WorldWideScience

Sample records for personal identity verification

  1. 75 FR 82575 - Federal Acquisition Regulation; Personal Identity Verification of Contractor Personnel

    Science.gov (United States)

    2010-12-30

    ... 9000-AL60 Federal Acquisition Regulation; Personal Identity Verification of Contractor Personnel AGENCY... requirement of collecting from contractors all forms of Government-provided identification once they are no...D Inspector General Audit Report No. D-2009-005, entitled ``Controls Over the Contractor Common...

  2. Can self-verification strivings fully transcend the self-other barrier? Seeking verification of ingroup identities.

    Science.gov (United States)

    Gómez, Angel; Seyle, D Conor; Huici, Carmen; Swann, William B

    2009-12-01

    Recent research has demonstrated self-verification strivings in groups, such that people strive to verify collective identities, which are personal self-views (e.g., "sensitive") associated with group membership (e.g., "women"). Such demonstrations stop short of showing that the desire for self-verification can fully transcend the self-other barrier, as in people working to verify ingroup identities (e.g., "Americans are loud") even when such identities are not self-descriptive ("I am quiet and unassuming"). Five studies focus on such ingroup verification strivings. Results indicate that people prefer to interact with individuals who verify their ingroup identities over those who enhance these identities (Experiments 1-5). Strivings for ingroup identity verification were independent of the extent to which the identities were self-descriptive but were stronger among participants who were highly invested in their ingroup identities, as reflected in high certainty of these identities (Experiments 1-4) and high identification with the group (Experiments 1-5). In addition, whereas past demonstrations of self-verification strivings have been limited to efforts to verify the content of identities (Experiments 1 to 3), the findings also show that they strive to verify the valence of their identities (i.e., the extent to which the identities are valued; Experiments 4 and 5). Self-verification strivings, rather than self-enhancement strivings, appeared to motivate participants' strivings for ingroup identity verification. Links to collective self-verification strivings and social identity theory are discussed.

  3. 75 FR 28771 - Federal Acquisition Regulation; FAR Case 2009-027, Personal Identity Verification of Contractor...

    Science.gov (United States)

    2010-05-24

    ... Acquisition Regulation; FAR Case 2009-027, Personal Identity Verification of Contractor Personnel AGENCIES... of collecting from contractors all forms of Government provided identification once they are no..., titled Controls Over the Contractor Common Access Card (CAC) Life Cycle, was performed to determine...

  4. A hand held photo identity verification system for mobile applications

    International Nuclear Information System (INIS)

    Kumar, Ranajit; Upreti, Anil; Mahaptra, U.; Bhattacharya, S.; Srivastava, G.P.

    2009-01-01

    A handheld portable system has been developed for mobile personnel identity verification. The system consists of a contact less RF smart card reader integrated to a Simputer through serial link. The simputer verifies the card data, with the data base and aids the security operator in identifying the persons by providing the facial image of the verified person along with other personal details like name, designation, division etc. All transactions are recorded in the Simputer with time and date for future record. This system finds extensive applications in mobile identity verification in nuclear or other industries. (author)

  5. 76 FR 12712 - Announcing Draft Federal Information Processing Standard (FIPS) 201-2, Personal Identity...

    Science.gov (United States)

    2011-03-08

    ...-02] Announcing Draft Federal Information Processing Standard (FIPS) 201-2, Personal Identity..., ``Personal Identity Verification of Federal Employees and Contractors Standard.'' Draft FIPS 201-2 amends... Issuing Personal Identity Verification Cards under HSPD-12.'' The purpose of this change is to update the...

  6. Sensor-fusion-based biometric identity verification

    International Nuclear Information System (INIS)

    Carlson, J.J.; Bouchard, A.M.; Osbourn, G.C.; Martinez, R.F.; Bartholomew, J.W.; Jordan, J.B.; Flachs, G.M.; Bao, Z.; Zhu, L.

    1998-02-01

    Future generation automated human biometric identification and verification will require multiple features/sensors together with internal and external information sources to achieve high performance, accuracy, and reliability in uncontrolled environments. The primary objective of the proposed research is to develop a theoretical and practical basis for identifying and verifying people using standoff biometric features that can be obtained with minimal inconvenience during the verification process. The basic problem involves selecting sensors and discovering features that provide sufficient information to reliably verify a person's identity under the uncertainties caused by measurement errors and tactics of uncooperative subjects. A system was developed for discovering hand, face, ear, and voice features and fusing them to verify the identity of people. The system obtains its robustness and reliability by fusing many coarse and easily measured features into a near minimal probability of error decision algorithm

  7. BIOMETRIC IDENTITY VERIFICATION IN HEALTH SERVICES: A BIOMETRIC SURVEILLANCE PRACTICE IN TURKEY

    OpenAIRE

    İlker ŞİRİN

    2014-01-01

    Determination or verification of identity with biometric methods has a widespread use especially at borders for security reasons. Social Security Institution transferred the biometric identity verification practice to health sercives that are provided by private and university hospitals. The risks of the new system considering the privacy of personal data are under debate. Although there are announcements or manuals of Social Security Institution regarding the implementation...

  8. BIOMETRIC IDENTITY VERIFICATION IN HEALTH SERVICES: A BIOMETRIC SURVEILLANCE PRACTICE IN TURKEY

    Directory of Open Access Journals (Sweden)

    İlker ŞİRİN

    2014-08-01

    Full Text Available Determination or verification of identity with biometric methods has a widespread use especially at borders for security reasons. Social Security Institution transferred the biometric identity verification practice to health sercives that are provided by private and university hospitals. The risks of the new system considering the privacy of personal data are under debate. Although there are announcements or manuals of Social Security Institution regarding the implementation and legislation for data sharing and security exists, lack of a national data protection law brings with it security gaps.

  9. 21 CFR 21.44 - Verification of identity.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 1 2010-04-01 2010-04-01 false Verification of identity. 21.44 Section 21.44 Food... Verification of identity. (a) An individual seeking access to records in a Privacy Act Record System may be... identity. The identification required shall be suitable considering the nature of the records sought. No...

  10. John Locke on persons and personal identity

    OpenAIRE

    Boeker, Ruth

    2013-01-01

    John Locke claims both that ‘person’ is a forensic term and that personal identity consists in sameness of consciousness. The aim of my dissertation is to explain and critically assess how Locke links his moral and legal account of personhood to his account of personal identity in terms of sameness of consciousness. My interpretation of Locke’s account of persons and personal identity is embedded in Locke’s sortal-dependent account of identity. Locke’s sortal-dependent ac...

  11. Personal Identity Online

    DEFF Research Database (Denmark)

    Rodogno, Raffaele

    2012-01-01

    Philosophers concerned with the question of personal identity have typically been asking the so-called re-identification question: what are the conditions under which a person at one point in time is properly re-identified at another point in time? This is a rather technical question. In our...... everyday interactions, however, we do raise a number of personal identity questions that are quite distinct from it. In order to explore the variety of ways in which the Internet may affect personal identity, I propose in this study to broaden the typical philosophical horizon to other more mundane senses...... of the question. In Section 2, I describe a number of possible meanings of personal identity observed in everyday contexts and more philosophical ones. With some caveats, I argue that it is the specific context in which the question arises that disambiguates the meaning of the question. Online contexts are novel...

  12. Personal Identity in Enhancement

    Directory of Open Access Journals (Sweden)

    Jana Podroužková

    2015-09-01

    Full Text Available The aim of this paper is to introduce the concept of human enhancement, its methods and its relation to personal identity. Also several approaches to personal identity will be described. Transhumanism is a special think tank supporting human enhancement through modern technologies and some of its representatives claim, that even great changes to human organisms will not affect their personal identity. I will briefly describe the most important means of human enhancment and consider the problem of personal identity for each of them separately.

  13. John locke on personal identity.

    Science.gov (United States)

    Nimbalkar, Namita

    2011-01-01

    John Locke speaks of personal identity and survival of consciousness after death. A criterion of personal identity through time is given. Such a criterion specifies, insofar as that is possible, the necessary and sufficient conditions for the survival of persons. John Locke holds that personal identity is a matter of psychological continuity. He considered personal identity (or the self) to be founded on consciousness (viz. memory), and not on the substance of either the soul or the body.

  14. John Locke on Personal Identity**

    OpenAIRE

    Nimbalkar, Namita

    2011-01-01

    John Locke speaks of personal identity and survival of consciousness after death. A criterion of personal identity through time is given. Such a criterion specifies, insofar as that is possible, the necessary and sufficient conditions for the survival of persons. John Locke holds that personal identity is a matter of psychological continuity. He considered personal identity (or the self) to be founded on consciousness (viz. memory), and not on the substance of either the soul or the body.

  15. Secure stand alone positive personnel identity verification system (SSA-PPIV)

    International Nuclear Information System (INIS)

    Merillat, P.D.

    1979-03-01

    The properties of a secure stand-alone positive personnel identity verification system are detailed. The system is designed to operate without the aid of a central computing facility and the verification function is performed in the absence of security personnel. Security is primarily achieved by means of data encryption on a magnetic stripe badge. Several operational configurations are discussed. Advantages and disadvantages of this system compared to a central computer driven system are detailed

  16. Personal identity and eastern thought

    Directory of Open Access Journals (Sweden)

    Correia Carlos João

    2009-01-01

    Full Text Available This paper aims to show that the problem of personal identity is a fundamental question of the classical Indian thought. Usually we tend to think that personal identity is a Western philosophical subject, and so we tend to forget the significance of the Self (Atman in Hinduism and even in Buddhism. The author shows how the Indian thought approached the question of personal identity and which was the singular solution outlined in the work consensually attributed to Gotama, the Buddha.

  17. Biometric Subject Verification Based on Electrocardiographic Signals

    Science.gov (United States)

    Dusan, Sorin V. (Inventor); Jorgensen, Charles C. (Inventor)

    2014-01-01

    A method of authenticating or declining to authenticate an asserted identity of a candidate-person. In an enrollment phase, a reference PQRST heart action graph is provided or constructed from information obtained from a plurality of graphs that resemble each other for a known reference person, using a first graph comparison metric. In a verification phase, a candidate-person asserts his/her identity and presents a plurality of his/her heart cycle graphs. If a sufficient number of the candidate-person's measured graphs resemble each other, a representative composite graph is constructed from the candidate-person's graphs and is compared with a composite reference graph, for the person whose identity is asserted, using a second graph comparison metric. When the second metric value lies in a selected range, the candidate-person's assertion of identity is accepted.

  18. PERSONAL IDENTITY IN DEAF ADOLESCENTS

    Directory of Open Access Journals (Sweden)

    Joanna KOSSEWSKA

    2008-06-01

    Full Text Available The purpose of this study was to investigate the factors influencing the identity deaf adolescents. The study involved 67 deaf adolescents (38 boys and 29 girls aged 16 to 19 students of secondary school. Ninety-three hearing children constituted a comparison group. The structure of identity was explored on the basis of identification references given by the subjects who were to reply in writing, 20 times running, to the question: „Who Am I?” the test, adapted from M. H. Kuhn and T. S. McPartland by Martines and Silvestre (1995 given in written and signed mode.Results showed that the hearing status as well as mode of communication influence the description of personal identity. It was found that deaf adoles­cents used more descriptions especially in the fol­lowing categories: Civil Status, Body and Physical Appearance, Tastes and Activities, Friendship and Relationships, Personal and Social Situation, Negative Personal Traits, and Neutral Personality Traits. Although this study could demonstrate im­pact independent variables on identity, the data raise the need for further, preferably longitudinal, research. This complex phenomenon has to be examined more closely.Combined self-descriptive processes lead to the development of an organized, learned and dynamic identity, and subjective description of an individ­ual has strong emotional consequences for the in­dividual in question.

  19. Protecting Personal Information in the Era of Identity Theft: Just how Safe is Our Personal Information from Identity Thieves?

    Directory of Open Access Journals (Sweden)

    Fawzia Cassim

    2015-07-01

    Full Text Available Identity theft has become one of the fastest growing white collar crimes in the world. It occurs when an individual's personal information such as inter alia his or her name, date of birth or credit card details is used by another individual to commit identity fraud. Identity theft can be committed via physical means or online. The increased use of the Internet for business and financial transactions, social networking and the storage of personal information has facilitated the work of identity thieves. Identity theft has an impact on the personal finances and emotional well-being of victims, and on the financial institutions and economies of countries. It presents challenges for law enforcement agencies and governments worldwide. This article examines how identity thieves use the personal information of individuals to commit identity fraud and theft, and looks at legislative solutions introduced in South Africa, the United States of America, the United Kingdom and India to combat identity theft crimes. The article examines measures introduced by the respective governments in these countries to counteract such crimes. Finally, the article will propose a way forward to counteract such crimes in the future. The study reveals that identity theft is a growing and evolving problem that requires a multi-faceted and multi-disciplinary approach by law enforcement agencies, businesses, individuals and collaboration between countries. It is advocated that businesses and institutions should take measures to protect personal information better and that individuals should be educated about their rights, and be vigilant and protect their personal information offline and in cyberspace.

  20. Smartphone User Identity Verification Using Gait Characteristics

    Directory of Open Access Journals (Sweden)

    Robertas Damaševičius

    2016-09-01

    Full Text Available Smartphone-based biometrics offers a wide range of possible solutions, which could be used to authenticate users and thus to provide an extra level of security and theft prevention. We propose a method for positive identification of smartphone user’s identity using user’s gait characteristics captured by embedded smartphone sensors (gyroscopes, accelerometers. The method is based on the application of the Random Projections method for feature dimensionality reduction to just two dimensions. Then, a probability distribution function (PDF of derived features is calculated, which is compared against known user PDF. The Jaccard distance is used to evaluate distance between two distributions, and the decision is taken based on thresholding. The results for subject recognition are at an acceptable level: we have achieved a grand mean Equal Error Rate (ERR for subject identification of 5.7% (using the USC-HAD dataset. Our findings represent a step towards improving the performance of gait-based user identity verification technologies.

  1. Integrating Fingerprint Verification into the Smart Card-Based Healthcare Information System

    OpenAIRE

    Jin-Won Park; Sung Bum Pan; Yongwha Chung; Daesung Moon

    2009-01-01

    As VLSI technology has been improved, a smart card employing 32-bit processors has been released, and more personal information such as medical, financial data can be stored in the card. Thus, it becomes important to protect personal information stored in the card. Verification of the card holder's identity using a fingerprint has advantages over the present practices of Personal Identification Numbers (PINs) and passwords. However, the computational workload of fingerprint verification i...

  2. Adolescent personality development and identity formation

    NARCIS (Netherlands)

    Klimstra, T.A.

    2013-01-01

    Personality development is not only about changes in traits but also about changes in other layers of the self, such as the identity layer. Forming one's identity is thought to be the key developmental task of adolescence, but profound changes in personality traits also occur in this period. In this

  3. Advance directives and personal identity: what is the problem?

    Science.gov (United States)

    Furberg, Elisabeth

    2012-02-01

    The personal identity problem expresses the worry that due to disrupted psychological continuity, one person's advance directive could be used to determine the care of a different person. Even ethicists, who strongly question the possibility of the scenario depicted by the proponents of the personal identity problem, often consider it to be a very potent objection to the use of advance directives. Aiming to question this assumption, I, in this paper, discuss the personal identity problem's relevance to the moral force of advance directives. By putting the personal identity argument in relation to two different normative frameworks, I aim to show that whether or not the personal identity problem is relevant to the moral force of advance directives, and further, in what way it is relevant, depends entirely on what normative reasons we have for respecting advance directives in the first place.

  4. Personal Verification/Identification via Analysis of the Peripheral ECG Leads: Influence of the Personal Health Status on the Accuracy

    Directory of Open Access Journals (Sweden)

    Irena Jekova

    2015-01-01

    Full Text Available Traditional means for identity validation (PIN codes, passwords, and physiological and behavioral biometric characteristics (fingerprint, iris, and speech are susceptible to hacker attacks and/or falsification. This paper presents a method for person verification/identification based on correlation of present-to-previous limb ECG leads: I (rI, II (rII, calculated from them first principal ECG component (rPCA, linear and nonlinear combinations between rI, rII, and rPCA. For the verification task, the one-to-one scenario is applied and threshold values for rI, rII, and rPCA and their combinations are derived. The identification task supposes one-to-many scenario and the tested subject is identified according to the maximal correlation with a previously recorded ECG in a database. The population based ECG-ILSA database of 540 patients (147 healthy subjects, 175 patients with cardiac diseases, and 218 with hypertension has been considered. In addition a common reference PTB dataset (14 healthy individuals with short time interval between the two acquisitions has been taken into account. The results on ECG-ILSA database were satisfactory with healthy people, and there was not a significant decrease in nonhealthy patients, demonstrating the robustness of the proposed method. With PTB database, the method provides an identification accuracy of 92.9% and a verification sensitivity and specificity of 100% and 89.9%.

  5. Multimodal Personal Verification Using Likelihood Ratio for the Match Score Fusion

    Directory of Open Access Journals (Sweden)

    Long Binh Tran

    2017-01-01

    Full Text Available In this paper, the authors present a novel personal verification system based on the likelihood ratio test for fusion of match scores from multiple biometric matchers (face, fingerprint, hand shape, and palm print. In the proposed system, multimodal features are extracted by Zernike Moment (ZM. After matching, the match scores from multiple biometric matchers are fused based on the likelihood ratio test. A finite Gaussian mixture model (GMM is used for estimating the genuine and impostor densities of match scores for personal verification. Our approach is also compared to some different famous approaches such as the support vector machine and the sum rule with min-max. The experimental results have confirmed that the proposed system can achieve excellent identification performance for its higher level in accuracy than different famous approaches and thus can be utilized for more application related to person verification.

  6. Verification of Ca F2:Mn type of dosemeters for personal dosimetry purposes

    International Nuclear Information System (INIS)

    Misovic, M.; Boskovic, Z.; Spasic-Jokic, V.

    1995-01-01

    Verification results of CaF2:Mn type of dosemeters for personal dosimetry purposes are presented in this paper. Tree types of irradiations are proceeded due to verification of relevant features of TLD. It is concluded that mentioned type of dosemeter can be used for purpose of personal dosimetry. (author)

  7. Identity theory and personality theory: mutual relevance.

    Science.gov (United States)

    Stryker, Sheldon

    2007-12-01

    Some personality psychologists have found a structural symbolic interactionist frame and identity theory relevant to their work. This frame and theory, developed in sociology, are first reviewed. Emphasized in the review are a multiple identity conception of self, identities as internalized expectations derived from roles embedded in organized networks of social interaction, and a view of social structures as facilitators in bringing people into networks or constraints in keeping them out, subsequently, attention turns to a discussion of the mutual relevance of structural symbolic interactionism/identity theory and personality theory, looking to extensions of the current literature on these topics.

  8. Life Stories, Cultural Métissage, and Personal Identities

    Directory of Open Access Journals (Sweden)

    Ricardo Vieira

    2014-01-01

    Full Text Available This article encompasses an underlying notion of personal identities and processes of interaction, which distinguish essentialist identity from relational identity in contexts involving subjects, fields of possibilities, and cultural metamorphosis. It addresses the idea of the individual and her/his transformations: “I am who I want to be if I can be that person.” Any one of us could hypothetically have been someone else. The question of the reconstruction of individual identities is a vital aspect in the relationship between objective social conditions and what each person subjectively does with them, in terms of auto-construction. The complexity of this question reflects the idea of a cultural kaleidoscope, in which similar social conditions experienced by different individuals can produce differentiated identities. The title and structure of this text also seek to encompass the idea that in a personal life story, the subject lives between various spheres and sociocultural contexts, with a composite, mestizo, and superimposed or displaced identity, in each context. This occurs as the result of a cultural metamorphosis, which is constructed both by the individual as well as by heterogeneous influences between the context of the starting and finishing points at a given moment. This complex process of cultural metamorphosis—the fruit of interweaving subjective and objective forces—reveals a new dimension: the truly composite nature of personal identities.

  9. The dynamics of personality and identity in adolescence

    NARCIS (Netherlands)

    Klimstra, T.A.

    2010-01-01

    The current dissertation focused on adolescent identity formation and personality development. We focused on how these aspects of individuality develop through adolescence, and how individual differences in (the development of) personality and identity relate to problem behavior. For that purpose,

  10. How is Civic Engagement Related to Personal Identity and Social Identity in Late Adolescents and Emerging Adults? A Person-Oriented Approach.

    Science.gov (United States)

    Lannegrand-Willems, Lyda; Chevrier, Basilie; Perchec, Cyrille; Carrizales, Alexia

    2018-04-01

    Adolescence and emerging adulthood are periods in life when individuals both question and define their place in society and form their identity. Meanwhile, active youth civic engagement represents a challenge for each democracy. The purpose of this study was to analyze the different forms of civic engagement among late adolescents and emerging adults and how they are related to personal identity and social identity, while adopting an integrative perspective through the lens of a person-oriented approach. The participants were 1217 (62.3% female) 16-24 year-old French students (M age  = 19.17; SD age  = 1.83). First, derived from cluster analyses, the findings emphasized diversity in civic engagement, from strong civic participation (in different formal and informal ways) to various forms of passivity. Diversity was also highlighted for personal identity and social identity profiles. Second, a Configural Frequency Analysis revealed a typical pattern associating passivity in civic engagement, personal carefree diffusion and rejection of social identity. Overall, these findings highlight an absence of general youth disaffection and provide a meaningful specific pattern for the understanding of passivity in political and civic matters in late adolescence and emerging adulthood.

  11. ECG based biometrics verification system using LabVIEW

    Directory of Open Access Journals (Sweden)

    Sunil Kumar Singla

    2010-07-01

    Full Text Available Biometric based authentication systems provide solutions to the problems in high security which remain with conventionalsecurity systems. In a biometric verification system, human’s biological parameters (such as voice, finger print,palm print or hand geometry, face, iris etc. are used to verify the authenticity of a person. These parameters are good to beused as biometric parameters but do not provide the guarantee that the person is present and alive. As voice can be copied,finger print can be picked from glass on synthetic skin and in face recognition system due to genetic factors identical twinsor father-son may have the same facial appearance. ECG does not have these problems. It can not be recorded without theknowledge of the person and ECG of every person is unique even identical twins have different ECG. In this paper an ECGbasedbiometrics verification system which was developed using Laboratory Virtual Instruments Engineering Workbench(LabVIEW version 7.1 is discussed. Experiments were conducted on the database stored in the laboratory of 20 individualshaving 10 samples each and the results revealed a false rejection rate (FRR of 3% and false acceptance rate (FAR of 3.21%.

  12. Investigation of Personality Disordes and Personality Traits in Men with Gender Identity Disorder

    Directory of Open Access Journals (Sweden)

    Nahid Noorian

    2008-04-01

    Full Text Available Objective: The purpose of this study is to investigation of personality disorders and personality traits in men who have gender identity disorder (GID. Identification of personality disorders can be useful for enhancement of the quality of help to the patients. Materials & Methods: This analytical and cross-sectional study was a comparative and case – control research. 40 men with gender identity disorder were selected by convenient sampling from individuals who have been referred to Tehran Navab Safavi welfare center. Also, 40 available individuals who have no any diagnostic criteria about gender identity disorder in DSM-IV-TR and worked in Islamic Azad University (Tehran Sciences and Researches Unit were selected as control group and matched with patients. Personality disorders and those frequencies were evaluated with Millon Clinical Multiaxial Inventory-II (MCMI-II. Data were analyzed using by Chi-square and Independent T tests. Results: The results showed that gender identity disorder patients get higher scores as compared to control group in scales “Dependent” (P=0/038, “Histrionic” (P<0/001, “Antisocial” (P=0/017, “Passive – aggressive” (P=0/007, “Borderline” (P<0/001 and “Paranoid” (P=0/021 and their difference was significant. Conclusion: Generally, the results of this study showed persons who have gender identity disorder also have some symptoms of personality disorders more than normal people.

  13. Goal-directedness and personal identity as correlates of life outcomes.

    Science.gov (United States)

    Goldman, Barry M; Masterson, Suzanne S; Locke, Edwin A; Groth, Markus; Jensen, David G

    2002-08-01

    Although much research has been conducted on goal setting, researchers have not examined goal-directedness or propensity to set goals as a stable human characteristic in adults. In this study, a survey was developed and distributed to 104 adult participants to assess their goal-directedness, personal identity, and various life outcomes. A theoretical model was developed and tested using structural equation modeling that proposed that both goal-directedness and personal identity should positivcly influence important life outcomes. Analysis showed that goal-directedness and personal identity are positively related to personal well-being, salary, and marital satisfaction. Further, personal identity was positively related to job satisfaction but, contrary to related research, goal-directedness did not predict job satisfaction.

  14. Integrating Fingerprint Verification into the Smart Card-Based Healthcare Information System

    Directory of Open Access Journals (Sweden)

    Jin-Won Park

    2009-01-01

    Full Text Available As VLSI technology has been improved, a smart card employing 32-bit processors has been released, and more personal information such as medical, financial data can be stored in the card. Thus, it becomes important to protect personal information stored in the card. Verification of the card holder's identity using a fingerprint has advantages over the present practices of Personal Identification Numbers (PINs and passwords. However, the computational workload of fingerprint verification is much heavier than that of the typical PIN-based solution. In this paper, we consider three strategies to implement fingerprint verification in a smart card environment and how to distribute the modules of fingerprint verification between the smart card and the card reader. We first evaluate the number of instructions of each step of a typical fingerprint verification algorithm, and estimate the execution time of several cryptographic algorithms to guarantee the security/privacy of the fingerprint data transmitted in the smart card with the client-server environment. Based on the evaluation results, we analyze each scenario with respect to the security level and the real-time execution requirements in order to implement fingerprint verification in the smart card with the client-server environment.

  15. Integrating Fingerprint Verification into the Smart Card-Based Healthcare Information System

    Science.gov (United States)

    Moon, Daesung; Chung, Yongwha; Pan, Sung Bum; Park, Jin-Won

    2009-12-01

    As VLSI technology has been improved, a smart card employing 32-bit processors has been released, and more personal information such as medical, financial data can be stored in the card. Thus, it becomes important to protect personal information stored in the card. Verification of the card holder's identity using a fingerprint has advantages over the present practices of Personal Identification Numbers (PINs) and passwords. However, the computational workload of fingerprint verification is much heavier than that of the typical PIN-based solution. In this paper, we consider three strategies to implement fingerprint verification in a smart card environment and how to distribute the modules of fingerprint verification between the smart card and the card reader. We first evaluate the number of instructions of each step of a typical fingerprint verification algorithm, and estimate the execution time of several cryptographic algorithms to guarantee the security/privacy of the fingerprint data transmitted in the smart card with the client-server environment. Based on the evaluation results, we analyze each scenario with respect to the security level and the real-time execution requirements in order to implement fingerprint verification in the smart card with the client-server environment.

  16. Functions of personal and vicarious life stories: Identity and empathy

    DEFF Research Database (Denmark)

    Lind, Majse; Thomsen, Dorthe Kirkegaard

    2018-01-01

    The present study investigates functions of personal and vicarious life stories focusing on identity and empathy. Two-hundred-and-forty Danish high school students completed two life story questionnaires: One for their personal life story and one for a close other’s life story. In both...... questionnaires, they identified up to 10 chapters and self-rated the chapters on valence and valence of causal connections. In addition, they completed measures of identity disturbance and empathy. More positive personal life stories were related to lower identity disturbance and higher empathy. Vicarious life...... stories showed a similar pattern with respect to identity but surprisingly were unrelated to empathy. In addition, we found positive correlations between personal and vicarious life stories for number of chapters, chapter valence, and valence of causal connections. The study indicates that both personal...

  17. Noninvasive Brain Stimulation and Personal Identity: Ethical Considerations.

    Science.gov (United States)

    Iwry, Jonathan; Yaden, David B; Newberg, Andrew B

    2017-01-01

    As noninvasive brain stimulation (NIBS) technology advances, these methods may become increasingly capable of influencing complex networks of mental functioning. We suggest that these might include cognitive and affective processes underlying personality and belief systems, which would raise important questions concerning personal identity and autonomy. We give particular attention to the relationship between personal identity and belief, emphasizing the importance of respecting users' personal values. We posit that research participants and patients should be encouraged to take an active approach to considering the personal implications of altering their own cognition, particularly in cases of neurocognitive "enhancement." We suggest that efforts to encourage careful consideration through the informed consent process would contribute usefully to studies and treatments that use NIBS.

  18. Personal Identity Verification

    Data.gov (United States)

    US Agency for International Development — PIV is the system USAID uses to comply with Homeland Security Presidential Directive (HSPD)-12, which requires Federal agencies to adopt policies, procedures, and...

  19. Co-occurrence of dissociative identity disorder and borderline personality disorder.

    Science.gov (United States)

    Ross, Colin A; Ferrell, Lynn; Schroeder, Elizabeth

    2014-01-01

    The literature indicates that, among individuals with borderline personality disorder, pathological dissociation correlates with a wide range of impairments and difficulties in psychological function. It also predicts a poorer response to dialectical behavior therapy for borderline personality disorder. We hypothesized that (a) dissociative identity disorder commonly co-occurs with borderline personality disorder and vice versa, and (b) individuals who meet criteria for both disorders have more comorbidity and trauma than individuals who meet criteria for only 1 disorder. We interviewed a sample of inpatients in a hospital trauma program using 3 measures of dissociation. The most symptomatic group was those participants who met criteria for both borderline personality disorder and dissociative identity disorder on the Dissociative Disorders Interview Schedule, followed by those who met criteria for dissociative identity disorder only, then those with borderline personality disorder only, and finally those with neither disorder. Greater attention should be paid to the relationship between borderline personality disorder and dissociative identity disorder.

  20. Biography, Identity, Improvisation, Sound: Intersections of Personal and Social Identity through Improvisation

    Science.gov (United States)

    Smilde, Rineke

    2016-01-01

    This essay addresses the relationship of improvisation and identity. Biographical research that was conducted by the author into professional musicians' lifelong learning showed the huge importance of improvisation for personal expression. Musically, the concept of "sound" appeared to serve as a strong metaphor for identity. In addition,…

  1. Noninvasive Brain Stimulation and Personal Identity: Ethical Considerations

    Directory of Open Access Journals (Sweden)

    Jonathan Iwry

    2017-06-01

    Full Text Available As noninvasive brain stimulation (NIBS technology advances, these methods may become increasingly capable of influencing complex networks of mental functioning. We suggest that these might include cognitive and affective processes underlying personality and belief systems, which would raise important questions concerning personal identity and autonomy. We give particular attention to the relationship between personal identity and belief, emphasizing the importance of respecting users' personal values. We posit that research participants and patients should be encouraged to take an active approach to considering the personal implications of altering their own cognition, particularly in cases of neurocognitive “enhancement.” We suggest that efforts to encourage careful consideration through the informed consent process would contribute usefully to studies and treatments that use NIBS.

  2. Personality disorders in persons with gender identity disorder.

    Science.gov (United States)

    Duišin, Dragana; Batinić, Borjanka; Barišić, Jasmina; Djordjevic, Miroslav L; Vujović, Svetlana; Bizic, Marta

    2014-01-01

    Investigations in the field of gender identity disorder (GID) have been mostly related to psychiatric comorbidity and severe psychiatric disorders, but have focused less on personality and personality disorders (PDs). The aim of the study was to assess the presence of PDs in persons with GID as compared to cisgendered (a cisgender person is a person who is content to remain the gender they were assigned at birth) heterosexuals, as well as to biological sex. The study sample consisted of 30 persons with GID and 30 cisgendered heterosexuals from the general population. The assessment of PDs was conducted by application of the self-administered Structured Clinical Interview for DSM-IV Axis II PDs (SCID-II). Persons with GID compared to cisgender heterosexuals have higher presence of PDs, particularly Paranoid PD, avoidant PDs, and comorbid PDs. In addition, MtF (transwomen are people assigned male at birth who identify as women) persons are characterized by a more severe psychopathological profile. Assessment of PDs in persons with GID is of great importance as it comprises a key part of personalized treatment plan tailoring, as well as a prognostic factor for sex-reassignment surgery (SRS) outcome.

  3. Trajectories of Identity Formation Modes and Their Personality Context in Adolescence.

    Science.gov (United States)

    Topolewska-Siedzik, Ewa; Cieciuch, Jan

    2018-04-01

    Identity formation is a dynamic process during adolescence. Trajectories of identity formation were assessed longitudinally in early and middle adolescents, taking into account the personality underpinnings of this process. Identity formation was conceptualized according to the circumplex of identity formation modes. The model distinguishes basic modes rooted in Marcia's categories of exploration and commitment. Plasticity and stability, the two higher order Big Five meta-traits, were used to assess personality underpinnings. This study includes five measurement waves over 1.5 years and involves 1,839 Polish participants; 914 early adolescents (53.9% girls) and 925 middle adolescents (63.8% girls). The results suggest that (1) the four identity formation modes change dynamically, showing linear and curvilinear growth and that (2) identity formation mode trajectories are more dynamic in middle adolescence than in early adolescence. The results also showed that, in the conditional model, (3) the higher-order personality factors and gender affect the growth factors of identity formation modes. Overall, trajectories of identity formation modes are more linear during early adolescence and more curvilinear during middle adolescence. The initial levels in identity trajectories are influenced by the personality metatraits but only plasticity is related to change among early adolescents.

  4. Personality Disorders in Persons with Gender Identity Disorder

    Directory of Open Access Journals (Sweden)

    Dragana Duišin

    2014-01-01

    Full Text Available Background. Investigations in the field of gender identity disorder (GID have been mostly related to psychiatric comorbidity and severe psychiatric disorders, but have focused less on personality and personality disorders (PDs. Aims. The aim of the study was to assess the presence of PDs in persons with GID as compared to cisgendered (a cisgender person is a person who is content to remain the gender they were assigned at birth heterosexuals, as well as to biological sex. Methods. The study sample consisted of 30 persons with GID and 30 cisgendered heterosexuals from the general population. The assessment of PDs was conducted by application of the self-administered Structured Clinical Interview for DSM-IV Axis II PDs (SCID-II. Results. Persons with GID compared to cisgender heterosexuals have higher presence of PDs, particularly Paranoid PD, avoidant PDs, and comorbid PDs. In addition, MtF (transwomen are people assigned male at birth who identify as women persons are characterized by a more severe psychopathological profile. Conclusions. Assessment of PDs in persons with GID is of great importance as it comprises a key part of personalized treatment plan tailoring, as well as a prognostic factor for sex-reassignment surgery (SRS outcome.

  5. Relationship between Consumer Identity and Brand Personality as a Factor of Brand Commitment

    Directory of Open Access Journals (Sweden)

    Antonova N. V.

    2015-12-01

    Full Text Available The article analyzes the relationship between consumer identity and brand personality as a factor of consumer commitment to the brand. We hypothesized that: a there is a link between consumer identity and preferred brand’s personality; b the higher the similarity between the consumer identity and preferred brand’s personality, the higher the brand commitment. The sample included 150 subjects aged 18—25. Methods: the method of J. Aaker was used to study brand personality, and its modification was used to study consumer identity. The questionnaire of J. Brovkina was used to study brand loyalty. Results: high correlations between consumer identity and brand personality were obtained on the scales Ruggedness, Sophistication, Excitement, and high correlations between brand loyalty and deltas of the values of consumer identity and brand personality on the same scales were also discovered. On the scales of Competence and Sincerity the correlations were lower, although important as well. Thus, the hypotheses were confirmed: a it is shown that there is a correlation between consumer identity and brand personality; b the higher this correlation is, the higher is the commitment to the preferred brand.

  6. Head Transplants and Personal Identity: A Philosophical and Literary Survey.

    Science.gov (United States)

    Mori, Giuliano

    2016-04-01

    The criterion of personal identity is clearly called into question by the project to perform a human head transplant. Is identity provided by psychological continuity alone, or does it depend on bodily continuity as well? And how do these different perspectives interface with our notion of mind and mind-body relationship? The reader will be provided with a discussion concerning these problems, together with a philosophical and literary survey about the conception of body-mind relationship from the Greek thought to contemporary philosophy. The analysis will conclude with a discussion concerning the possibility to consider the issue of personal identity from a statistic point of view, which privileges the general perception of identity, so as it has been shaped by the cultural trends of the last four centuries. It could hence be argued that personal identity is not something which can be defined once and for all. On the contrary, the general perception of identity is subject to significant alterations resulting from one's cultural environment. However, the cultural environment itself can be changed by particularly notable events, such as, hypothetically, the successful outcome of a human head transplant. © 2016 John Wiley & Sons Ltd.

  7. Associations of identity dimensions with Big Five personality domains and facets

    NARCIS (Netherlands)

    Klimstra, T.A.; Luyckx, K.; Goossens, L.; Teppers, E.; De Fruyt, F.

    2013-01-01

    Personality is among the most important factors contributing to individual differences in identity formation. However, previous studies mainly focused on broad personality domains and neglected more specific facets. In addition, it has only recently been recognized that identity formation is guided

  8. Two barriers to realizing the benefits of biometrics: a chain perspective on biometrics and identity fraud as biometrics' real challenge

    Science.gov (United States)

    Grijpink, Jan

    2004-06-01

    Along at least twelve dimensions biometric systems might vary. We need to exploit this variety to manoeuvre biometrics into place to be able to realise its social potential. Subsequently, two perspectives on biometrics are proposed revealing that biometrics will probably be ineffective in combating identity fraud, organised crime and terrorism: (1) the value chain perspective explains the first barrier: our strong preference for large scale biometric systems for general compulsory use. These biometric systems cause successful infringements to spread unnoticed. A biometric system will only function adequately if biometrics is indispensable for solving the dominant chain problem. Multi-chain use of biometrics takes it beyond the boundaries of good manageability. (2) the identity fraud perspective exposes the second barrier: our traditional approach to identity verification. We focus on identity documents, neglecting the person and the situation involved. Moreover, western legal cultures have made identity verification procedures known, transparent, uniform and predictable. Thus, we have developed a blind spot to identity fraud. Biometrics provides good potential to better checking persons, but will probably be used to enhance identity documents. Biometrics will only pay off if it confronts the identity fraudster with less predictable verification processes and more risks of his identity fraud being spotted. Standardised large scale applications of biometrics for general compulsory use without countervailing measures will probably produce the reverse. This contribution tentatively presents a few headlines for an overall biometrics strategy that could better resist identity fraud.

  9. [AIT (Adolescent Identity Treatment) - an Integrative Treatment Model for the Treatment of Personality Disorders].

    Science.gov (United States)

    Schlüter-Müller, Susanne

    2017-07-01

    AIT (Adolescent Identity Treatment) - an Integrative Treatment Model for the Treatment of Personality Disorders Personality disorders are patterns of maladaptive personality traits that have an impact on the individual throughout the life span. Borderline Personality Disorder (BPD) is a very severe, but treatable mental disorder. Identity disturbance is seen as the central construct for detecting severe personality pathology - and, most notably, borderline personality disorder - in adults and adolescents. Crises in the development of identity usually resolve into a normal and consolidated identity with flexible and adaptive functioning whereas identity diffusion is viewed as a lack of integration of the concept of the self and significant others. It is seen as the basis for subsequent personality pathology, including that of borderline personality disorder. Although BPD has its onset in adolescence and emerging adulthood the diagnosis is often delayed. In most cases, specific treatment is only offered late in the course of the disorder and to relatively few individuals. Adolescent Identity Treatment (AIT) is a treatment model that focuses on identity pathology as the core characteristic of personality disorders. This model integrates specific techniques for the treatment of adolescent personality pathology on the background of object-relation theories and modified elements of Transference-Focused Psychotherapy. Moreover, psychoeducation, a behavior-oriented homeplan and intensive family work is part of AIT.

  10. Features of the differential diagnosis of persons with gender identity disorders

    Directory of Open Access Journals (Sweden)

    Z.D. Novikova

    2013-10-01

    Full Text Available We presented a study of the features of gender identity in people undergoing gender, psychological and psychiatric examination to address the issue of gender reassignment. We analyze the specifics of gender identity, levels of masculinity and femininity, the similarities and differentiation within four nosological groups, which include persons with gender identity disorders (GID with transsexualism, personality disorders, diseases of the schizophrenia spectrum, and with organic mental disorders. We address the question of the differential diagnosis in the process of psychological screening of people with transsexualism and other types of GID. The analytical description of the four algorithms and their comparison are psychologically specific, qualitative research, almost impossible using statistical method of data processing. The data presented may be useful to specialists involved in the study of persons with gender identity disorders

  11. Optimal Experience and Personal Growth: Flow and the Consolidation of Place Identity.

    Science.gov (United States)

    Bonaiuto, Marino; Mao, Yanhui; Roberts, Scott; Psalti, Anastasia; Ariccio, Silvia; Ganucci Cancellieri, Uberta; Csikszentmihalyi, Mihaly

    2016-01-01

    This study examined the relationship between flow experience and place identity, based on eudaimonistic identity theory (EIT) which prioritizes self-defining activities as important for an individual's identification of his/her goals, values, beliefs, and interests corresponding to one's own identity development or enhancement. This study focuses on place identity, the identity's features relating to a person's relation with her/his place. The study is also based on flow theory, according to which some salient features of an activity experience are important for happiness and well-being. Questionnaire surveys on Italian and Greek residents focused on their perceived flow and place identity in relation to their own specific local place experiences. The overall findings revealed that flow experience occurring in one's own preferred place is widely reported as resulting from a range of self-defining activities, irrespective of gender or age, and it is positively and significantly associated with one's own place identity. Such findings provide the first quantitative evidence about the link between flow experienced during meaningfully located self-defining activities and identity experienced at the place level, similarly to the corresponding personal and social levels that had been previously already empirically tested. Results are also discussed in terms of their implications for EIT's understanding and enrichment, especially by its generalization from the traditional, personal identity level up to that of place identity. More generally, this study has implications for maintaining or enhancing one's own place identity, and therefore people-place relations, by means of facilitating a person's flow experience within psychologically meaningful places.

  12. Social Identification in Sports Teams: The Role of Personal, Social, and Collective Identity Motives.

    Science.gov (United States)

    Thomas, William E; Brown, Rupert; Easterbrook, Matthew J; Vignoles, Vivian L; Manzi, Claudia; D'Angelo, Chiara; Holt, Jeremy J

    2017-04-01

    Based on motivated identity construction theory (MICT; Vignoles, 2011), we offer an integrative approach examining the combined roles of six identity motives (self-esteem, distinctiveness, belonging, meaning, continuity, and efficacy) instantiated at three different motivational levels (personal, social, and collective identity) as predictors of group identification. These identity processes were investigated among 369 members of 45 sports teams from England and Italy in a longitudinal study over 6 months with four time points. Multilevel change modeling and cross-lagged analyses showed that satisfaction of four personal identity motives (individuals' personal feelings of self-esteem, distinctiveness, meaning, and efficacy derived from team membership), three social identity motives (individuals' feelings that the team identity carries a sense of belonging, meaning, and continuity), and one collective identity motive (a shared belief in group distinctiveness) significantly predicted group identification. Motivational processes underlying group identification are complex, multilayered, and not reducible to personal needs.

  13. Biography, identity, improvisation, sound: intersections of personal and social identity through improvisation

    NARCIS (Netherlands)

    Smilde, Rineke

    2016-01-01

    This essay addresses the relationship of improvisation and identity. Biographical research that was conducted by the author into professional musicians’ lifelong learning showed the huge importance of improvisation for personal expression. Musically, the concept of sound appeared to serve as a

  14. Person-first and identity-first language: Developing psychologists' cultural competence using disability language.

    Science.gov (United States)

    Dunn, Dana S; Andrews, Erin E

    2015-04-01

    The American Psychological Association (APA) advocates the use of person-first language (e.g., people with disabilities) to refer to individuals with disabilities in daily discourse and to reduce bias in psychological writing. Disability culture advocates and disability studies scholars have challenged the rationale for and implications of exclusive person-first language use, promoting use of identity-first language (e.g., disabled people). We argue that psychologists should adopt identity-first language alongside person-first constructions to address the concerns of disability groups while promoting human dignity and maintaining scientific and professional rigor. We review the evolution of disability language and then discuss the major models used to characterize disability and people with disabilities. The rationale for person-first language and the emergence of identity-first language, respectively, are linked to particular models. We then discuss some language challenges posed by identity-first language and the current intent of person-first language, suggesting that psychologists make judicious use of the former when it is possible to do so. We conclude by offering five observations of ways that use of both person-first and identity-first language could enhance psychologists' cultural competence regarding disability issues in personal and scientific communications. (c) 2015 APA, all rights reserved).

  15. Self-Determination and Personal Identity in University Students: The Mediating Role of Future Orientation.

    Science.gov (United States)

    Zhou, Mingming; Kam, Chester Chun Seng

    2018-05-17

    In this study, we sought to extend the research on self-determination, future orientation, and personal identity construction by integrating the theories on self-determination and future orientation to provide a conceptual framework for understanding the relations between personal identity and the following individual characteristics: Hope, optimism, awareness of self, and perceived choice. 191 university students in China responded surveys in hardcopies on an individual basis. Our SEM results revealed that proximal future orientation influenced the mechanisms through which distal psychological traits affected identity construction. Specifically, hope mediated the effects of self-awareness on the participants' personal identity ratings (b = .45, p identity. This study suggested an extended framework through which we could understand how the interaction between future orientation and self-determination can predict personal identity. The findings have significant implications for interventions in educational settings.

  16. The relationships of personal and cultural identity to adaptive and maladaptive psychosocial functioning in emerging adults.

    Science.gov (United States)

    Schwartz, Seth J; Zamboanga, Byron L; Weisskirch, Robert S; Wang, Sherry C

    2010-01-01

    The present study examined the extent to which cultural identity would be associated with adaptive and maladaptive psychosocial functioning, both directly and indirectly through a personal identity consolidation. A sample of 773 White, Black, and Hispanic university students completed measures of cultural identity, personal identity consolidation, adaptive psychosocial functioning, internalizing symptoms, and proclivity toward externalizing symptoms. Both heritage and American cultural identity were positively related to adaptive psychosocial functioning; American-culture identity was negatively associated with internalizing symptoms; and heritage-culture identity was negatively related to proclivity toward externalizing symptoms. All of these findings were mediated by personal identity consolidation and were fully consistent across ethnic groups. We discuss implications in terms of broadening the study of identity to include both personal and cultural dimensions of self.

  17. Utterance Verification for Text-Dependent Speaker Recognition

    DEFF Research Database (Denmark)

    Kinnunen, Tomi; Sahidullah, Md; Kukanov, Ivan

    2016-01-01

    Text-dependent automatic speaker verification naturally calls for the simultaneous verification of speaker identity and spoken content. These two tasks can be achieved with automatic speaker verification (ASV) and utterance verification (UV) technologies. While both have been addressed previously...

  18. The Game as the Way of Personal Identity Development

    Directory of Open Access Journals (Sweden)

    L. A. Belyayeva

    2012-01-01

    Full Text Available  The paper suggests the game interpretation as the universal and phenomenal way of developing personal identity by a relaxed participation in game activity. Unlike the extended definitions of game as a culturalogical and pedagogical phenomenon, the authors suggest the game analysis in philosophical perspective revealing its existential status. Being the active form of personal existence, the game facilitates self-awareness by means of self-understanding and self-determination in the course of game activity developing the attitude of «I am another one», and giving a chance to experiment with personal identity, taking and playing various social and cultural roles. The existential significance of games activating self-understanding and meaning of self-existence is growing nowadays, given pluralism and reassessment of values. 

  19. The Survey of Personal and National Identity on Cell Phone Addicts and Non-Addicts.

    Science.gov (United States)

    Alavi, Seyyed Salman; Ghanizadeh, Maryam; Mohammadi, Mohammad Reza; Mohammadi Kalhory, Soroush; Jannatifard, Fereshteh; Sepahbodi, Ghazal

    2018-01-01

    Objective: Smart phones have rapidly become an integral, and for some, an essential communication device worldwide. The issue of identity has always been a subject of interest among psychologists. The present study was conducted to compare personal and national identity and their subscales between cell phone addicts and non-addicts. Method : In this cross-sectional study, 500 student cell phone users from various universities in Tehran were recruited using stratified sampling. Participants completed cell phone addiction questionnaires including Mobile Phone Problematic Use Scale (MPPUS), Cell Phone Dependency Questionnaire (CPDQ), Personal Identity Development Questionnaire, Extended Objective Measure of Ego Identity Status (EOMEIS) and National Identity Questionnaire. Then, the subscales of these instruments were analyzed using SPSS Version 20. Results: Results of this study revealed significant differences between cell phone addicts and non-addicts in the scores of national identity, personal identity, and most subscales, except for some subscales (Pphone addiction (r=-0.35, -0.33, respectively).On the other hand, after controlling for the confounder variables, we found that national identity had an effect on cell phone addiction(OR=0.05, CI=0.92-0.98). Conclusion: The results of this study indicated that cell phone overuse may be correlated with defects in some aspects of national and personal identity.

  20. Which came first, personality traits or identity processes during early and middle adolescence?

    NARCIS (Netherlands)

    Hatano, Kai; Sugimura, Kazumi; Klimstra, T.A.

    No previous studies examined longitudinal associations between personality facets and identity dimensions in early and middle adolescence. To uncover these relationships; we test the direction of effects of domain-and facet-level personality traits with identity dimensions in early and middle

  1. Associations between identity diffusion, Axis II disorder, and psychopathology in inpatients with borderline personality disorder.

    Science.gov (United States)

    Sollberger, Daniel; Gremaud-Heitz, Daniela; Riemenschneider, Anke; Küchenhoff, Joachim; Dammann, Gerhard; Walter, Marc

    2012-01-01

    Patients with borderline personality disorder (BPD) suffer from instability in their relationships, their affectivity, and their identity. However, the associations between these dimensions are not clear. The purpose of the present study was to investigate the relation between identity diffusion and psychopathology in BPD. In the second week of inpatient treatment, 52 patients with BPD were assessed with the Inventory of Personality Organization (IPO) and questionnaires measuring general psychiatric symptoms, mood states, and negative affects (SCL-90-R, BDI, STAI, and STAXI). A median split was examined to differentiate BPD patients with high identity diffusion from those with low identity diffusion. BPD patients with high identity diffusion did not differ in their social data from BPD patients with low identity diffusion. However, BPD patients with high identity diffusion showed significantly higher levels of psychiatric symptoms, as well as higher anxiety, anger, and depression scores (p personality disorders (p identity diffusion with psychopathological symptoms and features of personality disorder and emphasize the clinical significance of identity diffusion for patients with BPD. Copyright © 2011 S. Karger AG, Basel.

  2. THE EFFECT OF MEDIA LITERACY ON THE SOCIAL IDENTITY OF VOLLEYBALL SPECTATORS THROUGH PERSONAL IDENTITY

    OpenAIRE

    Mahsa Nematzadeh

    2017-01-01

    This research aim was investigating the effect of media literacy on volleyball spectator's social identity through personal identity. The present study, psychologically, is divided in to 8 layers of view paradigm, the main type of applied research: deductive research approaches, quantity research strategies theories, field research tone, cross sectional survey methods, research objectives, description and finally data collection methods, library resource reviews, and questionnaires. The stati...

  3. Research Trends and Issues in the Study of Identity of Multi-ethnic Persons

    OpenAIRE

    TABA, Ayumi; TAKAI, Jiro

    2016-01-01

    In this article, concepts of identity are considered and surveyed researches of ego identity and group identity in social identity theory, self-categorization theory. It indicates ethnic identity is related to selfconcept, well-being, academic achievement, mental health, and so on. Furthermore, identity management theory reveals that cross- cultural communication occurs depending on management of cultural identity as group identity and relational identity as personal identity. However, there ...

  4. Face Verification for Mobile Personal Devices

    NARCIS (Netherlands)

    Tao, Q.

    2009-01-01

    In this thesis, we presented a detailed study of the face verification problem on the mobile device, covering every component of the system. The study includes face detection, registration, normalization, and verification. Furthermore, the information fusion problem is studied to verify face

  5. The association of personal semantic memory to identity representations: insight into higher-order networks of autobiographical contents.

    Science.gov (United States)

    Grilli, Matthew D

    2017-11-01

    Identity representations are higher-order knowledge structures that organise autobiographical memories on the basis of personality and role-based themes of one's self-concept. In two experiments, the extent to which different types of personal semantic content are reflected in these higher-order networks of memories was investigated. Healthy, young adult participants generated identity representations that varied in remoteness of formation and verbally reflected on these themes in an open-ended narrative task. The narrative responses were scored for retrieval of episodic, experience-near personal semantic and experience-far (i.e., abstract) personal semantic contents. Results revealed that to reflect on remotely formed identity representations, experience-far personal semantic contents were retrieved more than experience-near personal semantic contents. In contrast, to reflect on recently formed identity representations, experience-near personal semantic contents were retrieved more than experience-far personal semantic contents. Although episodic memory contents were retrieved less than both personal semantic content types to reflect on remotely formed identity representations, this content type was retrieved at a similar frequency as experience-far personal semantic content to reflect on recently formed identity representations. These findings indicate that the association of personal semantic content to identity representations is robust and related to time since acquisition of these knowledge structures.

  6. Survey on Offline Finger Print Verification System

    NARCIS (Netherlands)

    Suman, R.; Kaur, R.

    2012-01-01

    The fingerprint verification, means where "verification" implies a user matching a fingerprint against a single fingerprint associated with the identity that the user claims. Biometrics can be classified into two types Behavioral (signature verification, keystroke dynamics, etc.) And Physiological

  7. Being known, intimate, and valued: global self-verification and dyadic adjustment in couples and roommates.

    Science.gov (United States)

    Katz, Jennifer; Joiner, Thomas E

    2002-02-01

    We contend that close relationships provide adults with optimal opportunities for personal growth when relationship partners provide accurate, honest feedback. Accordingly, it was predicted that young adults would experience the relationship quality with relationship partners who evaluated them in a manner consistent their own self-evaluations. Three empirical tests of this self-verification hypothesis as applied to close dyads were conducted. In Study 1, young adults in dating relationships were most intimate with and somewhat more committed to partners when they perceived that partners evaluated them as they evaluated themselves. Self-verification effects were pronounced for those involved in more serious dating relationships. In Study 2, men reported the greatest esteem for same-sex roommates who evaluated them in a self-verifying manner. Results from Study 2 were replicated and extended to both male and female roommate dyads in Study 3. Further, self-verification effects were most pronounced for young adults with high emotional empathy. Results suggest that self-verification theory is useful for understanding dyadic adjustment across a variety of relational contexts in young adulthood. Implications of self-verification processes for adult personal development are outlined within an identity negotiation framework.

  8. Change and persistence of personal identities after the transition to retirement.

    Science.gov (United States)

    Teuscher, Ursina

    2010-01-01

    This study addresses the question of how retired people's self-image differs from that of working people, and what factors predict people's self-definition as professionals or retirees. Seven hundred ninety-two Swiss persons aged 58-70 (386 men, 406 women; 349 not retired, 443 retired) were asked to rate the importance of different self-description domains (such as profession, family-roles, personal values, etc.). Results indicated that the profession domain remains important for self-description even after retirement, to the extent that retirement status does not predict the importance of the professional identity at all. Rather, consistent with social identity theory, the importance of the profession for self-description is best predicted by the status of the (former or current) job. The importance of the retirement status for self-definition is predicted best by a positive attitude toward aging. In general, retired respondents rated more domains of self-description as important than did not-yet-retired respondents, and no domain was less important after retirement. In other words, identity diversity was higher for the retired than for the not-yet-retired persons. In addition, high identity diversity correlated with a high satisfaction across different life domains.

  9. I and Us: A Longitudinal Study on the Interplay of Personal and Social Identity in Adolescence.

    Science.gov (United States)

    Albarello, Flavia; Crocetti, Elisabetta; Rubini, Monica

    2018-04-01

    The development of personal and social identity is crucial in adolescence. On the one hand, adolescents face the task of forming and consolidating their personal identity in multiple domains, with educational and interpersonal domains particularly salient. On the other hand, they enlarge their social horizon and increasingly define themselves as members of multiple peer groups, such as groups of classmates and friends met outside school. There is however a lack of integrative research on the interplay among and between personal and social identity processes. Hence the purpose of this study was threefold. First, we examined how personal identity processes in the educational and interpersonal domains are associated longitudinally. Second, we investigated to what extent social identifications with classmates and with the group of friends are associated over time. Third, with an original approach we examined the longitudinal interplay between personal and social identity processes, to connect theoretical contributions that have so far proceeded largely in parallel. Participants were 304 adolescents (61.84% female, M age  = 17.49) involved in a three-wave longitudinal study. We found that (a) the ways in which adolescents develop their identity in the educational and interpersonal domains become more closely intertwined over time; (b) identifications with classmates and with the group of friends are interconnected; and (c) personal and social identity processes are associated both concurrently and longitudinally, with most cross-lagged effects showing that social identifications influence personal identity formation and consolidation in the interpersonal identity domain. Theoretical implications are discussed.

  10. Verification Image of The Veins on The Back Palm with Modified Local Line Binary Pattern (MLLBP) and Histogram

    Science.gov (United States)

    Prijono, Agus; Darmawan Hangkawidjaja, Aan; Ratnadewi; Saleh Ahmar, Ansari

    2018-01-01

    The verification to person who is used today as a fingerprint, signature, personal identification number (PIN) in the bank system, identity cards, attendance, easily copied and forged. This causes the system not secure and is vulnerable to unauthorized persons to access the system. In this research will be implemented verification system using the image of the blood vessels in the back of the palms as recognition more difficult to imitate because it is located inside the human body so it is safer to use. The blood vessels located at the back of the human hand is unique, even humans twins have a different image of the blood vessels. Besides the image of the blood vessels do not depend on a person’s age, so it can be used for long term, except in the case of an accident, or disease. Because of the unique vein pattern recognition can be used in a person. In this paper, we used a modification method to perform the introduction of a person based on the image of the blood vessel that is using Modified Local Line Binary Pattern (MLLBP). The process of matching blood vessel image feature extraction using Hamming Distance. Test case of verification is done by calculating the percentage of acceptance of the same person. Rejection error occurs if a person was not matched by the system with the data itself. The 10 person with 15 image compared to 5 image vein for each person is resulted 80,67% successful Another test case of the verification is done by verified two image from different person that is forgery, and the verification will be true if the system can rejection the image forgery. The ten different person is not verified and the result is obtained 94%.

  11. Secondary Uses of Personal Identity Information: Policies, Technologies and Regulatory Framework

    DEFF Research Database (Denmark)

    Adjei, Joseph K.; Olesen, Henning

    2012-01-01

    Although personal identity information must primarily be used for protecting and promoting the physical needs of individuals, it has also become central to the business models of the digital age due to its use for other secondary purposes, resulting in various innovative identity management (Id...

  12. Relationships between Personal and Collective Place Identity and Well-Being in Mountain Communities.

    Science.gov (United States)

    Knez, Igor; Eliasson, Ingegärd

    2017-01-01

    The aim was to investigate the relationships between landscape-related personal and collective identity and well-being of residents living in a Swedish mountain county ( N = 850). It was shown that their most valued mountain activities were viewing and experiencing nature and landscape, outdoor recreation, rest and leisure, and socializing with friends/family. Qualitative analyses showed that the most valued aspects of the sites were landscape and outdoor restoration for personal favorite sites, and tourism and alpine for collective favorite sites. According to quantitative analyses the stronger the attachment/closeness/belonging (emotional component of place identity) residents felt to favorite personal and collective sites the more well-being they perceived when visiting these places. Similarly, the more remembrance, thinking and mental travel (cognitive component of place identity) residents directed to these sites the more well-being they perceived in these places. In both types of sites well-being was more strongly predicted by emotional than cognitive component of place-identity. All this indicates the importance of person-place bonds in beneficial experiences of the outdoors, over and above simply being in outdoor environments.

  13. Confidence-increasing elements in user instructions: Seniors' reactions to verification steps and personal stories

    NARCIS (Netherlands)

    Loorbach, N.R.; Karreman, Joyce; Steehouder, M.F.

    2013-01-01

    Purpose: Research shows that confidence-increasing elements in user instructions positively influence senior users' task performance and motivation. We added verification steps and personal stories to user instructions for a cell phone, to find out how seniors (between 60 and 70 years) perceive

  14. The impact of corporate visual identity on brand personality

    OpenAIRE

    Jabbar, Zeenat

    2014-01-01

    This thesis was submitted for the degree of Doctor of Philosophy and awarded by Brunel University. It is argued that there is a need to extend our understanding and knowledge of the magnitude to which the elements of corporate visual identity (CVI) are perceived as the communicators of brand personality and hence corporate image, by the consumers. This thesis extends the knowledge about corporate visual identity (CVI) factors, particularly, name, logo, and colours, by developing a comprehe...

  15. Sex-typed personality traits and gender identity as predictors of young adults' career interests.

    Science.gov (United States)

    Dinella, Lisa M; Fulcher, Megan; Weisgram, Erica S

    2014-04-01

    Gender segregation of careers is still prominent in the U.S. workforce. The current study was designed to investigate the role of sex-typed personality traits and gender identity in predicting emerging adults' interests in sex-typed careers. Participants included 586 university students (185 males, 401 females). Participants reported their sex-typed personality traits (masculine and feminine traits), gender identities (gender typicality, contentment, felt pressure to conform, and intergroup bias), and interests in sex-typed careers. Results indicated both sex-typed personality traits and gender identity were important predictors of young adults' career interests, but in varying degrees and differentially for men and women. Men's sex-typed personality traits and gender typicality were predictive of their masculine career interests even more so when the interaction of their masculine traits and gender typicality were considered. When gender typicality and sex-typed personality traits were considered simultaneously, gender typicality was negatively related to men's feminine career interests and gender typicality was the only significant predictor of men's feminine career interests. For women, sex-typed personality traits and gender typicality were predictive of their sex-typed career interests. The level of pressure they felt to conform to their gender also positively predicted interest in feminine careers. The interaction of sex-typed personality traits and gender typicality did not predict women's career interests more than when these variables were considered as main effects. Results of the multidimensional assessment of gender identity confirmed that various dimensions of gender identity played different roles in predicting career interests and gender typicality was the strongest predictor of career interests.

  16. Identity processes and personality traits and types in adolescence : Directionality of effects and developmental trajectories

    NARCIS (Netherlands)

    Luyckx, K.; Teppers, E.; Klimstra, T.A.; Rassart, J.

    2014-01-01

    Personality traits are hypothesized to be among the most important factors contributing to individual differences in identity development. However, longitudinal studies linking Big Five personality traits to contemporary identity models (in which multiple exploration and commitment processes are

  17. The Survey personal and national identity between individual with cell phone addiction disorder and normal smartphone users

    Directory of Open Access Journals (Sweden)

    Seyyed Salman Alavi

    2018-02-01

    Full Text Available Objective: Smart phones have rapidly become an integral, and for some, an essential communication device worldwide. The issue of identity has always been a subject of interest among psychologists. The present study was conducted to compare personal and national identity and their subscales between cell phone addicts and non-addicts.Method: In this cross-sectional study, 500 student cell phone users from various universities in Tehran were recruited using stratified sampling. Participants completed cell phone addiction questionnaires including Mobile Phone Problematic Use Scale (MPPUS, Cell Phone Dependency Questionnaire (CPDQ, Personal Identity Development Questionnaire, Extended Objective Measure of Ego Identity Status (EOMEIS and National Identity Questionnaire. Then, the subscales of these instruments were analyzed using SPSS Version 20.Results: Results of this study revealed significant differences between cell phone addicts and non-addicts in the scores of national identity, personal identity, and most subscales, except for some subscales (P<0.05. In addition, a negative and significant relationship was found between personal and national identity and cell phone addiction (r=-0.35, -0.33, respectively.On the other hand, after controlling for the confounder variables, we found that national identity had an effect on cell phone addiction(OR=0.05, CI=0.92-0.98.Conclusion: The results of this study indicated that cell phone overuse may be correlated with defects in some aspects of national and personal identity.

  18. Gender identity and sexual orientation in women with borderline personality disorder.

    Science.gov (United States)

    Singh, Devita; McMain, Shelley; Zucker, Kenneth J

    2011-02-01

    In the Diagnostic and Statistical Manual of Mental Disorders, Fourth Edition, text revision (DSM-IV-TR) (and earlier editions), a disturbance in "identity" is one of the defining features of borderline personality disorder (BPD). Gender identity, a person's sense of self as a male or a female, constitutes an important aspect of identity formation, but this construct has rarely been examined in patients with BPD. In the present study, the presence of gender identity disorder or confusion was examined in women diagnosed with BPD. We used a validated dimensional measure of gender dysphoria. Recalled gender identity and gender role behavior from childhood was also assessed with a validated dimensional measure, and current sexual orientation was assessed by two self-report measures. A consecutive series of 100 clinic-referred women (mean age, 34 years) with BPD participated in the study. The women were diagnosed with BPD using the International Personality Disorder Exam-BPD Section. None of the women with BPD met the criterion for caseness on the dimensional measure of gender dysphoria. Women who self-reported either a bisexual or a homosexual sexual orientation had a significantly higher score on the dimensional measure of gender dysphoria than the women who self-reported a heterosexual sexual orientation, and they also recalled significantly more cross-gender behavior during childhood. Results were compared with a previous study on a diagnostically heterogeneous group of women with other clinical problems. The importance of psychosexual assessment in the clinical evaluation of patients with BPD is discussed. © 2010 International Society for Sexual Medicine.

  19. Pragmatics of the Development of Personal Identity in Adolescents in the Latin American Context.

    Science.gov (United States)

    Tapia, Javier; Rojas, Adrián; Picado, Karol

    2017-03-01

    The present work proposes a pragmatic perspective of the development of personal identity. Such perspective is based on a unifying vision that incorporates the contribution of communicative pragmatics and becomes aware of the contribution of semiotics to psychology, without leaving aside the eriksonian point of view and other significant contributions in the field. The article defines identity in adolescence from a development approach, and adopts a systemic perspective concerning the insertion of adolescents in their context of formation as individuals. It then proposes a way to understand identity from a pragmatic-communicative perspective. Finally, it introduces two communicative use contexts from which personal identity can emerge, showing the importance of communication and language in the formation and development of identity.

  20. Motivation and Justice at Work: The Role of Emotion and Cognition Components of Personal and Collective Work Identity.

    Science.gov (United States)

    Nordhall, Ola; Knez, Igor

    2017-01-01

    The aim of this study was to investigate the role of personal and collective work identity (including emotion and cognition components), in predicting work motivation (operationalized as work self-determined motivation) and organizational justice (operationalized as organizational pay justice). Digitized questionnaires were distributed by e-mail to 2905 members, teachers, of a Swedish trade union. A total of 768 individuals answered the questionnaire and by that participated in this study. Personal- compared to collective work identity was shown to positively associate with self-determined motivation accounted for by the emotion component of personal work identity. Collective compared to personal work identity was reported to positively associate with organizational pay justice accounted for by the cognition component of collective work identity. All this suggests that both work-related motivation and organizational justice might be, to some extent, accounted for by the psychological mechanisms of work identity and that, as predicted, different types of work identity, play different significant roles in predicting motivation and justice at work. More precisely, the emotion component of work identity was more pronounced in personal work-bonding relationships, and the cognitive component, of work identity in contrast, was more pronounced in collective work-bonding relationships.

  1. Inattentive listening undermines self-verification in personal storytelling.

    Science.gov (United States)

    Pasupathi, Monisha; Rich, Ben

    2005-08-01

    Two studies explore the narrative construction of self-perceptions in conversational storytelling among pairs of same-sex friends. Specifically, the studies examined how listener behavior can support or undermine attempts to self-verify in personal storytelling. In two studies (n=100 dyads), speakers told attentive, distracted, or disagreeable (Study 1 only) friends about a recent experience. Distracted, but not disagreeable, friends tended to undermine participants' attempts to verify their self-perception of being interested in an activity (Study 1) or their self-perception that an event was typical for them (Study 2). These results support the notion that friends can be an important source of influence on self-perceptions and, perhaps surprisingly, suggest that responsiveness from friends, rather than agreement per se, may be crucial for supporting self-verification processes.

  2. Secure optical verification using dual phase-only correlation

    International Nuclear Information System (INIS)

    Liu, Wei; Liu, Shutian; Zhang, Yan; Xie, Zhenwei; Liu, Zhengjun

    2015-01-01

    We introduce a security-enhanced optical verification system using dual phase-only correlation based on a novel correlation algorithm. By employing a nonlinear encoding, the inherent locks of the verification system are obtained in real-valued random distributions, and the identity keys assigned to authorized users are designed as pure phases. The verification process is implemented in two-step correlation, so only authorized identity keys can output the discriminate auto-correlation and cross-correlation signals that satisfy the reset threshold values. Compared with the traditional phase-only-correlation-based verification systems, a higher security level against counterfeiting and collisions are obtained, which is demonstrated by cryptanalysis using known attacks, such as the known-plaintext attack and the chosen-plaintext attack. Optical experiments as well as necessary numerical simulations are carried out to support the proposed verification method. (paper)

  3. Identity Processes and Personality Traits and Types in Adolescence: Directionality of Effects and Developmental Trajectories

    Science.gov (United States)

    Luyckx, Koen; Teppers, Eveline; Klimstra, Theo A.; Rassart, Jessica

    2014-01-01

    Personality traits are hypothesized to be among the most important factors contributing to individual differences in identity development. However, longitudinal studies linking Big Five personality traits to contemporary identity models (in which multiple exploration and commitment processes are distinguished) are largely lacking. To gain more…

  4. Perspectivism and Intersubjective Criteria for Personal Identity: A Defense of Bernard Williams’ Criterion of Bodily Continuity

    OpenAIRE

    Torriani, Tristan Guillermo

    2010-01-01

    In this article I revisit earlier stages of the discussion of personal identity, before Neo-Lockean psychological continuity views became prevalent. In particular, I am interested in Bernard Williams’ initial proposal of bodily identity as a necessary, although not sufficient, criterion of personal identity. It was at this point that psychological continuity views came to the fore arguing that bodily identity was not necessary because brain transplants were logically possible, even if physica...

  5. Motivation and Justice at Work: The Role of Emotion and Cognition Components of Personal and Collective Work Identity

    Directory of Open Access Journals (Sweden)

    Ola Nordhall

    2018-01-01

    Full Text Available The aim of this study was to investigate the role of personal and collective work identity (including emotion and cognition components, in predicting work motivation (operationalized as work self-determined motivation and organizational justice (operationalized as organizational pay justice. Digitized questionnaires were distributed by e-mail to 2905 members, teachers, of a Swedish trade union. A total of 768 individuals answered the questionnaire and by that participated in this study. Personal- compared to collective work identity was shown to positively associate with self-determined motivation accounted for by the emotion component of personal work identity. Collective compared to personal work identity was reported to positively associate with organizational pay justice accounted for by the cognition component of collective work identity. All this suggests that both work-related motivation and organizational justice might be, to some extent, accounted for by the psychological mechanisms of work identity and that, as predicted, different types of work identity, play different significant roles in predicting motivation and justice at work. More precisely, the emotion component of work identity was more pronounced in personal work-bonding relationships, and the cognitive component, of work identity in contrast, was more pronounced in collective work-bonding relationships.

  6. Motivation and Justice at Work: The Role of Emotion and Cognition Components of Personal and Collective Work Identity

    Science.gov (United States)

    Nordhall, Ola; Knez, Igor

    2018-01-01

    The aim of this study was to investigate the role of personal and collective work identity (including emotion and cognition components), in predicting work motivation (operationalized as work self-determined motivation) and organizational justice (operationalized as organizational pay justice). Digitized questionnaires were distributed by e-mail to 2905 members, teachers, of a Swedish trade union. A total of 768 individuals answered the questionnaire and by that participated in this study. Personal- compared to collective work identity was shown to positively associate with self-determined motivation accounted for by the emotion component of personal work identity. Collective compared to personal work identity was reported to positively associate with organizational pay justice accounted for by the cognition component of collective work identity. All this suggests that both work-related motivation and organizational justice might be, to some extent, accounted for by the psychological mechanisms of work identity and that, as predicted, different types of work identity, play different significant roles in predicting motivation and justice at work. More precisely, the emotion component of work identity was more pronounced in personal work-bonding relationships, and the cognitive component, of work identity in contrast, was more pronounced in collective work-bonding relationships. PMID:29379454

  7. Contribution of past and future self-defining event networks to personal identity.

    Science.gov (United States)

    Demblon, Julie; D'Argembeau, Arnaud

    2017-05-01

    Personal identity is nourished by memories of significant past experiences and by the imagination of meaningful events that one anticipates to happen in the future. The organisation of such self-defining memories and prospective thoughts in the cognitive system has received little empirical attention, however. In the present study, our aims were to investigate to what extent self-defining memories and future projections are organised in networks of related events, and to determine the nature of the connections linking these events. Our results reveal the existence of self-defining event networks, composed of both memories and future events of similar centrality for identity and characterised by similar identity motives. These self-defining networks expressed a strong internal coherence and frequently organised events in meaningful themes and sequences (i.e., event clusters). Finally, we found that the satisfaction of identity motives in represented events and the presence of clustering across events both contributed to increase in the perceived centrality of events for the sense of identity. Overall, these findings suggest that personal identity is not only nourished by representations of significant past and future events, but also depends on the formation of coherent networks of related events that provide an overarching meaning to specific life experiences.

  8. Optimal Experience and Personal Growth: Flow and the Consolidation of Place Identity

    Science.gov (United States)

    Bonaiuto, Marino; Mao, Yanhui; Roberts, Scott; Psalti, Anastasia; Ariccio, Silvia; Ganucci Cancellieri, Uberta; Csikszentmihalyi, Mihaly

    2016-01-01

    This study examined the relationship between flow experience and place identity, based on eudaimonistic identity theory (EIT) which prioritizes self-defining activities as important for an individual’s identification of his/her goals, values, beliefs, and interests corresponding to one’s own identity development or enhancement. This study focuses on place identity, the identity’s features relating to a person’s relation with her/his place. The study is also based on flow theory, according to which some salient features of an activity experience are important for happiness and well-being. Questionnaire surveys on Italian and Greek residents focused on their perceived flow and place identity in relation to their own specific local place experiences. The overall findings revealed that flow experience occurring in one’s own preferred place is widely reported as resulting from a range of self-defining activities, irrespective of gender or age, and it is positively and significantly associated with one’s own place identity. Such findings provide the first quantitative evidence about the link between flow experienced during meaningfully located self-defining activities and identity experienced at the place level, similarly to the corresponding personal and social levels that had been previously already empirically tested. Results are also discussed in terms of their implications for EIT’s understanding and enrichment, especially by its generalization from the traditional, personal identity level up to that of place identity. More generally, this study has implications for maintaining or enhancing one’s own place identity, and therefore people–place relations, by means of facilitating a person’s flow experience within psychologically meaningful places. PMID:27872600

  9. Perspectivism and Intersubjective Criteria for Personal Identity: A Defense of Bernard Williams’ Criterion of Bodily Continuity

    Directory of Open Access Journals (Sweden)

    Tristan Guillermo Torriani

    2008-06-01

    Full Text Available In this article I revisit earlier stages of the discussion of personal identity, before Neo-Lockean psychological continuity views became prevalent. In particular, I am interested in Bernard Williams’ initial proposal of bodily identity as a necessary, although not sufficient, criterion of personal identity. It was at this point that psychological continuity views came to the fore arguing that bodily identity was not necessary because brain transplants were logically possible, even if physically impossible. Further proposals by Shoemaker of causal relations between mental states in our memory and Parfit’s discussion of branching causal chains created additional complications. My contention in this paper is that psychological continuity views deflected our attention from what should have remained in the spotlight all the time: the intersubjective character (or not of criteria proposed to decide personal identity in our language game, and ultimately our form of life concerning ourselves as persons. B. Williams’ emphasis on the body was not just common sense. It was also recognition of the importance of giving priority to criteria that could be kept under intersubjective control.

  10. Perspectivism and Intersubjective Criteria for Personal Identity: A Defense of Bernard Williams’ Criterion of Bodily Continuity

    Directory of Open Access Journals (Sweden)

    Tristan Guillermo Torriani

    2010-09-01

    Full Text Available In this article I revisit earlier stages of the discussion of personal identity, before Neo-Lockean psychological continuity views became prevalent. In particular, I am interested in Bernard Williams’ initial proposal of bodily identity as a necessary, although not sufficient, criterion of personal identity. It was at this point that psychological continuity views came to the fore arguing that bodily identity was not necessary because brain transplants were logically possible, even if physically impossible. Further proposals by Shoemaker of causal relations between mental states in our memory and Parfit’s discussion of branching causal chains created additional complications. My contention in this paper is that psychological continuity views deflected our attention from what should have remained in the spotlight all the time: the intersubjective character (or not of criteria proposed to decide personal identity in our language game, and ultimately our form of life concerning ourselves as persons. B. Williams’ emphasis on the body was not just common sense. It was also recognition of the importance of giving priority to criteria that could be kept under intersubjective control.

  11. Pedagogic Approach to the Mechanisms of Personality Identity Development

    Science.gov (United States)

    Shakurova, Marina V.

    2016-01-01

    The article addresses the problem of defining and attributing pedagogic essence to the mechanisms of personality identity development. It is based on the general mechanism of social interaction. Its structure contains, on the one hand, pedagogic interaction, including the forms of pedagogic assistance and pedagogic support; on the other hand, it…

  12. Assessing cultural intelligence, personality and identity amongst young white Afrikaans-speaking students: A preliminary study

    Directory of Open Access Journals (Sweden)

    Natasha Nel

    2015-04-01

    Research purpose: The objective of this research is to determine the relationship between personality, identity and CQ amongst young Afrikaans-speaking South Africans. Research approach, design and method: A quantitative research design was used in this study. This study was cross-sectional in nature. For the purpose of this study, a sample of young South African university students (N = 252 was used. The personal identity subscale from the Erickson Psychosocial Stage Inventory, the Multi-Ethnic Identity Measure, the Religious Identity Short Scale, the South African Personality Inventory questionnaire and the Four Factor Model of Cultural Intelligence Scale were applied as the measuring instruments. Main findings: Religious identity and ethnic identity have a relationship with cognitive CQ. Soft-heartedness and conscientiousness have a relationship with behavioural CQ. Also, soft-heartedness, facilitating, extroversion and religious identity have a relationship with motivational CQ. Practical/managerial implications: Organisations within South Africa will gain a better understanding of CQ and the benefits of having a culturally intelligent workforce as a strengths-based approach. Culturally intelligent employees will be able to adjust to working with co-workers from another culture, not feel threatened when interacting with co-workers and clients and be able to transfer knowledge from one culture to another, which will aid the organisation in completing overseas assignments, cross-cultural decision-making, leadership in multicultural environments and managing international careers. Contribution/value-add: CQ is a relatively new concept and empirical research on positive subjects is still very limited. Research on personality, identity and CQ within the South African context is still very limited. Therefore, this study will contribute to literature on positive psychology and cultural intelligence.

  13. Reproductive autonomy, the non-identity problem, and the non-person problem.

    Science.gov (United States)

    DiSilvestro, Russell

    2009-01-01

    The Non-Identity Problem is the problem of explaining the apparent wrongness of a decision that does not harm people, especially since some of the people affected by the decision would not exist at all were it not for the decision. One approach to this problem, in the context of reproductive decisions, is to focus on wronging, rather than harming, one's offspring. But a Non-Person Problem emerges for any view that claims (1) that only persons can be wronged and (2) that the person-making properties allow for there to be human non-persons. Consider an individual human organism that is prevented from ever possessing the person-making properties. On person-only accounts of the victims of wronging, this organism cannot be wronged by anyone. Hence even individuals whose decisions prevent it from ever possessing the person-making properties cannot wrong it. But this is counter-intuitive. We can think of examples where a human organism is wronged by precisely those decisions that prevent it from possessing the person-making properties. The best solution to this problem, in the case where the person-making property is rational self-governance in pursuit of a meaningful life, is to adjust the concept of a person so that it refers, not merely to those with the immediate capacity for rational self-governance in pursuit of a meaningful life, but also to those with a higher-order capacity for such self-governance. Any solution to the Non-Identity Problem that focuses on wronging rather than harming should incorporate this sort of solution to the Non-Person Problem.

  14. Personal identity in college and the work context : Developmental trajectories and psychosocial functioning

    NARCIS (Netherlands)

    Luyckx, K.; Klimstra, T.A.; Schwartz, S.J.; Duriez, B.

    2013-01-01

    Personal identity formation represents a core developmental challenge for adolescents and young adults. Because much of the identity literature focuses on college students, it is necessary to conduct a detailed inquiry into the ways in which specific commitment and exploration processes develop over

  15. A performance evaluation of personnel identity verifiers

    International Nuclear Information System (INIS)

    Maxwell, R.L.; Wright, L.J.

    1987-01-01

    Personnel identity verification devices, which are based on the examination and assessment of a body feature or a unique repeatable personal action, are steadily improving. These biometric devices are becoming more practical with respect to accuracy, speed, user compatibility, reliability and cost, but more development is necessary to satisfy the varied and sometimes ill-defined future requirements of the security industry. In an attempt to maintain an awareness of the availability and the capabilities of identity verifiers for the DOE security community, Sandia Laboratories continues to comparatively evaluate the capabilities and improvements of developing devices. An evaluation of several recently available verifiers is discussed in this paper. Operating environments and procedures more typical of physical access control use can reveal performance substantially different from the basic laboratory tests

  16. When I equals we: exploring the relation between social and personal identity of extreme right-wing political party members.

    Science.gov (United States)

    Baray, Gamze; Postmes, Tom; Jetten, Jolanda

    2009-12-01

    This paper introduces the concept of self-defining groups to explain how personal and social aspects of identity relate to each other among members of an extreme right-wing political party. Two studies were conducted. Study 1 examined how affiliation with a social group that has clear-cut, rigid norms and values affects the personal and social self-concept. Participants were members of a (self-defining) Turkish nationalist organisation (N=66) and a control group of Turkish university students (N=58). Paradoxically, high levels of national identification were associated with stronger personal identity. Study 2 used the same participant population (N=177) and manipulated self-focused attention by means of a mirror. Self-aware members reported the highest levels of identification with the nationalist organisation. Results suggest that members of this groups show no signs of 'vanishing individuality': although boundaries between personal and social identities are blurred, extremist group members retain a distinct and strengthened sense of personal identity. This raises some interesting questions for the concept of personal identity and how it can be informed by the content of one's social identity.

  17. Change in Identity Diffusion and Psychopathology in a Specialized Inpatient Treatment for Borderline Personality Disorder.

    Science.gov (United States)

    Sollberger, Daniel; Gremaud-Heitz, Daniela; Riemenschneider, Anke; Agarwalla, Puspa; Benecke, Cord; Schwald, Oliver; Küchenhoff, Joachim; Walter, Marc; Dammann, Gerhard

    2015-01-01

    Patients with borderline personality disorder (BPD) show various psychopathological symptoms and suffer especially from disturbance in their identity. The purpose of the study was to investigate changes-particularly in affective BPD symptoms and identity diffusion-during a structured, disorder-specific inpatient treatment (DST) that combined a psychodynamic transference-focused psychotherapy approach with modules of dialectical behavioural skills training. In a prospective, two-group comparison trial, 44 patients with BPD were assessed with questionnaires addressing identity diffusion and state, as well as trait affective psychopathology, before and after 12 weeks of inpatient treatment. Thirty-two patients received DST, whereas 12 patients were given inpatient treatment-as-usual (TAU). The patients were allocated in a non-random procedure for two groups, in order of admission and availability of treatment options in the DST unit. In the pre-post-comparison, the DST group showed a significant decrease in identity diffusion (p borderline symptomatology and in the personality structure feature of identity diffusion. This highlights the significance of a short-term specific inpatient therapy for BPD. A structured, disorder-specific inpatient treatment of patients diagnosed with borderline personality disorder (BPD) combined a psychodynamic transference-focused psychotherapy treatment approach (focusing on pathological features in personality organization, particularly on non-integrated images of self and others) with modules of dialectical behavioural skills training. This treatment is associated with a decrease in identity diffusion of these patients after 12 weeks of treatment. The treatment is also related to a significant decrease in borderline typical psychopathological symptoms such as depressive symptoms, as well as an improvement in state anger. The outcomes of this structured, disorder-specific inpatient treatment of severely ill BPD patients indicated

  18. The Personal and Professional Selves of Teachers: Stable and Unstable Identities

    OpenAIRE

    Day, C.; Kington, Alison; Stobart, G.; Sammons, P.

    2006-01-01

    In much educational literature it is recognised that the broader social conditions in which teachers live and work, and the personal and professional elements of teachers' lives, experiences, beliefs and practices are integral to one another, and that there are often tensions between these which impact to a greater or lesser extent upon teachers' sense of self or identity. If identity is a key influencing factor on teachers' sense of purpose, self‐efficacy, motivation, commitment, job satisfa...

  19. 'Person' seeks 'Man'. A very quick immersion in, and evaluation of, the philosophical debate on personal identity since Locke

    OpenAIRE

    De Vleeschouwer, Gregory

    2009-01-01

    Traditionally, the question of how a person can be a unity throughout his life was answered by referring to the objective realm: the cartesian soul guaranteed our personal unity. But for Locke, the soul was considered irrelevant to the real question of personal identity, which was: how can I know that I am the same person throughout my life? For Locke that question was not answerable from an objective point of view, but only by a 'person', which for Locke meant as much as 'consciousness' or t...

  20. Assessment of the stability of morphological ECG features and their potential for person verification/identification

    Directory of Open Access Journals (Sweden)

    Matveev Mikhail

    2017-01-01

    Full Text Available This study investigates the potential of a set of ECG morphological features for person verification/identification. The measurements are done over 145 pairs of ECG recordings from healthy subjects, acquired 5 years apart (T1, T2 = T1+5 years. Time, amplitude, area and slope descriptors of the QRS-T pattern are analysed in 4 ECG leads, forming quasi-orthogonal lead system (II&III, V1, V5. The correspondence between feature values in T1 and T2 is verified via factor analysis by principal components extraction method; correlation analysis applied over the measurements in T1 and T2; synthesis of regression equations for prediction of features’ values in T2 based on T1 measurements; and cluster analysis for assessment of the correspondence between measured and predicted feature values. Thus, 11 amplitude descriptors of the QRS complex are highlighted as stable, i.e. keeping their strong correlation (≥0.7 within a certain factor, weak correlation (<0.3 with the features from the remaining factors and presenting high correlation in the two measurement periods that is a sign for their person verification/identification potential. The observed coincidence between feature values measured in T2 and predicted via the designed regression models (r=0.93 suggests about the confidence of person identification via the proposed morphological features.

  1. Personal and cultural identity development in recently immigrated Hispanic adolescents: Links with psychosocial functioning.

    Science.gov (United States)

    Meca, Alan; Sabet, Raha F; Farrelly, Colleen M; Benitez, Cynthia G; Schwartz, Seth J; Gonzales-Backen, Melinda; Lorenzo-Blanco, Elma I; Unger, Jennifer B; Zamboanga, Byron L; Baezconde-Garbanati, Lourdes; Picariello, Simona; Des Rosiers, Sabrina E; Soto, Daniel W; Pattarroyo, Monica; Villamar, Juan A; Lizzi, Karina M

    2017-07-01

    This study examined directionality between personal (i.e., coherence and confusion) and cultural identity (i.e., ethnic and U.S.) as well as their additive effects on psychosocial functioning in a sample of recently immigrated Hispanic adolescents. The sample consisted of 302 recent (identity coherence and both ethnic and U.S. identity. Ethnic and U.S. affirmation/commitment (A/C) positively and indirectly predicted optimism and negatively predicted rule breaking and aggression through coherence. However, confusion predicted lower self-esteem and optimism and higher depressive symptoms, rule breaking, unprotected sex, and cigarette use. Results further indicated significant site differences. In Los Angeles (but not Miami), ethnic A/C also negatively predicted confusion. Given the direct effects of coherence and confusion on nearly every outcome, it may be beneficial for interventions to target personal identity. However, in contexts such as Los Angeles, which has at least some ambivalence toward recently immigrated Hispanic adolescents, it may be more beneficial for interventions to also target cultural identity to reduce confusion and thus promote positive development. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  2. Implementation of an RBF neural network on embedded systems: real-time face tracking and identity verification.

    Science.gov (United States)

    Yang, Fan; Paindavoine, M

    2003-01-01

    This paper describes a real time vision system that allows us to localize faces in video sequences and verify their identity. These processes are image processing techniques based on the radial basis function (RBF) neural network approach. The robustness of this system has been evaluated quantitatively on eight video sequences. We have adapted our model for an application of face recognition using the Olivetti Research Laboratory (ORL), Cambridge, UK, database so as to compare the performance against other systems. We also describe three hardware implementations of our model on embedded systems based on the field programmable gate array (FPGA), zero instruction set computer (ZISC) chips, and digital signal processor (DSP) TMS320C62, respectively. We analyze the algorithm complexity and present results of hardware implementations in terms of the resources used and processing speed. The success rates of face tracking and identity verification are 92% (FPGA), 85% (ZISC), and 98.2% (DSP), respectively. For the three embedded systems, the processing speeds for images size of 288 /spl times/ 352 are 14 images/s, 25 images/s, and 4.8 images/s, respectively.

  3. Big Five Personality Traits as the Predictors of Creative Self-Efficacy and Creative Personal Identity: Does Gender Matter?

    Science.gov (United States)

    Karwowski, Maciej; Lebuda, Izabela; Wisniewska, Ewa; Gralewski, Jacek

    2013-01-01

    The aim of this study was to examine the relation of the Big Five personality factors to two self-concept variables of growing importance in creativity literature: creative self-efficacy (CSE) and creative personal identity (CPI). The analysis, conducted on a large (N = 2674, 49.6% women) and varied-in-age (15-59 years old) nationwide sample of…

  4. Personality traits, interpersonal identity, and relationship stability : Longitudinal linkages in late adolescence and young adulthood

    NARCIS (Netherlands)

    Klimstra, T.A.; Luyckx, K.; Branje, S.T.J.; Teppers, E.; Goossens, L.; Meeus, W.H.J.

    2013-01-01

    Adolescence and young adulthood are characterized by important changes in personality, changes toward a more stable identity, and the establishment of intimate relationships. We examined the role of personality traits in establishing intimate relationships, the interplay between personality traits

  5. The Use of Personal Identity Numbers in Sweden and Denmark

    DEFF Research Database (Denmark)

    Hyltén-Cavallius, Katarina

    2015-01-01

    The paper of Katarina Hyltén-Cavallius focuses on personal identity numbers in Sweden and Denmark. This paper looks into formal and informal structures, which organise society in a host member state and which can make it difficult for a non-national Union citizen to, in practice, access public an...

  6. Personal identity processes and self-esteem : Temporal sequences in high school and college students

    NARCIS (Netherlands)

    Luyckx, K.; Klimstra, T.A.; Duriez, B.; Van Petegem, S.; Beyers, W.; Teppers, E.; Goossens, L.

    2013-01-01

    Personal identity formation constitutes a crucial developmental task during the teens and 20s. Using a recently developed five-dimensional identity model, this cross-sectional study (N = 5834) investigated age trends from ages 14 to 30 for different commitment and exploration processes. As expected,

  7. Is identity per se irrelevant? A contrarian view of self-verification effects

    OpenAIRE

    Gregg, Aiden P.

    2008-01-01

    Self-verification theory (SVT) posits that people who hold negative self-views, such as depressive patients, ironically strive to verify that these self-views are correct, by actively seeking out critical feedback or interaction partners who evaluate them unfavorably. Such verification strivings are allegedly directed towards maximizing subjective perceptions of prediction and control. Nonetheless, verification strivings are also alleged to stabilize maladaptive self-perceptions, and thereby ...

  8. Beliefs About the Causal Structure of the Self-Concept Determine Which Changes Disrupt Personal Identity.

    Science.gov (United States)

    Chen, Stephanie Y; Urminsky, Oleg; Bartels, Daniel M

    2016-10-01

    Personal identity is an important determinant of behavior, yet how people mentally represent their self-concepts and their concepts of other people is not well understood. In the current studies, we examined the age-old question of what makes people who they are. We propose a novel approach to identity that suggests that the answer lies in people's beliefs about how the features of identity (e.g., memories, moral qualities, personality traits) are causally related to each other. We examined the impact of the causal centrality of a feature, a key determinant of the extent to which a feature defines a concept, on judgments of identity continuity. We found support for this approach in three experiments using both measured and manipulated causal centrality. For judgments both of one's self and of others, we found that some features are perceived to be more causally central than others and that changes in such causally central features are believed to be more disruptive to identity.

  9. Owning Up to Negative Ingroup Traits: How Personal Autonomy Promotes the Integration of Group Identity.

    Science.gov (United States)

    Legault, Lisa; Weinstein, Netta; Mitchell, Jahlil; Inzlicht, Michael; Pyke, Kristen; Upal, Afzal

    2017-10-01

    Our experiences, attributes, and behaviors are diverse, inconsistent, and often negative. Consequently, our capacity to assimilate divergent experiences-particularly negative aspects-is important to the development of a unified self. Whereas this process of integration has received attention at the level of personal identity, it has not been assessed at the level of group identity. We examined the mechanisms involved in integrating positive and negative ingroup identities, as well as related outcomes. In three experiments, participants (N = 332) high and low in autonomy identified either positive or negative aspects of their ingroup and then indicated the extent to which they integrated the attribute. Those high in personal autonomy integrated both positive and negative identities, whereas those low in autonomy acknowledged only positive identities. Study 2 showed that, regardless of identity valence, those high in autonomy felt satisfied and close with their group. Conversely, those low in autonomy felt less close and more dissatisfied with their group after reflecting on negative identities. Finally, reflecting on a negative identity reduced prejudice, but only for those high in autonomy. Owning up to negative group traits is facilitated by autonomy and demonstrates benefits for ingroup and intergroup processes. © 2016 Wiley Periodicals, Inc.

  10. Politicization during the 2012 U.S. Presidential Elections: bridging the personal and the political through an identity content approach.

    Science.gov (United States)

    Turner-Zwinkels, Felicity; van Zomeren, Martijn; Postmes, Tom

    2015-03-01

    We investigated U.S. citizens' politicization (i.e., switching from not self-defining to self-defining as an active political party supporter) during the 2012 U.S. Presidential Elections. We used a novel identity content approach to explore qualitative changes in overlap between personal and politicized identity traits. We collected longitudinal data from a community sample of U.S. citizens (N = 760), tracking whether and how personal and politicized identity content developed: two months before (T1), immediately before (T2), and 2 months after (T3) the election. We explored a subsample of participants who met inclusion criteria (n = 115), comparing 87 participants who did not politicize with 28 participants who self-labeled as unpoliticized at T1, but politicized at T2/T3. Results confirmed hypotheses: Only politicizers showed greater integration between their personal and politicized identity content over time; moreover, identity content was a significant positive predictor of politicization and action engagement. We discuss the value of identity content for politicization research. © 2015 by the Society for Personality and Social Psychology, Inc.

  11. Verification steps and personal stories in an instruction manual for seniors: Effects on confidence, motivation, and usability

    NARCIS (Netherlands)

    Loorbach, N.R.; Karreman, Joyce; Steehouder, M.F.

    2013-01-01

    Research problem: The purpose of this study was to investigate the effects of two types of motivational elements—verification steps and personal stories—in an instruction manual for a cell phone targeted at senior users (between 60 and 70 years). Research questions: What are the effects of adding

  12. Self and identity in borderline personality disorder: Agency and mental time travel.

    Science.gov (United States)

    Gold, Natalie; Kyratsous, Michalis

    2017-10-01

    We consider how conceptions of the self and identity from the philosophical literature can help us to understand identity disturbance in borderline personality disorder (BPD). We present 3 philosophical approaches: connectedness, narrative, and agency. We show how these map on to 3 different ways in which the self can be temporally extended. The connectedness approach is dominant in philosophy, and the narrative approach has been used by psychiatry, but we argue that the lesser-known agency approach provides a promising way to theorize some aspects of identity disturbance in BPD. It relates the 2 diagnostic criteria of identity disturbance and disinhibition and is consistent with evidence of memory deficits and altered self-processing in BPD patients. © 2017 The Authors. Journal of Evaluation in Clinical Practice Published by John Wiley & Sons Ltd.

  13. Personal Identity in Japan

    Science.gov (United States)

    Sugimura, Kazumi; Mizokami, Shinichi

    2012-01-01

    This chapter explores characteristics of identity formation among Japanese adolescents and young adults living in a cultural context where individualism has been increasingly emphasized even while maintaining collectivism. We argue that, to develop a sense of identity in Japanese culture, adolescents and young adults carefully consider others'…

  14. Analyzing personalized policies for online biometric verification.

    Science.gov (United States)

    Sadhwani, Apaar; Yang, Yan; Wein, Lawrence M

    2014-01-01

    Motivated by India's nationwide biometric program for social inclusion, we analyze verification (i.e., one-to-one matching) in the case where we possess similarity scores for 10 fingerprints and two irises between a resident's biometric images at enrollment and his biometric images during his first verification. At subsequent verifications, we allow individualized strategies based on these 12 scores: we acquire a subset of the 12 images, get new scores for this subset that quantify the similarity to the corresponding enrollment images, and use the likelihood ratio (i.e., the likelihood of observing these scores if the resident is genuine divided by the corresponding likelihood if the resident is an imposter) to decide whether a resident is genuine or an imposter. We also consider two-stage policies, where additional images are acquired in a second stage if the first-stage results are inconclusive. Using performance data from India's program, we develop a new probabilistic model for the joint distribution of the 12 similarity scores and find near-optimal individualized strategies that minimize the false reject rate (FRR) subject to constraints on the false accept rate (FAR) and mean verification delay for each resident. Our individualized policies achieve the same FRR as a policy that acquires (and optimally fuses) 12 biometrics for each resident, which represents a five (four, respectively) log reduction in FRR relative to fingerprint (iris, respectively) policies previously proposed for India's biometric program. The mean delay is [Formula: see text] sec for our proposed policy, compared to 30 sec for a policy that acquires one fingerprint and 107 sec for a policy that acquires all 12 biometrics. This policy acquires iris scans from 32-41% of residents (depending on the FAR) and acquires an average of 1.3 fingerprints per resident.

  15. A network identity authentication system based on Fingerprint identification technology

    Science.gov (United States)

    Xia, Hong-Bin; Xu, Wen-Bo; Liu, Yuan

    2005-10-01

    Fingerprint verification is one of the most reliable personal identification methods. However, most of the automatic fingerprint identification system (AFIS) is not run via Internet/Intranet environment to meet today's increasing Electric commerce requirements. This paper describes the design and implementation of the archetype system of identity authentication based on fingerprint biometrics technology, and the system can run via Internet environment. And in our system the COM and ASP technology are used to integrate Fingerprint technology with Web database technology, The Fingerprint image preprocessing algorithms are programmed into COM, which deployed on the internet information server. The system's design and structure are proposed, and the key points are discussed. The prototype system of identity authentication based on Fingerprint have been successfully tested and evaluated on our university's distant education applications in an internet environment.

  16. An approach to discussing personal and social identity terminology with patients.

    Science.gov (United States)

    Sloboda, Alexander; Mustafa, Aesha; Schober, Justine

    2018-03-01

    As the United States of America becomes more socially diverse, it is more important now than ever for health care providers to become more aware of their patients' social identities. It is imperative that providers engage with their patients and see how each of them identifies personally in relation to social construction terminology. As with the terminology of human anatomy, there is a vast and diverse vocabulary concerning the anatomy of society, which is also clinically relevant to health care providers. If health care providers take the initiative to discuss how their patients identify, they can understand better how those patients experience the world, and this can significantly affect many facets of their health and health care experience. Giving respect fosters the creation of a strong relationship within which patients can share very personal and intimate information, which in turn allows health care providers the possibility of providing the best healthcare. This discussion will build upon and integrate current academic research and opinion for tangible clinical use while discussing various social and personal identities, including but not limited to race, gender, gender expression, sex, sexual orientation, religion, ethnicity, socioeconomic class, and physical and mental abilities. Clin. Anat. 31:136-139, 2018. © 2017 Wiley Periodicals, Inc. © 2017 Wiley Periodicals, Inc.

  17. Rorschach Assessment of Two Distinctive Personality States of a Person With Dissociative Identity Disorder.

    Science.gov (United States)

    Hartmann, Ellen; Benum, Kirsten

    2017-12-13

    This case study used test data from a patient with Dissociative Identity Disorder (DID; American Psychiatric Association, 2013 ) to illustrate how two main personality states of the patient ("Ann" and "Ben") seemed to function. The Rorschach Performance Assessment System (R-PAS; Meyer, Viglione, Mihura, Erard, & Erdberg, 2011 ) and the Inventory of Interpersonal Problems-Circumplex (IIP-64; Horowitz, Alden, Wiggins, & Pincus, 2000 ), administered to Ann and Ben in separate settings, exposed two diverse R-PAS and IIP-64 profiles. Ann's R-PAS profile suggested an intellectualized style of information processing with few indications of psychological problems. Ben's profile indicated severe perceptual, cognitive, and interpersonal difficulties combined with suspicion and anxiety. Ann's IIP-64 profile suggested minor interpersonal problems, whereas Ben's indicated serious relational difficulties. The findings were discussed in relation to the theory of trauma-related structural dissociation of the personality (van der Hart, Nijenhuis, & Steele, 2006 ), which implies an enduring split in the organization of the personality with more or less separate entities with their own sense of self, perception of the world, and ways of organizing emotional, cognitive, and social functions. The DID personality structure is seen as a defense strategy and as a pathway in the personality development producing serious psychological pain and symptoms.

  18. Awareness of identity alteration and diagnostic preference between borderline personality disorder and dissociative disorders.

    Science.gov (United States)

    Sar, Vedat; Alioğlu, Firdevs; Akyuz, Gamze; Tayakısı, Emre; Öğülmüş, Ezgi F; Sönmez, Doğuş

    2017-01-01

    This study inquires into identity alteration among college students and its relationship to borderline personality disorder (BPD) and/or dissociative disorders (DDs). Steinberg Identity Alteration Questionnaire (SIAQ), Childhood Trauma Questionnaire (CTQ), and self-report screening tool of the BPD section of the Structured Clinical Interview for DSM-IV (SCID-BPD) were administered to 1301 college students. Participants who fit the diagnostic criteria of BPD (n = 80) according to the clinician-administered SCID-BPD and 111 non-BPD controls were evaluated using the Structured Clinical Interview for DSM-IV DDs (SCID-D) by two psychiatrists blind to the group membership and scale scores. Test-retest evaluations and internal consistency analyses suggested that SIAQ was a reliable instrument. Of the participants, 11.3% reported a SIAQ score 25 or above alongside some impairment. SIAQ scores differentiated participants who fit the diagnostic criteria for a DD from those who did not. While self-report identity alteration was correlated with all childhood trauma types, clinician-assessed identity alteration was correlated with childhood sexual abuse only. Those who fit criteria for both disorders had the highest identity alteration scores in self-report and clinician-assessment. Although both syndromes had significant effect on self-report identity alteration total scores, in contrast to DD, BPD did not have an effect on the clinician-administered evaluation. An impression of personality disorder rather than a DD may seem more likely when identity alteration remains subtle in clinical assessment, notwithstanding its presence in self-report. Lack of recognition of identity alteration may lead to overdiagnosis of BPD among individuals who have a DD.

  19. Personality Traits and Educational Identity Formation in Late Adolescents: Longitudinal Associations and Academic Progress

    Science.gov (United States)

    Klimstra, Theo A.; Luyckx, Koen; Germeijs, Veerle; Meeus, Wim H. J.; Goossens, Luc

    2012-01-01

    Changes in personality traits in late adolescence and young adulthood are believed to co-occur with changes in identity, but little research is available that supports this hypothesis. The present study addressed this relatively understudied area of research by examining longitudinal associations of Big Five personality traits (i.e., Neuroticism,…

  20. Self and identity in women with symptoms of borderline personality: A qualitative study

    Directory of Open Access Journals (Sweden)

    Gillian Agnew

    2016-03-01

    Full Text Available Identity disturbance has been suggested to be a core feature of borderline personality disorder (BPD. However, there is little known about the identity of individuals with symptoms of BPD from the participant's perspective. This study availed of in-depth lightly structured life story interviews with five female participants. Thematic analysis was utilized to derive three themes of identity: connection, distance between us, and hurt and healing. Results provided support for multiple and flexible conceptualizations of identity in comparison to the idea of a unitary self/identity. Results also suggested that participants were able to establish differing connections to others ranging from disconnection to intimacy and care. Participants reported that their identities were impacted upon by historical and current family/relationship dysfunction, but life stories also illustrated the positive impact of healing relationship experiences. Findings provide support for psychological theories that consider a multiple and relational self/identity and the empowerment of healthy aspects of the self in BPD recovery. Studies that assess the association between insight and change may further our knowledge into this complex population.

  1. "Irreplaceable": Exploring Identity and Relationships through the Discussion of Invaluable Personal Objects

    Science.gov (United States)

    Scharp, Kristina M.; Canfield, Clair

    2017-01-01

    Courses: Interpersonal Communication, Family Communication, Relational Communication. Objectives: Students reflect on and discuss how personal objects are connected to their identity and relationships with others. This activity illustrates the ways course concepts such as relational metaphors, stories, rules, rituals, and other patterns of…

  2. On the Effectiveness of Social Norms Intervention in College Drinking: The Roles of Identity Verification and Peer Influence.

    Science.gov (United States)

    Fitzpatrick, Ben G; Martinez, Jason; Polidan, Elizabeth; Angelis, Ekaterini

    2016-01-01

    The application of social norms theory in the study of college drinking centers on the ideas that incorrect perceptions of drinking norms encourage problematic drinking behavior and that correcting misperceptions can mitigate problems. The design and execution of social norms interventions can be improved with a deeper understanding of causal mechanisms connecting misperception to drinking behavior. We develop an agent-based computational simulation that uses identity control theory and peer influence (PI) to model interactions that affect drinking. Using data from the College Alcohol Survey and Social Norms Marketing Research Project, we inform model parameters for agent drinking identities and perceptions. We simulate social norms campaigns that reach progressively larger fractions of the student population, and we consider the strength of the campaign in terms of changing student perception and resulting behavior. We observe a general reduction in heavy episodic drinking (HED) as students are affected by the intervention. As campaigns reached larger fractions of students, the reduction rate diminishes, in some cases actually making a slight reverse. The way in which students "take the message to heart" can have a significant impact as well: The psychological factors involved in identity control and PI have both positive and negative effects on HED rates. With whom agents associate at drinking events also impacts drinking behavior and intervention effectiveness. Simulations suggest that reducing misperception can reduce HED. When agents adhere strongly to identity verification and when misperceptions affect identity appraisals, social norms campaigns can bring about large reductions. PI, self-monitoring, and socializing with like-drinking peers appear to moderate the effect. Copyright © 2015 by the Research Society on Alcoholism.

  3. CORPORATE IDENTITY DAN PERSONALITY BANK SYARIAH DI SURAT KABAR NASIONAL (Tekstual Analisis Konstruksi Meelalui Publikasi Perusahaan

    Directory of Open Access Journals (Sweden)

    Juwono Tri Atmodjo

    2015-05-01

    Full Text Available Corporate identity and personality manner that allows employers to formulate and differentiated from other companies (regular bank. Identity and personality can be realized by the company shows the vision and mission of the company, the company philosophy, corporate culture. The study is to assess the identity and personality were constructed through advetorian and Newspaper coverage related to the identity and personality of Islamic banks. Qualitative analysis with textual analysis strategy for observing any publication of the contents of the message, type, appearance, construction built with various combinations of text and images and the meaning behind it seems. Textual research results show that the identity and personality banks Islamic banks, care for the young entrepreneurs of the campus, BNI sharia requires political support, regulatory support, is an ISO 9001: 2008 as the bank has a good quality management. Construction as a bank with a foundation of Sharia as the implementation of Islamic teachings are constructed differently degan regular bank to provide the product name, the expression of interest, section or division, spirit or values and norms derived from the teachings of Islam. Ordinances of service, petuhas services, ornaments firm up souvenirs derived from the values of Islam. Cultural references conveyed Islamic banks oriented to the culture of Islamic countries that appear on the financial system based on gold. Identitas perusahaan dan personaliti cara yang memungkinkan perusahaan menyusun dan dibedakan dari perusahaan lain (reguler bank. Indentitas dan personaliti perusahaan dapat diwujudkan dengan menunjukkan visi dan misi perusahaan, filosofi perusahaan, budaya perusahaan. Studi ini untuk menilai identitas dan personaliti yang dikonstruksikan melalui advetorian dan liputan Surat Kabar berkaitan dengan identitas dan personaliti bank syariah. Analisis kualitatif dengan strategi analisis tektual untuk mengobservasi berbagai

  4. Personal identity processes from adolescence through the late 20s : Age trends, functionality, and depressive symptoms

    NARCIS (Netherlands)

    Luyckx, K.; Klimstra, T.A.; Duriez, B.; van Petegem, S.; Beyers, W.

    2013-01-01

    Personal identity formation constitutes a crucial developmental task during the teens and 20s. Using a recently developed five-dimensional identity model, this cross-sectional study (N = 5834) investigated age trends from ages 14 to 30 for different commitment and exploration processes. As expected,

  5. Relationships between Personal and Collective Place Identity and Well-Being in Mountain Communities

    OpenAIRE

    Knez, Igor; Eliasson, Ingegärd

    2017-01-01

    The aim was to investigate the relationships between landscape-related personal and collective identity and well-being of residents living in a Swedish mountain county (N = 850). It was shown that their most valued mountain activities were viewing and experiencing nature and landscape, outdoor recreation, rest and leisure, and socializing with friends/family. Qualitative analyses showed that the most valued aspects of the sites were landscape and outdoor restoration for personal favorite site...

  6. Exploring medical identity theft.

    Science.gov (United States)

    Mancilla, Desla; Moczygemba, Jackie

    2009-09-16

    The crime of medical identity theft is a growing concern in healthcare institutions. A mixed-method study design including a two-stage electronic survey, telephone survey follow-up, and on-site observations was used to evaluate current practices in admitting and registration departments to reduce the occurrence of medical identity theft. Survey participants were chief compliance officers in acute healthcare organizations and members of the Health Care Compliance Association. Study results indicate variance in whether or how patient identity is confirmed in healthcare settings. The findings of this study suggest that information systems need to be designed for more efficient identity management. Admitting and registration staff must be trained, and compliance with medical identity theft policies and procedures must be monitored. Finally, biometric identity management solutions should be considered for stronger patient identification verification.

  7. Human identity versus gender identity: The perception of sexual addiction among Iranian women.

    Science.gov (United States)

    Moshtagh, Mozhgan; Mirlashari, Jila; Rafiey, Hassan; Azin, Ali; Farnam, Robert

    2017-07-01

    This qualitative study was conducted to explore the images of personal identity from the perspective of women with sexual addiction. The data required for the study were collected through 31 in-depth interviews. Sensing a threat to personal identity, dissatisfaction with gender identity, dissociation with the continuum of identity, and identity reconstruction in response to threat were four of the experiences that were common among women with sexual addiction. Painful emotional experiences appear to have created a sense of gender and sexual conflict or weakness in these women and thus threatened their personal identity and led to their sexual addiction.

  8. 17 CFR 229.1003 - (Item 1003) Identity and background of filing person.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false (Item 1003) Identity and background of filing person. 229.1003 Section 229.1003 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD INSTRUCTIONS FOR FILING FORMS UNDER SECURITIES ACT OF 1933, SECURITIES EXCHANGE ACT OF 1934 AND ENERGY POLICY AND...

  9. Longitudinal Relations between Personality Traits and Aspects of Identity Formation during Adolescence

    Science.gov (United States)

    Hill, Patrick L.; Allemand, Mathias; Grob, Sabine Zehnder; Peng, Aristide; Morgenthaler, Christoph; Kappler, Christoph

    2013-01-01

    The current study focused on three aspects of identity development relevant to the adolescent years: being an authentic person, perceiving control over and consistency in one's environment, and having consistent expectations from close others. In a two-wave study of adolescents (n = 750), we examined how these aspects change over the course of a…

  10. Influences of gender identity on children's maltreatment of gender-nonconforming peers: a person × target analysis of aggression.

    Science.gov (United States)

    Pauletti, Rachel E; Cooper, Patrick J; Perry, David G

    2014-05-01

    We investigated whether gender identity influences preadolescents' tendency to single out gender-atypical peers for abuse. Data were gathered from 195 boys and girls (M age = 10.1 years) in the fall and spring of a school year. Children self-reported multiple dimensions of gender identity (intergroup bias, felt pressure for gender differentiation, felt gender typicality, gender contentedness); peers assessed each other's social behavior (gender nonconformity, aggression toward each classmate). Using multilevel modeling, we examined how children's attacks on gender-nonconforming peers (relative to their attacks on other peers) changed over the school year depending on their gender identity. There was modest support for the hypothesis that overconfident, arrogant gender identity promotes abuse of gender-atypical peers but considerable support for the hypothesis that insecure, self-questioning gender identity fosters this tendency. Implications for issues central to contemporary personality theory (e.g., Person × Situation interaction) are discussed. New and somewhat surprising information about the cognitive and behavioral characteristics of gender-nonconforming preadolescents is provided.

  11. Unpacking Personal Identities for Teaching Mathematics within the Context of Prospective Teacher Education

    Science.gov (United States)

    Hodges, Thomas E.; Hodge, Lynn Liao

    2017-01-01

    This article explores the personal identities of two prospective elementary teachers as they progressed from mathematics methods coursework into their capstone student teaching semester. Results indicate that both prospective teachers perceived contrasting obligations of effective mathematics teaching in the teacher education and student teaching…

  12. Mentalizing and interpersonal problems in borderline personality disorder: The mediating role of identity diffusion.

    Science.gov (United States)

    De Meulemeester, Celine; Lowyck, Benedicte; Vermote, Rudi; Verhaest, Yannic; Luyten, Patrick

    2017-12-01

    Individuals with borderline personality disorder (BPD) are characterized by problems in interpersonal functioning and their long-term social integration often remains problematic. Extant theories have linked identity diffusion to many of the interpersonal problems characteristic of BPD patients. Recent theoretical accounts have suggested that identity diffusion results from problems with mentalizing or reflective functioning, that is, the capacity to understand oneself and others in terms of intentional mental states. In this study we tested these assumptions, i.e., whether identity diffusion plays a mediating role in the relationship between mentalizing difficulties and interpersonal problems, in a sample of 167 BPD patients. Highly significant correlations were found between mentalizing impairments, identity diffusion and interpersonal problems. Mediation analyses showed that identity diffusion fully mediated the relationship between mentalizing difficulties and interpersonal problems. This study provides preliminary evidence that impairments in mentalizing are related to identity diffusion, which in turn is related to interpersonal problems in BPD. Further longitudinal research is needed to further substantiate these conclusions. Copyright © 2017 Elsevier B.V. All rights reserved.

  13. Telling the Tale and Living Well: Adolescent Narrative Identity, Personality Traits, and Well-Being Across Cultures.

    Science.gov (United States)

    Reese, Elaine; Myftari, Ella; McAnally, Helena M; Chen, Yan; Neha, Tia; Wang, Qi; Jack, Fiona; Robertson, Sarah-Jane

    2017-03-01

    This study explored links between narrative identity, personality traits, and well-being for 263 adolescents (age 12-21) from three New Zealand cultures: Māori, Chinese, and European. Turning-point narratives were assessed for autobiographical reasoning (causal coherence), local thematic coherence, emotional expressivity, and topic. Across cultures, older adolescents with higher causal coherence reported better well-being. Younger adolescents with higher causal coherence instead reported poorer well-being. Personal development topics were positively linked to well-being for New Zealand European adolescents only, and thematic coherence was positively linked to well-being for Māori adolescents only. Negative expressivity, neuroticism, conscientiousness, and openness were also linked to well-being. Implications of these cultural similarities and differences are considered for theories of narrative identity, personality, and adolescent well-being. © 2016 The Authors. Child Development © 2016 Society for Research in Child Development, Inc.

  14. Fingerprint verification prediction model in hand dermatitis.

    Science.gov (United States)

    Lee, Chew K; Chang, Choong C; Johor, Asmah; Othman, Puwira; Baba, Roshidah

    2015-07-01

    Hand dermatitis associated fingerprint changes is a significant problem and affects fingerprint verification processes. This study was done to develop a clinically useful prediction model for fingerprint verification in patients with hand dermatitis. A case-control study involving 100 patients with hand dermatitis. All patients verified their thumbprints against their identity card. Registered fingerprints were randomized into a model derivation and model validation group. Predictive model was derived using multiple logistic regression. Validation was done using the goodness-of-fit test. The fingerprint verification prediction model consists of a major criterion (fingerprint dystrophy area of ≥ 25%) and two minor criteria (long horizontal lines and long vertical lines). The presence of the major criterion predicts it will almost always fail verification, while presence of both minor criteria and presence of one minor criterion predict high and low risk of fingerprint verification failure, respectively. When none of the criteria are met, the fingerprint almost always passes the verification. The area under the receiver operating characteristic curve was 0.937, and the goodness-of-fit test showed agreement between the observed and expected number (P = 0.26). The derived fingerprint verification failure prediction model is validated and highly discriminatory in predicting risk of fingerprint verification in patients with hand dermatitis. © 2014 The International Society of Dermatology.

  15. 31 CFR 363.14 - How will you verify my identity?

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false How will you verify my identity? 363... you verify my identity? (a) Individual. When you establish an account, we may use a verification service to verify your identity using information you provide about yourself on the online application. At...

  16. Evaluation of Face Detection Algorithms for the Bank Client Identity Verification

    Directory of Open Access Journals (Sweden)

    Szczodrak Maciej

    2017-06-01

    Full Text Available Results of investigation of face detection algorithms efficiency in the banking client visual verification system are presented. The video recordings were made in real conditions met in three bank operating outlets employing a miniature industrial USB camera. The aim of the experiments was to check the practical usability of the face detection method in the biometric bank client verification system. The main assumption was to provide a simplified as much as possible user interaction with the application. Applied algorithms for face detection are described and achieved results of face detection in the real bank environment conditions are presented. Practical limitations of the application based on encountered problems are discussed.

  17. Ethnic Identity and Personal Well-Being of People of Color: A Meta-Analysis

    Science.gov (United States)

    Smith, Timothy B.; Silva, Lynda

    2011-01-01

    This article summarizes research examining the relationship between the constructs of ethnic identity and personal well-being among people of color in North America. Data from 184 studies analyzed with random effects models yielded an omnibus effect size of r = 0.17, suggesting a modest relationship between the 2 constructs. The relationship was…

  18. Automated personal identification: a new technique for controlling access to nuclear materials and facilities

    International Nuclear Information System (INIS)

    Eccles, D.R.

    1975-01-01

    Special nuclear materials must be protected against the threat of diversion or theft, and nuclear facilities against the threat of industrial sabotage. Implicit in this protection is the means of controlling access to protected areas, material access areas, and vital areas. With the advent of automated personal identification technology, the processes of access control can be automated to yield both higher security and reduced costs. This paper first surveys the conventional methods of access control; next, automated personal identification concepts are presented and various systems approaches are highlighted; finally, Calspan's FINGERSCAN /sub TM/ system for identity verification is described

  19. Putting the "we" into teamwork: effects of priming personal or social identity on flight attendants' perceptions of teamwork and communication.

    Science.gov (United States)

    Ford, Jane; O'Hare, David; Henderson, Robert

    2013-06-01

    The study was designed to investigate the effectiveness of a manipulation derived from social categorization and social identity theory to promote greater cabin crew willingness to engage in intergroup communication and teamwork in airline operations. Failures of communication and teamwork between airline crew have been implicated in a number of airline crashes. Flight attendants based domestically (n = 254) or overseas (n = 230) received a manipulation designed to prime either their social identity or personal identity and then read a brief outline of an in-flight event before completing a teamwork questionnaire. Flight attendants who received a social identity prime indicated increased willingness to engage in coordinated team action compared with those who received a personal identity prime. Priming social identity can enhance attitudes toward teamwork and communication, potentially leading to increased willingness to engage in intergroup cooperation. Social categorization and social identity theories can be used to inform joint training program development for flight attendants and pilots to create increased willingness for group members to participate in effective communication and teamwork behaviors.

  20. Dynamic Personal Identity and the Dynamic Identity Grid: How Theory and Concept Can Transform Information into Knowledge and Secure the American Homeland

    Science.gov (United States)

    2008-09-01

    80 Figure 12. Dynamic Identity Grid Strategy Canvas ..........................................................81 Figure 13. Hurdles to...GIG Global Information Grid HSPD Homeland Security Presidential Directive IAFIS Integrated Automated Fingerprint Identification System IP...recognizing a person based on a physiological or behavioral characteristic. Biometric features that can be measured include: facial, fingerprint , hand

  1. Verification of Many-Qubit States

    Directory of Open Access Journals (Sweden)

    Yuki Takeuchi

    2018-06-01

    Full Text Available Verification is a task to check whether a given quantum state is close to an ideal state or not. In this paper, we show that a variety of many-qubit quantum states can be verified with only sequential single-qubit measurements of Pauli operators. First, we introduce a protocol for verifying ground states of Hamiltonians. We next explain how to verify quantum states generated by a certain class of quantum circuits. We finally propose an adaptive test of stabilizers that enables the verification of all polynomial-time-generated hypergraph states, which include output states of the Bremner-Montanaro-Shepherd-type instantaneous quantum polynomial time (IQP circuits. Importantly, we do not make any assumption that the identically and independently distributed copies of the same states are given: Our protocols work even if some highly complicated entanglement is created among copies in any artificial way. As applications, we consider the verification of the quantum computational supremacy demonstration with IQP models, and verifiable blind quantum computing.

  2. Is identity per se irrelevant? A contrarian view of self-verification effects.

    Science.gov (United States)

    Gregg, Aiden P

    2009-01-01

    Self-verification theory (SVT) posits that people who hold negative self-views, such as depressive patients, ironically strive to verify that these self-views are correct, by actively seeking out critical feedback or interaction partners who evaluate them unfavorably. Such verification strivings are allegedly directed towards maximizing subjective perceptions of prediction and control. Nonetheless, verification strivings are also alleged to stabilize maladaptive self-perceptions, and thereby hindering therapeutic recovery. Despite the widespread acceptance of SVT, I contend that the evidence for it is weak and circumstantial. In particular, I contend that that most or all major findings cited in support of SVT can be more economically explained in terms of raison oblige theory (ROT). ROT posits that people with negative self-views solicit critical feedback, not because they want it, but because they their self-view inclines them regard it as probative, a necessary condition for considering it worth obtaining. Relevant findings are reviewed and reinterpreted with an emphasis on depression, and some new empirical data reported. (c) 2008 Wiley-Liss, Inc.

  3. Identity and Conflict: Personality, Sociality and Culturality

    Directory of Open Access Journals (Sweden)

    Rik Pinxten

    1997-05-01

    Full Text Available We presented a model which describes the field of questions on identity as a field of dynamics. It is structured by means of particular, temporal configurations of identity through time and space. The theory of dynamic systems provides us with precise models for the representation of forms of identity, or of their evolution towards types of so-called chaos, given certain conditions. The model allows us to work in a comparative perspective, which is a sure advantage in conflict analysis. The complexity of identity phenomena is captured covering individual, group and community dynamics of identity.

  4. Mindfulness and personal identity in the Western cultural context: A plea for greater cosmopolitanism.

    Science.gov (United States)

    Panaïoti, Antoine

    2015-08-01

    In the psychological sciences, mindfulness practices are increasingly being used, studied, and theorized, but their indigenous theoretical foundations in Buddhist accounts of the dynamics and psychology of personal identity tend to be overlooked. This situation is mirrored in the discipline of philosophy: here, Buddhist views on personal identity are beginning to draw attention, but almost invariably in a way which entirely blanks out the role of mindfulness practices in cultivating Buddhist insights on selfhood. The aggregate result is a failure, in the West, to reflect upon and seriously consider Buddhist theory and Buddhist practice in an integrated, holistic fashion. In its effort to overcome the compartmentalization of Buddhist theory (in philosophy) versus Buddhist practice (in psychology) and to embrace the challenges this might pose to fundamental Western beliefs about the self, this paper is intended both as a plea for and an exercise in greater, more venturesome cosmopolitanism. © The Author(s) 2015.

  5. Identity-related autobiographical memories and cultural life scripts in patients with Borderline Personality Disorder.

    Science.gov (United States)

    Jørgensen, Carsten René; Berntsen, Dorthe; Bech, Morten; Kjølbye, Morten; Bennedsen, Birgit E; Ramsgaard, Stine B

    2012-06-01

    Disturbed identity is one of the defining characteristics of Borderline Personality Disorder manifested in a broad spectrum of dysfunctions related to the self, including disturbances in meaning-generating self-narratives. Autobiographical memories are memories of personal events that provide crucial building-blocks in our construction of a life-story, self-concept, and a meaning-generating narrative identity. The cultural life script represents culturally shared expectations as to the order and timing of life events in a prototypical life course within a given culture. It is used to organize one's autobiographical memories. Here, 17 BPD-patients, 14 OCD-patients, and 23 non-clinical controls generated three important autobiographical memories and their conceptions of the cultural life script. BPD-patients reported substantially more negative memories, fewer of their memories were of prototypical life script events, their memory narratives were less coherent and more disoriented, and the overall typicality of their life scripts was lower as compared with the other two groups. Copyright © 2012 Elsevier Inc. All rights reserved.

  6. Rebuilding lives and identities: The role of place in recovery among persons with complex needs.

    Science.gov (United States)

    Tran Smith, Bikki; Padgett, Deborah K; Choy-Brown, Mimi; Henwood, Benjamin F

    2015-05-01

    Photo-elicitation interviews (PEIs) were conducted to explore the role of place in recovery - specifically, narrative identity reconstruction - among persons with complex needs. PEIs with 17 formerly homeless adults with co-occurring disorders in New York City produced 243 photos. Content analysis of photos revealed three categories - apartment, neighborhood and people. Two narrative themes - having my own and civic identity - were mapped onto the apartment and neighborhood categories, respectively. Three additional cross-categorical narrative themes were identified: (re)negotiating relationships and boundaries, moving beyond old identities and future possibilities. Housing was central across themes. Understanding of recovery is enhanced when viewed through participant-controlled visual methods. Copyright © 2015 Elsevier Ltd. All rights reserved.

  7. Personal and social facets of job identity : A person-centered approach

    NARCIS (Netherlands)

    Crocetti, E.; Avanzi, L.; Hawk, S.T.; Fraccaroli, F.; Meeus, W.H.J.

    2014-01-01

    Purpose The purpose of this study was to examine ego-identity (Erikson, Psychol Issues 1:1–171, 1959; Identity, youth and crisis, Norton, New York, 1968; Marcia, J Pers Soc Psychol 3:551–558, 1966) and social identity (Tajfel and Turner, In: Austin WG, Worchel S (Eds.) The social psychology of

  8. Is flow verification necessary

    International Nuclear Information System (INIS)

    Beetle, T.M.

    1986-01-01

    Safeguards test statistics are used in an attempt to detect diversion of special nuclear material. Under assumptions concerning possible manipulation (falsification) of safeguards accounting data, the effects on the statistics due to diversion and data manipulation are described algebraically. A comprehensive set of statistics that is capable of detecting any diversion of material is defined in terms of the algebraic properties of the effects. When the assumptions exclude collusion between persons in two material balance areas, then three sets of accounting statistics are shown to be comprehensive. Two of the sets contain widely known accountancy statistics. One of them does not require physical flow verification - comparisons of operator and inspector data for receipts and shipments. The third set contains a single statistic which does not require physical flow verification. In addition to not requiring technically difficult and expensive flow verification, this single statistic has several advantages over other comprehensive sets of statistics. This algebraic approach as an alternative to flow verification for safeguards accountancy is discussed in this paper

  9. Masculinity and Femininity: Essential to the Identity of the Human Person

    Directory of Open Access Journals (Sweden)

    O'Donnell Nancy

    2014-07-01

    Full Text Available The title of this congress begins with the word “identity”. It also includes the word “reciprocity,” which indicates a form of relationship and finally, “gift of self”. This would lead us to conclude that the identity of the human person has something to do with reciprocity and that reciprocity involves giving of oneself to others. This talk will attempt to shed light on how the concept of gender might in some way be incorporated into these three concepts.

  10. A Secure Dynamic Identity and Chaotic Maps Based User Authentication and Key Agreement Scheme for e-Healthcare Systems.

    Science.gov (United States)

    Li, Chun-Ta; Lee, Cheng-Chi; Weng, Chi-Yao; Chen, Song-Jhih

    2016-11-01

    Secure user authentication schemes in many e-Healthcare applications try to prevent unauthorized users from intruding the e-Healthcare systems and a remote user and a medical server can establish session keys for securing the subsequent communications. However, many schemes does not mask the users' identity information while constructing a login session between two or more parties, even though personal privacy of users is a significant topic for e-Healthcare systems. In order to preserve personal privacy of users, dynamic identity based authentication schemes are hiding user's real identity during the process of network communications and only the medical server knows login user's identity. In addition, most of the existing dynamic identity based authentication schemes ignore the inputs verification during login condition and this flaw may subject to inefficiency in the case of incorrect inputs in the login phase. Regarding the use of secure authentication mechanisms for e-Healthcare systems, this paper presents a new dynamic identity and chaotic maps based authentication scheme and a secure data protection approach is employed in every session to prevent illegal intrusions. The proposed scheme can not only quickly detect incorrect inputs during the phases of login and password change but also can invalidate the future use of a lost/stolen smart card. Compared the functionality and efficiency with other authentication schemes recently, the proposed scheme satisfies desirable security attributes and maintains acceptable efficiency in terms of the computational overheads for e-Healthcare systems.

  11. 78 FR 73868 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-DHS...

    Science.gov (United States)

    2013-12-09

    ... security screening and identity verification of individuals, including identification media and identifying... undergoing screening of their person (including identity verification) or property; individuals against whom... addresses, phone numbers); Social Security Number, Fingerprints or other biometric identifiers; Photographs...

  12. To thine own self be true? Clarifying the effects of identity discrepancies on psychological distress and emotions.

    Science.gov (United States)

    Kalkhoff, Will; Marcussen, Kristen; Serpe, Richard T

    2016-07-01

    After many years of research across disciplines, it remains unclear whether people are more motivated to seek appraisals that accurately match self-views (self-verification) or are as favorable as possible (self-enhancement). Within sociology, mixed findings in identity theory have fueled the debate. A problem here is that a commonly employed statistical approach does not take into account the direction of a discrepancy between how we see ourselves and how we think others see us in terms of a given identity, yet doing so is critical for determining which self-motive is at play. We offer a test of three competing models of identity processes, including a new "mixed motivations" model where self-verification and self-enhancement operate simultaneously. We compare the models using the conventional statistical approach versus response surface analysis. The latter method allows us to determine whether identity discrepancies involving over-evaluation are as distressing as those involving under-evaluation. We use nationally representative data and compare results across four different identities and multiple outcomes. The two statistical approaches lead to the same conclusions more often than not and mostly support identity theory and its assumption that people seek self-verification. However, response surface tests reveal patterns that are mistaken as evidence of self-verification by conventional procedures, especially for the spouse identity. We also find that identity discrepancies have different effects on distress and self-conscious emotions (guilt and shame). Our findings have implications not only for research on self and identity across disciplines, but also for many other areas of research that incorporate these concepts and/or use difference scores as explanatory variables. Copyright © 2016 Elsevier Inc. All rights reserved.

  13. Biometric Technologies and Verification Systems

    CERN Document Server

    Vacca, John R

    2007-01-01

    Biometric Technologies and Verification Systems is organized into nine parts composed of 30 chapters, including an extensive glossary of biometric terms and acronyms. It discusses the current state-of-the-art in biometric verification/authentication, identification and system design principles. It also provides a step-by-step discussion of how biometrics works; how biometric data in human beings can be collected and analyzed in a number of ways; how biometrics are currently being used as a method of personal identification in which people are recognized by their own unique corporal or behavior

  14. Philosophy teaching and the constitution of personal identity: Formation, autonomy and gender

    Directory of Open Access Journals (Sweden)

    Tânia Aparecida Kuhnen

    2017-12-01

    Full Text Available This article investigates the contribution of philosophy in basic education classes for the formation of the students as individuals, helping them in the process of identity construction. Philosophy teaching in high school contributes to constituteself-aware individuals in space and time. It helps them with the ability to reflect critically on the social context in which they are inserted and on the expectations in terms of fixed gender roles imposed from the outside in. In this sense, the particularity of philosophical knowledge, as critical thinking through the creation of concepts, entails a more authentic and autonomous individual formation. This also justifies the presence of philosophy as a subject in high school. The personal gender experience is central in the formation of identity. So it is important to discuss this topic with the students. Due to that, we advocate the importance of bringing gender issues to philosophy classes. It refers a real experience that can be problematized in order to deconstruct naturalized gender performativity and think about the inequalities that pervade this social category. Thus, students can constitute a more conscious individual identity, critical to social position that their genders occupy in the social environment.

  15. Differential contributions of the anterior temporal and medial temporal lobe to the retrieval of memory for person identity information.

    Science.gov (United States)

    Tsukiura, Takashi; Suzuki, Chisato; Shigemune, Yayoi; Mochizuki-Kawai, Hiroko

    2008-12-01

    Although previous studies have suggested the importance of the bilateral anterior temporal (ATL) and medial temporal lobes (MTL) in the retrieval of person identity information, there is little evidence concerning how these regions differentially contribute to the process. Here we investigated this question using functional magnetic resonance imaging (fMRI). Before scanning, subjects learned associations among faces (F), names (N), and job titles (as a form of person-related semantics, S). During retrieval with fMRI, subjects were presented with previously learned and new S stimuli, and judged whether the stimuli were old or new. Successful retrieval (H) trials were divided into three conditions: retrieval of S and associated F and N (HSFN); retrieval of S and associated F (HSF); and retrieval of S only (HS). The left ATL was significantly activated in HSFN, compared to HSF or HS, whereas the right ATL and MTL were significantly activated in HSFN and HSF relative to HS. In addition, activity in bilateral ATL was significantly correlated with reaction time for HSFN, whereas we found no significant correlation between activity in the right MTL and reaction time in any condition. The present findings suggest that the left ATL may mediate associations between names and person-related semantic information, whereas the right ATL mediates the association between faces and person-related semantic information in memory for person identity information. In addition, activation of the right MTL region implies that this area may contribute to a more general relational processing of associative components, including memory for person identity information. Copyright 2007 Wiley-Liss, Inc.

  16. Comparing the symptoms and mechanisms of "dissociation" in dissociative identity disorder and borderline personality disorder.

    Science.gov (United States)

    Laddis, Andreas; Dell, Paul F; Korzekwa, Marilyn

    2017-01-01

    A total of 75 patients were diagnosed with the Structured Clinical Interview for DSM-IV Dissociative Disorders-Revised as having dissociative identity disorder (DID), and 100 patients were diagnosed with the Structured Interview for DSM-IV Personality as having borderline personality disorder (BPD). Both groups were administered the Multidimensional Inventory of Dissociation (MID). DID patients had significantly higher MID scores than BPD patients, different distributions of MID scores, and different MID subscale profiles in 3 ranges of MID scores (0-15, 15-30, 30-45). The core MID symptoms-exhibited at all ranges of MID scores-for DID patients (the presence of alters, identity confusion, and memory problems) and BPD patients (flashbacks, identity confusion, and memory problems) were ostensibly similar but were considered to be mostly produced by different underlying processes. Multiple regression analyses showed that the core MID symptoms of DID patients had different predictors than did the core MID symptoms of BPD patients. Alter identities seemed to generate most-but not all-dissociative phenomena in DID patients, whereas only the 24% highest scoring BPD patients (MID ≥45) seemed to manifest alter-driven dissociative experiences. Most BPD dissociative experiences appeared to be due to 5 other mechanisms: (a) BPD-specific, stress-driven, rapid shifts of self-state; (b and c) nondefensive disruptions of the framework of perceptual organization with or without an accompanying BPD-specific, dissociation-like disintegration of affective/neurocognitive functioning; (d) a defensive distancing or detachment from distress (i.e., simple depersonalization); and (e) Allen, Console, and Lewis's (1999) severe absorptive detachment.

  17. Inter-identity autobiographical amnesia in patients with dissociative identity disorder

    OpenAIRE

    Huntjens, Rafaele JC; Verschuere, Bruno; McNally, Richard J

    2012-01-01

    Background: A major symptom of Dissociative Identity Disorder (DID; formerly Multiple Personality Disorder) is dissociative amnesia, the inability to recall important personal information. Only two case studies have directly addressed autobiographical memory in DID. Both provided evidence suggestive of dissociative amnesia. The aim of the current study was to objectively assess transfer of autobiographical information between identities in a larger sample of DID patients. Methods: Using a c...

  18. Self-defining memories, scripts, and the life story: narrative identity in personality and psychotherapy.

    Science.gov (United States)

    Singer, Jefferson A; Blagov, Pavel; Berry, Meredith; Oost, Kathryn M

    2013-12-01

    An integrative model of narrative identity builds on a dual memory system that draws on episodic memory and a long-term self to generate autobiographical memories. Autobiographical memories related to critical goals in a lifetime period lead to life-story memories, which in turn become self-defining memories when linked to an individual's enduring concerns. Self-defining memories that share repetitive emotion-outcome sequences yield narrative scripts, abstracted templates that filter cognitive-affective processing. The life story is the individual's overarching narrative that provides unity and purpose over the life course. Healthy narrative identity combines memory specificity with adaptive meaning-making to achieve insight and well-being, as demonstrated through a literature review of personality and clinical research, as well as new findings from our own research program. A clinical case study drawing on this narrative identity model is also presented with implications for treatment and research. © 2012 Wiley Periodicals, Inc.

  19. Speaker Recognition

    DEFF Research Database (Denmark)

    Mølgaard, Lasse Lohilahti; Jørgensen, Kasper Winther

    2005-01-01

    Speaker recognition is basically divided into speaker identification and speaker verification. Verification is the task of automatically determining if a person really is the person he or she claims to be. This technology can be used as a biometric feature for verifying the identity of a person...

  20. End-to-End Verification of Information-Flow Security for C and Assembly Programs

    Science.gov (United States)

    2016-04-01

    seL4 security verification [18] avoids this issue in the same way. In that work, the authors frame their solution as a restriction that disallows...identical: (σ, σ′1) ∈ TM ∧ (σ, σ′2) ∈ TM =⇒ Ol(σ′1) = Ol(σ′2) The successful security verifications of both seL4 and mCertiKOS provide reasonable...evidence that this restriction on specifications is not a major hindrance for usability. Unlike the seL4 verification, however, our framework runs into a

  1. Predicting borderline personality disorder features from personality traits, identity orientation, and attachment styles in Italian nonclinical adults: issues of consistency across age ranges.

    Science.gov (United States)

    Fossati, Andrea; Borroni, Serena; Feeney, Judith; Maffei, Cesare

    2012-04-01

    The aims of this study were to assess whether Borderline Personality Disorder (BPD) features could be predicted by Big Five traits, impulsivity, identity orientation, and adult attachment patterns in a sample of 1,192 adult nonclinical participants, and to evaluate the consistency of these regression models across four age groups (49 years, and >50 years, respectively). In the full sample, measures of neuroticism (N), impulsivity, and anxious insecure attachment were substantial predictors of BPD features (adjusted R(2) = .38, p personality traits and disturbed attachment patterns.

  2. Self-Verification of Ability through Biased Performance Memory.

    Science.gov (United States)

    Karabenick, Stuart A.; LeBlanc, Daniel

    Evidence points to a pervasive tendency for persons to behave to maintain their existing cognitive structures. One strategy by which this self-verification is made more probable involves information processing. Through attention, encoding and retrieval, and the interpretation of events, persons process information so that self-confirmatory…

  3. Modeling the contribution of personality, social identity and social norms to problematic Facebook use in adolescents.

    Science.gov (United States)

    Marino, Claudia; Vieno, Alessio; Pastore, Massimiliano; Albery, Ian P; Frings, Daniel; Spada, Marcantonio M

    2016-12-01

    Facebook is the most popular social networking site in the world providing the opportunity to maintain and/or establish relationships, to share media contents and experiences with friends, and to easily communicate with them. Despite the resources and the innovative social features offered by Facebook research has emerged indicating that its use may become problematic, with negative consequences on personal psycho-social well-being, especially among adolescents and young adults. The main aim of this study was to examine the unique contribution of personality traits and social influence processes (i.e. subjective norms, group norms, and social identity) to perceived frequency of Facebook Use and Problematic Facebook Use in a sample of adolescents. A total of 968 Italian adolescents participated in the study. Structural equation modeling showed that emotional stability, extraversion, conscientiousness and norms directly predicted Problematic Facebook Use, whereas gender, group norms and social identity predicted perceived frequency of Facebook use. In conclusion, both personal and social variables appear to explain perceived frequency of Facebook use and Problematic Facebook Use among adolescents, and should be taken into account by researchers and educational practitioners. Copyright © 2016 Elsevier Ltd. All rights reserved.

  4. Involved and Focused? Students' Perceptions of Institutional Identity, Personal Goal Orientation and Levels of Campus Engagement

    Science.gov (United States)

    Ferrari, Joseph R.; McCarthy, Brendan J.; Milner, Lauren A.

    2009-01-01

    The present study explores the relationship between students' perception of their institution's mission identity, personal goal orientation tendencies, and the extent to which they engage in mission-driven activities. Goal orientation research categorizes student motivations in three ways: mastery orientation (MO), performance-approach (PAp)…

  5. Automated Image Acquisition System for the Verification of Copper-Brass Seal Images

    International Nuclear Information System (INIS)

    Stringa, E.; Bergonzi, C.; Littmann, F.; ); Marszalek, Y.; Tempesta, S.; )

    2015-01-01

    This paper describes a system for the verification of copper-brass seals realized by JRC according to DG ENER requirements. DG ENER processes about 20,000 metal seals per year. The verification of metal seals consists in visually checking the identity of a removed seal. The identity of a copper-brass seal is defined by a random stain pattern realized by the seal producer together with random scratches engraved when the seals are initialized ('seal production'). In order to verify that the seal returned from the field is the expected one its pattern is compared with an image taken during seal production. Formerly, seal initialization and verification were very heavy tasks as seal pictures were acquired with a camera one by one both in the initialization and verification stages. During the initialization the Nuclear Safeguards technicians had to place one by one new seals under a camera and acquire the related reference images. During the verification, the technician had to take used seals and place them one by one under a camera to take new pictures. The new images were presented to the technicians without any preprocessing and the technicians had to recognize the seal. The new station described in this paper has an automated image acquisition system allowing to easily process seals in batches of 100 seals. To simplify the verification, a software automatically centres and rotates the newly acquired seal image in order to perfectly overlap with the reference image acquired during the production phase. The new system significantly speeds up seal production and helps particularly with the demanding task of seal verification. As a large part of the seals is dealt with by a joint Euratom-IAEA team, the IAEA directly profits from this development. The new tool has been in routine use since mid 2013. (author)

  6. The Soul and Personal Identity. Derek Parfit’s Arguments in the Substance Dualist Perspective

    Directory of Open Access Journals (Sweden)

    Sepetyi Dmytro

    2017-07-01

    Full Text Available This paper re-evaluates Derek Parfit’s attack on the commonly held view that personal identity is necessarily determinate and that it is what matters. In the first part we first argue against the Humean view of personal identity; secondly, we classify the remaining alternatives into three kinds: the body theory and the brain theory, the quasi-Humean theory, and the soul theory, and thirdly we deploy Parfit’s arguments and related considerations to the point that none of the materialistic alternatives is consistent with the commonly held view. This leaves us with the alternative: either we accept the radical and highly implausible materialistic view Parfit calls ‘Reductionism’, or we accept the view that we are nonphysical indivisible entities—Cartesian egos, or souls. The second part of the paper discusses Parfit’s objections against the Cartesian view: that there is no reason to believe in the existence of such nonphysical entities; that if such entities exist, there is no evidence that they are enduring (to span a human life; that even if they exist and are enduring, they are irrelevant for the psychological profile and temporal continuity of a person; that experiments with ‘brain-splitted’ patients provide strong evidence against the Cartesian view. We argue that these objections are in part mistaken, and that the remaining (sound part is not strong enough to make the Cartesian view less plausible than Reductionism.

  7. Ego identity formation in middle adolescence.

    Science.gov (United States)

    Lavoie, J C

    1976-12-01

    Assumed determinants of ego identity were investigated in this study using sophomore, junior, and senior high school males and females. Subjects were administered the Marcia Ego Identity Status Scale and measures of sex-role identification, personality development, psychological functioning, self-concept, and parental socialization practices. Data analyses, using a median split on identity score, showed that high-identity adolescents obtained more positive scores on sex-role identification, personality development, psychological adjustment, and self-concept than low-identity adolescents. Socialization practices also differed for the two groups. The sex differences which emerged were congruent with the identity literature. Overall, the data supported Erikson's theory of ego identity development.

  8. Exposure levels for persons involved in recovery operations following the Chernobyl accident in 1986-1987 and dosimetric data verification

    International Nuclear Information System (INIS)

    Il'in, L.A.; Kkyuchkov, V.P.; Osanov, D.P.; Pavlov, D.A.

    1995-01-01

    It is considered the organization of individual dosimetric monitoring (IDM) within 30-km zone around Chernobyl nuclear power plant (CNPP) in 1986 for different contingents of recovery workers: the CNPP personnel, Management for Construction 605 (MC-605), military recovery workers, persons assigned to 30-km zone. It is concluded that the quality of IDM had decreased in the following series: the MC-605 personnel, the CNPP personnel, the assigned persons, and military units. The method of dosimetric data verification for recovery workers in 1986 is presented. The results obtained by this method correspond to the results of the experts' estimation. Using the theory of hybrid lognormal distribution it was obtained, in our opinion, real external dose distribution for all the recovery workers. It was estimated that 7% of recovery workers received doses more than 0.25 Gy. Also, the data on values of mean and collective doses for different contingents, as well as for all persons involved in recovery operations is presented. 14 refs., 18 figs

  9. Personal dimensions of identity and empirical research in APA journals.

    Science.gov (United States)

    Munley, Patrick H; Anderson, Mary Z; Baines, Tonita C; Borgman, Amy L; Briggs, Denise; Dolan, James P; Koyama, Miki

    2002-11-01

    This study reviewed 402 empirical research papers published during 1999 in 9 American Psychological Association journals from the perspective of the Personal Dimensions of Identity (PDI) model. Descriptions of participants were reviewed to determine whether researchers reported information concerning Dimensions A, B, and C of the PDI model. PDI A and B Dimensions of age, gender, education, and geographic location were reported with the highest frequency: 88.56%, 89.30%, 78.50%, and 73.88%, respectively, whereas race/ethnicity was reported with moderate frequency, 60.70%. The remaining PDI A Dimensions of language, physical disability, sexual orientation, and social class, and the remaining B Dimensions of citizenship status, employment status, income, marital status, military experience, occupation, and religion, were reported in relatively low percentages of studies.

  10. Civil Identity

    DEFF Research Database (Denmark)

    Petersen, Lars Axel

    In this paper I will go through a catalogue of examples of contexts in which the term civil identity is currently used, ranging from the formal and technical process of linking a set of administrative and other events to an individual biological person by means of identity cards, fingerprints, iris...... of Israel to Luce Irigaray's Feminist agenda of elaborating gender specific civil identities. My intention is to investigate whether these different employments of 'civil identity' point towards a common, and fairly well defined object field asking questions of contemporary relevance to the philosophy...

  11. Designer's Identity

    DEFF Research Database (Denmark)

    Kunrath, Kamila; Cash, Philip; Li-Ying, Jason

    2016-01-01

    A designer’s professional identity (DPI) develops through both education and professional experience, building on core personality traits and innate skills. In this paper a systematic literature review and a secondary narrative review were developed in order to map personal attributes and design...

  12. Inter-identity autobiographical amnesia in patients with dissociative identity disorder.

    Science.gov (United States)

    Huntjens, Rafaële J C; Verschuere, Bruno; McNally, Richard J

    2012-01-01

    A major symptom of Dissociative Identity Disorder (DID; formerly Multiple Personality Disorder) is dissociative amnesia, the inability to recall important personal information. Only two case studies have directly addressed autobiographical memory in DID. Both provided evidence suggestive of dissociative amnesia. The aim of the current study was to objectively assess transfer of autobiographical information between identities in a larger sample of DID patients. Using a concealed information task, we assessed recognition of autobiographical details in an amnesic identity. Eleven DID patients, 27 normal controls, and 23 controls simulating DID participated. Controls and simulators were matched to patients on age, education level, and type of autobiographical memory tested. Although patients subjectively reported amnesia for the autobiographical details included in the task, the results indicated transfer of information between identities. The results call for a revision of the DID definition. The amnesia criterion should be modified to emphasize its subjective nature.

  13. Personal Identity and Resurrection from the Dead

    Directory of Open Access Journals (Sweden)

    Gasparov Igor

    2017-04-01

    Full Text Available The paper examines arguments of the “Christian materialist” Trenton Merricks that he provided in support of the claim that the Christian doctrine of resurrection from the dead is compatible with the materialist understanding of the nature of human beings. In his paper The Resurrection of the Body, Merricks discussed two aspects of the materialist interpretation of the traditional religious doctrine of the bodily resurrection. On the one hand, he analyses and tries to overcome objections against the possibility of the general resurrection in case the materialist understanding of the nature of human personality should be true (mainly the problem of the temporal gap. On the other hand, he provides some reasons why the materialist understanding of human nature is more relevant than its dualist counterpart to the doctrine of the bodily resurrection. The present paper evaluates his arguments and discusses the suggestion that the doctrine of resurrection is not only compatible with materialism, but is also tenable if human beings are identical with their physical bodies. The conclusion of the paper is that Merricks’ apologetic arguments achieve their aims in defending the doctrine of resurrection only partially; the resurrection doctrine appears more tenable if we accept the dualistic conception of human nature.

  14. Status of personnel identity verifiers

    International Nuclear Information System (INIS)

    Maxwell, R.L.

    1985-01-01

    Identity verification devices based on the interrogation of six different human biometric features or actions now exist and in general have been in development for about ten years. The capability of these devices to meet the cost and operational requirements of speed, accuracy, ease of use and reliability has generally increased although the verifier industry is still immature. Sandia Laboratories makes a continuing effort to stay abreast of identity verifier developments and to assess the capabilities and improvements of each device. Operating environment and procedures more typical of field use can often reveal performance results substantially different from laboratory tests. An evaluation of several recently available verifiers is herein reported

  15. The Identity of Czech Deaf Roma

    OpenAIRE

    Kalousová, Josefina

    2012-01-01

    With the definition of Deaf people as a cultural and linguistic minority the research of Deaf identity became possible. Following this, questions of identity of minority deaf persons emerged. Do these persons affiliate to the Deaf community or to their ethnic minority? This bachelor thesis focuses on the topic of Czech deaf Roma identity. The underlying assumption of the paper is that identity is a continuing process dependent on the interaction of an individual and society and that it consti...

  16. Medical Identity

    DEFF Research Database (Denmark)

    Musaeus, Peter

    2015-01-01

    Purpose: To examine philosophical stances underpinning medical identity and assess the conceptual relationship between physician, medical practice and culture. Argument: Medical identity is about the ideals and moral positions that physicians take when justifying themselves. Medical identity...... hedonistic versus sentimentalist approaches to medical identity. The sociocultural philosophical analysis of medical identity can shed light on what it means conceptually for a physician to harbor beliefs associated with him/her being taken to be an autonomous professional. It is important because it touches...... on the meaning of being a compassionate, good and skilled physician, making its relevance to person-centered medicine self-evident. Conclusion: Medical identity should be analyzed with reference to literature, philosophy and medical practice in order for the physician to exercise a reflective position...

  17. A Case for Implementation of Citizen Centric National Identity Management Systems

    DEFF Research Database (Denmark)

    Adjei, Joseph K.

    of trust in transacting parties. Policy makers are therefore trying to implement identity policies to prevent identity abuses, promote the seamless flow of business transactions, and provide citizens the ability to exercise informational self-determination. Previously, the design of identity management...... and exposure, and a high level of literacy. But in developing countries infrastructural challenges, low literacy level, and physical verification of credentials hamper the effective use of identity management systems. This PhD study adapts the DeLone and McLean model of information systems success to the case...

  18. Gauge invariance and Nielsen identities

    International Nuclear Information System (INIS)

    Lima, A.F. de; Bazaia, D.

    1989-01-01

    The one-loop contribution to the effective potential and mass are computed within the context of scalar electrodynamics for the class of general R gauges in the MS scheme. These calculations are performed in order to construct a non-trivial verification of the corresponding Nielsen identities within the context of the Higgs model. Some brief comments on the Coleman-Weinberg model are also included. (author) [pt

  19. Korean Adoptee Identity: Adoptive and Ethnic Identity Profiles of Adopted Korean Americans

    Science.gov (United States)

    Beaupre, Adam J.; Reichwald, Reed; Zhou, Xiang; Raleigh, Elizabeth; Lee, Richard M.

    2015-01-01

    Adopted Korean adolescents face the task of grappling with their identity as Koreans and coming to terms with their adoptive status. In order to explore these dual identities, the authors conducted a person-centered study of the identity profiles of 189 adopted Korean American adolescents. Using cluster analytic procedures, the study examined…

  20. Inter-identity autobiographical amnesia in patients with dissociative identity disorder

    NARCIS (Netherlands)

    Huntjens, R.J.C.; Verschuere, B.; McNally, R.J.

    2012-01-01

    Background A major symptom of Dissociative Identity Disorder (DID; formerly Multiple Personality Disorder) is dissociative amnesia, the inability to recall important personal information. Only two case studies have directly addressed autobiographical memory in DID. Both provided evidence suggestive

  1. Inter-Identity Autobiographical Amnesia in Patients with Dissociative Identity Disorder

    NARCIS (Netherlands)

    Huntjens, R.J.C.; Verschuere, B.; McNally, R.J.

    2012-01-01

    Background: A major symptom of Dissociative Identity Disorder (DID; formerly Multiple Personality Disorder) is dissociative amnesia, the inability to recall important personal information. Only two case studies have directly addressed autobiographical memory in DID. Both provided evidence suggestive

  2. Inter-Identity Autobiographical Amnesia in Patients with Dissociative Identity Disorder

    Science.gov (United States)

    Huntjens, Rafaële J. C.; Verschuere, Bruno; McNally, Richard J.

    2012-01-01

    Background A major symptom of Dissociative Identity Disorder (DID; formerly Multiple Personality Disorder) is dissociative amnesia, the inability to recall important personal information. Only two case studies have directly addressed autobiographical memory in DID. Both provided evidence suggestive of dissociative amnesia. The aim of the current study was to objectively assess transfer of autobiographical information between identities in a larger sample of DID patients. Methods Using a concealed information task, we assessed recognition of autobiographical details in an amnesic identity. Eleven DID patients, 27 normal controls, and 23 controls simulating DID participated. Controls and simulators were matched to patients on age, education level, and type of autobiographical memory tested. Findings Although patients subjectively reported amnesia for the autobiographical details included in the task, the results indicated transfer of information between identities. Conclusion The results call for a revision of the DID definition. The amnesia criterion should be modified to emphasize its subjective nature. PMID:22815769

  3. Inter-identity autobiographical amnesia in patients with dissociative identity disorder.

    Directory of Open Access Journals (Sweden)

    Rafaële J C Huntjens

    Full Text Available BACKGROUND: A major symptom of Dissociative Identity Disorder (DID; formerly Multiple Personality Disorder is dissociative amnesia, the inability to recall important personal information. Only two case studies have directly addressed autobiographical memory in DID. Both provided evidence suggestive of dissociative amnesia. The aim of the current study was to objectively assess transfer of autobiographical information between identities in a larger sample of DID patients. METHODS: Using a concealed information task, we assessed recognition of autobiographical details in an amnesic identity. Eleven DID patients, 27 normal controls, and 23 controls simulating DID participated. Controls and simulators were matched to patients on age, education level, and type of autobiographical memory tested. FINDINGS: Although patients subjectively reported amnesia for the autobiographical details included in the task, the results indicated transfer of information between identities. CONCLUSION: The results call for a revision of the DID definition. The amnesia criterion should be modified to emphasize its subjective nature.

  4. The centrality of affective instability and identity in Borderline Personality Disorder: Evidence from network analysis

    Science.gov (United States)

    Costantini, Giulio; De Panfilis, Chiara

    2017-01-01

    We argue that the series of traits characterizing Borderline Personality Disorder samples do not weigh equally. In this regard, we believe that network approaches employed recently in Personality and Psychopathology research to provide information about the differential relationships among symptoms would be useful to test our claim. To our knowledge, this approach has never been applied to personality disorders. We applied network analysis to the nine Borderline Personality Disorder traits to explore their relationships in two samples drawn from university students and clinical populations (N = 1317 and N = 96, respectively). We used the Fused Graphical Lasso, a technique that allows estimating networks from different populations separately while considering their similarities and differences. Moreover, we examined centrality indices to determine the relative importance of each symptom in each network. The general structure of the two networks was very similar in the two samples, although some differences were detected. Results indicate the centrality of mainly affective instability, identity, and effort to avoid abandonment aspects in Borderline Personality Disorder. Results are consistent with the new DSM Alternative Model for Personality Disorders. We discuss them in terms of implications for therapy. PMID:29040324

  5. Bilingualism versus identity

    DEFF Research Database (Denmark)

    Hermann, Jesper

    1988-01-01

    During the last hundred years psychologists, philosophers and theologians have developed two different conceptions of personal identity. One of them insists that each person is a unique and transcendental being, whereas the other finds the personality deriving from interaction with other persons....... (This is the prevailing view today.) These theories are placed in relation to the difficulties an immigrant encounters....

  6. Verification of RESRAD-RDD. (Version 2.01)

    Energy Technology Data Exchange (ETDEWEB)

    Cheng, Jing-Jy [Argonne National Lab. (ANL), Argonne, IL (United States); Flood, Paul E. [Argonne National Lab. (ANL), Argonne, IL (United States); LePoire, David [Argonne National Lab. (ANL), Argonne, IL (United States); Kamboj, Sunita [Argonne National Lab. (ANL), Argonne, IL (United States); Yu, Charley [Argonne National Lab. (ANL), Argonne, IL (United States)

    2015-09-01

    In this report, the results generated by RESRAD-RDD version 2.01 are compared with those produced by RESRAD-RDD version 1.7 for different scenarios with different sets of input parameters. RESRAD-RDD version 1.7 is spreadsheet-driven, performing calculations with Microsoft Excel spreadsheets. RESRAD-RDD version 2.01 revamped version 1.7 by using command-driven programs designed with Visual Basic.NET to direct calculations with data saved in Microsoft Access database, and re-facing the graphical user interface (GUI) to provide more flexibility and choices in guideline derivation. Because version 1.7 and version 2.01 perform the same calculations, the comparison of their results serves as verification of both versions. The verification covered calculation results for 11 radionuclides included in both versions: Am-241, Cf-252, Cm-244, Co-60, Cs-137, Ir-192, Po-210, Pu-238, Pu-239, Ra-226, and Sr-90. At first, all nuclidespecific data used in both versions were compared to ensure that they are identical. Then generic operational guidelines and measurement-based radiation doses or stay times associated with a specific operational guideline group were calculated with both versions using different sets of input parameters, and the results obtained with the same set of input parameters were compared. A total of 12 sets of input parameters were used for the verification, and the comparison was performed for each operational guideline group, from A to G, sequentially. The verification shows that RESRAD-RDD version 1.7 and RESRAD-RDD version 2.01 generate almost identical results; the slight differences could be attributed to differences in numerical precision with Microsoft Excel and Visual Basic.NET. RESRAD-RDD version 2.01 allows the selection of different units for use in reporting calculation results. The results of SI units were obtained and compared with the base results (in traditional units) used for comparison with version 1.7. The comparison shows that RESRAD

  7. Identity paradoxes

    Directory of Open Access Journals (Sweden)

    Đurić Jelena

    2010-01-01

    Full Text Available The article considers paradoxical nature of identity that emerges from: 1 the very concept of identity whose abstract generality unites various and even opposite features; 2 the processual nature of reality that is easier to express in the poetical metaphors or abstract principles than in unambiguous conceptual networks; 3 the oppose relationship between being and knowledge, mind and matter, subject and object, self and personality. Entangled in the labyrinth which evade efforts to be conceptually defined, the modern thinking of identity moves towards abandoning the idea of “self” on behalf of the “ego” and towards the misapprehension of identity as being identical. This corresponds to the “time of the lost spirit” stretched between the simultaneous need to find an identity and to give it up.

  8. Identity uncertainty and commitment making across adolescence : Five-year within-person associations using daily identity reports

    NARCIS (Netherlands)

    Becht, Andrik I.; Nelemans, Stefanie A.; Branje, Susan J. T.; Vollebergh, Wilma A. M.; Koot, Hans M.; Meeus, W.H.J.

    2017-01-01

    A central assumption of identity theory is that adolescents reconsider current identity commitments and explore identity alternatives before they make new commitments in various identity domains (Erikson, 1968; Marcia, 1966). Yet, little empirical evidence is available on how commitment and

  9. A field-theoretic approach to non-equilibrium work identities

    International Nuclear Information System (INIS)

    Mallick, Kirone; Orland, Henri; Moshe, Moshe

    2011-01-01

    We study non-equilibrium work relations for a space-dependent field with stochastic dynamics (model A). Jarzynski's equality is obtained through symmetries of the dynamical action in the path-integral representation. We derive a set of exact identities that generalize the fluctuation-dissipation relations to non-stationary and far-from-equilibrium situations. These identities are prone to experimental verification. Furthermore, we show that a well-studied invariance of the Langevin equation under supersymmetry, which is known to be broken when the external potential is time dependent, can be partially restored by adding to the action a term which is precisely Jarzynski's work. The work identities can then be retrieved as consequences of the associated Ward-Takahashi identities.

  10. Fashioning Identity

    DEFF Research Database (Denmark)

    Mackinney-Valentin, Maria

    We dress to communicate who we are, or who we would like others to think we are, telling seductive fashion narratives through our adornment. Yet, today, fashion has been democratized through high-low collaborations, social media and real-time fashion mediation, complicating the basic dynamic...... of identity displays, and creating tension between personal statements and social performances. Fashioning Identity explores how this tension is performed through fashion production and consumption,by examining a diverse series of case studies - from ninety-year old fashion icons to the paradoxical rebellion...... by readdressing Fred Davis' seminal concept of 'identity ambivalence' in Fashion, Culture and Identity (1992), Mackinney-Valentin argues that we are in an epoch of 'status ambivalence', in which fashioning one's own identity has become increasingly complicated....

  11. Absorption properties of identical atoms

    International Nuclear Information System (INIS)

    Sancho, Pedro

    2013-01-01

    Emission rates and other optical properties of multi-particle systems in collective and entangled states differ from those in product ones. We show the existence of similar effects in the absorption probabilities for (anti)symmetrized states of two identical atoms. The effects strongly depend on the overlapping between the atoms and differ for bosons and fermions. We propose a viable experimental verification of these ideas. -- Highlights: •The absorption rates of a pair of identical atoms in product and (anti)symmetrized states are different. •The modifications of the optical properties are essentially determined by the overlapping between the atoms. •The absorption properties differ, in some cases, for bosons and fermions

  12. Blind quantum computation with identity authentication

    Science.gov (United States)

    Li, Qin; Li, Zhulin; Chan, Wai Hong; Zhang, Shengyu; Liu, Chengdong

    2018-04-01

    Blind quantum computation (BQC) allows a client with relatively few quantum resources or poor quantum technologies to delegate his computational problem to a quantum server such that the client's input, output, and algorithm are kept private. However, all existing BQC protocols focus on correctness verification of quantum computation but neglect authentication of participants' identity which probably leads to man-in-the-middle attacks or denial-of-service attacks. In this work, we use quantum identification to overcome such two kinds of attack for BQC, which will be called QI-BQC. We propose two QI-BQC protocols based on a typical single-server BQC protocol and a double-server BQC protocol. The two protocols can ensure both data integrity and mutual identification between participants with the help of a third trusted party (TTP). In addition, an unjammable public channel between a client and a server which is indispensable in previous BQC protocols is unnecessary, although it is required between TTP and each participant at some instant. Furthermore, the method to achieve identity verification in the presented protocols is general and it can be applied to other similar BQC protocols.

  13. Assessment of identity development and identity diffusion in adolescence - Theoretical basis and psychometric properties of the self-report questionnaire AIDA.

    Science.gov (United States)

    Goth, Kirstin; Foelsch, Pamela; Schlüter-Müller, Susanne; Birkhölzer, Marc; Jung, Emanuel; Pick, Oliver; Schmeck, Klaus

    2012-07-19

    In the continuing revision of Diagnostic and Statistical Manual (DSM-V) "identity" is integrated as a central diagnostic criterion for personality disorders (self-related personality functioning). According to Kernberg, identity diffusion is one of the core elements of borderline personality organization. As there is no elaborated self-rating inventory to assess identity development in healthy and disturbed adolescents, we developed the AIDA (Assessment of Identity Development in Adolescence) questionnaire to assess this complex dimension, varying from "Identity Integration" to "Identity Diffusion", in a broad and substructured way and evaluated its psychometric properties in a mixed school and clinical sample. Test construction was deductive, referring to psychodynamic as well as social-cognitive theories, and led to a special item pool, with consideration for clarity and ease of comprehension. Participants were 305 students aged 12-18 attending a public school and 52 adolescent psychiatric inpatients and outpatients with diagnoses of personality disorders (N = 20) or other mental disorders (N = 32). Convergent validity was evaluated by covariations with personality development (JTCI 12-18 R scales), criterion validity by differences in identity development (AIDA scales) between patients and controls. AIDA showed excellent total score (Diffusion: α = .94), scale (Discontinuity: α = .86; Incoherence: α = .92) and subscale (α = .73-.86) reliabilities. High levels of Discontinuity and Incoherence were associated with low levels in Self Directedness, an indicator of maladaptive personality functioning. Both AIDA scales were significantly different between PD-patients and controls with remarkable effect sizes (d) of 2.17 and 1.94 standard deviations. AIDA is a reliable and valid instrument to assess normal and disturbed identity in adolescents. Studies for further validation and for obtaining population norms are in progress and may provide

  14. Professional identity of civil servants as a scientific problem

    Directory of Open Access Journals (Sweden)

    Nataliia Anatoliivna Lypovska

    2013-11-01

    Full Text Available The article examines the concept of «professional identity» and its importance for the analysis of the professionalization of the civil servants. The basic concepts such as “profession”, “professionalism” (“professional development”, “professional competence”, and their relationship are concerned. Relevance of the research is due to the fact that professional identity acts as an internal source of professional development and personal growth of any business entity, and the question of the development of professional identity is included into the total range of problems of any professional. Stages of professional identity are grounded. The paper concludes that professional identity is an integration concept, which expresses the relationship of personal characteristics that provide guidance in the world of professions and allows a person more fully realize his personal potential careers, as well as to predict the consequences of professional choice. Professional identity performs of transforming and stabilizing functions. Therefore professional identity serves like a kind of regulator for a profession.

  15. The status of personnel identity verifiers

    International Nuclear Information System (INIS)

    Maxwell, R.L.

    1985-01-01

    Identity verification devices based on the interrogation of six different human biometric features or actions now exist and in general have been in development for about ten years. The capability of these devices to meet the cost and operational requirements of speed, accuracy, ease of use and reliability has generally increased although the verifier industry is still immature. Sandia Laboratories makes a continuing effort to stay abreast of identity verifier developments and to assess the capabilities and improvements of each device. Operating environment and procedures more typical of field use can often reveal performance results substantially different from laboratory tests. An evaluation of several recently available verifiers is herein reported

  16. The Supermalt identity

    DEFF Research Database (Denmark)

    Bech-Larsen, Tino; Esbjerg, Lars; Grunert, Klaus G.

    2007-01-01

    on consumers' self-identities. The second part explored the role of food and beverage products in the construction of self-identities. The final part focused on the construction of brand identity for Supermalt. Findings - The article provides information on the self-identities constructed by Afro......-Caribbean informants. The food and beverage consumption of informants reflects their mixed cultural identity. The brand identity Supermalt appears to be malleable, with ample room for consumer co-construction. Perceptions of brand identity differ markedly among informants, who are all able to construct Supermalt......Purpose - The objective of this article is to conduct a case study of the Supermalt brand of malt beer, which has become the preferred beverage of Afro-Caribbean consumers in Brixton on a very limited marketing budget. Design/methodology/approach - The article uses the concepts of personal identity...

  17. I am remix your web identity

    CERN Document Server

    Sordi, Paolo

    2015-01-01

    I Am: Remix Your Web Identity explores methods of designing and developing a personal website with RSS feeds that aggregate blog posts along with posts on social networks, such as Flickr, YouTube, Goodreads, Last.fm, and Delicious, in order to regain control and ownership (as well as authorship) of one's identity in one consistent and customized location. The book provides a short overview of the evolution of digital identity and the transformation of personal websites from Geocities to blogs...

  18. Fostering group identification and creativity in diverse groups: the role of individuation and self-verification.

    Science.gov (United States)

    Swann, William B; Kwan, Virginia S Y; Polzer, Jeffrey T; Milton, Laurie P

    2003-11-01

    A longitudinal study examined the interplay of identity negotiation processes and diversity in small groups of master's of business administration (MBA) students. When perceivers formed relatively positive impressions of other group members, higher diversity predicted more individuation of targets. When perceivers formed relatively neutral impressions of other group members, however, higher diversity predicted less individuation of targets. Individuation at the outset of the semester predicted self-verification effects several weeks later, and self-verification, in turn, predicted group identification and creative task performance. The authors conclude that contrary to self-categorization theory, fostering individuation and self-verification in diverse groups may maximize group identification and productivity.

  19. Automated Offline Arabic Signature Verification System using Multiple Features Fusion for Forensic Applications

    Directory of Open Access Journals (Sweden)

    Saad M. Darwish

    2016-12-01

    Full Text Available The signature of a person is one of the most popular and legally accepted behavioral biometrics that provides a secure means for verification and personal identification in many applications such as financial, commercial and legal transactions. The objective of the signature verification system is to classify between genuine and forged signatures that are often associated with intrapersonal and interpersonal variability. Unlike other languages, Arabic has unique features; it contains diacritics, ligatures, and overlapping. Because of lacking any form of dynamic information during the Arabic signature’s writing process, it will be more difficult to obtain higher verification accuracy. This paper addresses the above difficulty by introducing a novel offline Arabic signature verification algorithm. The key point is using multiple feature fusion with fuzzy modeling to capture different aspects of a signature individually in order to improve the verification accuracy. State-of-the-art techniques adopt the fuzzy set to describe the properties of the extracted features to handle a signature’s uncertainty; this work also employs the fuzzy variables to describe the degree of similarity of the signature’s features to deal with the ambiguity of questioned document examiner judgment of signature similarity. It is concluded from the experimental results that the verification system performs well and has the ability to reduce both False Acceptance Rate (FAR and False Rejection Rate (FRR.

  20. Survivorship and discourses of identity.

    Science.gov (United States)

    Little, Miles; Paul, Kim; Jordens, Christopher F C; Sayers, Emma-Jane

    2002-01-01

    Personal identity is self-evidently important to us all. Identity is a philosophically complex subject, but there is some agreement that memory, embodiment and continuity are essential components. The sense of memory includes 'future memory', the kind of memory we would like to construct for ourselves as our lives proceed. While the sense of personal identity is internal to the individual, a sense of that person's identity exists in the minds of others. Extreme experiences threaten the element of continuity, because they may bring bodily changes as well as cognitive changes that challenge central values. Restoring or preserving continuity is a major task for survivors. The ways in which people experience discontinuity because of cancer illness, and the ways in which they manage this experience emerges from the narratives of the survivors of cancer and in the narratives of health care workers who look after them. People manage discontinuity by reference to stable 'anchor points' in their beliefs and values; by re-constructing versions of their pre-experience identities, drawing on past memory and finding ways to preserve a continuity between past memory, present experience and constructions of the future; by using the experience to develop established facets of identity; and by imbuing the experience with meaning and recognising the enlarged identity made possible by survival. Those who cannot achieve a sense of continuity may feel alienated from themselves, their friends and family. All these methods of management may be used by one person to negotiate the post-experience identity in its different social interactions. The experience of the survivor can be further understood by recognising the challenge posed by extreme experience to the sense of continuity of both embodied self and memory. A satisfactory discourse of survival has yet to enter the public domain. This lack adds to the burdens of survivors, including those who have survived cancer. Copyright 2002 John

  1. Development and Validation of a Q-Sort Measure of Identity Processing Style: The Identity Processing Style Q-Sort

    Science.gov (United States)

    Pittman, Joe F.; Kerpelman, Jennifer L.; Lamke, Leanne K.; Sollie, Donna L.

    2009-01-01

    Identity styles represent strategies individuals use to explore identity-related issues. Berzonsky (Berzonsky, M. D. (1992). Identity style and coping strategies. "Journal of Personality, 60", 771-788) identified three styles: informational, normative, and diffuse. In three studies, this paper presents (a) the identity processing style Q-sort…

  2. Exploring Japanese university English teachers' professional identity

    CERN Document Server

    Nagatomo, Diane Hawley

    2012-01-01

    This book examines the professional identities of Japanese university English teachers. It focuses on how relatively new teachers develop their professional identities, how gender impacts the professional identities of female professors, and how teaching practices and beliefs reflect personal and professional identity.

  3. GETTING PERSONAL: ETHICS AND IDENTITY IN GLOBAL HEALTH RESEARCH

    Science.gov (United States)

    Simon, Christian; Mosavel, Maghboeba

    2011-01-01

    ‘Researcher identity’ affects global health research in profound and complex ways. Anthropologists in particular have led the way in portraying the multiple, and sometimes tension-generating, identities that researchers ascribe to themselves, or have ascribed to them, in their places of research. However, the central importance of researcher identity in the ethical conduct of global health research has yet to be fully appreciated. The capacity of researchers to respond effectively to the ethical tensions surrounding their identities is hampered by lack of conceptual clarity, as to the nature and scope of the issues involved. This paper strives to provide some clarification of these ethical tensions by considering researcher identity from the perspective of (1) Guillemin and Heggen’s (2009) key distinction between procedural ethics and ethics in practice, and (2) our own distinction between perceptions of identity that are either symmetrical or asymmetrical, with the potential to shift research relationships toward greater or lesser ethical harmony. Discussion of these concepts is supported with ethnographic examples from relevant literature and from our own (United States (US) Government-funded) research in South Africa. A preliminary set of recommendations is provided in an effort to equip researchers with a greater sense of organization and control over the ethics of researcher identity. The paper concludes that the complex construction of researcher identity needs to be central among the ethical concerns of global health researchers, and that the conceptual tools discussed in the paper are a useful starting point for better organizing and acting on these ethical concerns. PMID:21426482

  4. Learning a Genetic Measure for Kinship Verification Using Facial Images

    Directory of Open Access Journals (Sweden)

    Lu Kou

    2015-01-01

    Full Text Available Motivated by the key observation that children generally resemble their parents more than other persons with respect to facial appearance, distance metric (similarity learning has been the dominant choice for state-of-the-art kinship verification via facial images in the wild. Most existing learning-based approaches to kinship verification, however, are focused on learning a genetic similarity measure in a batch learning manner, leading to less scalability for practical applications with ever-growing amount of data. To address this, we propose a new kinship verification approach by learning a sparse similarity measure in an online fashion. Experimental results on the kinship datasets show that our approach is highly competitive to the state-of-the-art alternatives in terms of verification accuracy, yet it is superior in terms of scalability for practical applications.

  5. A Federated Digital Identity Management Approach for Business Processes

    Science.gov (United States)

    Bertino, Elisa; Ferrini, Rodolfo; Musci, Andrea; Paci, Federica; Steuer, Kevin J.

    Business processes have gained a lot of attention because of the pressing need for integrating existing resources and services to better fulfill customer needs. A key feature of business processes is that they are built from composable services, referred to as component services, that may belong to different domains. In such a context, flexible multi-domain identity management solutions are crucial for increased security and user-convenience. In particular, it is important that during the execution of a business process the component services be able to verify the identity of the client to check that it has the required permissions for accessing the services. To address the problem of multi-domain identity management, we propose a multi-factor identity attribute verification protocol for business processes that assures clients privacy and handles naming heterogeneity.

  6. Identity at work: Exploring strategies for Identity Work

    Directory of Open Access Journals (Sweden)

    Byron G. Adams

    2012-09-01

    Research purpose: The main aim of this study was to explore employee narratives and identify the strategies available to them in the process of identity work, as they defined themselves at work. Motivation for the study: As there is a scarcity of research on identity work in South Africa, this study wanted to advance knowledge about identity work and the strategies used for regulating and negotiating an identity at work by exploring these constructs in this context. Research design, approach and method: A qualitative research process formed the basis for this study. Nineteen employees from a global manufacturing company participated in two semi-structured in-depth interviews. Grounded theory was applied to analyse and interpret the data. Main findings: Nine strategies for identity work were identified and categorised into four broad themes (personal philosophies; relationships; career management and negotiating balance. Practical/managerial implications: Employees followed various strategies for defining themselves at work and this may have some implications for employee work engagement and productivity. Contribution/value-add: This study expands on current theoretical knowledge of identity work, and provides insights into the strategies people use to regulate and negotiate their identities at work.

  7. Optimal Experience and Optimal Identity: A Multinational Study of the Associations Between Flow and Social Identity.

    Science.gov (United States)

    Mao, Yanhui; Roberts, Scott; Pagliaro, Stefano; Csikszentmihalyi, Mihaly; Bonaiuto, Marino

    2016-01-01

    Eudaimonistic identity theory posits a link between activity and identity, where a self-defining activity promotes the strength of a person's identity. An activity engaged in with high enjoyment, full involvement, and high concentration can facilitate the subjective experience of flow. In the present paper, we hypothesized in accordance with the theory of psychological selection that beyond the promotion of individual development and complexity at the personal level, the relationship between flow and identity at the social level is also positive through participation in self-defining activities. Three different samples (i.e., American, Chinese, and Spanish) filled in measures for flow and social identity, with reference to four previously self-reported activities, characterized by four different combinations of skills (low vs. high) and challenges (low vs. high). Findings indicated that flow was positively associated with social identity across each of the above samples, regardless of participants' gender and age. The results have implications for increasing social identity via participation in self-defining group activities that could facilitate flow.

  8. Revocable identity-based proxy re-signature against signing key exposure.

    Science.gov (United States)

    Yang, Xiaodong; Chen, Chunlin; Ma, Tingchun; Wang, Jinli; Wang, Caifen

    2018-01-01

    Identity-based proxy re-signature (IDPRS) is a novel cryptographic primitive that allows a semi-trusted proxy to convert a signature under one identity into another signature under another identity on the same message by using a re-signature key. Due to this transformation function, IDPRS is very useful in constructing privacy-preserving schemes for various information systems. Key revocation functionality is important in practical IDPRS for managing users dynamically; however, the existing IDPRS schemes do not provide revocation mechanisms that allow the removal of misbehaving or compromised users from the system. In this paper, we first introduce a notion called revocable identity-based proxy re-signature (RIDPRS) to achieve the revocation functionality. We provide a formal definition of RIDPRS as well as its security model. Then, we present a concrete RIDPRS scheme that can resist signing key exposure and prove that the proposed scheme is existentially unforgeable against adaptive chosen identity and message attacks in the standard model. To further improve the performance of signature verification in RIDPRS, we introduce a notion called server-aided revocable identity-based proxy re-signature (SA-RIDPRS). Moreover, we extend the proposed RIDPRS scheme to the SA-RIDPRS scheme and prove that this extended scheme is secure against adaptive chosen message and collusion attacks. The analysis results show that our two schemes remain efficient in terms of computational complexity when implementing user revocation procedures. In particular, in the SA-RIDPRS scheme, the verifier needs to perform only a bilinear pairing and four exponentiation operations to verify the validity of the signature. Compared with other IDPRS schemes in the standard model, our SA-RIDPRS scheme greatly reduces the computation overhead of verification.

  9. OPINIONS AND ATTITUDES OF PARENTS AND STUDENTS FOR SEXUAL DEVELOPMENT, SEXUAL BEHAVIOR AND GENDER IDENTITY OF PERSONS WITH AUTISM IN THE REPUBLIC OF MACEDONIA

    Directory of Open Access Journals (Sweden)

    Bisera MLADENOVSKA

    2010-04-01

    Full Text Available Persons with autism can experience severe issues during the puberty and adolescence resulting from the changes that occur in their body. People with autism are sexual beings. They have sexual needs and desires as other people. Sexual development is part of the overall development of their personality.The main objective of this research was to present sexual development, sexual behavior, and sexual identity among persons with autism. Furthermore, we determined the views and opinions of the parents and students, special educators and rehabilitators, about children with autism. Basic tasks of this research were: to determine whether persons with autism have a clear picture and concept of their sexuality, whether the parents discuss this topic with their children, whether and how persons with autism know what sex is, what is contraception, unwanted pregnancy, sexually transmitted diseases or intimate parts of the body, whether they show some kind of sexual behavior, and whether the parents and students should be educated regarding the sexual development, behavior, and sexual identity of persons with autism.The survey was conducted over a period of almost 3 months, which included 94 respondents.Obtained data was collected, grouped, tabled, and processed with the standard statistical program Microsoft Office Excel 2003, applying χ2 tests and Fisher's Еxact test. Statistical important difference was at the level of p<0.05.From the analysis and interpretation of the results, we can conclude that in Macedonian families and schools there is a very small extent or no existence of communication between the parents and professionals with persons with autism about sexual development, sexual behavior, and sexual identity. Persons with autism have very little or no general knowledge about sexuality.

  10. Differences in personality traits between male-to-female and female-to-male gender identity disorder subjects.

    Science.gov (United States)

    Miyajima, Eiichi; Taira, Naoki; Koda, Munenaga; Kondo, Tsuyoshi

    2014-12-15

    The present study aimed to investigate differences in personality traits among male-to-female (MtF), female-to-male (FtM) gender identity disorder (GID) subjects and non-transsexual male (M) and female (F) controls. Subjects were 72 MtF and 187 FtM GID subjects without psychiatric comorbidities together with 184 male and 159 female non-transsexual controls. Personality traits were assessed using a short version of the Temperament and Character Inventory (TCI-125). Group comparisons were made by two-way ANOVA. Statistical significances were observed as follows: 1) lower novelty seeking in FtM than in M or MtF, 2) higher reward dependence in FtM than in M, 3) higher cooperativeness in FtM than in M or MtF, 4) the highest self-transcendence in MtF among all the groups. The highest self-transcendence in MtF subjects may reflect their vulnerable identity and constrained adaptation to society as the minority. Nevertheless, higher reward dependence and cooperativeness in FtM subjects can be related to more determined motivation for the treatments of GID and might promise better social functioning and adjustment than MtF subjects. Copyright © 2014 Elsevier Ireland Ltd. All rights reserved.

  11. 'I am not a depressed person': how identity conflict affects help-seeking rates for major depressive disorder.

    Science.gov (United States)

    Farmer, Caroline; Farrand, Paul; O'Mahen, Heather

    2012-10-02

    There is a significant treatment gap for patients with depression. A third of sufferers never seek help, and the vast majority of those who do only do so after considerable delay. Little is understood regarding poor help-seeking rates amongst people with depression, with existing research mainly focussed on the impact of barriers to treatment. The current study explored psychological factors affecting help-seeking behaviour in clinically depressed individuals. Semi-structured interviews were conducted with 20 current or previously clinically depressed participants who either had or had not sought professional help. Thematic analysis was used to analyse results. The onset of depressive symptoms created conflict with participants' identity and personal goals. Delays in seeking help were primarily attributed to the desire to protect identity and goals from the threat of depressive symptoms. Participants used avoidance strategies to reduce the perceived threat of depressive symptoms on identity. These strategies interfered with help-seeking. Help-seeking was only undertaken once participants reached a point of acceptance and began to make concessions in their identity and goals, at which time they reduced their use of avoidance. Difficulties resolving conflict between identity and depressive symptoms may account for significant delays in seeking help for depression. The results have implications for predicting health behaviour and improving treatment uptake for depression, and may inform existing help-seeking models.

  12. Personality development from adolescence to emerging adulthood: linking trajectories of ego development to the family context and identity formation.

    Science.gov (United States)

    Syed, Moin; Seiffge-Krenke, Inge

    2013-02-01

    This longitudinal study analyzed personality development using an individual approach by examining changes in ego development across the transition from adolescence to emerging adulthood. Specifically, the study mapped the heterogeniety in ego development growth trajectories and linked the different trajectories to the family context in adolescence and identity development in emerging adulthood. Participants were 98 families with a child who were followed from age 14 to age 24. Latent class growth analysis identified 4 distinct trajectories of growth in ego development of the children over the 10-year period. The results indicated that growth was more rapid during adolescence and tended to taper off in emerging adulthood. In addition, promotion of personal growth within the family and parents' ego development were particulary instrumental in children's ego developmental gains in adolescence. Finally, youth who demonstrated continued ego development into emerging adulthood also demonstrated heightened levels of identity exploration. (c) 2013 APA, all rights reserved.

  13. Identity development in adolescents with mental problems.

    Science.gov (United States)

    Jung, Emanuel; Pick, Oliver; Schlüter-Müller, Susanne; Schmeck, Klaus; Goth, Kirstin

    2013-07-31

    In the revision of the Diagnostic and Statistical Manual (DSM-5), "Identity" is an essential diagnostic criterion for personality disorders (self-related personality functioning) in the alternative approach to the diagnosis of personality disorders in Section III of DSM-5. Integrating a broad range of established identity concepts, AIDA (Assessment of Identity Development in Adolescence) is a new questionnaire to assess pathology-related identity development in healthy and disturbed adolescents aged 12 to 18 years. Aim of the present study is to investigate differences in identity development between adolescents with different psychiatric diagnoses. Participants were 86 adolescent psychiatric in- and outpatients aged 12 to 18 years. The test set includes the questionnaire AIDA and two semi-structured psychiatric interviews (SCID-II, K-DIPS). The patients were assigned to three diagnostic groups (personality disorders, internalizing disorders, externalizing disorders). Differences were analyzed by multivariate analysis of variance MANOVA. In line with our hypotheses, patients with personality disorders showed the highest scores in all AIDA scales with T>70. Patients with externalizing disorders showed scores in an average range compared to population norms, while patients with internalizing disorders lay in between with scores around T=60. The AIDA total score was highly significant between the groups with a remarkable effect size of f= 0.44. Impairment of identity development differs between adolescent patients with different forms of mental disorders. The AIDA questionnaire is able to discriminate between these groups. This may help to improve assessment and treatment of adolescents with severe psychiatric problems.

  14. Distorted Fingerprint Verification System

    Directory of Open Access Journals (Sweden)

    Divya KARTHIKAESHWARAN

    2011-01-01

    Full Text Available Fingerprint verification is one of the most reliable personal identification methods. Fingerprint matching is affected by non-linear distortion introduced in fingerprint impression during the image acquisition process. This non-linear deformation changes both the position and orientation of minutiae. The proposed system operates in three stages: alignment based fingerprint matching, fuzzy clustering and classifier framework. First, an enhanced input fingerprint image has been aligned with the template fingerprint image and matching score is computed. To improve the performance of the system, a fuzzy clustering based on distance and density has been used to cluster the feature set obtained from the fingerprint matcher. Finally a classifier framework has been developed and found that cost sensitive classifier produces better results. The system has been evaluated on fingerprint database and the experimental result shows that system produces a verification rate of 96%. This system plays an important role in forensic and civilian applications.

  15. Identity at work: Exploring strategies for Identity Work

    Directory of Open Access Journals (Sweden)

    Byron G. Adams

    2012-01-01

    Full Text Available Orientation: This study explored strategies for identity work that are central to the negotiation and regulation of employee work identity.Research purpose: The main aim of this study was to explore employee narratives and identify the strategies available to them in the process of identity work, as they defined themselves at work.Motivation for the study: As there is a scarcity of research on identity work in South Africa, this study wanted to advance knowledge about identity work and the strategies used for regulating and negotiating an identity at work by exploring these constructs in this context.Research design, approach and method: A qualitative research process formed the basis for this study. Nineteen employees from a global manufacturing company participated in two semi-structured in-depth interviews. Grounded theory was applied to analyse and interpret the data.Main findings: Nine strategies for identity work were identified and categorised into four broad themes (personal philosophies; relationships; career management and negotiating balance.Practical/managerial implications: Employees followed various strategies for defining themselves at work and this may have some implications for employee work engagement and productivity.Contribution/value-add: This study expands on current theoretical knowledge of identity work, and provides insights into the strategies people use to regulate and negotiate their identities at work. 

  16. Assessment of identity development and identity diffusion in adolescence - Theoretical basis and psychometric properties of the self-report questionnaire AIDA

    Directory of Open Access Journals (Sweden)

    Goth Kirstin

    2012-07-01

    Full Text Available Abstract Background In the continuing revision of Diagnostic and Statistical Manual (DSM-V “identity” is integrated as a central diagnostic criterion for personality disorders (self-related personality functioning. According to Kernberg, identity diffusion is one of the core elements of borderline personality organization. As there is no elaborated self-rating inventory to assess identity development in healthy and disturbed adolescents, we developed the AIDA (Assessment of Identity Development in Adolescence questionnaire to assess this complex dimension, varying from “Identity Integration” to “Identity Diffusion”, in a broad and substructured way and evaluated its psychometric properties in a mixed school and clinical sample. Methods Test construction was deductive, referring to psychodynamic as well as social-cognitive theories, and led to a special item pool, with consideration for clarity and ease of comprehension. Participants were 305 students aged 12–18 attending a public school and 52 adolescent psychiatric inpatients and outpatients with diagnoses of personality disorders (N = 20 or other mental disorders (N = 32. Convergent validity was evaluated by covariations with personality development (JTCI 12–18 R scales, criterion validity by differences in identity development (AIDA scales between patients and controls. Results AIDA showed excellent total score (Diffusion: α = .94, scale (Discontinuity: α = .86; Incoherence: α = .92 and subscale (α = .73-.86 reliabilities. High levels of Discontinuity and Incoherence were associated with low levels in Self Directedness, an indicator of maladaptive personality functioning. Both AIDA scales were significantly different between PD-patients and controls with remarkable effect sizes (d of 2.17 and 1.94 standard deviations. Conclusion AIDA is a reliable and valid instrument to assess normal and disturbed identity in adolescents. Studies for further

  17. Is there a right not to know one's sex? The ethics of 'gender verification' in women's sports competition.

    Science.gov (United States)

    Wiesemann, Claudia

    2011-04-01

    The paper discusses the current medical practice of 'gender verification' in sports from an ethical point of view. It takes the recent public discussion about 800 m runner Caster Semenya as a starting point. At the World Championships in Athletics 2009 in Berlin, Germany, Semenya was challenged by competitors as being a so called 'sex impostor'. A medical examination to verify her sex ensued. The author analyses whether athletes like Semenya could claim a right not to know that is generally acknowledged in human genetics and enforced by international and national genetic privacy laws. The relevance of this right for genetic diagnosis in sports is discussed. To this end, the interests of the athlete concerned and of third parties are balanced according to the expected benefits and harms.Harm is documented in a number of cases and includes unjustified disqualification, severe sex and gender identity crisis, demeaning reactions, social isolation, depression and suicide. Benefits are dubious as most cases of intersex are considered irrelevant for sports competition. It has to be concluded that the benefits to be gained from 'gender verification' in sports via genetic testing do not outweigh the grave individual disadvantages. The current practice of athletic associations to largely ignore the right of competitors not to know does not comply with prevailing ethical provisions on the protection of sensitive personal data. Therefore, genetic 'gender verification' in sports should be abolished.

  18. [Uniqueness seeking behavior as a self-verification: an alternative approach to the study of uniqueness].

    Science.gov (United States)

    Yamaoka, S

    1995-06-01

    Uniqueness theory explains that extremely high perceived similarity between self and others evokes negative emotional reactions and causes uniqueness seeking behavior. However, the theory conceptualizes similarity so ambiguously that it appears to suffer from low predictive validity. The purpose of the current article is to propose an alternative explanation of uniqueness seeking behavior. It posits that perceived uniqueness deprivation is a threat to self-concepts, and therefore causes self-verification behavior. Two levels of self verification are conceived: one based on personal categorization and the other on social categorization. The present approach regards uniqueness seeking behavior as the personal-level self verification. To test these propositions, a 2 (very high or moderate similarity information) x 2 (with or without outgroup information) x 2 (high or low need for uniqueness) between-subject factorial-design experiment was conducted with 95 university students. Results supported the self-verification approach, and were discussed in terms of effects of uniqueness deprivation, levels of self-categorization, and individual differences in need for uniqueness.

  19. Malingering dissociative identity disorder: objective and projective assessment.

    Science.gov (United States)

    Labott, Susan M; Wallach, Heather R

    2002-04-01

    Verification of dissociative identity disorder presents challenges given the complex nature of the illness. This study addressed the concern that this disorder can be successfully malingered on objective and projective psychological tests. 50 undergraduate women were assigned to a Malingering or a Control condition, then completed the Rorschach Inkblot Test and the Dissociative Experiences Scale II. The Malingering group were asked to simulate dissociative identity disorder; controls received instructions to answer all materials honestly. Analysis indicated that malingerers were significantly more likely to endorse dissociative experiences on the Dissociative Experiences Scale II in the range common to patients with diagnosed dissociative identity disorder. However, on the Rorschach there were no significant differences between the two groups. Results suggest that the assessment of dissociative identity disorder requires a multifaceted approach with both objective and projective assessment tools. Research is needed to assess these issues in clinical populations.

  20. Patient Perceptions of Illness Identity in Cancer Clinical Trial Decision-Making.

    Science.gov (United States)

    Palmer-Wackerly, Angela L; Dailey, Phokeng M; Krok-Schoen, Jessica L; Rhodes, Nancy D; Krieger, Janice L

    2018-08-01

    When patients are diagnosed with cancer, they begin to negotiate their illness identity in relation to their past and future selves, their relationships, and their group memberships. Thus, how patients view their cancer in relation to their other identities may affect how and why they make particular decisions about treatment options. Using the Communication Theory of Identity (CTI), the current study explores: (1) how and why illness identity is framed across identity layers in relation to one particular cancer treatment: participation in a cancer clinical trial (CT); and (2) how and why patients experience identity conflicts while making their treatment decisions. Semi-structured, in-depth interviews were analyzed for 46 cancer patients who were offered a CT. Results of a grounded theory analysis indicated that patients expressed separate identity frames (e.g., personal, relational, and communal), aligned identity frames (e.g., personal and communal), and identity conflicts (e.g., personal-personal). This study theoretically shows how and why patient illness identity relates to cancer treatment decision-making as well as how and why patients relate (and conflict) with the cancer communal identity frame. Practical implications include how healthcare providers and family members can support patient decision-making through awareness of and accommodating to identity shifts.

  1. Dissociative identity disorder: a controversial diagnosis.

    Science.gov (United States)

    Gillig, Paulette Marie

    2009-03-01

    A brief description of the controversies surrounding the diagnosis of dissociative identity disorder is presented, followed by a discussion of the proposed similarities and differences between dissociative identity disorder and borderline personality disorder. The phenomenon of autohypnosis in the context of early childhood sexual trauma and disordered attachment is discussed, as is the meaning of alters or alternate personalities. The author describes recent neurosciences research that may relate the symptoms of dissociative identity disorder to demonstrable disordered attention and memory processes. A clinical description of a typical patient presentation is included, plus some recommendations for approaches to treatment.

  2. Keeping identity private

    DEFF Research Database (Denmark)

    Adjei, Joseph K.; Olesen, Henning

    2011-01-01

    information. On the other hand, consumers have expressed concerns that their rights and ability to control their personal information are violated. Paradoxically, it appears that users provide personal data freely and willingly, as it has been observed on Facebook and other social networks. This study...... is an attempt to understand the relationship between individuals’ intentions to disclose personal information, their actual personal information disclosure behaviours, and how these can be leveraged to develop privacy-enhancing identity management systems (IDMS) that users can trust. Legal, regu...

  3. A Secure Framework for Location Verification in Pervasive Computing

    Science.gov (United States)

    Liu, Dawei; Lee, Moon-Chuen; Wu, Dan

    The way people use computing devices has been changed in some way by the relatively new pervasive computing paradigm. For example, a person can use a mobile device to obtain its location information at anytime and anywhere. There are several security issues concerning whether this information is reliable in a pervasive environment. For example, a malicious user may disable the localization system by broadcasting a forged location, and it may impersonate other users by eavesdropping their locations. In this paper, we address the verification of location information in a secure manner. We first present the design challenges for location verification, and then propose a two-layer framework VerPer for secure location verification in a pervasive computing environment. Real world GPS-based wireless sensor network experiments confirm the effectiveness of the proposed framework.

  4. A Blockchain Ecosystem for Digital Identity: Improving Service Delivery in Canada’s Public and Private Sectors

    Directory of Open Access Journals (Sweden)

    Greg Wolfond

    2017-10-01

    Full Text Available Blockchain-based solutions have the potential to make government operations more efficient and improve the delivery of services in the public and private sectors. Identity verification and authentication technologies, as one of the applications of blockchain-based solutions – and the focus of our own efforts at SecureKey Technologies – have been critical components in service delivery in both sectors due to their power to increase trust between citizens and the services they access. To convert trust into solid value added, identities must be validated through highly-reliable technologies, such as blockchain, that have the capacity to reduce cost and fraud and to simplify the experience for customers while also keeping out the bad actors. With identities migrating to digital platforms, organizations and citizens need to be able to transact with reduced friction even as more counter-bound services move to online delivery. In this article, drawing on our own experiences with an ecosystem approach to digital identity, we describe the potential value of using blockchain technology to address the present and future challenges of identity verification and authentication within a Canadian context.

  5. Daily dynamics of personal identity and self-concept clarity

    NARCIS (Netherlands)

    Schwartz, S.J.; Klimstra, T.A.; Luyckx, K.; Hale, W.W.; Frijns, T.; Oosterwegel, A.; van Lier, P.A.C.; Koot, H.M.; Meeus, W.H.J.

    2011-01-01

    We examined the daily dynamics among self-concept clarity and identity processes, and their effects on distress, among a sample of 580 Dutch adolescents. Participants completed measures of identity, self-concept clarity, anxiety and depression at annual intervals; and daily single-item measures of

  6. 78 FR 4408 - Privacy Act of 1974, as Amended; System of Records

    Science.gov (United States)

    2013-01-22

    ... FDIC 30-64-0035, Identity, Credential and Access Management Records. We hereby publish this notice for... Web page. The Identity, Credential and Access Management Records system will contain records collected or generated in the process of producing Personal Identity Verification (PIV) cards issued by the...

  7. Gender identity and sport: is the playing field level?

    Science.gov (United States)

    Reeser, J C

    2005-10-01

    This review examines gender identity issues in competitive sports, focusing on the evolution of policies relating to female gender verification and transsexual participation in sport. The issues are complex and continue to challenge sport governing bodies, including the International Olympic Committee, as they strive to provide a safe environment in which female athletes may compete fairly and equitably.

  8. Teacher Identity in Language Teaching: Integrating Personal, Contextual, and Professional Factors

    Science.gov (United States)

    Pennington, Martha C.; Richards, Jack C.

    2016-01-01

    This article reviews notions of identity and teacher identity, how these relate to the specific characteristics of language teaching, and how teacher identity can evolve or be developed through experience and teacher education. The notion of teacher identity highlights the individual characteristics of the teacher and how these are integrated with…

  9. Intersecting Sexual, Gender, and Professional Identities among Social Work Students: The Importance of Identity Integration

    Science.gov (United States)

    Craig, Shelley L.; Iacono, Gio; Paceley, Megan S.; Dentato, Michael P.; Boyle, Kerrie E. H.

    2017-01-01

    Discrimination toward lesbian, gay, bisexual, transgender, and queer (LGBTQ) social work students can negatively affect academic performance and personal and professional identity development. Intersectionality is a conceptual approach that states that social identities interact to form different meanings and experiences from those that could be…

  10. 29 CFR 2400.6 - Procedures for requesting records.

    Science.gov (United States)

    2010-07-01

    ... mail shall establish his identity by a signature, address, date of birth, place of birth, employee... such inquiry. (b) Verification of identity. The following standards are applicable to any individual... person may establish his identity by the presentation of a single document bearing a photograph (such as...

  11. Image Processing Based Signature Verification Technique to Reduce Fraud in Financial Institutions

    Directory of Open Access Journals (Sweden)

    Hussein Walid

    2016-01-01

    Full Text Available Handwritten signature is broadly utilized as personal verification in financial institutions ensures the necessity for a robust automatic signature verification tool. This tool aims to reduce fraud in all related financial transactions’ sectors. This paper proposes an online, robust, and automatic signature verification technique using the recent advances in image processing and machine learning. Once the image of a handwritten signature for a customer is captured, several pre-processing steps are performed on it including filtration and detection of the signature edges. Afterwards, a feature extraction process is applied on the image to extract Speeded up Robust Features (SURF and Scale-Invariant Feature Transform (SIFT features. Finally, a verification process is developed and applied to compare the extracted image features with those stored in the database for the specified customer. Results indicate high accuracy, simplicity, and rapidity of the developed technique, which are the main criteria to judge a signature verification tool in banking and other financial institutions.

  12. Social Identity in People with Multiple Sclerosis: An Examination of Family Identity and Mood.

    Science.gov (United States)

    Barker, Alex B; Lincoln, Nadina B; Hunt, Nigel; dasNair, Roshan

    2018-01-01

    Mood disorders are highly prevalent in people with multiple sclerosis (MS). MS causes changes to a person's sense of self. The Social Identity Model of Identity Change posits that group membership can have a positive effect on mood during identity change. The family is a social group implicated in adjustment to MS. The objectives of this study were to investigate whether family identity can predict mood in people with MS and to test whether this prediction was mediated by social support and connectedness to others. This cross-sectional survey of 195 participants comprised measures of family identity, family social support, connectedness to others, and mood. Family identity predicted mood both directly and indirectly through parallel mediators of family social support and connectedness to others. Family identity predicted mood as posited by the Social Identity Model of Identity Change. Involving the family in adjustment to MS could reduce low mood.

  13. Fingerprint recognition with identical twin fingerprints.

    Science.gov (United States)

    Tao, Xunqiang; Chen, Xinjian; Yang, Xin; Tian, Jie

    2012-01-01

    Fingerprint recognition with identical twins is a challenging task due to the closest genetics-based relationship existing in the identical twins. Several pioneers have analyzed the similarity between twins' fingerprints. In this work we continue to investigate the topic of the similarity of identical twin fingerprints. Our study was tested based on a large identical twin fingerprint database that contains 83 twin pairs, 4 fingers per individual and six impressions per finger: 3984 (83*2*4*6) images. Compared to the previous work, our contributions are summarized as follows: (1) Two state-of-the-art fingerprint identification methods: P071 and VeriFinger 6.1 were used, rather than one fingerprint identification method in previous studies. (2) Six impressions per finger were captured, rather than just one impression, which makes the genuine distribution of matching scores more realistic. (3) A larger sample (83 pairs) was collected. (4) A novel statistical analysis, which aims at showing the probability distribution of the fingerprint types for the corresponding fingers of identical twins which have same fingerprint type, has been conducted. (5) A novel analysis, which aims at showing which finger from identical twins has higher probability of having same fingerprint type, has been conducted. Our results showed that: (a) A state-of-the-art automatic fingerprint verification system can distinguish identical twins without drastic degradation in performance. (b) The chance that the fingerprints have the same type from identical twins is 0.7440, comparing to 0.3215 from non-identical twins. (c) For the corresponding fingers of identical twins which have same fingerprint type, the probability distribution of five major fingerprint types is similar to the probability distribution for all the fingers' fingerprint type. (d) For each of four fingers of identical twins, the probability of having same fingerprint type is similar.

  14. Fingerprint recognition with identical twin fingerprints.

    Directory of Open Access Journals (Sweden)

    Xunqiang Tao

    Full Text Available Fingerprint recognition with identical twins is a challenging task due to the closest genetics-based relationship existing in the identical twins. Several pioneers have analyzed the similarity between twins' fingerprints. In this work we continue to investigate the topic of the similarity of identical twin fingerprints. Our study was tested based on a large identical twin fingerprint database that contains 83 twin pairs, 4 fingers per individual and six impressions per finger: 3984 (83*2*4*6 images. Compared to the previous work, our contributions are summarized as follows: (1 Two state-of-the-art fingerprint identification methods: P071 and VeriFinger 6.1 were used, rather than one fingerprint identification method in previous studies. (2 Six impressions per finger were captured, rather than just one impression, which makes the genuine distribution of matching scores more realistic. (3 A larger sample (83 pairs was collected. (4 A novel statistical analysis, which aims at showing the probability distribution of the fingerprint types for the corresponding fingers of identical twins which have same fingerprint type, has been conducted. (5 A novel analysis, which aims at showing which finger from identical twins has higher probability of having same fingerprint type, has been conducted. Our results showed that: (a A state-of-the-art automatic fingerprint verification system can distinguish identical twins without drastic degradation in performance. (b The chance that the fingerprints have the same type from identical twins is 0.7440, comparing to 0.3215 from non-identical twins. (c For the corresponding fingers of identical twins which have same fingerprint type, the probability distribution of five major fingerprint types is similar to the probability distribution for all the fingers' fingerprint type. (d For each of four fingers of identical twins, the probability of having same fingerprint type is similar.

  15. Who commits virtual identity suicide? Differences in privacy concerns, Internet addiction, and personality between Facebook users and quitters.

    Science.gov (United States)

    Stieger, Stefan; Burger, Christoph; Bohn, Manuel; Voracek, Martin

    2013-09-01

    Social networking sites such as Facebook attract millions of users by offering highly interactive social communications. Recently, a counter movement of users has formed, deciding to leave social networks by quitting their accounts (i.e., virtual identity suicide). To investigate whether Facebook quitters (n=310) differ from Facebook users (n=321), we examined privacy concerns, Internet addiction scores, and personality. We found Facebook quitters to be significantly more cautious about their privacy, having higher Internet addiction scores, and being more conscientious than Facebook users. The main self-stated reason for committing virtual identity suicide was privacy concerns (48 percent). Although the adequacy of privacy in online communication has been questioned, privacy is still an important issue in online social communications.

  16. Phantoms for IMRT dose distribution measurement and treatment verification

    International Nuclear Information System (INIS)

    Low, Daniel A.; Gerber, Russell L.; Mutic, Sasa; Purdy, James A.

    1998-01-01

    Background: The verification of intensity-modulated radiation therapy (IMRT) patient treatment dose distributions is currently based on custom-built or modified dose measurement phantoms. The only commercially available IMRT treatment planning and delivery system (Peacock, NOMOS Corp.) is supplied with a film phantom that allows accurate spatial localization of the dose distribution using radiographic film. However, measurements using other dosimeters are necessary for the thorough verification of IMRT. Methods: We have developed a phantom to enable dose measurements using a cylindrical ionization chamber and the localization of prescription isodose curves using a matrix of thermoluminescent dosimetry (TLD) chips. The external phantom cross-section is identical to that of the commercial phantom, to allow direct comparisons of measurements. A supplementary phantom has been fabricated to verify the IMRT dose distributions for pelvis treatments. Results: To date, this phantom has been used for the verification of IMRT dose distributions for head and neck and prostate cancer treatments. Designs are also presented for a phantom insert to be used with polymerizing gels (e.g., BANG-2) to obtain volumetric dose distribution measurements. Conclusion: The phantoms have proven useful in the quantitative evaluation of IMRT treatments

  17. Rights of Identity

    Directory of Open Access Journals (Sweden)

    Daniel Kofman

    2017-01-01

    Full Text Available A person’s identity is their sense of who and what they are, of who stands in significant relations to them, and of what is valuable to them. This is inevitably very broad, an immediate implication of which is that the concept of identity taken alone cannot do significant normative work. In some cases a person’s identity is bound up with the evil that they do or wish to do, and cannot thereby give them any right to do it. In other cases very powerful elements of a person’s identity – such as their attachment to loved ones – is certainly related to important rights, but it is not entirely clear that one needs the concept of identity to explicate or justify these rights; the deep involvement of their identity is arguably a byproduct of other important values in these cases (such as love, and those values can do the grounding work of the rights by themselves and more simply and clearly. Nevertheless, when suitably qualified, a person’s identity is central to accounting for important political rights. These ranges from rights to participate in cultural practices of one’s group, which sometimes implies duties on governments to support minorities threatened with extinction, to – at the outer limit – rights to arrange political administration. These rights are connected to both autonomy and fairness. Cultural rights are often taken either to be opposed to autonomy, or at best instrumental to personal autonomy (by providing ‘options’, but in fact, the ideal of autonomy, expressed by Mill as being the author of one’s life, requires that one be in control of significant aspects of one’s identity. Significant aspects of one’s identity are collectively determined within a culture. Cultures are not static, and their development is particularly affected by political boundaries. A fundamental right of autonomy implies, therefore, that groups be allowed, within reasonable constraints of general feasibility and stability, to arrange

  18. Writer Identification and Verification from Intra-variable Individual Handwriting

    OpenAIRE

    Adak, Chandranath; Chaudhuri, Bidyut B.; Blumenstein, Michael

    2017-01-01

    The handwriting of an individual may vary excessively with many factors such as mood, time, space, writing speed, writing medium, utensils etc. Therefore, it becomes more challenging to perform automated writer verification/ identification on a particular set of handwritten patterns (e.g. speedy handwriting) of a person, especially when the system is trained using a different set of writing patterns (e.g. normal/medium speed) of that same person. However, it would be interesting to experiment...

  19. The Use of Personal Identity Numbers in Sweden and Denmark: A Barrier to Union Citizens' Enjoyment of Free Movement Rights?

    DEFF Research Database (Denmark)

    Hyltén-Cavallius, Katarina

    2015-01-01

    The paper of Katarina Hyltén-Cavallius focuses on personal identity numbers in Sweden and Denmark. This paper looks into formal and informal structures, which organise society in a host member state and which can make it difficult for a non-national Union citizen to, in practice, access public an...

  20. Motivation for helping behavior after the floods in 2014: The role of personality and national identity

    Directory of Open Access Journals (Sweden)

    Otašević Biljana

    2014-01-01

    Full Text Available The severe floods, which struck Serbia in May 2014, inflicted enormous material damage and forced tens of thousands of people to leave their homes. The goal of this research was to investigate the motivation of citizens who helped, i.e. to establish the predictors of the motivation for helping behavior as well as its effects on different ways of providing help. Volunteer Functions Inventory, National Identity Scale, Big Five Inventory, and Helping Behavior Questionnaire were applied to the sample of 183 people who provided the flood victims with help. Multivariate analysis of covariance, where the predictors were gender, the prior acquaintance with the victims, six volunteer functions (Social, Understanding, Protective, Enhancement, Values, Career, age, education and financial status, while the criteria were dimensions of helping behavior, shows that the model provides statistically significant explanation of all dimensions of helping behavior, where the Social Motives and Understanding have significant multivariate effects. MANCOVA was used for establishing the predictors of helping motivation. Along with the control variables from the first analysis, the predictors were Big Five personality traits and national identity, and the criteria were 6 volunteer functions. The results showed significant multivariate effects of Openness, Agreeableness, Extraversion and national identity. Practical and theoretical implications are discussed.

  1. ECG Sensor Verification System with Mean-Interval Algorithm for Handling Sport Issue

    Directory of Open Access Journals (Sweden)

    Kuo-Kun Tseng

    2016-01-01

    Full Text Available With the development of biometric verification, we proposed a new algorithm and personal mobile sensor card system for ECG verification. The proposed new mean-interval approach can identify the user quickly with high accuracy and consumes a small amount of flash memory in the microprocessor. The new framework of the mobile card system makes ECG verification become a feasible application to overcome the issues of a centralized database. For a fair and comprehensive evaluation, the experimental results have been tested on public MIT-BIH ECG databases and our circuit system; they confirm that the proposed scheme is able to provide excellent accuracy and low complexity. Moreover, we also proposed a multiple-state solution to handle the heat rate changes of sports problem. It should be the first to address the issue of sports in ECG verification.

  2. Perceived Parenting Dimensions and Identity Styles: Exploring the Socialization of Adolescents' Processing of Identity-Relevant Information

    Science.gov (United States)

    Smits, Ilse; Soenens, Bart; Luyckx, Koen; Duriez, Bart; Berzonsky, Michael; Goossens, Luc

    2008-01-01

    This study examined the relationships between crucial dimensions of perceived parenting (support, behavioral control, and psychological control) and the three identity styles defined by Berzonsky [Berzonsky, M. D. (1990). "Self-construction over the life span: A process perspective on identity formation." "Advances in Personal Construct…

  3. Motivation and Justice at Work: The Role of Emotion and Cognition Components of Personal and Collective Work Identity

    OpenAIRE

    Ola Nordhall; Ola Nordhall; Igor Knez

    2018-01-01

    The aim of this study was to investigate the role of personal and collective work identity (including emotion and cognition components), in predicting work motivation (operationalized as work self-determined motivation) and organizational justice (operationalized as organizational pay justice). Digitized questionnaires were distributed by e-mail to 2905 members, teachers, of a Swedish trade union. A total of 768 individuals answered the questionnaire and by that participated in this study. Pe...

  4. A bimodal verification cryptosystem as a framework against spoofing attacks

    OpenAIRE

    Toli, Christina-Angeliki; Preneel, Bart

    2015-01-01

    The exponential growth of immigration crisis and the recent terrorism cases revealed the increase of fraud occurrences, cloning and identity theft with numerous social, economic and political consequences. The trustworthiness of biometrics during verification processes has been compromised by spoofing attackers sprang up to exploit the security gaps. Additionally, the cryptography’s role in the area is highly important as it may promote fair assessment procedures and foster public trust by se...

  5. 32 CFR Appendix B to Part 324 - System of Records Notice

    Science.gov (United States)

    2010-07-01

    ..., punctuation, and spaces. 2. Security classification. Self explanatory. (DoD does not publish this caption... birth, etc.); and any description of proof of identity for verification purposes required for personal... verification. If appropriate, the individual may be referred to the system manager or another DFAS official who...

  6. 76 FR 45902 - Agency Information Collection Activities: Proposed Request and Comment Request

    Science.gov (United States)

    2011-08-01

    ... will allow our users to maintain one User ID, consisting of a self-selected Username and Password, to...) Registration and identity verification; (2) enhancement of the User ID; and (3) authentication. The...- person identification verification process for individuals who cannot or are not willing to register...

  7. [Background and practical use of the assessment of identity development in adolescence (AIDA)].

    Science.gov (United States)

    Birkhölzer, Marc; Goth, Kirstin; Schrobildgen, Christian; Schmeck, Klaus; Schlüter-Müller, Susanne

    2015-01-01

    A paradigm shift towards early detection and intervention of personality disorders in adolescence to prevent persistent and chronic suffering is currently taking place. Aside further distinct areas of impaired psychosocial integrity, disturbed identity development is seen as one core component of personality disorders. Thus, the detection of early antecedents of impaired identity development is an important step to allow for early intervention. The self-report questionnaire Assessment of Identity Development in Adolescence (AIDA) is a reliable and valid diagnostic instrument to detect disturbed identity development. This questionnaire allows for global assessment of identity and a differentiation in fundamental subdomains as well and distinguishes between identity diffusion on one side and consolidated and stable identity on the other. In clinical practice, it supports the differentiation between severely disturbed identity as the core component of personality disorders and identity crisis or stable identity development that can be found in other mental disorders.

  8. 45 CFR 613.2 - Requesting access to records.

    Science.gov (United States)

    2010-10-01

    ... and/or date and place of birth of the individual; (2) Your own identity, as required in paragraph (c...) Verification of identity. When requesting access to records about yourself, NSF requires that you verify your identity in an appropriate fashion. Individuals appearing in person should be prepared to show reasonable...

  9. 22 CFR 50.9 - Card of identity.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Card of identity. 50.9 Section 50.9 Foreign... of United States Nationality of a Person Abroad § 50.9 Card of identity. When authorized by the Department, consular offices or designated nationality examiners may issue a card of identity for travel to...

  10. [Psychological features of body integrity identity disorder (BIID): personality traits, interpersonal aspects, coping mechanisms regarding stress and conflicts, body perception].

    Science.gov (United States)

    Oddo, S; Möller, J; Skoruppa, S; Stirn, A

    2014-05-01

    In BIID a disorder of body identity, concerned subjects desire an amputation of a healthy limb. So far, no psychiatric comorbidity was found in the few studies on BIID-subjects. This study explored clinical symptoms, personality characteristics, interpersonal aspects and coping strategies in 15 BIID persons. Psychometric testing on the topics (1) clinical symptoms, (2) personality and interpersonal aspects, (3) coping strategies, (4) attitudes towards the body were used and statistically evaluated with the T-test for one sample. Some psychopathologies such as depression, anxiety and obsessive-compulsive disorders (OCD) could be excluded although an increased tendency of depressiveness was found. BIID subjects showed specific personality and interpersonal characteristics: high agreeableness, autonomy, autarky and restrained behaviour towards others. Stress and conflicts are managed by self-control and self-affirmation. Their subjective physical attractiveness was low. BIID persons do not exhibit psychopathological characteristics (such as anxiety, depression or OCD), but do show specifics in personality, relationships and coping mechanisms. In the future, further personality traits and personality disorders should be investigated to shed more light on the categorisation and treatment of BIID. © Georg Thieme Verlag KG Stuttgart · New York.

  11. E-Visas Verification Schemes Based on Public-Key Infrastructure and Identity Based Encryption

    OpenAIRE

    Najlaa A. Abuadhmah; Muawya Naser; Azman Samsudin

    2010-01-01

    Problem statement: Visa is a very important travelling document, which is an essential need at the point of entry of any country we are visiting. However an important document such as visa is still handled manually which affects the accuracy and efficiency of processing the visa. Work on e-visa is almost unexplored. Approach: This study provided a detailed description of a newly proposed e-visa verification system prototyped based on RFID technology. The core technology of the proposed e-visa...

  12. Vocations as a source of identity: reciprocal relations between Big Five personality traits and RIASEC characteristics over 15 years.

    Science.gov (United States)

    Wille, Bart; De Fruyt, Filip

    2014-03-01

    Although work is a core part of life, the direction of influence from personality to work has typically been conceived as only unidirectional. The present study aims to contribute to the literature by considering reciprocal relations between personality and occupational characteristics, drawing on current perspectives from personality psychology (i.e., the social investment principle) and using a well-established framework to conceptualize career development (i.e., Holland's RIASEC theory). For this purpose, a longitudinal cohort of college alumni (N = 266) was tracked across a substantial and significant period in their professional career. Big Five personality traits and RIASEC occupational characteristics were assessed at the career start and 15 years later when their careers had unfolded. A combination of observed and latent variable analyses were used to disentangle the longitudinal and reciprocal relations between traits and occupational characteristics. Our results indicate that personality shapes and is shaped by our vocational experiences, suggesting that work can be a source of identity. The implications for theory and research on personality in the industrial and organizational literature are discussed alongside a number of practical implications for organizational and counseling settings.

  13. 75 FR 57333 - Privacy Act of 1974; Republication of Systems of Records Notices

    Science.gov (United States)

    2010-09-20

    ... Fitness Center Records--NRC. 45. Digital Certificates for Personal Identity Verification Records--NRC... business telephone numbers, citizenship, educational history, employment history, professional society...

  14. How Multiple Social Identities Are Related to Creativity.

    Science.gov (United States)

    Steffens, Niklas K; Gocłowska, Małgorzata A; Cruwys, Tegan; Galinsky, Adam D

    2016-02-01

    The present research examined whether possessing multiple social identities (i.e., groups relevant to one's sense of self) is associated with creativity. In Study 1, the more identities individuals reported having, the more names they generated for a new commercial product (i.e., greater idea fluency). In Study 2, multiple identities were associated with greater fluency and originality (mediated by cognitive flexibility, but not by persistence). Study 3 validated these findings using a highly powered sample. We again found that multiple identities increase fluency and originality, and that flexibility (but not persistence) mediated the effect on originality. Study 3 also ruled out several alternative explanations (self-affirmation, novelty seeking, and generalized persistence). Across all studies, the findings were robust to controlling for personality, and there was no evidence of a curvilinear relationship between multiple identities and creativity. These results suggest that possessing multiple social identities is associated with enhanced creativity via cognitive flexibility. © 2015 by the Society for Personality and Social Psychology, Inc.

  15. Biometric Authentication System on Mobile Personal Devices

    NARCIS (Netherlands)

    Tao, Q.; Veldhuis, Raymond N.J.

    We propose a secure, robust, and low-cost biometric authentication system on the mobile personal device for the personal network. The system consists of the following five key modules: 1) face detection; 2) face registration; 3) illumination normalization; 4) face verification; and 5) information

  16. Retail applications of signature verification

    Science.gov (United States)

    Zimmerman, Thomas G.; Russell, Gregory F.; Heilper, Andre; Smith, Barton A.; Hu, Jianying; Markman, Dmitry; Graham, Jon E.; Drews, Clemens

    2004-08-01

    The dramatic rise in identity theft, the ever pressing need to provide convenience in checkout services to attract and retain loyal customers, and the growing use of multi-function signature captures devices in the retail sector provides favorable conditions for the deployment of dynamic signature verification (DSV) in retail settings. We report on the development of a DSV system to meet the needs of the retail sector. We currently have a database of approximately 10,000 signatures collected from 600 subjects and forgers. Previous work at IBM on DSV has been merged and extended to achieve robust performance on pen position data available from commercial point of sale hardware, achieving equal error rates on skilled forgeries and authentic signatures of 1.5% to 4%.

  17. BAVP: Blockchain-Based Access Verification Protocol in LEO Constellation Using IBE Keys

    OpenAIRE

    Wei, Songjie; Li, Shuai; Liu, Peilong; Liu, Meilin

    2018-01-01

    LEO constellation has received intensive research attention in the field of satellite communication. The existing centralized authentication protocols traditionally used for MEO/GEO satellite networks cannot accommodate LEO satellites with frequent user connection switching. This paper proposes a fast and efficient access verification protocol named BAVP by combining identity-based encryption and blockchain technology. Two different key management schemes with IBE and blockchain, respectively...

  18. Advanced verification topics

    CERN Document Server

    Bhattacharya, Bishnupriya; Hall, Gary; Heaton, Nick; Kashai, Yaron; Khan Neyaz; Kirshenbaum, Zeev; Shneydor, Efrat

    2011-01-01

    The Accellera Universal Verification Methodology (UVM) standard is architected to scale, but verification is growing and in more than just the digital design dimension. It is growing in the SoC dimension to include low-power and mixed-signal and the system integration dimension to include multi-language support and acceleration. These items and others all contribute to the quality of the SOC so the Metric-Driven Verification (MDV) methodology is needed to unify it all into a coherent verification plan. This book is for verification engineers and managers familiar with the UVM and the benefits it brings to digital verification but who also need to tackle specialized tasks. It is also written for the SoC project manager that is tasked with building an efficient worldwide team. While the task continues to become more complex, Advanced Verification Topics describes methodologies outside of the Accellera UVM standard, but that build on it, to provide a way for SoC teams to stay productive and profitable.

  19. Relations I – other as modus of identity

    Directory of Open Access Journals (Sweden)

    O. B. Sinkevych

    2016-11-01

    Full Text Available One of the most important modes of formation of identity are the relationships I­Other. In collaboration with Other I acquires social recognition and affirmation of their identity. The relationship I­Other largely defined the boundaries of self. But in an age of mass culture, these boundaries are defined externally: mass media form the man, internal space of which is devoid of value­meaning centre, blurred. Thus man is deprived of individual person and turns into a mass media stereotype. In this situation, the protection of borders of self becomes one of the urgent problems in the process of formation of personal identity. The formation of identity requires internal dialogue, reflection and introspection. Mass culture tends to eliminate the drama of the inner life of the individual, to free the person from the need to find an answer to complex questions. It offers simple and clear explanations of the problems of existence and thus deprives the individual possibilities of self­knowledge, self­correction. This trend, which is defined as interpassivity, manifested in the unwillingness and inability to make decisions, to make an informed choice, put it into action. Its consequence is also a deformation of the self­identification of the individual. Identity is formed and through the mechanism of self­identification with the standard, sample, an ideal. The image of the ideal I, to which the person is a vector indicating the direction of its development, the building of «future me». Such a standard in culture have traditionally been the «existential Other» – person that by its uniqueness serves the guide for self­development of the individual. Characteristic of popular culture the substitution the ideal of «Idol» deprives the individual of the required vector of self­development. The loss of the completeness relations I­Other, typical for the era of mass culture, turns into a crisis of personal identity. The desire and ability to

  20. Compressive sensing using optimized sensing matrix for face verification

    Science.gov (United States)

    Oey, Endra; Jeffry; Wongso, Kelvin; Tommy

    2017-12-01

    Biometric appears as one of the solutions which is capable in solving problems that occurred in the usage of password in terms of data access, for example there is possibility in forgetting password and hard to recall various different passwords. With biometrics, physical characteristics of a person can be captured and used in the identification process. In this research, facial biometric is used in the verification process to determine whether the user has the authority to access the data or not. Facial biometric is chosen as its low cost implementation and generate quite accurate result for user identification. Face verification system which is adopted in this research is Compressive Sensing (CS) technique, in which aims to reduce dimension size as well as encrypt data in form of facial test image where the image is represented in sparse signals. Encrypted data can be reconstructed using Sparse Coding algorithm. Two types of Sparse Coding namely Orthogonal Matching Pursuit (OMP) and Iteratively Reweighted Least Squares -ℓp (IRLS-ℓp) will be used for comparison face verification system research. Reconstruction results of sparse signals are then used to find Euclidean norm with the sparse signal of user that has been previously saved in system to determine the validity of the facial test image. Results of system accuracy obtained in this research are 99% in IRLS with time response of face verification for 4.917 seconds and 96.33% in OMP with time response of face verification for 0.4046 seconds with non-optimized sensing matrix, while 99% in IRLS with time response of face verification for 13.4791 seconds and 98.33% for OMP with time response of face verification for 3.1571 seconds with optimized sensing matrix.

  1. VOICES-POSITIONS IN DISCOURSES: HOW IS IDENTITY POSSIBLE?

    Directory of Open Access Journals (Sweden)

    T. V. Podolska

    2017-06-01

    Full Text Available The article is devoted to the question of identity of a modern man which constantly emerges as a powerful wave and is brought up to date with new force. Thus, continuing scientific research on identity and individual identity are being held, but from a different point of view, i.e. by using modernized methodology. The purpose of the research is to substantiate scientific approaches, epistemological coordinate changes, and critical trends in the issue of identity that would allow solving the problems of nature of a modern person being. In this respect the narrative approach is considered to be up-to-date. Methodology. Interdisciplinary research perspective allowed using a comprehensive methodology where, complementing each other, there are phenomenological, cultural, anthropological, hermeneutic, systematic, historical and genetic methods and method historical-philosophical and socio-cultural comparative studies. Originality. Personal being occurs in time, and it’s the narrative method, the main feature of which is its temporality and extension, that can involve all of us to self-understanding on the basis of certain turning points in our history. The compliance with relevant ethical standards in dealing with other people, and requirements of certain supra-individual structures properly correlates with our least resistant inner world view and outlook. As the narrative identity exists in the subjective sense of time, experience and understanding of the events of life, thus, despite the ontogenetic secondary of the personal identity with respect to the social one, the domination of the former one is more probable. Conclusions. The adoption of such an understanding of identity by everyone signifies a high degree of responsibility for self-constructing, which implicitly assumes not just to say “I”, but first of all to define your being as a certain social debt: to another person, to society, its history and everyday life through which we get a

  2. Identity related to living situation in six individuals with congenital quadriplegia.

    Science.gov (United States)

    Robey, Kenneth L

    2008-01-01

    This study was a preliminary examination of structural aspects of identity, particularly identity associated with living situation, in individuals who have quadriplegia due to cerebral palsy. A hierarchical classes algorithm (HICLAS) was used to construct idiographic 'identity structure' models for three individuals who are living in an inpatient hospital setting and for three individuals living in community-based group residences. Indices derived from the models indicate that the identity 'myself as one who has a disability' was structurally superordinate (i.e., resided at a high hierarchical level) for all six participants, suggesting a high level of importance of this identity in participants' sense of self. The models also indicate that while identity associated with one's particular living situation was superordinate for persons living in the hospital, it was not for persons living in community residences. While conclusions based on this small sample are necessarily limited, the data suggest that identity associated with living situation might differ in structural centrality, and presumably subjective importance, for persons living in inpatient versus community-based settings.

  3. Identity disorder and social-psychological adaptation in patients with hepatobiliary disease

    Directory of Open Access Journals (Sweden)

    V. V. Khramtsova

    2017-12-01

    Full Text Available Negative bodily experience due to health complications and disability is perceived as a difficult life situation. The success of adaptation, commitment to treatment and cooperation with a doctor depend on the personality characteristics that define behavioral representations. Aim. Investigate the structure of identity and mechanisms of social-psychological adaptation of patients with the hepatobiliary system disease. Contingent and methods. 75 patients with a diffuse liver disease - chronic hepatitis, mostly of viral etiology (36 people and liver cirrhosis (39 patients have been examined. We have applied clinical, clinical-psychological, mathematical and empirical methods, semi-structured cross-interviews ("patient-doctor", "patient-psychologist", diagnostics of personal characteristics, identity structure, social-psychological components of adaptation. Three leading personality profiles have been highlighted. Results. Persons with a disharmonious personality development are characterized by disorders in the area of identity formation and development. Fragmentation, the impossibility of personal integration and severe penetrability from the environment contribute to social-psychological maladjustment. The coping is aimed at preserving the problem situation and intensifying the intrapersonal conflict. For persons with difficulties in the adaptation of the personality, a violation of activity interaction with the surrounding world is characteristic, a ban on one's self-identity. Social adaptation is often disrupted due to instability in the emotional-volitional sphere and choosing low-adaptive coping strategies. Genuine "I" and identity formation is impeded for the individuals suppressing aggressive impulses. Adaptability tends to be discrete. With mental stress increasing, the likelihood of choosing low-adaptive coping strategies increases. Conclusions. When drafting psycho-correction programs and medical treatment of people with a hepatobiliary

  4. The Significance of Mandatory Data Breach Warnings to Identity Crime

    OpenAIRE

    Eric Holm; Geraldine Mackenzie

    2015-01-01

    The relationship between data breaches and identity crime has been scarcely explored in current literature. However, there is an important relationship between the misuse of personal identification information and identity crime as the former is in many respects the catalyst for the latter. Data breaches are one of the ways in which this personal identification information is obtained by identity criminals, and thereby any response to data breaches is likely to impact the incidence of identit...

  5. Academic identities of black female first-year students

    African Journals Online (AJOL)

    Erna Kinsey

    sense of security, confidence, self-esteem and identity. South Africa is ... own personal manner (De Wet & Ackermann:2001:2). When looking ..... The Relationship between Identity. Development ... Self-disclosure of College Students to Faculty:.

  6. Gender, identity and culture in learning physics

    Science.gov (United States)

    Corbett, Katelin

    2016-06-01

    Student engagement in science, as defined by Iva Gurgel, Mauricio Pietrocola, and Graciella Watanabe, is of great importance because a student's perceived compatibility with science learning is highly influenced by personal identities, or how students see themselves in relations to the world. This can greatly impact their learning experiences. In this forum, I build on the work of Gurgel, Pietrocola, and Watanabe by exploring the relationships between engagement in physics and gender, and by looking at the expansive nature of the concept of culture. I expand the conversation by investigating ways in which learning science has impacted my own identity/worldview, particularly how it affects my personal teaching and learning experiences. I focus the conversation around the relationship between gender and the experience of learning science to further the dialogue concerning identity and how it impacts engagement in science. I also look at the role of didactic transposition in the perceived disconnect with science. I reveal my experiences and analysis through a personal narrative.

  7. A Feature Subtraction Method for Image Based Kinship Verification under Uncontrolled Environments

    DEFF Research Database (Denmark)

    Duan, Xiaodong; Tan, Zheng-Hua

    2015-01-01

    The most fundamental problem of local feature based kinship verification methods is that a local feature can capture the variations of environmental conditions and the differences between two persons having a kin relation, which can significantly decrease the performance. To address this problem...... the feature distance between face image pairs with kinship and maximize the distance between non-kinship pairs. Based on the subtracted feature, the verification is realized through a simple Gaussian based distance comparison method. Experiments on two public databases show that the feature subtraction method...

  8. A pessoa com deficiência e a crise das identidades na contemporaneidade The handicapped person and identity crisis in the present day

    Directory of Open Access Journals (Sweden)

    Rita de Cássia Barbosa Paiva Magalhães

    2010-04-01

    those individuals who differ from what is socially expected. The identity of the handicapped person tends, because of the stigma, to undergo processes of social control, in which important opportunities for metamorphosis are denied. Discussing identity seems to be, therefore, the connecting thread for understanding social and scholastic inclusion of the handicapped person

  9. The Relationship between Cell Phone Use and Identity Theft

    Science.gov (United States)

    Saunders, Lewis O.

    2014-01-01

    The growth of mobile phone use has paralleled increased reports of identity theft. Identity theft can result in financial loss and threats to a victim's personal safety. Although trends in identity theft are well-known, less is known about individual cell phone users' attitudes toward identity theft and the extent to which they connect it to cell…

  10. [Pinocchio and the unattained identity: Jervis' contribution to child clinical psychology].

    Science.gov (United States)

    Meacci, Stefano

    2012-01-01

    Giovanni Jervis is mainly known as a psychiatrist, but he also worked on psychological methodology and tackled important issues in clinical psychology. This essay describes the concept of personal identity elaborated by Jervis and its importance in Child Clinical Psychology. The problems related to personal identity appear very early in Jervis' work, influenced by the ethnologist Ernesto De Martino. His first considerations are found in his Preface to The Adventures of Pinocchio by Carlo Collodi (1968), in which Jervis describes the unhappy upbringing, the anti-social behaviour, and the unattained identity of the wooden puppet. Subsequently, in Presenza e identith (1984), Fondamenti di Psicologia Dinamica (1993) and La conquista dell'identith (1997), Jervis dealt with the theme of identity from a Dynamic Psychology perspective, showing that the formation of personal identity is a basic aspect of the development of the individual that starts in early childhood.

  11. The symbiosis between identity and migrant entrepreneurship ...

    African Journals Online (AJOL)

    In this article I have attempted to situate entrepreneurial identity in its more comprehensive personal context by tracking cultural transformations and attempting to understand how Ghanaian women entrepreneurs in Durban negotiate their day-to-day social identities. These women entrepreneurs found themselves projecting ...

  12. ROLE OF PROFESSIONAL IDENTITY IN SELF-REALIZATION OF PSYCHOLOGISTS-TEACHERS

    Directory of Open Access Journals (Sweden)

    S I Kudinov

    2015-12-01

    Full Text Available The article highlights the problem of the role of professional identity in self-realization of psychologists- teachers. Within the frame of a system-defined approach the research identifies and describes the individual- typological features of the phenomena interesting to us. The works that focus on the study of self-realization are subjected to the analysis, as the result it is noted that in this field there are still gaps in the understanding of this issue. Thus, the study from the perspective of the influence of professional identity on the successful self-realization of the personality is recognized as relevant. In the framework of this study the following assumptions are put forward: there is a relationship between the professional identity and successful self- realization of the personality; the level of formation of professional identity has an impact on the success of personality self-realization; the professional identity not fully formed acts as a barrier for creativity, activity, internality and constructive self- realization; fully formed professional identity provides a high success rate of self-realization. The purpose of this study was to investigate the features of self- realization and professional identity of psychologists-teachers. For the study, we used “Multidimensional questionnaire of personality self-realization” (MQPS by S.I. Kudinov, for the study of professional identity the following methods were used: “Professional identity-marginalism” questionnaire by E.P. Ermolaeva and Methods of measuring professional identity (MMPI by L.B. Schneider. The results obtained were subjected to quantitative analysis. In the article the author relies on the data gathered as a result of a study conducted at the Institute of Education Development of the Republic of Bashkortostan (GAOU DPO IRO RB, city of Ufa. The sample consisted of 142 educational psychologists. As a result of the conducted research, the specific relationship

  13. "It Is Not Wit, It Is Truth:" Transcending the Narrative Bounds of Professional and Personal Identity in Life and in Art.

    Science.gov (United States)

    Elliot, Michelle L

    2016-09-01

    Taking inspiration from the film Wit (2001), adapted from Margaret Edson's (1999) Pulitzer Prize-winning play, this article explores the particularities of witnessing a cinematic cancer narrative juxtaposed with the author's own cancer narrative. The analysis reveals the tenuous line between death and dying, illness and wellness, life and living and the resulting identities shaped in the process of understanding both from a personal and professional lens. By framing these representations of illness experience within the narrative constructions of drama, time, metaphor and morality, the personal stories of intellectual knowledge converging with intimate and embodied knowing are revealed.

  14. Dissociative Identity Disorder

    Science.gov (United States)

    Schmidt, Tom

    2007-01-01

    Few psychological disorders in the Diagnostic Statistical Manual have generated as much controversy as Dissociative Identity Disorder (DID). For the past 35 years diagnoses of DID, previously referred to as Multiple Personality Disorder (MPD), have increased exponentially, causing various psychological researchers and clinicians to question the…

  15. Apparent Amnesia : interidentity memory functioning in dissociative identity disdorder

    NARCIS (Netherlands)

    Huntjens, R.J.C.

    2003-01-01

    Dissociative identity disorder (DID) is characterized by the presence of two or more distinct identities or personality states that recurrently take control of the individual s behavior. Between 95 and 100 % of DID patients report experiences of blank spells for periods of time when other identities

  16. The Position of a Teacher as a Factor of Forming Students' Socio-Cultural Identities (On the Example of the Russian Civil Identity)

    Science.gov (United States)

    Shakurova, Marina V.

    2015-01-01

    The article presents experience of structuring and description of teachers' position in the process of forming socio-cultural identity of the person, detailed in regard to the process of formation of one of the subtypes of socio-cultural identity--Russian civil identity. We identified and described real subjective, nominally subjective and…

  17. Personality moderates the links of social identity with work motivation and job searching.

    Science.gov (United States)

    Baay, Pieter E; van Aken, Marcel A G; van der Lippe, Tanja; de Ridder, Denise T D

    2014-01-01

    Work motivation is critical for successful school-to-work transitions, but little is known about its determinants among labor market entrants. Applying a social identity framework, we examined whether work motivation and job searching are social-contextually determined. We expected that some job seekers are more sensitive to contextual influence, depending on their personality. Mediation analyses on 591 Dutch vocational training students indicate that the perception of more positive work norms in someone's social context was related to higher levels of intrinsic motivation, which in turn predicted higher preparatory job search behavior and job search intentions. Multi-group analysis shows that perceived work norms more strongly predict work motivation among overcontrollers compared to resilients and undercontrollers. In conclusion, work motivation and job searching appear contextually determined: especially among those sensitive to contextual influence, people seem to work when they believe that is what people like them do.

  18. School Identity in the Context of Alberta Charter Schools

    Science.gov (United States)

    Thompson, Merlin; Gereluk, Dianne; Kowch, Eugene

    2016-01-01

    The central tenet of this investigation is that educational institutions possess their own school identity. Acknowledging that school identity is influenced by institutional mechanisms and personal dynamics, we examine school identity in the context of 13 Alberta charter schools. Narratives of 73 educational stakeholders across the network of…

  19. Legal Environment Against Online Identity Theft: Comparative Analysis of USA’s and Lithuania’s Legislation

    Directory of Open Access Journals (Sweden)

    Paulius Pakutinskas

    2011-08-01

    Full Text Available Summary. The growth of the Internet and e-commerce has taken identity theft to new levels. Indeed, consumers, financial institutions and the whole economic suffer from online identity theft. This article analyses the legal environment which is concerned with online identity theft. The analysis is based on the comparison of two countries—USA’s and Lithuania’s— legislation, regulating such fields as personal data protection, electronic information security, identification, criminal liability and special legal acts, regulating online identity theft, because if all these fields are sufficiently regulated, the fight with online identity theft is more successful. The choice of the countries is based on the fact that USA has experience in fighting online identity theft while Lithuania is taken into a deeper consideration asit is a member of the European Union, the legal system of which has great differences in comparison to the USA. The analysis of legislation, regulating personal data protection, is based on comparison of the main requirements and principles of personal data protection, institutions which are responsible for personal data protection and liability for breaches of personal data protection rules. The authors of the present article also present similarities and differences of legal regulation of electronic information security in USA and Lithuania by comparing the institutional control of information security, main requirements for information security and liability for breaches of information security rules. Also, the variety of personal identity documents in the USA and Lithuania is analyzed, main personal identity documents are presented as well as regulation of online identity theft, elements and types of identification online are discussed. Moreover, criminal and special legislation of USA and Lithuania is taken into consideration in order to discuss and compare criminalization aspects of online identity theft.In this article

  20. Legal Environment Against Online Identity Theft: Comparative Analysis of USA’s and Lithuania’s Legislation

    Directory of Open Access Journals (Sweden)

    Darius Štitilis

    2013-08-01

    Full Text Available The growth of the Internet and e-commerce has taken identity theft to new levels. Indeed, consumers, financial institutions and the whole economic suffer from online identity theft. This article analyses the legal environment which is concerned with online identity theft. The analysis is based on the comparison of two countries—USA’s and Lithuania’s— legislation, regulating such fields as personal data protection, electronic information security, identification, criminal liability and special legal acts, regulating online identity theft, because if all these fields are sufficiently regulated, the fight with online identity theft is more successful. The choice of the countries is based on the fact that USA has experience in fighting online identity theft while Lithuania is taken into a deeper consideration as it is a member of the European Union, the legal system of which has great differences in comparison to the USA. The analysis of legislation, regulating personal data protection, is based on comparison of the main requirements and principles of personal data protection, institutions which are responsible for personal data protection and liability for breaches of personal data protection rules. The authors of the present article also present similarities and differences of legal regulation of electronic information security in USA and Lithuania by comparing the institutional control of information security, main requirements for information security and liability for breaches of information security rules. Also, the variety of personal identity documents in the USA and Lithuania is analyzed, main personal identity documents are presented as well as regulation of online identity theft, elements and types of identification online are discussed. Moreover, criminal and special legislation of USA and Lithuania is taken into consideration in order to discuss and compare criminalization aspects of online identity theft. In this article it is

  1. Longitudinal associations between exercise identity and exercise motivation: A multilevel growth curve model approach.

    Science.gov (United States)

    Ntoumanis, N; Stenling, A; Thøgersen-Ntoumani, C; Vlachopoulos, S; Lindwall, M; Gucciardi, D F; Tsakonitis, C

    2018-02-01

    Past work linking exercise identity and exercise motivation has been cross-sectional. This is the first study to model the relations between different types of exercise identity and exercise motivation longitudinally. Understanding the dynamic associations between these sets of variables has implications for theory development and applied research. This was a longitudinal survey study. Participants were 180 exercisers (79 men, 101 women) from Greece, who were recruited from fitness centers and were asked to complete questionnaires assessing exercise identity (exercise beliefs and role-identity) and exercise motivation (intrinsic, identified, introjected, external motivation, and amotivation) three times within a 6 month period. Multilevel growth curve modeling examined the role of motivational regulations as within- and between-level predictors of exercise identity, and a model in which exercise identity predicted exercise motivation at the within- and between-person levels. Results showed that within-person changes in intrinsic motivation, introjected, and identified regulations were positively and reciprocally related to within-person changes in exercise beliefs; intrinsic motivation was also a positive predictor of within-person changes in role-identity but not vice versa. Between-person differences in the means of predictor variables were predictive of initial levels and average rates of change in the outcome variables. The findings show support to the proposition that a strong exercise identity (particularly exercise beliefs) can foster motivation for behaviors that reinforce this identity. We also demonstrate that such relations can be reciprocal overtime and can depend on the type of motivation in question as well as between-person differences in absolute levels of these variables. © 2017 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.

  2. Los anclajes de la identidad personal

    Directory of Open Access Journals (Sweden)

    Revilla, Juan Carlos

    2003-11-01

    Full Text Available Many postmodern authors have claimed the dissolution of identity due to the multiplicity of personal relationships, to the variety of experiences or to the huge social changes in process. Nonetheless, I argue that, in spite of not being possible to sustain an essentialist conception of the subject, there are many elements that preclude an absolute dissolution of identity, anchoring the subject to a certain personal identity, but in a problematic, conflictive, and changing way. Furthermore, the dissolution of identity would not necessarily be beneficial for subjects nor groups, as long as the demand of interaction rights comes close to the maintaining of acknowledgeable identities. The problem would rather be the difficulty to accede to valuable identities in the prevailing life conditions, making difficult to produce positive self-discourses, and thus generalizing processes of identity “fragilization”.

  3. Improved Hip-Based Individual Recognition Using Wearable Motion Recording Sensor

    Science.gov (United States)

    Gafurov, Davrondzhon; Bours, Patrick

    In todays society the demand for reliable verification of a user identity is increasing. Although biometric technologies based on fingerprint or iris can provide accurate and reliable recognition performance, they are inconvenient for periodic or frequent re-verification. In this paper we propose a hip-based user recognition method which can be suitable for implicit and periodic re-verification of the identity. In our approach we use a wearable accelerometer sensor attached to the hip of the person, and then the measured hip motion signal is analysed for identity verification purposes. The main analyses steps consists of detecting gait cycles in the signal and matching two sets of detected gait cycles. Evaluating the approach on a hip data set consisting of 400 gait sequences (samples) from 100 subjects, we obtained equal error rate (EER) of 7.5% and identification rate at rank 1 was 81.4%. These numbers are improvements by 37.5% and 11.2% respectively of the previous study using the same data set.

  4. Personal Branding Through Fashion Blogging

    Directory of Open Access Journals (Sweden)

    Yuanita Safitri

    2017-01-01

    Full Text Available The objective of this research was to analyze personal branding development from personal brand identity, personal brand positioning, and personal brand assessment. The object of this research was Diana Rikasari's blog “Hot Chocolate and Mint”. She is one of prominent influence and fashion blogger from Indonesia. The research used the qualitative method with data collection by virtual observation from June until August 2016. Rikasari’s personal branding showed on her blog was the fashionably smart woman who had entrepreneurship competence. This research finds out that Diana Rikasari success to make her personal identity by her blog profile and blog posting. Her positioning is clear as Indonesian modern woman. The personal brand assessment can be seen through the achievements and feedbacks on her blog post, both positive or negative.

  5. Perceptions of Biometric Experts on Whether or Not Biometric Modalities Will Combat Identity Fraud

    Science.gov (United States)

    Edo, Galaxy Samson

    2012-01-01

    Electronic-authentication methods, no matter how sophisticated they are in preventing fraud, must be able to identify people to a reasonable degree of certainty before any credentials are assured (Personix, 2006). User authentication is different from identity verification, and both are separate but vital steps in the process of securing…

  6. Multilateral disarmament verification

    International Nuclear Information System (INIS)

    Persbo, A.

    2013-01-01

    Non-governmental organisations, such as VERTIC (Verification Research, Training and Information Centre), can play an important role in the promotion of multilateral verification. Parties involved in negotiating nuclear arms accords are for the most part keen that such agreements include suitable and robust provisions for monitoring and verification. Generally progress in multilateral arms control verification is often painstakingly slow, but from time to time 'windows of opportunity' - that is, moments where ideas, technical feasibility and political interests are aligned at both domestic and international levels - may occur and we have to be ready, so the preparatory work is very important. In the context of nuclear disarmament, verification (whether bilateral or multilateral) entails an array of challenges, hurdles and potential pitfalls relating to national security, health, safety and even non-proliferation, so preparatory work is complex and time-greedy. A UK-Norway Initiative was established in order to investigate the role that a non-nuclear-weapon state such as Norway could potentially play in the field of nuclear arms control verification. (A.C.)

  7. An Identity-Based Anti-Quantum Privacy-Preserving Blind Authentication in Wireless Sensor Networks.

    Science.gov (United States)

    Zhu, Hongfei; Tan, Yu-An; Zhu, Liehuang; Wang, Xianmin; Zhang, Quanxin; Li, Yuanzhang

    2018-05-22

    With the development of wireless sensor networks, IoT devices are crucial for the Smart City; these devices change people's lives such as e-payment and e-voting systems. However, in these two systems, the state-of-art authentication protocols based on traditional number theory cannot defeat a quantum computer attack. In order to protect user privacy and guarantee trustworthy of big data, we propose a new identity-based blind signature scheme based on number theorem research unit lattice, this scheme mainly uses a rejection sampling theorem instead of constructing a trapdoor. Meanwhile, this scheme does not depend on complex public key infrastructure and can resist quantum computer attack. Then we design an e-payment protocol using the proposed scheme. Furthermore, we prove our scheme is secure in the random oracle, and satisfies confidentiality, integrity, and non-repudiation. Finally, we demonstrate that the proposed scheme outperforms the other traditional existing identity-based blind signature schemes in signing speed and verification speed, outperforms the other lattice-based blind signature in signing speed, verification speed, and signing secret key size.

  8. An Identity-Based Anti-Quantum Privacy-Preserving Blind Authentication in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Hongfei Zhu

    2018-05-01

    Full Text Available With the development of wireless sensor networks, IoT devices are crucial for the Smart City; these devices change people’s lives such as e-payment and e-voting systems. However, in these two systems, the state-of-art authentication protocols based on traditional number theory cannot defeat a quantum computer attack. In order to protect user privacy and guarantee trustworthy of big data, we propose a new identity-based blind signature scheme based on number theorem research unit lattice, this scheme mainly uses a rejection sampling theorem instead of constructing a trapdoor. Meanwhile, this scheme does not depend on complex public key infrastructure and can resist quantum computer attack. Then we design an e-payment protocol using the proposed scheme. Furthermore, we prove our scheme is secure in the random oracle, and satisfies confidentiality, integrity, and non-repudiation. Finally, we demonstrate that the proposed scheme outperforms the other traditional existing identity-based blind signature schemes in signing speed and verification speed, outperforms the other lattice-based blind signature in signing speed, verification speed, and signing secret key size.

  9. Social identity management strategies used by workers with acquired hearing loss.

    Science.gov (United States)

    Jennings, Mary Beth; Southall, Kenneth; Gagné, Jean-Pierre

    2013-01-01

    There is a paucity of knowledge about social identity-management by persons with hearing loss. The objective of the study was to gain an understanding from the perspective of the participants, the ways in which workers with acquired hearing loss manage their identity in the workplace. Twelve persons with acquired hearing loss, who were gainfully employed in a variety of settings and occupations in three Canadian cities, participated in audio-recorded semi-structured interviews. A secondary qualitative analysis was conducted on transcripts of interviews collected in a previous study on factors that influence disclosure of hearing loss in the workplace. A qualitative descriptive research paradigm was adopted and content analyses were used to extract pertinent information from verbatim transcripts. Participants described a range of identity-management strategies enacted in the workplace. Five recurrent themes emerged as important considerations in the Art of Identity Management in the workplace: 1. Managing the situation, 2. Having a buddy system, 3. Feeling comfortable, 4. Using personal resources, 5. It gets easier with time. Social identity-management is a complex process. Although persons with acquired hearing loss experience different challenges from other persons with invisible stigmas, similarities in the range of social identity-management strategies employed were evident in our findings. In addition, the social cognitive learning model of disclosure appears to be relevant to the experiences of our participants. The implications of the findings emphasize the importance of all stakeholders working collaboratively to address the issues of the growing population of workers with hearing loss.

  10. Digital holographic-based cancellable biometric for personal authentication

    International Nuclear Information System (INIS)

    Verma, Gaurav; Sinha, Aloka

    2016-01-01

    In this paper, we propose a new digital holographic-based cancellable biometric scheme for personal authentication and verification. The realization of cancellable biometric is presented by using an optoelectronic experimental approach, in which an optically recorded hologram of the fingerprint of a person is numerically reconstructed. Each reconstructed feature has its own perspective, which is utilized to generate user-specific fingerprint features by using a feature-extraction process. New representations of the user-specific fingerprint features can be obtained from the same hologram, by changing the reconstruction distance (d) by an amount Δd between the recording plane and the reconstruction plane. This parameter is the key to make the cancellable user-specific fingerprint features using a digital holographic technique, which allows us to choose different reconstruction distances when reissuing the user-specific fingerprint features in the event of compromise. We have shown theoretically that each user-specific fingerprint feature has a unique identity with a high discrimination ability, and the chances of a match between them are minimal. In this aspect, a recognition system has also been demonstrated using the fingerprint biometric of the enrolled person at a particular reconstruction distance. For the performance evaluation of a fingerprint recognition system—the false acceptance ratio, the false rejection ratio and the equal error rate are calculated using correlation. The obtained results show good discrimination ability between the genuine and the impostor populations with the highest recognition rate of 98.23%. (paper)

  11. Negotiation of identities in intercultural communication

    Directory of Open Access Journals (Sweden)

    Janík Zdeněk

    2017-01-01

    Full Text Available Negotiation of identities in communication entails affirming the identities we want others to recognize in us and ascription of identities we mutually assign to each other in communication. The study of intercultural communication focuses on cultural identity as the principal identity component that defines intercultural communication. In this article, the assumption that cultural group membership factors determine the context of intercultural communication is questioned. The article examines how intercultural interlocutors negotiate their identities in various intercultural interactions. The aims of the research presented in this paper are: 1 to examine which identities - cultural, personal, or social - intercultural interlocutors activate in intercultural communication; 2 to determine whether interlocutors’ intercultural communication is largely influenced by their cultural identities; 3 and to identify situations in which they activate their cultural identities (3. The research data were collected from 263 international students studying at Masaryk University in Brno in the years 2010 - 2016. Although the research results are not conclusive, they indicate that cultural identities predominate in the students’ ethnocentric views and that stereotypes constrain the students’ cultural identities and affect the negotiation of identities in intercultural communication.

  12. Biracial Japanese American identity: an evolving process.

    Science.gov (United States)

    Collins, J F

    2000-05-01

    perspectives, identifications, and allegiances as they passed through a series of life experiences. Instead of staying marginalized, they integrated both cultures, recognizing positive values of both, thus developing an integrated identity. Although the participants' experiences and perceptions were varied, the overarching themes of self-evaluation, confusion of categorization, belonging, infusion/exploration, situational use of identity, and resolution/acceptance/self-verification were presented. On the basis of the research, a model of ethnic identity for biracial individuals is proposed.

  13. Names in Psychological Science: Investigating the Processes of Thought Development and the Construction of Personal Identities.

    Science.gov (United States)

    Quaglia, Rocco; Longobardi, Claudio; Mendola, Manuela; Prino, Laura Elvira

    2016-06-01

    This paper examines the name as an issue of interest in the psychology field. In thinking about the role played by names for some of the most important approaches on the psychology panorama, it has been found that the analysis of names can be used as an instrument for the investigation of thought formation processes, or as an element in the process of constructing personal identity. In the first case, the focus is on the so-called "common" names, which designate objects; in the second case, instead, it is on people's given names and on the way they are perceived by their bearers and those who surround them. We have examined both domains, since it is essential to understand how the psychological concepts related to names develop in children's minds, if we aim to grasp their importance as designators of people's internal and external realities. Lastly, we have proposed our own view of the person's name, linked to the relational systems perspective which essentially sees the name as a signifier or "representative" of the child-parent relationship, while the "relationship" is the signified.

  14. Embedded software verification and debugging

    CERN Document Server

    Winterholer, Markus

    2017-01-01

    This book provides comprehensive coverage of verification and debugging techniques for embedded software, which is frequently used in safety critical applications (e.g., automotive), where failures are unacceptable. Since the verification of complex systems needs to encompass the verification of both hardware and embedded software modules, this book focuses on verification and debugging approaches for embedded software with hardware dependencies. Coverage includes the entire flow of design, verification and debugging of embedded software and all key approaches to debugging, dynamic, static, and hybrid verification. This book discusses the current, industrial embedded software verification flow, as well as emerging trends with focus on formal and hybrid verification and debugging approaches. Includes in a single source the entire flow of design, verification and debugging of embedded software; Addresses the main techniques that are currently being used in the industry for assuring the quality of embedded softw...

  15. Hippocampal and Amygdalar Volumes in Dissociative Identity Disorder

    Science.gov (United States)

    Vermetten, Eric; Schmahl, Christian; Lindner, Sanneke; Loewenstein, Richard J.; Bremner, J. Douglas

    2011-01-01

    Objective Smaller hippocampal volume has been reported in several stress-related psychiatric disorders, including posttraumatic stress disorder (PTSD), borderline personality disorder with early abuse, and depression with early abuse. Patients with borderline personality disorder and early abuse have also been found to have smaller amygdalar volume. The authors examined hippocampal and amygdalar volumes in patients with dissociative identity disorder, a disorder that has been associated with a history of severe childhood trauma. Method The authors used magnetic resonance imaging to measure the volumes of the hippocampus and amygdala in 15 female patients with dissociative identity disorder and 23 female subjects without dissociative identity disorder or any other psychiatric disorder. The volumetric measurements for the two groups were compared. Results Hippocampal volume was 19.2% smaller and amygdalar volume was 31.6% smaller in the patients with dissociative identity disorder, compared to the healthy subjects. The ratio of hippocampal volume to amygdalar volume was significantly different between groups. Conclusions The findings are consistent with the presence of smaller hippocampal and amygdalar volumes in patients with dissociative identity disorder, compared with healthy subjects. PMID:16585437

  16. Hippocampal and amygdalar volumes in dissociative identity disorder.

    Science.gov (United States)

    Vermetten, Eric; Schmahl, Christian; Lindner, Sanneke; Loewenstein, Richard J; Bremner, J Douglas

    2006-04-01

    Smaller hippocampal volume has been reported in several stress-related psychiatric disorders, including posttraumatic stress disorder (PTSD), borderline personality disorder with early abuse, and depression with early abuse. Patients with borderline personality disorder and early abuse have also been found to have smaller amygdalar volume. The authors examined hippocampal and amygdalar volumes in patients with dissociative identity disorder, a disorder that has been associated with a history of severe childhood trauma. The authors used magnetic resonance imaging to measure the volumes of the hippocampus and amygdala in 15 female patients with dissociative identity disorder and 23 female subjects without dissociative identity disorder or any other psychiatric disorder. The volumetric measurements for the two groups were compared. Hippocampal volume was 19.2% smaller and amygdalar volume was 31.6% smaller in the patients with dissociative identity disorder, compared to the healthy subjects. The ratio of hippocampal volume to amygdalar volume was significantly different between groups. The findings are consistent with the presence of smaller hippocampal and amygdalar volumes in patients with dissociative identity disorder, compared with healthy subjects.

  17. The Brand Identity: A Strategic Shift for Success

    OpenAIRE

    Victor Danciu

    2010-01-01

    The strong identity is a key condition for the real success of a brand strategy. The identity reflects the inner value of the brand and describes its potential success. In order to maximize this value a brand identity should include and develop all dimensions of its complex structure. The product, the organizational, the personality and the symbolic dimension of the brand identity could develop a great capability for many associations that could be made to the brand. Apple is a brand that has...

  18. How does a newly encountered face become familiar? The effect of within-person variability on adults' and children's perception of identity.

    Science.gov (United States)

    Baker, Kristen A; Laurence, Sarah; Mondloch, Catherine J

    2017-04-01

    Adults and children aged 6years and older easily recognize multiple images of a familiar face, but often perceive two images of an unfamiliar face as belonging to different identities. Here we examined the process by which a newly encountered face becomes familiar, defined as accurate recognition of multiple images that capture natural within-person variability in appearance. In Experiment 1 we examined whether exposure to within-person variability in appearance helps children learn a new face. Children aged 6-13years watched a 10-min video of a woman reading a story; she was filmed on a single day (low variability) or over three days, across which her appearance and filming conditions (e.g., camera, lighting) varied (high variability). After familiarization, participants sorted a set of images comprising novel images of the target identity intermixed with distractors. Compared to participants who received no familiarization, children showed evidence of learning only in the high-variability condition, in contrast to adults who showed evidence of learning in both the low- and high-variability conditions. Experiment 2 highlighted the efficiency with which adults learn a new face; their accuracy was comparable across training conditions despite variability in duration (1 vs. 10min) and type (video vs. static images) of training. Collectively, our findings show that exposure to variability leads to the formation of a robust representation of facial identity, consistent with perceptual learning in other domains (e.g., language), and that the development of face learning is protracted throughout childhood. We discuss possible underlying mechanisms. Copyright © 2016. Published by Elsevier B.V.

  19. Software verification for nuclear industry

    International Nuclear Information System (INIS)

    Wilburn, N.P.

    1985-08-01

    Why verification of software products throughout the software life cycle is necessary is considered. Concepts of verification, software verification planning, and some verification methodologies for products generated throughout the software life cycle are then discussed

  20. The design of verification regimes

    International Nuclear Information System (INIS)

    Gallagher, N.W.

    1991-01-01

    Verification of a nuclear agreement requires more than knowledge of relevant technologies and institutional arrangements. It also demands thorough understanding of the nature of verification and the politics of verification design. Arms control efforts have been stymied in the past because key players agreed to verification in principle, only to disagree radically over verification in practice. In this chapter, it is shown that the success and stability of arms control endeavors can be undermined by verification designs which promote unilateral rather than cooperative approaches to security, and which may reduce, rather than enhance, the security of both sides. Drawing on logical analysis and practical lessons from previous superpower verification experience, this chapter summarizes the logic and politics of verification and suggests implications for South Asia. The discussion begins by determining what properties all forms of verification have in common, regardless of the participants or the substance and form of their agreement. Viewing verification as the political process of making decisions regarding the occurrence of cooperation points to four critical components: (1) determination of principles, (2) information gathering, (3) analysis and (4) projection. It is shown that verification arrangements differ primarily in regards to how effectively and by whom these four stages are carried out

  1. Comparison with the Typical College Student Predicts Graduation When Identity Is Uncertain

    Science.gov (United States)

    Lane, David J.

    2017-01-01

    This study investigated the effect of personal identity and social comparison on college graduation. First-year college students completed an online survey measuring exploration and commitment to personal identity and perceptions of the prototypical student. Those who perceived the typical student as favorable but dissimilar to themselves had the…

  2. Linking person perception and person knowledge in the human brain.

    Science.gov (United States)

    Greven, Inez M; Downing, Paul E; Ramsey, Richard

    2016-04-01

    Neuroscience research has examined separately how we detect human agents on the basis of their face and body (person perception) and how we reason about their thoughts, traits or intentions (person knowledge). Neuroanatomically distinct networks have been associated with person perception and person knowledge, but it remains unknown how multiple features of a person (e.g. thin and kind) are linked to form a holistic identity representation. In this fMRI experiment, we investigated the hypothesis that when encountering another person specialised person perception circuits would be functionally coupled with circuits involved in person knowledge. In a factorial design, we paired bodies or names with trait-based or neutral statements, and independent localiser scans identified body-selective and mentalising networks. When observing a body paired with a trait-implying statement, functional connectivity analyses demonstrated that body-selective patches in bilateral fusiform gyri were functionally coupled with nodes of the mentalising network. We demonstrate that when forming a representation of a person circuits for representing another person's physical appearance are linked to circuits that are engaged when reasoning about trait-based character. These data support the view that a 'who' system for social cognition involves communication between perceptual and inferential mechanisms when forming a representation of another's identity. © The Author (2016). Published by Oxford University Press.

  3. Different groups, different motives: identity motives underlying changes in identification with novel groups.

    Science.gov (United States)

    Easterbrook, Matt; Vignoles, Vivian L

    2012-08-01

    Social identification is known to have wide-reaching implications, but theorists disagree about the underlying motives. Integrating motivated identity construction theory with recent social identity research, the authors predicted which motives underlie identification with two types of groups: interpersonal networks and social categories. In a five-wave longitudinal study of social identity processes among 268 new university residents, multilevel analyses showed that motives involved in identity enactment processes--self-esteem, belonging, and efficacy--significantly predicted within-person changes in identification with flatmates (an interpersonal network group), whereas motives involved in identity definition processes--meaning, self-esteem, and distinctiveness--significantly predicted within-person changes in identification with halls of residence (an abstract social category). This article discusses implications for research into identity motives and social identity.

  4. Identity, storytelling and the philanthropic journey

    OpenAIRE

    Maclean, Mairi; Harvey, Charles; Gordon, Jillian; Shaw, Eleanor

    2015-01-01

    This article develops theoretical understanding of the involvement of wealthy entrepreneurs in socially transformative projects by offering a foundational theory of philanthropic identity narratives. We show that these narratives are structured according to the metaphorical framework of the journey, through which actors envision and make sense of personal transformation. The journey provides a valuable metaphor for conceptualizing narrative identities in entrepreneurial careers as individuals...

  5. Musical identity of patients with multiple sclerosis.

    Science.gov (United States)

    Moreira, Shirlene Vianna; França, Cecília Cavalieri; Moreira, Marcos Aurélio; Lana-Peixoto, Marco Aurélio

    2009-03-01

    Musical autobiographies consist of a powerful therapeutic tool by which individuals define themselves. The use of this technique may help (re)construction personal identities and improve quality of life of patients with multiple sclerosis (MS). Eight adult patients on treatment at CIEM Multiple Sclerosis Investigation Center after selecting 10 to 15 pieces of music most significant in their lives were interviewed. The data collected were classified according to Even Rudd categories, which reveal how a person expresses his personal, social, temporal and transpersonal identities. We observed that recall of musical history makes MS patients get better perception both of their feelings and body awareness, as well as provide them with an alternative way to express themselves, activate and contextualize affective memories, and achieving a sense of life continuity in spite of the disease.

  6. Patriotic Acts: Five Activities for Identity Building

    Science.gov (United States)

    Soetoro-Ng, Maya

    2013-01-01

    Building a personal identity is a lifelong, thoughtful process that takes into account not only one's race and ethnicity, but also life experiences, relationships, and communities. The process of exploring and evolving one's identity deserves a place in the classroom. Educators can play a key role in supporting their students' in this process by…

  7. Improved verification methods for safeguards verifications at enrichment plants

    International Nuclear Information System (INIS)

    Lebrun, A.; Kane, S. C.; Bourva, L.; Poirier, S.; Loghin, N. E.; Langlands, D.

    2009-01-01

    The International Atomic Energy Agency (IAEA) has initiated a coordinated research and development programme to improve its verification methods and equipment applicable to enrichment plants. The programme entails several individual projects to meet the objectives of the IAEA Safeguards Model Approach for Gas Centrifuge Enrichment Plants updated in 2006. Upgrades of verification methods to confirm the absence of HEU (highly enriched uranium) production have been initiated and, in particular, the Cascade Header Enrichment Monitor (CHEM) has been redesigned to reduce its weight and incorporate an electrically cooled germanium detector. Such detectors are also introduced to improve the attended verification of UF 6 cylinders for the verification of the material balance. Data sharing of authenticated operator weighing systems such as accountancy scales and process load cells is also investigated as a cost efficient and an effective safeguards measure combined with unannounced inspections, surveillance and non-destructive assay (NDA) measurement. (authors)

  8. Improved verification methods for safeguards verifications at enrichment plants

    Energy Technology Data Exchange (ETDEWEB)

    Lebrun, A.; Kane, S. C.; Bourva, L.; Poirier, S.; Loghin, N. E.; Langlands, D. [Department of Safeguards, International Atomic Energy Agency, Wagramer Strasse 5, A1400 Vienna (Austria)

    2009-07-01

    The International Atomic Energy Agency (IAEA) has initiated a coordinated research and development programme to improve its verification methods and equipment applicable to enrichment plants. The programme entails several individual projects to meet the objectives of the IAEA Safeguards Model Approach for Gas Centrifuge Enrichment Plants updated in 2006. Upgrades of verification methods to confirm the absence of HEU (highly enriched uranium) production have been initiated and, in particular, the Cascade Header Enrichment Monitor (CHEM) has been redesigned to reduce its weight and incorporate an electrically cooled germanium detector. Such detectors are also introduced to improve the attended verification of UF{sub 6} cylinders for the verification of the material balance. Data sharing of authenticated operator weighing systems such as accountancy scales and process load cells is also investigated as a cost efficient and an effective safeguards measure combined with unannounced inspections, surveillance and non-destructive assay (NDA) measurement. (authors)

  9. Perception, experience and body identity.

    Science.gov (United States)

    López-Ibor, Juan J; Ortiz, Tomás; López-Ibor, María I

    2011-12-01

    Physician has to know the patient in the disease and not only the disease in the patient, from the dual perspective of the body as object and the body as subject. This also affects the patient who has to cope with the reality of having a body that bursts into the subject's consciousness as a vital threat, as source of discomfort and inability and being a body (Marcel). The human body in its dual aspect has been and is a great unknown, if not a great outrage in spite of the fact that we are our body and our body is each of us. We sometimes do not feel as we are and thus a confrontation arises, sometimes more normal, others more morbid. This forces the physician to face complex ethics considerations and the scientist to accept a personal identity disorder. Dualism considers that there are two substances in us, one that distinguishes us from other beings and from the rest of the individuals of the human species, the soul, the psychic life, mind or consciousness, and another more insubstancial one, the body. The aim of the first substance is to dominate the body, to survive it after death when it is, already a corpse is meant to become putrefied, is buried, incinerated or thrown to the depth of the sea. This dualism aims to explain the origin of the evil and the attitude to defeat it and it does so efficiently. This anthropology has very ancient roots (the Upvanishads, in the orphic texts, in Plato), it is the core of Gnostic thought and the foundation of the modern science since Descartes. Some monist perspectives are a masked dualism or a mereologic fallacy, according to which, the brain is conscious, when that what is conscious is the subject, although the subject, with the brain could not be conscious. Therefore, a new perspective is proposed, chiasmatic or janicular monism, that considers the adaptive value of focusing on the reality from two perspectives, as physical universe and the world of interpersonal relationships. In the agnosias and in the phantom limb

  10. A Short Note on Accent-Bias, Social Identity and Ethnocentrism

    Science.gov (United States)

    Chakraborty, Rahul

    2017-01-01

    This paper discusses the interrelations among accent-based biases, social identity and ethnocentrism. Construction of social identity creates a set of ethnocentric values within a person, which indirectly or directly plays a pivotal role in generating accent related biases. Starting with Tajfel's (1959) social identity theory and then the…

  11. A social identity model of pro-environmental action (SIMPEA).

    Science.gov (United States)

    Fritsche, Immo; Barth, Markus; Jugert, Philipp; Masson, Torsten; Reese, Gerhard

    2018-03-01

    Large-scale environmental crises are genuinely collective phenomena: they usually result from collective, rather than personal, behavior and how they are cognitively represented and appraised is determined by collectively shared interpretations (e.g., differing across ideological groups) and based on concern for collectives (e.g., humankind, future generations) rather than for individuals. Nevertheless, pro-environmental action has been primarily investigated as a personal decision-making process. We complement this research with a social identity perspective on pro-environmental action. Social identity is the human capacity to define the self in terms of "We" instead of "I," enabling people to think and act as collectives, which should be crucial given personal insufficiency to appraise and effectively respond to environmental crises. We propose a Social Identity Model of Pro-Environmental Action (SIMPEA) of how social identity processes affect both appraisal of and behavioral responses to large-scale environmental crises. We review related and pertinent research providing initial evidence for the role of 4 social identity processes hypothesized in SIMPEA. Specifically, we propose that ingroup identification, ingroup norms and goals, and collective efficacy determine environmental appraisals as well as both private and public sphere environmental action. These processes are driven by personal and collective emotions and motivations that arise from environmental appraisal and operate on both a deliberate and automatic processing level. Finally, we discuss SIMPEA's implications for the research agenda in environmental and social psychology and for interventions fostering pro-environmental action. (PsycINFO Database Record (c) 2018 APA, all rights reserved).

  12. The postmodern crisis and the loss of stable identity

    Directory of Open Access Journals (Sweden)

    Vadim A. Emelin

    2017-06-01

    Full Text Available The paper proves the assumption that being a worldview of the information society postmodernism simultaneously reverberates its problems, among which is blurring personal identity. The most vulnerable part of the postmodern ideology is the implicit inability to construct steady architecture of identification. This is hampered by specific ideas related to the fundamental principle of postmodernism, i.e. pluralism leading to relativism and the loss of sustainable landmarks. Applying the pluralism principle to the full may result in unlimited choice production, which should not be considered the achievement of the information society and postmodern culture, but its main problem. The social political consequences of tolerance issues and the equivalence of opinions, attitudes and values are discussed. Lack of preferred self-identification vectors reduces the motivation for the individual to develop a stable personal identity. If no paradigm in terms of the truth can claim a given status disputes over claims of significance turn into controversies over power, thereby generating social Darwinism. The principle of pluralism actually legitimizes radical ideologies, whose extreme form is terrorism put in the mosaic and multicultural postmodern world occurs to be one of many sociocultural paradigms. Exactly the identity crisis in the conditions of mass distribution of both military and information technologies is considered the main cause of radicalism as the result of finding pathological forms of cognitive personal identity. Social cultural and worldview crises of the information society are becoming the main cause for producing endurable and irregular forms of personal identity architecture.

  13. Physics Verification Overview

    Energy Technology Data Exchange (ETDEWEB)

    Doebling, Scott William [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2017-09-12

    The purpose of the verification project is to establish, through rigorous convergence analysis, that each ASC computational physics code correctly implements a set of physics models and algorithms (code verification); Evaluate and analyze the uncertainties of code outputs associated with the choice of temporal and spatial discretization (solution or calculation verification); and Develop and maintain the capability to expand and update these analyses on demand. This presentation describes project milestones.

  14. Perceived parenting dimensions and identity styles: exploring the socialization of adolescents' processing of identity-relevant information.

    Science.gov (United States)

    Smits, Ilse; Soenens, Bart; Luyckx, Koen; Duriez, Bart; Berzonsky, Michael; Goossens, Luc

    2008-04-01

    This study examined the relationships between crucial dimensions of perceived parenting (support, behavioral control, and psychological control) and the three identity styles defined by Berzonsky [Berzonsky, M. D. (1990). Self-construction over the life span: A process perspective on identity formation. Advances in Personal Construct Psychology, 1, 155-186.]. Each identity style was hypothesized to relate to a specific pattern of perceived parenting dimensions. Hypotheses were examined in a sample of middle and late adolescents (n=674). An information-oriented style was positively predicted by parental support. Contrary to expectations, however, an information-oriented style was also positively predicted by psychological control. A normative identity style was positively predicted by support and behavioral control. In line with expectations, a diffuse-avoidant identity style was positively predicted by psychological control and negatively by maternal (but not paternal) behavioral control. Findings are discussed in light of the literature on the socialization of identity formation and directions for future research are outlined.

  15. Cues to identity in online collaboration: Interpersonal or intragroup perceptions in dyadic interactions

    NARCIS (Netherlands)

    Tanis, M.A.; Postmes, T.

    2008-01-01

    This article examines the impact of cues to personal identity on the quality of dyadic collaboration via computer-mediated communication systems. Study 1 (N = 180) shows that an absence of cues to personal identity resulted in more work satisfaction and better subjective performance. Analyses

  16. The theory of planned behaviour: self-identity, social identity and group norms.

    Science.gov (United States)

    Terry, D J; Hogg, M A; White, K M

    1999-09-01

    The aim of the present study was to examine further the role that self-identity plays in the theory of planned behaviour and, more specifically, to: (1) examine the combined effects of self-identity and social identity constructs on intention and behaviour, and (2) examine the effects of self-identity as a function of past experience of performing the behaviour. The study was concerned with the prediction of intention to engage in household recycling and reported recycling behaviour. A sample of 143 community residents participated in the study. It was prospective in design: measures of the predictors and intention were obtained at the first wave of data collection, whereas behaviour was assessed two weeks later. Self-identity significantly predicted behavioural intention, a relationship that was not dependent on the extent to which the behaviour had been performed in the past. As expected, there was also evidence that the perceived norm of a behaviourally relevant reference group was related to behavioural intention, but only for participants who identified strongly with the group, whereas the relationship between perceived behavioural control (a personal factor) and intention was strongest for low identifiers.

  17. Reflection and Professional Identity Development in Design Education

    Science.gov (United States)

    Tracey, Monica W.; Hutchinson, Alisa

    2018-01-01

    Design thinking positions designers as the drivers of the design space yet academic discourse is largely silent on the topic of professional identity development in design. Professional identity, or the dynamic narratives that individuals construct and maintain to integrate their personal qualities with professional responsibilities, has not been…

  18. Reorganization of personal identity in the context of motivational dynamics and internal dialogical activity.

    Science.gov (United States)

    Batory, Anna

    2014-08-01

    Identity is constantly constructed and reconstructed. It may be assumed that there are six fundamental motivational goals according to which it is organized: self-esteem, self-efficacy, continuity, distinctiveness, belonging, and meaning (Vignoles, 2011). Moreover, identity is shaped by its dialogical nature (Hermans, 2003; van Halen & Janssen, 2004). The longitudinal study was conducted to examine both the motivational and the dialogical basis of identity structure dynamics. The results showed that the more the identity element was connected with a sense of continuity and the more dialogical it was, the greater the perceived centrality of this element was after two months. Furthermore, the more the identity element satisfied the self-esteem and belonging motives, the more positive was the affect ascribed to it. In the behavioral domain of identity, participants more strongly manifested those identity aspects that were earlier rated as more dialogical and satisfying the motive of belonging. The results showed that the motivational underpinnings of identity along with its dialogical nature explain changes in identity structure. © 2014 Scandinavian Psychological Associations and John Wiley & Sons Ltd.

  19. Report: Fiscal Year 2015 Federal Information Security Modernization Act Report: Status of CSB’s Information Security Program

    Science.gov (United States)

    Report #16-P-0086, January 27, 2016. The effectiveness of the CSB’s information security program is challenged by its lack of personal identity verification cards for logical access, complete system inventory.

  20. 33 CFR 101.105 - Definitions.

    Science.gov (United States)

    2010-07-01

    ... the assessment or plan insufficient. Barge means a non-self-propelled vessel (46 CFR 24.10-1). Barge... continual basis after an initial personal identity and credential verification. Registered length means the...

  1. Optimal Experience and Optimal Identity: A Multinational Study of the Associations Between Flow and Social Identity

    Science.gov (United States)

    Mao, Yanhui; Roberts, Scott; Pagliaro, Stefano; Csikszentmihalyi, Mihaly; Bonaiuto, Marino

    2016-01-01

    Eudaimonistic identity theory posits a link between activity and identity, where a self-defining activity promotes the strength of a person’s identity. An activity engaged in with high enjoyment, full involvement, and high concentration can facilitate the subjective experience of flow. In the present paper, we hypothesized in accordance with the theory of psychological selection that beyond the promotion of individual development and complexity at the personal level, the relationship between flow and identity at the social level is also positive through participation in self-defining activities. Three different samples (i.e., American, Chinese, and Spanish) filled in measures for flow and social identity, with reference to four previously self-reported activities, characterized by four different combinations of skills (low vs. high) and challenges (low vs. high). Findings indicated that flow was positively associated with social identity across each of the above samples, regardless of participants’ gender and age. The results have implications for increasing social identity via participation in self-defining group activities that could facilitate flow. PMID:26924995

  2. Destination Personality: An Application of Brand Personality to Tourism Destinations

    OpenAIRE

    Ekinci, Yuksel; Hosany, Sameer

    2006-01-01

    In an increasingly competitive tourism market place, destination marketers face the challenge of attracting tourists through destination branding and destination personality building practices. As places become substitutable, destination personality, defined as the set of human characteristics associated with a destination, is seen as a viable metaphor for crafting a destination’s unique identity. At the conceptual level, the importance of destination personality has been widely acknowledged,...

  3. IDENTITY FRAUD: Prevalence and Links to Alien Illegal Activities

    National Research Council Canada - National Science Library

    2002-01-01

    To discuss the significance of "identity fraud"-a term that encompasses a broad range of illegal activities based on fraudulent use of identifying information of a real person or of a fictitious person...

  4. Human Rights and the Excess of Identity

    Science.gov (United States)

    Al Tamimi, Yussef

    2017-01-01

    Identity is a central theme in contemporary politics, but legal academia lacks a rigorous analysis of this concept. The aim of this article is twofold: (i) firstly, it aims to reveal presumptions on identity in human rights law by mapping how the European Court of Human Rights approaches identity and (ii) secondly, it seeks to analyse these presumptions using theoretical insights on identity. By merging legal and theoretical analysis, this article contributes a reading of the Court’s case law which suggests that the tension between the political and apolitical is visible as a common thread in the Court’s use of identity. In case law concerning paternity, the Court appears to hold a specific view of what is presented as an unquestionable part of identity. This ostensibly pre-political notion of identity becomes untenable in cases where the nature of an identity feature, such as the headscarf, is contended or a minority has adopted a national identity that conflicts with the majoritarian national identity. The Court’s approach to identity in such cases reflects a paradox that is inherent to identity; identity is personal while simultaneously constituted and shaped by overarching power mechanisms. PMID:29881144

  5. Impact of Personal Growth Projects on Leadership Identity Development

    Science.gov (United States)

    Odom, Summer F.; Boyd, Barry L.; Williams, Jennifer

    2012-01-01

    Within personal leadership education courses, leadership educators should include experiences which help students develop themselves as leaders. In this article, the authors discuss results from a qualitative research study involving the analysis of Personal Growth Project (PGP) assignments in a personal leadership education collegiate course. The…

  6. Perceiving and Confronting Sexism: The Causal Role of Gender Identity Salience.

    Science.gov (United States)

    Wang, Katie; Dovidio, John F

    2017-03-01

    Although many researchers have explored the relations among gender identification, discriminatory attributions, and intentions to challenge discrimination, few have examined the causal impact of gender identity salience on women's actual responses to a sexist encounter. In the current study, we addressed this question by experimentally manipulating the salience of gender identity and assessing its impact on women's decision to confront a sexist comment in a simulated online interaction. Female participants ( N = 114) were randomly assigned to complete a short measure of either personal or collective self-esteem, which was designed to increase the salience of personal versus gender identity. They were then given the opportunity to confront a male interaction partner who expressed sexist views. Compared to those who were primed to focus on their personal identity, participants who were primed to focus on their gender identity perceived the interaction partner's remarks as more sexist and were more likely to engage in confrontation. By highlighting the powerful role of subtle contextual cues in shaping women's perceptions of, and responses to, sexism, our findings have important implications for the understanding of gender identity salience as an antecedent of prejudice confrontation. Online slides for instructors who want to use this article for teaching are available on PWQ's website at http://journals.sagepub.com/page/pwq/suppl/index.

  7. Online fingerprint verification.

    Science.gov (United States)

    Upendra, K; Singh, S; Kumar, V; Verma, H K

    2007-01-01

    As organizations search for more secure authentication methods for user access, e-commerce, and other security applications, biometrics is gaining increasing attention. With an increasing emphasis on the emerging automatic personal identification applications, fingerprint based identification is becoming more popular. The most widely used fingerprint representation is the minutiae based representation. The main drawback with this representation is that it does not utilize a significant component of the rich discriminatory information available in the fingerprints. Local ridge structures cannot be completely characterized by minutiae. Also, it is difficult quickly to match two fingerprint images containing different number of unregistered minutiae points. In this study filter bank based representation, which eliminates these weakness, is implemented and the overall performance of the developed system is tested. The results have shown that this system can be used effectively for secure online verification applications.

  8. Social Identity, Social Ties and Social Capital: A Study in Gaming Context

    Science.gov (United States)

    Jiang, Hao

    2012-01-01

    This work will focus on how different social relationships, namely shared identity and personal tie, will impact cooperative behavior, a form of social capital. I designed and conducted an economic game study to show that shared identity and personal ties work differently on cooperation among people and resource flow in social groups. Many factors…

  9. Gender identity development in adolescence.

    Science.gov (United States)

    Steensma, Thomas D; Kreukels, Baudewijntje P C; de Vries, Annelou L C; Cohen-Kettenis, Peggy T

    2013-07-01

    This article is part of a Special Issue "Puberty and Adolescence".This article aims to provide an outline of what is currently known on trajectories, and contributing factors to gender identity development in adolescence. We give a historical overview of the concept of gender identity, and describe general identity development in adolescence, gender identity development in the general population and in gender variant youth. Possible psychosocial (such as child and parental characteristics) and biological factors (such as the effects of prenatal exposure to gonadal hormones and the role of genetics) contributing to a gender variant identity are discussed. Studies focusing on a number of psychosocial and biological factors separately, indicate that each of these factors influence gender identity formation, but little is known about the complex interplay between the factors, nor about the way individuals themselves contribute to the process. Research into normative and gender variant identity development of adolescents is clearly lagging behind. However, studies on persons with gender dysphoria and disorders of sex development, show that the period of adolescence, with its changing social environment and the onset of physical puberty, seems to be crucial for the development of a non-normative gender identity. Copyright © 2013 Elsevier Inc. All rights reserved.

  10. Space Station personal hygiene study

    Science.gov (United States)

    Prejean, Stephen E.; Booher, Cletis R.

    1986-01-01

    A personal hygiene system is currently under development for Space Station application that will provide capabilities equivalent to those found on earth. This paper addresses the study approach for specifying both primary and contingency personal hygiene systems and provisions for specified growth. Topics covered are system definition and subsystem descriptions. Subsystem interfaces are explored to determine which concurrent NASA study efforts must be monitored during future design phases to stay up-to-date on critical Space Station parameters. A design concept for a three (3) compartment personal hygiene facility is included as a baseline for planned test and verification activities.

  11. Identity driven Capability based Access Control (ICAC) Scheme for the Internet of Things

    DEFF Research Database (Denmark)

    Mahalle, Parikshit N.; Anggorojati, Bayu; Prasad, Neeli R.

    2012-01-01

    Internet of Things (IoT) becomes discretionary part of everyday life. Scalability and manageability is daunting due to unbounded number of devices and services. Access control and authorization in IoT with least privilege is equally important to establish secure communication between multiple...... devices and services. In this paper, the concept of capability for access control is introduced where the identities of the involved devices are entrenched in the access capabilities. Identity driven capability based access control (ICAC) scheme presented in this paper helps to alleviate issues related...... to complexity and dynamics of device identities. ICAC is implemented for 802.11 and results shows that ICAC has less scalability issues and better performance analysis compared with other access control schemes. The ICAC evaluation by using security protocol verification tool shows that ICAC is secure against...

  12. Knowledge of identity and reputation: Do people have knowledge of others' perceptions?

    Science.gov (United States)

    Solomon, Brittany C; Vazire, Simine

    2016-09-01

    It may be important to know when our impressions of someone differ from how that person sees him/herself and how others see that same person. We investigated whether people are aware of how their friends see themselves (knowledge of identity) and are seen by others (knowledge of reputation). Previous research indicates that, for physical attractiveness, romantic partners do have such knowledge of others' perceptions, but it is unknown whether people in platonic relationships also detect such discrepancies between their own perceptions and others'. We examined this phenomenon for a new set of characteristics: the Big Five personality traits. Our primary research questions pertained to identity accuracy and reputation accuracy (i.e., knowledge of a target's self-views and how others view the target, respectively) and identity insight and reputation insight (i.e., identity accuracy and reputation accuracy that cannot be accounted for by a potential artifact: perceivers assuming that others share their own views of targets). However, after a series of preliminary tests, we did not examine reputation insight, as several necessary conditions were not met, indicating that any effects would likely be spurious. We did find that perceivers can accurately infer a target's identity and reputation on global personality traits (identity and reputation accuracy), and that perceivers can sometimes accurately distinguish between their own perceptions of targets and targets' self-views, but not others' views of targets (i.e., identity, but not reputation, insight). Finally, we explored boundary conditions for knowledge of others' perceptions and whether knowledge of identity is correlated with knowledge of reputation. (PsycINFO Database Record (c) 2016 APA, all rights reserved).

  13. Psychosocial identity (representation in the daily life (Theatrum Mundi

    Directory of Open Access Journals (Sweden)

    María de la Villa Moral Jiménez

    2010-03-01

    Full Text Available The search and subsequent redefinition of the personal and social identity constitutes one of the main objectives of everyone individual, as well as the differentiation and dialectical relationship between the self and the others. Similar dynamic and multidetermined process has been influenced by the symbolic and socialized action of the property groups and of others legitimize for the purpose agencies (family, peer-groups, mass-media, etc.. Likewise, we proceed to the presentation of identity in the daily life, goffmanian way, in the social stage where it shows manifold roles, way of characters in scene with several scripts to perform. Actor's personal identity derives from a socialized identity constructed from and by social relationships. In this article, by a psychosociological analysis perspective and with a dramatic art approach, we resort to the "theatrum mundi" analysis with the purpose of exemplify those self theatrical (representations in the social scene. 

  14. Voluntary switching between identities in dissociative identity disorder: A functional MRI case study.

    Science.gov (United States)

    Savoy, R L; Frederick, B B; Keuroghlian, A S; Wolk, P C

    2012-01-01

    Patients who suffer from dissociative identity disorder present unique scientific and clinical challenges for psychology and psychiatry. We have been fortunate in working with a patient who-while undergoing functional MRI-can switch rapidly and voluntarily between her main personality (a middle-aged, high-functioning woman) and an alternate personality (a 4-6-year-old girl). A unique task was designed to isolate the processes occurring during the switches between these personalities. Data are from two imaging sessions, conducted months apart, each showing the same activated areas during switches between these personalities. The activated areas include the following: the primary sensory and motor cortex, likely associated with characteristic facial movements made during switching; the nucleus accumbens bilaterally, possibly associated with aspects of reward connected with switching; and prefrontal sites, presumably associated with the executive control involved in the switching of personalities.

  15. The collective past, group psychology and personal narrative: shaping Jewish identity by memoirs of the Holocaust.

    Science.gov (United States)

    Rosenman, S; Handelsman, I

    1990-06-01

    Through honing its collective memory, especially after the Holocaust, the Jewish community has attempted to sustain its culture, bolster the Jewish identity of its members, and regain a resolute sense that its narrative is again proceeding. To some degree, all these aims are realized by instilling in its members the Jewish modal character structure: a psychological configuration with two contrastable entities. One chronically discomposed self-structure, defining itself as polluted and helpless, trembles with the appalling imagery of historical and imminent community disasters. The other entity believes in its unmatched capacity for reparative, socially beneficial actions. The paradigm of this psychological organization is found in many children of survivors. The memory of a tragic history abides alongside the community's hopes in the Jewish modal personality. The need to set forth and accommodate these two motifs imprints upon the Jewish "national" character many of its distinctive qualities. The designs of the Jewish community for this particularly Jewish twofold personality formation are augmented by the personal revelations of survivors. Therefore, Holocaustic testimonies are invested with a sacred aura. In measure, these recitals of the disaster with their stark images, plus the clashing affects aroused in the reader toward main characters of the narrative, dictate the way Jews define themselves in the world and the way they live. A confluence of being covertly commissioned by the Jewish community joins with the narrators' more idiosyncratic longings. Together they generate a steady stream of Holocaustic accounts. Complementary vectors drive the reader to peruse these records. The results therefrom, intimate knowledge of the disaster, plus the twofold personality motifs stamp many Jews as scions of the Holocaust.

  16. Identity Development in Personal Branding Instruction

    Science.gov (United States)

    Brooks, Ann K.; Anumudu, Chinedu

    2016-01-01

    Increased technology, integration of the global economy, and the shift from investing in long-term employees to hiring temporary contract workers have spawned pervasive employment insecurity. This trend has led to a growing industry of career and marketing professionals, who have found a career niche in helping job seekers create personal brands…

  17. Pleasure, pursuit of health or negotiation of identity? Personality correlates of food choice motives among young and middle-aged women.

    Science.gov (United States)

    Lindeman, M; Stark, K

    1999-08-01

    The clustering of four food choice motives (health, weight concern, pleasure and ideological reasons) and the relationship between personality and the food choice motives were analysed among young and middle-aged women in two studies. The personality variables included personal strivings, magical beliefs about food, awareness and internalization of thinness pressures, appearance and weight dissatisfaction, depression, self-esteem and symptoms of eating disorders. Study 1 was done with 171 young and middle-aged women. In Study 2, with data provided by 118 senior high-school girls, one cluster of girls who did not regard any of the food choice motives as important was found, otherwise the food choice clusters were fairly similar in both studies. They were labelled as health fosterers, gourmets, ideological eaters, health dieters and distressed dieters. Only the second dieter group, distressed dieters, showed low psychological well-being and symptoms of disordered eating. The results also indicated that ideological food choice motives (i.e. expression of one's identity via food) were best predicted by vegetarianism, magical beliefs about food and health, and personal strivings for ecological welfare and for understanding self and the world. Copyright 1999 Academic Press.

  18. Narratives, choices, alienation, and identity: learning from an elementary science teacher

    Science.gov (United States)

    Upadhyay, Bhaskar

    2009-09-01

    As we contemplate on teacher identity research, there is a need to place a teacher's narratives or story-lines at the center of that work. In this forum, in response to the insightful commentary from Stephen Ritchie and Maria Iñez Mafra Goulart and Eduardo Soares, I place a greater emphasis on understanding Daisy's narratives from an existing social identity framework. Narratives tell us intricate and complex actions that a teacher has taken both personally and professionally. Additionally, narratives help us see implicit nature of identity explicitly. Therefore, a greater focus has to be placed on interactions and utterances of a teacher to make sense of who they are and what they do as expressed by their own words (identity and action). Finally, I join with Ritchie and Goulart and Soares to advocate that identity research needs to include participants as co-researchers and co-authors as identities are very personal and complex to be fully understood by the outsiders (researchers).

  19. Identity as an older prisoner: findings from a qualitative study in Switzerland.

    Science.gov (United States)

    Haesen, Sophie; Wangmo, Tenzin; Elger, Bernice S

    2018-06-01

    The increasing numbers of aging prisoners raise the issue of how they maintain their personal identity and self-esteem in light of long-standing detention. This study sought to answer this question since identity and self-esteem could influence mental and physical health. We conducted a secondary analysis of 35 qualitative interviews that were carried out with older inmates aged 51-75 years (mean age: 61 years) living in 12 Swiss prisons. We identified three main themes that characterized their identity: personal characterization of identity, occupational identity, and social identity. These main themes were divided into sub-themes such as familial network, retirement rights or subjective social position. Personal characterization of identity mostly happened through being part of a network of family and/or friends that supported them during imprisonment and where the prisoner could return to after release. Individual activities and behavior also played an important role for prisoners in defining themselves. Occupational identity was drawn from work that had been carried out either before or during imprisonment although in some cases the obligation to work in prison even after reaching retirement age was seen as a constraint. Social identity came from a role of mentor or counselor for younger inmates, and in a few cases older prisoners compared themselves to other inmates and perceived themselves as being in a higher social position. Identity was often expressed as a mix between positive and negative traits. Building on those elements during incarceration can contribute to better mental health of the individual prisoner which in turn influences the chances for successful rehabilitation.

  20. FMCT verification: Case studies

    International Nuclear Information System (INIS)

    Hui Zhang

    2001-01-01

    Full text: How to manage the trade-off between the need for transparency and the concern about the disclosure of sensitive information would be a key issue during the negotiations of FMCT verification provision. This paper will explore the general concerns on FMCT verification; and demonstrate what verification measures might be applied to those reprocessing and enrichment plants. A primary goal of an FMCT will be to have the five declared nuclear weapon states and the three that operate unsafeguarded nuclear facilities become parties. One focus in negotiating the FMCT will be verification. Appropriate verification measures should be applied in each case. Most importantly, FMCT verification would focus, in the first instance, on these states' fissile material production facilities. After the FMCT enters into force, all these facilities should be declared. Some would continue operating to produce civil nuclear power or to produce fissile material for non- explosive military uses. The verification measures necessary for these operating facilities would be essentially IAEA safeguards, as currently being applied to non-nuclear weapon states under the NPT. However, some production facilities would be declared and shut down. Thus, one important task of the FMCT verifications will be to confirm the status of these closed facilities. As case studies, this paper will focus on the verification of those shutdown facilities. The FMCT verification system for former military facilities would have to differ in some ways from traditional IAEA safeguards. For example, there could be concerns about the potential loss of sensitive information at these facilities or at collocated facilities. Eventually, some safeguards measures such as environmental sampling might be seen as too intrusive. Thus, effective but less intrusive verification measures may be needed. Some sensitive nuclear facilities would be subject for the first time to international inspections, which could raise concerns

  1. Inspector measurement verification activities

    International Nuclear Information System (INIS)

    George, R.S.; Crouch, R.

    e most difficult and complex activity facing a safeguards inspector involves the verification of measurements and the performance of the measurement system. Remeasurement is the key to measurement verification activities. Remeasurerements using the facility's measurement system provide the bulk of the data needed for determining the performance of the measurement system. Remeasurements by reference laboratories are also important for evaluation of the measurement system and determination of systematic errors. The use of these measurement verification activities in conjunction with accepted inventory verification practices provides a better basis for accepting or rejecting an inventory. (U.S.)

  2. Verification and disarmament

    Energy Technology Data Exchange (ETDEWEB)

    Blix, H. [IAEA, Vienna (Austria)

    1998-07-01

    The main features are described of the IAEA safeguards verification system that non-nuclear weapon states parties of the NPT are obliged to accept. Verification activities/problems in Iraq and North Korea are discussed.

  3. Verification and disarmament

    International Nuclear Information System (INIS)

    Blix, H.

    1998-01-01

    The main features are described of the IAEA safeguards verification system that non-nuclear weapon states parties of the NPT are obliged to accept. Verification activities/problems in Iraq and North Korea are discussed

  4. The Brand Identity: A Strategic Shift for Success

    Directory of Open Access Journals (Sweden)

    Victor Danciu

    2010-06-01

    Full Text Available The strong identity is a key condition for the real success of a brand strategy. The identity reflects the inner value of the brand and describes its potential success. In order to maximize this value a brand identity should include and develop all dimensions of its complex structure. The product, the organizational, the personality and the symbolic dimension of the brand identity could develop a greatcapability for many associations that could be made to the brand.Apple is a brand that has a distinct and clear identity. All four dimensions of a good brand identity could be identified in the Apple case. This provides a high level of quality, performance and valuethat are able to win the customer’s respect and loyalty.

  5. Cues to identity in online dyads : Effects of interpersonal versus intragroup perceptions on performance

    NARCIS (Netherlands)

    Tanis, Martin; Postmes, Tom

    This article examines the impact of cues to personal identity on the quality of dyadic collaboration via computer-mediated communication systems. Study 1 (N = 180) shows that an absence of cues to personal identity resulted in more work satisfaction and better subjective performance. Analyses

  6. Not looking yourself: The cost of self-selecting photographs for identity verification.

    Science.gov (United States)

    White, David; Burton, Amy L; Kemp, Richard I

    2016-05-01

    Photo-identification is based on the premise that photographs are representative of facial appearance. However, previous studies show that ratings of likeness vary across different photographs of the same face, suggesting that some images capture identity better than others. Two experiments were designed to examine the relationship between likeness judgments and face matching accuracy. In Experiment 1, we compared unfamiliar face matching accuracy for self-selected and other-selected high-likeness images. Surprisingly, images selected by previously unfamiliar viewers - after very limited exposure to a target face - were more accurately matched than self-selected images chosen by the target identity themselves. Results also revealed extremely low inter-rater agreement in ratings of likeness across participants, suggesting that perceptions of image resemblance are inherently unstable. In Experiment 2, we test whether the cost of self-selection can be explained by this general disagreement in likeness judgments between individual raters. We find that averaging across rankings by multiple raters produces image selections that provide superior identification accuracy. However, benefit of other-selection persisted for single raters, suggesting that inaccurate representations of self interfere with our ability to judge which images faithfully represent our current appearance. © 2015 The British Psychological Society.

  7. Education and identity of adult educators

    Directory of Open Access Journals (Sweden)

    Zoran Jelenc

    2010-10-01

    Full Text Available Adult education and learning has because of its wide extensiveness and variability huge difficulties with its identity. Difficulties appear in all three spheres of identity: professional identity of adult education; societal identity of the field; and personal identity with the profession. In our contribution we list and describe difficulties in all three identity areas. Insufficient identity is a great obstacle for continuing education and further training of those who work or wish to work in adult education or they are obliged to carry out such education. They are all named ‘adult educators’ but their roles and tasks in education are different. Contents and ways of realization of programs have to be adapted to that. We recommend: modular programs for different target groups should be created from a wide list of contents; more sophisticated methods of marketing and recruiting should be used for the better realization of programs; programs should enable participants to get publicly recognized certificates and in this way current program of pedagogical-andragogical education which does not follow enough above-named difficulties of identity should be replaced; successful programs should be distributed all over Slovenia and performed in cooperation with another providers.

  8. Monitoring/Verification Using DMS: TATP Example

    International Nuclear Information System (INIS)

    Kevin Kyle; Stephan Weeks

    2008-01-01

    Field-rugged and field-programmable differential mobility spectrometry (DMS) networks provide highly selective, universal monitoring of vapors and aerosols at detectable levels from persons or areas involved with illicit chemical/biological/explosives (CBE) production. CBE sensor motes used in conjunction with automated fast gas chromatography with DMS detection (GC/DMS) verification instrumentation integrated into situational operations management systems can be readily deployed and optimized for changing application scenarios. The feasibility of developing selective DMS motes for a 'smart dust' sampling approach with guided, highly selective, fast GC/DMS verification analysis is a compelling approach to minimize or prevent the illegal use of explosives or chemical and biological materials. DMS is currently one of the foremost emerging technologies for field separation and detection of gas-phase chemical species. This is due to trace-level detection limits, high selectivity, and small size. GC is the leading analytical method for the separation of chemical species in complex mixtures. Low-thermal-mass GC columns have led to compact, low-power field systems capable of complete analyses in 15-300 seconds. A collaborative effort optimized a handheld, fast GC/DMS, equipped with a non-rad ionization source, for peroxide-based explosive measurements

  9. Ethical, legal and social issues in restoring genetic identity after forced disappearance and suppression of identity in Argentina.

    Science.gov (United States)

    Penchaszadeh, Victor B

    2015-07-01

    Human genetic identification has been increasingly associated with the preservation, defence and reparation of human rights, in particular the right to genetic identity. The Argentinian military dictatorship of 1976-1983 engaged in a savage repression and egregious violations of human rights, including forced disappearance, torture, assassination and appropriation of children of the disappeared with suppression of their identity. The ethical, legal and social nuances in the use of forensic genetics to support the right to identity in Argentina included issues such as the best interest of children being raised by criminals, the right to learn the truth of one's origin and identity, rights of their biological families, the issue of voluntary versus compulsory testing of victims, as well as the duty of the state to investigate crimes against humanity, punish perpetrators and provide justice and reparation to the victims. In the 30 years following the return to democracy in 1984, the search, localization and DNA testing of disappeared children and young adults has led, so far, to the genetic identification of 116 persons who had been abducted as babies. The high value placed on DNA testing to identify victims of identity suppression did not conflict with the social consensus that personal identity is a complex and dynamic concept, attained by the interaction of genetics with historical, social, emotional, educational, cultural and other important environmental factors. The use of genetic identification as a tool to redress and repair human rights violations is a novel application of human genetics within a developing set of ethical and political circumstances.

  10. Academic Developer Identity: How We Know Who We Are

    Science.gov (United States)

    Kinash, Shelley; Wood, Kayleen

    2013-01-01

    This paper explores academic developer identity by applying self-concept theory and appreciative inquiry to the personal journeys of two academic developers. Self-attribution, social comparison and reflected appraisals are presented and applied to explain how academic developers form their identities. Sociological principles are incorporated to…

  11. The Pattern of Sexual Interest of Female-to-Male Transsexual Persons With Gender Identity Disorder Does Not Resemble That of Biological Men: An Eye-Tracking Study

    Directory of Open Access Journals (Sweden)

    Akira Tsujimura

    2017-09-01

    Tsujimura A, Kiuchi H, Soda T, et al. The Pattern of Sexual Interest of Female-to-Male Transsexual Persons With Gender Identity Disorder Does Not Resemble That of Biological Men: An Eye-Tracking Study. Sex Med 2017;5:e169–e174.

  12. Recognizing Moral Identity as a Cultural Construct.

    Science.gov (United States)

    Jia, Fanli; Krettenauer, Tobias

    2017-01-01

    Current research on moral identity shows that moral identity predicts moral action in Western cultures but not in non-Western cultures. The present paper argues that this may be due to the fact that the concept of moral identity is culturally biased. In order to remedy this situation, we argue that researchers should broaden their scopes of inquiry by adding a cultural lens to their studies of moral identity. This change is important because although some concept of moral identity likely exists in all cultures, it may function in different ways and at different levels in each place. We propose that moral identity is a context-dependent construct tied to varying social and cultural obligations. We argue that Western moral identity stresses an individually oriented morality, whereas, people from Eastern cultures consider a highly moral person to be societally oriented. We conclude by discussing the implications of this view for future research.

  13. RFID-based Electronic Identity Security Cloud Platform in Cyberspace

    OpenAIRE

    Bing Chen; Chengxiang Tan; Bo Jin; Xiang Zou; Yuebo Dai

    2012-01-01

    With the moving development of networks, especially Internet of Things, electronic identity administration in cyberspace is becoming more and more important. And personal identity management in cyberspace associated with individuals in reality has been one significant and urgent task for the further development of information construction in China. So this paper presents a RFID-based electronic identity security cloud platform in cyberspace to implement an efficient security management of cyb...

  14. HDL to verification logic translator

    Science.gov (United States)

    Gambles, J. W.; Windley, P. J.

    1992-01-01

    The increasingly higher number of transistors possible in VLSI circuits compounds the difficulty in insuring correct designs. As the number of possible test cases required to exhaustively simulate a circuit design explodes, a better method is required to confirm the absence of design faults. Formal verification methods provide a way to prove, using logic, that a circuit structure correctly implements its specification. Before verification is accepted by VLSI design engineers, the stand alone verification tools that are in use in the research community must be integrated with the CAD tools used by the designers. One problem facing the acceptance of formal verification into circuit design methodology is that the structural circuit descriptions used by the designers are not appropriate for verification work and those required for verification lack some of the features needed for design. We offer a solution to this dilemma: an automatic translation from the designers' HDL models into definitions for the higher-ordered logic (HOL) verification system. The translated definitions become the low level basis of circuit verification which in turn increases the designer's confidence in the correctness of higher level behavioral models.

  15. [Effects of community identity and topophilia on environmentally-conscious behavior].

    Science.gov (United States)

    Nonami, Hiroshi; Kato, Junzo

    2009-04-01

    This study classified environmentally-conscious behaviors of residents (n = 335) along Lake Biwa as a common goods into personal and group behavioral intentions, and examined the determinants of these intentions. Identification with the community was a social identity, and differed from attachment to Lake Biwa, which was defined as topophilia. The results indicated that group behavior was affected by topophilia, while personal behavior was influenced by general attitudes about the environmental problems of the lake and evaluations of the cost for the behavior. Community identity had a significant effect on both personal and group behavior. Rational or emotional decision making processes resulted in two different types of environmentally-conscious behaviors.

  16. Beyond Race: Examining the Facets of Multiracial Identity through a Life-Span Developmental Lens

    Science.gov (United States)

    Jackson, Kelly F.

    2009-01-01

    Using a social work developmental lens, this qualitative study explored some of the numerous social and environmental factors that shape a multiracial individual's cultural identity. Results from transcript analysis portray the cultural identity of multiracial persons as significantly influenced by (1) personal experiences of racism and…

  17. Perceiving and Confronting Sexism: The Causal Role of Gender Identity Salience

    Science.gov (United States)

    Wang, Katie; Dovidio, John F.

    2017-01-01

    Although many researchers have explored the relations among gender identification, discriminatory attributions, and intentions to challenge discrimination, few have examined the causal impact of gender identity salience on women’s actual responses to a sexist encounter. In the current study, we addressed this question by experimentally manipulating the salience of gender identity and assessing its impact on women’s decision to confront a sexist comment in a simulated online interaction. Female participants (N = 114) were randomly assigned to complete a short measure of either personal or collective self-esteem, which was designed to increase the salience of personal versus gender identity. They were then given the opportunity to confront a male interaction partner who expressed sexist views. Compared to those who were primed to focus on their personal identity, participants who were primed to focus on their gender identity perceived the interaction partner’s remarks as more sexist and were more likely to engage in confrontation. By highlighting the powerful role of subtle contextual cues in shaping women’s perceptions of, and responses to, sexism, our findings have important implications for the understanding of gender identity salience as an antecedent of prejudice confrontation. Online slides for instructors who want to use this article for teaching are available on PWQ’s website at http://journals.sagepub.com/page/pwq/suppl/index. PMID:29051685

  18. Unaware person recognition from the body when face identification fails.

    Science.gov (United States)

    Rice, Allyson; Phillips, P Jonathon; Natu, Vaidehi; An, Xiaobo; O'Toole, Alice J

    2013-11-01

    How does one recognize a person when face identification fails? Here, we show that people rely on the body but are unaware of doing so. State-of-the-art face-recognition algorithms were used to select images of people with almost no useful identity information in the face. Recognition of the face alone in these cases was near chance level, but recognition of the person was accurate. Accuracy in identifying the person without the face was identical to that in identifying the whole person. Paradoxically, people reported relying heavily on facial features over noninternal face and body features in making their identity decisions. Eye movements indicated otherwise, with gaze duration and fixations shifting adaptively toward the body and away from the face when the body was a better indicator of identity than the face. This shift occurred with no cost to accuracy or response time. Human identity processing may be partially inaccessible to conscious awareness.

  19. Do Data Breach Disclosure Laws Reduce Identity Theft?

    Science.gov (United States)

    Romanosky, Sasha; Telang, Rahul; Acquisti, Alessandro

    2011-01-01

    In the United States, identity theft resulted in corporate and consumer losses of $56 billion dollars in 2005, with up to 35 percent of known identity thefts caused by corporate data breaches. Many states have responded by adopting data breach disclosure laws that require firms to notify consumers if their personal information has been lost or…

  20. From Diversity to Identity: Schools Where Everyone Belongs.

    Science.gov (United States)

    Hodder, Janyne M.

    Schools are an important source of personal identity and group integration. In Canada, schools are better equipped to contribute to both individual and group identities than they are to be agents of general social integration. The central goal of schools is to provide quality education, and part of this mission is being more confident and creative…

  1. 'I am not a dyslexic person I'm a person with dyslexia': identity constructions of dyslexia among students in nurse education.

    Science.gov (United States)

    Evans, William

    2014-02-01

    To introduce how nursing students discursively construct their dyslexic identities. Identity mediates many important facets of a student's scholarly journey and the availability and use of discourses play a critical part in their ongoing construction. A discourse-based design was used to examine the language employed by students in constructing their dyslexic identities. Using narrative methods, 12 student nurses with dyslexia from two higher education institutions in the Republic of Ireland were interviewed during the period February-July 2012. Discourse analysis of interviews entailed a two-stage approach: leading identity analysis followed by thematic analysis. Discourses used by students to construct their dyslexic identity correspond with positions on an 'Embracer, Passive Engager and Resister' continuum heuristic. The majority of students rejected any reference to using medical or disabled discourses and instead drew on contemporary language in constructing their dyslexic identity. Nine of the 12 students did not disclose their dyslexic identity in practice settings and drew on not being understood to support this position. In addition, a discourse linking 'being stupid' with dyslexia was pervasive in most student narratives and evolved from historical as well as more recent interactions in nurse education. This study indicates variation in how students discursively construct their dyslexic identities, which, in turn, has an impact on disclosure behaviours. Policy leaders must continue to be mindful of wider sociocultural and individualized understandings of dyslexic identities to enhance inclusion prerogatives. © 2013 John Wiley & Sons Ltd.

  2. Attesting the Self: Narration and Identity Change during Periods of Residence Abroad.

    Science.gov (United States)

    Crawshaw, Robert; Callen, Beth; Tusting, Karin

    2001-01-01

    Considers the relationship between student diary writing and the formation of personal identity as it occurs in cross-cultural situations. Reviews figures associated with the concept of identity and argues that identity cannot be accounted for by separating intrinsic from extrinsic attributes. (Author/VWL)

  3. Integrating Personal and Professional Development.

    Science.gov (United States)

    Lippitt, Gordon L.

    1980-01-01

    The author outlines ways to integrate work identity and social identity in order to improve the quality of life. He presents a model for maintaining balance between personal and professional growth, which can stimulate achievement in six areas of human potential. (SK)

  4. The search for identity in Bessie Head's Maru | Egbung | Sophia: An ...

    African Journals Online (AJOL)

    The search for identity is an inward search that is propelled by a situation where the real being of a person is questioned. Identity determines self-perception, configuration of spaces, and the politics of interpersonal relationship. This paper uses the feminist theory to argue that the search for identity and self-actualization is ...

  5. South African Identities on the Edge: Lauren Beukes's Moxyland ...

    African Journals Online (AJOL)

    We follow the work of various critics and argue that the text presents identity as fractured, riven and characterized by sharp edges. The edges in question refer to the boundaries of personal, corporeal, national and corporate identity. These edges may be considered symptomatic of the individual and social demands placed ...

  6. Identity, storytelling and the philanthropic journey

    Science.gov (United States)

    Maclean, Mairi; Harvey, Charles; Gordon, Jillian; Shaw, Eleanor

    2015-01-01

    This article develops theoretical understanding of the involvement of wealthy entrepreneurs in socially transformative projects by offering a foundational theory of philanthropic identity narratives. We show that these narratives are structured according to the metaphorical framework of the journey, through which actors envision and make sense of personal transformation. The journey provides a valuable metaphor for conceptualizing narrative identities in entrepreneurial careers as individuals navigate different social landscapes, illuminating identities as unfolding through a process of wayfinding in response to events, transitions and turning-points. We delineate the journey from entrepreneurship to philanthropy, and propose a typology of rewards that entrepreneurs claim to derive from giving. We add to the expanding literature on narrative identities by suggesting that philanthropic identity narratives empower wealthy entrepreneurs to generate a legacy of the self that is both self- and socially oriented, these ‘generativity scripts’ propelling their capacity for action while ensuring the continuation of their journeys. PMID:26456976

  7. Identity, storytelling and the philanthropic journey.

    Science.gov (United States)

    Maclean, Mairi; Harvey, Charles; Gordon, Jillian; Shaw, Eleanor

    2015-10-01

    This article develops theoretical understanding of the involvement of wealthy entrepreneurs in socially transformative projects by offering a foundational theory of philanthropic identity narratives. We show that these narratives are structured according to the metaphorical framework of the journey , through which actors envision and make sense of personal transformation. The journey provides a valuable metaphor for conceptualizing narrative identities in entrepreneurial careers as individuals navigate different social landscapes, illuminating identities as unfolding through a process of wayfinding in response to events, transitions and turning-points. We delineate the journey from entrepreneurship to philanthropy, and propose a typology of rewards that entrepreneurs claim to derive from giving. We add to the expanding literature on narrative identities by suggesting that philanthropic identity narratives empower wealthy entrepreneurs to generate a legacy of the self that is both self- and socially oriented, these 'generativity scripts' propelling their capacity for action while ensuring the continuation of their journeys.

  8. Human Rights and the Excess of Identity: A Legal and Theoretical Inquiry into the Notion of Identity in Strasbourg Case Law.

    Science.gov (United States)

    Al Tamimi, Yussef

    2018-06-01

    Identity is a central theme in contemporary politics, but legal academia lacks a rigorous analysis of this concept. The aim of this article is twofold: (i) firstly, it aims to reveal presumptions on identity in human rights law by mapping how the European Court of Human Rights approaches identity and (ii) secondly, it seeks to analyse these presumptions using theoretical insights on identity. By merging legal and theoretical analysis, this article contributes a reading of the Court's case law which suggests that the tension between the political and apolitical is visible as a common thread in the Court's use of identity. In case law concerning paternity, the Court appears to hold a specific view of what is presented as an unquestionable part of identity. This ostensibly pre-political notion of identity becomes untenable in cases where the nature of an identity feature, such as the headscarf, is contended or a minority has adopted a national identity that conflicts with the majoritarian national identity. The Court's approach to identity in such cases reflects a paradox that is inherent to identity; identity is personal while simultaneously constituted and shaped by overarching power mechanisms.

  9. The Visual Identity Project

    Science.gov (United States)

    Tennant-Gadd, Laurie; Sansone, Kristina Lamour

    2008-01-01

    Identity is the focus of the middle-school visual arts program at Cambridge Friends School (CFS) in Cambridge, Massachusetts. Sixth graders enter the middle school and design a personal logo as their first major project in the art studio. The logo becomes a way for students to introduce themselves to their teachers and to represent who they are…

  10. Being Riveted to Oneself: Shame and Personal Identity

    OpenAIRE

    Montes Sánchez, Alba

    2011-01-01

    II Workshop on Identity, Memory and Experience. Getafe (Spain), March 1-4th, 2011 In Shame and Necessity, his brilliant book on the ethics of the Ancient Greeks, Bernard Williams performed a detailed and intriguing analysis of an emotion that, up to then, had been given little merit in connection to morality. Arguing with his former professor, E.R. Dodds, and picking up on a distinction between "shame cultures" and "guilt cultures" drawn by American anthropologist Ruth Benedict, William...

  11. Impact of identity theft on methods of identification.

    Science.gov (United States)

    McLemore, Jerri; Hodges, Walker; Wyman, Amy

    2011-06-01

    Responsibility for confirming a decedent's identity commonly falls on the shoulders of the coroner or medical examiner. Misidentification of bodies results in emotional turmoil for the next-of-kin and can negatively impact the coroner's or medical examiner's career. To avoid such mishaps, the use of scientific methods to establish a positive identification is advocated. The use of scientific methods of identification may not be reliable in cases where the decedent had assumed the identity of another person. Case studies of erroneously identified bodies due to identity theft from the state medical examiner offices in Iowa and New Mexico are presented. This article discusses the scope and major concepts of identity theft and how identity theft prevents the guarantee of a positive identification.

  12. Likelihood-ratio-based biometric verification

    NARCIS (Netherlands)

    Bazen, A.M.; Veldhuis, Raymond N.J.

    2002-01-01

    This paper presents results on optimal similarity measures for biometric verification based on fixed-length feature vectors. First, we show that the verification of a single user is equivalent to the detection problem, which implies that for single-user verification the likelihood ratio is optimal.

  13. Likelihood Ratio-Based Biometric Verification

    NARCIS (Netherlands)

    Bazen, A.M.; Veldhuis, Raymond N.J.

    The paper presents results on optimal similarity measures for biometric verification based on fixed-length feature vectors. First, we show that the verification of a single user is equivalent to the detection problem, which implies that, for single-user verification, the likelihood ratio is optimal.

  14. Three cases of dissociative identity disorder and co-occurring borderline personality disorder treated with dynamic deconstructive psychotherapy.

    Science.gov (United States)

    Chlebowski, Susan M; Gregory, Robert J

    2012-01-01

    Dissociative Identity Disorder (DID) is an under-researched entity and there are no clinical trials employing manual-based therapies and validated outcome measures. There is evidence that borderline personality disorder (BPD) commonly co-occurs with DID and can worsen its course. The authors report three cases of DID with co-occurring BPD that we successfully treated with a manual-based treatment, Dynamic Deconstructive Psychotherapy (DDP). Each of the three clients achieved a 34% to 79% reduction in their Dissociative Experiences Scale scores within 12 months of initiating therapy. Dynamic Deconstructive Psychotherapy was developed for treatment refractory BPD and differs in some respects from expert consensus treatment of DID. It may be a promising modality for DID complicated by co-occurring BPD.

  15. Positive identity entry control system with geographically distributed portals and enrollment stations

    International Nuclear Information System (INIS)

    McIntire, J.M.

    1985-01-01

    A positive identity entry control system using distributed processing to allow reliable geographically separated portals and enrollment stations has been installed and is fully operational at a large area DOE site. Identity verification requires a credential, a memorized number and measurement of a physical characteristic of the user. Additionally, all portal activity is monitored by guards. The portal system is dual redundant such that no single point failure will shut down operations. Each portal site maintains its own subset of the master data base so off-site failure of the central data base manager or its communication links will not significantly affect local portal activity. The system is suitable for installations with large populations requiring access control at several remote sites scattered over a large area

  16. Apparent Amnesia : interidentity memory functioning in dissociative identity disdorder

    OpenAIRE

    Huntjens, R.J.C.

    2003-01-01

    Dissociative identity disorder (DID) is characterized by the presence of two or more distinct identities or personality states that recurrently take control of the individual s behavior. Between 95 and 100 % of DID patients report experiences of blank spells for periods of time when other identities are in control of their behavior. In this thesis, the fundamental question of whether objective evidence for the reported interidentity amnesia in DID can be found under rigorous experimental cond...

  17. An ontology based trust verification of software license agreement

    Science.gov (United States)

    Lu, Wenhuan; Li, Xiaoqing; Gan, Zengqin; Wei, Jianguo

    2017-08-01

    When we install software or download software, there will show up so big mass document to state the rights and obligations, for which lots of person are not patient to read it or understand it. That would may make users feel distrust for the software. In this paper, we propose an ontology based verification for Software License Agreement. First of all, this work proposed an ontology model for domain of Software License Agreement. The domain ontology is constructed by proposed methodology according to copyright laws and 30 software license agreements. The License Ontology can act as a part of generalized copyright law knowledge model, and also can work as visualization of software licenses. Based on this proposed ontology, a software license oriented text summarization approach is proposed which performances showing that it can improve the accuracy of software licenses summarizing. Based on the summarization, the underline purpose of the software license can be explicitly explored for trust verification.

  18. Helping Gay and Lesbian Students Integrate Sexual and Religious Identities

    Science.gov (United States)

    Bayne, Hannah Barnhill

    2016-01-01

    This article explores the impact of sexual and religious identity on college student development, examining developmental models and discussing how counselors can assist gay and lesbian students with integrating these 2 personal identities. Treatment approaches are presented, and the article concludes with an examination of ethical and…

  19. Scalable Techniques for Formal Verification

    CERN Document Server

    Ray, Sandip

    2010-01-01

    This book presents state-of-the-art approaches to formal verification techniques to seamlessly integrate different formal verification methods within a single logical foundation. It should benefit researchers and practitioners looking to get a broad overview of the spectrum of formal verification techniques, as well as approaches to combining such techniques within a single framework. Coverage includes a range of case studies showing how such combination is fruitful in developing a scalable verification methodology for industrial designs. This book outlines both theoretical and practical issue

  20. Role identity and its implications in the athlete’s personal development

    Directory of Open Access Journals (Sweden)

    Paul Miron

    2010-12-01

    Full Text Available Purpose. This study seeks to highlight the strong identification of athletes with the role they fulfill and the possible consequences that a limited self-identity can have upon entering a transition phase towards another career outside the sporting world and other social settings.Methods. For accomplishing the goals of this essay I have used the methods of observation and bibliographical study.Conclusions. Analysis reveals that coincidences, both positive and negative, associated with this strong sportive identity, do indeed exist. Sportive identity has been related to improvement of sportive performances rise of self-confidence improvement of the social relations and interactions and diminishment of anxiety. On the other hand, one-dimensional orientation towards achieving sportive excellence, which comes along with competing in the elite class, can have potential psychological and social dangers The high level of identification with the role of an athlete can devalorify a quality education or even completely ignore it in some of the development stages, thus taking away from the athletes’ important competences necessary in the development of the individual.

  1. Is Personal Identity Evaluative? | Poltera | South African Journal of ...

    African Journals Online (AJOL)

    Martha Nussbaum subscribes to the view that our identity is an evaluative question determined by our common, deeply held beliefs about what is worthwhile in human life. In so doing, she asserts that for an account of ethics to have “philosophical power” it needs to be grounded in an account of human nature that is both ...

  2. Feminist Identity among Latina Adolescents

    Science.gov (United States)

    Manago, Adriana M.; Brown, Christia Spears; Leaper, Campbell

    2009-01-01

    This study explores developing conceptions of feminism among Latina adolescents, their prevalence of feminist endorsement, and whether home environment and well-being are related to feminist identity. One hundred and forty Latina girls (Grades 9 to 12, M age = 15) wrote personal narratives of their understanding of feminism and whether they…

  3. Positioning health professional identity

    DEFF Research Database (Denmark)

    Lund, Ole; Krogh Christensen, Mette; Mørcke, Anne Mette

    2017-01-01

    Drawing on positioning theory, the purpose of this paper is to characterize the activities and positions of students and supervisors at workplaces and on-campus skills training sites across the higher health professional educations of medicine, sports science, and nursing. Furthermore, the study ...... explored the impact of work-based learning (WBL) and skills training on students’ personal professional identity development....

  4. Negotiating Academic Teacher Identity Shifts during Higher Education Contextual Change

    Science.gov (United States)

    McNaughton, Susan Maree; Billot, Jennie

    2016-01-01

    Higher education teachers' roles and identities are constantly shifting in response to contextual change. Pedagogy, values, and professional and personal narratives of self are all affected, particularly by technological change. This paper explores the role and identity shifts of academics during the introduction of large-class videoconferencing.…

  5. Identity Disturbance, Feelings of Emptiness, and the Boundaries of the Schizophrenia Spectrum

    DEFF Research Database (Denmark)

    Zandersen, Maja; Parnas, Josef

    2018-01-01

    in schizophrenia and schizotypal personality disorder. Unfortunately, the diagnostic manuals offer limited insight into the nature of these criteria, including possible deviations and similarities with schizophrenia spectrum symptomatology. In this article, we attempt to clarify the concepts of identity......Historical and current research on borderline personality disorder reveal certain affinities with schizophrenia spectrum psychopathology. This is also the case for the borderline criteria of "identity disturbance" and "feelings of emptiness," which reflect symptomatology frequently found...

  6. Content analysis of age verification, purchase and delivery methods of internet e-cigarette vendors, 2013 and 2014.

    Science.gov (United States)

    Williams, Rebecca S; Derrick, Jason; Liebman, Aliza Kate; LaFleur, Kevin; Ribisl, Kurt M

    2018-05-01

    Identify the population of internet e-cigarette vendors (IEVs) and conduct content analyses of their age verification, purchase and delivery methods in 2013 and 2014. We used multiple sources to identify IEV websites, primarily complex search algorithms scanning more than 180 million websites. In 2013, we manually screened 32 446 websites, identifying 980 IEVs, selecting the 281 most popular for content analysis. This methodology yielded 31 239 websites for screening in 2014, identifying 3096 IEVs, with 283 selected for content analysis. The proportion of vendors that sold online-only, with no retail store, dropped significantly from 2013 (74.7%) to 2014 (64.3%) (ponline age verification services (7.1% in 2013 and 8.5% in 2014), driving licences (1.8% in 2013 and 7.4% in 2014, ponline e-cigarette sales are needed, including strict age and identity verification requirements. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2018. All rights reserved. No commercial use is permitted unless otherwise expressly granted.

  7. Advanced verification methods for OVI security ink

    Science.gov (United States)

    Coombs, Paul G.; McCaffery, Shaun F.; Markantes, Tom

    2006-02-01

    OVI security ink +, incorporating OVP security pigment* microflakes, enjoys a history of effective document protection. This security feature provides not only first-line recognition by the person on the street, but also facilitates machine-readability. This paper explores the evolution of OVI reader technology from proof-of-concept to miniaturization. Three different instruments have been built to advance the technology of OVI machine verification. A bench-top unit has been constructed which allows users to automatically verify a multitude of different banknotes and OVI images. In addition, high speed modules were fabricated and tested in a state of the art banknote sorting machine. Both units demonstrate the ability of modern optical components to illuminate and collect light reflected from the interference platelets within OVI ink. Electronic hardware and software convert and process the optical information in milliseconds to accurately determine the authenticity of the security feature. Most recently, OVI ink verification hardware has been miniaturized and simplified providing yet another platform for counterfeit protection. These latest devices provide a tool for store clerks and bank tellers to unambiguously determine the validity of banknotes in the time period it takes the cash drawer to be opened.

  8. FREE-FLOATING IDENTITIES: SOCIAL PAIN OR SOCIAL GAIN?

    Directory of Open Access Journals (Sweden)

    Tadej Praprotnik

    2014-09-01

    Full Text Available The article is focused to the problem of identity. It sketches some basic assumptions and questions the notion of identity. Identities are not stable and everlasting entities of some sort, because it is typical of the present time to be aware of the absence of any firm ground that could make universal identification possible. The truth about identities has to be sought first and foremost in its constant course of redefinition and denial, some continuous cutting of the rotten away from the good parts; it is not, as could well be expected, a goal of some kind that individuals might eventually achieve. The question of identity is problematized within the new media environment too. The potential of virtual reality lies actually in the very process of redefinition of identities itself, which is very typical for this reality. The individuals should find out that they themselves are constructed but that they can redefine again their individuality and identity in the corresponding internet environment. As far as idea of “virtual liberation” is concerned – we come across many questions and problems. The first problem concerns the fact that virtual persons are still “the same” persons. The question of creativity is connected to this because it is more and more obvious that the biggest limitation in virtual world are the people themselves. They project into virtual space all that they have learnt and realized in everyday life. In this sense the internet and popular culture connected with it are especially and above all an extension and not the alternative to the existing culture.

  9. Personal identity narratives of therapeutic songwriting participants following Spinal Cord Injury: A case series analysis.

    Science.gov (United States)

    Roddy, Chantal; Rickard, Nikki; Tamplin, Jeanette; Baker, Felicity Anne

    2018-07-01

    Spinal Cord Injury (SCI) patients face unique identity challenges associated with physical limitations, higher comorbid depression, increased suicidality and reduced subjective well-being. Post-injury identity is often unaddressed in subacute rehabilitation environments where critical physical and functional rehabilitation goals are prioritized. Therapeutic songwriting has demonstrated prior efficacy in promoting healthy adjustment and as a means of expression for post-injury narratives. The current study sought to examine the identity narratives of therapeutic songwriting participants. Case-series analysis of the individual identity trajectories of eight individuals. Subacute rehabilitation facility, Victoria, Australia. Eight individuals with an SCI; 7 males and 1 female. Six-week therapeutic songwriting intervention facilitated by a music therapist to promote identity rehabilitation. Identity, subjective well-being and distress, emotional state. Three participants demonstrated positive trajectories and a further three showed negative trajectories; remaining participants were ambiguous in their response. Injury severity differentiated those with positive trajectories from those with negative trajectories, with greater injury severity apparent for those showing negative trends. Self-concept also improved more in those with positive trajectories. Core demographic variables did not however meaningfully predict the direction of change in core identity or wellbeing indices. Identity-focused songwriting holds promise as a means of promoting healthy identity reintegration. Further research on benefits for those with less severe spinal injuries is warranted.

  10. Identity Exploration: A "Crisis" Which May Go Unnoticed in Gifted Adolescents.

    Science.gov (United States)

    Kidwell, Jeannie; And Others

    1995-01-01

    Correlation of 82 academically gifted adolescents' personality scores with scores for identity exploration revealed that youth who were actively exploring (according to Erik Erikson's ego identity theory) exhibited the following psychological portrait: inner confusion, agitation, dissatisfaction, unhappiness, periodic spells of depression,…

  11. [Tacit metarepresentation and affective sense of personal identity. An approach to understanding severe psychiatric disorders of adolescence and young adulthood].

    Science.gov (United States)

    Balbi, Juan

    2011-01-01

    The results of present-day research in the field of "Dissociation Paradigm", regarding the capacity of the human mind to perceive, learn, and store information that in appearance passes as unnoticed, support the constructivist hypothesis of the active, selective and constructive condition of consciousness, in addition to the existence of a tacit dimension of knowledge that operates in functional relationship with the former. Unconscious mental states are intrinsically intentional. This is to say that they imply a semantic or cognitive connotation that is capable of affecting phenomenical experience and therefore behavior. In addition, the precocious existence of a tacit metarepresentational system in normally developed children has been proven, which is essential for guaranteeing the deployment of the process of functional coevolution between affectivity and consciousness, by which the experience of personal identity is acquired. These discoveries allow the inference of a "tacit affective metarepresentational recurrence", the organizational foundation on which a unified, sustainable, and continuous sense of the experience of personal identity is structured, and also allow us to hypothesize a "tacit metarepresentational mourning", a specific type of grief which is the chief foundation of the majority of psychopathological disorders. This concept may represent a potential explanation of the severe mental disorders of adolescence and young adulthood. The hypothesis of the present work is that, in the ambiguous context of Postmodern Culture, the prolongation of the adolescent period, facilitated by the welfare state, hinders the dealing with the aforementioned mourning, leading to an increment of depressive states and suicidal behavior among young people.

  12. PERSON IN SOCIAL NETWORKS

    Directory of Open Access Journals (Sweden)

    Андрей Борисович Шалимов

    2013-11-01

    Full Text Available Purpose: Our scientific purpose is creation of practical model of person’s representation in social networks (Facebook, Twitter, Classmates. As user of social networks, person is made conditional not only upon its own identity, but also upon the information about himself, which he is ready to share with his friends in contact list. Goal-setting and practical activities for their achievement mean that you should apply force, it can completely eliminates systemic factors, the system of power relations, which overwhelms human being in social networks.Methodology: The reconstruction of the model of human in the popularity of social networksResults: There is descripton of practical model of person's representation in social networks, it includes the management of own identity and the audience (the list of contacts. When person manages own identity, he answers the question, «Whom I can dare to be?». Person perceives himself in social networks' being, he understands himself and his place in the world, he identifies.Managing the way in social media means that you answer the question «What I want to tell?». Person in social media looks at events in the field of culture, economy, politics, social relations through the prism of his own attitudes, he forms and formulates his own agenda and he is going to tell about himself through them.Practical implications: Everyday people’s life, practical activities, including marketing in social networks.DOI: http://dx.doi.org/10.12731/2218-7405-2013-9-51

  13. Can higher education improve the professional identity of CNNs?

    Science.gov (United States)

    Frankland, Sharon

    2010-12-01

    Community nursery nurses (CNNs) are an important part of the multidisciplinary team. This paper discusses how two students undertaking a foundation degree in early years experienced changes to their personal and professional identities. A 'life history' approach was used to understand and interpret their experiences in depth. Both students would not have entered higher education had it not been for the widening participation drive. The higher education experience had a positive influence on personal and professional identity for the learners. They underlined that the widening participation drive can enable those students from 'non-traditional backgrounds' to enter and benefit from higher education. However, changes to higher education funding and public sector cutbacks have raised grave concerns about the continued ability of CNNs and other early years practitioners to access such courses. This could have a negative effect on the continuing professional development and subsequent changing identities within this particular group.

  14. Why do identical twins differ in personality: shared environment reconsidered.

    Science.gov (United States)

    Torgersen, Anne Mari; Janson, Harald

    2002-02-01

    While heritability studies show that most of the variance in adult personality can be attributed to genetic or so-called nonshared environmental influence, this does not mean that shared events lack importance for the development of later personality differences. We studied the relationship between Big Five personality differences in monozygotic (MZ) twins at age 29, and life stressors at age 6 to 15, using prospective data from 26 MZ pairs studied from birth onwards. A positive significant correlation was found between stressors in childhood and early adolescence, and intrapair personality differences in Agreeableness, Openness, Conscientiousness, and five-factor profiles. We note that the effects of shared events are labeled "nonshared" environment when the effect is to make siblings more different. Case examples illustrate the relationship between stress and personality differences, and provide hypotheses for further studies in larger samples.

  15. Analysis of Privacy-Enhancing Identity Management Systems

    DEFF Research Database (Denmark)

    Adjei, Joseph K.; Olesen, Henning

    Privacy has become a major issue for policy makers. This has been impelled by the rapid development of technologies that facilitate collection, distribution, storage, and manipulation of personal information. Business organizations are finding new ways of leveraging the value derived from consumer...... is an attempt to understand the relationship between individuals’ intentions to disclose personal information, their actual personal information disclosure behaviours, and how these can be leveraged to develop privacy-enhancing identity management systems (IDMS) that users can trust. Legal, regulatory...... and technological aspects of privacy and technology adoption are also discussed....

  16. Adolescent Identity Exploration: A Test of Erikson's Theory of Transitional Crisis.

    Science.gov (United States)

    Kidwell, Jeannie S.; And Others

    1995-01-01

    Investigates Erikson's theory that adolescent identity exploration is associated with a variety of symptoms. Results support Erikson's theory, indicating that adolescents who were actively engaged in identity exploration were more likely to produce a personality pattern characterized by self-doubt, confusion, disturbed thinking, impulsivity,…

  17. A cultural take on the links between religiosity, identity, and meaning in life in religious emerging adults.

    Science.gov (United States)

    Negru-Subtirica, Oana; Tiganasu, Alexandra; Dezutter, Jessie; Luyckx, Koen

    2017-03-01

    Identity and meaning in life are core developmental assets in emerging adulthood. We analysed how religiosity is related to these intentional strivings in emerging adults enrolled in theological education, by depicting (1) identity strivings and meaning in life accounts in faith narratives (Study 1) and (2) links between personal identity and meaning in life profiles and religious beliefs, behaviours, and subjective experiences (Study 2). Both studies highlighted that a Foreclosed status, with high personal commitment and reduced exploration, was dominant in faith narratives and personal identity profiles. Also, in narratives meaning in life was reflected by a strong focus on presence of meaning through religious insights. Nonetheless, global meaning in life profiles indicated that many emerging adults were searching for a meaning in their lives, while reporting lower levels of presence of meaning. Identity Achievement and High Presence-High Search profiles were linked to the highest levels of subjective, behavioural, and cognitive religiosity. We highlighted the multidimensionality of identity and meaning in life strivings in emerging adults attending theological schools. We pointed out that even in a somewhat foreclosed cultural context (e.g., Romanian Christian Orthodox theological schools), religion represents a dynamic social and ideological context for self-development. Statement of contribution What is already known on this subject? Religious beliefs increase in emerging adults, doubled by decreases in religious behaviours, linked to an adherence to a more personal approach to religion. Religious youth are more committed to their faith and also explore identity and life meaning in relation to their religious strivings. Youth religious exemplars report close links between their religious faith and strivings for meaningful life goals. What does this study add? We investigated Christian Orthodox theology students, for whom religion is a normative dimension of

  18. Osobní identita a paměť (Lockova teorie osobní identity a její kritická interpretace v analytické filosofii)

    OpenAIRE

    Kollmann, Jan

    2008-01-01

    The thesis deals with the relations between Locke's theory of personal identity, its "classical" critic, performed by Butler and Reid and its critical adoption amongst some authors of analytic philosophy (Grice, Quinton, Perry, Shoemaker). In the first part of the thesis, Locke is shown as the founder of a tradition that lays stress on the fundamental relation between the identity of persons over time and its memory or consciousness. We also distinguish the identity of person and the identity...

  19. A Q-methodological study of smoking identities.

    Science.gov (United States)

    Farrimond, Hannah; Joffe, Helene; Stenner, Paul

    2010-10-01

    In contrast to the psychological literature on adolescent smoking, little research has investigated the social identities of adult smokers. This study aimed to identify shared 'smoking identities' amongst a sample of 64 British smokers from different socio-economic groups using Q-methodology. Participants were asked to sort 70 items concerning smoking and smokers according to their agreement/disagreement with them. The 64 Q-sorts were then subjected to a by-person factor analysis yielding six factors, with the first four interpretable factors being presented here. Each factor is understood to represent a distinct 'identity position'. The first two, the 'addicted' smoker, and the 'in control' smoker, oriented around a biomedical model of smoking as an addictive health risk. The final two, the 'no big deal' smoker and the 'proud' smoker reflected alternative understandings and values. The identity positions also differed in the extent to which smoking was considered a core part of self-identity. Unpacking the 'smoking identities' of current smokers offers the opportunity to devise targeted health promotion.

  20. Vocational identity of deaf and hard of hearing adolescents

    Directory of Open Access Journals (Sweden)

    Šešum Mia

    2016-01-01

    Full Text Available Vocational identity development represents the key aspect of identity development and it is one of the most significant issues in the period of adolescence. The persons with strong vocational identity have clearer understanding of their own career goals and they are characterized by greater self-confidence and dedication to their career choices, which is the reason why they decide on their future profession more quickly and more easily than the persons whose vocational identity is weaker. The career development of deaf and hard of hearing adolescents takes place under conditions of auditory deprivation, which may have a negative effect on the stability of their vocational identity and thus on their choice of profession, employment and assimilation into the working environment. This study examines the connection between vocational identity of deaf and hard of hearing adolescents and the number of completed school years and age, as well as the effect of gender, the level of hearing impairment, primary mode of communication, and general performance at school at the end of a school term on vocational identity. The sample comprised 97 deaf and hard of hearing students attending seventh and eighth grades of primary school as well as all grades of secondary school, who are educated in segregating conditions in the territory of Serbia. 'My Vocational Situation' (MVS, Holland et al., 1980-a was used as the instrument. The results of the study, following the data analysis, point to the connection between vocational identity of deaf and hard of hearing adolescents and the number of school years completed and age, as well as the effect of gender on vocational identity, while the effect of the level of hearing impairment, primary mode of communication, and general performance at school on vocational identity of the examinees has not been confirmed. Comparing these results with the results of studies conducted on the population of typically developing

  1. Cognitive Age: A New Multidimensional Approach to Measuring Age Identity.

    Science.gov (United States)

    Barak, Benny

    1987-01-01

    Conducted exploratory field study to examine how age-concepts are experienced and to assess relationship of age identities to each other. Proposes Cognitive Age as a new multidimensional age scale that merges the standard scale, Identity Age, and Personal Age. Study results attest to Cognitive Age scale's reliability and validity. (Author/NB)

  2. The Biological Contributions to Gender Identity and Gender Diversity: Bringing Data to the Table.

    Science.gov (United States)

    Polderman, Tinca J C; Kreukels, Baudewijntje P C; Irwig, Michael S; Beach, Lauren; Chan, Yee-Ming; Derks, Eske M; Esteva, Isabel; Ehrenfeld, Jesse; Heijer, Martin Den; Posthuma, Danielle; Raynor, Lewis; Tishelman, Amy; Davis, Lea K

    2018-03-01

    The American Psychological Association defines gender identity as, "A person's deeply-felt, inherent sense of being a boy, a man, or a male; a girl, a woman, or a female; or an alternative gender (e.g., genderqueer, gender nonconforming, gender neutral) that may or may not correspond to a person's sex assigned at birth or to a person's primary or secondary sex characteristics" (American Psychological Association, Am Psychol 70(9):832-864, 2015). Here we review the evidence that gender identity and related socially defined gender constructs are influenced in part by innate factors including genes. Based on the data reviewed, we hypothesize that gender identity is a multifactorial complex trait with a heritable polygenic component. We argue that increasing the awareness of the biological diversity underlying gender identity development is relevant to all domains of social, medical, and neuroscience research and foundational for reducing health disparities and promoting human-rights protections for gender minorities.

  3. The role of cultural identity clarity for self-concept clarity, self-esteem, and subjective well-being.

    Science.gov (United States)

    Usborne, Esther; Taylor, Donald M

    2010-07-01

    Knowing oneself and experiencing oneself as clearly defined has been linked to positive self-esteem and psychological well-being; however, this association has been tested only at the level of personal identity. The authors propose that a clear cultural identity provides the individual with a clear prototype with which to engage the processes necessary to construct a clear personal identity and, by extension, to achieve self-esteem and well-being. For samples of undergraduate students, Anglophone Quebecers, Francophone Québécois, Chinese North Americans, and Aboriginal Canadians, cultural identity clarity was positively related to self-concept clarity, self-esteem, and markers of subjective well-being. The relationship between cultural identity clarity and both self-esteem and well-being was consistently mediated by self-concept clarity. Interventions designed to clarify cultural identity might have psychological benefits for individuals facing cultural identity challenges.

  4. The Importance of Sensing Own's Movements in the World for the Sense of Personal Identity

    Directory of Open Access Journals (Sweden)

    Mariana Broens

    2012-01-01

    Full Text Available Within philosophy and cognitive science, the focus in relation to the problem of personal identity has been almost exclusively on the brain. We submit that the resulting neglect of the body and of bodily movements in the world has been detrimental in understanding how organisms develop a sense of identity. We examine the importance of sensing one’s own movements for the development of a basic, nonconceptual sense of self. More specifically, we argue that the origin of the sense of self stems from the sensitivity to spontaneous movements. Based on this, the organism develops a sense of “I move” and, finally, a sense of “I can move”. Proprioception and kinesthesis are essential in this development. At the same time, we argue against the traditional dichotomy between so-called external and internal senses, agreeing with Gibson that perception of the self and of the environment invariably go together. We discuss a traditional distinction between two aspects of bodily self: the body sense and the body image. We suggest that they capture different aspects of the sense of self. We argue that especially the body sense is of great importance to our nonconceptual sense of self. Finally, we attempt to draw some consequences for research in cognitive science, specifically in the area of robotics, by examining a case of missing proprioception. We make a plea for robots to be equipped not just with external perceptual and motor abilities but also with a sense of proprioception. This, we submit, would constitute one further step towards understanding creatures acting in the world with a sense of themselves.

  5. New Trends and Directions in Ethnic Identity among Internationally Transracially Adopted Persons: Summary of Special Issue

    Science.gov (United States)

    Rosnati, Rosa; Pinderhughes, Ellen E.; Baden, Amanda L.; Grotevant, Harold D.; Lee, Richard M.; Mohanty, Jayashree

    2015-01-01

    The collective findings of the six articles in this special issue highlight the importance of ethnic-racial socialization and ethnic identity among international transracial adoptees (ITRAs). A multidimensional developmental phenomenon, ethnic identity intersects with other identities, notably adoptive identity. Family, peers, community, and host…

  6. Racial Identity, Phenotype, and Self-Esteem among Biracial Polynesian/White Individuals

    Science.gov (United States)

    Allen, G. E. Kawika; Garriott, Patton O.; Reyes, Carla J.; Hsieh, Catherine

    2013-01-01

    This study examined racial identity, self-esteem, and phenotype among biracial Polynesian/White adults. Eighty-four Polynesian/White persons completed the Biracial Identity Attitude Scale, the Rosenberg Self-Esteem Inventory, and a Polynesian phenotype scale. Profile analyses showed participants identified more with their Polynesian parent. A…

  7. Development of naive personality perception

    OpenAIRE

    Hayashi, Tomoyuki

    2004-01-01

    Lay persons usually understand that the personality has consistency and causality. They also have the knowledge of what contents the personality consists of. Research of "theories of mind," which focuses on the developmental processes of the naive understanding of mind, suggests three stages : (a) alignment of actions (imitation) fosters the foundation of social cognition in young children (i.e., understanding that the mind causes behaviors, grasping the identity of a person, and discovering ...

  8. A Practitioners Perspective on Verification

    Science.gov (United States)

    Steenburgh, R. A.

    2017-12-01

    NOAAs Space Weather Prediction Center offers a wide range of products and services to meet the needs of an equally wide range of customers. A robust verification program is essential to the informed use of model guidance and other tools by both forecasters and end users alike. In this talk, we present current SWPC practices and results, and examine emerging requirements and potential approaches to satisfy them. We explore the varying verification needs of forecasters and end users, as well as the role of subjective and objective verification. Finally, we describe a vehicle used in the meteorological community to unify approaches to model verification and facilitate intercomparison.

  9. Gender Identity Disorder and Schizophrenia: Neurodevelopmental Disorders with Common Causal Mechanisms?

    OpenAIRE

    Ravi Philip Rajkumar

    2014-01-01

    Gender identity disorder (GID), recently renamed gender dysphoria (GD), is a rare condition characterized by an incongruity between gender identity and biological sex. Clinical evidence suggests that schizophrenia occurs in patients with GID at rates higher than in the general population and that patients with GID may have schizophrenia-like personality traits. Conversely, patients with schizophrenia may experience alterations in gender identity and gender role perception. Neurobiological res...

  10. The Lesbian, Gay, and Bisexual Identity Scale: Factor Analytic Evidence and Associations with Health and Well-Being

    Science.gov (United States)

    Cramer, Robert J.; Burks, Alixandra C.; Golom, Frank D.; Stroud, Caroline H.; Graham, James L.

    2017-01-01

    We tested the psychometric properties of the Lesbian, Gay, and Bisexual Identity Scale. Findings included (1) a three-factor structure (i.e., Negative Identity, Identity Uncertainty, Identity Superiority); (2) less positive identities among HIV-positive persons, African Americans, males, and bisexuals; and (3) convergent patterns with subjective…

  11. Identity development in cultural context: The role of deviating from master narratives.

    Science.gov (United States)

    McLean, Kate C; Lilgendahl, Jennifer P; Fordham, Chelsea; Alpert, Elizabeth; Marsden, Emma; Szymanowski, Kathryn; McAdams, Dan P

    2017-08-18

    The great majority of research on identity and personality development has focused on individual processes of development, to the relative neglect of the cultural context of development. We employ a recently articulated framework for the examination of identity development in context, centered on the construct of master narratives, or culturally shared stories. Across four studies, we asked emerging and midlife adults (N = 512) to narrate personal experiences of deviations from these master narratives. Across three quantitative studies, we show that (a) those who elaborated their deviation experiences were more likely to be in structurally marginalized positions in society (e.g., ethnic or sexual minorities); (b) those who elaborated an empowering alternative to the master narrative were more likely to be engaged in identity processes; and (c) master narratives maintain their rigidity by the frequency of their use. In study 4, using qualitative analyses, we illustrate the rigidity of master narratives, as well as the degree to which they take shape in social and group experiences. These studies emphasize the importance of cultural context in considering personality and identity development. © 2017 Wiley Periodicals, Inc.

  12. Plotting Maternity in Three Persons

    Science.gov (United States)

    Kinser, Amber E.

    2012-01-01

    This performance text examines complexities of personal and maternal identity in family life. Speaking in first, second, and third person voices, the author offers autoethnographic accounts of the tensions between separateness and connectedness, normative and subjective motherhood, and novice and seasoned perspectives. The piece functions as a…

  13. 12 CFR 614.4266 - Personal and intangible property evaluations.

    Science.gov (United States)

    2010-01-01

    .... 614.4266 Section 614.4266 Banks and Banking FARM CREDIT ADMINISTRATION FARM CREDIT SYSTEM LOAN POLICIES AND OPERATIONS Collateral Evaluation Requirements § 614.4266 Personal and intangible property... shall include provisions for periodic collateral inspections and verification by the institution's...

  14. Nuclear disarmament verification

    International Nuclear Information System (INIS)

    DeVolpi, A.

    1993-01-01

    Arms control treaties, unilateral actions, and cooperative activities -- reflecting the defusing of East-West tensions -- are causing nuclear weapons to be disarmed and dismantled worldwide. In order to provide for future reductions and to build confidence in the permanency of this disarmament, verification procedures and technologies would play an important role. This paper outlines arms-control objectives, treaty organization, and actions that could be undertaken. For the purposes of this Workshop on Verification, nuclear disarmament has been divided into five topical subareas: Converting nuclear-weapons production complexes, Eliminating and monitoring nuclear-weapons delivery systems, Disabling and destroying nuclear warheads, Demilitarizing or non-military utilization of special nuclear materials, and Inhibiting nuclear arms in non-nuclear-weapons states. This paper concludes with an overview of potential methods for verification

  15. Verification Account Management System (VAMS)

    Data.gov (United States)

    Social Security Administration — The Verification Account Management System (VAMS) is the centralized location for maintaining SSA's verification and data exchange accounts. VAMS account management...

  16. Quantum money with classical verification

    Energy Technology Data Exchange (ETDEWEB)

    Gavinsky, Dmitry [NEC Laboratories America, Princeton, NJ (United States)

    2014-12-04

    We propose and construct a quantum money scheme that allows verification through classical communication with a bank. This is the first demonstration that a secure quantum money scheme exists that does not require quantum communication for coin verification. Our scheme is secure against adaptive adversaries - this property is not directly related to the possibility of classical verification, nevertheless none of the earlier quantum money constructions is known to possess it.

  17. Quantum money with classical verification

    International Nuclear Information System (INIS)

    Gavinsky, Dmitry

    2014-01-01

    We propose and construct a quantum money scheme that allows verification through classical communication with a bank. This is the first demonstration that a secure quantum money scheme exists that does not require quantum communication for coin verification. Our scheme is secure against adaptive adversaries - this property is not directly related to the possibility of classical verification, nevertheless none of the earlier quantum money constructions is known to possess it

  18. Features of gender identity among schoolchildren of different ages

    Directory of Open Access Journals (Sweden)

    O.Y. Marchenko

    2014-01-01

    Full Text Available Purpose . Gender identity manifestations in schoolchildren were investigated. Material . The study involved schoolchildren of 3 -11th forms of the secondary schools (206 – boys, 213 - girls. For the research of age peculiarities in psychological gender, a questioner worked out by Sundry Bam which consists of 60 statements was used. Results . A number of aspects of self description which have different psychological characteristics in boys and girls were analysed. A peculiarity of gender identity in schoolchildren, which was identified by the overall number of respondents in whom the androgens personality type was identified, was singled out. Out of 206 boys – 90% have an androgens index, as for the girls – 69.5% refer to androgens personality type. The presence of feminine character qualities in boys and masculine – in girls was found out, which proves maximal development of feminine and masculine in one person. This will help social adaptation of schoolchildren. Conclusions . Physical education has enormous potential emotional and physical impact on the formation of gender identity of students and their notions of femininity and masculinity. This can directly affect the formation of life value orientations students in general, including the formation of values in the sphere of physical culture.

  19. Particularities of Verification Processes for Distributed Informatics Applications

    Directory of Open Access Journals (Sweden)

    Ion IVAN

    2013-01-01

    Full Text Available This paper presents distributed informatics applications and characteristics of their development cycle. It defines the concept of verification and there are identified the differences from software testing. Particularities of the software testing and software verification processes are described. The verification steps and necessary conditions are presented and there are established influence factors of quality verification. Software optimality verification is analyzed and some metrics are defined for the verification process.

  20. Identity's identities

    DEFF Research Database (Denmark)

    Jensen, Kim Ebensgaard

    -specialized language in which it also serves a number of functions – some of which are quite fundamental to society as such. In other words, the lexeme identity is a polysemic word and has multiple, well, identities. Given that it appears to have a number of functions in a variety of registers, including terminologies...... in Academic English and more everyday-based English, identity as a lexeme is definitely worth having a look at. This paper presents a lexicological study of identity in which some of its senses are identified and their behaviors in actual discourse are observed. Drawing on data from the 2011 section...... of the Corpus of Contemporary American English, a behavioral profile of the distributional characteristics of identity is set up. Behavioral profiling is a lexicographical method developed by the corpus linguist Stefan Th. Gries which, by applying semantic ID tagging and statistical analysis, provides a fine...

  1. Nuclear test ban verification

    International Nuclear Information System (INIS)

    Chun, Kin-Yip

    1991-07-01

    This report describes verification and its rationale, the basic tasks of seismic verification, the physical basis for earthquake/explosion source discrimination and explosion yield determination, the technical problems pertaining to seismic monitoring of underground nuclear tests, the basic problem-solving strategy deployed by the forensic seismology resarch team at the University of Toronto, and the scientific significance of the team's research. The research carried out at the Univeristy of Toronto has two components: teleseismic verification using P wave recordings from the Yellowknife Seismic Array (YKA), and regional (close-in) verification using high-frequency L g and P n recordings from the Eastern Canada Telemetered Network. Major differences have been found in P was attenuation among the propagation paths connecting the YKA listening post with seven active nuclear explosion testing areas in the world. Significant revisions have been made to previously published P wave attenuation results, leading to more interpretable nuclear explosion source functions. (11 refs., 12 figs.)

  2. Threats to social identity can trigger social deviance.

    Science.gov (United States)

    Belmi, Peter; Barragan, Rodolfo Cortes; Neale, Margaret A; Cohen, Geoffrey L

    2015-04-01

    We hypothesized that threats to people's social (i.e., group) identity can trigger deviant attitudes and behaviors. A correlational study and five experiments showed that experiencing or recalling situations associated with the devaluation of a social identity caused participants to endorse or engage in deviant actions, including stealing, cheating, and lying. The effect was driven by the tendency to construe social identity threats not as isolated incidents but as symbolic of the continuing devaluation and disrespectful treatment of one's group. Supplementing sociological approaches to deviance and delinquency, the results suggest the relevance and utility of a social-psychological account. © 2015 by the Society for Personality and Social Psychology, Inc.

  3. Enhancing the Personal Narrative Skills of Elementary School-Aged Students Who Use AAC: The Effectiveness of Personal Narrative Intervention

    Science.gov (United States)

    Soto, Gloria; Solomon-Rice, Patti; Caputo, Michele

    2009-01-01

    Children who use augmentative and alternative communication have been found to experience significant difficulties in the production of fictional and personal narratives. The important role of personal narratives in establishing personal and social identity has received substantial attention in developmental psychology but little attention in the…

  4. How identity crisis, relative deprivation, personal characteristics, and empathy contribute to the engagement of Western individuals in Islamist terrorist behavior

    Directory of Open Access Journals (Sweden)

    Khouwaga Yusoufzai

    2017-02-01

    Full Text Available The growing sense of insecurity in the Western world due to home-grown Islamist terrorism prompts further research on the topic. Based on previous literature, the current paper attempts to determine whether factors can be identified which contribute to Western individuals joining Islamic extremist organizations and engaging in terrorist behavior in the West. Four factors are discussed: While extensive scientific literature supports the view that identity crises and relative deprivation play a crucial role in turning Western individuals to terrorism, evidence on the role of personal characteristics and empathy, on the other hand, is still too scarce to allow any clear scientific judgment.

  5. 77 FR 59790 - General Services Administration Acquisition Regulation (GSAR); Rewrite of Part 504...

    Science.gov (United States)

    2012-10-01

    ... and Forms. This final rule is part of the General Services Administration Acquisition Manual (GSAM... the prescription for inclusion of the clause at 552.204-9, Personal Identity Verification Requirements... the ``National Industrial Security Program Operating Manual (NISPOM)'', and link to the web address...

  6. Work-Related Identity of Clinical Research Sector Employees in Poland Against Professional Transformation of the Industry

    Directory of Open Access Journals (Sweden)

    Barbara Kozierkiewicz

    2016-03-01

    Full Text Available Purpose: Established professions and knowledge workers identify more with their professional groups than with their organisations. The purpose of the study was to fnd what kind of work-related identities are shown by clinical research sector employees in Poland, what is the intensity of those identities and which one is dominant. Methodology: The study started with qualitative interviews dedicated to professional changes and to work-related identity. The latter was selected for the main quantitative part of the study and its fve types were defned related to the trained profession, the practised profession, organizational, relational and task-related work identities. Intensity of these pre-defned identities was tested with a use of a questionnaire completed by 147 representatives of the sector under study. Statistical analysis of the collected data verifed the research hypotheses that assumed a certain gradation of these work-related identities. Results: Professional identity related to the practised occupation was placed on the highest level followed by task-related identity. Relational and organisational identities were classifed on the third and fourth levels. Identity related to the trained occupation achieved the lowest score. The employing organization type had no effect on the manifested professional identity. Originality value: As a developing new occupation, the study group itself was an interesting population for studying work-related identity. Combining the qualitative and quantitative methods enabled evaluation of the results against the professional changes shaping the sector, which can have an impact on building the work-related identity of its employees.

  7. Clinical and theoretical parallels between desire for limb amputation and gender identity disorder.

    Science.gov (United States)

    Lawrence, Anne A

    2006-06-01

    Desire for amputation of a healthy limb has usually been regarded as a paraphilia (apotemnophilia), but some researchers propose that it may be a disorder of identity, similar to Gender Identity Disorder (GID) or transsexualism. Similarities between the desire for limb amputation and nonhomosexual male-to-female (MtF) transsexualism include profound dissatisfaction with embodiment, related paraphilias from which the conditions plausibly derive (apotemnophilia and autogynephilia), sexual arousal from simulation of the sought-after status (pretending to be an amputee and transvestism), attraction to persons with the same body type one wants to acquire, and an elevated prevalence of other paraphilic interests. K. Freund and R. Blanchard (1993) proposed that nonhomosexual MtF transsexualism represents an erotic target location error, in which men whose preferred erotic targets are women also eroticize their own feminized bodies. Desire for limb amputation may also reflect an erotic target location error, occurring in combination with an unusual erotic target preference for amputees. This model predicts that persons who desire limb amputation would almost always be attracted to amputees and would display an increased prevalence of gender identity problems, both of which have been observed. Persons who desire limb amputation and nonhomosexual MtF transsexuals often assert that their motives for wanting to change their bodies reflect issues of identity rather than sexuality, but because erotic/romantic orientations contribute significantly to identity, such distinctions may not be meaningful. Experience with nonhomosexual MtF transsexualism suggests possible directions for research and treatment for persons who desire limb amputation.

  8. Identity vicissitudes in work organizations

    Directory of Open Access Journals (Sweden)

    Giovanni Di Stefano

    2014-10-01

    Full Text Available Today’s pressing scientific and technological changes, while having an impact on the organizational life of our post-industrial world, are producing drastic transformations within organizations, creating in workers new feelings of anxiety and uncertainty. The features of the present state of crises - instability, uncertainty, weakening of family bonds – define a peculiar social and psychological uneasiness, proper of our time, as a consequence of the technological business culture prevailing today, which is destabilizing the institutional role of organizations, namely fixing the various forms of personal identity. This contribution offers, also by presenting a training experience in a business setting, a critical psycho-socio-analysis of the roles that individuals and organizations must presently face to foster development and, at the same time, provides directions to avoid the perverse drift of today’s culture and promote the identity process through the reactivation of the learning/changing capacity aimed at the definition of new shared meanings.Keywords: Identity; Organization; Psycho-socio-analysis

  9. Identity vicissitudes in work organizations

    Directory of Open Access Journals (Sweden)

    Giovanni Di Stefano

    2014-09-01

    Full Text Available Today’s pressing scientific and technological changes, while having an impact on the organizational life of our post-industrial world, are producing drastic transformations within organizations, creating in workers new feelings of anxiety and uncertainty. The features of the present state of crises - instability, uncertainty, weakening of family bonds – define a peculiar social and psychological uneasiness, proper of our time, as a consequence of the technological business culture prevailing today, which is destabilizing the institutional role of organizations, namely fixing the various forms of personal identity. This contribution offers, also by presenting a training experience in a business setting, a critical psycho-socio-analysis of the roles that individuals and organizations must presently face to foster development and, at the same time, provides directions to avoid the perverse drift of today’s culture and promote the identity process through the reactivation of the learning/changing capacity aimed at the definition of new shared meanings.Keywords: identity, organization, psycho-socio-analysis

  10. Implementation of the Fissile Mass Flow Monitor Source Verification and Confirmation

    Energy Technology Data Exchange (ETDEWEB)

    Uckan, Taner [ORNL; March-Leuba, Jose A [ORNL; Powell, Danny H [ORNL; Nelson, Dennis [Sandia National Laboratories (SNL); Radev, Radoslav [Lawrence Livermore National Laboratory (LLNL)

    2007-12-01

    This report presents the verification procedure for neutron sources installed in U.S. Department of Energy equipment used to measure fissile material flow. The Fissile Mass Flow Monitor (FMFM) equipment determines the {sup 235}U fissile mass flow of UF{sub 6} gas streams by using {sup 252}Cf neutron sources for fission activation of the UF{sub 6} gas and by measuring the fission products in the flow. The {sup 252}Cf sources in each FMFM are typically replaced every 2 to 3 years due to their relatively short half-life ({approx} 2.65 years). During installation of the new FMFM sources, the source identity and neutronic characteristics provided by the manufacturer are verified with the following equipment: (1) a remote-control video television (RCTV) camera monitoring system is used to confirm the source identity, and (2) a neutron detection system (NDS) is used for source-strength confirmation. Use of the RCTV and NDS permits remote monitoring of the source replacement process and eliminates unnecessary radiation exposure. The RCTV, NDS, and the confirmation process are described in detail in this report.

  11. Implementation of the Fissile Mass Flow Monitor Source Verification and Confirmation

    International Nuclear Information System (INIS)

    Uckan, Taner; March-Leuba, Jose A.; Powell, Danny H.; Nelson, Dennis; Radev, Radoslav

    2007-01-01

    This report presents the verification procedure for neutron sources installed in U.S. Department of Energy equipment used to measure fissile material flow. The Fissile Mass Flow Monitor (FMFM) equipment determines the 235 U fissile mass flow of UF 6 gas streams by using 252 Cf neutron sources for fission activation of the UF 6 gas and by measuring the fission products in the flow. The 252 Cf sources in each FMFM are typically replaced every 2 to 3 years due to their relatively short half-life (∼ 2.65 years). During installation of the new FMFM sources, the source identity and neutronic characteristics provided by the manufacturer are verified with the following equipment: (1) a remote-control video television (RCTV) camera monitoring system is used to confirm the source identity, and (2) a neutron detection system (NDS) is used for source-strength confirmation. Use of the RCTV and NDS permits remote monitoring of the source replacement process and eliminates unnecessary radiation exposure. The RCTV, NDS, and the confirmation process are described in detail in this report.

  12. Java bytecode verification via static single assignment form

    DEFF Research Database (Denmark)

    Gal, Andreas; Probst, Christian W.; Franz, Michael

    2008-01-01

    Java Virtual Machines (JVMs) traditionally perform bytecode verification by way of an iterative data-flow analysis. Bytecode verification is necessary to ensure type safety because temporary variables in the JVM are not statically typed. We present an alternative verification mechanism that trans......Java Virtual Machines (JVMs) traditionally perform bytecode verification by way of an iterative data-flow analysis. Bytecode verification is necessary to ensure type safety because temporary variables in the JVM are not statically typed. We present an alternative verification mechanism...

  13. Psychotherapy and Pharmacotherapy for Patients with Dissociative Identity Disorder

    OpenAIRE

    Gentile, Julie P.; Dillon, Kristy S.; Gillig, Paulette Marie

    2013-01-01

    There is a wide variety of what have been called “dissociative disorders,” including dissociative amnesia, dissociative fugue, depersonalization disorder, dissociative identity disorder, and forms of dissociative disorder not otherwise specified. Some of these diagnoses, particularly dissociative identity disorder, are controversial and have been questioned by many clinicians over the years. The disorders may be under-diagnosed or misdiagnosed, but many persons who have experienced trauma rep...

  14. Three Planes of Practice: Examining Intersections of Reading Identity and Pedagogy

    Science.gov (United States)

    Bernstein, Malayna

    2014-01-01

    This paper reports on a project that examined teachers' reading identities and explored ways in which those identities were manifested in reading pedagogy and were adopted by students. The paper focuses on one purposively selected teacher and his class. Tom Ziegler's personal and pedagogical practices were deeply aligned, and his…

  15. Genetics and human rights. Two histories: Restoring genetic identity after forced disappearance and identity suppression in Argentina and after compulsory isolation for leprosy in Brazil

    Science.gov (United States)

    Penchaszadeh, Victor B.; Schuler-Faccini, Lavinia

    2014-01-01

    Over the past three decades, there has been an accelerated development of genetic technology, leading to its use in human genetic identification for many purposes. Additionally, it has been made explicit that identity is a fundamental human right. A number of historical circumstances have connected these developments. Personal identity is increasingly associated with the preservation and defense of human rights and is a tool to repair the violation of these rights, particularly the right to identity. In this article, we report the use of genetics to support the right to identity in two historical circumstances. First, we report the search, localization, DNA testing and genetic identification of 110 individuals who were appropriated as babies by the Argentine military dictatorship of 1976–1983 in the context of savage repression and egregious violations of human rights, including forced disappearance and suppression of identity. Second, we report on the repair of right-to-identity violations of hundreds of individuals that occurred during the process of compulsory isolation of patients with leprosy in Brazil through the Program “Reencontro”, which has led to the genetic identification of 158 pairs of individuals who previously did not have proof that they were siblings. The high value placed on genetic identification by victims of identity suppression did not counter the prevailing view that genetic factors were not more important than other factors (social, emotional, educational, cultural, spiritual) in determining the complex phenomenon of personal identity. The use of genetic identification as a tool to redress and repair human rights violations is a novel application of human genetics for the benefit of mankind. PMID:24764764

  16. Genetics and human rights. Two histories: Restoring genetic identity after forced disappearance and identity suppression in Argentina and after compulsory isolation for leprosy in Brazil.

    Science.gov (United States)

    Penchaszadeh, Victor B; Schuler-Faccini, Lavinia

    2014-03-01

    Over the past three decades, there has been an accelerated development of genetic technology, leading to its use in human genetic identification for many purposes. Additionally, it has been made explicit that identity is a fundamental human right. A number of historical circumstances have connected these developments. Personal identity is increasingly associated with the preservation and defense of human rights and is a tool to repair the violation of these rights, particularly the right to identity. In this article, we report the use of genetics to support the right to identity in two historical circumstances. First, we report the search, localization, DNA testing and genetic identification of 110 individuals who were appropriated as babies by the Argentine military dictatorship of 1976-1983 in the context of savage repression and egregious violations of human rights, including forced disappearance and suppression of identity. Second, we report on the repair of right-to-identity violations of hundreds of individuals that occurred during the process of compulsory isolation of patients with leprosy in Brazil through the Program "Reencontro", which has led to the genetic identification of 158 pairs of individuals who previously did not have proof that they were siblings. The high value placed on genetic identification by victims of identity suppression did not counter the prevailing view that genetic factors were not more important than other factors (social, emotional, educational, cultural, spiritual) in determining the complex phenomenon of personal identity. The use of genetic identification as a tool to redress and repair human rights violations is a novel application of human genetics for the benefit of mankind.

  17. Genetics and human rights: Two histories: restoring genetic identity after forced disappearance and identity suppression in Argentina and after compulsory isolation for leprosy in Brazil

    Directory of Open Access Journals (Sweden)

    Victor B. Penchaszadeh

    2014-01-01

    Full Text Available Over the past three decades, there has been an accelerated development of genetic technology, leading to its use in human genetic identification for many purposes. Additionally, it has been made explicit that identity is a fundamental human right. A number of historical circumstances have connected these developments. Personal identity is increasingly associated with the preservation and defense of human rights and is a tool to repair the violation of these rights, particularly the right to identity. In this article, we report the use of genetics to support the right to identity in two historical circumstances. First, we report the search, localization, DNA testing and genetic identification of 110 individuals who were appropriated as babies by the Argentine military dictatorship of 1976-1983 in the context of savage repression and egregious violations of human rights, including forced disappearance and suppression of identity. Second, we report on the repair of right-to-identity violations of hundreds of individuals that occurred during the process of compulsory isolation of patients with leprosy in Brazil through the Program "Reencontro", which has led to the genetic identification of 158 pairs of individuals who previously did not have proof that they were siblings. The high value placed on genetic identification by victims of identity suppression did not counter the prevailing view that genetic factors were not more important than other factors (social, emotional, educational, cultural, spiritual in determining the complex phenomenon of personal identity. The use of genetic identification as a tool to redress and repair human rights violations is a novel application of human genetics for the benefit of mankind.

  18. The influence of individualism and drinking identity on alcohol problems.

    Science.gov (United States)

    Foster, Dawn W; Yeung, Nelson; Quist, Michelle C

    2014-12-01

    This study evaluated the interactive association between individualism and drinking identity predicting alcohol use and problems. Seven hundred and ten undergraduates (Mean age =22.84, SD = 5.31, 83.1% female) completed study materials. We expected that drinking identity and individualism would positively correlate with drinking variables. We further expected that individualism would moderate the association between drinking identity and drinking such that the relationship between drinking identity and alcohol outcomes would be positively associated, particularly among those high in individualism. Our findings supported our hypotheses. These findings better explain the relationship between drinking identity, individualism, and alcohol use. Furthermore, this research encourages the consideration of individual factors and personality characteristics in order to develop culturally tailored materials to maximize intervention efficacy across cultures.

  19. The influence of individualism and drinking identity on alcohol problems

    Science.gov (United States)

    Foster, Dawn W.; Yeung, Nelson; Quist, Michelle C.

    2014-01-01

    This study evaluated the interactive association between individualism and drinking identity predicting alcohol use and problems. Seven hundred and ten undergraduates (Mean age =22.84, SD = 5.31, 83.1% female) completed study materials. We expected that drinking identity and individualism would positively correlate with drinking variables. We further expected that individualism would moderate the association between drinking identity and drinking such that the relationship between drinking identity and alcohol outcomes would be positively associated, particularly among those high in individualism. Our findings supported our hypotheses. These findings better explain the relationship between drinking identity, individualism, and alcohol use. Furthermore, this research encourages the consideration of individual factors and personality characteristics in order to develop culturally tailored materials to maximize intervention efficacy across cultures. PMID:25525420

  20. Formal verification of algorithms for critical systems

    Science.gov (United States)

    Rushby, John M.; Von Henke, Friedrich

    1993-01-01

    We describe our experience with formal, machine-checked verification of algorithms for critical applications, concentrating on a Byzantine fault-tolerant algorithm for synchronizing the clocks in the replicated computers of a digital flight control system. First, we explain the problems encountered in unsynchronized systems and the necessity, and criticality, of fault-tolerant synchronization. We give an overview of one such algorithm, and of the arguments for its correctness. Next, we describe a verification of the algorithm that we performed using our EHDM system for formal specification and verification. We indicate the errors we found in the published analysis of the algorithm, and other benefits that we derived from the verification. Based on our experience, we derive some key requirements for a formal specification and verification system adequate to the task of verifying algorithms of the type considered. Finally, we summarize our conclusions regarding the benefits of formal verification in this domain, and the capabilities required of verification systems in order to realize those benefits.

  1. Challenges for effective WMD verification

    International Nuclear Information System (INIS)

    Andemicael, B.

    2006-01-01

    Effective verification is crucial to the fulfillment of the objectives of any disarmament treaty, not least as regards the proliferation of weapons of mass destruction (WMD). The effectiveness of the verification package depends on a number of factors, some inherent in the agreed structure and others related to the type of responses demanded by emerging challenges. The verification systems of three global agencies-the IAEA, the Comprehensive Nuclear-Test-Ban Treaty Organization (CTBTO, currently the Preparatory Commission), and the Organization for the Prohibition of Chemical Weapons (OPCW)-share similarities in their broad objectives of confidence-building and deterrence by assuring members that rigorous verification would deter or otherwise detect non-compliance. Yet they are up against various constraints and other issues, both internal and external to the treaty regime. These constraints pose major challenges to the effectiveness and reliability of the verification operations. In the nuclear field, the IAEA safeguards process was the first to evolve incrementally from modest Statute beginnings to a robust verification system under the global Treaty on the Non-Proliferation of Nuclear Weapons (NPT). The nuclear non-proliferation regime is now being supplemented by a technology-intensive verification system of the nuclear test-ban treaty (CTBT), a product of over three decades of negotiation. However, there still remain fundamental gaps and loopholes in the regime as a whole, which tend to diminish the combined effectiveness of the IAEA and the CTBT verification capabilities. He three major problems are (a) the lack of universality of membership, essentially because of the absence of three nuclear weapon-capable States-India, Pakistan and Israel-from both the NPT and the CTBT, (b) the changes in US disarmament policy, especially in the nuclear field, and (c) the failure of the Conference on Disarmament to conclude a fissile material cut-off treaty. The world is

  2. Designer's identity: Development of personal attributes and design skills over education

    DEFF Research Database (Denmark)

    Kunrath, Kamila; Cash, Philip; Li-Ying, Jason

    2017-01-01

    Designers’ Professional identity (DPI) is a social- and self-perceptive construct through which designers are able to identify themselves. To understand the development of DPI, not just as a profession but also as an educational process, there is a need to consider the designer as both individual...... and trained professional. These interactions become also a necessary foundation for professionalism that is especially important for design activity. For this study, a psychometric survey was developed by taking in consideration both aspects of DPI, making use of a set of elements distilled from literature...... to the process of identity consolidation over the educational period. Further, DPI consolidates through a lifelong learning process. These results provide an initial insight into the development of DPI and the challenges of measuring this subjective aspect over education....

  3. Variation in Veteran Identity as a Factor in Veteran-Targeted Interventions.

    Science.gov (United States)

    Hack, Samantha M; DeForge, Bruce R; Lucksted, Alicia

    2017-07-01

    The sociocultural identities that people self-assign or accept influence their interpersonal interactions and decision making. Identity-based interventions attempt to influence individuals by associating healthy behaviors with in-group membership. Outreach and educational efforts aimed at veterans may rely on "typical" veteran identity stereotypes. However, as discussed in this Open Forum, there is evidence that veteran identity is not monolithic but rather fluctuates on the basis of personal characteristics and individual military service experiences. Overall, the impact of veteran identity on veterans' health behaviors and use of health care is not known and has been understudied. A major limiting factor is the lack of a standardized measure of veteran identity that can assess variations in salience, prominence, and emotional valence.

  4. Improving Robustness of Biometric Identity Determination with Digital Watermarking

    Directory of Open Access Journals (Sweden)

    Juha Partala

    2016-01-01

    Full Text Available The determination of an identity from noisy biometric measurements is a continuing challenge. In many applications, such as identity-based encryption, the identity needs to be known with virtually 100% certainty. The determination of identities with such precision from face images taken under a wide range of natural situations is still an unsolved problem. We propose a digital watermarking based method to aid face recognizers to tackle this problem in applications. In particular, we suggest embedding multiple face dependent watermarks into an image to serve as expert knowledge on the corresponding identities to identity-based schemes. This knowledge could originate, for example, from the tagging of those people on a social network. In our proposal, a single payload consists of a correction vector that can be added to the extracted biometric template to compile a nearly noiseless identity. It also supports the removal of a person from the image. If a particular face is censored, the corresponding identity is also removed. Based on our experiments, our method is robust against JPEG compression, image filtering, and occlusion and enables a reliable determination of an identity without side information.

  5. Exploring the positional identities of high school science teachers

    Science.gov (United States)

    Blackwell, Edith Lavonne

    The identity of the teacher has been determined to influence classroom practices. Positional identity is defined as one's perception of self relative to others. This qualitative research study investigates the positional identity of five high school science teachers of different ethnicities and how their positional identities influence their classroom practices. Positional identity is thought to be determined by one's perception of how one's race, ethnicity, gender, age, religion and socioeconomic status position one relative to others. The methods of data collection included classroom observations, structured and semi-structured interviews, book club meetings, teacher journals, and researcher journals, demographic and online questionnaires. The teachers that overcame stereotypes based on race/ethnicity, gender and socioeconomic status felt empowered in their positional identities and were able to empower their students. The data also identified those teachers that struggle the most with finding their power within their positional identities were the immigrants that were not able to merge their personal identities within the pre-determined social positions they encountered in this society. The empowerment or powerlessness of the science teachers' positional identities impacted instruction and practices within the science classroom.

  6. Subjective and Objective Work-Based Identity Consequences

    NARCIS (Netherlands)

    Botha, F.C.; Roodt, G.; van de Bunt-Kokhuis, S.G.M.; Jansen, P.G.W.; Roodt, G.

    2015-01-01

    The aim of this chapter is to provide a systematic literature review on the selected consequences of work-based identity (WI). The first section of the chapter includes the following subjective consequences: self-report measures on personal alienation, helping behaviour (H-OCB), burnout (consisting

  7. Shifting social identities as a strategy for deflecting threatening social comparisons.

    Science.gov (United States)

    Mussweiler, T; Gabriel, S; Bodenhausen, G V

    2000-09-01

    Results of three studies suggest that the multifaceted nature of identity provides a strategic basis for reducing the threat involved in upward social comparisons. After performing worse than a comparison standard, people may strategically emphasize aspects of their identity that differentiate them from the standard, thereby making the standard less relevant for self-evaluation. On the basis of previous research showing that persons low in self-esteem are less likely to make effective use of self-protection strategies, we hypothesized that this strategy of deflecting the threat involved in upward comparison (i.e., decreasing perceived comparability by emphasizing an unshared social identity) would be used primarily by persons who are characteristically high in self-esteem. This pattern was confirmed in three studies. Moreover, use of the strategy was associated with relatively more positive affect following threatening upward comparisons.

  8. Hard Identity and Soft Identity

    Directory of Open Access Journals (Sweden)

    Hassan Rachik

    2006-04-01

    Full Text Available Often collective identities are classified depending on their contents and rarely depending on their forms. Differentiation between soft identity and hard identity is applied to diverse collective identities: religious, political, national, tribal ones, etc. This classification is made following the principal dimensions of collective identities: type of classification (univocal and exclusive or relative and contextual, the absence or presence of conflictsof loyalty, selective or totalitarian, objective or subjective conception, among others. The different characteristics analysed contribute to outlining an increasingly frequent type of identity: the authoritarian identity.

  9. Multimodal fusion of polynomial classifiers for automatic person recgonition

    Science.gov (United States)

    Broun, Charles C.; Zhang, Xiaozheng

    2001-03-01

    With the prevalence of the information age, privacy and personalization are forefront in today's society. As such, biometrics are viewed as essential components of current evolving technological systems. Consumers demand unobtrusive and non-invasive approaches. In our previous work, we have demonstrated a speaker verification system that meets these criteria. However, there are additional constraints for fielded systems. The required recognition transactions are often performed in adverse environments and across diverse populations, necessitating robust solutions. There are two significant problem areas in current generation speaker verification systems. The first is the difficulty in acquiring clean audio signals in all environments without encumbering the user with a head- mounted close-talking microphone. Second, unimodal biometric systems do not work with a significant percentage of the population. To combat these issues, multimodal techniques are being investigated to improve system robustness to environmental conditions, as well as improve overall accuracy across the population. We propose a multi modal approach that builds on our current state-of-the-art speaker verification technology. In order to maintain the transparent nature of the speech interface, we focus on optical sensing technology to provide the additional modality-giving us an audio-visual person recognition system. For the audio domain, we use our existing speaker verification system. For the visual domain, we focus on lip motion. This is chosen, rather than static face or iris recognition, because it provides dynamic information about the individual. In addition, the lip dynamics can aid speech recognition to provide liveness testing. The visual processing method makes use of both color and edge information, combined within Markov random field MRF framework, to localize the lips. Geometric features are extracted and input to a polynomial classifier for the person recognition process. A late

  10. A Syntactic-Semantic Approach to Incremental Verification

    OpenAIRE

    Bianculli, Domenico; Filieri, Antonio; Ghezzi, Carlo; Mandrioli, Dino

    2013-01-01

    Software verification of evolving systems is challenging mainstream methodologies and tools. Formal verification techniques often conflict with the time constraints imposed by change management practices for evolving systems. Since changes in these systems are often local to restricted parts, an incremental verification approach could be beneficial. This paper introduces SiDECAR, a general framework for the definition of verification procedures, which are made incremental by the framework...

  11. Verification and validation benchmarks.

    Energy Technology Data Exchange (ETDEWEB)

    Oberkampf, William Louis; Trucano, Timothy Guy

    2007-02-01

    Verification and validation (V&V) are the primary means to assess the accuracy and reliability of computational simulations. V&V methods and procedures have fundamentally improved the credibility of simulations in several high-consequence fields, such as nuclear reactor safety, underground nuclear waste storage, and nuclear weapon safety. Although the terminology is not uniform across engineering disciplines, code verification deals with assessing the reliability of the software coding, and solution verification deals with assessing the numerical accuracy of the solution to a computational model. Validation addresses the physics modeling accuracy of a computational simulation by comparing the computational results with experimental data. Code verification benchmarks and validation benchmarks have been constructed for a number of years in every field of computational simulation. However, no comprehensive guidelines have been proposed for the construction and use of V&V benchmarks. For example, the field of nuclear reactor safety has not focused on code verification benchmarks, but it has placed great emphasis on developing validation benchmarks. Many of these validation benchmarks are closely related to the operations of actual reactors at near-safety-critical conditions, as opposed to being more fundamental-physics benchmarks. This paper presents recommendations for the effective design and use of code verification benchmarks based on manufactured solutions, classical analytical solutions, and highly accurate numerical solutions. In addition, this paper presents recommendations for the design and use of validation benchmarks, highlighting the careful design of building-block experiments, the estimation of experimental measurement uncertainty for both inputs and outputs to the code, validation metrics, and the role of model calibration in validation. It is argued that the understanding of predictive capability of a computational model is built on the level of

  12. Verification of Ceramic Structures

    Science.gov (United States)

    Behar-Lafenetre, Stephanie; Cornillon, Laurence; Rancurel, Michael; De Graaf, Dennis; Hartmann, Peter; Coe, Graham; Laine, Benoit

    2012-07-01

    In the framework of the “Mechanical Design and Verification Methodologies for Ceramic Structures” contract [1] awarded by ESA, Thales Alenia Space has investigated literature and practices in affiliated industries to propose a methodological guideline for verification of ceramic spacecraft and instrument structures. It has been written in order to be applicable to most types of ceramic or glass-ceramic materials - typically Cesic®, HBCesic®, Silicon Nitride, Silicon Carbide and ZERODUR®. The proposed guideline describes the activities to be performed at material level in order to cover all the specific aspects of ceramics (Weibull distribution, brittle behaviour, sub-critical crack growth). Elementary tests and their post-processing methods are described, and recommendations for optimization of the test plan are given in order to have a consistent database. The application of this method is shown on an example in a dedicated article [7]. Then the verification activities to be performed at system level are described. This includes classical verification activities based on relevant standard (ECSS Verification [4]), plus specific analytical, testing and inspection features. The analysis methodology takes into account the specific behaviour of ceramic materials, especially the statistical distribution of failures (Weibull) and the method to transfer it from elementary data to a full-scale structure. The demonstration of the efficiency of this method is described in a dedicated article [8]. The verification is completed by classical full-scale testing activities. Indications about proof testing, case of use and implementation are given and specific inspection and protection measures are described. These additional activities are necessary to ensure the required reliability. The aim of the guideline is to describe how to reach the same reliability level as for structures made of more classical materials (metals, composites).

  13. "Women's studies is in a lot of ways--consciousness raising": the educational origins of identity politics.

    Science.gov (United States)

    Loss, Christopher P

    2011-08-01

    The second-wave feminist movement crystallized a new politics of personal identity that was fueled by and became inextricably linked to the modern university. On and off campus women organized into groups to press for political and educational rights. Along the way, women discovered that politics and education were both personal and that the achievement of "identity" offered the most direct path to true selfhood and liberation. This conclusion helped forge an enduring bond between higher education and identity group politics that continues to shape American higher education and politics to this day.

  14. Apotemnophilia or body integrity identity disorder: a case report review.

    Science.gov (United States)

    Bou Khalil, Rami; Richa, Sami

    2012-12-01

    Apotemnophilia or body integrity identity disorder (BIID) denotes a syndrome in which a person is preoccupied with the desire to amputate a healthy limb. In this report, we review the available case reports in the literature in order to enhance psychiatrists' and physicians' comprehension of this disorder. A search for the case reports available via MEDLINE was done since the first case report published by Money et al in 1977 till May 2011, using the following terms: apotemnophilia, self-demand amputation, body integrity identity disorder, and BIID. In all, 14 case reports were found relevant to our search. The desire to amputate one's healthy limb seems to be related to a major disturbance in the person's perception of one's own identity, where limb amputation can relieve temporarily the patient's feeling of distress without necessarily and uniformly adjusting the patient's own identity misperception. More investigations are needed in this domain in order to develop noninvasive treatment strategies that approach this aspect of the patient's distress within a globalist perspective. In addition, the health professionals' awareness regarding this disorder is required to ensure professional management of patients' suffering.

  15. 75 FR 20965 - Petition for Approval of Alternate Odometer Disclosure Requirements

    Science.gov (United States)

    2010-04-22

    ..., Congress enacted the Cost Savings Act to, among other things, prohibit tampering with odometers on motor... can be used for auditing and recording keeping, which include, among other things, a history of each... electronic signature that can uniquely identify the person. Identity verification begins with the customer...

  16. Psychiatric comorbidity of gender identity disorders: a survey among Dutch psychiatrists.

    Science.gov (United States)

    à Campo, Joost; Nijman, Henk; Merckelbach, H; Evers, Catharine

    2003-07-01

    In the Netherlands, it is considered good medical practice to offer patients with gender identity disorder the option to undergo hormonal and surgical sex reassignment therapy. A liberalization of treatment guidelines now allows for such treatment to be started at puberty or prepuberty. The question arises as to what extent gender identity disorder can be reliably distinguished from a cross-gender identification that is secondary to other psychiatric disorders. The authors sent survey questionnaires to 382 board-certified Dutch psychiatrists regarding their experiences with diagnosing and treating patients with gender identity disorder. One hundred eighty-six psychiatrists responded to the survey. These respondents reported on 584 patients with cross-gender identification. In 225 patients (39%), gender identity disorder was regarded as the primary diagnosis. For the remaining 359 patients (61%), cross-gender identification was comorbid with other psychiatric disorders. In 270 (75%) of these 359 patients, cross-gender identification was interpreted as an epiphenomenon of other psychiatric illnesses, notably personality, mood, dissociative, and psychotic disorders. These data suggest that there is little consensus, at least among Dutch psychiatrists, about diagnostic features of gender identity disorder or about the minimum age at which sex reassignment therapy is a safe option. Therapy options proposed to patients with gender identity disorder appear to depend on personal preferences of psychiatrists. These results underline the need for more specific diagnostic rules in this area.

  17. Procedure generation and verification

    International Nuclear Information System (INIS)

    Sheely, W.F.

    1986-01-01

    The Department of Energy has used Artificial Intelligence of ''AI'' concepts to develop two powerful new computer-based techniques to enhance safety in nuclear applications. The Procedure Generation System, and the Procedure Verification System, can be adapted to other commercial applications, such as a manufacturing plant. The Procedure Generation System can create a procedure to deal with the off-normal condition. The operator can then take correct actions on the system in minimal time. The Verification System evaluates the logic of the Procedure Generator's conclusions. This evaluation uses logic techniques totally independent of the Procedure Generator. The rapid, accurate generation and verification of corrective procedures can greatly reduce the human error, possible in a complex (stressful/high stress) situation

  18. Personal and Parents’ Life Stories in Patients with Borderline Personality Disorder

    DEFF Research Database (Denmark)

    Lind, Majse; Thomsen, Dorthe Kirkegaard; Bøye, Rikke

    . Thirty patients with BPD and thirty matched control participants described and answered questions about their personal life stories and their parents’ life stories and completed measures of identity disturbance, alexithymia, empathy, and emotional intelligence. Compared to the control group, patients...

  19. The design and performance evaluation of the ultrasonic random coil identity-integrity element for underwater safeguards seals

    International Nuclear Information System (INIS)

    Allen, V.H.; Backer, S.; Smith, M.T.

    1983-06-01

    Irradiated fuel discharged from CANDU power reactors is stored underwater and, in order to comply with the requirements of International Safe-guards, the fuel is stacked in sealed containers which are examined at intervals by IAEA inspectors. The seals are verified for identity and integrity and this report describes the design of an identity/integrity element for the seals. The element is in the form of a random coil of wire which is interrogated by ultrasonic methods. An evaluation of thirty-six seals is reported. The application of seals to stacks of fuel was simulated in a water-filled bay at CRNL and repetitive verification measurements were made which simulated inspection procedures. The seal identity signatures were compared using cross-correlation methods and the results show that a broken or tampered seal can be identified with a high level of confidence

  20. A Scalable Approach for Hardware Semiformal Verification

    OpenAIRE

    Grimm, Tomas; Lettnin, Djones; Hübner, Michael

    2018-01-01

    The current verification flow of complex systems uses different engines synergistically: virtual prototyping, formal verification, simulation, emulation and FPGA prototyping. However, none is able to verify a complete architecture. Furthermore, hybrid approaches aiming at complete verification use techniques that lower the overall complexity by increasing the abstraction level. This work focuses on the verification of complex systems at the RT level to handle the hardware peculiarities. Our r...

  1. An examination of the cross-cultural validity of the Identity Capital Model: American and Japanese students compared.

    Science.gov (United States)

    Côté, James E; Mizokami, Shinichi; Roberts, Sharon E; Nakama, Reiko

    2016-01-01

    The Identity Capital Model proposes that forms of personal agency are associated with identity development as part of the transition to adulthood. This model was examined in two cultural contexts, taking into account age and gender, among college and university students aged 18 to 24 (N = 995). Confirmatory Factor Analyses verified cultural, age, and gender invariance of the two key operationalizations of the model. A Structural Equation Model path analysis confirmed that the model applies in both cultures with minor variations-types of personal agency are associated with the formation of adult- and societal-identities as part of the resolution of the identity stage. It was concluded that forms of personal agency providing the most effective ways of dealing with "individualization" (e.g., internal locus of control) are more important in the transition to adulthood among American students, whereas types of personal agency most effective in dealing with "individualistic collectivism" (e.g., ego strength) are more important among Japanese students. Copyright © 2015 The Foundation for Professionals in Services for Adolescents. Published by Elsevier Ltd. All rights reserved.

  2. Split Personality: Assessing the Potential for Organizational Identity in Reinforcing U.S. Military Jointness

    Science.gov (United States)

    2015-07-17

    of Identity ...........................................................................................................36 Hybrid -Organizational...force through a theoretical lens, developing a working understanding of military identity. Analysis of the environment will illustrate the hybrid ... departmental civilians, and contractors in the DoD’s employ, and is consistent with CJCS usage. Joint Force. The Joint Force describes a notional

  3. Advertising identities: virtual galleries as places of identity

    Directory of Open Access Journals (Sweden)

    Alexandra Zontea

    2010-10-01

    Full Text Available This paper is focused on the public presentation of self through virtual art galleries, singling out the field of photography. Photography has always been disputed as being part of the highbrow arts because of its popular character. Today, anyone who owes a photo camera can experience photography as art, without a rigorous training. Everybody is able to expose the photos freely to a large number of people, on the Internet. Consequently, the Internet opens up a virtual space, in which photo artists and amateurs can promote their works and exhibit them in a personal online gallery, which represents their place in the virtual vastness. Therefore, my research approaches the matter of the virtual gallery as an identitary place, being focused on finding out why artists choose to exhibit in virtual galleries. I asked myself what are the new functions of the virtual art galleries?Are they understood as online markers that distinguish the owners in these virtual environments? In other words, are these personal galleries a way of expressing online identities?

  4. Personality factors of critical care nurses.

    Science.gov (United States)

    Levine, C D; Wilson, S F; Guido, G W

    1988-07-01

    Two hundred members of the American Association of Critical-Care Nurses responded to a mail-out survey done to determine the psychologic profile of critical care nurses in terms of self-esteem, gender identity, and selected personality characteristics. The instruments used were Cattell's 16 PR, the Personal Attributes Questionnaire (PAQ), and the Texas Social Behavior Inventory (TSBI). Their personality factors tended to be aggressive, assertive, competitive, persevering, moralistic, resourceful, and mechanical. The nurses who enjoyed the field most were of the androgynous or masculine type and had high levels of self-esteem. On the basis of these findings, the nurse recruiter or faculty member doing career counseling could assess the personality characteristics, gender identity, and self-esteem levels of interested nurses. The goal would be to identify nurses who would both enjoy the field and remain active in critical care nursing after orientation. The goal could also be to help nurses dissatisfied with critical care nursing to seek means of improving their self-esteem.

  5. Mismatched racial identities, colourism, and health in Toronto and Vancouver.

    Science.gov (United States)

    Veenstra, Gerry

    2011-10-01

    Using original telephone survey data collected from adult residents of Toronto (n = 685) and Vancouver (n = 814) in 2009, I investigate associations between mental and physical health and variously conceived racial identities. An 'expressed racial identity' is a self-identification with a racial grouping that a person will readily express to others when asked to fit into official racial classifications presented by Census forms, survey researchers, insurance forms, and the like. Distinguishing between Asian, Black, South Asian, and White expressed racial identities, I find that survey respondents expressing Black identity are the most likely to report high blood pressure or hypertension, a risk that is slightly attenuated by socioeconomic status, and that respondents expressing Asian identity are the most likely to report poorer self-rated mental health and self-rated overall health, risks that are not explained by socioeconomic status. I also find that darker-skinned Black respondents are more likely than lighter-skinned Black respondents to report poor health outcomes, indicating that colourism, processes of discrimination which privilege lighter-skinned people of colour over their darker-skinned counterparts, exists and has implications for well-being in Canada as it does in the United States. Finally, 'reflected racial identity' refers to the racial identity that a person believes that others tend to perceive him or her to be. I find that expressed and reflected racial identities differ from one another for large proportions of self-expressed Black and South Asian respondents and relatively few self-expressed White and Asian respondents. I also find that mismatched racial identities correspond with relatively high risks of various poor health outcomes, especially for respondents who consider themselves White but believe that others tend to think they are something else. I conclude by presenting a framework for conceptualizing multifaceted suites of racial

  6. Electronic Voting Protocol Using Identity-Based Cryptography

    Directory of Open Access Journals (Sweden)

    Gina Gallegos-Garcia

    2015-01-01

    Full Text Available Electronic voting protocols proposed to date meet their properties based on Public Key Cryptography (PKC, which offers high flexibility through key agreement protocols and authentication mechanisms. However, when PKC is used, it is necessary to implement Certification Authority (CA to provide certificates which bind public keys to entities and enable verification of such public key bindings. Consequently, the components of the protocol increase notably. An alternative is to use Identity-Based Encryption (IBE. With this kind of cryptography, it is possible to have all the benefits offered by PKC, without neither the need of certificates nor all the core components of a Public Key Infrastructure (PKI. Considering the aforementioned, in this paper we propose an electronic voting protocol, which meets the privacy and robustness properties by using bilinear maps.

  7. Electronic Voting Protocol Using Identity-Based Cryptography.

    Science.gov (United States)

    Gallegos-Garcia, Gina; Tapia-Recillas, Horacio

    2015-01-01

    Electronic voting protocols proposed to date meet their properties based on Public Key Cryptography (PKC), which offers high flexibility through key agreement protocols and authentication mechanisms. However, when PKC is used, it is necessary to implement Certification Authority (CA) to provide certificates which bind public keys to entities and enable verification of such public key bindings. Consequently, the components of the protocol increase notably. An alternative is to use Identity-Based Encryption (IBE). With this kind of cryptography, it is possible to have all the benefits offered by PKC, without neither the need of certificates nor all the core components of a Public Key Infrastructure (PKI). Considering the aforementioned, in this paper we propose an electronic voting protocol, which meets the privacy and robustness properties by using bilinear maps.

  8. Self-defining future projections: exploring the identity function of thinking about the future.

    Science.gov (United States)

    D'Argembeau, Arnaud; Lardi, Claudia; Van der Linden, Martial

    2012-01-01

    The act of projecting oneself into meaningful future events may significantly contribute to a person's sense of self and identity. Yet if the role of memories, in particular self-defining memories (SDMs), in grounding the self is now well established, the identity function of anticipated future events has received comparatively little attention. This article introduces the construct of self-defining future projection (SDFP) to address this issue. Two studies show that people can readily identify significant future events that they frequently think about and that convey core information about who they are as individuals. Furthermore, a person's particular style of constructing SDMs is similarly manifested in SDFPs, suggesting that both types of events can be used to ground the self. Notably, people who display a stronger tendency to extract meaning from their past experiences also reflect more about the potential implications of imagined future events. The results further demonstrate that SDMs and SDFPs both give rise to a strong sense of personal continuity over time and are meaningfully related to self-esteem. Together these findings lend support to the idea that a person's sense of self and identity is in part nourished by the anticipation of significant future events.

  9. The potential of agent-based modelling for verification of people trajectories based on smartphone sensor data

    International Nuclear Information System (INIS)

    Hillen, F; Ehlers, M; Höfle, B; Reinartz, P

    2014-01-01

    In this paper the potential of smartphone sensor data for verification of people trajectories derived from airborne remote sensing data are investigated and discussed based on simulated test recordings in the city of Osnabrueck, Germany. For this purpose, the airborne imagery is simulated by images taken from a high building with a typical single lens reflex camera. The smartphone data required for the analysis of the potential is simultaneously recorded by test persons on the ground. In a second step, the quality of the smartphone sensor data is evaluated regarding the integration into simulation and modelling approaches. In this context we studied the potential of the agent-based modelling technique concerning the verification of people trajectories

  10. Ratings of Essentialism for Eight Religious Identities.

    Science.gov (United States)

    Toosi, Negin R; Ambady, Nalini

    2011-01-01

    As a social identity, religion is unique because it contains a spectrum of choice. In some religious communities, individuals are considered members by virtue of having parents of that background, and religion, culture, and ethnicity are closely intertwined. Other faith communities actively invite people of other backgrounds to join, expecting individuals to choose the religion that best fits their personal beliefs. These various methods of identification influence beliefs about the essentialist nature of religious identity. Essentialism is when social groups are considered to have deep, immutable, and inherent defining properties. In this study, college students (N=55) provided ratings of essentialism for eight religious identities: Atheist, Buddhist, Catholic, Hindu, Jewish, Muslim, Protestant, and Spiritual-but-not-religious. Significant differences in essentialism were found between the target groups. Results and implications for intergroup relations are discussed.

  11. In-core Instrument Subcritical Verification (INCISV) - Core Design Verification Method - 358

    International Nuclear Information System (INIS)

    Prible, M.C.; Heibel, M.D.; Conner, S.L.; Sebastiani, P.J.; Kistler, D.P.

    2010-01-01

    According to the standard on reload startup physics testing, ANSI/ANS 19.6.1, a plant must verify that the constructed core behaves sufficiently close to the designed core to confirm that the various safety analyses bound the actual behavior of the plant. A large portion of this verification must occur before the reactor operates at power. The INCISV Core Design Verification Method uses the unique characteristics of a Westinghouse Electric Company fixed in-core self powered detector design to perform core design verification after a core reload before power operation. A Vanadium self powered detector that spans the length of the active fuel region is capable of confirming the required core characteristics prior to power ascension; reactivity balance, shutdown margin, temperature coefficient and power distribution. Using a detector element that spans the length of the active fuel region inside the core provides a signal of total integrated flux. Measuring the integrated flux distributions and changes at various rodded conditions and plant temperatures, and comparing them to predicted flux levels, validates all core necessary core design characteristics. INCISV eliminates the dependence on various corrections and assumptions between the ex-core detectors and the core for traditional physics testing programs. This program also eliminates the need for special rod maneuvers which are infrequently performed by plant operators during typical core design verification testing and allows for safer startup activities. (authors)

  12. Examining the Lesbian, Gay, and Bisexual Identity Scale Among Members of an Alternative Sexuality Special Interest Group.

    Science.gov (United States)

    Cramer, Robert J; Golom, Frank D; Gemberling, Tess M; Trost, Kristen; Lewis, Robin; Wright, Susan

    2018-05-01

    The present study contributes to a growing body of literature developing psychometrically and theoretically grounded measures of sexual orientation minority identity. We tested psychometric properties and construct validity of a 27-item measure, the Lesbian, Gay, and Bisexual Identity Scale (LGBIS). The sample consisted of 475 adult (178 male, 237 female, 16 male-to-female, 14 female-to-male, and 30 gender queer persons) members of a special interest group, the National Coalition for Sexual Freedom. Participants completed a health needs questionnaire. Prominent findings included (1) confirmatory factor-analytic, internal consistency, and inter-correlation patterns support two LGBIS factor structures; (2) men, compared primarily to women, reported elevated scores on Acceptance Concerns, Concealment Motivation, Difficulty Process, and Negative Identity; (3) queer-identifying persons tended to report low Concealment Motivation, and high Identity Affirmation and Identity Centrality scores; (4) experimenting/fluid-identifying individuals tended toward higher Identity Uncertainty and Negative Identity, and lower Identity Centrality scores; (5) LGB community involvement was negatively associated with Concealment Motivation, Identity Uncertainty, and Negative Identity, and positively associated with Identity Superiority, Identity Affirmation, and Identity Centrality scores; and (6) Acceptance Concerns, Identity Uncertainty, and Internalized Homonegativity displayed significant positive associations with such mental health symptoms as general anxiety and posttraumatic stress. The LGBIS represents a useful approach to evaluating sexual orientation minority identity. Implications for identity theory, research, and practice are provided.

  13. Explaining reactions to normative information about alcohol consumption: a test of an extended social identity model.

    Science.gov (United States)

    Livingstone, Andrew G; McCafferty, Stephanie

    2015-04-01

    To test the role of group identification and the perceived importance of alcohol consumption to a group identity in shaping reactions to normative information about alcohol consumption. The study had a 2 (behaviour: identity-defining/alcohol vs. non-identity defining/caffeine) × 2 (norm: low vs. heavy consumption) between-subjects factorial design. Group identification and personal attitudes towards alcohol/caffeine consumption were included as measured predictors. Participants were 83 undergraduate students (44 female, 38 male, one unspecified) at a University in Scotland. Predictor and outcome variables included questionnaire measures of group (student) identification, personal attitudes to alcohol/caffeine consumption, the perceived importance of alcohol/caffeine consumption to group identity, and behavioral intentions to consume alcohol/caffeine. Personal attitude and group identification moderated the impact of norm information on consumption intentions, but only for alcohol consumption, and not caffeine consumption. For alcohol, norm information did affect intended consumption (ps ≤ .034), with the crucial exception of high identifiers who had favourable personal attitudes towards alcohol consumption. Instead, these individuals resist norm information (ps = .458 and .174), showing no decrease in intentions in the face of norm information that emphasised relatively 'low' levels of consumption. The impact of norm information on alcohol consumption intentions depends on group-based factors such as group identification and the perceived importance of alcohol to a group identity. When both of these factors are high, and an individual also personally favours the behaviour, the potential for norm-based interventions to fail is increased. Copyright © 2014 Elsevier B.V. All rights reserved.

  14. The verification of ethnographic data.

    Science.gov (United States)

    Pool, Robert

    2017-09-01

    Anthropologists are increasingly required to account for the data on which they base their interpretations and to make it available for public scrutiny and re-analysis. While this may seem straightforward (why not place our data in online repositories?), it is not. Ethnographic 'data' may consist of everything from verbatim transcripts ('hard data') to memories and impressions ('soft data'). Hard data can be archived and re-analysed; soft data cannot. The focus on hard 'objective' data contributes to the delegitimizing of the soft data that are essential for ethnographic understanding, and without which hard data cannot be properly interpreted. However, the credibility of ethnographic interpretation requires the possibility of verification. This could be achieved by obligatory, standardised forms of personal storage with the option for audit if required, and by being more explicit in publications about the nature and status of the data and the process of interpretation.

  15. The Role of Identity in Acculturation among Immigrant People: Theoretical Propositions, Empirical Questions, and Applied Recommendations

    Science.gov (United States)

    Schwartz, Seth J.; Montgomery, Marilyn J.; Briones, Ervin

    2006-01-01

    The present paper advances theoretical propositions regarding the relationship between acculturation and identity. The most central thesis argued is that acculturation represents changes in cultural identity and that personal identity has the potential to "anchor" immigrant people during their transition to a new society. The article emphasizes…

  16. Learning and transition in a culture of professional identities

    DEFF Research Database (Denmark)

    Hasse, Cathrine

    2008-01-01

    It has been argued that in higher education academic disciplines can be seen as communities of practices. This implies a focus on what constitutes identities in academic culture. In this article I argue that the transition from newcomer to a full participant in a community of practice of physicists...... entails a focus on how identities emerge in learning how to highlight certain aspects of personal life histories. The analysis of interviews with 55 physicists shows that physicists often perceive experiences in their childhood as the first step into their professional identities as physicists...... ofauthoring" in a physicist culture, which cut across other cultural differences....

  17. Identity Development through Volunteer Tourism : A qualitative study of WWOOF volunteers’ identity formation

    OpenAIRE

    Börjars, Linnea

    2012-01-01

    Tourism is a fast growing phenomenon. As every person has a different motivation to travel new and alternative forms of tourism are continuously developing. Depending on form of tourism and the tourist’s motivation to take on a certain trip, the experience has a smaller or bigger impression on the individual. This study examines what influences volunteer trips can have on identities, focusing on volunteers in the organization WWOOF, World Wide Opportunities on Organic Farms. To understand the...

  18. "I'm Scared of the Disappointment": Young Adult Smokers' Relational Identity Gaps and Management Strategies as Sites of Communication Intervention.

    Science.gov (United States)

    Stanley, Samantha J; Pitts, Margaret Jane

    2018-02-22

    While cigarette smoking is decreasing among young adults, rates of nicotine consumption through other devices, most notably electronic cigarettes, are on the rise. Framed by communication theory of identity, this study examines young adult smokers' experiences with relational others in regard to their smoking. Focus group discussions and individual interviews convened with 20 young adult cigarette and electronic cigarette smokers revealed identity gaps implicating the relational layer of identity, including personal-relational, enacted-relational, and personal-enacted-relational identity gaps. Participants used communicative and behavioral strategies to manage relational discrepancies. The documented identity gaps and management strategies present opportunities for targeted smoking cessation interventions that amplify dissonance created through identity gaps as a motivational tactic.

  19. Do pedophiles have a weaker identity structure compared with nonsexual offenders?

    Science.gov (United States)

    Tardi, M; Van Gijseghem, H

    2001-10-01

    The aim of this study was to determine whether pedophiles have a weaker identity structure compared with nonsexual offenders. The recruitment process secured the participation of 87 male adult subjects, divided into three groups: 27 pedophiles who abused male victims (X = 38.6 years), 30 pedophiles who abused female victims (X = 35.5 years), 30 nonsexual offenders (X = 29.8 years). The concept of identity was examined on the basis of two factors: body image limits and ego identity. Two objective tests, the Minnesota Multiphasic Personality Inventory (MMPI) and the Ego Identity Scale, and one projective test, the Rorschach scored according to the Fisher and Cleveland method, were used. A multivariate analysis of covariance, at a significance threshold of p pedophiles who abused female victims and pedophiles who abused male victims have more fragile body image limits, as measured by the penetration score, and present a higher level of social introversion (Si scale) than do nonsexual offenders. Moreover, pedophiles who abused male victims have a weaker ego (Es scale) than do pedophiles who abused female victims and nonsexual offenders. In other respects, no significant intergroup difference emerged in terms of body image limits as measured by the barrier score and of strength of ego identity (Ego Identity Scale). Conceptual and empirical elements related to body image and ego identity are addressed to shed light on the potential disturbances in the identity of pedophile subjects. These results imply not only that certain impairments exist at the level of the basis structures of the personality, but also that these impairments should be taken into account in formulating a program and devising a therapeutic process for pedophiles.

  20. Usefulness of biological fingerprint in magnetic resonance imaging for patient verification.

    Science.gov (United States)

    Ueda, Yasuyuki; Morishita, Junji; Kudomi, Shohei; Ueda, Katsuhiko

    2016-09-01

    The purpose of our study is to investigate the feasibility of automated patient verification using multi-planar reconstruction (MPR) images generated from three-dimensional magnetic resonance (MR) imaging of the brain. Several anatomy-related MPR images generated from three-dimensional fast scout scan of each MR examination were used as biological fingerprint images in this study. The database of this study consisted of 730 temporal pairs of MR examination of the brain. We calculated the correlation value between current and prior biological fingerprint images of the same patient and also all combinations of two images for different patients to evaluate the effectiveness of our method for patient verification. The best performance of our system were as follows: a half-total error rate of 1.59 % with a false acceptance rate of 0.023 % and a false rejection rate of 3.15 %, an equal error rate of 1.37 %, and a rank-one identification rate of 98.6 %. Our method makes it possible to verify the identity of the patient using only some existing medical images without the addition of incidental equipment. Also, our method will contribute to patient misidentification error management caused by human errors.

  1. Implications of neuroscience Psychoactive drugs and identity: between history and culture

    Directory of Open Access Journals (Sweden)

    Lydia Feito Grande

    2016-02-01

    Full Text Available Neuroscientifical advances open the possibility to modify capacities in human beings, aimed to enhance them. An example is neurodrugs. Altering memory, attention or mood can make a difference in personal identity. This question about identity is analyzed and its implications on modification of human nature. This raises again the nature/culture debate, also from the contemporary neuroscience. The conclusion is that dynamism in human narrative identity is the result of an interaction between nature and culture.

  2. Professional identity of civil servants as a scientific problem

    OpenAIRE

    Nataliia Anatoliivna Lypovska; Mykola Oleksandrovych Malanchii

    2013-01-01

    The article examines the concept of «professional identity» and its importance for the analysis of the professionalization of the civil servants. The basic concepts such as “profession”, “professionalism” (“professional development”), “professional competence”, and their relationship are concerned. Relevance of the research is due to the fact that professional identity acts as an internal source of professional development and personal growth of any business entity, and the question of the de...

  3. La lengua y la identidad (Language and Identity).

    Science.gov (United States)

    Blanco Lazaro, Enrique T.

    1980-01-01

    Discusses the links among native language, personal identity and ethnicity. Sees language as the carrier of all the values and qualities that distinguish an individual and a people, as the prime repository of a culture, and the foundation of its institution. (MES)

  4. Freud's Jewish identity and psychoanalysis as a science.

    Science.gov (United States)

    Richards, Arnold D

    2014-12-01

    Ludwik Fleck, the Polish philosopher of science, maintained that scientific discovery is influenced by social, political, historical, psychological, and personal factors. The determinants of Freud's Jewish identity are examined from this Fleckian perspective, as is the impact of that complex identity on his creation of psychoanalysis as a science. Three strands contributing to his Jewish identity are identified and explored: his commitment to the ideal of Bildung, the anti-Semitism of the times, and his "godlessness." Finally, the question is addressed of what it means that psychoanalysis was founded by a Jew. For Freud, psychoanalysis was a kind of liberation philosophy, an attempt to break free of his ethnic and religious inheritance. Yet it represented at the same time his ineradicable relationship with that inheritance. It encapsulated both the ambivalence of his Jewish identity and the creativity of his efforts to resolve it. © 2014 by the American Psychoanalytic Association.

  5. An integrated developmental model for studying identity content in context.

    Science.gov (United States)

    Galliher, Renee V; McLean, Kate C; Syed, Moin

    2017-11-01

    Historically, identity researchers have placed greater emphasis on processes of identity development (how people develop their identities) and less on the content of identity (what the identity is). The relative neglect of identity content may reflect the lack of a comprehensive framework to guide research. In this article, we provide such a comprehensive framework for the study of the content of identity, including 4 levels of analysis. At the broadest level, we situate individual identity within historical, cultural, and political contexts, elaborating on identity development within the context of shifting cultural norms, values, and attitudes. Histories of prejudice and discrimination are relevant in shaping intersections among historically marginalized identities. Second, we examine social roles as unique and central contexts for identity development, such that relationship labels become integrated into a larger identity constellation. Third, domains of individual or personal identity content intersect to yield a sense of self in which various aspects are subjectively experienced as an integrated whole. We explore the negotiation of culturally marginalized and dominant identity labels, as well as idiosyncratic aspects of identities based on unique characteristics or group memberships. Finally, we argue that the content of identity is enacted at the level of everyday interactions, the "micro-level" of identity. The concepts of identity conflict, coherence, and compartmentalization are presented as strategies used to navigate identity content across these 4 levels. This framework serves as an organizing tool for the current literature, as well as for designing future studies on the identity development. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  6. Role of Education in Promoting National Identity Indicators

    Directory of Open Access Journals (Sweden)

    Mohammad Baqer Alizadeh Aghdam

    2010-04-01

    Full Text Available This article reviews social identity among students of secondary school with emphasis on national identity. This paper is to answer how we can increase students` belonging to national identity. Two high school students in two areas of Zanjan city with 700 people are the sample of this study which 30 persons were selected to attend the workshop. This research, based on objective, is practical and problem solving and based on time is longitudinal and panel study. The Research method is qualitative and the technique is based on PCM (Project Cycle Management. Theoretically, Tajfle, Giddens, Jenkins and Pyter Burk`s approaches are used in addition to micro, macro and combinational perspectives. Data collection in this study is through workshop and questionnaire. Research findings showed that students` belonging to national Identity have 10 percent increases since the workshop performance. Belonging to the national identity in male students has increased to 15 percent and in female students 5 percent after the workshop. Both female and male students` belongings to national identity have doubled after the workshop. Moreover, students’ familiarity with Iranian national figures, elements of national culture, the historical and national monuments and some national myths, which are all elements of national identity, have doubled after the workshop.

  7. Verification and validation benchmarks

    International Nuclear Information System (INIS)

    Oberkampf, William Louis; Trucano, Timothy Guy

    2007-01-01

    Verification and validation (V and V) are the primary means to assess the accuracy and reliability of computational simulations. V and V methods and procedures have fundamentally improved the credibility of simulations in several high-consequence fields, such as nuclear reactor safety, underground nuclear waste storage, and nuclear weapon safety. Although the terminology is not uniform across engineering disciplines, code verification deals with assessing the reliability of the software coding, and solution verification deals with assessing the numerical accuracy of the solution to a computational model. Validation addresses the physics modeling accuracy of a computational simulation by comparing the computational results with experimental data. Code verification benchmarks and validation benchmarks have been constructed for a number of years in every field of computational simulation. However, no comprehensive guidelines have been proposed for the construction and use of V and V benchmarks. For example, the field of nuclear reactor safety has not focused on code verification benchmarks, but it has placed great emphasis on developing validation benchmarks. Many of these validation benchmarks are closely related to the operations of actual reactors at near-safety-critical conditions, as opposed to being more fundamental-physics benchmarks. This paper presents recommendations for the effective design and use of code verification benchmarks based on manufactured solutions, classical analytical solutions, and highly accurate numerical solutions. In addition, this paper presents recommendations for the design and use of validation benchmarks, highlighting the careful design of building-block experiments, the estimation of experimental measurement uncertainty for both inputs and outputs to the code, validation metrics, and the role of model calibration in validation. It is argued that the understanding of predictive capability of a computational model is built on the

  8. Verification and validation benchmarks

    International Nuclear Information System (INIS)

    Oberkampf, William L.; Trucano, Timothy G.

    2008-01-01

    Verification and validation (V and V) are the primary means to assess the accuracy and reliability of computational simulations. V and V methods and procedures have fundamentally improved the credibility of simulations in several high-consequence fields, such as nuclear reactor safety, underground nuclear waste storage, and nuclear weapon safety. Although the terminology is not uniform across engineering disciplines, code verification deals with assessing the reliability of the software coding, and solution verification deals with assessing the numerical accuracy of the solution to a computational model. Validation addresses the physics modeling accuracy of a computational simulation by comparing the computational results with experimental data. Code verification benchmarks and validation benchmarks have been constructed for a number of years in every field of computational simulation. However, no comprehensive guidelines have been proposed for the construction and use of V and V benchmarks. For example, the field of nuclear reactor safety has not focused on code verification benchmarks, but it has placed great emphasis on developing validation benchmarks. Many of these validation benchmarks are closely related to the operations of actual reactors at near-safety-critical conditions, as opposed to being more fundamental-physics benchmarks. This paper presents recommendations for the effective design and use of code verification benchmarks based on manufactured solutions, classical analytical solutions, and highly accurate numerical solutions. In addition, this paper presents recommendations for the design and use of validation benchmarks, highlighting the careful design of building-block experiments, the estimation of experimental measurement uncertainty for both inputs and outputs to the code, validation metrics, and the role of model calibration in validation. It is argued that the understanding of predictive capability of a computational model is built on the

  9. Psychology or semiotics: persons or subjects?

    Science.gov (United States)

    Bell, Philip

    2005-01-01

    Cultural studies and especially semiological theory has recently sought to re-conceptualise classical problems considered in academic psychology such as perception, identity, and "subjectivity". It is argued that these theorizations are reductionist and/or theoretically incoherent without an adequate epistemology. Yet they have become for many students of the human sciences the conventional modes of analyzing such questions as personal identity.

  10. Work and Learner Identity -Developing an analytical framework

    DEFF Research Database (Denmark)

    Kondrup, Sissel

    within the field of lifelong learning to be sensitive to the significance of specific historical, social and material work practices when examining learner identities. First I argue that the hegemonic consensus about the necessity of lifelong learning calls for an increased attention to the different....... Then I present and discuss how Archer’s critical realist approach and her concepts of personal identity, natural, practical and social concerns (Archer 2000, 2003) and how Salling-Olesen’s life-historical approach rooted in critical theory (2002,2007) can contribute to the understanding of the relation...

  11. Quantitative analysis of patient-specific dosimetric IMRT verification

    International Nuclear Information System (INIS)

    Budgell, G J; Perrin, B A; Mott, J H L; Fairfoul, J; Mackay, R I

    2005-01-01

    Patient-specific dosimetric verification methods for IMRT treatments are variable, time-consuming and frequently qualitative, preventing evidence-based reduction in the amount of verification performed. This paper addresses some of these issues by applying a quantitative analysis parameter to the dosimetric verification procedure. Film measurements in different planes were acquired for a series of ten IMRT prostate patients, analysed using the quantitative parameter, and compared to determine the most suitable verification plane. Film and ion chamber verification results for 61 patients were analysed to determine long-term accuracy, reproducibility and stability of the planning and delivery system. The reproducibility of the measurement and analysis system was also studied. The results show that verification results are strongly dependent on the plane chosen, with the coronal plane particularly insensitive to delivery error. Unexpectedly, no correlation could be found between the levels of error in different verification planes. Longer term verification results showed consistent patterns which suggest that the amount of patient-specific verification can be safely reduced, provided proper caution is exercised: an evidence-based model for such reduction is proposed. It is concluded that dose/distance to agreement (e.g., 3%/3 mm) should be used as a criterion of acceptability. Quantitative parameters calculated for a given criterion of acceptability should be adopted in conjunction with displays that show where discrepancies occur. Planning and delivery systems which cannot meet the required standards of accuracy, reproducibility and stability to reduce verification will not be accepted by the radiotherapy community

  12. The rise and fall of gay: a cultural-historical approach to gay identity development.

    Science.gov (United States)

    Weststrate, Nic M; McLean, Kate C

    2010-02-01

    Research on identity development has paid relatively little attention to the development of marginalised identities such as those of gays and lesbians, whose isolation from the canonical narrative of sexuality may limit the available resources required for establishing a coherent identity. We examined these contested identities in relation to cultural-historical factors that may have played a role in shaping these identities over the past 50 years, and looked at how such factors have impacted the voicing and silencing of gay experiences. Participants (N=251) reported (1) a memory of a cultural event relevant to their sexuality, and (2) a self-defining memory about their sexuality. Those in older cohorts reported cultural memories centred on politics and other external events (e.g., Stonewall riots), and younger cohorts reported more personal memories (e.g., coming out), suggesting that homosexual identities have become less culturally defined, and instead more personally defined. Further, participants of older cohorts reported self-defining events that were predominantly from one private domain (e.g., sex). In contrast, younger participants reported a variety of self-defining events. These results suggest that cultural-historical factors play an important role in defining the developmental pathway of individuals, perhaps especially those who have marginalised identities.

  13. Post-silicon and runtime verification for modern processors

    CERN Document Server

    Wagner, Ilya

    2010-01-01

    The purpose of this book is to survey the state of the art and evolving directions in post-silicon and runtime verification. The authors start by giving an overview of the state of the art in verification, particularly current post-silicon methodologies in use in the industry, both for the domain of processor pipeline design and for memory subsystems. They then dive into the presentation of several new post-silicon verification solutions aimed at boosting the verification coverage of modern processors, dedicating several chapters to this topic. The presentation of runtime verification solution

  14. Personality functioning in patients with avoidant personality disorder and social phobia.

    Science.gov (United States)

    Eikenaes, Ingeborg; Hummelen, Benjamin; Abrahamsen, Gun; Andrea, Helene; Wilberg, Theresa

    2013-12-01

    Avoidant personality disorder (APD) and social phobia (SP) are closely related, such that they are suggested to represent different severity levels of one social anxiety disorder. This cross-sectional study aimed to compare patients with APD to patients with SP, with particular focus on personality dysfunction. Ninety-one adult patients were examined by diagnostic interviews and self-report measures, including the Index of Self-Esteem and the Severity Indices of Personality Problems. Patients were categorized in three groups; SP without APD (n = 20), APD without SP (n = 15), and APD with SP (n = 56). Compared to patients with SP without APD, patients with APD reported more symptom disorders, psychosocial problems, criteria of personality disorders, and personality dysfunction regarding self-esteem, identity and relational problems. These results indicate that APD involves more severe and broader areas of personality dysfunction than SP, supporting the conceptualization of APD as a personality disorder as proposed for DSM-5.

  15. Relationship between Values and Religious Identity in Buddhist Adolescents

    Directory of Open Access Journals (Sweden)

    Shorokhova V.A.,

    2016-04-01

    Full Text Available The paper describes results of a social psychological study on religious identity in Buddhist schoolchil- dren. The study involved 184 students of 9—10 classes of a school in the Aginskoye settlement (Aginsky Buryatsky Okrug, Zabaykalsky Krai. According to G. Allport’s concept and R. Gorsuch & S. McPherson measurements, religious identity is considered not only as practicing Buddhism, but as a complex social psychological formation with a four-factor structure base on the following scales: personal/social and in- trinsic/extrinsic. Different components of religious identity are explored in the context of their relation- ship with value orientations (as described by S. Schwartz and G. Hofstede. The following techniques were employed: the adapted version of D. Van Camp’s Individual/Social Religious Identity Measure, Schwartz’s Portrait Values Questionnaire (PVQ-R2, and Hofstede’s Values Survey Module. As it was revealed, al- most all values related to various components of religious identity of the Buddhist adolescents refer to the social focus. The paper concludes that religious identity in modern Buddhist young people has a distinctive social character.

  16. Automatic Capture Verification in Pacemakers (Autocapture – Utility and Problems

    Directory of Open Access Journals (Sweden)

    Ruth Kam

    2004-04-01

    Full Text Available The concept of a closed – loop feedback system, that would automatically assess pacing threshold and self -adjust pacing output to ensure consistent myocardial capture, has many appeals. Enhancing patient safety in cases of an unexpected rise in threshold, reduced current drain, hence prolonging battery longevity and reducing the amount of physician intervention required are just some of the advantages. Autocapture (AC is a proprietary algorithm developed by St Jude Medical CRMD, Sylmar, CA, USA, (SJM that was the first to commercially provide these automatic functions in a single chamber pacemaker (Microny and Regency, and subsequently in a dual chamber pacemaker (Affinity, Entity and Identity family of pacemakers. This article reviews the conditions necessary for AC verification and performance and the problems encountered in clinical practice.

  17. An attempt of classification of theoretical approaches to national identity

    Directory of Open Access Journals (Sweden)

    Milošević-Đorđević Jasna S.

    2003-01-01

    Full Text Available It is compulsory that complex social concepts should be defined in different ways and approached from the perspective of different science disciplines. Therefore, it is difficult to precisely define them without overlapping of meaning with other similar concepts. This paper has made an attempt towards theoretical classification of the national identity and differentiate that concept in comparison to the other related concepts (race, ethnic group, nation, national background, authoritativeness, patriarchy. Theoretical assessments are classified into two groups: ones that are dealing with nature of national identity and others that are stating one or more dimensions of national identity, crucial for its determination. On the contrary to the primordialistic concept of national identity, describing it as a fundamental, deeply rooted human feature, there are many numerous contemporary theoretical approaches (instrumentalist, constructivist, functionalistic, emphasizing changeable, fluid, instrumentalist function of the national identity. Fundamental determinants of national identity are: language, culture (music, traditional myths, state symbols (territory, citizenship, self-categorization, religion, set of personal characteristics and values.

  18. A loss in the family: silence, memory, and narrative identity after bereavement.

    Science.gov (United States)

    Baddeley, Jenna; Singer, Jefferson A

    2010-02-01

    Grief theories have converged on the idea that the sharing of autobiographical memory narratives of loss and of the deceased person, especially within the family, is a major way to maintain and/or reconfigure a healthy sense of identity after a loss. In contrast, we examine unspoken memory-the withholding of socially sharing autobiographical memories about the loss and the departed family member-as a way to either conserve an existing narrative identity or assert a new narrative identity. Depending on its context and function, silence about memory can play either a positive or negative role in an individual griever's ongoing narrative identity, as well as in the larger family narrative in which the griever's identity is embedded.

  19. Objective documentation of child abuse and dissociation in 12 murderers with dissociative identity disorder.

    Science.gov (United States)

    Lewis, D O; Yeager, C A; Swica, Y; Pincus, J H; Lewis, M

    1997-12-01

    The skepticism regarding the existence of dissociative identity disorder as well as the abuse that engenders it persists for lack of objective documentation. This is doubly so for the disorder in murderers because of issues of suspected malingering. This article presents objective verification of both dissociative symptoms and severe abuse during childhood in a series of adult murderers with dissociative identity disorder. This study consisted of a review of the clinical records of 11 men and one woman with DSM-IV-defined dissociative identity disorder who had committed murder. Data were gathered from medical, psychiatric, social service, school, military, and prison records and from records of interviews with subjects' family members and others. Handwriting samples were also examined. Data were analyzed qualitatively. Signs and symptoms of dissociative identity disorder in childhood and adulthood were corroborated independently and from several sources in all 12 cases; objective evidence of severe abuse was obtained in 11 cases. The subjects had amnesia for most of the abuse and underreported it. Marked changes in writing style and/or signatures were documented in 10 cases. This study establishes, once and for all, the linkage between early severe abuse and dissociative identity disorder. Further, the data demonstrate that the disorder can be distinguished from malingering and from other disorders. The study shows that it is possible, with great effort, to obtain objective evidence of both the symptoms of dissociative identity disorder and the abuse that engenders it.

  20. Enacting Efficacy in Early Career: Narratives of Agency, Growth, and Identity

    Directory of Open Access Journals (Sweden)

    Elizabeth K Niehaus

    2017-01-01

    Full Text Available Aim/Purpose: To explore how early career faculty in the field of higher education administration develop and enact their personal and professional identities. Background:\tParticipants sought to understand themselves, to understand their environments and the “rules” of the academic “game,” and to reconcile conflicts between their own values and identities and the expectations and culture of their environments. Methodology: In-depth case studies of seventeen early career scholars in the field. Contribution: The participants’ experiences underscore important implications for mentoring and socialization that takes into consideration the unique motivation and identity development of aspiring and new faculty members. Findings: Identifies the early career period as one where new faculty are working to develop a strong internal foundation upon which they can manage the many challenges of their personal and professional lives. Recommendations: The findings point to implications for practice, both in graduate education and in departments hiring new faculty members.