WorldWideScience

Sample records for personal identity verification

  1. 75 FR 28771 - Federal Acquisition Regulation; FAR Case 2009-027, Personal Identity Verification of Contractor...

    Science.gov (United States)

    2010-05-24

    ... Acquisition Regulation; FAR Case 2009-027, Personal Identity Verification of Contractor Personnel AGENCIES... of collecting from contractors all forms of Government provided identification once they are no..., titled Controls Over the Contractor Common Access Card (CAC) Life Cycle, was performed to determine...

  2. 75 FR 82575 - Federal Acquisition Regulation; Personal Identity Verification of Contractor Personnel

    Science.gov (United States)

    2010-12-30

    ... 9000-AL60 Federal Acquisition Regulation; Personal Identity Verification of Contractor Personnel AGENCY... requirement of collecting from contractors all forms of Government-provided identification once they are no...D Inspector General Audit Report No. D-2009-005, entitled ``Controls Over the Contractor Common...

  3. Personal Identity Verification

    Data.gov (United States)

    US Agency for International Development — PIV is the system USAID uses to comply with Homeland Security Presidential Directive (HSPD)-12, which requires Federal agencies to adopt policies, procedures, and...

  4. Sensor-fusion-based biometric identity verification

    International Nuclear Information System (INIS)

    Carlson, J.J.; Bouchard, A.M.; Osbourn, G.C.; Martinez, R.F.; Bartholomew, J.W.; Jordan, J.B.; Flachs, G.M.; Bao, Z.; Zhu, L.

    1998-02-01

    Future generation automated human biometric identification and verification will require multiple features/sensors together with internal and external information sources to achieve high performance, accuracy, and reliability in uncontrolled environments. The primary objective of the proposed research is to develop a theoretical and practical basis for identifying and verifying people using standoff biometric features that can be obtained with minimal inconvenience during the verification process. The basic problem involves selecting sensors and discovering features that provide sufficient information to reliably verify a person's identity under the uncertainties caused by measurement errors and tactics of uncooperative subjects. A system was developed for discovering hand, face, ear, and voice features and fusing them to verify the identity of people. The system obtains its robustness and reliability by fusing many coarse and easily measured features into a near minimal probability of error decision algorithm

  5. Personal Identity in Enhancement

    Directory of Open Access Journals (Sweden)

    Jana Podroužková

    2015-09-01

    Full Text Available The aim of this paper is to introduce the concept of human enhancement, its methods and its relation to personal identity. Also several approaches to personal identity will be described. Transhumanism is a special think tank supporting human enhancement through modern technologies and some of its representatives claim, that even great changes to human organisms will not affect their personal identity. I will briefly describe the most important means of human enhancment and consider the problem of personal identity for each of them separately.

  6. A hand held photo identity verification system for mobile applications

    International Nuclear Information System (INIS)

    Kumar, Ranajit; Upreti, Anil; Mahaptra, U.; Bhattacharya, S.; Srivastava, G.P.

    2009-01-01

    A handheld portable system has been developed for mobile personnel identity verification. The system consists of a contact less RF smart card reader integrated to a Simputer through serial link. The simputer verifies the card data, with the data base and aids the security operator in identifying the persons by providing the facial image of the verified person along with other personal details like name, designation, division etc. All transactions are recorded in the Simputer with time and date for future record. This system finds extensive applications in mobile identity verification in nuclear or other industries. (author)

  7. Personal Identity Online

    DEFF Research Database (Denmark)

    Rodogno, Raffaele

    2012-01-01

    Philosophers concerned with the question of personal identity have typically been asking the so-called re-identification question: what are the conditions under which a person at one point in time is properly re-identified at another point in time? This is a rather technical question. In our...... everyday interactions, however, we do raise a number of personal identity questions that are quite distinct from it. In order to explore the variety of ways in which the Internet may affect personal identity, I propose in this study to broaden the typical philosophical horizon to other more mundane senses...... of the question. In Section 2, I describe a number of possible meanings of personal identity observed in everyday contexts and more philosophical ones. With some caveats, I argue that it is the specific context in which the question arises that disambiguates the meaning of the question. Online contexts are novel...

  8. Can self-verification strivings fully transcend the self-other barrier? Seeking verification of ingroup identities.

    Science.gov (United States)

    Gómez, Angel; Seyle, D Conor; Huici, Carmen; Swann, William B

    2009-12-01

    Recent research has demonstrated self-verification strivings in groups, such that people strive to verify collective identities, which are personal self-views (e.g., "sensitive") associated with group membership (e.g., "women"). Such demonstrations stop short of showing that the desire for self-verification can fully transcend the self-other barrier, as in people working to verify ingroup identities (e.g., "Americans are loud") even when such identities are not self-descriptive ("I am quiet and unassuming"). Five studies focus on such ingroup verification strivings. Results indicate that people prefer to interact with individuals who verify their ingroup identities over those who enhance these identities (Experiments 1-5). Strivings for ingroup identity verification were independent of the extent to which the identities were self-descriptive but were stronger among participants who were highly invested in their ingroup identities, as reflected in high certainty of these identities (Experiments 1-4) and high identification with the group (Experiments 1-5). In addition, whereas past demonstrations of self-verification strivings have been limited to efforts to verify the content of identities (Experiments 1 to 3), the findings also show that they strive to verify the valence of their identities (i.e., the extent to which the identities are valued; Experiments 4 and 5). Self-verification strivings, rather than self-enhancement strivings, appeared to motivate participants' strivings for ingroup identity verification. Links to collective self-verification strivings and social identity theory are discussed.

  9. John locke on personal identity.

    Science.gov (United States)

    Nimbalkar, Namita

    2011-01-01

    John Locke speaks of personal identity and survival of consciousness after death. A criterion of personal identity through time is given. Such a criterion specifies, insofar as that is possible, the necessary and sufficient conditions for the survival of persons. John Locke holds that personal identity is a matter of psychological continuity. He considered personal identity (or the self) to be founded on consciousness (viz. memory), and not on the substance of either the soul or the body.

  10. John Locke on Personal Identity**

    OpenAIRE

    Nimbalkar, Namita

    2011-01-01

    John Locke speaks of personal identity and survival of consciousness after death. A criterion of personal identity through time is given. Such a criterion specifies, insofar as that is possible, the necessary and sufficient conditions for the survival of persons. John Locke holds that personal identity is a matter of psychological continuity. He considered personal identity (or the self) to be founded on consciousness (viz. memory), and not on the substance of either the soul or the body.

  11. 76 FR 12712 - Announcing Draft Federal Information Processing Standard (FIPS) 201-2, Personal Identity...

    Science.gov (United States)

    2011-03-08

    ...-02] Announcing Draft Federal Information Processing Standard (FIPS) 201-2, Personal Identity..., ``Personal Identity Verification of Federal Employees and Contractors Standard.'' Draft FIPS 201-2 amends... Issuing Personal Identity Verification Cards under HSPD-12.'' The purpose of this change is to update the...

  12. John Locke on persons and personal identity

    OpenAIRE

    Boeker, Ruth

    2013-01-01

    John Locke claims both that ‘person’ is a forensic term and that personal identity consists in sameness of consciousness. The aim of my dissertation is to explain and critically assess how Locke links his moral and legal account of personhood to his account of personal identity in terms of sameness of consciousness. My interpretation of Locke’s account of persons and personal identity is embedded in Locke’s sortal-dependent account of identity. Locke’s sortal-dependent ac...

  13. Personal identity and eastern thought

    Directory of Open Access Journals (Sweden)

    Correia Carlos João

    2009-01-01

    Full Text Available This paper aims to show that the problem of personal identity is a fundamental question of the classical Indian thought. Usually we tend to think that personal identity is a Western philosophical subject, and so we tend to forget the significance of the Self (Atman in Hinduism and even in Buddhism. The author shows how the Indian thought approached the question of personal identity and which was the singular solution outlined in the work consensually attributed to Gotama, the Buddha.

  14. 21 CFR 21.44 - Verification of identity.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 1 2010-04-01 2010-04-01 false Verification of identity. 21.44 Section 21.44 Food... Verification of identity. (a) An individual seeking access to records in a Privacy Act Record System may be... identity. The identification required shall be suitable considering the nature of the records sought. No...

  15. Personal Identity in Japan

    Science.gov (United States)

    Sugimura, Kazumi; Mizokami, Shinichi

    2012-01-01

    This chapter explores characteristics of identity formation among Japanese adolescents and young adults living in a cultural context where individualism has been increasingly emphasized even while maintaining collectivism. We argue that, to develop a sense of identity in Japanese culture, adolescents and young adults carefully consider others'…

  16. BIOMETRIC IDENTITY VERIFICATION IN HEALTH SERVICES: A BIOMETRIC SURVEILLANCE PRACTICE IN TURKEY

    OpenAIRE

    İlker ŞİRİN

    2014-01-01

    Determination or verification of identity with biometric methods has a widespread use especially at borders for security reasons. Social Security Institution transferred the biometric identity verification practice to health sercives that are provided by private and university hospitals. The risks of the new system considering the privacy of personal data are under debate. Although there are announcements or manuals of Social Security Institution regarding the implementation...

  17. Smartphone User Identity Verification Using Gait Characteristics

    Directory of Open Access Journals (Sweden)

    Robertas Damaševičius

    2016-09-01

    Full Text Available Smartphone-based biometrics offers a wide range of possible solutions, which could be used to authenticate users and thus to provide an extra level of security and theft prevention. We propose a method for positive identification of smartphone user’s identity using user’s gait characteristics captured by embedded smartphone sensors (gyroscopes, accelerometers. The method is based on the application of the Random Projections method for feature dimensionality reduction to just two dimensions. Then, a probability distribution function (PDF of derived features is calculated, which is compared against known user PDF. The Jaccard distance is used to evaluate distance between two distributions, and the decision is taken based on thresholding. The results for subject recognition are at an acceptable level: we have achieved a grand mean Equal Error Rate (ERR for subject identification of 5.7% (using the USC-HAD dataset. Our findings represent a step towards improving the performance of gait-based user identity verification technologies.

  18. PERSONAL IDENTITY IN DEAF ADOLESCENTS

    Directory of Open Access Journals (Sweden)

    Joanna KOSSEWSKA

    2008-06-01

    Full Text Available The purpose of this study was to investigate the factors influencing the identity deaf adolescents. The study involved 67 deaf adolescents (38 boys and 29 girls aged 16 to 19 students of secondary school. Ninety-three hearing children constituted a comparison group. The structure of identity was explored on the basis of identification references given by the subjects who were to reply in writing, 20 times running, to the question: „Who Am I?” the test, adapted from M. H. Kuhn and T. S. McPartland by Martines and Silvestre (1995 given in written and signed mode.Results showed that the hearing status as well as mode of communication influence the description of personal identity. It was found that deaf adoles­cents used more descriptions especially in the fol­lowing categories: Civil Status, Body and Physical Appearance, Tastes and Activities, Friendship and Relationships, Personal and Social Situation, Negative Personal Traits, and Neutral Personality Traits. Although this study could demonstrate im­pact independent variables on identity, the data raise the need for further, preferably longitudinal, research. This complex phenomenon has to be examined more closely.Combined self-descriptive processes lead to the development of an organized, learned and dynamic identity, and subjective description of an individ­ual has strong emotional consequences for the in­dividual in question.

  19. BIOMETRIC IDENTITY VERIFICATION IN HEALTH SERVICES: A BIOMETRIC SURVEILLANCE PRACTICE IN TURKEY

    Directory of Open Access Journals (Sweden)

    İlker ŞİRİN

    2014-08-01

    Full Text Available Determination or verification of identity with biometric methods has a widespread use especially at borders for security reasons. Social Security Institution transferred the biometric identity verification practice to health sercives that are provided by private and university hospitals. The risks of the new system considering the privacy of personal data are under debate. Although there are announcements or manuals of Social Security Institution regarding the implementation and legislation for data sharing and security exists, lack of a national data protection law brings with it security gaps.

  20. Adolescent personality development and identity formation

    NARCIS (Netherlands)

    Klimstra, T.A.

    2013-01-01

    Personality development is not only about changes in traits but also about changes in other layers of the self, such as the identity layer. Forming one's identity is thought to be the key developmental task of adolescence, but profound changes in personality traits also occur in this period. In this

  1. Identity theory and personality theory: mutual relevance.

    Science.gov (United States)

    Stryker, Sheldon

    2007-12-01

    Some personality psychologists have found a structural symbolic interactionist frame and identity theory relevant to their work. This frame and theory, developed in sociology, are first reviewed. Emphasized in the review are a multiple identity conception of self, identities as internalized expectations derived from roles embedded in organized networks of social interaction, and a view of social structures as facilitators in bringing people into networks or constraints in keeping them out, subsequently, attention turns to a discussion of the mutual relevance of structural symbolic interactionism/identity theory and personality theory, looking to extensions of the current literature on these topics.

  2. Face Verification for Mobile Personal Devices

    NARCIS (Netherlands)

    Tao, Q.

    2009-01-01

    In this thesis, we presented a detailed study of the face verification problem on the mobile device, covering every component of the system. The study includes face detection, registration, normalization, and verification. Furthermore, the information fusion problem is studied to verify face

  3. Analyzing personalized policies for online biometric verification.

    Science.gov (United States)

    Sadhwani, Apaar; Yang, Yan; Wein, Lawrence M

    2014-01-01

    Motivated by India's nationwide biometric program for social inclusion, we analyze verification (i.e., one-to-one matching) in the case where we possess similarity scores for 10 fingerprints and two irises between a resident's biometric images at enrollment and his biometric images during his first verification. At subsequent verifications, we allow individualized strategies based on these 12 scores: we acquire a subset of the 12 images, get new scores for this subset that quantify the similarity to the corresponding enrollment images, and use the likelihood ratio (i.e., the likelihood of observing these scores if the resident is genuine divided by the corresponding likelihood if the resident is an imposter) to decide whether a resident is genuine or an imposter. We also consider two-stage policies, where additional images are acquired in a second stage if the first-stage results are inconclusive. Using performance data from India's program, we develop a new probabilistic model for the joint distribution of the 12 similarity scores and find near-optimal individualized strategies that minimize the false reject rate (FRR) subject to constraints on the false accept rate (FAR) and mean verification delay for each resident. Our individualized policies achieve the same FRR as a policy that acquires (and optimally fuses) 12 biometrics for each resident, which represents a five (four, respectively) log reduction in FRR relative to fingerprint (iris, respectively) policies previously proposed for India's biometric program. The mean delay is [Formula: see text] sec for our proposed policy, compared to 30 sec for a policy that acquires one fingerprint and 107 sec for a policy that acquires all 12 biometrics. This policy acquires iris scans from 32-41% of residents (depending on the FAR) and acquires an average of 1.3 fingerprints per resident.

  4. Personality disorders in persons with gender identity disorder.

    Science.gov (United States)

    Duišin, Dragana; Batinić, Borjanka; Barišić, Jasmina; Djordjevic, Miroslav L; Vujović, Svetlana; Bizic, Marta

    2014-01-01

    Investigations in the field of gender identity disorder (GID) have been mostly related to psychiatric comorbidity and severe psychiatric disorders, but have focused less on personality and personality disorders (PDs). The aim of the study was to assess the presence of PDs in persons with GID as compared to cisgendered (a cisgender person is a person who is content to remain the gender they were assigned at birth) heterosexuals, as well as to biological sex. The study sample consisted of 30 persons with GID and 30 cisgendered heterosexuals from the general population. The assessment of PDs was conducted by application of the self-administered Structured Clinical Interview for DSM-IV Axis II PDs (SCID-II). Persons with GID compared to cisgender heterosexuals have higher presence of PDs, particularly Paranoid PD, avoidant PDs, and comorbid PDs. In addition, MtF (transwomen are people assigned male at birth who identify as women) persons are characterized by a more severe psychopathological profile. Assessment of PDs in persons with GID is of great importance as it comprises a key part of personalized treatment plan tailoring, as well as a prognostic factor for sex-reassignment surgery (SRS) outcome.

  5. Personality Disorders in Persons with Gender Identity Disorder

    Directory of Open Access Journals (Sweden)

    Dragana Duišin

    2014-01-01

    Full Text Available Background. Investigations in the field of gender identity disorder (GID have been mostly related to psychiatric comorbidity and severe psychiatric disorders, but have focused less on personality and personality disorders (PDs. Aims. The aim of the study was to assess the presence of PDs in persons with GID as compared to cisgendered (a cisgender person is a person who is content to remain the gender they were assigned at birth heterosexuals, as well as to biological sex. Methods. The study sample consisted of 30 persons with GID and 30 cisgendered heterosexuals from the general population. The assessment of PDs was conducted by application of the self-administered Structured Clinical Interview for DSM-IV Axis II PDs (SCID-II. Results. Persons with GID compared to cisgender heterosexuals have higher presence of PDs, particularly Paranoid PD, avoidant PDs, and comorbid PDs. In addition, MtF (transwomen are people assigned male at birth who identify as women persons are characterized by a more severe psychopathological profile. Conclusions. Assessment of PDs in persons with GID is of great importance as it comprises a key part of personalized treatment plan tailoring, as well as a prognostic factor for sex-reassignment surgery (SRS outcome.

  6. The dynamics of personality and identity in adolescence

    NARCIS (Netherlands)

    Klimstra, T.A.

    2010-01-01

    The current dissertation focused on adolescent identity formation and personality development. We focused on how these aspects of individuality develop through adolescence, and how individual differences in (the development of) personality and identity relate to problem behavior. For that purpose,

  7. Secure stand alone positive personnel identity verification system (SSA-PPIV)

    International Nuclear Information System (INIS)

    Merillat, P.D.

    1979-03-01

    The properties of a secure stand-alone positive personnel identity verification system are detailed. The system is designed to operate without the aid of a central computing facility and the verification function is performed in the absence of security personnel. Security is primarily achieved by means of data encryption on a magnetic stripe badge. Several operational configurations are discussed. Advantages and disadvantages of this system compared to a central computer driven system are detailed

  8. Advance directives and personal identity: what is the problem?

    Science.gov (United States)

    Furberg, Elisabeth

    2012-02-01

    The personal identity problem expresses the worry that due to disrupted psychological continuity, one person's advance directive could be used to determine the care of a different person. Even ethicists, who strongly question the possibility of the scenario depicted by the proponents of the personal identity problem, often consider it to be a very potent objection to the use of advance directives. Aiming to question this assumption, I, in this paper, discuss the personal identity problem's relevance to the moral force of advance directives. By putting the personal identity argument in relation to two different normative frameworks, I aim to show that whether or not the personal identity problem is relevant to the moral force of advance directives, and further, in what way it is relevant, depends entirely on what normative reasons we have for respecting advance directives in the first place.

  9. Personal Identity and Resurrection from the Dead

    Directory of Open Access Journals (Sweden)

    Gasparov Igor

    2017-04-01

    Full Text Available The paper examines arguments of the “Christian materialist” Trenton Merricks that he provided in support of the claim that the Christian doctrine of resurrection from the dead is compatible with the materialist understanding of the nature of human beings. In his paper The Resurrection of the Body, Merricks discussed two aspects of the materialist interpretation of the traditional religious doctrine of the bodily resurrection. On the one hand, he analyses and tries to overcome objections against the possibility of the general resurrection in case the materialist understanding of the nature of human personality should be true (mainly the problem of the temporal gap. On the other hand, he provides some reasons why the materialist understanding of human nature is more relevant than its dualist counterpart to the doctrine of the bodily resurrection. The present paper evaluates his arguments and discusses the suggestion that the doctrine of resurrection is not only compatible with materialism, but is also tenable if human beings are identical with their physical bodies. The conclusion of the paper is that Merricks’ apologetic arguments achieve their aims in defending the doctrine of resurrection only partially; the resurrection doctrine appears more tenable if we accept the dualistic conception of human nature.

  10. Identity and Conflict: Personality, Sociality and Culturality

    Directory of Open Access Journals (Sweden)

    Rik Pinxten

    1997-05-01

    Full Text Available We presented a model which describes the field of questions on identity as a field of dynamics. It is structured by means of particular, temporal configurations of identity through time and space. The theory of dynamic systems provides us with precise models for the representation of forms of identity, or of their evolution towards types of so-called chaos, given certain conditions. The model allows us to work in a comparative perspective, which is a sure advantage in conflict analysis. The complexity of identity phenomena is captured covering individual, group and community dynamics of identity.

  11. Personal Verification/Identification via Analysis of the Peripheral ECG Leads: Influence of the Personal Health Status on the Accuracy

    Directory of Open Access Journals (Sweden)

    Irena Jekova

    2015-01-01

    Full Text Available Traditional means for identity validation (PIN codes, passwords, and physiological and behavioral biometric characteristics (fingerprint, iris, and speech are susceptible to hacker attacks and/or falsification. This paper presents a method for person verification/identification based on correlation of present-to-previous limb ECG leads: I (rI, II (rII, calculated from them first principal ECG component (rPCA, linear and nonlinear combinations between rI, rII, and rPCA. For the verification task, the one-to-one scenario is applied and threshold values for rI, rII, and rPCA and their combinations are derived. The identification task supposes one-to-many scenario and the tested subject is identified according to the maximal correlation with a previously recorded ECG in a database. The population based ECG-ILSA database of 540 patients (147 healthy subjects, 175 patients with cardiac diseases, and 218 with hypertension has been considered. In addition a common reference PTB dataset (14 healthy individuals with short time interval between the two acquisitions has been taken into account. The results on ECG-ILSA database were satisfactory with healthy people, and there was not a significant decrease in nonhealthy patients, demonstrating the robustness of the proposed method. With PTB database, the method provides an identification accuracy of 92.9% and a verification sensitivity and specificity of 100% and 89.9%.

  12. Functions of personal and vicarious life stories: Identity and empathy

    DEFF Research Database (Denmark)

    Lind, Majse; Thomsen, Dorthe Kirkegaard

    2018-01-01

    The present study investigates functions of personal and vicarious life stories focusing on identity and empathy. Two-hundred-and-forty Danish high school students completed two life story questionnaires: One for their personal life story and one for a close other’s life story. In both...... questionnaires, they identified up to 10 chapters and self-rated the chapters on valence and valence of causal connections. In addition, they completed measures of identity disturbance and empathy. More positive personal life stories were related to lower identity disturbance and higher empathy. Vicarious life...... stories showed a similar pattern with respect to identity but surprisingly were unrelated to empathy. In addition, we found positive correlations between personal and vicarious life stories for number of chapters, chapter valence, and valence of causal connections. The study indicates that both personal...

  13. Life Stories, Cultural Métissage, and Personal Identities

    Directory of Open Access Journals (Sweden)

    Ricardo Vieira

    2014-01-01

    Full Text Available This article encompasses an underlying notion of personal identities and processes of interaction, which distinguish essentialist identity from relational identity in contexts involving subjects, fields of possibilities, and cultural metamorphosis. It addresses the idea of the individual and her/his transformations: “I am who I want to be if I can be that person.” Any one of us could hypothetically have been someone else. The question of the reconstruction of individual identities is a vital aspect in the relationship between objective social conditions and what each person subjectively does with them, in terms of auto-construction. The complexity of this question reflects the idea of a cultural kaleidoscope, in which similar social conditions experienced by different individuals can produce differentiated identities. The title and structure of this text also seek to encompass the idea that in a personal life story, the subject lives between various spheres and sociocultural contexts, with a composite, mestizo, and superimposed or displaced identity, in each context. This occurs as the result of a cultural metamorphosis, which is constructed both by the individual as well as by heterogeneous influences between the context of the starting and finishing points at a given moment. This complex process of cultural metamorphosis—the fruit of interweaving subjective and objective forces—reveals a new dimension: the truly composite nature of personal identities.

  14. Inattentive listening undermines self-verification in personal storytelling.

    Science.gov (United States)

    Pasupathi, Monisha; Rich, Ben

    2005-08-01

    Two studies explore the narrative construction of self-perceptions in conversational storytelling among pairs of same-sex friends. Specifically, the studies examined how listener behavior can support or undermine attempts to self-verify in personal storytelling. In two studies (n=100 dyads), speakers told attentive, distracted, or disagreeable (Study 1 only) friends about a recent experience. Distracted, but not disagreeable, friends tended to undermine participants' attempts to verify their self-perception of being interested in an activity (Study 1) or their self-perception that an event was typical for them (Study 2). These results support the notion that friends can be an important source of influence on self-perceptions and, perhaps surprisingly, suggest that responsiveness from friends, rather than agreement per se, may be crucial for supporting self-verification processes.

  15. Verification of Ca F2:Mn type of dosemeters for personal dosimetry purposes

    International Nuclear Information System (INIS)

    Misovic, M.; Boskovic, Z.; Spasic-Jokic, V.

    1995-01-01

    Verification results of CaF2:Mn type of dosemeters for personal dosimetry purposes are presented in this paper. Tree types of irradiations are proceeded due to verification of relevant features of TLD. It is concluded that mentioned type of dosemeter can be used for purpose of personal dosimetry. (author)

  16. Biography, Identity, Improvisation, Sound: Intersections of Personal and Social Identity through Improvisation

    Science.gov (United States)

    Smilde, Rineke

    2016-01-01

    This essay addresses the relationship of improvisation and identity. Biographical research that was conducted by the author into professional musicians' lifelong learning showed the huge importance of improvisation for personal expression. Musically, the concept of "sound" appeared to serve as a strong metaphor for identity. In addition,…

  17. Protecting Personal Information in the Era of Identity Theft: Just how Safe is Our Personal Information from Identity Thieves?

    Directory of Open Access Journals (Sweden)

    Fawzia Cassim

    2015-07-01

    Full Text Available Identity theft has become one of the fastest growing white collar crimes in the world. It occurs when an individual's personal information such as inter alia his or her name, date of birth or credit card details is used by another individual to commit identity fraud. Identity theft can be committed via physical means or online. The increased use of the Internet for business and financial transactions, social networking and the storage of personal information has facilitated the work of identity thieves. Identity theft has an impact on the personal finances and emotional well-being of victims, and on the financial institutions and economies of countries. It presents challenges for law enforcement agencies and governments worldwide. This article examines how identity thieves use the personal information of individuals to commit identity fraud and theft, and looks at legislative solutions introduced in South Africa, the United States of America, the United Kingdom and India to combat identity theft crimes. The article examines measures introduced by the respective governments in these countries to counteract such crimes. Finally, the article will propose a way forward to counteract such crimes in the future. The study reveals that identity theft is a growing and evolving problem that requires a multi-faceted and multi-disciplinary approach by law enforcement agencies, businesses, individuals and collaboration between countries. It is advocated that businesses and institutions should take measures to protect personal information better and that individuals should be educated about their rights, and be vigilant and protect their personal information offline and in cyberspace.

  18. Identity Development in Personal Branding Instruction

    Science.gov (United States)

    Brooks, Ann K.; Anumudu, Chinedu

    2016-01-01

    Increased technology, integration of the global economy, and the shift from investing in long-term employees to hiring temporary contract workers have spawned pervasive employment insecurity. This trend has led to a growing industry of career and marketing professionals, who have found a career niche in helping job seekers create personal brands…

  19. Noninvasive Brain Stimulation and Personal Identity: Ethical Considerations.

    Science.gov (United States)

    Iwry, Jonathan; Yaden, David B; Newberg, Andrew B

    2017-01-01

    As noninvasive brain stimulation (NIBS) technology advances, these methods may become increasingly capable of influencing complex networks of mental functioning. We suggest that these might include cognitive and affective processes underlying personality and belief systems, which would raise important questions concerning personal identity and autonomy. We give particular attention to the relationship between personal identity and belief, emphasizing the importance of respecting users' personal values. We posit that research participants and patients should be encouraged to take an active approach to considering the personal implications of altering their own cognition, particularly in cases of neurocognitive "enhancement." We suggest that efforts to encourage careful consideration through the informed consent process would contribute usefully to studies and treatments that use NIBS.

  20. Noninvasive Brain Stimulation and Personal Identity: Ethical Considerations

    Directory of Open Access Journals (Sweden)

    Jonathan Iwry

    2017-06-01

    Full Text Available As noninvasive brain stimulation (NIBS technology advances, these methods may become increasingly capable of influencing complex networks of mental functioning. We suggest that these might include cognitive and affective processes underlying personality and belief systems, which would raise important questions concerning personal identity and autonomy. We give particular attention to the relationship between personal identity and belief, emphasizing the importance of respecting users' personal values. We posit that research participants and patients should be encouraged to take an active approach to considering the personal implications of altering their own cognition, particularly in cases of neurocognitive “enhancement.” We suggest that efforts to encourage careful consideration through the informed consent process would contribute usefully to studies and treatments that use NIBS.

  1. The impact of corporate visual identity on brand personality

    OpenAIRE

    Jabbar, Zeenat

    2014-01-01

    This thesis was submitted for the degree of Doctor of Philosophy and awarded by Brunel University. It is argued that there is a need to extend our understanding and knowledge of the magnitude to which the elements of corporate visual identity (CVI) are perceived as the communicators of brand personality and hence corporate image, by the consumers. This thesis extends the knowledge about corporate visual identity (CVI) factors, particularly, name, logo, and colours, by developing a comprehe...

  2. Head Transplants and Personal Identity: A Philosophical and Literary Survey.

    Science.gov (United States)

    Mori, Giuliano

    2016-04-01

    The criterion of personal identity is clearly called into question by the project to perform a human head transplant. Is identity provided by psychological continuity alone, or does it depend on bodily continuity as well? And how do these different perspectives interface with our notion of mind and mind-body relationship? The reader will be provided with a discussion concerning these problems, together with a philosophical and literary survey about the conception of body-mind relationship from the Greek thought to contemporary philosophy. The analysis will conclude with a discussion concerning the possibility to consider the issue of personal identity from a statistic point of view, which privileges the general perception of identity, so as it has been shaped by the cultural trends of the last four centuries. It could hence be argued that personal identity is not something which can be defined once and for all. On the contrary, the general perception of identity is subject to significant alterations resulting from one's cultural environment. However, the cultural environment itself can be changed by particularly notable events, such as, hypothetically, the successful outcome of a human head transplant. © 2016 John Wiley & Sons Ltd.

  3. THE EFFECT OF MEDIA LITERACY ON THE SOCIAL IDENTITY OF VOLLEYBALL SPECTATORS THROUGH PERSONAL IDENTITY

    OpenAIRE

    Mahsa Nematzadeh

    2017-01-01

    This research aim was investigating the effect of media literacy on volleyball spectator's social identity through personal identity. The present study, psychologically, is divided in to 8 layers of view paradigm, the main type of applied research: deductive research approaches, quantity research strategies theories, field research tone, cross sectional survey methods, research objectives, description and finally data collection methods, library resource reviews, and questionnaires. The stati...

  4. Research Trends and Issues in the Study of Identity of Multi-ethnic Persons

    OpenAIRE

    TABA, Ayumi; TAKAI, Jiro

    2016-01-01

    In this article, concepts of identity are considered and surveyed researches of ego identity and group identity in social identity theory, self-categorization theory. It indicates ethnic identity is related to selfconcept, well-being, academic achievement, mental health, and so on. Furthermore, identity management theory reveals that cross- cultural communication occurs depending on management of cultural identity as group identity and relational identity as personal identity. However, there ...

  5. The Use of Personal Identity Numbers in Sweden and Denmark

    DEFF Research Database (Denmark)

    Hyltén-Cavallius, Katarina

    2015-01-01

    The paper of Katarina Hyltén-Cavallius focuses on personal identity numbers in Sweden and Denmark. This paper looks into formal and informal structures, which organise society in a host member state and which can make it difficult for a non-national Union citizen to, in practice, access public an...

  6. Pedagogic Approach to the Mechanisms of Personality Identity Development

    Science.gov (United States)

    Shakurova, Marina V.

    2016-01-01

    The article addresses the problem of defining and attributing pedagogic essence to the mechanisms of personality identity development. It is based on the general mechanism of social interaction. Its structure contains, on the one hand, pedagogic interaction, including the forms of pedagogic assistance and pedagogic support; on the other hand, it…

  7. The Game as the Way of Personal Identity Development

    Directory of Open Access Journals (Sweden)

    L. A. Belyayeva

    2012-01-01

    Full Text Available  The paper suggests the game interpretation as the universal and phenomenal way of developing personal identity by a relaxed participation in game activity. Unlike the extended definitions of game as a culturalogical and pedagogical phenomenon, the authors suggest the game analysis in philosophical perspective revealing its existential status. Being the active form of personal existence, the game facilitates self-awareness by means of self-understanding and self-determination in the course of game activity developing the attitude of «I am another one», and giving a chance to experiment with personal identity, taking and playing various social and cultural roles. The existential significance of games activating self-understanding and meaning of self-existence is growing nowadays, given pluralism and reassessment of values. 

  8. Biography, identity, improvisation, sound: intersections of personal and social identity through improvisation

    NARCIS (Netherlands)

    Smilde, Rineke

    2016-01-01

    This essay addresses the relationship of improvisation and identity. Biographical research that was conducted by the author into professional musicians’ lifelong learning showed the huge importance of improvisation for personal expression. Musically, the concept of sound appeared to serve as a

  9. Investigation of Personality Disordes and Personality Traits in Men with Gender Identity Disorder

    Directory of Open Access Journals (Sweden)

    Nahid Noorian

    2008-04-01

    Full Text Available Objective: The purpose of this study is to investigation of personality disorders and personality traits in men who have gender identity disorder (GID. Identification of personality disorders can be useful for enhancement of the quality of help to the patients. Materials & Methods: This analytical and cross-sectional study was a comparative and case – control research. 40 men with gender identity disorder were selected by convenient sampling from individuals who have been referred to Tehran Navab Safavi welfare center. Also, 40 available individuals who have no any diagnostic criteria about gender identity disorder in DSM-IV-TR and worked in Islamic Azad University (Tehran Sciences and Researches Unit were selected as control group and matched with patients. Personality disorders and those frequencies were evaluated with Millon Clinical Multiaxial Inventory-II (MCMI-II. Data were analyzed using by Chi-square and Independent T tests. Results: The results showed that gender identity disorder patients get higher scores as compared to control group in scales “Dependent” (P=0/038, “Histrionic” (P<0/001, “Antisocial” (P=0/017, “Passive – aggressive” (P=0/007, “Borderline” (P<0/001 and “Paranoid” (P=0/021 and their difference was significant. Conclusion: Generally, the results of this study showed persons who have gender identity disorder also have some symptoms of personality disorders more than normal people.

  10. Identity processes and personality traits and types in adolescence : Directionality of effects and developmental trajectories

    NARCIS (Netherlands)

    Luyckx, K.; Teppers, E.; Klimstra, T.A.; Rassart, J.

    2014-01-01

    Personality traits are hypothesized to be among the most important factors contributing to individual differences in identity development. However, longitudinal studies linking Big Five personality traits to contemporary identity models (in which multiple exploration and commitment processes are

  11. Multimodal Personal Verification Using Likelihood Ratio for the Match Score Fusion

    Directory of Open Access Journals (Sweden)

    Long Binh Tran

    2017-01-01

    Full Text Available In this paper, the authors present a novel personal verification system based on the likelihood ratio test for fusion of match scores from multiple biometric matchers (face, fingerprint, hand shape, and palm print. In the proposed system, multimodal features are extracted by Zernike Moment (ZM. After matching, the match scores from multiple biometric matchers are fused based on the likelihood ratio test. A finite Gaussian mixture model (GMM is used for estimating the genuine and impostor densities of match scores for personal verification. Our approach is also compared to some different famous approaches such as the support vector machine and the sum rule with min-max. The experimental results have confirmed that the proposed system can achieve excellent identification performance for its higher level in accuracy than different famous approaches and thus can be utilized for more application related to person verification.

  12. Confidence-increasing elements in user instructions: Seniors' reactions to verification steps and personal stories

    NARCIS (Netherlands)

    Loorbach, N.R.; Karreman, Joyce; Steehouder, M.F.

    2013-01-01

    Purpose: Research shows that confidence-increasing elements in user instructions positively influence senior users' task performance and motivation. We added verification steps and personal stories to user instructions for a cell phone, to find out how seniors (between 60 and 70 years) perceive

  13. Personality traits, interpersonal identity, and relationship stability : Longitudinal linkages in late adolescence and young adulthood

    NARCIS (Netherlands)

    Klimstra, T.A.; Luyckx, K.; Branje, S.T.J.; Teppers, E.; Goossens, L.; Meeus, W.H.J.

    2013-01-01

    Adolescence and young adulthood are characterized by important changes in personality, changes toward a more stable identity, and the establishment of intimate relationships. We examined the role of personality traits in establishing intimate relationships, the interplay between personality traits

  14. The relationships of personal and cultural identity to adaptive and maladaptive psychosocial functioning in emerging adults.

    Science.gov (United States)

    Schwartz, Seth J; Zamboanga, Byron L; Weisskirch, Robert S; Wang, Sherry C

    2010-01-01

    The present study examined the extent to which cultural identity would be associated with adaptive and maladaptive psychosocial functioning, both directly and indirectly through a personal identity consolidation. A sample of 773 White, Black, and Hispanic university students completed measures of cultural identity, personal identity consolidation, adaptive psychosocial functioning, internalizing symptoms, and proclivity toward externalizing symptoms. Both heritage and American cultural identity were positively related to adaptive psychosocial functioning; American-culture identity was negatively associated with internalizing symptoms; and heritage-culture identity was negatively related to proclivity toward externalizing symptoms. All of these findings were mediated by personal identity consolidation and were fully consistent across ethnic groups. We discuss implications in terms of broadening the study of identity to include both personal and cultural dimensions of self.

  15. Is identity per se irrelevant? A contrarian view of self-verification effects

    OpenAIRE

    Gregg, Aiden P.

    2008-01-01

    Self-verification theory (SVT) posits that people who hold negative self-views, such as depressive patients, ironically strive to verify that these self-views are correct, by actively seeking out critical feedback or interaction partners who evaluate them unfavorably. Such verification strivings are allegedly directed towards maximizing subjective perceptions of prediction and control. Nonetheless, verification strivings are also alleged to stabilize maladaptive self-perceptions, and thereby ...

  16. Personal dimensions of identity and empirical research in APA journals.

    Science.gov (United States)

    Munley, Patrick H; Anderson, Mary Z; Baines, Tonita C; Borgman, Amy L; Briggs, Denise; Dolan, James P; Koyama, Miki

    2002-11-01

    This study reviewed 402 empirical research papers published during 1999 in 9 American Psychological Association journals from the perspective of the Personal Dimensions of Identity (PDI) model. Descriptions of participants were reviewed to determine whether researchers reported information concerning Dimensions A, B, and C of the PDI model. PDI A and B Dimensions of age, gender, education, and geographic location were reported with the highest frequency: 88.56%, 89.30%, 78.50%, and 73.88%, respectively, whereas race/ethnicity was reported with moderate frequency, 60.70%. The remaining PDI A Dimensions of language, physical disability, sexual orientation, and social class, and the remaining B Dimensions of citizenship status, employment status, income, marital status, military experience, occupation, and religion, were reported in relatively low percentages of studies.

  17. Social Identification in Sports Teams: The Role of Personal, Social, and Collective Identity Motives.

    Science.gov (United States)

    Thomas, William E; Brown, Rupert; Easterbrook, Matthew J; Vignoles, Vivian L; Manzi, Claudia; D'Angelo, Chiara; Holt, Jeremy J

    2017-04-01

    Based on motivated identity construction theory (MICT; Vignoles, 2011), we offer an integrative approach examining the combined roles of six identity motives (self-esteem, distinctiveness, belonging, meaning, continuity, and efficacy) instantiated at three different motivational levels (personal, social, and collective identity) as predictors of group identification. These identity processes were investigated among 369 members of 45 sports teams from England and Italy in a longitudinal study over 6 months with four time points. Multilevel change modeling and cross-lagged analyses showed that satisfaction of four personal identity motives (individuals' personal feelings of self-esteem, distinctiveness, meaning, and efficacy derived from team membership), three social identity motives (individuals' feelings that the team identity carries a sense of belonging, meaning, and continuity), and one collective identity motive (a shared belief in group distinctiveness) significantly predicted group identification. Motivational processes underlying group identification are complex, multilayered, and not reducible to personal needs.

  18. Perspectivism and Intersubjective Criteria for Personal Identity: A Defense of Bernard Williams’ Criterion of Bodily Continuity

    OpenAIRE

    Torriani, Tristan Guillermo

    2010-01-01

    In this article I revisit earlier stages of the discussion of personal identity, before Neo-Lockean psychological continuity views became prevalent. In particular, I am interested in Bernard Williams’ initial proposal of bodily identity as a necessary, although not sufficient, criterion of personal identity. It was at this point that psychological continuity views came to the fore arguing that bodily identity was not necessary because brain transplants were logically possible, even if physica...

  19. ALGORITHM VERIFICATION FOR A TLD PERSONAL DOSIMETRY SYSTEM

    International Nuclear Information System (INIS)

    SHAHEIN, A.; SOLIMAN, H.A.; MAGHRABY, A.

    2008-01-01

    Dose algorithms are used in thermoluminescence personnel dosimetry for the interpretation of the dosimeter response in terms of equivalent dose. In the present study, an automated Harshaw 6600 reader was vigorously tested prior to the use for dose calculation algorithm according to the standard established by the US Department of Energy Laboratory Accreditation Program (DOELAP). Also, manual Harshaw 4500 reader was used along with the ICRU slab phantom and the RANDO phantom in experimentally determining the photon personal doses in terms of deep dose; Hp(10), shallow dose; Hp(0.07), and eye lens dose; Hp(3). Also, a Monte Carlo simulation program (VMC-dc) free code was used to simulate RANDO phantom irradiation process. The accuracy of the automated system lies well within DOELAP tolerance limits in all test categories

  20. [AIT (Adolescent Identity Treatment) - an Integrative Treatment Model for the Treatment of Personality Disorders].

    Science.gov (United States)

    Schlüter-Müller, Susanne

    2017-07-01

    AIT (Adolescent Identity Treatment) - an Integrative Treatment Model for the Treatment of Personality Disorders Personality disorders are patterns of maladaptive personality traits that have an impact on the individual throughout the life span. Borderline Personality Disorder (BPD) is a very severe, but treatable mental disorder. Identity disturbance is seen as the central construct for detecting severe personality pathology - and, most notably, borderline personality disorder - in adults and adolescents. Crises in the development of identity usually resolve into a normal and consolidated identity with flexible and adaptive functioning whereas identity diffusion is viewed as a lack of integration of the concept of the self and significant others. It is seen as the basis for subsequent personality pathology, including that of borderline personality disorder. Although BPD has its onset in adolescence and emerging adulthood the diagnosis is often delayed. In most cases, specific treatment is only offered late in the course of the disorder and to relatively few individuals. Adolescent Identity Treatment (AIT) is a treatment model that focuses on identity pathology as the core characteristic of personality disorders. This model integrates specific techniques for the treatment of adolescent personality pathology on the background of object-relation theories and modified elements of Transference-Focused Psychotherapy. Moreover, psychoeducation, a behavior-oriented homeplan and intensive family work is part of AIT.

  1. Rorschach Assessment of Two Distinctive Personality States of a Person With Dissociative Identity Disorder.

    Science.gov (United States)

    Hartmann, Ellen; Benum, Kirsten

    2017-12-13

    This case study used test data from a patient with Dissociative Identity Disorder (DID; American Psychiatric Association, 2013 ) to illustrate how two main personality states of the patient ("Ann" and "Ben") seemed to function. The Rorschach Performance Assessment System (R-PAS; Meyer, Viglione, Mihura, Erard, & Erdberg, 2011 ) and the Inventory of Interpersonal Problems-Circumplex (IIP-64; Horowitz, Alden, Wiggins, & Pincus, 2000 ), administered to Ann and Ben in separate settings, exposed two diverse R-PAS and IIP-64 profiles. Ann's R-PAS profile suggested an intellectualized style of information processing with few indications of psychological problems. Ben's profile indicated severe perceptual, cognitive, and interpersonal difficulties combined with suspicion and anxiety. Ann's IIP-64 profile suggested minor interpersonal problems, whereas Ben's indicated serious relational difficulties. The findings were discussed in relation to the theory of trauma-related structural dissociation of the personality (van der Hart, Nijenhuis, & Steele, 2006 ), which implies an enduring split in the organization of the personality with more or less separate entities with their own sense of self, perception of the world, and ways of organizing emotional, cognitive, and social functions. The DID personality structure is seen as a defense strategy and as a pathway in the personality development producing serious psychological pain and symptoms.

  2. I and Us: A Longitudinal Study on the Interplay of Personal and Social Identity in Adolescence.

    Science.gov (United States)

    Albarello, Flavia; Crocetti, Elisabetta; Rubini, Monica

    2018-04-01

    The development of personal and social identity is crucial in adolescence. On the one hand, adolescents face the task of forming and consolidating their personal identity in multiple domains, with educational and interpersonal domains particularly salient. On the other hand, they enlarge their social horizon and increasingly define themselves as members of multiple peer groups, such as groups of classmates and friends met outside school. There is however a lack of integrative research on the interplay among and between personal and social identity processes. Hence the purpose of this study was threefold. First, we examined how personal identity processes in the educational and interpersonal domains are associated longitudinally. Second, we investigated to what extent social identifications with classmates and with the group of friends are associated over time. Third, with an original approach we examined the longitudinal interplay between personal and social identity processes, to connect theoretical contributions that have so far proceeded largely in parallel. Participants were 304 adolescents (61.84% female, M age  = 17.49) involved in a three-wave longitudinal study. We found that (a) the ways in which adolescents develop their identity in the educational and interpersonal domains become more closely intertwined over time; (b) identifications with classmates and with the group of friends are interconnected; and (c) personal and social identity processes are associated both concurrently and longitudinally, with most cross-lagged effects showing that social identifications influence personal identity formation and consolidation in the interpersonal identity domain. Theoretical implications are discussed.

  3. Self-Determination and Personal Identity in University Students: The Mediating Role of Future Orientation.

    Science.gov (United States)

    Zhou, Mingming; Kam, Chester Chun Seng

    2018-05-17

    In this study, we sought to extend the research on self-determination, future orientation, and personal identity construction by integrating the theories on self-determination and future orientation to provide a conceptual framework for understanding the relations between personal identity and the following individual characteristics: Hope, optimism, awareness of self, and perceived choice. 191 university students in China responded surveys in hardcopies on an individual basis. Our SEM results revealed that proximal future orientation influenced the mechanisms through which distal psychological traits affected identity construction. Specifically, hope mediated the effects of self-awareness on the participants' personal identity ratings (b = .45, p identity. This study suggested an extended framework through which we could understand how the interaction between future orientation and self-determination can predict personal identity. The findings have significant implications for interventions in educational settings.

  4. Identity Processes and Personality Traits and Types in Adolescence: Directionality of Effects and Developmental Trajectories

    Science.gov (United States)

    Luyckx, Koen; Teppers, Eveline; Klimstra, Theo A.; Rassart, Jessica

    2014-01-01

    Personality traits are hypothesized to be among the most important factors contributing to individual differences in identity development. However, longitudinal studies linking Big Five personality traits to contemporary identity models (in which multiple exploration and commitment processes are distinguished) are largely lacking. To gain more…

  5. Which came first, personality traits or identity processes during early and middle adolescence?

    NARCIS (Netherlands)

    Hatano, Kai; Sugimura, Kazumi; Klimstra, T.A.

    No previous studies examined longitudinal associations between personality facets and identity dimensions in early and middle adolescence. To uncover these relationships; we test the direction of effects of domain-and facet-level personality traits with identity dimensions in early and middle

  6. Associations of identity dimensions with Big Five personality domains and facets

    NARCIS (Netherlands)

    Klimstra, T.A.; Luyckx, K.; Goossens, L.; Teppers, E.; De Fruyt, F.

    2013-01-01

    Personality is among the most important factors contributing to individual differences in identity formation. However, previous studies mainly focused on broad personality domains and neglected more specific facets. In addition, it has only recently been recognized that identity formation is guided

  7. Evaluation of Face Detection Algorithms for the Bank Client Identity Verification

    Directory of Open Access Journals (Sweden)

    Szczodrak Maciej

    2017-06-01

    Full Text Available Results of investigation of face detection algorithms efficiency in the banking client visual verification system are presented. The video recordings were made in real conditions met in three bank operating outlets employing a miniature industrial USB camera. The aim of the experiments was to check the practical usability of the face detection method in the biometric bank client verification system. The main assumption was to provide a simplified as much as possible user interaction with the application. Applied algorithms for face detection are described and achieved results of face detection in the real bank environment conditions are presented. Practical limitations of the application based on encountered problems are discussed.

  8. Daily dynamics of personal identity and self-concept clarity

    NARCIS (Netherlands)

    Schwartz, S.J.; Klimstra, T.A.; Luyckx, K.; Hale, W.W.; Frijns, T.; Oosterwegel, A.; van Lier, P.A.C.; Koot, H.M.; Meeus, W.H.J.

    2011-01-01

    We examined the daily dynamics among self-concept clarity and identity processes, and their effects on distress, among a sample of 580 Dutch adolescents. Participants completed measures of identity, self-concept clarity, anxiety and depression at annual intervals; and daily single-item measures of

  9. Co-occurrence of dissociative identity disorder and borderline personality disorder.

    Science.gov (United States)

    Ross, Colin A; Ferrell, Lynn; Schroeder, Elizabeth

    2014-01-01

    The literature indicates that, among individuals with borderline personality disorder, pathological dissociation correlates with a wide range of impairments and difficulties in psychological function. It also predicts a poorer response to dialectical behavior therapy for borderline personality disorder. We hypothesized that (a) dissociative identity disorder commonly co-occurs with borderline personality disorder and vice versa, and (b) individuals who meet criteria for both disorders have more comorbidity and trauma than individuals who meet criteria for only 1 disorder. We interviewed a sample of inpatients in a hospital trauma program using 3 measures of dissociation. The most symptomatic group was those participants who met criteria for both borderline personality disorder and dissociative identity disorder on the Dissociative Disorders Interview Schedule, followed by those who met criteria for dissociative identity disorder only, then those with borderline personality disorder only, and finally those with neither disorder. Greater attention should be paid to the relationship between borderline personality disorder and dissociative identity disorder.

  10. How is Civic Engagement Related to Personal Identity and Social Identity in Late Adolescents and Emerging Adults? A Person-Oriented Approach.

    Science.gov (United States)

    Lannegrand-Willems, Lyda; Chevrier, Basilie; Perchec, Cyrille; Carrizales, Alexia

    2018-04-01

    Adolescence and emerging adulthood are periods in life when individuals both question and define their place in society and form their identity. Meanwhile, active youth civic engagement represents a challenge for each democracy. The purpose of this study was to analyze the different forms of civic engagement among late adolescents and emerging adults and how they are related to personal identity and social identity, while adopting an integrative perspective through the lens of a person-oriented approach. The participants were 1217 (62.3% female) 16-24 year-old French students (M age  = 19.17; SD age  = 1.83). First, derived from cluster analyses, the findings emphasized diversity in civic engagement, from strong civic participation (in different formal and informal ways) to various forms of passivity. Diversity was also highlighted for personal identity and social identity profiles. Second, a Configural Frequency Analysis revealed a typical pattern associating passivity in civic engagement, personal carefree diffusion and rejection of social identity. Overall, these findings highlight an absence of general youth disaffection and provide a meaningful specific pattern for the understanding of passivity in political and civic matters in late adolescence and emerging adulthood.

  11. Relationship between Consumer Identity and Brand Personality as a Factor of Brand Commitment

    Directory of Open Access Journals (Sweden)

    Antonova N. V.

    2015-12-01

    Full Text Available The article analyzes the relationship between consumer identity and brand personality as a factor of consumer commitment to the brand. We hypothesized that: a there is a link between consumer identity and preferred brand’s personality; b the higher the similarity between the consumer identity and preferred brand’s personality, the higher the brand commitment. The sample included 150 subjects aged 18—25. Methods: the method of J. Aaker was used to study brand personality, and its modification was used to study consumer identity. The questionnaire of J. Brovkina was used to study brand loyalty. Results: high correlations between consumer identity and brand personality were obtained on the scales Ruggedness, Sophistication, Excitement, and high correlations between brand loyalty and deltas of the values of consumer identity and brand personality on the same scales were also discovered. On the scales of Competence and Sincerity the correlations were lower, although important as well. Thus, the hypotheses were confirmed: a it is shown that there is a correlation between consumer identity and brand personality; b the higher this correlation is, the higher is the commitment to the preferred brand.

  12. Assessment of the stability of morphological ECG features and their potential for person verification/identification

    Directory of Open Access Journals (Sweden)

    Matveev Mikhail

    2017-01-01

    Full Text Available This study investigates the potential of a set of ECG morphological features for person verification/identification. The measurements are done over 145 pairs of ECG recordings from healthy subjects, acquired 5 years apart (T1, T2 = T1+5 years. Time, amplitude, area and slope descriptors of the QRS-T pattern are analysed in 4 ECG leads, forming quasi-orthogonal lead system (II&III, V1, V5. The correspondence between feature values in T1 and T2 is verified via factor analysis by principal components extraction method; correlation analysis applied over the measurements in T1 and T2; synthesis of regression equations for prediction of features’ values in T2 based on T1 measurements; and cluster analysis for assessment of the correspondence between measured and predicted feature values. Thus, 11 amplitude descriptors of the QRS complex are highlighted as stable, i.e. keeping their strong correlation (≥0.7 within a certain factor, weak correlation (<0.3 with the features from the remaining factors and presenting high correlation in the two measurement periods that is a sign for their person verification/identification potential. The observed coincidence between feature values measured in T2 and predicted via the designed regression models (r=0.93 suggests about the confidence of person identification via the proposed morphological features.

  13. Impact of Personal Growth Projects on Leadership Identity Development

    Science.gov (United States)

    Odom, Summer F.; Boyd, Barry L.; Williams, Jennifer

    2012-01-01

    Within personal leadership education courses, leadership educators should include experiences which help students develop themselves as leaders. In this article, the authors discuss results from a qualitative research study involving the analysis of Personal Growth Project (PGP) assignments in a personal leadership education collegiate course. The…

  14. Goal-directedness and personal identity as correlates of life outcomes.

    Science.gov (United States)

    Goldman, Barry M; Masterson, Suzanne S; Locke, Edwin A; Groth, Markus; Jensen, David G

    2002-08-01

    Although much research has been conducted on goal setting, researchers have not examined goal-directedness or propensity to set goals as a stable human characteristic in adults. In this study, a survey was developed and distributed to 104 adult participants to assess their goal-directedness, personal identity, and various life outcomes. A theoretical model was developed and tested using structural equation modeling that proposed that both goal-directedness and personal identity should positivcly influence important life outcomes. Analysis showed that goal-directedness and personal identity are positively related to personal well-being, salary, and marital satisfaction. Further, personal identity was positively related to job satisfaction but, contrary to related research, goal-directedness did not predict job satisfaction.

  15. GETTING PERSONAL: ETHICS AND IDENTITY IN GLOBAL HEALTH RESEARCH

    Science.gov (United States)

    Simon, Christian; Mosavel, Maghboeba

    2011-01-01

    ‘Researcher identity’ affects global health research in profound and complex ways. Anthropologists in particular have led the way in portraying the multiple, and sometimes tension-generating, identities that researchers ascribe to themselves, or have ascribed to them, in their places of research. However, the central importance of researcher identity in the ethical conduct of global health research has yet to be fully appreciated. The capacity of researchers to respond effectively to the ethical tensions surrounding their identities is hampered by lack of conceptual clarity, as to the nature and scope of the issues involved. This paper strives to provide some clarification of these ethical tensions by considering researcher identity from the perspective of (1) Guillemin and Heggen’s (2009) key distinction between procedural ethics and ethics in practice, and (2) our own distinction between perceptions of identity that are either symmetrical or asymmetrical, with the potential to shift research relationships toward greater or lesser ethical harmony. Discussion of these concepts is supported with ethnographic examples from relevant literature and from our own (United States (US) Government-funded) research in South Africa. A preliminary set of recommendations is provided in an effort to equip researchers with a greater sense of organization and control over the ethics of researcher identity. The paper concludes that the complex construction of researcher identity needs to be central among the ethical concerns of global health researchers, and that the conceptual tools discussed in the paper are a useful starting point for better organizing and acting on these ethical concerns. PMID:21426482

  16. The Survey of Personal and National Identity on Cell Phone Addicts and Non-Addicts.

    Science.gov (United States)

    Alavi, Seyyed Salman; Ghanizadeh, Maryam; Mohammadi, Mohammad Reza; Mohammadi Kalhory, Soroush; Jannatifard, Fereshteh; Sepahbodi, Ghazal

    2018-01-01

    Objective: Smart phones have rapidly become an integral, and for some, an essential communication device worldwide. The issue of identity has always been a subject of interest among psychologists. The present study was conducted to compare personal and national identity and their subscales between cell phone addicts and non-addicts. Method : In this cross-sectional study, 500 student cell phone users from various universities in Tehran were recruited using stratified sampling. Participants completed cell phone addiction questionnaires including Mobile Phone Problematic Use Scale (MPPUS), Cell Phone Dependency Questionnaire (CPDQ), Personal Identity Development Questionnaire, Extended Objective Measure of Ego Identity Status (EOMEIS) and National Identity Questionnaire. Then, the subscales of these instruments were analyzed using SPSS Version 20. Results: Results of this study revealed significant differences between cell phone addicts and non-addicts in the scores of national identity, personal identity, and most subscales, except for some subscales (Pphone addiction (r=-0.35, -0.33, respectively).On the other hand, after controlling for the confounder variables, we found that national identity had an effect on cell phone addiction(OR=0.05, CI=0.92-0.98). Conclusion: The results of this study indicated that cell phone overuse may be correlated with defects in some aspects of national and personal identity.

  17. Trajectories of Identity Formation Modes and Their Personality Context in Adolescence.

    Science.gov (United States)

    Topolewska-Siedzik, Ewa; Cieciuch, Jan

    2018-04-01

    Identity formation is a dynamic process during adolescence. Trajectories of identity formation were assessed longitudinally in early and middle adolescents, taking into account the personality underpinnings of this process. Identity formation was conceptualized according to the circumplex of identity formation modes. The model distinguishes basic modes rooted in Marcia's categories of exploration and commitment. Plasticity and stability, the two higher order Big Five meta-traits, were used to assess personality underpinnings. This study includes five measurement waves over 1.5 years and involves 1,839 Polish participants; 914 early adolescents (53.9% girls) and 925 middle adolescents (63.8% girls). The results suggest that (1) the four identity formation modes change dynamically, showing linear and curvilinear growth and that (2) identity formation mode trajectories are more dynamic in middle adolescence than in early adolescence. The results also showed that, in the conditional model, (3) the higher-order personality factors and gender affect the growth factors of identity formation modes. Overall, trajectories of identity formation modes are more linear during early adolescence and more curvilinear during middle adolescence. The initial levels in identity trajectories are influenced by the personality metatraits but only plasticity is related to change among early adolescents.

  18. Associations between identity diffusion, Axis II disorder, and psychopathology in inpatients with borderline personality disorder.

    Science.gov (United States)

    Sollberger, Daniel; Gremaud-Heitz, Daniela; Riemenschneider, Anke; Küchenhoff, Joachim; Dammann, Gerhard; Walter, Marc

    2012-01-01

    Patients with borderline personality disorder (BPD) suffer from instability in their relationships, their affectivity, and their identity. However, the associations between these dimensions are not clear. The purpose of the present study was to investigate the relation between identity diffusion and psychopathology in BPD. In the second week of inpatient treatment, 52 patients with BPD were assessed with the Inventory of Personality Organization (IPO) and questionnaires measuring general psychiatric symptoms, mood states, and negative affects (SCL-90-R, BDI, STAI, and STAXI). A median split was examined to differentiate BPD patients with high identity diffusion from those with low identity diffusion. BPD patients with high identity diffusion did not differ in their social data from BPD patients with low identity diffusion. However, BPD patients with high identity diffusion showed significantly higher levels of psychiatric symptoms, as well as higher anxiety, anger, and depression scores (p personality disorders (p identity diffusion with psychopathological symptoms and features of personality disorder and emphasize the clinical significance of identity diffusion for patients with BPD. Copyright © 2011 S. Karger AG, Basel.

  19. Is identity per se irrelevant? A contrarian view of self-verification effects.

    Science.gov (United States)

    Gregg, Aiden P

    2009-01-01

    Self-verification theory (SVT) posits that people who hold negative self-views, such as depressive patients, ironically strive to verify that these self-views are correct, by actively seeking out critical feedback or interaction partners who evaluate them unfavorably. Such verification strivings are allegedly directed towards maximizing subjective perceptions of prediction and control. Nonetheless, verification strivings are also alleged to stabilize maladaptive self-perceptions, and thereby hindering therapeutic recovery. Despite the widespread acceptance of SVT, I contend that the evidence for it is weak and circumstantial. In particular, I contend that that most or all major findings cited in support of SVT can be more economically explained in terms of raison oblige theory (ROT). ROT posits that people with negative self-views solicit critical feedback, not because they want it, but because they their self-view inclines them regard it as probative, a necessary condition for considering it worth obtaining. Relevant findings are reviewed and reinterpreted with an emphasis on depression, and some new empirical data reported. (c) 2008 Wiley-Liss, Inc.

  20. On the Effectiveness of Social Norms Intervention in College Drinking: The Roles of Identity Verification and Peer Influence.

    Science.gov (United States)

    Fitzpatrick, Ben G; Martinez, Jason; Polidan, Elizabeth; Angelis, Ekaterini

    2016-01-01

    The application of social norms theory in the study of college drinking centers on the ideas that incorrect perceptions of drinking norms encourage problematic drinking behavior and that correcting misperceptions can mitigate problems. The design and execution of social norms interventions can be improved with a deeper understanding of causal mechanisms connecting misperception to drinking behavior. We develop an agent-based computational simulation that uses identity control theory and peer influence (PI) to model interactions that affect drinking. Using data from the College Alcohol Survey and Social Norms Marketing Research Project, we inform model parameters for agent drinking identities and perceptions. We simulate social norms campaigns that reach progressively larger fractions of the student population, and we consider the strength of the campaign in terms of changing student perception and resulting behavior. We observe a general reduction in heavy episodic drinking (HED) as students are affected by the intervention. As campaigns reached larger fractions of students, the reduction rate diminishes, in some cases actually making a slight reverse. The way in which students "take the message to heart" can have a significant impact as well: The psychological factors involved in identity control and PI have both positive and negative effects on HED rates. With whom agents associate at drinking events also impacts drinking behavior and intervention effectiveness. Simulations suggest that reducing misperception can reduce HED. When agents adhere strongly to identity verification and when misperceptions affect identity appraisals, social norms campaigns can bring about large reductions. PI, self-monitoring, and socializing with like-drinking peers appear to moderate the effect. Copyright © 2015 by the Research Society on Alcoholism.

  1. Is Personal Identity Evaluative? | Poltera | South African Journal of ...

    African Journals Online (AJOL)

    Martha Nussbaum subscribes to the view that our identity is an evaluative question determined by our common, deeply held beliefs about what is worthwhile in human life. In so doing, she asserts that for an account of ethics to have “philosophical power” it needs to be grounded in an account of human nature that is both ...

  2. Personal identity in college and the work context : Developmental trajectories and psychosocial functioning

    NARCIS (Netherlands)

    Luyckx, K.; Klimstra, T.A.; Schwartz, S.J.; Duriez, B.

    2013-01-01

    Personal identity formation represents a core developmental challenge for adolescents and young adults. Because much of the identity literature focuses on college students, it is necessary to conduct a detailed inquiry into the ways in which specific commitment and exploration processes develop over

  3. Secondary Uses of Personal Identity Information: Policies, Technologies and Regulatory Framework

    DEFF Research Database (Denmark)

    Adjei, Joseph K.; Olesen, Henning

    2012-01-01

    Although personal identity information must primarily be used for protecting and promoting the physical needs of individuals, it has also become central to the business models of the digital age due to its use for other secondary purposes, resulting in various innovative identity management (Id...

  4. Personal identity processes from adolescence through the late 20s : Age trends, functionality, and depressive symptoms

    NARCIS (Netherlands)

    Luyckx, K.; Klimstra, T.A.; Duriez, B.; van Petegem, S.; Beyers, W.

    2013-01-01

    Personal identity formation constitutes a crucial developmental task during the teens and 20s. Using a recently developed five-dimensional identity model, this cross-sectional study (N = 5834) investigated age trends from ages 14 to 30 for different commitment and exploration processes. As expected,

  5. Personal identity processes and self-esteem : Temporal sequences in high school and college students

    NARCIS (Netherlands)

    Luyckx, K.; Klimstra, T.A.; Duriez, B.; Van Petegem, S.; Beyers, W.; Teppers, E.; Goossens, L.

    2013-01-01

    Personal identity formation constitutes a crucial developmental task during the teens and 20s. Using a recently developed five-dimensional identity model, this cross-sectional study (N = 5834) investigated age trends from ages 14 to 30 for different commitment and exploration processes. As expected,

  6. Why do identical twins differ in personality: shared environment reconsidered.

    Science.gov (United States)

    Torgersen, Anne Mari; Janson, Harald

    2002-02-01

    While heritability studies show that most of the variance in adult personality can be attributed to genetic or so-called nonshared environmental influence, this does not mean that shared events lack importance for the development of later personality differences. We studied the relationship between Big Five personality differences in monozygotic (MZ) twins at age 29, and life stressors at age 6 to 15, using prospective data from 26 MZ pairs studied from birth onwards. A positive significant correlation was found between stressors in childhood and early adolescence, and intrapair personality differences in Agreeableness, Openness, Conscientiousness, and five-factor profiles. We note that the effects of shared events are labeled "nonshared" environment when the effect is to make siblings more different. Case examples illustrate the relationship between stress and personality differences, and provide hypotheses for further studies in larger samples.

  7. 'Person' seeks 'Man'. A very quick immersion in, and evaluation of, the philosophical debate on personal identity since Locke

    OpenAIRE

    De Vleeschouwer, Gregory

    2009-01-01

    Traditionally, the question of how a person can be a unity throughout his life was answered by referring to the objective realm: the cartesian soul guaranteed our personal unity. But for Locke, the soul was considered irrelevant to the real question of personal identity, which was: how can I know that I am the same person throughout my life? For Locke that question was not answerable from an objective point of view, but only by a 'person', which for Locke meant as much as 'consciousness' or t...

  8. E-Visas Verification Schemes Based on Public-Key Infrastructure and Identity Based Encryption

    OpenAIRE

    Najlaa A. Abuadhmah; Muawya Naser; Azman Samsudin

    2010-01-01

    Problem statement: Visa is a very important travelling document, which is an essential need at the point of entry of any country we are visiting. However an important document such as visa is still handled manually which affects the accuracy and efficiency of processing the visa. Work on e-visa is almost unexplored. Approach: This study provided a detailed description of a newly proposed e-visa verification system prototyped based on RFID technology. The core technology of the proposed e-visa...

  9. Optimal Experience and Personal Growth: Flow and the Consolidation of Place Identity.

    Science.gov (United States)

    Bonaiuto, Marino; Mao, Yanhui; Roberts, Scott; Psalti, Anastasia; Ariccio, Silvia; Ganucci Cancellieri, Uberta; Csikszentmihalyi, Mihaly

    2016-01-01

    This study examined the relationship between flow experience and place identity, based on eudaimonistic identity theory (EIT) which prioritizes self-defining activities as important for an individual's identification of his/her goals, values, beliefs, and interests corresponding to one's own identity development or enhancement. This study focuses on place identity, the identity's features relating to a person's relation with her/his place. The study is also based on flow theory, according to which some salient features of an activity experience are important for happiness and well-being. Questionnaire surveys on Italian and Greek residents focused on their perceived flow and place identity in relation to their own specific local place experiences. The overall findings revealed that flow experience occurring in one's own preferred place is widely reported as resulting from a range of self-defining activities, irrespective of gender or age, and it is positively and significantly associated with one's own place identity. Such findings provide the first quantitative evidence about the link between flow experienced during meaningfully located self-defining activities and identity experienced at the place level, similarly to the corresponding personal and social levels that had been previously already empirically tested. Results are also discussed in terms of their implications for EIT's understanding and enrichment, especially by its generalization from the traditional, personal identity level up to that of place identity. More generally, this study has implications for maintaining or enhancing one's own place identity, and therefore people-place relations, by means of facilitating a person's flow experience within psychologically meaningful places.

  10. Being Riveted to Oneself: Shame and Personal Identity

    OpenAIRE

    Montes Sánchez, Alba

    2011-01-01

    II Workshop on Identity, Memory and Experience. Getafe (Spain), March 1-4th, 2011 In Shame and Necessity, his brilliant book on the ethics of the Ancient Greeks, Bernard Williams performed a detailed and intriguing analysis of an emotion that, up to then, had been given little merit in connection to morality. Arguing with his former professor, E.R. Dodds, and picking up on a distinction between "shame cultures" and "guilt cultures" drawn by American anthropologist Ruth Benedict, William...

  11. Person-first and identity-first language: Developing psychologists' cultural competence using disability language.

    Science.gov (United States)

    Dunn, Dana S; Andrews, Erin E

    2015-04-01

    The American Psychological Association (APA) advocates the use of person-first language (e.g., people with disabilities) to refer to individuals with disabilities in daily discourse and to reduce bias in psychological writing. Disability culture advocates and disability studies scholars have challenged the rationale for and implications of exclusive person-first language use, promoting use of identity-first language (e.g., disabled people). We argue that psychologists should adopt identity-first language alongside person-first constructions to address the concerns of disability groups while promoting human dignity and maintaining scientific and professional rigor. We review the evolution of disability language and then discuss the major models used to characterize disability and people with disabilities. The rationale for person-first language and the emergence of identity-first language, respectively, are linked to particular models. We then discuss some language challenges posed by identity-first language and the current intent of person-first language, suggesting that psychologists make judicious use of the former when it is possible to do so. We conclude by offering five observations of ways that use of both person-first and identity-first language could enhance psychologists' cultural competence regarding disability issues in personal and scientific communications. (c) 2015 APA, all rights reserved).

  12. Pragmatics of the Development of Personal Identity in Adolescents in the Latin American Context.

    Science.gov (United States)

    Tapia, Javier; Rojas, Adrián; Picado, Karol

    2017-03-01

    The present work proposes a pragmatic perspective of the development of personal identity. Such perspective is based on a unifying vision that incorporates the contribution of communicative pragmatics and becomes aware of the contribution of semiotics to psychology, without leaving aside the eriksonian point of view and other significant contributions in the field. The article defines identity in adolescence from a development approach, and adopts a systemic perspective concerning the insertion of adolescents in their context of formation as individuals. It then proposes a way to understand identity from a pragmatic-communicative perspective. Finally, it introduces two communicative use contexts from which personal identity can emerge, showing the importance of communication and language in the formation and development of identity.

  13. Personal and social facets of job identity : A person-centered approach

    NARCIS (Netherlands)

    Crocetti, E.; Avanzi, L.; Hawk, S.T.; Fraccaroli, F.; Meeus, W.H.J.

    2014-01-01

    Purpose The purpose of this study was to examine ego-identity (Erikson, Psychol Issues 1:1–171, 1959; Identity, youth and crisis, Norton, New York, 1968; Marcia, J Pers Soc Psychol 3:551–558, 1966) and social identity (Tajfel and Turner, In: Austin WG, Worchel S (Eds.) The social psychology of

  14. Features of the differential diagnosis of persons with gender identity disorders

    Directory of Open Access Journals (Sweden)

    Z.D. Novikova

    2013-10-01

    Full Text Available We presented a study of the features of gender identity in people undergoing gender, psychological and psychiatric examination to address the issue of gender reassignment. We analyze the specifics of gender identity, levels of masculinity and femininity, the similarities and differentiation within four nosological groups, which include persons with gender identity disorders (GID with transsexualism, personality disorders, diseases of the schizophrenia spectrum, and with organic mental disorders. We address the question of the differential diagnosis in the process of psychological screening of people with transsexualism and other types of GID. The analytical description of the four algorithms and their comparison are psychologically specific, qualitative research, almost impossible using statistical method of data processing. The data presented may be useful to specialists involved in the study of persons with gender identity disorders

  15. Implementation of an RBF neural network on embedded systems: real-time face tracking and identity verification.

    Science.gov (United States)

    Yang, Fan; Paindavoine, M

    2003-01-01

    This paper describes a real time vision system that allows us to localize faces in video sequences and verify their identity. These processes are image processing techniques based on the radial basis function (RBF) neural network approach. The robustness of this system has been evaluated quantitatively on eight video sequences. We have adapted our model for an application of face recognition using the Olivetti Research Laboratory (ORL), Cambridge, UK, database so as to compare the performance against other systems. We also describe three hardware implementations of our model on embedded systems based on the field programmable gate array (FPGA), zero instruction set computer (ZISC) chips, and digital signal processor (DSP) TMS320C62, respectively. We analyze the algorithm complexity and present results of hardware implementations in terms of the resources used and processing speed. The success rates of face tracking and identity verification are 92% (FPGA), 85% (ZISC), and 98.2% (DSP), respectively. For the three embedded systems, the processing speeds for images size of 288 /spl times/ 352 are 14 images/s, 25 images/s, and 4.8 images/s, respectively.

  16. Personality Traits and Educational Identity Formation in Late Adolescents: Longitudinal Associations and Academic Progress

    Science.gov (United States)

    Klimstra, Theo A.; Luyckx, Koen; Germeijs, Veerle; Meeus, Wim H. J.; Goossens, Luc

    2012-01-01

    Changes in personality traits in late adolescence and young adulthood are believed to co-occur with changes in identity, but little research is available that supports this hypothesis. The present study addressed this relatively understudied area of research by examining longitudinal associations of Big Five personality traits (i.e., Neuroticism,…

  17. Big Five Personality Traits as the Predictors of Creative Self-Efficacy and Creative Personal Identity: Does Gender Matter?

    Science.gov (United States)

    Karwowski, Maciej; Lebuda, Izabela; Wisniewska, Ewa; Gralewski, Jacek

    2013-01-01

    The aim of this study was to examine the relation of the Big Five personality factors to two self-concept variables of growing importance in creativity literature: creative self-efficacy (CSE) and creative personal identity (CPI). The analysis, conducted on a large (N = 2674, 49.6% women) and varied-in-age (15-59 years old) nationwide sample of…

  18. Owning Up to Negative Ingroup Traits: How Personal Autonomy Promotes the Integration of Group Identity.

    Science.gov (United States)

    Legault, Lisa; Weinstein, Netta; Mitchell, Jahlil; Inzlicht, Michael; Pyke, Kristen; Upal, Afzal

    2017-10-01

    Our experiences, attributes, and behaviors are diverse, inconsistent, and often negative. Consequently, our capacity to assimilate divergent experiences-particularly negative aspects-is important to the development of a unified self. Whereas this process of integration has received attention at the level of personal identity, it has not been assessed at the level of group identity. We examined the mechanisms involved in integrating positive and negative ingroup identities, as well as related outcomes. In three experiments, participants (N = 332) high and low in autonomy identified either positive or negative aspects of their ingroup and then indicated the extent to which they integrated the attribute. Those high in personal autonomy integrated both positive and negative identities, whereas those low in autonomy acknowledged only positive identities. Study 2 showed that, regardless of identity valence, those high in autonomy felt satisfied and close with their group. Conversely, those low in autonomy felt less close and more dissatisfied with their group after reflecting on negative identities. Finally, reflecting on a negative identity reduced prejudice, but only for those high in autonomy. Owning up to negative group traits is facilitated by autonomy and demonstrates benefits for ingroup and intergroup processes. © 2016 Wiley Periodicals, Inc.

  19. Not looking yourself: The cost of self-selecting photographs for identity verification.

    Science.gov (United States)

    White, David; Burton, Amy L; Kemp, Richard I

    2016-05-01

    Photo-identification is based on the premise that photographs are representative of facial appearance. However, previous studies show that ratings of likeness vary across different photographs of the same face, suggesting that some images capture identity better than others. Two experiments were designed to examine the relationship between likeness judgments and face matching accuracy. In Experiment 1, we compared unfamiliar face matching accuracy for self-selected and other-selected high-likeness images. Surprisingly, images selected by previously unfamiliar viewers - after very limited exposure to a target face - were more accurately matched than self-selected images chosen by the target identity themselves. Results also revealed extremely low inter-rater agreement in ratings of likeness across participants, suggesting that perceptions of image resemblance are inherently unstable. In Experiment 2, we test whether the cost of self-selection can be explained by this general disagreement in likeness judgments between individual raters. We find that averaging across rankings by multiple raters produces image selections that provide superior identification accuracy. However, benefit of other-selection persisted for single raters, suggesting that inaccurate representations of self interfere with our ability to judge which images faithfully represent our current appearance. © 2015 The British Psychological Society.

  20. Verification steps and personal stories in an instruction manual for seniors: Effects on confidence, motivation, and usability

    NARCIS (Netherlands)

    Loorbach, N.R.; Karreman, Joyce; Steehouder, M.F.

    2013-01-01

    Research problem: The purpose of this study was to investigate the effects of two types of motivational elements—verification steps and personal stories—in an instruction manual for a cell phone targeted at senior users (between 60 and 70 years). Research questions: What are the effects of adding

  1. Assessing cultural intelligence, personality and identity amongst young white Afrikaans-speaking students: A preliminary study

    Directory of Open Access Journals (Sweden)

    Natasha Nel

    2015-04-01

    Research purpose: The objective of this research is to determine the relationship between personality, identity and CQ amongst young Afrikaans-speaking South Africans. Research approach, design and method: A quantitative research design was used in this study. This study was cross-sectional in nature. For the purpose of this study, a sample of young South African university students (N = 252 was used. The personal identity subscale from the Erickson Psychosocial Stage Inventory, the Multi-Ethnic Identity Measure, the Religious Identity Short Scale, the South African Personality Inventory questionnaire and the Four Factor Model of Cultural Intelligence Scale were applied as the measuring instruments. Main findings: Religious identity and ethnic identity have a relationship with cognitive CQ. Soft-heartedness and conscientiousness have a relationship with behavioural CQ. Also, soft-heartedness, facilitating, extroversion and religious identity have a relationship with motivational CQ. Practical/managerial implications: Organisations within South Africa will gain a better understanding of CQ and the benefits of having a culturally intelligent workforce as a strengths-based approach. Culturally intelligent employees will be able to adjust to working with co-workers from another culture, not feel threatened when interacting with co-workers and clients and be able to transfer knowledge from one culture to another, which will aid the organisation in completing overseas assignments, cross-cultural decision-making, leadership in multicultural environments and managing international careers. Contribution/value-add: CQ is a relatively new concept and empirical research on positive subjects is still very limited. Research on personality, identity and CQ within the South African context is still very limited. Therefore, this study will contribute to literature on positive psychology and cultural intelligence.

  2. The Personal and Professional Selves of Teachers: Stable and Unstable Identities

    OpenAIRE

    Day, C.; Kington, Alison; Stobart, G.; Sammons, P.

    2006-01-01

    In much educational literature it is recognised that the broader social conditions in which teachers live and work, and the personal and professional elements of teachers' lives, experiences, beliefs and practices are integral to one another, and that there are often tensions between these which impact to a greater or lesser extent upon teachers' sense of self or identity. If identity is a key influencing factor on teachers' sense of purpose, self‐efficacy, motivation, commitment, job satisfa...

  3. Perspectivism and Intersubjective Criteria for Personal Identity: A Defense of Bernard Williams’ Criterion of Bodily Continuity

    Directory of Open Access Journals (Sweden)

    Tristan Guillermo Torriani

    2008-06-01

    Full Text Available In this article I revisit earlier stages of the discussion of personal identity, before Neo-Lockean psychological continuity views became prevalent. In particular, I am interested in Bernard Williams’ initial proposal of bodily identity as a necessary, although not sufficient, criterion of personal identity. It was at this point that psychological continuity views came to the fore arguing that bodily identity was not necessary because brain transplants were logically possible, even if physically impossible. Further proposals by Shoemaker of causal relations between mental states in our memory and Parfit’s discussion of branching causal chains created additional complications. My contention in this paper is that psychological continuity views deflected our attention from what should have remained in the spotlight all the time: the intersubjective character (or not of criteria proposed to decide personal identity in our language game, and ultimately our form of life concerning ourselves as persons. B. Williams’ emphasis on the body was not just common sense. It was also recognition of the importance of giving priority to criteria that could be kept under intersubjective control.

  4. Perspectivism and Intersubjective Criteria for Personal Identity: A Defense of Bernard Williams’ Criterion of Bodily Continuity

    Directory of Open Access Journals (Sweden)

    Tristan Guillermo Torriani

    2010-09-01

    Full Text Available In this article I revisit earlier stages of the discussion of personal identity, before Neo-Lockean psychological continuity views became prevalent. In particular, I am interested in Bernard Williams’ initial proposal of bodily identity as a necessary, although not sufficient, criterion of personal identity. It was at this point that psychological continuity views came to the fore arguing that bodily identity was not necessary because brain transplants were logically possible, even if physically impossible. Further proposals by Shoemaker of causal relations between mental states in our memory and Parfit’s discussion of branching causal chains created additional complications. My contention in this paper is that psychological continuity views deflected our attention from what should have remained in the spotlight all the time: the intersubjective character (or not of criteria proposed to decide personal identity in our language game, and ultimately our form of life concerning ourselves as persons. B. Williams’ emphasis on the body was not just common sense. It was also recognition of the importance of giving priority to criteria that could be kept under intersubjective control.

  5. Optimal Experience and Personal Growth: Flow and the Consolidation of Place Identity

    Science.gov (United States)

    Bonaiuto, Marino; Mao, Yanhui; Roberts, Scott; Psalti, Anastasia; Ariccio, Silvia; Ganucci Cancellieri, Uberta; Csikszentmihalyi, Mihaly

    2016-01-01

    This study examined the relationship between flow experience and place identity, based on eudaimonistic identity theory (EIT) which prioritizes self-defining activities as important for an individual’s identification of his/her goals, values, beliefs, and interests corresponding to one’s own identity development or enhancement. This study focuses on place identity, the identity’s features relating to a person’s relation with her/his place. The study is also based on flow theory, according to which some salient features of an activity experience are important for happiness and well-being. Questionnaire surveys on Italian and Greek residents focused on their perceived flow and place identity in relation to their own specific local place experiences. The overall findings revealed that flow experience occurring in one’s own preferred place is widely reported as resulting from a range of self-defining activities, irrespective of gender or age, and it is positively and significantly associated with one’s own place identity. Such findings provide the first quantitative evidence about the link between flow experienced during meaningfully located self-defining activities and identity experienced at the place level, similarly to the corresponding personal and social levels that had been previously already empirically tested. Results are also discussed in terms of their implications for EIT’s understanding and enrichment, especially by its generalization from the traditional, personal identity level up to that of place identity. More generally, this study has implications for maintaining or enhancing one’s own place identity, and therefore people–place relations, by means of facilitating a person’s flow experience within psychologically meaningful places. PMID:27872600

  6. PCR tools for the verification of the specific identity of ascaridoid nematodes from dogs and cats.

    Science.gov (United States)

    Li, M W; Lin, R Q; Chen, H H; Sani, R A; Song, H Q; Zhu, X Q

    2007-01-01

    Based on the sequences of the internal transcribed spacers (ITS-1 and ITS-2) of nuclear ribosomal DNA (rDNA) of Toxocara canis, Toxocara cati, Toxocara malaysiensis and Toxascaris leonina, specific forward primers were designed in the ITS-1 or ITS-2 for each of the four ascaridoid species of dogs and cats. These primers were used individually together with a conserved primer in the large subunit of rDNA to amplify partial ITS-1 and/or ITS-2 of rDNA from 107 DNA samples from ascaridoids from dogs and cats in China, Australia, Malaysia, England and the Netherlands. This approach allowed their specific identification, with no amplicons being amplified from heterogeneous DNA samples, and sequencing confirmed the identity of the sequences amplified. The minimum amounts of DNA detectable using the PCR assays were 0.13-0.54ng. These PCR assays should provide useful tools for the diagnosis and molecular epidemiological investigations of toxocariasis in humans and animals.

  7. Identity uncertainty and commitment making across adolescence : Five-year within-person associations using daily identity reports

    NARCIS (Netherlands)

    Becht, Andrik I.; Nelemans, Stefanie A.; Branje, Susan J. T.; Vollebergh, Wilma A. M.; Koot, Hans M.; Meeus, W.H.J.

    2017-01-01

    A central assumption of identity theory is that adolescents reconsider current identity commitments and explore identity alternatives before they make new commitments in various identity domains (Erikson, 1968; Marcia, 1966). Yet, little empirical evidence is available on how commitment and

  8. Sex-typed personality traits and gender identity as predictors of young adults' career interests.

    Science.gov (United States)

    Dinella, Lisa M; Fulcher, Megan; Weisgram, Erica S

    2014-04-01

    Gender segregation of careers is still prominent in the U.S. workforce. The current study was designed to investigate the role of sex-typed personality traits and gender identity in predicting emerging adults' interests in sex-typed careers. Participants included 586 university students (185 males, 401 females). Participants reported their sex-typed personality traits (masculine and feminine traits), gender identities (gender typicality, contentment, felt pressure to conform, and intergroup bias), and interests in sex-typed careers. Results indicated both sex-typed personality traits and gender identity were important predictors of young adults' career interests, but in varying degrees and differentially for men and women. Men's sex-typed personality traits and gender typicality were predictive of their masculine career interests even more so when the interaction of their masculine traits and gender typicality were considered. When gender typicality and sex-typed personality traits were considered simultaneously, gender typicality was negatively related to men's feminine career interests and gender typicality was the only significant predictor of men's feminine career interests. For women, sex-typed personality traits and gender typicality were predictive of their sex-typed career interests. The level of pressure they felt to conform to their gender also positively predicted interest in feminine careers. The interaction of sex-typed personality traits and gender typicality did not predict women's career interests more than when these variables were considered as main effects. Results of the multidimensional assessment of gender identity confirmed that various dimensions of gender identity played different roles in predicting career interests and gender typicality was the strongest predictor of career interests.

  9. Biometric Subject Verification Based on Electrocardiographic Signals

    Science.gov (United States)

    Dusan, Sorin V. (Inventor); Jorgensen, Charles C. (Inventor)

    2014-01-01

    A method of authenticating or declining to authenticate an asserted identity of a candidate-person. In an enrollment phase, a reference PQRST heart action graph is provided or constructed from information obtained from a plurality of graphs that resemble each other for a known reference person, using a first graph comparison metric. In a verification phase, a candidate-person asserts his/her identity and presents a plurality of his/her heart cycle graphs. If a sufficient number of the candidate-person's measured graphs resemble each other, a representative composite graph is constructed from the candidate-person's graphs and is compared with a composite reference graph, for the person whose identity is asserted, using a second graph comparison metric. When the second metric value lies in a selected range, the candidate-person's assertion of identity is accepted.

  10. Change in Identity Diffusion and Psychopathology in a Specialized Inpatient Treatment for Borderline Personality Disorder.

    Science.gov (United States)

    Sollberger, Daniel; Gremaud-Heitz, Daniela; Riemenschneider, Anke; Agarwalla, Puspa; Benecke, Cord; Schwald, Oliver; Küchenhoff, Joachim; Walter, Marc; Dammann, Gerhard

    2015-01-01

    Patients with borderline personality disorder (BPD) show various psychopathological symptoms and suffer especially from disturbance in their identity. The purpose of the study was to investigate changes-particularly in affective BPD symptoms and identity diffusion-during a structured, disorder-specific inpatient treatment (DST) that combined a psychodynamic transference-focused psychotherapy approach with modules of dialectical behavioural skills training. In a prospective, two-group comparison trial, 44 patients with BPD were assessed with questionnaires addressing identity diffusion and state, as well as trait affective psychopathology, before and after 12 weeks of inpatient treatment. Thirty-two patients received DST, whereas 12 patients were given inpatient treatment-as-usual (TAU). The patients were allocated in a non-random procedure for two groups, in order of admission and availability of treatment options in the DST unit. In the pre-post-comparison, the DST group showed a significant decrease in identity diffusion (p borderline symptomatology and in the personality structure feature of identity diffusion. This highlights the significance of a short-term specific inpatient therapy for BPD. A structured, disorder-specific inpatient treatment of patients diagnosed with borderline personality disorder (BPD) combined a psychodynamic transference-focused psychotherapy treatment approach (focusing on pathological features in personality organization, particularly on non-integrated images of self and others) with modules of dialectical behavioural skills training. This treatment is associated with a decrease in identity diffusion of these patients after 12 weeks of treatment. The treatment is also related to a significant decrease in borderline typical psychopathological symptoms such as depressive symptoms, as well as an improvement in state anger. The outcomes of this structured, disorder-specific inpatient treatment of severely ill BPD patients indicated

  11. Relationships between Personal and Collective Place Identity and Well-Being in Mountain Communities

    OpenAIRE

    Knez, Igor; Eliasson, Ingegärd

    2017-01-01

    The aim was to investigate the relationships between landscape-related personal and collective identity and well-being of residents living in a Swedish mountain county (N = 850). It was shown that their most valued mountain activities were viewing and experiencing nature and landscape, outdoor recreation, rest and leisure, and socializing with friends/family. Qualitative analyses showed that the most valued aspects of the sites were landscape and outdoor restoration for personal favorite site...

  12. Contribution of past and future self-defining event networks to personal identity.

    Science.gov (United States)

    Demblon, Julie; D'Argembeau, Arnaud

    2017-05-01

    Personal identity is nourished by memories of significant past experiences and by the imagination of meaningful events that one anticipates to happen in the future. The organisation of such self-defining memories and prospective thoughts in the cognitive system has received little empirical attention, however. In the present study, our aims were to investigate to what extent self-defining memories and future projections are organised in networks of related events, and to determine the nature of the connections linking these events. Our results reveal the existence of self-defining event networks, composed of both memories and future events of similar centrality for identity and characterised by similar identity motives. These self-defining networks expressed a strong internal coherence and frequently organised events in meaningful themes and sequences (i.e., event clusters). Finally, we found that the satisfaction of identity motives in represented events and the presence of clustering across events both contributed to increase in the perceived centrality of events for the sense of identity. Overall, these findings suggest that personal identity is not only nourished by representations of significant past and future events, but also depends on the formation of coherent networks of related events that provide an overarching meaning to specific life experiences.

  13. Relationships between Personal and Collective Place Identity and Well-Being in Mountain Communities.

    Science.gov (United States)

    Knez, Igor; Eliasson, Ingegärd

    2017-01-01

    The aim was to investigate the relationships between landscape-related personal and collective identity and well-being of residents living in a Swedish mountain county ( N = 850). It was shown that their most valued mountain activities were viewing and experiencing nature and landscape, outdoor recreation, rest and leisure, and socializing with friends/family. Qualitative analyses showed that the most valued aspects of the sites were landscape and outdoor restoration for personal favorite sites, and tourism and alpine for collective favorite sites. According to quantitative analyses the stronger the attachment/closeness/belonging (emotional component of place identity) residents felt to favorite personal and collective sites the more well-being they perceived when visiting these places. Similarly, the more remembrance, thinking and mental travel (cognitive component of place identity) residents directed to these sites the more well-being they perceived in these places. In both types of sites well-being was more strongly predicted by emotional than cognitive component of place-identity. All this indicates the importance of person-place bonds in beneficial experiences of the outdoors, over and above simply being in outdoor environments.

  14. Involved and Focused? Students' Perceptions of Institutional Identity, Personal Goal Orientation and Levels of Campus Engagement

    Science.gov (United States)

    Ferrari, Joseph R.; McCarthy, Brendan J.; Milner, Lauren A.

    2009-01-01

    The present study explores the relationship between students' perception of their institution's mission identity, personal goal orientation tendencies, and the extent to which they engage in mission-driven activities. Goal orientation research categorizes student motivations in three ways: mastery orientation (MO), performance-approach (PAp)…

  15. Unpacking Personal Identities for Teaching Mathematics within the Context of Prospective Teacher Education

    Science.gov (United States)

    Hodges, Thomas E.; Hodge, Lynn Liao

    2017-01-01

    This article explores the personal identities of two prospective elementary teachers as they progressed from mathematics methods coursework into their capstone student teaching semester. Results indicate that both prospective teachers perceived contrasting obligations of effective mathematics teaching in the teacher education and student teaching…

  16. Longitudinal Relations between Personality Traits and Aspects of Identity Formation during Adolescence

    Science.gov (United States)

    Hill, Patrick L.; Allemand, Mathias; Grob, Sabine Zehnder; Peng, Aristide; Morgenthaler, Christoph; Kappler, Christoph

    2013-01-01

    The current study focused on three aspects of identity development relevant to the adolescent years: being an authentic person, perceiving control over and consistency in one's environment, and having consistent expectations from close others. In a two-wave study of adolescents (n = 750), we examined how these aspects change over the course of a…

  17. Ethnic Identity and Personal Well-Being of People of Color: A Meta-Analysis

    Science.gov (United States)

    Smith, Timothy B.; Silva, Lynda

    2011-01-01

    This article summarizes research examining the relationship between the constructs of ethnic identity and personal well-being among people of color in North America. Data from 184 studies analyzed with random effects models yielded an omnibus effect size of r = 0.17, suggesting a modest relationship between the 2 constructs. The relationship was…

  18. 17 CFR 229.1003 - (Item 1003) Identity and background of filing person.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false (Item 1003) Identity and background of filing person. 229.1003 Section 229.1003 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD INSTRUCTIONS FOR FILING FORMS UNDER SECURITIES ACT OF 1933, SECURITIES EXCHANGE ACT OF 1934 AND ENERGY POLICY AND...

  19. "Irreplaceable": Exploring Identity and Relationships through the Discussion of Invaluable Personal Objects

    Science.gov (United States)

    Scharp, Kristina M.; Canfield, Clair

    2017-01-01

    Courses: Interpersonal Communication, Family Communication, Relational Communication. Objectives: Students reflect on and discuss how personal objects are connected to their identity and relationships with others. This activity illustrates the ways course concepts such as relational metaphors, stories, rules, rituals, and other patterns of…

  20. Self and identity in borderline personality disorder: Agency and mental time travel.

    Science.gov (United States)

    Gold, Natalie; Kyratsous, Michalis

    2017-10-01

    We consider how conceptions of the self and identity from the philosophical literature can help us to understand identity disturbance in borderline personality disorder (BPD). We present 3 philosophical approaches: connectedness, narrative, and agency. We show how these map on to 3 different ways in which the self can be temporally extended. The connectedness approach is dominant in philosophy, and the narrative approach has been used by psychiatry, but we argue that the lesser-known agency approach provides a promising way to theorize some aspects of identity disturbance in BPD. It relates the 2 diagnostic criteria of identity disturbance and disinhibition and is consistent with evidence of memory deficits and altered self-processing in BPD patients. © 2017 The Authors. Journal of Evaluation in Clinical Practice Published by John Wiley & Sons Ltd.

  1. Self and identity in women with symptoms of borderline personality: A qualitative study

    Directory of Open Access Journals (Sweden)

    Gillian Agnew

    2016-03-01

    Full Text Available Identity disturbance has been suggested to be a core feature of borderline personality disorder (BPD. However, there is little known about the identity of individuals with symptoms of BPD from the participant's perspective. This study availed of in-depth lightly structured life story interviews with five female participants. Thematic analysis was utilized to derive three themes of identity: connection, distance between us, and hurt and healing. Results provided support for multiple and flexible conceptualizations of identity in comparison to the idea of a unitary self/identity. Results also suggested that participants were able to establish differing connections to others ranging from disconnection to intimacy and care. Participants reported that their identities were impacted upon by historical and current family/relationship dysfunction, but life stories also illustrated the positive impact of healing relationship experiences. Findings provide support for psychological theories that consider a multiple and relational self/identity and the empowerment of healthy aspects of the self in BPD recovery. Studies that assess the association between insight and change may further our knowledge into this complex population.

  2. Awareness of identity alteration and diagnostic preference between borderline personality disorder and dissociative disorders.

    Science.gov (United States)

    Sar, Vedat; Alioğlu, Firdevs; Akyuz, Gamze; Tayakısı, Emre; Öğülmüş, Ezgi F; Sönmez, Doğuş

    2017-01-01

    This study inquires into identity alteration among college students and its relationship to borderline personality disorder (BPD) and/or dissociative disorders (DDs). Steinberg Identity Alteration Questionnaire (SIAQ), Childhood Trauma Questionnaire (CTQ), and self-report screening tool of the BPD section of the Structured Clinical Interview for DSM-IV (SCID-BPD) were administered to 1301 college students. Participants who fit the diagnostic criteria of BPD (n = 80) according to the clinician-administered SCID-BPD and 111 non-BPD controls were evaluated using the Structured Clinical Interview for DSM-IV DDs (SCID-D) by two psychiatrists blind to the group membership and scale scores. Test-retest evaluations and internal consistency analyses suggested that SIAQ was a reliable instrument. Of the participants, 11.3% reported a SIAQ score 25 or above alongside some impairment. SIAQ scores differentiated participants who fit the diagnostic criteria for a DD from those who did not. While self-report identity alteration was correlated with all childhood trauma types, clinician-assessed identity alteration was correlated with childhood sexual abuse only. Those who fit criteria for both disorders had the highest identity alteration scores in self-report and clinician-assessment. Although both syndromes had significant effect on self-report identity alteration total scores, in contrast to DD, BPD did not have an effect on the clinician-administered evaluation. An impression of personality disorder rather than a DD may seem more likely when identity alteration remains subtle in clinical assessment, notwithstanding its presence in self-report. Lack of recognition of identity alteration may lead to overdiagnosis of BPD among individuals who have a DD.

  3. The association of personal semantic memory to identity representations: insight into higher-order networks of autobiographical contents.

    Science.gov (United States)

    Grilli, Matthew D

    2017-11-01

    Identity representations are higher-order knowledge structures that organise autobiographical memories on the basis of personality and role-based themes of one's self-concept. In two experiments, the extent to which different types of personal semantic content are reflected in these higher-order networks of memories was investigated. Healthy, young adult participants generated identity representations that varied in remoteness of formation and verbally reflected on these themes in an open-ended narrative task. The narrative responses were scored for retrieval of episodic, experience-near personal semantic and experience-far (i.e., abstract) personal semantic contents. Results revealed that to reflect on remotely formed identity representations, experience-far personal semantic contents were retrieved more than experience-near personal semantic contents. In contrast, to reflect on recently formed identity representations, experience-near personal semantic contents were retrieved more than experience-far personal semantic contents. Although episodic memory contents were retrieved less than both personal semantic content types to reflect on remotely formed identity representations, this content type was retrieved at a similar frequency as experience-far personal semantic content to reflect on recently formed identity representations. These findings indicate that the association of personal semantic content to identity representations is robust and related to time since acquisition of these knowledge structures.

  4. CORPORATE IDENTITY DAN PERSONALITY BANK SYARIAH DI SURAT KABAR NASIONAL (Tekstual Analisis Konstruksi Meelalui Publikasi Perusahaan

    Directory of Open Access Journals (Sweden)

    Juwono Tri Atmodjo

    2015-05-01

    Full Text Available Corporate identity and personality manner that allows employers to formulate and differentiated from other companies (regular bank. Identity and personality can be realized by the company shows the vision and mission of the company, the company philosophy, corporate culture. The study is to assess the identity and personality were constructed through advetorian and Newspaper coverage related to the identity and personality of Islamic banks. Qualitative analysis with textual analysis strategy for observing any publication of the contents of the message, type, appearance, construction built with various combinations of text and images and the meaning behind it seems. Textual research results show that the identity and personality banks Islamic banks, care for the young entrepreneurs of the campus, BNI sharia requires political support, regulatory support, is an ISO 9001: 2008 as the bank has a good quality management. Construction as a bank with a foundation of Sharia as the implementation of Islamic teachings are constructed differently degan regular bank to provide the product name, the expression of interest, section or division, spirit or values and norms derived from the teachings of Islam. Ordinances of service, petuhas services, ornaments firm up souvenirs derived from the values of Islam. Cultural references conveyed Islamic banks oriented to the culture of Islamic countries that appear on the financial system based on gold. Identitas perusahaan dan personaliti cara yang memungkinkan perusahaan menyusun dan dibedakan dari perusahaan lain (reguler bank. Indentitas dan personaliti perusahaan dapat diwujudkan dengan menunjukkan visi dan misi perusahaan, filosofi perusahaan, budaya perusahaan. Studi ini untuk menilai identitas dan personaliti yang dikonstruksikan melalui advetorian dan liputan Surat Kabar berkaitan dengan identitas dan personaliti bank syariah. Analisis kualitatif dengan strategi analisis tektual untuk mengobservasi berbagai

  5. Reproductive autonomy, the non-identity problem, and the non-person problem.

    Science.gov (United States)

    DiSilvestro, Russell

    2009-01-01

    The Non-Identity Problem is the problem of explaining the apparent wrongness of a decision that does not harm people, especially since some of the people affected by the decision would not exist at all were it not for the decision. One approach to this problem, in the context of reproductive decisions, is to focus on wronging, rather than harming, one's offspring. But a Non-Person Problem emerges for any view that claims (1) that only persons can be wronged and (2) that the person-making properties allow for there to be human non-persons. Consider an individual human organism that is prevented from ever possessing the person-making properties. On person-only accounts of the victims of wronging, this organism cannot be wronged by anyone. Hence even individuals whose decisions prevent it from ever possessing the person-making properties cannot wrong it. But this is counter-intuitive. We can think of examples where a human organism is wronged by precisely those decisions that prevent it from possessing the person-making properties. The best solution to this problem, in the case where the person-making property is rational self-governance in pursuit of a meaningful life, is to adjust the concept of a person so that it refers, not merely to those with the immediate capacity for rational self-governance in pursuit of a meaningful life, but also to those with a higher-order capacity for such self-governance. Any solution to the Non-Identity Problem that focuses on wronging rather than harming should incorporate this sort of solution to the Non-Person Problem.

  6. Personal and cultural identity development in recently immigrated Hispanic adolescents: Links with psychosocial functioning.

    Science.gov (United States)

    Meca, Alan; Sabet, Raha F; Farrelly, Colleen M; Benitez, Cynthia G; Schwartz, Seth J; Gonzales-Backen, Melinda; Lorenzo-Blanco, Elma I; Unger, Jennifer B; Zamboanga, Byron L; Baezconde-Garbanati, Lourdes; Picariello, Simona; Des Rosiers, Sabrina E; Soto, Daniel W; Pattarroyo, Monica; Villamar, Juan A; Lizzi, Karina M

    2017-07-01

    This study examined directionality between personal (i.e., coherence and confusion) and cultural identity (i.e., ethnic and U.S.) as well as their additive effects on psychosocial functioning in a sample of recently immigrated Hispanic adolescents. The sample consisted of 302 recent (identity coherence and both ethnic and U.S. identity. Ethnic and U.S. affirmation/commitment (A/C) positively and indirectly predicted optimism and negatively predicted rule breaking and aggression through coherence. However, confusion predicted lower self-esteem and optimism and higher depressive symptoms, rule breaking, unprotected sex, and cigarette use. Results further indicated significant site differences. In Los Angeles (but not Miami), ethnic A/C also negatively predicted confusion. Given the direct effects of coherence and confusion on nearly every outcome, it may be beneficial for interventions to target personal identity. However, in contexts such as Los Angeles, which has at least some ambivalence toward recently immigrated Hispanic adolescents, it may be more beneficial for interventions to also target cultural identity to reduce confusion and thus promote positive development. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  7. Beliefs About the Causal Structure of the Self-Concept Determine Which Changes Disrupt Personal Identity.

    Science.gov (United States)

    Chen, Stephanie Y; Urminsky, Oleg; Bartels, Daniel M

    2016-10-01

    Personal identity is an important determinant of behavior, yet how people mentally represent their self-concepts and their concepts of other people is not well understood. In the current studies, we examined the age-old question of what makes people who they are. We propose a novel approach to identity that suggests that the answer lies in people's beliefs about how the features of identity (e.g., memories, moral qualities, personality traits) are causally related to each other. We examined the impact of the causal centrality of a feature, a key determinant of the extent to which a feature defines a concept, on judgments of identity continuity. We found support for this approach in three experiments using both measured and manipulated causal centrality. For judgments both of one's self and of others, we found that some features are perceived to be more causally central than others and that changes in such causally central features are believed to be more disruptive to identity.

  8. Change and persistence of personal identities after the transition to retirement.

    Science.gov (United States)

    Teuscher, Ursina

    2010-01-01

    This study addresses the question of how retired people's self-image differs from that of working people, and what factors predict people's self-definition as professionals or retirees. Seven hundred ninety-two Swiss persons aged 58-70 (386 men, 406 women; 349 not retired, 443 retired) were asked to rate the importance of different self-description domains (such as profession, family-roles, personal values, etc.). Results indicated that the profession domain remains important for self-description even after retirement, to the extent that retirement status does not predict the importance of the professional identity at all. Rather, consistent with social identity theory, the importance of the profession for self-description is best predicted by the status of the (former or current) job. The importance of the retirement status for self-definition is predicted best by a positive attitude toward aging. In general, retired respondents rated more domains of self-description as important than did not-yet-retired respondents, and no domain was less important after retirement. In other words, identity diversity was higher for the retired than for the not-yet-retired persons. In addition, high identity diversity correlated with a high satisfaction across different life domains.

  9. Mentalizing and interpersonal problems in borderline personality disorder: The mediating role of identity diffusion.

    Science.gov (United States)

    De Meulemeester, Celine; Lowyck, Benedicte; Vermote, Rudi; Verhaest, Yannic; Luyten, Patrick

    2017-12-01

    Individuals with borderline personality disorder (BPD) are characterized by problems in interpersonal functioning and their long-term social integration often remains problematic. Extant theories have linked identity diffusion to many of the interpersonal problems characteristic of BPD patients. Recent theoretical accounts have suggested that identity diffusion results from problems with mentalizing or reflective functioning, that is, the capacity to understand oneself and others in terms of intentional mental states. In this study we tested these assumptions, i.e., whether identity diffusion plays a mediating role in the relationship between mentalizing difficulties and interpersonal problems, in a sample of 167 BPD patients. Highly significant correlations were found between mentalizing impairments, identity diffusion and interpersonal problems. Mediation analyses showed that identity diffusion fully mediated the relationship between mentalizing difficulties and interpersonal problems. This study provides preliminary evidence that impairments in mentalizing are related to identity diffusion, which in turn is related to interpersonal problems in BPD. Further longitudinal research is needed to further substantiate these conclusions. Copyright © 2017 Elsevier B.V. All rights reserved.

  10. The Survey personal and national identity between individual with cell phone addiction disorder and normal smartphone users

    Directory of Open Access Journals (Sweden)

    Seyyed Salman Alavi

    2018-02-01

    Full Text Available Objective: Smart phones have rapidly become an integral, and for some, an essential communication device worldwide. The issue of identity has always been a subject of interest among psychologists. The present study was conducted to compare personal and national identity and their subscales between cell phone addicts and non-addicts.Method: In this cross-sectional study, 500 student cell phone users from various universities in Tehran were recruited using stratified sampling. Participants completed cell phone addiction questionnaires including Mobile Phone Problematic Use Scale (MPPUS, Cell Phone Dependency Questionnaire (CPDQ, Personal Identity Development Questionnaire, Extended Objective Measure of Ego Identity Status (EOMEIS and National Identity Questionnaire. Then, the subscales of these instruments were analyzed using SPSS Version 20.Results: Results of this study revealed significant differences between cell phone addicts and non-addicts in the scores of national identity, personal identity, and most subscales, except for some subscales (P<0.05. In addition, a negative and significant relationship was found between personal and national identity and cell phone addiction (r=-0.35, -0.33, respectively.On the other hand, after controlling for the confounder variables, we found that national identity had an effect on cell phone addiction(OR=0.05, CI=0.92-0.98.Conclusion: The results of this study indicated that cell phone overuse may be correlated with defects in some aspects of national and personal identity.

  11. Rebuilding lives and identities: The role of place in recovery among persons with complex needs.

    Science.gov (United States)

    Tran Smith, Bikki; Padgett, Deborah K; Choy-Brown, Mimi; Henwood, Benjamin F

    2015-05-01

    Photo-elicitation interviews (PEIs) were conducted to explore the role of place in recovery - specifically, narrative identity reconstruction - among persons with complex needs. PEIs with 17 formerly homeless adults with co-occurring disorders in New York City produced 243 photos. Content analysis of photos revealed three categories - apartment, neighborhood and people. Two narrative themes - having my own and civic identity - were mapped onto the apartment and neighborhood categories, respectively. Three additional cross-categorical narrative themes were identified: (re)negotiating relationships and boundaries, moving beyond old identities and future possibilities. Housing was central across themes. Understanding of recovery is enhanced when viewed through participant-controlled visual methods. Copyright © 2015 Elsevier Ltd. All rights reserved.

  12. Self-defining memories, scripts, and the life story: narrative identity in personality and psychotherapy.

    Science.gov (United States)

    Singer, Jefferson A; Blagov, Pavel; Berry, Meredith; Oost, Kathryn M

    2013-12-01

    An integrative model of narrative identity builds on a dual memory system that draws on episodic memory and a long-term self to generate autobiographical memories. Autobiographical memories related to critical goals in a lifetime period lead to life-story memories, which in turn become self-defining memories when linked to an individual's enduring concerns. Self-defining memories that share repetitive emotion-outcome sequences yield narrative scripts, abstracted templates that filter cognitive-affective processing. The life story is the individual's overarching narrative that provides unity and purpose over the life course. Healthy narrative identity combines memory specificity with adaptive meaning-making to achieve insight and well-being, as demonstrated through a literature review of personality and clinical research, as well as new findings from our own research program. A clinical case study drawing on this narrative identity model is also presented with implications for treatment and research. © 2012 Wiley Periodicals, Inc.

  13. Gender identity and sexual orientation in women with borderline personality disorder.

    Science.gov (United States)

    Singh, Devita; McMain, Shelley; Zucker, Kenneth J

    2011-02-01

    In the Diagnostic and Statistical Manual of Mental Disorders, Fourth Edition, text revision (DSM-IV-TR) (and earlier editions), a disturbance in "identity" is one of the defining features of borderline personality disorder (BPD). Gender identity, a person's sense of self as a male or a female, constitutes an important aspect of identity formation, but this construct has rarely been examined in patients with BPD. In the present study, the presence of gender identity disorder or confusion was examined in women diagnosed with BPD. We used a validated dimensional measure of gender dysphoria. Recalled gender identity and gender role behavior from childhood was also assessed with a validated dimensional measure, and current sexual orientation was assessed by two self-report measures. A consecutive series of 100 clinic-referred women (mean age, 34 years) with BPD participated in the study. The women were diagnosed with BPD using the International Personality Disorder Exam-BPD Section. None of the women with BPD met the criterion for caseness on the dimensional measure of gender dysphoria. Women who self-reported either a bisexual or a homosexual sexual orientation had a significantly higher score on the dimensional measure of gender dysphoria than the women who self-reported a heterosexual sexual orientation, and they also recalled significantly more cross-gender behavior during childhood. Results were compared with a previous study on a diagnostically heterogeneous group of women with other clinical problems. The importance of psychosexual assessment in the clinical evaluation of patients with BPD is discussed. © 2010 International Society for Sexual Medicine.

  14. Mindfulness and personal identity in the Western cultural context: A plea for greater cosmopolitanism.

    Science.gov (United States)

    Panaïoti, Antoine

    2015-08-01

    In the psychological sciences, mindfulness practices are increasingly being used, studied, and theorized, but their indigenous theoretical foundations in Buddhist accounts of the dynamics and psychology of personal identity tend to be overlooked. This situation is mirrored in the discipline of philosophy: here, Buddhist views on personal identity are beginning to draw attention, but almost invariably in a way which entirely blanks out the role of mindfulness practices in cultivating Buddhist insights on selfhood. The aggregate result is a failure, in the West, to reflect upon and seriously consider Buddhist theory and Buddhist practice in an integrated, holistic fashion. In its effort to overcome the compartmentalization of Buddhist theory (in philosophy) versus Buddhist practice (in psychology) and to embrace the challenges this might pose to fundamental Western beliefs about the self, this paper is intended both as a plea for and an exercise in greater, more venturesome cosmopolitanism. © The Author(s) 2015.

  15. Motivation and Justice at Work: The Role of Emotion and Cognition Components of Personal and Collective Work Identity.

    Science.gov (United States)

    Nordhall, Ola; Knez, Igor

    2017-01-01

    The aim of this study was to investigate the role of personal and collective work identity (including emotion and cognition components), in predicting work motivation (operationalized as work self-determined motivation) and organizational justice (operationalized as organizational pay justice). Digitized questionnaires were distributed by e-mail to 2905 members, teachers, of a Swedish trade union. A total of 768 individuals answered the questionnaire and by that participated in this study. Personal- compared to collective work identity was shown to positively associate with self-determined motivation accounted for by the emotion component of personal work identity. Collective compared to personal work identity was reported to positively associate with organizational pay justice accounted for by the cognition component of collective work identity. All this suggests that both work-related motivation and organizational justice might be, to some extent, accounted for by the psychological mechanisms of work identity and that, as predicted, different types of work identity, play different significant roles in predicting motivation and justice at work. More precisely, the emotion component of work identity was more pronounced in personal work-bonding relationships, and the cognitive component, of work identity in contrast, was more pronounced in collective work-bonding relationships.

  16. Motivation and Justice at Work: The Role of Emotion and Cognition Components of Personal and Collective Work Identity

    Directory of Open Access Journals (Sweden)

    Ola Nordhall

    2018-01-01

    Full Text Available The aim of this study was to investigate the role of personal and collective work identity (including emotion and cognition components, in predicting work motivation (operationalized as work self-determined motivation and organizational justice (operationalized as organizational pay justice. Digitized questionnaires were distributed by e-mail to 2905 members, teachers, of a Swedish trade union. A total of 768 individuals answered the questionnaire and by that participated in this study. Personal- compared to collective work identity was shown to positively associate with self-determined motivation accounted for by the emotion component of personal work identity. Collective compared to personal work identity was reported to positively associate with organizational pay justice accounted for by the cognition component of collective work identity. All this suggests that both work-related motivation and organizational justice might be, to some extent, accounted for by the psychological mechanisms of work identity and that, as predicted, different types of work identity, play different significant roles in predicting motivation and justice at work. More precisely, the emotion component of work identity was more pronounced in personal work-bonding relationships, and the cognitive component, of work identity in contrast, was more pronounced in collective work-bonding relationships.

  17. Motivation and Justice at Work: The Role of Emotion and Cognition Components of Personal and Collective Work Identity

    Science.gov (United States)

    Nordhall, Ola; Knez, Igor

    2018-01-01

    The aim of this study was to investigate the role of personal and collective work identity (including emotion and cognition components), in predicting work motivation (operationalized as work self-determined motivation) and organizational justice (operationalized as organizational pay justice). Digitized questionnaires were distributed by e-mail to 2905 members, teachers, of a Swedish trade union. A total of 768 individuals answered the questionnaire and by that participated in this study. Personal- compared to collective work identity was shown to positively associate with self-determined motivation accounted for by the emotion component of personal work identity. Collective compared to personal work identity was reported to positively associate with organizational pay justice accounted for by the cognition component of collective work identity. All this suggests that both work-related motivation and organizational justice might be, to some extent, accounted for by the psychological mechanisms of work identity and that, as predicted, different types of work identity, play different significant roles in predicting motivation and justice at work. More precisely, the emotion component of work identity was more pronounced in personal work-bonding relationships, and the cognitive component, of work identity in contrast, was more pronounced in collective work-bonding relationships. PMID:29379454

  18. Integrating Fingerprint Verification into the Smart Card-Based Healthcare Information System

    OpenAIRE

    Jin-Won Park; Sung Bum Pan; Yongwha Chung; Daesung Moon

    2009-01-01

    As VLSI technology has been improved, a smart card employing 32-bit processors has been released, and more personal information such as medical, financial data can be stored in the card. Thus, it becomes important to protect personal information stored in the card. Verification of the card holder's identity using a fingerprint has advantages over the present practices of Personal Identification Numbers (PINs) and passwords. However, the computational workload of fingerprint verification i...

  19. The centrality of affective instability and identity in Borderline Personality Disorder: Evidence from network analysis

    Science.gov (United States)

    Costantini, Giulio; De Panfilis, Chiara

    2017-01-01

    We argue that the series of traits characterizing Borderline Personality Disorder samples do not weigh equally. In this regard, we believe that network approaches employed recently in Personality and Psychopathology research to provide information about the differential relationships among symptoms would be useful to test our claim. To our knowledge, this approach has never been applied to personality disorders. We applied network analysis to the nine Borderline Personality Disorder traits to explore their relationships in two samples drawn from university students and clinical populations (N = 1317 and N = 96, respectively). We used the Fused Graphical Lasso, a technique that allows estimating networks from different populations separately while considering their similarities and differences. Moreover, we examined centrality indices to determine the relative importance of each symptom in each network. The general structure of the two networks was very similar in the two samples, although some differences were detected. Results indicate the centrality of mainly affective instability, identity, and effort to avoid abandonment aspects in Borderline Personality Disorder. Results are consistent with the new DSM Alternative Model for Personality Disorders. We discuss them in terms of implications for therapy. PMID:29040324

  20. Modeling the contribution of personality, social identity and social norms to problematic Facebook use in adolescents.

    Science.gov (United States)

    Marino, Claudia; Vieno, Alessio; Pastore, Massimiliano; Albery, Ian P; Frings, Daniel; Spada, Marcantonio M

    2016-12-01

    Facebook is the most popular social networking site in the world providing the opportunity to maintain and/or establish relationships, to share media contents and experiences with friends, and to easily communicate with them. Despite the resources and the innovative social features offered by Facebook research has emerged indicating that its use may become problematic, with negative consequences on personal psycho-social well-being, especially among adolescents and young adults. The main aim of this study was to examine the unique contribution of personality traits and social influence processes (i.e. subjective norms, group norms, and social identity) to perceived frequency of Facebook Use and Problematic Facebook Use in a sample of adolescents. A total of 968 Italian adolescents participated in the study. Structural equation modeling showed that emotional stability, extraversion, conscientiousness and norms directly predicted Problematic Facebook Use, whereas gender, group norms and social identity predicted perceived frequency of Facebook use. In conclusion, both personal and social variables appear to explain perceived frequency of Facebook use and Problematic Facebook Use among adolescents, and should be taken into account by researchers and educational practitioners. Copyright © 2016 Elsevier Ltd. All rights reserved.

  1. The Soul and Personal Identity. Derek Parfit’s Arguments in the Substance Dualist Perspective

    Directory of Open Access Journals (Sweden)

    Sepetyi Dmytro

    2017-07-01

    Full Text Available This paper re-evaluates Derek Parfit’s attack on the commonly held view that personal identity is necessarily determinate and that it is what matters. In the first part we first argue against the Humean view of personal identity; secondly, we classify the remaining alternatives into three kinds: the body theory and the brain theory, the quasi-Humean theory, and the soul theory, and thirdly we deploy Parfit’s arguments and related considerations to the point that none of the materialistic alternatives is consistent with the commonly held view. This leaves us with the alternative: either we accept the radical and highly implausible materialistic view Parfit calls ‘Reductionism’, or we accept the view that we are nonphysical indivisible entities—Cartesian egos, or souls. The second part of the paper discusses Parfit’s objections against the Cartesian view: that there is no reason to believe in the existence of such nonphysical entities; that if such entities exist, there is no evidence that they are enduring (to span a human life; that even if they exist and are enduring, they are irrelevant for the psychological profile and temporal continuity of a person; that experiments with ‘brain-splitted’ patients provide strong evidence against the Cartesian view. We argue that these objections are in part mistaken, and that the remaining (sound part is not strong enough to make the Cartesian view less plausible than Reductionism.

  2. An approach to discussing personal and social identity terminology with patients.

    Science.gov (United States)

    Sloboda, Alexander; Mustafa, Aesha; Schober, Justine

    2018-03-01

    As the United States of America becomes more socially diverse, it is more important now than ever for health care providers to become more aware of their patients' social identities. It is imperative that providers engage with their patients and see how each of them identifies personally in relation to social construction terminology. As with the terminology of human anatomy, there is a vast and diverse vocabulary concerning the anatomy of society, which is also clinically relevant to health care providers. If health care providers take the initiative to discuss how their patients identify, they can understand better how those patients experience the world, and this can significantly affect many facets of their health and health care experience. Giving respect fosters the creation of a strong relationship within which patients can share very personal and intimate information, which in turn allows health care providers the possibility of providing the best healthcare. This discussion will build upon and integrate current academic research and opinion for tangible clinical use while discussing various social and personal identities, including but not limited to race, gender, gender expression, sex, sexual orientation, religion, ethnicity, socioeconomic class, and physical and mental abilities. Clin. Anat. 31:136-139, 2018. © 2017 Wiley Periodicals, Inc. © 2017 Wiley Periodicals, Inc.

  3. Comparing the symptoms and mechanisms of "dissociation" in dissociative identity disorder and borderline personality disorder.

    Science.gov (United States)

    Laddis, Andreas; Dell, Paul F; Korzekwa, Marilyn

    2017-01-01

    A total of 75 patients were diagnosed with the Structured Clinical Interview for DSM-IV Dissociative Disorders-Revised as having dissociative identity disorder (DID), and 100 patients were diagnosed with the Structured Interview for DSM-IV Personality as having borderline personality disorder (BPD). Both groups were administered the Multidimensional Inventory of Dissociation (MID). DID patients had significantly higher MID scores than BPD patients, different distributions of MID scores, and different MID subscale profiles in 3 ranges of MID scores (0-15, 15-30, 30-45). The core MID symptoms-exhibited at all ranges of MID scores-for DID patients (the presence of alters, identity confusion, and memory problems) and BPD patients (flashbacks, identity confusion, and memory problems) were ostensibly similar but were considered to be mostly produced by different underlying processes. Multiple regression analyses showed that the core MID symptoms of DID patients had different predictors than did the core MID symptoms of BPD patients. Alter identities seemed to generate most-but not all-dissociative phenomena in DID patients, whereas only the 24% highest scoring BPD patients (MID ≥45) seemed to manifest alter-driven dissociative experiences. Most BPD dissociative experiences appeared to be due to 5 other mechanisms: (a) BPD-specific, stress-driven, rapid shifts of self-state; (b and c) nondefensive disruptions of the framework of perceptual organization with or without an accompanying BPD-specific, dissociation-like disintegration of affective/neurocognitive functioning; (d) a defensive distancing or detachment from distress (i.e., simple depersonalization); and (e) Allen, Console, and Lewis's (1999) severe absorptive detachment.

  4. Masculinity and Femininity: Essential to the Identity of the Human Person

    Directory of Open Access Journals (Sweden)

    O'Donnell Nancy

    2014-07-01

    Full Text Available The title of this congress begins with the word “identity”. It also includes the word “reciprocity,” which indicates a form of relationship and finally, “gift of self”. This would lead us to conclude that the identity of the human person has something to do with reciprocity and that reciprocity involves giving of oneself to others. This talk will attempt to shed light on how the concept of gender might in some way be incorporated into these three concepts.

  5. When I equals we: exploring the relation between social and personal identity of extreme right-wing political party members.

    Science.gov (United States)

    Baray, Gamze; Postmes, Tom; Jetten, Jolanda

    2009-12-01

    This paper introduces the concept of self-defining groups to explain how personal and social aspects of identity relate to each other among members of an extreme right-wing political party. Two studies were conducted. Study 1 examined how affiliation with a social group that has clear-cut, rigid norms and values affects the personal and social self-concept. Participants were members of a (self-defining) Turkish nationalist organisation (N=66) and a control group of Turkish university students (N=58). Paradoxically, high levels of national identification were associated with stronger personal identity. Study 2 used the same participant population (N=177) and manipulated self-focused attention by means of a mirror. Self-aware members reported the highest levels of identification with the nationalist organisation. Results suggest that members of this groups show no signs of 'vanishing individuality': although boundaries between personal and social identities are blurred, extremist group members retain a distinct and strengthened sense of personal identity. This raises some interesting questions for the concept of personal identity and how it can be informed by the content of one's social identity.

  6. Survey on Offline Finger Print Verification System

    NARCIS (Netherlands)

    Suman, R.; Kaur, R.

    2012-01-01

    The fingerprint verification, means where "verification" implies a user matching a fingerprint against a single fingerprint associated with the identity that the user claims. Biometrics can be classified into two types Behavioral (signature verification, keystroke dynamics, etc.) And Physiological

  7. Dynamic Personal Identity and the Dynamic Identity Grid: How Theory and Concept Can Transform Information into Knowledge and Secure the American Homeland

    Science.gov (United States)

    2008-09-01

    80 Figure 12. Dynamic Identity Grid Strategy Canvas ..........................................................81 Figure 13. Hurdles to...GIG Global Information Grid HSPD Homeland Security Presidential Directive IAFIS Integrated Automated Fingerprint Identification System IP...recognizing a person based on a physiological or behavioral characteristic. Biometric features that can be measured include: facial, fingerprint , hand

  8. Utterance Verification for Text-Dependent Speaker Recognition

    DEFF Research Database (Denmark)

    Kinnunen, Tomi; Sahidullah, Md; Kukanov, Ivan

    2016-01-01

    Text-dependent automatic speaker verification naturally calls for the simultaneous verification of speaker identity and spoken content. These two tasks can be achieved with automatic speaker verification (ASV) and utterance verification (UV) technologies. While both have been addressed previously...

  9. Motivation for helping behavior after the floods in 2014: The role of personality and national identity

    Directory of Open Access Journals (Sweden)

    Otašević Biljana

    2014-01-01

    Full Text Available The severe floods, which struck Serbia in May 2014, inflicted enormous material damage and forced tens of thousands of people to leave their homes. The goal of this research was to investigate the motivation of citizens who helped, i.e. to establish the predictors of the motivation for helping behavior as well as its effects on different ways of providing help. Volunteer Functions Inventory, National Identity Scale, Big Five Inventory, and Helping Behavior Questionnaire were applied to the sample of 183 people who provided the flood victims with help. Multivariate analysis of covariance, where the predictors were gender, the prior acquaintance with the victims, six volunteer functions (Social, Understanding, Protective, Enhancement, Values, Career, age, education and financial status, while the criteria were dimensions of helping behavior, shows that the model provides statistically significant explanation of all dimensions of helping behavior, where the Social Motives and Understanding have significant multivariate effects. MANCOVA was used for establishing the predictors of helping motivation. Along with the control variables from the first analysis, the predictors were Big Five personality traits and national identity, and the criteria were 6 volunteer functions. The results showed significant multivariate effects of Openness, Agreeableness, Extraversion and national identity. Practical and theoretical implications are discussed.

  10. Philosophy teaching and the constitution of personal identity: Formation, autonomy and gender

    Directory of Open Access Journals (Sweden)

    Tânia Aparecida Kuhnen

    2017-12-01

    Full Text Available This article investigates the contribution of philosophy in basic education classes for the formation of the students as individuals, helping them in the process of identity construction. Philosophy teaching in high school contributes to constituteself-aware individuals in space and time. It helps them with the ability to reflect critically on the social context in which they are inserted and on the expectations in terms of fixed gender roles imposed from the outside in. In this sense, the particularity of philosophical knowledge, as critical thinking through the creation of concepts, entails a more authentic and autonomous individual formation. This also justifies the presence of philosophy as a subject in high school. The personal gender experience is central in the formation of identity. So it is important to discuss this topic with the students. Due to that, we advocate the importance of bringing gender issues to philosophy classes. It refers a real experience that can be problematized in order to deconstruct naturalized gender performativity and think about the inequalities that pervade this social category. Thus, students can constitute a more conscious individual identity, critical to social position that their genders occupy in the social environment.

  11. Identity-related autobiographical memories and cultural life scripts in patients with Borderline Personality Disorder.

    Science.gov (United States)

    Jørgensen, Carsten René; Berntsen, Dorthe; Bech, Morten; Kjølbye, Morten; Bennedsen, Birgit E; Ramsgaard, Stine B

    2012-06-01

    Disturbed identity is one of the defining characteristics of Borderline Personality Disorder manifested in a broad spectrum of dysfunctions related to the self, including disturbances in meaning-generating self-narratives. Autobiographical memories are memories of personal events that provide crucial building-blocks in our construction of a life-story, self-concept, and a meaning-generating narrative identity. The cultural life script represents culturally shared expectations as to the order and timing of life events in a prototypical life course within a given culture. It is used to organize one's autobiographical memories. Here, 17 BPD-patients, 14 OCD-patients, and 23 non-clinical controls generated three important autobiographical memories and their conceptions of the cultural life script. BPD-patients reported substantially more negative memories, fewer of their memories were of prototypical life script events, their memory narratives were less coherent and more disoriented, and the overall typicality of their life scripts was lower as compared with the other two groups. Copyright © 2012 Elsevier Inc. All rights reserved.

  12. Politicization during the 2012 U.S. Presidential Elections: bridging the personal and the political through an identity content approach.

    Science.gov (United States)

    Turner-Zwinkels, Felicity; van Zomeren, Martijn; Postmes, Tom

    2015-03-01

    We investigated U.S. citizens' politicization (i.e., switching from not self-defining to self-defining as an active political party supporter) during the 2012 U.S. Presidential Elections. We used a novel identity content approach to explore qualitative changes in overlap between personal and politicized identity traits. We collected longitudinal data from a community sample of U.S. citizens (N = 760), tracking whether and how personal and politicized identity content developed: two months before (T1), immediately before (T2), and 2 months after (T3) the election. We explored a subsample of participants who met inclusion criteria (n = 115), comparing 87 participants who did not politicize with 28 participants who self-labeled as unpoliticized at T1, but politicized at T2/T3. Results confirmed hypotheses: Only politicizers showed greater integration between their personal and politicized identity content over time; moreover, identity content was a significant positive predictor of politicization and action engagement. We discuss the value of identity content for politicization research. © 2015 by the Society for Personality and Social Psychology, Inc.

  13. Personality moderates the links of social identity with work motivation and job searching.

    Science.gov (United States)

    Baay, Pieter E; van Aken, Marcel A G; van der Lippe, Tanja; de Ridder, Denise T D

    2014-01-01

    Work motivation is critical for successful school-to-work transitions, but little is known about its determinants among labor market entrants. Applying a social identity framework, we examined whether work motivation and job searching are social-contextually determined. We expected that some job seekers are more sensitive to contextual influence, depending on their personality. Mediation analyses on 591 Dutch vocational training students indicate that the perception of more positive work norms in someone's social context was related to higher levels of intrinsic motivation, which in turn predicted higher preparatory job search behavior and job search intentions. Multi-group analysis shows that perceived work norms more strongly predict work motivation among overcontrollers compared to resilients and undercontrollers. In conclusion, work motivation and job searching appear contextually determined: especially among those sensitive to contextual influence, people seem to work when they believe that is what people like them do.

  14. The collective past, group psychology and personal narrative: shaping Jewish identity by memoirs of the Holocaust.

    Science.gov (United States)

    Rosenman, S; Handelsman, I

    1990-06-01

    Through honing its collective memory, especially after the Holocaust, the Jewish community has attempted to sustain its culture, bolster the Jewish identity of its members, and regain a resolute sense that its narrative is again proceeding. To some degree, all these aims are realized by instilling in its members the Jewish modal character structure: a psychological configuration with two contrastable entities. One chronically discomposed self-structure, defining itself as polluted and helpless, trembles with the appalling imagery of historical and imminent community disasters. The other entity believes in its unmatched capacity for reparative, socially beneficial actions. The paradigm of this psychological organization is found in many children of survivors. The memory of a tragic history abides alongside the community's hopes in the Jewish modal personality. The need to set forth and accommodate these two motifs imprints upon the Jewish "national" character many of its distinctive qualities. The designs of the Jewish community for this particularly Jewish twofold personality formation are augmented by the personal revelations of survivors. Therefore, Holocaustic testimonies are invested with a sacred aura. In measure, these recitals of the disaster with their stark images, plus the clashing affects aroused in the reader toward main characters of the narrative, dictate the way Jews define themselves in the world and the way they live. A confluence of being covertly commissioned by the Jewish community joins with the narrators' more idiosyncratic longings. Together they generate a steady stream of Holocaustic accounts. Complementary vectors drive the reader to peruse these records. The results therefrom, intimate knowledge of the disaster, plus the twofold personality motifs stamp many Jews as scions of the Holocaust.

  15. Exposure levels for persons involved in recovery operations following the Chernobyl accident in 1986-1987 and dosimetric data verification

    International Nuclear Information System (INIS)

    Il'in, L.A.; Kkyuchkov, V.P.; Osanov, D.P.; Pavlov, D.A.

    1995-01-01

    It is considered the organization of individual dosimetric monitoring (IDM) within 30-km zone around Chernobyl nuclear power plant (CNPP) in 1986 for different contingents of recovery workers: the CNPP personnel, Management for Construction 605 (MC-605), military recovery workers, persons assigned to 30-km zone. It is concluded that the quality of IDM had decreased in the following series: the MC-605 personnel, the CNPP personnel, the assigned persons, and military units. The method of dosimetric data verification for recovery workers in 1986 is presented. The results obtained by this method correspond to the results of the experts' estimation. Using the theory of hybrid lognormal distribution it was obtained, in our opinion, real external dose distribution for all the recovery workers. It was estimated that 7% of recovery workers received doses more than 0.25 Gy. Also, the data on values of mean and collective doses for different contingents, as well as for all persons involved in recovery operations is presented. 14 refs., 18 figs

  16. 49 CFR 802.7 - Requests: How, where, and when presented; verification of identity of individuals making requests...

    Science.gov (United States)

    2010-10-01

    ...) Requests made in person. Requests may be made in person during official working hours of the NTSB at the... Request,” “Privacy Act Statement of Disagreement,” “Privacy Act Disclosure Accounting Request,” “Appeal... acknowledged in writing by the Director, Bureau of Administration, or his designee, within 3 working days after...

  17. Putting the "we" into teamwork: effects of priming personal or social identity on flight attendants' perceptions of teamwork and communication.

    Science.gov (United States)

    Ford, Jane; O'Hare, David; Henderson, Robert

    2013-06-01

    The study was designed to investigate the effectiveness of a manipulation derived from social categorization and social identity theory to promote greater cabin crew willingness to engage in intergroup communication and teamwork in airline operations. Failures of communication and teamwork between airline crew have been implicated in a number of airline crashes. Flight attendants based domestically (n = 254) or overseas (n = 230) received a manipulation designed to prime either their social identity or personal identity and then read a brief outline of an in-flight event before completing a teamwork questionnaire. Flight attendants who received a social identity prime indicated increased willingness to engage in coordinated team action compared with those who received a personal identity prime. Priming social identity can enhance attitudes toward teamwork and communication, potentially leading to increased willingness to engage in intergroup cooperation. Social categorization and social identity theories can be used to inform joint training program development for flight attendants and pilots to create increased willingness for group members to participate in effective communication and teamwork behaviors.

  18. New Trends and Directions in Ethnic Identity among Internationally Transracially Adopted Persons: Summary of Special Issue

    Science.gov (United States)

    Rosnati, Rosa; Pinderhughes, Ellen E.; Baden, Amanda L.; Grotevant, Harold D.; Lee, Richard M.; Mohanty, Jayashree

    2015-01-01

    The collective findings of the six articles in this special issue highlight the importance of ethnic-racial socialization and ethnic identity among international transracial adoptees (ITRAs). A multidimensional developmental phenomenon, ethnic identity intersects with other identities, notably adoptive identity. Family, peers, community, and host…

  19. Teacher Identity in Language Teaching: Integrating Personal, Contextual, and Professional Factors

    Science.gov (United States)

    Pennington, Martha C.; Richards, Jack C.

    2016-01-01

    This article reviews notions of identity and teacher identity, how these relate to the specific characteristics of language teaching, and how teacher identity can evolve or be developed through experience and teacher education. The notion of teacher identity highlights the individual characteristics of the teacher and how these are integrated with…

  20. Names in Psychological Science: Investigating the Processes of Thought Development and the Construction of Personal Identities.

    Science.gov (United States)

    Quaglia, Rocco; Longobardi, Claudio; Mendola, Manuela; Prino, Laura Elvira

    2016-06-01

    This paper examines the name as an issue of interest in the psychology field. In thinking about the role played by names for some of the most important approaches on the psychology panorama, it has been found that the analysis of names can be used as an instrument for the investigation of thought formation processes, or as an element in the process of constructing personal identity. In the first case, the focus is on the so-called "common" names, which designate objects; in the second case, instead, it is on people's given names and on the way they are perceived by their bearers and those who surround them. We have examined both domains, since it is essential to understand how the psychological concepts related to names develop in children's minds, if we aim to grasp their importance as designators of people's internal and external realities. Lastly, we have proposed our own view of the person's name, linked to the relational systems perspective which essentially sees the name as a signifier or "representative" of the child-parent relationship, while the "relationship" is the signified.

  1. The Importance of Sensing Own's Movements in the World for the Sense of Personal Identity

    Directory of Open Access Journals (Sweden)

    Mariana Broens

    2012-01-01

    Full Text Available Within philosophy and cognitive science, the focus in relation to the problem of personal identity has been almost exclusively on the brain. We submit that the resulting neglect of the body and of bodily movements in the world has been detrimental in understanding how organisms develop a sense of identity. We examine the importance of sensing one’s own movements for the development of a basic, nonconceptual sense of self. More specifically, we argue that the origin of the sense of self stems from the sensitivity to spontaneous movements. Based on this, the organism develops a sense of “I move” and, finally, a sense of “I can move”. Proprioception and kinesthesis are essential in this development. At the same time, we argue against the traditional dichotomy between so-called external and internal senses, agreeing with Gibson that perception of the self and of the environment invariably go together. We discuss a traditional distinction between two aspects of bodily self: the body sense and the body image. We suggest that they capture different aspects of the sense of self. We argue that especially the body sense is of great importance to our nonconceptual sense of self. Finally, we attempt to draw some consequences for research in cognitive science, specifically in the area of robotics, by examining a case of missing proprioception. We make a plea for robots to be equipped not just with external perceptual and motor abilities but also with a sense of proprioception. This, we submit, would constitute one further step towards understanding creatures acting in the world with a sense of themselves.

  2. The Use of Personal Identity Numbers in Sweden and Denmark: A Barrier to Union Citizens' Enjoyment of Free Movement Rights?

    DEFF Research Database (Denmark)

    Hyltén-Cavallius, Katarina

    2015-01-01

    The paper of Katarina Hyltén-Cavallius focuses on personal identity numbers in Sweden and Denmark. This paper looks into formal and informal structures, which organise society in a host member state and which can make it difficult for a non-national Union citizen to, in practice, access public an...

  3. Verification criteria on the reliability of personal dosimetric services from x and gamma radiations

    International Nuclear Information System (INIS)

    Borasi, G.; Benco, A.; Kaftal, S.

    1990-07-01

    The paper presents the methods used by Working Group ENEA-EDP (Experts in Personal Dosimetry) to control the reliability of the Dosimetric Services operating in Italy and asking for the above controls on voluntary basis. Testing and irradiation test methods are explained as well as the evaluation criteria. The paper includes suggestions and guide-lines to gain the status of 'Reliable Service'. Technical equipment and operating procedures needed to pass the test are also illustrated. (author)

  4. Telling the Tale and Living Well: Adolescent Narrative Identity, Personality Traits, and Well-Being Across Cultures.

    Science.gov (United States)

    Reese, Elaine; Myftari, Ella; McAnally, Helena M; Chen, Yan; Neha, Tia; Wang, Qi; Jack, Fiona; Robertson, Sarah-Jane

    2017-03-01

    This study explored links between narrative identity, personality traits, and well-being for 263 adolescents (age 12-21) from three New Zealand cultures: Māori, Chinese, and European. Turning-point narratives were assessed for autobiographical reasoning (causal coherence), local thematic coherence, emotional expressivity, and topic. Across cultures, older adolescents with higher causal coherence reported better well-being. Younger adolescents with higher causal coherence instead reported poorer well-being. Personal development topics were positively linked to well-being for New Zealand European adolescents only, and thematic coherence was positively linked to well-being for Māori adolescents only. Negative expressivity, neuroticism, conscientiousness, and openness were also linked to well-being. Implications of these cultural similarities and differences are considered for theories of narrative identity, personality, and adolescent well-being. © 2016 The Authors. Child Development © 2016 Society for Research in Child Development, Inc.

  5. Identity's identities

    DEFF Research Database (Denmark)

    Jensen, Kim Ebensgaard

    -specialized language in which it also serves a number of functions – some of which are quite fundamental to society as such. In other words, the lexeme identity is a polysemic word and has multiple, well, identities. Given that it appears to have a number of functions in a variety of registers, including terminologies...... in Academic English and more everyday-based English, identity as a lexeme is definitely worth having a look at. This paper presents a lexicological study of identity in which some of its senses are identified and their behaviors in actual discourse are observed. Drawing on data from the 2011 section...... of the Corpus of Contemporary American English, a behavioral profile of the distributional characteristics of identity is set up. Behavioral profiling is a lexicographical method developed by the corpus linguist Stefan Th. Gries which, by applying semantic ID tagging and statistical analysis, provides a fine...

  6. Influences of gender identity on children's maltreatment of gender-nonconforming peers: a person × target analysis of aggression.

    Science.gov (United States)

    Pauletti, Rachel E; Cooper, Patrick J; Perry, David G

    2014-05-01

    We investigated whether gender identity influences preadolescents' tendency to single out gender-atypical peers for abuse. Data were gathered from 195 boys and girls (M age = 10.1 years) in the fall and spring of a school year. Children self-reported multiple dimensions of gender identity (intergroup bias, felt pressure for gender differentiation, felt gender typicality, gender contentedness); peers assessed each other's social behavior (gender nonconformity, aggression toward each classmate). Using multilevel modeling, we examined how children's attacks on gender-nonconforming peers (relative to their attacks on other peers) changed over the school year depending on their gender identity. There was modest support for the hypothesis that overconfident, arrogant gender identity promotes abuse of gender-atypical peers but considerable support for the hypothesis that insecure, self-questioning gender identity fosters this tendency. Implications for issues central to contemporary personality theory (e.g., Person × Situation interaction) are discussed. New and somewhat surprising information about the cognitive and behavioral characteristics of gender-nonconforming preadolescents is provided.

  7. FINGERPRINT VERIFICATION IN PERSONAL IDENTIFICATION BY APPLYING LOCAL WALSH HADAMARD TRANSFORM AND GABOR COEFFICIENTS

    Directory of Open Access Journals (Sweden)

    K N Pushpalatha

    2017-05-01

    Full Text Available In an era of advanced computer technology world where innumerable services such as access to bank accounts, or access to secured data or entry to some national important organizations require authentication of genuine individual. Among all biometric personal identification systems, fingerprint recognition system is most accurate and economical technology. In this paper we have proposed fingerprint recognition system using Local Walsh Hadamard Transform (LWHT with Phase Magnitude Histograms (PMHs for feature extraction. Fingerprints display oriented texture-like patterns. Gabor filters have the property of capturing global and local texture information from blur or unclear images and filter bank provides the orientation features which are robust to image distortion and rotation. The LWHT algorithm is compared with other two approaches viz., Gabor Coefficients and Directional Features. The three methods are compared using FVC 2006 Finger print database images. It is found from the observation that the values of TSR, FAR and FRR have improved results compared to existing algorithm.

  8. Personal identity narratives of therapeutic songwriting participants following Spinal Cord Injury: A case series analysis.

    Science.gov (United States)

    Roddy, Chantal; Rickard, Nikki; Tamplin, Jeanette; Baker, Felicity Anne

    2018-07-01

    Spinal Cord Injury (SCI) patients face unique identity challenges associated with physical limitations, higher comorbid depression, increased suicidality and reduced subjective well-being. Post-injury identity is often unaddressed in subacute rehabilitation environments where critical physical and functional rehabilitation goals are prioritized. Therapeutic songwriting has demonstrated prior efficacy in promoting healthy adjustment and as a means of expression for post-injury narratives. The current study sought to examine the identity narratives of therapeutic songwriting participants. Case-series analysis of the individual identity trajectories of eight individuals. Subacute rehabilitation facility, Victoria, Australia. Eight individuals with an SCI; 7 males and 1 female. Six-week therapeutic songwriting intervention facilitated by a music therapist to promote identity rehabilitation. Identity, subjective well-being and distress, emotional state. Three participants demonstrated positive trajectories and a further three showed negative trajectories; remaining participants were ambiguous in their response. Injury severity differentiated those with positive trajectories from those with negative trajectories, with greater injury severity apparent for those showing negative trends. Self-concept also improved more in those with positive trajectories. Core demographic variables did not however meaningfully predict the direction of change in core identity or wellbeing indices. Identity-focused songwriting holds promise as a means of promoting healthy identity reintegration. Further research on benefits for those with less severe spinal injuries is warranted.

  9. Reorganization of personal identity in the context of motivational dynamics and internal dialogical activity.

    Science.gov (United States)

    Batory, Anna

    2014-08-01

    Identity is constantly constructed and reconstructed. It may be assumed that there are six fundamental motivational goals according to which it is organized: self-esteem, self-efficacy, continuity, distinctiveness, belonging, and meaning (Vignoles, 2011). Moreover, identity is shaped by its dialogical nature (Hermans, 2003; van Halen & Janssen, 2004). The longitudinal study was conducted to examine both the motivational and the dialogical basis of identity structure dynamics. The results showed that the more the identity element was connected with a sense of continuity and the more dialogical it was, the greater the perceived centrality of this element was after two months. Furthermore, the more the identity element satisfied the self-esteem and belonging motives, the more positive was the affect ascribed to it. In the behavioral domain of identity, participants more strongly manifested those identity aspects that were earlier rated as more dialogical and satisfying the motive of belonging. The results showed that the motivational underpinnings of identity along with its dialogical nature explain changes in identity structure. © 2014 Scandinavian Psychological Associations and John Wiley & Sons Ltd.

  10. Predicting borderline personality disorder features from personality traits, identity orientation, and attachment styles in Italian nonclinical adults: issues of consistency across age ranges.

    Science.gov (United States)

    Fossati, Andrea; Borroni, Serena; Feeney, Judith; Maffei, Cesare

    2012-04-01

    The aims of this study were to assess whether Borderline Personality Disorder (BPD) features could be predicted by Big Five traits, impulsivity, identity orientation, and adult attachment patterns in a sample of 1,192 adult nonclinical participants, and to evaluate the consistency of these regression models across four age groups (49 years, and >50 years, respectively). In the full sample, measures of neuroticism (N), impulsivity, and anxious insecure attachment were substantial predictors of BPD features (adjusted R(2) = .38, p personality traits and disturbed attachment patterns.

  11. Split Personality: Assessing the Potential for Organizational Identity in Reinforcing U.S. Military Jointness

    Science.gov (United States)

    2015-07-17

    of Identity ...........................................................................................................36 Hybrid -Organizational...force through a theoretical lens, developing a working understanding of military identity. Analysis of the environment will illustrate the hybrid ... departmental civilians, and contractors in the DoD’s employ, and is consistent with CJCS usage. Joint Force. The Joint Force describes a notional

  12. Differential contributions of the anterior temporal and medial temporal lobe to the retrieval of memory for person identity information.

    Science.gov (United States)

    Tsukiura, Takashi; Suzuki, Chisato; Shigemune, Yayoi; Mochizuki-Kawai, Hiroko

    2008-12-01

    Although previous studies have suggested the importance of the bilateral anterior temporal (ATL) and medial temporal lobes (MTL) in the retrieval of person identity information, there is little evidence concerning how these regions differentially contribute to the process. Here we investigated this question using functional magnetic resonance imaging (fMRI). Before scanning, subjects learned associations among faces (F), names (N), and job titles (as a form of person-related semantics, S). During retrieval with fMRI, subjects were presented with previously learned and new S stimuli, and judged whether the stimuli were old or new. Successful retrieval (H) trials were divided into three conditions: retrieval of S and associated F and N (HSFN); retrieval of S and associated F (HSF); and retrieval of S only (HS). The left ATL was significantly activated in HSFN, compared to HSF or HS, whereas the right ATL and MTL were significantly activated in HSFN and HSF relative to HS. In addition, activity in bilateral ATL was significantly correlated with reaction time for HSFN, whereas we found no significant correlation between activity in the right MTL and reaction time in any condition. The present findings suggest that the left ATL may mediate associations between names and person-related semantic information, whereas the right ATL mediates the association between faces and person-related semantic information in memory for person identity information. In addition, activation of the right MTL region implies that this area may contribute to a more general relational processing of associative components, including memory for person identity information. Copyright 2007 Wiley-Liss, Inc.

  13. Personality development from adolescence to emerging adulthood: linking trajectories of ego development to the family context and identity formation.

    Science.gov (United States)

    Syed, Moin; Seiffge-Krenke, Inge

    2013-02-01

    This longitudinal study analyzed personality development using an individual approach by examining changes in ego development across the transition from adolescence to emerging adulthood. Specifically, the study mapped the heterogeniety in ego development growth trajectories and linked the different trajectories to the family context in adolescence and identity development in emerging adulthood. Participants were 98 families with a child who were followed from age 14 to age 24. Latent class growth analysis identified 4 distinct trajectories of growth in ego development of the children over the 10-year period. The results indicated that growth was more rapid during adolescence and tended to taper off in emerging adulthood. In addition, promotion of personal growth within the family and parents' ego development were particulary instrumental in children's ego developmental gains in adolescence. Finally, youth who demonstrated continued ego development into emerging adulthood also demonstrated heightened levels of identity exploration. (c) 2013 APA, all rights reserved.

  14. [Psychological features of body integrity identity disorder (BIID): personality traits, interpersonal aspects, coping mechanisms regarding stress and conflicts, body perception].

    Science.gov (United States)

    Oddo, S; Möller, J; Skoruppa, S; Stirn, A

    2014-05-01

    In BIID a disorder of body identity, concerned subjects desire an amputation of a healthy limb. So far, no psychiatric comorbidity was found in the few studies on BIID-subjects. This study explored clinical symptoms, personality characteristics, interpersonal aspects and coping strategies in 15 BIID persons. Psychometric testing on the topics (1) clinical symptoms, (2) personality and interpersonal aspects, (3) coping strategies, (4) attitudes towards the body were used and statistically evaluated with the T-test for one sample. Some psychopathologies such as depression, anxiety and obsessive-compulsive disorders (OCD) could be excluded although an increased tendency of depressiveness was found. BIID subjects showed specific personality and interpersonal characteristics: high agreeableness, autonomy, autarky and restrained behaviour towards others. Stress and conflicts are managed by self-control and self-affirmation. Their subjective physical attractiveness was low. BIID persons do not exhibit psychopathological characteristics (such as anxiety, depression or OCD), but do show specifics in personality, relationships and coping mechanisms. In the future, further personality traits and personality disorders should be investigated to shed more light on the categorisation and treatment of BIID. © Georg Thieme Verlag KG Stuttgart · New York.

  15. Motivation and Justice at Work: The Role of Emotion and Cognition Components of Personal and Collective Work Identity

    OpenAIRE

    Ola Nordhall; Ola Nordhall; Igor Knez

    2018-01-01

    The aim of this study was to investigate the role of personal and collective work identity (including emotion and cognition components), in predicting work motivation (operationalized as work self-determined motivation) and organizational justice (operationalized as organizational pay justice). Digitized questionnaires were distributed by e-mail to 2905 members, teachers, of a Swedish trade union. A total of 768 individuals answered the questionnaire and by that participated in this study. Pe...

  16. 'I am not a depressed person': how identity conflict affects help-seeking rates for major depressive disorder.

    Science.gov (United States)

    Farmer, Caroline; Farrand, Paul; O'Mahen, Heather

    2012-10-02

    There is a significant treatment gap for patients with depression. A third of sufferers never seek help, and the vast majority of those who do only do so after considerable delay. Little is understood regarding poor help-seeking rates amongst people with depression, with existing research mainly focussed on the impact of barriers to treatment. The current study explored psychological factors affecting help-seeking behaviour in clinically depressed individuals. Semi-structured interviews were conducted with 20 current or previously clinically depressed participants who either had or had not sought professional help. Thematic analysis was used to analyse results. The onset of depressive symptoms created conflict with participants' identity and personal goals. Delays in seeking help were primarily attributed to the desire to protect identity and goals from the threat of depressive symptoms. Participants used avoidance strategies to reduce the perceived threat of depressive symptoms on identity. These strategies interfered with help-seeking. Help-seeking was only undertaken once participants reached a point of acceptance and began to make concessions in their identity and goals, at which time they reduced their use of avoidance. Difficulties resolving conflict between identity and depressive symptoms may account for significant delays in seeking help for depression. The results have implications for predicting health behaviour and improving treatment uptake for depression, and may inform existing help-seeking models.

  17. Vocations as a source of identity: reciprocal relations between Big Five personality traits and RIASEC characteristics over 15 years.

    Science.gov (United States)

    Wille, Bart; De Fruyt, Filip

    2014-03-01

    Although work is a core part of life, the direction of influence from personality to work has typically been conceived as only unidirectional. The present study aims to contribute to the literature by considering reciprocal relations between personality and occupational characteristics, drawing on current perspectives from personality psychology (i.e., the social investment principle) and using a well-established framework to conceptualize career development (i.e., Holland's RIASEC theory). For this purpose, a longitudinal cohort of college alumni (N = 266) was tracked across a substantial and significant period in their professional career. Big Five personality traits and RIASEC occupational characteristics were assessed at the career start and 15 years later when their careers had unfolded. A combination of observed and latent variable analyses were used to disentangle the longitudinal and reciprocal relations between traits and occupational characteristics. Our results indicate that personality shapes and is shaped by our vocational experiences, suggesting that work can be a source of identity. The implications for theory and research on personality in the industrial and organizational literature are discussed alongside a number of practical implications for organizational and counseling settings.

  18. Who commits virtual identity suicide? Differences in privacy concerns, Internet addiction, and personality between Facebook users and quitters.

    Science.gov (United States)

    Stieger, Stefan; Burger, Christoph; Bohn, Manuel; Voracek, Martin

    2013-09-01

    Social networking sites such as Facebook attract millions of users by offering highly interactive social communications. Recently, a counter movement of users has formed, deciding to leave social networks by quitting their accounts (i.e., virtual identity suicide). To investigate whether Facebook quitters (n=310) differ from Facebook users (n=321), we examined privacy concerns, Internet addiction scores, and personality. We found Facebook quitters to be significantly more cautious about their privacy, having higher Internet addiction scores, and being more conscientious than Facebook users. The main self-stated reason for committing virtual identity suicide was privacy concerns (48 percent). Although the adequacy of privacy in online communication has been questioned, privacy is still an important issue in online social communications.

  19. Supervising the Professional Doctoral Student: Less Process and Progress, More Peripheral Participation and Personal Identity

    Science.gov (United States)

    Mawson, Kate; Abbott, Ian

    2017-01-01

    This article presents a discussion around issues of identity for part-time professional doctoral students. The current supervision arrangements of a professional doctoral programme were considered, using an exploratory study, to explore the idea that supervision for competent confident professionals should, in the early stages, focus on identity…

  20. School Community Engaging with Immigrant Youth: Incorporating Personal/Social Development and Ethnic Identity Development

    Science.gov (United States)

    Gonzalez, Laura M.; Eades, Mark P.; Supple, Andrew J.

    2014-01-01

    It has been projected that 33% of all school children will be from immigrant households by the year 2040 (Suarez-Orozco et al., 2010). For school personnel (e.g., administrators, counselors, teachers) working with immigrant youth and adolescents, understanding ethnic identity development is an essential cultural competency. In this essay, the…

  1. "Not the Same Person Anymore": Groupwork, Identity and Social Learning Online

    Science.gov (United States)

    Jaber, Rowaida; Kennedy, Eileen

    2017-01-01

    This paper argues that identity may be key to understanding why social presence has been considered so important to successful learning experiences. A qualitative case study of 10 students and 4 tutors in an online postgraduate education program was conducted. The research applied the work of Goffman to explain the relationship between social…

  2. Education for Cosmopolitanism: Cosmopolitanism as a Personal Cultural Identity Model for and within International Education

    Science.gov (United States)

    Gunesch, Konrad

    2004-01-01

    This article presents a model of cosmopolitanism, taken from the conceptual part of the author's research study into "The Relationship between Multilingualism and Cosmopolitanism". Cosmopolitan cultural identity is introduced as straddling the global and the local, encompassing questions of cultural mastery, metaculturality, mobility and…

  3. Prevention for HIV-Seropositive Persons: Successive Approximation Toward a New Identity

    Science.gov (United States)

    Lightfoot, Marguerita; Rotheram-Borus, Mary Jane; Milburn, Norweeta G.; Swendeman, Dallas

    2005-01-01

    This article presents a three-module intervention based on social action theory that focuses on health promotion and social identity formation for seropositive youth. The modules are designed to reduce transmission of HIV by reducing sexual and substance abuse acts, increasing healthy acts and adherence to care, and maintaining positive behavioral…

  4. Identity Crises in Love and at Work: Dispositional Optimism as a Durable Personal Resource

    Science.gov (United States)

    Andersson, Matthew A.

    2012-01-01

    Using the 2004 General Social Survey (N = 453), the identity stress process is investigated in terms of crises in intimate relationships and at the workplace. I discuss dispositional optimism as a psychological resource that is relatively independent of the situation and the self, making it ideal for structurally disadvantaged actors and for…

  5. How Living or Traveling to Foreign Locations Influences Adults' Worldviews and Impacts Personal Identity

    Science.gov (United States)

    Yelich Biniecki, Susan M.; Conceição, Simone C. O.

    2014-01-01

    People are living and traveling to places all over the world. An exploration of how this movement influences learners' worldviews has implications for adult development, identity, and learning. The purpose of this paper is to present a phenomenological study conducted in the U.S. that examined how individuals' living or traveling…

  6. Motivations, Values, and Conflict Resolution: Students' Integration of Personal and Professional Identities

    Science.gov (United States)

    Osteen, Philip J.

    2011-01-01

    Edicts within the Council on Social Work Education's 2008 Educational Policy and Accreditation Standards address the importance of understanding the intersection of personal and professional values. Twenty MSW students, chosen on the basis of diverse cultural and personal characteristics, were interviewed about their motivations for pursuing a MSW…

  7. How identity crisis, relative deprivation, personal characteristics, and empathy contribute to the engagement of Western individuals in Islamist terrorist behavior

    Directory of Open Access Journals (Sweden)

    Khouwaga Yusoufzai

    2017-02-01

    Full Text Available The growing sense of insecurity in the Western world due to home-grown Islamist terrorism prompts further research on the topic. Based on previous literature, the current paper attempts to determine whether factors can be identified which contribute to Western individuals joining Islamic extremist organizations and engaging in terrorist behavior in the West. Four factors are discussed: While extensive scientific literature supports the view that identity crises and relative deprivation play a crucial role in turning Western individuals to terrorism, evidence on the role of personal characteristics and empathy, on the other hand, is still too scarce to allow any clear scientific judgment.

  8. Professional development in person: identity and the construction of teaching within a high school science department

    Science.gov (United States)

    Deneroff, Victoria

    2016-06-01

    This is a narrative inquiry into the role of professional development in the construction of teaching practice by an exemplary urban high school science teacher. I collected data during 3 years of ethnographic participant observation in Marie Gonzalez's classroom. Marie told stories about her experiences in ten years of professional development focused on inquiry science teaching. I use a social practice theory lens to analyze my own stories as well as Marie's. I make the case that science teaching is best understood as mediated by socially-constructed identities rather than as the end-product of knowledge and beliefs. The cognitive paradigm for understanding teachers' professional learning fails to consistently produce transformations of teaching practice. In order to design professional development with science teachers that is generative of new knowledge, and is self-sustaining, we must understand how to build knowledge of how to problematize identities and consciously use social practice theory.

  9. Designer's identity: Development of personal attributes and design skills over education

    DEFF Research Database (Denmark)

    Kunrath, Kamila; Cash, Philip; Li-Ying, Jason

    2017-01-01

    Designers’ Professional identity (DPI) is a social- and self-perceptive construct through which designers are able to identify themselves. To understand the development of DPI, not just as a profession but also as an educational process, there is a need to consider the designer as both individual...... and trained professional. These interactions become also a necessary foundation for professionalism that is especially important for design activity. For this study, a psychometric survey was developed by taking in consideration both aspects of DPI, making use of a set of elements distilled from literature...... to the process of identity consolidation over the educational period. Further, DPI consolidates through a lifelong learning process. These results provide an initial insight into the development of DPI and the challenges of measuring this subjective aspect over education....

  10. Simulation of multiple personalities: a review of research comparing diagnosed and simulated dissociative identity disorder.

    Science.gov (United States)

    Boysen, Guy A; VanBergen, Alexandra

    2014-02-01

    Dissociative Identity Disorder (DID) has long been surrounded by controversy due to disagreement about its etiology and the validity of its associated phenomena. Researchers have conducted studies comparing people diagnosed with DID and people simulating DID in order to better understand the disorder. The current research presents a systematic review of this DID simulation research. The literature consists of 20 studies and contains several replicated findings. Replicated differences between the groups include symptom presentation, identity presentation, and cognitive processing deficits. Replicated similarities between the groups include interidentity transfer of information as shown by measures of recall, recognition, and priming. Despite some consistent findings, this research literature is hindered by methodological flaws that reduce experimental validity. Copyright © 2013 Elsevier Ltd. All rights reserved.

  11. Role identity and its implications in the athlete’s personal development

    Directory of Open Access Journals (Sweden)

    Paul Miron

    2010-12-01

    Full Text Available Purpose. This study seeks to highlight the strong identification of athletes with the role they fulfill and the possible consequences that a limited self-identity can have upon entering a transition phase towards another career outside the sporting world and other social settings.Methods. For accomplishing the goals of this essay I have used the methods of observation and bibliographical study.Conclusions. Analysis reveals that coincidences, both positive and negative, associated with this strong sportive identity, do indeed exist. Sportive identity has been related to improvement of sportive performances rise of self-confidence improvement of the social relations and interactions and diminishment of anxiety. On the other hand, one-dimensional orientation towards achieving sportive excellence, which comes along with competing in the elite class, can have potential psychological and social dangers The high level of identification with the role of an athlete can devalorify a quality education or even completely ignore it in some of the development stages, thus taking away from the athletes’ important competences necessary in the development of the individual.

  12. Differences in personality traits between male-to-female and female-to-male gender identity disorder subjects.

    Science.gov (United States)

    Miyajima, Eiichi; Taira, Naoki; Koda, Munenaga; Kondo, Tsuyoshi

    2014-12-15

    The present study aimed to investigate differences in personality traits among male-to-female (MtF), female-to-male (FtM) gender identity disorder (GID) subjects and non-transsexual male (M) and female (F) controls. Subjects were 72 MtF and 187 FtM GID subjects without psychiatric comorbidities together with 184 male and 159 female non-transsexual controls. Personality traits were assessed using a short version of the Temperament and Character Inventory (TCI-125). Group comparisons were made by two-way ANOVA. Statistical significances were observed as follows: 1) lower novelty seeking in FtM than in M or MtF, 2) higher reward dependence in FtM than in M, 3) higher cooperativeness in FtM than in M or MtF, 4) the highest self-transcendence in MtF among all the groups. The highest self-transcendence in MtF subjects may reflect their vulnerable identity and constrained adaptation to society as the minority. Nevertheless, higher reward dependence and cooperativeness in FtM subjects can be related to more determined motivation for the treatments of GID and might promise better social functioning and adjustment than MtF subjects. Copyright © 2014 Elsevier Ireland Ltd. All rights reserved.

  13. [Tacit metarepresentation and affective sense of personal identity. An approach to understanding severe psychiatric disorders of adolescence and young adulthood].

    Science.gov (United States)

    Balbi, Juan

    2011-01-01

    The results of present-day research in the field of "Dissociation Paradigm", regarding the capacity of the human mind to perceive, learn, and store information that in appearance passes as unnoticed, support the constructivist hypothesis of the active, selective and constructive condition of consciousness, in addition to the existence of a tacit dimension of knowledge that operates in functional relationship with the former. Unconscious mental states are intrinsically intentional. This is to say that they imply a semantic or cognitive connotation that is capable of affecting phenomenical experience and therefore behavior. In addition, the precocious existence of a tacit metarepresentational system in normally developed children has been proven, which is essential for guaranteeing the deployment of the process of functional coevolution between affectivity and consciousness, by which the experience of personal identity is acquired. These discoveries allow the inference of a "tacit affective metarepresentational recurrence", the organizational foundation on which a unified, sustainable, and continuous sense of the experience of personal identity is structured, and also allow us to hypothesize a "tacit metarepresentational mourning", a specific type of grief which is the chief foundation of the majority of psychopathological disorders. This concept may represent a potential explanation of the severe mental disorders of adolescence and young adulthood. The hypothesis of the present work is that, in the ambiguous context of Postmodern Culture, the prolongation of the adolescent period, facilitated by the welfare state, hinders the dealing with the aforementioned mourning, leading to an increment of depressive states and suicidal behavior among young people.

  14. The acquisition of face and person identity information following anterior temporal lobectomy.

    Science.gov (United States)

    Moran, Maria; Seidenberg, Michael; Sabsevitz, Dave; Swanson, Sara; Hermann, Bruce

    2005-05-01

    Thirty unilateral anterior temporal lobectomy (ATL) subjects (15 right and 15 left) and 15 controls were presented a multitrial learning task in which unfamiliar faces were paired with biographical information (occupation, city location, and a person's name). Face recognition hits were similar between groups, but the right ATL group committed more false-positive errors to face foils. Both left and right ATL groups were impaired relative to controls in acquiring biographical information, but the deficit was more pronounced for the left ATL group. Recall levels also varied for the different types of biographical information; occupation was most commonly recalled followed by city name and person name. In addition, city and person name recall was more likely when occupation was also recalled. Overall, recall of biographical information was positively correlated with clinical measures of anterograde episodic memory. Findings are discussed in terms of the role of the temporal lobe and associative learning ability in the successful acquisition of new face semantic (biographical) representations.

  15. On being peripheral: Effects of identity insecurity on personal and collective self-esteem

    NARCIS (Netherlands)

    Jetten, J.; Branscombe, N.R.; Spears, R.

    2002-01-01

    We examined collective self-esteem and personal self-esteem as a function of anticipated changes in one's prototypicality within a valued ingroup. In Study 1 (N = 80), all participants received information that they were currently peripheral group members. Expectations for the future were then

  16. Change and Persistence of Personal Identities after the Transition to Retirement

    Science.gov (United States)

    Teuscher, Ursina

    2010-01-01

    This study addresses the question of how retired people's self-image differs from that of working people, and what factors predict people's self-definition as professionals or retirees. Seven hundred ninety-two Swiss persons aged 58-70 (386 men, 406 women; 349 not retired, 443 retired) were asked to rate the importance of different…

  17. College Experiences for Students with Autism Spectrum Disorder: Personal Identity, Public Disclosure, and Institutional Support

    Science.gov (United States)

    Cox, Bradley E.; Thompson, Kerry; Anderson, Amelia; Mintz, Amanda; Locks, Taylor; Morgan, Lindee; Edelstein, Jeffrey; Wolz, Abigail

    2017-01-01

    Individuals with autism spectrum disorder (ASD) are completing high school with reasonable expectations for postsecondary success. College educators are likely ill prepared to provide appropriate support for these students. Based on personal interviews with a diverse group of students with autism, this study (a) amplifies these students' voices,…

  18. On being peripheral : effects of identity insecurity on personal and collective self-esteem

    NARCIS (Netherlands)

    Jetten, J; Branscombe, NR; Spears, R

    2002-01-01

    We examined collective self-esteem and personal self-esteem as a function of anticipated changes in one's prototypicality, within a valued ingroup. In Study, 1 (N=80), all participants received information that they, it-ere currently peripheral group members. Expectations for the future were then

  19. Personal practical theories, self-identity, and astronomy teachers' interactive decision making

    Science.gov (United States)

    Richmond, Marvin Elliot

    2005-12-01

    Research has suggested that beliefs play a major role in selecting and defining teaching tasks and organizing the knowledge needed to perform those tasks. Teachers, consciously or unconsciously, depend on beliefs because they work in ill-structured domains where traditional problem solving techniques and academic knowledge do not work as well. The goal of this project was to establish, if possible, a causal link between teacher beliefs and interactive decision making through empirical, qualitative research. The hypothesis was, that when faced with those sorts of situations, the participants would fall back on belief systems that did not necessarily have a rational basis. The research focused on astronomy teachers in community colleges. Since most science reform efforts are directed toward primary and secondary schools, community college science teaching remains a neglected area of study. Yet community colleges are predicted to play an increasingly important role in higher education in the near future. For many students, community college science classes may represent their last encounter with formal, academic, science programs. The three participants were interviewed and observed in the classroom over an extended period. Initial interviews were conducted with each participant to capture stated beliefs. After the extensive classroom observations, stimulated recall interviews were held with each participant viewing short, edited segments of the classroom videotapes. No direct causal link between beliefs (in the conventional sense of the word) and participant decision making is apparent from this empirical research. However, the construct of personal practical theories, which includes beliefs as one component, shows promise as a significant determining factor in interactive decision making. Themes have been developed that represent each participant's personal practical theories. The strongest theme, applicable to all participants, is based on the notion of

  20. THE ANALYZE OF THE PERSONALITY, THE VISUAL IDENTITY AND BRAND COMMUNICATION OF DESTINATION - ROMANIA

    Directory of Open Access Journals (Sweden)

    IORDACHE MARIA CARMEN

    2014-05-01

    Full Text Available The development of a national tourist brand has an impact on medium term both on the country brand development as well as on the growth of domestic and foreign tourist markets. Tourism is one of the axes that generate income to the government and a tourist brand is only a part of a country brand - indeed an important one through the high visibility it enjoys. The development of a national tourist brand is particularly important as Romania does not have a sharp image as a tourist destination, with its internal and external promotion quite inadequate and undersized. Therefore, this activity must overcome the identity crisis that Romania faces today. A wider involvement in promoting national resources and values would generate benefits for various categories: raising living standards through the expansion and development of economic activities, openness to what a value system means in tourism and sustainable tourism, attracting foreign investors, new business opportunities, increasing public confidence in the business environment, international fundraising for developing ecological and cultural projects etc

  1. Three cases of dissociative identity disorder and co-occurring borderline personality disorder treated with dynamic deconstructive psychotherapy.

    Science.gov (United States)

    Chlebowski, Susan M; Gregory, Robert J

    2012-01-01

    Dissociative Identity Disorder (DID) is an under-researched entity and there are no clinical trials employing manual-based therapies and validated outcome measures. There is evidence that borderline personality disorder (BPD) commonly co-occurs with DID and can worsen its course. The authors report three cases of DID with co-occurring BPD that we successfully treated with a manual-based treatment, Dynamic Deconstructive Psychotherapy (DDP). Each of the three clients achieved a 34% to 79% reduction in their Dissociative Experiences Scale scores within 12 months of initiating therapy. Dynamic Deconstructive Psychotherapy was developed for treatment refractory BPD and differs in some respects from expert consensus treatment of DID. It may be a promising modality for DID complicated by co-occurring BPD.

  2. The Civil Identity Registry Unification and Personal Data Protection in Brazil

    Directory of Open Access Journals (Sweden)

    José Renato Gaziero Cella

    2016-06-01

    Full Text Available There has long been treated the idea of discipline society and control society, dealing, for example, the works of Michel Foucault and Gilles Deleuze. The contemporary brought numerous developments in relation to the concepts assigned by Foucault and Deleuze, and many of these results were predicted by the analysis of events by these thinkers, however we are still in search for understanding the evolution of societies in relation to power and its maintenance, Law, Ethics, and possible future social outcomes. It is necessary to understand the dialectics of this topic to understand the current situation and thinking about the future. The scope of this paper is to understand the social control and the ramifications of power called the Information Society, both in public and in the private sphere. The state of the art, with the advent of internet, it is significant in the history of communications in terms of speed and agility. In light of the theoretical framework chosen for the development of this paper, the control is established by the idea of discipline and the society of control is the successor to the disciplinary paradigm (the discipline is already incorporated. For Deleuze, surveillance and monitoring activities are forms of control, ie, the reinvention of Jeremy Bentham’s panopticon. The ramifications of this form of society make use of the internet and its easy access to propagate the largest number of people possible, whether through social networking programs, reality shows, including surveillance cameras, just like George Orwell referred in his book 1984. We intend to analyze the information quickly overcomes the lack of security, given that it is today, for example, cases such as the Steering Committee of the National Civil Identification Record System - Brazilian Sirc, just implement a project- emission pilot of the new ID card - RIC, where you may have a unification of personal data and the bureaucracy of citizen service services

  3. Two barriers to realizing the benefits of biometrics: a chain perspective on biometrics and identity fraud as biometrics' real challenge

    Science.gov (United States)

    Grijpink, Jan

    2004-06-01

    Along at least twelve dimensions biometric systems might vary. We need to exploit this variety to manoeuvre biometrics into place to be able to realise its social potential. Subsequently, two perspectives on biometrics are proposed revealing that biometrics will probably be ineffective in combating identity fraud, organised crime and terrorism: (1) the value chain perspective explains the first barrier: our strong preference for large scale biometric systems for general compulsory use. These biometric systems cause successful infringements to spread unnoticed. A biometric system will only function adequately if biometrics is indispensable for solving the dominant chain problem. Multi-chain use of biometrics takes it beyond the boundaries of good manageability. (2) the identity fraud perspective exposes the second barrier: our traditional approach to identity verification. We focus on identity documents, neglecting the person and the situation involved. Moreover, western legal cultures have made identity verification procedures known, transparent, uniform and predictable. Thus, we have developed a blind spot to identity fraud. Biometrics provides good potential to better checking persons, but will probably be used to enhance identity documents. Biometrics will only pay off if it confronts the identity fraudster with less predictable verification processes and more risks of his identity fraud being spotted. Standardised large scale applications of biometrics for general compulsory use without countervailing measures will probably produce the reverse. This contribution tentatively presents a few headlines for an overall biometrics strategy that could better resist identity fraud.

  4. Civil Identity

    DEFF Research Database (Denmark)

    Petersen, Lars Axel

    In this paper I will go through a catalogue of examples of contexts in which the term civil identity is currently used, ranging from the formal and technical process of linking a set of administrative and other events to an individual biological person by means of identity cards, fingerprints, iris...... of Israel to Luce Irigaray's Feminist agenda of elaborating gender specific civil identities. My intention is to investigate whether these different employments of 'civil identity' point towards a common, and fairly well defined object field asking questions of contemporary relevance to the philosophy...

  5. Neural correlates of ostracism in transgender persons living according to their gender identity: a potential risk marker for psychopathology?

    Science.gov (United States)

    Mueller, Sven C; Wierckx, Katrien; Boccadoro, Sara; T'Sjoen, Guy

    2018-01-15

    Stigmatization in society carries a high risk for development of psychopathology. Transgender persons are at particularly high risk for such stigmatization and social rejection by others. However, the neural correlates of ostracism in this group have not been captured. Twenty transgender men (TM, female-to-male) and 19 transgender women (TW, male-to-female) already living in their gender identity and 20 cisgender men (CM) and 20 cisgender women (CW) completed a cyberball task assessing both exclusion and re-inclusion during functional magnetic resonance imaging (fMRI). During psychosocial stress between-group differences were found in the dorsal and ventral anterior cingulate cortex (ACC) and the inferior frontal gyrus (IFG). Patterns were consistent with sex assigned at birth, i.e. CW showed greater activation in dorsal ACC and IFG relative to CM and TW. During re-inclusion, transgender persons showed greater ventral ACC activity relative to CW, possibly indicating persistent feelings of exclusion. Functional connectivity analyses supported these findings but showed a particularly altered functional connectivity between ACC and lateral prefrontal cortex in TM, which may suggest reduced emotional regulation to the ostracism experience in this group. Depressive symptoms or hormonal levels were not associated with these findings. The results bear implications for the role of social exclusion in development of mental health problems in socially marginalized groups.

  6. Social reintegration of convicts. The paradigm of personal, social and cultural-civilization identity

    Directory of Open Access Journals (Sweden)

    Andrzej Bałandynowicz

    2011-12-01

    Full Text Available The diagnosis of the social situation of children and youth shows a presence of at least three unfavourable phenomena determining the result of resocialization. Firstly, it is an individual and group depression resulting in a loss of control over everyday environment and the loss of social value as a consequence of a feeling of lack of usefulness, autonomy, and independence. High degree of unfulfilling of the basic and developmental needs leads the young people to pauperization, exclusion and resignation from their own aspirations and life goals. Another phenomenon which distorts the entity’s process of taking root in a society is sociopathy, understood as a form of egoism and indifference to human fate. It emerges in an atmosphere of excessive competition and fulfilling needs even at a price of harming others and extreme indifference, lack of empathy for their existential and educational problems. The process of social sociopathy is accompanied by an excessive commercialisation and careerism. Person becomes an object, loses his distinctness and ceases to be responsible for his choices made in the process of socialization. Present knowledge of the resocialization proves that the analyses of functioning of the children and adults in their real environment gives the most valuable diagnostic data, helpful when setting strategy for correcting faulty interactions between family members.

  7. Designer's Identity

    DEFF Research Database (Denmark)

    Kunrath, Kamila; Cash, Philip; Li-Ying, Jason

    2016-01-01

    A designer’s professional identity (DPI) develops through both education and professional experience, building on core personality traits and innate skills. In this paper a systematic literature review and a secondary narrative review were developed in order to map personal attributes and design...

  8. Medical Identity

    DEFF Research Database (Denmark)

    Musaeus, Peter

    2015-01-01

    Purpose: To examine philosophical stances underpinning medical identity and assess the conceptual relationship between physician, medical practice and culture. Argument: Medical identity is about the ideals and moral positions that physicians take when justifying themselves. Medical identity...... hedonistic versus sentimentalist approaches to medical identity. The sociocultural philosophical analysis of medical identity can shed light on what it means conceptually for a physician to harbor beliefs associated with him/her being taken to be an autonomous professional. It is important because it touches...... on the meaning of being a compassionate, good and skilled physician, making its relevance to person-centered medicine self-evident. Conclusion: Medical identity should be analyzed with reference to literature, philosophy and medical practice in order for the physician to exercise a reflective position...

  9. Identity paradoxes

    Directory of Open Access Journals (Sweden)

    Đurić Jelena

    2010-01-01

    Full Text Available The article considers paradoxical nature of identity that emerges from: 1 the very concept of identity whose abstract generality unites various and even opposite features; 2 the processual nature of reality that is easier to express in the poetical metaphors or abstract principles than in unambiguous conceptual networks; 3 the oppose relationship between being and knowledge, mind and matter, subject and object, self and personality. Entangled in the labyrinth which evade efforts to be conceptually defined, the modern thinking of identity moves towards abandoning the idea of “self” on behalf of the “ego” and towards the misapprehension of identity as being identical. This corresponds to the “time of the lost spirit” stretched between the simultaneous need to find an identity and to give it up.

  10. Revision of the grandiosity dimension of the Dimensional Clinical Personality Inventory and verification of its psychometric properties

    Directory of Open Access Journals (Sweden)

    Lucas de Francisco Carvalho

    Full Text Available Abstract Introduction: Personality disorders are among the most common disorders seen in clinical psychology. However, in Brazil there are few instruments for assessing the pathological characteristics of personality. Objective: To revise the grandiosity dimension of the Brazilian Dimensional Clinical Personality Inventory (Inventário Dimensional Clínico da Personalidade [IDCP] and investigate its psychometric properties. Methods: A total of 225 people participated in this study. Their ages ranged from 18 to 66 years (mean [M] = 26.2, standard deviation [SD] = 8.1 and the majority were female (n = 162, 70.1%. The IDCP and the Brazilian versions of the Revised NEO Personality Inventory (NEO PI-R and the Personality Inventory for DSM-5 (PID-5 were administered to all participants. Results: A total of 285 new items were developed and content analysis was used to select 33 of these to comprise the final version destined for administration. The results of parallel analysis and factor analysis identified four interpretable factors. Internal consistency coefficients were deemed acceptable and varied from 0.73 to 0.84 for the factors. Additionally, the expected correlations between the IDCP Inventory and the other tests were observed. Conclusion: This study demonstrates the revised dimension's suitability for assessment of the pathological traits of narcissistic personality disorder.

  11. Integrating Fingerprint Verification into the Smart Card-Based Healthcare Information System

    Directory of Open Access Journals (Sweden)

    Jin-Won Park

    2009-01-01

    Full Text Available As VLSI technology has been improved, a smart card employing 32-bit processors has been released, and more personal information such as medical, financial data can be stored in the card. Thus, it becomes important to protect personal information stored in the card. Verification of the card holder's identity using a fingerprint has advantages over the present practices of Personal Identification Numbers (PINs and passwords. However, the computational workload of fingerprint verification is much heavier than that of the typical PIN-based solution. In this paper, we consider three strategies to implement fingerprint verification in a smart card environment and how to distribute the modules of fingerprint verification between the smart card and the card reader. We first evaluate the number of instructions of each step of a typical fingerprint verification algorithm, and estimate the execution time of several cryptographic algorithms to guarantee the security/privacy of the fingerprint data transmitted in the smart card with the client-server environment. Based on the evaluation results, we analyze each scenario with respect to the security level and the real-time execution requirements in order to implement fingerprint verification in the smart card with the client-server environment.

  12. Integrating Fingerprint Verification into the Smart Card-Based Healthcare Information System

    Science.gov (United States)

    Moon, Daesung; Chung, Yongwha; Pan, Sung Bum; Park, Jin-Won

    2009-12-01

    As VLSI technology has been improved, a smart card employing 32-bit processors has been released, and more personal information such as medical, financial data can be stored in the card. Thus, it becomes important to protect personal information stored in the card. Verification of the card holder's identity using a fingerprint has advantages over the present practices of Personal Identification Numbers (PINs) and passwords. However, the computational workload of fingerprint verification is much heavier than that of the typical PIN-based solution. In this paper, we consider three strategies to implement fingerprint verification in a smart card environment and how to distribute the modules of fingerprint verification between the smart card and the card reader. We first evaluate the number of instructions of each step of a typical fingerprint verification algorithm, and estimate the execution time of several cryptographic algorithms to guarantee the security/privacy of the fingerprint data transmitted in the smart card with the client-server environment. Based on the evaluation results, we analyze each scenario with respect to the security level and the real-time execution requirements in order to implement fingerprint verification in the smart card with the client-server environment.

  13. The Pattern of Sexual Interest of Female-to-Male Transsexual Persons With Gender Identity Disorder Does Not Resemble That of Biological Men: An Eye-Tracking Study

    Directory of Open Access Journals (Sweden)

    Akira Tsujimura

    2017-09-01

    Tsujimura A, Kiuchi H, Soda T, et al. The Pattern of Sexual Interest of Female-to-Male Transsexual Persons With Gender Identity Disorder Does Not Resemble That of Biological Men: An Eye-Tracking Study. Sex Med 2017;5:e169–e174.

  14. African communalism and public health policies: the relevance ofindigenous concepts of personal identity to HIV/AIDS policies in Botswana.

    Science.gov (United States)

    Jensen, Kipton; Gaie, Joseph Br

    2010-09-01

    This article explores the possible relevance of African communalism to HIV/AIDS policies in Botswana and other parts of sub-Saharan Africa. We examine various interpretations of African communalism, which many consider to be the cardinal insight of African thought. We suggest several applications of this indigenous notion of personhood to HIV prevention in general and to routine HIV-testing policies in particular. This analysis demonstrates some of the ethical dilemmas and cultural complexities inherent in designing as well as implementing effective HIV-prevention programmes that strike a conscientious balance between protecting individual freedoms and securing public health. Recovering past traditions (such as African conceptions of personal identity) is valuable not only for the purpose of self-identification but also for helping us meet the challenges and problems of today in Africa. We also suggest that the human-rights-based approach to HIV prevention, which strives to protect individuals, is possibly incompatible with the socio-ethical ideals espoused by African communalism. We conclude that public health programmes in Botswana and other parts of sub-Saharan Africa would be more effective if those who designed and implemented them possessed a better understanding of indigenous conceptions of personhood or human agency as well as existing ethno-medical beliefs and cultural practices.

  15. Fashioning Identity

    DEFF Research Database (Denmark)

    Mackinney-Valentin, Maria

    We dress to communicate who we are, or who we would like others to think we are, telling seductive fashion narratives through our adornment. Yet, today, fashion has been democratized through high-low collaborations, social media and real-time fashion mediation, complicating the basic dynamic...... of identity displays, and creating tension between personal statements and social performances. Fashioning Identity explores how this tension is performed through fashion production and consumption,by examining a diverse series of case studies - from ninety-year old fashion icons to the paradoxical rebellion...... by readdressing Fred Davis' seminal concept of 'identity ambivalence' in Fashion, Culture and Identity (1992), Mackinney-Valentin argues that we are in an epoch of 'status ambivalence', in which fashioning one's own identity has become increasingly complicated....

  16. OPINIONS AND ATTITUDES OF PARENTS AND STUDENTS FOR SEXUAL DEVELOPMENT, SEXUAL BEHAVIOR AND GENDER IDENTITY OF PERSONS WITH AUTISM IN THE REPUBLIC OF MACEDONIA

    Directory of Open Access Journals (Sweden)

    Bisera MLADENOVSKA

    2010-04-01

    Full Text Available Persons with autism can experience severe issues during the puberty and adolescence resulting from the changes that occur in their body. People with autism are sexual beings. They have sexual needs and desires as other people. Sexual development is part of the overall development of their personality.The main objective of this research was to present sexual development, sexual behavior, and sexual identity among persons with autism. Furthermore, we determined the views and opinions of the parents and students, special educators and rehabilitators, about children with autism. Basic tasks of this research were: to determine whether persons with autism have a clear picture and concept of their sexuality, whether the parents discuss this topic with their children, whether and how persons with autism know what sex is, what is contraception, unwanted pregnancy, sexually transmitted diseases or intimate parts of the body, whether they show some kind of sexual behavior, and whether the parents and students should be educated regarding the sexual development, behavior, and sexual identity of persons with autism.The survey was conducted over a period of almost 3 months, which included 94 respondents.Obtained data was collected, grouped, tabled, and processed with the standard statistical program Microsoft Office Excel 2003, applying χ2 tests and Fisher's Еxact test. Statistical important difference was at the level of p<0.05.From the analysis and interpretation of the results, we can conclude that in Macedonian families and schools there is a very small extent or no existence of communication between the parents and professionals with persons with autism about sexual development, sexual behavior, and sexual identity. Persons with autism have very little or no general knowledge about sexuality.

  17. 'I am not a dyslexic person I'm a person with dyslexia': identity constructions of dyslexia among students in nurse education.

    Science.gov (United States)

    Evans, William

    2014-02-01

    To introduce how nursing students discursively construct their dyslexic identities. Identity mediates many important facets of a student's scholarly journey and the availability and use of discourses play a critical part in their ongoing construction. A discourse-based design was used to examine the language employed by students in constructing their dyslexic identities. Using narrative methods, 12 student nurses with dyslexia from two higher education institutions in the Republic of Ireland were interviewed during the period February-July 2012. Discourse analysis of interviews entailed a two-stage approach: leading identity analysis followed by thematic analysis. Discourses used by students to construct their dyslexic identity correspond with positions on an 'Embracer, Passive Engager and Resister' continuum heuristic. The majority of students rejected any reference to using medical or disabled discourses and instead drew on contemporary language in constructing their dyslexic identity. Nine of the 12 students did not disclose their dyslexic identity in practice settings and drew on not being understood to support this position. In addition, a discourse linking 'being stupid' with dyslexia was pervasive in most student narratives and evolved from historical as well as more recent interactions in nurse education. This study indicates variation in how students discursively construct their dyslexic identities, which, in turn, has an impact on disclosure behaviours. Policy leaders must continue to be mindful of wider sociocultural and individualized understandings of dyslexic identities to enhance inclusion prerogatives. © 2013 John Wiley & Sons Ltd.

  18. The signer and the sign: cortical correlates of person identity and language processing from point-light displays.

    Science.gov (United States)

    Campbell, Ruth; Capek, Cheryl M; Gazarian, Karine; MacSweeney, Mairéad; Woll, Bencie; David, Anthony S; McGuire, Philip K; Brammer, Michael J

    2011-09-01

    In this study, the first to explore the cortical correlates of signed language (SL) processing under point-light display conditions, the observer identified either a signer or a lexical sign from a display in which different signers were seen producing a number of different individual signs. Many of the regions activated by point-light under these conditions replicated those previously reported for full-image displays, including regions within the inferior temporal cortex that are specialised for face and body-part identification, although such body parts were invisible in the display. Right frontal regions were also recruited - a pattern not usually seen in full-image SL processing. This activation may reflect the recruitment of information about person identity from the reduced display. A direct comparison of identify-signer and identify-sign conditions showed these tasks relied to a different extent on the posterior inferior regions. Signer identification elicited greater activation than sign identification in (bilateral) inferior temporal gyri (BA 37/19), fusiform gyri (BA 37), middle and posterior portions of the middle temporal gyri (BAs 37 and 19), and superior temporal gyri (BA 22 and 42). Right inferior frontal cortex was a further focus of differential activation (signer>sign). These findings suggest that the neural systems supporting point-light displays for the processing of SL rely on a cortical network including areas of the inferior temporal cortex specialized for face and body identification. While this might be predicted from other studies of whole body point-light actions (Vaina, Solomon, Chowdhury, Sinha, & Belliveau, 2001) it is not predicted from the perspective of spoken language processing, where voice characteristics and speech content recruit distinct cortical regions (Stevens, 2004) in addition to a common network. In this respect, our findings contrast with studies of voice/speech recognition (Von Kriegstein, Kleinschmidt, Sterzer

  19. Did Curiosity Kill the Cat? Relationship Between Trait Curiosity, Creative Self-Efficacy and Creative Personal Identity

    Directory of Open Access Journals (Sweden)

    Maciej Karwowski

    2012-11-01

    Full Text Available The main objective of the study presented in this article was to examine the relationship between trait curiosity and two self-concept constructs which are gaining popularity in the creativity literature – creative self-efficacy (CSE and creative personal identity (CPI. Although the role of curiosity in creativity seems well established, in fact there is little empirical evidence of the relationship between curiosity treated as a trait and both CSE and CPI. In a study conducted on a sample of middle and high school Polish students (N = 284; 55% female, aged 13–18, M = 14.74, SD = 1.14, curiosity was measured by the Curiosity and Exploration Inventory (CEI-II: Kashdan, Gallagher, Silvia, Winterstein, Breen, Terhar, & Steger, 2009 and CSE and CPI by the Short Scale of Creative Self (SSCS; Karwowski, Lebuda, & Wiśniewska, in press. Confirmatory factor analysis revealed the existence of substantial correlations between measured constructs. Latent factor of CSE correlated strongly with a tendency to seek out new experiences (stretching, r = .72 and an acceptance of unpredictability (embracing, r = .67, while CPI correlated substantially with stretching (r = .62 and slightly less with embracing (r = .48 – all correlations were highly reliable (p < .001. Hierarchical confirmatory factor analysis showed the existence of a strong relationship between the higher-order factor of curiosity (composed of stretching and embracing and creative self (composed of CSE and CPI: r = .75, which may indicate common basis of creativity and curiosity. The consequences of curiosity for the development of CSE and CPI are discussed.

  20. Effects of different steps in gender reassignment therapy on psychopathology: a prospective study of persons with a gender identity disorder.

    Science.gov (United States)

    Heylens, Gunter; Verroken, Charlotte; De Cock, Sanne; T'Sjoen, Guy; De Cuypere, Griet

    2014-01-01

    At the start of gender reassignment therapy, persons with a gender identity disorder (GID) may deal with various forms of psychopathology. Until now, a limited number of publications focus on the effect of the different phases of treatment on this comorbidity and other psychosocial factors. The aim of this study was to investigate how gender reassignment therapy affects psychopathology and other psychosocial factors. This is a prospective study that assessed 57 individuals with GID by using the Symptom Checklist-90 (SCL-90) at three different points of time: at presentation, after the start of hormonal treatment, and after sex reassignment surgery (SRS). Questionnaires on psychosocial variables were used to evaluate the evolution between the presentation and the postoperative period. The data were statistically analyzed by using SPSS 19.0, with significance levels set at P < 0.05. The psychopathological parameters include overall psychoneurotic distress, anxiety, agoraphobia, depression, somatization, paranoid ideation/psychoticism, interpersonal sensitivity, hostility, and sleeping problems. The psychosocial parameters consist of relationship, living situation, employment, sexual contacts, social contacts, substance abuse, and suicide attempt. A difference in SCL-90 overall psychoneurotic distress was observed at the different points of assessments (P = 0.003), with the most prominent decrease occurring after the initiation of hormone therapy (P < 0.001). Significant decreases were found in the subscales such as anxiety, depression, interpersonal sensitivity, and hostility. Furthermore, the SCL-90 scores resembled those of a general population after hormone therapy was initiated. Analysis of the psychosocial variables showed no significant differences between pre- and postoperative assessments. A marked reduction in psychopathology occurs during the process of sex reassignment therapy, especially after the initiation of hormone therapy. © 2013

  1. ECG based biometrics verification system using LabVIEW

    Directory of Open Access Journals (Sweden)

    Sunil Kumar Singla

    2010-07-01

    Full Text Available Biometric based authentication systems provide solutions to the problems in high security which remain with conventionalsecurity systems. In a biometric verification system, human’s biological parameters (such as voice, finger print,palm print or hand geometry, face, iris etc. are used to verify the authenticity of a person. These parameters are good to beused as biometric parameters but do not provide the guarantee that the person is present and alive. As voice can be copied,finger print can be picked from glass on synthetic skin and in face recognition system due to genetic factors identical twinsor father-son may have the same facial appearance. ECG does not have these problems. It can not be recorded without theknowledge of the person and ECG of every person is unique even identical twins have different ECG. In this paper an ECGbasedbiometrics verification system which was developed using Laboratory Virtual Instruments Engineering Workbench(LabVIEW version 7.1 is discussed. Experiments were conducted on the database stored in the laboratory of 20 individualshaving 10 samples each and the results revealed a false rejection rate (FRR of 3% and false acceptance rate (FAR of 3.21%.

  2. Identity processes and coping strategies in college students : Short-term longitudinal dynamics and the role of personality

    NARCIS (Netherlands)

    Luyckx, K.; Klimstra, T.A.; Duriez, B.; Schwartz, S.J.; Vanhalst, J.

    2012-01-01

    Coping strategies and identity processes are hypothesized to influence one another over time. This three-wave longitudinal study (N = 458; 84.9% women) examined, for the first time, how and to what extent identity processes (i.e., commitment making, identification with commitment, exploration in

  3. Personal and Interpersonal Value System, Self-Perception and Identity of Spanish Nurses: A Cross-Sectional Study

    Science.gov (United States)

    Losa Iglesias, Marta Elena; de Bengoa Vallejo, Ricardo Becerro

    2011-01-01

    The aim of this research is to identify the predominant values system among a sample of Spanish nurses, to identify how values are tied to professional nursing identity and determine differences in values and identity between socio-demographic variables as a gender, citizenship and/or nursing service. Cross-sectional study was performed with a…

  4. "It Is Not Wit, It Is Truth:" Transcending the Narrative Bounds of Professional and Personal Identity in Life and in Art.

    Science.gov (United States)

    Elliot, Michelle L

    2016-09-01

    Taking inspiration from the film Wit (2001), adapted from Margaret Edson's (1999) Pulitzer Prize-winning play, this article explores the particularities of witnessing a cinematic cancer narrative juxtaposed with the author's own cancer narrative. The analysis reveals the tenuous line between death and dying, illness and wellness, life and living and the resulting identities shaped in the process of understanding both from a personal and professional lens. By framing these representations of illness experience within the narrative constructions of drama, time, metaphor and morality, the personal stories of intellectual knowledge converging with intimate and embodied knowing are revealed.

  5. A pessoa com deficiência e a crise das identidades na contemporaneidade The handicapped person and identity crisis in the present day

    Directory of Open Access Journals (Sweden)

    Rita de Cássia Barbosa Paiva Magalhães

    2010-04-01

    those individuals who differ from what is socially expected. The identity of the handicapped person tends, because of the stigma, to undergo processes of social control, in which important opportunities for metamorphosis are denied. Discussing identity seems to be, therefore, the connecting thread for understanding social and scholastic inclusion of the handicapped person

  6. Verification Image of The Veins on The Back Palm with Modified Local Line Binary Pattern (MLLBP) and Histogram

    Science.gov (United States)

    Prijono, Agus; Darmawan Hangkawidjaja, Aan; Ratnadewi; Saleh Ahmar, Ansari

    2018-01-01

    The verification to person who is used today as a fingerprint, signature, personal identification number (PIN) in the bank system, identity cards, attendance, easily copied and forged. This causes the system not secure and is vulnerable to unauthorized persons to access the system. In this research will be implemented verification system using the image of the blood vessels in the back of the palms as recognition more difficult to imitate because it is located inside the human body so it is safer to use. The blood vessels located at the back of the human hand is unique, even humans twins have a different image of the blood vessels. Besides the image of the blood vessels do not depend on a person’s age, so it can be used for long term, except in the case of an accident, or disease. Because of the unique vein pattern recognition can be used in a person. In this paper, we used a modification method to perform the introduction of a person based on the image of the blood vessel that is using Modified Local Line Binary Pattern (MLLBP). The process of matching blood vessel image feature extraction using Hamming Distance. Test case of verification is done by calculating the percentage of acceptance of the same person. Rejection error occurs if a person was not matched by the system with the data itself. The 10 person with 15 image compared to 5 image vein for each person is resulted 80,67% successful Another test case of the verification is done by verified two image from different person that is forgery, and the verification will be true if the system can rejection the image forgery. The ten different person is not verified and the result is obtained 94%.

  7. RELATION OF IDENTITY AND SUBJECTIVE PICTURE OF THE COURSE OF LIFE OF THE PERSONALITY AT TEENAGERS AND YOUNG MEN

    Directory of Open Access Journals (Sweden)

    Mikhail Yuryevich Kuzmin

    2017-02-01

    Full Text Available The article analyzes the problem of relation between identity and subjective picture of a personality’s life line in subjects -adolescents and young people. In the course of theoretical analysis of the problem in native (Kulesh, Burovihina, Vechkanova and foreign sources the authors come to the conclusion that the type of the relation between identity and subjective picture of life line in the subjects of different age remains debatable. The empiric research was conducted on the sample of 150 subjects with the help of LifeLine by Cronic, SJeI-test bt Soldatova and Semantic differential methods. As a result the authors found out that there exists specific relation between identity and life line picture different in adolescents and young people. The higher the subjects-young people esteem themselves on the scales of Semantic differential method, the less attention they pay to their past. In general, it is typical for the subjects undergoing the crisis stages of identity forming and having low self-esteem to direct much attention to their past. And on the contrary, the subjects with mature, formed identity typically pay attention to their future.

  8. Exploring medical identity theft.

    Science.gov (United States)

    Mancilla, Desla; Moczygemba, Jackie

    2009-09-16

    The crime of medical identity theft is a growing concern in healthcare institutions. A mixed-method study design including a two-stage electronic survey, telephone survey follow-up, and on-site observations was used to evaluate current practices in admitting and registration departments to reduce the occurrence of medical identity theft. Survey participants were chief compliance officers in acute healthcare organizations and members of the Health Care Compliance Association. Study results indicate variance in whether or how patient identity is confirmed in healthcare settings. The findings of this study suggest that information systems need to be designed for more efficient identity management. Admitting and registration staff must be trained, and compliance with medical identity theft policies and procedures must be monitored. Finally, biometric identity management solutions should be considered for stronger patient identification verification.

  9. A performance evaluation of personnel identity verifiers

    International Nuclear Information System (INIS)

    Maxwell, R.L.; Wright, L.J.

    1987-01-01

    Personnel identity verification devices, which are based on the examination and assessment of a body feature or a unique repeatable personal action, are steadily improving. These biometric devices are becoming more practical with respect to accuracy, speed, user compatibility, reliability and cost, but more development is necessary to satisfy the varied and sometimes ill-defined future requirements of the security industry. In an attempt to maintain an awareness of the availability and the capabilities of identity verifiers for the DOE security community, Sandia Laboratories continues to comparatively evaluate the capabilities and improvements of developing devices. An evaluation of several recently available verifiers is discussed in this paper. Operating environments and procedures more typical of physical access control use can reveal performance substantially different from the basic laboratory tests

  10. Happiness and Values in the Formation of Personal Identity in Students of the Fifth and Sixth Grade at Primary School

    Science.gov (United States)

    Chorro, Estefanía Gomis; Fernández, María Ángela Morales; Corbí, Raquel Gilar

    2017-01-01

    The objective of this research is twofold: first intending to assess the level at which students prioritize happiness; and second discerning how the experience of happiness affects the formation of their identity and their relationship with their environment, taking into account the values deduced from their perceptions, and understanding from…

  11. Ideology and Personality: Aspects of Identity Formation in Adolescents with Strong Attitudes Toward Sex-Role Equalitarianism

    Science.gov (United States)

    Kirsch, Patricia Ann; And Others

    1976-01-01

    Adolescents with strong attitudes for and against the sex role ideology of the Women's Movement were administered a Q-sort to study flexibility-rigidity and independence-dependence. The results showed that beliefs in equalitarian sex role behaviors are significantly related to aspects of identity formation in white middle class adolescent boys and…

  12. Exploring Type-and-Identity-Based Proxy Re-Encryption Scheme to Securely Manage Personal Health Records

    NARCIS (Netherlands)

    Ibraimi, L.; Gangopadhyay, Aryya; Tang, Qiang; Hartel, Pieter H.; Jonker, Willem

    2010-01-01

    Commercial Web-based Personal-Health Record (PHR) systems can help patients to share their personal health records (PHRs) anytime from anywhere. PHRs are very sensitive data and an inappropriate disclosure may cause serious problems to an individual. Therefore commercial Web-based PHR systems have

  13. Being known, intimate, and valued: global self-verification and dyadic adjustment in couples and roommates.

    Science.gov (United States)

    Katz, Jennifer; Joiner, Thomas E

    2002-02-01

    We contend that close relationships provide adults with optimal opportunities for personal growth when relationship partners provide accurate, honest feedback. Accordingly, it was predicted that young adults would experience the relationship quality with relationship partners who evaluated them in a manner consistent their own self-evaluations. Three empirical tests of this self-verification hypothesis as applied to close dyads were conducted. In Study 1, young adults in dating relationships were most intimate with and somewhat more committed to partners when they perceived that partners evaluated them as they evaluated themselves. Self-verification effects were pronounced for those involved in more serious dating relationships. In Study 2, men reported the greatest esteem for same-sex roommates who evaluated them in a self-verifying manner. Results from Study 2 were replicated and extended to both male and female roommate dyads in Study 3. Further, self-verification effects were most pronounced for young adults with high emotional empathy. Results suggest that self-verification theory is useful for understanding dyadic adjustment across a variety of relational contexts in young adulthood. Implications of self-verification processes for adult personal development are outlined within an identity negotiation framework.

  14. Is flow verification necessary

    International Nuclear Information System (INIS)

    Beetle, T.M.

    1986-01-01

    Safeguards test statistics are used in an attempt to detect diversion of special nuclear material. Under assumptions concerning possible manipulation (falsification) of safeguards accounting data, the effects on the statistics due to diversion and data manipulation are described algebraically. A comprehensive set of statistics that is capable of detecting any diversion of material is defined in terms of the algebraic properties of the effects. When the assumptions exclude collusion between persons in two material balance areas, then three sets of accounting statistics are shown to be comprehensive. Two of the sets contain widely known accountancy statistics. One of them does not require physical flow verification - comparisons of operator and inspector data for receipts and shipments. The third set contains a single statistic which does not require physical flow verification. In addition to not requiring technically difficult and expensive flow verification, this single statistic has several advantages over other comprehensive sets of statistics. This algebraic approach as an alternative to flow verification for safeguards accountancy is discussed in this paper

  15. Bilingualism versus identity

    DEFF Research Database (Denmark)

    Hermann, Jesper

    1988-01-01

    During the last hundred years psychologists, philosophers and theologians have developed two different conceptions of personal identity. One of them insists that each person is a unique and transcendental being, whereas the other finds the personality deriving from interaction with other persons....... (This is the prevailing view today.) These theories are placed in relation to the difficulties an immigrant encounters....

  16. Personal number Management : personal numbers and identity fraud – number strategies for security and privacy in an information society - part 1

    NARCIS (Netherlands)

    Grijpink, J.H.A.M.

    2002-01-01

    For the sake of clarity and manageability, this article is in the form of a checklist. It will be published in two parts. The first part in this issue presents some practical and juridical characteristics of personal number systems. But at the end of the day, it is the number strategy that

  17. Distorted Fingerprint Verification System

    Directory of Open Access Journals (Sweden)

    Divya KARTHIKAESHWARAN

    2011-01-01

    Full Text Available Fingerprint verification is one of the most reliable personal identification methods. Fingerprint matching is affected by non-linear distortion introduced in fingerprint impression during the image acquisition process. This non-linear deformation changes both the position and orientation of minutiae. The proposed system operates in three stages: alignment based fingerprint matching, fuzzy clustering and classifier framework. First, an enhanced input fingerprint image has been aligned with the template fingerprint image and matching score is computed. To improve the performance of the system, a fuzzy clustering based on distance and density has been used to cluster the feature set obtained from the fingerprint matcher. Finally a classifier framework has been developed and found that cost sensitive classifier produces better results. The system has been evaluated on fingerprint database and the experimental result shows that system produces a verification rate of 96%. This system plays an important role in forensic and civilian applications.

  18. Pleasure, pursuit of health or negotiation of identity? Personality correlates of food choice motives among young and middle-aged women.

    Science.gov (United States)

    Lindeman, M; Stark, K

    1999-08-01

    The clustering of four food choice motives (health, weight concern, pleasure and ideological reasons) and the relationship between personality and the food choice motives were analysed among young and middle-aged women in two studies. The personality variables included personal strivings, magical beliefs about food, awareness and internalization of thinness pressures, appearance and weight dissatisfaction, depression, self-esteem and symptoms of eating disorders. Study 1 was done with 171 young and middle-aged women. In Study 2, with data provided by 118 senior high-school girls, one cluster of girls who did not regard any of the food choice motives as important was found, otherwise the food choice clusters were fairly similar in both studies. They were labelled as health fosterers, gourmets, ideological eaters, health dieters and distressed dieters. Only the second dieter group, distressed dieters, showed low psychological well-being and symptoms of disordered eating. The results also indicated that ideological food choice motives (i.e. expression of one's identity via food) were best predicted by vegetarianism, magical beliefs about food and health, and personal strivings for ecological welfare and for understanding self and the world. Copyright 1999 Academic Press.

  19. How does a newly encountered face become familiar? The effect of within-person variability on adults' and children's perception of identity.

    Science.gov (United States)

    Baker, Kristen A; Laurence, Sarah; Mondloch, Catherine J

    2017-04-01

    Adults and children aged 6years and older easily recognize multiple images of a familiar face, but often perceive two images of an unfamiliar face as belonging to different identities. Here we examined the process by which a newly encountered face becomes familiar, defined as accurate recognition of multiple images that capture natural within-person variability in appearance. In Experiment 1 we examined whether exposure to within-person variability in appearance helps children learn a new face. Children aged 6-13years watched a 10-min video of a woman reading a story; she was filmed on a single day (low variability) or over three days, across which her appearance and filming conditions (e.g., camera, lighting) varied (high variability). After familiarization, participants sorted a set of images comprising novel images of the target identity intermixed with distractors. Compared to participants who received no familiarization, children showed evidence of learning only in the high-variability condition, in contrast to adults who showed evidence of learning in both the low- and high-variability conditions. Experiment 2 highlighted the efficiency with which adults learn a new face; their accuracy was comparable across training conditions despite variability in duration (1 vs. 10min) and type (video vs. static images) of training. Collectively, our findings show that exposure to variability leads to the formation of a robust representation of facial identity, consistent with perceptual learning in other domains (e.g., language), and that the development of face learning is protracted throughout childhood. We discuss possible underlying mechanisms. Copyright © 2016. Published by Elsevier B.V.

  20. Getting Personal: How Early Childhood Teacher Education Troubles Students' and Teacher Educators' Identities Regarding Subjectivity and Feminism

    Science.gov (United States)

    Taguchi, Hillevi Lenz

    2005-01-01

    This article constitutes an attempt to investigate how student teachers and teacher educators in the context of Swedish early childhood teacher education are invented and reinvented by practices that are inspired by feminist and post-structural thinking. I give examples of practice that explicitly make use of different aspects of the personal,…

  1. Esprit de corps. On the relevance of Peirce's notion of 'person' in the study of the notion of 'Identity' in social media

    Directory of Open Access Journals (Sweden)

    Emanuele Fadda

    2014-11-01

    Full Text Available This contribution is the first survey on the relevance and the possible fertility of the notion of "person(ality" as emerging from Peirce's cosmologic and metaphysical essays published on The Monist in the 1890s (see CP 6.268 ff. and set in the frame of some semiotic and socio-psychologic questions connected to the New Media. The article is preceded by a short reflection on the peculiar way some Peircean terms can be set in the semiotic debate. My proposal consists in the application to the study of identity management in today's social networks (in particularly Facebook. Both the pars destruens (radical devaluation of individuality and the pars construens (the idea of person as "coordination and connection of ideas", together with their intersections, help us draw a perspective (based on the notion of continuity that may support us in focusing on the most recent trends of the social networks as, for instance, the progressive shrinking of the "private" dimension, and in particular the irruption - up to sheer invasion - of corporeality in the digital universe, though the body seemed, at the outset, to be banned or at least concealed. The Peircean devaluation of individuality implies, indeed, that the body is not more individual than the mind (as Rossella Fabbrichesi has recently and brilliantly shown, becoming at any time potentially available to public existence and fruition.

  2. The Supermalt identity

    DEFF Research Database (Denmark)

    Bech-Larsen, Tino; Esbjerg, Lars; Grunert, Klaus G.

    2007-01-01

    on consumers' self-identities. The second part explored the role of food and beverage products in the construction of self-identities. The final part focused on the construction of brand identity for Supermalt. Findings - The article provides information on the self-identities constructed by Afro......-Caribbean informants. The food and beverage consumption of informants reflects their mixed cultural identity. The brand identity Supermalt appears to be malleable, with ample room for consumer co-construction. Perceptions of brand identity differ markedly among informants, who are all able to construct Supermalt......Purpose - The objective of this article is to conduct a case study of the Supermalt brand of malt beer, which has become the preferred beverage of Afro-Caribbean consumers in Brixton on a very limited marketing budget. Design/methodology/approach - The article uses the concepts of personal identity...

  3. Linear equations and rap battles: how students in a wired classroom utilized the computer as a resource to coordinate personal and mathematical positional identities in hybrid spaces

    Science.gov (United States)

    Langer-Osuna, Jennifer

    2015-03-01

    This paper draws on the constructs of hybridity, figured worlds, and cultural capital to examine how a group of African-American students in a technology-driven, project-based algebra classroom utilized the computer as a resource to coordinate personal and mathematical positional identities during group work. Analyses of several vignettes of small group dynamics highlight how hybridity was established as the students engaged in multiple on-task and off-task computer-based activities, each of which drew on different lived experiences and forms of cultural capital. The paper ends with a discussion on how classrooms that make use of student-led collaborative work, and where students are afforded autonomy, have the potential to support the academic engagement of students from historically marginalized communities.

  4. I Move, therefore I am - A Comment on "The Importance of Sensing One's Movements in the World for the Sense of Personal Identity" by Haselager, Broens, & Quilici Gonzalez

    Directory of Open Access Journals (Sweden)

    Sandro Nannini

    2012-01-01

    Full Text Available The position taken by Haselager, Broens and Quilici Gonzalez in The Importance of Sensing One’s Movements in the World for the Sense of Personal Identity consists in three fundamental theses which can be summarized as follows: (1 The fundamental core of human self-consciousness is not language or thought but the body sense; (2 The traditional dichotomy between external and internal senses is false; (3 There is no prominence of the brain over the rest of the body with regard to the sense of identity that every human being has. This paper aims at showing that – while thesis (1 is perfectly convincing - theses (2 and (3 must be revisited in part since they are too committed to the kind of anti-representationalism proposed by Brooks. In fact, several experimental findings (see above all the vestibulo-ocular reflex show – in contrast to (2 – that the brain distinguishes even at a purely perceptual level between self and external world. Moreover, while other experiments do confirm the “importance”of the body for cognition and the steady interaction between the brain and the body including for the execution of cognitive tasks, they also show – in contrast to (3 – that the influence of bodily movement on the associative areas of the cortex is not directly due to the motor schemata that direct bodily movements but to “higher” brain representations of actions each of which can be executed by different motor schemata.

  5. Biometric Technologies and Verification Systems

    CERN Document Server

    Vacca, John R

    2007-01-01

    Biometric Technologies and Verification Systems is organized into nine parts composed of 30 chapters, including an extensive glossary of biometric terms and acronyms. It discusses the current state-of-the-art in biometric verification/authentication, identification and system design principles. It also provides a step-by-step discussion of how biometrics works; how biometric data in human beings can be collected and analyzed in a number of ways; how biometrics are currently being used as a method of personal identification in which people are recognized by their own unique corporal or behavior

  6. Fingerprint verification prediction model in hand dermatitis.

    Science.gov (United States)

    Lee, Chew K; Chang, Choong C; Johor, Asmah; Othman, Puwira; Baba, Roshidah

    2015-07-01

    Hand dermatitis associated fingerprint changes is a significant problem and affects fingerprint verification processes. This study was done to develop a clinically useful prediction model for fingerprint verification in patients with hand dermatitis. A case-control study involving 100 patients with hand dermatitis. All patients verified their thumbprints against their identity card. Registered fingerprints were randomized into a model derivation and model validation group. Predictive model was derived using multiple logistic regression. Validation was done using the goodness-of-fit test. The fingerprint verification prediction model consists of a major criterion (fingerprint dystrophy area of ≥ 25%) and two minor criteria (long horizontal lines and long vertical lines). The presence of the major criterion predicts it will almost always fail verification, while presence of both minor criteria and presence of one minor criterion predict high and low risk of fingerprint verification failure, respectively. When none of the criteria are met, the fingerprint almost always passes the verification. The area under the receiver operating characteristic curve was 0.937, and the goodness-of-fit test showed agreement between the observed and expected number (P = 0.26). The derived fingerprint verification failure prediction model is validated and highly discriminatory in predicting risk of fingerprint verification in patients with hand dermatitis. © 2014 The International Society of Dermatology.

  7. Swarm Verification

    Science.gov (United States)

    Holzmann, Gerard J.; Joshi, Rajeev; Groce, Alex

    2008-01-01

    Reportedly, supercomputer designer Seymour Cray once said that he would sooner use two strong oxen to plow a field than a thousand chickens. Although this is undoubtedly wise when it comes to plowing a field, it is not so clear for other types of tasks. Model checking problems are of the proverbial "search the needle in a haystack" type. Such problems can often be parallelized easily. Alas, none of the usual divide and conquer methods can be used to parallelize the working of a model checker. Given that it has become easier than ever to gain access to large numbers of computers to perform even routine tasks it is becoming more and more attractive to find alternate ways to use these resources to speed up model checking tasks. This paper describes one such method, called swarm verification.

  8. The Pattern of Sexual Interest of Female-to-Male Transsexual Persons With Gender Identity Disorder Does Not Resemble That of Biological Men: An Eye-Tracking Study.

    Science.gov (United States)

    Tsujimura, Akira; Kiuchi, Hiroshi; Soda, Tetsuji; Takezawa, Kentaro; Fukuhara, Shinichiro; Takao, Tetsuya; Sekiguchi, Yuki; Iwasa, Atsushi; Nonomura, Norio; Miyagawa, Yasushi

    2017-09-01

    Very little has been elucidated about sexual interest in female-to-male (FtM) transsexual persons. To investigate the sexual interest of FtM transsexual persons vs that of men using an eye-tracking system. The study included 15 men and 13 FtM transsexual subjects who viewed three sexual videos (clip 1: sexy clothed young woman kissing the region of the male genitals covered by underwear; clip 2: naked actor and actress kissing and touching each other; and clip 3: heterosexual intercourse between a naked actor and actress) in which several regions were designated for eye-gaze analysis in each frame. The designation of each region was not visible to the participants. Visual attention was measured across each designated region according to gaze duration. For clip 1, there was a statistically significant sex difference in the viewing pattern between men and FtM transsexual subjects. Longest gaze time was for the eyes of the actress in men, whereas it was for non-human regions in FtM transsexual subjects. For clip 2, there also was a statistically significant sex difference. Longest gaze time was for the face of the actress in men, whereas it was for non-human regions in FtM transsexual subjects, and there was a significant difference between regions with longest gaze time. The most apparent difference was in the gaze time for the body of the actor: the percentage of time spent gazing at the body of the actor was 8.35% in FtM transsexual subjects, whereas it was only 0.03% in men. For clip 3, there were no statistically significant differences in viewing patterns between men and FtM transsexual subjects, although longest gaze time was for the face of the actress in men, whereas it was for non-human regions in FtM transsexual subjects. We suggest that the characteristics of sexual interest of FtM transsexual persons are not the same as those of biological men. Tsujimura A, Kiuchi H, Soda T, et al. The Pattern of Sexual Interest of Female-to-Male Transsexual Persons

  9. The Future of Community and Personal Identity in the Coming Electronic Culture. A Report of the Annual Aspen Institute Roundtable on Information Technology (3rd, Aspen, Colorado, August 18-21, 1994).

    Science.gov (United States)

    Bollier, David

    The 1994 Aspen Institute Roundtable on Information Technology began as a look at the changing nature of the home. In building scenarios of the "new home," the participants expressed many significant insights into issues of personal identity, community-building, and setting boundaries in our lives and environments. This report captures…

  10. A network identity authentication system based on Fingerprint identification technology

    Science.gov (United States)

    Xia, Hong-Bin; Xu, Wen-Bo; Liu, Yuan

    2005-10-01

    Fingerprint verification is one of the most reliable personal identification methods. However, most of the automatic fingerprint identification system (AFIS) is not run via Internet/Intranet environment to meet today's increasing Electric commerce requirements. This paper describes the design and implementation of the archetype system of identity authentication based on fingerprint biometrics technology, and the system can run via Internet environment. And in our system the COM and ASP technology are used to integrate Fingerprint technology with Web database technology, The Fingerprint image preprocessing algorithms are programmed into COM, which deployed on the internet information server. The system's design and structure are proposed, and the key points are discussed. The prototype system of identity authentication based on Fingerprint have been successfully tested and evaluated on our university's distant education applications in an internet environment.

  11. Exchange Sex Among Persons Who Inject Drugs in the New York Metropolitan Area: The Importance of Local Context, Gender and Sexual Identity.

    Science.gov (United States)

    Walters, Suzan M; Rivera, Alexis V; Reilly, Kathleen H; Anderson, Bridget J; Bolden, Barbara; Wogayehu, Afework; Neaigus, Alan; Braunstein, Sarah

    2018-02-21

    Exchanging sex for money or drugs is known to increase risk for HIV among persons who inject drugs (PWID). To better understand determinants of exchange sex among PWID we examined factors associated with exchange sex in the New York metropolitan area-defined as New York City (NYC), NY; Newark, NJ; and Long Island, NY-using data from the 2012 National HIV Behavioral Surveillance system cycle on injection drug use. Of the 1160 PWID in this analysis, 24% reported exchange sex, with differences in gender and sexual identity by location. In multivariable analysis gay/bisexual men, heterosexual women, and lesbian, gay, or bisexual (LGB) women were more likely to exchange sex compared to heterosexual men. Exchange sex was also associated with race/ethnicity, homelessness, incarceration, location, and non-injection crack and cocaine use. We find that heterosexual women and LGB women who injected drugs residing in Newark were more likely to report exchange sex compared to NYC. This study highlights how local conditions impact exchange sex.

  12. Online fingerprint verification.

    Science.gov (United States)

    Upendra, K; Singh, S; Kumar, V; Verma, H K

    2007-01-01

    As organizations search for more secure authentication methods for user access, e-commerce, and other security applications, biometrics is gaining increasing attention. With an increasing emphasis on the emerging automatic personal identification applications, fingerprint based identification is becoming more popular. The most widely used fingerprint representation is the minutiae based representation. The main drawback with this representation is that it does not utilize a significant component of the rich discriminatory information available in the fingerprints. Local ridge structures cannot be completely characterized by minutiae. Also, it is difficult quickly to match two fingerprint images containing different number of unregistered minutiae points. In this study filter bank based representation, which eliminates these weakness, is implemented and the overall performance of the developed system is tested. The results have shown that this system can be used effectively for secure online verification applications.

  13. Secure optical verification using dual phase-only correlation

    International Nuclear Information System (INIS)

    Liu, Wei; Liu, Shutian; Zhang, Yan; Xie, Zhenwei; Liu, Zhengjun

    2015-01-01

    We introduce a security-enhanced optical verification system using dual phase-only correlation based on a novel correlation algorithm. By employing a nonlinear encoding, the inherent locks of the verification system are obtained in real-valued random distributions, and the identity keys assigned to authorized users are designed as pure phases. The verification process is implemented in two-step correlation, so only authorized identity keys can output the discriminate auto-correlation and cross-correlation signals that satisfy the reset threshold values. Compared with the traditional phase-only-correlation-based verification systems, a higher security level against counterfeiting and collisions are obtained, which is demonstrated by cryptanalysis using known attacks, such as the known-plaintext attack and the chosen-plaintext attack. Optical experiments as well as necessary numerical simulations are carried out to support the proposed verification method. (paper)

  14. Software verification for nuclear industry

    International Nuclear Information System (INIS)

    Wilburn, N.P.

    1985-08-01

    Why verification of software products throughout the software life cycle is necessary is considered. Concepts of verification, software verification planning, and some verification methodologies for products generated throughout the software life cycle are then discussed

  15. Verification and disarmament

    Energy Technology Data Exchange (ETDEWEB)

    Blix, H. [IAEA, Vienna (Austria)

    1998-07-01

    The main features are described of the IAEA safeguards verification system that non-nuclear weapon states parties of the NPT are obliged to accept. Verification activities/problems in Iraq and North Korea are discussed.

  16. Verification and disarmament

    International Nuclear Information System (INIS)

    Blix, H.

    1998-01-01

    The main features are described of the IAEA safeguards verification system that non-nuclear weapon states parties of the NPT are obliged to accept. Verification activities/problems in Iraq and North Korea are discussed

  17. Hard Identity and Soft Identity

    Directory of Open Access Journals (Sweden)

    Hassan Rachik

    2006-04-01

    Full Text Available Often collective identities are classified depending on their contents and rarely depending on their forms. Differentiation between soft identity and hard identity is applied to diverse collective identities: religious, political, national, tribal ones, etc. This classification is made following the principal dimensions of collective identities: type of classification (univocal and exclusive or relative and contextual, the absence or presence of conflictsof loyalty, selective or totalitarian, objective or subjective conception, among others. The different characteristics analysed contribute to outlining an increasingly frequent type of identity: the authoritarian identity.

  18. Leadership identities

    DEFF Research Database (Denmark)

    Holmgreen, Lise-Lotte

    2018-01-01

    Questioning the assumption that identities can be controlled through a shared organisational culture, the article explores the inculcation of a discourse of diversity into leadership identities in a Danish bank and building society. Thus, it intends to demonstrate that, on the one hand, discourse...... plays a significant role in identity construction and, on the other, that leaders’ constructions may have many sources of inspiration within and outside the organisation, emphasising that identity construction is a complex process in which organisational efforts to promote a common leadership identity...... to construct their leadership identities. While the respondents present comparable identities to the interviewer, the analysis reveals that the they draw on different discourses and employ a number of different discursive means to present this identity. This, the article argues, may be the result of a number...

  19. Ternutator identities

    International Nuclear Information System (INIS)

    Devchand, Chandrashekar; Fairlie, David; Nuyts, Jean; Weingart, Gregor

    2009-01-01

    The ternary commutator or ternutator, defined as the alternating sum of the product of three operators, has recently drawn much attention as an interesting structure generalizing the commutator. The ternutator satisfies cubic identities analogous to the quadratic Jacobi identity for the commutator. We present various forms of these identities and discuss the possibility of using them to define ternary algebras.

  20. Keeping identity private

    DEFF Research Database (Denmark)

    Adjei, Joseph K.; Olesen, Henning

    2011-01-01

    information. On the other hand, consumers have expressed concerns that their rights and ability to control their personal information are violated. Paradoxically, it appears that users provide personal data freely and willingly, as it has been observed on Facebook and other social networks. This study...... is an attempt to understand the relationship between individuals’ intentions to disclose personal information, their actual personal information disclosure behaviours, and how these can be leveraged to develop privacy-enhancing identity management systems (IDMS) that users can trust. Legal, regu...

  1. Ego identity formation in middle adolescence.

    Science.gov (United States)

    Lavoie, J C

    1976-12-01

    Assumed determinants of ego identity were investigated in this study using sophomore, junior, and senior high school males and females. Subjects were administered the Marcia Ego Identity Status Scale and measures of sex-role identification, personality development, psychological functioning, self-concept, and parental socialization practices. Data analyses, using a median split on identity score, showed that high-identity adolescents obtained more positive scores on sex-role identification, personality development, psychological adjustment, and self-concept than low-identity adolescents. Socialization practices also differed for the two groups. The sex differences which emerged were congruent with the identity literature. Overall, the data supported Erikson's theory of ego identity development.

  2. Exploring Japanese university English teachers' professional identity

    CERN Document Server

    Nagatomo, Diane Hawley

    2012-01-01

    This book examines the professional identities of Japanese university English teachers. It focuses on how relatively new teachers develop their professional identities, how gender impacts the professional identities of female professors, and how teaching practices and beliefs reflect personal and professional identity.

  3. Gauge invariance and Nielsen identities

    International Nuclear Information System (INIS)

    Lima, A.F. de; Bazaia, D.

    1989-01-01

    The one-loop contribution to the effective potential and mass are computed within the context of scalar electrodynamics for the class of general R gauges in the MS scheme. These calculations are performed in order to construct a non-trivial verification of the corresponding Nielsen identities within the context of the Higgs model. Some brief comments on the Coleman-Weinberg model are also included. (author) [pt

  4. Status of personnel identity verifiers

    International Nuclear Information System (INIS)

    Maxwell, R.L.

    1985-01-01

    Identity verification devices based on the interrogation of six different human biometric features or actions now exist and in general have been in development for about ten years. The capability of these devices to meet the cost and operational requirements of speed, accuracy, ease of use and reliability has generally increased although the verifier industry is still immature. Sandia Laboratories makes a continuing effort to stay abreast of identity verifier developments and to assess the capabilities and improvements of each device. Operating environment and procedures more typical of field use can often reveal performance results substantially different from laboratory tests. An evaluation of several recently available verifiers is herein reported

  5. Physics Verification Overview

    Energy Technology Data Exchange (ETDEWEB)

    Doebling, Scott William [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2017-09-12

    The purpose of the verification project is to establish, through rigorous convergence analysis, that each ASC computational physics code correctly implements a set of physics models and algorithms (code verification); Evaluate and analyze the uncertainties of code outputs associated with the choice of temporal and spatial discretization (solution or calculation verification); and Develop and maintain the capability to expand and update these analyses on demand. This presentation describes project milestones.

  6. Inspector measurement verification activities

    International Nuclear Information System (INIS)

    George, R.S.; Crouch, R.

    e most difficult and complex activity facing a safeguards inspector involves the verification of measurements and the performance of the measurement system. Remeasurement is the key to measurement verification activities. Remeasurerements using the facility's measurement system provide the bulk of the data needed for determining the performance of the measurement system. Remeasurements by reference laboratories are also important for evaluation of the measurement system and determination of systematic errors. The use of these measurement verification activities in conjunction with accepted inventory verification practices provides a better basis for accepting or rejecting an inventory. (U.S.)

  7. The Visual Identity Project

    Science.gov (United States)

    Tennant-Gadd, Laurie; Sansone, Kristina Lamour

    2008-01-01

    Identity is the focus of the middle-school visual arts program at Cambridge Friends School (CFS) in Cambridge, Massachusetts. Sixth graders enter the middle school and design a personal logo as their first major project in the art studio. The logo becomes a way for students to introduce themselves to their teachers and to represent who they are…

  8. Positioning health professional identity

    DEFF Research Database (Denmark)

    Lund, Ole; Krogh Christensen, Mette; Mørcke, Anne Mette

    2017-01-01

    Drawing on positioning theory, the purpose of this paper is to characterize the activities and positions of students and supervisors at workplaces and on-campus skills training sites across the higher health professional educations of medicine, sports science, and nursing. Furthermore, the study ...... explored the impact of work-based learning (WBL) and skills training on students’ personal professional identity development....

  9. Dissociative Identity Disorder

    Science.gov (United States)

    Schmidt, Tom

    2007-01-01

    Few psychological disorders in the Diagnostic Statistical Manual have generated as much controversy as Dissociative Identity Disorder (DID). For the past 35 years diagnoses of DID, previously referred to as Multiple Personality Disorder (MPD), have increased exponentially, causing various psychological researchers and clinicians to question the…

  10. Identity Management

    Data.gov (United States)

    Social Security Administration — Provides information for identity management services on the creation, modification and eventual deletion of accounts and entitlements based on user relationships on...

  11. Identity Assemblages

    DEFF Research Database (Denmark)

    Horn, Line Helverskov

    The study aims at exploring how identity is enacted within the context of a two-year programme in Service, Hospitality, and Tourism Management (SHTM). This research thus investigates how students and educators go about their daily lives in different educational contexts both on and off campus...... as a contribution to the body of literature of ANT-based studies. Second, it contributes to existing identity theories by exemplifying a socio-material approach to identity issues. Third, the study enables reflections upon how educational institutions as fundamentally identity-producing organisations acknowledge...

  12. The Identity of Czech Deaf Roma

    OpenAIRE

    Kalousová, Josefina

    2012-01-01

    With the definition of Deaf people as a cultural and linguistic minority the research of Deaf identity became possible. Following this, questions of identity of minority deaf persons emerged. Do these persons affiliate to the Deaf community or to their ethnic minority? This bachelor thesis focuses on the topic of Czech deaf Roma identity. The underlying assumption of the paper is that identity is a continuing process dependent on the interaction of an individual and society and that it consti...

  13. Human identity versus gender identity: The perception of sexual addiction among Iranian women.

    Science.gov (United States)

    Moshtagh, Mozhgan; Mirlashari, Jila; Rafiey, Hassan; Azin, Ali; Farnam, Robert

    2017-07-01

    This qualitative study was conducted to explore the images of personal identity from the perspective of women with sexual addiction. The data required for the study were collected through 31 in-depth interviews. Sensing a threat to personal identity, dissatisfaction with gender identity, dissociation with the continuum of identity, and identity reconstruction in response to threat were four of the experiences that were common among women with sexual addiction. Painful emotional experiences appear to have created a sense of gender and sexual conflict or weakness in these women and thus threatened their personal identity and led to their sexual addiction.

  14. Bridging Identities

    Science.gov (United States)

    Deaux, Kay; Burke, Peter

    2010-01-01

    Sociology and psychology are no strangers in the theoretical world of self and identity. Early works by William James (1890), a psychologist, and George Herbert Mead (1934), a sociologist, are often taken as a starting point by investigators in both fields. In more recent years, with the development of a number of identity theories in both fields,…

  15. Brand Identity.

    Science.gov (United States)

    Lawlor, John

    1998-01-01

    Instead of differentiating themselves by building "brand identities," colleges and universities often focus on competing with price. As a result, fewer and fewer institutions base their identities on value, the combination of quality and price. Methods of building two concepts to influence customers' brand image and brand loyalty are…

  16. Ritual Identity

    NARCIS (Netherlands)

    van der Beek, Suzanne

    2017-01-01

    Rituals are often used as opportunities for self-reflection and identity construction. The Camino to Santiago de Compostela, which has become a singularly popular pilgrimage since the late 1980s, is an example of a ritual that is explicitly used to gain a deeper understanding of one’s identity

  17. Organizational Identity

    DEFF Research Database (Denmark)

    Hatch, Mary Jo; Schultz, Majken

    This text presents the classic works on organizational identity alongside more current thinking on the issues. Ranging from theoretical contributions to empirical studies, the readings in this volume address the key issues of organizational identity, and show how these issues have developed through...

  18. Challenging Identities

    DEFF Research Database (Denmark)

    Identity is a keyword in a number of academic fields as well as in public debate and in politics. During the last decades, references to identity have proliferated, yet there is no simple definition available that corresponds to the use of the notion in all contexts. The significance of the notion...

  19. Effects of Desktop Virtual Reality Environment Training on State Anxiety and Vocational Identity Scores among Persons with Disabilities during Job Placement

    Science.gov (United States)

    Washington, Andre Lamont

    2013-01-01

    This study examined how desktop virtual reality environment training (DVRET) affected state anxiety and vocational identity of vocational rehabilitation services consumers during job placement/job readiness activities. It utilized a quantitative research model with a quasi-experimental pretest-posttest design plus some qualitative descriptive…

  20. The Role of Social and Personal Identities among At-Risk and Non-at-Risk Singapore Youths during Peer Mediation

    Science.gov (United States)

    Huan, Vivien S.

    2006-01-01

    Peer mediation is a school-based intervention program that was implemented in response to the rising violence in schools, and to the need for alternative and more proactive discipline plans. Using the theoretical framework of the Social Identity Theory, this article highlighted the importance of peer mediation in helping adolescents resolve their…

  1. Verification Account Management System (VAMS)

    Data.gov (United States)

    Social Security Administration — The Verification Account Management System (VAMS) is the centralized location for maintaining SSA's verification and data exchange accounts. VAMS account management...

  2. A Secure Dynamic Identity and Chaotic Maps Based User Authentication and Key Agreement Scheme for e-Healthcare Systems.

    Science.gov (United States)

    Li, Chun-Ta; Lee, Cheng-Chi; Weng, Chi-Yao; Chen, Song-Jhih

    2016-11-01

    Secure user authentication schemes in many e-Healthcare applications try to prevent unauthorized users from intruding the e-Healthcare systems and a remote user and a medical server can establish session keys for securing the subsequent communications. However, many schemes does not mask the users' identity information while constructing a login session between two or more parties, even though personal privacy of users is a significant topic for e-Healthcare systems. In order to preserve personal privacy of users, dynamic identity based authentication schemes are hiding user's real identity during the process of network communications and only the medical server knows login user's identity. In addition, most of the existing dynamic identity based authentication schemes ignore the inputs verification during login condition and this flaw may subject to inefficiency in the case of incorrect inputs in the login phase. Regarding the use of secure authentication mechanisms for e-Healthcare systems, this paper presents a new dynamic identity and chaotic maps based authentication scheme and a secure data protection approach is employed in every session to prevent illegal intrusions. The proposed scheme can not only quickly detect incorrect inputs during the phases of login and password change but also can invalidate the future use of a lost/stolen smart card. Compared the functionality and efficiency with other authentication schemes recently, the proposed scheme satisfies desirable security attributes and maintains acceptable efficiency in terms of the computational overheads for e-Healthcare systems.

  3. Retail applications of signature verification

    Science.gov (United States)

    Zimmerman, Thomas G.; Russell, Gregory F.; Heilper, Andre; Smith, Barton A.; Hu, Jianying; Markman, Dmitry; Graham, Jon E.; Drews, Clemens

    2004-08-01

    The dramatic rise in identity theft, the ever pressing need to provide convenience in checkout services to attract and retain loyal customers, and the growing use of multi-function signature captures devices in the retail sector provides favorable conditions for the deployment of dynamic signature verification (DSV) in retail settings. We report on the development of a DSV system to meet the needs of the retail sector. We currently have a database of approximately 10,000 signatures collected from 600 subjects and forgers. Previous work at IBM on DSV has been merged and extended to achieve robust performance on pen position data available from commercial point of sale hardware, achieving equal error rates on skilled forgeries and authentic signatures of 1.5% to 4%.

  4. Identity Management

    CERN Document Server

    Pace, A

    2008-01-01

    This paper introduces identity management concepts and discusses various issues associated with its implementation. It will try to highlight technical, legal, and social aspects that must been foreseen when defining the numerous processes that an identity management infrastructure must support. Grid interoperability as well as cross platform interoperability is addressed on the technical aspect, followed by a short discussion on social consequences on user’s privacy when completed traceability is enforced and some examples on how identity management has been implemented at CERN

  5. Identity management

    Energy Technology Data Exchange (ETDEWEB)

    Pace, A [CERN, Geneva (Switzerland)

    2008-07-01

    This paper introduces identity management concepts and discusses various issues associated with their implementation. It will try to highlight technical, legal, and social aspects that must been foreseen when defining the numerous processes that an identity management infrastructure must support. Grid interoperability as well as cross platform interoperability is addressed on the technical aspect, followed by a short discussion on social consequences on user's privacy when completed traceability is enforced. The paper will finally give some examples on how identity management has been implemented at CERN.

  6. Identity management

    International Nuclear Information System (INIS)

    Pace, A

    2008-01-01

    This paper introduces identity management concepts and discusses various issues associated with their implementation. It will try to highlight technical, legal, and social aspects that must been foreseen when defining the numerous processes that an identity management infrastructure must support. Grid interoperability as well as cross platform interoperability is addressed on the technical aspect, followed by a short discussion on social consequences on user's privacy when completed traceability is enforced. The paper will finally give some examples on how identity management has been implemented at CERN

  7. Electronic identity

    CERN Document Server

    de Andrade, Norberto Nuno Gomes; Argles, David

    2014-01-01

    With the increasing availability of electronic services, security and a reliable means by which identity is verified is essential.Written by Norberto Andrade the first chapter of this book provides an overview of the main legal and regulatory aspects regarding electronic identity in Europe and assesses the importance of electronic identity for administration (public), business (private) and, above all, citizens. It also highlights the role of eID as a key enabler of the economy.In the second chapter Lisha Chen-Wilson, David Argles, Michele Schiano di Zenise and Gary Wills discuss the user-cent

  8. Automated personal identification: a new technique for controlling access to nuclear materials and facilities

    International Nuclear Information System (INIS)

    Eccles, D.R.

    1975-01-01

    Special nuclear materials must be protected against the threat of diversion or theft, and nuclear facilities against the threat of industrial sabotage. Implicit in this protection is the means of controlling access to protected areas, material access areas, and vital areas. With the advent of automated personal identification technology, the processes of access control can be automated to yield both higher security and reduced costs. This paper first surveys the conventional methods of access control; next, automated personal identification concepts are presented and various systems approaches are highlighted; finally, Calspan's FINGERSCAN /sub TM/ system for identity verification is described

  9. FMCT verification: Case studies

    International Nuclear Information System (INIS)

    Hui Zhang

    2001-01-01

    Full text: How to manage the trade-off between the need for transparency and the concern about the disclosure of sensitive information would be a key issue during the negotiations of FMCT verification provision. This paper will explore the general concerns on FMCT verification; and demonstrate what verification measures might be applied to those reprocessing and enrichment plants. A primary goal of an FMCT will be to have the five declared nuclear weapon states and the three that operate unsafeguarded nuclear facilities become parties. One focus in negotiating the FMCT will be verification. Appropriate verification measures should be applied in each case. Most importantly, FMCT verification would focus, in the first instance, on these states' fissile material production facilities. After the FMCT enters into force, all these facilities should be declared. Some would continue operating to produce civil nuclear power or to produce fissile material for non- explosive military uses. The verification measures necessary for these operating facilities would be essentially IAEA safeguards, as currently being applied to non-nuclear weapon states under the NPT. However, some production facilities would be declared and shut down. Thus, one important task of the FMCT verifications will be to confirm the status of these closed facilities. As case studies, this paper will focus on the verification of those shutdown facilities. The FMCT verification system for former military facilities would have to differ in some ways from traditional IAEA safeguards. For example, there could be concerns about the potential loss of sensitive information at these facilities or at collocated facilities. Eventually, some safeguards measures such as environmental sampling might be seen as too intrusive. Thus, effective but less intrusive verification measures may be needed. Some sensitive nuclear facilities would be subject for the first time to international inspections, which could raise concerns

  10. Advanced verification topics

    CERN Document Server

    Bhattacharya, Bishnupriya; Hall, Gary; Heaton, Nick; Kashai, Yaron; Khan Neyaz; Kirshenbaum, Zeev; Shneydor, Efrat

    2011-01-01

    The Accellera Universal Verification Methodology (UVM) standard is architected to scale, but verification is growing and in more than just the digital design dimension. It is growing in the SoC dimension to include low-power and mixed-signal and the system integration dimension to include multi-language support and acceleration. These items and others all contribute to the quality of the SOC so the Metric-Driven Verification (MDV) methodology is needed to unify it all into a coherent verification plan. This book is for verification engineers and managers familiar with the UVM and the benefits it brings to digital verification but who also need to tackle specialized tasks. It is also written for the SoC project manager that is tasked with building an efficient worldwide team. While the task continues to become more complex, Advanced Verification Topics describes methodologies outside of the Accellera UVM standard, but that build on it, to provide a way for SoC teams to stay productive and profitable.

  11. Spacing Identity

    DEFF Research Database (Denmark)

    Stang Våland, Marianne; Georg, Susse

    2018-01-01

    In this paper, we analyze how architectural design, and the spatial and material changes this involves, contributes to the continuous shaping of identities in an organization. Based upon a case study of organizational and architectural change in a municipal administration at a time of major public...... sector reforms, we examine how design interventions were used to (re)form work and professional relationships. The paper examines how engagements with spatial arrangements and material artifacts affected people’s sense of both occupational and organizational identity. Taking a relational approach...... to sociomateriality, the paper contributes to the further theorizing of space in organization studies by proposing the concept of spacing identity to capture the fluidity of identity performance....

  12. Learning to Teach and Professional Identity: Images of Personal and Professional Recognition (Aprender a enseñar e identidad profesional: imágenes de reconocimiento personal y profesional)

    Science.gov (United States)

    Fajardo Castañeda, J. Alberto

    2014-01-01

    This study aims to investigate how pre-service teachers construct their professional identities from the interplay between participation in a teacher community and their systems of knowledge and beliefs. A group of six Colombian pre-service teachers in the final stage of their five-year teacher education programme were the research participants.…

  13. Identity, identity politics, and neoliberalism

    Directory of Open Access Journals (Sweden)

    Wrenn Mary

    2014-01-01

    Full Text Available With the intensification of neoliberalism, it is useful to examine how some individuals might cope with the irrationality of the system. Neoliberalism cloaks the execution of the corporate agenda behind rhetorical manipulation that advocates for limited government. The corollary absence of government involvement on behalf of the citizenry writ large disarms the means of social redress for the individual. Democracy funded and fueled by corporate power thereby disenfranchises the individual, provoking some to search for empowerment through identity politics. The argument set forth suggests that individuals construct, reinforce, or escalate allegiance to identities as a coping mechanism, some of which manifest in violent identity politics.

  14. Nuclear test ban verification

    International Nuclear Information System (INIS)

    Chun, Kin-Yip

    1991-07-01

    This report describes verification and its rationale, the basic tasks of seismic verification, the physical basis for earthquake/explosion source discrimination and explosion yield determination, the technical problems pertaining to seismic monitoring of underground nuclear tests, the basic problem-solving strategy deployed by the forensic seismology resarch team at the University of Toronto, and the scientific significance of the team's research. The research carried out at the Univeristy of Toronto has two components: teleseismic verification using P wave recordings from the Yellowknife Seismic Array (YKA), and regional (close-in) verification using high-frequency L g and P n recordings from the Eastern Canada Telemetered Network. Major differences have been found in P was attenuation among the propagation paths connecting the YKA listening post with seven active nuclear explosion testing areas in the world. Significant revisions have been made to previously published P wave attenuation results, leading to more interpretable nuclear explosion source functions. (11 refs., 12 figs.)

  15. Standard Verification System (SVS)

    Data.gov (United States)

    Social Security Administration — SVS is a mainframe program that accesses the NUMIDENT to perform SSN verifications. This program is called by SSA Internal applications to verify SSNs. There is also...

  16. Formal Verification -26 ...

    Indian Academy of Sciences (India)

    by testing of the components and successful testing leads to the software being ... Formal verification is based on formal methods which are mathematically based ..... scenario under which a similar error could occur. There are various other ...

  17. SSN Verification Service

    Data.gov (United States)

    Social Security Administration — The SSN Verification Service is used by Java applications to execute the GUVERF02 service using the WebSphere/CICS Interface. It accepts several input data fields...

  18. Environmental technology verification methods

    CSIR Research Space (South Africa)

    Szewczuk, S

    2016-03-01

    Full Text Available Environmental Technology Verification (ETV) is a tool that has been developed in the United States of America, Europe and many other countries around the world to help innovative environmental technologies reach the market. Claims about...

  19. Verification of RADTRAN

    International Nuclear Information System (INIS)

    Kanipe, F.L.; Neuhauser, K.S.

    1995-01-01

    This document presents details of the verification process of the RADTRAN computer code which was established for the calculation of risk estimates for radioactive materials transportation by highway, rail, air, and waterborne modes

  20. The Pattern of Sexual Interest of Female-to-Male Transsexual Persons With Gender Identity Disorder Does Not Resemble That of Biological Men: An Eye-Tracking Study

    OpenAIRE

    Tsujimura, Akira; Kiuchi, Hiroshi; Soda, Tetsuji; Takezawa, Kentaro; Fukuhara, Shinichiro; Takao, Tetsuya; Sekiguchi, Yuki; Iwasa, Atsushi; Nonomura, Norio; Miyagawa, Yasushi

    2017-01-01

    Introduction: Very little has been elucidated about sexual interest in female-to-male (FtM) transsexual persons. Aims: To investigate the sexual interest of FtM transsexual persons vs that of men using an eye-tracking system. Methods: The study included 15 men and 13 FtM transsexual subjects who viewed three sexual videos (clip 1: sexy clothed young woman kissing the region of the male genitals covered by underwear; clip 2: naked actor and actress kissing and touching each other; and cl...

  1. Multilateral disarmament verification

    International Nuclear Information System (INIS)

    Persbo, A.

    2013-01-01

    Non-governmental organisations, such as VERTIC (Verification Research, Training and Information Centre), can play an important role in the promotion of multilateral verification. Parties involved in negotiating nuclear arms accords are for the most part keen that such agreements include suitable and robust provisions for monitoring and verification. Generally progress in multilateral arms control verification is often painstakingly slow, but from time to time 'windows of opportunity' - that is, moments where ideas, technical feasibility and political interests are aligned at both domestic and international levels - may occur and we have to be ready, so the preparatory work is very important. In the context of nuclear disarmament, verification (whether bilateral or multilateral) entails an array of challenges, hurdles and potential pitfalls relating to national security, health, safety and even non-proliferation, so preparatory work is complex and time-greedy. A UK-Norway Initiative was established in order to investigate the role that a non-nuclear-weapon state such as Norway could potentially play in the field of nuclear arms control verification. (A.C.)

  2. An Art Educator's Journey of Becoming a Researcher: A Self-Reflective Auto-Ethnography of Identity Construction and Personal Growth

    Science.gov (United States)

    Riedler, Martina

    2016-01-01

    In this self-reflective auto-ethnographic research, the author shares her experiences of introspection, change and professional growth as an art educator in an international context. Auto-ethnography is an approach to qualitative inquiry in which the researcher employs self-reflection to explore her personal experiences and connect these…

  3. Self-Verification of Ability through Biased Performance Memory.

    Science.gov (United States)

    Karabenick, Stuart A.; LeBlanc, Daniel

    Evidence points to a pervasive tendency for persons to behave to maintain their existing cognitive structures. One strategy by which this self-verification is made more probable involves information processing. Through attention, encoding and retrieval, and the interpretation of events, persons process information so that self-confirmatory…

  4. Embedded software verification and debugging

    CERN Document Server

    Winterholer, Markus

    2017-01-01

    This book provides comprehensive coverage of verification and debugging techniques for embedded software, which is frequently used in safety critical applications (e.g., automotive), where failures are unacceptable. Since the verification of complex systems needs to encompass the verification of both hardware and embedded software modules, this book focuses on verification and debugging approaches for embedded software with hardware dependencies. Coverage includes the entire flow of design, verification and debugging of embedded software and all key approaches to debugging, dynamic, static, and hybrid verification. This book discusses the current, industrial embedded software verification flow, as well as emerging trends with focus on formal and hybrid verification and debugging approaches. Includes in a single source the entire flow of design, verification and debugging of embedded software; Addresses the main techniques that are currently being used in the industry for assuring the quality of embedded softw...

  5. I am remix your web identity

    CERN Document Server

    Sordi, Paolo

    2015-01-01

    I Am: Remix Your Web Identity explores methods of designing and developing a personal website with RSS feeds that aggregate blog posts along with posts on social networks, such as Flickr, YouTube, Goodreads, Last.fm, and Delicious, in order to regain control and ownership (as well as authorship) of one's identity in one consistent and customized location. The book provides a short overview of the evolution of digital identity and the transformation of personal websites from Geocities to blogs...

  6. Identity Activities

    Science.gov (United States)

    2016-08-03

    in reaction to their environment. They reflect an individual’s internal or external, conscious or subconscious , overt or covert, voluntary or...identity activities under a range of legal authorities, policy constraints, transnational threats, regional concerns and biases , and most likely...Biography. A baseline and descriptive analytic product that supports the development of the behavioral influences analysis ( BIA ) individual behavioral

  7. [Identity theft

    CERN Multimedia

    Wolinksy, H

    2003-01-01

    "A new survey by the Federal Trade Commission indicates that over the last five years one in four American households has been hit by identity theft, which can result in thieves tapping their victims' credit cards or bank accounts" (1 page).

  8. Challenging Identities

    DEFF Research Database (Denmark)

    depends on the conceptual or ideological constellation in which it takes part. This volume on one hand demonstrates the role of notions of identity in a variety of European contexts, and on the other hand highlights how there may be reasons to challenge the use of the term and corresponding social...

  9. Rights of Identity

    Directory of Open Access Journals (Sweden)

    Daniel Kofman

    2017-01-01

    Full Text Available A person’s identity is their sense of who and what they are, of who stands in significant relations to them, and of what is valuable to them. This is inevitably very broad, an immediate implication of which is that the concept of identity taken alone cannot do significant normative work. In some cases a person’s identity is bound up with the evil that they do or wish to do, and cannot thereby give them any right to do it. In other cases very powerful elements of a person’s identity – such as their attachment to loved ones – is certainly related to important rights, but it is not entirely clear that one needs the concept of identity to explicate or justify these rights; the deep involvement of their identity is arguably a byproduct of other important values in these cases (such as love, and those values can do the grounding work of the rights by themselves and more simply and clearly. Nevertheless, when suitably qualified, a person’s identity is central to accounting for important political rights. These ranges from rights to participate in cultural practices of one’s group, which sometimes implies duties on governments to support minorities threatened with extinction, to – at the outer limit – rights to arrange political administration. These rights are connected to both autonomy and fairness. Cultural rights are often taken either to be opposed to autonomy, or at best instrumental to personal autonomy (by providing ‘options’, but in fact, the ideal of autonomy, expressed by Mill as being the author of one’s life, requires that one be in control of significant aspects of one’s identity. Significant aspects of one’s identity are collectively determined within a culture. Cultures are not static, and their development is particularly affected by political boundaries. A fundamental right of autonomy implies, therefore, that groups be allowed, within reasonable constraints of general feasibility and stability, to arrange

  10. Identity at work: Exploring strategies for Identity Work

    Directory of Open Access Journals (Sweden)

    Byron G. Adams

    2012-01-01

    Full Text Available Orientation: This study explored strategies for identity work that are central to the negotiation and regulation of employee work identity.Research purpose: The main aim of this study was to explore employee narratives and identify the strategies available to them in the process of identity work, as they defined themselves at work.Motivation for the study: As there is a scarcity of research on identity work in South Africa, this study wanted to advance knowledge about identity work and the strategies used for regulating and negotiating an identity at work by exploring these constructs in this context.Research design, approach and method: A qualitative research process formed the basis for this study. Nineteen employees from a global manufacturing company participated in two semi-structured in-depth interviews. Grounded theory was applied to analyse and interpret the data.Main findings: Nine strategies for identity work were identified and categorised into four broad themes (personal philosophies; relationships; career management and negotiating balance.Practical/managerial implications: Employees followed various strategies for defining themselves at work and this may have some implications for employee work engagement and productivity.Contribution/value-add: This study expands on current theoretical knowledge of identity work, and provides insights into the strategies people use to regulate and negotiate their identities at work. 

  11. The verification of ethnographic data.

    Science.gov (United States)

    Pool, Robert

    2017-09-01

    Anthropologists are increasingly required to account for the data on which they base their interpretations and to make it available for public scrutiny and re-analysis. While this may seem straightforward (why not place our data in online repositories?), it is not. Ethnographic 'data' may consist of everything from verbatim transcripts ('hard data') to memories and impressions ('soft data'). Hard data can be archived and re-analysed; soft data cannot. The focus on hard 'objective' data contributes to the delegitimizing of the soft data that are essential for ethnographic understanding, and without which hard data cannot be properly interpreted. However, the credibility of ethnographic interpretation requires the possibility of verification. This could be achieved by obligatory, standardised forms of personal storage with the option for audit if required, and by being more explicit in publications about the nature and status of the data and the process of interpretation.

  12. Inter-identity autobiographical amnesia in patients with dissociative identity disorder

    NARCIS (Netherlands)

    Huntjens, R.J.C.; Verschuere, B.; McNally, R.J.

    2012-01-01

    Background A major symptom of Dissociative Identity Disorder (DID; formerly Multiple Personality Disorder) is dissociative amnesia, the inability to recall important personal information. Only two case studies have directly addressed autobiographical memory in DID. Both provided evidence suggestive

  13. Inter-Identity Autobiographical Amnesia in Patients with Dissociative Identity Disorder

    NARCIS (Netherlands)

    Huntjens, R.J.C.; Verschuere, B.; McNally, R.J.

    2012-01-01

    Background: A major symptom of Dissociative Identity Disorder (DID; formerly Multiple Personality Disorder) is dissociative amnesia, the inability to recall important personal information. Only two case studies have directly addressed autobiographical memory in DID. Both provided evidence suggestive

  14. Procedure generation and verification

    International Nuclear Information System (INIS)

    Sheely, W.F.

    1986-01-01

    The Department of Energy has used Artificial Intelligence of ''AI'' concepts to develop two powerful new computer-based techniques to enhance safety in nuclear applications. The Procedure Generation System, and the Procedure Verification System, can be adapted to other commercial applications, such as a manufacturing plant. The Procedure Generation System can create a procedure to deal with the off-normal condition. The operator can then take correct actions on the system in minimal time. The Verification System evaluates the logic of the Procedure Generator's conclusions. This evaluation uses logic techniques totally independent of the Procedure Generator. The rapid, accurate generation and verification of corrective procedures can greatly reduce the human error, possible in a complex (stressful/high stress) situation

  15. Nuclear disarmament verification

    International Nuclear Information System (INIS)

    DeVolpi, A.

    1993-01-01

    Arms control treaties, unilateral actions, and cooperative activities -- reflecting the defusing of East-West tensions -- are causing nuclear weapons to be disarmed and dismantled worldwide. In order to provide for future reductions and to build confidence in the permanency of this disarmament, verification procedures and technologies would play an important role. This paper outlines arms-control objectives, treaty organization, and actions that could be undertaken. For the purposes of this Workshop on Verification, nuclear disarmament has been divided into five topical subareas: Converting nuclear-weapons production complexes, Eliminating and monitoring nuclear-weapons delivery systems, Disabling and destroying nuclear warheads, Demilitarizing or non-military utilization of special nuclear materials, and Inhibiting nuclear arms in non-nuclear-weapons states. This paper concludes with an overview of potential methods for verification

  16. Is there a right not to know one's sex? The ethics of 'gender verification' in women's sports competition.

    Science.gov (United States)

    Wiesemann, Claudia

    2011-04-01

    The paper discusses the current medical practice of 'gender verification' in sports from an ethical point of view. It takes the recent public discussion about 800 m runner Caster Semenya as a starting point. At the World Championships in Athletics 2009 in Berlin, Germany, Semenya was challenged by competitors as being a so called 'sex impostor'. A medical examination to verify her sex ensued. The author analyses whether athletes like Semenya could claim a right not to know that is generally acknowledged in human genetics and enforced by international and national genetic privacy laws. The relevance of this right for genetic diagnosis in sports is discussed. To this end, the interests of the athlete concerned and of third parties are balanced according to the expected benefits and harms.Harm is documented in a number of cases and includes unjustified disqualification, severe sex and gender identity crisis, demeaning reactions, social isolation, depression and suicide. Benefits are dubious as most cases of intersex are considered irrelevant for sports competition. It has to be concluded that the benefits to be gained from 'gender verification' in sports via genetic testing do not outweigh the grave individual disadvantages. The current practice of athletic associations to largely ignore the right of competitors not to know does not comply with prevailing ethical provisions on the protection of sensitive personal data. Therefore, genetic 'gender verification' in sports should be abolished.

  17. Survivorship and discourses of identity.

    Science.gov (United States)

    Little, Miles; Paul, Kim; Jordens, Christopher F C; Sayers, Emma-Jane

    2002-01-01

    Personal identity is self-evidently important to us all. Identity is a philosophically complex subject, but there is some agreement that memory, embodiment and continuity are essential components. The sense of memory includes 'future memory', the kind of memory we would like to construct for ourselves as our lives proceed. While the sense of personal identity is internal to the individual, a sense of that person's identity exists in the minds of others. Extreme experiences threaten the element of continuity, because they may bring bodily changes as well as cognitive changes that challenge central values. Restoring or preserving continuity is a major task for survivors. The ways in which people experience discontinuity because of cancer illness, and the ways in which they manage this experience emerges from the narratives of the survivors of cancer and in the narratives of health care workers who look after them. People manage discontinuity by reference to stable 'anchor points' in their beliefs and values; by re-constructing versions of their pre-experience identities, drawing on past memory and finding ways to preserve a continuity between past memory, present experience and constructions of the future; by using the experience to develop established facets of identity; and by imbuing the experience with meaning and recognising the enlarged identity made possible by survival. Those who cannot achieve a sense of continuity may feel alienated from themselves, their friends and family. All these methods of management may be used by one person to negotiate the post-experience identity in its different social interactions. The experience of the survivor can be further understood by recognising the challenge posed by extreme experience to the sense of continuity of both embodied self and memory. A satisfactory discourse of survival has yet to enter the public domain. This lack adds to the burdens of survivors, including those who have survived cancer. Copyright 2002 John

  18. Verification of Ceramic Structures

    Science.gov (United States)

    Behar-Lafenetre, Stephanie; Cornillon, Laurence; Rancurel, Michael; De Graaf, Dennis; Hartmann, Peter; Coe, Graham; Laine, Benoit

    2012-07-01

    In the framework of the “Mechanical Design and Verification Methodologies for Ceramic Structures” contract [1] awarded by ESA, Thales Alenia Space has investigated literature and practices in affiliated industries to propose a methodological guideline for verification of ceramic spacecraft and instrument structures. It has been written in order to be applicable to most types of ceramic or glass-ceramic materials - typically Cesic®, HBCesic®, Silicon Nitride, Silicon Carbide and ZERODUR®. The proposed guideline describes the activities to be performed at material level in order to cover all the specific aspects of ceramics (Weibull distribution, brittle behaviour, sub-critical crack growth). Elementary tests and their post-processing methods are described, and recommendations for optimization of the test plan are given in order to have a consistent database. The application of this method is shown on an example in a dedicated article [7]. Then the verification activities to be performed at system level are described. This includes classical verification activities based on relevant standard (ECSS Verification [4]), plus specific analytical, testing and inspection features. The analysis methodology takes into account the specific behaviour of ceramic materials, especially the statistical distribution of failures (Weibull) and the method to transfer it from elementary data to a full-scale structure. The demonstration of the efficiency of this method is described in a dedicated article [8]. The verification is completed by classical full-scale testing activities. Indications about proof testing, case of use and implementation are given and specific inspection and protection measures are described. These additional activities are necessary to ensure the required reliability. The aim of the guideline is to describe how to reach the same reliability level as for structures made of more classical materials (metals, composites).

  19. Verification and validation benchmarks.

    Energy Technology Data Exchange (ETDEWEB)

    Oberkampf, William Louis; Trucano, Timothy Guy

    2007-02-01

    Verification and validation (V&V) are the primary means to assess the accuracy and reliability of computational simulations. V&V methods and procedures have fundamentally improved the credibility of simulations in several high-consequence fields, such as nuclear reactor safety, underground nuclear waste storage, and nuclear weapon safety. Although the terminology is not uniform across engineering disciplines, code verification deals with assessing the reliability of the software coding, and solution verification deals with assessing the numerical accuracy of the solution to a computational model. Validation addresses the physics modeling accuracy of a computational simulation by comparing the computational results with experimental data. Code verification benchmarks and validation benchmarks have been constructed for a number of years in every field of computational simulation. However, no comprehensive guidelines have been proposed for the construction and use of V&V benchmarks. For example, the field of nuclear reactor safety has not focused on code verification benchmarks, but it has placed great emphasis on developing validation benchmarks. Many of these validation benchmarks are closely related to the operations of actual reactors at near-safety-critical conditions, as opposed to being more fundamental-physics benchmarks. This paper presents recommendations for the effective design and use of code verification benchmarks based on manufactured solutions, classical analytical solutions, and highly accurate numerical solutions. In addition, this paper presents recommendations for the design and use of validation benchmarks, highlighting the careful design of building-block experiments, the estimation of experimental measurement uncertainty for both inputs and outputs to the code, validation metrics, and the role of model calibration in validation. It is argued that the understanding of predictive capability of a computational model is built on the level of

  20. Verification and validation benchmarks

    International Nuclear Information System (INIS)

    Oberkampf, William Louis; Trucano, Timothy Guy

    2007-01-01

    Verification and validation (V and V) are the primary means to assess the accuracy and reliability of computational simulations. V and V methods and procedures have fundamentally improved the credibility of simulations in several high-consequence fields, such as nuclear reactor safety, underground nuclear waste storage, and nuclear weapon safety. Although the terminology is not uniform across engineering disciplines, code verification deals with assessing the reliability of the software coding, and solution verification deals with assessing the numerical accuracy of the solution to a computational model. Validation addresses the physics modeling accuracy of a computational simulation by comparing the computational results with experimental data. Code verification benchmarks and validation benchmarks have been constructed for a number of years in every field of computational simulation. However, no comprehensive guidelines have been proposed for the construction and use of V and V benchmarks. For example, the field of nuclear reactor safety has not focused on code verification benchmarks, but it has placed great emphasis on developing validation benchmarks. Many of these validation benchmarks are closely related to the operations of actual reactors at near-safety-critical conditions, as opposed to being more fundamental-physics benchmarks. This paper presents recommendations for the effective design and use of code verification benchmarks based on manufactured solutions, classical analytical solutions, and highly accurate numerical solutions. In addition, this paper presents recommendations for the design and use of validation benchmarks, highlighting the careful design of building-block experiments, the estimation of experimental measurement uncertainty for both inputs and outputs to the code, validation metrics, and the role of model calibration in validation. It is argued that the understanding of predictive capability of a computational model is built on the

  1. Verification and validation benchmarks

    International Nuclear Information System (INIS)

    Oberkampf, William L.; Trucano, Timothy G.

    2008-01-01

    Verification and validation (V and V) are the primary means to assess the accuracy and reliability of computational simulations. V and V methods and procedures have fundamentally improved the credibility of simulations in several high-consequence fields, such as nuclear reactor safety, underground nuclear waste storage, and nuclear weapon safety. Although the terminology is not uniform across engineering disciplines, code verification deals with assessing the reliability of the software coding, and solution verification deals with assessing the numerical accuracy of the solution to a computational model. Validation addresses the physics modeling accuracy of a computational simulation by comparing the computational results with experimental data. Code verification benchmarks and validation benchmarks have been constructed for a number of years in every field of computational simulation. However, no comprehensive guidelines have been proposed for the construction and use of V and V benchmarks. For example, the field of nuclear reactor safety has not focused on code verification benchmarks, but it has placed great emphasis on developing validation benchmarks. Many of these validation benchmarks are closely related to the operations of actual reactors at near-safety-critical conditions, as opposed to being more fundamental-physics benchmarks. This paper presents recommendations for the effective design and use of code verification benchmarks based on manufactured solutions, classical analytical solutions, and highly accurate numerical solutions. In addition, this paper presents recommendations for the design and use of validation benchmarks, highlighting the careful design of building-block experiments, the estimation of experimental measurement uncertainty for both inputs and outputs to the code, validation metrics, and the role of model calibration in validation. It is argued that the understanding of predictive capability of a computational model is built on the

  2. Identity transformation

    DEFF Research Database (Denmark)

    Neergaard, Helle; Robinson, Sarah; Jones, Sally

    , as well as the resources they have when they come to the classroom. It also incorporates perspectives from (ii) transformational learning and explores the concept of (iii) nudging from a pedagogical viewpoint, proposing it as an important tool in entrepreneurship education. The study incorporates......This paper develops the concept of ‘pedagogical nudging’ and examines four interventions in an entrepreneurship classroom and the potential it has for student identity transformation. Pedagogical nudging is positioned as a tool, which in the hands of a reflective, professional......) assists students in straddling the divide between identities, the emotions and tensions this elicits, and (iv) transform student understanding. We extend nudging theory into a new territory. Pedagogical nudging techniques may be able to unlock doors and bring our students beyond the unacknowledged...

  3. 31 CFR 363.14 - How will you verify my identity?

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false How will you verify my identity? 363... you verify my identity? (a) Individual. When you establish an account, we may use a verification service to verify your identity using information you provide about yourself on the online application. At...

  4. Reload core safety verification

    International Nuclear Information System (INIS)

    Svetlik, M.; Minarcin, M.

    2003-01-01

    This paper presents a brief look at the process of reload core safety evaluation and verification in Slovak Republic. It gives an overview of experimental verification of selected nuclear parameters in the course of physics testing during reactor start-up. The comparison of IAEA recommendations and testing procedures at Slovak and European nuclear power plants of similar design is included. An introduction of two level criteria for evaluation of tests represents an effort to formulate the relation between safety evaluation and measured values (Authors)

  5. Absorption properties of identical atoms

    International Nuclear Information System (INIS)

    Sancho, Pedro

    2013-01-01

    Emission rates and other optical properties of multi-particle systems in collective and entangled states differ from those in product ones. We show the existence of similar effects in the absorption probabilities for (anti)symmetrized states of two identical atoms. The effects strongly depend on the overlapping between the atoms and differ for bosons and fermions. We propose a viable experimental verification of these ideas. -- Highlights: •The absorption rates of a pair of identical atoms in product and (anti)symmetrized states are different. •The modifications of the optical properties are essentially determined by the overlapping between the atoms. •The absorption properties differ, in some cases, for bosons and fermions

  6. Korean Adoptee Identity: Adoptive and Ethnic Identity Profiles of Adopted Korean Americans

    Science.gov (United States)

    Beaupre, Adam J.; Reichwald, Reed; Zhou, Xiang; Raleigh, Elizabeth; Lee, Richard M.

    2015-01-01

    Adopted Korean adolescents face the task of grappling with their identity as Koreans and coming to terms with their adoptive status. In order to explore these dual identities, the authors conducted a person-centered study of the identity profiles of 189 adopted Korean American adolescents. Using cluster analytic procedures, the study examined…

  7. Integrated Java Bytecode Verification

    DEFF Research Database (Denmark)

    Gal, Andreas; Probst, Christian; Franz, Michael

    2005-01-01

    Existing Java verifiers perform an iterative data-flow analysis to discover the unambiguous type of values stored on the stack or in registers. Our novel verification algorithm uses abstract interpretation to obtain definition/use information for each register and stack location in the program...

  8. Mediating Identity

    DEFF Research Database (Denmark)

    Kjærgaard, Annemette Leonhardt; Morsing, Mette; Ravasi, Davide

    2011-01-01

    This paper reports a longitudinal field study on the effects of positive media coverage on the reconstruction of organizational identity. The study highlights how intense positive coverage – to the point of turning an organization into a ‘celebrity’– influences both the way members understand...... their organization (sensemaking effect) and the gratification they derive from its positive representation (self-enhancement effect). Our findings suggest that positive media representations foster members' alignment around an emergent new understanding of what their organization is. Over time, however, celebrity...

  9. Unravelling identities

    OpenAIRE

    2007-01-01

    Abstract The decision to go to war by the government of the day is assumed to be a decision taken on behalf of all citizens of the nation, conceived as a collective united by a harmony of interests. Yet in the case of the Iraq War, there is clearly no unified voice of support from the British people. There is division between the state and its citizens, and the latter also reflect the multilayered identities of an increasingly multicultural society. How do individuals displaying mu...

  10. Verification Games: Crowd-Sourced Formal Verification

    Science.gov (United States)

    2016-03-01

    additional paintbrushes. Additionally, in Paradox , human players are never given small optimization problems (for example, toggling the values of 50...were developed by the Center for Game Science: Pipe Jam, Traffic Jam, Flow Jam and Paradox . Verification tools and games were integrated to verify...4 4. Paradox …………………………………………………......5 5. MyClass ………………………………………………….....7 6. Results …………………………………………………......11 7. Time to

  11. Verification of Many-Qubit States

    Directory of Open Access Journals (Sweden)

    Yuki Takeuchi

    2018-06-01

    Full Text Available Verification is a task to check whether a given quantum state is close to an ideal state or not. In this paper, we show that a variety of many-qubit quantum states can be verified with only sequential single-qubit measurements of Pauli operators. First, we introduce a protocol for verifying ground states of Hamiltonians. We next explain how to verify quantum states generated by a certain class of quantum circuits. We finally propose an adaptive test of stabilizers that enables the verification of all polynomial-time-generated hypergraph states, which include output states of the Bremner-Montanaro-Shepherd-type instantaneous quantum polynomial time (IQP circuits. Importantly, we do not make any assumption that the identically and independently distributed copies of the same states are given: Our protocols work even if some highly complicated entanglement is created among copies in any artificial way. As applications, we consider the verification of the quantum computational supremacy demonstration with IQP models, and verifiable blind quantum computing.

  12. The Relationship between Cell Phone Use and Identity Theft

    Science.gov (United States)

    Saunders, Lewis O.

    2014-01-01

    The growth of mobile phone use has paralleled increased reports of identity theft. Identity theft can result in financial loss and threats to a victim's personal safety. Although trends in identity theft are well-known, less is known about individual cell phone users' attitudes toward identity theft and the extent to which they connect it to cell…

  13. Gender identity development in adolescence.

    Science.gov (United States)

    Steensma, Thomas D; Kreukels, Baudewijntje P C; de Vries, Annelou L C; Cohen-Kettenis, Peggy T

    2013-07-01

    This article is part of a Special Issue "Puberty and Adolescence".This article aims to provide an outline of what is currently known on trajectories, and contributing factors to gender identity development in adolescence. We give a historical overview of the concept of gender identity, and describe general identity development in adolescence, gender identity development in the general population and in gender variant youth. Possible psychosocial (such as child and parental characteristics) and biological factors (such as the effects of prenatal exposure to gonadal hormones and the role of genetics) contributing to a gender variant identity are discussed. Studies focusing on a number of psychosocial and biological factors separately, indicate that each of these factors influence gender identity formation, but little is known about the complex interplay between the factors, nor about the way individuals themselves contribute to the process. Research into normative and gender variant identity development of adolescents is clearly lagging behind. However, studies on persons with gender dysphoria and disorders of sex development, show that the period of adolescence, with its changing social environment and the onset of physical puberty, seems to be crucial for the development of a non-normative gender identity. Copyright © 2013 Elsevier Inc. All rights reserved.

  14. Parentage verification and identity test of Ghezel sheep using ...

    African Journals Online (AJOL)

    Jane

    2011-06-29

    Jun 29, 2011 ... The Ghezel sheep is a fat tail high weight Iranian breed which is raised in the North-west of Iran. To design an efficient improvement program and genetic evaluation system for this indigenous breed, accurate estimates of the population genetic parameters is per-required and all pedigrees and relationships ...

  15. Verification of genetic identity of introduced cacao germplasm in ...

    African Journals Online (AJOL)

    In the present study, high-throughput genotyping with SNP markers was used to fingerprint 160 cacao trees in the germplasm collection at the Cocoa Research Institute of Ghana (CRIG). ... Keywords: Cacao, conservation, chocolate, DNA fingerprint, molecular marker, tropical plant, off-type, true-to-type, West Africa.

  16. Verification of Organic Feed Identity by Fatty Acid Fingerprinting

    NARCIS (Netherlands)

    Tres, A.; Ruth, van S.M.

    2011-01-01

    The origin and authenticity of feed for laying hens is an important and fraud-susceptible aspect in the production of organic eggs. Chemical fingerprinting in combination with chemometric methods is increasingly used in conjunction with administrative controls to verify and safeguard the

  17. Identity verification using computer vision for automatic garage door opening

    NARCIS (Netherlands)

    Wijnhoven, R.G.J.; With, de P.H.N.

    2011-01-01

    We present a novel system for automatic identification of vehicles as part of an intelligent access control system for a garage entrance. Using a camera in the door, cars are detected and matched to the database of authenticated cars. Once a car is detected, License Plate Recognition (LPR) is

  18. The design of verification regimes

    International Nuclear Information System (INIS)

    Gallagher, N.W.

    1991-01-01

    Verification of a nuclear agreement requires more than knowledge of relevant technologies and institutional arrangements. It also demands thorough understanding of the nature of verification and the politics of verification design. Arms control efforts have been stymied in the past because key players agreed to verification in principle, only to disagree radically over verification in practice. In this chapter, it is shown that the success and stability of arms control endeavors can be undermined by verification designs which promote unilateral rather than cooperative approaches to security, and which may reduce, rather than enhance, the security of both sides. Drawing on logical analysis and practical lessons from previous superpower verification experience, this chapter summarizes the logic and politics of verification and suggests implications for South Asia. The discussion begins by determining what properties all forms of verification have in common, regardless of the participants or the substance and form of their agreement. Viewing verification as the political process of making decisions regarding the occurrence of cooperation points to four critical components: (1) determination of principles, (2) information gathering, (3) analysis and (4) projection. It is shown that verification arrangements differ primarily in regards to how effectively and by whom these four stages are carried out

  19. Learning a Genetic Measure for Kinship Verification Using Facial Images

    Directory of Open Access Journals (Sweden)

    Lu Kou

    2015-01-01

    Full Text Available Motivated by the key observation that children generally resemble their parents more than other persons with respect to facial appearance, distance metric (similarity learning has been the dominant choice for state-of-the-art kinship verification via facial images in the wild. Most existing learning-based approaches to kinship verification, however, are focused on learning a genetic similarity measure in a batch learning manner, leading to less scalability for practical applications with ever-growing amount of data. To address this, we propose a new kinship verification approach by learning a sparse similarity measure in an online fashion. Experimental results on the kinship datasets show that our approach is highly competitive to the state-of-the-art alternatives in terms of verification accuracy, yet it is superior in terms of scalability for practical applications.

  20. Development and Validation of a Q-Sort Measure of Identity Processing Style: The Identity Processing Style Q-Sort

    Science.gov (United States)

    Pittman, Joe F.; Kerpelman, Jennifer L.; Lamke, Leanne K.; Sollie, Donna L.

    2009-01-01

    Identity styles represent strategies individuals use to explore identity-related issues. Berzonsky (Berzonsky, M. D. (1992). Identity style and coping strategies. "Journal of Personality, 60", 771-788) identified three styles: informational, normative, and diffuse. In three studies, this paper presents (a) the identity processing style Q-sort…

  1. Identity Management A Primer

    CERN Document Server

    Sharoni, Ilan; Williamson, Graham; Yip, David

    2009-01-01

    In an age in which the boundaries between the real and the virtual are becoming increasingly blurred, this timely guide teaches both the key issues of identity management as well as appropriate strategies and preventative measures for ensuring personal safety in the virtual world. In a corporate setting, it is essential to identify and control the way in which the organization deals with customers, suppliers, employees, and other users who may interact with the information systems of the company. Providing strategies for overcoming this task in real-world terms as well as questions that assist

  2. The status of personnel identity verifiers

    International Nuclear Information System (INIS)

    Maxwell, R.L.

    1985-01-01

    Identity verification devices based on the interrogation of six different human biometric features or actions now exist and in general have been in development for about ten years. The capability of these devices to meet the cost and operational requirements of speed, accuracy, ease of use and reliability has generally increased although the verifier industry is still immature. Sandia Laboratories makes a continuing effort to stay abreast of identity verifier developments and to assess the capabilities and improvements of each device. Operating environment and procedures more typical of field use can often reveal performance results substantially different from laboratory tests. An evaluation of several recently available verifiers is herein reported

  3. Cuerpo e identidad en la experiencia de Alzheimer: Intentos por recuperar la condición de persona Body and identity in the experience of Alzheimer: intents to recover person's condition

    Directory of Open Access Journals (Sweden)

    Mª Antonia Martorell Poveda

    2008-03-01

    Full Text Available Cuestiones como la condición de persona o la identidad han formado y forman parte del debate filosófico entorno a la existencia humana. En términos filosóficos, una persona individual "es un ser con un cuerpo, conciencia, continuidad, compromiso y responsabilidad." Sin embargo, ¿qué sucede con el cuerpo del sujeto cuando su conciencia se ve truncada por la presencia de una enfermedad como el Alzheimer? Desde diferentes colectivos se han construido y divulgado una serie de respresentaciones culturales entorno a este padecimiento incorporadas y normalizadas en la experiencia del Alzheimer hasta el punto de colaborar en la construcción de la persona con Alzheimer como alguien "sin vida". Tomando como referente teórico el interaccionismo simbólico y recuperando las narrativas de cuidadoras familiares de personas con Alzheimer, se pretende ilustrar y analizar cómo a pesar de una construcción dominante entorno a una supuesta "pérdida del ser" del sujeto con Alzheimer, en ocasiones, sus cuidadoras favorecen, a través de sus discursos y prácticas, la emergencia de la identidad de la persona y un reconocimiento de la misma a través de su corporeidad, condición necesaria para su identificación social. Como conclusión, desde los profesionales, resulta preciso (re-construir y difundir una imagen del Alzheimer centrada en la persona que permita su (re-conocimiento e identificación cotidiana otorgándole una ubicación particular en la sociedad.Question as person's condition or the identity have formed and are part from the debate philosophical about to the human existence. In philosophical terms, an person is a being with a body, makes aware, continuity, commitment and responsibility. However, what does it happen to the fellow's body when their conscience is truncated by the presence of an illness like the Alzheimer? Different collective have been built and disclosed a series of cultural representations about Alzheimer’s disease

  4. Academic identities of black female first-year students

    African Journals Online (AJOL)

    Erna Kinsey

    sense of security, confidence, self-esteem and identity. South Africa is ... own personal manner (De Wet & Ackermann:2001:2). When looking ..... The Relationship between Identity. Development ... Self-disclosure of College Students to Faculty:.

  5. Identity at work: Exploring strategies for Identity Work

    Directory of Open Access Journals (Sweden)

    Byron G. Adams

    2012-09-01

    Research purpose: The main aim of this study was to explore employee narratives and identify the strategies available to them in the process of identity work, as they defined themselves at work. Motivation for the study: As there is a scarcity of research on identity work in South Africa, this study wanted to advance knowledge about identity work and the strategies used for regulating and negotiating an identity at work by exploring these constructs in this context. Research design, approach and method: A qualitative research process formed the basis for this study. Nineteen employees from a global manufacturing company participated in two semi-structured in-depth interviews. Grounded theory was applied to analyse and interpret the data. Main findings: Nine strategies for identity work were identified and categorised into four broad themes (personal philosophies; relationships; career management and negotiating balance. Practical/managerial implications: Employees followed various strategies for defining themselves at work and this may have some implications for employee work engagement and productivity. Contribution/value-add: This study expands on current theoretical knowledge of identity work, and provides insights into the strategies people use to regulate and negotiate their identities at work.

  6. Feminist Identity among Latina Adolescents

    Science.gov (United States)

    Manago, Adriana M.; Brown, Christia Spears; Leaper, Campbell

    2009-01-01

    This study explores developing conceptions of feminism among Latina adolescents, their prevalence of feminist endorsement, and whether home environment and well-being are related to feminist identity. One hundred and forty Latina girls (Grades 9 to 12, M age = 15) wrote personal narratives of their understanding of feminism and whether they…

  7. RESRAD-BUILD verification

    International Nuclear Information System (INIS)

    Kamboj, S.; Yu, C.; Biwer, B. M.; Klett, T.

    2002-01-01

    The results generated by the RESRAD-BUILD code (version 3.0) were verified with hand or spreadsheet calculations using equations given in the RESRAD-BUILD manual for different pathways. For verification purposes, different radionuclides--H-3, C-14, Na-22, Al-26, Cl-36, Mn-54, Co-60, Au-195, Ra-226, Ra-228, Th-228, and U-238--were chosen to test all pathways and models. Tritium, Ra-226, and Th-228 were chosen because of the special tritium and radon models in the RESRAD-BUILD code. Other radionuclides were selected to represent a spectrum of radiation types and energies. Verification of the RESRAD-BUILD code was conducted with an initial check of all the input parameters for correctness against their original source documents. Verification of the calculations was performed external to the RESRAD-BUILD code with Microsoft Excel to verify all the major portions of the code. In some cases, RESRAD-BUILD results were compared with those of external codes, such as MCNP (Monte Carlo N-particle) and RESRAD. The verification was conducted on a step-by-step basis and used different test cases as templates. The following types of calculations were investigated: (1) source injection rate, (2) air concentration in the room, (3) air particulate deposition, (4) radon pathway model, (5) tritium model for volume source, (6) external exposure model, (7) different pathway doses, and (8) time dependence of dose. Some minor errors were identified in version 3.0; these errors have been corrected in later versions of the code. Some possible improvements in the code were also identified

  8. Methods of Software Verification

    Directory of Open Access Journals (Sweden)

    R. E. Gurin

    2015-01-01

    Full Text Available This article is devoted to the problem of software verification (SW. Methods of software verification designed to check the software for compliance with the stated requirements such as correctness, system security and system adaptability to small changes in the environment, portability and compatibility, etc. These are various methods both by the operation process and by the way of achieving result. The article describes the static and dynamic methods of software verification and paid attention to the method of symbolic execution. In its review of static analysis are discussed and described the deductive method, and methods for testing the model. A relevant issue of the pros and cons of a particular method is emphasized. The article considers classification of test techniques for each method. In this paper we present and analyze the characteristics and mechanisms of the static analysis of dependencies, as well as their views, which can reduce the number of false positives in situations where the current state of the program combines two or more states obtained both in different paths of execution and in working with multiple object values. Dependences connect various types of software objects: single variables, the elements of composite variables (structure fields, array elements, the size of the heap areas, the length of lines, the number of initialized array elements in the verification code using static methods. The article pays attention to the identification of dependencies within the framework of the abstract interpretation, as well as gives an overview and analysis of the inference tools.Methods of dynamic analysis such as testing, monitoring and profiling are presented and analyzed. Also some kinds of tools are considered which can be applied to the software when using the methods of dynamic analysis. Based on the work a conclusion is drawn, which describes the most relevant problems of analysis techniques, methods of their solutions and

  9. Material integrity verification radar

    International Nuclear Information System (INIS)

    Koppenjan, S.K.

    1999-01-01

    The International Atomic Energy Agency (IAEA) has the need for verification of 'as-built' spent fuel-dry storage containers and other concrete structures. The IAEA has tasked the Special Technologies Laboratory (STL) to fabricate, test, and deploy a stepped-frequency Material Integrity Verification Radar (MIVR) system to nondestructively verify the internal construction of these containers. The MIVR system is based on previously deployed high-frequency, ground penetrating radar (GPR) systems that have been developed by STL for the U.S. Department of Energy (DOE). Whereas GPR technology utilizes microwave radio frequency energy to create subsurface images, MTVR is a variation for which the medium is concrete instead of soil. The purpose is to nondestructively verify the placement of concrete-reinforcing materials, pipes, inner liners, and other attributes of the internal construction. The MIVR system underwent an initial field test on CANDU reactor spent fuel storage canisters at Atomic Energy of Canada Limited (AECL), Chalk River Laboratories, Ontario, Canada, in October 1995. A second field test at the Embalse Nuclear Power Plant in Embalse, Argentina, was completed in May 1996. The DOE GPR also was demonstrated at the site. Data collection and analysis were performed for the Argentine National Board of Nuclear Regulation (ENREN). IAEA and the Brazilian-Argentine Agency for the Control and Accounting of Nuclear Material (ABACC) personnel were present as observers during the test. Reinforcing materials were evident in the color, two-dimensional images produced by the MIVR system. A continuous pattern of reinforcing bars was evident and accurate estimates on the spacing, depth, and size were made. The potential uses for safeguard applications were jointly discussed. The MIVR system, as successfully demonstrated in the two field tests, can be used as a design verification tool for IAEA safeguards. A deployment of MIVR for Design Information Questionnaire (DIQ

  10. Federated Identity Management

    OpenAIRE

    Chadwick, David W.

    2009-01-01

    Abstract. This paper addresses the topic of federated identity management. It discusses in detail the following topics: what is digital identity, what is identity management, what is federated identity management, Kim Camerons 7 Laws of Identity, how can we protect the users privacy in a federated environment, levels of assurance, some past and present federated identity management systems, and some current research in FIM.

  11. Human Rights and the Excess of Identity

    Science.gov (United States)

    Al Tamimi, Yussef

    2017-01-01

    Identity is a central theme in contemporary politics, but legal academia lacks a rigorous analysis of this concept. The aim of this article is twofold: (i) firstly, it aims to reveal presumptions on identity in human rights law by mapping how the European Court of Human Rights approaches identity and (ii) secondly, it seeks to analyse these presumptions using theoretical insights on identity. By merging legal and theoretical analysis, this article contributes a reading of the Court’s case law which suggests that the tension between the political and apolitical is visible as a common thread in the Court’s use of identity. In case law concerning paternity, the Court appears to hold a specific view of what is presented as an unquestionable part of identity. This ostensibly pre-political notion of identity becomes untenable in cases where the nature of an identity feature, such as the headscarf, is contended or a minority has adopted a national identity that conflicts with the majoritarian national identity. The Court’s approach to identity in such cases reflects a paradox that is inherent to identity; identity is personal while simultaneously constituted and shaped by overarching power mechanisms. PMID:29881144

  12. Social Identity in People with Multiple Sclerosis: An Examination of Family Identity and Mood.

    Science.gov (United States)

    Barker, Alex B; Lincoln, Nadina B; Hunt, Nigel; dasNair, Roshan

    2018-01-01

    Mood disorders are highly prevalent in people with multiple sclerosis (MS). MS causes changes to a person's sense of self. The Social Identity Model of Identity Change posits that group membership can have a positive effect on mood during identity change. The family is a social group implicated in adjustment to MS. The objectives of this study were to investigate whether family identity can predict mood in people with MS and to test whether this prediction was mediated by social support and connectedness to others. This cross-sectional survey of 195 participants comprised measures of family identity, family social support, connectedness to others, and mood. Family identity predicted mood both directly and indirectly through parallel mediators of family social support and connectedness to others. Family identity predicted mood as posited by the Social Identity Model of Identity Change. Involving the family in adjustment to MS could reduce low mood.

  13. Identical and shifted identical bands

    International Nuclear Information System (INIS)

    Dodder, R.S; Jones, E.F.; Hamilton, J.H.

    1997-01-01

    Spontaneous fission of 252 Cm was studied with 72 large Compton suppressed Ge detectors in Gamma sphere. New isotopes 160 Sm and 162 Gd were identified. Through X-ray-γ and γ-γ-γ) coincidence measurements, level energies were established to spins 14 + to 20 + in 152 , 154 156 60 Nd 92 94 96 , 156 , 158 , 160 62 Sm 94 , 96 , 98 , and 160 , 162 64 Gd 96 , 98 . These nuclei exhibit a remarkable variety of identical bands and bands where the energies and moments of inertia are shifted by the same constant amount for every spin state from 2 + to 12 + for various combinations of nuclei differing by 2n, 4n, 2p, 4p, and α

  14. Patriotic Acts: Five Activities for Identity Building

    Science.gov (United States)

    Soetoro-Ng, Maya

    2013-01-01

    Building a personal identity is a lifelong, thoughtful process that takes into account not only one's race and ethnicity, but also life experiences, relationships, and communities. The process of exploring and evolving one's identity deserves a place in the classroom. Educators can play a key role in supporting their students' in this process by…

  15. Identity, storytelling and the philanthropic journey

    OpenAIRE

    Maclean, Mairi; Harvey, Charles; Gordon, Jillian; Shaw, Eleanor

    2015-01-01

    This article develops theoretical understanding of the involvement of wealthy entrepreneurs in socially transformative projects by offering a foundational theory of philanthropic identity narratives. We show that these narratives are structured according to the metaphorical framework of the journey, through which actors envision and make sense of personal transformation. The journey provides a valuable metaphor for conceptualizing narrative identities in entrepreneurial careers as individuals...

  16. The symbiosis between identity and migrant entrepreneurship ...

    African Journals Online (AJOL)

    In this article I have attempted to situate entrepreneurial identity in its more comprehensive personal context by tracking cultural transformations and attempting to understand how Ghanaian women entrepreneurs in Durban negotiate their day-to-day social identities. These women entrepreneurs found themselves projecting ...

  17. Fingerprint recognition with identical twin fingerprints.

    Science.gov (United States)

    Tao, Xunqiang; Chen, Xinjian; Yang, Xin; Tian, Jie

    2012-01-01

    Fingerprint recognition with identical twins is a challenging task due to the closest genetics-based relationship existing in the identical twins. Several pioneers have analyzed the similarity between twins' fingerprints. In this work we continue to investigate the topic of the similarity of identical twin fingerprints. Our study was tested based on a large identical twin fingerprint database that contains 83 twin pairs, 4 fingers per individual and six impressions per finger: 3984 (83*2*4*6) images. Compared to the previous work, our contributions are summarized as follows: (1) Two state-of-the-art fingerprint identification methods: P071 and VeriFinger 6.1 were used, rather than one fingerprint identification method in previous studies. (2) Six impressions per finger were captured, rather than just one impression, which makes the genuine distribution of matching scores more realistic. (3) A larger sample (83 pairs) was collected. (4) A novel statistical analysis, which aims at showing the probability distribution of the fingerprint types for the corresponding fingers of identical twins which have same fingerprint type, has been conducted. (5) A novel analysis, which aims at showing which finger from identical twins has higher probability of having same fingerprint type, has been conducted. Our results showed that: (a) A state-of-the-art automatic fingerprint verification system can distinguish identical twins without drastic degradation in performance. (b) The chance that the fingerprints have the same type from identical twins is 0.7440, comparing to 0.3215 from non-identical twins. (c) For the corresponding fingers of identical twins which have same fingerprint type, the probability distribution of five major fingerprint types is similar to the probability distribution for all the fingers' fingerprint type. (d) For each of four fingers of identical twins, the probability of having same fingerprint type is similar.

  18. Fingerprint recognition with identical twin fingerprints.

    Directory of Open Access Journals (Sweden)

    Xunqiang Tao

    Full Text Available Fingerprint recognition with identical twins is a challenging task due to the closest genetics-based relationship existing in the identical twins. Several pioneers have analyzed the similarity between twins' fingerprints. In this work we continue to investigate the topic of the similarity of identical twin fingerprints. Our study was tested based on a large identical twin fingerprint database that contains 83 twin pairs, 4 fingers per individual and six impressions per finger: 3984 (83*2*4*6 images. Compared to the previous work, our contributions are summarized as follows: (1 Two state-of-the-art fingerprint identification methods: P071 and VeriFinger 6.1 were used, rather than one fingerprint identification method in previous studies. (2 Six impressions per finger were captured, rather than just one impression, which makes the genuine distribution of matching scores more realistic. (3 A larger sample (83 pairs was collected. (4 A novel statistical analysis, which aims at showing the probability distribution of the fingerprint types for the corresponding fingers of identical twins which have same fingerprint type, has been conducted. (5 A novel analysis, which aims at showing which finger from identical twins has higher probability of having same fingerprint type, has been conducted. Our results showed that: (a A state-of-the-art automatic fingerprint verification system can distinguish identical twins without drastic degradation in performance. (b The chance that the fingerprints have the same type from identical twins is 0.7440, comparing to 0.3215 from non-identical twins. (c For the corresponding fingers of identical twins which have same fingerprint type, the probability distribution of five major fingerprint types is similar to the probability distribution for all the fingers' fingerprint type. (d For each of four fingers of identical twins, the probability of having same fingerprint type is similar.

  19. Quantum money with classical verification

    Energy Technology Data Exchange (ETDEWEB)

    Gavinsky, Dmitry [NEC Laboratories America, Princeton, NJ (United States)

    2014-12-04

    We propose and construct a quantum money scheme that allows verification through classical communication with a bank. This is the first demonstration that a secure quantum money scheme exists that does not require quantum communication for coin verification. Our scheme is secure against adaptive adversaries - this property is not directly related to the possibility of classical verification, nevertheless none of the earlier quantum money constructions is known to possess it.

  20. Quantum money with classical verification

    International Nuclear Information System (INIS)

    Gavinsky, Dmitry

    2014-01-01

    We propose and construct a quantum money scheme that allows verification through classical communication with a bank. This is the first demonstration that a secure quantum money scheme exists that does not require quantum communication for coin verification. Our scheme is secure against adaptive adversaries - this property is not directly related to the possibility of classical verification, nevertheless none of the earlier quantum money constructions is known to possess it

  1. Scalable Techniques for Formal Verification

    CERN Document Server

    Ray, Sandip

    2010-01-01

    This book presents state-of-the-art approaches to formal verification techniques to seamlessly integrate different formal verification methods within a single logical foundation. It should benefit researchers and practitioners looking to get a broad overview of the spectrum of formal verification techniques, as well as approaches to combining such techniques within a single framework. Coverage includes a range of case studies showing how such combination is fruitful in developing a scalable verification methodology for industrial designs. This book outlines both theoretical and practical issue

  2. A Practitioners Perspective on Verification

    Science.gov (United States)

    Steenburgh, R. A.

    2017-12-01

    NOAAs Space Weather Prediction Center offers a wide range of products and services to meet the needs of an equally wide range of customers. A robust verification program is essential to the informed use of model guidance and other tools by both forecasters and end users alike. In this talk, we present current SWPC practices and results, and examine emerging requirements and potential approaches to satisfy them. We explore the varying verification needs of forecasters and end users, as well as the role of subjective and objective verification. Finally, we describe a vehicle used in the meteorological community to unify approaches to model verification and facilitate intercomparison.

  3. Recognizing Moral Identity as a Cultural Construct.

    Science.gov (United States)

    Jia, Fanli; Krettenauer, Tobias

    2017-01-01

    Current research on moral identity shows that moral identity predicts moral action in Western cultures but not in non-Western cultures. The present paper argues that this may be due to the fact that the concept of moral identity is culturally biased. In order to remedy this situation, we argue that researchers should broaden their scopes of inquiry by adding a cultural lens to their studies of moral identity. This change is important because although some concept of moral identity likely exists in all cultures, it may function in different ways and at different levels in each place. We propose that moral identity is a context-dependent construct tied to varying social and cultural obligations. We argue that Western moral identity stresses an individually oriented morality, whereas, people from Eastern cultures consider a highly moral person to be societally oriented. We conclude by discussing the implications of this view for future research.

  4. A bimodal verification cryptosystem as a framework against spoofing attacks

    OpenAIRE

    Toli, Christina-Angeliki; Preneel, Bart

    2015-01-01

    The exponential growth of immigration crisis and the recent terrorism cases revealed the increase of fraud occurrences, cloning and identity theft with numerous social, economic and political consequences. The trustworthiness of biometrics during verification processes has been compromised by spoofing attackers sprang up to exploit the security gaps. Additionally, the cryptography’s role in the area is highly important as it may promote fair assessment procedures and foster public trust by se...

  5. Negotiation of identities in intercultural communication

    Directory of Open Access Journals (Sweden)

    Janík Zdeněk

    2017-01-01

    Full Text Available Negotiation of identities in communication entails affirming the identities we want others to recognize in us and ascription of identities we mutually assign to each other in communication. The study of intercultural communication focuses on cultural identity as the principal identity component that defines intercultural communication. In this article, the assumption that cultural group membership factors determine the context of intercultural communication is questioned. The article examines how intercultural interlocutors negotiate their identities in various intercultural interactions. The aims of the research presented in this paper are: 1 to examine which identities - cultural, personal, or social - intercultural interlocutors activate in intercultural communication; 2 to determine whether interlocutors’ intercultural communication is largely influenced by their cultural identities; 3 and to identify situations in which they activate their cultural identities (3. The research data were collected from 263 international students studying at Masaryk University in Brno in the years 2010 - 2016. Although the research results are not conclusive, they indicate that cultural identities predominate in the students’ ethnocentric views and that stereotypes constrain the students’ cultural identities and affect the negotiation of identities in intercultural communication.

  6. Writer Identification and Verification from Intra-variable Individual Handwriting

    OpenAIRE

    Adak, Chandranath; Chaudhuri, Bidyut B.; Blumenstein, Michael

    2017-01-01

    The handwriting of an individual may vary excessively with many factors such as mood, time, space, writing speed, writing medium, utensils etc. Therefore, it becomes more challenging to perform automated writer verification/ identification on a particular set of handwritten patterns (e.g. speedy handwriting) of a person, especially when the system is trained using a different set of writing patterns (e.g. normal/medium speed) of that same person. However, it would be interesting to experiment...

  7. High-level verification

    CERN Document Server

    Lerner, Sorin; Kundu, Sudipta

    2011-01-01

    Given the growing size and heterogeneity of Systems on Chip (SOC), the design process from initial specification to chip fabrication has become increasingly complex. This growing complexity provides incentive for designers to use high-level languages such as C, SystemC, and SystemVerilog for system-level design. While a major goal of these high-level languages is to enable verification at a higher level of abstraction, allowing early exploration of system-level designs, the focus so far for validation purposes has been on traditional testing techniques such as random testing and scenario-based

  8. End-to-End Verification of Information-Flow Security for C and Assembly Programs

    Science.gov (United States)

    2016-04-01

    seL4 security verification [18] avoids this issue in the same way. In that work, the authors frame their solution as a restriction that disallows...identical: (σ, σ′1) ∈ TM ∧ (σ, σ′2) ∈ TM =⇒ Ol(σ′1) = Ol(σ′2) The successful security verifications of both seL4 and mCertiKOS provide reasonable...evidence that this restriction on specifications is not a major hindrance for usability. Unlike the seL4 verification, however, our framework runs into a

  9. Fostering group identification and creativity in diverse groups: the role of individuation and self-verification.

    Science.gov (United States)

    Swann, William B; Kwan, Virginia S Y; Polzer, Jeffrey T; Milton, Laurie P

    2003-11-01

    A longitudinal study examined the interplay of identity negotiation processes and diversity in small groups of master's of business administration (MBA) students. When perceivers formed relatively positive impressions of other group members, higher diversity predicted more individuation of targets. When perceivers formed relatively neutral impressions of other group members, however, higher diversity predicted less individuation of targets. Individuation at the outset of the semester predicted self-verification effects several weeks later, and self-verification, in turn, predicted group identification and creative task performance. The authors conclude that contrary to self-categorization theory, fostering individuation and self-verification in diverse groups may maximize group identification and productivity.

  10. Gender identity and sport: is the playing field level?

    Science.gov (United States)

    Reeser, J C

    2005-10-01

    This review examines gender identity issues in competitive sports, focusing on the evolution of policies relating to female gender verification and transsexual participation in sport. The issues are complex and continue to challenge sport governing bodies, including the International Olympic Committee, as they strive to provide a safe environment in which female athletes may compete fairly and equitably.

  11. Dissociative identity disorder: a controversial diagnosis.

    Science.gov (United States)

    Gillig, Paulette Marie

    2009-03-01

    A brief description of the controversies surrounding the diagnosis of dissociative identity disorder is presented, followed by a discussion of the proposed similarities and differences between dissociative identity disorder and borderline personality disorder. The phenomenon of autohypnosis in the context of early childhood sexual trauma and disordered attachment is discussed, as is the meaning of alters or alternate personalities. The author describes recent neurosciences research that may relate the symptoms of dissociative identity disorder to demonstrable disordered attention and memory processes. A clinical description of a typical patient presentation is included, plus some recommendations for approaches to treatment.

  12. HDL to verification logic translator

    Science.gov (United States)

    Gambles, J. W.; Windley, P. J.

    1992-01-01

    The increasingly higher number of transistors possible in VLSI circuits compounds the difficulty in insuring correct designs. As the number of possible test cases required to exhaustively simulate a circuit design explodes, a better method is required to confirm the absence of design faults. Formal verification methods provide a way to prove, using logic, that a circuit structure correctly implements its specification. Before verification is accepted by VLSI design engineers, the stand alone verification tools that are in use in the research community must be integrated with the CAD tools used by the designers. One problem facing the acceptance of formal verification into circuit design methodology is that the structural circuit descriptions used by the designers are not appropriate for verification work and those required for verification lack some of the features needed for design. We offer a solution to this dilemma: an automatic translation from the designers' HDL models into definitions for the higher-ordered logic (HOL) verification system. The translated definitions become the low level basis of circuit verification which in turn increases the designer's confidence in the correctness of higher level behavioral models.

  13. IDENTITY FRAUD: Prevalence and Links to Alien Illegal Activities

    National Research Council Canada - National Science Library

    2002-01-01

    To discuss the significance of "identity fraud"-a term that encompasses a broad range of illegal activities based on fraudulent use of identifying information of a real person or of a fictitious person...

  14. Identity development in adolescents with mental problems.

    Science.gov (United States)

    Jung, Emanuel; Pick, Oliver; Schlüter-Müller, Susanne; Schmeck, Klaus; Goth, Kirstin

    2013-07-31

    In the revision of the Diagnostic and Statistical Manual (DSM-5), "Identity" is an essential diagnostic criterion for personality disorders (self-related personality functioning) in the alternative approach to the diagnosis of personality disorders in Section III of DSM-5. Integrating a broad range of established identity concepts, AIDA (Assessment of Identity Development in Adolescence) is a new questionnaire to assess pathology-related identity development in healthy and disturbed adolescents aged 12 to 18 years. Aim of the present study is to investigate differences in identity development between adolescents with different psychiatric diagnoses. Participants were 86 adolescent psychiatric in- and outpatients aged 12 to 18 years. The test set includes the questionnaire AIDA and two semi-structured psychiatric interviews (SCID-II, K-DIPS). The patients were assigned to three diagnostic groups (personality disorders, internalizing disorders, externalizing disorders). Differences were analyzed by multivariate analysis of variance MANOVA. In line with our hypotheses, patients with personality disorders showed the highest scores in all AIDA scales with T>70. Patients with externalizing disorders showed scores in an average range compared to population norms, while patients with internalizing disorders lay in between with scores around T=60. The AIDA total score was highly significant between the groups with a remarkable effect size of f= 0.44. Impairment of identity development differs between adolescent patients with different forms of mental disorders. The AIDA questionnaire is able to discriminate between these groups. This may help to improve assessment and treatment of adolescents with severe psychiatric problems.

  15. Verification of Simulation Tools

    International Nuclear Information System (INIS)

    Richard, Thierry

    2015-01-01

    Before qualifying a simulation tool, the requirements shall first be clearly identified, i.e.: - What type of study needs to be carried out? - What phenomena need to be modeled? This phase involves writing a precise technical specification. Once the requirements are defined, the most adapted product shall be selected from the various software options available on the market. Before using a particular version of a simulation tool to support the demonstration of nuclear safety studies, the following requirements shall be met. - An auditable quality assurance process complying with development international standards shall be developed and maintained, - A process of verification and validation (V and V) shall be implemented. This approach requires: writing a report and/or executive summary of the V and V activities, defining a validated domain (domain in which the difference between the results of the tools and those of another qualified reference is considered satisfactory for its intended use). - Sufficient documentation shall be available, - A detailed and formal description of the product (software version number, user configuration, other settings and parameters) in the targeted computing environment shall be available. - Source codes corresponding to the software shall be archived appropriately. When these requirements are fulfilled, the version of the simulation tool shall be considered qualified for a defined domain of validity, in a given computing environment. The functional verification shall ensure that: - the computer architecture of the tool does not include errors, - the numerical solver correctly represents the physical mathematical model, - equations are solved correctly. The functional verification can be demonstrated through certification or report of Quality Assurance. The functional validation shall allow the user to ensure that the equations correctly represent the physical phenomena in the perimeter of intended use. The functional validation can

  16. Shift Verification and Validation

    Energy Technology Data Exchange (ETDEWEB)

    Pandya, Tara M. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Evans, Thomas M. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Davidson, Gregory G [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Johnson, Seth R. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Godfrey, Andrew T. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States)

    2016-09-07

    This documentation outlines the verification and validation of Shift for the Consortium for Advanced Simulation of Light Water Reactors (CASL). Five main types of problems were used for validation: small criticality benchmark problems; full-core reactor benchmarks for light water reactors; fixed-source coupled neutron-photon dosimetry benchmarks; depletion/burnup benchmarks; and full-core reactor performance benchmarks. We compared Shift results to measured data and other simulated Monte Carlo radiation transport code results, and found very good agreement in a variety of comparison measures. These include prediction of critical eigenvalue, radial and axial pin power distributions, rod worth, leakage spectra, and nuclide inventories over a burn cycle. Based on this validation of Shift, we are confident in Shift to provide reference results for CASL benchmarking.

  17. Biracial Japanese American identity: an evolving process.

    Science.gov (United States)

    Collins, J F

    2000-05-01

    perspectives, identifications, and allegiances as they passed through a series of life experiences. Instead of staying marginalized, they integrated both cultures, recognizing positive values of both, thus developing an integrated identity. Although the participants' experiences and perceptions were varied, the overarching themes of self-evaluation, confusion of categorization, belonging, infusion/exploration, situational use of identity, and resolution/acceptance/self-verification were presented. On the basis of the research, a model of ethnic identity for biracial individuals is proposed.

  18. Apparent Amnesia : interidentity memory functioning in dissociative identity disdorder

    NARCIS (Netherlands)

    Huntjens, R.J.C.

    2003-01-01

    Dissociative identity disorder (DID) is characterized by the presence of two or more distinct identities or personality states that recurrently take control of the individual s behavior. Between 95 and 100 % of DID patients report experiences of blank spells for periods of time when other identities

  19. 22 CFR 50.9 - Card of identity.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Card of identity. 50.9 Section 50.9 Foreign... of United States Nationality of a Person Abroad § 50.9 Card of identity. When authorized by the Department, consular offices or designated nationality examiners may issue a card of identity for travel to...

  20. School Identity in the Context of Alberta Charter Schools

    Science.gov (United States)

    Thompson, Merlin; Gereluk, Dianne; Kowch, Eugene

    2016-01-01

    The central tenet of this investigation is that educational institutions possess their own school identity. Acknowledging that school identity is influenced by institutional mechanisms and personal dynamics, we examine school identity in the context of 13 Alberta charter schools. Narratives of 73 educational stakeholders across the network of…

  1. A Secure Framework for Location Verification in Pervasive Computing

    Science.gov (United States)

    Liu, Dawei; Lee, Moon-Chuen; Wu, Dan

    The way people use computing devices has been changed in some way by the relatively new pervasive computing paradigm. For example, a person can use a mobile device to obtain its location information at anytime and anywhere. There are several security issues concerning whether this information is reliable in a pervasive environment. For example, a malicious user may disable the localization system by broadcasting a forged location, and it may impersonate other users by eavesdropping their locations. In this paper, we address the verification of location information in a secure manner. We first present the design challenges for location verification, and then propose a two-layer framework VerPer for secure location verification in a pervasive computing environment. Real world GPS-based wireless sensor network experiments confirm the effectiveness of the proposed framework.

  2. Autonoesis and dissociative identity disorder.

    Science.gov (United States)

    Morton, John

    2018-01-01

    Dissociative identity disorder is characterised by the presence in one individual of two or more alternative personality states (alters). For such individuals, the memory representation of a particular event can have full episodic, autonoetic status for one alter, while having the status of knowledge or even being inaccessible to a second alter. This phenomenon appears to create difficulties for a purely representational theory and is presented to Mahr & Csibra (M&C) for their consideration.

  3. Intersecting Sexual, Gender, and Professional Identities among Social Work Students: The Importance of Identity Integration

    Science.gov (United States)

    Craig, Shelley L.; Iacono, Gio; Paceley, Megan S.; Dentato, Michael P.; Boyle, Kerrie E. H.

    2017-01-01

    Discrimination toward lesbian, gay, bisexual, transgender, and queer (LGBTQ) social work students can negatively affect academic performance and personal and professional identity development. Intersectionality is a conceptual approach that states that social identities interact to form different meanings and experiences from those that could be…

  4. Improved verification methods for safeguards verifications at enrichment plants

    International Nuclear Information System (INIS)

    Lebrun, A.; Kane, S. C.; Bourva, L.; Poirier, S.; Loghin, N. E.; Langlands, D.

    2009-01-01

    The International Atomic Energy Agency (IAEA) has initiated a coordinated research and development programme to improve its verification methods and equipment applicable to enrichment plants. The programme entails several individual projects to meet the objectives of the IAEA Safeguards Model Approach for Gas Centrifuge Enrichment Plants updated in 2006. Upgrades of verification methods to confirm the absence of HEU (highly enriched uranium) production have been initiated and, in particular, the Cascade Header Enrichment Monitor (CHEM) has been redesigned to reduce its weight and incorporate an electrically cooled germanium detector. Such detectors are also introduced to improve the attended verification of UF 6 cylinders for the verification of the material balance. Data sharing of authenticated operator weighing systems such as accountancy scales and process load cells is also investigated as a cost efficient and an effective safeguards measure combined with unannounced inspections, surveillance and non-destructive assay (NDA) measurement. (authors)

  5. Improved verification methods for safeguards verifications at enrichment plants

    Energy Technology Data Exchange (ETDEWEB)

    Lebrun, A.; Kane, S. C.; Bourva, L.; Poirier, S.; Loghin, N. E.; Langlands, D. [Department of Safeguards, International Atomic Energy Agency, Wagramer Strasse 5, A1400 Vienna (Austria)

    2009-07-01

    The International Atomic Energy Agency (IAEA) has initiated a coordinated research and development programme to improve its verification methods and equipment applicable to enrichment plants. The programme entails several individual projects to meet the objectives of the IAEA Safeguards Model Approach for Gas Centrifuge Enrichment Plants updated in 2006. Upgrades of verification methods to confirm the absence of HEU (highly enriched uranium) production have been initiated and, in particular, the Cascade Header Enrichment Monitor (CHEM) has been redesigned to reduce its weight and incorporate an electrically cooled germanium detector. Such detectors are also introduced to improve the attended verification of UF{sub 6} cylinders for the verification of the material balance. Data sharing of authenticated operator weighing systems such as accountancy scales and process load cells is also investigated as a cost efficient and an effective safeguards measure combined with unannounced inspections, surveillance and non-destructive assay (NDA) measurement. (authors)

  6. Compressive sensing using optimized sensing matrix for face verification

    Science.gov (United States)

    Oey, Endra; Jeffry; Wongso, Kelvin; Tommy

    2017-12-01

    Biometric appears as one of the solutions which is capable in solving problems that occurred in the usage of password in terms of data access, for example there is possibility in forgetting password and hard to recall various different passwords. With biometrics, physical characteristics of a person can be captured and used in the identification process. In this research, facial biometric is used in the verification process to determine whether the user has the authority to access the data or not. Facial biometric is chosen as its low cost implementation and generate quite accurate result for user identification. Face verification system which is adopted in this research is Compressive Sensing (CS) technique, in which aims to reduce dimension size as well as encrypt data in form of facial test image where the image is represented in sparse signals. Encrypted data can be reconstructed using Sparse Coding algorithm. Two types of Sparse Coding namely Orthogonal Matching Pursuit (OMP) and Iteratively Reweighted Least Squares -ℓp (IRLS-ℓp) will be used for comparison face verification system research. Reconstruction results of sparse signals are then used to find Euclidean norm with the sparse signal of user that has been previously saved in system to determine the validity of the facial test image. Results of system accuracy obtained in this research are 99% in IRLS with time response of face verification for 4.917 seconds and 96.33% in OMP with time response of face verification for 0.4046 seconds with non-optimized sensing matrix, while 99% in IRLS with time response of face verification for 13.4791 seconds and 98.33% for OMP with time response of face verification for 3.1571 seconds with optimized sensing matrix.

  7. Inter-identity autobiographical amnesia in patients with dissociative identity disorder

    OpenAIRE

    Huntjens, Rafaele JC; Verschuere, Bruno; McNally, Richard J

    2012-01-01

    Background: A major symptom of Dissociative Identity Disorder (DID; formerly Multiple Personality Disorder) is dissociative amnesia, the inability to recall important personal information. Only two case studies have directly addressed autobiographical memory in DID. Both provided evidence suggestive of dissociative amnesia. The aim of the current study was to objectively assess transfer of autobiographical information between identities in a larger sample of DID patients. Methods: Using a c...

  8. Central Verification System

    Data.gov (United States)

    US Agency for International Development — CVS is a system managed by OPM that is designed to be the primary tool for verifying whether or not there is an existing investigation on a person seeking security...

  9. Verification criteria on the reliability of personal dosimetric services from x and gamma radiations; Criteri per la verifica dell'affidabilita di un servizio di dosimetria personale per radiazioni x e gamma

    Energy Technology Data Exchange (ETDEWEB)

    Borasi, G [Arcisp. S. Maria Nuova, USL 9, Reggio Emilia (Italy); Benco, A [CCE-CCR, Ispra, Varese (Italy); Kaftal, S [CESNEF - Politecnico, Milan (Italy)

    1990-07-15

    The paper presents the methods used by Working Group ENEA-EDP (Experts in Personal Dosimetry) to control the reliability of the Dosimetric Services operating in Italy and asking for the above controls on voluntary basis. Testing and irradiation test methods are explained as well as the evaluation criteria. The paper includes suggestions and guide-lines to gain the status of 'Reliable Service'. Technical equipment and operating procedures needed to pass the test are also illustrated. (author)

  10. The Significance of Mandatory Data Breach Warnings to Identity Crime

    OpenAIRE

    Eric Holm; Geraldine Mackenzie

    2015-01-01

    The relationship between data breaches and identity crime has been scarcely explored in current literature. However, there is an important relationship between the misuse of personal identification information and identity crime as the former is in many respects the catalyst for the latter. Data breaches are one of the ways in which this personal identification information is obtained by identity criminals, and thereby any response to data breaches is likely to impact the incidence of identit...

  11. Identity after Death

    DEFF Research Database (Denmark)

    Gerstrøm, Anna

    2015-01-01

    Purpose: The purpose of this paper is to explore how legacy organizational identity and death relate to each other and, thereby, contribute to closing the gap in knowledge on organizational identity constructions in times of death. Design/methodology/approach: The paper opted for an exploratory....../value: This paper addresses an apparent gap in the literature on identity and death; exploring identity narratives in a bankrupted bank, the paper considers constructions of legacy organizational identities in times of disruptive death....

  12. Asian American Adolescent Identity

    OpenAIRE

    Ohm, Julie Juhye

    1999-01-01

    The formation of ego identity in Asian American late adolescents attending Virginia Tech was examined within the frameworks of Erikson's psychosocial theory and Berry, Trimble, and Olmedo's model of acculturation. Ego identity was measured using the Achieved sub-scale of the Revised Version of the Extended Objective Measure of Ego Identity Status, an instrument based on the theoretical constructs of Erikson. Ethnic identity was measured using the Multigroup Ethnic Identity Measure and America...

  13. Numident Online Verification Utility (NOVU)

    Data.gov (United States)

    Social Security Administration — NOVU is a mainframe application that accesses the NUMIDENT to perform real-time SSN verifications. This program is called by other SSA online programs that serve as...

  14. Image Processing Based Signature Verification Technique to Reduce Fraud in Financial Institutions

    Directory of Open Access Journals (Sweden)

    Hussein Walid

    2016-01-01

    Full Text Available Handwritten signature is broadly utilized as personal verification in financial institutions ensures the necessity for a robust automatic signature verification tool. This tool aims to reduce fraud in all related financial transactions’ sectors. This paper proposes an online, robust, and automatic signature verification technique using the recent advances in image processing and machine learning. Once the image of a handwritten signature for a customer is captured, several pre-processing steps are performed on it including filtration and detection of the signature edges. Afterwards, a feature extraction process is applied on the image to extract Speeded up Robust Features (SURF and Scale-Invariant Feature Transform (SIFT features. Finally, a verification process is developed and applied to compare the extracted image features with those stored in the database for the specified customer. Results indicate high accuracy, simplicity, and rapidity of the developed technique, which are the main criteria to judge a signature verification tool in banking and other financial institutions.

  15. The Brand Identity: A Strategic Shift for Success

    OpenAIRE

    Victor Danciu

    2010-01-01

    The strong identity is a key condition for the real success of a brand strategy. The identity reflects the inner value of the brand and describes its potential success. In order to maximize this value a brand identity should include and develop all dimensions of its complex structure. The product, the organizational, the personality and the symbolic dimension of the brand identity could develop a great capability for many associations that could be made to the brand. Apple is a brand that has...

  16. Personal Beacon

    Science.gov (United States)

    2000-01-01

    The MicroPLB (personal locator beacon) is a search and rescue satellite-aided tracking (SARSAT) transmitter. When activated it emits a distress signal to a constellation of internationally operated satellites. The endangered person's identity and location anywhere on Earth is automatically forwarded to central monitoring stations around the world. It is accurate to within just a few meters. The user uses the device to download navigation data from a global positioning satellite receiver. After the download is complete, the MicroPLB functions as a self-locating beacon. Also, it is the only PLB to use a safe battery. In the past, other PLB devices have used batteries that have enough volatility to explode with extreme force. It was developed by Microwave Monolithic, Inc. through SBIR funding from Glenn Research Center and Goddard Space Flight Center.

  17. Experimental inventory verification system

    International Nuclear Information System (INIS)

    Steverson, C.A.; Angerman, M.I.

    1991-01-01

    As Low As Reasonably Achievable (ALARA) goals and Department of Energy (DOE) inventory requirements are frequently in conflict at facilities across the DOE complex. The authors wish, on one hand, to verify the presence of correct amounts of nuclear materials that are in storage or in process; yet on the other hand, we wish to achieve ALARA goals by keeping individual and collective exposures as low as social, technical, economic, practical, and public policy considerations permit. The Experimental Inventory Verification System (EIVSystem) is a computer-based, camera-driven system that utilizes image processing technology to detect change in vault areas. Currently in the test and evaluation phase at Idaho National Engineering Laboratory, this system guards personnel. The EIVSystem continually monitors the vault, providing proof of changed status for objects sorted within the vault. This paper reports that these data could provide the basis for reducing inventory requirements when no change has occurred, thus helping implement ALARA policy; the data will also help describe there target area of an inventory when change has been shown to occur

  18. Woodward Effect Experimental Verifications

    Science.gov (United States)

    March, Paul

    2004-02-01

    The work of J. F. Woodward (1990 1996a; 1996b; 1998; 2002a; 2002b; 2004) on the existence of ``mass fluctuations'' and their use in exotic propulsion schemes was examined for possible application in improving space flight propulsion and power generation. Woodward examined Einstein's General Relativity Theory (GRT) and assumed that if the strong Machian interpretation of GRT as well as gravitational / inertia like Wheeler-Feynman radiation reaction forces hold, then when an elementary particle is accelerated through a potential gradient, its rest mass should fluctuate around its mean value during its acceleration. Woodward also used GRT to clarify the precise experimental conditions necessary for observing and exploiting these mass fluctuations or ``Woodward effect'' (W-E). Later, in collaboration with his ex-graduate student T. Mahood, they also pushed the experimental verification boundaries of these proposals. If these purported mass fluctuations occur as Woodward claims, and his assumption that gravity and inertia are both byproducts of the same GRT based phenomenon per Mach's Principle is correct, then many innovative applications such as propellantless propulsion and gravitational exotic matter generators may be feasible. This paper examines the reality of mass fluctuations and the feasibility of using the W-E to design propellantless propulsion devices in the near to mid-term future. The latest experimental results, utilizing MHD-like force rectification systems, will also be presented.

  19. Verification of hypergraph states

    Science.gov (United States)

    Morimae, Tomoyuki; Takeuchi, Yuki; Hayashi, Masahito

    2017-12-01

    Hypergraph states are generalizations of graph states where controlled-Z gates on edges are replaced with generalized controlled-Z gates on hyperedges. Hypergraph states have several advantages over graph states. For example, certain hypergraph states, such as the Union Jack states, are universal resource states for measurement-based quantum computing with only Pauli measurements, while graph state measurement-based quantum computing needs non-Clifford basis measurements. Furthermore, it is impossible to classically efficiently sample measurement results on hypergraph states unless the polynomial hierarchy collapses to the third level. Although several protocols have been proposed to verify graph states with only sequential single-qubit Pauli measurements, there was no verification method for hypergraph states. In this paper, we propose a method for verifying a certain class of hypergraph states with only sequential single-qubit Pauli measurements. Importantly, no i.i.d. property of samples is assumed in our protocol: any artificial entanglement among samples cannot fool the verifier. As applications of our protocol, we consider verified blind quantum computing with hypergraph states, and quantum computational supremacy demonstrations with hypergraph states.

  20. Identity Work and Emotions

    DEFF Research Database (Denmark)

    Winkler, Ingo

    2018-01-01

    This paper reviews the empirical literature on identity work and identifies two distinct approaches to incorporating emotion. The majority of empirical studies use emotion to describe the experiences of identity work. In doing so, the authors (a) mention the emotions that people feel in situations...... that trigger identity work, (b) illustrate identity work as an emotional endeavour, and (c) describe the emotional impact of successful and unsuccessful identity work. There is also an emerging literature that examines the mutual constitution of emotions and identity work. These authors address emotional...... labour, affective social identification, emotional attachment and detachment, and humour when studying identity work. This paper suggests that, to understand better the relation between emotions and identity work, future research should examine the role of emotions in problematizing identity...

  1. Identity and identity conflict in the workplace

    NARCIS (Netherlands)

    K.E. Horton (Kate); P.S. Bayerl (Saskia); G. Belschak-Jacobs (Gabriele)

    2014-01-01

    textabstractAs individuals, we define ourselves according to various characteristics that include our values and beliefs. This gives us our identity. As organisations become increasingly complex, understanding the concept of identity conflict may mean the difference between success and failure.

  2. Creation, Identity and Reflection

    Directory of Open Access Journals (Sweden)

    Alina Beatrice Cheşcă

    2015-05-01

    Full Text Available The paper “Creation, Identity and Reflection” approaches the identification in the “mirror” of reality with creation, in other words seeking the authors’ identity in the reflected images. Reflection means attempting to find oneself, the mirror being the main principle of creation. Many characters become interesting only when they step into the world beyond the mirror, when their faces are doubled by the other self or when their selves are returned by other characters. The narcissistic concept of the mirror, i.e. the reflection in the mirror and the representation of the mirror itself, is a recurrent one in literature, but the reflection of the self which is not the self (as it is a reflection does not necessarily appear in a mirror or in a photograph or portrait. Sometimes, the not-self is returned to the self by another person or character. As far as Oscar Wilde’s theories are concerned, the main idea is that people are interesting for their masks, not for their inner nature. What Wilde calls “inner nature” is the characters’ un-reflected self and the mask is the reflection, the self in the mirror. Some characters’ relationships develop within a fiction that they dramatically try to preserve and protect with the risk of suffering. They refuse to take off the masks which define them in the others’ minds and hearts; the narcissistic individuals (both artists and characters seek and love their own image which they project upon facts, thus creating a fictive realm.

  3. On Fay identity

    International Nuclear Information System (INIS)

    Michev, Iordan P.

    2006-01-01

    In the first part of this paper we consider the transformation of the cubic identities for general Korteweg-de Vries (KdV) tau functions from [Mishev, J. Math. Phys. 40, 2419-2428 (1999)] to the specific identities for trigonometric KdV tau functions. Afterwards, we consider the Fay identity as a functional equation and provide a wide set of solutions of this equation. The main result of this paper is Theorem 3.4, where we generalize the identities from Mishev. An open problem is the transformation of the cubic identities from Mishev to the specific identities for elliptic KdV tau functions

  4. Identities as organizational practices

    DEFF Research Database (Denmark)

    Oshima, Sae; Asmuß, Birte

    Identity has been widely acknowledged as playing a central role in various organizational processes, yet there is still a need to better understand the dynamics and functions of identity work in modern organizations. The present paper is centered within this concern, and examines identity......) reveal the intersubjective, multimodal and embodied nature of identity work; 2) demonstrate identity work as organizational practices, used in order to accomplish specific actions; and 3) pose a question on the view on identity as a layered/leveled phenomenon....

  5. Identity transformation in medical students.

    Science.gov (United States)

    Cohen, Mitchell J M; Kay, Abigail; Youakim, James M; Balaicuis, John M; Balacius, John M

    2009-03-01

    This paper reviews the literature on the impact of medical school on personal development and consolidation of core identity. The limited literature relies on reports from medical students' journaling exercises, discussion groups, post-graduation surveys, and repeated personality testing. We review forces acting on medical students, with potential transforming effects. These forces include high external expectations and internal fear of superficial knowledge and skills, entry into the culture of medicine with its insider jargon and hierarchy, high academic workload, and the emotional burdens of confronting cadavers and death as well as bearing witness to patients' suffering. Potential developmental delay, emergence of substance abuse and hedonic acting out, cynicism, and loss of individual core values are possible consequences. Protections against these adverse outcomes include identification of strong mentors and role models, developing post-conventional morality and relativistic thinking, finding healthy coping strategies such as peer support, and remaining intellectually creative and personally reflective.

  6. Advanced verification methods for OVI security ink

    Science.gov (United States)

    Coombs, Paul G.; McCaffery, Shaun F.; Markantes, Tom

    2006-02-01

    OVI security ink +, incorporating OVP security pigment* microflakes, enjoys a history of effective document protection. This security feature provides not only first-line recognition by the person on the street, but also facilitates machine-readability. This paper explores the evolution of OVI reader technology from proof-of-concept to miniaturization. Three different instruments have been built to advance the technology of OVI machine verification. A bench-top unit has been constructed which allows users to automatically verify a multitude of different banknotes and OVI images. In addition, high speed modules were fabricated and tested in a state of the art banknote sorting machine. Both units demonstrate the ability of modern optical components to illuminate and collect light reflected from the interference platelets within OVI ink. Electronic hardware and software convert and process the optical information in milliseconds to accurately determine the authenticity of the security feature. Most recently, OVI ink verification hardware has been miniaturized and simplified providing yet another platform for counterfeit protection. These latest devices provide a tool for store clerks and bank tellers to unambiguously determine the validity of banknotes in the time period it takes the cash drawer to be opened.

  7. Monitoring/Verification Using DMS: TATP Example

    International Nuclear Information System (INIS)

    Kevin Kyle; Stephan Weeks

    2008-01-01

    Field-rugged and field-programmable differential mobility spectrometry (DMS) networks provide highly selective, universal monitoring of vapors and aerosols at detectable levels from persons or areas involved with illicit chemical/biological/explosives (CBE) production. CBE sensor motes used in conjunction with automated fast gas chromatography with DMS detection (GC/DMS) verification instrumentation integrated into situational operations management systems can be readily deployed and optimized for changing application scenarios. The feasibility of developing selective DMS motes for a 'smart dust' sampling approach with guided, highly selective, fast GC/DMS verification analysis is a compelling approach to minimize or prevent the illegal use of explosives or chemical and biological materials. DMS is currently one of the foremost emerging technologies for field separation and detection of gas-phase chemical species. This is due to trace-level detection limits, high selectivity, and small size. GC is the leading analytical method for the separation of chemical species in complex mixtures. Low-thermal-mass GC columns have led to compact, low-power field systems capable of complete analyses in 15-300 seconds. A collaborative effort optimized a handheld, fast GC/DMS, equipped with a non-rad ionization source, for peroxide-based explosive measurements

  8. Identity, storytelling and the philanthropic journey

    Science.gov (United States)

    Maclean, Mairi; Harvey, Charles; Gordon, Jillian; Shaw, Eleanor

    2015-01-01

    This article develops theoretical understanding of the involvement of wealthy entrepreneurs in socially transformative projects by offering a foundational theory of philanthropic identity narratives. We show that these narratives are structured according to the metaphorical framework of the journey, through which actors envision and make sense of personal transformation. The journey provides a valuable metaphor for conceptualizing narrative identities in entrepreneurial careers as individuals navigate different social landscapes, illuminating identities as unfolding through a process of wayfinding in response to events, transitions and turning-points. We delineate the journey from entrepreneurship to philanthropy, and propose a typology of rewards that entrepreneurs claim to derive from giving. We add to the expanding literature on narrative identities by suggesting that philanthropic identity narratives empower wealthy entrepreneurs to generate a legacy of the self that is both self- and socially oriented, these ‘generativity scripts’ propelling their capacity for action while ensuring the continuation of their journeys. PMID:26456976

  9. Identity, storytelling and the philanthropic journey.

    Science.gov (United States)

    Maclean, Mairi; Harvey, Charles; Gordon, Jillian; Shaw, Eleanor

    2015-10-01

    This article develops theoretical understanding of the involvement of wealthy entrepreneurs in socially transformative projects by offering a foundational theory of philanthropic identity narratives. We show that these narratives are structured according to the metaphorical framework of the journey , through which actors envision and make sense of personal transformation. The journey provides a valuable metaphor for conceptualizing narrative identities in entrepreneurial careers as individuals navigate different social landscapes, illuminating identities as unfolding through a process of wayfinding in response to events, transitions and turning-points. We delineate the journey from entrepreneurship to philanthropy, and propose a typology of rewards that entrepreneurs claim to derive from giving. We add to the expanding literature on narrative identities by suggesting that philanthropic identity narratives empower wealthy entrepreneurs to generate a legacy of the self that is both self- and socially oriented, these 'generativity scripts' propelling their capacity for action while ensuring the continuation of their journeys.

  10. Researching Identity and Interculturality

    DEFF Research Database (Denmark)

    Lønsmann, Dorte

    2016-01-01

    Review of: Researching Identity and Interculturality / by F. Dervin and K. Risager (eds.). Routledge 2015, 245 pp.......Review of: Researching Identity and Interculturality / by F. Dervin and K. Risager (eds.). Routledge 2015, 245 pp....

  11. Understanding Identity and Organizations

    DEFF Research Database (Denmark)

    Christensen, Lars Thøger

    2013-01-01

    The article reviews the book "Understanding Identity and Organizations," by Kate Kenny, Andrea Whitle, and Hugh Wilmott.......The article reviews the book "Understanding Identity and Organizations," by Kate Kenny, Andrea Whitle, and Hugh Wilmott....

  12. Challenges for effective WMD verification

    International Nuclear Information System (INIS)

    Andemicael, B.

    2006-01-01

    Effective verification is crucial to the fulfillment of the objectives of any disarmament treaty, not least as regards the proliferation of weapons of mass destruction (WMD). The effectiveness of the verification package depends on a number of factors, some inherent in the agreed structure and others related to the type of responses demanded by emerging challenges. The verification systems of three global agencies-the IAEA, the Comprehensive Nuclear-Test-Ban Treaty Organization (CTBTO, currently the Preparatory Commission), and the Organization for the Prohibition of Chemical Weapons (OPCW)-share similarities in their broad objectives of confidence-building and deterrence by assuring members that rigorous verification would deter or otherwise detect non-compliance. Yet they are up against various constraints and other issues, both internal and external to the treaty regime. These constraints pose major challenges to the effectiveness and reliability of the verification operations. In the nuclear field, the IAEA safeguards process was the first to evolve incrementally from modest Statute beginnings to a robust verification system under the global Treaty on the Non-Proliferation of Nuclear Weapons (NPT). The nuclear non-proliferation regime is now being supplemented by a technology-intensive verification system of the nuclear test-ban treaty (CTBT), a product of over three decades of negotiation. However, there still remain fundamental gaps and loopholes in the regime as a whole, which tend to diminish the combined effectiveness of the IAEA and the CTBT verification capabilities. He three major problems are (a) the lack of universality of membership, essentially because of the absence of three nuclear weapon-capable States-India, Pakistan and Israel-from both the NPT and the CTBT, (b) the changes in US disarmament policy, especially in the nuclear field, and (c) the failure of the Conference on Disarmament to conclude a fissile material cut-off treaty. The world is

  13. Disarmament Verification - the OPCW Experience

    International Nuclear Information System (INIS)

    Lodding, J.

    2010-01-01

    The Chemical Weapons Convention is the only multilateral treaty that bans completely an entire category of weapons of mass destruction under international verification arrangements. Possessor States, i.e. those that have chemical weapons stockpiles at the time of becoming party to the CWC, commit to destroying these. All States undertake never to acquire chemical weapons and not to help other States acquire such weapons. The CWC foresees time-bound chemical disarmament. The deadlines for destruction for early entrants to the CWC are provided in the treaty. For late entrants, the Conference of States Parties intervenes to set destruction deadlines. One of the unique features of the CWC is thus the regime for verifying destruction of chemical weapons. But how can you design a system for verification at military sites, while protecting military restricted information? What degree of assurance is considered sufficient in such circumstances? How do you divide the verification costs? How do you deal with production capability and initial declarations of existing stockpiles? The founders of the CWC had to address these and other challenges in designing the treaty. Further refinement of the verification system has followed since the treaty opened for signature in 1993 and since inspection work was initiated following entry-into-force of the treaty in 1997. Most of this work concerns destruction at the two large possessor States, Russia and the United States. Perhaps some of the lessons learned from the OPCW experience may be instructive in a future verification regime for nuclear weapons. (author)

  14. Verification of Chemical Weapons Destruction

    International Nuclear Information System (INIS)

    Lodding, J.

    2010-01-01

    The Chemical Weapons Convention is the only multilateral treaty that bans completely an entire category of weapons of mass destruction under international verification arrangements. Possessor States, i.e. those that have chemical weapons stockpiles at the time of becoming party to the CWC, commit to destroying these. All States undertake never to acquire chemical weapons and not to help other States acquire such weapons. The CWC foresees time-bound chemical disarmament. The deadlines for destruction for early entrants to the CWC are provided in the treaty. For late entrants, the Conference of States Parties intervenes to set destruction deadlines. One of the unique features of the CWC is thus the regime for verifying destruction of chemical weapons. But how can you design a system for verification at military sites, while protecting military restricted information? What degree of assurance is considered sufficient in such circumstances? How do you divide the verification costs? How do you deal with production capability and initial declarations of existing stockpiles? The founders of the CWC had to address these and other challenges in designing the treaty. Further refinement of the verification system has followed since the treaty opened for signature in 1993 and since inspection work was initiated following entry-into-force of the treaty in 1997. Most of this work concerns destruction at the two large possessor States, Russia and the United States. Perhaps some of the lessons learned from the OPCW experience may be instructive in a future verification regime for nuclear weapons. (author)

  15. Components of Sexual Identity

    Science.gov (United States)

    Shively, Michael G.; DeCecco, John P.

    1977-01-01

    This paper examines the four components of sexual identity: biological sex, gender identity, social sex-role, and sexual orientation. Theories about the development of each component and how they combine and conflict to form the individual's sexual identity are discussed. (Author)

  16. Mobile Identity Management

    NARCIS (Netherlands)

    Hoepman, J.J.

    2011-01-01

    Identity management consists of the processes and all underlying technologies for the creation, management, and usage of digital identities. Business rely on identity management systems to simplify the management of access rights to their systems and services for both their employees and their

  17. Being Tolerant about Identity?

    NARCIS (Netherlands)

    van Rooij, R.; Gutzmann, D.; Köpping, J.; Meier, C.

    2014-01-01

    Identity and identification are very important concepts in philosophy and logic. They are crucial for the analysis of quantification and for counting. According to some philosophers, many examples that are supposed to show that identity is contingent, in fact show that the notion of identity is

  18. [Background and practical use of the assessment of identity development in adolescence (AIDA)].

    Science.gov (United States)

    Birkhölzer, Marc; Goth, Kirstin; Schrobildgen, Christian; Schmeck, Klaus; Schlüter-Müller, Susanne

    2015-01-01

    A paradigm shift towards early detection and intervention of personality disorders in adolescence to prevent persistent and chronic suffering is currently taking place. Aside further distinct areas of impaired psychosocial integrity, disturbed identity development is seen as one core component of personality disorders. Thus, the detection of early antecedents of impaired identity development is an important step to allow for early intervention. The self-report questionnaire Assessment of Identity Development in Adolescence (AIDA) is a reliable and valid diagnostic instrument to detect disturbed identity development. This questionnaire allows for global assessment of identity and a differentiation in fundamental subdomains as well and distinguishes between identity diffusion on one side and consolidated and stable identity on the other. In clinical practice, it supports the differentiation between severely disturbed identity as the core component of personality disorders and identity crisis or stable identity development that can be found in other mental disorders.

  19. An integrated developmental model for studying identity content in context.

    Science.gov (United States)

    Galliher, Renee V; McLean, Kate C; Syed, Moin

    2017-11-01

    Historically, identity researchers have placed greater emphasis on processes of identity development (how people develop their identities) and less on the content of identity (what the identity is). The relative neglect of identity content may reflect the lack of a comprehensive framework to guide research. In this article, we provide such a comprehensive framework for the study of the content of identity, including 4 levels of analysis. At the broadest level, we situate individual identity within historical, cultural, and political contexts, elaborating on identity development within the context of shifting cultural norms, values, and attitudes. Histories of prejudice and discrimination are relevant in shaping intersections among historically marginalized identities. Second, we examine social roles as unique and central contexts for identity development, such that relationship labels become integrated into a larger identity constellation. Third, domains of individual or personal identity content intersect to yield a sense of self in which various aspects are subjectively experienced as an integrated whole. We explore the negotiation of culturally marginalized and dominant identity labels, as well as idiosyncratic aspects of identities based on unique characteristics or group memberships. Finally, we argue that the content of identity is enacted at the level of everyday interactions, the "micro-level" of identity. The concepts of identity conflict, coherence, and compartmentalization are presented as strategies used to navigate identity content across these 4 levels. This framework serves as an organizing tool for the current literature, as well as for designing future studies on the identity development. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  20. CASL Verification and Validation Plan

    Energy Technology Data Exchange (ETDEWEB)

    Mousseau, Vincent Andrew [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Dinh, Nam [North Carolina State Univ., Raleigh, NC (United States)

    2016-06-30

    This report documents the Consortium for Advanced Simulation of LWRs (CASL) verification and validation plan. The document builds upon input from CASL subject matter experts, most notably the CASL Challenge Problem Product Integrators, CASL Focus Area leaders, and CASL code development and assessment teams. This document will be a living document that will track progress on CASL to do verification and validation for both the CASL codes (including MPACT, CTF, BISON, MAMBA) and for the CASL challenge problems (CIPS, PCI, DNB). The CASL codes and the CASL challenge problems are at differing levels of maturity with respect to validation and verification. The gap analysis will summarize additional work that needs to be done. Additional VVUQ work will be done as resources permit. This report is prepared for the Department of Energy’s (DOE’s) CASL program in support of milestone CASL.P13.02.

  1. Technical challenges for dismantlement verification

    International Nuclear Information System (INIS)

    Olinger, C.T.; Stanbro, W.D.; Johnston, R.G.; Nakhleh, C.W.; Dreicer, J.S.

    1997-01-01

    In preparation for future nuclear arms reduction treaties, including any potential successor treaties to START I and II, the authors have been examining possible methods for bilateral warhead dismantlement verification. Warhead dismantlement verification raises significant challenges in the political, legal, and technical arenas. This discussion will focus on the technical issues raised by warhead arms controls. Technical complications arise from several sources. These will be discussed under the headings of warhead authentication, chain-of-custody, dismantlement verification, non-nuclear component tracking, component monitoring, and irreversibility. The authors will discuss possible technical options to address these challenges as applied to a generic dismantlement and disposition process, in the process identifying limitations and vulnerabilities. They expect that these considerations will play a large role in any future arms reduction effort and, therefore, should be addressed in a timely fashion

  2. Perception, experience and body identity.

    Science.gov (United States)

    López-Ibor, Juan J; Ortiz, Tomás; López-Ibor, María I

    2011-12-01

    Physician has to know the patient in the disease and not only the disease in the patient, from the dual perspective of the body as object and the body as subject. This also affects the patient who has to cope with the reality of having a body that bursts into the subject's consciousness as a vital threat, as source of discomfort and inability and being a body (Marcel). The human body in its dual aspect has been and is a great unknown, if not a great outrage in spite of the fact that we are our body and our body is each of us. We sometimes do not feel as we are and thus a confrontation arises, sometimes more normal, others more morbid. This forces the physician to face complex ethics considerations and the scientist to accept a personal identity disorder. Dualism considers that there are two substances in us, one that distinguishes us from other beings and from the rest of the individuals of the human species, the soul, the psychic life, mind or consciousness, and another more insubstancial one, the body. The aim of the first substance is to dominate the body, to survive it after death when it is, already a corpse is meant to become putrefied, is buried, incinerated or thrown to the depth of the sea. This dualism aims to explain the origin of the evil and the attitude to defeat it and it does so efficiently. This anthropology has very ancient roots (the Upvanishads, in the orphic texts, in Plato), it is the core of Gnostic thought and the foundation of the modern science since Descartes. Some monist perspectives are a masked dualism or a mereologic fallacy, according to which, the brain is conscious, when that what is conscious is the subject, although the subject, with the brain could not be conscious. Therefore, a new perspective is proposed, chiasmatic or janicular monism, that considers the adaptive value of focusing on the reality from two perspectives, as physical universe and the world of interpersonal relationships. In the agnosias and in the phantom limb

  3. Blind quantum computation with identity authentication

    Science.gov (United States)

    Li, Qin; Li, Zhulin; Chan, Wai Hong; Zhang, Shengyu; Liu, Chengdong

    2018-04-01

    Blind quantum computation (BQC) allows a client with relatively few quantum resources or poor quantum technologies to delegate his computational problem to a quantum server such that the client's input, output, and algorithm are kept private. However, all existing BQC protocols focus on correctness verification of quantum computation but neglect authentication of participants' identity which probably leads to man-in-the-middle attacks or denial-of-service attacks. In this work, we use quantum identification to overcome such two kinds of attack for BQC, which will be called QI-BQC. We propose two QI-BQC protocols based on a typical single-server BQC protocol and a double-server BQC protocol. The two protocols can ensure both data integrity and mutual identification between participants with the help of a third trusted party (TTP). In addition, an unjammable public channel between a client and a server which is indispensable in previous BQC protocols is unnecessary, although it is required between TTP and each participant at some instant. Furthermore, the method to achieve identity verification in the presented protocols is general and it can be applied to other similar BQC protocols.

  4. The Lesbian, Gay, and Bisexual Identity Scale: Factor Analytic Evidence and Associations with Health and Well-Being

    Science.gov (United States)

    Cramer, Robert J.; Burks, Alixandra C.; Golom, Frank D.; Stroud, Caroline H.; Graham, James L.

    2017-01-01

    We tested the psychometric properties of the Lesbian, Gay, and Bisexual Identity Scale. Findings included (1) a three-factor structure (i.e., Negative Identity, Identity Uncertainty, Identity Superiority); (2) less positive identities among HIV-positive persons, African Americans, males, and bisexuals; and (3) convergent patterns with subjective…

  5. Biometric Authentication System on Mobile Personal Devices

    NARCIS (Netherlands)

    Tao, Q.; Veldhuis, Raymond N.J.

    We propose a secure, robust, and low-cost biometric authentication system on the mobile personal device for the personal network. The system consists of the following five key modules: 1) face detection; 2) face registration; 3) illumination normalization; 4) face verification; and 5) information

  6. Formal Verification of Continuous Systems

    DEFF Research Database (Denmark)

    Sloth, Christoffer

    2012-01-01

    and the verification procedures should be algorithmically synthesizable. Autonomous control plays an important role in many safety-critical systems. This implies that a malfunction in the control system can have catastrophic consequences, e.g., in space applications where a design flaw can result in large economic...... losses. Furthermore, a malfunction in the control system of a surgical robot may cause death of patients. The previous examples involve complex systems that are required to operate according to complex specifications. The systems cannot be formally verified by modern verification techniques, due...

  7. IMRT plan verification in radiotherapy

    International Nuclear Information System (INIS)

    Vlk, P.

    2006-01-01

    This article describes the procedure for verification of IMRT (Intensity modulated radiation therapy) plan, which is used in the Oncological Institute of St. Elisabeth in Bratislava. It contains basic description of IMRT technology and developing a deployment plan for IMRT planning system CORVUS 6.0, the device Mimic (Multilammelar intensity modulated collimator) and the overall process of verifying the schedule created. The aim of verification is particularly good control of the functions of MIMIC and evaluate the overall reliability of IMRT planning. (author)

  8. K Basins Field Verification Program

    International Nuclear Information System (INIS)

    Booth, H.W.

    1994-01-01

    The Field Verification Program establishes a uniform and systematic process to ensure that technical information depicted on selected engineering drawings accurately reflects the actual existing physical configuration. This document defines the Field Verification Program necessary to perform the field walkdown and inspection process that identifies the physical configuration of the systems required to support the mission objectives of K Basins. This program is intended to provide an accurate accounting of the actual field configuration by documenting the as-found information on a controlled drawing

  9. Runtime Verification Through Forward Chaining

    Directory of Open Access Journals (Sweden)

    Alan Perotti

    2014-12-01

    Full Text Available In this paper we present a novel rule-based approach for Runtime Verification of FLTL properties over finite but expanding traces. Our system exploits Horn clauses in implication form and relies on a forward chaining-based monitoring algorithm. This approach avoids the branching structure and exponential complexity typical of tableaux-based formulations, creating monitors with a single state and a fixed number of rules. This allows for a fast and scalable tool for Runtime Verification: we present the technical details together with a working implementation.

  10. Education and identity of adult educators

    Directory of Open Access Journals (Sweden)

    Zoran Jelenc

    2010-10-01

    Full Text Available Adult education and learning has because of its wide extensiveness and variability huge difficulties with its identity. Difficulties appear in all three spheres of identity: professional identity of adult education; societal identity of the field; and personal identity with the profession. In our contribution we list and describe difficulties in all three identity areas. Insufficient identity is a great obstacle for continuing education and further training of those who work or wish to work in adult education or they are obliged to carry out such education. They are all named ‘adult educators’ but their roles and tasks in education are different. Contents and ways of realization of programs have to be adapted to that. We recommend: modular programs for different target groups should be created from a wide list of contents; more sophisticated methods of marketing and recruiting should be used for the better realization of programs; programs should enable participants to get publicly recognized certificates and in this way current program of pedagogical-andragogical education which does not follow enough above-named difficulties of identity should be replaced; successful programs should be distributed all over Slovenia and performed in cooperation with another providers.

  11. Identity and Professional Networking.

    Science.gov (United States)

    Raj, Medha; Fast, Nathanael J; Fisher, Oliver

    2017-06-01

    Despite evidence that large professional networks afford a host of financial and professional benefits, people vary in how motivated they are to build such networks. To help explain this variance, the present article moves beyond a rational self-interest account to examine the possibility that identity shapes individuals' intentions to network. Study 1 established a positive association between viewing professional networking as identity-congruent and the tendency to prioritize strengthening and expanding one's professional network. Study 2 revealed that manipulating the salience of the self affects networking intentions, but only among those high in networking identity-congruence. Study 3 further established causality by experimentally manipulating identity-congruence to increase networking intentions. Study 4 examined whether identity or self-interest is a better predictor of networking intentions, providing support for the former. These findings indicate that identity influences the networks people develop. Implications for research on the self, identity-based motivation, and professional networking are discussed.

  12. A Scalable Approach for Hardware Semiformal Verification

    OpenAIRE

    Grimm, Tomas; Lettnin, Djones; Hübner, Michael

    2018-01-01

    The current verification flow of complex systems uses different engines synergistically: virtual prototyping, formal verification, simulation, emulation and FPGA prototyping. However, none is able to verify a complete architecture. Furthermore, hybrid approaches aiming at complete verification use techniques that lower the overall complexity by increasing the abstraction level. This work focuses on the verification of complex systems at the RT level to handle the hardware peculiarities. Our r...

  13. Likelihood-ratio-based biometric verification

    NARCIS (Netherlands)

    Bazen, A.M.; Veldhuis, Raymond N.J.

    2002-01-01

    This paper presents results on optimal similarity measures for biometric verification based on fixed-length feature vectors. First, we show that the verification of a single user is equivalent to the detection problem, which implies that for single-user verification the likelihood ratio is optimal.

  14. Likelihood Ratio-Based Biometric Verification

    NARCIS (Netherlands)

    Bazen, A.M.; Veldhuis, Raymond N.J.

    The paper presents results on optimal similarity measures for biometric verification based on fixed-length feature vectors. First, we show that the verification of a single user is equivalent to the detection problem, which implies that, for single-user verification, the likelihood ratio is optimal.

  15. Integrating Personal and Professional Development.

    Science.gov (United States)

    Lippitt, Gordon L.

    1980-01-01

    The author outlines ways to integrate work identity and social identity in order to improve the quality of life. He presents a model for maintaining balance between personal and professional growth, which can stimulate achievement in six areas of human potential. (SK)

  16. Malingering dissociative identity disorder: objective and projective assessment.

    Science.gov (United States)

    Labott, Susan M; Wallach, Heather R

    2002-04-01

    Verification of dissociative identity disorder presents challenges given the complex nature of the illness. This study addressed the concern that this disorder can be successfully malingered on objective and projective psychological tests. 50 undergraduate women were assigned to a Malingering or a Control condition, then completed the Rorschach Inkblot Test and the Dissociative Experiences Scale II. The Malingering group were asked to simulate dissociative identity disorder; controls received instructions to answer all materials honestly. Analysis indicated that malingerers were significantly more likely to endorse dissociative experiences on the Dissociative Experiences Scale II in the range common to patients with diagnosed dissociative identity disorder. However, on the Rorschach there were no significant differences between the two groups. Results suggest that the assessment of dissociative identity disorder requires a multifaceted approach with both objective and projective assessment tools. Research is needed to assess these issues in clinical populations.

  17. A Federated Digital Identity Management Approach for Business Processes

    Science.gov (United States)

    Bertino, Elisa; Ferrini, Rodolfo; Musci, Andrea; Paci, Federica; Steuer, Kevin J.

    Business processes have gained a lot of attention because of the pressing need for integrating existing resources and services to better fulfill customer needs. A key feature of business processes is that they are built from composable services, referred to as component services, that may belong to different domains. In such a context, flexible multi-domain identity management solutions are crucial for increased security and user-convenience. In particular, it is important that during the execution of a business process the component services be able to verify the identity of the client to check that it has the required permissions for accessing the services. To address the problem of multi-domain identity management, we propose a multi-factor identity attribute verification protocol for business processes that assures clients privacy and handles naming heterogeneity.

  18. Automated Verification of Virtualized Infrastructures

    DEFF Research Database (Denmark)

    Bleikertz, Sören; Gross, Thomas; Mödersheim, Sebastian Alexander

    2011-01-01

    Virtualized infrastructures and clouds present new challenges for security analysis and formal verification: they are complex environments that continuously change their shape, and that give rise to non-trivial security goals such as isolation and failure resilience requirements. We present a pla...

  19. Future of monitoring and verification

    International Nuclear Information System (INIS)

    Wagenmakers, H.

    1991-01-01

    The organized verification entrusted to IAEA for the implementation of the NPT, of the Treaty of Tlatelolco and of the Treaty of Rarotonga, reaches reasonable standards. The current dispute with the Democratic People's Republic of Korea about the conclusion of a safeguards agreement with IAEA, by its exceptional nature, underscores rather than undermines the positive judgement to be passed on IAEA's overall performance. The additional task given to the Director General of IAEA under Security Council resolution 687 (1991) regarding Iraq's nuclear-weapons-usable material is particularly challenging. For the purposes of this paper, verification is defined as the process for establishing whether the States parties are complying with an agreement. In the final stage verification may lead into consideration of how to respond to non-compliance. Monitoring is perceived as the first level in the verification system. It is one generic form of collecting information on objects, activities or events and it involves a variety of instruments ranging from communications satellites to television cameras or human inspectors. Monitoring may also be used as a confidence-building measure

  20. Hot cell verification facility update

    International Nuclear Information System (INIS)

    Titzler, P.A.; Moffett, S.D.; Lerch, R.E.

    1985-01-01

    The Hot Cell Verification Facility (HCVF) provides a prototypic hot cell mockup to check equipment for functional and remote operation, and provides actual hands-on training for operators. The facility arrangement is flexible and assists in solving potential problems in a nonradioactive environment. HCVF has been in operation for six years, and the facility is a part of the Hanford Engineering Development Laboratory

  1. Static Verification for Code Contracts

    Science.gov (United States)

    Fähndrich, Manuel

    The Code Contracts project [3] at Microsoft Research enables programmers on the .NET platform to author specifications in existing languages such as C# and VisualBasic. To take advantage of these specifications, we provide tools for documentation generation, runtime contract checking, and static contract verification.

  2. Verification of safety critical software

    International Nuclear Information System (INIS)

    Son, Ki Chang; Chun, Chong Son; Lee, Byeong Joo; Lee, Soon Sung; Lee, Byung Chai

    1996-01-01

    To assure quality of safety critical software, software should be developed in accordance with software development procedures and rigorous software verification and validation should be performed. Software verification is the formal act of reviewing, testing of checking, and documenting whether software components comply with the specified requirements for a particular stage of the development phase[1]. New software verification methodology was developed and was applied to the Shutdown System No. 1 and 2 (SDS1,2) for Wolsung 2,3 and 4 nuclear power plants by Korea Atomic Energy Research Institute(KAERI) and Atomic Energy of Canada Limited(AECL) in order to satisfy new regulation requirements of Atomic Energy Control Boars(AECB). Software verification methodology applied to SDS1 for Wolsung 2,3 and 4 project will be described in this paper. Some errors were found by this methodology during the software development for SDS1 and were corrected by software designer. Outputs from Wolsung 2,3 and 4 project have demonstrated that the use of this methodology results in a high quality, cost-effective product. 15 refs., 6 figs. (author)

  3. Verification and the safeguards legacy

    International Nuclear Information System (INIS)

    Perricos, Demetrius

    2001-01-01

    A number of inspection or monitoring systems throughout the world over the last decades have been structured drawing upon the IAEA experience of setting up and operating its safeguards system. The first global verification system was born with the creation of the IAEA safeguards system, about 35 years ago. With the conclusion of the NPT in 1968, inspections were to be performed under safeguards agreements, concluded directly between the IAEA and non-nuclear weapon states parties to the Treaty. The IAEA developed the safeguards system within the limitations reflected in the Blue Book (INFCIRC 153), such as limitations of routine access by the inspectors to 'strategic points', including 'key measurement points', and the focusing of verification on declared nuclear material in declared installations. The system, based as it was on nuclear material accountancy. It was expected to detect a diversion of nuclear material with a high probability and within a given time and therefore determine also that there had been no diversion of nuclear material from peaceful purposes. The most vital element of any verification system is the inspector. Technology can assist but cannot replace the inspector in the field. Their experience, knowledge, intuition and initiative are invaluable factors contributing to the success of any inspection regime. The IAEA inspectors are however not part of an international police force that will intervene to prevent a violation taking place. To be credible they should be technically qualified with substantial experience in industry or in research and development before they are recruited. An extensive training program has to make sure that the inspectors retain their professional capabilities and that it provides them with new skills. Over the years, the inspectors and through them the safeguards verification system gained experience in: organization and management of large teams; examination of records and evaluation of material balances

  4. Eggspectation : organic egg verification tool

    NARCIS (Netherlands)

    Ruth, van S.M.; Hoogenboom, L.A.P.

    2011-01-01

    In 2009 RIKILT conducted a study on about 2,000 eggs to evaluate three different analytical verification methods: carotenoid profiling, fatty acid profiling and isotope ratio mass spectrometry. The eggs were collected from about 50 Dutch farms. The selection was based on the farms’ location and

  5. Automated Image Acquisition System for the Verification of Copper-Brass Seal Images

    International Nuclear Information System (INIS)

    Stringa, E.; Bergonzi, C.; Littmann, F.; ); Marszalek, Y.; Tempesta, S.; )

    2015-01-01

    This paper describes a system for the verification of copper-brass seals realized by JRC according to DG ENER requirements. DG ENER processes about 20,000 metal seals per year. The verification of metal seals consists in visually checking the identity of a removed seal. The identity of a copper-brass seal is defined by a random stain pattern realized by the seal producer together with random scratches engraved when the seals are initialized ('seal production'). In order to verify that the seal returned from the field is the expected one its pattern is compared with an image taken during seal production. Formerly, seal initialization and verification were very heavy tasks as seal pictures were acquired with a camera one by one both in the initialization and verification stages. During the initialization the Nuclear Safeguards technicians had to place one by one new seals under a camera and acquire the related reference images. During the verification, the technician had to take used seals and place them one by one under a camera to take new pictures. The new images were presented to the technicians without any preprocessing and the technicians had to recognize the seal. The new station described in this paper has an automated image acquisition system allowing to easily process seals in batches of 100 seals. To simplify the verification, a software automatically centres and rotates the newly acquired seal image in order to perfectly overlap with the reference image acquired during the production phase. The new system significantly speeds up seal production and helps particularly with the demanding task of seal verification. As a large part of the seals is dealt with by a joint Euratom-IAEA team, the IAEA directly profits from this development. The new tool has been in routine use since mid 2013. (author)

  6. Digital holographic-based cancellable biometric for personal authentication

    International Nuclear Information System (INIS)

    Verma, Gaurav; Sinha, Aloka

    2016-01-01

    In this paper, we propose a new digital holographic-based cancellable biometric scheme for personal authentication and verification. The realization of cancellable biometric is presented by using an optoelectronic experimental approach, in which an optically recorded hologram of the fingerprint of a person is numerically reconstructed. Each reconstructed feature has its own perspective, which is utilized to generate user-specific fingerprint features by using a feature-extraction process. New representations of the user-specific fingerprint features can be obtained from the same hologram, by changing the reconstruction distance (d) by an amount Δd between the recording plane and the reconstruction plane. This parameter is the key to make the cancellable user-specific fingerprint features using a digital holographic technique, which allows us to choose different reconstruction distances when reissuing the user-specific fingerprint features in the event of compromise. We have shown theoretically that each user-specific fingerprint feature has a unique identity with a high discrimination ability, and the chances of a match between them are minimal. In this aspect, a recognition system has also been demonstrated using the fingerprint biometric of the enrolled person at a particular reconstruction distance. For the performance evaluation of a fingerprint recognition system—the false acceptance ratio, the false rejection ratio and the equal error rate are calculated using correlation. The obtained results show good discrimination ability between the genuine and the impostor populations with the highest recognition rate of 98.23%. (paper)

  7. Development of naive personality perception

    OpenAIRE

    Hayashi, Tomoyuki

    2004-01-01

    Lay persons usually understand that the personality has consistency and causality. They also have the knowledge of what contents the personality consists of. Research of "theories of mind," which focuses on the developmental processes of the naive understanding of mind, suggests three stages : (a) alignment of actions (imitation) fosters the foundation of social cognition in young children (i.e., understanding that the mind causes behaviors, grasping the identity of a person, and discovering ...

  8. Inter-Identity Autobiographical Amnesia in Patients with Dissociative Identity Disorder

    Science.gov (United States)

    Huntjens, Rafaële J. C.; Verschuere, Bruno; McNally, Richard J.

    2012-01-01

    Background A major symptom of Dissociative Identity Disorder (DID; formerly Multiple Personality Disorder) is dissociative amnesia, the inability to recall important personal information. Only two case studies have directly addressed autobiographical memory in DID. Both provided evidence suggestive of dissociative amnesia. The aim of the current study was to objectively assess transfer of autobiographical information between identities in a larger sample of DID patients. Methods Using a concealed information task, we assessed recognition of autobiographical details in an amnesic identity. Eleven DID patients, 27 normal controls, and 23 controls simulating DID participated. Controls and simulators were matched to patients on age, education level, and type of autobiographical memory tested. Findings Although patients subjectively reported amnesia for the autobiographical details included in the task, the results indicated transfer of information between identities. Conclusion The results call for a revision of the DID definition. The amnesia criterion should be modified to emphasize its subjective nature. PMID:22815769

  9. Inter-identity autobiographical amnesia in patients with dissociative identity disorder.

    Science.gov (United States)

    Huntjens, Rafaële J C; Verschuere, Bruno; McNally, Richard J

    2012-01-01

    A major symptom of Dissociative Identity Disorder (DID; formerly Multiple Personality Disorder) is dissociative amnesia, the inability to recall important personal information. Only two case studies have directly addressed autobiographical memory in DID. Both provided evidence suggestive of dissociative amnesia. The aim of the current study was to objectively assess transfer of autobiographical information between identities in a larger sample of DID patients. Using a concealed information task, we assessed recognition of autobiographical details in an amnesic identity. Eleven DID patients, 27 normal controls, and 23 controls simulating DID participated. Controls and simulators were matched to patients on age, education level, and type of autobiographical memory tested. Although patients subjectively reported amnesia for the autobiographical details included in the task, the results indicated transfer of information between identities. The results call for a revision of the DID definition. The amnesia criterion should be modified to emphasize its subjective nature.

  10. Inter-identity autobiographical amnesia in patients with dissociative identity disorder.

    Directory of Open Access Journals (Sweden)

    Rafaële J C Huntjens

    Full Text Available BACKGROUND: A major symptom of Dissociative Identity Disorder (DID; formerly Multiple Personality Disorder is dissociative amnesia, the inability to recall important personal information. Only two case studies have directly addressed autobiographical memory in DID. Both provided evidence suggestive of dissociative amnesia. The aim of the current study was to objectively assess transfer of autobiographical information between identities in a larger sample of DID patients. METHODS: Using a concealed information task, we assessed recognition of autobiographical details in an amnesic identity. Eleven DID patients, 27 normal controls, and 23 controls simulating DID participated. Controls and simulators were matched to patients on age, education level, and type of autobiographical memory tested. FINDINGS: Although patients subjectively reported amnesia for the autobiographical details included in the task, the results indicated transfer of information between identities. CONCLUSION: The results call for a revision of the DID definition. The amnesia criterion should be modified to emphasize its subjective nature.

  11. Experiencing with Identity

    DEFF Research Database (Denmark)

    Pors, Justine Grønbæk

    2012-01-01

    This article studies how a political organization begins to experiment with its identity. By use of an empirical case of the Danish Ministry of Education, I examine how a political organization supplements its identity of a legislating power with identities of a supervisor, beacon and facilitator...... of evaluation in public schools. Out of a paralysis emerge new innovative strategies of governing, aimed at the schools’ self-governing capacity. The identity of the political system thus emerges as oscillations between different roles of a legislating power and a supervising coach. The case study suggests...... that a society of experimentalism is emerging. Thus, the relevant object of study is no longer organizational identity, but the experiments with different identities that modern organizations are performing....

  12. A Case for Implementation of Citizen Centric National Identity Management Systems

    DEFF Research Database (Denmark)

    Adjei, Joseph K.

    of trust in transacting parties. Policy makers are therefore trying to implement identity policies to prevent identity abuses, promote the seamless flow of business transactions, and provide citizens the ability to exercise informational self-determination. Previously, the design of identity management...... and exposure, and a high level of literacy. But in developing countries infrastructural challenges, low literacy level, and physical verification of credentials hamper the effective use of identity management systems. This PhD study adapts the DeLone and McLean model of information systems success to the case...

  13. Identity, gender and teaching English in Japan

    CERN Document Server

    Nagatomo, Diane Hawley

    2016-01-01

    How do teachers, who have chosen to settle down in one country, manage the difficulties of living and teaching English in that country? This book answers this question by investigating the personal and professional identity development of ten Western women with Japanese spouses who teach English in various educational contexts in Japan.

  14. Phantoms for IMRT dose distribution measurement and treatment verification

    International Nuclear Information System (INIS)

    Low, Daniel A.; Gerber, Russell L.; Mutic, Sasa; Purdy, James A.

    1998-01-01

    Background: The verification of intensity-modulated radiation therapy (IMRT) patient treatment dose distributions is currently based on custom-built or modified dose measurement phantoms. The only commercially available IMRT treatment planning and delivery system (Peacock, NOMOS Corp.) is supplied with a film phantom that allows accurate spatial localization of the dose distribution using radiographic film. However, measurements using other dosimeters are necessary for the thorough verification of IMRT. Methods: We have developed a phantom to enable dose measurements using a cylindrical ionization chamber and the localization of prescription isodose curves using a matrix of thermoluminescent dosimetry (TLD) chips. The external phantom cross-section is identical to that of the commercial phantom, to allow direct comparisons of measurements. A supplementary phantom has been fabricated to verify the IMRT dose distributions for pelvis treatments. Results: To date, this phantom has been used for the verification of IMRT dose distributions for head and neck and prostate cancer treatments. Designs are also presented for a phantom insert to be used with polymerizing gels (e.g., BANG-2) to obtain volumetric dose distribution measurements. Conclusion: The phantoms have proven useful in the quantitative evaluation of IMRT treatments

  15. Automated Offline Arabic Signature Verification System using Multiple Features Fusion for Forensic Applications

    Directory of Open Access Journals (Sweden)

    Saad M. Darwish

    2016-12-01

    Full Text Available The signature of a person is one of the most popular and legally accepted behavioral biometrics that provides a secure means for verification and personal identification in many applications such as financial, commercial and legal transactions. The objective of the signature verification system is to classify between genuine and forged signatures that are often associated with intrapersonal and interpersonal variability. Unlike other languages, Arabic has unique features; it contains diacritics, ligatures, and overlapping. Because of lacking any form of dynamic information during the Arabic signature’s writing process, it will be more difficult to obtain higher verification accuracy. This paper addresses the above difficulty by introducing a novel offline Arabic signature verification algorithm. The key point is using multiple feature fusion with fuzzy modeling to capture different aspects of a signature individually in order to improve the verification accuracy. State-of-the-art techniques adopt the fuzzy set to describe the properties of the extracted features to handle a signature’s uncertainty; this work also employs the fuzzy variables to describe the degree of similarity of the signature’s features to deal with the ambiguity of questioned document examiner judgment of signature similarity. It is concluded from the experimental results that the verification system performs well and has the ability to reduce both False Acceptance Rate (FAR and False Rejection Rate (FRR.

  16. Professional entrepreneurial identity construction

    DEFF Research Database (Denmark)

    Ramsgaard, Michael Breum

    The present study investigates the construction of a professional identity as an entrepreneur in a sample of people with educational background in nutrition and health. The study examines the connection between professional identity construction and entrepreneurial business emergence using...... ‘entrepreneurial preparedness’ as parameter. This research seeks to address the following questions: What significant components or characteristics do entrepreneurs rely on in the early processes of constructing an entrepreneurial identity....

  17. Known and Unknown Identity

    DEFF Research Database (Denmark)

    Henze-Pedersen, Sofie

    This qualitative study investigates the relationship between openness and identity among 18 adoptees. Many studies have argued that a high degree of openness is important for the identity formation of adoptees. However, few studies have explored this relationship. Two types of openness...... (biographical knowledge and communicative openness) are used to categorise the empirical material, making it possible to illuminate how different types of openness influence identity. The findings suggest that there is no direct link between a high degree of openness and positive identity formation. Instead...

  18. Identity/Time

    Directory of Open Access Journals (Sweden)

    Nancy J. Knauer

    2013-09-01

    Full Text Available This paper engages the unspoken fourth dimension of intersectionality—time. Using the construction of lesbian, gay, bisexual, and transgender (LGBT identities as an example, it establishes that identity, as it is lived and experienced, is not only multivalent, but also historically contingent. It then raises a number of points regarding the temporal locality of identity—the influence of time on issues of identity and understanding, its implications for legal interventions, social movement building, and paradigms of progressive change. As the title suggests, the paper asks us to consider the frame of identity over time.

  19. Identity vicissitudes in work organizations

    Directory of Open Access Journals (Sweden)

    Giovanni Di Stefano

    2014-09-01

    Full Text Available Today’s pressing scientific and technological changes, while having an impact on the organizational life of our post-industrial world, are producing drastic transformations within organizations, creating in workers new feelings of anxiety and uncertainty. The features of the present state of crises - instability, uncertainty, weakening of family bonds – define a peculiar social and psychological uneasiness, proper of our time, as a consequence of the technological business culture prevailing today, which is destabilizing the institutional role of organizations, namely fixing the various forms of personal identity. This contribution offers, also by presenting a training experience in a business setting, a critical psycho-socio-analysis of the roles that individuals and organizations must presently face to foster development and, at the same time, provides directions to avoid the perverse drift of today’s culture and promote the identity process through the reactivation of the learning/changing capacity aimed at the definition of new shared meanings.Keywords: identity, organization, psycho-socio-analysis

  20. Identity vicissitudes in work organizations

    Directory of Open Access Journals (Sweden)

    Giovanni Di Stefano

    2014-10-01

    Full Text Available Today’s pressing scientific and technological changes, while having an impact on the organizational life of our post-industrial world, are producing drastic transformations within organizations, creating in workers new feelings of anxiety and uncertainty. The features of the present state of crises - instability, uncertainty, weakening of family bonds – define a peculiar social and psychological uneasiness, proper of our time, as a consequence of the technological business culture prevailing today, which is destabilizing the institutional role of organizations, namely fixing the various forms of personal identity. This contribution offers, also by presenting a training experience in a business setting, a critical psycho-socio-analysis of the roles that individuals and organizations must presently face to foster development and, at the same time, provides directions to avoid the perverse drift of today’s culture and promote the identity process through the reactivation of the learning/changing capacity aimed at the definition of new shared meanings.Keywords: Identity; Organization; Psycho-socio-analysis

  1. Body integrity identity disorder.

    Science.gov (United States)

    Blom, Rianne M; Hennekam, Raoul C; Denys, Damiaan

    2012-01-01

    Body Integrity Identity Disorder (BIID) is a rare, infrequently studied and highly secretive condition in which there is a mismatch between the mental body image and the physical body. Subjects suffering from BIID have an intense desire to amputate a major limb or severe the spinal cord in order to become paralyzed. Aim of the study is to broaden the knowledge of BIID amongst medical professionals, by describing all who deal with BIID. Somatic, psychiatric and BIID characteristic data were collected from 54 BIID individuals using a detailed questionnaire. Subsequently, data of different subtypes of BIID (i.e. wish for amputation or paralyzation) were evaluated. Finally, disruption in work, social and family life due to BIID in subjects with and without amputation were compared. Based on the subjects' reports we found that BIID has an onset in early childhood. The main rationale given for their desire for body modification is to feel complete or to feel satisfied inside. Somatic and severe psychiatric co-morbidity is unusual, but depressive symptoms and mood disorders can be present, possibly secondary to the enormous distress BIID puts upon a person. Amputation and paralyzation variant do not differ in any clinical variable. Surgery is found helpful in all subjects who underwent amputation and those subjects score significantly lower on a disability scale than BIID subjects without body modification. The amputation variant and paralyzation variant of BIID are to be considered as one of the same condition. Amputation of the healthy body part appears to result in remission of BIID and an impressive improvement of quality of life. Knowledge of and respect for the desires of BIID individuals are the first steps in providing care and may decrease the huge burden they experience.

  2. Body integrity identity disorder.

    Directory of Open Access Journals (Sweden)

    Rianne M Blom

    Full Text Available INTRODUCTION: Body Integrity Identity Disorder (BIID is a rare, infrequently studied and highly secretive condition in which there is a mismatch between the mental body image and the physical body. Subjects suffering from BIID have an intense desire to amputate a major limb or severe the spinal cord in order to become paralyzed. Aim of the study is to broaden the knowledge of BIID amongst medical professionals, by describing all who deal with BIID. METHODS: Somatic, psychiatric and BIID characteristic data were collected from 54 BIID individuals using a detailed questionnaire. Subsequently, data of different subtypes of BIID (i.e. wish for amputation or paralyzation were evaluated. Finally, disruption in work, social and family life due to BIID in subjects with and without amputation were compared. RESULTS: Based on the subjects' reports we found that BIID has an onset in early childhood. The main rationale given for their desire for body modification is to feel complete or to feel satisfied inside. Somatic and severe psychiatric co-morbidity is unusual, but depressive symptoms and mood disorders can be present, possibly secondary to the enormous distress BIID puts upon a person. Amputation and paralyzation variant do not differ in any clinical variable. Surgery is found helpful in all subjects who underwent amputation and those subjects score significantly lower on a disability scale than BIID subjects without body modification. CONCLUSIONS: The amputation variant and paralyzation variant of BIID are to be considered as one of the same condition. Amputation of the healthy body part appears to result in remission of BIID and an impressive improvement of quality of life. Knowledge of and respect for the desires of BIID individuals are the first steps in providing care and may decrease the huge burden they experience.

  3. ECG Sensor Verification System with Mean-Interval Algorithm for Handling Sport Issue

    Directory of Open Access Journals (Sweden)

    Kuo-Kun Tseng

    2016-01-01

    Full Text Available With the development of biometric verification, we proposed a new algorithm and personal mobile sensor card system for ECG verification. The proposed new mean-interval approach can identify the user quickly with high accuracy and consumes a small amount of flash memory in the microprocessor. The new framework of the mobile card system makes ECG verification become a feasible application to overcome the issues of a centralized database. For a fair and comprehensive evaluation, the experimental results have been tested on public MIT-BIH ECG databases and our circuit system; they confirm that the proposed scheme is able to provide excellent accuracy and low complexity. Moreover, we also proposed a multiple-state solution to handle the heat rate changes of sports problem. It should be the first to address the issue of sports in ECG verification.

  4. An ontology based trust verification of software license agreement

    Science.gov (United States)

    Lu, Wenhuan; Li, Xiaoqing; Gan, Zengqin; Wei, Jianguo

    2017-08-01

    When we install software or download software, there will show up so big mass document to state the rights and obligations, for which lots of person are not patient to read it or understand it. That would may make users feel distrust for the software. In this paper, we propose an ontology based verification for Software License Agreement. First of all, this work proposed an ontology model for domain of Software License Agreement. The domain ontology is constructed by proposed methodology according to copyright laws and 30 software license agreements. The License Ontology can act as a part of generalized copyright law knowledge model, and also can work as visualization of software licenses. Based on this proposed ontology, a software license oriented text summarization approach is proposed which performances showing that it can improve the accuracy of software licenses summarizing. Based on the summarization, the underline purpose of the software license can be explicitly explored for trust verification.

  5. Apparent Amnesia : interidentity memory functioning in dissociative identity disdorder

    OpenAIRE

    Huntjens, R.J.C.

    2003-01-01

    Dissociative identity disorder (DID) is characterized by the presence of two or more distinct identities or personality states that recurrently take control of the individual s behavior. Between 95 and 100 % of DID patients report experiences of blank spells for periods of time when other identities are in control of their behavior. In this thesis, the fundamental question of whether objective evidence for the reported interidentity amnesia in DID can be found under rigorous experimental cond...

  6. RFID-based Electronic Identity Security Cloud Platform in Cyberspace

    OpenAIRE

    Bing Chen; Chengxiang Tan; Bo Jin; Xiang Zou; Yuebo Dai

    2012-01-01

    With the moving development of networks, especially Internet of Things, electronic identity administration in cyberspace is becoming more and more important. And personal identity management in cyberspace associated with individuals in reality has been one significant and urgent task for the further development of information construction in China. So this paper presents a RFID-based electronic identity security cloud platform in cyberspace to implement an efficient security management of cyb...

  7. Elective Identities, (Culture, Identization and Integration)

    NARCIS (Netherlands)

    S.J. Magala (Slawomir)

    2002-01-01

    textabstractMost of contemporary individual and social identities (constructed with societal, cultural and technological resources) are radically autonomous, nomadic and virtual - i.e. they are de-traditionalized, open to negotiation and not based on a single interpretation of a tradition.

  8. Optimal Experience and Optimal Identity: A Multinational Study of the Associations Between Flow and Social Identity.

    Science.gov (United States)

    Mao, Yanhui; Roberts, Scott; Pagliaro, Stefano; Csikszentmihalyi, Mihaly; Bonaiuto, Marino

    2016-01-01

    Eudaimonistic identity theory posits a link between activity and identity, where a self-defining activity promotes the strength of a person's identity. An activity engaged in with high enjoyment, full involvement, and high concentration can facilitate the subjective experience of flow. In the present paper, we hypothesized in accordance with the theory of psychological selection that beyond the promotion of individual development and complexity at the personal level, the relationship between flow and identity at the social level is also positive through participation in self-defining activities. Three different samples (i.e., American, Chinese, and Spanish) filled in measures for flow and social identity, with reference to four previously self-reported activities, characterized by four different combinations of skills (low vs. high) and challenges (low vs. high). Findings indicated that flow was positively associated with social identity across each of the above samples, regardless of participants' gender and age. The results have implications for increasing social identity via participation in self-defining group activities that could facilitate flow.

  9. Space Station personal hygiene study

    Science.gov (United States)

    Prejean, Stephen E.; Booher, Cletis R.

    1986-01-01

    A personal hygiene system is currently under development for Space Station application that will provide capabilities equivalent to those found on earth. This paper addresses the study approach for specifying both primary and contingency personal hygiene systems and provisions for specified growth. Topics covered are system definition and subsystem descriptions. Subsystem interfaces are explored to determine which concurrent NASA study efforts must be monitored during future design phases to stay up-to-date on critical Space Station parameters. A design concept for a three (3) compartment personal hygiene facility is included as a baseline for planned test and verification activities.

  10. Personal Branding Through Fashion Blogging

    Directory of Open Access Journals (Sweden)

    Yuanita Safitri

    2017-01-01

    Full Text Available The objective of this research was to analyze personal branding development from personal brand identity, personal brand positioning, and personal brand assessment. The object of this research was Diana Rikasari's blog “Hot Chocolate and Mint”. She is one of prominent influence and fashion blogger from Indonesia. The research used the qualitative method with data collection by virtual observation from June until August 2016. Rikasari’s personal branding showed on her blog was the fashionably smart woman who had entrepreneurship competence. This research finds out that Diana Rikasari success to make her personal identity by her blog profile and blog posting. Her positioning is clear as Indonesian modern woman. The personal brand assessment can be seen through the achievements and feedbacks on her blog post, both positive or negative.

  11. Reflection and Professional Identity Development in Design Education

    Science.gov (United States)

    Tracey, Monica W.; Hutchinson, Alisa

    2018-01-01

    Design thinking positions designers as the drivers of the design space yet academic discourse is largely silent on the topic of professional identity development in design. Professional identity, or the dynamic narratives that individuals construct and maintain to integrate their personal qualities with professional responsibilities, has not been…

  12. Academic Developer Identity: How We Know Who We Are

    Science.gov (United States)

    Kinash, Shelley; Wood, Kayleen

    2013-01-01

    This paper explores academic developer identity by applying self-concept theory and appreciative inquiry to the personal journeys of two academic developers. Self-attribution, social comparison and reflected appraisals are presented and applied to explain how academic developers form their identities. Sociological principles are incorporated to…

  13. Cognitive Age: A New Multidimensional Approach to Measuring Age Identity.

    Science.gov (United States)

    Barak, Benny

    1987-01-01

    Conducted exploratory field study to examine how age-concepts are experienced and to assess relationship of age identities to each other. Proposes Cognitive Age as a new multidimensional age scale that merges the standard scale, Identity Age, and Personal Age. Study results attest to Cognitive Age scale's reliability and validity. (Author/NB)

  14. Helping Gay and Lesbian Students Integrate Sexual and Religious Identities

    Science.gov (United States)

    Bayne, Hannah Barnhill

    2016-01-01

    This article explores the impact of sexual and religious identity on college student development, examining developmental models and discussing how counselors can assist gay and lesbian students with integrating these 2 personal identities. Treatment approaches are presented, and the article concludes with an examination of ethical and…

  15. South African Identities on the Edge: Lauren Beukes's Moxyland ...

    African Journals Online (AJOL)

    We follow the work of various critics and argue that the text presents identity as fractured, riven and characterized by sharp edges. The edges in question refer to the boundaries of personal, corporeal, national and corporate identity. These edges may be considered symptomatic of the individual and social demands placed ...

  16. Negotiating Academic Teacher Identity Shifts during Higher Education Contextual Change

    Science.gov (United States)

    McNaughton, Susan Maree; Billot, Jennie

    2016-01-01

    Higher education teachers' roles and identities are constantly shifting in response to contextual change. Pedagogy, values, and professional and personal narratives of self are all affected, particularly by technological change. This paper explores the role and identity shifts of academics during the introduction of large-class videoconferencing.…

  17. Do Data Breach Disclosure Laws Reduce Identity Theft?

    Science.gov (United States)

    Romanosky, Sasha; Telang, Rahul; Acquisti, Alessandro

    2011-01-01

    In the United States, identity theft resulted in corporate and consumer losses of $56 billion dollars in 2005, with up to 35 percent of known identity thefts caused by corporate data breaches. Many states have responded by adopting data breach disclosure laws that require firms to notify consumers if their personal information has been lost or…

  18. From Diversity to Identity: Schools Where Everyone Belongs.

    Science.gov (United States)

    Hodder, Janyne M.

    Schools are an important source of personal identity and group integration. In Canada, schools are better equipped to contribute to both individual and group identities than they are to be agents of general social integration. The central goal of schools is to provide quality education, and part of this mission is being more confident and creative…

  19. (Re)scaling identities

    DEFF Research Database (Denmark)

    Koefoed, Lasse Martin; Simonsen, Kirsten

    2012-01-01

    of Pakistani origin, the study employs theoretical ideas of estrangement, identification and recognition in order to obtain a thorough understanding of the complexity and the contradictory character of their spatial identities and affiliations. A turning point in the double processes of estrangement...... of identity....

  20. Value Conditionality of Identity

    Directory of Open Access Journals (Sweden)

    M M Yusupov

    2013-12-01

    Full Text Available The article considers theoretical approaches to the study of values and identity, and reveals the role of values in the formation of the ethnic, regional and Russian identity on the example of Chechnya and the North Caucasus, with the sociological indicators characterizing value orientations and self-identification.

  1. Self and social identity

    NARCIS (Netherlands)

    Ellemers, N; Spears, R; Doosje, B

    2002-01-01

    In this chapter, we examine the self and identity by considering the different conditions under which these are affected by the groups to which people belong. From a social identity perspective we argue that group commitment, on the one hand, and features of the social context, on the other hand,

  2. Children's Social Identities

    Science.gov (United States)

    Bennett, Mark

    2011-01-01

    This paper provides a brief overview of recent developmental research on themes related to children's social identities. Initially, consideration is given to the capacity for social categorization, following which attention is given to children's developing conceptions of social identities, their identification with social groups, and the…

  3. Corporate identity. Brand designs.

    Science.gov (United States)

    Mathieson, Steve

    2004-02-19

    The past two years have seen a steadily more consistent brand identity for the NHS. Branding will become more important as foundation status and PCT commissioning makes acute hospitals more competitive. This has put pressure on some trusts that have their own strong identities.

  4. Identities-in-action

    DEFF Research Database (Denmark)

    Stentoft, Diana; Valero, Paola

    2009-01-01

    The notion of identity is often used in mathematics education research in an attempt to link individual and social understandings of mathematical learning. In this paper we review existing research making use of the notion of identity, and we point to some of the strengths and weaknesses in the w...

  5. Identity without Membership?

    DEFF Research Database (Denmark)

    Dobusch, Leonhard; Schoeneborn, Dennis

    the formation of organizational identity in more fluid organizational settings. Drawing on an empirical study of the hacker collective Anonymous, we show that organizational identity is formed through public communicative events that are subject to meaning negotiation whether or not actions can be attributed...

  6. Musical identity of patients with multiple sclerosis.

    Science.gov (United States)

    Moreira, Shirlene Vianna; França, Cecília Cavalieri; Moreira, Marcos Aurélio; Lana-Peixoto, Marco Aurélio

    2009-03-01

    Musical autobiographies consist of a powerful therapeutic tool by which individuals define themselves. The use of this technique may help (re)construction personal identities and improve quality of life of patients with multiple sclerosis (MS). Eight adult patients on treatment at CIEM Multiple Sclerosis Investigation Center after selecting 10 to 15 pieces of music most significant in their lives were interviewed. The data collected were classified according to Even Rudd categories, which reveal how a person expresses his personal, social, temporal and transpersonal identities. We observed that recall of musical history makes MS patients get better perception both of their feelings and body awareness, as well as provide them with an alternative way to express themselves, activate and contextualize affective memories, and achieving a sense of life continuity in spite of the disease.

  7. Land surface Verification Toolkit (LVT)

    Science.gov (United States)

    Kumar, Sujay V.

    2017-01-01

    LVT is a framework developed to provide an automated, consolidated environment for systematic land surface model evaluation Includes support for a range of in-situ, remote-sensing and other model and reanalysis products. Supports the analysis of outputs from various LIS subsystems, including LIS-DA, LIS-OPT, LIS-UE. Note: The Land Information System Verification Toolkit (LVT) is a NASA software tool designed to enable the evaluation, analysis and comparison of outputs generated by the Land Information System (LIS). The LVT software is released under the terms and conditions of the NASA Open Source Agreement (NOSA) Version 1.1 or later. Land Information System Verification Toolkit (LVT) NOSA.

  8. Ontology Matching with Semantic Verification.

    Science.gov (United States)

    Jean-Mary, Yves R; Shironoshita, E Patrick; Kabuka, Mansur R

    2009-09-01

    ASMOV (Automated Semantic Matching of Ontologies with Verification) is a novel algorithm that uses lexical and structural characteristics of two ontologies to iteratively calculate a similarity measure between them, derives an alignment, and then verifies it to ensure that it does not contain semantic inconsistencies. In this paper, we describe the ASMOV algorithm, and then present experimental results that measure its accuracy using the OAEI 2008 tests, and that evaluate its use with two different thesauri: WordNet, and the Unified Medical Language System (UMLS). These results show the increased accuracy obtained by combining lexical, structural and extensional matchers with semantic verification, and demonstrate the advantage of using a domain-specific thesaurus for the alignment of specialized ontologies.

  9. Multicultural identity processes.

    Science.gov (United States)

    Hong, Ying-Yi; Zhan, Siran; Morris, Michael W; Benet-Martínez, Verónica

    2016-04-01

    The study of multicultural identity has gained prominence in recent decades and will be even more urgent as the mobility of individuals and social groups becomes the 'new normal'. This paper reviews the state-of-the-art theoretical advancements and empirical discoveries of multicultural identity processes at the intrapersonal, interpersonal, and collective (e.g., organizational, societal) levels. First, biculturalism has more benefits for individuals' psychological and sociocultural adjustment than monoculturalism. Bicultural individuals' racial essentialist beliefs and Bicultural Identity Integration affect cultural frame switching, racial categorization, and creativity. Second, identity denial and identity-based discrimination by other people or groups threaten multicultural individuals' psychological health and performance. Third, multiculturalism and interculturalism policies are associated with different conceptions of and attitudes toward diversity, and have distinct outcomes for multicultural individuals and societies. Copyright © 2015 Elsevier Ltd. All rights reserved.

  10. Identity as wrapping up

    DEFF Research Database (Denmark)

    Nickelsen, Niels Christian Mossfeldt

    2015-01-01

    The aim of this paper is to provide an understanding of cross-professional collaboration and to develop a notion of professional identity based in practice. The background of the paper is science and technology studies and more precisely actor network theory. The method used: The empirical analysis...... in close relation to the making of a report concerning the cross-professional collaboration. Findings are that “Identity as wrapping up” points to the way in which certain actors, by other actors, are maneuvered into certain pockets in a network. Identity as wrapping up is emphasized as a way...... of participating, which is closely connected to the intention to control the relation towards the other. Thus identity as wrapping up is argued to be a strategy to optimize the situation of one’s own profession. Conclusion: This articulation of identity contributes to the actor network literature as well...

  11. Researcher Identity in Transition

    DEFF Research Database (Denmark)

    Castelló, Montserrat; Kobayashi, Sofie; McGinn, Michelle K.

    2015-01-01

    to reinterpretation, and ECRs need to attend to new or reimagined signals in their efforts to develop a researcher identity in this current context. In this article, we present a comprehensive framework for researcher identity in relation to the ways ECRs recognise and respond to divergent signals across spheres...... of activity. We illustrate this framework through eight identity stories drawn from our earlier research projects. Each identity story highlights the congruence (or lack of congruence) between signals across spheres of activity and emphasises the different ways ECRs respond to these signals. The proposed...... comprehensive framework allows for the analysis of researcher identity development through the complex and intertwined activities in which ECRs are involved. We advance this approach as a foundation for a sustained research agenda to understand how ECRs identify and respond to relevant signals, and...

  12. Visual identity and rebranding

    Directory of Open Access Journals (Sweden)

    Katarzyna Wrona

    2015-06-01

    Full Text Available The goal of this article is to highlight the essence of visual identification and rebranding, as well as to discuss elements of corporate identity, which are subject to revitalization in the process of refreshing the image of a brand. In the first part the article the analysis of the term visual identification is conducted. In the analysis special attention is drawn to the role of visual identification in creating a coherent identity of an organization. In the subsequent chapters further components of corporate identity are presented in detail – starting with logotype, through business forms, advertisements, accompanying materials and Internet websites to signs on buildings. Moreover, corporate identity book as a collection of standards and guidelines for application of corporate identity rules is discussed. The deliberations are based on the study of literature. The last chapter presented the transformation of the brand of Institute of Aviation.

  13. Perceived Parenting Dimensions and Identity Styles: Exploring the Socialization of Adolescents' Processing of Identity-Relevant Information

    Science.gov (United States)

    Smits, Ilse; Soenens, Bart; Luyckx, Koen; Duriez, Bart; Berzonsky, Michael; Goossens, Luc

    2008-01-01

    This study examined the relationships between crucial dimensions of perceived parenting (support, behavioral control, and psychological control) and the three identity styles defined by Berzonsky [Berzonsky, M. D. (1990). "Self-construction over the life span: A process perspective on identity formation." "Advances in Personal Construct…

  14. Nuclear Data Verification and Standardization

    Energy Technology Data Exchange (ETDEWEB)

    Karam, Lisa R.; Arif, Muhammad; Thompson, Alan K.

    2011-10-01

    The objective of this interagency program is to provide accurate neutron interaction verification and standardization data for the U.S. Department of Energy Division of Nuclear Physics programs which include astrophysics, radioactive beam studies, and heavy-ion reactions. The measurements made in this program are also useful to other programs that indirectly use the unique properties of the neutron for diagnostic and analytical purposes. These include homeland security, personnel health and safety, nuclear waste disposal, treaty verification, national defense, and nuclear based energy production. The work includes the verification of reference standard cross sections and related neutron data employing the unique facilities and capabilities at NIST and other laboratories as required; leadership and participation in international intercomparisons and collaborations; and the preservation of standard reference deposits. An essential element of the program is critical evaluation of neutron interaction data standards including international coordinations. Data testing of critical data for important applications is included. The program is jointly supported by the Department of Energy and the National Institute of Standards and Technology.

  15. Identidad personal y profesional de los docentes de preescolar en el distrito de Santa Marta Identidade pessoal e profissional dos docentes de pré-escolar no distrito de Santa Marta Personal and Professional Identity of Pre-School Teachers in the Santa Marta district

    Directory of Open Access Journals (Sweden)

    María Dilia Mieles-Barrera

    2009-03-01

    temores. No campo profissional, destacam-se abertura as mudanças, a predisposição ao trabalho em equipe, a recursividade e a falta de qualificação e de treinamento. A população que participou na pesquisa pensa que a educação pré-escolar não é muito valorada na proposição de políticas públicas sobre educação e que são requeridas mudanças drásticas no senso e a orientação deste nível educativo.This article presents a study done by the Research Group on Early Childhood Education at the Universidad de Magdalena in Santa Marta, Colombia. The study was designed to prompt reflection and recognition among the participants on the aspects that characterize them at a personal and professional level, to explore how they are perceived by other teachers, teaching directors and parents, and to delve into the expectations all these actors have with in terms of what preschool education should be. The main findings reflect a personal identity characterized by a sense of belonging to the Caribbean culture, religiousness, a high regard for family unity, the capacity for self-critique and the presence of certain fears. As for the professional aspect, the more outstanding characteristics include a receptiveness to change, a willingness to work as part of a team, resourcefulness and lack of certification and refresher training. For the most part, those who participated in the study find that preschool education is undervalued in the realm of public policy on education, and believe that fundamental changes are in order with respect to the meaning and orientation of education at this level.

  16. The Position of a Teacher as a Factor of Forming Students' Socio-Cultural Identities (On the Example of the Russian Civil Identity)

    Science.gov (United States)

    Shakurova, Marina V.

    2015-01-01

    The article presents experience of structuring and description of teachers' position in the process of forming socio-cultural identity of the person, detailed in regard to the process of formation of one of the subtypes of socio-cultural identity--Russian civil identity. We identified and described real subjective, nominally subjective and…

  17. Plotting Maternity in Three Persons

    Science.gov (United States)

    Kinser, Amber E.

    2012-01-01

    This performance text examines complexities of personal and maternal identity in family life. Speaking in first, second, and third person voices, the author offers autoethnographic accounts of the tensions between separateness and connectedness, normative and subjective motherhood, and novice and seasoned perspectives. The piece functions as a…

  18. Linguistic identity matching

    CERN Document Server

    Lisbach, Bertrand

    2013-01-01

    Regulation, risk awareness and technological advances are increasingly drawing identity search functionality into business, security and data management processes, as well as fraud investigations and counter-terrorist measures.Over the years, a number of techniques have been developed for searching identity data, traditionally focusing on logical algorithms. These techniques often failed to take into account the complexities of language and culture that provide the rich variations  seen in names used around the world. A new paradigm has now emerged for understanding the way that identity data

  19. Vocational Identity and Ego Identity Status in Korean Nursing Students

    Directory of Open Access Journals (Sweden)

    Hyun-Young Koo, PhD, RN

    2016-03-01

    Conclusions: These findings show that nursing students in identity achievement status have secure and clear vocational identities. Further longitudinal and qualitative studies are needed to find out if identity formation among nursing students changes with age.

  20. Perceptions of Biometric Experts on Whether or Not Biometric Modalities Will Combat Identity Fraud

    Science.gov (United States)

    Edo, Galaxy Samson

    2012-01-01

    Electronic-authentication methods, no matter how sophisticated they are in preventing fraud, must be able to identify people to a reasonable degree of certainty before any credentials are assured (Personix, 2006). User authentication is different from identity verification, and both are separate but vital steps in the process of securing…