WorldWideScience

Sample records for sars-covs share identical

  1. Sharing Status and Appropriating Identity

    DEFF Research Database (Denmark)

    de Oliveira, Sandi Michele

    2013-01-01

    On 26 December 2012 President Cavaco Silva announced the creation of the Conselho da Diápora Portuguesa, an association of 300 “notable” (notáveis) Portuguese to be individually invited by the Council’s Board. Their function will be to service as lobbyists working to improve the country’s image...... to their relatives in Portugal as well as to the needs of the Portuguese Government. This initiative, however, is different; here, in addition to direct economic benefits that the Council’s members may provide, their identity itself as successful Portuguese is put into play. Using tools from discourse analysis...... of Portugal, Camões and the Portuguese Communities (10 June 2013). The study focuses specifically on strategies of legitimization and delegitimization of Portuguese transnationals....

  2. Shared identity is key to effective communication.

    Science.gov (United States)

    Greenaway, Katharine H; Wright, Ruth G; Willingham, Joanne; Reynolds, Katherine J; Haslam, S Alexander

    2015-02-01

    The ability to communicate with others is one of the most important human social functions, yet communication is not always investigated from a social perspective. This research examined the role that shared social identity plays in communication effectiveness using a minimal group paradigm. In two experiments, participants constructed a model using instructions that were said to be created by an ingroup or an outgroup member. Participants made models of objectively better quality when working from communications ostensibly created by an ingroup member (Experiments 1 and 2). However, this effect was attenuated when participants were made aware of a shared superordinate identity that included both the ingroup and the outgroup (Experiment 2). These findings point to the importance of shared social identity for effective communication and provide novel insights into the social psychology of communication. © 2014 by the Society for Personality and Social Psychology, Inc.

  3. Shared identity in organizational stress and change.

    Science.gov (United States)

    van Dick, Rolf; Ciampa, Valeria; Liang, Shuang

    2017-11-17

    The social identity approach has been found very useful for the understanding of a range of phenomena within and across organizations. It has been applied in particular to analyze employees' stress and well-being at work and their reactions to organizational change. In this paper, we argue that there is a mismatch between the theoretical notion of shared identities in teams and organizations and empirical research, which largely focuses on the individual employee's identification with his or her social categories at work. We briefly review the literature in the two areas of stress and change and conclude with an agenda for future research. Copyright © 2017 Elsevier Ltd. All rights reserved.

  4. Cancer survivor identity shared in a social media intervention.

    Science.gov (United States)

    Song, Hayeon; Nam, Yujung; Gould, Jessica; Sanders, W Scott; McLaughlin, Margaret; Fulk, Janet; Meeske, Kathleen A; Ruccione, Kathleen S

    2012-01-01

    This study investigates how cancer survivors construct their identities and the impact on their psychological health, as measured by depression and survivor self-efficacy. Fourteen young adult survivors of pediatric cancer participated in a customized social networking and video blog intervention program, the LIFECommunity, over a 6-month period. Survivors were asked to share their stories on various topics by posting video messages. Those video blog postings, along with survey data collected from participants, were analyzed to see how cancer survivors expressed their identities, and how these identities are associated with survivors' psychosocial outcomes. In survivors who held negative stereotypes about cancer survivors, there was a positive relationship with depression while positive stereotypes had a marginal association with cancer survivor efficacy. Findings indicate that although pediatric cancer survivors often do not publicly discuss a "cancer survivor identity," they do internalize both positive and negative stereotypes about cancer survivorship. It is important for practitioners to be aware of the long-term implications of cancer survivor identity and stereotypes.

  5. Silver lining: building a shared Sudanese identity through food.

    Science.gov (United States)

    Crofts, A V

    2010-01-01

    The displaced of Sudan, due to both decades of civil war and natural disasters, are disproportionately female and many are responsible for dependents. For those settling in the capital, Khartoum, their livelihood depends on carving out ways to earn money in an urban area that is experiencing tremendous growth from the millions of recent arrivals. When confronted with the immediate need to provide for their families, women turn to a skill universally expected of them: cooking. Therefore, Khartoum is home to a thriving micro-economy of food vendors. By selling these dishes in the capital, they broaden the culinary horizons of the city while preserving their own food traditions. Their growing numbers provide an opportunity for regional foodways to gain wider introduction, adaptation, and, finally, adoption. These same vendors also facilitate a nascent sense of a shared Sudanese identity and nationalism. For established Khartoum urbanites, the definition of Sudanese food (and, by extension, what it means to be Sudanese) expands as street-vendor fare moves to restaurants and becomes more widely available throughout the city. As urban Sudanese overcome their preconceptions and discover a taste for regional cuisines, meals function as unofficial diplomacy during this turbulent time in Sudan's history.

  6. Why do identical twins differ in personality: shared environment reconsidered.

    Science.gov (United States)

    Torgersen, Anne Mari; Janson, Harald

    2002-02-01

    While heritability studies show that most of the variance in adult personality can be attributed to genetic or so-called nonshared environmental influence, this does not mean that shared events lack importance for the development of later personality differences. We studied the relationship between Big Five personality differences in monozygotic (MZ) twins at age 29, and life stressors at age 6 to 15, using prospective data from 26 MZ pairs studied from birth onwards. A positive significant correlation was found between stressors in childhood and early adolescence, and intrapair personality differences in Agreeableness, Openness, Conscientiousness, and five-factor profiles. We note that the effects of shared events are labeled "nonshared" environment when the effect is to make siblings more different. Case examples illustrate the relationship between stress and personality differences, and provide hypotheses for further studies in larger samples.

  7. Explaining effervescence: Investigating the relationship between shared social identity and positive experience in crowds.

    Science.gov (United States)

    Hopkins, Nick; Reicher, Stephen D; Khan, Sammyh S; Tewari, Shruti; Srinivasan, Narayanan; Stevenson, Clifford

    2016-01-01

    We investigated the intensely positive emotional experiences arising from participation in a large-scale collective event. We predicted such experiences arise when those attending a collective event are (1) able to enact their valued collective identity and (2) experience close relations with other participants. In turn, we predicted both of these to be more likely when participants perceived crowd members to share a common collective identity. We investigated these predictions in a survey of pilgrims (N = 416) attending a month-long Hindu pilgrimage festival in north India. We found participants' perceptions of a shared identity amongst crowd members had an indirect effect on their positive experience at the event through (1) increasing participants' sense that they were able to enact their collective identity and (2) increasing the sense of intimacy with other crowd members. We discuss the implications of these data for how crowd emotion should be conceptualised.

  8. Identity Federation and Its Importance for NASA's Future: The SharePoint Extranet Pilot

    Science.gov (United States)

    Baturin, Rebecca R.

    2013-01-01

    My project at Kennedy Space Center (KSC) during the spring 2013 Project Management and Systems Engineering Internship was to functionalJy test and deploy the SharePoint Extranet system and ensure successful completion of the project's various lifecycle milestones as described by NASA Procedural Requirement (NPR) 7 120.7. I worked alongside NASA Project Managers, Systems Integration Engineers, and Information Technology (IT) Professionals to pilot this collaboration capability between NASA and its External Partners. The use of identity federation allows NASA to leverage externally-issued credentials of other federal agencies and private aerospace and defense companies, versus the traditional process of granting and maintaining full NASA identities for these individuals. This is the first system of its kind at NASA and it will serve as a pilot for the Federal Government. Recognizing the novelty of this service, NASA's initial approach for deployment included a pilot period where nearby employees of Patrick Air Force Base would assist in testing and deployment. By utilizing a credential registration process, Air Force users mapped their Air Force-issued Common Access Cards (CAC) to a NASA identity for access to the External SharePoint. Once the Air Force stands up an Active Directory Federation Services (ADFS) instance within their Data Center and establishes a direct trust with NASA, true identity federation can be established. The next partner NASA is targeting for collaboration is Lockheed Martin (LMCO), since they collaborate frequently for the ORION Program. Through the use of Exostar as an identity hub, LMCO employees will be able to access NASA data on a need to know basis, with NASA ultimately managing access. In a time when every dollar and resource is being scrutinized, this capability is an exciting new way for NASA to continue its collaboration efforts in a cost and resource effective manner.

  9. Work in the virtual enterprise-creating identities, building trust, and sharing knowledge

    DEFF Research Database (Denmark)

    Rasmussen, Lauge Baungaard; Wangel, Arne

    2006-01-01

    for an exploratory, sociotechnical research approach combining the dimensions of context, subject and action with the twin objectives of contributing to the enhancement of collaborative capabilities in virtual teams as well as improving the insights into the nature of virtual work....... of the network must be integrated across the barriers of missing face-to-face clues and cultural differences. The social integration of the virtual network involves the creation of identities of the participating nodes, the building of trust between them, and the sharing of tacit and explicit knowledge among...... them. The conventional organisation already doing well in these areas seems to have an edge when going virtual. The paper argues that the whole question of management and control must be reconsidered due to the particular circumstances in the ‘Network Society’. The paper outlines a suggestion...

  10. Key exchange using biometric identity based encryption for sharing encrypted data in cloud environment

    Science.gov (United States)

    Hassan, Waleed K.; Al-Assam, Hisham

    2017-05-01

    The main problem associated with using symmetric/ asymmetric keys is how to securely store and exchange the keys between the parties over open networks particularly in the open environment such as cloud computing. Public Key Infrastructure (PKI) have been providing a practical solution for session key exchange for loads of web services. The key limitation of PKI solution is not only the need for a trusted third partly (e.g. certificate authority) but also the absent link between data owner and the encryption keys. The latter is arguably more important where accessing data needs to be linked with identify of the owner. Currently available key exchange protocols depend on using trusted couriers or secure channels, which can be subject to man-in-the-middle attack and various other attacks. This paper proposes a new protocol for Key Exchange using Biometric Identity Based Encryption (KE-BIBE) that enables parties to securely exchange cryptographic keys even an adversary is monitoring the communication channel between the parties. The proposed protocol combines biometrics with IBE in order to provide a secure way to access symmetric keys based on the identity of the users in unsecure environment. In the KE-BIOBE protocol, the message is first encrypted by the data owner using a traditional symmetric key before migrating it to a cloud storage. The symmetric key is then encrypted using public biometrics of the users selected by data owner to decrypt the message based on Fuzzy Identity-Based Encryption. Only the selected users will be able to decrypt the message by providing a fresh sample of their biometric data. The paper argues that the proposed solution eliminates the needs for a key distribution centre in traditional cryptography. It will also give data owner the power of finegrained sharing of encrypted data by control who can access their data.

  11. Haplotype assembly in polyploid genomes and identical by descent shared tracts.

    Science.gov (United States)

    Aguiar, Derek; Istrail, Sorin

    2013-07-01

    Genome-wide haplotype reconstruction from sequence data, or haplotype assembly, is at the center of major challenges in molecular biology and life sciences. For complex eukaryotic organisms like humans, the genome is vast and the population samples are growing so rapidly that algorithms processing high-throughput sequencing data must scale favorably in terms of both accuracy and computational efficiency. Furthermore, current models and methodologies for haplotype assembly (i) do not consider individuals sharing haplotypes jointly, which reduces the size and accuracy of assembled haplotypes, and (ii) are unable to model genomes having more than two sets of homologous chromosomes (polyploidy). Polyploid organisms are increasingly becoming the target of many research groups interested in the genomics of disease, phylogenetics, botany and evolution but there is an absence of theory and methods for polyploid haplotype reconstruction. In this work, we present a number of results, extensions and generalizations of compass graphs and our HapCompass framework. We prove the theoretical complexity of two haplotype assembly optimizations, thereby motivating the use of heuristics. Furthermore, we present graph theory-based algorithms for the problem of haplotype assembly using our previously developed HapCompass framework for (i) novel implementations of haplotype assembly optimizations (minimum error correction), (ii) assembly of a pair of individuals sharing a haplotype tract identical by descent and (iii) assembly of polyploid genomes. We evaluate our methods on 1000 Genomes Project, Pacific Biosciences and simulated sequence data. HapCompass is available for download at http://www.brown.edu/Research/Istrail_Lab/. Supplementary data are available at Bioinformatics online.

  12. An exploration of social identity: The geography and politics of news-sharing communities in twitter

    Science.gov (United States)

    HerdaĞdelen, AmaÇ; Zuo, Wenyun; Gard-Murray, Alexander; Bar-Yam, Yaneer

    2013-11-01

    The importance of collective social action in current events is manifest in the Arab Spring and Occupy movements. Electronic social media have become a pervasive channel for social interactions, and a basis of collective social response to information. The study of social media can reveal how individual actions combine to become the collective dynamics of society. Characterizing the groups that form spontaneously may reveal both how individuals self-identify and how they will act together. Here we map the social, political, and geographical properties of news-sharing communities on Twitter, a popular micro-blogging platform. We track user-generated messages that contain links to New York Times online articles and we label users according to the topic of the links they share, their geographic location, and their self-descriptive keywords. When users are clustered based on who follows whom in Twitter, we find social groups separate by whether they are interested in local (NY), national (US) or global (cosmopolitan) issues. The national group subdivides into liberal, conservative and other, the latter being a diverse but mostly business oriented group with sports, arts and other splinters. The national political groups are based across the US but are distinct from the national group that is broadly interested in a variety of topics. A person who is cosmopolitan associates with others who are cosmopolitan, and a US liberal / conservative associates with others who are US liberal / conservative, creating separated social groups with those identities. The existence of "citizens" of local, national and cosmopolitan communities is a basis for dialog and action at each of these levels of societal organization.

  13. Genius begins at home: Shared social identity enhances the recognition of creative performance.

    Science.gov (United States)

    Steffens, Niklas K; Haslam, S Alexander; Ryan, Michelle K; Millard, Kathryn

    2017-11-01

    The present research examines the extent to which the recognition of creative performance is structured by social group membership. It does this by analysing the award of merit prizes for Best Actor and Actress in a Leading Role for the international award of US-based Oscars and British-based BAFTAs since BAFTA's inception of this category in 1968. For both awards, the exclusive assessment criterion is the quality of artists' performance in the international arena. Results show that US artists won a greater proportion of Oscars than BAFTAs (odds ratio: 2.10), whereas British artists won a greater proportion of BAFTAs than Oscars (OR: 2.26). Furthermore, results support the hypothesis that these patterns are more pronounced as the diagnostic value of a quality indicator increases - that is, in the conferring of actual awards rather than nominations. Specifically, US artists won a greater proportion of Oscar awards than nominations (OR: 1.77), while British artists won a greater proportion of BAFTA awards than nominations (OR: 1.62). Additional analyses show that the performances of in-group actors in movies portraying in-group culture (US culture in the case of Oscars, British culture in the case of BAFTAs) are more likely to be recognized than the performances of in-group actors in movies portraying the culture of other (out-)groups. These are the first data to provide clear evidence from the field that the recognition of exceptional creative performance is enhanced by shared social identity between perceivers and performers. © 2017 The British Psychological Society.

  14. On the Impact of Closed Access and Users Identities in Spectrum-Shared Overlaid Wireless Networks

    KAUST Repository

    Radaydeh, Redha M.; Gaaloul, Fakhreddine; Alouini, Mohamed-Slim

    2016-01-01

    © 2015 IEEE. This paper develops analytical models to investigate the impact of various operation terms and parameters on the downlink performance of spectrum-shared overlaid networks under closed-access small cells deployment. It is considered

  15. Monkey Business: Children's Use of Character Identity to Infer Shared Properties

    Science.gov (United States)

    Rhemtulla, Mijke; Hall, D. Geoffrey

    2009-01-01

    Children's toys provide a rich arena for investigating conceptual flexibility, because they often can be understood as possessing an individual identity at multiple levels of abstraction. For example, many dolls (e.g., Winnie-the-Pooh) and action figures (e.g., Batman) can be construed either as characters from a fictional world or as physical…

  16. Assumption-free estimation of heritability from genome-wide identity-by-descent sharing between full siblings.

    Directory of Open Access Journals (Sweden)

    2006-03-01

    Full Text Available The study of continuously varying, quantitative traits is important in evolutionary biology, agriculture, and medicine. Variation in such traits is attributable to many, possibly interacting, genes whose expression may be sensitive to the environment, which makes their dissection into underlying causative factors difficult. An important population parameter for quantitative traits is heritability, the proportion of total variance that is due to genetic factors. Response to artificial and natural selection and the degree of resemblance between relatives are all a function of this parameter. Following the classic paper by R. A. Fisher in 1918, the estimation of additive and dominance genetic variance and heritability in populations is based upon the expected proportion of genes shared between different types of relatives, and explicit, often controversial and untestable models of genetic and non-genetic causes of family resemblance. With genome-wide coverage of genetic markers it is now possible to estimate such parameters solely within families using the actual degree of identity-by-descent sharing between relatives. Using genome scans on 4,401 quasi-independent sib pairs of which 3,375 pairs had phenotypes, we estimated the heritability of height from empirical genome-wide identity-by-descent sharing, which varied from 0.374 to 0.617 (mean 0.498, standard deviation 0.036. The variance in identity-by-descent sharing per chromosome and per genome was consistent with theory. The maximum likelihood estimate of the heritability for height was 0.80 with no evidence for non-genetic causes of sib resemblance, consistent with results from independent twin and family studies but using an entirely separate source of information. Our application shows that it is feasible to estimate genetic variance solely from within-family segregation and provides an independent validation of previously untestable assumptions. Given sufficient data, our new paradigm will

  17. Innovative business models within niche tourist markets: shared identity, authenticity and flexibile networks. The case of three italian SMEs

    Directory of Open Access Journals (Sweden)

    Federica Montaguti

    2016-07-01

    Full Text Available Innovative business models within niche tourist markets: shared identity, authenticity and flexibile networks. The case of three italian SMEs The evolution of business models is a crucial challenge for tourism companies, which should understand how they can stimulate their creativity and introduce innovation. However for many firms, in particular for SMEs, this process is not so easy to be adopted. Even more difficult it is to understand how the business model should change to be successful in solving what appears to be one of the main problems for SMEs, especially within mature, tourist destinations, i.e. targeting new profitable segments. The paper discusses the main findings of a research project carried out by the authors about changes in the business models of Italian tourism companies, underlining in particular three case-studies of interest in terms of the innovation put in place and that relate to SMEs. The analysis, based on the business model canvas, the value constellation and the storytelling, found out that these three firms are flexible companies that have characteristics emblematic of the knowledge and information economy business models. They successfully answer the needs of specific niches, finding new opportunities within a mature tourism market and famous destinations, thanks to their ability to develop wide flexible networks, where customers are an active part, and thanks to the value proposed to the clients, centred on the idea of a shared identity between the clients and the company’s founders and of an authenticity guaranteed by the life story of the founders themselves.

  18. Brasiguaio Identities: An outcome of the pursuit of land across the Brazilian and Paraguayan shared border region

    Directory of Open Access Journals (Sweden)

    Marcos Estrada

    2017-10-01

    Full Text Available The movement of people between places is far from being a new or isolated phenomenon and is happening more often than before. This is also the case for individuals who moved from Brazil and Paraguay. Based on the existing literature as well as on data gathered in the landless camp Antônio Irmão, also known locally as the ‘Brasiguaios landless camp’ in Itaquiraí in the state of Mato Grosso do Sul, Brazil, this article explains how their search for a piece of land in either Brazil and Paraguay influenced the formation of the Brasiguaios identities. First, I briefly approach the foundation of transnationalism scholarship, which guided my research. Next, I demonstrate how land policies in Brazil and Paraguay, aimed at developing their respective border regions, played a role in the migration of Brazilians to Paraguayan and then the return of a number of them to Brazil. Last, I share the narrative of individuals in the Brasiguaio landless camp in the pursuit of land in either country. At the core of my argument is that the Brasiguaio identities of this landless group result from their pursuit of land rather than from migration processes.

  19. Identity's identities

    DEFF Research Database (Denmark)

    Jensen, Kim Ebensgaard

    -specialized language in which it also serves a number of functions – some of which are quite fundamental to society as such. In other words, the lexeme identity is a polysemic word and has multiple, well, identities. Given that it appears to have a number of functions in a variety of registers, including terminologies...... in Academic English and more everyday-based English, identity as a lexeme is definitely worth having a look at. This paper presents a lexicological study of identity in which some of its senses are identified and their behaviors in actual discourse are observed. Drawing on data from the 2011 section...... of the Corpus of Contemporary American English, a behavioral profile of the distributional characteristics of identity is set up. Behavioral profiling is a lexicographical method developed by the corpus linguist Stefan Th. Gries which, by applying semantic ID tagging and statistical analysis, provides a fine...

  20. Creating a Shared Culture: Assessing Induction Programs in Ignatian Identity for the Formation of New Teachers in Jesuit Secondary Schools

    Science.gov (United States)

    Rebore, Ronald W., Jr.

    2012-01-01

    There has been a significant decline in the amount of priests and brothers who live and work at Jesuit secondary schools in the United States. The presence of Jesuits in the schools shaped the Ignatian identity of the schools' cultures. The Jesuit order, the Jesuit Secondary Education Association (JSEA), and the high schools have recognized that…

  1. The Informal Institutions and the Knowledge Sharing: The Mediating Effect of the Social Identity and the Organizational Trust

    Directory of Open Access Journals (Sweden)

    Erendira Fierro Moreno

    2016-06-01

    Full Text Available The aim of this scientific paper is to determine the extent to which social identity and organizational trust mediate the relationship between informal institutions and the exchange of knowledge. Based on a review of literature and relying on the theoretical perspective of new institutionalism and on the resource based-view the research hypotheses were formulated. Using a cross-sectional and with Mexican public sector organizations and through the perceptions of 252 public servants the hypotheses were tested. Multivariate analysis (SEM was performed. The results confirm the importance of informal institutions that legitimize the performance of organizations but do not guarantee its real efficiency. However, research shows that intervening valuable resources management (social identity and organizational trust helps to exploit opportunities and neutralize threats from the environment generating new capabilities: the exchange of knowledge.

  2. Leadership identities

    DEFF Research Database (Denmark)

    Holmgreen, Lise-Lotte

    2018-01-01

    Questioning the assumption that identities can be controlled through a shared organisational culture, the article explores the inculcation of a discourse of diversity into leadership identities in a Danish bank and building society. Thus, it intends to demonstrate that, on the one hand, discourse...... plays a significant role in identity construction and, on the other, that leaders’ constructions may have many sources of inspiration within and outside the organisation, emphasising that identity construction is a complex process in which organisational efforts to promote a common leadership identity...... to construct their leadership identities. While the respondents present comparable identities to the interviewer, the analysis reveals that the they draw on different discourses and employ a number of different discursive means to present this identity. This, the article argues, may be the result of a number...

  3. The Relevance of Tag along Rights and Identity of Controlling Shareholders for the Price Spreads between Dual-Class Shares: the Brazilian Case

    Directory of Open Access Journals (Sweden)

    Richard Saito

    2010-01-01

    Full Text Available This paper analyzes the determinants of the differential pricing of equity classes (the so-called dual-class premium [DCP] in Brazil from 1995 to 2006 with a focus on two specific corporate governance aspects: i the granting of tag along rights, a mandatory bid rule that extends to minority shareholders the right to sell their shares in case of a control transfer; and ii the identity of the controlling shareholders, with an emphasis on family control. We examined 87 Brazilian listed firms throughout the period, resulting in a sample of 3,287 observations. We found empirical evidence that changes in Corporate Law decreased (increased the advantage of voting shares in terms of tag along rights reduced (incremented DCP. However, we did not find empirical evidence that the voluntary granting of tag along rights altered DCP. We also found evidence suggesting that family control is positively associated with DCP level. Overall, our results indicate that regulations regarding shareholders’ rights and the identity of controlling shareholders are the two relevant corporate governance variables for DCP level in environments characterized by concentrated ownership structures.

  4. Ribonucleocapsid Formation of SARS-COV Through Molecular Action of the N-Terminal Domain of N Protein

    Energy Technology Data Exchange (ETDEWEB)

    Saikatendu, K.S.; Joseph, J.S.; Subramanian, V.; Neuman, B.W.; Buchmeier, M.J.; Stevens, R.C.; Kuhn, P.; /Scripps Res. Inst.

    2007-07-12

    Conserved amongst all coronaviruses are four structural proteins, the matrix (M), small envelope (E) and spike (S) that are embedded in the viral membrane and the nucleocapsid phosphoprotein (N), which exists in a ribonucleoprotein complex in their lumen. The N terminal domain of coronaviral N proteins (N-NTD) provides a scaffold for RNA binding while the C-terminal domain (N-CTD) mainly acts as oligomerization modules during assembly. The C-terminus of N protein anchors it to the viral membrane by associating with M protein. We characterized the structures of N-NTD from severe acute respiratory syndrome coronavirus (SARS-CoV) in two crystal forms, at 1.17A (monoclinic) and 1.85 A (cubic) respectively, solved by molecular replacement using the homologous avian infectious bronchitis virus (IBV) structure. Flexible loops in the solution structure of SARS-CoV N-NTD are now shown to be well ordered around the beta-sheet core. The functionally important positively charged beta-hairpin protrudes out of the core and is oriented similar to that in the IBV N-NTD and is involved in crystal packing in the monoclinic form. In the cubic form, the monomers form trimeric units that stack in a helical array. Comparison of crystal packing of SARS-CoV and IBV N-NTDs suggest a common mode of RNA recognition, but probably associate differently in vivo during the formation of the ribonucleoprotein complex. Electrostatic potential distribution on the surface of homology models of related coronaviral N-NTDs hints that they employ different modes of both RNA recognition as well as oligomeric assembly, perhaps explaining why their nucleocapsids have different morphologies.

  5. Believing in "us": exploring leaders' capacity to enhance team confidence and performance by building a sense of shared social identity.

    Science.gov (United States)

    Fransen, Katrien; Haslam, S Alexander; Steffens, Niklas K; Vanbeselaere, Norbert; De Cuyper, Bert; Boen, Filip

    2015-03-01

    The present study examined the impact of athlete leaders' perceived confidence on their teammates' confidence and performance. Male basketball players (N = 102) participated in groups of 4. To manipulate leaders' team confidence, the appointed athlete leader of each newly formed basketball team (a confederate) expressed either high or low team confidence. The results revealed an effect of team confidence contagion such that team members had greater team confidence when the leader expressed high (rather than low) confidence in the team's success. Second, the present study sought to explain the mechanisms through which this contagion occurs. In line with the social identity approach to leadership, structural equation modeling demonstrated that this effect was partially mediated by team members' increased team identification. Third, findings indicated that when leaders expressed high team confidence, team members' performance increased during the test, but when leaders expressed low confidence, team members' performance decreased. Athlete leaders thus have the capacity to shape team members' confidence--and hence their performance--in both positive and negative ways. In particular, by showing that they believe in "our team," leaders are able not only to make "us" a psychological reality, but also to transform "us" into an effective operational unit. PsycINFO Database Record (c) 2015 APA, all rights reserved.

  6. Activation of shared identities on the Uruguayan and Brazilian frontier triggered by the construction of Uruguay as a consumption proposal

    Directory of Open Access Journals (Sweden)

    Roberta Brandalise

    2016-12-01

    Full Text Available Estudamos a participação do jornalismo brasileiro na articulação de representações sociais e de identidades culturais na fronteira Brasil-Uruguai, a partir das apropriações e usos que brasileiros e uruguaios fronteiriços fizeram de narrativas noticiosas sobre o Uruguai e que eles consideraram relevantes em seu cotidiano. Realizamos o estudo de caso sob a perspectiva dos Estudos Culturais Britânicos e Latino-Americanos, com entrevistas semiestruturadas junto a uma amostra de 12 fronteiriços. O Uruguai foi caracterizado no discurso jornalístico como uma proposta de consumo, como destino turístico ou em função de seus produtos e recursos naturais. As narrativas noticiosas colaboraram para reforçar a identificação entre uruguaios e brasileiros com respeito ao pertencimento regional e ao estilo de vida.   PALAVRAS-CHAVE: Comunicação; Consumo; Fronteiras; Uruguai; Brasil.     ABSTRACT We studied the participation of Brazilian journalism in the articulation of social representations and of cultural identities on the Brazilian and Uruguayan border based on the news narratives about Uruguay that frontier Brazilians and Uruguayans appropriated, made use of and considered relevant in their everyday lives. We conducted the study case from the perspective of British and Latin American social studies, using semi-structured interviews for questioning 12 frontier people. Uruguay was featured in newspaper discourse as a consumption proposal, a tourist destination, or a stand for its products and natural resources. The narrative news helped to reinforce the mutual identification of Uruguayans and Brazilians with respect to their belonging to the region and their life style.   KEYWORDS: Communication; Consumption; Frontiers; Uruguay; Brazil.     RESUMEN Estudiamos la participación del periodismo brasileño en la articulación de representaciones sociales y de identidades culturales en la frontera Brasil-Uruguay, a partir de las

  7. Human rotavirus strains bearing VP4 gene P[6] allele recovered from asymptomatic or symptomatic infections share similar, if not identical, VP4 neutralization specificities

    International Nuclear Information System (INIS)

    Hoshino, Yasutaka; Jones, Ronald W.; Ross, Jerri; Santos, Norma; Kapikian, Albert Z.

    2003-01-01

    A rotavirus VP4 gene P[6] allele has been documented in a number of countries to be characteristically associated with an endemic predominantly asymptomatic infection in neonates in maternity hospital nurseries. The mechanisms underlying the endemicity and asymptomatic nature of such neonatal infections remain unknown. Rotavirus strains sharing this same P genotype, however, have more recently been recovered from an increasing number of symptomatic diarrheal episodes in infants and young children in various parts of the world. Previously, we have shown that an asymptomatic P[6] rotavirus neonatal infection is not associated with a unique VP7 (G) serotype but may occur in conjunction with various G types. Although amino acid sequence comparisons of the VP4 gene between selected 'asymptomatic' and 'symptomatic' P[6] rotavirus strains have been reported and yielded information concerning their VP4 genotypes, serotypic comparisons of the outer capsid spike protein VP4 of such viruses have not been studied systematically by two-way cross-neutralizations. We determined the VP4 neutralization specificities of four asymptomatic and four symptomatic P[6] strains: two each of asymptomatic and symptomatic strains by two-way tests, and two each of additional asymptomatic and symptomatic strains by one-way tests. Both asymptomatic and symptomatic P[6] strains were shown to bear similar, if not identical, VP4 neutralization specificities. Thus, P[6] rotavirus strains causing asymptomatic or symptomatic infections did not appear to belong to unique P (VP4) serotypes. In addition, a close VP4 serotypic relationship between human P[6] rotavirus strains and the porcine P[6] rotavirus Gottfried strain was confirmed

  8. Molecular cloning and expression of a transformation-sensitive human protein containing the TPR motif and sharing identity to the stress-inducible yeast protein STI1

    DEFF Research Database (Denmark)

    Honoré, B; Leffers, H; Madsen, Peder

    1992-01-01

    in families of fungal proteins required for mitosis and RNA synthesis. In particular, the protein has 42% amino acid sequence identity to STI1, a stress-inducible mediator of the heat shock response in Saccharomyces cerevisiae. Northern blot analysis indicated that the 3521 mRNA is up-regulated in several...

  9. Borrowing brainpower - sharing insecurities

    DEFF Research Database (Denmark)

    Wegener, Charlotte; Meier, Ninna; Ingerslev, Karen

    2016-01-01

    Academic writing is a vital, yet complex skill that must be developed within a doctoral training process. In addition, becoming an academic researcher is a journey of changing sense of self and identity. Through analysis of a group session, we show how the feedback of peers addresses questions...... of structure and writing style along with wider issues of researcher identity. Thus, peer learning is demonstrated as a process of simultaneously building a text and an identity as scholarly researcher. The paper advocates ‘borrowing brainpower’ from peers in order to write better texts and, at the same time......, ‘share insecurities’ during the development of the researcher identity. Based on a distributed notion of peer learning and identity, we point to the need for further research into the everyday activities of doctoral writing groups in order to understand the dynamic relationship between production of text...

  10. Hard Identity and Soft Identity

    Directory of Open Access Journals (Sweden)

    Hassan Rachik

    2006-04-01

    Full Text Available Often collective identities are classified depending on their contents and rarely depending on their forms. Differentiation between soft identity and hard identity is applied to diverse collective identities: religious, political, national, tribal ones, etc. This classification is made following the principal dimensions of collective identities: type of classification (univocal and exclusive or relative and contextual, the absence or presence of conflictsof loyalty, selective or totalitarian, objective or subjective conception, among others. The different characteristics analysed contribute to outlining an increasingly frequent type of identity: the authoritarian identity.

  11. Ternutator identities

    International Nuclear Information System (INIS)

    Devchand, Chandrashekar; Fairlie, David; Nuyts, Jean; Weingart, Gregor

    2009-01-01

    The ternary commutator or ternutator, defined as the alternating sum of the product of three operators, has recently drawn much attention as an interesting structure generalizing the commutator. The ternutator satisfies cubic identities analogous to the quadratic Jacobi identity for the commutator. We present various forms of these identities and discuss the possibility of using them to define ternary algebras.

  12. Music, culture and identity

    Directory of Open Access Journals (Sweden)

    Ilir Ramadani

    2017-03-01

    Full Text Available At the time of globalization it is difficult to pretend avoiding music culture and identity from political, cultural and social developments. Thus, it is impossible for the music to be unshakable and to represent national identity by not taking and giving nothing to culture. The dynamics of life and the rapid development of technology make it impossible for the culture to remain unaffected in terms of sharing experiences social experiences. Culture represents our current course, both in terms of politics, also in the social and human aspects. Through the technology it is possible for our children to be equal with children of all other countries, to exchange information and to connect directly with all countries of the world. Musical education is one of the main factors of cultural development and preservation of national identity. Identity consists of everything we posses and reflect. We are those who distinguish from each other and have a common denominator compared to other nations.

  13. Shared pledge shared vision

    International Nuclear Information System (INIS)

    Boussaha, Ali; Diatta, Christian Sina

    2005-01-01

    The New Partnership for Africa's Development (NEPAD) is a pledge by African leaders to eradicate poverty and to promote sustainable growth and development. NEPAD is a 'new framework of interaction with the rest of the world, including the industrialised countries and multilateral organizations.' The agenda is based on regional priorities and development plans and its implementation relies on African ownership and management. As a UN system organisation, the IAEA strongly supports the priorities identified in the Millennium Declaration and the New Partnership for Africa's Development. As a technical agency, the IAEA shares its recognized core competencies and technical expertise in support of NEPAD goals. Efforts aim at strengthening institutional capacity building in nuclear sciences and technology and promoting the sustainable application of nuclear techniques for social and economic development. The IAEA has a membership of 34 African countries. The Agency supports them under its technical cooperation programme through provision of expertise, training opportunities and equipment in priority areas identified by the countries themselves. For many African Member States, meeting basic human needs through the implementation of poverty alleviation strategies remains the top priority on the agenda for national development plans and international cooperation programmes. In the context of sustainable development, special attention is being paid to enlarging the contribution of isotopes and nuclear techniques in major areas of economic and social significance and to promoting regional cooperation in nuclear science and technology related fields. As a partner in development, the Agency has promoted and undertaken programmes to support African countries' efforts to address priority development issues particularly in the areas of health care, food and agriculture and water resources development. The IAEA technical cooperation mechanism includes support to the African Regional

  14. Medical Identity

    DEFF Research Database (Denmark)

    Musaeus, Peter

    2015-01-01

    Purpose: To examine philosophical stances underpinning medical identity and assess the conceptual relationship between physician, medical practice and culture. Argument: Medical identity is about the ideals and moral positions that physicians take when justifying themselves. Medical identity...... hedonistic versus sentimentalist approaches to medical identity. The sociocultural philosophical analysis of medical identity can shed light on what it means conceptually for a physician to harbor beliefs associated with him/her being taken to be an autonomous professional. It is important because it touches...... on the meaning of being a compassionate, good and skilled physician, making its relevance to person-centered medicine self-evident. Conclusion: Medical identity should be analyzed with reference to literature, philosophy and medical practice in order for the physician to exercise a reflective position...

  15. Identity paradoxes

    Directory of Open Access Journals (Sweden)

    Đurić Jelena

    2010-01-01

    Full Text Available The article considers paradoxical nature of identity that emerges from: 1 the very concept of identity whose abstract generality unites various and even opposite features; 2 the processual nature of reality that is easier to express in the poetical metaphors or abstract principles than in unambiguous conceptual networks; 3 the oppose relationship between being and knowledge, mind and matter, subject and object, self and personality. Entangled in the labyrinth which evade efforts to be conceptually defined, the modern thinking of identity moves towards abandoning the idea of “self” on behalf of the “ego” and towards the misapprehension of identity as being identical. This corresponds to the “time of the lost spirit” stretched between the simultaneous need to find an identity and to give it up.

  16. Identity Management

    Data.gov (United States)

    Social Security Administration — Provides information for identity management services on the creation, modification and eventual deletion of accounts and entitlements based on user relationships on...

  17. Identity Assemblages

    DEFF Research Database (Denmark)

    Horn, Line Helverskov

    The study aims at exploring how identity is enacted within the context of a two-year programme in Service, Hospitality, and Tourism Management (SHTM). This research thus investigates how students and educators go about their daily lives in different educational contexts both on and off campus...... as a contribution to the body of literature of ANT-based studies. Second, it contributes to existing identity theories by exemplifying a socio-material approach to identity issues. Third, the study enables reflections upon how educational institutions as fundamentally identity-producing organisations acknowledge...

  18. Civil Identity

    DEFF Research Database (Denmark)

    Petersen, Lars Axel

    In this paper I will go through a catalogue of examples of contexts in which the term civil identity is currently used, ranging from the formal and technical process of linking a set of administrative and other events to an individual biological person by means of identity cards, fingerprints, iris...... of Israel to Luce Irigaray's Feminist agenda of elaborating gender specific civil identities. My intention is to investigate whether these different employments of 'civil identity' point towards a common, and fairly well defined object field asking questions of contemporary relevance to the philosophy...

  19. To share and be shared

    DEFF Research Database (Denmark)

    Winther, Ida Wentzel

    2018-01-01

    to another. To a certain degree, they share their everyday lives, things, places, memories, and past/future, but as the ones who move back and forth, they belong a little less in each place. This article is about children who are shared between their parent, households and siblings. They are shared...

  20. Bridging Identities

    Science.gov (United States)

    Deaux, Kay; Burke, Peter

    2010-01-01

    Sociology and psychology are no strangers in the theoretical world of self and identity. Early works by William James (1890), a psychologist, and George Herbert Mead (1934), a sociologist, are often taken as a starting point by investigators in both fields. In more recent years, with the development of a number of identity theories in both fields,…

  1. Brand Identity.

    Science.gov (United States)

    Lawlor, John

    1998-01-01

    Instead of differentiating themselves by building "brand identities," colleges and universities often focus on competing with price. As a result, fewer and fewer institutions base their identities on value, the combination of quality and price. Methods of building two concepts to influence customers' brand image and brand loyalty are…

  2. Ritual Identity

    NARCIS (Netherlands)

    van der Beek, Suzanne

    2017-01-01

    Rituals are often used as opportunities for self-reflection and identity construction. The Camino to Santiago de Compostela, which has become a singularly popular pilgrimage since the late 1980s, is an example of a ritual that is explicitly used to gain a deeper understanding of one’s identity

  3. Organizational Identity

    DEFF Research Database (Denmark)

    Hatch, Mary Jo; Schultz, Majken

    This text presents the classic works on organizational identity alongside more current thinking on the issues. Ranging from theoretical contributions to empirical studies, the readings in this volume address the key issues of organizational identity, and show how these issues have developed through...

  4. Challenging Identities

    DEFF Research Database (Denmark)

    Identity is a keyword in a number of academic fields as well as in public debate and in politics. During the last decades, references to identity have proliferated, yet there is no simple definition available that corresponds to the use of the notion in all contexts. The significance of the notion...

  5. Fashioning Identity

    DEFF Research Database (Denmark)

    Mackinney-Valentin, Maria

    We dress to communicate who we are, or who we would like others to think we are, telling seductive fashion narratives through our adornment. Yet, today, fashion has been democratized through high-low collaborations, social media and real-time fashion mediation, complicating the basic dynamic...... of identity displays, and creating tension between personal statements and social performances. Fashioning Identity explores how this tension is performed through fashion production and consumption,by examining a diverse series of case studies - from ninety-year old fashion icons to the paradoxical rebellion...... by readdressing Fred Davis' seminal concept of 'identity ambivalence' in Fashion, Culture and Identity (1992), Mackinney-Valentin argues that we are in an epoch of 'status ambivalence', in which fashioning one's own identity has become increasingly complicated....

  6. Sharing City

    DEFF Research Database (Denmark)

    This magazine offers an insight into the growing commercial innovation, civic movements, and political narratives surrounding sharing economy services, solutions and organisational types. It presents a cross-section of the manifold sharing economy services and solutions that can be found in Denmark....... Moreover, 15 thought leading experts - professionals and academic - have been invited to give their perspective on sharing economy for cities. This magazine touches upon aspects of the sharing economy as mobility, communities, sustainability, business development, mobility, and urban-rural relation....

  7. Digital music and subculture: Sharing files, sharing styles

    OpenAIRE

    Ebare, Sean

    2004-01-01

    In this paper I propose a new approach for the study of online music sharing communities, drawing from popular music studies and cyberethnography. I describe how issues familiar to popular music scholars — identity and difference, subculture and genre hybridity, and the political economy of technology and music production and consumption — find homologues in the dynamics of online communication, centering around issues of anonymity and trust, identity experimentation, and online communication...

  8. File sharing

    NARCIS (Netherlands)

    van Eijk, N.

    2011-01-01

    ‘File sharing’ has become generally accepted on the Internet. Users share files for downloading music, films, games, software etc. In this note, we have a closer look at the definition of file sharing, the legal and policy-based context as well as enforcement issues. The economic and cultural

  9. Identity Management

    CERN Document Server

    Pace, A

    2008-01-01

    This paper introduces identity management concepts and discusses various issues associated with its implementation. It will try to highlight technical, legal, and social aspects that must been foreseen when defining the numerous processes that an identity management infrastructure must support. Grid interoperability as well as cross platform interoperability is addressed on the technical aspect, followed by a short discussion on social consequences on user’s privacy when completed traceability is enforced and some examples on how identity management has been implemented at CERN

  10. Identity management

    Energy Technology Data Exchange (ETDEWEB)

    Pace, A [CERN, Geneva (Switzerland)

    2008-07-01

    This paper introduces identity management concepts and discusses various issues associated with their implementation. It will try to highlight technical, legal, and social aspects that must been foreseen when defining the numerous processes that an identity management infrastructure must support. Grid interoperability as well as cross platform interoperability is addressed on the technical aspect, followed by a short discussion on social consequences on user's privacy when completed traceability is enforced. The paper will finally give some examples on how identity management has been implemented at CERN.

  11. Identity management

    International Nuclear Information System (INIS)

    Pace, A

    2008-01-01

    This paper introduces identity management concepts and discusses various issues associated with their implementation. It will try to highlight technical, legal, and social aspects that must been foreseen when defining the numerous processes that an identity management infrastructure must support. Grid interoperability as well as cross platform interoperability is addressed on the technical aspect, followed by a short discussion on social consequences on user's privacy when completed traceability is enforced. The paper will finally give some examples on how identity management has been implemented at CERN

  12. Electronic identity

    CERN Document Server

    de Andrade, Norberto Nuno Gomes; Argles, David

    2014-01-01

    With the increasing availability of electronic services, security and a reliable means by which identity is verified is essential.Written by Norberto Andrade the first chapter of this book provides an overview of the main legal and regulatory aspects regarding electronic identity in Europe and assesses the importance of electronic identity for administration (public), business (private) and, above all, citizens. It also highlights the role of eID as a key enabler of the economy.In the second chapter Lisha Chen-Wilson, David Argles, Michele Schiano di Zenise and Gary Wills discuss the user-cent

  13. Shared leadership

    DEFF Research Database (Denmark)

    Ulhøi, John Parm; Müller, Sabine

    2012-01-01

    The aim of this paper is twofold. First, this paper comprehensively will review the conceptual and empirical literature to identify such critical underlying mechanisms which enable shared or collective leadership. Second, this article identifies the antecedents and outcomes of shared leadership...... according to the literature review to develop a re-conceptualised and synthesized framework for managing the organizational issues associated with shared leadership on various organizational levels. The paper rectifies this by identifying the critical factors and mechanisms which enable shared leadership...... and its antecedents and outcomes, and to develop a re-conceptualized and synthesized framework of shared leadership. The paper closes with a brief discussion of avenues for future research and implications for managers....

  14. Spacing Identity

    DEFF Research Database (Denmark)

    Stang Våland, Marianne; Georg, Susse

    2018-01-01

    In this paper, we analyze how architectural design, and the spatial and material changes this involves, contributes to the continuous shaping of identities in an organization. Based upon a case study of organizational and architectural change in a municipal administration at a time of major public...... sector reforms, we examine how design interventions were used to (re)form work and professional relationships. The paper examines how engagements with spatial arrangements and material artifacts affected people’s sense of both occupational and organizational identity. Taking a relational approach...... to sociomateriality, the paper contributes to the further theorizing of space in organization studies by proposing the concept of spacing identity to capture the fluidity of identity performance....

  15. Identity, identity politics, and neoliberalism

    Directory of Open Access Journals (Sweden)

    Wrenn Mary

    2014-01-01

    Full Text Available With the intensification of neoliberalism, it is useful to examine how some individuals might cope with the irrationality of the system. Neoliberalism cloaks the execution of the corporate agenda behind rhetorical manipulation that advocates for limited government. The corollary absence of government involvement on behalf of the citizenry writ large disarms the means of social redress for the individual. Democracy funded and fueled by corporate power thereby disenfranchises the individual, provoking some to search for empowerment through identity politics. The argument set forth suggests that individuals construct, reinforce, or escalate allegiance to identities as a coping mechanism, some of which manifest in violent identity politics.

  16. Knowledge Sharing

    DEFF Research Database (Denmark)

    Holdt Christensen, Peter

    The concept of knowledge management has, indeed, become a buzzword that every single organization is expected to practice and live by. Knowledge management is about managing the organization's knowledge for the common good of the organization -but practicing knowledge management is not as simple...... as that. This article focuses on knowledge sharing as the process seeking to reduce the resources spent on reinventing the wheel.The article introduces the concept of time sensitiveness; i.e. that knowledge is either urgently needed, or not that urgently needed. Furthermore, knowledge sharing...... is considered as either a push or pull system. Four strategies for sharing knowledge - help, post-it, manuals and meeting, and advice are introduced. Each strategy requires different channels for sharing knowledge. An empirical analysis in a production facility highlights how the strategies can be practiced....

  17. Ethnic Identity, Bicultural Identity Integration, and Psychological Well-Being among Transracial Adoptees: A Longitudinal Study

    Science.gov (United States)

    Ferrari, Laura; Rosnati, Rosa; Manzi, Claudia; Benet-Martínez, Verònica

    2015-01-01

    The ethnic identity development plays a crucial role in adolescence and emerging adulthood and may be more complex for adoptees who do not share their ethnic identity with their adoptive families. Evidence from the studies was mixed, with strong ethnic identity not always found to be indicative of improved psychological adjustment. Recently…

  18. The challenge of plural identity

    Directory of Open Access Journals (Sweden)

    Jovanović Bojan

    2005-01-01

    Full Text Available The complexity of collective existence is expressed through an awareness of its real identity, which then entails an appropriate attitude towards its own negativity. Within the hierarchically structured identity, different levels of its generality make it possible to consider them as factors of a plural reality. If negativity is raised to consciousness, then its dark side is dismantled. Thus, instead of being a factor of conflict, negativity becomes an element of complementariness and a factor in the construction of a shared identity at a higher level of generality.

  19. Sharing Death

    DEFF Research Database (Denmark)

    Sandvik, Kjetil; Refslund Christensen, Dorthe

    Web 2.0 marks a social turn in digitally mediated communication and culture, placing the media user in the role as co-producer, innovator and participant.  The term covers a variety of interactive systems which facilitates the continuous storytelling process of constructing identity; systems allo...

  20. Identity Activities

    Science.gov (United States)

    2016-08-03

    in reaction to their environment. They reflect an individual’s internal or external, conscious or subconscious , overt or covert, voluntary or...identity activities under a range of legal authorities, policy constraints, transnational threats, regional concerns and biases , and most likely...Biography. A baseline and descriptive analytic product that supports the development of the behavioral influences analysis ( BIA ) individual behavioral

  1. [Identity theft

    CERN Multimedia

    Wolinksy, H

    2003-01-01

    "A new survey by the Federal Trade Commission indicates that over the last five years one in four American households has been hit by identity theft, which can result in thieves tapping their victims' credit cards or bank accounts" (1 page).

  2. Designer's Identity

    DEFF Research Database (Denmark)

    Kunrath, Kamila; Cash, Philip; Li-Ying, Jason

    2016-01-01

    A designer’s professional identity (DPI) develops through both education and professional experience, building on core personality traits and innate skills. In this paper a systematic literature review and a secondary narrative review were developed in order to map personal attributes and design...

  3. Challenging Identities

    DEFF Research Database (Denmark)

    depends on the conceptual or ideological constellation in which it takes part. This volume on one hand demonstrates the role of notions of identity in a variety of European contexts, and on the other hand highlights how there may be reasons to challenge the use of the term and corresponding social...

  4. Identity transformation

    DEFF Research Database (Denmark)

    Neergaard, Helle; Robinson, Sarah; Jones, Sally

    , as well as the resources they have when they come to the classroom. It also incorporates perspectives from (ii) transformational learning and explores the concept of (iii) nudging from a pedagogical viewpoint, proposing it as an important tool in entrepreneurship education. The study incorporates......This paper develops the concept of ‘pedagogical nudging’ and examines four interventions in an entrepreneurship classroom and the potential it has for student identity transformation. Pedagogical nudging is positioned as a tool, which in the hands of a reflective, professional......) assists students in straddling the divide between identities, the emotions and tensions this elicits, and (iv) transform student understanding. We extend nudging theory into a new territory. Pedagogical nudging techniques may be able to unlock doors and bring our students beyond the unacknowledged...

  5. Social interactions and the salience of social identity

    OpenAIRE

    McLeish, Kendra N.; Oxoby, Robert J.

    2008-01-01

    In this paper, we explore the effect of identity salience on behavior in a simple social interaction. Specifically, we compare behavior in a ultimatum game across three treatments: priming subjects with a shared identity, priming subjects with an identity distinct from those with whom they will interact, and priming subjects with no particular identity. We find that subjects are most cooperative in the identity-priming treatment and least cooperative in the distinctiveness-priming treatment. ...

  6. Mediating Identity

    DEFF Research Database (Denmark)

    Kjærgaard, Annemette Leonhardt; Morsing, Mette; Ravasi, Davide

    2011-01-01

    This paper reports a longitudinal field study on the effects of positive media coverage on the reconstruction of organizational identity. The study highlights how intense positive coverage – to the point of turning an organization into a ‘celebrity’– influences both the way members understand...... their organization (sensemaking effect) and the gratification they derive from its positive representation (self-enhancement effect). Our findings suggest that positive media representations foster members' alignment around an emergent new understanding of what their organization is. Over time, however, celebrity...

  7. Unravelling identities

    OpenAIRE

    2007-01-01

    Abstract The decision to go to war by the government of the day is assumed to be a decision taken on behalf of all citizens of the nation, conceived as a collective united by a harmony of interests. Yet in the case of the Iraq War, there is clearly no unified voice of support from the British people. There is division between the state and its citizens, and the latter also reflect the multilayered identities of an increasingly multicultural society. How do individuals displaying mu...

  8. Shared care and boundaries:

    DEFF Research Database (Denmark)

    Winthereik, Brit Ross

    2008-01-01

    Purpose – The paper seeks to examine how an online maternity record involving pregnant women worked as a means to create shared maternity care. Design/methodology/approach – Ethnographic techniques have been used. The paper adopts a theoretical/methodological framework based on science and techno......Purpose – The paper seeks to examine how an online maternity record involving pregnant women worked as a means to create shared maternity care. Design/methodology/approach – Ethnographic techniques have been used. The paper adopts a theoretical/methodological framework based on science...... and technology studies. Findings – The paper shows how a version of “the responsible patient” emerges from the project which is different from the version envisioned by the project organisation. The emerging one is concerned with the boundary between primary and secondary sector care, and not with the boundary......, IT designers and project managers should attend to the specific ways in which boundaries are inevitably enacted and to the ways in which care is already shared. This will provide them with opportunities to use the potentials of new identities and concerns that emerge from changing the organisation...

  9. Collective Identity Formation in Hybrid Organizations

    DEFF Research Database (Denmark)

    Boulongne, Romain; Boxenbaum, Eva

    The present article examines the process of collective identity formation in the context of hybrid organizing. Empirically, we investigate hybrid organizing in a collaborative structure at the interface of two heterogeneous organizations in the domain of new renewable energies. We draw...... on the literature on knowledge sharing across organizational boundaries, particularly the notions of transfer, translation and transformation, to examine in real time how knowledge sharing in a hybrid setting contributes (or not) to the emergence of a new collective identity at the interface of two heterogeneous...... organizations. Our findings point to two factors that limit knowledge sharing and hence to new collective identity formation in a hybrid space: 1) ambiguous or multiple organizational roles and 2) strong identities of the collaborating organizations. These findings contribute to illuminating the initial...

  10. Performing identities on a Dutch river dike: national identity and diverging lifestyles

    NARCIS (Netherlands)

    Terlouw, K.

    2013-01-01

    The creation of a national identity shared by the whole population becomes increasingly difficult in individualizing and globalizing national societies. The national population fragments into many lifestyle groups with very different social and cultural orientations. The enactment of these different

  11. Sharing knowledge

    Energy Technology Data Exchange (ETDEWEB)

    2009-07-01

    The workshop on Climate Change Impacts and Adaptation Strategies for Arctic Indigenous Communities is one stage in developing positions and providing input from the perspectives of Arctic Peoples in preparation for the Indigenous Peoples' Global Summit on Climate Change that will take place in April, 2009, in Anchorage, Alaska. The Summit, organized by the Inuit Circumpolar Council with oversight of an International Steering Committee, will bring together hundreds of indigenous Peoples around the world. This Workshop intended to bring together Arctic Indigenous Peoples to deliver and to share information, academic research, case studies based on traditional knowledge and researchers knowledgeable in traditional knowledge and/or policy issues drawn from traditional knowledge. The following themes were discussed: 1) Traditional knowledge research and education; 2) Laws and lawmaking; 3) Food and health; 4) Organisation; 5) Communications and advocacy. (ln)

  12. Federated Identity Management

    OpenAIRE

    Chadwick, David W.

    2009-01-01

    Abstract. This paper addresses the topic of federated identity management. It discusses in detail the following topics: what is digital identity, what is identity management, what is federated identity management, Kim Camerons 7 Laws of Identity, how can we protect the users privacy in a federated environment, levels of assurance, some past and present federated identity management systems, and some current research in FIM.

  13. A User-Centric System for Verified Identities on the Bitcoin Blockchain

    OpenAIRE

    Augot, Daniel; Chabanne, Hervé; Chenevier, Thomas; George, William; Lamber, Laurent

    2017-01-01

    International audience; We present an identity management scheme built into the Bitcoin blockchain, allowing for identities that are as indelible as the blockchain itself. Moreover, we take advantage of Bitcoin's decentralized nature to facilitate a shared control between users and identity providers, allowing users to directly manage their own identities, fluidly coordinating identities from different providers, even as identity providers can revoke identities and impose controls.

  14. Identical and shifted identical bands

    International Nuclear Information System (INIS)

    Dodder, R.S; Jones, E.F.; Hamilton, J.H.

    1997-01-01

    Spontaneous fission of 252 Cm was studied with 72 large Compton suppressed Ge detectors in Gamma sphere. New isotopes 160 Sm and 162 Gd were identified. Through X-ray-γ and γ-γ-γ) coincidence measurements, level energies were established to spins 14 + to 20 + in 152 , 154 156 60 Nd 92 94 96 , 156 , 158 , 160 62 Sm 94 , 96 , 98 , and 160 , 162 64 Gd 96 , 98 . These nuclei exhibit a remarkable variety of identical bands and bands where the energies and moments of inertia are shifted by the same constant amount for every spin state from 2 + to 12 + for various combinations of nuclei differing by 2n, 4n, 2p, 4p, and α

  15. Context-Aware Identity Delegation

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.

    2009-01-01

    In emerging ubiquitous computing, related nomadic users often perform similar tasks and share the same computing infrastructure.This means that security of the shared resources is of prime importance.Frequent delegation of tasks among users must be anticipated as most nomadic environments...... are hectic and very dynamic. A delegation mechanism with a slightly complicated user interface will not only reduce the productivity but also provide nomadic users with a strong motivation to circumvent the mechanism itself. Delegation in access control domain is not practical for the most of nomadic users...... due to its complicated and complex structure. Identity delegation at authentication level provides improved usability, which reduces the risk of circumventing the delegation mechanism; at the same time, however, identity delegation violates the principle of least privileges. We use contextual...

  16. Digital music and subculture: Sharing files, sharing styles (originally published in February 2004)

    OpenAIRE

    Ebare, Sean

    2005-01-01

    Digital music and subculture: Sharing files, sharing styles by Sean Ebare In this paper I propose a new approach for the study of online music sharing communities, drawing from popular music studies and cyberethnography. I describe how issues familiar to popular music scholars — identity and difference, subculture and genre hybridity, and the political economy of technology and music production and consumption — find homologues in the dynamics of online communication, centering around iss...

  17. Shared decision making

    Science.gov (United States)

    ... page: //medlineplus.gov/ency/patientinstructions/000877.htm Shared decision making To use the sharing features on this page, ... treatment you both support. When to use Shared Decision Making Shared decision making is often used when you ...

  18. The political reference point: How geography shapes political identity

    Science.gov (United States)

    Feinberg, Matthew; Tullett, Alexa M.; Mensch, Zachary; Hart, William; Gottlieb, Sara

    2017-01-01

    It is commonly assumed that how individuals identify on the political spectrum–whether liberal, conservative, or moderate–has a universal meaning when it comes to policy stances and voting behavior. But, does political identity mean the same thing from place to place? Using data collected from across the U.S. we find that even when people share the same political identity, those in “bluer” locations are more likely to support left-leaning policies and vote for Democratic candidates than those in “redder” locations. Because the meaning of political identity is inconsistent across locations, individuals who share the same political identity sometimes espouse opposing policy stances. Meanwhile, those with opposing identities sometimes endorse identical policy stances. Such findings suggest that researchers, campaigners, and pollsters must use caution when extrapolating policy preferences and voting behavior from political identity, and that animosity toward the other end of the political spectrum is sometimes misplaced. PMID:28207906

  19. The political reference point: How geography shapes political identity.

    Science.gov (United States)

    Feinberg, Matthew; Tullett, Alexa M; Mensch, Zachary; Hart, William; Gottlieb, Sara

    2017-01-01

    It is commonly assumed that how individuals identify on the political spectrum-whether liberal, conservative, or moderate-has a universal meaning when it comes to policy stances and voting behavior. But, does political identity mean the same thing from place to place? Using data collected from across the U.S. we find that even when people share the same political identity, those in "bluer" locations are more likely to support left-leaning policies and vote for Democratic candidates than those in "redder" locations. Because the meaning of political identity is inconsistent across locations, individuals who share the same political identity sometimes espouse opposing policy stances. Meanwhile, those with opposing identities sometimes endorse identical policy stances. Such findings suggest that researchers, campaigners, and pollsters must use caution when extrapolating policy preferences and voting behavior from political identity, and that animosity toward the other end of the political spectrum is sometimes misplaced.

  20. The political reference point: How geography shapes political identity.

    Directory of Open Access Journals (Sweden)

    Matthew Feinberg

    Full Text Available It is commonly assumed that how individuals identify on the political spectrum-whether liberal, conservative, or moderate-has a universal meaning when it comes to policy stances and voting behavior. But, does political identity mean the same thing from place to place? Using data collected from across the U.S. we find that even when people share the same political identity, those in "bluer" locations are more likely to support left-leaning policies and vote for Democratic candidates than those in "redder" locations. Because the meaning of political identity is inconsistent across locations, individuals who share the same political identity sometimes espouse opposing policy stances. Meanwhile, those with opposing identities sometimes endorse identical policy stances. Such findings suggest that researchers, campaigners, and pollsters must use caution when extrapolating policy preferences and voting behavior from political identity, and that animosity toward the other end of the political spectrum is sometimes misplaced.

  1. Competition and Social Identity in the Workplace

    DEFF Research Database (Denmark)

    Kato, Takao; Shu, Pian

    2016-01-01

    We study the impact of social identity on worker competition by exploiting the well-documented social divide between urban resident workers and rural migrant workers in urban Chinese firms. We analyze data on weekly output, individual characteristics, and coworker composition for all weavers...... in an urban Chinese textile firm during a 53-week period. The firm adopts relative performance incentives in addition to piece rates to encourage competition in the workplace. We find that social identity has a significant impact on competition: a weaver only competes against coworkers with a different social...... identity, but not against those sharing her own identity. The results are mainly driven by urban weavers competing aggressively against rural coworkers. Our results highlight the important role of social identity in mitigating or enhancing competition....

  2. Solidarity through shared disadvantage: Highlighting shared experiences of discrimination improves relations between stigmatized groups.

    Science.gov (United States)

    Cortland, Clarissa I; Craig, Maureen A; Shapiro, Jenessa R; Richeson, Jennifer A; Neel, Rebecca; Goldstein, Noah J

    2017-10-01

    Intergroup relations research has largely focused on relations between members of dominant groups and members of disadvantaged groups. The small body of work examining intraminority intergroup relations, or relations between members of different disadvantaged groups, reveals that salient experiences of ingroup discrimination promote positive relations between groups that share a dimension of identity (e.g., 2 different racial minority groups) and negative relations between groups that do not share a dimension of identity (e.g., a racial minority group and a sexual minority group). In the present work, we propose that shared experiences of discrimination between groups that do not share an identity dimension can be used as a lever to facilitate positive intraminority intergroup relations. Five experiments examining relations among 4 different disadvantaged groups supported this hypothesis. Both blatant (Experiments 1 and 3) and subtle (Experiments 2, 3, and 4) connections to shared experiences of discrimination, or inducing a similarity-seeking mindset in the context of discrimination faced by one's ingroup (Experiment 5), increased support for policies benefiting the outgroup (Experiments 1, 2, and 4) and reduced intergroup bias (Experiments 3, 4, and 5). Taken together, these experiments provide converging evidence that highlighting shared experiences of discrimination can improve intergroup outcomes between stigmatized groups across dimensions of social identity. Implications of these findings for intraminority intergroup relations are discussed. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  3. Identity after Death

    DEFF Research Database (Denmark)

    Gerstrøm, Anna

    2015-01-01

    Purpose: The purpose of this paper is to explore how legacy organizational identity and death relate to each other and, thereby, contribute to closing the gap in knowledge on organizational identity constructions in times of death. Design/methodology/approach: The paper opted for an exploratory....../value: This paper addresses an apparent gap in the literature on identity and death; exploring identity narratives in a bankrupted bank, the paper considers constructions of legacy organizational identities in times of disruptive death....

  4. Asian American Adolescent Identity

    OpenAIRE

    Ohm, Julie Juhye

    1999-01-01

    The formation of ego identity in Asian American late adolescents attending Virginia Tech was examined within the frameworks of Erikson's psychosocial theory and Berry, Trimble, and Olmedo's model of acculturation. Ego identity was measured using the Achieved sub-scale of the Revised Version of the Extended Objective Measure of Ego Identity Status, an instrument based on the theoretical constructs of Erikson. Ethnic identity was measured using the Multigroup Ethnic Identity Measure and America...

  5. Our Shared Future: Social Media, Leadership, Vulnerability, and Digital Identity

    Science.gov (United States)

    Stoller, Eric

    2013-01-01

    Social media have challenged us in our journey to support our students. Administrators have entered into new web-based conversations with one another and with their students. Personal branding has created a sense of performativity that conflicts with a growing trend towards online vulnerability. Our leaders have increasingly been engaged in…

  6. A teacher's identity trajectory within a context of change

    African Journals Online (AJOL)

    Hennie

    change in South Africa on a teacher's identity trajectory. The data was generated ... Iris was articulate, a strong voice in the school, eager to share her experiences and .... (Perold et al., 2012). Comparative international studies, such as the.

  7. Shaping student identity and creating entrepreneurs:

    DEFF Research Database (Denmark)

    Robinson, Sarah; Shumar, Wesley; Neergaard, Helle

    by doing.” As students engage with hands-on learning experiences they build, not only different ways of seeing problems and understanding opportunity but, new identities as well. According to Bruner (1996), all learning is a process of intersubjective meaning making. It is social, communicative and shared...

  8. Identity Work and Emotions

    DEFF Research Database (Denmark)

    Winkler, Ingo

    2018-01-01

    This paper reviews the empirical literature on identity work and identifies two distinct approaches to incorporating emotion. The majority of empirical studies use emotion to describe the experiences of identity work. In doing so, the authors (a) mention the emotions that people feel in situations...... that trigger identity work, (b) illustrate identity work as an emotional endeavour, and (c) describe the emotional impact of successful and unsuccessful identity work. There is also an emerging literature that examines the mutual constitution of emotions and identity work. These authors address emotional...... labour, affective social identification, emotional attachment and detachment, and humour when studying identity work. This paper suggests that, to understand better the relation between emotions and identity work, future research should examine the role of emotions in problematizing identity...

  9. Identity and identity conflict in the workplace

    NARCIS (Netherlands)

    K.E. Horton (Kate); P.S. Bayerl (Saskia); G. Belschak-Jacobs (Gabriele)

    2014-01-01

    textabstractAs individuals, we define ourselves according to various characteristics that include our values and beliefs. This gives us our identity. As organisations become increasingly complex, understanding the concept of identity conflict may mean the difference between success and failure.

  10. Anonymity versus privacy: selective information sharing in online cancer communities.

    Science.gov (United States)

    Frost, Jeana; Vermeulen, Ivar E; Beekers, Nienke

    2014-05-14

    Active sharing in online cancer communities benefits patients. However, many patients refrain from sharing health information online due to privacy concerns. Existing research on privacy emphasizes data security and confidentiality, largely focusing on electronic medical records. Patient preferences around information sharing in online communities remain poorly understood. Consistent with the privacy calculus perspective adopted from e-commerce research, we suggest that patients approach online information sharing instrumentally, weighing privacy costs against participation benefits when deciding whether to share certain information. Consequently, we argue that patients prefer sharing clinical information over daily life and identity information that potentially compromises anonymity. Furthermore, we explore whether patients' prior experiences, age, health, and gender affect perceived privacy costs and thus willingness to share information. The goal of the present study is to document patient preferences for sharing information within online health platforms. A total of 115 cancer patients reported sharing intentions for 15 different types of information, demographics, health status, prior privacy experiences, expected community utility, and privacy concerns. Factor analysis on the 15 information types revealed 3 factors coinciding with 3 proposed information categories: clinical, daily life, and identity information. A within-subject ANOVA showed a strong preference for sharing clinical information compared to daily life and identity information (F1,114=135.59, P=.001, η(2)=.93). Also, adverse online privacy experiences, age, and health status negatively affected information-sharing intentions. Female patients shared information less willingly. Respondents' information-sharing intentions depend on dispositional and situational factors. Patients share medical details more willingly than daily life or identity information. The results suggest the need to focus on

  11. Anonymity Versus Privacy: Selective Information Sharing in Online Cancer Communities

    Science.gov (United States)

    Vermeulen, Ivar E; Beekers, Nienke

    2014-01-01

    Background Active sharing in online cancer communities benefits patients. However, many patients refrain from sharing health information online due to privacy concerns. Existing research on privacy emphasizes data security and confidentiality, largely focusing on electronic medical records. Patient preferences around information sharing in online communities remain poorly understood. Consistent with the privacy calculus perspective adopted from e-commerce research, we suggest that patients approach online information sharing instrumentally, weighing privacy costs against participation benefits when deciding whether to share certain information. Consequently, we argue that patients prefer sharing clinical information over daily life and identity information that potentially compromises anonymity. Furthermore, we explore whether patients’ prior experiences, age, health, and gender affect perceived privacy costs and thus willingness to share information. Objective The goal of the present study is to document patient preferences for sharing information within online health platforms. Methods A total of 115 cancer patients reported sharing intentions for 15 different types of information, demographics, health status, prior privacy experiences, expected community utility, and privacy concerns. Results Factor analysis on the 15 information types revealed 3 factors coinciding with 3 proposed information categories: clinical, daily life, and identity information. A within-subject ANOVA showed a strong preference for sharing clinical information compared to daily life and identity information (F 1,114=135.59, P=.001, η2=.93). Also, adverse online privacy experiences, age, and health status negatively affected information-sharing intentions. Female patients shared information less willingly. Conclusions Respondents’ information-sharing intentions depend on dispositional and situational factors. Patients share medical details more willingly than daily life or identity

  12. On Fay identity

    International Nuclear Information System (INIS)

    Michev, Iordan P.

    2006-01-01

    In the first part of this paper we consider the transformation of the cubic identities for general Korteweg-de Vries (KdV) tau functions from [Mishev, J. Math. Phys. 40, 2419-2428 (1999)] to the specific identities for trigonometric KdV tau functions. Afterwards, we consider the Fay identity as a functional equation and provide a wide set of solutions of this equation. The main result of this paper is Theorem 3.4, where we generalize the identities from Mishev. An open problem is the transformation of the cubic identities from Mishev to the specific identities for elliptic KdV tau functions

  13. Identities as organizational practices

    DEFF Research Database (Denmark)

    Oshima, Sae; Asmuß, Birte

    Identity has been widely acknowledged as playing a central role in various organizational processes, yet there is still a need to better understand the dynamics and functions of identity work in modern organizations. The present paper is centered within this concern, and examines identity......) reveal the intersubjective, multimodal and embodied nature of identity work; 2) demonstrate identity work as organizational practices, used in order to accomplish specific actions; and 3) pose a question on the view on identity as a layered/leveled phenomenon....

  14. To share or not to share? Expected pros and cons of data sharing in radiological research.

    Science.gov (United States)

    Sardanelli, Francesco; Alì, Marco; Hunink, Myriam G; Houssami, Nehmat; Sconfienza, Luca M; Di Leo, Giovanni

    2018-06-01

    The aims of this paper are to illustrate the trend towards data sharing, i.e. the regulated availability of the original patient-level data obtained during a study, and to discuss the expected advantages (pros) and disadvantages (cons) of data sharing in radiological research. Expected pros include the potential for verification of original results with alternative or supplementary analyses (including estimation of reproducibility), advancement of knowledge by providing new results by testing new hypotheses (not explored by the original authors) on pre-existing databases, larger scale analyses based on individual-patient data, enhanced multidisciplinary cooperation, reduced publication of false studies, improved clinical practice, and reduced cost and time for clinical research. Expected cons are outlined as the risk that the original authors could not exploit the entire potential of the data they obtained, possible failures in patients' privacy protection, technical barriers such as the lack of standard formats, and possible data misinterpretation. Finally, open issues regarding data ownership, the role of individual patients, advocacy groups and funding institutions in decision making about sharing of data and images are discussed. • Regulated availability of patient-level data of published clinical studies (data-sharing) is expected. • Expected benefits include verification/advancement of knowledge, reduced cost/time of research, clinical improvement. • Potential drawbacks include faults in patients' identity protection and data misinterpretation.

  15. The Supermalt identity

    DEFF Research Database (Denmark)

    Bech-Larsen, Tino; Esbjerg, Lars; Grunert, Klaus G.

    2007-01-01

    on consumers' self-identities. The second part explored the role of food and beverage products in the construction of self-identities. The final part focused on the construction of brand identity for Supermalt. Findings - The article provides information on the self-identities constructed by Afro......-Caribbean informants. The food and beverage consumption of informants reflects their mixed cultural identity. The brand identity Supermalt appears to be malleable, with ample room for consumer co-construction. Perceptions of brand identity differ markedly among informants, who are all able to construct Supermalt......Purpose - The objective of this article is to conduct a case study of the Supermalt brand of malt beer, which has become the preferred beverage of Afro-Caribbean consumers in Brixton on a very limited marketing budget. Design/methodology/approach - The article uses the concepts of personal identity...

  16. Researching Identity and Interculturality

    DEFF Research Database (Denmark)

    Lønsmann, Dorte

    2016-01-01

    Review of: Researching Identity and Interculturality / by F. Dervin and K. Risager (eds.). Routledge 2015, 245 pp.......Review of: Researching Identity and Interculturality / by F. Dervin and K. Risager (eds.). Routledge 2015, 245 pp....

  17. Understanding Identity and Organizations

    DEFF Research Database (Denmark)

    Christensen, Lars Thøger

    2013-01-01

    The article reviews the book "Understanding Identity and Organizations," by Kate Kenny, Andrea Whitle, and Hugh Wilmott.......The article reviews the book "Understanding Identity and Organizations," by Kate Kenny, Andrea Whitle, and Hugh Wilmott....

  18. Components of Sexual Identity

    Science.gov (United States)

    Shively, Michael G.; DeCecco, John P.

    1977-01-01

    This paper examines the four components of sexual identity: biological sex, gender identity, social sex-role, and sexual orientation. Theories about the development of each component and how they combine and conflict to form the individual's sexual identity are discussed. (Author)

  19. Mobile Identity Management

    NARCIS (Netherlands)

    Hoepman, J.J.

    2011-01-01

    Identity management consists of the processes and all underlying technologies for the creation, management, and usage of digital identities. Business rely on identity management systems to simplify the management of access rights to their systems and services for both their employees and their

  20. Being Tolerant about Identity?

    NARCIS (Netherlands)

    van Rooij, R.; Gutzmann, D.; Köpping, J.; Meier, C.

    2014-01-01

    Identity and identification are very important concepts in philosophy and logic. They are crucial for the analysis of quantification and for counting. According to some philosophers, many examples that are supposed to show that identity is contingent, in fact show that the notion of identity is

  1. Leadership: social identity and guiding from within.

    Science.gov (United States)

    Kerfoot, Karlene M

    2007-01-01

    An important field in leadership research is that of the social identity of the group and what that means for leadership. In health care, there are many different types of social identities that vary by hospital, geography, and profession. Leaders often sabotage their effectiveness when they do not consider the social values of the group. The work of leaders is to help move units and organizations to a higher level of performance. Identifying the social identity of the group is the first step. The most successful have expertise in assessing the social identity of groups and developing a commonality of a shared vision that represents the best work of the group and of the leader.

  2. Identity vicissitudes in work organizations

    Directory of Open Access Journals (Sweden)

    Giovanni Di Stefano

    2014-09-01

    Full Text Available Today’s pressing scientific and technological changes, while having an impact on the organizational life of our post-industrial world, are producing drastic transformations within organizations, creating in workers new feelings of anxiety and uncertainty. The features of the present state of crises - instability, uncertainty, weakening of family bonds – define a peculiar social and psychological uneasiness, proper of our time, as a consequence of the technological business culture prevailing today, which is destabilizing the institutional role of organizations, namely fixing the various forms of personal identity. This contribution offers, also by presenting a training experience in a business setting, a critical psycho-socio-analysis of the roles that individuals and organizations must presently face to foster development and, at the same time, provides directions to avoid the perverse drift of today’s culture and promote the identity process through the reactivation of the learning/changing capacity aimed at the definition of new shared meanings.Keywords: identity, organization, psycho-socio-analysis

  3. Identity vicissitudes in work organizations

    Directory of Open Access Journals (Sweden)

    Giovanni Di Stefano

    2014-10-01

    Full Text Available Today’s pressing scientific and technological changes, while having an impact on the organizational life of our post-industrial world, are producing drastic transformations within organizations, creating in workers new feelings of anxiety and uncertainty. The features of the present state of crises - instability, uncertainty, weakening of family bonds – define a peculiar social and psychological uneasiness, proper of our time, as a consequence of the technological business culture prevailing today, which is destabilizing the institutional role of organizations, namely fixing the various forms of personal identity. This contribution offers, also by presenting a training experience in a business setting, a critical psycho-socio-analysis of the roles that individuals and organizations must presently face to foster development and, at the same time, provides directions to avoid the perverse drift of today’s culture and promote the identity process through the reactivation of the learning/changing capacity aimed at the definition of new shared meanings.Keywords: Identity; Organization; Psycho-socio-analysis

  4. Identity and Professional Networking.

    Science.gov (United States)

    Raj, Medha; Fast, Nathanael J; Fisher, Oliver

    2017-06-01

    Despite evidence that large professional networks afford a host of financial and professional benefits, people vary in how motivated they are to build such networks. To help explain this variance, the present article moves beyond a rational self-interest account to examine the possibility that identity shapes individuals' intentions to network. Study 1 established a positive association between viewing professional networking as identity-congruent and the tendency to prioritize strengthening and expanding one's professional network. Study 2 revealed that manipulating the salience of the self affects networking intentions, but only among those high in networking identity-congruence. Study 3 further established causality by experimentally manipulating identity-congruence to increase networking intentions. Study 4 examined whether identity or self-interest is a better predictor of networking intentions, providing support for the former. These findings indicate that identity influences the networks people develop. Implications for research on the self, identity-based motivation, and professional networking are discussed.

  5. Matroids and quantum-secret-sharing schemes

    International Nuclear Information System (INIS)

    Sarvepalli, Pradeep; Raussendorf, Robert

    2010-01-01

    A secret-sharing scheme is a cryptographic protocol to distribute a secret state in an encoded form among a group of players such that only authorized subsets of the players can reconstruct the secret. Classically, efficient secret-sharing schemes have been shown to be induced by matroids. Furthermore, access structures of such schemes can be characterized by an excluded minor relation. No such relations are known for quantum secret-sharing schemes. In this paper we take the first steps toward a matroidal characterization of quantum-secret-sharing schemes. In addition to providing a new perspective on quantum-secret-sharing schemes, this characterization has important benefits. While previous work has shown how to construct quantum-secret-sharing schemes for general access structures, these schemes are not claimed to be efficient. In this context the present results prove to be useful; they enable us to construct efficient quantum-secret-sharing schemes for many general access structures. More precisely, we show that an identically self-dual matroid that is representable over a finite field induces a pure-state quantum-secret-sharing scheme with information rate 1.

  6. Contracting and Information Sharing Under Supply Chain Competition

    OpenAIRE

    Albert Y. Ha; Shilu Tong

    2008-01-01

    We investigate contracting and information sharing in two competing supply chains, each consisting of one manufacturer and one retailer. The two supply chains are identical, except they may have different investment costs for information sharing. The problem is studied using a two-stage game. In the first stage, the manufacturers decide whether to invest in information sharing. In the second stage, given the information structure created in the first stage, the manufacturers offer contracts t...

  7. Rethinking the Sharing Economy

    DEFF Research Database (Denmark)

    Kornberger, Martin; Leixnering, Stephan; Meyer, Renate

    2017-01-01

    Our paper focuses on a non-standard sharing example that harbors the potential to disrupt received wisdom on the sharing economy. While originally entering the field to analyze, broadly from a governance perspective, how the 2015 refugee crisis was handled in Vienna, Austria, we found that the no...... of sharing: economic and moral. Our paper contributes to this Special Issue of the Academy of Management Discoveries by highlighting and explaining the two-fold economic and moral nature of sharing and the organization of sharing between movement and platform....... sharing of resources (i.e., the economic dimension): the sharing of a distinct concern (i.e., the moral dimension of sharing). Our discovery exemplifies such a moral dimension that is rather different from the status quo materialistic treatments focusing on economic transactions and property rights...

  8. Job Sharing in Education.

    Science.gov (United States)

    Davidson, Wilma; Kline, Susan

    1979-01-01

    The author presents the advantages of job sharing for all school personnel, saying that education is particularly adaptable to this new form of employment. Current job sharing programs in Massachusetts, California, and New Jersey schools are briefly discussed. (SJL)

  9. Production sharing agreements

    International Nuclear Information System (INIS)

    1994-01-01

    This paper, which was presented at the Production Sharing Agreement seminar, discusses economic rent, negotiations, trends in fiscal system development, and concessionary systems. Production sharing contracts, risk service contracts, joint ventures and the global market are examined. (UK)

  10. Laughables as a resource for foregrounding shared knowledge and shared identities in intercultural interactions in Scandinavia

    DEFF Research Database (Denmark)

    Tranekjær, Louise

    2017-01-01

    have previously shown how laughables and laughter attend to a range of social functions such as affiliation (Glenn 2010), seeking intimacy and handling ‘troubles talk’ (Jefferson 1984;Jefferson et al. 1987). This paper focuses on the former of these functions and argues that laughables are a resource...

  11. Epistemic companions: shared reality development in close relationships.

    Science.gov (United States)

    Rossignac-Milon, Maya; Higgins, E Tory

    2018-01-11

    We propose a framework outlining the development of shared reality in close relationships. In this framework, we attempt to integrate disparate close relationship phenomena under the conceptual umbrella of shared reality. We argue that jointly satisfying epistemic needs-making sense of the world together-plays an important but under-appreciated role in establishing and maintaining close relationships. Specifically, we propose that dyads progress through four cumulative phases in which new forms of shared reality emerge. Relationships are often initiated when people discover Shared Feelings, which then facilitate the co-construction of dyad-specific Shared Practices. Partners then form an interdependent web of Shared Coordination and ultimately develop a Shared Identity. Each emergent form of shared reality continues to evolve throughout subsequent phases, and, if neglected, can engender relationship dissolution. Copyright © 2018 Elsevier Ltd. All rights reserved.

  12. Job Sharing in Geography.

    Science.gov (United States)

    Kay, Jeanne

    1982-01-01

    Job sharing is an employment alternative in which two qualified individuals manage the responsibilities of a single position. Discusses the barriers to and the potential, advantages, disadvantages, pitfalls, and challenges of job sharing. Focuses on job sharing in the geography profession. (Author/JN)

  13. The Sharing Economy

    OpenAIRE

    Reinhold, Stephan; Dolnicar, Sara

    2017-01-01

    Peer-to-peer accommodation networks in general, and Airbnb in specific, are frequently referred to as part of the sharing economy. This chapter provides an overview of key characteristics of the sharing economy, discusses how these characteristics relate to peer-to-peer accommodation, and positions peer-to-peer accommodation networks within the sharing economy.

  14. Satisfaction and 'comparison sharing'

    DEFF Research Database (Denmark)

    Amilon, Anna

    2009-01-01

    the probability of satisfaction. Results show that comparison sharing impacts satisfaction for women, and that those women who share more equally than their peers are more likely to be satisfied, whereas comparison sharing has no influence on satisfaction for men. Also, parents are less likely to be satisfied...

  15. Social Identity, Social Ties and Social Capital: A Study in Gaming Context

    Science.gov (United States)

    Jiang, Hao

    2012-01-01

    This work will focus on how different social relationships, namely shared identity and personal tie, will impact cooperative behavior, a form of social capital. I designed and conducted an economic game study to show that shared identity and personal ties work differently on cooperation among people and resource flow in social groups. Many factors…

  16. Hashtag (# as Message Identity in Virtual Community

    Directory of Open Access Journals (Sweden)

    Urip Mulyadi

    2018-02-01

    Full Text Available Computer Mediated Communication or CMC is able to present a virtual community, where the people inside have the same interest to share information related to events, activities, competitions, entertainment, history, event and others in Semarang City for publication. This research attempted to describe that hashtags can be utilized as the identity of a message in a communications network on Facebook Group MIK Semar. The results of this study are hashtags have changed how we build a virtual community, as the use of hashtags in Facebook Group MIK SEMAR as message identity to build better relationship and support communication among its members.

  17. Exploring medical identity theft.

    Science.gov (United States)

    Mancilla, Desla; Moczygemba, Jackie

    2009-09-16

    The crime of medical identity theft is a growing concern in healthcare institutions. A mixed-method study design including a two-stage electronic survey, telephone survey follow-up, and on-site observations was used to evaluate current practices in admitting and registration departments to reduce the occurrence of medical identity theft. Survey participants were chief compliance officers in acute healthcare organizations and members of the Health Care Compliance Association. Study results indicate variance in whether or how patient identity is confirmed in healthcare settings. The findings of this study suggest that information systems need to be designed for more efficient identity management. Admitting and registration staff must be trained, and compliance with medical identity theft policies and procedures must be monitored. Finally, biometric identity management solutions should be considered for stronger patient identification verification.

  18. Experiencing with Identity

    DEFF Research Database (Denmark)

    Pors, Justine Grønbæk

    2012-01-01

    This article studies how a political organization begins to experiment with its identity. By use of an empirical case of the Danish Ministry of Education, I examine how a political organization supplements its identity of a legislating power with identities of a supervisor, beacon and facilitator...... of evaluation in public schools. Out of a paralysis emerge new innovative strategies of governing, aimed at the schools’ self-governing capacity. The identity of the political system thus emerges as oscillations between different roles of a legislating power and a supervising coach. The case study suggests...... that a society of experimentalism is emerging. Thus, the relevant object of study is no longer organizational identity, but the experiments with different identities that modern organizations are performing....

  19. Regional Commonalities and Regional Identities: Forging a Normative Understanding of Southeast Asian Identity

    Directory of Open Access Journals (Sweden)

    Gürol Baba

    2016-01-01

    Full Text Available In the last two decades, most of the IR academia’s attention on Southeast Asian regionalism utilised constructivism and/or realism and has focused on ASEAN and its derivatives. This article aims to skew this angle by elaborating a possible relationship between Asian values and a normative understanding of Southeast Asian identity. The major reason for this article’s focus on a normative interpretation is that a practical application of Southeast Asian identity is not very achievable due to various ethnic, cultural, political, territorial, and historical diversities. While the region is diverse, there are also a number of commonalities among its states. Asian values, from a Confucian perspective, account for some of these commonalities. By using constructivists’ claims on both the links between norms and identity and the dynamic interaction between values and norms, this article argues that Asian values could contribute to the development of Amitav Acharya’s widely cited normative/ideational format of Southeast Asian identity. The article takes ASEAN identity as a case study and aims to show why a normative identity is more achievable than a practical identity among Southeast Asians, and how Asian values might contribute to the creation of this shared identity.

  20. Professional entrepreneurial identity construction

    DEFF Research Database (Denmark)

    Ramsgaard, Michael Breum

    The present study investigates the construction of a professional identity as an entrepreneur in a sample of people with educational background in nutrition and health. The study examines the connection between professional identity construction and entrepreneurial business emergence using...... ‘entrepreneurial preparedness’ as parameter. This research seeks to address the following questions: What significant components or characteristics do entrepreneurs rely on in the early processes of constructing an entrepreneurial identity....

  1. Sharing family and household:

    DEFF Research Database (Denmark)

    Winther, Ida Wentzel

    Keynote: Family relationships are normatively assumed to be characterized by ‘sharing’, such as living together in the same home, occupying the same place, sharing stuff, blood and biology, spending special and ordinary time together, and consequently creating shared biographical experiences....... In that way, families are thrown into togetherness. At the same time, we see families in varying forms where 'sharing' is lived and contested differently. In Denmark, many children live in nuclear families, and many live in different variations of more than one household. For those who share household...... and family, 'sharing' will be a basic condition. No matter what, they should share life circumstances, more stories, more places and spaces, more households families with both kin and non-kin. This keynote addresses the particular of children’s experiences of living apart and/or living together in sharing...

  2. Personal Identity in Enhancement

    Directory of Open Access Journals (Sweden)

    Jana Podroužková

    2015-09-01

    Full Text Available The aim of this paper is to introduce the concept of human enhancement, its methods and its relation to personal identity. Also several approaches to personal identity will be described. Transhumanism is a special think tank supporting human enhancement through modern technologies and some of its representatives claim, that even great changes to human organisms will not affect their personal identity. I will briefly describe the most important means of human enhancment and consider the problem of personal identity for each of them separately.

  3. Known and Unknown Identity

    DEFF Research Database (Denmark)

    Henze-Pedersen, Sofie

    This qualitative study investigates the relationship between openness and identity among 18 adoptees. Many studies have argued that a high degree of openness is important for the identity formation of adoptees. However, few studies have explored this relationship. Two types of openness...... (biographical knowledge and communicative openness) are used to categorise the empirical material, making it possible to illuminate how different types of openness influence identity. The findings suggest that there is no direct link between a high degree of openness and positive identity formation. Instead...

  4. Identity/Time

    Directory of Open Access Journals (Sweden)

    Nancy J. Knauer

    2013-09-01

    Full Text Available This paper engages the unspoken fourth dimension of intersectionality—time. Using the construction of lesbian, gay, bisexual, and transgender (LGBT identities as an example, it establishes that identity, as it is lived and experienced, is not only multivalent, but also historically contingent. It then raises a number of points regarding the temporal locality of identity—the influence of time on issues of identity and understanding, its implications for legal interventions, social movement building, and paradigms of progressive change. As the title suggests, the paper asks us to consider the frame of identity over time.

  5. Elective Identities, (Culture, Identization and Integration)

    NARCIS (Netherlands)

    S.J. Magala (Slawomir)

    2002-01-01

    textabstractMost of contemporary individual and social identities (constructed with societal, cultural and technological resources) are radically autonomous, nomadic and virtual - i.e. they are de-traditionalized, open to negotiation and not based on a single interpretation of a tradition.

  6. Dynamic quantum secret sharing

    International Nuclear Information System (INIS)

    Jia, Heng-Yue; Wen, Qiao-Yan; Gao, Fei; Qin, Su-Juan; Guo, Fen-Zhuo

    2012-01-01

    In this Letter we consider quantum secret sharing (QSS) between a sender and a dynamic agent group, called dynamic quantum secret sharing (DQSS). In the DQSS, the change of the agent group is allowable during the procedure of sharing classical and quantum information. Two DQSS schemes are proposed based on a special kind of entangled state, starlike cluster states. Without redistributing all the shares, the changed agent group can reconstruct the sender's secret by their cooperation. Compared with the previous quantum secret sharing scheme, our schemes are more flexible and suitable for practical applications. -- Highlights: ► We consider quantum secret sharing between a sender and a dynamic agent group, called dynamic quantum secret sharing (DQSS). ► In the DQSS, the change of the agent group is allowable during the procedure of sharing classical and quantum information. ► Two DQSS schemes are proposed based on a special kind of entangled state, starlike cluster states. ► Without redistributing all the shares, the changed agent group can reconstruct the sender's secret by their cooperation. ► Compared with the previous quantum secret sharing scheme, our schemes are more flexible and suitable for practical applications.

  7. Collective identity formation in hybrid organizations.

    OpenAIRE

    Boulongne , Romain; Boxenbaum , Eva

    2015-01-01

    International audience; The present article examines the process of collective identity formation in the context of hybrid organizing. Empirically, we investigate hybrid organizing in a collaborative structure at the interface of two heterogeneous organizations in the domain of new renewable energies. We draw on the literature on knowledge sharing across organizational boundaries, particularly the notions of transfer, translation and transformation, to examine in real time how knowledge shari...

  8. (Re)scaling identities

    DEFF Research Database (Denmark)

    Koefoed, Lasse Martin; Simonsen, Kirsten

    2012-01-01

    of Pakistani origin, the study employs theoretical ideas of estrangement, identification and recognition in order to obtain a thorough understanding of the complexity and the contradictory character of their spatial identities and affiliations. A turning point in the double processes of estrangement...... of identity....

  9. Value Conditionality of Identity

    Directory of Open Access Journals (Sweden)

    M M Yusupov

    2013-12-01

    Full Text Available The article considers theoretical approaches to the study of values and identity, and reveals the role of values in the formation of the ethnic, regional and Russian identity on the example of Chechnya and the North Caucasus, with the sociological indicators characterizing value orientations and self-identification.

  10. Self and social identity

    NARCIS (Netherlands)

    Ellemers, N; Spears, R; Doosje, B

    2002-01-01

    In this chapter, we examine the self and identity by considering the different conditions under which these are affected by the groups to which people belong. From a social identity perspective we argue that group commitment, on the one hand, and features of the social context, on the other hand,

  11. Children's Social Identities

    Science.gov (United States)

    Bennett, Mark

    2011-01-01

    This paper provides a brief overview of recent developmental research on themes related to children's social identities. Initially, consideration is given to the capacity for social categorization, following which attention is given to children's developing conceptions of social identities, their identification with social groups, and the…

  12. Corporate identity. Brand designs.

    Science.gov (United States)

    Mathieson, Steve

    2004-02-19

    The past two years have seen a steadily more consistent brand identity for the NHS. Branding will become more important as foundation status and PCT commissioning makes acute hospitals more competitive. This has put pressure on some trusts that have their own strong identities.

  13. Identities-in-action

    DEFF Research Database (Denmark)

    Stentoft, Diana; Valero, Paola

    2009-01-01

    The notion of identity is often used in mathematics education research in an attempt to link individual and social understandings of mathematical learning. In this paper we review existing research making use of the notion of identity, and we point to some of the strengths and weaknesses in the w...

  14. Identity without Membership?

    DEFF Research Database (Denmark)

    Dobusch, Leonhard; Schoeneborn, Dennis

    the formation of organizational identity in more fluid organizational settings. Drawing on an empirical study of the hacker collective Anonymous, we show that organizational identity is formed through public communicative events that are subject to meaning negotiation whether or not actions can be attributed...

  15. Personal Identity in Japan

    Science.gov (United States)

    Sugimura, Kazumi; Mizokami, Shinichi

    2012-01-01

    This chapter explores characteristics of identity formation among Japanese adolescents and young adults living in a cultural context where individualism has been increasingly emphasized even while maintaining collectivism. We argue that, to develop a sense of identity in Japanese culture, adolescents and young adults carefully consider others'…

  16. Bianchi identities in higher dimensions

    International Nuclear Information System (INIS)

    Pravda, V; Pravdova, A; Coley, A; Milson, R

    2004-01-01

    A higher dimensional frame formalism is developed in order to study implications of the Bianchi identities for the Weyl tensor in vacuum spacetimes of the algebraic types III and N in arbitrary dimension n. It follows that the principal null congruence is geodesic and expands isotropically in two dimensions and does not expand in n - 4 spacelike dimensions or does not expand at all. It is shown that the existence of such principal geodesic null congruence in vacuum (together with an additional condition on twist) implies an algebraically special spacetime. We also use the Myers-Perry metric as an explicit example of a vacuum type D spacetime to show that principal geodesic null congruences in vacuum type D spacetimes do not share this property

  17. Multicultural identity processes.

    Science.gov (United States)

    Hong, Ying-Yi; Zhan, Siran; Morris, Michael W; Benet-Martínez, Verónica

    2016-04-01

    The study of multicultural identity has gained prominence in recent decades and will be even more urgent as the mobility of individuals and social groups becomes the 'new normal'. This paper reviews the state-of-the-art theoretical advancements and empirical discoveries of multicultural identity processes at the intrapersonal, interpersonal, and collective (e.g., organizational, societal) levels. First, biculturalism has more benefits for individuals' psychological and sociocultural adjustment than monoculturalism. Bicultural individuals' racial essentialist beliefs and Bicultural Identity Integration affect cultural frame switching, racial categorization, and creativity. Second, identity denial and identity-based discrimination by other people or groups threaten multicultural individuals' psychological health and performance. Third, multiculturalism and interculturalism policies are associated with different conceptions of and attitudes toward diversity, and have distinct outcomes for multicultural individuals and societies. Copyright © 2015 Elsevier Ltd. All rights reserved.

  18. Identity as wrapping up

    DEFF Research Database (Denmark)

    Nickelsen, Niels Christian Mossfeldt

    2015-01-01

    The aim of this paper is to provide an understanding of cross-professional collaboration and to develop a notion of professional identity based in practice. The background of the paper is science and technology studies and more precisely actor network theory. The method used: The empirical analysis...... in close relation to the making of a report concerning the cross-professional collaboration. Findings are that “Identity as wrapping up” points to the way in which certain actors, by other actors, are maneuvered into certain pockets in a network. Identity as wrapping up is emphasized as a way...... of participating, which is closely connected to the intention to control the relation towards the other. Thus identity as wrapping up is argued to be a strategy to optimize the situation of one’s own profession. Conclusion: This articulation of identity contributes to the actor network literature as well...

  19. Researcher Identity in Transition

    DEFF Research Database (Denmark)

    Castelló, Montserrat; Kobayashi, Sofie; McGinn, Michelle K.

    2015-01-01

    to reinterpretation, and ECRs need to attend to new or reimagined signals in their efforts to develop a researcher identity in this current context. In this article, we present a comprehensive framework for researcher identity in relation to the ways ECRs recognise and respond to divergent signals across spheres...... of activity. We illustrate this framework through eight identity stories drawn from our earlier research projects. Each identity story highlights the congruence (or lack of congruence) between signals across spheres of activity and emphasises the different ways ECRs respond to these signals. The proposed...... comprehensive framework allows for the analysis of researcher identity development through the complex and intertwined activities in which ECRs are involved. We advance this approach as a foundation for a sustained research agenda to understand how ECRs identify and respond to relevant signals, and...

  20. Visual identity and rebranding

    Directory of Open Access Journals (Sweden)

    Katarzyna Wrona

    2015-06-01

    Full Text Available The goal of this article is to highlight the essence of visual identification and rebranding, as well as to discuss elements of corporate identity, which are subject to revitalization in the process of refreshing the image of a brand. In the first part the article the analysis of the term visual identification is conducted. In the analysis special attention is drawn to the role of visual identification in creating a coherent identity of an organization. In the subsequent chapters further components of corporate identity are presented in detail – starting with logotype, through business forms, advertisements, accompanying materials and Internet websites to signs on buildings. Moreover, corporate identity book as a collection of standards and guidelines for application of corporate identity rules is discussed. The deliberations are based on the study of literature. The last chapter presented the transformation of the brand of Institute of Aviation.

  1. Job sharing. Part 1.

    Science.gov (United States)

    Anderson, K; Forbes, R

    1989-01-01

    This article is the first of a three part series discussing the impact of nurses job sharing at University Hospital, London, Ontario. This first article explores the advantages and disadvantages of job sharing for staff nurses and their supervising nurse manager, as discussed in the literature. The results of a survey conducted on a unit with a large number of job sharing positions, concur with literature findings. The second article will present the evaluation of a pilot project in which two nurses job share a first line managerial position in the Operating Room. The third article will relate the effects of job sharing on women's perceived general well being. Job sharing in all areas, is regarded as a positive experience by both nurse and administrators.

  2. The Sharing Economy

    DEFF Research Database (Denmark)

    Avital, Michel; Carroll, John M.; Hjalmarsson, Anders

    2015-01-01

    The sharing economy is spreading rapidly worldwide in a number of industries and markets. The disruptive nature of this phenomenon has drawn mixed responses ranging from active conflict to adoption and assimilation. Yet, in spite of the growing attention to the sharing economy, we still do not know...... much about it. With the abundant enthusiasm about the benefits that the sharing economy can unleash and the weekly reminders about its dark side, further examination is required to determine the potential of the sharing economy while mitigating its undesirable side effects. The panel will join...... the ongoing debate about the sharing economy and contribute to the discourse with insights about how digital technologies are critical in shaping this turbulent ecosystem. Furthermore, we will define an agenda for future research on the sharing economy as it becomes part of the mainstream society as well...

  3. Probabilistic Infinite Secret Sharing

    OpenAIRE

    Csirmaz, László

    2013-01-01

    The study of probabilistic secret sharing schemes using arbitrary probability spaces and possibly infinite number of participants lets us investigate abstract properties of such schemes. It highlights important properties, explains why certain definitions work better than others, connects this topic to other branches of mathematics, and might yield new design paradigms. A probabilistic secret sharing scheme is a joint probability distribution of the shares and the secret together with a colle...

  4. BBSRC Data Sharing Policy

    OpenAIRE

    Amanda Collis; David McAllister; Michael Ball

    2011-01-01

    BBSRC recognizes the importance of contributing to the growing international efforts in data sharing. BBSRC is committed to getting the best value for the funds we invest and believes that making research data more readily available will reinforce open scientific inquiry and stimulate new investigations and analyses. BBSRC supports the view that data sharing should be led by the scientific community and driven by scientific need. It should also be cost effective and the data shared should be ...

  5. Factors Impacting Knowledge Sharing

    DEFF Research Database (Denmark)

    Schulzmann, David; Slepniov, Dmitrij

    The purpose of this paper is to examine various factors affecting knowledge sharing at the R&D center of a Western MNE in China. The paper employs qualitative methodology and is based on the action research and case study research techniques. The findings of the paper advance our understanding...... about factors that affect knowledge sharing. The main emphasis is given to the discussion on how to improve knowledge sharing in global R&D organizations....

  6. Regulating the sharing economy

    OpenAIRE

    Erickson, Kristofer; Sorensen, Inge

    2016-01-01

    In this introductory essay, we explore definitions of the ‘sharing economy’, a concept indicating both social (relational, communitarian) and economic (allocative, profit-seeking) aspects which appear to be in tension. We suggest combining the social and economic logics of the sharing economy to focus on the central features of network enabled, aggregated membership in a pool of offers and demands (for goods, services, creative expressions). This definition of the sharing economy distinguishe...

  7. Phenomenology of experiential sharing

    DEFF Research Database (Denmark)

    León, Felipe; Zahavi, Dan

    2016-01-01

    The chapter explores the topic of experiential sharing by drawing on the early contributions of the phenomenologists Alfred Schutz and Gerda Walther. It is argued that both Schutz and Walther support, from complementary perspectives, an approach to experiential sharing that has tended to be overl......The chapter explores the topic of experiential sharing by drawing on the early contributions of the phenomenologists Alfred Schutz and Gerda Walther. It is argued that both Schutz and Walther support, from complementary perspectives, an approach to experiential sharing that has tended...

  8. A Data Sharing Story

    Directory of Open Access Journals (Sweden)

    Mercè Crosas

    2012-01-01

    Full Text Available From the early days of modern science through this century of Big Data, data sharing has enabled some of the greatest advances in science. In the digital age, technology can facilitate more effective and efficient data sharing and preservation practices, and provide incentives for making data easily accessible among researchers. At the Institute for Quantitative Social Science at Harvard University, we have developed an open-source software to share, cite, preserve, discover and analyze data, named the Dataverse Network. We share here the project’s motivation, its growth and successes, and likely evolution.

  9. Share your sweets

    DEFF Research Database (Denmark)

    Byrnit, Jill; Høgh-Olesen, Henrik; Makransky, Guido

    2015-01-01

    study to examine the sharing behavior of groups of captive chimpanzees and bonobos when introducing the same type of food (branches) manipulated to be of two different degrees of desirability (with or without syrup). Results showed that, the large majority of food transfers in both species came about...... as sharing in which group members were allowed to co-feed or remove food from the stock of the food possessor, and the introduction of high-value food resulted in more sharing, not less. Food sharing behavior differed between species in that chimpanzees displayed significantly more begging behavior than...

  10. Regional identity can add value to agricultural products

    Directory of Open Access Journals (Sweden)

    Bradley C. Christensen

    2015-04-01

    Full Text Available Regional identity creation is being recognized for its economic benefits and as a strategic resource for producer communities. A regional identity is not a brand; it is built through a complicated process of developing cohesion and sharing in the industry community and communicating outside the industry community to opinion-makers and consumers. The California fine wine industry has built successful regional identities and leveraged them to add value to their wines. As regional identities in the wine industry have strengthened, so has the industry, and a symbiotic relationship with other local value-added industries, such as tourism and hospitality, has emerged. Other agricultural producers can learn from the identity creation experiences in the wine industry. With the many challenges faced by California agriculture, identity formation may offer producers new ideas for adding value to their products and finding larger markets.

  11. Practicing Identity: A Crafty Ideal?

    Science.gov (United States)

    Brysbaert, A.; Vetters, M.

    This paper focuses on the materialization of technological practices as a form of identity expression. Contextual analyses of a Mycenaean workshop area in the Late Bronze Age citadel of Tiryns (Argolis, Greece) are presented to investigate the interaction of different artisans under changing socio-political and economic circumstances. The case study indicates that although certain technological practices are often linked to specific crafts, they do not necessarily imply the separation of job tasks related to the working of one specific material versus another. Shared technological practices and activities, therefore, may be a factor in shaping cohesive group identities of specialized artisans. Since tracing artisans' identities is easier said than done on the basis of excavated materials alone, we employ the concepts of multiple chaînes opératoires combined with cross-craft interactions as a methodology in order to retrieve distinctive sets of both social and technological practices from the archaeological remains. These methodological concepts are not restricted to a specific set of steps in the production cycle, but ideally encompass reconstructing contexts of extraction, manufacture, distribution and discard/reuse for a range of artefacts. Therefore, these concepts reveal both technological practices, and, by contextualising these technological practices in their spatial layout, equally focus on social contacts that would have taken place during any of these actions. Our detailed contextual study demonstrates that the material remains when analysed in their entirety are complementary to textual evidence. In this case study they even form a source of information on palatial spheres of life about which the fragmentary Linear B texts, so far, remain silent.

  12. Millennials and the Sharing Economy

    DEFF Research Database (Denmark)

    Ranzini, Giulia; Newlands, Gemma; Anselmi, Guido

    Report from the EU H2020 Research Project Ps2Share: Participation, Privacy, and Power in the Sharing Economy......Report from the EU H2020 Research Project Ps2Share: Participation, Privacy, and Power in the Sharing Economy...

  13. Linguistic identity matching

    CERN Document Server

    Lisbach, Bertrand

    2013-01-01

    Regulation, risk awareness and technological advances are increasingly drawing identity search functionality into business, security and data management processes, as well as fraud investigations and counter-terrorist measures.Over the years, a number of techniques have been developed for searching identity data, traditionally focusing on logical algorithms. These techniques often failed to take into account the complexities of language and culture that provide the rich variations  seen in names used around the world. A new paradigm has now emerged for understanding the way that identity data

  14. Vocational Identity and Ego Identity Status in Korean Nursing Students

    Directory of Open Access Journals (Sweden)

    Hyun-Young Koo, PhD, RN

    2016-03-01

    Conclusions: These findings show that nursing students in identity achievement status have secure and clear vocational identities. Further longitudinal and qualitative studies are needed to find out if identity formation among nursing students changes with age.

  15. Mobile energy sharing futures

    DEFF Research Database (Denmark)

    Worgan, Paul; Knibbe, Jarrod; Plasencia, Diego Martinez

    2016-01-01

    We foresee a future where energy in our mobile devices can be shared and redistributed to suit our current task needs. Many of us are beginning to carry multiple mobile devices and we seek to re-evaluate the traditional view of a mobile device as only accepting energy. In our vision, we can...... sharing futures....

  16. 5G Spectrum Sharing

    OpenAIRE

    Nekovee, Maziar; Rudd, Richard

    2017-01-01

    In this paper an overview is given of the current status of 5G industry standards, spectrum allocation and use cases, followed by initial investigations of new opportunities for spectrum sharing in 5G using cognitive radio techniques, considering both licensed and unlicensed scenarios. A particular attention is given to sharing millimeter-wave frequencies, which are of prominent importance for 5G.

  17. NCSU Reactor Sharing Program

    International Nuclear Information System (INIS)

    Perez, P.B.

    1993-01-01

    The Nuclear Reactor Program at North Carolina State University provides the PULSTAR Research Reactor and associated facilities to eligible institutions with support, in part, from the Department of Energy Reactor Sharing Program. Participation in the NCSU Reactor Sharing Program continues to increase steadily with visitors ranging from advance high school physics and chemistry students to Ph.D. level research from neighboring universities

  18. 'An Arena for Sharing'

    DEFF Research Database (Denmark)

    la Cour, Karen; Ledderer, Loni; Hansen, Helle Ploug

    2015-01-01

    relatives). In-depth interviews were conducted in the participants' homes 1 month after the rehabilitation course. Data were analyzed by a constant comparative method. Results: Residential rehabilitation course was identified to serve as an "arena for sharing," underpinned by 3 dimensions of sharing...

  19. Exploring the Sharing Economy

    DEFF Research Database (Denmark)

    Netter, Sarah

    Despite the growing interest on the part of proponents and opponents - ranging from business, civil society, media, to policy-makers alike - there is still limited knowledge about the working mechanisms of the sharing economy. The thesis is dedicated to explore this understudied phenomenon...... and to provide a more nuanced understanding of the micro- and macro-level tensions that characterize the sharing economy. This thesis consists of four research papers, each using different literature, methodology, and data sets. The first paper investigates how the sharing economy is diffused and is ‘talked......-level tensions experience by sharing platforms by looking at the case of mobile fashion reselling and swapping markets. The final paper combines the perspectives of different sharing economy stakeholders and outlines some of the micro and macro tensions arising in and influencing the organization of these multi...

  20. Sharing Rare Attitudes Attracts.

    Science.gov (United States)

    Alves, Hans

    2018-04-01

    People like others who share their attitudes. Online dating platforms as well as other social media platforms regularly rely on the social bonding power of their users' shared attitudes. However, little is known about moderating variables. In the present work, I argue that sharing rare compared with sharing common attitudes should evoke stronger interpersonal attraction among people. In five studies, I tested this prediction for the case of shared interests from different domains. I found converging evidence that people's rare compared with their common interests are especially potent to elicit interpersonal attraction. I discuss the current framework's theoretical implications for impression formation and impression management as well as its practical implications for improving online dating services.

  1. Implementing Explicit and Finding Implicit Sharing in Embedded DSLs

    Directory of Open Access Journals (Sweden)

    Oleg Kiselyov

    2011-09-01

    Full Text Available Aliasing, or sharing, is prominent in many domains, denoting that two differently-named objects are in fact identical: a change in one object (memory cell, circuit terminal, disk block is instantly reflected in the other. Languages for modelling such domains should let the programmer explicitly define the sharing among objects or expressions. A DSL compiler may find other identical expressions and share them, implicitly. Such common subexpression elimination is crucial to the efficient implementation of DSLs. Sharing is tricky in embedded DSL, since host aliasing may correspond to copying of the underlying objects rather than their sharing. This tutorial summarizes discussions of implementing sharing in Haskell DSLs for automotive embedded systems and hardware description languages. The technique has since been used in a Haskell SAT solver and the DSL for music synthesis. We demonstrate the embedding in pure Haskell of a simple DSL with a language form for explicit sharing. The DSL also has implicit sharing, implemented via hash-consing. Explicit sharing greatly speeds up hash-consing. The seemingly imperative nature of hash-consing is hidden beneath a simple combinator language. The overall implementation remains pure functional and easy to reason about.

  2. Personal Identity Online

    DEFF Research Database (Denmark)

    Rodogno, Raffaele

    2012-01-01

    Philosophers concerned with the question of personal identity have typically been asking the so-called re-identification question: what are the conditions under which a person at one point in time is properly re-identified at another point in time? This is a rather technical question. In our...... everyday interactions, however, we do raise a number of personal identity questions that are quite distinct from it. In order to explore the variety of ways in which the Internet may affect personal identity, I propose in this study to broaden the typical philosophical horizon to other more mundane senses...... of the question. In Section 2, I describe a number of possible meanings of personal identity observed in everyday contexts and more philosophical ones. With some caveats, I argue that it is the specific context in which the question arises that disambiguates the meaning of the question. Online contexts are novel...

  3. Researcher Identities in Transition

    DEFF Research Database (Denmark)

    Castelló, Montserrat; Wisker, Gina; Kobayashi, Sofie

    as other emergent ‘signals’, the latent or clear indications from institutions and academic communities regarding career directions and necessary professional skills and attitudes should be identified and interpreted for researchers to adequately develop their new identities. The aim of this paper......Researchers are now embarked upon what we define as a ‘risk career’, rather than, as previously, a relatively more predictable academic career. In this changing context, traditional milestones that enabled early career researchers to build their identities are disappearing. Instead, what we define...... is twofold: a) to present a comprehensive framework of the notion of researcher identity by means of analysing those spheres of activity related to researcher and career development; and b) to relate researcher identities to the experiences of early career researchers with issues concerning signals...

  4. Primary Identity in Literature

    DEFF Research Database (Denmark)

    Graham, Brian Russell

    In our times, literary criticism, as well as larger political and cultural developments, is characterized by identity politics, meaning that our discourses are structured around the notion of different socially identifiable populations in society. In relation to literature, this results in our...... viewing the characters in literature in terms of these political identities. Literature is consequently discussed in relation to political causes. Literary criticism is animated by the same causes, and is viewed as having a direct intervention in society in relation to them. In this paper, I will discuss......, in relation to Frye’s works, the idea that the primary identities of characters in literature were and, to a considerable extent, continue to be those of family-member identities. As such, literature should not be appropriated to a political context too readily. Whereas viewing characters in terms of...

  5. WORK AND LEARNER IDENTITY

    DEFF Research Database (Denmark)

    Kondrup, Sissel

    2015-01-01

    The aim of this article is to suggest a theoretical framework than can assess to how people’s engagement in specific historical and social work practices are significant to their development, maintenance or transformation of a learner identity. Such a framework is crucial in order to grasp how...... different groups have distinctive conditions for meeting the obligation of forming a proactive learner identity and engage in lifelong learning prevalent in both national and transnational policies on lifelong learning....

  6. Introduction: Discourses of Identity

    DEFF Research Database (Denmark)

    Madsen, Peter

    2016-01-01

    Analysis of usages of ideas of 'identity' in relation to migration in Britain, France, and Germany, as well as in the Serbian anti-muslim war - with a view of demonstrating conceptual context of the usages.......Analysis of usages of ideas of 'identity' in relation to migration in Britain, France, and Germany, as well as in the Serbian anti-muslim war - with a view of demonstrating conceptual context of the usages....

  7. Developing Identity for Lawyers

    OpenAIRE

    Høedt-Rasmussen, Inger

    2014-01-01

    The role of the lawyer is in transition and the formerly predominantly homogeneous profes-sion has become a heterogeneous group of lawyers with diverging perceptions of the lawyer’s identity and of the main characteristics of the profession. The European Union has extended the perception of democracy and the fundamental rights to include more collective rights, social concerns, global responsibility and sustainability. The dissertation’s main question is: How can the identity and competen...

  8. Chimpanzees share forbidden fruit.

    Directory of Open Access Journals (Sweden)

    Kimberley J Hockings

    2007-09-01

    Full Text Available The sharing of wild plant foods is infrequent in chimpanzees, but in chimpanzee communities that engage in hunting, meat is frequently used as a 'social tool' for nurturing alliances and social bonds. Here we report the only recorded example of regular sharing of plant foods by unrelated, non-provisioned wild chimpanzees, and the contexts in which these sharing behaviours occur. From direct observations, adult chimpanzees at Bossou (Republic of Guinea, West Africa very rarely transferred wild plant foods. In contrast, they shared cultivated plant foods much more frequently (58 out of 59 food sharing events. Sharing primarily consists of adult males allowing reproductively cycling females to take food that they possess. We propose that hypotheses focussing on 'food-for-sex and -grooming' and 'showing-off' strategies plausibly account for observed sharing behaviours. A changing human-dominated landscape presents chimpanzees with fresh challenges, and our observations suggest that crop-raiding provides adult male chimpanzees at Bossou with highly desirable food commodities that may be traded for other currencies.

  9. Sharing the dance -

    DEFF Research Database (Denmark)

    He, Jing; Ravn, Susanne

    2018-01-01

    In his recent works on daily face-to-face encounters, Zahavi claims that the phenomenon of sharing involves reciprocity. Following Zahavi’s line of thought, we wonder what exactly reciprocity amounts to and how the shared experience emerges from the dynamic process of interaction. By turning...... to the highly specialized field of elite sports dance, we aim at exploring the way in which reciprocity unfolds in intensive deliberate practices of movement. In our analysis, we specifically argue that the ongoing dynamics of two separate flows of movement constitute a shared experience of dancing together...

  10. Global resource sharing

    CERN Document Server

    Frederiksen, Linda; Nance, Heidi

    2011-01-01

    Written from a global perspective, this book reviews sharing of library resources on a global scale. With expanded discovery tools and massive digitization projects, the rich and extensive holdings of the world's libraries are more visible now than at any time in the past. Advanced communication and transmission technologies, along with improved international standards, present a means for the sharing of library resources around the globe. Despite these significant improvements, a number of challenges remain. Global Resource Sharing provides librarians and library managers with a comprehensive

  11. Report endorses data sharing

    Science.gov (United States)

    The potential benefits of sharing data so outweigh its costs that investigators should be required to include plans for sharing data as part of their grant proposals, according to recommendations issued recently by the Committee on National Statistics (CNSTAT) of the National Research Council (NRC).In their report Sharing Research Data, CNSTAT also recommended that “Journals should give more emphasis to reports of secondary analyses and to replications,” provided that the original collections of data receive full credit. In addition, “Journal editors should require authors to provide access to data during the peer review process.”

  12. Tools for Understanding Identity

    Energy Technology Data Exchange (ETDEWEB)

    Creese, Sadie; Gibson-Robinson, Thomas; Goldsmith, Michael; Hodges, Duncan; Kim, Dee DH; Love, Oriana J.; Nurse, Jason R.; Pike, William A.; Scholtz, Jean

    2013-12-28

    Identity attribution and enrichment is critical to many aspects of law-enforcement and intelligence gathering; this identity typically spans a number of domains in the natural-world such as biographic information (factual information – e.g. names, addresses), biometric information (e.g. fingerprints) and psychological information. In addition to these natural-world projections of identity, identity elements are projected in the cyber-world. Conversely, undesirable elements may use similar techniques to target individuals for spear-phishing attacks (or worse), and potential targets or their organizations may want to determine how to minimize the attack surface exposed. Our research has been exploring the construction of a mathematical model for identity that supports such holistic identities. The model captures the ways in which an identity is constructed through a combination of data elements (e.g. a username on a forum, an address, a telephone number). Some of these elements may allow new characteristics to be inferred, hence enriching the holistic view of the identity. An example use-case would be the inference of real names from usernames, the ‘path’ created by inferring new elements of identity is highlighted in the ‘critical information’ panel. Individual attribution exercises can be understood as paths through a number of elements. Intuitively the entire realizable ‘capability’ can be modeled as a directed graph, where the elements are nodes and the inferences are represented by links connecting one or more antecedents with a conclusion. The model can be operationalized with two levels of tool support described in this paper, the first is a working prototype, the second is expected to reach prototype by July 2013: Understanding the Model The tool allows a user to easily determine, given a particular set of inferences and attributes, which elements or inferences are of most value to an investigator (or an attacker). The tool is also able to take

  13. Anthropology and Genre: Science Fiction – Communication of Identity

    Directory of Open Access Journals (Sweden)

    Bojan Žikić

    2016-02-01

    Full Text Available Genre production uses the shared nature of cultural communication in order to establish certain kinds and models of cultural identity, and these identities go on to have a social and cultural existence outside genre communication. Anthropology insists on the shared nature of cultural communication, more precisely, on the fact that those who shape the information transmitted in this way have to share its code with the intended recipients. The anthropological study of genres is actually the study of certain cultural artefacts characteristic of the societies and cultures in which they have been created. on the fact that those who shape the information transmitted in this way have to share its code with the intended recipients. The anthropological study of

  14. Facilitating Knowledge Sharing

    DEFF Research Database (Denmark)

    Holdt Christensen, Peter

    knowledge sharing is to ensure that the exchange is seen as equitable for the parties involved, and by viewing the problems of knowledge sharing as motivational problems situated in different organizational settings, the paper explores how knowledge exchange can be conceptualized as going on in four...... distinct situations of exchange denominated organizational exchange yielding extrinsic rewards, organizational exchange yielding intrinsic rewards, financial exchange, and social exchange. The paper argues that each situation of exchange has distinct assumptions about individual behaviour...... and the intermediaries regulating the exchange, and facilitating knowledge sharing should therefore be viewed as a continuum of practices under the influence of opportunistic behaviour, obedience or organizational citizenship behaviour. Keywords: Knowledge sharing, motivation, organizational settings, situations...

  15. A Sharing Proposition.

    Science.gov (United States)

    Sturgeon, Julie

    2002-01-01

    Describes how the University of Vermont and St. Michael's College in Burlington, Vermont cooperated to share a single card access system. Discusses the planning, financial, and marketplace advantages of the cooperation. (EV)

  16. Pricing Shared Appreciation Mortgages

    OpenAIRE

    Zhong, Yina

    2006-01-01

    This paper develops a model for the valuation of shared appreciation mortgage (SAM) and examines the effect of reduction in interest rate on the mortgage duration and share of property appreciation lender charges. The recent rise in SAM availability, as a result of some secondary market financial support and prerequisite standardization, motivates a more careful consideration of the underlying SAM value. The primary difference between the SAM model and the model for general traditional mor...

  17. Sharing resources@CERN

    CERN Multimedia

    Maximilien Brice

    2002-01-01

    The library is launching a 'sharing resources@CERN' campaign, aiming to increase the library's utility by including the thousands of books bought by individual groups at CERN. This will improve sharing of information among CERN staff and users. Photo 01: L. to r. Eduardo Aldaz, from the PS division, Corrado Pettenati, Head Librarian, and Isabel Bejar, from the ST division, read their divisional copies of the same book.

  18. SharePoint governance

    OpenAIRE

    Ali, Mudassar

    2013-01-01

    Masteroppgave i informasjons- og kommunikasjonsteknologi IKT590 2013 – Universitetet i Agder, Grimstad SharePoint is a web-based business collaboration platform from Microsoft which is very robust and dynamic in nature. The platform has been in the market for more than a decade and has been adapted by large number of organisations in the world. The platform has become larger in scale, richer in features and is improving consistently with every new version. However, SharePoint ...

  19. The Process of Identity Work: Negotiating a Work Identity

    NARCIS (Netherlands)

    Crafford, A.; Adams, B.G.; Saayman, T.; Vinkenburg, C.J.; Jansen, P.G.W.; Roodt, G.

    2015-01-01

    Identity work is an important process in negotiating, regulating and maintaining a coherent sense of self-(identity). In this chapter we discuss how identity work is particularly useful in establishing a work identity. The crux of the discussion in this chapter is based on the qualitative phase of

  20. Information partnerships--shared data, shared scale.

    Science.gov (United States)

    Konsynski, B R; McFarlan, F W

    1990-01-01

    How can one company gain access to another's resources or customers without merging ownership, management, or plotting a takeover? The answer is found in new information partnerships, enabling diverse companies to develop strategic coalitions through the sharing of data. The key to cooperation is a quantum improvement in the hardware and software supporting relational databases: new computer speeds, cheaper mass-storage devices, the proliferation of fiber-optic networks, and networking architectures. Information partnerships mean that companies can distribute the technological and financial exposure that comes with huge investments. For the customer's part, partnerships inevitably lead to greater simplification on the desktop and more common standards around which vendors have to compete. The most common types of partnership are: joint marketing partnerships, such as American Airline's award of frequent flyer miles to customers who use Citibank's credit card; intraindustry partnerships, such as the insurance value-added network service (which links insurance and casualty companies to independent agents); customer-supplier partnerships, such as Baxter Healthcare's electronic channel to hospitals for medical and other equipment; and IT vendor-driven partnerships, exemplified by ESAB (a European welding supplies and equipment company), whose expansion strategy was premised on a technology platform offered by an IT vendor. Partnerships that succeed have shared vision at the top, reciprocal skills in information technology, concrete plans for an early success, persistence in the development of usable information for all partners, coordination on business policy, and a new and imaginative business architecture.

  1. Regulating the sharing economy

    Directory of Open Access Journals (Sweden)

    Kristofer Erickson

    2016-06-01

    Full Text Available In this introductory essay, we explore definitions of the ‘sharing economy’, a concept indicating both social (relational, communitarian and economic (allocative, profit-seeking aspects which appear to be in tension. We suggest combining the social and economic logics of the sharing economy to focus on the central features of network enabled, aggregated membership in a pool of offers and demands (for goods, services, creative expressions. This definition of the sharing economy distinguishes it from other related peer-to-peer and collaborative forms of production. Understanding the social and economic motivations for and implications of participating in the sharing economy is important to its regulation. Each of the papers in this special issue contributes to knowledge by linking the social and economic aspects of sharing economy practices to regulatory norms and mechanisms. We conclude this essay by suggesting future research to further clarify and render intelligible the sharing economy, not as a contradiction in terms but as an empirically observable realm of socio-economic activity.

  2. Avoiding Medical Identity Theft

    Science.gov (United States)

    ... medical records that can plague your medical and financial life for years, or even put your health at risk. ... Monitor your health records closely and address any errors quickly Share personal and health insurance information only ...

  3. Identity Expansion and Transcendence

    Directory of Open Access Journals (Sweden)

    William Sims Bainbridge

    2014-05-01

    Full Text Available Emerging developments in communications and computing technology may transform the nature of human identity, in the process rendering obsolete the traditional philosophical and scientific frameworks for understanding the nature of individuals and groups.  Progress toward an evaluation of this possibility and an appropriate conceptual basis for analyzing it may be derived from two very different but ultimately connected social movements that promote this radical change. One is the governmentally supported exploration of Converging Technologies, based in the unification of nanoscience, biology, information science and cognitive science (NBIC. The other is the Transhumanist movement, which has been criticized as excessively radical yet is primarily conducted as a dignified intellectual discussion within a new school of philosophy about human enhancement.  Together, NBIC and Transhumanism suggest the immense transformative power of today’s technologies, through which individuals may explore multiple identities by means of online avatars, semi-autonomous intelligent agents, and other identity expansions.

  4. Biometrics and Identity Management

    DEFF Research Database (Denmark)

    management. BIOID 2008. The papers are categorized in four classes. These classes represent the 4 working groups of the COST Action 2101. For more information, see http://www.cost2101.org/.   Biometric data quality and multimodal biometric templates, Unsupervised interactive interfaces for multimodal...... security and border control scenarios it is now apparent that the widespread availability of biometrics in everyday life will also spin out an ever increasing number of (private) applications in other domains. Crucial to this vision is the management of the user's identity, which does not only imply...... biometrics, Biometric attacks and countermeasures, Standards and privacy issues for biometrics in identity documents and smart cards. BIOID 2008 is an initiative of the COST Action 2101 on Biometrics for Identity Documents and Smart Cards. It is supported by the EU Framework 7 Programme. Other sponsors...

  5. Identity negotiations in meetings

    DEFF Research Database (Denmark)

    Asmuß, Birte; Oshima, Sae

    of the company, and all members know (and display) that he holds some information that the rest don’t have access to. Our analysis shows that the participants evoke various identities of the manager, sometimes orienting to the structure of the organization, and other times orienting to wider social categories......Meetings are places, where identity negotiation is a central activity and where members’ local practices recurrently inform and are informed by larger categories (Antaki and Widdicombe 1998). Correspondingly, the approach to understanding organization (macro) by way of identity work (micro) has...... company, and in the data recorded over 10 days, the employees frequently complain about the many changes that have taken place. Our focus lies in a unique occasion where one of the managers makes an unusual appearance at the lunchroom. In this situation, he is the only one that is on the business side...

  6. Learning as Negotiating Identities

    DEFF Research Database (Denmark)

    Jørgensen, Kenneth Mølbjerg; Keller, Hanne Dauer

    The paper explores the contribution of Communities of Practice (COP) to Human Resource Development (HRD). Learning as negotiating identities captures the contribution of COP to HRD. In COP the development of practice happens through negotiation of meaning. The learning process also involves modes...... of belonging constitutive of our identities. We suggest that COP makes a significant contribution by linking learning and identification. This means that learning becomes much less instrumental and much more linked to fundamental questions of being. We argue that the COP-framework links learning with the issue...... of time - caught in the notion of trajectories of learning - that integrate past, present and future. Working with the learners' notion of time is significant because it is here that new learning possibilities become visible and meaningful for individuals. Further, we argue that the concept of identity...

  7. On the fundamentals of identity

    NARCIS (Netherlands)

    van der Gaag, Mandy

    Various new perspectives on identity have been introduced or have increased in popularity over the past two decades. These include identity as dynamic system (Kunnen & Bosma, 2001), a narrative approach to identity (McAdams, 2001), multi-dimensional models of identity formation (Luyckx et al., 2006;

  8. Splitting Ward identity

    Energy Technology Data Exchange (ETDEWEB)

    Safari, Mahmoud [Institute for Research in Fundamental Sciences (IPM), School of Particles and Accelerators, P.O. Box 19395-5531, Tehran (Iran, Islamic Republic of)

    2016-04-15

    Within the background-field framework we present a path integral derivation of the splitting Ward identity for the one-particle irreducible effective action in the presence of an infrared regulator, and make connection with earlier works on the subject. The approach is general in the sense that it does not rely on how the splitting is performed. This identity is then used to address the problem of background dependence of the effective action at an arbitrary energy scale. We next introduce the modified master equation and emphasize its role in constraining the effective action. Finally, application to general gauge theories within the geometric approach is discussed. (orig.)

  9. Social identities and risk

    DEFF Research Database (Denmark)

    Blok, Anders; Jensen, Mette; Kaltoft, Pernille

    2008-01-01

    Expert-based environmental and health risk regulation is widely believed to suffer from a lack of public understanding and legitimacy. On controversial issues such as genetically modified organisms and food-related chemicals, a "lay-expert discrepancy" in the assessment of risks is clearly visible...... of social identities. On the basis of qualitative interviews with citizens and experts, respectively, we focus on the multiple ways in which identities come to be employed in actors' risk accounts. Empirically, we identify salient characteristics of "typical" imagined experts and lay-people, while arguing...

  10. Splitting Ward identity

    International Nuclear Information System (INIS)

    Safari, Mahmoud

    2016-01-01

    Within the background-field framework we present a path integral derivation of the splitting Ward identity for the one-particle irreducible effective action in the presence of an infrared regulator, and make connection with earlier works on the subject. The approach is general in the sense that it does not rely on how the splitting is performed. This identity is then used to address the problem of background dependence of the effective action at an arbitrary energy scale. We next introduce the modified master equation and emphasize its role in constraining the effective action. Finally, application to general gauge theories within the geometric approach is discussed. (orig.)

  11. Law and Identity

    DEFF Research Database (Denmark)

    Schmidt, Garbi

    2011-01-01

    processes of social integration. Within media-based and political debates, transnational marriages are frequently described as practices destructive both to individual freedom and to Danish national identity. Nonetheless, it is a practice in which both minority and majority citizens engage, one that frames...... both their family lives and their lives as citizens. This article analyses the dynamic relationship between public discourse and practices of transnational marriage. The first part describes how political and legislative perceptions of transnational (arranged) marriages are situated within a discussion......' expressions of autonomy and choice and their adaptations of such concepts to understandings of social belonging, inclusion and identity formation vis--vis the Danish nation-state....

  12. Editorial: Negotiating Gamer Identities

    Directory of Open Access Journals (Sweden)

    Matthew Barr

    2016-07-01

    Full Text Available The term ‘gamer identity’ is hotly contested, and certainly not understood as a broadly accepted term. From the outdated stereotype of white, heterosexual, teenage boys playing Nintendo in their parents’ basement to the equally contested proclamation that “‘gamers’ are over”, the current game culture climate is such that movements as divisive and controversial as #gamergate can flourish. For this latest special issue of Press Start, we invited submissions regarding the recent controversies surrounding the notion of player identities, with the aim of receiving papers from different viewpoints on gamer identity and culture.

  13. Corporate Brand Identity in SMEs

    DEFF Research Database (Denmark)

    Mäläskä, Minna; Jones, Richard Ian

    Purpose: To study the emergence of corporate brand identity in SMEs and to develop a typology of brand identity drivers that reflects a co-creative approach to the emergence of brand identity. Design / Methodology / Approach : Existing approaches to brand identity are summarised. A narrative...... studies. The research is important since it suggests an iterative and co-creative approach to brand identity. A typology of brand identity formation for SMEs is presented: entrepreneur driven, market driven, stakeholder driven. Practical implications: The three paths to creating a strong brand identity...... challenge existing notions that brand identity is based solely on the values of the entrepreneur. This typology suggests that SMEs should be open to creating an identity that draws from their stakeholder eco-system. Originality / value: this research challenges the existing assumption that brand identity...

  14. Labia Majora Share

    Directory of Open Access Journals (Sweden)

    Hanjing Lee

    2017-01-01

    Full Text Available Defects involving specialised areas with characteristic anatomical features, such as the nipple, upper eyelid, and lip, benefit greatly from the use of sharing procedures. The vulva, a complex 3-dimensional structure, can also be reconstructed through a sharing procedure drawing upon the contralateral vulva. In this report, we present the interesting case of a patient with chronic, massive, localised lymphedema of her left labia majora that was resected in 2011. Five years later, she presented with squamous cell carcinoma over the left vulva region, which is rarely associated with chronic lymphedema. To the best of our knowledge, our management of the radical vulvectomy defect with a labia majora sharing procedure is novel and has not been previously described. The labia major flap presented in this report is a shared flap; that is, a transposition flap based on the dorsal clitoral artery, which has consistent vascular anatomy, making this flap durable and reliable. This procedure epitomises the principle of replacing like with like, does not interfere with leg movement or patient positioning, has minimal donor site morbidity, and preserves other locoregional flap options for future reconstruction. One limitation is the need for a lax contralateral vulva. This labia majora sharing procedure is a viable option in carefully selected patients.

  15. The Consumer Science of Sharing: A Discussant's Observations

    OpenAIRE

    Rudmin, Floyd Webster

    2016-01-01

    This discussant’s response to the collected articles on the consumer behavior of sharing draws on a 1983–99 record of research on the psychology of ownership and property. The major recommendations here are: (1) that sharing be defined as the simultaneous or sequential use of an object (e.g., car), a space (e.g., living room), or an intangible (e.g., identity) by more than one individual; (2) that sharing be better described and analyzed by the naive phenomenology methods used by Ichheiser, H...

  16. Collaborate, compete and share

    Science.gov (United States)

    Pugliese, Emanuele; Castellano, Claudio; Marsili, Matteo; Pietronero, Luciano

    2009-02-01

    We introduce and study a model of an interacting population of agents who collaborate in groups which compete for limited resources. Groups are formed by random matching agents and their worth is determined by the sum of the efforts deployed by agents in group formation. Agents, on their side, have to share their effort between contributing to their group’s chances to outcompete other groups and resource sharing among partners, when the group is successful. A simple implementation of this strategic interaction gives rise to static and evolutionary properties with a very rich phenomenology. A robust emerging feature is the separation of the population between agents who invest mainly in the success of their group and agents who concentrate in getting the largest share of their group’s profits.

  17. Urban sharing culture

    DEFF Research Database (Denmark)

    Fjalland, Emmy Laura Perez

    of the structures of the networked urban mobilities and holds the potentials to change the future mobilities. References Bauman, Zygmunt. 2000. Liquid Modernity. Cambridge: Polity. Beck, Ulrich. 1992. Risk Society: Towards a New Modernity (Published in Association with Theory, Culture & Society). London: SAGE......In urban areas sharing cultures, services and economies are rising. People share, rent and recycle their homes, cars, bikes, rides, tools, cloths, working space, knowhow and so on. The sharing culture can be understood as mobilities (Kesselring and Vogl 2013) of goods, values and ideas reshaping...... problems and side effects from concentration of consumption and contamination; and due to the shift from ownership to access it change our basic social cultural norms (Sayer 2005; Sayer 2011) about the ‘good’ life and social status (Freudendal-Pedersen 2007), commons and individuality, responsibility...

  18. Language, Identity, and Exile

    Science.gov (United States)

    Erdinast-Vulcan, Daphna

    2010-01-01

    The exilic mode of being, a living on boundary-lines, produces a constant relativization of one's home, one's culture, one's language, and one's self, through the acknowledgement of otherness. It is a homesickness without nostalgia, without the desire to return to the same, to be identical to oneself. The encounter with the other which produces a…

  19. Bilingualism versus identity

    DEFF Research Database (Denmark)

    Hermann, Jesper

    1988-01-01

    During the last hundred years psychologists, philosophers and theologians have developed two different conceptions of personal identity. One of them insists that each person is a unique and transcendental being, whereas the other finds the personality deriving from interaction with other persons....... (This is the prevailing view today.) These theories are placed in relation to the difficulties an immigrant encounters....

  20. Language and Identity Explored

    Directory of Open Access Journals (Sweden)

    Thomas Rozanov

    2016-06-01

    Full Text Available The relationship between language and identity is widely discussed in applied linguistics, sociology, communications and other related scholarly fields. Furthermore, many researchers have focused on the post-Soviet region, which given its unique historical context allows for testing of this relationship. The widespread bilingualism as a result of historical russification and the linguistic transformations that occurred after the collapse of the Soviet Union make the region a ‘sociolinguistic playground’. Recent events in Ukraine have given grounds to further explore this relationship, now in attempt to link language and identity as potential forces for geopolitical change in the region. This paper presents an overview of existing research, theories, and opposing perspectives related to the relationship between language and identity, and considers complications such as historical russification, religious influence, socioeconomic factors, and education with regards to the Ukrainian and post-Soviet context.  I aim to illustrate the significance of language and its effects on socio-political change in the case of Ukraine, by presenting arguments and complications in support of the relationship between language and identity.

  1. Shifting Design Consultancy Identities

    DEFF Research Database (Denmark)

    Larsen, Henry; Huijboom, Nina; Holm Nielsen, Anne

    2014-01-01

    and identities that resonate more with freelancing and portfolio careers than with the intention of creating firms that are intended to expand. We recognized a pattern where freelancers build up their work as a portfolio by moving from one engagement to another, a process that we will call sequential freelancing...

  2. Migration, Narration, Identity

    DEFF Research Database (Denmark)

    Leese, Peter

    three consecutive summers from 2010 to 2012. The articles focus on various aspects of the migrant experience and try to answer questions about migrant identity and its representations in literature and the media. The book closes with an original play by Carlos Morton, the Chicano playwright working...

  3. The Visual Identity Project

    Science.gov (United States)

    Tennant-Gadd, Laurie; Sansone, Kristina Lamour

    2008-01-01

    Identity is the focus of the middle-school visual arts program at Cambridge Friends School (CFS) in Cambridge, Massachusetts. Sixth graders enter the middle school and design a personal logo as their first major project in the art studio. The logo becomes a way for students to introduce themselves to their teachers and to represent who they are…

  4. Work and Female Identity.

    Science.gov (United States)

    Reohr, Janet R.

    In climbing an organizational ladder dominated by males, the professional woman encounters obstacles to the more traditional feminine behaviors and mannerisms to which she may be accustomed. These obstacles may erode her sense of identity, creating difficulties both inside and outside of her work environment. Traditional distinctions between…

  5. Positioning health professional identity

    DEFF Research Database (Denmark)

    Lund, Ole; Krogh Christensen, Mette; Mørcke, Anne Mette

    2017-01-01

    Drawing on positioning theory, the purpose of this paper is to characterize the activities and positions of students and supervisors at workplaces and on-campus skills training sites across the higher health professional educations of medicine, sports science, and nursing. Furthermore, the study ...... explored the impact of work-based learning (WBL) and skills training on students’ personal professional identity development....

  6. Dissociative Identity Disorder

    Science.gov (United States)

    Schmidt, Tom

    2007-01-01

    Few psychological disorders in the Diagnostic Statistical Manual have generated as much controversy as Dissociative Identity Disorder (DID). For the past 35 years diagnoses of DID, previously referred to as Multiple Personality Disorder (MPD), have increased exponentially, causing various psychological researchers and clinicians to question the…

  7. Spatial Identity in Gagauzia

    Directory of Open Access Journals (Sweden)

    A. V. Salavatova

    2015-01-01

    Full Text Available Historically the gagauz developed a self-perception based on their difference from Moldova as well as the ‘Turkish world’. The article argues that this fact has determined their pro-Russian political orientation as the only possible way of maintaining their identity

  8. Body Integrity Identity Disorder

    NARCIS (Netherlands)

    Blom, Rianne M.; Hennekam, Raoul C.; Denys, Damiaan

    2012-01-01

    Introduction: Body Integrity Identity Disorder (BIID) is a rare, infrequently studied and highly secretive condition in which there is a mismatch between the mental body image and the physical body. Subjects suffering from BIID have an intense desire to amputate a major limb or severe the spinal

  9. Fluidity, Identity, and Organizationality

    DEFF Research Database (Denmark)

    Dobusch, Leonhard; Schoeneborn, Dennis

    2015-01-01

    that the organizationality of a social collective is accomplished through “identity claims”—i.e., speech acts that concern what the social collective is or does—and negotiations on whether or not these claims have been made on the collective's behalf. We empirically examine the case of the hacker collective Anonymous...

  10. Professions and their Identities

    DEFF Research Database (Denmark)

    Krejsler, John

    2005-01-01

    analytical strategies can frame in sufficiently complex ways what it means to be a professional today. It is assumed that at least four main issues must be dealt with in order to conduct a satisfactory analysis of professions and their identities. Firstly, it is of fundamental strategic importance that one...

  11. Regional identity and family

    Directory of Open Access Journals (Sweden)

    Tripković Gordana D.

    2003-01-01

    Full Text Available This paper is a continuation of a study on regionalisation and family, within the project named Sociological Aspects of Multiculturality and Regionalisation and their influence on the development of AP Vojvodina and the Republic of Serbia. The author focuses her attention to operationalisation of the theoretical and methodological premises that were developed in the previous paper (Tripković, 2002: 111-127, which means that it represents the results of the second phase of the research plan. This phase includes adjusting of theoretical concepts to the fieldwork displaying the results of the research and the analysis of the findings that put a family in the context of confronting different identities, above all national and regional. As possible "identity difference" was emphasized in the research, theoretical and methodological apparatus was adjusted to this goal. That is why in this paper the replies of interviewees that can suggest or reject the assumption that their national identity can influence significantly the evaluation of identity specificities are presented and analyzed, concerning more or less visible aspects of family life, like welfare status, relations between spouses, respect to the elder, family harmony, number of children, connections with relatives, etc.

  12. Identity-Based Authentication for Cloud Computing

    Science.gov (United States)

    Li, Hongwei; Dai, Yuanshun; Tian, Ling; Yang, Haomiao

    Cloud computing is a recently developed new technology for complex systems with massive-scale services sharing among numerous users. Therefore, authentication of both users and services is a significant issue for the trust and security of the cloud computing. SSL Authentication Protocol (SAP), once applied in cloud computing, will become so complicated that users will undergo a heavily loaded point both in computation and communication. This paper, based on the identity-based hierarchical model for cloud computing (IBHMCC) and its corresponding encryption and signature schemes, presented a new identity-based authentication protocol for cloud computing and services. Through simulation testing, it is shown that the authentication protocol is more lightweight and efficient than SAP, specially the more lightweight user side. Such merit of our model with great scalability is very suited to the massive-scale cloud.

  13. Federated Identity Management for Research Collaborations

    CERN Document Server

    Broeder, Daan; Kelsey, David; Kershaw, Philip; Lüders, Stefan; Lyall, Andrew; Nyrönen, Tommi; Wartel, Romain; Weyer, Heinz J

    2012-01-01

    Federated identity management (FIM) is an arrangement that can be made among multiple organisations that lets subscribers use the same identification data to obtain access to the secured resources of all organisations in the group. Identity federation offers economic advantages, as well as convenience, to organisations and their users. For example, multiple institutions can share a single application, with resultant cost savings and consolidation of resources. In order for FIM to be effective, the partners must have a sense of mutual trust. A number of laboratories including national and regional research organizations are facing the challenge of a deluge of scientific data that needs to be accessed by expanding user bases in dynamic collaborations that cross organisational and national boundaries. Driven by these needs, representatives from a variety of research communities, including photon/neutron facilities, social science & humanities, high-energy physics, atmospheric science, bioinformatics and fusi...

  14. Imagining Geographies, Mapping Identities

    Directory of Open Access Journals (Sweden)

    Matthew Graves

    2015-03-01

    Full Text Available The ambition of this issue of Portal is to reach across the methodological boundaries of history, politics, literature and geography to apply their complementary perspectives to the study of identity and its relation to space and place, an aim that involves attempting to identify the many different ways the notoriously slippery concepts of identity and geography may intersect. For this issue we have selected articles that cast a fresh perspective on two areas where identity and geography intersect: the construction of identity through the imaginative recreation of place in literature: Mapping Literary Spaces; and the study of the shifting relationships of centre and periphery, exclusion and inclusion in urban settings and geopolitical confrontations: Social and Political Peripheries. Gerard Toal has written that geography is not a noun but a verb: it does not describe what space is but studies what we do with space, imaginatively and politically. The articles in this issue illustrate the exercise of the literary and political imagination and the role of materiality and memory in the creation of geographic representation. They show too a new awareness of the centrality of space in the constitution of identities, and the need for a new geocritical reading of its discourse, as the interrelations of place and community are played out on the many scales of social and political life, from the local to the global.   The special issue is organised thus: Introduction Matthew Graves (Aix-Marseille University & Liz Rechniewski (Sydney University: “Imagining Geographies, Mapping Identities.” I. Mapping Literary Spaces - Isabelle Avila (University of Paris XIII, "Les Cartes de l'Afrique au XIXe siècle et Joseph Conrad : Perceptions d'une Révolution Cartographique." - Daniela Rogobete (University of Craiova, "Global vs Glocal: Dimensions of the post-1981 Indian English Novel." II. Social and Political Peripheries - Elizabeth Rechniewski (Sydney

  15. Rights of Identity

    Directory of Open Access Journals (Sweden)

    Daniel Kofman

    2017-01-01

    Full Text Available A person’s identity is their sense of who and what they are, of who stands in significant relations to them, and of what is valuable to them. This is inevitably very broad, an immediate implication of which is that the concept of identity taken alone cannot do significant normative work. In some cases a person’s identity is bound up with the evil that they do or wish to do, and cannot thereby give them any right to do it. In other cases very powerful elements of a person’s identity – such as their attachment to loved ones – is certainly related to important rights, but it is not entirely clear that one needs the concept of identity to explicate or justify these rights; the deep involvement of their identity is arguably a byproduct of other important values in these cases (such as love, and those values can do the grounding work of the rights by themselves and more simply and clearly. Nevertheless, when suitably qualified, a person’s identity is central to accounting for important political rights. These ranges from rights to participate in cultural practices of one’s group, which sometimes implies duties on governments to support minorities threatened with extinction, to – at the outer limit – rights to arrange political administration. These rights are connected to both autonomy and fairness. Cultural rights are often taken either to be opposed to autonomy, or at best instrumental to personal autonomy (by providing ‘options’, but in fact, the ideal of autonomy, expressed by Mill as being the author of one’s life, requires that one be in control of significant aspects of one’s identity. Significant aspects of one’s identity are collectively determined within a culture. Cultures are not static, and their development is particularly affected by political boundaries. A fundamental right of autonomy implies, therefore, that groups be allowed, within reasonable constraints of general feasibility and stability, to arrange

  16. Spiritual Exchange in Pluralistic Contexts: Sharing Narratives across Worldview Differences

    Science.gov (United States)

    Rockenbach, Alyssa Bryant; Bachenheimer, Aaron; Conley, Abigail Holland; Grays, Shaefny

    2014-01-01

    Grounded in narrative inquiry, this study explored the ways in which graduate and undergraduate students representing different worldview identities come together in dyads to share stories that reflect their existential and spiritual development. The study revealed two contrasting types of exchange: (1) deep, personal exchanges that involved a…

  17. Motives for secondary social sharing of emotions.

    Science.gov (United States)

    Christophe, Véronique; Delelis, Gérald; Antoine, Pascal; Nandrino, Jean-Louis

    2008-08-01

    This study provides new evidence of motives of secondary social sharing of emotions. In a retrospective study, 140 female (Mage = 29.4 yr., SD=12.8) and 116 male (M = 29.5 yr., SD = 13.1) participants were asked to recall a recent situation in which they had talked to a third person about a positive or negative, low or high intensity emotional narrative they had heard. 70% of the respondents reported having secondarily shared the reported event rapidly after the narration with several persons and at several times. Moreover, they not only described the event, the speaker's reaction and their own reactions, but also revealed the identity of their first confidant. Participants reported having spread the emotional narrative more widely in the high negative condition in order to seek emotional support and social comparison.

  18. Ethnicity, Alienation, Identity: Themes in Hispanic Minority Fiction.

    Science.gov (United States)

    Lewis, Marvin A.

    This paper presents a thematic examination of three novels by Hispanic minority writers. In their assessment of the human condition, Chicano, Puerto Rican, and Cuban exile writers share many concerns. Among them are the problems of ethnicity, alienation, and identity. These preoccupations are manifested primarily through character portrayal in…

  19. Youth negotiation and performance of masculine identities in rural Estonia

    NARCIS (Netherlands)

    Trell, Elen; van Hoven, Bettina; Huigen, Paulus

    2014-01-01

    This paper explores key shared places and practices through which young men in rural Estonia perform and construct masculine identities. Whereas powerful images of rural places and rural masculinity exist and are reproduced in public discourse in Estonia, not much is known about how masculinities

  20. Identity Management and Trust Services: Foundations for Cloud Computing

    Science.gov (United States)

    Suess, Jack; Morooney, Kevin

    2009-01-01

    Increasingly, IT organizations will move from providing IT services locally to becoming an integrator of IT services--some provided locally and others provided outside the institution. As a result, institutions must immediately begin to plan for shared services and must understand the essential role that identity management and trust services play…

  1. Information Sharing and Knowledge Sharing as Communicative Activities

    Science.gov (United States)

    Savolainen, Reijo

    2017-01-01

    Introduction: This paper elaborates the picture of information sharing and knowledge sharing as forms of communicative activity. Method: A conceptual analysis was made to find out how researchers have approached information sharing and knowledge sharing from the perspectives of transmission and ritual. The findings are based on the analysis of one…

  2. Shared Care in Diabetes?

    DEFF Research Database (Denmark)

    Bødker, Keld

    2006-01-01

    The Danish National Board of Health has recently released a report that is intended to mark the start of a new project to establish it support for shared care in diabetes. In this paper I raise a number of concerns where lack of attention towards participation from prospective users constitute...

  3. Sharing (and) familiarities

    DEFF Research Database (Denmark)

    Rasmussen, Jon Dag; Winther, Ida Wentzel; Davies, Hayley

    but not exclusive to lifestories/biographies, travels, times, spaces and material items, bodies and intimate knowledge of one another, surnames - in the subjective lives of family members? Sociology has traditionally been preoccupied with notions and logics of sharing in homely contexts (e.g. Simmel’s work...

  4. The Sharing Economy

    DEFF Research Database (Denmark)

    Hamari, Juho; Sjöklint, Mimmi; Ukkonen, Antti

    2016-01-01

    Information and communications technologies (ICTs) have enabled the rise of so-called “Collaborative Consumption” (CC): the peer-to-peer-based activity of obtaining, giving, or sharing the access to goods and services, coordinated through community-based online services. CC has been expected to a...

  5. Shared goals and development

    DEFF Research Database (Denmark)

    Blomberg, Olle

    2015-01-01

    undemanding for children to engage in, and therefore has the potential to play a part in fostering their understanding of other minds. Part of the functional role of shared goals is to enable agents to choose means that are appropriate to realising a goal with others rather than individually. By offering...

  6. Identity Entrepreneurship and the Consequences of Identity Failure: The Dynamics of Leadership in the BBC Prison Study

    Science.gov (United States)

    Haslam, S. Alexander; Reicher, Stephen

    2007-01-01

    The BBC Prison Study was an experimental case study in which participants were randomly assigned to groups as prisoners or guards. This paper examines the impact of interventions designed to increase prisoners' sense of shared social identity on processes of leadership. It presents psychometric, behavioral, and observational data which support the…

  7. Constructing nurses' professional identity through social identity theory.

    Science.gov (United States)

    Willetts, Georgina; Clarke, David

    2014-04-01

    The profession of nursing continues to struggle with defining and clarifying its professional identity. The definitive recognition of nursing as a profession was the moving of training from the hospital apprentice model to the tertiary sector. However, this is only part of the story of professional identity in nursing. Once training finishes and enculturation into the workplace commences, professional identity becomes a complicated social activity. This paper proposes social identity theory as a valuable research framework to assist with clarifying and describing the professional identity of nurses. The paper outlines the key elements of a profession and then goes on to describe the main concepts of social identity theory. Lastly, a connection is made between the usefulness of using social identity theory in researching professional identity in nursing, recognizing the contextual nature of the social activity of the profession within its workplace environment. © 2013 Wiley Publishing Asia Pty Ltd.

  8. The evolution of extreme cooperation via shared dysphoric experiences.

    Science.gov (United States)

    Whitehouse, Harvey; Jong, Jonathan; Buhrmester, Michael D; Gómez, Ángel; Bastian, Brock; Kavanagh, Christopher M; Newson, Martha; Matthews, Miriam; Lanman, Jonathan A; McKay, Ryan; Gavrilets, Sergey

    2017-03-14

    Willingness to lay down one's life for a group of non-kin, well documented historically and ethnographically, represents an evolutionary puzzle. Building on research in social psychology, we develop a mathematical model showing how conditioning cooperation on previous shared experience can allow individually costly pro-group behavior to evolve. The model generates a series of predictions that we then test empirically in a range of special sample populations (including military veterans, college fraternity/sorority members, football fans, martial arts practitioners, and twins). Our empirical results show that sharing painful experiences produces "identity fusion" - a visceral sense of oneness - which in turn can motivate self-sacrifice, including willingness to fight and die for the group. Practically, our account of how shared dysphoric experiences produce identity fusion helps us better understand such pressing social issues as suicide terrorism, holy wars, sectarian violence, gang-related violence, and other forms of intergroup conflict.

  9. Social Identification in Sports Teams: The Role of Personal, Social, and Collective Identity Motives.

    Science.gov (United States)

    Thomas, William E; Brown, Rupert; Easterbrook, Matthew J; Vignoles, Vivian L; Manzi, Claudia; D'Angelo, Chiara; Holt, Jeremy J

    2017-04-01

    Based on motivated identity construction theory (MICT; Vignoles, 2011), we offer an integrative approach examining the combined roles of six identity motives (self-esteem, distinctiveness, belonging, meaning, continuity, and efficacy) instantiated at three different motivational levels (personal, social, and collective identity) as predictors of group identification. These identity processes were investigated among 369 members of 45 sports teams from England and Italy in a longitudinal study over 6 months with four time points. Multilevel change modeling and cross-lagged analyses showed that satisfaction of four personal identity motives (individuals' personal feelings of self-esteem, distinctiveness, meaning, and efficacy derived from team membership), three social identity motives (individuals' feelings that the team identity carries a sense of belonging, meaning, and continuity), and one collective identity motive (a shared belief in group distinctiveness) significantly predicted group identification. Motivational processes underlying group identification are complex, multilayered, and not reducible to personal needs.

  10. Scripting Professional Identities

    DEFF Research Database (Denmark)

    Bévort, Frans; Suddaby, Roy

    2016-01-01

    on a longitudinal ethnography of professionals in a Big Four accounting firm we analyse the process by which individual professionals make sense of their new roles and integrate the conflicting demands of professional and managerial logics. We find that individuals are active authors of their own identity scripts......This article examines how individual accountants subjectively interpret competing logics of professionalism as they transform from practicing accountants to managerial roles and as their organizations transform from traditional professional partnerships to more corporate organizational forms. Based....... We further observe considerable interpretive variation in how identity scripts are reproduced and enacted. We contribute to the emerging understanding of institutions as ‘inhabited’ by individuals and extend this literature by demonstrating that the institutional work of reinterpreting competing...

  11. LITERATURE AND IDENTITY

    Directory of Open Access Journals (Sweden)

    Dragana Litričin Dunić

    2015-04-01

    Full Text Available Literature can represent, on the one hand, the establishment of cultural and national identity, and, on the other hand, a constant indicator of the differences. Self-image and the image of the Other in literature is very important not only for understanding national character and preservation of cultural identity, but also for the release from ideological reading and stereotyping. Analyzing the image of the Other, research into the representation of the Balkans symbolically represents in the popular literature of the West, study of the cultural context and the processes that formed the writer’s perceptions that determine the establishment of stereotypes about Homo Balcanicus and many others, are all important tasks of imagological research, as well as the key research tasks conducted nowadays. In this paper we shall discuss some of these issues in the field of comparative literature.

  12. A general integral identity

    Energy Technology Data Exchange (ETDEWEB)

    Glasser, M L, E-mail: laryg@clarkson.edu [Department of Physics, Clarkson University, Potsdam, NY 13699-5820 (United States); Departamento de Fisica Teorica, Atomica y Optica, Universidad de Valladolid, Valladolid 470071 (Spain)

    2011-06-03

    The identity {integral}{sub 0}{sup {pi}/2}d{Phi}{integral}{sub 0}{sup {pi}/2}d{Theta} sin{Phi} F(x sn{Phi} sin{Phi})={pi}/2 {integral}{sub 0}{sup 1}F(xt)dt, where F is any function, is derived. Several extensions are given and a few examples of physical interest are described.

  13. Identity, History, Tolerance

    Directory of Open Access Journals (Sweden)

    Surovtsev V.A.

    2016-01-01

    Full Text Available The article discusses the role of historical narratives in the formation of identity. Rüsen’s thesis on the contradiction of traditional historical identities that suggest an ethnocentric position with the processes of intercultural communication is analyzed. The potential of historical narratives in overcoming (or restricting ethnocentrism is considered. It is shown that ethnocentrism is constituted by kinds of the configuration of historical writing rather than by a subjective position of historical narrative authors. The types of stories suggest a the way of making history using only the criteria of success and failure in the interpretation of the past; b interpretation of history as teleological continuity; c merely the necessity to justify (to substantiate claims or to discredit something. It is alleged that the realization that the form of historical knowledge constructs, not discovers, can facilitate liberation from referential fallacy on the whole and enslavement by certain kinds of stories in particular. It is concluded that the recognition of the constitutive nature of historical narratives allows being independent from the traditional forms of historical knowledge and traditional ideas about their cultural value. In particular, it allows reconsidering the need to apply historical knowledge when constructing identity.

  14. Identity Styles and Religiosity: Examining the Role of Identity Commitment

    Science.gov (United States)

    Grajales, Tevni E.; Sommers, Brittany

    2016-01-01

    This study observed the role of identity styles, identity commitment, and identity statuses in predicting religiosity in a sample of undergraduate students attending a Seventh-day Adventist university (N = 138). Two structural models were evaluated via path analysis. Results revealed two strong models for the prediction of religiosity. Identity…

  15. Images and Identity: Children Constructing a Sense of Belonging to Europe

    Science.gov (United States)

    Healy, Mary; Richardson, Mary

    2017-01-01

    The European Framework for Key Competences (2006) promotes a shared European identity as a priority for assuring a cohesive future for the European Union (EU), yet the development of a discrete European identity remains acutely contentious, with critics claiming it is too shallow to support the bonds of solidarity needed to engender and support a…

  16. Entrepreneurship Education as Identity Workspace

    DEFF Research Database (Denmark)

    Frederiksen, Signe Hedeboe

    2016-01-01

    Entrepreneurship education theory and practice show increasing interest in identity work as an important part of entrepreneurial learning. Entrepreneurship programs become identity workspaces where pedagogical designs stimulate entrepreneurial identity work and support individuals’ discovery...... of themselves as entrepreneurs. This article investigates how entrepreneurship education is practiced as an identity workspace, when reflective identity work is turned into a pedagogical strategy for entrepreneurial learning. I present empirical data from a qualitative fieldstudy in an eleven week mandatory...... and identities. Exposed to identity work practices in class, learners experienced conflicting demands participating as succesful students and participating as potential entrepreneurs. The study draws attention to how an education setting contextualises identity work as a social practice. It critisises...

  17. Sharing data increases citations

    DEFF Research Database (Denmark)

    Drachen, Thea Marie; Ellegaard, Ole; Larsen, Asger Væring

    2016-01-01

    This paper presents some indications to the existence of a citation advantage related to sharing data using astrophysics as a case. Through bibliometric analyses we find a citation advantage for astrophysical papers in core journals. The advantage arises as indexed papers are associated with data...... by bibliographical links, and consists of papers receiving on average significantly more citations per paper per year, than do papers not associated with links to data.......This paper presents some indications to the existence of a citation advantage related to sharing data using astrophysics as a case. Through bibliometric analyses we find a citation advantage for astrophysical papers in core journals. The advantage arises as indexed papers are associated with data...

  18. Does Knowledge Sharing Pay?

    DEFF Research Database (Denmark)

    Mahnke, Volker; Pedersen, Torben; Venzin, Markus

    are developed using a simultaneous equation model applied to a unique dataset encompassing a German MNC, HeidelbergCement. Enablers and impediments of knowledge outflows are assessed in order to explain why subsidiaries share their knowledge with other MNC units. Implications are examined by studying the link......This empirical paper explores knowledge outflow from MNC subsidiaries and its impact on the MNC performance. We develop and test hypotheses derived from literature on MNC knowledge flows integrated with the perspective of knowledge-creating, self-interested MNC subsidiaries. The hypotheses...... between knowledge outflows and subsidiary performance. Our findings suggest that knowledge outflows increase a subsidiary's performance only up to a certain point and that too much knowledge sharing may be detrimental to the contributing subsidiary's performance....

  19. Globalization and Risk Sharing

    OpenAIRE

    Jaume Ventura; Fernando A. Broner

    2006-01-01

    We study the effects of globalization on risk sharing and welfare. Like the previous literature, we assume that governments cannot commit to enforce the repayment of debts owed by their citizens. Unlike the previous literature, we assume that governments cannot discriminate between domestic and foreign creditors when enforcing debt payments. This creates novel interactions between domestic and international trade in assets. (i) Increases in domestic trade raise the benefits of enforcement and...

  20. Decreasing Serial Cost Sharing

    DEFF Research Database (Denmark)

    Hougaard, Jens Leth; Østerdal, Lars Peter

    The increasing serial cost sharing rule of Moulin and Shenker [Econometrica 60 (1992) 1009] and the decreasing serial rule of de Frutos [Journal of Economic Theory 79 (1998) 245] have attracted attention due to their intuitive appeal and striking incentive properties. An axiomatic characterization...... of the increasing serial rule was provided by Moulin and Shenker [Journal of Economic Theory 64 (1994) 178]. This paper gives an axiomatic characterization of the decreasing serial rule...

  1. Decreasing serial cost sharing

    DEFF Research Database (Denmark)

    Hougaard, Jens Leth; Østerdal, Lars Peter Raahave

    2009-01-01

    The increasing serial cost sharing rule of Moulin and Shenker (Econometrica 60:1009-1037, 1992) and the decreasing serial rule of de Frutos (J Econ Theory 79:245-275, 1998) are known by their intuitive appeal and striking incentive properties. An axiomatic characterization of the increasing serial...... rule was provided by Moulin and Shenker (J Econ Theory 64:178-201, 1994). This paper gives an axiomatic characterization of the decreasing serial rule....

  2. An 'open source' networked identity

    DEFF Research Database (Denmark)

    Larsen, Malene Charlotte

    2013-01-01

    This paper examines the concept of identity in relation to youth practices on social network sites (SNS). The paper illustrates how writing “I love you” or other emotional statements on each other’s profiles on SNS is not only a common way for Danish teenagers to communicate and practice friendship...... communicative actions – are not only performing their own identity, but are becoming co-constructors of each other's identities, which the author characterizes as an 'open source' networked identity....

  3. Social Identity and Group Contests

    OpenAIRE

    Zaunbrecher, Henrik; Riedl, Arno

    2016-01-01

    Social identity has been shown to successfully enhance cooperation and effort in cooperation and coordination games. Little is known about the causal effect of social identity on the propensity to engage in group conflict. In this paper we explore theoretically and experimentally whether social identity increases investments in group contests. We show theoretically that increased social identity with the own group implies higher investments in Tullock contests. Empirically we find that induce...

  4. Social identity process within organizations

    OpenAIRE

    Bazarov, Takhir; Kuzmina, Maria

    2005-01-01

    Expanding and complex social realities cause new types of identity. Variety in organizations and workgroups (where people are involved), implies a special kind of social identity which can be defined as professional, organizational or managerial. The study of the social identity processes in organizations is a new interdisciplinary sphere that is presented especially commonly in European Social Psychology. The result of its theoretical comprehension is Social Identity Theory. In the article l...

  5. John locke on personal identity.

    Science.gov (United States)

    Nimbalkar, Namita

    2011-01-01

    John Locke speaks of personal identity and survival of consciousness after death. A criterion of personal identity through time is given. Such a criterion specifies, insofar as that is possible, the necessary and sufficient conditions for the survival of persons. John Locke holds that personal identity is a matter of psychological continuity. He considered personal identity (or the self) to be founded on consciousness (viz. memory), and not on the substance of either the soul or the body.

  6. John Locke on Personal Identity**

    OpenAIRE

    Nimbalkar, Namita

    2011-01-01

    John Locke speaks of personal identity and survival of consciousness after death. A criterion of personal identity through time is given. Such a criterion specifies, insofar as that is possible, the necessary and sufficient conditions for the survival of persons. John Locke holds that personal identity is a matter of psychological continuity. He considered personal identity (or the self) to be founded on consciousness (viz. memory), and not on the substance of either the soul or the body.

  7. Towards A Shared Mission

    DEFF Research Database (Denmark)

    Staunstrup, Jørgen; Orth Gaarn-Larsen, Carsten

    A mission shared by stakeholders, management and employees is a prerequisite for an engaging dialog about the many and substantial changes and challenges currently facing universities. Too often this essen-tial dialog reveals mistrust and misunderstandings about the role and outcome of the univer......A mission shared by stakeholders, management and employees is a prerequisite for an engaging dialog about the many and substantial changes and challenges currently facing universities. Too often this essen-tial dialog reveals mistrust and misunderstandings about the role and outcome...... on a shared mission aiming at value creation (in the broadest interpretation). One important aspect of choosing value as the cornerstone of the mission of universities is to stress that the outcome is measured by external stakeholders and by their standards. Most of the paper is devoted to discussing value...... it possible to lead through processes that engage and excite while creating transparency and accountability. The paper will be illustrated with examples from Denmark and the Helios initiative taken by the Danish Academy of Technical Sciences (ATV) under the headline “The value creating university – courage...

  8. Bonobos share with strangers.

    Directory of Open Access Journals (Sweden)

    Jingzhi Tan

    Full Text Available Humans are thought to possess a unique proclivity to share with others--including strangers. This puzzling phenomenon has led many to suggest that sharing with strangers originates from human-unique language, social norms, warfare and/or cooperative breeding. However, bonobos, our closest living relative, are highly tolerant and, in the wild, are capable of having affiliative interactions with strangers. In four experiments, we therefore examined whether bonobos will voluntarily donate food to strangers. We show that bonobos will forego their own food for the benefit of interacting with a stranger. Their prosociality is in part driven by unselfish motivation, because bonobos will even help strangers acquire out-of-reach food when no desirable social interaction is possible. However, this prosociality has its limitations because bonobos will not donate food in their possession when a social interaction is not possible. These results indicate that other-regarding preferences toward strangers are not uniquely human. Moreover, language, social norms, warfare and cooperative breeding are unnecessary for the evolution of xenophilic sharing. Instead, we propose that prosociality toward strangers initially evolves due to selection for social tolerance, allowing the expansion of individual social networks. Human social norms and language may subsequently extend this ape-like social preference to the most costly contexts.

  9. Sharing resources@CERN

    CERN Multimedia

    2002-01-01

    The library is launching a 'sharing resources@CERN' campaign, aiming to increase the library's utility by including the thousands of books bought by individual groups at CERN. This will improve sharing of information among CERN staff and users. Until now many people were unaware that copies of the same book (or standard, or journal) are often held not only by the library but by different divisions. (Here Eduardo Aldaz, from the PS division, and Isabel Bejar, from the ST division, read their divisional copies of the same book.) The idea behind the library's new sharing resources@CERN' initiative is not at all to collect the books in individual collections at the CERN library, but simply to register them in the Library database. Those not belonging to the library will in principle be unavailable for loan, but should be able to be consulted by anybody at CERN who is interested. "When you need a book urgently and it is not available in the library,' said PS Division engineer Eduardo Aldaz Carroll, it is a sham...

  10. Identity Development in Deaf Adolescents

    Science.gov (United States)

    Kunnen, E. Saskia

    2014-01-01

    We studied identity development during 5 years in seven deaf adolescents who attended a school for deaf children in the highest level of regular secondary education (age between 14 and 18 years), administering identity interviews every year. Identity development is conceptualized as the processes of exploration and commitment formation (Bosma,…

  11. Queering Black Racial Identity Development

    Science.gov (United States)

    Johnson, Alandis A.; Quaye, Stephen John

    2017-01-01

    We used queer theory to encourage readers to think differently about previous theories about Black racial identity development. Queer theory facilitates new and deeper understandings of how Black people develop their racial identities, prompting more fluidity and nuance. Specifically, we present a queered model of Black racial identity development…

  12. Social Identity Simulation System (SISTEM)

    Science.gov (United States)

    2014-03-31

    Report Individuation Individuation refers to when an individual attempts to preserve self-esteem by psychologically separating oneself from a...its expected costs. The following subsections describe various strategies of social identity entrepreneurship in more detail. Calling for...Haslam, S. A., & Reicher, S. (2007). Identity Entrepreneurship and the consequences of identity failure: the dynamics of leadership in the BBC prison

  13. Identity theft and your practice.

    Science.gov (United States)

    Asbell, Lisa

    2010-01-01

    Medical identity theft is a growing problem in America. The federal government has passed laws to help "prevent" identity theft. However, several powerful medical associations are fighting the legislation. Americans need to know what is happening with these laws and why these laws are important to protect providers from lawsuits and consumers of healthcare from medical identity theft.

  14. Social identity change: shifts in social identity during adolescence.

    Science.gov (United States)

    Tanti, Chris; Stukas, Arthur A; Halloran, Michael J; Foddy, Margaret

    2011-06-01

    This study investigated the proposition that adolescence involves significant shifts in social identity as a function of changes in social context and cognitive style. Using an experimental design, we primed either peer or gender identity with a sample of 380 early- (12-13 years), mid- (15-16 years), and late-adolescents (18-20 years) and then measured the effect of the prime on self-stereotyping and ingroup favouritism. The findings showed significant differences in social identity across adolescent groups, in that social identity effects were relatively strong in early- and late-adolescents, particularly when peer group identity rather than gender identity was salient. While these effects were consistent with the experience of change in educational social context, differences in cognitive style were only weakly related to ingroup favouritism. The implications of the findings for theory and future research on social identity during adolescence are discussed. Crown Copyright © 2010. Published by Elsevier Ltd. All rights reserved.

  15. Mistaken identity: activating conservative political identities induces "conservative" financial decisions.

    Science.gov (United States)

    Morris, Michael W; Carranza, Erica; Fox, Craig R

    2008-11-01

    Four studies investigated whether activating a social identity can lead group members to choose options that are labeled in words associated with that identity. When political identities were made salient, Republicans (but not Democrats) became more likely to choose the gamble or investment option labeled "conservative." This shift did not occur in a condition in which the same options were unlabeled. Thus, the mechanism underlying the effect appears to be not activated identity-related values prioritizing low risk, but rather activated identity-related language (the group label "conservative"). Indeed, when political identities were salient, Republicans favored options labeled "conservative" regardless of whether the options were low or high risk. Finally, requiring participants to explain the label "conservative" before making their choice did not diminish the effect, which suggests that it does not merely reflect inattention to content or construct accessibility. We discuss the implications of these results for the literatures on identity, priming, choice, politics, and marketing.

  16. Keeping identity private

    DEFF Research Database (Denmark)

    Adjei, Joseph K.; Olesen, Henning

    2011-01-01

    information. On the other hand, consumers have expressed concerns that their rights and ability to control their personal information are violated. Paradoxically, it appears that users provide personal data freely and willingly, as it has been observed on Facebook and other social networks. This study...... is an attempt to understand the relationship between individuals’ intentions to disclose personal information, their actual personal information disclosure behaviours, and how these can be leveraged to develop privacy-enhancing identity management systems (IDMS) that users can trust. Legal, regu...

  17. Identities at Odds

    DEFF Research Database (Denmark)

    Hazel, Spencer

    2015-01-01

    This study offers an interaction analytic account of how linguistic identities in internationalized workplaces in Denmark are indexed against members’ institutional positions in particular interactional settings. Where language policy may not be explicitly articulated between members, it is still....... The study uses recordings of naturally occurring interaction in different international workplace settings, and argues for greater attention to be paid to the actual language-policy practices in international workplace settings, as a entry point into developing a more nuanced understanding of the practices...

  18. Digital identity management

    CERN Document Server

    Laurent, Maryline

    2015-01-01

    In the past four decades, information technology has altered chains of value production, distribution, and information access at a significant rate. These changes, although they have shaken up numerous economic models, have so far not radically challenged the bases of our society.This book addresses our current progress and viewpoints on digital identity management in different fields (social networks, cloud computing, Internet of Things (IoT)), with input from experts in computer science, law, economics and sociology. Within this multidisciplinary and scientific context, having crossed analys

  19. Identity Management A Primer

    CERN Document Server

    Sharoni, Ilan; Williamson, Graham; Yip, David

    2009-01-01

    In an age in which the boundaries between the real and the virtual are becoming increasingly blurred, this timely guide teaches both the key issues of identity management as well as appropriate strategies and preventative measures for ensuring personal safety in the virtual world. In a corporate setting, it is essential to identify and control the way in which the organization deals with customers, suppliers, employees, and other users who may interact with the information systems of the company. Providing strategies for overcoming this task in real-world terms as well as questions that assist

  20. Identities in Migration

    Directory of Open Access Journals (Sweden)

    Montserrat Clua i Fainé

    2017-08-01

    Full Text Available Young Catalans in London build their identity as immigrants in a close dialectic between their own imaginary about immigration in their country of origin and British perceptions of them. Given the negative stigma attached to the category of «immigrant», not all recognise themselves as such. Some simply refuse to acknowledge they belong to this category, while others use the projection of prejudices on immigrants towards Spaniards as a strategy from which they distance themselves by establishing a distinction between Catalans and Spaniards.

  1. An Effective Grouping Method for Privacy-Preserving Bike Sharing Data Publishing

    Directory of Open Access Journals (Sweden)

    A S M Touhidul Hasan

    2017-10-01

    Full Text Available Bike sharing programs are eco-friendly transportation systems that are widespread in smart city environments. In this paper, we study the problem of privacy-preserving bike sharing microdata publishing. Bike sharing systems collect visiting information along with user identity and make it public by removing the user identity. Even after excluding user identification, the published bike sharing dataset will not be protected against privacy disclosure risks. An adversary may arrange published datasets based on bike’s visiting information to breach a user’s privacy. In this paper, we propose a grouping based anonymization method to protect published bike sharing dataset from linking attacks. The proposed Grouping method ensures that the published bike sharing microdata will be protected from disclosure risks. Experimental results show that our approach can protect user privacy in the released datasets from disclosure risks and can keep more data utility compared with existing methods.

  2. Identity style and coping strategies.

    Science.gov (United States)

    Berzonsky, M D

    1992-12-01

    This study examined the relationship between identity style and strategies used to cope with stressors that potentially threaten one's sense of identity. Identity style refers to differences in the way individuals construct and revise or maintain their sense of identity. An informational style involves actively seeking out, evaluating, and utilizing self-relevant information. A normative style highlights the expectations and standards of significant others. A diffuse/avoidant style is characterized by procrastination and situation-specific reactions. Late-adolescent college subjects were administered measures of identity style, ways of coping with academic stressors, and test anxiety. Within this self-as-student context, subjects with diffuse and normative identity styles employed avoidant-oriented coping strategies (wishful thinking, distancing, and tension reduction). An informational style was associated with deliberate, problem-focused coping. Findings are discussed in terms of a process model of identity development.

  3. Identity and the Management Project

    DEFF Research Database (Denmark)

    Jørgensen, Kenneth Mølbjerg; Dehlin, Erlend

    The paper discusses the concept of identity in relation to management. We take our starting point in Wittgenstein’s concept language games. We argue that identity is a question of using linguistic tools to construct reality. Two elements of the language game metaphor are central here: rules...... and family resemblance. As such, managing identity in organizations is closely linked to rules and family resemblance. Organizations manage identity through the definition of norms and values for right or wrong, appropriate or inappropriate, to name but a few. Norms and values are important as reference...... points for constructing identities. Managing identity has become more important because the rules-of-the-game have become more unstable. Managing identity is important if the bonds between individuals and organizations are to be sustained. But this task is contradictory and paradoxical of its very nature...

  4. Online Identities and Social Networking

    Science.gov (United States)

    Maheswaran, Muthucumaru; Ali, Bader; Ozguven, Hatice; Lord, Julien

    Online identities play a critical role in the social web that is taking shape on the Internet. Despite many technical proposals for creating and managing online identities, none has received widespread acceptance. Design and implementation of online identities that are socially acceptable on the Internet remains an open problem. This chapter discusses the interplay between online identities and social networking. Online social networks (OSNs) are growing at a rapid pace and has millions of members in them. While the recent trend is to create explicit OSNs such as Facebook and MySpace, we also have implicit OSNs such as interaction graphs created by email and instant messaging services. Explicit OSNs allow users to create profiles and use them to project their identities on the web. There are many interesting identity related issues in the context of social networking including how OSNs help and hinder the definition of online identities.

  5. Fixed Access Network Sharing

    Science.gov (United States)

    Cornaglia, Bruno; Young, Gavin; Marchetta, Antonio

    2015-12-01

    Fixed broadband network deployments are moving inexorably to the use of Next Generation Access (NGA) technologies and architectures. These NGA deployments involve building fiber infrastructure increasingly closer to the customer in order to increase the proportion of fiber on the customer's access connection (Fibre-To-The-Home/Building/Door/Cabinet… i.e. FTTx). This increases the speed of services that can be sold and will be increasingly required to meet the demands of new generations of video services as we evolve from HDTV to "Ultra-HD TV" with 4k and 8k lines of video resolution. However, building fiber access networks is a costly endeavor. It requires significant capital in order to cover any significant geographic coverage. Hence many companies are forming partnerships and joint-ventures in order to share the NGA network construction costs. One form of such a partnership involves two companies agreeing to each build to cover a certain geographic area and then "cross-selling" NGA products to each other in order to access customers within their partner's footprint (NGA coverage area). This is tantamount to a bi-lateral wholesale partnership. The concept of Fixed Access Network Sharing (FANS) is to address the possibility of sharing infrastructure with a high degree of flexibility for all network operators involved. By providing greater configuration control over the NGA network infrastructure, the service provider has a greater ability to define the network and hence to define their product capabilities at the active layer. This gives the service provider partners greater product development autonomy plus the ability to differentiate from each other at the active network layer.

  6. The science of sharing and the sharing of science

    OpenAIRE

    Milkman, Katherine L.; Berger, Jonah

    2014-01-01

    Why do members of the public share some scientific findings and not others? What can scientists do to increase the chances that their findings will be shared widely among nonscientists? To address these questions, we integrate past research on the psychological drivers of interpersonal communication with a study examining the sharing of hundreds of recent scientific discoveries. Our findings offer insights into (i) how attributes of a discovery and the way it is described impact sharing, (ii)...

  7. Shared Oral Care

    DEFF Research Database (Denmark)

    Hede, Børge; Elmelund Poulsen,, Johan; Christophersen, Rasmus

    2014-01-01

    Shared Oral Care - Forebyggelse af orale sygdomme på plejecentre Introduktion og formål: Mangelfuld mundhygiejne hos plejekrævende ældre er et alment og veldokumenteret sundhedsproblem, der kan føre til massiv udvikling af tandsygdomme, og som yderligere kan være medvirkende årsag til alvorlige...... ressourceanvendelse er muligt at skabe en betydeligt forbedret mundhygiejne hos plejekrævende ældre Key words: Geriatric dentistry, nursing home, community health services, prevention, situated learning...

  8. Socially Shared Health Information

    DEFF Research Database (Denmark)

    Hansen, Kjeld S.

    2018-01-01

    In this PhD project, I'm investigating how health organizations are sharing health information on social media. My PhD project is divided into two parts, but in this paper, I will only focus on the first part: To understand current practices of how health organizations engage with health...... information and users on social media (empirical studies 1,2,3) and to develop a theoretical model for how it is done efficiently and effectively. I have currently conducted and published on two empirical studies (1,2). I am in the process of collecting data for a revised version of empirical study (2...

  9. Shared decision-making.

    Science.gov (United States)

    Godolphin, William

    2009-01-01

    Shared decision-making has been called the crux of patient-centred care and identified as a key part of change for improved quality and safety in healthcare. However, it rarely happens, is hard to do and is not taught - for many reasons. Talking with patients about options is not embedded in the attitudes or communication skills training of most healthcare professionals. Information tools such as patient decision aids, personal health records and the Internet will help to shift this state, as will policy that drives patient and public involvement in healthcare delivery and training.

  10. Sharing Keynote Slideshows

    CERN Document Server

    Clark, Josh

    2010-01-01

    Slideshows have come a long way since overhead projectors were your only option. You can show share your ideas with the world via email, DVD, PDF, YouTube, iPhone, or kiosk. Once your show is polished to perfection, this thorough, accessible guide shows you how to export and deliver it all possible ways-even as a PowerPoint file, QuickTime movie, or web site. As a bonus, you'll find advice on setting up your equipment and delivering an effective presentation.

  11. Shared consultant physician posts.

    LENUS (Irish Health Repository)

    Cooke, J

    2012-01-31

    Our aim was to assess the acceptability and cost-efficiency of shared consultancy posts. Two consultant physicians worked alternate fortnights for a period of twelve months. Questionnaires were distributed to general practitioners, nurses, consultants and junior doctors affected by the arrangement. Patients or their next of kin were contacted by telephone. 1\\/17 of consultants described the experience as negative. 14\\/19 junior doctors reported a positive experience. 11 felt that training had been improved while 2 felt that it had been adversely affected. 17\\/17 GPs were satisfied with the arrangement. 1\\/86 nurses surveyed reported a negative experience. 1\\/48 patients were unhappy with the arrangement. An extra 2.2 (p<0.001) patients were seen per clinic. Length of stay was shortened by 2.49 days (p<0.001). A saving of 69,212 was made due to decreased locum requirements. We present data suggesting structured shared consultancy posts can be broadly acceptable and cost efficient in Ireland.

  12. Reconceptualising Shared Services

    Directory of Open Access Journals (Sweden)

    Peter McKinlay

    2011-12-01

    Full Text Available Endeavours to improve the efficiency and effectiveness of local government have been a persistent theme both of politicians in higher tiers of government and of interest groups, especially business. The two contenders for improvement which receive most coverage both in the research literature and in popular discussion are amalgamation and shared services. Arguments from the literature have generally favoured shared services over amalgamation. Bish (2001 in a comprehensive review of North American research dismisses the argument for amalgamation as a product of flawed nineteenth-century thinking and a bureaucratic urge for centralized control. He does so making the very reasonable point that the presumed economies of scale which will result from amalgamation are a function not of the size and scale of individual local authorities, but of the services for which those local authorities are responsible, and the point at which economies of scale will be optimised will be very different for different services. The case against amalgamation is also reinforced by the absence of any significant post-facto evidence that amalgamation achieves either the promised savings or the anticipated efficiency gains (McKinlay 2006.

  13. Vaccines, our shared responsibility.

    Science.gov (United States)

    Pagliusi, Sonia; Jain, Rishabh; Suri, Rajinder Kumar

    2015-05-05

    The Developing Countries Vaccine Manufacturers' Network (DCVMN) held its fifteenth annual meeting from October 27-29, 2014, New Delhi, India. The DCVMN, together with the co-organizing institution Panacea Biotec, welcomed over 240 delegates representing high-profile governmental and nongovernmental global health organizations from 36 countries. Over the three-day meeting, attendees exchanged information about their efforts to achieve their shared goal of preventing death and disability from known and emerging infectious diseases. Special praise was extended to all stakeholders involved in the success of polio eradication in South East Asia and highlighted challenges in vaccine supply for measles-rubella immunization over the coming decades. Innovative vaccines and vaccine delivery technologies indicated creative solutions for achieving global immunization goals. Discussions were focused on three major themes including regulatory challenges for developing countries that may be overcome with better communication; global collaborations and partnerships for leveraging investments and enable uninterrupted supply of affordable and suitable vaccines; and leading innovation in vaccines difficult to develop, such as dengue, Chikungunya, typhoid-conjugated and EV71, and needle-free technologies that may speed up vaccine delivery. Moving further into the Decade of Vaccines, participants renewed their commitment to shared responsibility toward a world free of vaccine-preventable diseases. Copyright © 2015 The Authors. Published by Elsevier Ltd.. All rights reserved.

  14. Language Proficiency and Cultural Identity as Two Facets of the Acculturation Process

    Directory of Open Access Journals (Sweden)

    Kmiotek Łukasz

    2017-10-01

    Full Text Available This article describes a cross-cultural study comparing bicultural identity of first generation Poles and high school students in the Rhône Alpes region (France, as well as French language university students in Poland. Studies show that two components, language and identity, are related. This article intends to answer questions regarding the relationship between the migrant’s bicultural identity and language proficiency. Bilingualism is operationalized as (i listening comprehension and (ii bidirectional translation. The results do not confirm that there is a relation between bilingual skills and identification with shared French and Polish values. Cultural identity appears to be inversely related to country of residence: Polish identity is strongest amongst immigrant youth in France and French identity is strongest amongst Polish students of French language and culture. These identities run in opposite direction to language competencies. The results suggest internalization of one of the cultures' negative stereotypes towards the other or towards itself.

  15. VHA Data Sharing Agreement Repository

    Data.gov (United States)

    Department of Veterans Affairs — The VHA Data Sharing Agreement Repository serves as a centralized location to collect and report on agreements that share VHA data with entities outside of VA. It...

  16. Challenges in sharing information effectively

    DEFF Research Database (Denmark)

    Sonnenwald, Diane H.

    2006-01-01

    collaborating successfully, i.e., a deceptively false shared understanding had emerged. These incidents were analysed to discover what led to these unsuspected breakdowns in information sharing. Results. Unsuspected breakdowns in information sharing emerged when: differences in implementations of shared symbols......Introduction. The goal of information sharing is to change a person's image of the world and to develop a shared working understanding. It is an essential component of collaboration. This paper examines barriers to sharing information effectively in dynamic group work situations. Method. Three...... types of battlefield training simulations were observed and open-ended interviews with military personnel were conducted. Analysis. Observation notes and interview transcripts were analysed to identify incidents when group members erroneously believed they had shared information effectively and were...

  17. 'Everyone here wants everyone else to get better': The role of social identity in eating disorder recovery.

    Science.gov (United States)

    McNamara, Niamh; Parsons, Harriet

    2016-12-01

    Retention of a positively valued illness identity contributes to poor outcomes for individuals with eating disorders (EDs). Consequently, dis-identification from the illness identity and the adoption of a recovery identity are vital for successful recovery. While social identity processes have been shown to influence ED maintenance, their role in recovery is rarely considered. This study explores how a sense of shared identity helps individuals with EDs manage their condition and promotes recovery. Transcripts from 18 online support sessions involving 75 participants were thematically analysed. Our findings suggest that the illness identity initially operates as a social identity that forms the basis for connections with similar others. For those wishing to recover, identity-based support is then perceived to be more effective than that found outside the group. Online interactions also facilitate construction of a new shared recovery identity which promotes a shift from the illness identity as a primary source of definition and endorses group norms of illness disclosure and treatment engagement. While in the clinical literature, ED identity is seen as problematic and interventions are targeted at challenging an individual's self-concept, we suggest that interventions could instead harness identity resources to support a transition to a recovery identity. © 2016 The British Psychological Society.

  18. Identity at work: Exploring strategies for Identity Work

    Directory of Open Access Journals (Sweden)

    Byron G. Adams

    2012-01-01

    Full Text Available Orientation: This study explored strategies for identity work that are central to the negotiation and regulation of employee work identity.Research purpose: The main aim of this study was to explore employee narratives and identify the strategies available to them in the process of identity work, as they defined themselves at work.Motivation for the study: As there is a scarcity of research on identity work in South Africa, this study wanted to advance knowledge about identity work and the strategies used for regulating and negotiating an identity at work by exploring these constructs in this context.Research design, approach and method: A qualitative research process formed the basis for this study. Nineteen employees from a global manufacturing company participated in two semi-structured in-depth interviews. Grounded theory was applied to analyse and interpret the data.Main findings: Nine strategies for identity work were identified and categorised into four broad themes (personal philosophies; relationships; career management and negotiating balance.Practical/managerial implications: Employees followed various strategies for defining themselves at work and this may have some implications for employee work engagement and productivity.Contribution/value-add: This study expands on current theoretical knowledge of identity work, and provides insights into the strategies people use to regulate and negotiate their identities at work. 

  19. Swiss identity smells like chocolate: Social identity shapes olfactory judgments.

    Science.gov (United States)

    Coppin, Géraldine; Pool, Eva; Delplanque, Sylvain; Oud, Bastiaan; Margot, Christian; Sander, David; Van Bavel, Jay J

    2016-10-11

    There is extensive evidence that social identities can shape people's attitudes and behavior, but what about sensory judgments? We examined the possibility that social identity concerns may also shape the judgment of non-social properties-namely, olfactory judgment. In two experiments, we presented Swiss and non-Swiss participants with the odor of chocolate, for which Switzerland is world-famous, and a control odor (popcorn). Swiss participants primed with Swiss identity reported the odor of chocolate (but not popcorn) as more intense than non-Swiss participants (Experiments 1 and 2) and than Swiss participants primed with individual identity or not primed (Experiment 2). The self-reported intensity of chocolate smell tended to increase as identity accessibility increased-but only among Swiss participants (Experiment 1). These results suggest that identity priming can counter-act classic sensory habituation effects, allowing identity-relevant smells to maintain their intensity after repeated presentations. This suggests that social identity dynamically influences sensory judgment. We discuss the potential implications for models of social identity and chemosensory perception.

  20. Swiss identity smells like chocolate: Social identity shapes olfactory judgments

    Science.gov (United States)

    Coppin, Géraldine; Pool, Eva; Delplanque, Sylvain; Oud, Bastiaan; Margot, Christian; Sander, David; Van Bavel, Jay J.

    2016-01-01

    There is extensive evidence that social identities can shape people’s attitudes and behavior, but what about sensory judgments? We examined the possibility that social identity concerns may also shape the judgment of non-social properties—namely, olfactory judgment. In two experiments, we presented Swiss and non-Swiss participants with the odor of chocolate, for which Switzerland is world-famous, and a control odor (popcorn). Swiss participants primed with Swiss identity reported the odor of chocolate (but not popcorn) as more intense than non-Swiss participants (Experiments 1 and 2) and than Swiss participants primed with individual identity or not primed (Experiment 2). The self-reported intensity of chocolate smell tended to increase as identity accessibility increased—but only among Swiss participants (Experiment 1). These results suggest that identity priming can counter-act classic sensory habituation effects, allowing identity-relevant smells to maintain their intensity after repeated presentations. This suggests that social identity dynamically influences sensory judgment. We discuss the potential implications for models of social identity and chemosensory perception. PMID:27725715

  1. Job-Sharing the Principalship.

    Science.gov (United States)

    Brown, Shelley; Feltham, Wendy

    1997-01-01

    The coprincipals of a California elementary school share their ideas for building a successful job-sharing partnership. They suggest it is important to find the right partner, develop and present a job-sharing proposal, establish systems of communication with each other, evaluate one's progress, focus on the principalship, and provide leadership…

  2. School Nurses Share a Job.

    Science.gov (United States)

    Merwin, Elizabeth G.; Voss, Sondra

    1981-01-01

    Job sharing is a relatively new idea in which two or more people share the hours, the work, and the responsibilities of one job. Advantages and disadvantages to this situation are discussed in relation to the experiences of two nurses who shared a position as district nurse. (JN)

  3. Nostalgia and lost identity.

    Science.gov (United States)

    Pourtova, Elena

    2013-02-01

    Nostalgia for the Soviet Union is a major social phenomenon in Russia today due to the irrevocable losses of the recent past in which Soviet citizens involuntarily became immigrants in their own country. With reference to discussions of nostalgia in philosophical and psychoanalytic literature, I suggest that nostalgia may represent either a defensive regression to the past or a progressive striving for wholeness through re-connecting with what has been lost in the service of a greater integration. I compare this with the processes of adaptation seen in immigrants and provide a clinical illustration of a young man coming to terms with loss and change in the post-Soviet era. When nostalgia is recognized as a legitimate emotional experience it may facilitate mourning and enable the integration of the past with the present and the development of a new identity. © 2013, The Society of Analytical Psychology.

  4. Forging a Black identity

    Directory of Open Access Journals (Sweden)

    Barry Chevannes

    1992-07-01

    Full Text Available [First paragraph] The Rastafarians: sounds of cultural dissonance [revised and updated editionj. LEONARD E. BARRETT, SR. Boston: Beacon Press, 1988. xviii + 302 pp. (Paper US$ 11.95 Rasta and resistance: from Marcus Garvey to Walter Rodney. HORACE CAMPBELL. Trenton NJ: Africa World Press, 1987. xiii + 236 pp. (Cloth US$32.95, Paper US$ 10.95 Garvey's children: the legacy of Marcus Garvey. TONY SEWELL. London: Macmillan Caribbean, 1990. 128 pp. (Paper £ 17.95 The central theme linking these three titles is the evolution of a black identity among English-speaking Caribbean peoples, in particular Jamaicans. Consequently all three authors cover the two most important historical phenomena in Caribbean black nationalism, namely Garveyism and Rastafari, one focusing on the former and the other two focusing on the latter.

  5. National and Transnational Identities

    DEFF Research Database (Denmark)

    Jørgensen, Martin Bak

    within the Turkish minority in the three countries with special attention to the influence of transnational social transformation. Social communities and organisations such as trade unions, political parties or religious and cultural association have usually been ascribed the capability to enhance...... relations between individuals and to extend trust, values, identity and social belonging. Whether we focus on the individual and the value of face to face contact or we focus on the role of the organisation as an intervening institution between the state, the political system and the citizen...... in prolongation of the previous development. Conversely do the analyses of the Danish and German case show that models are not static. Denmark followed Sweden shortly after in introducing local voting rights for non-citizens and generally non-citizens enjoy considerable political, social and civic rights...

  6. Creation, Identity and Reflection

    Directory of Open Access Journals (Sweden)

    Alina Beatrice Cheşcă

    2015-05-01

    Full Text Available The paper “Creation, Identity and Reflection” approaches the identification in the “mirror” of reality with creation, in other words seeking the authors’ identity in the reflected images. Reflection means attempting to find oneself, the mirror being the main principle of creation. Many characters become interesting only when they step into the world beyond the mirror, when their faces are doubled by the other self or when their selves are returned by other characters. The narcissistic concept of the mirror, i.e. the reflection in the mirror and the representation of the mirror itself, is a recurrent one in literature, but the reflection of the self which is not the self (as it is a reflection does not necessarily appear in a mirror or in a photograph or portrait. Sometimes, the not-self is returned to the self by another person or character. As far as Oscar Wilde’s theories are concerned, the main idea is that people are interesting for their masks, not for their inner nature. What Wilde calls “inner nature” is the characters’ un-reflected self and the mask is the reflection, the self in the mirror. Some characters’ relationships develop within a fiction that they dramatically try to preserve and protect with the risk of suffering. They refuse to take off the masks which define them in the others’ minds and hearts; the narcissistic individuals (both artists and characters seek and love their own image which they project upon facts, thus creating a fictive realm.

  7. Bridges or Barriers? Conceptualization of the Role of Multiple Identity Gateway Groups in Intergroup Relations

    Directory of Open Access Journals (Sweden)

    Aharon Levy

    2017-06-01

    Full Text Available The modern era of globalization has been accompanied by a massive growth in interconnections between groups, and has led to the sharing of multiple identities by individuals and groups. Following these developments, research has focused on the issue of multiple identities, and has shed important light on how individuals who hold these complex forms of identity feel and behave, and on the reactions they elicit from members of other groups. However, the potential of groups with such multiple identities (e.g., biracials, immigrants, etc. to affect the intergroup relations between the groups that represent the respective sources of the different identities (e.g., Blacks and Whites, country of origin and country of residence, etc. has not been examined to date. Accordingly, in this paper, we first systematically explore the potential of groups in which people identify with multiple social categories, or groups that are perceived as such by others, to play a role in intergroup dynamics. Next, we offer a theoretical framework outlining what functions groups of people with shared multiple identities may serve (as bridges or barriers by proposing how their presence may facilitate or deteriorate intergroup relations. Finally, we present recent empirical research examining how groups of people with shared multiple identities can act as gateways and bridge the cleft between two separate groups that represent the respective sources of their different identities, and discuss the theoretical and practical implications for the field of intergroup relations.

  8. A loss in the family: silence, memory, and narrative identity after bereavement.

    Science.gov (United States)

    Baddeley, Jenna; Singer, Jefferson A

    2010-02-01

    Grief theories have converged on the idea that the sharing of autobiographical memory narratives of loss and of the deceased person, especially within the family, is a major way to maintain and/or reconfigure a healthy sense of identity after a loss. In contrast, we examine unspoken memory-the withholding of socially sharing autobiographical memories about the loss and the departed family member-as a way to either conserve an existing narrative identity or assert a new narrative identity. Depending on its context and function, silence about memory can play either a positive or negative role in an individual griever's ongoing narrative identity, as well as in the larger family narrative in which the griever's identity is embedded.

  9. SHARED TECHNOLOGY TRANSFER PROGRAM

    Energy Technology Data Exchange (ETDEWEB)

    GRIFFIN, JOHN M. HAUT, RICHARD C.

    2008-03-07

    The program established a collaborative process with domestic industries for the purpose of sharing Navy-developed technology. Private sector businesses were educated so as to increase their awareness of the vast amount of technologies that are available, with an initial focus on technology applications that are related to the Hydrogen, Fuel Cells and Infrastructure Technologies (Hydrogen) Program of the U.S. Department of Energy. Specifically, the project worked to increase industry awareness of the vast technology resources available to them that have been developed with taxpayer funding. NAVSEA-Carderock and the Houston Advanced Research Center teamed with Nicholls State University to catalog NAVSEA-Carderock unclassified technologies, rated the level of readiness of the technologies and established a web based catalog of the technologies. In particular, the catalog contains technology descriptions, including testing summaries and overviews of related presentations.

  10. Thermodynamical quantum information sharing

    International Nuclear Information System (INIS)

    Wiesniak, M.; Vedral, V.; Brukner, C.

    2005-01-01

    Full text: Thermodynamical properties fully originate from classical physics and can be easily measured for macroscopic systems. On the other hand, entanglement is a widely spoken feature of quantum physics, which allows to perform certain task with efficiency unavailable with any classical resource. Therefore an interesting question is whether we can witness entanglement in a state of a macroscopic sample. We show, that some macroscopic properties, in particular magnetic susceptibility, can serve as an entanglement witnesses. We also study a mutual relation between magnetic susceptibility and magnetisation. Such a complementarity exhibits quantum information sharing between these two thermodynamical quantities. Magnetization expresses properties of individual spins, while susceptibility might reveal non-classical correlations as a witness. Therefore, a rapid change of one of these two quantities may mean a phase transition also in terms of entanglement. The complementarity relation is demonstrated by an analytical solution of an exemplary model. (author)

  11. University Reactor Sharing Program

    International Nuclear Information System (INIS)

    Reese, W.D.

    2004-01-01

    Research projects supported by the program include items such as dating geological material and producing high current super conducting magnets. The funding continues to give small colleges and universities the valuable opportunity to use the NSC for teaching courses in nuclear processes; specifically neutron activation analysis and gamma spectroscopy. The Reactor Sharing Program has supported the construction of a Fast Neutron Flux Irradiator for users at New Mexico Institute of Mining and Technology and the University of Houston. This device has been characterized and has been found to have near optimum neutron fluxes for A39/Ar 40 dating. Institution final reports and publications resulting from the use of these funds are on file at the Nuclear Science Center

  12. CILogon: An Integrated Identity and Access Management Platform for Science

    Science.gov (United States)

    Basney, J.

    2016-12-01

    When scientists work together, they use web sites and other software to share their ideas and data. To ensure the integrity of their work, these systems require the scientists to log in and verify that they are part of the team working on a particular science problem. Too often, the identity and access verification process is a stumbling block for the scientists. Scientific research projects are forced to invest time and effort into developing and supporting Identity and Access Management (IAM) services, distracting them from the core goals of their research collaboration. CILogon provides an IAM platform that enables scientists to work together to meet their IAM needs more effectively so they can allocate more time and effort to their core mission of scientific research. The CILogon platform enables federated identity management and collaborative organization management. Federated identity management enables researchers to use their home organization identities to access cyberinfrastructure, rather than requiring yet another username and password to log on. Collaborative organization management enables research projects to define user groups for authorization to collaboration platforms (e.g., wikis, mailing lists, and domain applications). CILogon's IAM platform serves the unique needs of research collaborations, namely the need to dynamically form collaboration groups across organizations and countries, sharing access to data, instruments, compute clusters, and other resources to enable scientific discovery. CILogon provides a software-as-a-service platform to ease integration with cyberinfrastructure, while making all software components publicly available under open source licenses to enable re-use. Figure 1 illustrates the components and interfaces of this platform. CILogon has been operational since 2010 and has been used by over 7,000 researchers from more than 170 identity providers to access cyberinfrastructure including Globus, LIGO, Open Science Grid

  13. Reactor Sharing Program

    International Nuclear Information System (INIS)

    Tehan, Terry

    2002-01-01

    Support utilization of the RINSC reactor for student and faculty instructions and research. The Department of Energy award has provided financial assistance during the period 9/29/1995 to 5/31/2001 to support the utilization of the Rhode Island Nuclear Science Center (RINSC) reactor for student and faculty instruction and research by non-reactor owning educational institutions within approximately 300 miles of Narragansett, Rhode Island. Through the reactor sharing program, the RINSC (including the reactor and analytical laboratories) provided reactor services and laboratory space that were not available to the other universities and colleges in the region. As an example of services provided to the users: Counting equipment, laboratory space, pneumatic and in-pool irradiations, demonstrations of sample counting and analysis, reactor tours and lectures. Funding from the Reactor Sharing Program has provided the RINSC to expand student tours and demonstration programs that emphasized our long history of providing these types of services to the universities and colleges in the area. The funding have also helped defray the cost of the technical assistance that the staff has routinely provided to schools, individuals and researchers who have called on the RINSC for resolution of problems relating to nuclear science. The reactor has been featured in a Public Broadcasting System documentary on Pollution in the Arctic and how a University of Rhode Island Professor used Neutron Activation Analysis conducted at the RINSC to discover the sources of the ''Arctic Haze''. The RINSC was also featured by local television on Earth Day for its role in environmental monitoring

  14. Job share a consultant post.

    OpenAIRE

    Thornicroft, G.; Strathdee, G.

    1992-01-01

    Job sharing offers advantages to both employer and employee but it is still uncommon in medicine. Based on the experiences of two psychiatrists sharing a consultant post this article describes some of the problems in obtaining a job share. The most difficult part can be getting an interview, and once a post has been obtained the terms and conditions of service may have to be modified to suit job sharing. Getting on well with your job sharing partner and good communication will not only help o...

  15. Perancangan Corporate Identity Brotherwood Decoration

    OpenAIRE

    Ciputra, Ongky Permana; Bangsa, Petrus Gogor; Christianna, Aniendya

    2015-01-01

    Sebagai Perusahaan interior di Surabaya, “BROTHERWOOD” sedang membangun citra positif melalui penguatan corporate identity secara menyeluruh.Oleh karena itu “Brotherwood” memerlukan corporate identity dan mengaplikasikannya pada media promosi dan informasi yang sesuai dengan karakter dari target audience dan target market-nya.Dengan menggunakan corporate identity diharapkan “Brotherwood” menjadi lebih dikenal oleh target audience dan target market-nya sehingga membuat market “Brotherwood” men...

  16. Personal identity and eastern thought

    Directory of Open Access Journals (Sweden)

    Correia Carlos João

    2009-01-01

    Full Text Available This paper aims to show that the problem of personal identity is a fundamental question of the classical Indian thought. Usually we tend to think that personal identity is a Western philosophical subject, and so we tend to forget the significance of the Self (Atman in Hinduism and even in Buddhism. The author shows how the Indian thought approached the question of personal identity and which was the singular solution outlined in the work consensually attributed to Gotama, the Buddha.

  17. The Role of Moral Beliefs, Memories, and Preferences in Representations of Identity.

    Science.gov (United States)

    Heiphetz, Larisa; Strohminger, Nina; Young, Liane L

    2017-04-01

    People perceive that if their memories and moral beliefs changed, they would change. We investigated why individuals respond this way. In Study 1, participants judged that identity would change more after changes to memories and widely shared moral beliefs (e.g., about murder) versus preferences and controversial moral beliefs (e.g., about abortion). The extent to which participants judged that changes would affect their relationships predicted identity change (Study 2) and mediated the relationship between type of moral belief and perceived identity change (Study 3). We discuss the role that social relationships play in judgments of identity and highlight implications for psychology and philosophy. Copyright © 2016 Cognitive Science Society, Inc.

  18. The construction of identities, a task attributed to the school and the teachers

    Directory of Open Access Journals (Sweden)

    Francisco Rodríguez Lestegás

    2008-04-01

    Full Text Available The traditional conceptualization of a collective identity linked to a state-nation is being seriously questioned. The vindication of specific identities on the part of several regional, ethnic or cultural groups coexists with a globalisation process that tends towards cultural standardization and the uniformity of ways of life and shared values. This paper deals with the process of incorporation of the knowledge of Europe into the school culture and the outstanding role of the school and the teachers in the construction of an intercultural European identity based on the acceptance of multiple simultaneous identities.

  19. Constructing leadership identities through stories

    DEFF Research Database (Denmark)

    Frimann, Søren; Hersted, Lone

    2016-01-01

    This article analyzes the construction of leadership identities through stories found in four narrative interviews from a qualitative study and leadership development project based on social constructionism and action learning. We argue that leadership development and the construction of leadership...... that the concept of coauthoring is useful in developing leadership and leadership identities through reflexive dialogs and emerging stories....... identities in a postmodern paradigm are based on the negotiation and co-construction of meanings, relationships, and stories. The following questions are investigated: What happens when a group of leaders from different organizations construct, deconstruct, and reconstruct their identity as leaders through...

  20. Sharing data is a shared responsibility: Commentary on: "The essential nature of sharing in science".

    Science.gov (United States)

    Giffels, Joe

    2010-12-01

    Research data should be made readily available. A robust data-sharing plan, led by the principal investigator of the research project, requires considerable administrative and operational resources. Because external support for data sharing is minimal, principal investigators should consider engaging existing institutional information experts, such as librarians and information systems personnel, to participate in data-sharing efforts.

  1. Share and share alike? Social information and interaction style in coordination of shared use

    NARCIS (Netherlands)

    Niemantsverdriet, Karin; van de Werff, T.C.F.; van Essen, H.A.; Eggen, J.H.

    2018-01-01

    Interfaces are commonly designed from the perspective of individual users, even though most of the systems we use in everyday life are in fact shared. We argue that more attention is needed for system sharing, especially because interfaces are known to influence coordination of shared use. In this

  2. Identity Support, Identity Devaluation, and Well-Being among Lesbians

    Science.gov (United States)

    Beals, Kristin P.; Peplau, Letitia Anne

    2005-01-01

    This research tested predictions about the association of identity support and identity devaluation with psychological well-being (self-esteem, life satisfaction, and depression). Lesbian women completed baseline surveys (N=42), then provided daily experience reports during a 2-week period (n=38), and completed a 2-month follow-up survey (n=34).…

  3. Social Identity Change: Shifts in Social Identity during Adolescence

    Science.gov (United States)

    Tanti, Chris; Stukas, Arthur A.; Halloran, Michael J.; Foddy, Margaret

    2011-01-01

    This study investigated the proposition that adolescence involves significant shifts in social identity as a function of changes in social context and cognitive style. Using an experimental design, we primed either peer or gender identity with a sample of 380 early- (12-13 years), mid- (15-16 years), and late-adolescents (18-20 years) and then…

  4. A Q-methodological study of smoking identities.

    Science.gov (United States)

    Farrimond, Hannah; Joffe, Helene; Stenner, Paul

    2010-10-01

    In contrast to the psychological literature on adolescent smoking, little research has investigated the social identities of adult smokers. This study aimed to identify shared 'smoking identities' amongst a sample of 64 British smokers from different socio-economic groups using Q-methodology. Participants were asked to sort 70 items concerning smoking and smokers according to their agreement/disagreement with them. The 64 Q-sorts were then subjected to a by-person factor analysis yielding six factors, with the first four interpretable factors being presented here. Each factor is understood to represent a distinct 'identity position'. The first two, the 'addicted' smoker, and the 'in control' smoker, oriented around a biomedical model of smoking as an addictive health risk. The final two, the 'no big deal' smoker and the 'proud' smoker reflected alternative understandings and values. The identity positions also differed in the extent to which smoking was considered a core part of self-identity. Unpacking the 'smoking identities' of current smokers offers the opportunity to devise targeted health promotion.

  5. Identity text: an educational intervention to foster cultural interaction.

    Science.gov (United States)

    Zaidi, Zareen; Verstegen, Daniëlle; Naqvi, Rahat; Dornan, Tim; Morahan, Page

    2016-01-01

    Sociocultural theories state that learning results from people participating in contexts where social interaction is facilitated. There is a need to create such facilitated pedagogical spaces where participants can share their ways of knowing and doing. The aim of this exploratory study was to introduce pedagogical space for sociocultural interaction using 'Identity Text'. Identity Texts are sociocultural artifacts produced by participants, which can be written, spoken, visual, musical, or multimodal. In 2013, participants of an international medical education fellowship program were asked to create their own Identity Texts to promote discussion about participants' cultural backgrounds. Thematic analysis was used to make the analysis relevant to studying the pedagogical utility of the intervention. The Identity Text intervention created two spaces: a 'reflective space', which helped participants reflect on sensitive topics such as institutional environments, roles in interdisciplinary teams, and gender discrimination, and a 'narrative space', which allowed participants to tell powerful stories that provided cultural insights and challenged cultural hegemony; they described the conscious and subconscious transformation in identity that evolved secondary to struggles with local power dynamics and social demands involving the impact of family, peers, and country of origin. While the impact of providing pedagogical space using Identity Text on cognitive engagement and enhanced learning requires further research, the findings of this study suggest that it is a useful pedagogical strategy to support cross-cultural education.

  6. Identity text: an educational intervention to foster cultural interaction

    Directory of Open Access Journals (Sweden)

    Zareen Zaidi

    2016-11-01

    Full Text Available Background: Sociocultural theories state that learning results from people participating in contexts where social interaction is facilitated. There is a need to create such facilitated pedagogical spaces where participants can share their ways of knowing and doing. The aim of this exploratory study was to introduce pedagogical space for sociocultural interaction using ‘Identity Text’. Methods: Identity Texts are sociocultural artifacts produced by participants, which can be written, spoken, visual, musical, or multimodal. In 2013, participants of an international medical education fellowship program were asked to create their own Identity Texts to promote discussion about participants’ cultural backgrounds. Thematic analysis was used to make the analysis relevant to studying the pedagogical utility of the intervention. Result: The Identity Text intervention created two spaces: a ‘reflective space’, which helped participants reflect on sensitive topics such as institutional environments, roles in interdisciplinary teams, and gender discrimination, and a ‘narrative space’, which allowed participants to tell powerful stories that provided cultural insights and challenged cultural hegemony; they described the conscious and subconscious transformation in identity that evolved secondary to struggles with local power dynamics and social demands involving the impact of family, peers, and country of origin. Conclusion: While the impact of providing pedagogical space using Identity Text on cognitive engagement and enhanced learning requires further research, the findings of this study suggest that it is a useful pedagogical strategy to support cross-cultural education.

  7. Configurations of self-identity formations of adults who stutter

    Directory of Open Access Journals (Sweden)

    Harsha Kathard

    2010-12-01

    Full Text Available The aims of this paper are twofold: Firstly, to describe the configuration of self-identity formations evident across and within research stories of adults living with stuttering; and secondly, to discuss the clinical implications of these findings. The study on which this paper is based used life history narratives to describe the types, processes and configurations of self-identity formations of adults who stuttered since childhood. Through open-ended, in-depth interviews 7 participants shared their experiences of living with stuttering. The interviews were analysed at a first level using narrative analysis and at a second level to further describe the types, processes and configurations of self-identity formations evident in the stories. The findings on configurations of self-identity formations were that the two types of self-identity formations Able and DisOther were present in singular and dual configurations. The dual self-identity formations occurred in co-existing, competing and coalescing relationships within particular time periods in their stories. The clinical implications of the findings are discussed.

  8. The science of sharing and the sharing of science.

    Science.gov (United States)

    Milkman, Katherine L; Berger, Jonah

    2014-09-16

    Why do members of the public share some scientific findings and not others? What can scientists do to increase the chances that their findings will be shared widely among nonscientists? To address these questions, we integrate past research on the psychological drivers of interpersonal communication with a study examining the sharing of hundreds of recent scientific discoveries. Our findings offer insights into (i) how attributes of a discovery and the way it is described impact sharing, (ii) who generates discoveries that are likely to be shared, and (iii) which types of people are most likely to share scientific discoveries. The results described here, combined with a review of recent research on interpersonal communication, suggest how scientists can frame their work to increase its dissemination. They also provide insights about which audiences may be the best targets for the diffusion of scientific content.

  9. Chaotic Dynamics and Application of LCR Oscillators Sharing Common Nonlinearity

    Science.gov (United States)

    Jeevarekha, A.; Paul Asir, M.; Philominathan, P.

    2016-06-01

    This paper addresses the problem of sharing common nonlinearity among nonautonomous and autonomous oscillators. By choosing a suitable common nonlinear element with the driving point characteristics capable of bringing out chaotic motion in a combined system, we obtain identical chaotic states. The dynamics of the coupled system is explored through numerical and experimental studies. Employing the concept of common nonlinearity, a simple chaotic communication system is modeled and its performance is verified through Multisim simulation.

  10. Estimating the elasticity of trade: the trade share approach

    OpenAIRE

    Mauro Lanati

    2013-01-01

    Recent theoretical work on international trade emphasizes the importance of trade elasticity as the fundamental statistic needed to conduct welfare analysis. Eaton and Kortum (2002) proposed a two-step method to estimate this parameter, where exporter fixed effects are regressed on proxies for technology and wages. Within the same Ricardian model of trade, the trade share provides an alternative source of identication for the elasticity of trade. Following Santos Silva and Tenreyro (2006) bot...

  11. Contexts as Shared Commitments

    Directory of Open Access Journals (Sweden)

    Manuel eGarcía-Carpintero

    2015-12-01

    Full Text Available Contemporary semantics assumes two different notions of context: one coming from Kaplan (1989, on which contexts are sets of predetermined parameters, and another originated in Stalnaker (1978, on which contexts are sets of propositions that are common ground. The latter is deservedly more popular, given its flexibility to account for context-dependent aspects of language beyond manifest indexicals, such as epistemic modals, predicates of taste, and so on and so forth; in fact, properly dealing with demonstratives (perhaps ultimately all indexicals requires that further flexibility. Even if we acknowledge Lewis (1980 point that, in a sense, Kaplanian contexts already include common ground contexts, it is better to be clear and explicit about what contexts constitutively are. Now, Stalnaker (1978, 2002, 2014 defines context-as-common-ground as a set of propositions, but recent work shows that this is not an accurate conception. The paper explains why, and provides an alternative. The main reason is that several phenomena (presuppositional treatments of pejoratives and predicates of taste, forces other than assertion require that the common ground includes non-doxastic attitudes such as appraisals, emotions, etc. Hence the common ground should not be taken to include merely contents (propositions, but those together with attitudes concerning them: shared commitments, as I will defend.

  12. Identity Theft - The National Guard

    Science.gov (United States)

    Legislative Liaison Small Business Programs Social Media State Websites Videos Featured Videos On Every Front identity theft you discover someone is still fraudulently using your Social Security Number, you can Features Blended Retirement System Diversity Features by Year Identity Theft Posture Statement State

  13. Play Memories and Place Identity.

    Science.gov (United States)

    Sandberg, Anette

    2003-01-01

    This retrospective study examined play memories from childhood to adulthood of 478 university students between ages 20 and 62 as exhibited in drawings of play memories and questionnaire responses. The study focused on the role of the physical environment and place identity in play memories and individual identity development. Findings showed that…

  14. Social Identity and Group Contests

    NARCIS (Netherlands)

    Zaunbrecher, Henrik; Riedl, Arno

    2016-01-01

    Social identity has been shown to successfully enhance cooperation and effort in cooperation and coordination games. Little is known about the causal effect of social identity on the propensity to engage in group conflict. In this paper we explore theoretically and experimentally whether social

  15. Identity development in deaf adolescents

    NARCIS (Netherlands)

    Kunnen, E. Saskia

    2014-01-01

    We studied identity development during 5 years in 11 deaf adolescents who attend a school for deaf children in the highest level of regular secondary education (age between 14 and 19 years). Identity development is conceptualized by the processes of exploration and commitment formation, as

  16. Exploring Leader Identity and Development.

    Science.gov (United States)

    Priest, Kerry L; Middleton, Eric

    2016-01-01

    Taking on a leader identity can be a motivating force for pursuing leader development. This chapter explores the reciprocal and recursive nature of identity development and leader development, emphasizing how shifting views of self influence one's motivation to develop as a leader. © 2016 Wiley Periodicals, Inc., A Wiley Company.

  17. Gender identity development in adolescence.

    Science.gov (United States)

    Steensma, Thomas D; Kreukels, Baudewijntje P C; de Vries, Annelou L C; Cohen-Kettenis, Peggy T

    2013-07-01

    This article is part of a Special Issue "Puberty and Adolescence".This article aims to provide an outline of what is currently known on trajectories, and contributing factors to gender identity development in adolescence. We give a historical overview of the concept of gender identity, and describe general identity development in adolescence, gender identity development in the general population and in gender variant youth. Possible psychosocial (such as child and parental characteristics) and biological factors (such as the effects of prenatal exposure to gonadal hormones and the role of genetics) contributing to a gender variant identity are discussed. Studies focusing on a number of psychosocial and biological factors separately, indicate that each of these factors influence gender identity formation, but little is known about the complex interplay between the factors, nor about the way individuals themselves contribute to the process. Research into normative and gender variant identity development of adolescents is clearly lagging behind. However, studies on persons with gender dysphoria and disorders of sex development, show that the period of adolescence, with its changing social environment and the onset of physical puberty, seems to be crucial for the development of a non-normative gender identity. Copyright © 2013 Elsevier Inc. All rights reserved.

  18. Generalized Cherednik-Macdonald identities

    NARCIS (Netherlands)

    Stokman, J.V.

    2008-01-01

    We derive generalizations of the Cherednik-Macdonald constant term identities associated to root systems which depend, besides on the usual Multiplicity function, symmetrically on two additional parameters omega +/-. They are natural analogues of the Cherednik-Macdonald constant term q-identities in

  19. Ward identities at finite temperature

    International Nuclear Information System (INIS)

    DOlivo, J.C.; Torres, M.; Tututi, E.

    1996-01-01

    The Ward identities for QED at finite temperature are derived using the functional real-time formalism. They are verified by an explicit one-loop calculation. An effective causal vertex is constructed which satisfy the Ward identity with the associated retarded self-energy. copyright 1996 American Institute of Physics

  20. STORYTELLING AND UNIVERSITY BRANDING IDENTITY

    Directory of Open Access Journals (Sweden)

    ANDREEA MONICA STATE

    2016-08-01

    Full Text Available The present article sets out to clarify the concepts of storytelling and branding, with a focus on university branding and visual identity – the latter being a vital element to a brand’s uniqueness. Storytelling is an important method of brand construction, and it entails a strong power of seduction. Branding is increasingly more about storytelling. Practically, a story is an image made up of facts, feelings and interpretations, which are often told to us solely by the university itself. As such, the brand appears on the market accompanied by its identity. Identity is what we aim to express with help of the brand. Implementing a system of visual identity that would help to harmoniously develop a university brand requires a handbook of visual identity. The present article aims to be a starting point for such a handbook serving the University of Bucharest, which currently does not own such a handbook

  1. Ethnic Identities of University Students

    Directory of Open Access Journals (Sweden)

    Gözde Özdikmenli-Demir

    2014-06-01

    Full Text Available The aim of this article is to understand the relationship between ethnic identity, victimization/witnessing community violence, ethnic discrimination, and aggression in a sample of university students living in the South East Region of Turkey. The participants were 263 university students of predominantly Kurdish ethnic origin. The results showed that males had higher levels of ethnic identity in the dimensions of exploration and commitment. Males also presented higher scores for witnessing community violence and lifetime exposure to ethnic discrimination. The most important predictor of participants’ ethnic identity was witnessing community violence. Participants who witnessed violent acts in their social environment had higher ethnic identity levels. Although the predictor variables could not explain an important part of the participants’ aggression levels, only perceived ethnic discrimination was positively related to aggressive behavior. The role of native language efficiency in ethnic identity is also discussed.

  2. In the Blink of an I: On Delayed but Identical Subjective Reactions and Their Effect on Self-Interested Behavior.

    Science.gov (United States)

    Pinel, Elizabeth C; Long, Anson E; Huneke, Mark

    2015-01-01

    People believe that they have shared an identical subjective experience--that they have I-shared--when they react identically and simultaneously to the same stimulus. Despite growing evidence for I-sharing, researchers have yet to ask whether simultaneity really makes a difference. We test the importance of simultaneity for I-sharing effects. Participants played prisoner's dilemma with someone who shared their subjective self, their objective self, or neither. Some participants learned this information immediately; others, after a short delay. Time delay decreased cooperation in the subjective similarity condition, but not in the objective similarity or neither conditions. These findings underscore the importance of simultaneity for I-sharing effects and highlight the implications of I-sharing for cooperation and self-interested behavior.

  3. Origin and identity of Fejervarya (Anura: Dicroglossidae) on Guam

    Science.gov (United States)

    Wostl, Elijah; Smith, Eric N.; Reed, Robert

    2016-01-01

    We used morphological and molecular data to infer the identity and origin of frogs in the genus Fejervarya that have been introduced to the island of Guam. Mensural and meristic data were collected from 96 specimens from throughout their range on the island and a principal component analysis was used to investigate the distribution of these data in morphological space. We also amplified a fragment of the 16S ribosomal ribonucleic acid mitochondrial gene from 27 of these specimens and compared it to 63 published sequences of Fejervarya and the morphologically similar Zakerana. All examined Fejervarya from Guam are morphologically indistinguishable and share an identical haplotype. The molecular data identify them as Fejervarya cancrivora with a haplotype identical to F. cancrivora from Taiwan.

  4. Identity at work: Exploring strategies for Identity Work

    Directory of Open Access Journals (Sweden)

    Byron G. Adams

    2012-09-01

    Research purpose: The main aim of this study was to explore employee narratives and identify the strategies available to them in the process of identity work, as they defined themselves at work. Motivation for the study: As there is a scarcity of research on identity work in South Africa, this study wanted to advance knowledge about identity work and the strategies used for regulating and negotiating an identity at work by exploring these constructs in this context. Research design, approach and method: A qualitative research process formed the basis for this study. Nineteen employees from a global manufacturing company participated in two semi-structured in-depth interviews. Grounded theory was applied to analyse and interpret the data. Main findings: Nine strategies for identity work were identified and categorised into four broad themes (personal philosophies; relationships; career management and negotiating balance. Practical/managerial implications: Employees followed various strategies for defining themselves at work and this may have some implications for employee work engagement and productivity. Contribution/value-add: This study expands on current theoretical knowledge of identity work, and provides insights into the strategies people use to regulate and negotiate their identities at work.

  5. Habermas on European Constitution and European Identity

    Directory of Open Access Journals (Sweden)

    Éva Biró-Kaszás

    2010-12-01

    Full Text Available For the last two decades or so philosophers have been reflecting on a set of practical and political concerns in connection with the new political structural arrangements beyond the nation-state. In this article two essays by Jürgen Habermas shall be examined. An attempt shall be made to tackle Habermas’ philosophical concepts of personal and collective identity as well as the role that a constitution may play in building the post-national constellation. It has been shown that Habermas has normative answers. Firstly, according to him, the fragile balance between the legal order and the particular cultures and traditions of a community has to be protected by the constitutional state. For that reason the political culture has to be “decoupled” from the majority culture. Secondly, the democratically structured attempt to achieve shared meaning has to find the delicate balance between the context-transcending universal normative claims and the claims of particular individual and collective life. Thirdly, it is possible to expand legally mediated civil solidarity trans-nationally, across Europe – we may recognize this development as the emergence of European identity –, since the process of democratic will-formation of citizens may get loose from the structures provided by the state if both shared democratic political cultures as well as a European-wide public sphere exist. The European Constitution may have a catalytic function in materialization of these conditions. It has been shown that in his deliberations Habermas tried to find a reflective equilibrium between the normative and the empirical.

  6. 2012 Information Sharing Environment Performance Data

    Data.gov (United States)

    Information Sharing Environment — This is a survey of federal departments and agencies who share terrorism information and are therefore considered part of the Information Sharing Environment. The...

  7. 2013 Information Sharing Environment Performance Data

    Data.gov (United States)

    Information Sharing Environment — This is a survey of federal departments and agencies who share terrorism information and are therefore considered part of the Information Sharing Environment. The...

  8. Instant Social Ride-Sharing

    OpenAIRE

    Gidofalvi, Gyözö; Herenyi, Gergely; Bach Pedersen, Torben

    2008-01-01

    This paper explores the use of ride–sharing as a resource-efficient mode of personal transportation. While the perceived benefits of ride–sharing include reduced travel times, transportation costs, congestion, and carbon emissions, its wide–spread adoption is hindered by a number of barriers. These include the scheduling and coordination of routes, safety risks, social discomfort in sharing private spaces, and an imbalance of costs and benefits among parties. To address these barriers, the au...

  9. SharePoint User's Guide

    CERN Document Server

    Corporation, Infusion Development

    2009-01-01

    This straightforward guide shows SharePoint users how to create and use web sites for sharing and collaboration. Learn to use the document and picture libraries for adding and editing content, add discussion boards and surveys, receive alerts when documents and information have been added or changed, and enhance security. Designed to help you find answers quickly, the book shows how to make the most of SharePoint for productivity and collaboration.

  10. Cosmopolitanism and Identity

    Directory of Open Access Journals (Sweden)

    Sami Şener

    2014-11-01

    Full Text Available Cosmopolitism is a complicated concept and has different properties. Pure tangible objects in the world are worth more than those mixed. This character distinguishes objects and gives them a special value. Is the same situation true in the spiritual and moral worlds? Already, every object finds its value in their value world. In particular, this also applies in the real social world in general. Social world has a meaning because of living with others. So, our world enriches with disparateness and this situation adds new values to our life. For this reason It is very importance to know how to keep different cultures together. In general, we mainly reserve a share in a narrow mentality for ourselves. But, when we look to the events from other people‘s perspectives we discern different realities. Today, we face many chaos and social problems. The cause of it that we could not endure living together with others and do not have toleration culture about different groups. Such a behaviour stems from psychological weakness and keep ourselves in the forefront in ethnical issues. Whereas all great success in the history has been obtained by civilizations and leaders who had understood the differentiations as richness. In this subject culture as life philosophy and value of law are quite important concepts. Most important issues will lead us to success and understanding of law in this issue. With this approach we have to behave most suitable attitude to the life and human being without hegemonic or ethnic perspective.

  11. Gender identity disorder.

    LENUS (Irish Health Repository)

    De Gascun, C

    2006-05-01

    Gender Identity Disorder (GID) is a relatively rare condition of atypical gender development in which there is a psychological perception of self as masculine or feminine which is incongruent with ones phenotype. GID replaced the term Transsexualism in DSM-IV in 1994. The demographics of GID in Ireland have not been established. Since 2000 we have received 52 referrals of individuals with confirmed GID to our endocrine service for consideration for hormonal treatment (HT). Of the 52 patients 45 have male to female (MTF) GID (mean age 38.9 years) and 7 have female to male (FTM) GID (mean age 30.7 years). The age at presentation in this group is approximately 9 years older than in international series for both MTF (39 years v 30yrs) and FTM (31 yrs v 22yrs). The karyotype where analysed has been normal for their phenotypic sex. Twenty-three of the patients had received HT prior to attending our clinic that in only one case had been prescribed by a specialist. A number of patients had obtained HT via the internet or from overseas sources without medical review. Eighteen of the patients have been or are married and 14 of the group have children. The scale of referrals confirms that GID exists in the Irish population to a significant degree. Thus an appropriate care pathway for people with the condition needs to be established. This will facilitate optimum medical management of the patient group and a coherent approach to the many difficult social issues faced individuals with this disorder.

  12. Body integrity identity disorder.

    Science.gov (United States)

    Blom, Rianne M; Hennekam, Raoul C; Denys, Damiaan

    2012-01-01

    Body Integrity Identity Disorder (BIID) is a rare, infrequently studied and highly secretive condition in which there is a mismatch between the mental body image and the physical body. Subjects suffering from BIID have an intense desire to amputate a major limb or severe the spinal cord in order to become paralyzed. Aim of the study is to broaden the knowledge of BIID amongst medical professionals, by describing all who deal with BIID. Somatic, psychiatric and BIID characteristic data were collected from 54 BIID individuals using a detailed questionnaire. Subsequently, data of different subtypes of BIID (i.e. wish for amputation or paralyzation) were evaluated. Finally, disruption in work, social and family life due to BIID in subjects with and without amputation were compared. Based on the subjects' reports we found that BIID has an onset in early childhood. The main rationale given for their desire for body modification is to feel complete or to feel satisfied inside. Somatic and severe psychiatric co-morbidity is unusual, but depressive symptoms and mood disorders can be present, possibly secondary to the enormous distress BIID puts upon a person. Amputation and paralyzation variant do not differ in any clinical variable. Surgery is found helpful in all subjects who underwent amputation and those subjects score significantly lower on a disability scale than BIID subjects without body modification. The amputation variant and paralyzation variant of BIID are to be considered as one of the same condition. Amputation of the healthy body part appears to result in remission of BIID and an impressive improvement of quality of life. Knowledge of and respect for the desires of BIID individuals are the first steps in providing care and may decrease the huge burden they experience.

  13. Body integrity identity disorder.

    Directory of Open Access Journals (Sweden)

    Rianne M Blom

    Full Text Available INTRODUCTION: Body Integrity Identity Disorder (BIID is a rare, infrequently studied and highly secretive condition in which there is a mismatch between the mental body image and the physical body. Subjects suffering from BIID have an intense desire to amputate a major limb or severe the spinal cord in order to become paralyzed. Aim of the study is to broaden the knowledge of BIID amongst medical professionals, by describing all who deal with BIID. METHODS: Somatic, psychiatric and BIID characteristic data were collected from 54 BIID individuals using a detailed questionnaire. Subsequently, data of different subtypes of BIID (i.e. wish for amputation or paralyzation were evaluated. Finally, disruption in work, social and family life due to BIID in subjects with and without amputation were compared. RESULTS: Based on the subjects' reports we found that BIID has an onset in early childhood. The main rationale given for their desire for body modification is to feel complete or to feel satisfied inside. Somatic and severe psychiatric co-morbidity is unusual, but depressive symptoms and mood disorders can be present, possibly secondary to the enormous distress BIID puts upon a person. Amputation and paralyzation variant do not differ in any clinical variable. Surgery is found helpful in all subjects who underwent amputation and those subjects score significantly lower on a disability scale than BIID subjects without body modification. CONCLUSIONS: The amputation variant and paralyzation variant of BIID are to be considered as one of the same condition. Amputation of the healthy body part appears to result in remission of BIID and an impressive improvement of quality of life. Knowledge of and respect for the desires of BIID individuals are the first steps in providing care and may decrease the huge burden they experience.

  14. Coming to an Asexual Identity: Negotiating Identity, Negotiating Desire.

    Science.gov (United States)

    Scherrer, Kristin S

    2008-10-01

    Sexuality is generally considered an important aspect of self-hood. Therefore, individuals who do not experience sexual attraction, and embrace an asexual identity are in a unique position to inform the social construction of sexuality. This study explores the experiences of asexual individuals utilizing open ended Internet survey data from 102 self-identified asexual people. In this paper I describe several distinct aspects of asexual identities: the meanings of sexual, and therefore, asexual behaviors, essentialist characterizations of asexuality, and lastly, interest in romance as a distinct dimension of sexuality. These findings have implications not only for asexual identities, but also for the connections of asexuality with other marginalized sexualities.

  15. Governing Individual Knowledge Sharing Behavior

    DEFF Research Database (Denmark)

    Minbaeva, Dana; Pedersen, Torben

    2010-01-01

    The emerging Knowledge Governance Approach asserts the need to build microfoundations grounded in individual action. Toward this goal, using the Theory of Planned Behavior, we aim to explain individual knowledge sharing behavior as being determined by the intention to share knowledge and its...... antecedents: attitude toward knowledge sharing, subjective norms, and perceived behavioral control. In addition, we consider managerial interventions (governance mechanisms) that managers can employ to influence the identified antecedents and thereby govern individual knowledge sharing behavior. We test...... a positive effect on subjective norms and perceived behavioral control, respectively....

  16. Islamic Identity and Competitive Identities (Global, National and Ethnic Identity; A Case Study of Shiraz University Students

    Directory of Open Access Journals (Sweden)

    Mohammadtaghi Iman

    2013-06-01

    Full Text Available The verse of holy Koran "verily the most honored of you in the sight of Allah is [he who is] the most virtuous of you" directly shows that in god's willing there is no superiority of a man or a group than others except those who have piety to god. In fact, the Islamic identity focuses on the superiority of piety among humans and does not focus on superiority of a man or a group that causes Islamic identity theoretically be against other competitive identities such as ethnic, global and national identity. Therefore, this research aims to study the relationship between Islamic identity and competitive identities (ethnic, national and global. In this way based on Sheldon Stryker theory and survey method, 431 students have elected and have analyzed. The results have shown that there was positive significant relationship between Islamic identity, national and ethnic identity, and negative significant relationship between Islamic identity and global identity. In addition, multivariate regression results have shown that the variables national and global identities have explained 45 percent of the variation of Islamic identity variable. The results shows that national and ethnic identity amplify the Islamic identity and they have positive relationship with it and in fact they are not a competitive identity for Islamic identity but global identity has negative relationship with Islamic identity and therefore it is a competitive identity for Islamic identity.

  17. Theatrically Digital: Education and Online Identity

    Directory of Open Access Journals (Sweden)

    Nastaran Khoshsabk

    2017-08-01

    Full Text Available The dramaturgical aspects of using social media are applied in this study from a sociological perspective (Goffman, 1959 to describe the process of gaining a sense of self through learning in online-environments. The exploration of data in this qualitative case study sheds light on the theatrical dimension of virtual self-presentation which can encourage individuals to become engaged in interacting online and, in the process of doing so, learn actively though using social media via its unique audio-visual digital content. Social media tools provide a space for information sharing to fill the gaps when students are unwilling to communicate in face-to-face classrooms because of a particular socio-cultural context. The codes and themes from six months’ Facebook analysis of adult social media users were analysed based on the self-representation of the digital self with relation to their language and cultural background and its influence on the formation of identity. The ‘actual self’, as described in interviews, was being manipulated by individuals for different reasons such as its influence on their social/cultural identity and the development of the self-image. Increasingly, educators in all educational domains are using online social media platforms to support engagement in teaching and learning. It is hoped that this research, by offering increased understanding of the importance of online-communities, will have implications for learning from online contexts, particularly in contexts with socio-cultural boundaries.

  18. integrated identity and integrated identity and access management

    African Journals Online (AJOL)

    eobe

    Management System (T-IAMS) is a fingerprint biometric database that centrally manages students' identity, course a fingerprint ... registration, library and medical services information. .... based application and a web-based application.

  19. Perancangan Corporate Identity Astro Rent Car Surabaya

    OpenAIRE

    Gunardi, Yohanes Calvin; Negara, I Nengah Sudika; Aryanto, Hendro

    2017-01-01

    Corporate Identity merupakan hal yang krusial dalam perkembangan sebuah Perusahaan dalam segi internal maupun eksternal. Dalam membuat perancangan Corporate identity yang efektif, perancangan ini menampilkan segala teori dan ilmu yang berhubungan dengan Corporate identity. Dengan adanya perancangan ini diharapkan para pembaca mengerti betapa pentingnya peran sebuah corporate identity yang tepat dan mengena.Kata kunci: corporate identity, Astro, logo.

  20. Identity In and Around Organisations

    DEFF Research Database (Denmark)

    Schultz, Majken; Maguire, Steve

    2013-01-01

    concept may not be the best way of approaching and managing your organisation. Rather, Majken Schultz and Steve Maguire argue that organisations would benefit from adopting a process-based view of identity, which integrates history, ongoing change and market instability into its definition.......At the heart of any successful organisation lies a powerful conception of identity: the coherent way in which it presents itself to its stakeholders and employees, containing its purpose, goals and key characteristics. However, the traditional idea of identity as a stable, solid and reliable...

  1. Teilen, Sharing 1 und Sharing 2: die Sharing Economy im Licht theoretischer Zugänge

    OpenAIRE

    Haase, Michaela; Pick, Doreén

    2016-01-01

    Der Artikel geht theoretischen Zugängen zum Sharing-Begriff nach. Er erläutert den Beitrag, aber auch die Grenzen von Dienstleistungstheorie und Property-Rights-Theorie für das Verständnis der Sharing Economy. Gründe für die Unterscheidung zwischen kommerzieller und nichtkommerzieller Sharing Economy werden dargelegt sowie mögliche Impulse der Sharing Economy für Änderungen im Verständnis wirtschaftlichen Handels und seiner Organisationsformen erörtert. This article elaborates on theoretic...

  2. Job Sharing in the Schools.

    Science.gov (United States)

    Moorman, Barbara; And Others

    Job sharing is defined as "two people sharing the responsibilities of one full-time position with salary and benefits prorated"; the concept focuses on positions usually offered only as full-time jobs, often in professional and managerial categories. This book is a guide for teachers and administrators on the implementation and use of…

  3. Unveiling the Knowledge Sharing Culture

    NARCIS (Netherlands)

    Hendriks, P.H.J.

    2009-01-01

    It is generally acknowledged that organisation culture affects how knowledge processes such as knowledge-sharing evolve. Despite the growing attention to the aspects of culture, the knowledge management debate has not paid systematic attention to the assessment or measurement of a knowledge-sharing

  4. Panorama 2014 - Car-sharing

    International Nuclear Information System (INIS)

    Vinot, Simon

    2013-10-01

    Car-sharing is a new mode of transportation that consists of multiple users sharing the same vehicle. This type of service is expanding with the arrival of larger players, such as traditional car rental companies, automotive manufacturers, and large firms specializing in transportation. This new mode of transportation offers real potential and is currently finding its users, in France and worldwide. (author)

  5. Shared Contract-Obedient Endpoints

    Directory of Open Access Journals (Sweden)

    Étienne Lozes

    2012-12-01

    Full Text Available Most of the existing verification techniques for message-passing programs suppose either that channel endpoints are used in a linear fashion, where at most one thread may send or receive from an endpoint at any given time, or that endpoints may be used arbitrarily by any number of threads. The former approach usually forbids the sharing of channels while the latter limits what is provable about programs. In this paper we propose a midpoint between these techniques by extending a proof system based on separation logic to allow sharing of endpoints. We identify two independent mechanisms for supporting sharing: an extension of fractional shares to endpoints, and a new technique based on what we call reflexive ownership transfer. We demonstrate on a number of examples that a linear treatment of sharing is possible.

  6. Knowledge Sharing and National Culture

    DEFF Research Database (Denmark)

    Michailova, Snejina; Hutchings, Kate

    2004-01-01

    Much of the knowledge management literature tends to assume a rather universalistunderstanding of knowledge sharing. Yet, attitudes to knowledge sharing as well as actualknowledge-sharing behaviour depend on conditions that vary across institutional and culturalenvironments. This paper contributes...... to the knowledge-sharing literature by specificallydiscussing the interplay between knowledge-sharing and national cultural factors in the context oftransition countries. The paper engages in a comparative examination of two major transitionsocieties, China and Russia, and contributes to understanding...... the complexity of differencesbetween transition economies. The paper is written as a set of theoretical arguments andpropositions that is designed to elucidate more nuanced ways of thinking about knowledgesharing in China and Russia. We argue that in the case of China and Russia, verticalindividualism...

  7. Unhealthy Paradoxes of Healthy Identities

    NARCIS (Netherlands)

    S.J. Magala (Slawomir)

    2003-01-01

    textabstractComparative cross-cultural studies and identity research in social psychology focused on national and organizational differences, clashes and dimensions (Hofstede, Barsoux & Schneider, Jackson, Ward, Bochner & Furnham, Capoza & Brown). Mapping cultural software of individuals and

  8. On Identities in Modern Networks

    Directory of Open Access Journals (Sweden)

    Libor Polcak

    2014-09-01

    Full Text Available Communicating parties inside computer networks use different kind of identifiers. Some of these identifiers are stable, e.g., logins used to access a specific service, some are only temporary, e.g., dynamically assigned IP addresses. This paper tackles several challenges of lawful interception that emerged in modern networks. The main contribution is the graph model that links identities learnt from various sources distributed in a network. The inferred identities result into an interception of more detailed data in conformance with the issued court order. The approach deals with network address translation, short-lived identifiers and simultaneous usage of different identities. The approach was evaluated to be viable during real network testing based on various means to learn identities of users connected to a network.

  9. Unskilled Work and Learner Identity

    DEFF Research Database (Denmark)

    Kondrup, Sissel

    2014-01-01

    . The main argument is that participation research must abandon the notion of motivation as an individual attribute and apply a dialectic concept of learner identity acknowledging work-life as a pivotal space for learning and formation of identity. I outline how a work-life-historical approach combining......The paper examines how unskilled work forms conditions for meeting the obligation to position oneself as an educable subject and engage in formal learning activities. Sensitivity to peoples’ work-life-experiences is necessary to understand their orientation toward different learning activities...... a critical theoretical approach inspired by Salling-Olesen’s and Archer’s concepts of identity and concerns can contribute to an understanding of the relationship between work and learner identity. Through narrative work-life interviews I examine how engagement in unskilled work in small and medium sized...

  10. Culture, Identity and the Curriculum.

    Science.gov (United States)

    Burtonwood, Neil

    1996-01-01

    Critiques recent versions of pluralism by examining the concepts of culture and identity underlying them. Proposes a model of education that rejects cultural transmission in favor of a transformational curriculum that goes beyond culture. (SK)

  11. Human Rights and Cultural Identity

    Directory of Open Access Journals (Sweden)

    John-Stewart Gordon

    2015-12-01

    Full Text Available Universal human rights and particular cultural identities, which are relativistic by nature, seem to stand in conflict with each other. It is commonly suggested that the relativistic natures of cultural identities undermine universal human rights and that human rights might compromise particular cultural identities in a globalised world. This article examines this supposed clash and suggests that it is possible to frame a human rights approach in such a way that it becomes the starting point and constraining framework for all non-deficient cultural identities. In other words, it is possible to depict human rights in a culturally sensitive way so that universal human rights can meet the demands of a moderate version of meta-ethical relativism which acknowledges a small universal core of objectively true or false moral statements and avers that, beyond that small core, all other moral statements are neither objectively true nor false.

  12. Science Identity in Informal Education

    Science.gov (United States)

    Schon, Jennifer A.

    The national drive to increase the number of students pursuing Science Technology, Engineering, and Math (STEM) careers has brought science identity into focus for educators, with the need to determine what encourages students to pursue and persist in STEM careers. Science identity, the degree to which students think someone like them could be a scientist is a potential indicator of students pursuing and persisting in STEM related fields. Science identity, as defined by Carlone and Johnson (2007) consists of three constructs: competence, performance, and recognition. Students need to feel like they are good at science, can perform it well, and that others recognize them for these achievements in order to develop a science identity. These constructs can be bolstered by student visitation to informal education centers. Informal education centers, such as outdoor science schools, museums, and various learning centers can have a positive impact on how students view themselves as scientists by exposing them to novel and unique learning opportunities unavailable in their school. Specifically, the University of Idaho's McCall Outdoor Science School (MOSS) focuses on providing K-12 students with the opportunity to learn about science with a place-based, hands-on, inquiry-based curriculum that hopes to foster science identity development. To understand the constructs that lead to science identity formation and the impact the MOSS program has on science identity development, several questions were explored examining how students define the constructs and if the MOSS program impacted how they rate themselves within each construct. A mixed-method research approach was used consisting of focus group interviews with students and pre, post, one-month posttests for visiting students to look at change in science identity over time. Results from confirmatory factor analysis indicate that the instrument created is a good fit for examining science identity and the associated

  13. Ward identities for conformal models

    International Nuclear Information System (INIS)

    Lazzarini, S.; Stora, R.

    1988-01-01

    Ward identities which express the symmetry of conformal models are treated. Diffeomorphism invariance or locally holomorphic coordinate transformations are used. Diffeomorphism invariance is then understood in terms of Riemannian geometry. Two different sets of Ward identities expressing diffeomorphism invariance in a conformally invariant way are found for the free bosonic string. Using a geometrical argument, the correct invariance for a large class of conformal models is given

  14. Understanding American Identity: An Introduction

    Science.gov (United States)

    2017-12-01

    this leads to is, how can we begin this transformation ? D. HOW TO GET THERE: PATRIOTIC BUILDING BLOCKS 1. Civic Education Many have argued that civic... transformation of the U.S. public education system and writes, “High schools brought young people together into an adolescent world that helped to obscure...Revamped civic education and national service programs can serve to form those cross-cutting ties. 14. SUBJECT TERMS American identity, national identity

  15. The ambiguous identity of auditing

    DEFF Research Database (Denmark)

    Lindeberg, Tobias

    2007-01-01

    This paper analyses the identity of auditing by comparing performance auditing to financial auditing and programme evaluation. Based on an analysis of textbooks, it is concluded that these evaluative practices are situated on a continuum. This implies that studies that rely on ‘audit’ as a label...... to attribute identity to a distinct evaluative practice become insensitive to issues concerning the relevance of their results to evaluative practices in general and their relation to specific characteristic of certain evaluative practices...

  16. Survivorship and discourses of identity.

    Science.gov (United States)

    Little, Miles; Paul, Kim; Jordens, Christopher F C; Sayers, Emma-Jane

    2002-01-01

    Personal identity is self-evidently important to us all. Identity is a philosophically complex subject, but there is some agreement that memory, embodiment and continuity are essential components. The sense of memory includes 'future memory', the kind of memory we would like to construct for ourselves as our lives proceed. While the sense of personal identity is internal to the individual, a sense of that person's identity exists in the minds of others. Extreme experiences threaten the element of continuity, because they may bring bodily changes as well as cognitive changes that challenge central values. Restoring or preserving continuity is a major task for survivors. The ways in which people experience discontinuity because of cancer illness, and the ways in which they manage this experience emerges from the narratives of the survivors of cancer and in the narratives of health care workers who look after them. People manage discontinuity by reference to stable 'anchor points' in their beliefs and values; by re-constructing versions of their pre-experience identities, drawing on past memory and finding ways to preserve a continuity between past memory, present experience and constructions of the future; by using the experience to develop established facets of identity; and by imbuing the experience with meaning and recognising the enlarged identity made possible by survival. Those who cannot achieve a sense of continuity may feel alienated from themselves, their friends and family. All these methods of management may be used by one person to negotiate the post-experience identity in its different social interactions. The experience of the survivor can be further understood by recognising the challenge posed by extreme experience to the sense of continuity of both embodied self and memory. A satisfactory discourse of survival has yet to enter the public domain. This lack adds to the burdens of survivors, including those who have survived cancer. Copyright 2002 John

  17. ASPECTS REGARDING THE SHARE TRANSFER

    Directory of Open Access Journals (Sweden)

    Cristina Cojocaru

    2015-11-01

    Full Text Available Throughout its content, the memorandum of association, even in the case of a limited liability company, stipulates the contribution of each shareholder to the share capital while the share capital is divided into shares, corresponding to the contribution of each shareholder to the share capital. The limited liability company is established in consideration of the people who set it up and as such, the share transfer is subject to certain conditions provided by law. Therefore, the law sets out strict conditions for share transfer in the case the transfer is done to one or more shareholders, but especially if the transfer is done to people outside the company, or following the inheritance. If the transfer is done to a shareholder, such is possible provided that this transfer has not been prohibited by the act of incorporation itself. Instead, the transfer to people outside the company cannot be done without the cons ent of shareholders representing at least three quarters of the capital. In case of share transfer by succession, the law allows it provided that this transfer is permitted within the memorandum of association .

  18. Nonlinear secret image sharing scheme.

    Science.gov (United States)

    Shin, Sang-Ho; Lee, Gil-Je; Yoo, Kee-Young

    2014-01-01

    Over the past decade, most of secret image sharing schemes have been proposed by using Shamir's technique. It is based on a linear combination polynomial arithmetic. Although Shamir's technique based secret image sharing schemes are efficient and scalable for various environments, there exists a security threat such as Tompa-Woll attack. Renvall and Ding proposed a new secret sharing technique based on nonlinear combination polynomial arithmetic in order to solve this threat. It is hard to apply to the secret image sharing. In this paper, we propose a (t, n)-threshold nonlinear secret image sharing scheme with steganography concept. In order to achieve a suitable and secure secret image sharing scheme, we adapt a modified LSB embedding technique with XOR Boolean algebra operation, define a new variable m, and change a range of prime p in sharing procedure. In order to evaluate efficiency and security of proposed scheme, we use the embedding capacity and PSNR. As a result of it, average value of PSNR and embedding capacity are 44.78 (dB) and 1.74t⌈log2 m⌉ bit-per-pixel (bpp), respectively.

  19. On Converting Secret Sharing Scheme to Visual Secret Sharing Scheme

    Directory of Open Access Journals (Sweden)

    Wang Daoshun

    2010-01-01

    Full Text Available Abstract Traditional Secret Sharing (SS schemes reconstruct secret exactly the same as the original one but involve complex computation. Visual Secret Sharing (VSS schemes decode the secret without computation, but each share is m times as big as the original and the quality of the reconstructed secret image is reduced. Probabilistic visual secret sharing (Prob.VSS schemes for a binary image use only one subpixel to share the secret image; however the probability of white pixels in a white area is higher than that in a black area in the reconstructed secret image. SS schemes, VSS schemes, and Prob. VSS schemes have various construction methods and advantages. This paper first presents an approach to convert (transform a -SS scheme to a -VSS scheme for greyscale images. The generation of the shadow images (shares is based on Boolean XOR operation. The secret image can be reconstructed directly by performing Boolean OR operation, as in most conventional VSS schemes. Its pixel expansion is significantly smaller than that of VSS schemes. The quality of the reconstructed images, measured by average contrast, is the same as VSS schemes. Then a novel matrix-concatenation approach is used to extend the greyscale -SS scheme to a more general case of greyscale -VSS scheme.

  20. Resolving an identity crisis: Implicit drinking identity and implicit alcohol identity are related but not the same.

    Science.gov (United States)

    Ramirez, Jason J; Olin, Cecilia C; Lindgren, Kristen P

    2017-09-01

    Two variations of the Implicit Association Test (IAT), the Drinking Identity IAT and the Alcohol Identity IAT, assess implicit associations held in memory between one's identity and alcohol-related constructs. Both have been shown to predict numerous drinking outcomes, but these IATs have never been directly compared to one another. The purpose of this study was to compare these IATs and evaluate their incremental predictive validity. US undergraduate students (N=64, 50% female, mean age=21.98years) completed the Drinking Identity IAT, the Alcohol Identity IAT, an explicit measure of drinking identity, as well as measures of typical alcohol consumption and hazardous drinking. When evaluated in separate regression models that controlled for explicit drinking identity, results indicated that the Drinking Identity IAT and the Alcohol Identity IAT were significant, positive predictors of typical alcohol consumption, and that the Drinking Identity IAT, but not the Alcohol Identity IAT, was a significant predictor of hazardous drinking. When evaluated in the same regression models, the Drinking Identity IAT, but not the Alcohol Identity IAT, was significantly associated with typical and hazardous drinking. These results suggest that the Drinking Identity IAT and Alcohol Identity IAT are related but not redundant. Moreover, given that the Drinking Identity IAT, but not the Alcohol Identity IAT, incrementally predicted variance in drinking outcomes, identification with drinking behavior and social groups, as opposed to identification with alcohol itself, may be an especially strong predictor of drinking outcomes. Copyright © 2017 Elsevier Ltd. All rights reserved.

  1. One Share-One Vote

    DEFF Research Database (Denmark)

    Poulsen, Thomas; Eklund, Johan E.

    Shares with more voting rights than cash flow rights provide their owners with a disproportional influence that is often found to destroy the value of outside equity. This is taken as evidence of discretionary use of power. However, concentration of power does not necessarily result from control...... enhancing mechanisms; it could also be that some shareholders retain a large block in a one share-one vote structure. In this paper, we develop a methodology to disentangle disproportionality, which allows us to test the effect of deviations from one share-one vote more precisely. Our empirical findings add...

  2. Identity Presentation: The Construction of Identity in Asynchronous Discussion

    Directory of Open Access Journals (Sweden)

    Brian Morgan

    2008-08-01

    Full Text Available This study examines the use of e-mail as a tool for long term discussion between teachers and grade six students. E-mail messages between grade six students and teachers were collected over the course of one academic year. Methods of conversation analysis within a framework of social practice are used to examine the data. While identity is more readily constructed and more fully developed in contexts which allow for physical embodiment such as face-to-face discussion, this analysis found that identity can be constructed in a context that does not provide for the physical embodiment of identity: Identity was constructed using the social, cultural, and technological tools provided and supported by e-mail to develop social practices germane to the e-mail discussion. This study has implications for further understanding the relation between identity, goals, constraints and affordances, and the collaborative creation of social practices in asynchronous computer mediated communication. URN: urn:nbn:de:0114-fqs0803185

  3. American National Identity in a Globalized World as a Topic in the Advanced EFL-Classroom

    Directory of Open Access Journals (Sweden)

    Peter Freese

    2008-06-01

    Full Text Available In order to make an issue as complex and controversial as that of ‘national identity’ teachable in the advanced EFL-classroom, it has to be reduced to exemplary aspects and illustrated with concrete examples. Therefore, I will suggest an appropriate ‘Course Opener,’ briefly survey the historical unfolding of the American identity concept in order to provide teachers with the necessary background knowledge, and then suggest two teaching units, the first of which traces some major developments by means of ‘classic’ texts, whereas the second deals with the crucial issue of whether a shared language is a prerequisite for a shared identity.

  4. Exploring the identity and "sense of identity" of organisations

    Directory of Open Access Journals (Sweden)

    C L Van Tonder

    2006-04-01

    Full Text Available During the past two decades a steady increase in scholarly contributions in the area of organisation identity have been observed – to the point that the phenomenon is now the subject of a sustainable discourse in several disciplines. Many theoretical and conceptual dilemmas however remain, largely as a result of the low incidence of empirical research in the area. This study reports the results of an exploratory investigation that adapted Schley and Wagenfield’s (1979 concept of identity for use in an organisational setting. Interviews were conducted with 152 top managers representing 10 companies. The results indicate that organisational responses to the question “who am I?�? elicit distinctive organisational self-descriptions and some awareness of identity issues.

  5. Share capitalism and worker wellbeing.

    Science.gov (United States)

    Bryson, Alex; Clark, Andrew E; Freeman, Richard B; Green, Colin P

    2016-10-01

    We show that worker wellbeing is determined not only by the amount of compensation workers receive but also by how compensation is determined. While previous theoretical and empirical work has often been preoccupied with individual performance-related pay, we find that the receipt of a range of group-performance schemes (profit shares, group bonuses and share ownership) is associated with higher job satisfaction. This holds conditional on wage levels, so that pay methods are associated with greater job satisfaction in addition to that coming from higher wages. We use a variety of methods to control for unobserved individual and job-specific characteristics. We suggest that half of the share-capitalism effect is accounted for by employees reciprocating for the "gift"; we also show that share capitalism helps dampen the negative wellbeing effects of what we typically think of as "bad" aspects of job quality.

  6. Medicaid Disproportionate Share Hospital Payments

    Data.gov (United States)

    U.S. Department of Health & Human Services — Medicaid Disproportionate Share Hospital (DSH) Payments This link provides you with information about Medicaid DSH Payments. You can find information on DSH Audit...

  7. Los espacios compartidos ("Shared Space"

    Directory of Open Access Journals (Sweden)

    Mateus Porto Schettino

    2008-07-01

    The "Shared Space" concept was formally defined when the European Project with this title took place, as part of the Interreg IIIB, North Sea Program. "Shared Space" initiated at 2004 and it's time as a project partly financed by the European Union finish at 2008, after having promoted seven "pilot projects" at Germany, Belgium, Denmark, Holland and England. Nevertheless, Shared Space, it's just a new name for a technique with decades of history, developed fundamentally in Holland and which implemented new criteria for traffic regulation and public space design, were based on all traffic signs elimination and on the spatial integration of all different street users. To analyze Shared Space's projects construction and operation experience, and evaluate their possible application in some Spanish city centres is this paper main objective.

  8. Benefit sharing in health research

    African Journals Online (AJOL)

    2015-08-02

    Aug 2, 2015 ... [4] Those who contribute to scientific research ought to share in its benefits. .... women to form new relationships, social networks and develop a sense of ... or discoveries about the indigenous biological resources before.

  9. United Network for Organ Sharing

    Science.gov (United States)

    ... donor families & recipients Organ donation facts Policy Policy development Policy brochures Membership Data Transplant trends Data resources Technology Get Involved EDUCATE Become a UNOS Ambassador Promote organ donation Share through social media VISIT Attend a UNOS event Tour the National ...

  10. Sharing Resources in Educational Communities

    Directory of Open Access Journals (Sweden)

    Anoush Margarayn

    2010-06-01

    Full Text Available The paper explores the implications of mobility within educational communities for sharing and reuse of educational resources. The study begins by exploring individuals’ existing strategies for sharing and reusing educational resources within localised and distributed communities, with particular emphasis on the impact of geographic location on these strategies. The results indicate that the geographic distribution of communities has little impact on individuals’ strategies for resource management, since many individuals are communicating via technology tools with colleagues within a localised setting. The study points to few major differences in the ways in which individuals within the localised and distributed communities store, share and collaborate around educational resources. Moving beyond the view of individuals being statically involved in one or two communities, mobility across communities, roles and geographic location are formulated and illustrated through eight scenarios. The effects of mobility across these scenarios are outlined and a framework for future research into mobility and resource sharing within communities discussed.

  11. Network node for peripheral sharing

    International Nuclear Information System (INIS)

    Bobbitt, J.; Johnson, M.

    1977-01-01

    A module which enables several independent computer systems to share the peripherals (graphics display and line printer) of a PDP-11 computer is described. The module requires no software support in the PDP-11

  12. Shared Year Exchange in Nursing

    DEFF Research Database (Denmark)

    Vedsegaard, Helle Wendner; Wederkinck, Elisabeth

    2010-01-01

    Beskrivelse af Shared Year Exchange in Nursing, et udviklingsporjekt omhandlende udvikling, beskrivelse og implementering af et fælles studieår for sygeplejerskestuderende ved Metropol og La Trobe University Australien.......Beskrivelse af Shared Year Exchange in Nursing, et udviklingsporjekt omhandlende udvikling, beskrivelse og implementering af et fælles studieår for sygeplejerskestuderende ved Metropol og La Trobe University Australien....

  13. Value of Sharing: Viral Advertisement

    OpenAIRE

    Duygu Aydın; Aşina Gülerarslan; Süleyman Karaçor; Tarık Doğan

    2013-01-01

    Sharing motivations of viral advertisements by consumers and the impacts of these advertisements on the perceptions for brand will be questioned in this study. Three fundamental questions are answered in the study. These are advertisement watching and sharing motivations of individuals, criteria of liking viral advertisement and the impact of individual attitudes for viral advertisement on brand perception respectively. This study will be carried out via a viral advertise...

  14. Maximum-likelihood estimation of recent shared ancestry (ERSA).

    Science.gov (United States)

    Huff, Chad D; Witherspoon, David J; Simonson, Tatum S; Xing, Jinchuan; Watkins, W Scott; Zhang, Yuhua; Tuohy, Therese M; Neklason, Deborah W; Burt, Randall W; Guthery, Stephen L; Woodward, Scott R; Jorde, Lynn B

    2011-05-01

    Accurate estimation of recent shared ancestry is important for genetics, evolution, medicine, conservation biology, and forensics. Established methods estimate kinship accurately for first-degree through third-degree relatives. We demonstrate that chromosomal segments shared by two individuals due to identity by descent (IBD) provide much additional information about shared ancestry. We developed a maximum-likelihood method for the estimation of recent shared ancestry (ERSA) from the number and lengths of IBD segments derived from high-density SNP or whole-genome sequence data. We used ERSA to estimate relationships from SNP genotypes in 169 individuals from three large, well-defined human pedigrees. ERSA is accurate to within one degree of relationship for 97% of first-degree through fifth-degree relatives and 80% of sixth-degree and seventh-degree relatives. We demonstrate that ERSA's statistical power approaches the maximum theoretical limit imposed by the fact that distant relatives frequently share no DNA through a common ancestor. ERSA greatly expands the range of relationships that can be estimated from genetic data and is implemented in a freely available software package.

  15. Hierarchy of modular graph identities

    International Nuclear Information System (INIS)

    D’Hoker, Eric; Kaidi, Justin

    2016-01-01

    The low energy expansion of Type II superstring amplitudes at genus one is organized in terms of modular graph functions associated with Feynman graphs of a conformal scalar field on the torus. In earlier work, surprising identities between two-loop graphs at all weights, and between higher-loop graphs of weights four and five were constructed. In the present paper, these results are generalized in two complementary directions. First, all identities at weight six and all dihedral identities at weight seven are obtained and proven. Whenever the Laurent polynomial at the cusp is available, the form of these identities confirms the pattern by which the vanishing of the Laurent polynomial governs the full modular identity. Second, the family of modular graph functions is extended to include all graphs with derivative couplings and worldsheet fermions. These extended families of modular graph functions are shown to obey a hierarchy of inhomogeneous Laplace eigenvalue equations. The eigenvalues are calculated analytically for the simplest infinite sub-families and obtained by Maple for successively more complicated sub-families. The spectrum is shown to consist solely of eigenvalues s(s−1) for positive integers s bounded by the weight, with multiplicities which exhibit rich representation-theoretic patterns.

  16. Hierarchy of modular graph identities

    Energy Technology Data Exchange (ETDEWEB)

    D’Hoker, Eric; Kaidi, Justin [Mani L. Bhaumik Institute for Theoretical Physics, Department of Physics and Astronomy,University of California,Los Angeles, CA 90095 (United States)

    2016-11-09

    The low energy expansion of Type II superstring amplitudes at genus one is organized in terms of modular graph functions associated with Feynman graphs of a conformal scalar field on the torus. In earlier work, surprising identities between two-loop graphs at all weights, and between higher-loop graphs of weights four and five were constructed. In the present paper, these results are generalized in two complementary directions. First, all identities at weight six and all dihedral identities at weight seven are obtained and proven. Whenever the Laurent polynomial at the cusp is available, the form of these identities confirms the pattern by which the vanishing of the Laurent polynomial governs the full modular identity. Second, the family of modular graph functions is extended to include all graphs with derivative couplings and worldsheet fermions. These extended families of modular graph functions are shown to obey a hierarchy of inhomogeneous Laplace eigenvalue equations. The eigenvalues are calculated analytically for the simplest infinite sub-families and obtained by Maple for successively more complicated sub-families. The spectrum is shown to consist solely of eigenvalues s(s−1) for positive integers s bounded by the weight, with multiplicities which exhibit rich representation-theoretic patterns.

  17. PERSONAL IDENTITY IN DEAF ADOLESCENTS

    Directory of Open Access Journals (Sweden)

    Joanna KOSSEWSKA

    2008-06-01

    Full Text Available The purpose of this study was to investigate the factors influencing the identity deaf adolescents. The study involved 67 deaf adolescents (38 boys and 29 girls aged 16 to 19 students of secondary school. Ninety-three hearing children constituted a comparison group. The structure of identity was explored on the basis of identification references given by the subjects who were to reply in writing, 20 times running, to the question: „Who Am I?” the test, adapted from M. H. Kuhn and T. S. McPartland by Martines and Silvestre (1995 given in written and signed mode.Results showed that the hearing status as well as mode of communication influence the description of personal identity. It was found that deaf adoles­cents used more descriptions especially in the fol­lowing categories: Civil Status, Body and Physical Appearance, Tastes and Activities, Friendship and Relationships, Personal and Social Situation, Negative Personal Traits, and Neutral Personality Traits. Although this study could demonstrate im­pact independent variables on identity, the data raise the need for further, preferably longitudinal, research. This complex phenomenon has to be examined more closely.Combined self-descriptive processes lead to the development of an organized, learned and dynamic identity, and subjective description of an individ­ual has strong emotional consequences for the in­dividual in question.

  18. Quantum entanglement of identical particles

    International Nuclear Information System (INIS)

    Shi Yu

    2003-01-01

    We consider entanglement in a system with a fixed number of identical particles. Since any operation should be symmetrized over all the identical particles and there is the precondition that the spatial wave functions overlap, the meaning of identical-particle entanglement is fundamentally different from that of distinguishable particles. The identical-particle counterpart of the Schmidt basis is shown to be the single-particle basis in which the one-particle reduced density matrix is diagonal. But it does not play a special role in the issue of entanglement, which depends on the single-particle basis chosen. The nonfactorization due to (anti)symmetrization is naturally excluded by using the (anti)symmetrized basis or, equivalently, the particle number representation. The natural degrees of freedom in quantifying the identical-particle entanglement in a chosen single-particle basis are occupation numbers of different single-particle basis states. The entanglement between effectively distinguishable spins is shown to be a special case of the occupation-number entanglement

  19. Leisure Time and Social Identity

    Directory of Open Access Journals (Sweden)

    Rasoul Rabbani

    2010-01-01

    Full Text Available How could patterns of leisure represent social identity? Whether they are sub-ordinate to the class identity or in the contemporary context of consumption and the post-modern cultural transformations, they could represent some other different social identities based on the patterns of consumption? Considering “leisure time” as a part of “style of life”, the present study attempts to explore social identity. There are two parts in methodology; first the qualitative one, carried through deep interview technique; and the other, surveying through questionnaire. Results distinguish the determining role “social class”, and the combination of “gender” and social class play in modeling distinctions in leisure patterns. In other words, leisure –as the arena for individual choice- is restricted to the social class and gender –as the structural and contextual variables. The strong correlation identity has with the social class and gender denies the post-modern interpretations which emphasis on consumption as the cause of social differentiations.

  20. Measuring and Modeling Shared Visual Attention

    Science.gov (United States)

    Mulligan, Jeffrey B.; Gontar, Patrick

    2016-01-01

    Multi-person teams are sometimes responsible for critical tasks, such as flying an airliner. Here we present a method using gaze tracking data to assess shared visual attention, a term we use to describe the situation where team members are attending to a common set of elements in the environment. Gaze data are quantized with respect to a set of N areas of interest (AOIs); these are then used to construct a time series of N dimensional vectors, with each vector component representing one of the AOIs, all set to 0 except for the component corresponding to the currently fixated AOI, which is set to 1. The resulting sequence of vectors can be averaged in time, with the result that each vector component represents the proportion of time that the corresponding AOI was fixated within the given time interval. We present two methods for comparing sequences of this sort, one based on computing the time-varying correlation of the averaged vectors, and another based on a chi-square test testing the hypothesis that the observed gaze proportions are drawn from identical probability distributions. We have evaluated the method using synthetic data sets, in which the behavior was modeled as a series of "activities," each of which was modeled as a first-order Markov process. By tabulating distributions for pairs of identical and disparate activities, we are able to perform a receiver operating characteristic (ROC) analysis, allowing us to choose appropriate criteria and estimate error rates. We have applied the methods to data from airline crews, collected in a high-fidelity flight simulator (Haslbeck, Gontar & Schubert, 2014). We conclude by considering the problem of automatic (blind) discovery of activities, using methods developed for text analysis.

  1. Cold comfort at the Magh Mela: social identity processes and physical hardship.

    Science.gov (United States)

    Pandey, Kavita; Stevenson, Clifford; Shankar, Shail; Hopkins, Nicholas P; Reicher, Stephen D

    2014-12-01

    Humans inhabit environments that are both social and physical, and in this article we investigate if and how social identity processes shape the experience and negotiation of physically demanding environmental conditions. Specifically, we consider how severe cold can be interpreted and experienced in relation to group members' social identity. Our data comprise ethnographic observation and semi-structured interviews with pilgrims attending a month-long winter Hindu religious festival that is characterized by near-freezing conditions. The analysis explores (1) how pilgrims appraised the cold and how these appraisals were shaped by their identity as pilgrims; (2) how shared identity with other pilgrims led to forms of mutual support that made it easier to cope with the cold. Our findings therefore extend theorizing on social identity processes to highlight their relevance to physical as well as social conditions. © 2013 The British Psychological Society.

  2. Making meaning of urban American Indian identity: a multistage integrative process.

    Science.gov (United States)

    Lucero, Nancy M

    2010-10-01

    The cultural identity and tribal connectedness of American Indians are commonly believed to have been negatively affected by the urbanization process in which American Indians have been involved during the past half century. This phenomenological study examined the processes through which cultural identity was formed and maintained by a group of American Indians who had lived since childhood in urban areas, away from their reservations or tribal communities. Seven urban Indian adults, each from a different tribe, shared their experiences related to coming to understand what it means to be American Indian and the development of their American Indian cultural identity. Four themes emerged from participant interviews and were seen to correspond to stages that participants passed through, from their teens through their 30s, that led to understanding and integration of their American Indian identity. Findings point to the importance of considering issues of cultural identity development when providing social work services to urban American Indian young adults.

  3. IDENTITY AND THE EUROPEAN UNION

    Directory of Open Access Journals (Sweden)

    Abrudan Cristina

    2008-05-01

    Full Text Available The purpose of this article is to throw some light on the question of identity in the European Union. The challenge is to understand how identity formation takes place in the contemporary world. The European integration has to be understood both as a process of socio-economic convergence among European states but also as a process of co-operation on different other levels, too. It seems that cultures, traditions and interests are more and more interconnected as societies become increasingly multicultural. This is the reason why people are concerned with the concept of identity and the recognition of their uniqueness in terms of traditions, values and ways of lives.

  4. Identity, Diversity and Diversity Management

    DEFF Research Database (Denmark)

    Holck, Lotte; Muhr, Sara Louise; Villeseche, Florence

    2016-01-01

    – The work can encourage policy makers, diversity and HR managers to question their own practices and assumptions leading to more theoretical informed diversity management practices. Originality/value – The theoretical connections between identity and diversity literature have so far not been reviewed......The purpose of this paper is to examine the relationship between the identity and diversity literatures and discuss how a better understanding of the theoretical connections between the two informs both diversity research and diversity management practices. Design/methodology/approach – Literature...... and limitations – is crucial for successful diversity management research and practice. Research limitations/implications – The authors argue for a better understanding of differences, overlaps and limits of different identity perspectives, and for a stronger engagement with practice. Practical implications...

  5. National identity in multicultural environment

    Directory of Open Access Journals (Sweden)

    Milena Öbrink Hobzová

    2017-11-01

    Full Text Available In today's globalized world, it is important to find a relationship to our own culture as well as to the other cultures which we encounter due to migration. This goal should be met in multicultural education. As a result of the so-called migration crisis, effectiveness of multicultural education was discussed on social networks and in media. At the same time, national interests and security began to appear in the programmes of political parties. It seems that, due to the fear of refugees, national identity started becoming more important. The situation is reflected in the research presented below. It aimed to determine whether there was a link between the sense of national identity and attitudes to foreigners. The investigation was carried out in 2015 on a sample of 245 respondents. The results showed that the growing sense of national identity deepened the negative attitude to foreigners. It is necessary to work with this fact in multicultural education at schools.

  6. CORPORATE IDENTITY SEJARAH DAN APLIKASINYA

    Directory of Open Access Journals (Sweden)

    Christine Suharto Cenadi

    1999-01-01

    Full Text Available In the recent globalization era%2C and the developed market%2C many companies compete to attract consumers to buy their products. One of the keys to compete and survive in this developing market is by creating an image and graphic identity. This paper will discuss about corporate identity%2C image%2C its purpose and applications. Abstract in Bahasa Indonesia : Dalam era globalisasi dewasa ini%2C dan dengan berkembangnya pasar (market%2C banyak perusahaan bersaing untuk menarik perhatian konsumen untuk membeli produknya. Salah satu cara untuk bersaing dan dapat bertahan di dalam pasar yang terus berkembang ini adalah dengan menciptakan suatu image dan identitas graphic. Tulisan ini akan membahas tentang corporate identity%2C image%2C fungsi dan aplikasinya

  7. 12 CFR 701.35 - Share, share draft, and share certificate accounts.

    Science.gov (United States)

    2010-01-01

    ..., and share certificate accounts in all advertising, disclosures, or agreements, whether written or oral..., other federal law, and its contractual obligations, determine the types of fees or charges and other...

  8. Theta function identities associated with Ramanujan's modular ...

    Indian Academy of Sciences (India)

    In Chapter 20 of his second notebook [6], Ramanujan recorded several theta function identities associated with modular equations of composite degree 15. These identities have previously been proved by Berndt in [3]. But he proved most of these theta function identities using modular equations. These identities can also ...

  9. On an extension of a combinatorial identity

    Indian Academy of Sciences (India)

    to an infinite family of 4-way combinatorial identities. In some particular cases we get even 5-way combinatorial identities which give us four new combinatorial versions of. Göllnitz–Gordon identities. Keywords. n-Color partitions; lattice paths; Frobenius partitions; Göllnitz–Gordon identities; combinatorial interpretations. 1.

  10. Exploring Japanese university English teachers' professional identity

    CERN Document Server

    Nagatomo, Diane Hawley

    2012-01-01

    This book examines the professional identities of Japanese university English teachers. It focuses on how relatively new teachers develop their professional identities, how gender impacts the professional identities of female professors, and how teaching practices and beliefs reflect personal and professional identity.

  11. 7 CFR 52.771 - Identity.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 2 2010-01-01 2010-01-01 false Identity. 52.771 Section 52.771 Agriculture... United States Standards for Grades of Canned Red Tart Pitted Cherries 1 Identity and Grades § 52.771 Identity. Canned red tart pitted cherries is the product represented as defined in the standard of identity...

  12. Teacher Identity Work in Mathematics Teacher Education

    Science.gov (United States)

    Neumayer-Depiper, Jill

    2013-01-01

    Becoming a teacher is not developing an identity, but is developing identity as a continuous process of constructing and deconstructing understandings within the complexities of social practice, beliefs, experiences, and social norms. I take up this stance on identity as articulated in Judith Butler's (1999) work with gender identity and…

  13. Identity and Diversity in Today's World

    Science.gov (United States)

    Gee, James Paul

    2017-01-01

    This paper develops a thesis about identity and diversity. I first look at activity-based identities, identities like being a gardener, birder, citizen scientist or fan-fiction writer. These are freely chosen identities and they are proliferating at a great rate today thanks to participatory culture, the Maker Movement and digital and social…

  14. Integrating Identities: Ethnic and Academic Identities among Diverse College Students

    Science.gov (United States)

    Walker, Lovey H. M.; Syed, Moin

    2013-01-01

    Background/Context: Students of Color continue to be underrepresented at the undergraduate level. Recent research has demonstrated the importance of non-academic psychosocial factors for understanding college experiences. One factor, identity, is a broad, multidimensional construct that comprises numerous distinct domains, including political,…

  15. Blended Identities: Identity Work, Equity and Marginalization in Blended Learning

    Science.gov (United States)

    Heikoop, Will

    2013-01-01

    This article is a theoretical study of the self-presentation strategies employed by higher education students online; it examines student identity work via profile information and avatars in a blended learning environment delivered through social networking sites and virtual worlds. It argues that students are faced with difficult choices when…

  16. Men as victims: "victim" identities, gay identities, and masculinities.

    Science.gov (United States)

    Dunn, Peter

    2012-11-01

    The impact and meanings of homophobic violence on gay men's identities are explored with a particular focus on their identities as men and as gay men. Homosexuality can pose a challenge to conventional masculinities, and for some gay men, being victimized on account of sexual orientation reawakens conflicts about their masculinity that they thought they had resolved. Being victimized can reinvoke shame that is rooted in failure or unwillingness to uphold masculine norms. For some gay men, victimization therefore has connotations of nonmasculinity that make being a victim an undesirable status, yet that status must be claimed to obtain a response from criminal justice or victim services. Men who experience homophobic abuse are helped by accepting a victim identity, but only if they can quickly move on from it by reconstructing a masculine gay (nonvictim) identity. This process can be facilitated by agencies such as the police and victim services, provided they help men exercise agency in "fighting back," that is, resisting further victimization and recovering.

  17. Layering spatial identities: the identity discourses of new regions

    NARCIS (Netherlands)

    Terlouw, K.; van Gorp, B.H.

    2014-01-01

    The number and importance of regions are increasing at the same time as traditional regional identities are undermined through processes like globalisation and individualisation. Local and other administrations increasingly cooperate and create new regions which are too changeable for a distinct

  18. Contested identities: Identity constructions in a youth recreational drug culture

    DEFF Research Database (Denmark)

    Ravn, Signe

    2012-01-01

    as responsible drug users. The article studies this recreational drug culture and its internal distinctions, conceptions and norms as they are expressed discursively. The analysis identifies six dimensions of the identity as a responsible, recreational drug user: drug practice, general drug knowledge, context...

  19. Share opportunity sets and cooperative games

    NARCIS (Netherlands)

    Caprari, E.; Patrone, F.; Pusillo, L.; Tijs, S.H.; Torre, A.

    2008-01-01

    In many share problems there is ana priorigiven a natural set of possible divisions to solve the sharing problem. Cooperative games related to such share sets are introduced, which may be helpful in solving share problems. Relations between properties of share sets and properties of games are

  20. Share Opportunity Sets and Cooperative Games

    NARCIS (Netherlands)

    Caprari, E.; Patrone, F.; Pusillo, L.; Tijs, S.H.; Torre, A.

    2006-01-01

    In many share problems there is a priori given a natural set of possible divisions to solve the sharing problem.Cooperative games related to such share sets are introduced, which may be helpful in solving share problems.Relations between properties of share sets and properties of games are

  1. Job Sharing--Opportunities or Headaches?

    Science.gov (United States)

    Leighton, Patricia

    1986-01-01

    Discusses the issue of job sharing as a new alternative available to workers. Topics covered include (1) a profile of job sharers, (2) response to job sharing, (3) establishing a job share, (4) job sharing in operation, and (5) legal analysis of job sharing. (CH)

  2. Display Sharing: An Alternative Paradigm

    Science.gov (United States)

    Brown, Michael A.

    2010-01-01

    The current Johnson Space Center (JSC) Mission Control Center (MCC) Video Transport System (VTS) provides flight controllers and management the ability to meld raw video from various sources with telemetry to improve situational awareness. However, maintaining a separate infrastructure for video delivery and integration of video content with data adds significant complexity and cost to the system. When considering alternative architectures for a VTS, the current system's ability to share specific computer displays in their entirety to other locations, such as large projector systems, flight control rooms, and back supporting rooms throughout the facilities and centers must be incorporated into any new architecture. Internet Protocol (IP)-based systems also support video delivery and integration. IP-based systems generally have an advantage in terms of cost and maintainability. Although IP-based systems are versatile, the task of sharing a computer display from one workstation to another can be time consuming for an end-user and inconvenient to administer at a system level. The objective of this paper is to present a prototype display sharing enterprise solution. Display sharing is a system which delivers image sharing across the LAN while simultaneously managing bandwidth, supporting encryption, enabling recovery and resynchronization following a loss of signal, and, minimizing latency. Additional critical elements will include image scaling support, multi -sharing, ease of initial integration and configuration, integration with desktop window managers, collaboration tools, host and recipient controls. This goal of this paper is to summarize the various elements of an IP-based display sharing system that can be used in today's control center environment.

  3. Status of personnel identity verifiers

    International Nuclear Information System (INIS)

    Maxwell, R.L.

    1985-01-01

    Identity verification devices based on the interrogation of six different human biometric features or actions now exist and in general have been in development for about ten years. The capability of these devices to meet the cost and operational requirements of speed, accuracy, ease of use and reliability has generally increased although the verifier industry is still immature. Sandia Laboratories makes a continuing effort to stay abreast of identity verifier developments and to assess the capabilities and improvements of each device. Operating environment and procedures more typical of field use can often reveal performance results substantially different from laboratory tests. An evaluation of several recently available verifiers is herein reported

  4. Saving Face and Group Identity

    DEFF Research Database (Denmark)

    Eriksson, Tor; Mao, Lei; Villeval, Marie-Claire

    2015-01-01

    their self- but also other group members' image. This behavior is frequent even in the absence of group identity. When group identity is more salient, individuals help regardless of whether the least performer is an in-group or an out-group. This suggests that saving others' face is a strong social norm.......Are people willing to sacrifice resources to save one's and others' face? In a laboratory experiment, we study whether individuals forego resources to avoid the public exposure of the least performer in their group. We show that a majority of individuals are willing to pay to preserve not only...

  5. Ego identity formation in middle adolescence.

    Science.gov (United States)

    Lavoie, J C

    1976-12-01

    Assumed determinants of ego identity were investigated in this study using sophomore, junior, and senior high school males and females. Subjects were administered the Marcia Ego Identity Status Scale and measures of sex-role identification, personality development, psychological functioning, self-concept, and parental socialization practices. Data analyses, using a median split on identity score, showed that high-identity adolescents obtained more positive scores on sex-role identification, personality development, psychological adjustment, and self-concept than low-identity adolescents. Socialization practices also differed for the two groups. The sex differences which emerged were congruent with the identity literature. Overall, the data supported Erikson's theory of ego identity development.

  6. Akuisisi dan Budaya Knowledge Sharing

    Directory of Open Access Journals (Sweden)

    Nuril Kusumawardhani Soeprapto Putri

    2011-06-01

    Full Text Available Large companies which are experiencing barriers in innovation often take a radical step to acquire knowledge, namely acquisition. Though innovation is not the only reason, acquisition will result in the company wishes to achieve competitive advantage affected by the creation of ideas, creativity and innovation. The three points can be achieved more easily when the knowledge sharing within the organization / company runs well. However, the acquisition maybe impacts as a counter-attack for the knowledge sharing culture both in the acquisitor and and company which obtains the acquisition. Therefore, a key to succeed the acquisition is a sharing culture among individuals within a company that runs well or even better. Individuals from the acquisitor and those of the company that obtains the acquisition can adapt to each other and have confidence in order not to hinder them to share knowledge. This study discusses in detail the potential impacts of an acquisition upon a knowledge sharing culture in a company. 

  7. The Risky Path to a Followership Identity

    DEFF Research Database (Denmark)

    Larsson, Magnus; Nielsen, Mie Femø

    2017-01-01

    Followership research has increased recently, but little attention has been paid to the complexities and challenges of creating a followership identity. Researchers typically portray followership as a safe alternative to leadership identity, but we challenge this assumption by using naturally...... occurring workplace interactions to identify active contributions as well as risks associated with a follower identity. In this study, we use conversation analysis to examine how people collaboratively construct identities, and how identity development shapes and organizes interactions between people...

  8. Lift of dilogarithm to partition identities

    International Nuclear Information System (INIS)

    Terhoeven, M.

    1992-11-01

    For the whole set of dilogarithm identities found recently using the thermodynamic Bethe-Ansatz for the ADET series of purely elastic scattering theories we give partition identities which involve characters of those conformal field theories which correspond to the UV-limits of the scattering theories. These partition identities in turn allow to derive the dilogarithm identities using modular invariance and a saddle point approximation. We conjecture on possible generalizations of this correspondance, namely, a lift from dilogarithm to partition identities. (orig.)

  9. Measurements of Charge Sharing Effects in Pixilated CZT/CdTe Detectors

    DEFF Research Database (Denmark)

    Kuvvetli, Irfan; Budtz-Jørgensen, Carl

    2007-01-01

    In this paper, charge sharing and charge loss effects in pixilated CZT/CdTe detectors are investigated by measurements. We measured charge sharing effects function of the inter-pixel gap (with same pixel pitch), the photon energy and the detector bias voltage for a large numbers of CZT and Cd......Te pixel detector samples. The results are used for the development of the large area X-ray and Gamma ray detector for the Atmosphere-Space Interactions Monitor (ASIM) planned for the ISS ESA Columbus module. Charge sharing measurements on detector samples with identical size and pixel geometry...

  10. Brand: Identity, Image, and Relationships

    Science.gov (United States)

    Danker, Stephanie Harvey

    2014-01-01

    Adolescents face complex dilemmas such as challenging issues of identity and self-concept, and struggles with building and maintaining relationships. These issues must be embraced in the art classroom. This Instructional Resource will focus on the concept of brand--connecting visual art, marketing, and psychology--and center on ideas found in the…

  11. Cultural heritage and identity politics

    NARCIS (Netherlands)

    During, R.

    2011-01-01

    ‘As the authors in this fascinating volume point out, both heritage and identity discourse can be instrumentalized, by proponents and opponents of European integration, as they can be commodified, in branding efforts with various implementations. Just as in Macchiavelli’s Europe, political and

  12. Developing Students' Professional Digital Identity

    Science.gov (United States)

    Cochrane, Thomas; Antonczak, Laurent

    2015-01-01

    In contrast to the myth of the "Digital Native" and the ubiquity of Facebook use, we have found that students' digital identities are predominantly social with their online activity beyond Facebook limited to being social media consumers rather than producers. Within a global economy students need to learn new digital literacy skills to…

  13. Cultural Identity in Korean English

    Science.gov (United States)

    Chang, Bok-Myung

    2010-01-01

    This study aims to investigate the cultural identity of Korean English and to make the intercultural communications among non-native speakers successful. The purposes of this study can be summarized as follows: 1) to recognize the concept of English as an International Language (EIL), 2) to emphasize cross-cultural understanding in the globalized…

  14. Feminist Identity among Latina Adolescents

    Science.gov (United States)

    Manago, Adriana M.; Brown, Christia Spears; Leaper, Campbell

    2009-01-01

    This study explores developing conceptions of feminism among Latina adolescents, their prevalence of feminist endorsement, and whether home environment and well-being are related to feminist identity. One hundred and forty Latina girls (Grades 9 to 12, M age = 15) wrote personal narratives of their understanding of feminism and whether they…

  15. On 3-way combinatorial identities

    Indian Academy of Sciences (India)

    A K Agarwal

    2018-03-19

    Mar 19, 2018 ... Math. 79 (2009) 145–155), and Agarwal (J. Number Theory 28 (1988) 299–305). Keywords. Basic series; n-color partitions; lattice paths; associated lattice paths; ...... J. Math. 136(2) (1989) 209–228. [5] Agarwal A K and Goyal M, Lattice paths and Rogers identities, Open J. Discrete Math. 1. (2011) 89–95.

  16. Identity Representations in Visual Texts

    Science.gov (United States)

    Hayik, Rawia

    2012-01-01

    In an attempt to address minority issues with Israeli Arab English-as-a-foreign-language ninth-grade students, I as a teacher researcher introduced picture books on the issue and invited students to respond in different modes, one of which was artistic. In one of the lessons, students created collages to represent their identities. In this…

  17. [Identity and narration: autobiographical quests].

    Science.gov (United States)

    Arfuch, Leonor

    2013-01-01

    This paper aims to tackle the subtle relation between autobiographical narratives and identity construction, from a non essentialist conception of identity. In a perspective that articulates philosophy of language, psychoanalysis, semiotics and literary critique, we posit the concept of biographical space as an analytical instrument to make a critical update of the reconfiguration of identities and subjectivities in contemporary culture, marked by the predominance of the biographical, the private and a kind of "public intimacy". This look is more symptomatic than descriptive: it intends to account for the rise of auto/biographical narratives and life-stories, from canonic genres to their multiple derivations in the media, social networks and the most diverse artistic practices, a phenomenon that seems to reaffirm the notion of narrative identities by Ricoeur. Our analysis here, from an ethic, aesthetic and political point of view, will focus on two visual arts experiences that have recently taken place for the first time in Buenos Aires: Christian Boltanski's and Tracey Emin's, solo exhibitions, each of them with a different biographical approach.

  18. Rethinking Materiality, Memory and Identity

    Directory of Open Access Journals (Sweden)

    Tracy Ireland

    2016-12-01

    Full Text Available This introductory article  considers and questions exactly how materials and people constitute social worlds and relationships which sustain identity and memory and, in turn, the social and political structures or norms that these attachments invest in, stabilise and maintain.

  19. Identity, causality, and pronoun ambiguity.

    Science.gov (United States)

    Sagi, Eyal; Rips, Lance J

    2014-10-01

    This article looks at the way people determine the antecedent of a pronoun in sentence pairs, such as: Albert invited Ron to dinner. He spent hours cleaning the house. The experiment reported here is motivated by the idea that such judgments depend on reasoning about identity (e.g., the identity of the he who cleaned the house). Because the identity of an individual over time depends on the causal-historical path connecting the stages of the individual, the correct antecedent will also depend on causal connections. The experiment varied how likely it is that the event of the first sentence (e.g., the invitation) would cause the event of the second (the house cleaning) for each of the two individuals (the likelihood that if Albert invited Ron to dinner, this would cause Albert to clean the house, versus cause Ron to clean the house). Decisions about the antecedent followed causal likelihood. A mathematical model of causal identity accounted for most of the key aspects of the data from the individual sentence pairs. Copyright © 2014 Cognitive Science Society, Inc.

  20. Constructing and Reconstructing Narrative Identity

    Directory of Open Access Journals (Sweden)

    Gabriele Lucius-Hoene

    2000-06-01

    Full Text Available The research work done by the author investigates a phenomenological field—the subjective experience of chronic illness and disability—by means of a specific research instrument, the autobiographical narrative interview. It focuses on the concept of narrative identity and its empirical substrate in the scientifically generated texts. Narrative identity is regarded as a situated, pragmatic, autoepistemic and interactive activity drawing on culturally transmitted narrative conventions which is performed within the research context. We have been working with a systematic analytic approach which covers interactive and contextual aspects of the interview situation as well as rhetoric and positioning strategies in the act of telling. Other research questions concern the concept of "narrative coping" and the comparison of partner's narratives on problems of illness and disability, especially on scrutinizing aspects of identity and alterity (self and other in the texts. This work can be understood as combining aspects of the research domains of narratology, identity and coping on the background of a qualitative methodology. URN: urn:nbn:de:0114-fqs0002189

  1. 6 Keys to Identity Management

    Science.gov (United States)

    Shoham, Idan

    2011-01-01

    An Identity and Access Management (IAM) project on campus can feel like a Sisyphean task: Just when access rights have finally been sorted out, the semester ends--and users change roles, leave campus, or require new processes. IT departments face a constantly changing technical landscape: (1) integrating new applications and retiring old ones; (2)…

  2. FRAGMENTED IDENTITIES: THE CULTURAL COLLISION ...

    African Journals Online (AJOL)

    User

    Born in the former French and German colony of. Togo, Komla-Ebri ... of how cultural barriers not only lead to isolation and fragmented identities, but also ..... and, in recreating bits of Italy, in the form of music, cinema and food, absorbs parts of ...

  3. Identity and sortals (and Caesar)

    Czech Academy of Sciences Publication Activity Database

    Klev, Ansten

    2017-01-01

    Roč. 82, č. 1 (2017), s. 1-16 ISSN 0165-0106 Institutional support: RVO:67985955 Keywords : identity * neo-logicism * type theory * Julius Caesar problem Subject RIV: AA - Philosophy ; Religion OBOR OECD: Philosophy, History and Philosophy of science and technology

  4. Arla and Danish National Identity

    DEFF Research Database (Denmark)

    Mordhorst, Mads

    2014-01-01

    into modernity that is more democratic than the traditional process of industrialisation seen in other European countries. Thus the narrative of the co-operatives has become part of Danish memory and identity. In the post-war years, however, and especially in the last two decades, the process of globalisation...

  5. Monetary Organization and National Identity

    DEFF Research Database (Denmark)

    Ravn Sørensen, Anders

    2016-01-01

    This article develops a detailed overview of literature on the relationship between monetary organization, understood as currencies and central banks, and issues of national identity and nationalism. It demonstrates how the literature on this subject for the past 20 years has developed into a dis......This article develops a detailed overview of literature on the relationship between monetary organization, understood as currencies and central banks, and issues of national identity and nationalism. It demonstrates how the literature on this subject for the past 20 years has developed...... into a distinct research field and the article sketches a set of different methodological approaches as well as geographical and thematical variations within the field. In particular, the overview points to a recent shift in focus from a preoccupation with the identity-cultivating qualities of monetary...... organization to an emphasis on how collective identities legitimize monetary organization. Based on the literature review, the article points to two underdeveloped themes for future research to investigate: (1) further studies on the interrelation between the legitimacy of monetary organization and national...

  6. An 'open source' networked identity

    DEFF Research Database (Denmark)

    Larsen, Malene Charlotte

    2016-01-01

    This chapter examines the concept of identity in relation to youth practices on social network sites (SNSs). The chapter illustrates how writing “I love you” or other emotional statements on each other’s profiles on SNSs is not only a common way for Danish teenagers to communicate and practice...

  7. Facilitating Conversations about Managerial Identities

    DEFF Research Database (Denmark)

    Madsen, Mona Toft

    -based organization in the engineering consulting sector b) a reflection meeting, where the same three managers were gathered, and conversations were facilitated based on identity work in the context of earlier interviews. More specifically, three themes were discussed; flat organizational structure, tensions between...

  8. Identity Transformation of Korean Immigrants.

    Science.gov (United States)

    Kim, Saekyung; Gaa, John; Swank, Paul; Liberman, Dov

    Immigration is one of the most significant changes which can occur in one's lifetime. Immigrants struggle with their foreign environment and renewed crises; they suffer from "uprootedness" and "missed embeddedness" and have difficulty integrating their identity roles. Erikson's psychosocial development theory and Marcia's…

  9. Digital photography: communication, identity, memory

    NARCIS (Netherlands)

    van Dijck, J.

    2008-01-01

    Taking photographs seems no longer primarily an act of memory intended to safeguard a family's pictorial heritage, but is increasingly becoming a tool for an individual's identity formation and communication. Digital cameras, cameraphones, photoblogs and other multipurpose devices are used to

  10. Counselor Identity: Conformity or Distinction?

    Science.gov (United States)

    McLaughlin, Jerry E.; Boettcher, Kathryn

    2009-01-01

    The authors explore 3 debates in other disciplines similar to counseling's identity debate in order to learn about common themes and outcomes. Conformity, distinction, and cohesion emerged as common themes. They conclude that counselors should retain their distinctive, humanistic approach rather than conforming to the dominant, medical approach.

  11. One-way shared memory

    DEFF Research Database (Denmark)

    Schoeberl, Martin

    2018-01-01

    Standard multicore processors use the shared main memory via the on-chip caches for communication between cores. However, this form of communication has two limitations: (1) it is hardly time-predictable and therefore not a good solution for real-time systems and (2) this single shared memory...... is a bottleneck in the system. This paper presents a communication architecture for time-predictable multicore systems where core-local memories are distributed on the chip. A network-on-chip constantly copies data from a sender core-local memory to a receiver core-local memory. As this copying is performed...... in one direction we call this architecture a one-way shared memory. With the use of time-division multiplexing for the memory accesses and the network-on-chip routers we achieve a time-predictable solution where the communication latency and bandwidth can be bounded. An example architecture for a 3...

  12. Availability Cascades & the Sharing Economy

    DEFF Research Database (Denmark)

    Netter, Sarah

    2014-01-01

    attention. This conceptual paper attempts to explain the emergent focus on the sharing economy and associated business and consumption models by applying cascade theory. Risks associated with this behavior will be especially examined with regard to the sustainability claim of collaborative consumption......In search of a new concept that will provide answers to as to how modern societies should not only make sense but also resolve the social and environmental problems linked with our modes of production and consumption, collaborative consumption and the sharing economy are increasingly attracting....... With academics, practitioners, and civil society alike having a shared history in being rather fast in accepting new concepts that will not only provide business opportunities but also a good conscience, this study proposes a critical study of the implications of collaborative consumption, before engaging...

  13. EQUITY SHARES EQUATING THE RESULTS OF FCFF AND FCFE METHODS

    Directory of Open Access Journals (Sweden)

    Bartłomiej Cegłowski

    2012-06-01

    Full Text Available The aim of the article is to present the method of establishing equity shares in weight average cost of capital (WACC, in which the value of loan capital results from the fixed assumptions accepted in the financial plan (for example a schedule of loan repayment and own equity is evaluated by means of a discount method. The described method causes that, regardless of whether cash flows are calculated as FCFF or FCFE, the result of the company valuation will be identical.

  14. The challenges of knowledge sharing in practice a social approach

    CERN Document Server

    Widen-Wulff, Gunilla

    2007-01-01

    Addresses the key skills that are required in organisations in the information intensive society. The book examines the power of information behaviour on the construction of different kinds of shared knowledge and social identity in a group. An introduction to the different dimensions of social capital that is structural and cognitive, and looks at the relational aspects of information behaviour in organisations. Experiences are analysed in two different case studies - in the financial and biotechnology industries - in order to gain additional insights in how the internal organisation environm

  15. Inference for shared-frailty survival models with left-truncated data

    NARCIS (Netherlands)

    van den Berg, G.J.; Drepper, B.

    2016-01-01

    Shared-frailty survival models specify that systematic unobserved determinants of duration outcomes are identical within groups of individuals. We consider random-effects likelihood-based statistical inference if the duration data are subject to left-truncation. Such inference with left-truncated

  16. Fast transfer of shared data

    International Nuclear Information System (INIS)

    Timmer, C.; Abbott, D.J.; Heyes, W.G.; Jostizembski, E.; MacLeod, R.W.; Wolin, E.

    2000-01-01

    The Event Transfer system enables its users to produce events (data) and share them with other users by utilizing shared memory on either Solaris or Linux-based computers. Its design emphasizes speed, reliability, ease of use, and recoverability from crashes. In addition to fast local operation, the ET system allows network transfer of events. Using multi-threaded code based on POSIX threades and mutexes, a successful implementation was developed which allowed passing events over 500 kHz on a 4 cpu Sun workstation and 150 kHz on a dual cpu PC

  17. Security interest in business share

    OpenAIRE

    Žák, Zdeněk

    2007-01-01

    75 English summary Lien of the share in a limited liability company The main goal of my thesis "Lien of the share in a limited liability company" is to analyze provisions of the new Czech Civil Code and Corporation Act, which were passed in the spring of 2012. Both statutes come into effect on 1 January 2014. At first I briefly describe the historical development of this issue since 1906, when first a statute concerning the limited liability company was passed in our country. Then I describe ...

  18. Knowledge Sharing is Knowledge Creation

    DEFF Research Database (Denmark)

    Greve, Linda

    2015-01-01

    Knowledge sharing and knowledge transfer are important to knowledge communication. However when groups of knowledge workers engage in knowledge communication activities, it easily turns into mere mechanical information processing despite other ambitions. This article relates literature of knowledge...... communication and knowledge creation to an intervention study in a large Danish food production company. For some time a specific group of employees uttered a wish for knowledge sharing, but it never really happened. The group was observed and submitted to metaphor analysis as well as analysis of co...

  19. Beyond Conflict and Spoilt Identities: How Rwandan Leaders Justify a Single Recategorization Model for Post-Conflict Reconciliation

    Directory of Open Access Journals (Sweden)

    Sigrun Marie Moss

    2014-08-01

    Full Text Available Since 1994, the Rwandan government has attempted to remove the division of the population into the ‘ethnic’ identities Hutu, Tutsi and Twa and instead make the shared Rwandan identity salient. This paper explores how leaders justify the single recategorization model, based on nine in-depth semi-structured interviews with Rwandan national leaders (politicians and bureaucrats tasked with leading unity implementation conducted in Rwanda over three months in 2011/2012. Thematic analysis revealed this was done through a meta-narrative focusing on the shared Rwandan identity. Three frames were found in use to “sell” this narrative where ethnic identities are presented as a an alien construction; b which was used to the disadvantage of the people; and c non-essential social constructs. The material demonstrates the identity entrepreneurship behind the single recategorization approach: the definition of the category boundaries, the category content, and the strategies for controlling and overcoming alternative narratives. Rwandan identity is presented as essential and legitimate, and as offering a potential way for people to escape spoilt subordinate identities. The interviewed leaders insist Rwandans are all one, and that the single recategorization is the right path for Rwanda, but this approach has been criticised for increasing rather than decreasing intergroup conflict due to social identity threat. The Rwandan case offers a rare opportunity to explore leaders’ own narratives and framing of these ‘ethnic’ identities to justify the single recategorization approach.

  20. Varieties in vaper identitys in a Norwegian context

    Directory of Open Access Journals (Sweden)

    Rikke Tokle

    2018-03-01

    Full Text Available Background In this qualitative study, we analyze how users of e-cigarettes (vapers articulate and express the meaning of vaping and their identity as vapers. Particular attention are drawn to how they understand their use in a Norwegian context, where use of snus is widespread, combustible cigarettes are denormalized, and perspectives on harm reduction within the tobacco control community are conflicting. Methods Semi-structured personal interviews with 32 vapers, strategically recruited (age, sex, soci.ec.status to ensure coverage of different perspectives, and systematic observations of a Norwegian online vaping forum (< 12K members, are conducted to explore the complexity of identity-making processes for users of e-cigarettes. Results Majority of interviewed vapers perceived their use of e-cigarettes as a less harmful substitute for smoking. Analyzing personal interviews and observations on a virtual vaping forum we observed that their identities as vapers varies, and can be classified into three main groups: (I Users who vape to replace cigarette smoking. (II Users who (also have vaping as a hobby and participate in a vape oriented subculture. In addition, (III recreational users who switch between tobacco products (snus+ and who value the novelty of e-cigarettes in some occasions, but also are ambivalent in regard to identifying themselves as vapers because of what they see as the social meaning of use of e-cigarettes (addiction, hobby, activists. Conclusions This study provides new insight into the varieties of vaper identities in a context were also snus have a substantial marked share. They portray their vaping in various ways, but hold a shared understanding of use of e-cigarettes as harm reduction. The results are relevant to policy makers in order to understand how to address users and potential new users of e-cigarettes.

  1. The cloud storage service bwSync&Share at KIT

    CERN Multimedia

    CERN. Geneva

    2014-01-01

    The Karlsruhe Institute of Technology introduced the bwSync&Share collaboration service in January 2014. The service is an on-premise alternative to existing public cloud storage solutions for students and scientists in the German state of Baden-Württemberg, which allows the synchronization and sharing of documents between multiple devices and users. The service is based on the commercial software PowerFolder and is deployed on a virtual environment to support high reliability and scalability for potential 450,000 users. The integration of the state-wide federated identity management system (bwIDM) and a centralized helpdesk portal allows the service to be used by all academic institutions in the state of Baden-Württemberg. Since starting, approximately 15 organizations and 8,000 users joined the service. The talk gives an overview of related challenges, technical and organizational requirements, current architecture and future development plans.

  2. Cognition and Knowledge Sharing in Post-acquisition Integration

    DEFF Research Database (Denmark)

    Jaura, Manya; Michailova, Snejina

    2014-01-01

    conducted with ten respondents in four Indian IT companies that have acquired firms abroad. Findings: The authors find evidence for supporting the negative effect of in- and out-groups differentiation and the positive effect of interpersonal interaction on knowledge sharing among employees of the acquired...... of organisational objectives in a post-acquisition context. Managers should understand that the knowledge their employees possess is a strategic asset, and therefore how they use it is influential in attaining organisational goals in general, and acquisition integration objectives in particular. The creation...... of task- and project-related communities or groups can help in establishing a shared organisational identity, especially after the turbulent event of one company acquiring another one. The creation of communities or groups where socialisation is encouraged can lead to employees interacting with one...

  3. When Communities Collide: The Shared Construction and Defence of Community and Identity during a Teaching Practicum

    Science.gov (United States)

    Trent, John

    2014-01-01

    This article describes the results of a qualitative multiple case study investigation of the experiences of preservice teachers during a teaching practicum in Hong Kong. The study uses in-depth interviews with pairs of student teachers and their school-based supporting teachers to understand how the former positioned themselves as particular types…

  4. Four Year-Olds Use Norm-Based Coding for Face Identity

    Science.gov (United States)

    Jeffery, Linda; Read, Ainsley; Rhodes, Gillian

    2013-01-01

    Norm-based coding, in which faces are coded as deviations from an average face, is an efficient way of coding visual patterns that share a common structure and must be distinguished by subtle variations that define individuals. Adults and school-aged children use norm-based coding for face identity but it is not yet known if pre-school aged…

  5. The Chameleon on a Tartan Rug: Adaptations of Three Academic Developers' Professional Identities

    Science.gov (United States)

    Kensington-Miller, Barbara; Renc-Roe, Joanna; Morón-García, Susan

    2015-01-01

    This paper builds on discussions of academic developers' identity experienced as a discomfiting, troubled, and often marginal space. Three experienced academic developers, located in research-intensive institutions in three different countries, using auto-ethnographic writing and a shared narrative inquiry, explore moments of congruence and…

  6. The Development of University Teachers' Professional Identity: A Dialogical Study

    Science.gov (United States)

    Scartezini, Raquel Antunes; Monereo, Carles

    2018-01-01

    This study investigated whether changes can occur on indicators of teachers' professional identity (TPI) when teachers and students share representations about what happens in class during an academic term. TPI is a process of constant negotiation between the different I-positions of teachers at the personal, social and cultural levels. The main…

  7. The Role of Identity and Embeddedness in the Emergence of a Knowledge Cluster in Lithuania

    DEFF Research Database (Denmark)

    Gelbuda, Modestas; Sørensen, Brian Vejrum; Slepniov, Dmitrij

    2005-01-01

    available to the key actors as well as the absence of a powerful catalyst are the main barriers in building the knowledge cluster. Because collaborative capabilities and shared identities are not readily available, and because they can only be created through learning by doing, we predict that cluster...

  8. Constructing Glocal Identities through Multilingual Writing Practices on Flickr.com[R

    Science.gov (United States)

    Lee, Carmen K. M.; Barton, David

    2011-01-01

    This article reports on a study of user-generated multilingual writing activities on the photo sharing site, Flickr.com[R]. It discusses how Flickr users deploy their multilingual resources when interacting with international audiences, the factors affecting their language choice, and how new multilingual identities are constructed. An exploratory…

  9. Issues of E-Learning Standards and Identity Management for Mobility and Collaboration in Higher Education

    Science.gov (United States)

    Alves, Paulo; Uhomoibhi, James

    2010-01-01

    Purpose: This paper seeks to investigate and report on the status of identity management systems and e-learning standards across Europe for promoting mobility, collaboration and the sharing of contents and services in higher education institutions. Design/methodology/approach: The present research work examines existing e-learning standards and…

  10. Reflections on literary history and Netherlandic cultural identity in the medieval period

    NARCIS (Netherlands)

    Oostrom, F.P. van

    2000-01-01

    I have flown 4000 miles to share with you two interrelated questions I find extremely perplexing. The two questions are the following: Did Dutch literature have an identity of its own as early as the Middle Ages? And if so, does this bear any relation to characteristics that are considered

  11. Popular Imagination and Identity Politics: Reading the Future in "Star Trek: The Next Generation."

    Science.gov (United States)

    Ott, Brian L.; Aoki, Eric

    2001-01-01

    Analyzes the television series "Star Trek: The Next Generation." Theorizes the relationship between collective visions of the future and the identity politics of the present. Argues that "The Next Generation" invites audiences to participate in a shared sense of the future that constrains human agency and (re)produces the…

  12. Religious, Secular, and Spiritual Identities Convergence: Introduction to the Special Issue

    Science.gov (United States)

    Small, Jenny L.; Bowman, Nicholas A.

    2018-01-01

    The purpose of this special issue is to share the best research, theory, practice, and perspectives from presenters at the 2017 Religious, Secular, and Spiritual Identities Convergence conference, alongside the new writing of scholars and practitioners who were inspired by the themes of the conference. Readers will have access both to the best of…

  13. Bridging Identity Gaps : Supporting Identity Performance in Citizen Service Encounters

    DEFF Research Database (Denmark)

    Borchorst, Nikolaj Gandrup; McPhail, Brenda; Smith, Karen Louise

    2012-01-01

    administrative processes and the quality and swiftness of the service they receive. As we bring to light in this paper, this “fitting in” with rigid bureaucratic procedures and IT systems interestingly requires a substantial collaborative effort between the receiver(s) of the service and a complex constellation...... of surrounding stakeholders and intermediaries. This collaboration and the performing of multiple identities raises challenges for the design of e-government systems aimed at supporting physical and digital citizen service provision, as well as issues regarding privacy, citizenship, and public service quality......This paper explores in situ citizen service encounters in government offices. Drawing upon ethnographically informed fieldwork in Canada and Denmark, we discuss the challenges to supporting citizens in constructing and performing identities in public service settings. Our data suggests...

  14. The Contrabassist and the CEO: Moral Judgment and Collective Identity

    Directory of Open Access Journals (Sweden)

    Alessandro Pinzani

    2003-01-01

    Full Text Available How much is a moral judgment on a single act influenced by circumstances which have little to do with the nature of the act itself? How much have certain moral judgments to do with the common history and shared experience of a certain group of individuals? Using two cases taken from life (a German musician and a German CEO behaving both in a morally wrong way but with very different consequences from the point of view of moral judgement and with very different reactions from the German public, the article tries to give an answer to these questions, touching issues like: guilt, moral responsibility, collective responsibility, and collective identity.

  15. Social identity formation during the emergence of the Occupy movement

    OpenAIRE

    Smith, Laura G. E.; Gavin, Jeffrey; Sharp, Elise

    2015-01-01

    The Occupy movement made a series of local ‘sit-ins’ in cities across the world in response to financial and political injustices. Prior to the movement’s emergence, the Internet provided a transnational forum for people across the world to discuss their opinions and coalesce about the financial and political context. Here, we analyze 5,343 posts on the ‘#OccupyWallStreet’ Facebook event page to identify linguistic markers of shared social identity formation.Results suggest that discussants f...

  16. Multipartite-to-bipartite entanglement transformations and polynomial identity testing

    International Nuclear Information System (INIS)

    Chitambar, Eric; Duan Runyao; Shi Yaoyun

    2010-01-01

    We consider the problem of deciding if some multiparty entangled pure state can be converted, with a nonzero success probability, into a given bipartite pure state shared between two specified parties through local quantum operations and classical communication. We show that this question is equivalent to the well-known computational problem of deciding if a multivariate polynomial is identically zero. Efficient randomized algorithms developed to study the latter can thus be applied to our question. As a result, a given transformation is possible if and only if it is generically attainable by a simple randomized protocol.

  17. Intergroup Leadership Across Distinct Subgroups and Identities.

    Science.gov (United States)

    Rast, David E; Hogg, Michael A; van Knippenberg, Daan

    2018-03-01

    Resolving intergroup conflict is a significant and often arduous leadership challenge, yet existing theory and research rarely, if ever, discuss or examine this situation. Leaders confront a significant challenge when they provide leadership across deep divisions between distinct subgroups defined by self-contained identities-The challenge is to avoid provoking subgroup identity distinctiveness threat. Drawing on intergroup leadership theory, three studies were conducted to test the core hypothesis that, where identity threat exists, leaders promoting an intergroup relational identity will be better evaluated and are more effective than leaders promoting a collective identity; in the absence of threat, leaders promoting a collective identity will prevail. Studies 1 and 2 ( N = 170; N = 120) supported this general proposition. Study 3 ( N = 136) extended these findings, showing that leaders promoting an intergroup relational identity, but not a collective identity, improved intergroup attitudes when participants experienced an identity distinctiveness threat.

  18. Knowledge sharing in industrial research

    NARCIS (Netherlands)

    Berends, J.J.

    2003-01-01

    Over the past decade, the field of organization studies has increasingly focused on knowledge and knowledge processes in organizations. This thesis describes a study of one of those processes, knowledge sharing, in the context of industrial research. Though the attention for knowledge in

  19. Sharing Power in the Classroom.

    Science.gov (United States)

    Richard-Amato, Patricia

    2002-01-01

    Suggests that be sharing power in the classroom teachers allow the development of participatory classrooms in which all students can thrive. Examines participatory teaching and critical pedagogy, components of the participatory learning experience, manifestations of participatory teaching, an application of the language experience approach,…

  20. Scalable shared-memory multiprocessing

    CERN Document Server

    Lenoski, Daniel E

    1995-01-01

    Dr. Lenoski and Dr. Weber have experience with leading-edge research and practical issues involved in implementing large-scale parallel systems. They were key contributors to the architecture and design of the DASH multiprocessor. Currently, they are involved with commercializing scalable shared-memory technology.

  1. The People's Time Sharing System

    NARCIS (Netherlands)

    Tanenbaum, A.S.; Benson, W.H.

    1973-01-01

    A set of programs running under a multiprogramming batch operating system on the CDC 6600 which provide remote users with a time sharing service is described. The basis for the system is the ability of a user program to create job control statements during execution, thereby tricking the operating

  2. Job Sharing: One District's Experience.

    Science.gov (United States)

    Lantz, Mahlon L.

    1983-01-01

    Describes responses of principals, teachers, and parents to a job sharing program instituted to reduce impact of staff layoffs. Principals were satisfied overall; teachers believed that students benefited from interaction with two instructors; and a majority of parents felt likewise. (TE)

  3. DOE/university reactor sharing

    International Nuclear Information System (INIS)

    Young, H.H.

    1985-01-01

    The objective of the US Department of Energy's program of reactor sharing is to strengthen nuclear science and engineering instruction and nuclear research opportunities in non-reactor-owning colleges and universities. The benefits of the program and need for the continuation of the program in the future are discussed

  4. Information Sharing and International Taxation

    NARCIS (Netherlands)

    Keen, M.; Ligthart, J.E.

    2004-01-01

    The sharing between national tax authorities of taxpayer-specific information has emerged over the last few years as a-probably "the"-central issue in the formation of international tax policy.Yet this refocusing of the debate on international taxation-away from parametric tax coordination and

  5. Shared breastfeeding in central Africa

    NARCIS (Netherlands)

    Ramharter, Michael; Chai, Sanders K.; Adegnika, Ayola A.; Klöpfer, Anna; Längin, Matthias; Agnandji, Selidji T.; Oyakhirome, Sunny; Schwarz, Norbert G.; Grobusch, Martin P.; Issifou, Saadon; Kremsner, Peter G.

    2004-01-01

    In this study, shared breastfeeding is described asa novel risk factor for vertical HIV transmission. This cross-sectional survey conducted in the central African country Gabon found that 40% of lactating mothers also breastfed other children than their own, and as many children were additionally

  6. Car sharing à la carte

    CERN Multimedia

    Anaïs Schaeffer

    2012-01-01

    Do you want to make your commute to CERN easier, while saving money at the same time? Would you prefer not to spend a quarter of an hour crawling round the CERN car parks looking for a space? If so, read on: this article might well be of great interest to you.   We would like to draw your attention to a well established, albeit sadly under-used, method of transport: car sharing. To promote car-sharing, the GS Department has stepped in to call on the services of the Swiss firm Green Monkeys which specialises in this user-friendly and intelligent transport scheme. The company’s slogan is:  “Car-sharing as you want, when you want and as much as you want”. The principle is very straightforward. To use this car-sharing facility, you simply complete your free online registration with Green Monkeys, providing the following details: your journey, departure time, arrival time and days of the week, and indicating whether you are a passenger or driver or both. &a...

  7. Shared reality in interpersonal relationships.

    Science.gov (United States)

    Andersen, Susan M; Przybylinski, Elizabeth

    2017-11-24

    Close relationships afford us opportunities to create and maintain meaning systems as shared perceptions of ourselves and the world. Establishing a sense of mutual understanding allows for creating and maintaining lasting social bonds, and as such, is important in human relations. In a related vein, it has long been known that knowledge of significant others in one's life is stored in memory and evoked with new persons-in the social-cognitive process of 'transference'-imbuing new encounters with significance and leading to predictable cognitive, evaluative, motivational, and behavioral consequences, as well as shifts in the self and self-regulation, depending on the particular significant other evoked. In these pages, we briefly review the literature on meaning as interpersonally defined and then selectively review research on transference in interpersonal perception. Based on this, we then highlight a recent series of studies focused on shared meaning systems in transference. The highlighted studies show that values and beliefs that develop in close relationships (as shared reality) are linked in memory to significant-other knowledge, and thus, are indirectly activated (made accessible) when cues in a new person implicitly activate that significant-other knowledge (in transference), with these shared beliefs then actively pursued with the new person and even protected against threat. This also confers a sense of mutual understanding, and all told, serves both relational and epistemic functions. In concluding, we consider as well the relevance of co-construction of shared reality n such processes. Copyright © 2017 Elsevier Ltd. All rights reserved.

  8. Socio-political context and accounts of national identity in adolescence.

    Science.gov (United States)

    Stevenson, Clifford; Muldoon, Orla T

    2010-09-01

    Psychological research into national identity has considered both the banal quality of nationalism alongside the active, strategic construction of national categories and boundaries. Less attention has been paid to the conflict between these processes for those whose claims to national identity may be problematic. In the present study, focus groups were conducted with 36 Roman Catholic adolescents living in border regions of Ireland, in which participants were asked to talk about their own and others' Irish national identity. Discursive analysis of the data revealed that those in the Republic of Ireland strategically displayed their national identity as obvious and 'banal', while those in Northern Ireland proactively claimed their Irishness. Moreover, those in Northern Ireland displayed an assumption that their fellow Irish in the Republic shared their imperative to assert national identity, while those in the Republic actively distanced themselves from this version of Irishness. These results suggest that for dominant ethnic groups, 'banality' may itself provide a marker of national identity while paradoxically the proactive display of national identity undermines minority groups claims to national identity.

  9. Absorption properties of identical atoms

    International Nuclear Information System (INIS)

    Sancho, Pedro

    2013-01-01

    Emission rates and other optical properties of multi-particle systems in collective and entangled states differ from those in product ones. We show the existence of similar effects in the absorption probabilities for (anti)symmetrized states of two identical atoms. The effects strongly depend on the overlapping between the atoms and differ for bosons and fermions. We propose a viable experimental verification of these ideas. -- Highlights: •The absorption rates of a pair of identical atoms in product and (anti)symmetrized states are different. •The modifications of the optical properties are essentially determined by the overlapping between the atoms. •The absorption properties differ, in some cases, for bosons and fermions

  10. Variational identities and Hamiltonian structures

    International Nuclear Information System (INIS)

    Ma Wenxiu

    2010-01-01

    This report is concerned with Hamiltonian structures of classical and super soliton hierarchies. In the classical case, basic tools are variational identities associated with continuous and discrete matrix spectral problems, targeted to soliton equations derived from zero curvature equations over general Lie algebras, both semisimple and non-semisimple. In the super case, a supertrace identity is presented for constructing Hamiltonian structures of super soliton equations associated with Lie superalgebras. We illustrate the general theories by the KdV hierarchy, the Volterra lattice hierarchy, the super AKNS hierarchy, and two hierarchies of dark KdV equations and dark Volterra lattices. The resulting Hamiltonian structures show the commutativity of each hierarchy discussed and thus the existence of infinitely many commuting symmetries and conservation laws.

  11. About identities: What is "hinchada"?

    Directory of Open Access Journals (Sweden)

    Daniel Zambaglione

    2008-11-01

    Full Text Available This text belongs to Chapter I of the master's hesis "The endurance in the body" Building identity of the fans of a club of Argentine football. Such work investigation was developing on a predominantly qualitative approach, involve different methods such as e-depth interviews, participant observation and not a participant and focus groups. In this chapter, we will present to the fans, their practices and performances. Showing the subjects and their actions. , Exhibiting the main mechanisms of association to the group "The stamina." Also, as it conforms rebuild on the one hand as a symbol of prestige and honor. And for another, as one of the most important factors in the formation of identity, understood this from a position constructivita traveling in reverse strict sense of the essential sights

  12. Othering, identity formation and agency

    Directory of Open Access Journals (Sweden)

    Sune Qvotrup Jensen

    2011-10-01

    Full Text Available The article examines the potentials of the concept of othering to describe identity formation among ethnic minorities. First, it outlines the history of the concept, its contemporary use, as well as some criticisms. Then it is argued that young ethnic minority men in Denmark are subject to intersectional othering, which contains elements of exoticist fascination of the other. On the basis of ethnographic material, it is analysed how young marginalized ethnic minority men react to othering. Two types of reactions are illustrated: 1 capitalization on being positioned as the other, and 2 refusing to occupy the position of the other by disidentification and claims to normality. Finally, it is argued that the concept of othering is well suited for understanding the power structures as well as the historic symbolic meanings conditioning such identity formation, but problematic in terms of agency.

  13. Fannish tattooing and sacred identity

    Directory of Open Access Journals (Sweden)

    Bethan Jones

    2015-03-01

    Full Text Available Pleasure is an important motivation for fans to adopt texts. Fannish tattoos function to demonstrate affective investments in a text; they are also a performance of fandom and an example of sacred fan identity. Like engaging in cosplay or wearing clothing that features logos, fannish tattoos mark people as fans of a text. Furthermore, the more obscure the logo or fannish reference, the more performative the tattoo. Fannish tattoos help to construct a sacred fan identity. The sacred experience (as theorized by Émile Durkheim and his concept of the totem is imbued with meaning through choices that set it aside from the mundane. Within the context of fannish tattoos, fan affect gains similar significance.

  14. Vacceans, Past or future identity?

    Directory of Open Access Journals (Sweden)

    Rosalía Hernández García

    2011-06-01

    Full Text Available Nowadays, when talking about the vaccei, discussions focus on the debate of geographic and cultural boundaries and on the definition of their identity, but bearing in mind that the life of this people was sold for thousands of years by the Roman assimilation. A further reflection makes us wonder if this identity has survived to some extension up to the present: concepts such as the controversial “vaccean collectivism” were used to support various ideological discourses, furthermore it shouldn’t be missed the popular uptake of this ancient people today through Rugby’s team (vacceos cavaliers, partnerships, trademarks and wines with the name of vaccei, among many others. The aim of this paper is to study how the various factors that determine or define that culture have been used over recent history.

  15. From shared data to sharing workflow: Merging PACS and teleradiology

    International Nuclear Information System (INIS)

    Benjamin, Menashe; Aradi, Yinon; Shreiber, Reuven

    2010-01-01

    Due to a host of technological, interface, operational and workflow limitations, teleradiology and PACS/RIS were historically developed as separate systems serving different purposes. PACS/RIS handled local radiology storage and workflow management while teleradiology addressed remote access to images. Today advanced PACS/RIS support complete site radiology workflow for attending physicians, whether on-site or remote. In parallel, teleradiology has emerged into a service of providing remote, off-hours, coverage for emergency radiology and to a lesser extent subspecialty reading to subscribing sites and radiology groups. When attending radiologists use teleradiology for remote access to a site, they may share all relevant patient data and participate in the site's workflow like their on-site peers. The operation gets cumbersome and time consuming when these radiologists serve multi-sites, each requiring a different remote access, or when the sites do not employ the same PACS/RIS/Reporting Systems and do not share the same ownership. The least efficient operation is of teleradiology companies engaged in reading for multiple facilities. As these services typically employ non-local radiologists, they are allowed to share some of the available patient data necessary to provide an emergency report but, by enlarge, they do not share the workflow of the sites they serve. Radiology stakeholders usually prefer to have their own radiologists perform all radiology tasks including interpretation of off-hour examinations. It is possible with current technology to create a system that combines the benefits of local radiology services to multiple sites with the advantages offered by adding subspecialty and off-hours emergency services through teleradiology. Such a system increases efficiency for the radiology groups by enabling all users, regardless of location, to work 'local' and fully participate in the workflow of every site. We refer to such a system as SuperPACS.

  16. Faith Dialogues Foster Identity Development

    Science.gov (United States)

    Small, Jenny L.

    2009-01-01

    The author shares the results of her research with focus groups of Christian, Jewish, Muslim, and atheist students who discussed their religious and spiritual beliefs with her and with each other. She offers these students' words in order to encourage other educators to consider hosting similarly structured conversations and to think about the…

  17. Organizational Identity, Culture, and Image

    OpenAIRE

    Ravasi, D.

    2016-01-01

    The concept of organizational identity is often confused with similar concepts such as organizational culture or organizational image. This confusion depends in part on the inconsistent use that scholars have made of these terms in the past. This chapter reviews the literature that has discussed how these concepts differ and how they are interrelated, and proposes an integrative framework that summarizes the most widely accepted definitions. It focuses in particular on research on dynamic int...

  18. Communicating a Renewed Brand Identity

    OpenAIRE

    Marttila, Oona

    2017-01-01

    This thesis aims to help the commissioning company in finding a suitable approach to efficiently communicate the renewed brand identity of the company. Theories applied to this research include rebranding, segmentation, as well as theories on customer relationships, service encounters and online marketing. This is complemented by the identification of the company potential through SWOT analysis as well as identifying differentiating factors within the company, in order to gain competitive adv...

  19. Building Place Identity through Heritage

    OpenAIRE

    Alexandra PACESCU; Vlad THIERY

    2015-01-01

    In an increasingly globalized world, the fading specificity is producing homogeneous images that make cities more and more difficult to tell apart. The market economy tends to commodify each and every aspect of urban life, even those belonging to the cultural realm. As a consequence, a need for differentiators arises, which can be best embodied by the local heritage. The present paper is trying to establish a link between the concept of Place Identity, seen from a marketing point of view, ...

  20. Autonoesis and dissociative identity disorder.

    Science.gov (United States)

    Morton, John

    2018-01-01

    Dissociative identity disorder is characterised by the presence in one individual of two or more alternative personality states (alters). For such individuals, the memory representation of a particular event can have full episodic, autonoetic status for one alter, while having the status of knowledge or even being inaccessible to a second alter. This phenomenon appears to create difficulties for a purely representational theory and is presented to Mahr & Csibra (M&C) for their consideration.

  1. Music teacher identity and professionalism

    DEFF Research Database (Denmark)

    Holgersen, Sven-Erik

    2017-01-01

    The present article is concerned with transformative learning and identity formation in student music teachers acting as researchers of a music education practice as part of their MA study programme. More specific, the aim is to discuss how engaging in a research perspective may serve as an eye......-opener for student music teachers and widen their perspective on subject didactics, teaching/learning issues and professional practice....

  2. Gauge invariance and Nielsen identities

    International Nuclear Information System (INIS)

    Lima, A.F. de; Bazaia, D.

    1989-01-01

    The one-loop contribution to the effective potential and mass are computed within the context of scalar electrodynamics for the class of general R gauges in the MS scheme. These calculations are performed in order to construct a non-trivial verification of the corresponding Nielsen identities within the context of the Higgs model. Some brief comments on the Coleman-Weinberg model are also included. (author) [pt

  3. Codimensions of generalized polynomial identities

    International Nuclear Information System (INIS)

    Gordienko, Aleksei S

    2010-01-01

    It is proved that for every finite-dimensional associative algebra A over a field of characteristic zero there are numbers C element of Q + and t element of Z + such that gc n (A)∼Cn t d n as n→∞, where d=PI exp(A) element of Z + . Thus, Amitsur's and Regev's conjectures hold for the codimensions gc n (A) of the generalized polynomial identities. Bibliography: 6 titles.

  4. Ectodermal dysplasia in identical twins

    OpenAIRE

    Puttaraju, Gurkar Haraswarupa; Visveswariah, Paranjyothi Magadi

    2013-01-01

    Hereditary hypohidrotic ectodermal dysplasia (HED) is typically inherited as an X-linked recessive trait, characterized by deformity of at least two or more of the ectodermal structures - hair, teeth, nails and sweat glands. Two cases of hereditary HED involving identical male twins, is being documented for the rarity of its occurrence with special attention given to genetics, pathophysiology, clinical, intraoral manifestations and to the methods to improve the masticatory function, the facia...

  5. Human Rights and the Excess of Identity

    Science.gov (United States)

    Al Tamimi, Yussef

    2017-01-01

    Identity is a central theme in contemporary politics, but legal academia lacks a rigorous analysis of this concept. The aim of this article is twofold: (i) firstly, it aims to reveal presumptions on identity in human rights law by mapping how the European Court of Human Rights approaches identity and (ii) secondly, it seeks to analyse these presumptions using theoretical insights on identity. By merging legal and theoretical analysis, this article contributes a reading of the Court’s case law which suggests that the tension between the political and apolitical is visible as a common thread in the Court’s use of identity. In case law concerning paternity, the Court appears to hold a specific view of what is presented as an unquestionable part of identity. This ostensibly pre-political notion of identity becomes untenable in cases where the nature of an identity feature, such as the headscarf, is contended or a minority has adopted a national identity that conflicts with the majoritarian national identity. The Court’s approach to identity in such cases reflects a paradox that is inherent to identity; identity is personal while simultaneously constituted and shaped by overarching power mechanisms. PMID:29881144

  6. Exhausting management work: conflicting identities.

    Science.gov (United States)

    Mischenko, Jane

    2005-01-01

    The primary purpose of this paper is to critically explore managers' experience of work identity in the National Health Service (NHS). This paper is unconventional in that it uses an auto-ethnographic approach and poetry as the empirical data from which the conceptual framework evolves. The concepts of identity, power and self are analysed in relation to the narrative utilising a post-structuralist, critical management lens, particularly drawing from Foucault. The paper reflects and critiques the challenges of undertaking auto-ethnography, not least the publication and exposure of a "vulnerable aspect" of the author but also identifies this as a powerful method to explore how one uses narrative to create meaning and constitute oneself, the challenges of such textual representation and the various ways one adapts, resists and survives the challenge of the "multiphrenic" world. The contribution this paper makes is an "outing" of the dynamics of being a manager in the NHS and an opening of a debate on current management discourse and practice. The further value of this paper is the experimentation of critically evaluating an auto-ethnographic approach to researching management identity work.

  7. Stillbirth and stigma: the spoiling and repair of multiple social identities.

    Science.gov (United States)

    Brierley-Jones, Lyn; Crawley, Rosalind; Lomax, Samantha; Ayers, Susan

    This study investigated mothers' experiences surrounding stillbirth in the United Kingdom, their memory making and sharing opportunities, and the effect these opportunities had on them. Qualitative data were generated from free text responses to open-ended questions. Thematic content analysis revealed that "stigma" was experienced by most women and Goffman's (1963) work on stigma was subsequently used as an analytical framework. Results suggest that stillbirth can spoil the identities of "patient," "mother," and "full citizen." Stigma was reported as arising from interactions with professionals, family, friends, work colleagues, and even casual acquaintances. Stillbirth produces common learning experiences often requiring "identity work" (Murphy, 2012). Memory making and sharing may be important in this work and further research is needed. Stigma can reduce the memory sharing opportunities for women after stillbirth and this may explain some of the differential mental health effects of memory making after stillbirth that is documented in the literature.

  8. The Complete Guide to Job Sharing.

    Science.gov (United States)

    Hohn, Marcia D.

    This booklet provides information on job sharing that resulted from the research and experience of the Merrimack Valley Job Sharing Project. An overview of the topic considers the need for job sharing, employer benefits, types of jobs shared, job division, benefits, employer costs and savings, financial considerations for job sharers, perspectives…

  9. To share or not to share? Business aspects of network sharing for Mobile Network Operators

    NARCIS (Netherlands)

    Berkers, F.T.H.M.; Hendrix, G.; Chatzicharistou, I.; Haas, T. de; Hamera, D.

    2010-01-01

    Radio spectrum and network infrastructure are two essential resources for mobile service delivery, which are both costly and increasingly scarce. In this paper we consider drivers and barriers of network sharing, which is seen as a potential solution for scarcity in these resources. We considered a

  10. A social identity model of pro-environmental action (SIMPEA).

    Science.gov (United States)

    Fritsche, Immo; Barth, Markus; Jugert, Philipp; Masson, Torsten; Reese, Gerhard

    2018-03-01

    Large-scale environmental crises are genuinely collective phenomena: they usually result from collective, rather than personal, behavior and how they are cognitively represented and appraised is determined by collectively shared interpretations (e.g., differing across ideological groups) and based on concern for collectives (e.g., humankind, future generations) rather than for individuals. Nevertheless, pro-environmental action has been primarily investigated as a personal decision-making process. We complement this research with a social identity perspective on pro-environmental action. Social identity is the human capacity to define the self in terms of "We" instead of "I," enabling people to think and act as collectives, which should be crucial given personal insufficiency to appraise and effectively respond to environmental crises. We propose a Social Identity Model of Pro-Environmental Action (SIMPEA) of how social identity processes affect both appraisal of and behavioral responses to large-scale environmental crises. We review related and pertinent research providing initial evidence for the role of 4 social identity processes hypothesized in SIMPEA. Specifically, we propose that ingroup identification, ingroup norms and goals, and collective efficacy determine environmental appraisals as well as both private and public sphere environmental action. These processes are driven by personal and collective emotions and motivations that arise from environmental appraisal and operate on both a deliberate and automatic processing level. Finally, we discuss SIMPEA's implications for the research agenda in environmental and social psychology and for interventions fostering pro-environmental action. (PsycINFO Database Record (c) 2018 APA, all rights reserved).

  11. Professional SharePoint 2010 Development

    CERN Document Server

    Rizzo, Tom; Fried, Jeff

    2010-01-01

    Learn to leverage the features of the newest version of SharePoint, in this update to the bestseller. More than simply a portal, SharePoint is Microsoft's popular content management solution for building intranets and Web sites or hosting wikis and blogs. Offering broad coverage on all aspects of development for the SharePoint platform, this comprehensive book shows you exactly what SharePoint does, how to build solutions, and what features are accessible within SharePoint. Written by one of the most recognized names in SharePoint development, Professional SharePoint 2010 Development offers an

  12. Professional SharePoint 2013 administration

    CERN Document Server

    Young, Shane; Klindt, Todd

    2013-01-01

    SharePoint admin author gurus return to prepare you for working with the new features of SharePoint 2013! The new iteration of SharePoint boasts exciting new features. However, any new version also comes with its fair share of challenges and that's where this book comes in. The team of SharePoint admin gurus returns to presents a fully updated resource that prepares you for making all the new SharePoint 2013 features work right. They cover all of the administration components of SharePoint 2013 in detail, and present a clear understanding of how they affect the role of the adminis

  13. Identity and power in Ukraine

    Directory of Open Access Journals (Sweden)

    Karina V. Korostelina

    2013-01-01

    Full Text Available This paper analyzes the coercive and legitimate forms of power in Ukraine. It describes the crisis of legitimacy in Ukraine as a contradiction between a blatantly cruel system of capitalism dominated by a few oligarchs, and the lingering remnants of a Soviet mentality. Two strategies are used by the Government to stoke the crisis. First, increased identification with ethnic or regional groups are instrumentally used by the Government to take attention from economic and class issues. Second, the incorporation of a Soviet meaning of power into the new national identity and presentation of it as core norms, believes, and values of the people of Ukraine competes with alternative Ukrainian identity concepts. The paper analyzes five main features of the Soviet meanings of power – political, social, and economic paternalism, perception of power as source of profit and violence, and the dual reality of power with the gap between official narratives of power and a real life. The process of incorporation of the Soviet concept of power into national identity is facilitated by the process of national identity formation that helped to preserve the Soviet perception of power, because of the absence of a new ideology, a lack of critical assessment of the Soviet past, an absence of the vision of outcome, an embryonic culture of democracy, and contributions of all the presidents to the preservation of the Soviet meaning of power. People justify the system as legitimate and fair for many reasons: out of historic habit and deemed moral obligations, self-interests and/or a fear of sanctions, identification with the ruler, zones of indifference, an absence of will and self-confidence, desire to support a strong leader based on ambiguity intolerance, hierarchy – enhancing ideologies, and a general tolerance of injustice. The obedience of subjects is connected with the strength of will of the subjects and the social structures of the society. In Ukraine, the

  14. Christian identity of secular Europe

    Directory of Open Access Journals (Sweden)

    Malešević Miroslava

    2006-01-01

    Full Text Available The Jyllands-Posten Muhammad cartoons controversy began after twelve editorial cartoons, most of which depicted the Islamic prophet Muhammad, were published in the Danish newspaper Jyllands-Posten on September 30, 2005. The newspaper explained that this publication was a contribution to debate regarding criticism of Islam and self-censorship. In response, Danish Muslim organizations held public protests and spread knowledge of Jyllands-Postens publication. As the controversy grew, some or all of the cartoons were reprinted in newspapers in more than fifty other countries, which led to violent protests, particularly in the Muslim world. Critics of the cartoons describe them as islamophobic and argue that they are blasphemous, intended to humiliate a marginalized Danish minority, and a manifestation of ignorance about the history of western imperialism, from colonialism to the current conflicts in the Middle East. Supporters of the cartoons claim they illustrate an important issue in an age of Islamic extremist terrorism and that their publication is a legitimate exercise of the right of free speech. They also note that similar cartoons about other religions are frequently printed, arguing that the followers of Islam were not targeted in a discriminatory way. The dispute has again pointed out to the relevance of religion and religious differences in the contemporary world. Again, several questions presented themselves as significant: citizen freedom, values and the rights to exercise them, secularism, tolerance, multiculturalism majority-minority relationships and so on. The resolution to these issues appears as of the outmost importance, considering the existing tendencies of united Europe to even more firmly establish cultural, economic, and political associations, in order to launch a one, joined European identity with vanishing national, ethnic and religious differences. Therefore, the question becomes: what could serve as a foundation for

  15. Authenticity in Leadership: Intersectionality of Identities.

    Science.gov (United States)

    Jones, Susan R

    2016-12-01

    This chapter situates leadership and the process of becoming a leader within an understanding of identity, particularly intersecting social identities and intersectionality. © 2016 Wiley Periodicals, Inc., A Wiley Company.

  16. Idendity and identity conflict in the workplace

    NARCIS (Netherlands)

    K.E. Horton (Kate); P.S. Bayerl (Saskia); G. Belschak-Jacobs (Gabriele)

    2014-01-01

    markdownabstract__Abstract__ As individuals, we define ourselves according to various characteristics that include our values and beliefs. This gives us our identity. As organisations become increasingly complex, understanding the concept of identity conflict may mean the difference

  17. Superconformal Ward identities and the supertorus

    International Nuclear Information System (INIS)

    Grundberg, J.; Nakayama, R.

    1987-12-01

    We derive superconformal Ward identities in the context of superspace supergravity. From these Ward identities we extract operator product expansions and the case of a supertorus is studied in some detail. (orig.)

  18. Perception, experience and body identity.

    Science.gov (United States)

    López-Ibor, Juan J; Ortiz, Tomás; López-Ibor, María I

    2011-12-01

    Physician has to know the patient in the disease and not only the disease in the patient, from the dual perspective of the body as object and the body as subject. This also affects the patient who has to cope with the reality of having a body that bursts into the subject's consciousness as a vital threat, as source of discomfort and inability and being a body (Marcel). The human body in its dual aspect has been and is a great unknown, if not a great outrage in spite of the fact that we are our body and our body is each of us. We sometimes do not feel as we are and thus a confrontation arises, sometimes more normal, others more morbid. This forces the physician to face complex ethics considerations and the scientist to accept a personal identity disorder. Dualism considers that there are two substances in us, one that distinguishes us from other beings and from the rest of the individuals of the human species, the soul, the psychic life, mind or consciousness, and another more insubstancial one, the body. The aim of the first substance is to dominate the body, to survive it after death when it is, already a corpse is meant to become putrefied, is buried, incinerated or thrown to the depth of the sea. This dualism aims to explain the origin of the evil and the attitude to defeat it and it does so efficiently. This anthropology has very ancient roots (the Upvanishads, in the orphic texts, in Plato), it is the core of Gnostic thought and the foundation of the modern science since Descartes. Some monist perspectives are a masked dualism or a mereologic fallacy, according to which, the brain is conscious, when that what is conscious is the subject, although the subject, with the brain could not be conscious. Therefore, a new perspective is proposed, chiasmatic or janicular monism, that considers the adaptive value of focusing on the reality from two perspectives, as physical universe and the world of interpersonal relationships. In the agnosias and in the phantom limb

  19. Employee share ownership in Germany

    DEFF Research Database (Denmark)

    Ortlieb, Renate; Matiaske, Wenzel; Fietze, Simon

    2016-01-01

    Politicians and scholars alike praise the significant benefits associated with employee share ownership (ESO). However, little is known about the concrete motives of firms to provide ESO to their employees. In particular, it is unknown how these motives correlate with firms’ contexts. Drawing...... on an institutional theoretical framework, this article examines what aims firms pursue through the provision of ESO. The data originate from a survey of firms in Germany. The cluster analytic findings indicate distinctive patterns of relationships between aims and firm characteristics. Aims related to employee...... performance are most important to foreign-owned firms, financial aims are most important to non-public small and medium-sized firms and aims related to corporate image are most important to big firms and to firms that do not provide profit sharing. Aims related to employee attraction and retention are almost...

  20. SECTORAL SHARES AND ECONOMIC GROWTH

    DEFF Research Database (Denmark)

    Ahmad, Nisar; Naveed, Amjad; Naz, Amber

    2013-01-01

    believe that structural change is an unimportant side effect of the economic development. On the contrary, economists associated with the World Bank and some others posit that growth is brought about by the changes in sectoral composition. The objective of this study is to empirically test...... the relationship between sectoral shares and economic growth by using the panel data for 20 developed countries. The results of the granger causality suggest that both services and agriculture sectors do granger cause economic growth, whereas industrial sector does not granger cause growth. Reverse causality does...... not hold for any of the three sectors. The results of Barro and Non-Barro regressions along with the set of control variables have suggested that services sector is negatively affecting growth, whereas both industrial and agriculture shares are positively affect economic growth....