illustrates the ways course concepts such as relational metaphors, stories, rules, rituals, and other patterns of…

  15. 75 FR 82575 - Federal Acquisition Regulation; Personal Identity Verification of Contractor Personnel

    Science.gov (United States)

    2010-12-30

    ... 9000-AL60 Federal Acquisition Regulation; Personal Identity Verification of Contractor Personnel AGENCY... requirement of collecting from contractors all forms of Government-provided identification once they are no...D Inspector General Audit Report No. D-2009-005, entitled ``Controls Over the Contractor Common...

  16. CORPORATE IDENTITY DAN PERSONALITY BANK SYARIAH DI SURAT KABAR NASIONAL (Tekstual Analisis Konstruksi Meelalui Publikasi Perusahaan

    Directory of Open Access Journals (Sweden)

    Juwono Tri Atmodjo

    2015-05-01

    Full Text Available Corporate identity and personality manner that allows employers to formulate and differentiated from other companies (regular bank. Identity and personality can be realized by the company shows the vision and mission of the company, the company philosophy, corporate culture. The study is to assess the identity and personality were constructed through advetorian and Newspaper coverage related to the identity and personality of Islamic banks. Qualitative analysis with textual analysis strategy for observing any publication of the contents of the message, type, appearance, construction built with various combinations of text and images and the meaning behind it seems. Textual research results show that the identity and personality banks Islamic banks, care for the young entrepreneurs of the campus, BNI sharia requires political support, regulatory support, is an ISO 9001: 2008 as the bank has a good quality management. Construction as a bank with a foundation of Sharia as the implementation of Islamic teachings are constructed differently degan regular bank to provide the product name, the expression of interest, section or division, spirit or values and norms derived from the teachings of Islam. Ordinances of service, petuhas services, ornaments firm up souvenirs derived from the values of Islam. Cultural references conveyed Islamic banks oriented to the culture of Islamic countries that appear on the financial system based on gold. Identitas perusahaan dan personaliti cara yang memungkinkan perusahaan menyusun dan dibedakan dari perusahaan lain (reguler bank. Indentitas dan personaliti perusahaan dapat diwujudkan dengan menunjukkan visi dan misi perusahaan, filosofi perusahaan, budaya perusahaan. Studi ini untuk menilai identitas dan personaliti yang dikonstruksikan melalui advetorian dan liputan Surat Kabar berkaitan dengan identitas dan personaliti bank syariah. Analisis kualitatif dengan strategi analisis tektual untuk mengobservasi berbagai

  17. From EuCARD to EuCARD-2

    CERN Multimedia

    Chaudron, M

    2013-01-01

    The one word that best describes the spirit of the EuCARD ’13 event (see here) that took place from 10 to 14 June at CERN is "collaboration". The event brought together more than 180 accelerator specialists from all over the world to celebrate the conclusion of the EuCARD project and to kick off its successor, EuCARD-2.   EuCARD-2 brings a global view to particle accelerator research in order to address challenges for future generations of accelerators. The project officially began on 1 May 2013 and will run for four years. With a total budget of €23.4 million, including an €8 million EU contribution, it will build upon the success of EuCARD and push it into an even more innovative regime. EuCARD-2 aims to significantly enhance multidisciplinary R&D for European accelerators and will actively contribute to the development of a European Research Area in accelerator science. This will be accomplished by promoting complementary expertise, cross-d...

  18. Médicarte software developed for the Quebec microprocessor health card project.

    Science.gov (United States)

    Lavoie, G; Tremblay, L; Durant, P; Papillon, M J; Bérubé, J; Fortin, J P

    1995-01-01

    The Quebec Patient Smart Card Project is a Provincial Government initiative under the responsibility of the Rgie de l'assurance-maladie du Québec (Quebec Health Insurance Board). Development, implementation, and assessment duties were assigned to a team from Université Laval, which in turn joined a group from the Direction de la santé publique du Bas-St-Laurent in Rimouski, where the experiment is taking place. The pilot project seeks to evaluate the use and acceptance of a microprocessor card as a way to improve the exchange of clinical information between card users and various health professionals. The card can be best described as a résumé containing information pertinent to an individual's health history. It is not a complete medical file; rather, it is a summary to be used as a starting point for a discussion between health professionals and patients. The target population is composed of persons 60 years and over, pregnant women, infants under 18 months, and the residents of a small town located in the target area, St-Fabien, regardless of age. The health professionals involved are general practitioners, specialists, pharmacists, nurses, and ambulance personnel. Participation in the project is on a voluntary basis. Each health care provider participating in the project has a personal identification number (PIN) and must use both an access card and a user card to access information. This prevents unauthorized access to a patient's card and allows the staff to sign and date information entered onto the patient card. To test the microprocessor card, we developed software based on a problem-oriented approach integrating diagnosis, investigations, treatments, and referrals. This software is not an expert system that constrains the clinician to a particular decisional algorithm. Instead, the software supports the physician in decision making. The software was developed with a graphical interface (Windows 3.1) to maximize its user friendliness. A version of the

  19. Personal identity processes from adolescence through the late 20s : Age trends, functionality, and depressive symptoms

    NARCIS (Netherlands)

    Luyckx, K.; Klimstra, T.A.; Duriez, B.; van Petegem, S.; Beyers, W.

    2013-01-01

    Personal identity formation constitutes a crucial developmental task during the teens and 20s. Using a recently developed five-dimensional identity model, this cross-sectional study (N = 5834) investigated age trends from ages 14 to 30 for different commitment and exploration processes. As expected,

  20. 26 CFR 301.6311-2 - Payment by credit card and debit card.

    Science.gov (United States)

    2010-04-01

    ... 26 Internal Revenue 18 2010-04-01 2010-04-01 false Payment by credit card and debit card. 301.6311....6311-2 Payment by credit card and debit card. (a) Authority to receive—(1) Payments by credit card and debit card. Internal revenue taxes may be paid by credit card or debit card as authorized by this...

  1. Using Efficient TRNGs for PSEUDO Profile in National eID Card

    OpenAIRE

    Blerim Rexha; Dren Imeraj; Isak Shabani

    2018-01-01

    Applications that requires true random number generator (TRNG), which uses raw analog data generated from any noise source in nature, must convert the source normal distribution to uniform distribution. Many up to date implementations convert the raw analog data into digital data by employing a comparator or a Schmitt trigger. This method wastes a large amount of random input data, lowering the throughput of the TRNG. In new national electronic identity card (eID) beyond the true identity of ...

  2. Superstrumps: the Card Game with a Mission

    Directory of Open Access Journals (Sweden)

    Syd Moore

    2016-02-01

    Full Text Available The artist interview in this dossier is an example of collaborative work between an artist and a writer. It is a showcase of how popular culture can be re-appropriated. The interviewees are the co-creators of the card game Superstrumps developed to address the issue of stereotyping of women. In the interview, they recount the process of creating the game involving other women from their local community. This exemplifies how a strategy for resisting and reclaiming identities undermined by negative labelling is developed. Their views are strongly shaped by their feminist principles. The interview acknowledges the complex nature of identities, the challenge of media representation and the symbiotic relationship between media and audiences is revealed.

  3. Payment Cards

    Directory of Open Access Journals (Sweden)

    Kantnerová Liběna

    2016-09-01

    Full Text Available The aim of this paper is to analyze the use of payment cards in retail in the Czech Republic from the side of clients (buyers and the side of sellers. Questionnaires for clients examine satisfaction with cards and the service connected with them. Sellers’ satisfaction with the profit and function of cards is analyzed. The data indicated that 92% of the 352 respondents in South Bohemia had a payment card and more than 35% had more than one card. In retail, 70% of sellers had a payment terminal.

  4. CARDS MARKET – A RESISTANT MARKET TO CRISIS

    Directory of Open Access Journals (Sweden)

    Tudose Geanina - Gabriela

    2012-07-01

    Full Text Available At the same time with the development of market and consumer behavior of Romanians, the growth rate of cards market accelerated. Of course, infrastructure and acceptance network were very important, they are the factors that allowed the widespread use of cards. Currently, any natural person or legal entity is engaged in commercial relationships involving financial transactions, the electronic payments having an important role, representing virtually future transactions, both nationally and across borders. The financial institutions have made a more rapid segmentation of the portfolio of cards and began to focus increasingly on services and benefits situated behind the payment instruments. Meanwhile, cardholders were becoming more educated and sophisticated, knowing what to ask of cards. More, many financial institutions have adapted so that network to accept chip cards. On the Romanian market, the chip cards will increase which are much more effective in terms of security transactions, as well as for co-branded cards, that offers the possibility of the loyalty of the customers. They will try to get as many benefits from different types of cards, but at the same time, they will focus on niche products, business cards, cards for shopping or for payment of public services. The scientific paper aims to capture aspects that emphasize the fact that the permanent market monitoring and the continuous adaptation of it will become necessary for the next period. The current client is more demanding, more educated and less tolerant in the relation to the suppliers of any kind and especially with those of financial services. The tendency to use co-branded cards for everyday payments will increase as merchants and issuing banks will attach more and more benefits on these cards, which will ultimately increase trading volumes on the card to merchants. The bank clients benefited of the cutting - edge technologies, of dual cards functionality - debit and credit.

  5. Biometrics, e-identity, and the balance between security and privacy: case study of the passenger name record (PNR) system.

    Science.gov (United States)

    Nouskalis, G

    2011-03-01

    The implementation of biometrics entails either the establishment of an identity or tracing a person's identity. Biometric passport data (e.g., irises, fingers, faces) can be used in order to verify a passenger's identity. The proposed Passenger Name Record (PNR) system contains all the information necessary to enable reservations to be processed and controlled by the booking and participating air carriers for each journey booked by or on behalf of any person. PNR data are related to travel movements, usually flights, and include passport data, name, address, telephone numbers, travel agent, credit card number, history of changes in the flight schedule, seat preferences, and other information. In the aftermath of the September 11 attacks, a new emergency political-law status of society was established: the continuous state of "war" against the so-called unlawful combatants of the "enemy". Officially, the enemy is the terrorists, but the victims of the privacy invasions caused by the above new form of data processing are the civilians. The data processing based on biometrics is covered both by Directive 95/46 EC and Article 8 of the Convention on the Protection of Human Rights and Fundamental Freedoms (now the European Convention on Human Rights, "ECHR"). According to Article 2, Paragraph a of the above Directive, personal data shall mean any information relating to an identified or identifiable natural person; an identifiable person is one who can be identified, directly or indirectly, in particular by reference to an identification number or to one or more factors specific to his/her physical, physiological, mental, economic, cultural, or social identity.

  6. Relationships between Personal and Collective Place Identity and Well-Being in Mountain Communities

    OpenAIRE

    Knez, Igor; Eliasson, Ingegärd

    2017-01-01

    The aim was to investigate the relationships between landscape-related personal and collective identity and well-being of residents living in a Swedish mountain county (N = 850). It was shown that their most valued mountain activities were viewing and experiencing nature and landscape, outdoor recreation, rest and leisure, and socializing with friends/family. Qualitative analyses showed that the most valued aspects of the sites were landscape and outdoor restoration for personal favorite site...

  7. Playing the Smart Card.

    Science.gov (United States)

    Zuzack, Christine A.

    1997-01-01

    Enhanced magnetic strip cards and "smart cards" offer varied service options to college students. Enhanced magnetic strip cards serve as cash cards and provide access to services. Smart cards, which resemble credit cards but contain a microchip, can be used as phone cards, bus passes, library cards, admission tickets, point-of-sale debit…

  8. Mensuration of equivalent dose with personal dosemeters and instruments of radiological protection in the new operative magnitudes ICRU, for external fields of beta radiation. Part I. Study of the homogeneity of the response personal dosemeters leaves (cards G-1, TLD-100), in radiation fields of Co60

    International Nuclear Information System (INIS)

    Alvarez R, J.T.

    1994-01-01

    A sample of 40 composed personal dosemeters by cards model: G-l, (each card is made up of two TLD-100 crystals encapsulated in teflon), Harshaw trademark; those personal dosemeters present a free window and another with a filter of A1 of 171.7 mg cm -2 of mass thickness.The objective of the work is to select of this sample of 40 personal dosemeters a population with the same stocking and standard deviation. The technique used is that of comparison of stockings, (ANOVA; Variance Analysis, when samples of the same one were had size; and/or GLM, Widespread Lineal Models, when the samples were of different size), by means of the use of those Duncan statistics, SNK, Tukey, Gabriel; the results are validated proving the kindness of adjustment of the experimental data to a Normal distribution by means of the Shapiro-Wilks statistics.The experimental design used consists on a test of two vias: a via is the variable card with two levels, (crystal 1 and 2), the other via is the variable irradiation position with four levels, (LS=left superior, SR= right superior, LI= left Inferior, IR = right inferior). The irradiations carried out in blocks of four personal dosemeters in a gamma radiation beam range of Cobalt 60; carrying out three repetitions of the design. With object of proving the homogeneity of the filter of A1 in those personal dosemeters the experimental design was executed for those cards without personal dosemeters.They were also carried out tests of stockings to the readings of bottom and sensibility of the reader equipment, (Harshaw, model marks 2271), certain that doesn t exist differences for sequence of reading, but if in the stockings of the sensibility, (they were 4 different populations). The responses of the dosemeters were corrected subtracting him the reading correspondence of bottom and by sensibility of the reader equipment before subjecting them to the tests of stockings mentioned. Of the results of the tests of stockings for the cards with and

  9. Credit Card Risk Behavior on College Campuses: Evidence from Brazil

    Directory of Open Access Journals (Sweden)

    Wesley Mendes-da-Silva

    2012-07-01

    Full Text Available College students frequently show they have little skill when it comes to using a credit card in a responsible manner. This article deals with this issue in an emerging market and in a pioneering manner. University students (n = 769 in São Paulo, Brazil’s main financial center, replied to a questionnaire about their credit card use habits. Using Logit models, associations were discovered between personal characteristics and credit card use habits that involve financially risky behavior. The main results were: (a a larger number of credit cards increases the probability of risky behavior; (b students who alleged they knew what interest rates the card administrators were charging were less inclined to engage in risky behavior. The results are of interest to the financial industry, to university managers and to policy makers. This article points to the advisability, indeed necessity, of providing students with information about the use of financial products (notably credit cards bearing in mind the high interest rates which their users are charged. The findings regarding student behavior in the use of credit cards in emerging economies are both significant and relevant. Furthermore, financial literature, while recognizing the importance of the topic, has not significantly examined the phenomenon in emerging economies.

  10. Human identity versus gender identity: The perception of sexual addiction among Iranian women.

    Science.gov (United States)

    Moshtagh, Mozhgan; Mirlashari, Jila; Rafiey, Hassan; Azin, Ali; Farnam, Robert

    2017-07-01

    This qualitative study was conducted to explore the images of personal identity from the perspective of women with sexual addiction. The data required for the study were collected through 31 in-depth interviews. Sensing a threat to personal identity, dissatisfaction with gender identity, dissociation with the continuum of identity, and identity reconstruction in response to threat were four of the experiences that were common among women with sexual addiction. Painful emotional experiences appear to have created a sense of gender and sexual conflict or weakness in these women and thus threatened their personal identity and led to their sexual addiction.

  11. A security and privacy preserving e-prescription system based on smart cards.

    Science.gov (United States)

    Hsu, Chien-Lung; Lu, Chung-Fu

    2012-12-01

    In 2002, Ateniese and Medeiros proposed an e-prescription system, in which the patient can store e-prescription and related information using smart card. Latter, Yang et al. proposed a novel smart-card based e-prescription system based on Ateniese and Medeiros's system in 2004. Yang et al. considered the privacy issues of prescription data and adopted the concept of a group signature to provide patient's privacy protection. To make the e-prescription system more realistic, they further applied a proxy signature to allow a patient to delegate his signing capability to other people. This paper proposed a novel security and privacy preserving e-prescription system model based on smart cards. A new role, chemist, is included in the system model for settling the medicine dispute. We further presented a concrete identity-based (ID-based) group signature scheme and an ID-based proxy signature scheme to realize the proposed model. Main property of an ID-based system is that public key is simple user's identity and can be verified without extra public key certificates. Our ID-based group signature scheme can allow doctors to sign e-prescription anonymously. In a case of a medical dispute, identities of the doctors can be identified. The proposed ID-based proxy signature scheme can improve signing delegation and allows a delegation chain. The proposed e-prescription system based on our proposed two cryptographic schemes is more practical and efficient than Yang et al.'s system in terms of security, communication overheads, computational costs, practical considerations.

  12. 17 CFR 229.1003 - (Item 1003) Identity and background of filing person.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false (Item 1003) Identity and background of filing person. 229.1003 Section 229.1003 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD INSTRUCTIONS FOR FILING FORMS UNDER SECURITIES ACT OF 1933, SECURITIES EXCHANGE ACT OF 1934 AND ENERGY POLICY AND...

  13. FRENCH PROTOCOL CARDS

    CERN Multimedia

    Human Resources Division

    2000-01-01

    Senior officials, holders of FRENCH PROTOCOL cards (blue cards) due to expire on 31.12.2000, are requested to return these cards and those of family members, for extension to: Bureau des cartes, Bât 33.1-009/1-015 Should the three spaces for authentication on the back of the card be full, please enclose two passport photographs for a new card. In the case of children aged 14 and over, an attestation of dependency and a school certificate should be returned with the card.

  14. Clinical information system based on the medical smart card.

    Science.gov (United States)

    Danon, Y L; Saiag, E

    2000-07-01

    Over the last 5 years Israel has implemented a nationwide health insurance plan covering the entire population of the country. We have developed a clinical information system based on electronic-chip health care medical smart cards. Health care cards are used in several European countries and chip smart cards have been successful in many sectors. Our project involves the community use of the MSC, thereby enabling health care professionals to skillfully employ card systems in the health care sector. This system can easily arrange electronic medical charts in clinics, facilitating the confidential sharing of personal health databases among health professionals. To develop an MSC applicable for daily use in the community and hospital system. The MSC project, currently underway in Israel and the USA, will aid in determining the costs, benefits and feasibility of the MSC. Successful implementation of the MSC in chosen clinics will promote a nationwide willingness to adopt this promising technology.

  15. FRENCH PROTOCOL CARDS

    CERN Multimedia

    Division du Personnel

    1999-01-01

    Senior officials, holders of FRENCH PROTOCOL cards (blue cards) due to expire on 31.12.1999, are requested to return these cards and those of family members, for extension to:Bureau des cartes, bâtiment 33.1-025Should the 3 spaces for authentication on the back of the card be full, please enclose 2 passport photographs for a new card.In the case of children aged 14 and over, an attestation of dependency and a school certificate should be returned with the card.Personnel DivisionTel. 79494/74683

  16. Longitudinal Relations between Personality Traits and Aspects of Identity Formation during Adolescence

    Science.gov (United States)

    Hill, Patrick L.; Allemand, Mathias; Grob, Sabine Zehnder; Peng, Aristide; Morgenthaler, Christoph; Kappler, Christoph

    2013-01-01

    The current study focused on three aspects of identity development relevant to the adolescent years: being an authentic person, perceiving control over and consistency in one's environment, and having consistent expectations from close others. In a two-wave study of adolescents (n = 750), we examined how these aspects change over the course of a…

  17. Influences of gender identity on children's maltreatment of gender-nonconforming peers: a person × target analysis of aggression.

    Science.gov (United States)

    Pauletti, Rachel E; Cooper, Patrick J; Perry, David G

    2014-05-01

    We investigated whether gender identity influences preadolescents' tendency to single out gender-atypical peers for abuse. Data were gathered from 195 boys and girls (M age = 10.1 years) in the fall and spring of a school year. Children self-reported multiple dimensions of gender identity (intergroup bias, felt pressure for gender differentiation, felt gender typicality, gender contentedness); peers assessed each other's social behavior (gender nonconformity, aggression toward each classmate). Using multilevel modeling, we examined how children's attacks on gender-nonconforming peers (relative to their attacks on other peers) changed over the school year depending on their gender identity. There was modest support for the hypothesis that overconfident, arrogant gender identity promotes abuse of gender-atypical peers but considerable support for the hypothesis that insecure, self-questioning gender identity fosters this tendency. Implications for issues central to contemporary personality theory (e.g., Person × Situation interaction) are discussed. New and somewhat surprising information about the cognitive and behavioral characteristics of gender-nonconforming preadolescents is provided.

  18. Unpacking Personal Identities for Teaching Mathematics within the Context of Prospective Teacher Education

    Science.gov (United States)

    Hodges, Thomas E.; Hodge, Lynn Liao

    2017-01-01

    This article explores the personal identities of two prospective elementary teachers as they progressed from mathematics methods coursework into their capstone student teaching semester. Results indicate that both prospective teachers perceived contrasting obligations of effective mathematics teaching in the teacher education and student teaching…

  19. The Learning Credit Card: A Tool for Managing Personal Development

    Science.gov (United States)

    Rushby, Nick; Twining, John; Twining, Nick; Devitt, Thomas

    2008-01-01

    This is the report of a five month study, undertaken by Sundridge Park Training Technologies in association with Guildford Educational Services to assess the potential of smart card technology to support learning and the management of learning. The study had two strands--the state of the art of the technology and its potential for supporting,…

  20. Smart practice: smart card design considerations in health care.

    Science.gov (United States)

    Lindley, R A; Pacheco, F

    1995-01-01

    Recent innovations in microelectronics and advances in cryptography are driving the appearance of a new generation of smart cards with wider applications; this has important repercussions for our society in the coming years. Essentially, these breakthroughs include built-in microprocessors capable of generating cryptographic transactions (e.g.,Jelectronic blinded signatures, digital pseudonyms, and digital credentials), developments toward a single electronic card offering multi-access to services such as transport, telecommunications, health, financial, and entertainment (Universal Access Services), and incorporation of personal identification technologies such as voice, eye, or skin pattern recognition. For example, by using electronic representatives or cryptographic blinded signatures, a smart card can be used for multi transactions across different organizations and under different generated pseudonyms. These pseudonyms are capable of recognizing an individual unambiguously, while none of her records can be linked [1]. Moreover, tamper-proof electronic observers would make smart cards a very attractive technology for high-security based applications, such as those in the health care field. New trends in smart card technology offer excellent privacy and confidentiality safeguards. Therefore, smart cards constitute a promising technology for the health sector in Australia and other countries around the world in their pursuit of technology to support the delivery of quality care services. This paper addresses the main issues and the key design criteria which may be of strategic importance to the success of future smart card technology in the health care sector.

  1. Mentalizing and interpersonal problems in borderline personality disorder: The mediating role of identity diffusion.

    Science.gov (United States)

    De Meulemeester, Celine; Lowyck, Benedicte; Vermote, Rudi; Verhaest, Yannic; Luyten, Patrick

    2017-12-01

    Individuals with borderline personality disorder (BPD) are characterized by problems in interpersonal functioning and their long-term social integration often remains problematic. Extant theories have linked identity diffusion to many of the interpersonal problems characteristic of BPD patients. Recent theoretical accounts have suggested that identity diffusion results from problems with mentalizing or reflective functioning, that is, the capacity to understand oneself and others in terms of intentional mental states. In this study we tested these assumptions, i.e., whether identity diffusion plays a mediating role in the relationship between mentalizing difficulties and interpersonal problems, in a sample of 167 BPD patients. Highly significant correlations were found between mentalizing impairments, identity diffusion and interpersonal problems. Mediation analyses showed that identity diffusion fully mediated the relationship between mentalizing difficulties and interpersonal problems. This study provides preliminary evidence that impairments in mentalizing are related to identity diffusion, which in turn is related to interpersonal problems in BPD. Further longitudinal research is needed to further substantiate these conclusions. Copyright © 2017 Elsevier B.V. All rights reserved.

  2. A Secure Dynamic Identity and Chaotic Maps Based User Authentication and Key Agreement Scheme for e-Healthcare Systems.

    Science.gov (United States)

    Li, Chun-Ta; Lee, Cheng-Chi; Weng, Chi-Yao; Chen, Song-Jhih

    2016-11-01

    Secure user authentication schemes in many e-Healthcare applications try to prevent unauthorized users from intruding the e-Healthcare systems and a remote user and a medical server can establish session keys for securing the subsequent communications. However, many schemes does not mask the users' identity information while constructing a login session between two or more parties, even though personal privacy of users is a significant topic for e-Healthcare systems. In order to preserve personal privacy of users, dynamic identity based authentication schemes are hiding user's real identity during the process of network communications and only the medical server knows login user's identity. In addition, most of the existing dynamic identity based authentication schemes ignore the inputs verification during login condition and this flaw may subject to inefficiency in the case of incorrect inputs in the login phase. Regarding the use of secure authentication mechanisms for e-Healthcare systems, this paper presents a new dynamic identity and chaotic maps based authentication scheme and a secure data protection approach is employed in every session to prevent illegal intrusions. The proposed scheme can not only quickly detect incorrect inputs during the phases of login and password change but also can invalidate the future use of a lost/stolen smart card. Compared the functionality and efficiency with other authentication schemes recently, the proposed scheme satisfies desirable security attributes and maintains acceptable efficiency in terms of the computational overheads for e-Healthcare systems.

  3. Biometrics, e-Identity, and the Balance between Security and Privacy: Case Study of the Passenger Name Record (PNR System

    Directory of Open Access Journals (Sweden)

    G. Nouskalis

    2011-01-01

    Full Text Available The implementation of biometrics entails either the establishment of an identity or tracing a person's identity. Biometric passport data (e.g., irises, fingers, faces can be used in order to verify a passenger's identity. The proposed Passenger Name Record (PNR system contains all the information necessary to enable reservations to be processed and controlled by the booking and participating air carriers for each journey booked by or on behalf of any person. PNR data are related to travel movements, usually flights, and include passport data, name, address, telephone numbers, travel agent, credit card number, history of changes in the flight schedule, seat preferences, and other information. In the aftermath of the September 11 attacks, a new emergency political-law status of society was established: the continuous state of “war” against the so-called unlawful combatants of the “enemy”. Officially, the enemy is the terrorists, but the victims of the privacy invasions caused by the above new form of data processing are the civilians. The data processing based on biometrics is covered both by Directive 95/46 EC and Article 8 of the Convention on the Protection of Human Rights and Fundamental Freedoms (now the European Convention on Human Rights, “ECHR”. According to Article 2, Paragraph a of the above Directive, personal data shall mean any information relating to an identified or identifiable natural person; an identifiable person is one who can be identified, directly or indirectly, in particular by reference to an identification number or to one or more factors specific to his/her physical, physiological, mental, economic, cultural, or social identity.

  4. Credit Card Security

    OpenAIRE

    G.C., Anup

    2013-01-01

    Author: Anup G.C. Year: 2013 Subject of thesis: Credit Card Security Number of pages: 36+2 Credit Card is a widely used electronic chip for easy transactions. The main purpose of the report was to show the security measures of transaction by credit cards. The purpose was to give information about credit cards and how they were introduced. The thesis reportcontained the types of card theft with examples and sited the various protocols used for online ...

  5. Telling the Tale and Living Well: Adolescent Narrative Identity, Personality Traits, and Well-Being Across Cultures.

    Science.gov (United States)

    Reese, Elaine; Myftari, Ella; McAnally, Helena M; Chen, Yan; Neha, Tia; Wang, Qi; Jack, Fiona; Robertson, Sarah-Jane

    2017-03-01

    This study explored links between narrative identity, personality traits, and well-being for 263 adolescents (age 12-21) from three New Zealand cultures: Māori, Chinese, and European. Turning-point narratives were assessed for autobiographical reasoning (causal coherence), local thematic coherence, emotional expressivity, and topic. Across cultures, older adolescents with higher causal coherence reported better well-being. Younger adolescents with higher causal coherence instead reported poorer well-being. Personal development topics were positively linked to well-being for New Zealand European adolescents only, and thematic coherence was positively linked to well-being for Māori adolescents only. Negative expressivity, neuroticism, conscientiousness, and openness were also linked to well-being. Implications of these cultural similarities and differences are considered for theories of narrative identity, personality, and adolescent well-being. © 2016 The Authors. Child Development © 2016 Society for Research in Child Development, Inc.

  6. An Association Rule Based Method to Integrate Metro-Public Bicycle Smart Card Data for Trip Chain Analysis

    Directory of Open Access Journals (Sweden)

    De Zhao

    2018-01-01

    Full Text Available Smart card data provide valuable insights and massive samples for enhancing the understanding of transfer behavior between metro and public bicycle. However, smart cards for metro and public bicycle are often issued and managed by independent companies and this results in the same commuter having different identity tags in the metro and public bicycle smart card systems. The primary objective of this study is to develop a data fusion methodology for matching metro and public bicycle smart cards for the same commuter using historical smart card data. A novel method with association rules to match the data derived from the two systems is proposed and validation was performed. The results showed that our proposed method successfully matched 573 pairs of smart cards with an accuracy of 100%. We also validated the association rules method through visualization of individual metro and public bicycle trips. Based on the matched cards, interesting findings of metro-bicycle transfer have been derived, including the spatial pattern of the public bicycle as first/last mile solution as well as the duration of a metro trip chain.

  7. Implementation in Russia and the European Union of International Safety Standards of Identity Documents with Biometric Data: Legal Regulation and Perspectives

    Directory of Open Access Journals (Sweden)

    Alexander Grigoryevich Volevodz

    2015-01-01

    Full Text Available The article contains the findings of a research into particular aspects of use of identity documents with personal biometric data. It considers the international safety standards of documents with biometric data worked out by the International Civil Aviation Organization (ICAO, pursuant to which those data should be included into machine-readable documents used by their holders for travel to various states. It contains the information on the implementation of these international standards in Russian and European Union law. The author has substantiated a conclusion to the effect that the procedure established in Russia for production and issuance, as well as for use of international, diplomatic and service passports identifying the Russian Federation citizen outside the Russian Federation territory, containing electronic information carriers with personal and biometric personal data, currently conforms to the international safety standards of documents with biometric data. The article surveys the experience of introducing domestic biometric identity documents - electronic passports in various countries of the world, and the problems arising therefrom. It substantiates the advantages and disadvantages of determining a passport of the Russian Federation citizen issued in the form of an identity card with an electronic information carrier, as the main document of the Russian Federation citizen identifying him domestically within the country's territory.

  8. Print a Bed Bug Card - (Single Cards)

    Science.gov (United States)

    Two sets of business-card-sized lists of tips for recognizing bed bugs and the signs of an infestation, including a photo of bed bugs to assist identification. One card is for general use around home or office, the other for travelers.

  9. Ethnic Identity and Personal Well-Being of People of Color: A Meta-Analysis

    Science.gov (United States)

    Smith, Timothy B.; Silva, Lynda

    2011-01-01

    This article summarizes research examining the relationship between the constructs of ethnic identity and personal well-being among people of color in North America. Data from 184 studies analyzed with random effects models yielded an omnibus effect size of r = 0.17, suggesting a modest relationship between the 2 constructs. The relationship was…

  10. Card Product Use and Perception of Marketing Communication by Card Issuers among Students

    Directory of Open Access Journals (Sweden)

    Đurđana Ozretić Došen

    2011-06-01

    Full Text Available Student population is a very interesting and important segment of the market to the marketing practitioners involved in card business. The services and products offered by card issuers to students are created with a view to attracting the kind of users who will grow accustomed to a long-term, loyal use of a chosen card brand, i.e. beyond the point at which they complete their academic education. This paper describes the exploratory research on card products designed for the student population which was conducted in the Republic of Croatia. Student awareness of card products and their habits associated with card use were also examined. Additional areas of research were student attitudes and perceptions with regard to card products and to the appeal of the marketing communications which target this specific market segment. Results showed that the majority of students hold debit cards of the banks in which they have their current accounts. Students use cards actively, most of all for the purpose of withdrawing cash at automated teller machines (ATMs and least of all for Internet purchases. They assess card use as being simple, and card holders are also aware of the various benefits provided through it. However, the recall of advertisements for card products point to the conclusion that card issuers do not communicate with students in a manner which the latter would find appealing.

  11. Putting the "we" into teamwork: effects of priming personal or social identity on flight attendants' perceptions of teamwork and communication.

    Science.gov (United States)

    Ford, Jane; O'Hare, David; Henderson, Robert

    2013-06-01

    The study was designed to investigate the effectiveness of a manipulation derived from social categorization and social identity theory to promote greater cabin crew willingness to engage in intergroup communication and teamwork in airline operations. Failures of communication and teamwork between airline crew have been implicated in a number of airline crashes. Flight attendants based domestically (n = 254) or overseas (n = 230) received a manipulation designed to prime either their social identity or personal identity and then read a brief outline of an in-flight event before completing a teamwork questionnaire. Flight attendants who received a social identity prime indicated increased willingness to engage in coordinated team action compared with those who received a personal identity prime. Priming social identity can enhance attitudes toward teamwork and communication, potentially leading to increased willingness to engage in intergroup cooperation. Social categorization and social identity theories can be used to inform joint training program development for flight attendants and pilots to create increased willingness for group members to participate in effective communication and teamwork behaviors.

  12. Dynamic Personal Identity and the Dynamic Identity Grid: How Theory and Concept Can Transform Information into Knowledge and Secure the American Homeland

    Science.gov (United States)

    2008-09-01

    80 Figure 12. Dynamic Identity Grid Strategy Canvas ..........................................................81 Figure 13. Hurdles to...GIG Global Information Grid HSPD Homeland Security Presidential Directive IAFIS Integrated Automated Fingerprint Identification System IP...recognizing a person based on a physiological or behavioral characteristic. Biometric features that can be measured include: facial, fingerprint , hand

  13. Turning a Private Label Bank Card into a Multi-function Campus ID Card.

    Science.gov (United States)

    James, Thomas G.; Norwood, Bill R.

    1991-01-01

    This article describes the development at Florida State University of the Seminole ACCESS card, which functions simultaneously as a bank automated teller machine card, a student identification card, and a debit card. Explained are the partnership between the university and the bank charge card center, funding system, technologies involved, and…

  14. Optical Verification Laboratory Demonstration System for High Security Identification Cards

    Science.gov (United States)

    Javidi, Bahram

    1997-01-01

    Document fraud including unauthorized duplication of identification cards and credit cards is a serious problem facing the government, banks, businesses, and consumers. In addition, counterfeit products such as computer chips, and compact discs, are arriving on our shores in great numbers. With the rapid advances in computers, CCD technology, image processing hardware and software, printers, scanners, and copiers, it is becoming increasingly easy to reproduce pictures, logos, symbols, paper currency, or patterns. These problems have stimulated an interest in research, development and publications in security technology. Some ID cards, credit cards and passports currently use holograms as a security measure to thwart copying. The holograms are inspected by the human eye. In theory, the hologram cannot be reproduced by an unauthorized person using commercially-available optical components; in practice, however, technology has advanced to the point where the holographic image can be acquired from a credit card-photographed or captured with by a CCD camera-and a new hologram synthesized using commercially-available optical components or hologram-producing equipment. Therefore, a pattern that can be read by a conventional light source and a CCD camera can be reproduced. An optical security and anti-copying device that provides significant security improvements over existing security technology was demonstrated. The system can be applied for security verification of credit cards, passports, and other IDs so that they cannot easily be reproduced. We have used a new scheme of complex phase/amplitude patterns that cannot be seen and cannot be copied by an intensity-sensitive detector such as a CCD camera. A random phase mask is bonded to a primary identification pattern which could also be phase encoded. The pattern could be a fingerprint, a picture of a face, or a signature. The proposed optical processing device is designed to identify both the random phase mask and the

  15. A microprocessor card software server to support the Quebec health microprocessor card project.

    Science.gov (United States)

    Durant, P; Bérubé, J; Lavoie, G; Gamache, A; Ardouin, P; Papillon, M J; Fortin, J P

    1995-01-01

    The Quebec Health Smart Card Project is advocating the use of a memory card software server[1] (SCAM) to implement a portable medical record (PMR) on a smart card. The PMR is viewed as an object that can be manipulated by SCAM's services. In fact, we can talk about a pseudo-object-oriented approach. This software architecture provides a flexible and evolutive way to manage and optimize the PMR. SCAM is a generic software server; it can manage smart cards as well as optical (laser) cards or other types of memory cards. But, in the specific case of the Quebec Health Card Project, SCAM is used to provide services between physicians' or pharmacists' software and IBM smart card technology. We propose to expose the concepts and techniques used to provide a generic environment to deal with smart cards (and more generally with memory cards), to obtain a dynamic an evolutive PMR, to raise the system global security level and the data integrity, to optimize significantly the management of the PMR, and to provide statistic information about the use of the PMR.

  16. Enhancing Privacy for Biometric Identification Cards

    Directory of Open Access Journals (Sweden)

    2009-01-01

    Full Text Available Most developed countries have started the implementation of biometric electronic identification cards, especially passports. The European Union and the United States of America struggle to introduce and standardize these electronic documents. Due to the personal nature of the biometric elements used for the generation of these cards, privacy issues were raised on both sides of the Atlantic Ocean, leading to civilian protests and concerns. The lack of transparency from the public authorities responsible with the implementation of such identification systems, and the poor technological approaches chosen by these authorities, are the main reasons for the negative popularity of the new identification methods. The following article shows an approach that provides all the benefits of modern technological advances in the fields of biometrics and cryptography, without sacrificing the privacy of those that will be the beneficiaries of the new system

  17. Effect of Personal Financial Knowledge on College Students' Credit Card Behavior

    Science.gov (United States)

    Robb, Cliff A.; Sharpe, Deanna L.

    2009-01-01

    Analysis of survey data collected from 6,520 students at a large Midwestern University affirmed that financial knowledge is a significant factor in the credit card decisions of college students but not entirely in expected ways. Results of a double hurdle analysis indicated that students with relatively higher levels of financial knowledge were…

  18. The impacts of smart cards on hospital information systems--an investigation of the first phase of the national health insurance smart card project in Taiwan.

    Science.gov (United States)

    Liu, Chien-Tsai; Yang, Pei-Tun; Yeh, Yu-Ting; Wang, Bin-Long

    2006-02-01

    To investigate the impacts of the first phase of Taiwan's Bureau of National Health Insurance (TBNHI) smart card project on existing hospital information systems. TBNHI has launched a nationwide project for replacement of its paper-based health insurance cards by smart cards (or NHI-IC cards) since November 1999. The NHI-IC cards have been used since 1 July 2003, and they have fully replaced the paper-based cards since 1 January 2004. Hospitals must support the cards in order to provide medical services for insured patients. We made a comprehensive study of the current phase of the NHI-IC card system, and conducted a questionnaire survey (from 1 October to 30 November, 2003) to investigate the impacts of NHI-IC cards on the existing hospital information systems. A questionnaire was distributed by mail to 479 hospitals, including 23 medical centers, 71 regional hospitals, and 355 district hospitals. The returned questionnaires were also collected by prepaid mail. The questionnaire return rates of the medical centers, regional hospitals and district hospitals were 39.1, 29.6 and 20.9%, respectively. In phase 1 of the project, the average number of card readers purchased per medical center, regional hospital, and district hospital were 202, 45 and 10, respectively. The average person-days for the enhancement of existing information systems of a medical center, regional hospital and district hospital were 175, 74 and 58, respectively. Three months after using the NHI-IC cards most hospitals (60.6%) experienced prolonged service time for their patients due to more interruptions caused mainly by: (1) impairment of the NHI-IC cards (31.2%), (2) failure in authentication of the SAMs (17.0%), (3) malfunction in card readers (15.3%) and (4) problems with interfaces between the card readers and hospital information systems (15.8%). The overall hospital satisfaction on the 5-point Likert scale was 2.86. Although most hospitals were OK with the project, there was about 22

  19. Identity and Conflict: Personality, Sociality and Culturality

    Directory of Open Access Journals (Sweden)

    Rik Pinxten

    1997-05-01

    Full Text Available We presented a model which describes the field of questions on identity as a field of dynamics. It is structured by means of particular, temporal configurations of identity through time and space. The theory of dynamic systems provides us with precise models for the representation of forms of identity, or of their evolution towards types of so-called chaos, given certain conditions. The model allows us to work in a comparative perspective, which is a sure advantage in conflict analysis. The complexity of identity phenomena is captured covering individual, group and community dynamics of identity.

  20. Mindfulness and personal identity in the Western cultural context: A plea for greater cosmopolitanism.

    Science.gov (United States)

    Panaïoti, Antoine

    2015-08-01

    In the psychological sciences, mindfulness practices are increasingly being used, studied, and theorized, but their indigenous theoretical foundations in Buddhist accounts of the dynamics and psychology of personal identity tend to be overlooked. This situation is mirrored in the discipline of philosophy: here, Buddhist views on personal identity are beginning to draw attention, but almost invariably in a way which entirely blanks out the role of mindfulness practices in cultivating Buddhist insights on selfhood. The aggregate result is a failure, in the West, to reflect upon and seriously consider Buddhist theory and Buddhist practice in an integrated, holistic fashion. In its effort to overcome the compartmentalization of Buddhist theory (in philosophy) versus Buddhist practice (in psychology) and to embrace the challenges this might pose to fundamental Western beliefs about the self, this paper is intended both as a plea for and an exercise in greater, more venturesome cosmopolitanism. © The Author(s) 2015.

  1. Identity-related autobiographical memories and cultural life scripts in patients with Borderline Personality Disorder.

    Science.gov (United States)

    Jørgensen, Carsten René; Berntsen, Dorthe; Bech, Morten; Kjølbye, Morten; Bennedsen, Birgit E; Ramsgaard, Stine B

    2012-06-01

    Disturbed identity is one of the defining characteristics of Borderline Personality Disorder manifested in a broad spectrum of dysfunctions related to the self, including disturbances in meaning-generating self-narratives. Autobiographical memories are memories of personal events that provide crucial building-blocks in our construction of a life-story, self-concept, and a meaning-generating narrative identity. The cultural life script represents culturally shared expectations as to the order and timing of life events in a prototypical life course within a given culture. It is used to organize one's autobiographical memories. Here, 17 BPD-patients, 14 OCD-patients, and 23 non-clinical controls generated three important autobiographical memories and their conceptions of the cultural life script. BPD-patients reported substantially more negative memories, fewer of their memories were of prototypical life script events, their memory narratives were less coherent and more disoriented, and the overall typicality of their life scripts was lower as compared with the other two groups. Copyright © 2012 Elsevier Inc. All rights reserved.

  2. Rebuilding lives and identities: The role of place in recovery among persons with complex needs.

    Science.gov (United States)

    Tran Smith, Bikki; Padgett, Deborah K; Choy-Brown, Mimi; Henwood, Benjamin F

    2015-05-01

    Photo-elicitation interviews (PEIs) were conducted to explore the role of place in recovery - specifically, narrative identity reconstruction - among persons with complex needs. PEIs with 17 formerly homeless adults with co-occurring disorders in New York City produced 243 photos. Content analysis of photos revealed three categories - apartment, neighborhood and people. Two narrative themes - having my own and civic identity - were mapped onto the apartment and neighborhood categories, respectively. Three additional cross-categorical narrative themes were identified: (re)negotiating relationships and boundaries, moving beyond old identities and future possibilities. Housing was central across themes. Understanding of recovery is enhanced when viewed through participant-controlled visual methods. Copyright © 2015 Elsevier Ltd. All rights reserved.

  3. Identity and privacy. Unique in the shopping mall: on the reidentifiability of credit card metadata.

    Science.gov (United States)

    de Montjoye, Yves-Alexandre; Radaelli, Laura; Singh, Vivek Kumar; Pentland, Alex Sandy

    2015-01-30

    Large-scale data sets of human behavior have the potential to fundamentally transform the way we fight diseases, design cities, or perform research. Metadata, however, contain sensitive information. Understanding the privacy of these data sets is key to their broad use and, ultimately, their impact. We study 3 months of credit card records for 1.1 million people and show that four spatiotemporal points are enough to uniquely reidentify 90% of individuals. We show that knowing the price of a transaction increases the risk of reidentification by 22%, on average. Finally, we show that even data sets that provide coarse information at any or all of the dimensions provide little anonymity and that women are more reidentifiable than men in credit card metadata. Copyright © 2015, American Association for the Advancement of Science.

  4. NOD1CARD Might Be Using Multiple Interfaces for RIP2-Mediated CARD-CARD Interaction: Insights from Molecular Dynamics Simulation.

    Directory of Open Access Journals (Sweden)

    Jitendra Maharana

    Full Text Available The nucleotide-binding and oligomerization domain (NOD-containing protein 1 (NOD1 plays the pivotal role in host-pathogen interface of innate immunity and triggers immune signalling pathways for the maturation and release of pro-inflammatory cytokines. Upon the recognition of iE-DAP, NOD1 self-oligomerizes in an ATP-dependent fashion and interacts with adaptor molecule receptor-interacting protein 2 (RIP2 for the propagation of innate immune signalling and initiation of pro-inflammatory immune responses. This interaction (mediated by NOD1 and RIP2 helps in transmitting the downstream signals for the activation of NF-κB signalling pathway, and has been arbitrated by respective caspase-recruitment domains (CARDs. The so-called CARD-CARD interaction still remained contradictory due to inconsistent results. Henceforth, to understand the mode and the nature of the interaction, structural bioinformatics approaches were employed. MD simulation of modelled 1:1 heterodimeric complexes revealed that the type-Ia interface of NOD1CARD and the type-Ib interface of RIP2CARD might be the suitable interfaces for the said interaction. Moreover, we perceived three dynamically stable heterotrimeric complexes with an NOD1:RIP2 ratio of 1:2 (two numbers and 2:1. Out of which, in the first trimeric complex, a type-I NOD1-RIP2 heterodimer was found interacting with an RIP2CARD using their type-IIa and IIIa interfaces. However, in the second and third heterotrimer, we observed type-I homodimers of NOD1 and RIP2 CARDs were interacting individually with RIP2CARD and NOD1CARD (in type-II and type-III interface, respectively. Overall, this study provides structural and dynamic insights into the NOD1-RIP2 oligomer formation, which will be crucial in understanding the molecular basis of NOD1-mediated CARD-CARD interaction in higher and lower eukaryotes.

  5. Personal and social facets of job identity : A person-centered approach

    NARCIS (Netherlands)

    Crocetti, E.; Avanzi, L.; Hawk, S.T.; Fraccaroli, F.; Meeus, W.H.J.

    2014-01-01

    Purpose The purpose of this study was to examine ego-identity (Erikson, Psychol Issues 1:1–171, 1959; Identity, youth and crisis, Norton, New York, 1968; Marcia, J Pers Soc Psychol 3:551–558, 1966) and social identity (Tajfel and Turner, In: Austin WG, Worchel S (Eds.) The social psychology of

  6. Markets: Gift Cards

    OpenAIRE

    Jennifer Pate Offenberg

    2007-01-01

    The Mobil Oil Company introduced the first retail gift card that recorded value on a magnetic strip in 1995. In under a decade, such gift cards replaced apparel as the number one item sold during the Christmas season. This study will discuss the reasons for the strong surge in the gift card market. It will then consider the value of gift cards as an intermediate option between two alternatives: purchasing a physical gift, which could possibly be returned or exchanged, versus giving cash. Empi...

  7. Masculinity and Femininity: Essential to the Identity of the Human Person

    Directory of Open Access Journals (Sweden)

    O'Donnell Nancy

    2014-07-01

    Full Text Available The title of this congress begins with the word “identity”. It also includes the word “reciprocity,” which indicates a form of relationship and finally, “gift of self”. This would lead us to conclude that the identity of the human person has something to do with reciprocity and that reciprocity involves giving of oneself to others. This talk will attempt to shed light on how the concept of gender might in some way be incorporated into these three concepts.

  8. Imaging standards for smart cards

    Science.gov (United States)

    Ellson, Richard N.; Ray, Lawrence A.

    1996-02-01

    "Smart cards" are plastic cards the size of credit cards which contain integrated circuits for the storage of digital information. The applications of these cards for image storage has been growing as card data capacities have moved from tens of bytes to thousands of bytes. This has prompted the recommendation of standards by the X3B10 committee of ANSI for inclusion in ISO standards for card image storage of a variety of image data types including digitized signatures and color portrait images. This paper will review imaging requirements of the smart card industry, challenges of image storage for small memory devices, card image communications, and the present status of standards. The paper will conclude with recommendations for the evolution of smart card image standards towards image formats customized to the image content and more optimized for smart card memory constraints.

  9. Dynamic Virtual Credit Card Numbers

    Science.gov (United States)

    Molloy, Ian; Li, Jiangtao; Li, Ninghui

    Theft of stored credit card information is an increasing threat to e-commerce. We propose a dynamic virtual credit card number scheme that reduces the damage caused by stolen credit card numbers. A user can use an existing credit card account to generate multiple virtual credit card numbers that are either usable for a single transaction or are tied with a particular merchant. We call the scheme dynamic because the virtual credit card numbers can be generated without online contact with the credit card issuers. These numbers can be processed without changing any of the infrastructure currently in place; the only changes will be at the end points, namely, the card users and the card issuers. We analyze the security requirements for dynamic virtual credit card numbers, discuss the design space, propose a scheme using HMAC, and prove its security under the assumption the underlying function is a PRF.

  10. Robust Fourier Watermarking for ID Images on Smart Card Plastic Supports

    Directory of Open Access Journals (Sweden)

    RIAD, R.

    2016-11-01

    Full Text Available Security checking can be improved by watermarking identity (ID images printed on smart cards plastic supports. The major challenge is resistance to attacks: printing the images on the plastic cards, durability and other attacks then scanning the image from the plastic card. In this work, a robust watermarking technique is presented in this context. It is composed of three main mechanisms. The first is a watermarking algorithm based on the Fourier transform to cope with global geometric distortions. The second comprises a filter that reduces image blurring. The third attenuates color degradations. Experiments on 400 ID images show that the Wiener filter strongly improves the detection rate and outperforms competitive algorithms (blind deconvolution and unsharp filter. Color corrections also enhance the watermarking score. The whole scheme has a high efficiency and a low computational cost. It makes it compatible with the desired industrial constraints, i.e. the watermark is to be invisible, the error rate must be lower than 1%, and the detection of the mark should be fast and simple for the user.

  11. Evaluation of ICT filariasis card test using whole capillary blood: comparison with Knott's concentration and counting chamber methods.

    Science.gov (United States)

    Njenga, S M; Wamae, C N

    2001-10-01

    An immunochromatographic card test (ICT) that uses fingerprick whole blood instead of serum for diagnosis of bancroftian filariasis has recently been developed. The card test was validated in the field in Kenya by comparing its sensitivity to the combined sensitivity of Knott's concentration and counting chamber methods. A total of 102 (14.6%) and 117 (16.7%) persons was found to be microfilaremic by Knott's concentration and counting chamber methods, respectively. The geometric mean intensities (GMI) were 74.6 microfilariae (mf)/ml and 256.5 mf/ml by Knott's concentration and counting chamber methods, respectively. All infected individuals detected by both Knott's concentration and counting chamber methods were also antigen positive by the ICT filariasis card test (100% sensitivity). Further, of 97 parasitologically amicrofilaremic persons, 24 (24.7%) were antigen positive by the ICT. The overall prevalence of antigenemia was 37.3%. Of 100 nonendemic area control persons, none was found to be filarial antigen positive (100% specificity). The results show that the new version of the ICT filariasis card test is a simple, sensitive, specific, and rapid test that is convenient in field settings.

  12. Legal policy justification for the crime of non-covered use of payment cards

    Directory of Open Access Journals (Sweden)

    Vuković Igor

    2014-01-01

    Full Text Available In this paper the authors discuss the legal policy reasons for the crime of non-covered use of payments cards (Criminal Code, Art. 228(1. In the first part of the paper the ratio legis of this crime is explained. It is concluded that the non-covered use of payment cards deserves to be criminally sanctioned only when, based of the card's use, the card issuer becomes personally liable for payment to the third party not privy to the contract between the issuer and the card-holder. Conversely, criminal proscribing is not justified when debit cards are used at the point-of-sale or the ATM of another bank, since here the issuer authorizes the payment transaction and thereby participates in assuming his own obligation to pay to the third party. The second part of the paper contains critical analysis of the proscribed non-covered use of payment cards in the Serbian Criminal Code. In this respect the authors show the lack of clarity and certain discrepancies with the explained ratio legis of such a crime. Based on the comprehensive analysis of the issues regarding the justification of criminal proscribing in this field, in the last part of the paper the authors suggest possible solutions de lege ferenda.

  13. Computer Data Punch Cards

    CERN Multimedia

    Those card are printed with minimal layout aids for the formatting of FORTRAN programs, plus extra guidelines every ten columns suggesting a generic tabular data layout. A punch card is a piece of stiff paper that can be used to contain digital information represented by the presence or absence of holes in predefined positions. Punched cards were used for specialized unit record machines, organized into semiautomatic data processing systems, used punched cards for data input, output, and storage. Furthermore many new digital computers started to used punched cards.

  14. The SMile Card: a computerised data card for multiple sclerosis patients. SMile Card Scientific Board.

    Science.gov (United States)

    Mancardi, G L; Uccelli, M M; Sonnati, M; Comi, G; Milanese, C; De Vincentiis, A; Battaglia, M A

    2000-04-01

    The SMile Card was developed as a means for computerising clinical information for the purpose of transferability, accessibility, standardisation and compilation of a national database of demographic and clinical information about multiple sclerosis (MS) patients. In many European countries, centres for MS are organised independently from one another making collaboration, consultation and patient referral complicated. Only the more highly advanced clinical centres, generally located in large urban areas, have had the possibility to utilise technical possibilities for improving the organisation of patient clinical and research information, although independently from other centres. The information system, developed utilising the Visual Basic language for Microsoft Windows 95, stores information via a 'smart card' in a database which is initiated and updated utilising a microprocessor, located at each neurological clinic. The SMile Card, currently being tested in Italy, permits patients to carry with them all relevant medical information without limitations. Neurologists are able to access and update, via the microprocessor, the patient's entire medical history and MS-related information, including the complete neurological examination and laboratory test results. The SMile Card provides MS patients and neurologists with a complete computerised archive of clinical information which is accessible throughout the country. In addition, data from the SMile Card system can be exported to other database programs.

  15. Thermorewritable card by using dyes; Senryo wo mochiita kakikae kanona card

    Energy Technology Data Exchange (ETDEWEB)

    Muto, Y.

    1998-06-01

    Described herein are thermorewritable cards which use dyes. Rewritable cards, mainly used for membership and point cards, are themselves used repeatedly and required to be rewritable repeatedly for information they carry. The dyes and developers used for the conventional heat- and pressure-sensitive papers are colorless, leuco-dye precursors and acidic compounds with a phenolic hydroxyl group or the like. They transfer electrons to each other, opening the lactone ring of the dye precursor to develop the color. Developing and erasing the color are reversible chemical reactions, where the color is developed under heat and maintained by quenching. For erasing the color, it is heated and then slowly cooled to separate the precursor and developer phases from each other. A printer (thermal head) is required for developing and erasing a color. Durability under various conditions is another requirement of the card; it must be adaptable to weather conditions and resistant to sweat. The new thermorewritable card is protected from various adverse effects on its chemical reactions, and made as durable as the conventional cards. 3 refs., 5 figs., 1 tab.

  16. Philosophy teaching and the constitution of personal identity: Formation, autonomy and gender

    Directory of Open Access Journals (Sweden)

    Tânia Aparecida Kuhnen

    2017-12-01

    Full Text Available This article investigates the contribution of philosophy in basic education classes for the formation of the students as individuals, helping them in the process of identity construction. Philosophy teaching in high school contributes to constituteself-aware individuals in space and time. It helps them with the ability to reflect critically on the social context in which they are inserted and on the expectations in terms of fixed gender roles imposed from the outside in. In this sense, the particularity of philosophical knowledge, as critical thinking through the creation of concepts, entails a more authentic and autonomous individual formation. This also justifies the presence of philosophy as a subject in high school. The personal gender experience is central in the formation of identity. So it is important to discuss this topic with the students. Due to that, we advocate the importance of bringing gender issues to philosophy classes. It refers a real experience that can be problematized in order to deconstruct naturalized gender performativity and think about the inequalities that pervade this social category. Thus, students can constitute a more conscious individual identity, critical to social position that their genders occupy in the social environment.

  17. High-throughput sequencing of forensic genetic samples using punches of FTA cards with buccal swabs.

    Science.gov (United States)

    Kampmann, Marie-Louise; Buchard, Anders; Børsting, Claus; Morling, Niels

    2016-01-01

    Here, we demonstrate that punches from buccal swab samples preserved on FTA cards can be used for high-throughput DNA sequencing, also known as massively parallel sequencing (MPS). We typed 44 reference samples with the HID-Ion AmpliSeq Identity Panel using washed 1.2 mm punches from FTA cards with buccal swabs and compared the results with those obtained with DNA extracted using the EZ1 DNA Investigator Kit. Concordant profiles were obtained for all samples. Our protocol includes simple punch, wash, and PCR steps, reducing cost and hands-on time in the laboratory. Furthermore, it facilitates automation of DNA sequencing.

  18. Differential contributions of the anterior temporal and medial temporal lobe to the retrieval of memory for person identity information.

    Science.gov (United States)

    Tsukiura, Takashi; Suzuki, Chisato; Shigemune, Yayoi; Mochizuki-Kawai, Hiroko

    2008-12-01

    Although previous studies have suggested the importance of the bilateral anterior temporal (ATL) and medial temporal lobes (MTL) in the retrieval of person identity information, there is little evidence concerning how these regions differentially contribute to the process. Here we investigated this question using functional magnetic resonance imaging (fMRI). Before scanning, subjects learned associations among faces (F), names (N), and job titles (as a form of person-related semantics, S). During retrieval with fMRI, subjects were presented with previously learned and new S stimuli, and judged whether the stimuli were old or new. Successful retrieval (H) trials were divided into three conditions: retrieval of S and associated F and N (HSFN); retrieval of S and associated F (HSF); and retrieval of S only (HS). The left ATL was significantly activated in HSFN, compared to HSF or HS, whereas the right ATL and MTL were significantly activated in HSFN and HSF relative to HS. In addition, activity in bilateral ATL was significantly correlated with reaction time for HSFN, whereas we found no significant correlation between activity in the right MTL and reaction time in any condition. The present findings suggest that the left ATL may mediate associations between names and person-related semantic information, whereas the right ATL mediates the association between faces and person-related semantic information in memory for person identity information. In addition, activation of the right MTL region implies that this area may contribute to a more general relational processing of associative components, including memory for person identity information. Copyright 2007 Wiley-Liss, Inc.

  19. Comparing the symptoms and mechanisms of "dissociation" in dissociative identity disorder and borderline personality disorder.

    Science.gov (United States)

    Laddis, Andreas; Dell, Paul F; Korzekwa, Marilyn

    2017-01-01

    A total of 75 patients were diagnosed with the Structured Clinical Interview for DSM-IV Dissociative Disorders-Revised as having dissociative identity disorder (DID), and 100 patients were diagnosed with the Structured Interview for DSM-IV Personality as having borderline personality disorder (BPD). Both groups were administered the Multidimensional Inventory of Dissociation (MID). DID patients had significantly higher MID scores than BPD patients, different distributions of MID scores, and different MID subscale profiles in 3 ranges of MID scores (0-15, 15-30, 30-45). The core MID symptoms-exhibited at all ranges of MID scores-for DID patients (the presence of alters, identity confusion, and memory problems) and BPD patients (flashbacks, identity confusion, and memory problems) were ostensibly similar but were considered to be mostly produced by different underlying processes. Multiple regression analyses showed that the core MID symptoms of DID patients had different predictors than did the core MID symptoms of BPD patients. Alter identities seemed to generate most-but not all-dissociative phenomena in DID patients, whereas only the 24% highest scoring BPD patients (MID ≥45) seemed to manifest alter-driven dissociative experiences. Most BPD dissociative experiences appeared to be due to 5 other mechanisms: (a) BPD-specific, stress-driven, rapid shifts of self-state; (b and c) nondefensive disruptions of the framework of perceptual organization with or without an accompanying BPD-specific, dissociation-like disintegration of affective/neurocognitive functioning; (d) a defensive distancing or detachment from distress (i.e., simple depersonalization); and (e) Allen, Console, and Lewis's (1999) severe absorptive detachment.

  20. International images: business cards.

    Science.gov (United States)

    Gaston, S; Pucci, J

    1991-01-01

    Nursing specialists engage in a variety of international professional activities. Business cards are an important aspect of establishing a professional image. This article presents recommended business card contents, international etiquette, card design and production, and cared innovations.

  1. Probabilities in the Card Game of Three Cards

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 9; Issue 3. Probabilities in the Card Game of Three Cards. A W Joshi M W Joshi. Classroom Volume 9 Issue 3 March 2004 pp 76-77. Fulltext. Click here to view fulltext PDF. Permanent link: https://www.ias.ac.in/article/fulltext/reso/009/03/0076-0077 ...

  2. Inter-identity autobiographical amnesia in patients with dissociative identity disorder

    OpenAIRE

    Huntjens, Rafaele JC; Verschuere, Bruno; McNally, Richard J

    2012-01-01

    Background: A major symptom of Dissociative Identity Disorder (DID; formerly Multiple Personality Disorder) is dissociative amnesia, the inability to recall important personal information. Only two case studies have directly addressed autobiographical memory in DID. Both provided evidence suggestive of dissociative amnesia. The aim of the current study was to objectively assess transfer of autobiographical information between identities in a larger sample of DID patients. Methods: Using a c...

  3. CERN access cards

    CERN Multimedia

    HR Department

    2007-01-01

    Holders of CERN access cards are reminded that the card is an official document. It is important to carry it with you at all times when you are on the site. This applies also to those on standby duty who are called out for emergency interventions. As announced in Weekly Bulletin 13/2006, any loss or theft of access cards must be declared to the competent external authorities.

  4. Some security strategies for smart cards

    Energy Technology Data Exchange (ETDEWEB)

    Ros, F [Gemalto, St Cyr en Val, BP 6021, 45060 Orlans Cedex (France); Harba, R [LESI, Polytech' Orlans-LESI, 12 rue de Blois, 45067 Orleans Cedex 2 (France)

    2007-07-15

    This paper details current developments at Gemalto in the field of security. It focuses on two different security processes for ID cards. The first one consists in adding observable security features in the ID image to allow quick visual verification and serves mainly to detect counterfeit attempts. The second consists in watermarking ID images during the pre personalization step by a secret key stored in the chip. The interest of the different approaches is demonstrated with several real ID images.

  5. Java Card: An analysis of the most successful smart card operating system

    NARCIS (Netherlands)

    de Jong, Eduard; Hartel, Pieter H.; Peyret, Patrice; Cattaneo, Peter

    2005-01-01

    To explain why the Java Card operating system has become the most successful smart card operating system to date, we analyze the realized features of the current Java Card version, we argue it could be enhanced by adding a number of intended features and we discuss a set of complementary features

  6. Self-defining memories, scripts, and the life story: narrative identity in personality and psychotherapy.

    Science.gov (United States)

    Singer, Jefferson A; Blagov, Pavel; Berry, Meredith; Oost, Kathryn M

    2013-12-01

    An integrative model of narrative identity builds on a dual memory system that draws on episodic memory and a long-term self to generate autobiographical memories. Autobiographical memories related to critical goals in a lifetime period lead to life-story memories, which in turn become self-defining memories when linked to an individual's enduring concerns. Self-defining memories that share repetitive emotion-outcome sequences yield narrative scripts, abstracted templates that filter cognitive-affective processing. The life story is the individual's overarching narrative that provides unity and purpose over the life course. Healthy narrative identity combines memory specificity with adaptive meaning-making to achieve insight and well-being, as demonstrated through a literature review of personality and clinical research, as well as new findings from our own research program. A clinical case study drawing on this narrative identity model is also presented with implications for treatment and research. © 2012 Wiley Periodicals, Inc.

  7. Predicting borderline personality disorder features from personality traits, identity orientation, and attachment styles in Italian nonclinical adults: issues of consistency across age ranges.

    Science.gov (United States)

    Fossati, Andrea; Borroni, Serena; Feeney, Judith; Maffei, Cesare

    2012-04-01

    The aims of this study were to assess whether Borderline Personality Disorder (BPD) features could be predicted by Big Five traits, impulsivity, identity orientation, and adult attachment patterns in a sample of 1,192 adult nonclinical participants, and to evaluate the consistency of these regression models across four age groups (49 years, and >50 years, respectively). In the full sample, measures of neuroticism (N), impulsivity, and anxious insecure attachment were substantial predictors of BPD features (adjusted R(2) = .38, p personality traits and disturbed attachment patterns.

  8. Modeling the contribution of personality, social identity and social norms to problematic Facebook use in adolescents.

    Science.gov (United States)

    Marino, Claudia; Vieno, Alessio; Pastore, Massimiliano; Albery, Ian P; Frings, Daniel; Spada, Marcantonio M

    2016-12-01

    Facebook is the most popular social networking site in the world providing the opportunity to maintain and/or establish relationships, to share media contents and experiences with friends, and to easily communicate with them. Despite the resources and the innovative social features offered by Facebook research has emerged indicating that its use may become problematic, with negative consequences on personal psycho-social well-being, especially among adolescents and young adults. The main aim of this study was to examine the unique contribution of personality traits and social influence processes (i.e. subjective norms, group norms, and social identity) to perceived frequency of Facebook Use and Problematic Facebook Use in a sample of adolescents. A total of 968 Italian adolescents participated in the study. Structural equation modeling showed that emotional stability, extraversion, conscientiousness and norms directly predicted Problematic Facebook Use, whereas gender, group norms and social identity predicted perceived frequency of Facebook use. In conclusion, both personal and social variables appear to explain perceived frequency of Facebook use and Problematic Facebook Use among adolescents, and should be taken into account by researchers and educational practitioners. Copyright © 2016 Elsevier Ltd. All rights reserved.

  9. The Multidimensional Card Selection Task: A new way to measure concurrent cognitive flexibility in preschoolers.

    Science.gov (United States)

    Podjarny, Gal; Kamawar, Deepthi; Andrews, Katherine

    2017-07-01

    Most executive function research examining preschoolers' cognitive flexibility, the ability to think about something in more than one way, has focused on preschoolers' facility for sequentially switching their attention from one dimension to another (e.g., sorting bivalent cards first by color and then by shape). We know very little about preschoolers' ability to coordinate more than one dimension simultaneously (concurrent cognitive flexibility). Here we report on a new task, the Multidimensional Card Selection Task, which was designed to measure children's ability to consider two dimensions, and then three dimensions, concurrently (e.g., shape and size, and then shape, size, and color). More than half of the preschoolers in our sample of 107 (50 3-year-olds and 57 4-year-olds) could coordinate three dimensions simultaneously and consistently across three test trials. Furthermore, performance on the Multidimensional Card Selection Task was related, but not identical, to performance on other cognitive tasks, including a widely used measure of switching cognitive flexibility (the Dimensional Change Card Sort). The Multidimensional Card Selection Task provides a new way to measure concurrent cognitive flexibility in preschoolers, and opens another avenue for exploring the emergence of early cognitive flexibility development. Copyright © 2017 Elsevier Inc. All rights reserved.

  10. Empirical approach to interpreting card-sorting data

    Directory of Open Access Journals (Sweden)

    Steven F. Wolf1,2,*

    2012-05-01

    Full Text Available Since it was first published 30 years ago, the seminal paper of Chi et al. on expert and novice categorization of introductory problems led to a plethora of follow-up studies within and outside of the area of physics [ Cogn. Sci. 5 121 (1981]. These studies frequently encompass “card-sorting” exercises whereby the participants group problems. While this technique certainly allows insights into problem solving approaches, simple descriptive statistics more often than not fail to find significant differences between experts and novices. In moving beyond descriptive statistics, we describe a novel microscopic approach that takes into account the individual identity of the cards and uses graph theory and models to visualize, analyze, and interpret problem categorization experiments. We apply these methods to an introductory physics (mechanics problem categorization experiment, and find that most of the variation in sorting outcome is not due to the sorter being an expert versus a novice, but rather due to an independent characteristic that we named “stacker” versus “spreader.” The fact that the expert-novice distinction only accounts for a smaller amount of the variation may explain the frequent null results when conducting these experiments.

  11. Involved and Focused? Students' Perceptions of Institutional Identity, Personal Goal Orientation and Levels of Campus Engagement

    Science.gov (United States)

    Ferrari, Joseph R.; McCarthy, Brendan J.; Milner, Lauren A.

    2009-01-01

    The present study explores the relationship between students' perception of their institution's mission identity, personal goal orientation tendencies, and the extent to which they engage in mission-driven activities. Goal orientation research categorizes student motivations in three ways: mastery orientation (MO), performance-approach (PAp)…

  12. Research on the SIM card implementing functions of transport card

    Science.gov (United States)

    Li, Yi; Wang, Lin

    2015-12-01

    This paper is based on the analysis for theory and key technologies of contact communication, contactless communication card and STK menu, and proposes complete software and hardware solution for achieving convenience and secure mobile payment system on SIM card.

  13. RANCANG BANGUN APLIKASI SMART CARD INTERFACE

    OpenAIRE

    I Putu Agus Swastika; Siti Saibah Pua Luka; Yanno Dwi Ananda

    2012-01-01

    Opportunity to development smart card -based application is quite large as the need for smart card technology in various fields of both business and government agencies and BUMN. One brand that is widely used smart card is a smart card type from a vendor production NFC ACR122U ACS (Advanced Card System Limited) because prices are relatively affordable, but fairly tough. At the Thesis is done, the ACS (Advanced Card System Limited) as a manufacturer of smart card vendor type ...

  14. Method card design dimensions

    DEFF Research Database (Denmark)

    Wölfel, Christiane; Merritt, T.

    2013-01-01

    There are many examples of cards used to assist or provide structure to the design process, yet there has not been a thorough articulation of the strengths and weaknesses of the various examples. We review eighteen card-based design tools in order to understand how they might benefit designers....... The card-based tools are explained in terms of five design dimensions including the intended purpose and scope of use, duration of use, methodology, customization, and formal/material qualities. Our analysis suggests three design patterns or archetypes for existing card-based design method tools...... and highlights unexplored areas in the design space. The paper concludes with recommendations for the future development of card-based methods for the field of interaction design....

  15. The Soul and Personal Identity. Derek Parfit’s Arguments in the Substance Dualist Perspective

    Directory of Open Access Journals (Sweden)

    Sepetyi Dmytro

    2017-07-01

    Full Text Available This paper re-evaluates Derek Parfit’s attack on the commonly held view that personal identity is necessarily determinate and that it is what matters. In the first part we first argue against the Humean view of personal identity; secondly, we classify the remaining alternatives into three kinds: the body theory and the brain theory, the quasi-Humean theory, and the soul theory, and thirdly we deploy Parfit’s arguments and related considerations to the point that none of the materialistic alternatives is consistent with the commonly held view. This leaves us with the alternative: either we accept the radical and highly implausible materialistic view Parfit calls ‘Reductionism’, or we accept the view that we are nonphysical indivisible entities—Cartesian egos, or souls. The second part of the paper discusses Parfit’s objections against the Cartesian view: that there is no reason to believe in the existence of such nonphysical entities; that if such entities exist, there is no evidence that they are enduring (to span a human life; that even if they exist and are enduring, they are irrelevant for the psychological profile and temporal continuity of a person; that experiments with ‘brain-splitted’ patients provide strong evidence against the Cartesian view. We argue that these objections are in part mistaken, and that the remaining (sound part is not strong enough to make the Cartesian view less plausible than Reductionism.

  16. Ego identity formation in middle adolescence.

    Science.gov (United States)

    Lavoie, J C

    1976-12-01

    Assumed determinants of ego identity were investigated in this study using sophomore, junior, and senior high school males and females. Subjects were administered the Marcia Ego Identity Status Scale and measures of sex-role identification, personality development, psychological functioning, self-concept, and parental socialization practices. Data analyses, using a median split on identity score, showed that high-identity adolescents obtained more positive scores on sex-role identification, personality development, psychological adjustment, and self-concept than low-identity adolescents. Socialization practices also differed for the two groups. The sex differences which emerged were congruent with the identity literature. Overall, the data supported Erikson's theory of ego identity development.

  17. Evaluation and implementation of QR Code Identity Tag system for Healthcare in Turkey

    OpenAIRE

    Uzun, Vassilya; Bilgin, Sami

    2016-01-01

    For this study, we designed a QR Code Identity Tag system to integrate into the Turkish healthcare system. This system provides QR code-based medical identification alerts and an in-hospital patient identification system. Every member of the medical system is assigned a unique QR Code Tag; to facilitate medical identification alerts, the QR Code Identity Tag can be worn as a bracelet or necklace or carried as an ID card. Patients must always possess the QR Code Identity bracelets within hospi...

  18. Personal dimensions of identity and empirical research in APA journals.

    Science.gov (United States)

    Munley, Patrick H; Anderson, Mary Z; Baines, Tonita C; Borgman, Amy L; Briggs, Denise; Dolan, James P; Koyama, Miki

    2002-11-01

    This study reviewed 402 empirical research papers published during 1999 in 9 American Psychological Association journals from the perspective of the Personal Dimensions of Identity (PDI) model. Descriptions of participants were reviewed to determine whether researchers reported information concerning Dimensions A, B, and C of the PDI model. PDI A and B Dimensions of age, gender, education, and geographic location were reported with the highest frequency: 88.56%, 89.30%, 78.50%, and 73.88%, respectively, whereas race/ethnicity was reported with moderate frequency, 60.70%. The remaining PDI A Dimensions of language, physical disability, sexual orientation, and social class, and the remaining B Dimensions of citizenship status, employment status, income, marital status, military experience, occupation, and religion, were reported in relatively low percentages of studies.

  19. CMS Wallet Card

    Data.gov (United States)

    U.S. Department of Health & Human Services — The CMS Wallet Card is a quick reference statistical summary on annual CMS program and financial data. The CMS Wallet Card is available for each year from 2004...

  20. The Internet and healthcare in Taiwan: value-added applications on the medical network in the National Health Insurance smart card system.

    Science.gov (United States)

    Tsai, Wen-Hsien; Kuo, Hsiao-Chiao

    2007-01-01

    The introduction of smart card technology has ushered in a new era of electronic medical information systems. Taiwan's Bureau of National Health Insurance (BNHI) implemented the National Health Insurance (NHI) smart card project in 2004. The purpose of the project was to replace all paper cards with one smart card. The NHI medical network now provides three kinds of services. In this paper, we illustrate the status of the NHI smart card system in Taiwan and propose three kinds of value-added applications for the medical network, which are electronic exchange of medical information, retrieval of personal medical records and medical e-learning for future development of health information systems.

  1. Point card compatible automatic vending machine for canned drink; Point card taio kan jido hanbaiki

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2000-01-10

    A point card compatible automatic vending machine for canned drinks is developed, which provides drink manufacturers with a powerful tool to acquire selling sites and attract consumers. Since the machine is equipped with a device to handle point cards, regular customers have increased and sales have picked up. A point card issuing device is also installed, and the new machine issues a point card whenever a customer wants. The drink manufacturers are evaluating high of the vending machine because it will contribute to the diffusion of the point card system and because a sales promotion campaign may be conducted through the vending machine for instance by exchanging a fully marked card with a giveaway on the spot. In the future, a bill validator (paper money identifier) will be integrated even with small size machines for the diffusion of point card compatible machines. (translated by NEDO)

  2. CERNET Interface Card

    CERN Multimedia

    1978-01-01

    Homegrown networking technology pre-dating the internet. This is a CERNnet card developed and built at CERN. There was a lot of space on the card between the components, so the engineers decided to put their portraits on it.

  3. Designer's Identity

    DEFF Research Database (Denmark)

    Kunrath, Kamila; Cash, Philip; Li-Ying, Jason

    2016-01-01

    A designer’s professional identity (DPI) develops through both education and professional experience, building on core personality traits and innate skills. In this paper a systematic literature review and a secondary narrative review were developed in order to map personal attributes and design...

  4. The Future of Smart Cards.

    Science.gov (United States)

    Fickes, Michael

    2000-01-01

    Discusses the evolution of smart cards from digital signatures and other innovations into the realm of magnetic-stripe cards to expand their applications. Examples of magnetic-strip smart card usage are examined. (GR)

  5. Pocket EZPIN device for healthcare IC cards to enhance the security and convenience of senior citizens.

    Science.gov (United States)

    Lai, Jiun-Tze; Hou, Ting-Wei

    2008-04-01

    An application that adopts smart cards often requires users to enter a PIN (Personal Identification Number) code. In Taiwan's healthcare system, a PIN is used to protect a card holder's private data. However, should one forget one's PIN, the procedure to set up a new PIN is inconvenient. There is a higher probability that senior citizens may forget their PINs. We propose a device which stores the PIN of the cardholder's Healthcare IC card. When the healthcare IC card reader requires the cardholder to enter his/her PIN, the cardholder pushes a button of the device to remotely sends the cardholder's encrypted PIN, for example by Infra Red. The device is designed to be low cost and easy to carry, and, hence, affordable to be a gift to senior citizens. Moreover, if the cardholder should forget to take the device with him/her, the card still works as normal. The device would be helpful in ensuring the public's privacy and convenience in Taiwan's healthcare system.

  6. Inter-identity autobiographical amnesia in patients with dissociative identity disorder.

    Science.gov (United States)

    Huntjens, Rafaële J C; Verschuere, Bruno; McNally, Richard J

    2012-01-01

    A major symptom of Dissociative Identity Disorder (DID; formerly Multiple Personality Disorder) is dissociative amnesia, the inability to recall important personal information. Only two case studies have directly addressed autobiographical memory in DID. Both provided evidence suggestive of dissociative amnesia. The aim of the current study was to objectively assess transfer of autobiographical information between identities in a larger sample of DID patients. Using a concealed information task, we assessed recognition of autobiographical details in an amnesic identity. Eleven DID patients, 27 normal controls, and 23 controls simulating DID participated. Controls and simulators were matched to patients on age, education level, and type of autobiographical memory tested. Although patients subjectively reported amnesia for the autobiographical details included in the task, the results indicated transfer of information between identities. The results call for a revision of the DID definition. The amnesia criterion should be modified to emphasize its subjective nature.

  7. Unraveling a Card Trick

    Science.gov (United States)

    Hoare, Tony; Shankar, Natarajan

    In one version of Gilbreath's card trick, a deck of cards is arranged as a series of quartets, where each quartet contains a card from each suit and all the quartets feature the same ordering of the suits. For example, the deck could be a repeating sequence of spades, hearts, clubs, and diamonds, in that order, as in the deck below.

  8. Credit Card Debt Hardship Letter Samples

    OpenAIRE

    lissa coffey

    2016-01-01

    Having trouble with your credit card debt? Below you will find examples of hardship letters. There are several things to consider when writing a credit card hardship letter. A hardship letter is the first step to letting the credit card company know that things are bad. This free credit card hardship letter sample is only a guide in order to start the negotiation. Credit card debt hardship letter example, hardship letter to credit card. If you are having trouble paying off your debt and need ...

  9. Personal Identity and Resurrection from the Dead

    Directory of Open Access Journals (Sweden)

    Gasparov Igor

    2017-04-01

    Full Text Available The paper examines arguments of the “Christian materialist” Trenton Merricks that he provided in support of the claim that the Christian doctrine of resurrection from the dead is compatible with the materialist understanding of the nature of human beings. In his paper The Resurrection of the Body, Merricks discussed two aspects of the materialist interpretation of the traditional religious doctrine of the bodily resurrection. On the one hand, he analyses and tries to overcome objections against the possibility of the general resurrection in case the materialist understanding of the nature of human personality should be true (mainly the problem of the temporal gap. On the other hand, he provides some reasons why the materialist understanding of human nature is more relevant than its dualist counterpart to the doctrine of the bodily resurrection. The present paper evaluates his arguments and discusses the suggestion that the doctrine of resurrection is not only compatible with materialism, but is also tenable if human beings are identical with their physical bodies. The conclusion of the paper is that Merricks’ apologetic arguments achieve their aims in defending the doctrine of resurrection only partially; the resurrection doctrine appears more tenable if we accept the dualistic conception of human nature.

  10. Java Card for PayTv Application

    OpenAIRE

    Dutta, Pallab

    2013-01-01

    Smart cards are widely used along with PayTV receivers to store secret user keys and to perform security functions to prevent any unauthorized viewing of PayTV channels. Java Card technology enables programs written in the Java programming language to run on smart cards. Smart cards represent one of the smallest computing platforms in use today. The memory configuration of a smart card are of the order of 4K of RAM, 72K of EEPROM, and 24K of ROM. Using Java card provides advantages to the ind...

  11. Passive microfluidic array card and reader

    Science.gov (United States)

    Dugan, Lawrence Christopher [Modesto, CA; Coleman, Matthew A [Oakland, CA

    2011-08-09

    A microfluidic array card and reader system for analyzing a sample. The microfluidic array card includes a sample loading section for loading the sample onto the microfluidic array card, a multiplicity of array windows, and a transport section or sections for transporting the sample from the sample loading section to the array windows. The microfluidic array card reader includes a housing, a receiving section for receiving the microfluidic array card, a viewing section, and a light source that directs light to the array window of the microfluidic array card and to the viewing section.

  12. A Mechanism for Anonymous Credit Card Systems

    Science.gov (United States)

    Tamura, Shinsuke; Yanase, Tatsuro

    This paper proposes a mechanism for anonymous credit card systems, in which each credit card holder can conceal individual transactions from the credit card company, while enabling the credit card company to calculate the total expenditures of transactions of individual card holders during specified periods, and to identify card holders who executed dishonest transactions. Based on three existing mechanisms, i.e. anonymous authentication, blind signature and secure statistical data gathering, together with implicit transaction links proposed here, the proposed mechanism enables development of anonymous credit card systems without assuming any absolutely trustworthy entity like tamper resistant devices or organizations faithful both to the credit card company and card holders.

  13. The microassay on a card: A rugged, portable immunoassay

    Science.gov (United States)

    Kidwell, David

    1991-01-01

    The Microassay on a Card (MAC) is a portable, hand-held, non-instrumental immunoassay that can test for the presence of a wide variety of substances in the environment. The MAC is a simple device to use. A drop of test solution is placed on one side of the card and within five minutes a color is developed on the other side in proportion to the amount of substance in the test solution, with sensitivity approaching 10 ng/ml. The MAC is self-contained and self-timed; no reagents or timing is necessary. The MAC may be configured with multiple wells to provide simultaneous testing for multiple species. As envisioned, the MAC will be employed first as an on-site screen for drugs of abuse in urine or saliva. If the MAC can be used as a screen of saliva for drugs of abuse, it could be applied to driving while intoxicated, use of drugs on the job, or testing of the identity of seized materials. With appropriate modifications, the MAC also could be used to test for environmental toxins or pollutants.

  14. 78 FR 4408 - Privacy Act of 1974, as Amended; System of Records

    Science.gov (United States)

    2013-01-22

    ... FDIC 30-64-0035, Identity, Credential and Access Management Records. We hereby publish this notice for... Web page. The Identity, Credential and Access Management Records system will contain records collected or generated in the process of producing Personal Identity Verification (PIV) cards issued by the...

  15. The Identity of Czech Deaf Roma

    OpenAIRE

    Kalousová, Josefina

    2012-01-01

    With the definition of Deaf people as a cultural and linguistic minority the research of Deaf identity became possible. Following this, questions of identity of minority deaf persons emerged. Do these persons affiliate to the Deaf community or to their ethnic minority? This bachelor thesis focuses on the topic of Czech deaf Roma identity. The underlying assumption of the paper is that identity is a continuing process dependent on the interaction of an individual and society and that it consti...

  16. Medical Identity

    DEFF Research Database (Denmark)

    Musaeus, Peter

    2015-01-01

    Purpose: To examine philosophical stances underpinning medical identity and assess the conceptual relationship between physician, medical practice and culture. Argument: Medical identity is about the ideals and moral positions that physicians take when justifying themselves. Medical identity...... hedonistic versus sentimentalist approaches to medical identity. The sociocultural philosophical analysis of medical identity can shed light on what it means conceptually for a physician to harbor beliefs associated with him/her being taken to be an autonomous professional. It is important because it touches...... on the meaning of being a compassionate, good and skilled physician, making its relevance to person-centered medicine self-evident. Conclusion: Medical identity should be analyzed with reference to literature, philosophy and medical practice in order for the physician to exercise a reflective position...

  17. Quartet cards as the media of career exploration for lower-grade primary school students

    Directory of Open Access Journals (Sweden)

    Yulia Ayriza

    2017-12-01

    Full Text Available A career developed through the optimization of one’s potentials will irrevocably play a role in the development of self-identity as well as the psychological well-being of the individual. When children are introduced and allowed to explore as many career options as possible during their developmental stage, they are more likely to have a fruitful career development in the future. The preceding study showed that the career interests and knowledge of lower-grade primary students fit the Holland Career Categories: realistic, investigative, artistic, social, enterprising, and conventional (RIASEC. It was also found that the students’ career interest and knowledge levels varied, with most in the low level. This second-year study aims to expand the results of the previous study by developing the use of Quartet cards as the media of career exploration for lower-grade primary students. By using the research and development method, this study develops Quartet Career Cards into three difficulty levels: low, medium, and high. The Quartet cards media have undergone feasibility tests conducted by experts in theory and media, as well as a series of field testing consisting of preliminary, main, and operational stages among a total of 266 primary students of grades 1, 2, and 3. A revision was made on several components including the images, information, colors, font sizes, illustration styles, and card sizes. The findings show that Quartet Career Cards meet the feasibility standards for the media of career exploration

  18. Korean Adoptee Identity: Adoptive and Ethnic Identity Profiles of Adopted Korean Americans

    Science.gov (United States)

    Beaupre, Adam J.; Reichwald, Reed; Zhou, Xiang; Raleigh, Elizabeth; Lee, Richard M.

    2015-01-01

    Adopted Korean adolescents face the task of grappling with their identity as Koreans and coming to terms with their adoptive status. In order to explore these dual identities, the authors conducted a person-centered study of the identity profiles of 189 adopted Korean American adolescents. Using cluster analytic procedures, the study examined…

  19. Inter-identity autobiographical amnesia in patients with dissociative identity disorder

    NARCIS (Netherlands)

    Huntjens, R.J.C.; Verschuere, B.; McNally, R.J.

    2012-01-01

    Background A major symptom of Dissociative Identity Disorder (DID; formerly Multiple Personality Disorder) is dissociative amnesia, the inability to recall important personal information. Only two case studies have directly addressed autobiographical memory in DID. Both provided evidence suggestive

  20. Inter-Identity Autobiographical Amnesia in Patients with Dissociative Identity Disorder

    NARCIS (Netherlands)

    Huntjens, R.J.C.; Verschuere, B.; McNally, R.J.

    2012-01-01

    Background: A major symptom of Dissociative Identity Disorder (DID; formerly Multiple Personality Disorder) is dissociative amnesia, the inability to recall important personal information. Only two case studies have directly addressed autobiographical memory in DID. Both provided evidence suggestive

  1. Inter-Identity Autobiographical Amnesia in Patients with Dissociative Identity Disorder

    Science.gov (United States)

    Huntjens, Rafaële J. C.; Verschuere, Bruno; McNally, Richard J.

    2012-01-01

    Background A major symptom of Dissociative Identity Disorder (DID; formerly Multiple Personality Disorder) is dissociative amnesia, the inability to recall important personal information. Only two case studies have directly addressed autobiographical memory in DID. Both provided evidence suggestive of dissociative amnesia. The aim of the current study was to objectively assess transfer of autobiographical information between identities in a larger sample of DID patients. Methods Using a concealed information task, we assessed recognition of autobiographical details in an amnesic identity. Eleven DID patients, 27 normal controls, and 23 controls simulating DID participated. Controls and simulators were matched to patients on age, education level, and type of autobiographical memory tested. Findings Although patients subjectively reported amnesia for the autobiographical details included in the task, the results indicated transfer of information between identities. Conclusion The results call for a revision of the DID definition. The amnesia criterion should be modified to emphasize its subjective nature. PMID:22815769

  2. Inter-identity autobiographical amnesia in patients with dissociative identity disorder.

    Directory of Open Access Journals (Sweden)

    Rafaële J C Huntjens

    Full Text Available BACKGROUND: A major symptom of Dissociative Identity Disorder (DID; formerly Multiple Personality Disorder is dissociative amnesia, the inability to recall important personal information. Only two case studies have directly addressed autobiographical memory in DID. Both provided evidence suggestive of dissociative amnesia. The aim of the current study was to objectively assess transfer of autobiographical information between identities in a larger sample of DID patients. METHODS: Using a concealed information task, we assessed recognition of autobiographical details in an amnesic identity. Eleven DID patients, 27 normal controls, and 23 controls simulating DID participated. Controls and simulators were matched to patients on age, education level, and type of autobiographical memory tested. FINDINGS: Although patients subjectively reported amnesia for the autobiographical details included in the task, the results indicated transfer of information between identities. CONCLUSION: The results call for a revision of the DID definition. The amnesia criterion should be modified to emphasize its subjective nature.

  3. Computer Security: what is your identity?

    CERN Multimedia

    Stefan Lueders, Computer Security Team

    2016-01-01

    In the physical world this is fairly clear; your sense of self is multi-faceted and highly complex but the entity of “you” is well defined.  You can prove your identity simply, typically by showing your ID card or by having someone vouch for you. You are a being layered with attributes. Other people may request some of these attributes: your first name at Starbucks or your shoe size at the bowling alley. But only your most trusted contacts are granted access to your entire set of attributes… or maybe you never expose your identity entirely!   Online, your identity is a very different beast. It is fragmented. Each piece of your identity is typically verified by its own username and password. Occasionally pieces are forgotten or lost to the depths of the Internet. The hundreds of accounts that identify “you” present a security problem. Can you keep track of these accounts and is it even realistic to use unique, non-trivial passwords for ea...

  4. Empirical approach to interpreting card-sorting data

    Directory of Open Access Journals (Sweden)

    Steven F. Wolf

    2012-05-01

    Full Text Available Since it was first published 30 years ago, the seminal paper of Chi et al. on expert and novice categorization of introductory problems led to a plethora of follow-up studies within and outside of the area of physics [Cogn. Sci. 5, 121 (1981COGSD50364-021310.1207/s15516709cog0502_2]. These studies frequently encompass “card-sorting” exercises whereby the participants group problems. While this technique certainly allows insights into problem solving approaches, simple descriptive statistics more often than not fail to find significant differences between experts and novices. In moving beyond descriptive statistics, we describe a novel microscopic approach that takes into account the individual identity of the cards and uses graph theory and models to visualize, analyze, and interpret problem categorization experiments. We apply these methods to an introductory physics (mechanics problem categorization experiment, and find that most of the variation in sorting outcome is not due to the sorter being an expert versus a novice, but rather due to an independent characteristic that we named “stacker” versus “spreader.” The fact that the expert-novice distinction only accounts for a smaller amount of the variation may explain the frequent null results when conducting these experiments.

  5. 75 FR 10414 - Researcher Identification Card

    Science.gov (United States)

    2010-03-08

    ... capturing administrative information on the characteristics of our users. Other forms of identification are... use bar-codes on researcher identification cards in the Washington, DC, area. The plastic cards we... plastic researcher identification cards as part of their security systems, we issue a plastic card to...

  6. The "Negative" Credit Card Effect: Credit Cards as Spending-Limiting Stimuli in New Zealand

    Science.gov (United States)

    Lie, Celia; Hunt, Maree; Peters, Heather L.; Veliu, Bahrie; Harper, David

    2010-01-01

    The "credit card effect" describes a finding where greater value is given to consumer items if credit card logos are present. One explanation for the effect is that credit cards elicit spending behavior through associative learning. If this is true, social, economic and historical contexts should alter this effect. In Experiment 1, Year…

  7. Early clinical experience with CardioCard - a credit card-sized electronic patient record.

    Science.gov (United States)

    Bernheim, Alain M; Schaer, Beat A; Kaufmann, Christoph; Brunner-La Rocca, Hanspeter; Moulay-Lakhdar, Nadir; Buser, Peter T; Pfisterer, Matthias E; Osswald, Stefan

    2006-08-19

    CardioCard is a CDROM of credit card size containing medical information on cardiac patients. Patient data acquired during hospital stay are stored in PDF format and secured by a password known to patients only. In a consecutive series of patients, we assessed acceptance and utility of this new information medium. A questionnaire was sent to all patients who had received CardioCard over a one-year period. The questionnaire was returned by 392 patients (73%). 44% of patients had the card with them all the time. The majority of patients (73%) considered the CardioCard useful (8% not useful, 19% no statement) and most (78%) would even agree to bear additional costs. Only 5% worried about data security. In contrast, 44% would be concerned of data transmission via internet. During an observation period of 6 (SD 3) months, data were accessed by 27% of patients and 12% of their physicians. The proportion of card users was lower among older patients: 70 y, 16% and particularly among older women: 61.70 y, 9%; >70 y, 5%. Technical problems during data access occurred in 34%, mostly due to incorrect handling. A majority of patients considered CardioCard as useful and safe. Lack of hardware equipment or insufficient computer knowledge, but not safety issues were the most important limitations. As patients expressed concerns regarding protection of privacy if data were accessible via internet, this would remain a strong limiting factor for online use.

  8. Demonstration of holographic smart card system using the optical memory technology

    Science.gov (United States)

    Kim, JungHoi; Choi, JaeKwang; An, JunWon; Kim, Nam; Lee, KwonYeon; Jeon, SeckHee

    2003-05-01

    In this paper, we demonstrate the holographic smart card system using digital holographic memory technique that uses reference beam encrypted by the random phase mask to prevent unauthorized users from accessing the stored digital page. The input data that include document data, a picture of face, and a fingerprint for identification is encoded digitally and then coupled with the reference beam modulated by a random phase mask. Therefore, this proposed system can execute recording in the order of MB~GB and readout all personal information from just one card without any additional database system. Also, recorded digital holograms can't be reconstructed without a phase key and can't be copied by using computers, scanners, or photography.

  9. The centrality of affective instability and identity in Borderline Personality Disorder: Evidence from network analysis

    Science.gov (United States)

    Costantini, Giulio; De Panfilis, Chiara

    2017-01-01

    We argue that the series of traits characterizing Borderline Personality Disorder samples do not weigh equally. In this regard, we believe that network approaches employed recently in Personality and Psychopathology research to provide information about the differential relationships among symptoms would be useful to test our claim. To our knowledge, this approach has never been applied to personality disorders. We applied network analysis to the nine Borderline Personality Disorder traits to explore their relationships in two samples drawn from university students and clinical populations (N = 1317 and N = 96, respectively). We used the Fused Graphical Lasso, a technique that allows estimating networks from different populations separately while considering their similarities and differences. Moreover, we examined centrality indices to determine the relative importance of each symptom in each network. The general structure of the two networks was very similar in the two samples, although some differences were detected. Results indicate the centrality of mainly affective instability, identity, and effort to avoid abandonment aspects in Borderline Personality Disorder. Results are consistent with the new DSM Alternative Model for Personality Disorders. We discuss them in terms of implications for therapy. PMID:29040324

  10. Credit Cards. Bulletin No. 721. (Revised.)

    Science.gov (United States)

    Fox, Linda Kirk

    This cooperative extension bulletin provides basic information about credit cards and their use. It covers the following topics: types of credit cards (revolving credit, travel and entertainment, and debit); factors to consider when evaluating a credit card (interest rates, grace period, and annual membership fee); other credit card costs (late…

  11. Bilingualism versus identity

    DEFF Research Database (Denmark)

    Hermann, Jesper

    1988-01-01

    During the last hundred years psychologists, philosophers and theologians have developed two different conceptions of personal identity. One of them insists that each person is a unique and transcendental being, whereas the other finds the personality deriving from interaction with other persons....... (This is the prevailing view today.) These theories are placed in relation to the difficulties an immigrant encounters....

  12. Identity paradoxes

    Directory of Open Access Journals (Sweden)

    Đurić Jelena

    2010-01-01

    Full Text Available The article considers paradoxical nature of identity that emerges from: 1 the very concept of identity whose abstract generality unites various and even opposite features; 2 the processual nature of reality that is easier to express in the poetical metaphors or abstract principles than in unambiguous conceptual networks; 3 the oppose relationship between being and knowledge, mind and matter, subject and object, self and personality. Entangled in the labyrinth which evade efforts to be conceptually defined, the modern thinking of identity moves towards abandoning the idea of “self” on behalf of the “ego” and towards the misapprehension of identity as being identical. This corresponds to the “time of the lost spirit” stretched between the simultaneous need to find an identity and to give it up.

  13. Identity uncertainty and commitment making across adolescence : Five-year within-person associations using daily identity reports

    NARCIS (Netherlands)

    Becht, Andrik I.; Nelemans, Stefanie A.; Branje, Susan J. T.; Vollebergh, Wilma A. M.; Koot, Hans M.; Meeus, W.H.J.

    2017-01-01

    A central assumption of identity theory is that adolescents reconsider current identity commitments and explore identity alternatives before they make new commitments in various identity domains (Erikson, 1968; Marcia, 1966). Yet, little empirical evidence is available on how commitment and

  14. [Application of patient card technology to health care].

    Science.gov (United States)

    Sayag, E; Danon, Y L

    1995-03-15

    The potential benefits of patient card technology in improving management and delivery of health services have been explored. Patient cards can be used for numerous applications and functions: as a means of identification, as a key for an insurance payment system, and as a communication medium. Advanced card technologies allow for the storage of data on the card, creating the possibility of a comprehensive and portable patient record. There are many types of patient cards: paper or plastic cards, microfilm cards, bar-code cards, magnetic-strip cards and integrated circuit smart-cards. Choosing the right card depends on the amount of information to be stored, the degree of security required and the cost of the cards and their supporting infrastructure. Problems with patient cards are related to storage capacity, backup and data consistency, access authorization and ownership and compatibility. We think it is worth evaluating the place of patient card technology in the delivery of health services in Israel.

  15. Using Response Cards in Teacher Education--A Case Example in Taiwan

    Science.gov (United States)

    Wang, Hui-Ting

    2016-01-01

    Using response cards is one strategy to increase active student response. This approach may also satisfy a unique cultural learning need in some cultures like Taiwan where students are hesitant to speak in class. This paper provides a case example of using personal writing boards (PWBs) as an alternative response option to improve student…

  16. The Identity Politics of the Minority in Knitting the Constitutionality (The Legal review of Sunda Wiwitan Community of Cigugur, Kuningan, West Java

    Directory of Open Access Journals (Sweden)

    Sarip Sarip

    2018-02-01

    Full Text Available Abstract The Identity Politics of Sunda Wiwitan community, which nowadays is rated as a form of self-preservation to meet the economic needs of families, has been considered to get restraints from the state. The economic needs makes the identity politics as a means to save oneself. The Identification card, which is known as KTP and in which there is a religion column, has created discrimination of the identity for the Sunda Wiwitan Community (KSW. The obedience to the teachings of the ancestors is still run by the KSW but to save the economy, the status of the religion is willingly written to be recognized as other religions by the state. There is no other way to save the economic life for the sake of the family survival than to fill in the religion column with the the state-recognized religions. The situation is certainly influential for the KSW against other identities such as marriage and education cards. The discussion uses the result that comes from the interviews and some literature. Then the result becomes something ideal for KSW to save themselves in the economic field by changing the identity on the ID card. It is the way from KSW in passing the identity politics to meet the economic needs while the other side becomes the weakness of the Indonesian national law that does not provide any space for KSW in order to have equal opportunity as the Indonesian citizen.   Keywords: The Identity Politics, KSW, Constitutionality.

  17. Follow Up: Credit Card Caution

    Science.gov (United States)

    Cahill, Timothy P.

    2007-01-01

    In "Pushing Plastic," ("The New England Journal of Higher Education", Summer 2007), John Humphrey notes that many college administrators justify their credit card solicitations by suggesting that credit card access will help students learn to manage their own finances. Instead, credit card debt will teach thousands of students…

  18. Digitizing Olin Eggen's Card Database

    Science.gov (United States)

    Crast, J.; Silvis, G.

    2017-06-01

    The goal of the Eggen Card Database Project is to recover as many of the photometric observations from Olin Eggen's Card Database as possible and preserve these observations, in digital forms that are accessible by anyone. Any observations of interest to the AAVSO will be added to the AAVSO International Database (AID). Given to the AAVSO on long-term loan by the Cerro Tololo Inter-American Observatory, the database is a collection of over 78,000 index cards holding all Eggen's observations made between 1960 and 1990. The cards were electronically scanned and the resulting 108,000 card images have been published as a series of 2,216 PDF files, which are available from the AAVSO web site. The same images are also stored in an AAVSO online database where they are indexed by star name and card content. These images can be viewed using the eggen card portal online tool. Eggen made observations using filter bands from five different photometric systems. He documented these observations using 15 different data recording formats. Each format represents a combination of filter magnitudes and color indexes. These observations are being transcribed onto spreadsheets, from which observations of value to the AAVSO are added to the AID. A total of 506 U, B, V, R, and I observations were added to the AID for the variable stars S Car and l Car. We would like the reader to search through the card database using the eggen card portal for stars of particular interest. If such stars are found and retrieval of the observations is desired, e-mail the authors, and we will be happy to help retrieve those data for the reader.

  19. Mammography screening credit card and compliance.

    Science.gov (United States)

    Schapira, D V; Kumar, N B; Clark, R A; Yag, C

    1992-07-15

    Screening for breast cancer using mammography has been shown to be effective in reducing mortality from breast cancer. The authors attempted to determine if use of a wallet-size plastic screening "credit" card would increase participants' compliance for subsequent mammograms when compared with traditional methods of increasing compliance. Two hundred and twenty consecutive women, ages 40-70 years, undergoing their first screening mammography were recruited and assigned randomly to four groups receiving (1) a reminder plastic credit card (2) reminder credit card with written reminder; (3) appointment card; and (4) verbal recommendation. Return rates of the four groups were determined after 15 months. The return rate for subsequent mammograms was significantly higher for participants (72.4%) using the credit card than for participants (39.8%) exposed to traditional encouragement/reminders (P less than 0.0001). The credit card was designed to show the participant's screening anniversary, and the durability of the card may have been a factor in increasing the return rate. The use of reminder credit cards may increase compliance for periodic screening examinations for other cancers and other chronic diseases.

  20. BHI Purchase Card System user's guide

    International Nuclear Information System (INIS)

    Mehden, P. von der.

    1996-04-01

    The purpose of the purchase card system (P-Card System) is to apply enhanced acquisition tools for increased return on ERC internal resources, and to reduce the cost of off-the-shelf commercial items through the use of credit cards by authorized personnel. The P-Card may be used to make transactions either over the counter, by mail, or via telephone. For Project employees, the P-Card provides and easier, direct method of acquisition that requires less process time than requisitioning. The P-C eliminates the involvement of the procurement organization in low value-added acquisitions and low-risk transactions. Controller reduces the expenditure of resources in the support of low dollar value products and services acquisition. The P- Card System has been initiated in agreement with American Express Travel Related Services, Inc.; the credit card is and American Express Corporate Purchasing Card. The integrated network application for cardholder reconciliation and reallocation of costs was originally government furnished software developed by the U.S. DOE. Currently, the software application (version 3.0 and beyond) is copyrighted by a Bechtel Hanford, Inc. subcontractor

  1. UTILIZAÇÃO DE JAVA CARD COMO PLATAFORMA PARA O DESENVOLVIMENTO DE APLICAÇÕES EM SMART CARD.

    Directory of Open Access Journals (Sweden)

    Lucas Plis Dolce

    2011-12-01

    Full Text Available With the growth of Java Card technology and the increased use of smart cards in the market, demand for the development of applications that run on the cards has risen. These applications need to offerbesides portability, convenience and safety, service quality and high availability for users. This article examines the main concepts of Smart Card technology and use these to develop small applicationsusing the Java Card focusing on the use for control systems where the card would serve as a repository of some data and query tool for larger systems.

  2. Fashioning Identity

    DEFF Research Database (Denmark)

    Mackinney-Valentin, Maria

    We dress to communicate who we are, or who we would like others to think we are, telling seductive fashion narratives through our adornment. Yet, today, fashion has been democratized through high-low collaborations, social media and real-time fashion mediation, complicating the basic dynamic...... of identity displays, and creating tension between personal statements and social performances. Fashioning Identity explores how this tension is performed through fashion production and consumption,by examining a diverse series of case studies - from ninety-year old fashion icons to the paradoxical rebellion...... by readdressing Fred Davis' seminal concept of 'identity ambivalence' in Fashion, Culture and Identity (1992), Mackinney-Valentin argues that we are in an epoch of 'status ambivalence', in which fashioning one's own identity has become increasingly complicated....

  3. Comparative Study of the New Colorimetric VITEK 2 Yeast Identification Card versus the Older Fluorometric Card and of CHROMagar Candida as a Source Medium with the New Card

    OpenAIRE

    Aubertine, C. L.; Rivera, M.; Rohan, S. M.; Larone, D. H.

    2006-01-01

    The new VITEK 2 colorimetric card was compared to the previous fluorometric card for identification of yeast. API 20C was considered the “gold standard.” The new card consistently performed better than the older card. Isolates from CHROMagar Candida plates were identified equally as well as those from Sabouraud dextrose agar.

  4. The c-cards game

    DEFF Research Database (Denmark)

    Valente, Andrea

    2005-01-01

    C-cards are an easy-to-reify, graphical formalism capable of expressing computational systems, discrete both in time and in space. The main goal of the project aims at scaling-down the learning complexity of Computer Science core contents. We argue that our cards present many dimensions...... of flexibility, resulting in a highly customizable learning object, that gives teachers and pedagogues freedom with respect to reification and deployment strategies. The correlation between the c-cards game and children's soft skills is also discussed....

  5. Clearing and settlement of interbank card transactions: a MasterCard tutorial for Federal Reserve payments analysts

    OpenAIRE

    Susan Herbst-Murphy

    2013-01-01

    The Payment Cards Center organized a meeting at which senior officials from MasterCard shared information with Federal Reserve System payments analysts about the clearing and settlement functions that MasterCard performs for its client banks. These functions involve the transfer of information pertaining to card-based transactions (clearing) and the exchange of monetary value (settlement) that takes place between the banks whose customers are cardholders and those banks whose customers are ca...

  6. Assessment of identity development and identity diffusion in adolescence - Theoretical basis and psychometric properties of the self-report questionnaire AIDA.

    Science.gov (United States)

    Goth, Kirstin; Foelsch, Pamela; Schlüter-Müller, Susanne; Birkhölzer, Marc; Jung, Emanuel; Pick, Oliver; Schmeck, Klaus

    2012-07-19

    In the continuing revision of Diagnostic and Statistical Manual (DSM-V) "identity" is integrated as a central diagnostic criterion for personality disorders (self-related personality functioning). According to Kernberg, identity diffusion is one of the core elements of borderline personality organization. As there is no elaborated self-rating inventory to assess identity development in healthy and disturbed adolescents, we developed the AIDA (Assessment of Identity Development in Adolescence) questionnaire to assess this complex dimension, varying from "Identity Integration" to "Identity Diffusion", in a broad and substructured way and evaluated its psychometric properties in a mixed school and clinical sample. Test construction was deductive, referring to psychodynamic as well as social-cognitive theories, and led to a special item pool, with consideration for clarity and ease of comprehension. Participants were 305 students aged 12-18 attending a public school and 52 adolescent psychiatric inpatients and outpatients with diagnoses of personality disorders (N = 20) or other mental disorders (N = 32). Convergent validity was evaluated by covariations with personality development (JTCI 12-18 R scales), criterion validity by differences in identity development (AIDA scales) between patients and controls. AIDA showed excellent total score (Diffusion: α = .94), scale (Discontinuity: α = .86; Incoherence: α = .92) and subscale (α = .73-.86) reliabilities. High levels of Discontinuity and Incoherence were associated with low levels in Self Directedness, an indicator of maladaptive personality functioning. Both AIDA scales were significantly different between PD-patients and controls with remarkable effect sizes (d) of 2.17 and 1.94 standard deviations. AIDA is a reliable and valid instrument to assess normal and disturbed identity in adolescents. Studies for further validation and for obtaining population norms are in progress and may provide

  7. Store Security. Credit Card Fraud.

    Science.gov (United States)

    Brockway, Jerry

    The manual, intended for use by adults and not in the high school classroom situation, presents material directed toward assisting in the reduction of credit card crime. This teaching guide is organized in three sections which deal with the nature of and major reasons for credit card fraud, the types of hot card runners, and methods of reducing…

  8. Professional identity of civil servants as a scientific problem

    Directory of Open Access Journals (Sweden)

    Nataliia Anatoliivna Lypovska

    2013-11-01

    Full Text Available The article examines the concept of «professional identity» and its importance for the analysis of the professionalization of the civil servants. The basic concepts such as “profession”, “professionalism” (“professional development”, “professional competence”, and their relationship are concerned. Relevance of the research is due to the fact that professional identity acts as an internal source of professional development and personal growth of any business entity, and the question of the development of professional identity is included into the total range of problems of any professional. Stages of professional identity are grounded. The paper concludes that professional identity is an integration concept, which expresses the relationship of personal characteristics that provide guidance in the world of professions and allows a person more fully realize his personal potential careers, as well as to predict the consequences of professional choice. Professional identity performs of transforming and stabilizing functions. Therefore professional identity serves like a kind of regulator for a profession.

  9. Smart Card

    Directory of Open Access Journals (Sweden)

    Floarea NASTASE

    2006-01-01

    Full Text Available Reforms in electronic business have presented new opportunities to use smart card technology as an enabling tool. The network-centric applications, where resources are located throughout the Internet and access to them is possible from any location, require authenticated access and secured transactions. Smart cards represent an ideal solution: they offers an additional layer of electronic security and information assurance for user authentication, confidentiality, non-repudiation, information integrity, physical access control to facilities, and logical access control to an computer systems.

  10. The European Commission's Decision in MasterCard : Issues Facing the Payment Card Industry for the Future

    OpenAIRE

    John Wotton

    2008-01-01

    The Decision in MasterCard displays a fundamental divergence between the Commission’s and MasterCard’s approaches to the analysis of the competitive effects of open payment card schemes.

  11. Hoarding and community in Star Wars Card Trader

    Directory of Open Access Journals (Sweden)

    Jeremy Groskopf

    2016-09-01

    Full Text Available Transitioning collectibles from the physical to the digital sphere changes the culture of collecting by increasing the accessibility of trading partners and adding digital limitations on personal interaction. In this analysis, I examine the collecting game Star Wars Card Trader (2015 and its culture of mass hoarding—the collecting of vast quantities of a single, valueless digital object—through which players reintroduce elements of personality, camaraderie, and nonrivalrous collecting into a system designed primarily for anonymous profitable acquisition. Via an analysis of player behaviors both within the game itself and in online venues, I argue that mass hoarding—a user invention—acts as the central community-building behavior in this digital realm. Mass hoarding is thus a clear indication that even in the digital realm, human personalities and relationships are vital to the construction of collecting as a pastime that is more complex than an investment opportunity.

  12. Implementing Smart Cards into the Air Force Reserve

    National Research Council Canada - National Science Library

    McClannan, Keith

    2002-01-01

    Smart card technology is essentially about a credit card with a brain, Smart cards have an embedded microchip that allows the card to hold digital data up to the available memory installed on the card...

  13. Implementing Smart Cards into the Air Force Reserve

    National Research Council Canada - National Science Library

    McClannan, Keith

    2001-01-01

    Smart card technology is essentially about a credit card with a brain. Smart cards have an embedded microchip that allows the card to hold digital data up to the available memory installed on the card...

  14. The Supermalt identity

    DEFF Research Database (Denmark)

    Bech-Larsen, Tino; Esbjerg, Lars; Grunert, Klaus G.

    2007-01-01

    on consumers' self-identities. The second part explored the role of food and beverage products in the construction of self-identities. The final part focused on the construction of brand identity for Supermalt. Findings - The article provides information on the self-identities constructed by Afro......-Caribbean informants. The food and beverage consumption of informants reflects their mixed cultural identity. The brand identity Supermalt appears to be malleable, with ample room for consumer co-construction. Perceptions of brand identity differ markedly among informants, who are all able to construct Supermalt......Purpose - The objective of this article is to conduct a case study of the Supermalt brand of malt beer, which has become the preferred beverage of Afro-Caribbean consumers in Brixton on a very limited marketing budget. Design/methodology/approach - The article uses the concepts of personal identity...

  15. Applying new thinking from the linked and emerging fields of digital identity and privacy to information governance in health informatics

    Directory of Open Access Journals (Sweden)

    John Harrison

    2003-12-01

    Full Text Available Recent work in the emerging field of network or digital identity suggests a new approach to the design of informatics systems, in which the individual becomes the guardian of their own personal data, and is assisted in controlling access to it by an infrastructure that is aware of roles, such as 'doctor', and relationships, such as 'doctor_patient'. For these purposes, an 'identity' is defined as the history of a relationship between two entities, and thus encompasses not only name and address but also data that would usually be regarded as part of an electronic patient or health record. This paper presents a description of how such a true person-centric architecture might work, and shows how it can be seen as an evolution of current plans in the NHS for a national patient data spine. One application, the electronic transmission of prescriptions, is described in detail. Other applications, both within and without the healthcare field, are described in outline. The implementation of such a person-centric system requires a modest degree of technical innovation, but significant change in organisational and business models. It is suggested that there is a need for one or more not-for-profit trusts, each with a remit to act as host for an individual's digital identity, and as the individual's true agent. Service providers - such as healthcare organisations - will pay the trust for provision of authentication, and for the storage and transmission of a patient's data; the trust in turn will pay implementation partners, such as smart card issuers and providers of communication channels, acting on behalf of the individual.

  16. Applying new thinking from the linked and emerging fields of digital identity and privacy to information governance in health informatics.

    Science.gov (United States)

    Harrison, John; Booth, Nick

    2003-01-01

    Recent work in the emerging field of network or digital identity suggests a new approach to the design of informatics systems, in which the individual becomes the guardian of their own personal data, and is assisted in controlling access to it by an infrastructure that is aware of roles, such as 'doctor', and relationships, such as 'doctor-patient'.For these purposes, an 'identity' is defined as the history of a relationship between two entities, and thus encompasses not only name and address but also data that would usually be regarded as part of an electronic patient or health record. This paper presents a description of how such a true person-centric architecture might work, and shows how it can be seen as an evolution of current plans in the NHS for a national patient data spine. One application, the electronic transmission of prescriptions, is described in detail. Other applications, both within and without the healthcare field, are described in outline. The implementation of such a person-centric system requires a modest degree of technical innovation, but significant change in organisational and business models. It is suggested that there is a need for one or more not-for-profit trusts, each with a remit to act as host for an individual's digital identity, and as the individual's true agent. Service providers - such as healthcare organisations - will pay the trust for provision of authentication, and for the storage and transmission of a patient's data; the trust in turn will pay implementation partners, such as smart card issuers and providers of communication channels, acting on behalf of the individual.

  17. I am remix your web identity

    CERN Document Server

    Sordi, Paolo

    2015-01-01

    I Am: Remix Your Web Identity explores methods of designing and developing a personal website with RSS feeds that aggregate blog posts along with posts on social networks, such as Flickr, YouTube, Goodreads, Last.fm, and Delicious, in order to regain control and ownership (as well as authorship) of one's identity in one consistent and customized location. The book provides a short overview of the evolution of digital identity and the transformation of personal websites from Geocities to blogs...

  18. A Projector-Camera System for Augmented Card Playing and a Case Study with the Pelmanism Game

    Directory of Open Access Journals (Sweden)

    Nozomu Tanaka

    2017-05-01

    Full Text Available In this article, we propose a system for augmented card playing with a projector and a camera to add playfulness and increase communication among players of a traditional card game. The functionalities were derived on the basis of a user survey session with actual players. Playing cards are recognized using a video camera on the basis of a template matching without any artificial marker with an accuracy of > 0.96. Players are also tracked to provide person-dependent services using a video camera from the direction of their hands appearing over a table. These functions are provided as an API; therefore, the user of our system, i.e., a developer, can easily augment playing card games. The Pelmanism game was augmented on top of the system to validate the concept of augmentation. The results showed the feasibility of the system’s performance in an actual environment and the potential of enhancing playfulness and communication among players.

  19. Helping Students Design HyperCard Stacks.

    Science.gov (United States)

    Dunham, Ken

    1995-01-01

    Discusses how to teach students to design HyperCard stacks. Highlights include introducing HyperCard, developing storyboards, introducing design concepts and scripts, presenting stacks, evaluating storyboards, and continuing projects. A sidebar presents a HyperCard stack evaluation form. (AEF)

  20. Main components of business cards design

    Directory of Open Access Journals (Sweden)

    Ю. В. Романенкова

    2003-03-01

    Full Text Available The essay is dedicated to the urgent problem of necessity of creation of professional design of business cards, that are important part of the image of modem businessman. There are classification of cards by functional principle, the functions of cards of each type were analyzed. All components of business card, variants of its composition schemes, color characteristics, principles of use of trade marks and other design elements have been allocated

  1. Engineering software development with HyperCard

    Science.gov (United States)

    Darko, Robert J.

    1990-01-01

    The successful and unsuccessful techniques used in the development of software using HyperCard are described. The viability of the HyperCard for engineering is evaluated and the future use of HyperCard by this particular group of developers is discussed.

  2. A House of Cards.

    Science.gov (United States)

    Kennedy, Mike

    2000-01-01

    Reviews how technologically enhanced ID cards are helping colleges and universities keep their students and staff safe. The benefits of a one-card system for identification, building access, and financial transactions are highlighted as are the liberal use of security phones and security cameras. (GR)

  3. C-cards in Music Education

    DEFF Research Database (Denmark)

    Valente, Andrea; Lyon, Kirstin Catherine

    2005-01-01

    Music and Computer Science share a dual nature: theory and practice relate in complex ways, and seem to be equally central for learners; for this no standard teaching approach for children has yet emerged in either of these two areas. Computational cards is a tabletop game, where cards act...... of the card; if the action is to generate a sound, then the circuit will effectively became a music machine....

  4. 77 FR 2613 - Registration of Swap Dealers and Major Swap Participants

    Science.gov (United States)

    2012-01-19

    ... natural person who is a principal of an applicant for registration to file a fingerprint card. The... and text identical to that which existed prior to this unintentional deletion. The Commission also... apply for registration must file a Form 7-R, and a Form 8-R and fingerprint card for each principal of...

  5. [Smart cards in health services].

    Science.gov (United States)

    Rienhoff, O

    2001-10-01

    Since the early 1980-ties it has been tried to utilise smart cards in health care. All industrialised countries participated in those efforts. The most sustainable analyses took place in Europe--specifically in the United Kingdom, France, and Germany. The first systems installed (the service access cards in F and G, the Health Professional Card in F) are already conceptionally outdated today. The senior understanding of the great importance of smart cards for security of electronic communication in health care does contrast to a hesitating behaviour of the key players in health care and health politics in Germany. There are clear hints that this may relate to the low informatics knowledge of current senior management.

  6. RENEWAL OF SWISS LEGITIMATION CARDS

    CERN Multimedia

    Division des Ressources Humaines; Human Resources Division; Tel. 79494-74683

    2000-01-01

    Members of the personnel, holders of SWISS LEGITIMATION CARDS due to expire during the year 2000, need to change them. Those concerned should bring: - a recent passport photo (with NAME and first name on the back) - the expired (or due to expire) card and a recto-verso photocopy on A4 size paper (for certified authentication) to: Bureau des cartes, bldg 33.1-009/1-011. HR Division will notify members of personnel as soon as the new cards are available.Be careful: if you are in possession of expired cards (Swiss or French), or if you present non-certified copies, the Organisation will not take any responsibility in case of difficulties with the customs authorities or the police.

  7. Stream processing health card application.

    Science.gov (United States)

    Polat, Seda; Gündem, Taflan Imre

    2012-10-01

    In this paper, we propose a data stream management system embedded to a smart card for handling and storing user specific summaries of streaming data coming from medical sensor measurements and/or other medical measurements. The data stream management system that we propose for a health card can handle the stream data rates of commonly known medical devices and sensors. It incorporates a type of context awareness feature that acts according to user specific information. The proposed system is cheap and provides security for private data by enhancing the capabilities of smart health cards. The stream data management system is tested on a real smart card using both synthetic and real data.

  8. Survivorship and discourses of identity.

    Science.gov (United States)

    Little, Miles; Paul, Kim; Jordens, Christopher F C; Sayers, Emma-Jane

    2002-01-01

    Personal identity is self-evidently important to us all. Identity is a philosophically complex subject, but there is some agreement that memory, embodiment and continuity are essential components. The sense of memory includes 'future memory', the kind of memory we would like to construct for ourselves as our lives proceed. While the sense of personal identity is internal to the individual, a sense of that person's identity exists in the minds of others. Extreme experiences threaten the element of continuity, because they may bring bodily changes as well as cognitive changes that challenge central values. Restoring or preserving continuity is a major task for survivors. The ways in which people experience discontinuity because of cancer illness, and the ways in which they manage this experience emerges from the narratives of the survivors of cancer and in the narratives of health care workers who look after them. People manage discontinuity by reference to stable 'anchor points' in their beliefs and values; by re-constructing versions of their pre-experience identities, drawing on past memory and finding ways to preserve a continuity between past memory, present experience and constructions of the future; by using the experience to develop established facets of identity; and by imbuing the experience with meaning and recognising the enlarged identity made possible by survival. Those who cannot achieve a sense of continuity may feel alienated from themselves, their friends and family. All these methods of management may be used by one person to negotiate the post-experience identity in its different social interactions. The experience of the survivor can be further understood by recognising the challenge posed by extreme experience to the sense of continuity of both embodied self and memory. A satisfactory discourse of survival has yet to enter the public domain. This lack adds to the burdens of survivors, including those who have survived cancer. Copyright 2002 John

  9. Circuit card failures and industry mitigation strategy

    Energy Technology Data Exchange (ETDEWEB)

    Mondal, U. [Candu Owners Group, Toronto, Ontario (Canada)

    2012-07-01

    In recent years the nuclear industry has experienced an increase in circuit card failures due to ageing of components, inadequate Preventive Maintenance (PM), lack of effective circuit card health monitoring, etc. Circuit card failures have caused loss of critical equipment, e.g., electro hydraulic governors, Safety Systems, resulting in loss of function and in some cases loss of generation. INPO completed a root cause analysis of 40 Reactor Trips/Scrams in US reactors and has recommended several actions to mitigate Circuit Card failures. Obsolescence of discrete components has posed many challenges in conducting effective preventative maintenance on circuit cards. In many cases, repairs have resulted in installation of components that compromise performance of the circuit cards. Improper termination and worn edge connectors have caused intermittent contacts contributing to circuit card failures. Traditionally, little attention is paid to relay functions and preventative maintenance of relay. Relays contribute significantly to circuit card failures and have dominated loss of generation across the power industry. The INPO study recommended a number of actions to mitigate circuit card failures, such as; identification of critical components and single point vulnerabilities; strategic preventative maintenance; protection of circuit boards against electrostatic discharge; limiting power cycles; performing an effective burn-in prior to commissioning of the circuit cards; monitoring performance of DC power supplies; limiting cabinet temperatures; managing of component aging/degradation mechanism, etc. A subcommittee has been set up under INPO sponsorship to understand the causes of circuit card failure and to develop an effective mitigation strategy. (author)

  10. A smart-card-enabled privacy preserving E-prescription system.

    Science.gov (United States)

    Yang, Yanjiang; Han, Xiaoxi; Bao, Feng; Deng, Robert H

    2004-03-01

    Within the overall context of protection of health care information, privacy of prescription data needs special treatment. First, the involvement of diverse parties, especially nonmedical parties in the process of drug prescription complicates the protection of prescription data. Second, both patients and doctors have privacy stakes in prescription, and their privacy should be equally protected. Third, the following facts determine that prescription should not be processed in a truly anonymous manner: certain involved parties conduct useful research on the basis of aggregation of prescription data that are linkable with respect to either the patients or the doctors; prescription data has to be identifiable in some extreme circumstances, e.g., under the court order for inspection and assign liability. In this paper, we propose an e-prescription system to address issues pertaining to the privacy protection in the process of drug prescription. In our system, patients' smart cards play an important role. For one thing, the smart cards are implemented to be portable repositories carrying up-to-date personal medical records and insurance information, providing doctors instant data access crucial to the process of diagnosis and prescription. For the other, with the secret signing key being stored inside, the smart card enables the patient to sign electronically the prescription pad, declaring his acceptance of the prescription. To make the system more realistic, we identify the needs for a patient to delegate his signing capability to other people so as to protect the privacy of information housed on his card. A strong proxy signature scheme achieving technologically mutual agreements on the delegation is proposed to implement the delegation functionality.

  11. Development and Validation of a Q-Sort Measure of Identity Processing Style: The Identity Processing Style Q-Sort

    Science.gov (United States)

    Pittman, Joe F.; Kerpelman, Jennifer L.; Lamke, Leanne K.; Sollie, Donna L.

    2009-01-01

    Identity styles represent strategies individuals use to explore identity-related issues. Berzonsky (Berzonsky, M. D. (1992). Identity style and coping strategies. "Journal of Personality, 60", 771-788) identified three styles: informational, normative, and diffuse. In three studies, this paper presents (a) the identity processing style Q-sort…

  12. Analysis of Transaction Authorization for Credit Card Master Card Holders

    OpenAIRE

    Alam Surawijaya; Elly Agustina. Skom, Elly Agustina. Skom

    1998-01-01

    The credit card is a kind of payment in lieu of cash has a bright prospect in the future,because with the risk of carrying cash large enough in terms of both security and theamount of cash required at certain moments.With so many banks are Mastercard credit card issuer, then Mastercard create acommunication network that is designed to serve all requests authorization from eachmember. Some of the benefits gained from the existence of this system are rapidlyincreasing the authorization process ...

  13. Exploring Japanese university English teachers' professional identity

    CERN Document Server

    Nagatomo, Diane Hawley

    2012-01-01

    This book examines the professional identities of Japanese university English teachers. It focuses on how relatively new teachers develop their professional identities, how gender impacts the professional identities of female professors, and how teaching practices and beliefs reflect personal and professional identity.

  14. GETTING PERSONAL: ETHICS AND IDENTITY IN GLOBAL HEALTH RESEARCH

    Science.gov (United States)

    Simon, Christian; Mosavel, Maghboeba

    2011-01-01

    ‘Researcher identity’ affects global health research in profound and complex ways. Anthropologists in particular have led the way in portraying the multiple, and sometimes tension-generating, identities that researchers ascribe to themselves, or have ascribed to them, in their places of research. However, the central importance of researcher identity in the ethical conduct of global health research has yet to be fully appreciated. The capacity of researchers to respond effectively to the ethical tensions surrounding their identities is hampered by lack of conceptual clarity, as to the nature and scope of the issues involved. This paper strives to provide some clarification of these ethical tensions by considering researcher identity from the perspective of (1) Guillemin and Heggen’s (2009) key distinction between procedural ethics and ethics in practice, and (2) our own distinction between perceptions of identity that are either symmetrical or asymmetrical, with the potential to shift research relationships toward greater or lesser ethical harmony. Discussion of these concepts is supported with ethnographic examples from relevant literature and from our own (United States (US) Government-funded) research in South Africa. A preliminary set of recommendations is provided in an effort to equip researchers with a greater sense of organization and control over the ethics of researcher identity. The paper concludes that the complex construction of researcher identity needs to be central among the ethical concerns of global health researchers, and that the conceptual tools discussed in the paper are a useful starting point for better organizing and acting on these ethical concerns. PMID:21426482

  15. Payment card rewards programs and consumer payment choice

    OpenAIRE

    Andrew Ching; Fumiko Hayashi

    2006-01-01

    Card payments have been growing very rapidly. To continue the growth, payment card networks keep adding new merchants and card issuers try to stimulate their existing customers’ card usage by providing rewards. This paper seeks to analyze the effects of payment card rewards programs on consumer payment choice, by using consumer survey data. Specifically, we examine whether credit/debit reward receivers use credit/debit cards relatively more often than other consumers, if so how much more ofte...

  16. Anonymous Authentication for Smartcards

    Directory of Open Access Journals (Sweden)

    J. Hajny

    2010-06-01

    Full Text Available The paper presents an innovative solution in the field of RFID (Radio-Frequency IDentification smartcard authentication. Currently the smartcards are used for many purposes - e.g. employee identification, library cards, student cards or even identity credentials. Personal identity is revealed to untrustworthy entities every time we use these cards. Such information could later be used without our knowledge and for harmful reasons like shopping pattern scanning or even movement tracking. We present a communication scheme for keeping one’s identity private in this paper. Although our system provides anonymity, it does not allow users to abuse this feature. The system is based on strong cryptographic primitives that provide features never available before. Besides theoretical design of the anonymous authentication scheme and its analysis we also provide implementation results.

  17. RENEWAL OF SWISS LEGITIMATION CARDS

    CERN Multimedia

    Division des Ressources Humaines; Human Resources Division; Tel. 79494-74683

    2000-01-01

    Members of the personnel, holders of SWISS LEGITIMATION CARDS due to expire during the year 2000, need to change them. Those concerned should bring : a recent passport photo (with NAME and first name on the back) the expired (or due to expire) card and a recto-verso photocopy on A4 size paper (for certified authentication)to: Bureau des cartes, Bât 33.1-009/1-011. Members of personnel will be notified by HR Division as soon as the new cards are available. Be careful: if you are in possession of expired cards (Swiss or French), or if you present non-certified copies, the Organization will not take any responsibility in case of difficulties with the customs authorities or the police.

  18. RENEWAL OF SWISS LEGITIMATION CARDS

    CERN Multimedia

    Human Resources Division; Human Resources Division; Tel. 79494-74683

    2000-01-01

    Members of the personnel, holders of SWISS LEGITIMATION CARDS due to expire during the year 2000, need to change them. Those concerned should bring: ­ a recent passport photo (with NAME and first name on the back) ­ the expired (or due to expire) card and a recto-verso photocopy on A4 size paper (for certified authentication) to: Bureau des cartes, Bât 33.1-009/1-011 Members of the personnel will be notified by HR Division as soon as the new cards are available. Be careful: if you are in possession of expired cards (Swiss or French), or if you present non-certified copies, the Organization will not take any responsability in case of difficulties with the customs authorities or the police.

  19. RENEWAL OF SWISS LEGITIMATION CARDS

    CERN Multimedia

    Division des Ressources Humaines; Human Resources Division; Tel. 79494-74683

    2000-01-01

    Members of the personnel, holders of SWISS LEGITIMATION CARDS due to expire during the year 2000, need to change them. Those concerned should bring : - a recent passport photo (with NAME and first name on the back) - the expired (or due to expire) card and a recto-verso photocopy on A4 size paper (for certified authentication) to: Bureau des cartes, bât 33.1-009/1-011. HR Division will notify members of personnel as soon as the new cards are available. Be careful: if you are in possession of expired cards (Swiss or French), or if you present non-certified copies, the Organization will not take any responsibility in case of difficulties with the customs authorities or the police.

  20. Identity at work: Exploring strategies for Identity Work

    Directory of Open Access Journals (Sweden)

    Byron G. Adams

    2012-09-01

    Research purpose: The main aim of this study was to explore employee narratives and identify the strategies available to them in the process of identity work, as they defined themselves at work. Motivation for the study: As there is a scarcity of research on identity work in South Africa, this study wanted to advance knowledge about identity work and the strategies used for regulating and negotiating an identity at work by exploring these constructs in this context. Research design, approach and method: A qualitative research process formed the basis for this study. Nineteen employees from a global manufacturing company participated in two semi-structured in-depth interviews. Grounded theory was applied to analyse and interpret the data. Main findings: Nine strategies for identity work were identified and categorised into four broad themes (personal philosophies; relationships; career management and negotiating balance. Practical/managerial implications: Employees followed various strategies for defining themselves at work and this may have some implications for employee work engagement and productivity. Contribution/value-add: This study expands on current theoretical knowledge of identity work, and provides insights into the strategies people use to regulate and negotiate their identities at work.

  1. An acuity cards cookbook.

    Science.gov (United States)

    Vital-Durand, F

    1996-01-01

    Acuity cards are being more commonly used in clinical and screening practice. The author describes his experience from over 6000 infants tested with the method, using two commercially available sets of cards to provide users with comprehensive guidelines to allow them to get the most out of this useful test.

  2. Optimal Experience and Optimal Identity: A Multinational Study of the Associations Between Flow and Social Identity.

    Science.gov (United States)

    Mao, Yanhui; Roberts, Scott; Pagliaro, Stefano; Csikszentmihalyi, Mihaly; Bonaiuto, Marino

    2016-01-01

    Eudaimonistic identity theory posits a link between activity and identity, where a self-defining activity promotes the strength of a person's identity. An activity engaged in with high enjoyment, full involvement, and high concentration can facilitate the subjective experience of flow. In the present paper, we hypothesized in accordance with the theory of psychological selection that beyond the promotion of individual development and complexity at the personal level, the relationship between flow and identity at the social level is also positive through participation in self-defining activities. Three different samples (i.e., American, Chinese, and Spanish) filled in measures for flow and social identity, with reference to four previously self-reported activities, characterized by four different combinations of skills (low vs. high) and challenges (low vs. high). Findings indicated that flow was positively associated with social identity across each of the above samples, regardless of participants' gender and age. The results have implications for increasing social identity via participation in self-defining group activities that could facilitate flow.

  3. OPINIONS AND ATTITUDES OF PARENTS AND STUDENTS FOR SEXUAL DEVELOPMENT, SEXUAL BEHAVIOR AND GENDER IDENTITY OF PERSONS WITH AUTISM IN THE REPUBLIC OF MACEDONIA

    Directory of Open Access Journals (Sweden)

    Bisera MLADENOVSKA

    2010-04-01

    Full Text Available Persons with autism can experience severe issues during the puberty and adolescence resulting from the changes that occur in their body. People with autism are sexual beings. They have sexual needs and desires as other people. Sexual development is part of the overall development of their personality.The main objective of this research was to present sexual development, sexual behavior, and sexual identity among persons with autism. Furthermore, we determined the views and opinions of the parents and students, special educators and rehabilitators, about children with autism. Basic tasks of this research were: to determine whether persons with autism have a clear picture and concept of their sexuality, whether the parents discuss this topic with their children, whether and how persons with autism know what sex is, what is contraception, unwanted pregnancy, sexually transmitted diseases or intimate parts of the body, whether they show some kind of sexual behavior, and whether the parents and students should be educated regarding the sexual development, behavior, and sexual identity of persons with autism.The survey was conducted over a period of almost 3 months, which included 94 respondents.Obtained data was collected, grouped, tabled, and processed with the standard statistical program Microsoft Office Excel 2003, applying χ2 tests and Fisher's Еxact test. Statistical important difference was at the level of p<0.05.From the analysis and interpretation of the results, we can conclude that in Macedonian families and schools there is a very small extent or no existence of communication between the parents and professionals with persons with autism about sexual development, sexual behavior, and sexual identity. Persons with autism have very little or no general knowledge about sexuality.

  4. Governance, Issuance Restrictions, And Competition In Payment Card Networks

    OpenAIRE

    Robert S. Pindyck

    2007-01-01

    I discuss the antitrust suit brought by the U.S. Department of Justice against Visa and MasterCard in 1998. Banks that issue Visa cards are free to also issue MasterCard cards, and vice versa, and many banks issue the cards of both networks. However, both Visa and MasterCard had rules prohibiting member banks from also issuing the cards of other networks, in particular American Express and Discover. In addition, most banks are members of both the Visa and MasterCard networks, so governance is...

  5. Differences in personality traits between male-to-female and female-to-male gender identity disorder subjects.

    Science.gov (United States)

    Miyajima, Eiichi; Taira, Naoki; Koda, Munenaga; Kondo, Tsuyoshi

    2014-12-15

    The present study aimed to investigate differences in personality traits among male-to-female (MtF), female-to-male (FtM) gender identity disorder (GID) subjects and non-transsexual male (M) and female (F) controls. Subjects were 72 MtF and 187 FtM GID subjects without psychiatric comorbidities together with 184 male and 159 female non-transsexual controls. Personality traits were assessed using a short version of the Temperament and Character Inventory (TCI-125). Group comparisons were made by two-way ANOVA. Statistical significances were observed as follows: 1) lower novelty seeking in FtM than in M or MtF, 2) higher reward dependence in FtM than in M, 3) higher cooperativeness in FtM than in M or MtF, 4) the highest self-transcendence in MtF among all the groups. The highest self-transcendence in MtF subjects may reflect their vulnerable identity and constrained adaptation to society as the minority. Nevertheless, higher reward dependence and cooperativeness in FtM subjects can be related to more determined motivation for the treatments of GID and might promise better social functioning and adjustment than MtF subjects. Copyright © 2014 Elsevier Ireland Ltd. All rights reserved.

  6. 'I am not a depressed person': how identity conflict affects help-seeking rates for major depressive disorder.

    Science.gov (United States)

    Farmer, Caroline; Farrand, Paul; O'Mahen, Heather

    2012-10-02

    There is a significant treatment gap for patients with depression. A third of sufferers never seek help, and the vast majority of those who do only do so after considerable delay. Little is understood regarding poor help-seeking rates amongst people with depression, with existing research mainly focussed on the impact of barriers to treatment. The current study explored psychological factors affecting help-seeking behaviour in clinically depressed individuals. Semi-structured interviews were conducted with 20 current or previously clinically depressed participants who either had or had not sought professional help. Thematic analysis was used to analyse results. The onset of depressive symptoms created conflict with participants' identity and personal goals. Delays in seeking help were primarily attributed to the desire to protect identity and goals from the threat of depressive symptoms. Participants used avoidance strategies to reduce the perceived threat of depressive symptoms on identity. These strategies interfered with help-seeking. Help-seeking was only undertaken once participants reached a point of acceptance and began to make concessions in their identity and goals, at which time they reduced their use of avoidance. Difficulties resolving conflict between identity and depressive symptoms may account for significant delays in seeking help for depression. The results have implications for predicting health behaviour and improving treatment uptake for depression, and may inform existing help-seeking models.

  7. Port Card Module

    International Nuclear Information System (INIS)

    Utes, M.

    1994-01-01

    The Port Card will be one link in the data acquisition system for the D0 Silicon Vertex Detector. This system consists of the following parts, starting at the detector: Silicon strip detectors are mounted in a spaceframe and wire-bonded to custom bare-die integrated circuits (SVX-II chips) that digitize the charge collected by the strips. The 128-channel chips are mounted on a High-Density Interconnect (HDI) that consists of a small flex circuit that routes control signals and eight data bits for each of three to ten chips onto a common data bus. A cable then routes this bus approximately thirty feet out from the detector to the Port Card. The Port Card houses a commercial chipset that serializes the data in real time and converts the signal into laser light impulses that are then transmitted through a multi-mode optical fiber about 150 feet to a Silicon Acquisition and Readout board (SAR). Here, the data is transformed back to parallel electrical signals that are stored in one of several banks of FIFO memories. The FIFOs place their data onto the VME backplane to a VME Buffer Driver (VBD) which stores the event data in buffers for eventual readout over a thirty-two signal ribbon cable to the Level Two Computers and subsequent tape storage. Control and sequencing of the whole operation starts with the Silicon Acquisition/Readout Controller (SARC) working in tandem with the D0 Clock System. The SARC resides in the same VME crate as the SARs, and transforms signals from the Trigger System into control codes distributed to the various Port Cards via optical fibers operating at 53 Mb/s. It is through these control codes that data taking operations such as data-acquisition, digitization, readout, and various resets can be carried out. The Port Card receives the control codes and manipulates the SVX-II chips in the proper way to effect proper data taking. There will be a total of about 700,000 channels, which translates into about 5580 SVX-II chips, 66 to 100 Port Cards

  8. Personality development from adolescence to emerging adulthood: linking trajectories of ego development to the family context and identity formation.

    Science.gov (United States)

    Syed, Moin; Seiffge-Krenke, Inge

    2013-02-01

    This longitudinal study analyzed personality development using an individual approach by examining changes in ego development across the transition from adolescence to emerging adulthood. Specifically, the study mapped the heterogeniety in ego development growth trajectories and linked the different trajectories to the family context in adolescence and identity development in emerging adulthood. Participants were 98 families with a child who were followed from age 14 to age 24. Latent class growth analysis identified 4 distinct trajectories of growth in ego development of the children over the 10-year period. The results indicated that growth was more rapid during adolescence and tended to taper off in emerging adulthood. In addition, promotion of personal growth within the family and parents' ego development were particulary instrumental in children's ego developmental gains in adolescence. Finally, youth who demonstrated continued ego development into emerging adulthood also demonstrated heightened levels of identity exploration. (c) 2013 APA, all rights reserved.

  9. Health smart cards: merging technology and medical information.

    Science.gov (United States)

    Ward, Sherry R

    2003-01-01

    Smart cards are credit card-sized plastic cards, with an embedded dime-sized Integrated Circuit microprocessor chip. Smart cards can be used for keyless entry, electronic medical records, etc. Health smart cards have been in limited use since 1982 in Europe and the United States, and several barriers including lack of infrastructure, low consumer confidence, competing standards, and cost continue to be addressed.

  10. Clifford’s Fireplace Company Limited Brand Identity Project

    OpenAIRE

    Dee, Peter

    2009-01-01

    Peter Dee - Strategic Design and Marketing Consultant, was responsible for the design and development of the brand identity for the Clifford’s Fireplaces Company which was used on business cards, letterhead, advertisements, promotional material and e-Commerce website. Clifford's Fireplaces Ltd. was established in 1947 and with over 65 years of experience in the fireplace and home heating business it is their goal to ensure that customers obtain the most appropriate products and services to me...

  11. Identity development in adolescents with mental problems.

    Science.gov (United States)

    Jung, Emanuel; Pick, Oliver; Schlüter-Müller, Susanne; Schmeck, Klaus; Goth, Kirstin

    2013-07-31

    In the revision of the Diagnostic and Statistical Manual (DSM-5), "Identity" is an essential diagnostic criterion for personality disorders (self-related personality functioning) in the alternative approach to the diagnosis of personality disorders in Section III of DSM-5. Integrating a broad range of established identity concepts, AIDA (Assessment of Identity Development in Adolescence) is a new questionnaire to assess pathology-related identity development in healthy and disturbed adolescents aged 12 to 18 years. Aim of the present study is to investigate differences in identity development between adolescents with different psychiatric diagnoses. Participants were 86 adolescent psychiatric in- and outpatients aged 12 to 18 years. The test set includes the questionnaire AIDA and two semi-structured psychiatric interviews (SCID-II, K-DIPS). The patients were assigned to three diagnostic groups (personality disorders, internalizing disorders, externalizing disorders). Differences were analyzed by multivariate analysis of variance MANOVA. In line with our hypotheses, patients with personality disorders showed the highest scores in all AIDA scales with T>70. Patients with externalizing disorders showed scores in an average range compared to population norms, while patients with internalizing disorders lay in between with scores around T=60. The AIDA total score was highly significant between the groups with a remarkable effect size of f= 0.44. Impairment of identity development differs between adolescent patients with different forms of mental disorders. The AIDA questionnaire is able to discriminate between these groups. This may help to improve assessment and treatment of adolescents with severe psychiatric problems.

  12. Card Sort Technique in Vocational Guidance/Career Counseling: Pilot Study about Career Values

    Directory of Open Access Journals (Sweden)

    Tülin ACAR

    2009-08-01

    Full Text Available The purpose of this study was to develop and to pilot a not-test technique for assessing career and work values. This instrument was developed during a Career Counseling course taught by one of the authors of this paper. The first stage of development was the generation of a master list of career and work values, as reflected in the current literature related to theories and vocational research. From this master list 38 career values were selected resulting in the final deck that was used in testing. This deck of cards was given the name Career Values Cards (MEDEK and administered to a total of 75 high school students. Following administration each of the subjects was asked to complete a MEDEK evaluation form designed to assess reactions to the MEDEK experience. Results of the survey indicated that the MEDEK was an easy-to-use, understandable, and enjoyable technique to increase self-awareness and enhance insight, and a source of important information for students engaged in career counseling and career development by enhancing personal identification of personal career and work values.

  13. Improvement of Accuracy in Environmental Dosimetry by TLD Cards Using Three-dimensional Calibration Method

    Directory of Open Access Journals (Sweden)

    HosseiniAliabadi S. J.

    2015-06-01

    Full Text Available Background: The angular dependency of response for TLD cards may cause deviation from its true value on the results of environmental dosimetry, since TLDs may be exposed to radiation at different angles of incidence from the surrounding area. Objective: A 3D setting of TLD cards has been calibrated isotropically in a standard radiation field to evaluate the improvement of the accuracy of measurement for environmental dosimetry. Method: Three personal TLD cards were rectangularly placed in a cylindrical holder, and calibrated using 1D and 3D calibration methods. Then, the dosimeter has been used simultaneously with a reference instrument in a real radiation field measuring the accumulated dose within a time interval. Result: The results show that the accuracy of measurement has been improved by 6.5% using 3D calibration factor in comparison with that of normal 1D calibration method. Conclusion: This system can be utilized in large scale environmental monitoring with a higher accuracy

  14. Identity at work: Exploring strategies for Identity Work

    Directory of Open Access Journals (Sweden)

    Byron G. Adams

    2012-01-01

    Full Text Available Orientation: This study explored strategies for identity work that are central to the negotiation and regulation of employee work identity.Research purpose: The main aim of this study was to explore employee narratives and identify the strategies available to them in the process of identity work, as they defined themselves at work.Motivation for the study: As there is a scarcity of research on identity work in South Africa, this study wanted to advance knowledge about identity work and the strategies used for regulating and negotiating an identity at work by exploring these constructs in this context.Research design, approach and method: A qualitative research process formed the basis for this study. Nineteen employees from a global manufacturing company participated in two semi-structured in-depth interviews. Grounded theory was applied to analyse and interpret the data.Main findings: Nine strategies for identity work were identified and categorised into four broad themes (personal philosophies; relationships; career management and negotiating balance.Practical/managerial implications: Employees followed various strategies for defining themselves at work and this may have some implications for employee work engagement and productivity.Contribution/value-add: This study expands on current theoretical knowledge of identity work, and provides insights into the strategies people use to regulate and negotiate their identities at work. 

  15. RENEWAL OF SWISS LEGITIMATION CARDS

    CERN Multimedia

    HR Division

    2001-01-01

    Members of the personnel and their families, holders of SWISS LEGITIMATION CARDS due to expire during the year 2001, need to change them. Those concerned should bring : a recent passport photo (with NAME and first name on the back) the expired (or due to expire) card and a recto-verso photocopy on A4 size paper (for certified authentication) to Bureau des cartes, building 33/1-009/1-015. Members of the personnel will be notified by the Social and Statutary Conditions Group, HR Division as soon as the new cards are available. Be careful: If you are in possession of expired cards (Swiss or French), or if you present non-certified copies, the Organization will not take any responsibility in case of difficulties with the customs authorities or the police.

  16. British and American attitudes toward credit cards.

    Science.gov (United States)

    Yang, Bijou; James, Simon; Lester, David

    2006-04-01

    American university students owned more than twice as many credit cards as British university students. However, scores on a credit card attitude scale predicted the number of cards owned by respondents in both countries.

  17. NCDC Punched Card Reference Manuals

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Documentation for using and reading punched cards kept at the National Weather Records Center (NWRC, previous name for NCDC and NCEI). Many of these punched card...

  18. Assessment of identity development and identity diffusion in adolescence - Theoretical basis and psychometric properties of the self-report questionnaire AIDA

    Directory of Open Access Journals (Sweden)

    Goth Kirstin

    2012-07-01

    Full Text Available Abstract Background In the continuing revision of Diagnostic and Statistical Manual (DSM-V “identity” is integrated as a central diagnostic criterion for personality disorders (self-related personality functioning. According to Kernberg, identity diffusion is one of the core elements of borderline personality organization. As there is no elaborated self-rating inventory to assess identity development in healthy and disturbed adolescents, we developed the AIDA (Assessment of Identity Development in Adolescence questionnaire to assess this complex dimension, varying from “Identity Integration” to “Identity Diffusion”, in a broad and substructured way and evaluated its psychometric properties in a mixed school and clinical sample. Methods Test construction was deductive, referring to psychodynamic as well as social-cognitive theories, and led to a special item pool, with consideration for clarity and ease of comprehension. Participants were 305 students aged 12–18 attending a public school and 52 adolescent psychiatric inpatients and outpatients with diagnoses of personality disorders (N = 20 or other mental disorders (N = 32. Convergent validity was evaluated by covariations with personality development (JTCI 12–18 R scales, criterion validity by differences in identity development (AIDA scales between patients and controls. Results AIDA showed excellent total score (Diffusion: α = .94, scale (Discontinuity: α = .86; Incoherence: α = .92 and subscale (α = .73-.86 reliabilities. High levels of Discontinuity and Incoherence were associated with low levels in Self Directedness, an indicator of maladaptive personality functioning. Both AIDA scales were significantly different between PD-patients and controls with remarkable effect sizes (d of 2.17 and 1.94 standard deviations. Conclusion AIDA is a reliable and valid instrument to assess normal and disturbed identity in adolescents. Studies for further

  19. Card products market in the Republic of Croatia

    Directory of Open Access Journals (Sweden)

    Ivana Šučur

    2007-12-01

    Full Text Available Card business in the Republic of Croatia started to develop more than 30 years ago in the form of non-bank card products, issued by American Express and Diners Club global payment systems. These card products were defined as standard charge cards and had been the only card products present in the market until bank cards appeared about ten years ago. The situation changed completely when banks started to enter the market as active participants in the card business. In co-operation with bank global payment systems, MasterCard Worldwide and Visa International, banks have issued several millions of various cards in just a few years, while non-bank issuers have followed the same trend with new card products. This paper explores the current situation in the domestic market; it determines who the cardholders of particular products are, which products they are familiar with, whether they use them or not and for what reason. Cardholders’ opinions, attitudes and preferences towards existing products have been explored, as well as the benefits they would like to get. The results obtained imply that cardholders are familiar with all bank and non-bank card brands, but that they use mostly those which provide them with specific benefits. Therefore, instead of focusing on providing more similar products, issuers should concentrate on designing differentiated products that have been tailored to cardholders’ real needs.

  20. Patient Perceptions of Illness Identity in Cancer Clinical Trial Decision-Making.

    Science.gov (United States)

    Palmer-Wackerly, Angela L; Dailey, Phokeng M; Krok-Schoen, Jessica L; Rhodes, Nancy D; Krieger, Janice L

    2018-08-01

    When patients are diagnosed with cancer, they begin to negotiate their illness identity in relation to their past and future selves, their relationships, and their group memberships. Thus, how patients view their cancer in relation to their other identities may affect how and why they make particular decisions about treatment options. Using the Communication Theory of Identity (CTI), the current study explores: (1) how and why illness identity is framed across identity layers in relation to one particular cancer treatment: participation in a cancer clinical trial (CT); and (2) how and why patients experience identity conflicts while making their treatment decisions. Semi-structured, in-depth interviews were analyzed for 46 cancer patients who were offered a CT. Results of a grounded theory analysis indicated that patients expressed separate identity frames (e.g., personal, relational, and communal), aligned identity frames (e.g., personal and communal), and identity conflicts (e.g., personal-personal). This study theoretically shows how and why patient illness identity relates to cancer treatment decision-making as well as how and why patients relate (and conflict) with the cancer communal identity frame. Practical implications include how healthcare providers and family members can support patient decision-making through awareness of and accommodating to identity shifts.

  1. Dissociative identity disorder: a controversial diagnosis.

    Science.gov (United States)

    Gillig, Paulette Marie

    2009-03-01

    A brief description of the controversies surrounding the diagnosis of dissociative identity disorder is presented, followed by a discussion of the proposed similarities and differences between dissociative identity disorder and borderline personality disorder. The phenomenon of autohypnosis in the context of early childhood sexual trauma and disordered attachment is discussed, as is the meaning of alters or alternate personalities. The author describes recent neurosciences research that may relate the symptoms of dissociative identity disorder to demonstrable disordered attention and memory processes. A clinical description of a typical patient presentation is included, plus some recommendations for approaches to treatment.

  2. Keeping identity private

    DEFF Research Database (Denmark)

    Adjei, Joseph K.; Olesen, Henning

    2011-01-01

    information. On the other hand, consumers have expressed concerns that their rights and ability to control their personal information are violated. Paradoxically, it appears that users provide personal data freely and willingly, as it has been observed on Facebook and other social networks. This study...... is an attempt to understand the relationship between individuals’ intentions to disclose personal information, their actual personal information disclosure behaviours, and how these can be leveraged to develop privacy-enhancing identity management systems (IDMS) that users can trust. Legal, regu...

  3. War of the Credit Cards.

    Science.gov (United States)

    Nicklin, Julie L.

    1993-01-01

    Increasingly, colleges are offering affinity credit cards with attractive incentives as a marketing tool. Some in academe feel the trend may compromise educational objectives. Institutions may also face taxation on unrelated-business income generated through the cards. (MSE)

  4. Privacy and health information: health cards offer a workable solution

    Directory of Open Access Journals (Sweden)

    Roderick Neame

    2008-12-01

    Currently there is a crisis emerging in which professionals are arguing that they are being compelled to compromise their ethical responsibilities to their patients, and government is responding that their measures are necessary to preserve access to quality data for research and planning. This paper proposes an integrated plan for managing these issues in a manner that is ethically sustainable, as well as in keeping with all provisions of the law, using a personal health card.

  5. Data transfer based on intelligent ethernet card

    International Nuclear Information System (INIS)

    Zhu Haitao; Chinese Academy of Sciences, Beijing; Chu Yuanping; Zhao Jingwei

    2007-01-01

    Intelligent Ethernet Cards are widely used in systems where the network throughout is very large, such as the DAQ systems for modern high energy physics experiments, web service. With the example of a commercial intelligent Ethernet card, this paper introduces the architecture, the principle and the process of intelligent Ethernet cards. In addition, the results of several experiments showing the differences between intelligent Ethernet cards and general ones are also presented. (authors)

  6. Falla cardíaca (primera parte)

    OpenAIRE

    Flórez Alarcón, Noel Alberto; Fundación Valle de Lili

    2006-01-01

    Anatomía y función del corazón/¿Qué es la falla cardíaca?/Causas de falla cardíaca/¿Cómo prevenir la falla cardíaca?/¿Qué es un factor de riesgo?/¿Cuáles son los síntomas y signos de la falla cardiaca?/¿Cómo se diagnostica la falla cardiaca?

  7. Daily dynamics of personal identity and self-concept clarity

    NARCIS (Netherlands)

    Schwartz, S.J.; Klimstra, T.A.; Luyckx, K.; Hale, W.W.; Frijns, T.; Oosterwegel, A.; van Lier, P.A.C.; Koot, H.M.; Meeus, W.H.J.

    2011-01-01

    We examined the daily dynamics among self-concept clarity and identity processes, and their effects on distress, among a sample of 580 Dutch adolescents. Participants completed measures of identity, self-concept clarity, anxiety and depression at annual intervals; and daily single-item measures of

  8. An overview of smart card technology and markets

    OpenAIRE

    Mark Furletti

    2002-01-01

    As part of the Payment Cards Center's series of discussion papers, this paper provides an overview of smart card technology and its potential for significantly increasing payment card functionality. In addition to reviewing the current market for smart cards in the U.S., this paper examines the costs and barriers associated with their wide spread adoption. European and US smart card acceptance is compared. In addition, this paper provides background on the technological and infrastructure dev...

  9. Teacher Identity in Language Teaching: Integrating Personal, Contextual, and Professional Factors

    Science.gov (United States)

    Pennington, Martha C.; Richards, Jack C.

    2016-01-01

    This article reviews notions of identity and teacher identity, how these relate to the specific characteristics of language teaching, and how teacher identity can evolve or be developed through experience and teacher education. The notion of teacher identity highlights the individual characteristics of the teacher and how these are integrated with…

  10. Credit Card Selection Criteria: Singapore Perspective

    OpenAIRE

    Lydia L. Gan; Ramin Cooper Maysami

    2006-01-01

    This study used factor analysis to examine credit card selection criteria among Singaporeans. The results showed that convenience of use and protection, economics, and flexibility were the main drivers, while the reputation of card was the least important in determining credit card selection in Singapore. Demographic results showed that high-income earners, the better educated, the elderly, married and the professional preferred the convenience-protection factor to the economic-promotional fa...

  11. 12 CFR 226.12 - Special credit card provisions.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 3 2010-01-01 2010-01-01 false Special credit card provisions. 226.12 Section... SYSTEM TRUTH IN LENDING (REGULATION Z) Open-End Credit § 226.12 Special credit card provisions. (a) Issuance of credit cards. Regardless of the purpose for which a credit card is to be used, including...

  12. Re-Designing Business Card Advertisements.

    Science.gov (United States)

    Schaub, Laura

    2001-01-01

    Discusses ways to turn information from a business card into an advertisement to be placed in a student publication. Addresses visual interest, typography, and other design issues. Includes several sample advertisements and a classroom activity involving redesigning a business card into an advertisement. (RS)

  13. Intersecting Sexual, Gender, and Professional Identities among Social Work Students: The Importance of Identity Integration

    Science.gov (United States)

    Craig, Shelley L.; Iacono, Gio; Paceley, Megan S.; Dentato, Michael P.; Boyle, Kerrie E. H.

    2017-01-01

    Discrimination toward lesbian, gay, bisexual, transgender, and queer (LGBTQ) social work students can negatively affect academic performance and personal and professional identity development. Intersectionality is a conceptual approach that states that social identities interact to form different meanings and experiences from those that could be…

  14. Determinants of debit cards acceptance: An empirical investigation

    International Nuclear Information System (INIS)

    Ismail, Shafinar; Adnan, Azimah; Azizi, Amsyar; Bakri, Mohamed Hariri; Zulkepli, Jafri

    2014-01-01

    These days, most of the Malaysians realize that the consumption of debit card will help them to reduce the household debt. Thus, it is important to analyse the acceptance of debit cards for further enhancement and expanding its market share in Malaysia. In addition, there is lacked of research being conducted on the determinants affecting the acceptance of debit cards among Malaysians. Thus, the study aimed to investigate the factors affecting the acceptance of debit cards. This study focuses on payment methods, consumer attitude, and safety of debit card in acceptance of debit cards. Questionnaires were distributed to the 300 respondents. The sampling procedure adopted was stratified random sampling. The data obtained were analysed using SPSS 20.0 which involves scale reliability, descriptive and regression analysis. The result indicates that payment methods, consumer attitude and safety are the determinants of debit cards acceptance. Safety is the best predictor as most of the customers are confidents to use debit cards because of the security being developed around these debit card transactions. The analyses presented in this study can be used by policymakers and managers as a guide to promote banking products and services. The findings achieved in this study will be of interest for practitioners and academics concerned with developments of the Malaysian banking industry

  15. Determinants of debit cards acceptance: An empirical investigation

    Energy Technology Data Exchange (ETDEWEB)

    Ismail, Shafinar; Adnan, Azimah; Azizi, Amsyar [Faculty of Business and Management, Universiti Teknologi MARA, Melaka 75300 (Malaysia); Bakri, Mohamed Hariri [Faculty of Technology Management And Technopreneurship, Universiti Teknikal Malaysia, Melaka 76100 (Malaysia); Zulkepli, Jafri [Faculty of Quantitative Science, Universiti Utara Malaysia, Sintok Kedah (Malaysia)

    2014-12-04

    These days, most of the Malaysians realize that the consumption of debit card will help them to reduce the household debt. Thus, it is important to analyse the acceptance of debit cards for further enhancement and expanding its market share in Malaysia. In addition, there is lacked of research being conducted on the determinants affecting the acceptance of debit cards among Malaysians. Thus, the study aimed to investigate the factors affecting the acceptance of debit cards. This study focuses on payment methods, consumer attitude, and safety of debit card in acceptance of debit cards. Questionnaires were distributed to the 300 respondents. The sampling procedure adopted was stratified random sampling. The data obtained were analysed using SPSS 20.0 which involves scale reliability, descriptive and regression analysis. The result indicates that payment methods, consumer attitude and safety are the determinants of debit cards acceptance. Safety is the best predictor as most of the customers are confidents to use debit cards because of the security being developed around these debit card transactions. The analyses presented in this study can be used by policymakers and managers as a guide to promote banking products and services. The findings achieved in this study will be of interest for practitioners and academics concerned with developments of the Malaysian banking industry.

  16. Determinants of debit cards acceptance: An empirical investigation

    Science.gov (United States)

    Ismail, Shafinar; Bakri, Mohamed Hariri; Zulkepli, Jafri; Adnan, Azimah; Azizi, Amsyar

    2014-12-01

    These days, most of the Malaysians realize that the consumption of debit card will help them to reduce the household debt. Thus, it is important to analyse the acceptance of debit cards for further enhancement and expanding its market share in Malaysia. In addition, there is lacked of research being conducted on the determinants affecting the acceptance of debit cards among Malaysians. Thus, the study aimed to investigate the factors affecting the acceptance of debit cards. This study focuses on payment methods, consumer attitude, and safety of debit card in acceptance of debit cards. Questionnaires were distributed to the 300 respondents. The sampling procedure adopted was stratified random sampling. The data obtained were analysed using SPSS 20.0 which involves scale reliability, descriptive and regression analysis. The result indicates that payment methods, consumer attitude and safety are the determinants of debit cards acceptance. Safety is the best predictor as most of the customers are confidents to use debit cards because of the security being developed around these debit card transactions. The analyses presented in this study can be used by policymakers and managers as a guide to promote banking products and services. The findings achieved in this study will be of interest for practitioners and academics concerned with developments of the Malaysian banking industry.

  17. Optical smart card using semipassive communication.

    Science.gov (United States)

    Glaser, I; Green, Shlomo; Dimkov, Ilan

    2006-03-15

    An optical secure short-range communication system is presented. The mobile unit (optical smart card) of this system utilizes a retroreflector with an optical modulator, using light from the stationary unit; this mobile unit has very low power consumption and can be as small as a credit card. Such optical smart cards offer better security than RF-based solutions, yet do not require physical contact. Results from a feasibility study model are included.

  18. Market structure and credit card pricing: what drives the interchange?

    OpenAIRE

    Zhu Wang

    2008-01-01

    This paper presents a model for the credit card industry, where oligopolistic card networks price their products in a complex marketplace with competing payment instruments, rational consumers/merchants, and competitive card issuers/acquirers. The analysis suggests that card networks demand higher interchange fees to maximize card issuers' profits as card payments become more efficient. At equilibrium, consumer rewards and card transaction volume also increase, while consumer surplus and merc...

  19. Health care report cards: what about consumers' perspectives?

    Science.gov (United States)

    McGee, J; Knutson, D

    1994-10-01

    Though the report card style is seen by many as a way to create better-informed consumers, very little is actually known about how consumers will respond to health care report cards. Report cards are only one of many factors that influence health care decision making. Much consumer-oriented effort and fine-tuning will be required to make report cards effective. Using the approach called "social marketing" as a framework, specific examples are used to outline some ideas for more intensive pursuit of consumers' perspectives in the design and distribution of report cards.

  20. EuCARD final project report

    CERN Document Server

    Koutchouk, J P

    2014-01-01

    After four years of activity, EuCARD has most of its objectives fulfilled, with some new objectives added and a few others on excellent tracks while requiring additional time. The management has been active in reinforcing the collaborative links between partners and projects, contributing to the preparation of FP7-EuCARD2, initiating FP7-HiLumi-LHC Design Study, to favour sustained collaborations beyond EuCARD. An out-of-contract network has been successfully launched on laser plasma acceleration, to combine forces between accelerator, laser and plasma communities. Communication and dissemination activities have led to two highlights: Accelerating News, an accelerator R&D newsletter initiated by EuCARD and now common to all FP7 accelerator projects (over 1000 subscribers) and a series of monographs on accelerator sciences that is progressively finding its public. The scientific networks have more than fulfilled their initial objectives: roadmaps are defined for neutrino facilities, submitted to the Europe...

  1. Social Identity in People with Multiple Sclerosis: An Examination of Family Identity and Mood.

    Science.gov (United States)

    Barker, Alex B; Lincoln, Nadina B; Hunt, Nigel; dasNair, Roshan

    2018-01-01

    Mood disorders are highly prevalent in people with multiple sclerosis (MS). MS causes changes to a person's sense of self. The Social Identity Model of Identity Change posits that group membership can have a positive effect on mood during identity change. The family is a social group implicated in adjustment to MS. The objectives of this study were to investigate whether family identity can predict mood in people with MS and to test whether this prediction was mediated by social support and connectedness to others. This cross-sectional survey of 195 participants comprised measures of family identity, family social support, connectedness to others, and mood. Family identity predicted mood both directly and indirectly through parallel mediators of family social support and connectedness to others. Family identity predicted mood as posited by the Social Identity Model of Identity Change. Involving the family in adjustment to MS could reduce low mood.

  2. Augmenting C-cards with music actions

    DEFF Research Database (Denmark)

    Jensen, Karl Kristoffer; Valente, Andrea; Lyon, Kirstin Catherine

    2006-01-01

    The paper proposes a new way of introducing music to classes of 8 to 10 years old pupils, by adopting a recent educational tool for teaching Computer Science. Our proposal builds in fact on computational cards (or c-cards), a playful and intuitive mind-tool, that has been applied to a variety...... of Computer Science concepts. Here a simple extension to c-cards is presented, that enables pupils to build and play with tangible musical machine....

  3. Prepaid cards: vulnerable to money laundering?

    OpenAIRE

    Stanley J. Sienkiewicz

    2007-01-01

    This paper discusses the potential money laundering threat that prepaid cards face as they enter the mainstream of consumer payments. Over the past year, several government agencies have issued reports describing the threat to the U.S. financial system, including the use of prepaid cards by money launderers. Also, this paper incorporates the presentations made at a workshop hosted by the Payment Cards Center at which Patrice Motz, executive vice president, Premier Compliance Solutions, and Pa...

  4. WHAT INFLUENCE CREDIT CARD DEBTS IN YOUNG CONSUMERS IN MALAYSIA

    OpenAIRE

    Syed Shah ALAM; Ruzita Abdul RAHIM; Ridhwanul HAQ; Atiqur Rahman KHAN

    2014-01-01

    This paper examines empirically antecedents of the credit card debts in young consumers in Malaysia. We examine whether easy access to credit card, credit card related knowledge, aggressive promotion by credit card industry, low minimum payment requirement and attitude towards credit cards influence credit card debts in the younger generation. Regression model was used to meet the objectives. These findings based on a sample of 240 young credit card holders, show that the factors that affect ...

  5. Who commits virtual identity suicide? Differences in privacy concerns, Internet addiction, and personality between Facebook users and quitters.

    Science.gov (United States)

    Stieger, Stefan; Burger, Christoph; Bohn, Manuel; Voracek, Martin

    2013-09-01

    Social networking sites such as Facebook attract millions of users by offering highly interactive social communications. Recently, a counter movement of users has formed, deciding to leave social networks by quitting their accounts (i.e., virtual identity suicide). To investigate whether Facebook quitters (n=310) differ from Facebook users (n=321), we examined privacy concerns, Internet addiction scores, and personality. We found Facebook quitters to be significantly more cautious about their privacy, having higher Internet addiction scores, and being more conscientious than Facebook users. The main self-stated reason for committing virtual identity suicide was privacy concerns (48 percent). Although the adequacy of privacy in online communication has been questioned, privacy is still an important issue in online social communications.

  6. Implementing a High-Assurance Smart-Card OS

    Science.gov (United States)

    Karger, Paul A.; Toll, David C.; Palmer, Elaine R.; McIntosh, Suzanne K.; Weber, Samuel; Edwards, Jonathan W.

    Building a high-assurance, secure operating system for memory constrained systems, such as smart cards, introduces many challenges. The increasing power of smart cards has made their use feasible in applications such as electronic passports, military and public sector identification cards, and cell-phone based financial and entertainment applications. Such applications require a secure environment, which can only be provided with sufficient hardware and a secure operating system. We argue that smart cards pose additional security challenges when compared to traditional computer platforms. We discuss our design for a secure smart card operating system, named Caernarvon, and show that it addresses these challenges, which include secure application download, protection of cryptographic functions from malicious applications, resolution of covert channels, and assurance of both security and data integrity in the face of arbitrary power losses.

  7. It's All in the Cards.

    Science.gov (United States)

    Burke, Jim

    2002-01-01

    Describes how the author learned by watching low-achieving students play intricate card games such as "Magic" that they can learn, can remember, and certainly can master information. Realizes that these cards were advanced learning tools, multifaceted texts using color, symbols, images, texts, and metaphor to help create a world of…

  8. Rights of Identity

    Directory of Open Access Journals (Sweden)

    Daniel Kofman

    2017-01-01

    Full Text Available A person’s identity is their sense of who and what they are, of who stands in significant relations to them, and of what is valuable to them. This is inevitably very broad, an immediate implication of which is that the concept of identity taken alone cannot do significant normative work. In some cases a person’s identity is bound up with the evil that they do or wish to do, and cannot thereby give them any right to do it. In other cases very powerful elements of a person’s identity – such as their attachment to loved ones – is certainly related to important rights, but it is not entirely clear that one needs the concept of identity to explicate or justify these rights; the deep involvement of their identity is arguably a byproduct of other important values in these cases (such as love, and those values can do the grounding work of the rights by themselves and more simply and clearly. Nevertheless, when suitably qualified, a person’s identity is central to accounting for important political rights. These ranges from rights to participate in cultural practices of one’s group, which sometimes implies duties on governments to support minorities threatened with extinction, to – at the outer limit – rights to arrange political administration. These rights are connected to both autonomy and fairness. Cultural rights are often taken either to be opposed to autonomy, or at best instrumental to personal autonomy (by providing ‘options’, but in fact, the ideal of autonomy, expressed by Mill as being the author of one’s life, requires that one be in control of significant aspects of one’s identity. Significant aspects of one’s identity are collectively determined within a culture. Cultures are not static, and their development is particularly affected by political boundaries. A fundamental right of autonomy implies, therefore, that groups be allowed, within reasonable constraints of general feasibility and stability, to arrange

  9. The Use of Personal Identity Numbers in Sweden and Denmark: A Barrier to Union Citizens' Enjoyment of Free Movement Rights?

    DEFF Research Database (Denmark)

    Hyltén-Cavallius, Katarina

    2015-01-01

    The paper of Katarina Hyltén-Cavallius focuses on personal identity numbers in Sweden and Denmark. This paper looks into formal and informal structures, which organise society in a host member state and which can make it difficult for a non-national Union citizen to, in practice, access public an...

  10. Report: Fiscal Year 2015 Federal Information Security Modernization Act Report: Status of CSB’s Information Security Program

    Science.gov (United States)

    Report #16-P-0086, January 27, 2016. The effectiveness of the CSB’s information security program is challenged by its lack of personal identity verification cards for logical access, complete system inventory.

  11. Smart Cards for Transit : Multi-Use Remotely Interrogated Stored-Data Cards for Fare and Toll Payment

    Science.gov (United States)

    1995-04-01

    This project developed relevant information on existing and future, stored readable/writable data card technology for fare and toll payments. The project supports the FTA objective of developing a plan for a common standard card-based fare payment sy...

  12. Wallet Card

    Data.gov (United States)

    U.S. Department of Health & Human Services — The CMS Office of Information Products and Data Analysis, OIPDA, produces the CMS Wallet Card as a quick reference statistical summary on annual CMS program and...

  13. Correlates of credit card ownership in men and women.

    Science.gov (United States)

    Yang, Bijou; Lester, David

    2005-06-01

    In a sample of 352 students, correlates of credit card ownership differed by sex. For both men and women, credit card ownership was predicted by their affective attitude toward credit cards. However, whereas for men concern with money as a tactic for gaining power predicted credit card ownership, for women feelings of insecurity about having sufficient money and having a conservative approach to money predicted credit card ownership.

  14. Motivation for helping behavior after the floods in 2014: The role of personality and national identity

    Directory of Open Access Journals (Sweden)

    Otašević Biljana

    2014-01-01

    Full Text Available The severe floods, which struck Serbia in May 2014, inflicted enormous material damage and forced tens of thousands of people to leave their homes. The goal of this research was to investigate the motivation of citizens who helped, i.e. to establish the predictors of the motivation for helping behavior as well as its effects on different ways of providing help. Volunteer Functions Inventory, National Identity Scale, Big Five Inventory, and Helping Behavior Questionnaire were applied to the sample of 183 people who provided the flood victims with help. Multivariate analysis of covariance, where the predictors were gender, the prior acquaintance with the victims, six volunteer functions (Social, Understanding, Protective, Enhancement, Values, Career, age, education and financial status, while the criteria were dimensions of helping behavior, shows that the model provides statistically significant explanation of all dimensions of helping behavior, where the Social Motives and Understanding have significant multivariate effects. MANCOVA was used for establishing the predictors of helping motivation. Along with the control variables from the first analysis, the predictors were Big Five personality traits and national identity, and the criteria were 6 volunteer functions. The results showed significant multivariate effects of Openness, Agreeableness, Extraversion and national identity. Practical and theoretical implications are discussed.

  15. Sound card based digital correlation detection of weak photoelectrical signals

    International Nuclear Information System (INIS)

    Tang Guanghui; Wang Jiangcheng

    2005-01-01

    A simple and low-cost digital correlation method is proposed to investigate weak photoelectrical signals, using a high-speed photodiode as detector, which is directly connected to a programmably triggered sound card analogue-to-digital converter and a personal computer. Two testing experiments, autocorrelation detection of weak flickering signals from a computer monitor under background of noisy outdoor stray light and cross-correlation measurement of the surface velocity of a motional tape, are performed, showing that the results are reliable and the method is easy to implement

  16. Perceived Parenting Dimensions and Identity Styles: Exploring the Socialization of Adolescents' Processing of Identity-Relevant Information

    Science.gov (United States)

    Smits, Ilse; Soenens, Bart; Luyckx, Koen; Duriez, Bart; Berzonsky, Michael; Goossens, Luc

    2008-01-01

    This study examined the relationships between crucial dimensions of perceived parenting (support, behavioral control, and psychological control) and the three identity styles defined by Berzonsky [Berzonsky, M. D. (1990). "Self-construction over the life span: A process perspective on identity formation." "Advances in Personal Construct…

  17. 6 CFR 37.3 - Definitions.

    Science.gov (United States)

    2010-01-01

    ... cards issued by the State for official purposes. Digital photograph means a digital image of the face of... denotes identity and citizenship as determined by the U.S. Department of State. Personally identifiable..., including a digital photograph or signature; alone, or when combined with other personal or identifying...

  18. A Comparison of Card-sorting Analysis Methods

    DEFF Research Database (Denmark)

    Nawaz, Ather

    2012-01-01

    This study investigates how the choice of analysis method for card sorting studies affects the suggested information structure for websites. In the card sorting technique, a variety of methods are used to analyse the resulting data. The analysis of card sorting data helps user experience (UX......) designers to discover the patterns in how users make classifications and thus to develop an optimal, user-centred website structure. During analysis, the recurrence of patterns of classification between users influences the resulting website structure. However, the algorithm used in the analysis influences...... the recurrent patterns found and thus has consequences for the resulting website design. This paper draws an attention to the choice of card sorting analysis and techniques and shows how it impacts the results. The research focuses on how the same data for card sorting can lead to different website structures...

  19. RENEWAL OF CRIMINAL LAW AGAINST ABUSE OF CREDIT CARDS

    Directory of Open Access Journals (Sweden)

    Eka Nugraha

    2015-07-01

    Full Text Available The use of credit cards for payment in lieu of cash since the introduction of the first credit card ever more widely known and used by people.   On the early introduction of this credit card, the wearer is limited to certain circles. However, a few decades later the credit card industry primarily enter the end of the Decade of the 1970s, has penetrated almost throughout all parts of the world, including Indonesia.   A credit card is issued by most commonly used by the public and apply the current International consists of a range of brands, among others, a very popular one is Visa and Master Card are each issued by the credit card company international and Master Card International.In practice many found the works in banking that may be subject to sanctions as set forth in the book of the law of criminal law (Criminal Code.

  20. Puppet Visual Adaptation on Playing Cards as Educational Media

    Directory of Open Access Journals (Sweden)

    Joko Wiyoso

    2017-02-01

    Full Text Available This study aims at presenting an effective media in a form of puppet picture playing cards as a means to introduce traditional puppet to the society. Research and Development (R&D was chosen as the method to develop the playing cards. Results were presented in a form of the design of puppet picture playing cards as many as 54 cards as well as 54 puppet characters as the background pictures. The design of the playing cards is adjusted to the common playing cards which are distributed widely in the society, including both the sizes and symbols, like the pictures of spade, heart, diamond, and club. In detail, the design comprises: (1 the size of playing cards which is 6 cm width of the upper and lower sides and 9 cm length for the left and right sides. (2 The playing cards’ background is in a bright color so does the puppet picture on the card can be seen clearly.

  1. RENEWAL OF SWISS LEGITIMATION CARDS

    CERN Multimedia

    HR DIVISION

    2000-01-01

    Members of the personnel, holders of SWISS LEGITIMATION CARDSdue to expire during the year 2000, need to change them.Those concerned should bring:a recent passport photo (with NAME and first name on the back)the expired (or due to expire) card and a photocopy (for certified authentication)to: Bureau des cartes, building 33/1-025Members of personnel will be notified by HR Division as soon as the new cards are available.Be careful: if you are in possession of expired cards (Swiss or French), or if you present non-certified copies, the Organization will not take any responsibility in case of difficulties with the customs authorities or the police.Human Resources DivisionTel. 79494-74683

  2. Motivation and Justice at Work: The Role of Emotion and Cognition Components of Personal and Collective Work Identity

    OpenAIRE

    Ola Nordhall; Ola Nordhall; Igor Knez

    2018-01-01

    The aim of this study was to investigate the role of personal and collective work identity (including emotion and cognition components), in predicting work motivation (operationalized as work self-determined motivation) and organizational justice (operationalized as organizational pay justice). Digitized questionnaires were distributed by e-mail to 2905 members, teachers, of a Swedish trade union. A total of 768 individuals answered the questionnaire and by that participated in this study. Pe...

  3. The Regulation of the Credit Card Market in Turkey

    OpenAIRE

    Ahmet Faruk Aysan; L. Yildiz

    2006-01-01

    The rapid growth in Turkish credit card market brought together new issues. Card holders and consumer unions complain about the high interest rates, economists complain about the default rates and banks complain about the amnesties. After all of these complaints coinciding with the accelerating suicide incidences due to credit card debts, regulation has been enacted in the credit card market in Turkey. In 2003, credit cards had been taken into the scope of the Consumer Protection Law. This wa...

  4. One-Card Programs Boast Endless Options.

    Science.gov (United States)

    Pearcey, Kevin

    2003-01-01

    Discusses how all-campus ID cards are easy to manage, enhance overall campus security, lower operating expenses, and provide a chance to build lasting relationships with the community by taking the card to off-campus businesses. (EV)

  5. Is the personal bankruptcy system bankrupt?

    OpenAIRE

    Loretta J. Mester

    2002-01-01

    Loretta Mester outlines the components of reform proposals. She then looks at the empirical research on personal bankruptcy to evaluate the rationale for reforming the system and the effectiveness of proposed changes. ; Also issued as Payment Cards Center Discussion Paper No. 02-02

  6. Problem and solution of tally segment card in MCNP code

    International Nuclear Information System (INIS)

    Xie Jiachun; Zhao Shouzhi; Sun Zheng; Jia Baoshan

    2010-01-01

    Wrong results may be given when FS card (tally segment card) was used for tally with other tally cards in Monte Carlo code MCNP. According to the comparison of segment tally results which were obtained by FS card of three different models of the same geometry, the tally results of fuel regions were found to be wrong in fill pattern. The reason is that the fuel cells were described by Universe card and FILL card, and the filled cells were always considered at Universe card definition place. A proposed solution was that the segment tally for filled cells was done at Universe card definition place. Radial flux distribution of one example was calculated in this way. The results show that the fault of segment tally with FS card in fill pattern could be solved by this method. (authors)

  7. [Background and practical use of the assessment of identity development in adolescence (AIDA)].

    Science.gov (United States)

    Birkhölzer, Marc; Goth, Kirstin; Schrobildgen, Christian; Schmeck, Klaus; Schlüter-Müller, Susanne

    2015-01-01

    A paradigm shift towards early detection and intervention of personality disorders in adolescence to prevent persistent and chronic suffering is currently taking place. Aside further distinct areas of impaired psychosocial integrity, disturbed identity development is seen as one core component of personality disorders. Thus, the detection of early antecedents of impaired identity development is an important step to allow for early intervention. The self-report questionnaire Assessment of Identity Development in Adolescence (AIDA) is a reliable and valid diagnostic instrument to detect disturbed identity development. This questionnaire allows for global assessment of identity and a differentiation in fundamental subdomains as well and distinguishes between identity diffusion on one side and consolidated and stable identity on the other. In clinical practice, it supports the differentiation between severely disturbed identity as the core component of personality disorders and identity crisis or stable identity development that can be found in other mental disorders.

  8. Cobacabana (control of balance by card-based navigation) : A card-based system for job shop control

    NARCIS (Netherlands)

    Land, M.J.

    Existing card-based production control systems such as Kanban are mostly dedicated to repetitive production environments. Cards-based systems for job shop control are lacking, while particularly this industry segment shows a need for simple control systems. This paper aims at filling the gap by

  9. Prepaid cards: how do they function? how are they regulated?

    OpenAIRE

    Mark Furletti

    2004-01-01

    This conference, sponsored by the Payment Cards Center, brought together prepaid card industry leaders and regulators to discuss how various prepaid-card systems work and the ways in which different state and federal laws can affect them. The conference featured sessions on bank- and merchant-issued gift cards, payroll cards, and flexible spending account cards. It also featured presentations by experts on Regulation E, the Federal Deposit Insurance Act, state money transmitter laws, and stat...

  10. Improved Optical Document Security Techniques Based on Volume Holography and Lippmann Photography

    Science.gov (United States)

    Bjelkhagen, Hans I.

    Optical variable devices (OVDs), such as holograms, are now common in the field of document security. Up until now mass-produced embossed holograms or other types of mass-produced OVDs are used not only for banknotes but also for personalized documents, such as passports, ID cards, travel documents, driving licenses, credit cards, etc. This means that identical OVDs are used on documents issued to individuals. Today, there is need for a higher degree of security on such documents and this chapter covers new techniques to make improved mass-produced or personalized OVDs.

  11. NCDC Punched Card Inventory - 1950s

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Index of foreign weather data available on punched cards held at the Joint Punched Card Library in Asheville NC, produced in the late 1950s, and also station/data...

  12. Mathematical card magic fifty-two new effects

    CERN Document Server

    Mulcahy, Colm

    2013-01-01

    Mathematical card effects offer both beginning and experienced magicians an opportunity to entertain with a minimum of props. Featuring mostly original creations, Mathematical Card Magic: Fifty-Two New Effects presents an entertaining look at new mathematically based card tricks. Each chapter contains four card effects, generally starting with simple applications of a particular mathematical principle and ending with more complex ones. Practice a handful of the introductory effects and, in no time, you'll establish your reputation as a "mathemagician." Delve a little deeper into each chapter and the mathematics gets more interesting. The author explains the mathematics as needed in an easy-to-follow way. He also provides additional details, background, and suggestions for further explorations.Suitable for recreational math buffs and amateur card lovers or as a text in a first-year seminar, this color book offers a diverse collection of new mathemagic principles and effects.

  13. Towards full citizenship: correlates of engagement with the gender identity law among transwomen in Argentina.

    Science.gov (United States)

    Socías, María Eugenia; Marshall, Brandon D L; Arístegui, Inés; Zalazar, Virginia; Romero, Marcela; Sued, Omar; Kerr, Thomas

    2014-01-01

    In May 2012, Argentina passed its "Gender Identity" Law, which aimed to address the legal invisibility, discrimination and marginalization that transgender individuals have historically faced. The aim of this study was to explore factors associated with engagement with the Gender Identity Law among transwomen living in Argentina. Data were derived from a 2013 nationwide, cross-sectional study involving transwomen in Argentina. Using multivariate logistic regression, we assessed the prevalence and factors associated with acquiring a gender-congruent identity card within the first 18 months of enactment of the Gender Identity Law. Among 452 transwomen, 260 (57.5%) reported that they had obtained a new gender-congruent identity card. In multivariate analysis, factors positively associated with acquiring a new ID were: previously experiencing discrimination by healthcare workers (adjusted odd ratio [aOR] = 2.01, 95% CI: 1.27-3.20); having engaged in transition procedures (aOR = 3.06, 95% CI: 1.58-5.93); and having a job other than sex work (aOR = 1.81, 95% CI: 1.06-3.10). Foreign born transwomen were less likely to have obtained a new ID (aOR = 0.14, 95% CI: 0.06-0.33). More than half of transwomen in our sample acquired a new gender-congruent ID within the first 18 months of enactment of the Gender Identity Law. However, access to and uptake of this right has been heterogeneous. In particular, our findings suggest that the most empowered transwomen may have been among the first to take advantage of this right. Although educational level, housing conditions, HIV status and sex work were not associated with the outcome, foreign-born status was a strong negative correlate of new ID acquisition. Therefore, additional efforts should be made in order to ensure that benefits of this founding policy reach all transwomen in Argentina.

  14. Towards full citizenship: correlates of engagement with the gender identity law among transwomen in Argentina.

    Directory of Open Access Journals (Sweden)

    María Eugenia Socías

    Full Text Available In May 2012, Argentina passed its "Gender Identity" Law, which aimed to address the legal invisibility, discrimination and marginalization that transgender individuals have historically faced. The aim of this study was to explore factors associated with engagement with the Gender Identity Law among transwomen living in Argentina.Data were derived from a 2013 nationwide, cross-sectional study involving transwomen in Argentina. Using multivariate logistic regression, we assessed the prevalence and factors associated with acquiring a gender-congruent identity card within the first 18 months of enactment of the Gender Identity Law.Among 452 transwomen, 260 (57.5% reported that they had obtained a new gender-congruent identity card. In multivariate analysis, factors positively associated with acquiring a new ID were: previously experiencing discrimination by healthcare workers (adjusted odd ratio [aOR] = 2.01, 95% CI: 1.27-3.20; having engaged in transition procedures (aOR = 3.06, 95% CI: 1.58-5.93; and having a job other than sex work (aOR = 1.81, 95% CI: 1.06-3.10. Foreign born transwomen were less likely to have obtained a new ID (aOR = 0.14, 95% CI: 0.06-0.33.More than half of transwomen in our sample acquired a new gender-congruent ID within the first 18 months of enactment of the Gender Identity Law. However, access to and uptake of this right has been heterogeneous. In particular, our findings suggest that the most empowered transwomen may have been among the first to take advantage of this right. Although educational level, housing conditions, HIV status and sex work were not associated with the outcome, foreign-born status was a strong negative correlate of new ID acquisition. Therefore, additional efforts should be made in order to ensure that benefits of this founding policy reach all transwomen in Argentina.

  15. Smart Card sebagai Pengaman Sepeda Motor Berbasis Mikrokontroler

    OpenAIRE

    Yohanes Chrisostomus Purba; Antonius Wibowo

    2010-01-01

    Pengaman sepeda motor yang berbentuk smart card terdiri dari bagian yang memuat chip EEPROM dan bagian pengaman smart card. Pembacaan smart card didesain dan ditempatkan pada sepeda motor. Untuk pembacaan data chip SLE 4442, dan pembacaan data pengaman smart card digunakan mikrokontroler AT89S51. Untuk pengaturan aktif maupun tidak aktifnya CDI, dan starter juga digunakan mikrokontroler AT89S51. Sistem pengaman sepeda motor akan menjadi aktif bila sepeda motor dalam keadaan mati. Smart car...

  16. Insuficiencia cardíaca y diabetes

    OpenAIRE

    Jorge Thierer

    2006-01-01

    La prevalencia de la insuficiencia cardíaca y la diabetes continúa creciendo. Ambas están fuertemente asociadas. La diabetes es un fuerte predictor de aparición de insuficiencia cardíaca. Las razones son la presencia de enfermedad coronaria y los trastornos metabólicos vinculados con la resistencia a la insulina que generan disfunción contráctil. Los pacientes con insuficiencia cardíaca que son diabéticos tienen peor evolución. Los Betabloqueantes, vasodilatadores y los inhibidores de la en...

  17. Insuficiencia cardíaca y diabetes

    OpenAIRE

    Thierer, Jorge

    2006-01-01

    La prevalencia de la insuficiencia cardíaca y la diabetes continúa creciendo. Ambas están fuertemente asociadas. La diabetes es un fuerte predictor de aparición de insuficiencia cardíaca. Las razones son la presencia de enfermedad coronaria y los trastornos metabólicos vinculados con la resistencia a la insulina que generan disfunción contráctil. Los pacientes con insuficiencia cardíaca que son diabéticos tienen peor evolución. Los betabloqueantes vasodilatadores y los inhibidores de la enzim...

  18. [Psychological features of body integrity identity disorder (BIID): personality traits, interpersonal aspects, coping mechanisms regarding stress and conflicts, body perception].

    Science.gov (United States)

    Oddo, S; Möller, J; Skoruppa, S; Stirn, A

    2014-05-01

    In BIID a disorder of body identity, concerned subjects desire an amputation of a healthy limb. So far, no psychiatric comorbidity was found in the few studies on BIID-subjects. This study explored clinical symptoms, personality characteristics, interpersonal aspects and coping strategies in 15 BIID persons. Psychometric testing on the topics (1) clinical symptoms, (2) personality and interpersonal aspects, (3) coping strategies, (4) attitudes towards the body were used and statistically evaluated with the T-test for one sample. Some psychopathologies such as depression, anxiety and obsessive-compulsive disorders (OCD) could be excluded although an increased tendency of depressiveness was found. BIID subjects showed specific personality and interpersonal characteristics: high agreeableness, autonomy, autarky and restrained behaviour towards others. Stress and conflicts are managed by self-control and self-affirmation. Their subjective physical attractiveness was low. BIID persons do not exhibit psychopathological characteristics (such as anxiety, depression or OCD), but do show specifics in personality, relationships and coping mechanisms. In the future, further personality traits and personality disorders should be investigated to shed more light on the categorisation and treatment of BIID. © Georg Thieme Verlag KG Stuttgart · New York.

  19. PC add on card for processing of LSC signals

    International Nuclear Information System (INIS)

    Jadhav, S.R.; Nikhare, D.M.; Gurna, R.K.; Paulson, Molly; Kulkarni, C.P.; Vaidya, P.P.

    2001-01-01

    This paper describes PC- add on card developed at Electronics Division for processing of LSC signals. This card uses highly integrated digital and analog circuits, for entire processing of signals available from preamplifiers to get complete beta energy spectrum corresponding to coincident events in Liquid Scintillation Counting. LSC card along with High Voltage PC-add on card gives complete electronics required for LSC system. This card is also used in automatic LSC system along with interface circuits, which are used to control mechanical movements. (author)

  20. Modulatory effects of psychopathy on Wisconsin Card Sorting Test performance in male offenders with Antisocial Personality Disorder.

    Science.gov (United States)

    Pera-Guardiola, Vanessa; Batalla, Iolanda; Bosque, Javier; Kosson, David; Pifarré, Josep; Hernández-Ribas, Rosa; Goldberg, Ximena; Contreras-Rodríguez, Oren; Menchón, José M; Soriano-Mas, Carles; Cardoner, Narcís

    2016-01-30

    Neuropsychological deficits in executive functions (EF) have been linked to antisocial behavior and considered to be cardinal to the onset and persistence of severe antisocial and aggressive behavior. However, when psychopathy is present, prior evidence suggests that the dorsolateral prefrontal cortex is unaffected leading to intact EF. Ninety-one male offenders with Antisocial Personality Disorder (ASPD) and 24 controls completed the Wisconsin Card Sorting Test (WCST). ASPD individuals were grouped in three categories according to Psychopathy Checklist-Revised (PCL-R) scores (low, medium and high). We hypothesized that ASPD offenders with high PCL-R scores will not differ from healthy controls in EF and will show better EF performance in comparison with subjects with low PCL-R scores. Results showed that ASPD offenders with low PCL-R scores committed more perseverative errors and responses than controls and offenders with high PCL-R scores, which did not differ from healthy controls. Moreover, scores on Factor 1 and the interpersonal facet of the PCL-R were predictors of better WCST performance. Our results suggest a modulatory role of psychopathy in the cognitive performance of ASPD offenders, and provide further evidence supporting that offenders with ASPD and psychopathy are characterized by a cognitive profile different from those with ASPD without psychopathy. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.

  1. Figure 2. Representation of the technological dimension of privacy-Educational Research on the Technological Dimension of Private Life

    OpenAIRE

    Liliana Mâţă

    2010-01-01

    Following the development of new technologies in recent decades have been a number of innovative, but also privacy threats, elements: bank cards, personal computers, communication networks, internet, digital signature, email, surveillance systems for children. The structure of the technological dimension of private life can be represented by the following elements (Figure 2): personal objects technology (material itSelf), electronic identity, personal blog (personal Self), spec...

  2. Feocromocitoma cardíaco

    Directory of Open Access Journals (Sweden)

    Gustavo L. Knop

    2006-01-01

    Full Text Available Los feocromocitomas cardíacos primarios (FCP son sumamente infrecuentes. Hasta el presente son menos de 50 los casos comunicados en el mundo. Presentamos el caso de un tumor intrapericárdico, que resultó ser un feocromocitoma primario, en una mujer de mediana edad, cuyo signo principal fue hipertensión arterial severa (HTAs. Los estudios diagnósticos por imágenes corroboraron la presencia de un tumor intrapericárdico como único hallazgo y los estudios bioquímicos de catecolaminas y sus metabolitos excretados por orina reafirmaron el diagnóstico etiológico. El tumor fue resecado quirúrgicamente sin complicaciones mediante cirugía cardíaca convencional con circulación extracorpórea (CEC y paro cardíaco con cardioplejía. Siete meses después de la operación, la paciente se encuentra asintomática y normotensa.

  3. 75 FR 81721 - Debit Card Interchange Fees and Routing

    Science.gov (United States)

    2010-12-28

    ... cards not marketed or labeled as a gift card or certificate. EFTA Section 920 provides, however, that... cardholder initiates a purchase by providing his or her card or card information to a merchant. In the case... purchases at retailers in the early 1980s. It was not until the mid-1990s, however, that PIN debit became a...

  4. Student ID Cards: What You Should Know About Them

    Science.gov (United States)

    Hoffman, Jonathan; McGuire, Agnes C.

    1973-01-01

    Discusses the usefulness of photo ID cards for school security purposes, library control, student activities, and bus transportation control. Examines ways in which card costs can be reduced and the pros and cons of producing the cards at the school or of letting the work out. Problems involving card abuse and student rights are also considered.…

  5. Vocations as a source of identity: reciprocal relations between Big Five personality traits and RIASEC characteristics over 15 years.

    Science.gov (United States)

    Wille, Bart; De Fruyt, Filip

    2014-03-01

    Although work is a core part of life, the direction of influence from personality to work has typically been conceived as only unidirectional. The present study aims to contribute to the literature by considering reciprocal relations between personality and occupational characteristics, drawing on current perspectives from personality psychology (i.e., the social investment principle) and using a well-established framework to conceptualize career development (i.e., Holland's RIASEC theory). For this purpose, a longitudinal cohort of college alumni (N = 266) was tracked across a substantial and significant period in their professional career. Big Five personality traits and RIASEC occupational characteristics were assessed at the career start and 15 years later when their careers had unfolded. A combination of observed and latent variable analyses were used to disentangle the longitudinal and reciprocal relations between traits and occupational characteristics. Our results indicate that personality shapes and is shaped by our vocational experiences, suggesting that work can be a source of identity. The implications for theory and research on personality in the industrial and organizational literature are discussed alongside a number of practical implications for organizational and counseling settings.

  6. RENEWAL OF SWISS LEGITIMATION CARDS

    CERN Multimedia

    HR Division

    2000-01-01

    Members of the personnel, holders ofSWISS LEGITIMATION CARDSdue to expire during the year 2000, need to change them.Those concerned should bring:a recent passport photo (with NAME and first name on the back)the expired (or due to expire) card and a recto-verso photocopy on A4 size paper (for certified authentication) to:Bureau des cartes, Bât 33.1-009/1-011.HR Division will notify members of personnel as soon as the new cards are available.Be careful: if you are in possession of expired cards (Swiss or French), or if you present non-certified copies, the Organisation will not take any responsibility in case of difficulties with the customs authorities or the police.Human Resources DivisionTel. 79494-74683

  7. RENEWAL OF SWISS LEGITIMATION CARDS

    CERN Multimedia

    Division des Ressources Humaines

    2000-01-01

    Members of the personnel, holders of SWISS LEGITIMATION CARDSdue to expire during the year 2000, need to change them.Those concerned should bring:-\ta recent passport photo (with NAME and first name on the back)-\tthe expired (or due to expire) card and a recto-verso photocopy on A4 size paper (for certified authentication) to:Bureau des cartes, bât 33.1-009/1-011.HR Division will notify members of personnel as soon as the new cards are available.Be careful: if you are in possession of expired cards (Swiss or French), or if you present non-certified copies, the Organisation will not take any responsibility in case of difficulties with the customs authorities or the police.Human Resources DivisionTel. 79494-74683

  8. Materialism and credit card use by college students.

    Science.gov (United States)

    Pinto, M B; Parente, D H; Palmer, T S

    2000-04-01

    Much has been written in the popular press on credit card use and spending patterns of American college students. The proliferation of credit cards and their ease of acquisition ensure that students today have more opportunities for making more credit purchases than any other generation of college students. Little is known about the relationship between students' attitudes towards materialism and their use of credit cards. A study was conducted at three college campuses in the northeastern part of the United States where a total of 1,022 students were surveyed. Students' attitudes toward use of credit and their credit card balances were evaluated relative to their scores on Richins and Dawson's Materialism Scale (1992). Our findings suggest no significant difference between those individuals scoring high versus low on the Materialism Scale in terms of the number of credit cards owned and the average balance owed. Individuals high on materialism, however, significantly differed in terms of their uses for credit cards and their general attitude toward their use.

  9. The role of audience participation and task relevance on change detection during a card trick

    Directory of Open Access Journals (Sweden)

    Tim J Smith

    2015-02-01

    Full Text Available Magicians utilize many techniques for misdirecting audience attention away from the secret sleight of a trick. One technique is to ask an audience member to participate in a trick either physically by asking them to choose a card or cognitively by having them keep track of a card. While such audience participation is an established part of most magic the cognitive mechanisms by which it operates are unknown. Failure to detect changes to objects while passively viewing magic tricks has been shown to be conditional on the changing feature being irrelevant to the current task. How change blindness operates during interactive tasks is unclear but preliminary evidence suggests that relevance of the changing feature may also play a role (Triesch, Ballard, Hayhoe & Sullivan, 2003. The present study created a simple on-line card trick inspired by Triesch and colleagues’ (2003 that allowed playing cards to be instantaneously replaced without distraction or occlusion as participants were either actively sorting the cards (active condition or watching another person perform the task (passive conditions. Participants were given one of three sets of instructions. The relevance of the card color to the task increased across the three instructions. During half of the trials a card changed color (but retained its number as it was moving to the stack. Participants were instructed to immediately report such changes. Analysis of the probability of reporting a change revealed that actively performing the sorting task led to more missed changes than passively watching the same task but only when the changing feature was irrelevant to the sorting task. If the feature was relevant during either the pick-up or put-down action change detection was as good as during the passive block. These results confirm the ability of audience participation to create subtle dynamics of attention and perception during a magic trick and hide otherwise striking changes at the center of

  10. The role of audience participation and task relevance on change detection during a card trick.

    Science.gov (United States)

    Smith, Tim J

    2015-01-01

    Magicians utilize many techniques for misdirecting audience attention away from the secret sleight of a trick. One technique is to ask an audience member to participate in a trick either physically by asking them to choose a card or cognitively by having them keep track of a card. While such audience participation is an established part of most magic the cognitive mechanisms by which it operates are unknown. Failure to detect changes to objects while passively viewing magic tricks has been shown to be conditional on the changing feature being irrelevant to the current task. How change blindness operates during interactive tasks is unclear but preliminary evidence suggests that relevance of the changing feature may also play a role (Triesch et al., 2003). The present study created a simple on-line card trick inspired by Triesch et al.'s (2003) that allowed playing cards to be instantaneously replaced without distraction or occlusion as participants were either actively sorting the cards (Doing condition) or watching another person perform the task (Watching conditions). Participants were given one of three sets of instructions. The relevance of the card color to the task increased across the three instructions. During half of the trials a card changed color (but retained its number) as it was moving to the stack. Participants were instructed to immediately report such changes. Analysis of the probability of reporting a change revealed that actively performing the sorting task led to more missed changes than passively watching the same task but only when the changing feature was irrelevant to the sorting task. If the feature was relevant during either the pick-up or put-down action change detection was as good as during the watching block. These results confirm the ability of audience participation to create subtle dynamics of attention and perception during a magic trick and hide otherwise striking changes at the center of attention.

  11. Consumer Credit Card Use Intention and Influence Factors Analysis

    Directory of Open Access Journals (Sweden)

    Wang Yantao

    2017-01-01

    Full Text Available Credit card as a kind of advanced means of payment and the new way of consumer credit in the world widely, but in our country is faced with some problems, such as their per capita spending is low, open the card number is small, motionless bank card is a lot. In this paper, using the Logit model to analyze the Anshan city in Liaoning province consumer credit card usage. And combined with empirical analysis to provide banking management Suggestions and marketing countermeasures, including targeted to provide different kinds of credit card.

  12. Prefrontal system dysfunction and credit card debt.

    Science.gov (United States)

    Spinella, Marcello; Yang, Bijou; Lester, David

    2004-10-01

    Credit card use often involves a disadvantageous allocation of finances because they allow for spending beyond means and buying on impulse. Accordingly they are associated with increased bankruptcy, anxiety, stress, and health problems. Mounting evidence from functional neuroimaging and clinical studies implicates prefrontal-subcortical systems in processing financial information. This study examined the relationship of credit card debt and executive functions using the Frontal System Behavior Scale (FRSBE). After removing the influences of demographic variables (age, sex, education, and income), credit card debt was associated with the Executive Dysfunction scale, but not the Apathy or Disinhibition scales. This suggests that processes of conceptualizing and organizing finances are most relevant to credit card debt, and implicates dorsolateral prefrontal dysfunction.

  13. How Multiple Social Identities Are Related to Creativity.

    Science.gov (United States)

    Steffens, Niklas K; Gocłowska, Małgorzata A; Cruwys, Tegan; Galinsky, Adam D

    2016-02-01

    The present research examined whether possessing multiple social identities (i.e., groups relevant to one's sense of self) is associated with creativity. In Study 1, the more identities individuals reported having, the more names they generated for a new commercial product (i.e., greater idea fluency). In Study 2, multiple identities were associated with greater fluency and originality (mediated by cognitive flexibility, but not by persistence). Study 3 validated these findings using a highly powered sample. We again found that multiple identities increase fluency and originality, and that flexibility (but not persistence) mediated the effect on originality. Study 3 also ruled out several alternative explanations (self-affirmation, novelty seeking, and generalized persistence). Across all studies, the findings were robust to controlling for personality, and there was no evidence of a curvilinear relationship between multiple identities and creativity. These results suggest that possessing multiple social identities is associated with enhanced creativity via cognitive flexibility. © 2015 by the Society for Personality and Social Psychology, Inc.

  14. Disruption - Access cards service

    CERN Multimedia

    2014-01-01

    We would like to inform you that between 10 November and 15 December 2014, the access cards service in Building 55 will be disrupted, as the GS Department has decided to improve the facilities for users of this building. During the work, you will find the registration, biometric registration and dosimeter exchange services on the second floor of Building 55 and the vehicle sticker service on the ground floor along with the access cards service. We thank you for your understanding and apologise for any inconvenience caused.

  15. Familiarity and Within-Person Facial Variability: The Importance of the Internal and External Features.

    Science.gov (United States)

    Kramer, Robin S S; Manesi, Zoi; Towler, Alice; Reynolds, Michael G; Burton, A Mike

    2018-01-01

    As faces become familiar, we come to rely more on their internal features for recognition and matching tasks. Here, we assess whether this same pattern is also observed for a card sorting task. Participants sorted photos showing either the full face, only the internal features, or only the external features into multiple piles, one pile per identity. In Experiments 1 and 2, we showed the standard advantage for familiar faces-sorting was more accurate and showed very few errors in comparison with unfamiliar faces. However, for both familiar and unfamiliar faces, sorting was less accurate for external features and equivalent for internal and full faces. In Experiment 3, we asked whether external features can ever be used to make an accurate sort. Using familiar faces and instructions on the number of identities present, we nevertheless found worse performance for the external in comparison with the internal features, suggesting that less identity information was available in the former. Taken together, we show that full faces and internal features are similarly informative with regard to identity. In comparison, external features contain less identity information and produce worse card sorting performance. This research extends current thinking on the shift in focus, both in attention and importance, toward the internal features and away from the external features as familiarity with a face increases.

  16. 'Smart card' speeds triage, boosts safety.

    Science.gov (United States)

    2008-10-01

    An internally developed 'smart card' and a kiosk equipped with an electronic reader have helped Wellington (FL) Regional Medical Center speed up its triage process considerably. The new technology is extremely popular with the staff, as well as with the patients. Here are some of its benefits: Patients who have the card don't need to provide a detailed history every time they visit the ED. Nurses don't have to type in the patient's medical information. It automatically "populates" their computer screen. Security is maintained, because the information is stored in a database, and not on the card.

  17. 78 FR 39020 - Market Test on Gift Cards

    Science.gov (United States)

    2013-06-28

    ... POSTAL REGULATORY COMMISSION [Docket No. MT2011-2; Order No. 1755] Market Test on Gift Cards... Service filing requesting a temporary extension of a market test on gift cards. This notice informs the... INFORMATION: On June 18, 2013, the United States Postal Service moved to temporarily extend its Gift Card...

  18. The Civil Identity Registry Unification and Personal Data Protection in Brazil

    Directory of Open Access Journals (Sweden)

    José Renato Gaziero Cella

    2016-06-01

    Full Text Available There has long been treated the idea of discipline society and control society, dealing, for example, the works of Michel Foucault and Gilles Deleuze. The contemporary brought numerous developments in relation to the concepts assigned by Foucault and Deleuze, and many of these results were predicted by the analysis of events by these thinkers, however we are still in search for understanding the evolution of societies in relation to power and its maintenance, Law, Ethics, and possible future social outcomes. It is necessary to understand the dialectics of this topic to understand the current situation and thinking about the future. The scope of this paper is to understand the social control and the ramifications of power called the Information Society, both in public and in the private sphere. The state of the art, with the advent of internet, it is significant in the history of communications in terms of speed and agility. In light of the theoretical framework chosen for the development of this paper, the control is established by the idea of discipline and the society of control is the successor to the disciplinary paradigm (the discipline is already incorporated. For Deleuze, surveillance and monitoring activities are forms of control, ie, the reinvention of Jeremy Bentham’s panopticon. The ramifications of this form of society make use of the internet and its easy access to propagate the largest number of people possible, whether through social networking programs, reality shows, including surveillance cameras, just like George Orwell referred in his book 1984. We intend to analyze the information quickly overcomes the lack of security, given that it is today, for example, cases such as the Steering Committee of the National Civil Identification Record System - Brazilian Sirc, just implement a project- emission pilot of the new ID card - RIC, where you may have a unification of personal data and the bureaucracy of citizen service services

  19. Relations I – other as modus of identity

    Directory of Open Access Journals (Sweden)

    O. B. Sinkevych

    2016-11-01

    Full Text Available One of the most important modes of formation of identity are the relationships I­Other. In collaboration with Other I acquires social recognition and affirmation of their identity. The relationship I­Other largely defined the boundaries of self. But in an age of mass culture, these boundaries are defined externally: mass media form the man, internal space of which is devoid of value­meaning centre, blurred. Thus man is deprived of individual person and turns into a mass media stereotype. In this situation, the protection of borders of self becomes one of the urgent problems in the process of formation of personal identity. The formation of identity requires internal dialogue, reflection and introspection. Mass culture tends to eliminate the drama of the inner life of the individual, to free the person from the need to find an answer to complex questions. It offers simple and clear explanations of the problems of existence and thus deprives the individual possibilities of self­knowledge, self­correction. This trend, which is defined as interpassivity, manifested in the unwillingness and inability to make decisions, to make an informed choice, put it into action. Its consequence is also a deformation of the self­identification of the individual. Identity is formed and through the mechanism of self­identification with the standard, sample, an ideal. The image of the ideal I, to which the person is a vector indicating the direction of its development, the building of «future me». Such a standard in culture have traditionally been the «existential Other» – person that by its uniqueness serves the guide for self­development of the individual. Characteristic of popular culture the substitution the ideal of «Idol» deprives the individual of the required vector of self­development. The loss of the completeness relations I­Other, typical for the era of mass culture, turns into a crisis of personal identity. The desire and ability to

  20. On the use of OSL of chip card modules with molding for retrospective and accident dosimetry

    International Nuclear Information System (INIS)

    Woda, Clemens; Fiedler, Irene; Spöttl, Thomas

    2012-01-01

    The potential of optically stimulated luminescence of wire-bond chip card modules with molded encapsulations for retrospective and accident dosimetry is investigated. Contact-based and contactless modules were studied, the latter finding potential use in electronic documents (e.g. electronic passports, electronic identity cards). Investigations were carried out on intact as well as chemically prepared modules, extracting the filler material. Contact-based modules are characterized according to zero dose signal, correlation between OSL and TL, dose response and long-term signal stability. For prepared modules, the minimum detectable dose immediately after irradiation is 3 mGy and between 20 and 200 mGy for contact-based and contactless modules, respectively. Dose recovery tests on contact-based modules indicate that the developed methodology yields results with sufficient accuracy for measurements promptly after irradiation, whereas a systematic underestimation is observed for longer delay times. The reasons for this behaviour are as yet not fully understood.

  1. 8 CFR 1212.6 - Border crossing identification cards.

    Science.gov (United States)

    2010-01-01

    ... combined B-1/B-2 visitor visa and non-biometric border crossing identification card or (a similar stamp in... non-biometric border crossing identification card (or similar stamp in a passport), issued by the DOS... 8 Aliens and Nationality 1 2010-01-01 2010-01-01 false Border crossing identification cards. 1212...

  2. 76 FR 3180 - Market Test of Gift Cards

    Science.gov (United States)

    2011-01-19

    ... are very similar to money orders. Id. at 7. The Postal Service asserts that gift cards purchased from... POSTAL REGULATORY COMMISSION [Docket No. MT2011-2; Order No. 647] Market Test of Gift Cards AGENCY... Service proposal to conduct a 2-year market test involving the sale of gift cards. This document describes...

  3. Studi Perkembangan Pasar Smart Card Indonesia Pada Sektor Perbankan

    OpenAIRE

    Onny Rafizan

    2017-01-01

    Smart card merupakan salah satu teknologi yang sudah banyak digunakan di Indonesia di berbagai sektor. Dari sisi teknologi, industri dalam negeri sebenarnya sudah mampu memproduksi smart card, sehingga industri ini sangat potensial untuk dikembangkan menuju kemandirian. Penelitian ini dilakukan sebagai bagian dalam USAha pemerintah untuk mendorong perkembangan industri smart card dalam negeri, dengan tujuan memberikan gambaran kondisi pasar smart card di Indonesia saat ini. Pengumpulan data p...

  4. Establishing a Successful Smart Card Program.

    Science.gov (United States)

    Wiens, Janet

    2001-01-01

    Discusses how to run a successful smart card program through a comprehensive approach that includes a detailed plan for the present and future, high level support from school administration, and extensive user input. Florida State University is used to illustrate a successfully implemented smart card program. (GR)

  5. VOICES-POSITIONS IN DISCOURSES: HOW IS IDENTITY POSSIBLE?

    Directory of Open Access Journals (Sweden)

    T. V. Podolska

    2017-06-01

    Full Text Available The article is devoted to the question of identity of a modern man which constantly emerges as a powerful wave and is brought up to date with new force. Thus, continuing scientific research on identity and individual identity are being held, but from a different point of view, i.e. by using modernized methodology. The purpose of the research is to substantiate scientific approaches, epistemological coordinate changes, and critical trends in the issue of identity that would allow solving the problems of nature of a modern person being. In this respect the narrative approach is considered to be up-to-date. Methodology. Interdisciplinary research perspective allowed using a comprehensive methodology where, complementing each other, there are phenomenological, cultural, anthropological, hermeneutic, systematic, historical and genetic methods and method historical-philosophical and socio-cultural comparative studies. Originality. Personal being occurs in time, and it’s the narrative method, the main feature of which is its temporality and extension, that can involve all of us to self-understanding on the basis of certain turning points in our history. The compliance with relevant ethical standards in dealing with other people, and requirements of certain supra-individual structures properly correlates with our least resistant inner world view and outlook. As the narrative identity exists in the subjective sense of time, experience and understanding of the events of life, thus, despite the ontogenetic secondary of the personal identity with respect to the social one, the domination of the former one is more probable. Conclusions. The adoption of such an understanding of identity by everyone signifies a high degree of responsibility for self-constructing, which implicitly assumes not just to say “I”, but first of all to define your being as a certain social debt: to another person, to society, its history and everyday life through which we get a

  6. Insuficiencia cardíaca y diabetes

    Directory of Open Access Journals (Sweden)

    Jorge Thierer

    2006-01-01

    Full Text Available La prevalencia de la insuficiencia cardíaca y la diabetes continúa creciendo. Ambas están fuertemente asociadas. La diabetes es un fuerte predictor de aparición de insuficiencia cardíaca. Las razones son la presencia de enfermedad coronaria y los trastornos metabólicos vinculados con la resistencia a la insulina que generan disfunción contráctil. Los pacientes con insuficiencia cardíaca que son diabéticos tienen peor evolución. Los Betabloqueantes, vasodilatadores y los inhibidores de la enzima convertidora ejercen una influencia favorable, en tanto que el uso de glitazonas todavía es controversial. La insuficiencia cardíaca puede a su vez generar diabetes, debido a la activación del sistema nervioso simpático y al efecto del tratamiento. La comprensión adecuada de estos hechos es fundamental para tomar decisiones correctas y mejorar la suerte de los pacientes.

  7. CRC-cards for Product Modelling

    DEFF Research Database (Denmark)

    Hvam, Lars; Riis, Jesper; Hansen, Benjamin Loer

    2003-01-01

    , transportation, service and decommissioning. A main challenge when building product models is to collect and document the product related data, information and knowledge in a structured way. CRC cards are index cards (or computerized versions of these) which are used to record proposed classes, the behavior......This paper describes the CRC (class, responsibility, collaboration) modelling process for building product models. A product model is normally represented in an IT system which contains data, information and knowledge on industrial products and their life cycle properties e.g. manufacturing...... of the classes, their responsibilities, and their relationship to other classes (collaboration). CRC modelling gives an effective, low-tech method for domain-experts, programmers and users to work closely together to identify, structure, understand and document a product model. CRC cards were originally...

  8. Vulnerabilities in First-Generation RFID-enabled Credit Cards

    Science.gov (United States)

    Heydt-Benjamin, Thomas S.; Bailey, Daniel V.; Fu, Kevin; Juels, Ari; O'Hare, Tom

    RFID-enabled credit cards are widely deployed in the United States and other countries, but no public study has thoroughly analyzed the mechanisms that provide both security and privacy. Using samples from a variety of RFID-enabled credit cards, our study observes that (1) the cardholder's name and often credit card number and expiration are leaked in plaintext to unauthenticated readers, (2) our homemade device costing around 150 effectively clones one type of skimmed cards thus providing a proof-of-concept implementation for the RF replay attack, (3) information revealed by the RFID transmission cross contaminates the security of RFID and non-RFID payment contexts, and (4) RFID-enabled credit cards are susceptible in various degrees to a range of other traditional RFID attacks such as skimming and relaying.

  9. Identity related to living situation in six individuals with congenital quadriplegia.

    Science.gov (United States)

    Robey, Kenneth L

    2008-01-01

    This study was a preliminary examination of structural aspects of identity, particularly identity associated with living situation, in individuals who have quadriplegia due to cerebral palsy. A hierarchical classes algorithm (HICLAS) was used to construct idiographic 'identity structure' models for three individuals who are living in an inpatient hospital setting and for three individuals living in community-based group residences. Indices derived from the models indicate that the identity 'myself as one who has a disability' was structurally superordinate (i.e., resided at a high hierarchical level) for all six participants, suggesting a high level of importance of this identity in participants' sense of self. The models also indicate that while identity associated with one's particular living situation was superordinate for persons living in the hospital, it was not for persons living in community residences. While conclusions based on this small sample are necessarily limited, the data suggest that identity associated with living situation might differ in structural centrality, and presumably subjective importance, for persons living in inpatient versus community-based settings.

  10. Why do card issuers charge proportional fees?

    OpenAIRE

    Oz Shy; Zhu Wang

    2008-01-01

    This paper explains why payment card companies charge consumers and merchants fees which are proportional to the transaction values instead of charging a fixed per-transaction fee. Our theory shows that, even in the absence of any cost considerations, card companies earn much higher profit when they charge proportional fees. It is also shown that competition among merchants reduces card companies' gains from using proportional fees relative to a fixed per-transaction fee. Merchants are found ...

  11. Identity disorder and social-psychological adaptation in patients with hepatobiliary disease

    Directory of Open Access Journals (Sweden)

    V. V. Khramtsova

    2017-12-01

    Full Text Available Negative bodily experience due to health complications and disability is perceived as a difficult life situation. The success of adaptation, commitment to treatment and cooperation with a doctor depend on the personality characteristics that define behavioral representations. Aim. Investigate the structure of identity and mechanisms of social-psychological adaptation of patients with the hepatobiliary system disease. Contingent and methods. 75 patients with a diffuse liver disease - chronic hepatitis, mostly of viral etiology (36 people and liver cirrhosis (39 patients have been examined. We have applied clinical, clinical-psychological, mathematical and empirical methods, semi-structured cross-interviews ("patient-doctor", "patient-psychologist", diagnostics of personal characteristics, identity structure, social-psychological components of adaptation. Three leading personality profiles have been highlighted. Results. Persons with a disharmonious personality development are characterized by disorders in the area of identity formation and development. Fragmentation, the impossibility of personal integration and severe penetrability from the environment contribute to social-psychological maladjustment. The coping is aimed at preserving the problem situation and intensifying the intrapersonal conflict. For persons with difficulties in the adaptation of the personality, a violation of activity interaction with the surrounding world is characteristic, a ban on one's self-identity. Social adaptation is often disrupted due to instability in the emotional-volitional sphere and choosing low-adaptive coping strategies. Genuine "I" and identity formation is impeded for the individuals suppressing aggressive impulses. Adaptability tends to be discrete. With mental stress increasing, the likelihood of choosing low-adaptive coping strategies increases. Conclusions. When drafting psycho-correction programs and medical treatment of people with a hepatobiliary

  12. [Card-based age control mechanisms at tobacco vending machines. Effect and consequences].

    Science.gov (United States)

    Schneider, S; Meyer, C; Löber, S; Röhrig, S; Solle, D

    2010-02-01

    Until recently, 700,000 tobacco vending machines provided uncontrolled access to cigarettes for children and adolescents in Germany. On January 1, 2007, a card-based electronic locking device was attached to all tobacco vending machines to prevent the purchase of cigarettes by children and adolescents under 16. Starting in 2009, only persons older than 18 are able to buy cigarettes from tobacco vending machines. The aim of the present investigation (SToP Study: "Sources of Tobacco for Pupils" Study) was to assess changes in the number of tobacco vending machines after the introduction of these new technical devices (supplier's reaction). In addition, the ways smoking adolescents make purchases were assessed (consumer's reaction). We registered and mapped the total number of tobacco points of sale (tobacco POS) before and after the introduction of the card-based electronic locking device in two selected districts of the city of Cologne. Furthermore, pupils from local schools (response rate: 83%) were asked about their tobacco consumption and ways of purchase using a questionnaire. Results indicated that in the area investigated the total number of tobacco POSs decreased from 315 in 2005 to 277 in 2007. The rates of decrease were 48% for outdoor vending machines and 8% for indoor vending machines. Adolescents reported circumventing the card-based electronic locking devices (e.g., by using cards from older friends) and using other tobacco POSs (especially newspaper kiosks) or relying on their social network (mainly friends). The decreasing number of tobacco vending machines has not had a significant impact on cigarette acquisition by adolescent smokers as they tend to circumvent the newly introduced security measures.

  13. The Significance of Mandatory Data Breach Warnings to Identity Crime

    OpenAIRE

    Eric Holm; Geraldine Mackenzie

    2015-01-01

    The relationship between data breaches and identity crime has been scarcely explored in current literature. However, there is an important relationship between the misuse of personal identification information and identity crime as the former is in many respects the catalyst for the latter. Data breaches are one of the ways in which this personal identification information is obtained by identity criminals, and thereby any response to data breaches is likely to impact the incidence of identit...

  14. OPENING HOURS FOR CARDS OFFICE

    CERN Multimedia

    Human Resources Division

    2001-01-01

    Due to the extra workload generated by the global renewal of French cards and in order to preserve the level of service offered by the cards office, please note that this office will in future be open every morning from 8.30 a.m. to 12.30 p.m. until further notice. The service can be contacted by telephone during the same hours. Thank you for your understanding.

  15. Prototype ALICE front-end card

    CERN Multimedia

    Maximilien Brice

    2004-01-01

    This circuit board is a prototype 48-channel front end digitizer card for the ALICE time projection chamber (TPC), which takes electrical signals from the wire sensors in the TPC and shapes the data before converting the analogue signal to digital data. A total of 4356 cards will be required to process the data from the ALICE TPC, the largest of this type of detector in the world.

  16. Credit Card Attitudes and Behaviors of College Students

    Science.gov (United States)

    Joo, S.-H.; Grable, J. E.; Bagwell, D. C.

    2005-01-01

    At a southwestern public university, 242 students responded to a questionnaire about their credit-card use and attitudes. The results revealed that about 70 percent of the students held one or more credit cards, and about 10 percent had five or more credit cards. Twenty-two percent never kept copies of their charge slips, and only 49 percent paid…

  17. 77 FR 40338 - Announcing Revised Draft Federal Information Processing Standard (FIPS) 201-2, Personal Identity...

    Science.gov (United States)

    2012-07-09

    ... ``Federal Emergency Response Official'' indicator or country of citizenship information, when present, shall... by including it as one of the core mandatory logical credentials of the PIV Card. The digital...

  18. Academic identities of black female first-year students

    African Journals Online (AJOL)

    Erna Kinsey

    sense of security, confidence, self-esteem and identity. South Africa is ... own personal manner (De Wet & Ackermann:2001:2). When looking ..... The Relationship between Identity. Development ... Self-disclosure of College Students to Faculty:.

  19. Gender, identity and culture in learning physics

    Science.gov (United States)

    Corbett, Katelin

    2016-06-01

    Student engagement in science, as defined by Iva Gurgel, Mauricio Pietrocola, and Graciella Watanabe, is of great importance because a student's perceived compatibility with science learning is highly influenced by personal identities, or how students see themselves in relations to the world. This can greatly impact their learning experiences. In this forum, I build on the work of Gurgel, Pietrocola, and Watanabe by exploring the relationships between engagement in physics and gender, and by looking at the expansive nature of the concept of culture. I expand the conversation by investigating ways in which learning science has impacted my own identity/worldview, particularly how it affects my personal teaching and learning experiences. I focus the conversation around the relationship between gender and the experience of learning science to further the dialogue concerning identity and how it impacts engagement in science. I also look at the role of didactic transposition in the perceived disconnect with science. I reveal my experiences and analysis through a personal narrative.

  20. Loyalty Card Promotional Activity in Budget Hotel

    OpenAIRE

    Teng, Fei

    2010-01-01

    Loyalty card is one of the most commonly used promotional activities in business. Thus far, there are some research has been done on luxury hotel, but very few researches are on budget hotel. So, the purpose of the thesis is finding out the Swedish customers’ attitude and behavior towards budget hotel’s loyalty card; getting to know what factors influence Swedish customers’ response towards the loyalty card and budget hotels. In the thesis, the main research problem is “How do Swedish custome...

  1. Benefits of Using Vocabulary Flash Cards in an EFL Classroom

    OpenAIRE

    Jonathan, Aliponga; Christopher C, Johnston

    2013-01-01

    This paper was written to research and advocate the use of English word cards withregard to vocabulary acquisition and English productive and receptive competency. Also,student perceptions of using and making word cards will be examined to show theimportance of including a word card policy in an EFL classroom. Despite all the positiveresearch done on word cards, it is surprising how many Japanese EFL students do notutilize word cards in their English studies. For this research, 108 students f...

  2. Firewall Mechanism in a User Centric Smart Card Ownership Model

    OpenAIRE

    Akram , Raja Naeem; Markantonakis , Konstantinos; Mayes , Keith

    2010-01-01

    International audience; Multi-application smart card technology facilitates applications to securely share their data and functionality. The security enforcement and assurance in application sharing is provided by the smart card firewall. The firewall mechanism is well defined and studied in the Issuer Centric Smart Card Ownership Model (ICOM), in which a smart card is under total control of its issuer. However, it is not analysed in the User Centric Smart Card Ownership Model (UCOM) that del...

  3. Tumores cardíacos primarios

    Directory of Open Access Journals (Sweden)

    Rosa Eugenia Díaz Garriga

    2013-10-01

    Full Text Available Introducción: los tumores cardíacos primarios son aquellos que se originan en Miocardio o Pericardio. El 90% son benignos, no son invasivos, pero debido a su localización pueden provocar alteraciones hemodinámicas graves y arrítmias. Presentación del caso: dos casos portadores de tumores cardíacos diagnosticados en la etapa prenatal, una gestante de 32 años, portadora de una Neurofribromatosis que en la ecocardiografía fetal de su hijo, se identifican dos tipos de tumores cardíacos, un mixoma auricular y un fibroma, y un niño que desde la etapa prenatal se diagnosticó un rabdomioma, lo cual se confirmó al nacimiento y que regresó espontáneamente. Conclusiones: a ecocardiografía fetal permite cada vez con más frecuencia, el diagnóstico intraútero de tumores cardíacos. Los rabdomiomas regresan en más del 50% de los casos, pero pueden ser un marcador de Esclerosis Tuberosa. Los tumores cardiacos se asocian a otras afecciones congénitas y requieren de tratamiento quirúrgico. Aspectos todos a tener en consideración para realizar el asesoramiento genético a la familia.

  4. A pessoa com deficiência e a crise das identidades na contemporaneidade The handicapped person and identity crisis in the present day

    Directory of Open Access Journals (Sweden)

    Rita de Cássia Barbosa Paiva Magalhães

    2010-04-01

    those individuals who differ from what is socially expected. The identity of the handicapped person tends, because of the stigma, to undergo processes of social control, in which important opportunities for metamorphosis are denied. Discussing identity seems to be, therefore, the connecting thread for understanding social and scholastic inclusion of the handicapped person

  5. The Relationship between Cell Phone Use and Identity Theft

    Science.gov (United States)

    Saunders, Lewis O.

    2014-01-01

    The growth of mobile phone use has paralleled increased reports of identity theft. Identity theft can result in financial loss and threats to a victim's personal safety. Although trends in identity theft are well-known, less is known about individual cell phone users' attitudes toward identity theft and the extent to which they connect it to cell…

  6. Enhancing Students' Learning: Instant Feedback Cards

    Science.gov (United States)

    Mohrweis, Lawrence C.; Shinham, Kathe M.

    2015-01-01

    This study illustrates an active learning approach using instant feedback cards in the first course in accounting. The objectives of this study are to (1) describe instant feedback cards and (2) show how this tool, when used in an active learning environment, can enhance learning. We examined whether students exposed to immediate feedback…

  7. Compulsive buying and credit card misuse among credit card holders: The roles of self-esteem, materialism, impulsive buying and budget constraint

    Directory of Open Access Journals (Sweden)

    Nor Asiah Omar

    2014-02-01

    Full Text Available Purpose: This study aims to examine the factors that influence credit card misuse among working adults in Klang Valley, Malaysia. The relationship among self-esteem, materialism, impulsive buying, budget constraint, compulsive buying and credit card misuse are explored in this study. Design/methodology/approach: A total of 186 questionnaires was collected via convenience sampling from credit card users of working adults in Malaysia. A structural equation model that assesses the relationship between the proposed variables is tested using AMOS 20. Findings: The findings reveal that budget constraints, impulsive buying and materialism have a statistically significant influence on compulsive buying. In terms of credit card misuse, it is influenced negatively by self-esteem while positively by compulsive buying. Originality/value: Despite vast research on compulsive buying and credit card misuse, very few studies have examined it in the non-Western context.

  8. [Pinocchio and the unattained identity: Jervis' contribution to child clinical psychology].

    Science.gov (United States)

    Meacci, Stefano

    2012-01-01

    Giovanni Jervis is mainly known as a psychiatrist, but he also worked on psychological methodology and tackled important issues in clinical psychology. This essay describes the concept of personal identity elaborated by Jervis and its importance in Child Clinical Psychology. The problems related to personal identity appear very early in Jervis' work, influenced by the ethnologist Ernesto De Martino. His first considerations are found in his Preface to The Adventures of Pinocchio by Carlo Collodi (1968), in which Jervis describes the unhappy upbringing, the anti-social behaviour, and the unattained identity of the wooden puppet. Subsequently, in Presenza e identith (1984), Fondamenti di Psicologia Dinamica (1993) and La conquista dell'identith (1997), Jervis dealt with the theme of identity from a Dynamic Psychology perspective, showing that the formation of personal identity is a basic aspect of the development of the individual that starts in early childhood.

  9. Family Registration Card as electronic medical carrier in Bosnia and Herzegovina.

    Science.gov (United States)

    Novo, Ahmed; Masic, Izet; Toromanovic, Selim; Loncarevic, Nedim; Junuzovic, Dzelaludin; Dizdarevic, Jadranka

    2004-01-01

    Medical documentation is a very important part of the medical documentalistics and is occupies a large part of daily work of medical staff working in Primary Health Care. Paper documentation is going to be replaced by electronic cards in Bosnia and Herzegovina and a new Health Care System is under development, based on an Electronic Family Registration Card. Developed countries proceeded from the manual and semiautomatic method of medical data processing to the new method of entering, storage, transferring, searching and protecting data, using electronic equipment. Currently, many European countries have developed a Medical Card Based Electronic Information System. Three types of electronic card are currently in use: a Hybrid Card, a Smart Card and a Laser Card. The dilemma is which card should be used as a data carrier. The Electronic Family Registration Cared is a question of strategic interest for B&H, but also a great investment. We should avoid the errors of other countries that have been developing card-based system. In this article we present all mentioned cards and compare advantages and disadvantages of different technologies.

  10. PENGARUH PERMAINAN CALL CARDS TERHADAP HASIL BELAJAR DAN AKTIVITAS PEMBELAJARAN BIOLOGI

    Directory of Open Access Journals (Sweden)

    A. Machin

    2012-10-01

    Full Text Available Tujuan penelitian untuk mengetahui pengaruh permainan call cards terhadap hasil belajar dan aktivitas pembelajaran. Aktivitas pembelajaran yang diukur meliputi aktivitas individual siswa dan kinerja guru. Penelitian ini merupakan penelitian eksperimental. Hasil penelitian menunjukkan bahwa media permainan call cards berkontribusi sebesar 46% terhadap hasil belajar siswa. Hasil belajar siswa yang diberi media permainan call cards lebih baik daripada hasil belajar siswa yang tidak diberi mediapermainan call cards. Dengan demikian, media permainan call cards dapat menjadi alternatif dalam pencapaian hasil belajar biologi yang lebih baik.   Research purposes to determine the effect of call cards game against learning outcomes and learning activities. Learning activities that were measured included the activity of individual student and teacher performance. This research was experimental. The results showed that the media play call cards account for 46% of the student learning outcomes. Learning outcomes of students who were given media cards call the game better than the learning outcomes of students who were not given mediapermainan call cards. Thus, the media play call cards can be an alternative in achieving the learning outcomes of biology better.

  11. Sample Development on Java Smart-Card Electronic Wallet Application

    OpenAIRE

    Toma Cristian

    2009-01-01

    In this paper, are highlighted concepts as: complete Java card application, life cycle of an applet, and a practical electronic wallet sample implemented in Java card technology. As a practical approach it would be interesting building applets for ID, Driving License, Health-Insurance smart cards, for encrypt and digitally sign documents, for E-Commerce and for accessing critical resources in government and military field. The end of this article it is presented a java card electronic wallet ...

  12. The symbiosis between identity and migrant entrepreneurship ...

    African Journals Online (AJOL)

    In this article I have attempted to situate entrepreneurial identity in its more comprehensive personal context by tracking cultural transformations and attempting to understand how Ghanaian women entrepreneurs in Durban negotiate their day-to-day social identities. These women entrepreneurs found themselves projecting ...

  13. Australian healthcare: a smart card for a clever country.

    Science.gov (United States)

    Morris, S; Cooper, J; Bomba, D; Brankovic, L; Miller, M; Pacheco, F

    1995-10-01

    In this paper we give an overview of smart card technology how a smart card could be used as a healthcare card and the benefits that would most likely result from doing so. The smart card memory can be zoned into different security levels. The top security zone may contain an individual's full medical history while the lowest security zone may contain the cardholders name and address. Access to the different zones depends on the level of security of the zone. The higher the security level the more restrictive the access method. Were smart cards adopted for the storage of medical histories it would change the form of medical information recorded, not merely convert paper files to electronic ones. Storage of an individual's medical history on a smart card raises important privacy issues. These privacy issues are discussed particularly as they relate to the Australian community.

  14. Design and implementation of a smart card based billing system for ...

    African Journals Online (AJOL)

    A smart card based billing system for petroleum dispenser is just one of the many ways in which smart cards can be employed to make commerce efficient. It incorporates the use of smart card as its legal tender and a smart card reader embedded into the filling station dispenser design. The smart card reader processes the ...

  15. Introducing Teamwork Challenges in Simulation Using Game Cards.

    Science.gov (United States)

    Chang, Todd P; Kwan, Karen Y; Liberman, Danica; Song, Eric; Dao, Eugene H; Chung, Dayun; Morton, Inge; Festekjian, Ara

    2015-08-01

    Poor teamwork and communication during resuscitations are linked to patient safety problems and poorer outcomes. We present a novel simulation-based educational intervention using game cards to introduce challenges in teamwork. This intervention uses sets of game cards that designate roles, limitations, or communication challenges designed to introduce common communication or teamwork problems. Game cards are designed to be applicable for any simulation-based scenario and are independent from patient physiology. In our example, participants were pediatric emergency medicine fellows undergoing simulation training for orientation. We describe the use of card sets in different scenarios with increasing teamwork challenge and difficulty. Both postscenario and summative debriefings were facilitated to allow participants to reflect on their performance and discover ways to apply their strategies to real resuscitations. In this article, we present our experience with the novel use of game cards to modify simulation scenarios to improve communication and teamwork skills.

  16. ROLE OF PROFESSIONAL IDENTITY IN SELF-REALIZATION OF PSYCHOLOGISTS-TEACHERS

    Directory of Open Access Journals (Sweden)

    S I Kudinov

    2015-12-01

    Full Text Available The article highlights the problem of the role of professional identity in self-realization of psychologists- teachers. Within the frame of a system-defined approach the research identifies and describes the individual- typological features of the phenomena interesting to us. The works that focus on the study of self-realization are subjected to the analysis, as the result it is noted that in this field there are still gaps in the understanding of this issue. Thus, the study from the perspective of the influence of professional identity on the successful self-realization of the personality is recognized as relevant. In the framework of this study the following assumptions are put forward: there is a relationship between the professional identity and successful self- realization of the personality; the level of formation of professional identity has an impact on the success of personality self-realization; the professional identity not fully formed acts as a barrier for creativity, activity, internality and constructive self- realization; fully formed professional identity provides a high success rate of self-realization. The purpose of this study was to investigate the features of self- realization and professional identity of psychologists-teachers. For the study, we used “Multidimensional questionnaire of personality self-realization” (MQPS by S.I. Kudinov, for the study of professional identity the following methods were used: “Professional identity-marginalism” questionnaire by E.P. Ermolaeva and Methods of measuring professional identity (MMPI by L.B. Schneider. The results obtained were subjected to quantitative analysis. In the article the author relies on the data gathered as a result of a study conducted at the Institute of Education Development of the Republic of Bashkortostan (GAOU DPO IRO RB, city of Ufa. The sample consisted of 142 educational psychologists. As a result of the conducted research, the specific relationship

  17. "It Is Not Wit, It Is Truth:" Transcending the Narrative Bounds of Professional and Personal Identity in Life and in Art.

    Science.gov (United States)

    Elliot, Michelle L

    2016-09-01

    Taking inspiration from the film Wit (2001), adapted from Margaret Edson's (1999) Pulitzer Prize-winning play, this article explores the particularities of witnessing a cinematic cancer narrative juxtaposed with the author's own cancer narrative. The analysis reveals the tenuous line between death and dying, illness and wellness, life and living and the resulting identities shaped in the process of understanding both from a personal and professional lens. By framing these representations of illness experience within the narrative constructions of drama, time, metaphor and morality, the personal stories of intellectual knowledge converging with intimate and embodied knowing are revealed.

  18. Dissociative Identity Disorder

    Science.gov (United States)

    Schmidt, Tom

    2007-01-01

    Few psychological disorders in the Diagnostic Statistical Manual have generated as much controversy as Dissociative Identity Disorder (DID). For the past 35 years diagnoses of DID, previously referred to as Multiple Personality Disorder (MPD), have increased exponentially, causing various psychological researchers and clinicians to question the…

  19. Designing minimum data sets of health smart card system

    Directory of Open Access Journals (Sweden)

    Mohtaram Nematollahi

    2014-10-01

    Full Text Available Introduction: Nowadays different countries benefit from health system based on health cards and projects related to smart cards. Lack of facilities which cover this technology is obvious in our society. This paper aims to design Minimum Data Sets of Health Smart Card System for Iran. Method: This research was an applied descriptive study. At first, we reviewed the same projects and guidelines of selected countries and the proposed model was designed in accordance to the country’s needs, taking people’s attitude about it by Delphi technique. A data analysis in study stage of MDS(Minimum Data Sets of Health Smart Card in the selective countries was done by comparative tables and determination of similarities and differences of the MDS. In the stage of gaining credit for model, it was accomplished with descriptive statistics to the extent of absolute and relative frequency through SPSS (version 16. Results: MDS of Health Smart Card for Iran is presented in the patient’s card and health provider’s card on basisof studiesin America, Australia, Turkey and Belgium and needs of our country and after doing Delphi technique with 94 percent agreement confirmed. Conclusion: Minimum Data Sets of Health Smart Card provides continuous care for patients and communication among providers. So, it causes a decrease in the complications of threatening diseases. Collection of MDS of diseases increases the quality of care assessment

  20. Apparent Amnesia : interidentity memory functioning in dissociative identity disdorder

    NARCIS (Netherlands)

    Huntjens, R.J.C.

    2003-01-01

    Dissociative identity disorder (DID) is characterized by the presence of two or more distinct identities or personality states that recurrently take control of the individual s behavior. Between 95 and 100 % of DID patients report experiences of blank spells for periods of time when other identities

  1. Introduction of card payment system in a merchant company

    OpenAIRE

    Štrukelj, Anja

    2015-01-01

    The thesis is about PCI DSS, which stands for Payment Card Industry Data Security Standard. PCI DSS represents a uniőed approach to the protection of sensitive card data and to prevention of abuses in the payment card industry. Implementation of the standard in the company provides a higher level of security, it maintains conődence, protection against abuse and consequently protection against őnancial losses and loss of reputation. When paying with credit cards, the őrst lin...

  2. The Position of a Teacher as a Factor of Forming Students' Socio-Cultural Identities (On the Example of the Russian Civil Identity)

    Science.gov (United States)

    Shakurova, Marina V.

    2015-01-01

    The article presents experience of structuring and description of teachers' position in the process of forming socio-cultural identity of the person, detailed in regard to the process of formation of one of the subtypes of socio-cultural identity--Russian civil identity. We identified and described real subjective, nominally subjective and…

  3. Paro Cardíaco en el Embarazo

    OpenAIRE

    Manuel Eduardo Sáenz Madrigal; Carlos Adrián Vindas Morera

    2013-01-01

    El paro cardíaco en el embarazo presenta un escenario único en el que están incluidos dos pacientes: la madre y el feto. El manejo de este escenario requiere de un equipo multidisciplinario incluyendo especialistas en anestesia, obstetricia, neonatología, cardiología y en ocasiones cirugía cardíaca. Los protocolos de soporte vital básico y soporte cardíaco avanzado deben ser implementados, sin embargo, dados los cambios anatómicos y fisiológicos que ocurren en el embarazo, algunas modificacio...

  4. Personality moderates the links of social identity with work motivation and job searching.

    Science.gov (United States)

    Baay, Pieter E; van Aken, Marcel A G; van der Lippe, Tanja; de Ridder, Denise T D

    2014-01-01

    Work motivation is critical for successful school-to-work transitions, but little is known about its determinants among labor market entrants. Applying a social identity framework, we examined whether work motivation and job searching are social-contextually determined. We expected that some job seekers are more sensitive to contextual influence, depending on their personality. Mediation analyses on 591 Dutch vocational training students indicate that the perception of more positive work norms in someone's social context was related to higher levels of intrinsic motivation, which in turn predicted higher preparatory job search behavior and job search intentions. Multi-group analysis shows that perceived work norms more strongly predict work motivation among overcontrollers compared to resilients and undercontrollers. In conclusion, work motivation and job searching appear contextually determined: especially among those sensitive to contextual influence, people seem to work when they believe that is what people like them do.

  5. Selecting e-Purse Smart Card Technology via Fuzzy AHP and ANP

    Directory of Open Access Journals (Sweden)

    Nurgül Demirtaş

    2014-01-01

    Full Text Available Developments in the information technologies provide important advantages to consumers and companies. Nowadays, smart card technology starts to use e-purse applications. The aim of this paper is to identify the most important decision criteria to select the best card technology. In this study, at first smart card and multiple selection techniques were explained. Then the best card technology was selected for an e-purse application. The three types of card technologies were examined and the most important criteria were taken into account by the software developer while they develop card software. Fuzzy analytic hierarchy process (FAHP and analytical network process (ANP techniques were used to compare smart card technologies.

  6. School Identity in the Context of Alberta Charter Schools

    Science.gov (United States)

    Thompson, Merlin; Gereluk, Dianne; Kowch, Eugene

    2016-01-01

    The central tenet of this investigation is that educational institutions possess their own school identity. Acknowledging that school identity is influenced by institutional mechanisms and personal dynamics, we examine school identity in the context of 13 Alberta charter schools. Narratives of 73 educational stakeholders across the network of…

  7. REMINDER - FRENCH CARDS - NEW PROCEDURE FOR INITIAL APPLICATION

    CERN Multimedia

    Human Resources Division

    2002-01-01

    The Human Resources Division would like to remind members of personnel that they are obliged to submit an application form for a French card as soon as they have a permanent address in either Switzerland or in France and they are actually living there. Following the rationalization of our administrative procedures, as of October 1st, 2002, the initial application procedure for a French card will now be as follows: The member of personnel should complete an application form. If necessary, an application form must also be completed for family members. These forms must then be transferred via e-mail to the appropriate Divisional Administrative Officer (DAO) who will forward them to the Cards Service. In parallel, the member of personnel should submit the necessary supporting documents to the Cards Service. Users are requested to apply for a French card through the Users' Office. The application form (Word format only), the procedural details, the necessary supporting documents as well as the conditions of issue ...

  8. Credit Card Quiz.

    Science.gov (United States)

    Marks, Jeff

    2000-01-01

    Describes an activity in which students design credit cards and discover for themselves the mathematical realities of buying on credit. Employs multiple-intelligence theory to increase the chance that all students will be reached. (YDS)

  9. 76 FR 43393 - Debit Card Interchange Fees and Routing

    Science.gov (United States)

    2011-07-20

    ... programs and certain reloadable, general-use prepaid cards not marketed or labeled as a gift card or gift... evolved to support payments made by consumers for the purchase of goods or services at merchants... of the purchase transaction. Debit cards are generally issued by depository institutions to their...

  10. Impact of Closed-Loop Gift Card Promotions By Businesses

    Directory of Open Access Journals (Sweden)

    Kathryn W. Ernstberger

    2013-07-01

    Full Text Available At their inception, gift cards were sold by businesses to customers to give as gifts to others. More recently, gift cards are beingused strategically by businesses to manage and transform their relationships with customers. Of particular interest here is the closed-loop gift card that can only be redeemed at the business whose name is on it. This analysis discusses the impact of closed-loop gift card promotions and evaluates the impact of these promotions ontotal spending, lift and redemption rates.

  11. Legal Environment Against Online Identity Theft: Comparative Analysis of USA’s and Lithuania’s Legislation

    Directory of Open Access Journals (Sweden)

    Paulius Pakutinskas

    2011-08-01

    Full Text Available Summary. The growth of the Internet and e-commerce has taken identity theft to new levels. Indeed, consumers, financial institutions and the whole economic suffer from online identity theft. This article analyses the legal environment which is concerned with online identity theft. The analysis is based on the comparison of two countries—USA’s and Lithuania’s— legislation, regulating such fields as personal data protection, electronic information security, identification, criminal liability and special legal acts, regulating online identity theft, because if all these fields are sufficiently regulated, the fight with online identity theft is more successful. The choice of the countries is based on the fact that USA has experience in fighting online identity theft while Lithuania is taken into a deeper consideration asit is a member of the European Union, the legal system of which has great differences in comparison to the USA. The analysis of legislation, regulating personal data protection, is based on comparison of the main requirements and principles of personal data protection, institutions which are responsible for personal data protection and liability for breaches of personal data protection rules. The authors of the present article also present similarities and differences of legal regulation of electronic information security in USA and Lithuania by comparing the institutional control of information security, main requirements for information security and liability for breaches of information security rules. Also, the variety of personal identity documents in the USA and Lithuania is analyzed, main personal identity documents are presented as well as regulation of online identity theft, elements and types of identification online are discussed. Moreover, criminal and special legislation of USA and Lithuania is taken into consideration in order to discuss and compare criminalization aspects of online identity theft.In this article

  12. Legal Environment Against Online Identity Theft: Comparative Analysis of USA’s and Lithuania’s Legislation

    Directory of Open Access Journals (Sweden)

    Darius Štitilis

    2013-08-01

    Full Text Available The growth of the Internet and e-commerce has taken identity theft to new levels. Indeed, consumers, financial institutions and the whole economic suffer from online identity theft. This article analyses the legal environment which is concerned with online identity theft. The analysis is based on the comparison of two countries—USA’s and Lithuania’s— legislation, regulating such fields as personal data protection, electronic information security, identification, criminal liability and special legal acts, regulating online identity theft, because if all these fields are sufficiently regulated, the fight with online identity theft is more successful. The choice of the countries is based on the fact that USA has experience in fighting online identity theft while Lithuania is taken into a deeper consideration as it is a member of the European Union, the legal system of which has great differences in comparison to the USA. The analysis of legislation, regulating personal data protection, is based on comparison of the main requirements and principles of personal data protection, institutions which are responsible for personal data protection and liability for breaches of personal data protection rules. The authors of the present article also present similarities and differences of legal regulation of electronic information security in USA and Lithuania by comparing the institutional control of information security, main requirements for information security and liability for breaches of information security rules. Also, the variety of personal identity documents in the USA and Lithuania is analyzed, main personal identity documents are presented as well as regulation of online identity theft, elements and types of identification online are discussed. Moreover, criminal and special legislation of USA and Lithuania is taken into consideration in order to discuss and compare criminalization aspects of online identity theft. In this article it is

  13. Investigating customer racial discrimination in the secondary baseball card market.

    Science.gov (United States)

    Primm, Eric; Piquero, Nicole Leeper; Piquero, Alex R; Regoli, Robert M

    2011-01-01

    A growing body of literature in a variety of disciplines has appeared over the last 20 years examining customer racial bias in the secondary sports card market; however, consensus on the matter has yet to emerge. In this article, we explore the more subtle ways that a player's race/ethnicity may affect the value of his sports card including a player's skin tone (light- to dark-skinned). Data were obtained for 383 black, Latino, and white baseball players who had received at least one vote for induction into Major League Baseball's Hall of Fame including their career performance statistics, rookie card price, card availability, Hall of Fame status, and skin tone. Findings indicate that card availability is the primary determinant of card value while a player's skin tone has no direct effect. Subsequent analysis demonstrates that a player's race (white/non-white) rather than skin tone did have an effect as it interacts with Hall of Fame status to influence his rookie card price.

  14. Security, at what cost? A stated preference approach toward understanding individuals' privacy and civil liberties trade-offs regarding security measures

    NARCIS (Netherlands)

    Robinson, N.; Potoglou, D.

    2010-01-01

    In the presently heightened security environment there are a number of examples of policy that must strike a delicate balance between strengthening security without jeopardising public liberties and personal privacy. The introduction of national identity cards and biometric passports, the expansion

  15. Longitudinal associations between exercise identity and exercise motivation: A multilevel growth curve model approach.

    Science.gov (United States)

    Ntoumanis, N; Stenling, A; Thøgersen-Ntoumani, C; Vlachopoulos, S; Lindwall, M; Gucciardi, D F; Tsakonitis, C

    2018-02-01

    Past work linking exercise identity and exercise motivation has been cross-sectional. This is the first study to model the relations between different types of exercise identity and exercise motivation longitudinally. Understanding the dynamic associations between these sets of variables has implications for theory development and applied research. This was a longitudinal survey study. Participants were 180 exercisers (79 men, 101 women) from Greece, who were recruited from fitness centers and were asked to complete questionnaires assessing exercise identity (exercise beliefs and role-identity) and exercise motivation (intrinsic, identified, introjected, external motivation, and amotivation) three times within a 6 month period. Multilevel growth curve modeling examined the role of motivational regulations as within- and between-level predictors of exercise identity, and a model in which exercise identity predicted exercise motivation at the within- and between-person levels. Results showed that within-person changes in intrinsic motivation, introjected, and identified regulations were positively and reciprocally related to within-person changes in exercise beliefs; intrinsic motivation was also a positive predictor of within-person changes in role-identity but not vice versa. Between-person differences in the means of predictor variables were predictive of initial levels and average rates of change in the outcome variables. The findings show support to the proposition that a strong exercise identity (particularly exercise beliefs) can foster motivation for behaviors that reinforce this identity. We also demonstrate that such relations can be reciprocal overtime and can depend on the type of motivation in question as well as between-person differences in absolute levels of these variables. © 2017 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.

  16. Evolution of optically nondestructive and data-non-intrusive credit card verifiers

    Science.gov (United States)

    Sumriddetchkajorn, Sarun; Intaravanne, Yuttana

    2010-04-01

    Since the deployment of the credit card, the number of credit card fraud cases has grown rapidly with a huge amount of loss in millions of US dollars. Instead of asking more information from the credit card's holder or taking risk through payment approval, a nondestructive and data-non-intrusive credit card verifier is highly desirable before transaction begins. In this paper, we review optical techniques that have been proposed and invented in order to make the genuine credit card more distinguishable than the counterfeit credit card. Several optical approaches for the implementation of credit card verifiers are also included. In particular, we highlight our invention on a hyperspectral-imaging based portable credit card verifier structure that offers a very low false error rate of 0.79%. Other key features include low cost, simplicity in design and implementation, no moving part, no need of an additional decoding key, and adaptive learning.

  17. Card counting in continuous time

    OpenAIRE

    Andersson, Patrik

    2012-01-01

    We consider the problem of finding an optimal betting strategy for a house-banked casino card game that is played for several coups before reshuffling. The sampling without replacement makes it possible to take advantage of the changes in the expected value as the deck is depleted, making large bets when the game is advantageous. Using such a strategy, which is easy to implement, is known as card counting. We consider the case of a large number of decks, making an approximat...

  18. Los anclajes de la identidad personal

    Directory of Open Access Journals (Sweden)

    Revilla, Juan Carlos

    2003-11-01

    Full Text Available Many postmodern authors have claimed the dissolution of identity due to the multiplicity of personal relationships, to the variety of experiences or to the huge social changes in process. Nonetheless, I argue that, in spite of not being possible to sustain an essentialist conception of the subject, there are many elements that preclude an absolute dissolution of identity, anchoring the subject to a certain personal identity, but in a problematic, conflictive, and changing way. Furthermore, the dissolution of identity would not necessarily be beneficial for subjects nor groups, as long as the demand of interaction rights comes close to the maintaining of acknowledgeable identities. The problem would rather be the difficulty to accede to valuable identities in the prevailing life conditions, making difficult to produce positive self-discourses, and thus generalizing processes of identity “fragilization”.

  19. Personal Branding Through Fashion Blogging

    Directory of Open Access Journals (Sweden)

    Yuanita Safitri

    2017-01-01

    Full Text Available The objective of this research was to analyze personal branding development from personal brand identity, personal brand positioning, and personal brand assessment. The object of this research was Diana Rikasari's blog “Hot Chocolate and Mint”. She is one of prominent influence and fashion blogger from Indonesia. The research used the qualitative method with data collection by virtual observation from June until August 2016. Rikasari’s personal branding showed on her blog was the fashionably smart woman who had entrepreneurship competence. This research finds out that Diana Rikasari success to make her personal identity by her blog profile and blog posting. Her positioning is clear as Indonesian modern woman. The personal brand assessment can be seen through the achievements and feedbacks on her blog post, both positive or negative.

  20. Comparison of RPR 'teardrop' card test, VDRL and FTA-ABS tests results on sera from persons with suspected yaws in Columbia.

    Science.gov (United States)

    Hopkins, D R; Florez, D

    1977-08-01

    A small study comparing results of the rapid plasma reagin (RPR) teardrop card test performed in the field, with results of Venereal Disease Research Laboratory (VDRL) and fluorescent treponemal antibody absorption (FTA-ABS) tests performed in the laboratory on venous blood specimens from the same suspected yaws patients was undertaken in Columbia in July 1975. The results suggest that the RPR teardrop card test may be used to screen for infectious, or potentially infectious, yaws patients under field conditions, but that it will not reliably detect patients with VDRL titres of 1:2 or less, or all patients in whom sera are reactive in the FTA-ABS test.

  1. Quantum key distribution using card, base station and trusted authority

    Energy Technology Data Exchange (ETDEWEB)

    Nordholt, Jane E.; Hughes, Richard John; Newell, Raymond Thorson; Peterson, Charles Glen; Rosenberg, Danna; McCabe, Kevin Peter; Tyagi, Kush T.; Dallmann, Nicholas

    2017-06-14

    Techniques and tools for quantum key distribution ("QKD") between a quantum communication ("QC") card, base station and trusted authority are described herein. In example implementations, a QC card contains a miniaturized QC transmitter and couples with a base station. The base station provides a network connection with the trusted authority and can also provide electric power to the QC card. When coupled to the base station, after authentication by the trusted authority, the QC card acquires keys through QKD with a trust authority. The keys can be used to set up secure communication, for authentication, for access control, or for other purposes. The QC card can be implemented as part of a smart phone or other mobile computing device, or the QC card can be used as a fillgun for distribution of the keys.

  2. Quantum key distribution using card, base station and trusted authority

    Science.gov (United States)

    Nordholt, Jane Elizabeth; Hughes, Richard John; Newell, Raymond Thorson; Peterson, Charles Glen; Rosenberg, Danna; McCabe, Kevin Peter; Tyagi, Kush T; Dallman, Nicholas

    2015-04-07

    Techniques and tools for quantum key distribution ("QKD") between a quantum communication ("QC") card, base station and trusted authority are described herein. In example implementations, a QC card contains a miniaturized QC transmitter and couples with a base station. The base station provides a network connection with the trusted authority and can also provide electric power to the QC card. When coupled to the base station, after authentication by the trusted authority, the QC card acquires keys through QKD with a trusted authority. The keys can be used to set up secure communication, for authentication, for access control, or for other purposes. The QC card can be implemented as part of a smart phone or other mobile computing device, or the QC card can be used as a fillgun for distribution of the keys.

  3. Prevention of Information Leakage by Photo-Coupling in Smart Card

    Science.gov (United States)

    Shen, Sung-Shiou; Chiu, Jung-Hui

    Advances in smart card technology encourages smart card use in more sensitive applications, such as storing important information and securing application. Smart cards are however vulnerable to side channel attacks. Power consumption and electromagnetic radiation of the smart card can leak information about the secret data protected by the smart card. Our paper describes two possible hardware countermeasures that protect against side channel information leakage. We show that power analysis can be prevented by adopting photo-coupling techniques. This method involves the use of LED with photovoltaic cells and photo-couplers on the power, reset, I/O and clock lines of the smart card. This method reduces the risk of internal data bus leakage on the external data lines. Moreover, we also discuss the effectiveness of reducing electromagnetic radiation by using embedded metal plates.

  4. Reminder: Swiss and French cards

    CERN Multimedia

    2012-01-01

    Communication from the HR Department to members of personnel holding an employment or association contract, above 50% and for more than 3 months, with the Organization. The HR Department would like to remind all members of personnel concerned that they are obliged to: • hold a valid Swiss  Légitimation card AND a valid French card (“Titre de séjour spécial” or “attestation de fonctions”) at all times during the exercise of their functions in the Organization; • return these documents as soon as their functions in the Organization cease. Not following these rules could be prejudicial to the Organization and appropriate measures may be taken towards the member of personnel concerned. Information and procedures concerning Swiss and French cards (first application, renewal, theft/loss, etc.) are available in the Admin e-guide. Users and Unpaid Associates must contact the Users Office HR Department Tel.: 729...

  5. Swiss and French cards - Reminder

    CERN Multimedia

    HR Department

    2011-01-01

    Communication from the HR Department to members of personnel holding an employment or association contract, above 50% and for more than 3 months, with the Organization. The HR Department would like to remind all members of the personnel concerned that they are obliged to: hold a valid Swiss Légitimation card AND a valid French card (“Titre de séjour spécial” or “attestation de fonctions”) at all times during the exercise of their functions in the Organization; return these documents as soon as their functions in the Organization cease. Not following these rules could be prejudicial to the Organization and appropriate measures may be taken with respect to the member of the personnel concerned. Information and procedures concerning Swiss and French cards (first application, renewal, theft/loss, etc.) are available in the Admin e-guide: https://cern.ch/admin-eguide/cartes/proc_cartes_home.asp Users and Unpaid Associates must ...

  6. Real Communication through Interview and Conversation Cards

    Science.gov (United States)

    Bonin, Therese M.; Birckbichler, Diane W.

    1975-01-01

    A method for use in foreign language teaching which involves the use of conversation cards and interview cards is described. The method is intended to improve the ability of the student to communicate in the language and allow for greater individualization of instruction. (RM)

  7. Fingerprint matching on smart card: A review

    CSIR Research Space (South Africa)

    Baruni, Kedimotse P

    2016-12-01

    Full Text Available Fingerprint Match-on-Card (MoC) offers the highest degree of privacy and security to cardholders as the fingerprint never leaves the secure environment of a smart card. The level of security of a biometric system is evaluated by the location where...

  8. Self-control and credit-card use among college students.

    Science.gov (United States)

    Mansfield, Phylis M; Pinto, Mary Beth; Parente, Diane H

    2003-06-01

    This study assessed the relationship between self-control and credit-card use with a convenience sample of 165 traditional-age college students of whom 69 (42%) were women. Students' self-control was measured on Grasmick, et al.'s Self-control Scale, which has six subscales, one of which is Impulsivity. Comparisons were made between those students who paid their cards off each month, called convenience users, and those who carried a monthly balance forward on scores on total self-control and impulsivity, and number of credit cards possessed. A significant difference in self-control scores was found between these two groups and also for mean impulsivity scores. Significantly fewer credit cards were possessed by students who paid their cards off each month than by those who carried a monthly balance.

  9. Social identity management strategies used by workers with acquired hearing loss.

    Science.gov (United States)

    Jennings, Mary Beth; Southall, Kenneth; Gagné, Jean-Pierre

    2013-01-01

    There is a paucity of knowledge about social identity-management by persons with hearing loss. The objective of the study was to gain an understanding from the perspective of the participants, the ways in which workers with acquired hearing loss manage their identity in the workplace. Twelve persons with acquired hearing loss, who were gainfully employed in a variety of settings and occupations in three Canadian cities, participated in audio-recorded semi-structured interviews. A secondary qualitative analysis was conducted on transcripts of interviews collected in a previous study on factors that influence disclosure of hearing loss in the workplace. A qualitative descriptive research paradigm was adopted and content analyses were used to extract pertinent information from verbatim transcripts. Participants described a range of identity-management strategies enacted in the workplace. Five recurrent themes emerged as important considerations in the Art of Identity Management in the workplace: 1. Managing the situation, 2. Having a buddy system, 3. Feeling comfortable, 4. Using personal resources, 5. It gets easier with time. Social identity-management is a complex process. Although persons with acquired hearing loss experience different challenges from other persons with invisible stigmas, similarities in the range of social identity-management strategies employed were evident in our findings. In addition, the social cognitive learning model of disclosure appears to be relevant to the experiences of our participants. The implications of the findings emphasize the importance of all stakeholders working collaboratively to address the issues of the growing population of workers with hearing loss.

  10. Smart Cards 101: Everything a Beginner Needs To Get Started.

    Science.gov (United States)

    Wiens, Janet

    2001-01-01

    Discusses how to implement a smart card system at a college or university, and explains what smart cards are, their potential applications, benefits, and costs. Provides a resource for obtaining additional information about smart cards. (GR)

  11. Application of smart cards in physical and information security systems

    International Nuclear Information System (INIS)

    Dreifus, H.N.

    1988-01-01

    Smart Cards, integrated circuits embedded into credit cards, have been proposed for many computer and physical security applications. The cards have shown promise in improving both the security and monitoring of systems ranging from computer network identification through physical protection and access control. With the increasing computational power embedded within these cards, advanced encryption techniques such as public key cryptography can now be realized, enabling more sophisticated uses

  12. Ministerial Ordinance No. 530/166 of 10 July 1989, establishing measures to execute Decree-Law No. 1/007 of 20 March 1989 setting forth regulations on the entry, stay, and establishment of foreigners in Burundi and their departure.

    Science.gov (United States)

    1989-01-01

    This Ordinance sets forth rules on visas, identity cards, and monetary guarantees as established in Decree-Law No. 1/007 of 20 March 1989. Visas can be granted for the purposes of transit, entry, stay, departure and return, and establishment of both determined and indeterminate length. A transit visa permits a foreigner to enter Burundi for not more than seventy-two hours; an entry visa allows a foreigner to make one or more entries into Burundi and stay there for a period of not more than three months; a visa of stay is given to a foreigner who already has a transit or entry visa and allows that person to lengthen his visit for up to six months; a visa of departure and return is granted to foreigners residing in Burundi who wish to return to Burundi after travelling abroad and is good for up to seven months; a visa of establishment of determinate length is granted to a person who wishes to become established in Burundi and whose proposed activity has already been approved; a visa of establishment of indeterminate length is granted to a foreigner who has resided in Burundi for the uninterrupted period of the preceding twenty years, although exceptions are possible, as in the case of persons who marry Burundi citizens. In order to receive an identity card, a foreigner must be registered in the community of his residence within fifteen days of obtaining a visa of establishment or permission to change his residence. Identity cards are given to six groups of foreigners: permanent residents, persons who hold visas of establishment of either determinate or indeterminate nature, diplomats, refugees, and the stateless. All persons authorized to establish themselves in Burundi are required to deposit a monetary guarantee in the amount of $1,250 US.

  13. Development Of The Drexler Optical-Card Reader/Writer System

    Science.gov (United States)

    Pierce, Gerald A.

    1988-06-01

    An optical-card reader/writer optical and electronic breadboard system, developed by SRI International under contract to Drexler Technology, is described. The optical card, which is the same size as a credit card, can contain more than 2 megabytes of digital user data, which may also include preformatted tracking information and preformatted data. The data layout on the card is similar to that on a floppy disk, with each track containing a header and clocking information. The design of this optical reader/writer system for optical cards is explained. Design of the optical card system entails a number of unique issues: To accommodate both laser-recorded and mass-duplicated information, the system must be compatible with preencoded information, which implies a larger-than-normal spot size (5 gm) and a detection system that can read both types of optical patterns. Cost-reduction considerations led to selection of a birefringent protection layer, which dictated a nonstandard optical system. The non-polarization-sensitive optics use an off-axis approach to detection. An LED illumination system makes it possible to read multiple tracks.

  14. Negotiation of identities in intercultural communication

    Directory of Open Access Journals (Sweden)

    Janík Zdeněk

    2017-01-01

    Full Text Available Negotiation of identities in communication entails affirming the identities we want others to recognize in us and ascription of identities we mutually assign to each other in communication. The study of intercultural communication focuses on cultural identity as the principal identity component that defines intercultural communication. In this article, the assumption that cultural group membership factors determine the context of intercultural communication is questioned. The article examines how intercultural interlocutors negotiate their identities in various intercultural interactions. The aims of the research presented in this paper are: 1 to examine which identities - cultural, personal, or social - intercultural interlocutors activate in intercultural communication; 2 to determine whether interlocutors’ intercultural communication is largely influenced by their cultural identities; 3 and to identify situations in which they activate their cultural identities (3. The research data were collected from 263 international students studying at Masaryk University in Brno in the years 2010 - 2016. Although the research results are not conclusive, they indicate that cultural identities predominate in the students’ ethnocentric views and that stereotypes constrain the students’ cultural identities and affect the negotiation of identities in intercultural communication.

  15. Compulsive buying and credit card misuse among credit card holders: the roles of self-esteem, materialism, impulsive buying and budget constraint

    OpenAIRE

    Omar, Nor Asiah; Rahim, Ruzita Abdul; Wel, Che Aniza Che; Alam, Syed Shah

    2014-01-01

    Purpose: This study aims to examine the factors that influence credit card misuse among working adults in Klang Valley, Malaysia. The relationship among self-esteem, materialism, impulsive buying, budget constraint, compulsive buying and credit card misuse are explored in this study. Design/methodology/approach: A total of 186 questionnaires was collected via convenience sampling from credit card users of working adults in Malaysia. A structural equation model that assesses the relationship b...

  16. Software for a multichannel acquisition card

    International Nuclear Information System (INIS)

    Arista Romeu, E. J.; Diaz Garcia, A.; Vela Morales, O.

    2013-01-01

    A software developed in C++ for a multichannel acquisition card is presented. The use of an acquisition add-on card with multiple channels is a suitable solution to substitute several instruments, allowing simultaneous acquisition with each channel. In this work, the limitations of a concrete hardware are discussed and also several different approaches have been suggested. Some preliminary results obtained in laboratory conditions are shown. (Author)

  17. C??lulas madre en terapia celular card??aca

    OpenAIRE

    Lobo Gonz??lez, Manuel

    2013-01-01

    La enfermedad cardiovascular, y su frecuente resultado final, el fallo card??aco del ventr??culo izquierdo, son la principal causa de morbimortalidad en los pa??ses desarrollados. La investigaci??n con c??lulas madre podr??a regenerar una variedad de c??lulas que incluye a los cardiomiocitos. Se han utilizado diferentes fuentes celulares para la terapia regenerativa card??aca, incluyendo c??lulas madre card??acas, mioblastos de m??sculo esquel??tico, c??lulas madre derivadas de la...

  18. FRENCH CARDS - NEW PROCEDURE FOR INITIAL APPLICATION

    CERN Multimedia

    Human Resources Division

    2002-01-01

    The Human Resources Division would like to remind members of personnel that they are obliged to submit an application form for a French card as soon as they have a permanent address in either Switzerland or in France and they are actually living there. Following the rationalization of our administrative procedures, as of October 1st, 2002, the initial application procedure for a French card will now be as follows: The member of personnel should complete an application form. If necessary, an application form must also be completed for family members. These forms must then be transferred via e-mail to the appropriate Divisional Administrative Officer (DAO) who will forward them to the Cards Service. In parallel, the member of personnel should submit the necessary supporting documents to the Cards Service. The application form (Word format only), the procedural details, the necessary supporting documents as well as the conditions of issue are available here.   Human Resources Division Tel. 74469

  19. CQL: a database in smart card for health care applications.

    Science.gov (United States)

    Paradinas, P C; Dufresnes, E; Vandewalle, J J

    1995-01-01

    The CQL-Card is the first smart card in the world to use Database Management Systems (DBMS) concepts. The CQL-Card is particularly suited to a portable file in health applications where the information is required by many different partners, such as health insurance organizations, emergency services, and General Practitioners. All the information required by these different partners can be shared with independent security mechanisms. Database engine functions are carried out by the card, which manages tables, views, and dictionaries. Medical Information is stored in tables and views are logical and dynamic subsets of tables. For owner-partners like MIS (Medical Information System), it is possible to grant privileges (select, insert, update, and delete on table or view) to other partners. Furthermore, dictionaries are structures that contain requested descriptions and which allow adaptation to computer environments. Health information held in the CQL-Card is accessed using CQL (Card Query Language), a high level database query language which is a subset of the standard SQL (Structured Query Language). With this language, CQL-Card can be easily integrated into Medical Information Systems.

  20. The mother's card: a simplified aid for primary health workers.

    Science.gov (United States)

    Shah, K P; Shah, P M

    1981-02-01

    The Mother's Card and its use are described. The card is filled out by the health worker and provides data on the mother concerning family planning, menstrual cycles, pregnancy period (including whether at risk, state of nutrition, immunization against tetanus, and expected date of birth), and breastfeeding. The card is kept by the mother, and the health worker keeps a copy. Each card has space for 10 years and up to 4 pregnancies. The cards have been used successfully in India since 1976 and in Somalia since early 1980, and were useful in strengthening family planning programs as well as identifying pregnancies at risk for special attention.