WorldWideScience

Sample records for sars-covs share identical

  1. Bioinformatics analysis of SARS-Cov M protein provides information for vaccine development

    Institute of Scientific and Technical Information of China (English)

    LIU Wanli; LU Yun; CHEN Yinghua

    2003-01-01

    The pathogen causing severe acute respiratory syndrome (SARS) is identified to be SARS-Cov. It is urgent to know more about SARS-Cov for developing an efficient SARS vaccine to prevent this epidemic disease. In this report, the homology of SARS-Cov M protein to other members of coronavirus is illustrated, and all amino acid changes in both S and M proteins among all available SARS-Cov isolates in GenBank are described. Furthermore, one topological trans-membrane secondary structure model of M protein is proposed, which is corresponded well with the accepted topology model of M proteins of other members of coronavirus. Hydrophilic profile analysis indicated that one region (aa150~210) on the cytoplasmic domain is fairly hydrophilic, suggesting its property of antigenicity. Based on the fact that cytoplasmic domain of the M protein of some other coronavirus could induce protective activities against virus infection, this region might be one potential target for SARS vaccine development.

  2. Receptor-binding domain of SARS-Cov spike protein: Soluble expression in purification and functional characterization

    Institute of Scientific and Technical Information of China (English)

    Jing Chen; Lin Miao; Jia-Ming Li; Yan-Ying Li; Qing-Yu Zhu; Chang-Lin Zhou; Hong-Qing Fang; Hui-Peng Chen

    2005-01-01

    AIM: To find a soluble and functional recombinant receptor-binding domain of severe acute respiratory syndrome-associated coronavirus (SARS-Cov), and to analyze its receptor binding ability.METHODS: Three fusion tags (glutathione S-transferase,GST; thioredoxin, Trx; maltose-binding protein, MBP),which preferably contributes to increasing solubility and to facilitating the proper folding of heteroprotein, were used to acquire the soluble and functional expression of RBD protein in Escherichia coli( BL21( DE3 ) and Rosetta-gamiB(DE3) strains). The receptor binding ability of the purified soluble RBD protein was then detected by ELISA and flow cytometry assay.RESULTS: RBD of SARS-Cov spike protein was expressed as inclusion body when fused as TrxA tag form in both BL21 (DE3) and Rosetta-gamiB (DE3) under many different cultures and induction conditions. And there was no visible expression band on SDS-PAGE when RBD was expressed as MBP tagged form. Only GST tagged RBD was soluble expressed in BL21(DE3), and the protein was purified by AKTA Prime Chromatography system. The ELISA data anti-RBD mouse monoclonal antibody 1A5. Further flow cytometry assay demonstrated the high efficiency of RBD's binding ability to ACE2 (angiotensin-converting enzyme 2)positive Vero E6 cell. And ACE2 was proved as a cellular receptor that meditated an initial-affinity interaction with SARS-Cov spike protein. The geometrical mean of GST and respectively.CONCLUSION: In this paper, we get sufficient soluble N terminal GST tagged RBD protein expressed in E. coli BL21(DE3); data from ELISA and flow cytometry assay demonstrate that the recombinant protein is functional and binding to ACE2 positive Vero E6 cell efficiently. And the recombinant RBD derived from E. coli can be used to developing subunit vaccine to block S protein binding with receptor and to neutralizing SARS-Cov infection.

  3. Sharing Status and Appropriating Identity

    DEFF Research Database (Denmark)

    de Oliveira, Sandi Michele

    2013-01-01

    On 26 December 2012 President Cavaco Silva announced the creation of the Conselho da Diápora Portuguesa, an association of 300 “notable” (notáveis) Portuguese to be individually invited by the Council’s Board. Their function will be to service as lobbyists working to improve the country’s image...... in the world. In other words, and according to the Council’s President Filipe de Botton, the Conselho da Diáspora Portuguesa will be able to “take advantage of the best that Portugal has to offer outside Portugal.” Through remittances, Portuguese emigrants have long been a source of economic benefit...... to their relatives in Portugal as well as to the needs of the Portuguese Government. This initiative, however, is different; here, in addition to direct economic benefits that the Council’s members may provide, their identity itself as successful Portuguese is put into play. Using tools from discourse analysis...

  4. Shared identity is key to effective communication.

    Science.gov (United States)

    Greenaway, Katharine H; Wright, Ruth G; Willingham, Joanne; Reynolds, Katherine J; Haslam, S Alexander

    2015-02-01

    The ability to communicate with others is one of the most important human social functions, yet communication is not always investigated from a social perspective. This research examined the role that shared social identity plays in communication effectiveness using a minimal group paradigm. In two experiments, participants constructed a model using instructions that were said to be created by an ingroup or an outgroup member. Participants made models of objectively better quality when working from communications ostensibly created by an ingroup member (Experiments 1 and 2). However, this effect was attenuated when participants were made aware of a shared superordinate identity that included both the ingroup and the outgroup (Experiment 2). These findings point to the importance of shared social identity for effective communication and provide novel insights into the social psychology of communication. © 2014 by the Society for Personality and Social Psychology, Inc.

  5. Reconstruction of the most recent common ancestor sequences of SARS-Cov S gene and detection of adaptive evolution in the spike protein

    Institute of Scientific and Technical Information of China (English)

    ZHANG Yuan; ZHENG Nan; HAO Pei; ZHONG Yang

    2004-01-01

    @@ The genome organization and expression strategy of severe acute respiratory syndrome coronavirus (SARSCoV) have been described extensivelyl1- 10]. As a structural glycoprotein on the virion surface, the spike protein is responsible for binding to host cellular receptors and for the fusion between the viral envelope and the cellular membrane. It also induces neutralizing antibodies in the host and mediates cellular immunity[11]. Previous studies suggested that amino acid replacements in the spike protein could dramatically alter the pathogenesis and virulence of some coronaviruses[11]. It is therefore reasonable to test the hypothesis that radical amino acid replacements in the spike protein, favored by environmental selective pressure during the process of SARS-CoV interspecific transmission[10], might make this pathogen adapt to a new host. In this study, we investigated a total of 108complete sequences of the SARS-CoV S gene from GenBank (until March 23, 2004). After omission of those records containing frame-shift mutations or low quality sequences, e.g. ZJ01, and selection of one sequence for identical records, an alignment of 42 sequences was obtained using the program Clustal-X[13]. Then, we reconstructed the most recent common ancestor (MRCA) sequences of the SARS-CoV S gene and detected the adaptive evolution in the spike protein.

  6. Multiparty simultaneous quantum identity authentication with secret sharing

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    Two multiparty simultaneous quantum identity authentication (MSQIA) protocols based on secret sharing are presented. All the users can be authenticated by a trusted third party (TTP) simultaneously. In the first protocol,the TTP shares a random key K with all the users using quantum secret sharing. The ith share acts as the authentication key of the ith user. When it is necessary to perform MSQIA,the TTP generates a random number R secretly and sends a sequence of single photons encoded with K and R to all the users. According to his share,each user performs the corresponding unitary operations on the single photon sequence sequentially. At last,the TTP can judge whether the impersonator exists. The sec-ond protocol is a modified version with a circular structure. The two protocols can be efficiently used for MSQIA in a network. They are feasible with current technol-ogy.

  7. Multiparty simultaneous quantum identity authentication with secret sharing

    Institute of Scientific and Technical Information of China (English)

    YANG YuGuang; WEN QiaoYan; ZHANG Xing

    2008-01-01

    Two multiparty simultaneous quantum identity authentication (MSQIA) protocols based on secret sharing are presented.All the users can be authenticated by a trusted third party (TTP) simultaneously.In the first protocol, the TTP shares a random key K with all the users using quantum secret sharing.The ith share acts as the authentication key of the ith user.When it is necessary to perform MSQIA, the TTP generates a random number R secretly and sends a sequence of single photons encoded with K and R to all the users.According to his share, each user performs the corresponding unitary operations on the single photon sequence sequentially.At last, the TTP can judge whether the impersonator exists.The sec-ond protocol is a modified version with a circular structure.The two protocols can be efficiently used for MSQIA in a network.They are feasible with current technol-ogy.

  8. Shared Negative Experiences Lead to Identity Fusion via Personal Reflection.

    Directory of Open Access Journals (Sweden)

    Jonathan Jong

    Full Text Available Across three studies, we examined the role of shared negative experiences in the formation of strong social bonds--identity fusion--previously associated with individuals' willingness to self-sacrifice for the sake of their groups. Studies 1 and 2 were correlational studies conducted on two different populations. In Study 1, we found that the extent to which Northern Irish Republicans and Unionists experienced shared negative experiences was associated with levels of identity fusion, and that this relationship was mediated by their reflection on these experiences. In Study 2, we replicated this finding among Bostonians, looking at their experiences of the 2013 Boston Marathon Bombings. These correlational studies provide initial evidence for the plausibility of our causal model; however, an experiment was required for a more direct test. Thus, in Study 3, we experimentally manipulated the salience of the Boston Marathon Bombings, and found that this increased state levels of identity fusion among those who experienced it negatively. Taken together, these three studies provide evidence that shared negative experience leads to identity fusion, and that this process involves personal reflection.

  9. Cancer survivor identity shared in a social media intervention.

    Science.gov (United States)

    Song, Hayeon; Nam, Yujung; Gould, Jessica; Sanders, W Scott; McLaughlin, Margaret; Fulk, Janet; Meeske, Kathleen A; Ruccione, Kathleen S

    2012-01-01

    This study investigates how cancer survivors construct their identities and the impact on their psychological health, as measured by depression and survivor self-efficacy. Fourteen young adult survivors of pediatric cancer participated in a customized social networking and video blog intervention program, the LIFECommunity, over a 6-month period. Survivors were asked to share their stories on various topics by posting video messages. Those video blog postings, along with survey data collected from participants, were analyzed to see how cancer survivors expressed their identities, and how these identities are associated with survivors' psychosocial outcomes. In survivors who held negative stereotypes about cancer survivors, there was a positive relationship with depression while positive stereotypes had a marginal association with cancer survivor efficacy. Findings indicate that although pediatric cancer survivors often do not publicly discuss a "cancer survivor identity," they do internalize both positive and negative stereotypes about cancer survivorship. It is important for practitioners to be aware of the long-term implications of cancer survivor identity and stereotypes.

  10. Silver lining: building a shared Sudanese identity through food.

    Science.gov (United States)

    Crofts, A V

    2010-01-01

    The displaced of Sudan, due to both decades of civil war and natural disasters, are disproportionately female and many are responsible for dependents. For those settling in the capital, Khartoum, their livelihood depends on carving out ways to earn money in an urban area that is experiencing tremendous growth from the millions of recent arrivals. When confronted with the immediate need to provide for their families, women turn to a skill universally expected of them: cooking. Therefore, Khartoum is home to a thriving micro-economy of food vendors. By selling these dishes in the capital, they broaden the culinary horizons of the city while preserving their own food traditions. Their growing numbers provide an opportunity for regional foodways to gain wider introduction, adaptation, and, finally, adoption. These same vendors also facilitate a nascent sense of a shared Sudanese identity and nationalism. For established Khartoum urbanites, the definition of Sudanese food (and, by extension, what it means to be Sudanese) expands as street-vendor fare moves to restaurants and becomes more widely available throughout the city. As urban Sudanese overcome their preconceptions and discover a taste for regional cuisines, meals function as unofficial diplomacy during this turbulent time in Sudan's history.

  11. Knowledge Sharing in Professions Roles and Identity in Expert Communities

    CERN Document Server

    Styhre, Alexander

    2011-01-01

    Knowledge Sharing in Professions looks at professionalism as a form of systematic and institutionalized knowledge sharing. It analyses professionalism through the everyday practices in professional communities and the organizations where they work. Three empirical studies, of pharmaceutical clinical trials researchers, management consultants, and architects, are presented, serving to illustrate the relational nature of these and other professions, and how members of professional communities are constantly exchanging data, information, and know-how in their everyday work.

  12. Shared cognition as a product of, and precursor to, shared identity in negotiations

    NARCIS (Netherlands)

    Swaab, R; Postmes, T.; Van Beest, I.; Spears, R.

    2007-01-01

    Three studies examined the hypothesis that shared cognition and group identification can be each other's catalysts as well as driving forces behind multiparty negotiation outcomes that might not otherwise be realized. Experiment 1 demonstrates that clear links exist between communication, the develo

  13. Genomic sharing surrounding alleles identical by descent : Effects of genetic drift and population growth

    NARCIS (Netherlands)

    te Meerman, G J; Van der Meulen, M A

    1997-01-01

    The number of identical deleterious mutations present in a population may become very large, depending on the combined effect of genetic drift, population growth and limited negative selection. The distribution of the length of the shared area between two random chromosomes carrying the mutations ha

  14. Genomic sharing surrounding alleles identical by descent : Effects of genetic drift and population growth

    NARCIS (Netherlands)

    te Meerman, G J; Meulen ,van der Martin

    1997-01-01

    The number of identical deleterious mutations present in a population may become very large, depending on the combined effect of genetic drift, population growth and limited negative selection. The distribution of the length of the shared area between two random chromosomes carrying the mutations ha

  15. Identity Federation and Its Importance for NASA's Future: The SharePoint Extranet Pilot

    Science.gov (United States)

    Baturin, Rebecca R.

    2013-01-01

    My project at Kennedy Space Center (KSC) during the spring 2013 Project Management and Systems Engineering Internship was to functionalJy test and deploy the SharePoint Extranet system and ensure successful completion of the project's various lifecycle milestones as described by NASA Procedural Requirement (NPR) 7 120.7. I worked alongside NASA Project Managers, Systems Integration Engineers, and Information Technology (IT) Professionals to pilot this collaboration capability between NASA and its External Partners. The use of identity federation allows NASA to leverage externally-issued credentials of other federal agencies and private aerospace and defense companies, versus the traditional process of granting and maintaining full NASA identities for these individuals. This is the first system of its kind at NASA and it will serve as a pilot for the Federal Government. Recognizing the novelty of this service, NASA's initial approach for deployment included a pilot period where nearby employees of Patrick Air Force Base would assist in testing and deployment. By utilizing a credential registration process, Air Force users mapped their Air Force-issued Common Access Cards (CAC) to a NASA identity for access to the External SharePoint. Once the Air Force stands up an Active Directory Federation Services (ADFS) instance within their Data Center and establishes a direct trust with NASA, true identity federation can be established. The next partner NASA is targeting for collaboration is Lockheed Martin (LMCO), since they collaborate frequently for the ORION Program. Through the use of Exostar as an identity hub, LMCO employees will be able to access NASA data on a need to know basis, with NASA ultimately managing access. In a time when every dollar and resource is being scrutinized, this capability is an exciting new way for NASA to continue its collaboration efforts in a cost and resource effective manner.

  16. Work in the virtual enterprise-creating identities, building trust, and sharing knowledge

    DEFF Research Database (Denmark)

    Rasmussen, Lauge Baungaard; Wangel, Arne

    2006-01-01

    of the network must be integrated across the barriers of missing face-to-face clues and cultural differences. The social integration of the virtual network involves the creation of identities of the participating nodes, the building of trust between them, and the sharing of tacit and explicit knowledge among...... for an exploratory, sociotechnical research approach combining the dimensions of context, subject and action with the twin objectives of contributing to the enhancement of collaborative capabilities in virtual teams as well as improving the insights into the nature of virtual work....

  17. Estimation of heritability from limited family data using genome-wide identity-by-descent sharing

    Directory of Open Access Journals (Sweden)

    Ødegård Jørgen

    2012-05-01

    Full Text Available Abstract Background In classical pedigree-based analysis, additive genetic variance is estimated from between-family variation, which requires the existence of larger phenotyped and pedigreed populations involving numerous families (parents. However, estimation is often complicated by confounding of genetic and environmental family effects, with the latter typically occurring among full-sibs. For this reason, genetic variance is often inferred based on covariance among more distant relatives, which reduces the power of the analysis. This simulation study shows that genome-wide identity-by-descent sharing among close relatives can be used to quantify additive genetic variance solely from within-family variation using data on extremely small family samples. Methods Identity-by-descent relationships among full-sibs were simulated assuming a genome size similar to that of humans (effective number of loci ~80. Genetic variance was estimated from phenotypic data assuming that genomic identity-by-descent relationships could be accurately re-created using information from genome-wide markers. The results were compared with standard pedigree-based genetic analysis. Results For a polygenic trait and a given number of phenotypes, the most accurate estimates of genetic variance were based on data from a single large full-sib family only. Compared with classical pedigree-based analysis, the proposed method is more robust to selection among parents and for confounding of environmental and genetic effects. Furthermore, in some cases, satisfactory results can be achieved even with less ideal data structures, i.e., for selectively genotyped data and for traits for which the genetic variance is largely under the control of a few major genes. Conclusions Estimation of genetic variance using genomic identity-by-descent relationships is especially useful for studies aiming at estimating additive genetic variance of highly fecund species, using data from small

  18. Being differently the same: the mediation of identity tensions in the sharing of illness experiences.

    Science.gov (United States)

    Mazanderani, Fadhila; Locock, Louise; Powell, John

    2012-02-01

    The sharing of experiences between patients has become increasingly privileged as a source of knowledge and support in contemporary healthcare. Despite this, relatively little is known about the processes whereby people's experiences become, or fail to become, valued as sources of health-related knowledge in different contexts. Through a secondary analysis of 87 interviews conducted between 2006 and 2008 in the UK with people affected by motor neurone disease (46 interviews) and Parkinson's disease (41 interviews), we explore the identity work involved in turning other people's experiences into 'experiential knowledge' that can be shared between patients. Of particular interest is how the turning of others' experiences into knowledge is presupposed by negotiating a particular type of identity tension - what, drawing on the work of Paul Ricoeur (2003) on metaphor, we refer to as 'being differently the same'. We examine the way in which people living with motor neurone disease and Parkinson's disease spoke of managing this tension as part of the process of accessing and valuing other patients' experiences, both epistemologically and emotionally. Instead of treating others' experiences as a pre-given source of knowledge, we emphasise how experience comes to be embodied and articulated through different media - bodies, speech, text, and images. Moreover, we suggest that paying closer attention to these media provides opportunities for enhancing our understanding of how people with different chronic and/or terminal illnesses use or do not use different forms of peer support - and in particular online ones - as a source of health-related experiential knowledge. Some of the implications of this are discussed in the specific context of people diagnosed with incurable neurodegenerative conditions characterised by visible physical deterioration and associated emotional distress. Copyright © 2011 Elsevier Ltd. All rights reserved.

  19. Key exchange using biometric identity based encryption for sharing encrypted data in cloud environment

    Science.gov (United States)

    Hassan, Waleed K.; Al-Assam, Hisham

    2017-05-01

    The main problem associated with using symmetric/ asymmetric keys is how to securely store and exchange the keys between the parties over open networks particularly in the open environment such as cloud computing. Public Key Infrastructure (PKI) have been providing a practical solution for session key exchange for loads of web services. The key limitation of PKI solution is not only the need for a trusted third partly (e.g. certificate authority) but also the absent link between data owner and the encryption keys. The latter is arguably more important where accessing data needs to be linked with identify of the owner. Currently available key exchange protocols depend on using trusted couriers or secure channels, which can be subject to man-in-the-middle attack and various other attacks. This paper proposes a new protocol for Key Exchange using Biometric Identity Based Encryption (KE-BIBE) that enables parties to securely exchange cryptographic keys even an adversary is monitoring the communication channel between the parties. The proposed protocol combines biometrics with IBE in order to provide a secure way to access symmetric keys based on the identity of the users in unsecure environment. In the KE-BIOBE protocol, the message is first encrypted by the data owner using a traditional symmetric key before migrating it to a cloud storage. The symmetric key is then encrypted using public biometrics of the users selected by data owner to decrypt the message based on Fuzzy Identity-Based Encryption. Only the selected users will be able to decrypt the message by providing a fresh sample of their biometric data. The paper argues that the proposed solution eliminates the needs for a key distribution centre in traditional cryptography. It will also give data owner the power of finegrained sharing of encrypted data by control who can access their data.

  20. On the Impact of Closed Access and Users Identities in Spectrum-Shared Overlaid Wireless Networks

    KAUST Repository

    Radaydeh, Redha M.

    2016-03-28

    © 2015 IEEE. This paper develops analytical models to investigate the impact of various operation terms and parameters on the downlink performance of spectrum-shared overlaid networks under closed-access small cells deployment. It is considered that closed-access small cells (i.e., femtocells) can not reuse available channels, and can serve only active authorized user equipments (UEs). On the other hand, the macrocell base station can unconditionally reuse available channels to serve active macrocell UEs. The analysis characterizes UEs identities, their likelihoods of being active, and their likelihoods of initiating interference. Moreover, it quantifies interference sources observed from effective femtocells considering their over-loaded and under-loaded cell scenarios. The developed results to characterize an active UE performance and the impact of the number of available channels are thoroughly examined. The obtained results are generally applicable for any performance measure and any network channel models. Numerical and simulation examples are presented to clarify the main outcomes of this paper.

  1. The induction of shared identity : The positive role of individual distinctiveness for groups

    NARCIS (Netherlands)

    Jans, Lise; Postmes, Tom; Van der Zee, Karen I.

    2011-01-01

    This article examines inductive processes of social identity formation, the bottom-up processes by which individual group members influence a social identity, integrating it with work on entitativity. Three studies tested the prediction that feelings of individual distinctiveness mediate the relatio

  2. Assumption-free estimation of heritability from genome-wide identity-by-descent sharing between full siblings.

    Directory of Open Access Journals (Sweden)

    Peter M Visscher

    2006-03-01

    Full Text Available The study of continuously varying, quantitative traits is important in evolutionary biology, agriculture, and medicine. Variation in such traits is attributable to many, possibly interacting, genes whose expression may be sensitive to the environment, which makes their dissection into underlying causative factors difficult. An important population parameter for quantitative traits is heritability, the proportion of total variance that is due to genetic factors. Response to artificial and natural selection and the degree of resemblance between relatives are all a function of this parameter. Following the classic paper by R. A. Fisher in 1918, the estimation of additive and dominance genetic variance and heritability in populations is based upon the expected proportion of genes shared between different types of relatives, and explicit, often controversial and untestable models of genetic and non-genetic causes of family resemblance. With genome-wide coverage of genetic markers it is now possible to estimate such parameters solely within families using the actual degree of identity-by-descent sharing between relatives. Using genome scans on 4,401 quasi-independent sib pairs of which 3,375 pairs had phenotypes, we estimated the heritability of height from empirical genome-wide identity-by-descent sharing, which varied from 0.374 to 0.617 (mean 0.498, standard deviation 0.036. The variance in identity-by-descent sharing per chromosome and per genome was consistent with theory. The maximum likelihood estimate of the heritability for height was 0.80 with no evidence for non-genetic causes of sib resemblance, consistent with results from independent twin and family studies but using an entirely separate source of information. Our application shows that it is feasible to estimate genetic variance solely from within-family segregation and provides an independent validation of previously untestable assumptions. Given sufficient data, our new paradigm will

  3. Assumption-free estimation of heritability from genome-wide identity-by-descent sharing between full siblings.

    Directory of Open Access Journals (Sweden)

    2006-03-01

    Full Text Available The study of continuously varying, quantitative traits is important in evolutionary biology, agriculture, and medicine. Variation in such traits is attributable to many, possibly interacting, genes whose expression may be sensitive to the environment, which makes their dissection into underlying causative factors difficult. An important population parameter for quantitative traits is heritability, the proportion of total variance that is due to genetic factors. Response to artificial and natural selection and the degree of resemblance between relatives are all a function of this parameter. Following the classic paper by R. A. Fisher in 1918, the estimation of additive and dominance genetic variance and heritability in populations is based upon the expected proportion of genes shared between different types of relatives, and explicit, often controversial and untestable models of genetic and non-genetic causes of family resemblance. With genome-wide coverage of genetic markers it is now possible to estimate such parameters solely within families using the actual degree of identity-by-descent sharing between relatives. Using genome scans on 4,401 quasi-independent sib pairs of which 3,375 pairs had phenotypes, we estimated the heritability of height from empirical genome-wide identity-by-descent sharing, which varied from 0.374 to 0.617 (mean 0.498, standard deviation 0.036. The variance in identity-by-descent sharing per chromosome and per genome was consistent with theory. The maximum likelihood estimate of the heritability for height was 0.80 with no evidence for non-genetic causes of sib resemblance, consistent with results from independent twin and family studies but using an entirely separate source of information. Our application shows that it is feasible to estimate genetic variance solely from within-family segregation and provides an independent validation of previously untestable assumptions. Given sufficient data, our new paradigm will

  4. An Exploration of Social Identity: The Geography and Politics of News-Sharing Communities in Twitter

    CERN Document Server

    Herdağdelen, Amaç; Gard-Murray, Alexander; Bar-Yam, Yaneer

    2012-01-01

    The importance of collective social action in current events is manifest in the Arab Spring and Occupy movements. Electronic social media have become a pervasive channel for social interactions, and a basis of collective social response to information. The study of social media can reveal how individual actions combine to become the collective dynamics of society. Characterizing the groups that form spontaneously may reveal both how individuals self-identify and how they will act together. Here we map the social, political, and geographical properties of news-sharing communities on Twitter, a popular micro-blogging platform. We track user-generated messages that contain links to New York Times online articles and we label users according to the topic of the links they share, their geographic location, and their self-descriptive keywords. When users are clustered based on who follows whom in Twitter, we find social groups separate by whether they are interested in local (NY), national (US) or global (cosmopoli...

  5. 共享平台数据属性重合下的LDAP多身份认证%Sharing Platform Data Attribute Coincidence of LDAP Many Identity Authentication

    Institute of Scientific and Technical Information of China (English)

    段琳琳

    2013-01-01

    Based on LDAP many school sharing platform, usually is the use of identity information matching algorithm of identity authentication data. In mass users are using this platform, will cause identity data coincidence, leading to identity information is not clear, thus unable to realize accurate identity authentication. In order to avoid the defect, the article puts forward a method based on LDAP many school sharing platform identity authentication method multiple attribute da-ta. Structure based on LDAP many school of sharing platform of identity authentication protocol for identity authentication provides an effective way. In the user identity mass data, extracting user identity authentication information. According to the above identity authentication information, carries on the multiple attribute identity authentication data. The experi-mental results show that using the above methods can improve the based on LDAP school sharing platform multiple at-tribute identification accuracy, has made the satisfactory effect.%  基于LDAP的多校共享平台中,通常情况下是利用身份信息匹配算法进行身份数据认证的。在海量用户都使用该平台的情况下,将造成身份数据重合,导致身份信息不明确,从而无法实现准确的身份认证。为了避免上述缺陷,提出了一种基于LDAP的多校共享平台中多属性身份数据认证方法。构造基于LDAP的多校共享平台的身份认证协议,为身份认证提供一个有效的途径。在用户海量身份数据中,提取用户身份认证信息。根据上述身份认证信息,进行多属性身份数据认证。实验结果表明,利用上述方法能够提高基于LDAP的多校共享平台中多属性身份认证的准确性,取得了令人满意的效果。

  6. DNA Vaccine of SARS-Cov S Gene Induces Antibody Response in Mice

    Institute of Scientific and Technical Information of China (English)

    PingZHAO; Jin-ShanKE; Zhao-LinQIN; HaoREN; Lan-JuanZHAO; Jian-GuoYU

    2004-01-01

    The spike (S) protein, a main surface antigen of SARS-coronavirus (SARS-CoV), is one of the most important antigen candidates for vaccine design. In the present study, three fragments of the truncated S protein were expressed in E.coli, and analyzed with pooled sera of convalescence phase of SARS patients.The full length S gene DNA vaccine was constructed and used to immunize BALB/c mice. The mouse serum IgG antibody against SARS-CoV was measured by ELISA with E.coli expressed truncated S protein or SARS-CoV lysate as diagnostic antigen. The results showed that all the three fragments of S protein expressed by E.coli was able to react with sera of SARS patients and the S gene DNA candidate vaccine could induce the production of specific IgG antibody against SARS-CoV efficiently in mice with seroconversion ratio of 75% after 3 times of immunization. These findings lay some foundations for further understanding the immunology of SARS-CoV and developing SARS vaccines.

  7. DNA Vaccine of SARS-Cov S Gene Induces Antibody Response in Mice

    Institute of Scientific and Technical Information of China (English)

    Ping ZHAO; Jin-Shan KE; Zhao-Lin QIN; Hao REN; Lan-Juan ZHAO; Jian-Guo YU; Jun GAO; Shi-Ying ZHU; Zhong-Tian QI

    2004-01-01

    The spike (S) protein, a main surface antigen of SARS-coronavirus (SARS-CoV), is one of the most important antigen candidates for vaccine design. In the present study, three fragments of the truncated S protein were expressed in E. Coli, and analyzed with pooled sera of convalescence phase of SARS patients.The full length S gene DNA vaccine was constructed and used to immunize BALB/c mice. The mouse serum IgG antibody against SARS-CoV was measured by ELISA with E. Coli expressed truncated S protein or SARS-CoV lysate as diagnostic antigen. The results showed that all the three fragments of S protein expressed by E. Coli was able to react with sera of SARS patients and the S gene DNA candidate vaccine could induce the production of specific IgG antibody against SARS-CoV efficiently in mice with seroconversion ratio of 75% after 3 times of immunization. These findings lay some foundations for further understanding the immunology of SARS-CoV and developing SARS vaccines.

  8. CLONING SEGMENT SPIKE PROTEIN GENE OF SARS-COV AND ITS EXPRESSION IN ESCHERICHIA COLI

    Institute of Scientific and Technical Information of China (English)

    刘中华; 许文波; 毛乃颖; 张燕; 朱贞; 崔爱利; 杨建国; 胡海涛

    2004-01-01

    Objective Expressing and purifying the segment of SARS-CoV spike protein in E.Coli. Methods The target gene was obtained by RT-PCR. The PCR product was cloned into pEGM- T Easy Vector, sequencing and double restriction digestion ( BamHⅠ,PstⅠ) were performed. The target gene was subcloned into PQE30 expression vector. The gene was expressed in the E.coli strain M15 cells induced by IPTG. The protein was purified with a nickel HiTrap chelating metal affinity column. Results The recombinant expression plasmid was successfully constructed and the protein was well expressed in E. coli strain M15 cells. The ideal pure protein was obtained by purification. Western blotting analysis suggested the protein could act with the convalescent sera of lab confirmed SARS patients. Conclusion The segment of SARS-CoV spike protein was well expressed and purified, and can be applied in diagnosis and immunological research of SARS.

  9. Haplotype identity between individuals who share a CFTR mutation allele ''identical by descent'' : Demonstration of the usefulness of the haplotype-sharing concept for gene mapping in real populations

    NARCIS (Netherlands)

    deVries, HG; vanderMeulen, MA; Rozen, R; Halley, DJJ; Scheffer, H; tenKate, LP; Buys, CHCM; teMeerman, GJ

    1996-01-01

    Cystic fibrosis (CF) patients with the A455E mutation, in both the French Canadian and the Dutch population, share a common haplotype over distances of up to 25 cM. French Canadian patients with the 621+1G-->T mutation share a common haplotype of more than 14 cM. In contrast, haplotypes containing t

  10. Haplotype identity between individuals who share a CFTR mutation allele 'identical by descent': Demonstration of the usefulness of the haplotype-sharing concept for gene mapping in real populations

    NARCIS (Netherlands)

    H.G. de Vries (Hendrik); M.A. van der Meulen (Martin); R. Rozen (Rima); D.J.J. Halley (Dicky); H. Scheffer (Hans); L.P. ten Kate; C.H.C.M. Buys; G.J. Te Meerman (Gerard)

    1996-01-01

    markdownabstractAbstract Cystic fibrosis (CF) patients with the A455E mutation, in both the French Canadian and the Dutch population, share a common haplotype over distances of up to 25 cM. French Canadian patients with the 621+1G→T mutation share a common haplotype of more than 14 cM. In contras

  11. Identity's identities

    DEFF Research Database (Denmark)

    Jensen, Kim Ebensgaard

    in Academic English and more everyday-based English, identity as a lexeme is definitely worth having a look at. This paper presents a lexicological study of identity in which some of its senses are identified and their behaviors in actual discourse are observed. Drawing on data from the 2011 section...... of the Corpus of Contemporary American English, a behavioral profile of the distributional characteristics of identity is set up. Behavioral profiling is a lexicographical method developed by the corpus linguist Stefan Th. Gries which, by applying semantic ID tagging and statistical analysis, provides a fine......-grained insight into the semantic affinities of one or more lexemes. The main premise is that the semantic properties of a linguistic unit are reflected in its distributional characteristics, and, thus, by observing association patterns of a lexeme we can gain useful insights into its semantic affinities. Thus...

  12. The corona of the daffodil Narcissus bulbocodium shares stamen-like identity and is distinct from the orthodox floral whorls.

    Science.gov (United States)

    Waters, Mark T; Tiley, Anna M M; Kramer, Elena M; Meerow, Alan W; Langdale, Jane A; Scotland, Robert W

    2013-05-01

    The structural homology of the daffodil corona has remained a source of debate throughout the history of botany. Over the years it has been separately referred to as a modified petal stipule, stamen and tepal. Here we provide insights from anatomy and molecular studies to clarify the early developmental stages and position of corona initiation in Narcissus bulbocodium. We demonstrate that the corona initiates as six separate anlagen from hypanthial tissue between the stamens and perianth. Scanning electron microscope images and serial sections demonstrate that corona initiation occurs late in development, after the other floral whorls are fully developed. To define more precisely the identity of the floral structures, daffodil orthologues of the ABC floral organ identity genes were isolated and expression patterns were examined in perianth, stamens, carpel, hypanthial tube and corona tissue. Coupled with in situ hybridisation experiments, these analyses showed that the expression pattern of the C-class gene NbAGAMOUS in the corona is more similar to that of the stamens than that of the tepals. In combination, our results demonstrate that the corona of the daffodil N. bulbocodium exhibits stamen-like identity, develops independently from the orthodox floral whorls and is best interpreted as a late elaboration of the region between the petals and stamens associated with epigyny and the hypanthium.

  13. The Relevance of Tag along Rights and Identity of Controlling Shareholders for the Price Spreads between Dual-Class Shares: the Brazilian Case

    Directory of Open Access Journals (Sweden)

    Richard Saito

    2010-01-01

    Full Text Available This paper analyzes the determinants of the differential pricing of equity classes (the so-called dual-class premium [DCP] in Brazil from 1995 to 2006 with a focus on two specific corporate governance aspects: i the granting of tag along rights, a mandatory bid rule that extends to minority shareholders the right to sell their shares in case of a control transfer; and ii the identity of the controlling shareholders, with an emphasis on family control. We examined 87 Brazilian listed firms throughout the period, resulting in a sample of 3,287 observations. We found empirical evidence that changes in Corporate Law decreased (increased the advantage of voting shares in terms of tag along rights reduced (incremented DCP. However, we did not find empirical evidence that the voluntary granting of tag along rights altered DCP. We also found evidence suggesting that family control is positively associated with DCP level. Overall, our results indicate that regulations regarding shareholders’ rights and the identity of controlling shareholders are the two relevant corporate governance variables for DCP level in environments characterized by concentrated ownership structures.

  14. Bridging Identities through Identity Change

    Science.gov (United States)

    Cantwell, Allison M.; Martiny, Sarah E.

    2010-01-01

    As indicated by Deaux and Burke (this volume), sociology and psychology have shared a tradition of discourse allowing social psychologists to build upon each other's ideas. A conversation between social identity theory and identity theory was initiated fifteen years ago and addressed the similarities and differences between these theories. This…

  15. Believing in "us": exploring leaders' capacity to enhance team confidence and performance by building a sense of shared social identity.

    Science.gov (United States)

    Fransen, Katrien; Haslam, S Alexander; Steffens, Niklas K; Vanbeselaere, Norbert; De Cuyper, Bert; Boen, Filip

    2015-03-01

    The present study examined the impact of athlete leaders' perceived confidence on their teammates' confidence and performance. Male basketball players (N = 102) participated in groups of 4. To manipulate leaders' team confidence, the appointed athlete leader of each newly formed basketball team (a confederate) expressed either high or low team confidence. The results revealed an effect of team confidence contagion such that team members had greater team confidence when the leader expressed high (rather than low) confidence in the team's success. Second, the present study sought to explain the mechanisms through which this contagion occurs. In line with the social identity approach to leadership, structural equation modeling demonstrated that this effect was partially mediated by team members' increased team identification. Third, findings indicated that when leaders expressed high team confidence, team members' performance increased during the test, but when leaders expressed low confidence, team members' performance decreased. Athlete leaders thus have the capacity to shape team members' confidence--and hence their performance--in both positive and negative ways. In particular, by showing that they believe in "our team," leaders are able not only to make "us" a psychological reality, but also to transform "us" into an effective operational unit. PsycINFO Database Record (c) 2015 APA, all rights reserved.

  16. Activation of shared identities on the Uruguayan and Brazilian frontier triggered by the construction of Uruguay as a consumption proposal

    Directory of Open Access Journals (Sweden)

    Roberta Brandalise

    2016-12-01

    Full Text Available Estudamos a participação do jornalismo brasileiro na articulação de representações sociais e de identidades culturais na fronteira Brasil-Uruguai, a partir das apropriações e usos que brasileiros e uruguaios fronteiriços fizeram de narrativas noticiosas sobre o Uruguai e que eles consideraram relevantes em seu cotidiano. Realizamos o estudo de caso sob a perspectiva dos Estudos Culturais Britânicos e Latino-Americanos, com entrevistas semiestruturadas junto a uma amostra de 12 fronteiriços. O Uruguai foi caracterizado no discurso jornalístico como uma proposta de consumo, como destino turístico ou em função de seus produtos e recursos naturais. As narrativas noticiosas colaboraram para reforçar a identificação entre uruguaios e brasileiros com respeito ao pertencimento regional e ao estilo de vida.   PALAVRAS-CHAVE: Comunicação; Consumo; Fronteiras; Uruguai; Brasil.     ABSTRACT We studied the participation of Brazilian journalism in the articulation of social representations and of cultural identities on the Brazilian and Uruguayan border based on the news narratives about Uruguay that frontier Brazilians and Uruguayans appropriated, made use of and considered relevant in their everyday lives. We conducted the study case from the perspective of British and Latin American social studies, using semi-structured interviews for questioning 12 frontier people. Uruguay was featured in newspaper discourse as a consumption proposal, a tourist destination, or a stand for its products and natural resources. The narrative news helped to reinforce the mutual identification of Uruguayans and Brazilians with respect to their belonging to the region and their life style.   KEYWORDS: Communication; Consumption; Frontiers; Uruguay; Brazil.     RESUMEN Estudiamos la participación del periodismo brasileño en la articulación de representaciones sociales y de identidades culturales en la frontera Brasil-Uruguay, a partir de las

  17. Identity formation in multiparty negotiations

    NARCIS (Netherlands)

    Swaab, R; Postmes, T.; Spears, R.

    2008-01-01

    Based on the recently proposed Interactive Model of Identity Formation, we examine how top-down deductive and bottom-up inductive identity formations influence intentions and behaviour in multiparty negotiations. Results show that a shared identity can be deduced from the social context through reco

  18. Group identity and leading-by-example

    OpenAIRE

    Drouvelis, Michalis; Nosenzo, Daniele

    2012-01-01

    We study the interplay between leading-by-example and group identity in a public goods game experiment. A common identity between the leader and her followers is beneficial for cooperation: average contributions are more than 30% higher than in a treatment where no identity was induced. In two further treatments we study the effects of heterogeneous identities. We find no effect on cooperation when only part of the followers share the leader’s identity, or when followers share a common identi...

  19. Borrowing brainpower - sharing insecurities

    DEFF Research Database (Denmark)

    Wegener, Charlotte; Meier, Ninna; Ingerslev, Karen

    2016-01-01

    Academic writing is a vital, yet complex skill that must be developed within a doctoral training process. In addition, becoming an academic researcher is a journey of changing sense of self and identity. Through analysis of a group session, we show how the feedback of peers addresses questions...... of structure and writing style along with wider issues of researcher identity. Thus, peer learning is demonstrated as a process of simultaneously building a text and an identity as scholarly researcher. The paper advocates ‘borrowing brainpower’ from peers in order to write better texts and, at the same time......, ‘share insecurities’ during the development of the researcher identity. Based on a distributed notion of peer learning and identity, we point to the need for further research into the everyday activities of doctoral writing groups in order to understand the dynamic relationship between production of text...

  20. 一种适合云数据共享的身份代理重加密方案%Identity based proxy re-encryption scheme for secure cloud data sharing

    Institute of Scientific and Technical Information of China (English)

    郑志恒; 张敏情; 王绪安

    2016-01-01

    目前云数据安全存储方案中,数据拥有者加密数据上传到云中,但却不能很好地支持加密数据分享,尤其是分享给多个用户时,可扩展性不强。针对这个问题提出一种基于身份的代理重加密方案,该方案不需要云完全可信但却又能灵活地进行数据安全共享。在具体构造上,结合基于身份的加密,用一个强不可伪造的一次签名方案使被转换后的密文具有公开验证性,且能达到被转换后的密文在标准模型下具有选择密文安全性。由于该类方案无须使用公钥证书、能支持细粒度的访问控制且可扩展性较好,因此可以较好地适用于安全云数据共享。%Currently most of the solutions of cloud data security storage required the data owner encrypted his data before out-sourcing the data to the cloud,but this method couldn't support flexible data sharing,especially for the multi-user setting. Aimed at solving this problem,this paper proposed a new identity based proxy re-encryption scheme,which didn't need the cloud to be completely trusted,but could also be used to share the data safely.In the concrete construction,this paper used a strongly non-forgeable signature scheme to let the encrypted ciphertexts be publicly verifiable,this scheme could also be cho-sen ciphertext secure in the standard model.For the proposed scheme can be used without certificate,support fine-grained ac-cess control and be very scalable,thus it can be used for secure data sharing in the cloud.

  1. Shared lives, shared energy

    Energy Technology Data Exchange (ETDEWEB)

    Madsen, P.; Goss, K.

    1982-07-01

    A social experiment in Denmark is described in which 25 families combine private ownership (each family owns its own home) and collectivism (each family owns 1/25 of the grounds, large common house and other facilities). The superinsulated individual homes are small (< 1000 ft/sup 2/) but the common house (7800 ft/sup 2/) provides dining and meeting facilities for all 25 families as well as a central heating plant. Heat may be supplied from solar, wind and/or oil-fired boiler. Adequate hot water storage is provided using solar collectors and a 55 kW Vesta wind generator (surplus power is sold). All south facing roof surfaces are fitted with solar collectors (4455 ft/sup 2/ total). A total of 70% of the energy used is produced on site (solar and wind). The manner of living and sharing (child care, automobiles, cooking, etc.) is described as well as typical floor plans for the units. Other collective housing in Denmark is described and it is postulated that overdrevet may serve as a model. (MJJ)

  2. Identity Change

    Science.gov (United States)

    Burke, Peter J.

    2006-01-01

    This research examines two mechanisms by which persons' identities change over time. First, on the basis of identity control theory (ICT), I hypothesize that while identities influence the way in which a role is played out, discrepancies between the meanings of the identity standard and the meanings of the role performance will result in change.…

  3. Sharing Economy

    DEFF Research Database (Denmark)

    Marton, Attila; Constantiou, Ioanna; Thoma, Antonela

    De spite the hype the notion of the sharing economy is surrounded by, our understanding of sharing is surprisingly undertheorized. In this paper, we make a first step towards rem edying this state of affairs by analy sing sharing as a s ocial practice. Based on a multi ple - case study, we analyse...... the institutional assemblage of sharing on online platforms to counter the prevalent assumpti o n i n the literature that sharing derives primarily from the shareability of goods and resources. Sharing, we contend, is a fundament al human practice that, in our case study, takes the particular form of coord inated...

  4. Hard Identity and Soft Identity

    Directory of Open Access Journals (Sweden)

    Hassan Rachik

    2006-04-01

    Full Text Available Often collective identities are classified depending on their contents and rarely depending on their forms. Differentiation between soft identity and hard identity is applied to diverse collective identities: religious, political, national, tribal ones, etc. This classification is made following the principal dimensions of collective identities: type of classification (univocal and exclusive or relative and contextual, the absence or presence of conflictsof loyalty, selective or totalitarian, objective or subjective conception, among others. The different characteristics analysed contribute to outlining an increasingly frequent type of identity: the authoritarian identity.

  5. Sharing Economy

    DEFF Research Database (Denmark)

    Marton, Attila; Constantiou, Ioanna; Thoma, Antonela

    De spite the hype the notion of the sharing economy is surrounded by, our understanding of sharing is surprisingly undertheorized. In this paper, we make a first step towards rem edying this state of affairs by analy sing sharing as a s ocial practice. Based on a multi ple - case study, we analyse...

  6. Adaptive team formation for shared situation awareness

    NARCIS (Netherlands)

    Foeken, E. van; Kester, L.J.H.M.

    2012-01-01

    To reach their goals in the most effective way a team of entities needs to have a high situation awareness. In addition, the awareness needs to be shared among the entities and preferably identical in order to coordinate their actions. Unfortunately, optimal identical shared awareness is often not p

  7. Adaptive team formation for shared situation awareness

    NARCIS (Netherlands)

    Foeken, E. van; Kester, L.J.H.M.

    2012-01-01

    To reach their goals in the most effective way a team of entities needs to have a high situation awareness. In addition, the awareness needs to be shared among the entities and preferably identical in order to coordinate their actions. Unfortunately, optimal identical shared awareness is often not

  8. Sharing City

    DEFF Research Database (Denmark)

    This magazine offers an insight into the growing commercial innovation, civic movements, and political narratives surrounding sharing economy services, solutions and organisational types. It presents a cross-section of the manifold sharing economy services and solutions that can be found in Denmark....... Solutions of sharing that seeks to improve our cities and local communities in both urban and rural environments. 24 sharing economy organisations and businesses addressing urban and rural issues are being portrayed and seven Danish municipalities that have explored the potentials of sharing economy....... Moreover, 15 thought leading experts - professionals and academic - have been invited to give their perspective on sharing economy for cities. This magazine touches upon aspects of the sharing economy as mobility, communities, sustainability, business development, mobility, and urban-rural relation....

  9. Sharing code

    OpenAIRE

    Kubilius, Jonas

    2014-01-01

    Sharing code is becoming increasingly important in the wake of Open Science. In this review I describe and compare two popular code-sharing utilities, GitHub and Open Science Framework (OSF). GitHub is a mature, industry-standard tool but lacks focus towards researchers. In comparison, OSF offers a one-stop solution for researchers but a lot of functionality is still under development. I conclude by listing alternative lesser-known tools for code and materials sharing.

  10. National and Transnational Identities

    DEFF Research Database (Denmark)

    Jørgensen, Martin Bak

    is that the opportunity and incentive structures clearly affect collective identities and the organising processes of the Turkish minority groups within in the three countries. The analysis shows that the immigrant organisations adapt to the structural limitations and claims and identities are negotiated within...... in terms of career paths. In Germany the integration activities are increasingly being pushed over to the immigrant organisations which now share the role of being service providers together with the welfare organisations, which also stipulates increased competition. The analysis also shows...

  11. Information Sharing among Untrustworthy Entities

    Science.gov (United States)

    Tamura, Shinsuke; Yanase, Tatsuro

    Most of current technologies that enable secure information sharing assume that entities that share information are mutually trustworthy. However, in recent applications this assumption is not realistic. As applications become sophisticated, information systems are required to share information securely even among untrustworthy entities. This paper discusses two kinds of problems about information sharing among untrustworthy entities, i.e. secure statistical data gathering and anonymous authentication, and proposes their solutions. The former is a problem to calculate statistics while ensuring that raw data are not disclosed to any entity including ones that calculate statistics, and the latter is a problem to authenticate entities while keeping their identities confidential.

  12. File sharing

    NARCIS (Netherlands)

    van Eijk, N.

    2011-01-01

    ‘File sharing’ has become generally accepted on the Internet. Users share files for downloading music, films, games, software etc. In this note, we have a closer look at the definition of file sharing, the legal and policy-based context as well as enforcement issues. The economic and cultural impact

  13. Shared leadership

    DEFF Research Database (Denmark)

    Ulhøi, John Parm; Müller, Sabine

    2012-01-01

    The aim of this paper is twofold. First, this paper comprehensively will review the conceptual and empirical literature to identify such critical underlying mechanisms which enable shared or collective leadership. Second, this article identifies the antecedents and outcomes of shared leadership...... according to the literature review to develop a re-conceptualised and synthesized framework for managing the organizational issues associated with shared leadership on various organizational levels. The paper rectifies this by identifying the critical factors and mechanisms which enable shared leadership...... and its antecedents and outcomes, and to develop a re-conceptualized and synthesized framework of shared leadership. The paper closes with a brief discussion of avenues for future research and implications for managers....

  14. Sharing Graphs

    CERN Document Server

    Sahasranand, K R

    2010-01-01

    Almost all known secret sharing schemes work on numbers. Such methods will have difficulty in sharing graphs since the number of graphs increases exponentially with the number of nodes. We propose a secret sharing scheme for graphs where we use graph intersection for reconstructing the secret which is hidden as a sub graph in the shares. Our method does not rely on heavy computational operations such as modular arithmetic or polynomial interpolation but makes use of very basic operations like assignment and checking for equality, and graph intersection can also be performed visually. In certain cases, the secret could be reconstructed using just pencil and paper by authorised parties but cannot be broken by an adversary even with unbounded computational power. The method achieves perfect secrecy for (2, n) scheme and requires far fewer operations compared to Shamir's algorithm. The proposed method could be used to share objects such as matrices, sets, plain text and even a heterogeneous collection of these. S...

  15. Shared leadership

    DEFF Research Database (Denmark)

    Ulhøi, John Parm; Müller, Sabine

    2012-01-01

    The aim of this paper is twofold. First, this paper comprehensively will review the conceptual and empirical literature to identify such critical underlying mechanisms which enable shared or collective leadership. Second, this article identifies the antecedents and outcomes of shared leadership...... according to the literature review to develop a re-conceptualised and synthesized framework for managing the organizational issues associated with shared leadership on various organizational levels. The paper rectifies this by identifying the critical factors and mechanisms which enable shared leadership...... and its antecedents and outcomes, and to develop a re-conceptualized and synthesized framework of shared leadership. The paper closes with a brief discussion of avenues for future research and implications for managers....

  16. Identity paradoxes

    Directory of Open Access Journals (Sweden)

    Đurić Jelena

    2010-01-01

    Full Text Available The article considers paradoxical nature of identity that emerges from: 1 the very concept of identity whose abstract generality unites various and even opposite features; 2 the processual nature of reality that is easier to express in the poetical metaphors or abstract principles than in unambiguous conceptual networks; 3 the oppose relationship between being and knowledge, mind and matter, subject and object, self and personality. Entangled in the labyrinth which evade efforts to be conceptually defined, the modern thinking of identity moves towards abandoning the idea of “self” on behalf of the “ego” and towards the misapprehension of identity as being identical. This corresponds to the “time of the lost spirit” stretched between the simultaneous need to find an identity and to give it up.

  17. Medical Identity

    DEFF Research Database (Denmark)

    Musaeus, Peter

    2015-01-01

    Purpose: To examine philosophical stances underpinning medical identity and assess the conceptual relationship between physician, medical practice and culture. Argument: Medical identity is about the ideals and moral positions that physicians take when justifying themselves. Medical identity...... hedonistic versus sentimentalist approaches to medical identity. The sociocultural philosophical analysis of medical identity can shed light on what it means conceptually for a physician to harbor beliefs associated with him/her being taken to be an autonomous professional. It is important because it touches...... on the meaning of being a compassionate, good and skilled physician, making its relevance to person-centered medicine self-evident. Conclusion: Medical identity should be analyzed with reference to literature, philosophy and medical practice in order for the physician to exercise a reflective position...

  18. Identity Management

    Data.gov (United States)

    Social Security Administration — Provides information for identity management services on the creation, modification and eventual deletion of accounts and entitlements based on user relationships on...

  19. Shared Attention.

    Science.gov (United States)

    Shteynberg, Garriy

    2015-09-01

    Shared attention is extremely common. In stadiums, public squares, and private living rooms, people attend to the world with others. Humans do so across all sensory modalities-sharing the sights, sounds, tastes, smells, and textures of everyday life with one another. The potential for attending with others has grown considerably with the emergence of mass media technologies, which allow for the sharing of attention in the absence of physical co-presence. In the last several years, studies have begun to outline the conditions under which attending together is consequential for human memory, motivation, judgment, emotion, and behavior. Here, I advance a psychological theory of shared attention, defining its properties as a mental state and outlining its cognitive, affective, and behavioral consequences. I review empirical findings that are uniquely predicted by shared-attention theory and discuss the possibility of integrating shared-attention, social-facilitation, and social-loafing perspectives. Finally, I reflect on what shared-attention theory implies for living in the digital world.

  20. IMMIGRATION, IDENTITY AND LITERATURE

    Directory of Open Access Journals (Sweden)

    Semran CENGİZ

    2010-12-01

    Full Text Available The leading problems incidental to the globalization are the immigration, the poverty, the adaptation problems of the immigrants, the identity and the cultural conflicts. The globalization actors that are transforming the whole world to a huge market, consider to commercialize the product even to the people at the other end of the world. Therefore they lay emphasis on its local identity and remark its variety as its richness. In this way the limits are easily exceeded and the consumption culture becomes available to be instilled upon even the people at the back of the beyond. However one party always wins; the more some people consume, the more some people make profit. The people who does not have any power to consume anymore, becomes the guest of the ones who get them adopt this habit and desires to receive a share from this profit.The modern world people who are not pleased with this situation, have made every effort to alienate the immigrants from the center but they could not succeed. The situation that gave rise to a conflict between parties, have also led the identity problems to occur. In the present situation, the immigrants are trying to take place in the modern world as people with hybrid identities. The music produced by the children of the immigrants with double identities, attracts attention of the world where the immigrant identity, changing its shell, promises hope as the conciliation area of the new century.

  1. Bridging Identities

    Science.gov (United States)

    Deaux, Kay; Burke, Peter

    2010-01-01

    Sociology and psychology are no strangers in the theoretical world of self and identity. Early works by William James (1890), a psychologist, and George Herbert Mead (1934), a sociologist, are often taken as a starting point by investigators in both fields. In more recent years, with the development of a number of identity theories in both fields,…

  2. Brand Identity.

    Science.gov (United States)

    Lawlor, John

    1998-01-01

    Instead of differentiating themselves by building "brand identities," colleges and universities often focus on competing with price. As a result, fewer and fewer institutions base their identities on value, the combination of quality and price. Methods of building two concepts to influence customers' brand image and brand loyalty are…

  3. Brand Identity.

    Science.gov (United States)

    Lawlor, John

    1998-01-01

    Instead of differentiating themselves by building "brand identities," colleges and universities often focus on competing with price. As a result, fewer and fewer institutions base their identities on value, the combination of quality and price. Methods of building two concepts to influence customers' brand image and brand loyalty are…

  4. Organizational Identity

    DEFF Research Database (Denmark)

    Hatch, Mary Jo; Schultz, Majken

    This text presents the classic works on organizational identity alongside more current thinking on the issues. Ranging from theoretical contributions to empirical studies, the readings in this volume address the key issues of organizational identity, and show how these issues have developed through...

  5. Knowledge Sharing

    DEFF Research Database (Denmark)

    Holdt Christensen, Peter

    The concept of knowledge management has, indeed, become a buzzword that every single organization is expected to practice and live by. Knowledge management is about managing the organization's knowledge for the common good of the organization -but practicing knowledge management is not as simple...... as that. This article focuses on knowledge sharing as the process seeking to reduce the resources spent on reinventing the wheel.The article introduces the concept of time sensitiveness; i.e. that knowledge is either urgently needed, or not that urgently needed. Furthermore, knowledge sharing...... is considered as either a push or pull system. Four strategies for sharing knowledge - help, post-it, manuals and meeting, and advice are introduced. Each strategy requires different channels for sharing knowledge. An empirical analysis in a production facility highlights how the strategies can be practiced....

  6. Identity Assemblages

    DEFF Research Database (Denmark)

    Horn, Line Helverskov

    2017-01-01

    , and theoretical foundation of the dissertation. Philosophically, the research rests on the central ANT concepts of symmetry, associations, and enactment with an inherent value of multiplicity. The philosophical position implies that the study of identity must be understood as the study of practices. This, in turn......Research in identity in general and professional identity specifically has seen an immense increase in recent years (Bauman 2004, Lawler 2014). Due to societal and technological developments, notions of what constitutes ‘the professional’ are subject to change. Thus, this dissertation rests...... on an understanding of professional identity as a moving concept that must be understood through its spatial and temporal contexts (Scanlon 2011). Accepting this position necessitates a reconsideration of the role that formal education plays in the development of professional identity of students. Researchers within...

  7. Electronic identity

    CERN Document Server

    de Andrade, Norberto Nuno Gomes; Argles, David

    2014-01-01

    With the increasing availability of electronic services, security and a reliable means by which identity is verified is essential.Written by Norberto Andrade the first chapter of this book provides an overview of the main legal and regulatory aspects regarding electronic identity in Europe and assesses the importance of electronic identity for administration (public), business (private) and, above all, citizens. It also highlights the role of eID as a key enabler of the economy.In the second chapter Lisha Chen-Wilson, David Argles, Michele Schiano di Zenise and Gary Wills discuss the user-cent

  8. Context-Aware Identity Delegation

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.

    2009-01-01

    In emerging ubiquitous computing, related nomadic users often perform similar tasks and share the same computing infrastructure.This means that security of the shared resources is of prime importance.Frequent delegation of tasks among users must be anticipated as most nomadic environments...... due to its complicated and complex structure. Identity delegation at authentication level provides improved usability, which reduces the risk of circumventing the delegation mechanism; at the same time, however, identity delegation violates the principle of least privileges. We use contextual...

  9. Identity, identity politics, and neoliberalism

    Directory of Open Access Journals (Sweden)

    Wrenn Mary

    2014-01-01

    Full Text Available With the intensification of neoliberalism, it is useful to examine how some individuals might cope with the irrationality of the system. Neoliberalism cloaks the execution of the corporate agenda behind rhetorical manipulation that advocates for limited government. The corollary absence of government involvement on behalf of the citizenry writ large disarms the means of social redress for the individual. Democracy funded and fueled by corporate power thereby disenfranchises the individual, provoking some to search for empowerment through identity politics. The argument set forth suggests that individuals construct, reinforce, or escalate allegiance to identities as a coping mechanism, some of which manifest in violent identity politics.

  10. The challenge of plural identity

    Directory of Open Access Journals (Sweden)

    Jovanović Bojan

    2005-01-01

    Full Text Available The complexity of collective existence is expressed through an awareness of its real identity, which then entails an appropriate attitude towards its own negativity. Within the hierarchically structured identity, different levels of its generality make it possible to consider them as factors of a plural reality. If negativity is raised to consciousness, then its dark side is dismantled. Thus, instead of being a factor of conflict, negativity becomes an element of complementariness and a factor in the construction of a shared identity at a higher level of generality.

  11. DYNAMIC AND VERIFIABLE SECRET SHARING AMONG WEIGHTED PARTICIPANTS

    Institute of Scientific and Technical Information of China (English)

    Yanshuo ZHANG; Zhuojun LIU

    2007-01-01

    A secret sharing scheme permits a secret to be shared among participants in such a way that only qualified subsets of participants can recover the secret. Secret sharing is useful in management of cryptographic keys. Based on identity, we analyze the secret sharing scheme among weighted participants. Then we present a dynamic scheme about secret sharing among weighted participants. At last, we analyze the secret sharing scheme among weighted participants, which can make all weighted participants verifiable and dynamic.

  12. Challenging Identities

    DEFF Research Database (Denmark)

    Identity is a keyword in a number of academic fields as well as in public debate and in politics. During the last decades, references to identity have proliferated, yet there is no simple definition available that corresponds to the use of the notion in all contexts. The significance of the notio...... Christian Lammers, Saxo-Instituttet - Arkæologi, Etnologi, Historie og Græsk og Latin; Gert Sørensen, Institut for Engelsk, Germansk og Romansk ; Anne Ring Petersen, Institut for Kunst- og Kulturvidenskab...

  13. Designer's Identity

    DEFF Research Database (Denmark)

    Kunrath, Kamila; Cash, Philip; Li-Ying, Jason

    2016-01-01

    A designer’s professional identity (DPI) develops through both education and professional experience, building on core personality traits and innate skills. In this paper a systematic literature review and a secondary narrative review were developed in order to map personal attributes and design...

  14. [Identity theft

    CERN Multimedia

    Wolinksy, H

    2003-01-01

    "A new survey by the Federal Trade Commission indicates that over the last five years one in four American households has been hit by identity theft, which can result in thieves tapping their victims' credit cards or bank accounts" (1 page).

  15. Mediating Identity

    DEFF Research Database (Denmark)

    Kjærgaard, Annemette Leonhardt; Morsing, Mette; Ravasi, Davide

    2011-01-01

    This paper reports a longitudinal field study on the effects of positive media coverage on the reconstruction of organizational identity. The study highlights how intense positive coverage – to the point of turning an organization into a ‘celebrity’– influences both the way members understand the...

  16. The Roots of Our Identity.

    Science.gov (United States)

    Cotti, Flavio

    1993-01-01

    Maintains that Switzerland's national spirit lies in cultural and linguistic diversity. Proposes a "Ten Commandments of Multilingualism" for Swiss citizens who share this core principle of national identity. Concludes that Swiss should be happy and proud to have a nation based on cultural diversity. (CFR)

  17. Information sharing promotes prosocial behaviour

    CERN Document Server

    Szolnoki, Attila

    2013-01-01

    More often than not, bad decisions are bad regardless of where and when they are made. Information sharing might thus be utilized to mitigate them. Here we show that sharing the information about strategy choice between players residing on two different networks reinforces the evolution of cooperation. In evolutionary games the strategy reflects the action of each individual that warrants the highest utility in a competitive setting. We therefore assume that identical strategies on the two networks reinforce themselves by lessening their propensity to change. Besides network reciprocity working in favour of cooperation on each individual network, we observe the spontaneous emerge of correlated behaviour between the two networks, which further deters defection. If information is shared not just between individuals but also between groups, the positive effect is even stronger, and this despite the fact that information sharing is implemented without any assumptions with regards to content.

  18. Information sharing promotes prosocial behaviour

    Science.gov (United States)

    Szolnoki, Attila; Perc, Matjaž

    2013-05-01

    More often than not, bad decisions are bad regardless of where and when they are made. Information sharing might thus be utilized to mitigate them. Here we show that sharing information about strategy choice between players residing on two different networks reinforces the evolution of cooperation. In evolutionary games, the strategy reflects the action of each individual that warrants the highest utility in a competitive setting. We therefore assume that identical strategies on the two networks reinforce themselves by lessening their propensity to change. Besides network reciprocity working in favour of cooperation on each individual network, we observe the spontaneous emergence of correlated behaviour between the two networks, which further deters defection. If information is shared not just between individuals but also between groups, the positive effect is even stronger, and this despite the fact that information sharing is implemented without any assumptions with regard to content.

  19. Civil Identity

    DEFF Research Database (Denmark)

    Petersen, Lars Axel

    scanning, etc., to discussions of Shari'a law versus common civil law in India; from the study of religious cult in ancient city states to the processes of constitutional reconstruction in former Communist countries; and from attempts at conflict resolution and prevention between Jewish and Arab citizens......In this paper I will go through a catalogue of examples of contexts in which the term civil identity is currently used, ranging from the formal and technical process of linking a set of administrative and other events to an individual biological person by means of identity cards, fingerprints, iris...... of technology and of law. If such a field can be established, the answers to those questions might be relevant to such contemporary issues as inter-ethnic, religious, and -cultural conflict or reconciliation, migration and nationality, civil rights and surveillance, security and privacy, bureaucracy and inter...

  20. Civil Identity

    DEFF Research Database (Denmark)

    Petersen, Lars Axel

    scanning, etc., to discussions of Shari'a law versus common civil law in India; from the study of religious cult in ancient city states to the processes of constitutional reconstruction in former Communist countries; and from attempts at conflict resolution and prevention between Jewish and Arab citizens...... of Israel to Luce Irigaray's Feminist agenda of elaborating gender specific civil identities. My intention is to investigate whether these different employments of 'civil identity' point towards a common, and fairly well defined object field asking questions of contemporary relevance to the philosophy...... of technology and of law. If such a field can be established, the answers to those questions might be relevant to such contemporary issues as inter-ethnic, religious, and -cultural conflict or reconciliation, migration and nationality, civil rights and surveillance, security and privacy, bureaucracy and inter...

  1. Consumer Identity

    OpenAIRE

    Young, Melissa Marie

    2009-01-01

    The purpose of this thesis is to prove that despite consumers' impression that they are alone in deciding their consumption decision they are wrong. Consumers are manipulated on various levels by marketers. It is the marketer who decides what consumer identities should be created. Consumers are persuaded by marketers on different levels beginning with consumers' needs. Marketers begin by appealing to consumer drives, motivations and emotions to persuade their consumers to purchase their brand...

  2. Trigonometric identities

    Directory of Open Access Journals (Sweden)

    Malvina Baica

    1986-01-01

    Full Text Available In this paper the author obtains new trigonometric identities of the form 2(p−1(p−22∏k=1p−2(1−cos2πkpp−1−k=pp−2 which are derived as a result of relations in a cyclotomic field ℛ(ρ, where ℛ is the field of rationals and ρ is a root of unity.

  3. Gender Identity and Gender Confusion in Children

    Science.gov (United States)

    ... Listen Español Text Size Email Print Share Gender Identity Development in Children Page Content Article Body ​What's the ... children, the match between biological sex and gender identity is not so ... gender development in children. See the related article, Gender Non- ...

  4. Collective Identity Formation in Hybrid Organizations

    DEFF Research Database (Denmark)

    Boulongne, Romain; Boxenbaum, Eva

    organizations. Our findings point to two factors that limit knowledge sharing and hence to new collective identity formation in a hybrid space: 1) ambiguous or multiple organizational roles and 2) strong identities of the collaborating organizations. These findings contribute to illuminating the initial...

  5. Identity transformation

    DEFF Research Database (Denmark)

    Neergaard, Helle; Robinson, Sarah; Jones, Sally

    This paper develops the concept of ‘pedagogical nudging’ and examines four interventions in an entrepreneurship classroom and the potential it has for student identity transformation. Pedagogical nudging is positioned as a tool, which in the hands of a reflective, professional, with an understand......This paper develops the concept of ‘pedagogical nudging’ and examines four interventions in an entrepreneurship classroom and the potential it has for student identity transformation. Pedagogical nudging is positioned as a tool, which in the hands of a reflective, professional......, as well as the resources they have when they come to the classroom. It also incorporates perspectives from (ii) transformational learning and explores the concept of (iii) nudging from a pedagogical viewpoint, proposing it as an important tool in entrepreneurship education. The study incorporates......) assists students in straddling the divide between identities, the emotions and tensions this elicits, and (iv) transform student understanding. We extend nudging theory into a new territory. Pedagogical nudging techniques may be able to unlock doors and bring our students beyond the unacknowledged...

  6. Identity Activities

    Science.gov (United States)

    2016-08-03

    of shared beliefs, values, customs, behaviors, and artifacts that members of a society use to cope with their world and with one another. Culture is...transported to the location by helicopter to exploit any and all useful artifacts or paperwork for future intelligence value or prosecution efforts...field medical hospitals are assembled and operational. All individuals who receive medical attention within the disaster area are immediately

  7. Sharing values, sharing a vision

    Energy Technology Data Exchange (ETDEWEB)

    1993-12-31

    Teamwork, partnership and shared values emerged as recurring themes at the Third Technology Transfer/Communications Conference. The program drew about 100 participants who sat through a packed two days to find ways for their laboratories and facilities to better help American business and the economy. Co-hosts were the Lawrence Livermore National Laboratory and the Lawrence Berkeley Laboratory, where most meetings took place. The conference followed traditions established at the First Technology Transfer/Communications Conference, conceived of and hosted by the Pacific Northwest Laboratory in May 1992 in Richmond, Washington, and the second conference, hosted by the National Renewable Energy Laboratory in January 1993 in Golden, Colorado. As at the other conferences, participants at the third session represented the fields of technology transfer, public affairs and communications. They came from Department of Energy headquarters and DOE offices, laboratories and production facilities. Continued in this report are keynote address; panel discussion; workshops; and presentations in technology transfer.

  8. Shared Memories?

    DEFF Research Database (Denmark)

    Wæhrens, Anne

    2011-01-01

    This paper analyses how the memory of the Holocaust has been addressed in the European Parliament from 1989 to 2009. I identify two major changes that occurred in the 1990s and after the 2004 enlargement of the European Union respectively. In the 1990s the war in Bosnia and the question of restit......This paper analyses how the memory of the Holocaust has been addressed in the European Parliament from 1989 to 2009. I identify two major changes that occurred in the 1990s and after the 2004 enlargement of the European Union respectively. In the 1990s the war in Bosnia and the question...... of restitution universalised the memory of the Holocaust and made it present. The 2004 enlargement brought the memory of Soviet Communism into the Union and made it a central task to construct a community of memory that includes both the memory of the Holocaust and of Soviet Communism. The analysis also...... identifies what seems to be a political memory split between Left and Right; and it shows that the time might not be ripe for a shared European memory....

  9. Meromorphic functions sharing one value by weight

    Institute of Scientific and Technical Information of China (English)

    LAI Li-ping; LI Chun-hong

    2007-01-01

    The uniqueness of meromorphic fuctions sharing one value was studied.Using the concept of weighted sharing,we proved the following theorem.For two meromorphic functions f and g which are not polynominals of degree less than a positive integer k, if.fnf(k) and gng(k) share(1,2),where n is another positive integer not less than k+10,then fnf(k) identically equals gng(k) or fnf(k)gng(k) identically equals 1.Particularly for k=1,we improved the results of Yang[Yang CC,Hua XH,Uniqueness and value-sharing of meromorphic functions,Annales Academi(ae) Scientiarum Fennic(ae) Mathematica,1997,22:395-406],and Fang[Fang ML,Hua XH,Entire function that share one value,Joumal of Nanjing University,1996,13(1):44-48.(In Chinese)].

  10. Identity Style, Parental Authority, and Identity Commitment.

    Science.gov (United States)

    Berzonsky, Michael D.

    2004-01-01

    The role that parental authority patterns and social-cognitive identity styles may play in establishing identity commitments was investigated. The results indicated that family authority and identity style variables combined accounted for 50% of the variation in strength of identity commitment. As hypothesized, the relationship between parental…

  11. Identity Style, Parental Authority, and Identity Commitment.

    Science.gov (United States)

    Berzonsky, Michael D.

    2004-01-01

    The role that parental authority patterns and social-cognitive identity styles may play in establishing identity commitments was investigated. The results indicated that family authority and identity style variables combined accounted for 50% of the variation in strength of identity commitment. As hypothesized, the relationship between parental…

  12. Implementing Explicit and Finding Implicit Sharing in Embedded DSLs

    CERN Document Server

    Kiselyov, Oleg

    2011-01-01

    Aliasing, or sharing, is prominent in many domains, denoting that two differently-named objects are in fact identical: a change in one object (memory cell, circuit terminal, disk block) is instantly reflected in the other. Languages for modelling such domains should let the programmer explicitly define the sharing among objects or expressions. A DSL compiler may find other identical expressions and share them, implicitly. Such common subexpression elimination is crucial to the efficient implementation of DSLs. Sharing is tricky in embedded DSL, since host aliasing may correspond to copying of the underlying objects rather than their sharing. This tutorial summarizes discussions of implementing sharing in Haskell DSLs for automotive embedded systems and hardware description languages. The technique has since been used in a Haskell SAT solver and the DSL for music synthesis. We demonstrate the embedding in pure Haskell of a simple DSL with a language form for explicit sharing. The DSL also has implicit sharing,...

  13. Digital Identity Management Systems

    OpenAIRE

    Kuhar, Marko

    2010-01-01

    The goal of this thesis is a review of existing systems and technologies for managing digital identities. After the selection of the two most promising systems there will be a detailed comparison for a typical environment. In the first part of my thesis, the theory for understanding issues of identity management is introduced. Furthermore, the difference between identity and digital identity is explained and identity management itself is interpreted. An example of identity management solut...

  14. The political reference point: How geography shapes political identity

    Science.gov (United States)

    Feinberg, Matthew; Tullett, Alexa M.; Mensch, Zachary; Hart, William; Gottlieb, Sara

    2017-01-01

    It is commonly assumed that how individuals identify on the political spectrum–whether liberal, conservative, or moderate–has a universal meaning when it comes to policy stances and voting behavior. But, does political identity mean the same thing from place to place? Using data collected from across the U.S. we find that even when people share the same political identity, those in “bluer” locations are more likely to support left-leaning policies and vote for Democratic candidates than those in “redder” locations. Because the meaning of political identity is inconsistent across locations, individuals who share the same political identity sometimes espouse opposing policy stances. Meanwhile, those with opposing identities sometimes endorse identical policy stances. Such findings suggest that researchers, campaigners, and pollsters must use caution when extrapolating policy preferences and voting behavior from political identity, and that animosity toward the other end of the political spectrum is sometimes misplaced. PMID:28207906

  15. Anonymity versus privacy: selective information sharing in online cancer communities.

    Science.gov (United States)

    Frost, Jeana; Vermeulen, Ivar E; Beekers, Nienke

    2014-05-14

    Active sharing in online cancer communities benefits patients. However, many patients refrain from sharing health information online due to privacy concerns. Existing research on privacy emphasizes data security and confidentiality, largely focusing on electronic medical records. Patient preferences around information sharing in online communities remain poorly understood. Consistent with the privacy calculus perspective adopted from e-commerce research, we suggest that patients approach online information sharing instrumentally, weighing privacy costs against participation benefits when deciding whether to share certain information. Consequently, we argue that patients prefer sharing clinical information over daily life and identity information that potentially compromises anonymity. Furthermore, we explore whether patients' prior experiences, age, health, and gender affect perceived privacy costs and thus willingness to share information. The goal of the present study is to document patient preferences for sharing information within online health platforms. A total of 115 cancer patients reported sharing intentions for 15 different types of information, demographics, health status, prior privacy experiences, expected community utility, and privacy concerns. Factor analysis on the 15 information types revealed 3 factors coinciding with 3 proposed information categories: clinical, daily life, and identity information. A within-subject ANOVA showed a strong preference for sharing clinical information compared to daily life and identity information (F1,114=135.59, P=.001, η(2)=.93). Also, adverse online privacy experiences, age, and health status negatively affected information-sharing intentions. Female patients shared information less willingly. Respondents' information-sharing intentions depend on dispositional and situational factors. Patients share medical details more willingly than daily life or identity information. The results suggest the need to focus on

  16. Anonymity Versus Privacy: Selective Information Sharing in Online Cancer Communities

    Science.gov (United States)

    Vermeulen, Ivar E; Beekers, Nienke

    2014-01-01

    Background Active sharing in online cancer communities benefits patients. However, many patients refrain from sharing health information online due to privacy concerns. Existing research on privacy emphasizes data security and confidentiality, largely focusing on electronic medical records. Patient preferences around information sharing in online communities remain poorly understood. Consistent with the privacy calculus perspective adopted from e-commerce research, we suggest that patients approach online information sharing instrumentally, weighing privacy costs against participation benefits when deciding whether to share certain information. Consequently, we argue that patients prefer sharing clinical information over daily life and identity information that potentially compromises anonymity. Furthermore, we explore whether patients’ prior experiences, age, health, and gender affect perceived privacy costs and thus willingness to share information. Objective The goal of the present study is to document patient preferences for sharing information within online health platforms. Methods A total of 115 cancer patients reported sharing intentions for 15 different types of information, demographics, health status, prior privacy experiences, expected community utility, and privacy concerns. Results Factor analysis on the 15 information types revealed 3 factors coinciding with 3 proposed information categories: clinical, daily life, and identity information. A within-subject ANOVA showed a strong preference for sharing clinical information compared to daily life and identity information (F 1,114=135.59, P=.001, η2=.93). Also, adverse online privacy experiences, age, and health status negatively affected information-sharing intentions. Female patients shared information less willingly. Conclusions Respondents’ information-sharing intentions depend on dispositional and situational factors. Patients share medical details more willingly than daily life or identity

  17. Politicized collective identity. A social psychological analysis.

    Science.gov (United States)

    Simon, B; Klandermans, B

    2001-04-01

    This article develops a social psychological model of politicized collective identity that revolves around 3 conceptual triads. The 1st triad consists of collective identity, the struggle between groups for power, and the wider societal context. It is proposed that people evince politicized collective identity to the extent that they engage as self-conscious group members in a power struggle on behalf of their group knowing that it is the more inclusive societal context in which this struggle has to be fought out. Next, 3 antecedent stages leading to politicized collective identity are distinguished: awareness of shared grievances, adversarial attributions, and involvement of society at large. This sequence culminates in the final triad because the intergroup power struggle is eventually triangulated by involving society at large or representatives thereof. Consequences of politicized collective identity are discussed.

  18. Shaping student identity and creating entrepreneurs:

    DEFF Research Database (Denmark)

    Robinson, Sarah; Shumar, Wesley; Neergaard, Helle

    by doing.” As students engage with hands-on learning experiences they build, not only different ways of seeing problems and understanding opportunity but, new identities as well. According to Bruner (1996), all learning is a process of intersubjective meaning making. It is social, communicative and shared...... come to think of themselves and their own identity, in new ways. Thus, a central part of intersubjective meaning making involves identity transformation as we move from seeing ourselves as novices to practitioners to (perhaps) experts. This paper suggests that identity work is a critical part...... of the “learning by doing” model of entrepreneurship education. Drawing on ethnographic data from an ongoing 4 year project with Masters’ students, the paper asks the following questions: What is the evidence that an entrepreneurial identity is beginning to take shape in the students? Are these students beginning...

  19. Competition and Social Identity in the Workplace

    DEFF Research Database (Denmark)

    Kato, Takao; Shu, Pian

    2016-01-01

    We study the impact of social identity on worker competition by exploiting the well-documented social divide between urban resident workers and rural migrant workers in urban Chinese firms. We analyze data on weekly output, individual characteristics, and coworker composition for all weavers...... in an urban Chinese textile firm during a 53-week period. The firm adopts relative performance incentives in addition to piece rates to encourage competition in the workplace. We find that social identity has a significant impact on competition: a weaver only competes against coworkers with a different social...... identity, but not against those sharing her own identity. The results are mainly driven by urban weavers competing aggressively against rural coworkers. Our results highlight the important role of social identity in mitigating or enhancing competition....

  20. Our Shared Future: Social Media, Leadership, Vulnerability, and Digital Identity

    Science.gov (United States)

    Stoller, Eric

    2013-01-01

    Social media have challenged us in our journey to support our students. Administrators have entered into new web-based conversations with one another and with their students. Personal branding has created a sense of performativity that conflicts with a growing trend towards online vulnerability. Our leaders have increasingly been engaged in…

  1. Our Shared Future: Social Media, Leadership, Vulnerability, and Digital Identity

    Science.gov (United States)

    Stoller, Eric

    2013-01-01

    Social media have challenged us in our journey to support our students. Administrators have entered into new web-based conversations with one another and with their students. Personal branding has created a sense of performativity that conflicts with a growing trend towards online vulnerability. Our leaders have increasingly been engaged in…

  2. Personal Identity in Italy

    Science.gov (United States)

    Crocetti, Elisabetta; Rabaglietti, Emanuela; Sica, Luigia Simona

    2012-01-01

    This chapter discusses specifics of identity formation in Italian adolescents and emerging adults. We review consistent evidence illustrating that, in Italy, a progressive deferral of transition to adulthood strongly impacts youth identity development by stimulating identity exploration and postponement of identity commitments. We also consider…

  3. Personal Identity in Italy

    Science.gov (United States)

    Crocetti, Elisabetta; Rabaglietti, Emanuela; Sica, Luigia Simona

    2012-01-01

    This chapter discusses specifics of identity formation in Italian adolescents and emerging adults. We review consistent evidence illustrating that, in Italy, a progressive deferral of transition to adulthood strongly impacts youth identity development by stimulating identity exploration and postponement of identity commitments. We also consider…

  4. Clan and Islamic Identities in Somali Society

    Science.gov (United States)

    2011-11-01

    practice of pastoral democracy, is a fundamental part of the Somalis’ shared cultural heritage. Somali clan identity is deeply rooted and emotional ...over to practical life, as he is credited with bringing the Arabian sheep to Somalia and inventing a Somali notation for Arabic vowels that eased the

  5. Share your Sweets

    DEFF Research Database (Denmark)

    Byrnit, Jill; Høgh-Olesen, Henrik; Makransky, Guido

    2015-01-01

    as sharing in which group members were allowed to co-feed or remove food from the stock of the food possessor, and the introduction of high-value food resulted in more sharing, not less. Food sharing behavior differed between species in that chimpanzees displayed significantly more begging behavior than......All over the world, humans (Homo sapiens) display resource-sharing behavior, and common patterns of sharing seem to exist across cultures. Humans are not the only primates to share, and observations from the wild have long documented food sharing behavior in our closest phylogenetic relatives......, chimpanzees (Pan troglodytes) and bonobos (Pan paniscus). However, few controlled studies have been made where groups of Pan are introduced to food items that may be shared or monopolized by a first food possessor, and very few studies have examined what happens to these sharing patterns if the food...

  6. Identity and identity conflict in the workplace

    NARCIS (Netherlands)

    K.E. Horton (Kate); P.S. Bayerl (Saskia); G. Belschak-Jacobs (Gabriele)

    2014-01-01

    textabstractAs individuals, we define ourselves according to various characteristics that include our values and beliefs. This gives us our identity. As organisations become increasingly complex, understanding the concept of identity conflict may mean the difference between success and failure.

  7. Identities as organizational practices

    DEFF Research Database (Denmark)

    Oshima, Sae; Asmuß, Birte

    Identity has been widely acknowledged as playing a central role in various organizational processes, yet there is still a need to better understand the dynamics and functions of identity work in modern organizations. The present paper is centered within this concern, and examines identity as inte......) reveal the intersubjective, multimodal and embodied nature of identity work; 2) demonstrate identity work as organizational practices, used in order to accomplish specific actions; and 3) pose a question on the view on identity as a layered/leveled phenomenon.......Identity has been widely acknowledged as playing a central role in various organizational processes, yet there is still a need to better understand the dynamics and functions of identity work in modern organizations. The present paper is centered within this concern, and examines identity...

  8. A Comparative Analysis on Arab and European Identity Structures: Portraying Distinctive Transnational Identity Patterns

    OpenAIRE

    Joelle Chamieh

    2015-01-01

    Eighteen Arab countries speaking the same language (Arabic) and sharing the same cultural background, yet so far, a superficial coordination exists among them. Whereas, comparatively, European community members, who have less in common (in terms of multilingual and multicultural societies), have succeeded in forming a certain unified transnational identity structure. In order to understand this perplexity which indicates an apparent incoherence vis-à-vis both identity formations – in terms of...

  9. Urban sharing culture

    DEFF Research Database (Denmark)

    Fjalland, Emmy Laura Perez

    In urban areas sharing cultures, services and economies are rising. People share, rent and recycle their homes, cars, bikes, rides, tools, cloths, working space, knowhow and so on. The sharing culture can be understood as mobilities (Kesselring and Vogl 2013) of goods, values and ideas reshaping...... our cities. The sharing economy has the power to democratise access the urban space, resources and raw materials (Steen Nielsen 2008; Harvey 2000); it holds the ability to change the current dominant understandings and structures of economy and growth (Steen Nielsen 2008); solve emerging environmental...... and trust. (Thomsen 2013; Bauman 2000; Beck 1992; Giddens 1991). The sharing economy is currently hyper trendy but before claiming capitalism as dead we need to understand the basics of the sharing economies and cultures asking who can share and what will we share. Furthermore it is crucial to study what...

  10. Dynamics of Perceived Parenting and Identity Formation in Late Adolescence

    Science.gov (United States)

    Beyers, Wim; Goossens, Luc

    2008-01-01

    Identity formation is a dynamic process of person-context interactions, and part of this context are parents, even in late adolescence. Several theories on parent-adolescent relationships share the idea that parents influence the process of identity formation. However, up to now, empirical evidence, particularly longitudinal evidence for this link…

  11. Satisfaction and 'comparison sharing'

    DEFF Research Database (Denmark)

    Amilon, Anna

    2009-01-01

    the probability of satisfaction. Results show that comparison sharing impacts satisfaction for women, and that those women who share more equally than their peers are more likely to be satisfied, whereas comparison sharing has no influence on satisfaction for men. Also, parents are less likely to be satisfied...

  12. Nationality Divides and Shared Leadership in Multinational Teams

    DEFF Research Database (Denmark)

    Paunova, Minna

    2015-01-01

    nationality-based characteristics of members may divide teams and affect leadership. We argue that the national belonging of members may result in both identity subgroups and status ranks. However, the configurational properties of identity subgroups and status ranks will have distinct effects on team......How shared leadership is enacted in teams that are nationally diverse is currently under- researched, despite the increasing presence of multinational teams in the workplace. To better understand the phenomenon of shared leadership in multinational team contexts, we propose two ways in which...... dynamics, shared leadership within the team, and team performance. We conduct two empirical studies, and find that the number and balance of identity subgroups have important implications for multinational team functioning, in line with social identity approaches. Interestingly, the number and balance...

  13. Negotiating work identity

    Directory of Open Access Journals (Sweden)

    Tamsen Saayman

    2011-03-01

    Full Text Available Orientation: The study explored the dynamics of work identity negotiation and construction.Research purpose: The aim of the study was to investigate identity tensions and demands that mobilise identity work in the work environment.Motivation for the study: The study hoped to improve the understanding of the dynamics of identity construction and negotiation.Research design, approach and method: Using grounded theory methodology in the context of qualitative field research, the researchers conducted two unstructured interviews with 28 employees of a South African manufacturing company.Main findings: The five primary dimensions the data yielded were personal identity, individual agency, social identity, social practice and job.Practical/managerial implications: This study has implications for organisations that want to improve productivity through understanding work identity.Contribution/value-add: The article presents a conceptual model of the demands and tensions that influence work identity.

  14. Researching Identity and Interculturality

    DEFF Research Database (Denmark)

    Lønsmann, Dorte

    2016-01-01

    Review of: Researching Identity and Interculturality / by F. Dervin and K. Risager (eds.). Routledge 2015, 245 pp.......Review of: Researching Identity and Interculturality / by F. Dervin and K. Risager (eds.). Routledge 2015, 245 pp....

  15. Diversity of deaf identities.

    Science.gov (United States)

    Bat-Chava, Y

    2000-12-01

    Social Identity Theory (Tajfel, 1981) posits that members of minority groups achieve positive social identity by (a) attempting to gain access to the mainstream through individual mobility or (b) working with other group members to bring about social change. Some people may use a combination of both strategies. Through the use of cluster analysis, the existence of three identities associated with these strategies was discerned in a sample of 267 deaf adults: culturally hearing identity, culturally deaf identity, and bicultural identity, each comprising about a third of the sample. A subset of 56 people were interviewed in depth; excerpts are presented to illustrate the identity types. Qualified support was found for the prediction that people with culturally deaf and bicultural identities would have higher self-esteem.

  16. Professional entrepreneurial identity construction

    DEFF Research Database (Denmark)

    Ramsgaard, Michael Breum

    2014-01-01

    The present study investigates the construction of a professional identity as an entrepreneur in a sample of people with educational background in nutrition and health. The study examines the connection between professional identity construction and entrepreneurial business emergence using...

  17. National Identity within the National Museum: Subjectification within Socialization

    Science.gov (United States)

    Weiser, M. Elizabeth

    2015-01-01

    Rhetorician Kenneth Burke's theory of identification usefully demonstrates how (and where) communities are able to engage with difficult, opposing viewpoints as they develop or maintain a sense of shared identity. Identification, "establishing a shared sense of values, attitudes, and interests with [an audience]," is promoted…

  18. Language, Power and Identity

    Science.gov (United States)

    Wodak, Ruth

    2012-01-01

    How are identities constructed in discourse? How are national and European identities tied to language and communication? And what role does power have--power in discourse, over discourse and of discourse? This paper seeks to identify and analyse processes of identity construction within Europe and at its boundaries, particularly the diversity of…

  19. Experiencing with Identity

    DEFF Research Database (Denmark)

    Pors, Justine Grønbæk

    2012-01-01

    This article studies how a political organization begins to experiment with its identity. By use of an empirical case of the Danish Ministry of Education, I examine how a political organization supplements its identity of a legislating power with identities of a supervisor, beacon and facilitator...

  20. Identity Security Awareness

    OpenAIRE

    Philipsen, Nayna C.

    2004-01-01

    Identity theft is an increasing concern when organizations, businesses, and even childbirth educators ask for a client's Social Security number for identification purposes. In this column, the author suggests ways to protect one's identity and, more importantly, decrease the opportunities for identity theft.

  1. Teachers' Interpersonal Role Identity

    Science.gov (United States)

    van der Want, Anna C.; den Brok, Perry; Beijaard, Douwe; Brekelmans, Mieke; Claessens, Luce C. A.; Pennings, Helena J. M.

    2015-01-01

    This article investigates the link between teachers' appraisal of specific interpersonal situations in classrooms and their more general interpersonal identity standard, which together form their interpersonal role identity. Using semi-structured and video-stimulated interviews, data on teachers' appraisals and interpersonal identity standards…

  2. Mobile Identity Management

    NARCIS (Netherlands)

    Hoepman, J.J.

    2011-01-01

    Identity management consists of the processes and all underlying technologies for the creation, management, and usage of digital identities. Business rely on identity management systems to simplify the management of access rights to their systems and services for both their employees and their custo

  3. Identity vicissitudes in work organizations

    Directory of Open Access Journals (Sweden)

    Giovanni Di Stefano

    2014-09-01

    Full Text Available Today’s pressing scientific and technological changes, while having an impact on the organizational life of our post-industrial world, are producing drastic transformations within organizations, creating in workers new feelings of anxiety and uncertainty. The features of the present state of crises - instability, uncertainty, weakening of family bonds – define a peculiar social and psychological uneasiness, proper of our time, as a consequence of the technological business culture prevailing today, which is destabilizing the institutional role of organizations, namely fixing the various forms of personal identity. This contribution offers, also by presenting a training experience in a business setting, a critical psycho-socio-analysis of the roles that individuals and organizations must presently face to foster development and, at the same time, provides directions to avoid the perverse drift of today’s culture and promote the identity process through the reactivation of the learning/changing capacity aimed at the definition of new shared meanings.Keywords: identity, organization, psycho-socio-analysis

  4. Social Identity and Preferences*

    Science.gov (United States)

    Benjamin, Daniel J.; Choi, James J.; Strickland, A. Joshua

    2009-01-01

    Social identities prescribe behaviors for people. We identify the marginal behavioral effect of these norms on discount rates and risk aversion by measuring how laboratory subjects’ choices change when an aspect of social identity is made salient. When we make ethnic identity salient to Asian-American subjects, they make more patient choices. When we make racial identity salient to black subjects, non-immigrant blacks (but not immigrant blacks) make more patient choices. Making gender identity salient has no effect on intertemporal or risk choices. PMID:20871741

  5. Identity and Professional Networking.

    Science.gov (United States)

    Raj, Medha; Fast, Nathanael J; Fisher, Oliver

    2017-06-01

    Despite evidence that large professional networks afford a host of financial and professional benefits, people vary in how motivated they are to build such networks. To help explain this variance, the present article moves beyond a rational self-interest account to examine the possibility that identity shapes individuals' intentions to network. Study 1 established a positive association between viewing professional networking as identity-congruent and the tendency to prioritize strengthening and expanding one's professional network. Study 2 revealed that manipulating the salience of the self affects networking intentions, but only among those high in networking identity-congruence. Study 3 further established causality by experimentally manipulating identity-congruence to increase networking intentions. Study 4 examined whether identity or self-interest is a better predictor of networking intentions, providing support for the former. These findings indicate that identity influences the networks people develop. Implications for research on the self, identity-based motivation, and professional networking are discussed.

  6. The Supermalt identity

    DEFF Research Database (Denmark)

    Bech-Larsen, Tino; Esbjerg, Lars; Grunert, Klaus G.

    2007-01-01

    -Caribbean informants. The food and beverage consumption of informants reflects their mixed cultural identity. The brand identity Supermalt appears to be malleable, with ample room for consumer co-construction. Perceptions of brand identity differ markedly among informants, who are all able to construct Supermalt...... on consumers' self-identities. The second part explored the role of food and beverage products in the construction of self-identities. The final part focused on the construction of brand identity for Supermalt. Findings - The article provides information on the self-identities constructed by Afro...... aiming to develop strong brands with a limited marketing budget. Based on the Supermalt case, suggestions are made regarding branding in relation to ethnic minorities. Originality/value - This article provides a study of a brand that has become strong within a narrowly defined group of consumers....

  7. Secure Data Sharing In an Untrusted Cloud

    Directory of Open Access Journals (Sweden)

    Rekha Chandankere

    2015-08-01

    Full Text Available Cloud computing is a huge area which basically provides many services on the basis of pay as you go. One of the fundamental services provided by cloud is data storage. Cloud provides cost efficiency and an efficient solution for sharing resource among cloud users. A secure and efficient data sharing scheme for groups in cloud is not an easy task. On one hand customers are not ready to share their identity but on other hand want to enjoy the cost efficiency provided by the cloud. It needs to provide identity privacy, multiple owner and dynamic data sharing without getting effected by the number of cloud users revoked. In this paper, any member of a group can completely enjoy the data storing and sharing services by the cloud. A secure data sharing scheme for dynamic cloud users is proposed in this paper. For which it uses group signature and dynamic broadcast encryption techniques such that any user in a group can share the information in a secured manner. Additionally the permission option is proposed for the security reasons. This means the file access permissions are generated by the admin and given to the user using Role Based Access Control (RBA algorithm. The file access permissions are read, write and delete. In this, owner can provide files with options and accepts the users using that option. The revocation of cloud user is a function generated by the Admin for security purpose. The encryption computational cost and storage overhead is not dependent on the number of users revoked. We analyze the security by proofs and produce the cloud efficiency report using cloudsim.

  8. The Sharing Economy

    DEFF Research Database (Denmark)

    Avital, Michel; Carroll, John M.; Hjalmarsson, Anders

    2015-01-01

    The sharing economy is spreading rapidly worldwide in a number of industries and markets. The disruptive nature of this phenomenon has drawn mixed responses ranging from active conflict to adoption and assimilation. Yet, in spite of the growing attention to the sharing economy, we still do not know...... much about it. With the abundant enthusiasm about the benefits that the sharing economy can unleash and the weekly reminders about its dark side, further examination is required to determine the potential of the sharing economy while mitigating its undesirable side effects. The panel will join...... the ongoing debate about the sharing economy and contribute to the discourse with insights about how digital technologies are critical in shaping this turbulent ecosystem. Furthermore, we will define an agenda for future research on the sharing economy as it becomes part of the mainstream society as well...

  9. Factors Impacting Knowledge Sharing

    DEFF Research Database (Denmark)

    Schulzmann, David; Slepniov, Dmitrij

    The purpose of this paper is to examine various factors affecting knowledge sharing at the R&D center of a Western MNE in China. The paper employs qualitative methodology and is based on the action research and case study research techniques. The findings of the paper advance our understanding...... about factors that affect knowledge sharing. The main emphasis is given to the discussion on how to improve knowledge sharing in global R&D organizations....

  10. Facilitating Knowledge Sharing

    DEFF Research Database (Denmark)

    Holdt Christensen, Peter

    Abstract This paper argues that knowledge sharing can be conceptualized as different situations of exchange in which individuals relate to each other in different ways, involving different rules, norms and traditions of reciprocity regulating the exchange. The main challenge for facilitating...... and the intermediaries regulating the exchange, and facilitating knowledge sharing should therefore be viewed as a continuum of practices under the influence of opportunistic behaviour, obedience or organizational citizenship behaviour. Keywords: Knowledge sharing, motivation, organizational settings, situations...

  11. Facilitating Knowledge Sharing

    OpenAIRE

    Holdt Christensen, Peter

    2005-01-01

    Abstract This paper argues that knowledge sharing can be conceptualized as different situations of exchange in which individuals relate to each other in different ways, involving different rules, norms and traditions of reciprocity regulating the exchange. The main challenge for facilitating knowledge sharing is to ensure that the exchange is seen as equitable for the parties involved, and by viewing the problems of knowledge sharing as motivational problems situated in different organization...

  12. A Data Sharing Story

    Directory of Open Access Journals (Sweden)

    Mercè Crosas

    2012-01-01

    Full Text Available From the early days of modern science through this century of Big Data, data sharing has enabled some of the greatest advances in science. In the digital age, technology can facilitate more effective and efficient data sharing and preservation practices, and provide incentives for making data easily accessible among researchers. At the Institute for Quantitative Social Science at Harvard University, we have developed an open-source software to share, cite, preserve, discover and analyze data, named the Dataverse Network. We share here the project’s motivation, its growth and successes, and likely evolution.

  13. Phenomenology of experiential sharing

    DEFF Research Database (Denmark)

    León, Felipe; Zahavi, Dan

    2016-01-01

    The chapter explores the topic of experiential sharing by drawing on the early contributions of the phenomenologists Alfred Schutz and Gerda Walther. It is argued that both Schutz and Walther support, from complementary perspectives, an approach to experiential sharing that has tended...... to be overlooked in current debates. This approach highlights specific experiential interrelations taking place among individuals who are jointly engaged and located in a common environment, and situates this type of sharing within a broader and richer spectrum of sharing phe- nomena. Whereas Schutz’ route...

  14. Phenomenology of experiential sharing

    DEFF Research Database (Denmark)

    León, Felipe; Zahavi, Dan

    2016-01-01

    The chapter explores the topic of experiential sharing by drawing on the early contributions of the phenomenologists Alfred Schutz and Gerda Walther. It is argued that both Schutz and Walther support, from complementary perspectives, an approach to experiential sharing that has tended to be overl......The chapter explores the topic of experiential sharing by drawing on the early contributions of the phenomenologists Alfred Schutz and Gerda Walther. It is argued that both Schutz and Walther support, from complementary perspectives, an approach to experiential sharing that has tended...

  15. Commons of Identity: Sherpa Identity Management

    Directory of Open Access Journals (Sweden)

    Leif Rune Loland

    2006-12-01

    Full Text Available The recent history of Sherpas demonstrates how identities can be scarce goods. While ‘Sherpa’ refers to an ethnic identity, ‘Sherpa’ refers to a crucial occupation in the trekking industry.i Their privileged position in Nepal’s international tourist industry is related to their common reputation. Their collective use of identity seems to help them getting access to an economic niche, and work in tourism seems to be an aspect of being Sherpa. Thus, an individual that operates in the tourist market does not only manage material assets but also identity assets to maintain the Sherpa reputation. Consequently, one can expect it to be a collective concern to husband their image, ie to control each member’s behaviour which could affect the Sherpa image. This article on Sherpa identity in encounters with outsiders analyses Sherpaness as a manageable resource that constitutes a collectively sanctioned commons. My point of departure is Barth’s analysis of ethnic boundary dynamics (1969, 1994 combined with Bourdieu’s concept of ‘capital’ and Hardin’s perspective on commons.DOI: 10.3126/dsaj.v1i0.288Dhaulagiri Vol.1 (2005 pp.176-192

  16. Genetics and identity.

    Science.gov (United States)

    Nordgren, Anders

    2008-01-01

    For the last 20 years the concepts of identity and identification have been subject to much interest in the humanities and social sciences. However, the implications of genetics for identity and identification have been largely neglected. In this paper, I distinguish various conceptions of identity (as continuity over time, as basic kind of being, as unique set of properties, and as social role) and identification (as subjective experience of identity in various senses and as social ascription of identity in various senses), and investigate systematically genetic perspectives on each of these conceptions. I stress the importance of taking the genetic perspectives seriously but also their limitations. In particular, I pinpoint conceptual problems that arise when a genetic approach to identity is adopted.

  17. Identity and total institution

    Directory of Open Access Journals (Sweden)

    Ljubičić Milana

    2015-01-01

    Full Text Available This paper analyses a psychiatric institution resident’s identity (self- construction processes. Our quest was grounded on constructivist theoretical paradigm that sees identity as a manner a person defines oneself in accordance with offered social repertoire. In other words, the total institution milieu offers limited range of identities to its residents. On the other hand, the latter are not just passive subjects that identity is imposed upon. They are able to use a number of adjustment mechanisms to the knowledge about themselves - ranging from symbolic escape to open resistance against the imposed image about them; to obedience, and we were interested to understand the (supposed complex dynamic of identity (re-building in, so-called, special or forensic patients. In order to understand this process and attempting to discover, besides the manifest also the latent layer of the story about self, the local, or personal, identity understanding was examined.

  18. Exploring medical identity theft.

    Science.gov (United States)

    Mancilla, Desla; Moczygemba, Jackie

    2009-09-16

    The crime of medical identity theft is a growing concern in healthcare institutions. A mixed-method study design including a two-stage electronic survey, telephone survey follow-up, and on-site observations was used to evaluate current practices in admitting and registration departments to reduce the occurrence of medical identity theft. Survey participants were chief compliance officers in acute healthcare organizations and members of the Health Care Compliance Association. Study results indicate variance in whether or how patient identity is confirmed in healthcare settings. The findings of this study suggest that information systems need to be designed for more efficient identity management. Admitting and registration staff must be trained, and compliance with medical identity theft policies and procedures must be monitored. Finally, biometric identity management solutions should be considered for stronger patient identification verification.

  19. Regional Commonalities and Regional Identities: Forging a Normative Understanding of Southeast Asian Identity

    Directory of Open Access Journals (Sweden)

    Gürol Baba

    2016-01-01

    Full Text Available In the last two decades, most of the IR academia’s attention on Southeast Asian regionalism utilised constructivism and/or realism and has focused on ASEAN and its derivatives. This article aims to skew this angle by elaborating a possible relationship between Asian values and a normative understanding of Southeast Asian identity. The major reason for this article’s focus on a normative interpretation is that a practical application of Southeast Asian identity is not very achievable due to various ethnic, cultural, political, territorial, and historical diversities. While the region is diverse, there are also a number of commonalities among its states. Asian values, from a Confucian perspective, account for some of these commonalities. By using constructivists’ claims on both the links between norms and identity and the dynamic interaction between values and norms, this article argues that Asian values could contribute to the development of Amitav Acharya’s widely cited normative/ideational format of Southeast Asian identity. The article takes ASEAN identity as a case study and aims to show why a normative identity is more achievable than a practical identity among Southeast Asians, and how Asian values might contribute to the creation of this shared identity.

  20. A Comparative Analysis on Arab and European Identity Structures: Portraying Distinctive Transnational Identity Patterns

    Directory of Open Access Journals (Sweden)

    Joelle Chamieh

    2015-11-01

    Full Text Available Eighteen Arab countries speaking the same language (Arabic and sharing the same cultural background, yet so far, a superficial coordination exists among them. Whereas, comparatively, European community members, who have less in common (in terms of multilingual and multicultural societies, have succeeded in forming a certain unified transnational identity structure. In order to understand this perplexity which indicates an apparent incoherence vis-à-vis both identity formations – in terms of unification models – this article proposes to dig deeply within the transnational European identity formation so as to disclose the mechanisms of its unifying functions by excavating tangibly rationalized theoretical analyses and apply them on Arab identity formations. Accordingly, a comparison is performed based on a set of theoretical analysis, where Arab and European identity formations are comparatively examined for cause of identifying plausible unifying patterns that may be adhered within the construct of a common Arab identity structure. Our original analysis framework is based on several theoretical approaches leading to the identification of identity-significant independent variables that will enable us to measure the similarities and the differences between the two above mentioned identity models.

  1. Athletic identity foreclosure.

    Science.gov (United States)

    Brewer, Britton W; Petitpas, Albert J

    2017-08-01

    Athletic identity foreclosure refers to commitment to the athlete role in the absence of exploration of occupational or ideological alternatives. This article traces the theoretical underpinnings of the construct, examines the role of sport participation in identity development, and provides an overview of the course, correlates, and consequences of athletic identity foreclosure. Implications for future research are discussed. Copyright © 2017 Elsevier Ltd. All rights reserved.

  2. The Sharing Economy

    DEFF Research Database (Denmark)

    Avital, Michel; Carroll, John M.; Hjalmarsson, Anders;

    2015-01-01

    The sharing economy is spreading rapidly worldwide in a number of industries and markets. The disruptive nature of this phenomenon has drawn mixed responses ranging from active conflict to adoption and assimilation. Yet, in spite of the growing attention to the sharing economy, we still do not kn...

  3. Limitations to sharing entanglement

    CERN Document Server

    Kim, Jeong San; Sanders, Barry C

    2011-01-01

    We discuss limitations to sharing entanglement known as monogamy of entanglement. Our pedagogical approach commences with simple examples of limited entanglement sharing for pure three-qubit states and progresses to the more general case of mixed-state monogamy relations with multiple qudits.

  4. 5G Spectrum Sharing

    OpenAIRE

    Nekovee, Maziar; Rudd, Richard

    2017-01-01

    In this paper an overview is given of the current status of 5G industry standards, spectrum allocation and use cases, followed by initial investigations of new opportunities for spectrum sharing in 5G using cognitive radio techniques, considering both licensed and unlicensed scenarios. A particular attention is given to sharing millimeter-wave frequencies, which are of prominent importance for 5G.

  5. Shared Parenting Dysfunction.

    Science.gov (United States)

    Turkat, Ira Daniel

    2002-01-01

    Joint custody of children is the most prevalent court ordered arrangement for families of divorce. A growing body of literature indicates that many parents engage in behaviors that are incompatible with shared parenting. This article provides specific criteria for a definition of the Shared Parenting Dysfunction. Clinical aspects of the phenomenon…

  6. Preventing Identity Theft

    OpenAIRE

    Jensen, Christine

    2004-01-01

    Identity theft is becoming more common and is a very serious crime. Victims of identity theft can spend months or years and a lot of hard earned money cleaning up the mess thieves have made of their good name and credit record. Identity thieves can use your personal information to take over your credit accounts and open new ones. They may even use your good credit to get a job, take out a car loan, or rent an apartment. Identity theft victims may lose job opportunities, be refused loans for e...

  7. Personal Identity in Enhancement

    Directory of Open Access Journals (Sweden)

    Jana Podroužková

    2015-09-01

    Full Text Available The aim of this paper is to introduce the concept of human enhancement, its methods and its relation to personal identity. Also several approaches to personal identity will be described. Transhumanism is a special think tank supporting human enhancement through modern technologies and some of its representatives claim, that even great changes to human organisms will not affect their personal identity. I will briefly describe the most important means of human enhancment and consider the problem of personal identity for each of them separately.

  8. Identity/Time

    Directory of Open Access Journals (Sweden)

    Nancy J. Knauer

    2013-09-01

    Full Text Available This paper engages the unspoken fourth dimension of intersectionality—time. Using the construction of lesbian, gay, bisexual, and transgender (LGBT identities as an example, it establishes that identity, as it is lived and experienced, is not only multivalent, but also historically contingent. It then raises a number of points regarding the temporal locality of identity—the influence of time on issues of identity and understanding, its implications for legal interventions, social movement building, and paradigms of progressive change. As the title suggests, the paper asks us to consider the frame of identity over time.

  9. Exploring the Sharing Economy

    DEFF Research Database (Denmark)

    Netter, Sarah

    tensions experience by sharing platforms by looking at the case of mobile fashion reselling and swapping markets. The final paper combines the perspectives of different sharing economy stakeholders and outlines some of the micro and macro tensions arising in and influencing the organization of these multi...... and to provide a more nuanced understanding of the micro- and macro-level tensions that characterize the sharing economy. This thesis consists of four research papers, each using different literature, methodology, and data sets. The first paper investigates how the sharing economy is diffused and is ‘talked...... into existence’ by the communicative acts of a number of different actors. The second paper looks at how the reality of these narratives is actually experienced by the representatives of one type of sharing platform, i.e., fashion libraries. The third paper further expands the understanding of micro-level...

  10. Exploring the Sharing Economy

    DEFF Research Database (Denmark)

    Netter, Sarah

    Despite the growing interest on the part of proponents and opponents - ranging from business, civil society, media, to policy-makers alike - there is still limited knowledge about the working mechanisms of the sharing economy. The thesis is dedicated to explore this understudied phenomenon...... and to provide a more nuanced understanding of the micro- and macro-level tensions that characterize the sharing economy. This thesis consists of four research papers, each using different literature, methodology, and data sets. The first paper investigates how the sharing economy is diffused and is ‘talked......-level tensions experience by sharing platforms by looking at the case of mobile fashion reselling and swapping markets. The final paper combines the perspectives of different sharing economy stakeholders and outlines some of the micro and macro tensions arising in and influencing the organization of these multi...

  11. Collective identity formation in hybrid organizations.

    OpenAIRE

    Boulongne, Romain; Boxenbaum, Eva

    2015-01-01

    International audience; The present article examines the process of collective identity formation in the context of hybrid organizing. Empirically, we investigate hybrid organizing in a collaborative structure at the interface of two heterogeneous organizations in the domain of new renewable energies. We draw on the literature on knowledge sharing across organizational boundaries, particularly the notions of transfer, translation and transformation, to examine in real time how knowledge shari...

  12. Pragmatic identity and alterity in political discourse

    OpenAIRE

    Boicu, Ruxandra

    2007-01-01

    The article analyzes a sample of political discourse, namely the speech entitled “We Want Our Country Back”, delivered by the British nationalist, MEP, Ashley Mote. In the communication situation, the audience is made up of conservative, right-wing politicians or supporters, mainly readers of the nationalist “Right Now” magazine. The politician utterer interacts both with the interlocutors present, considered to share the speaker’s national and religious identity and with potential interlocut...

  13. Elective Identities, (Culture, Identization and Integration)

    NARCIS (Netherlands)

    S.J. Magala (Slawomir)

    2002-01-01

    textabstractMost of contemporary individual and social identities (constructed with societal, cultural and technological resources) are radically autonomous, nomadic and virtual - i.e. they are de-traditionalized, open to negotiation and not based on a single interpretation of a tradition.

  14. Implementing Explicit and Finding Implicit Sharing in Embedded DSLs

    Directory of Open Access Journals (Sweden)

    Oleg Kiselyov

    2011-09-01

    Full Text Available Aliasing, or sharing, is prominent in many domains, denoting that two differently-named objects are in fact identical: a change in one object (memory cell, circuit terminal, disk block is instantly reflected in the other. Languages for modelling such domains should let the programmer explicitly define the sharing among objects or expressions. A DSL compiler may find other identical expressions and share them, implicitly. Such common subexpression elimination is crucial to the efficient implementation of DSLs. Sharing is tricky in embedded DSL, since host aliasing may correspond to copying of the underlying objects rather than their sharing. This tutorial summarizes discussions of implementing sharing in Haskell DSLs for automotive embedded systems and hardware description languages. The technique has since been used in a Haskell SAT solver and the DSL for music synthesis. We demonstrate the embedding in pure Haskell of a simple DSL with a language form for explicit sharing. The DSL also has implicit sharing, implemented via hash-consing. Explicit sharing greatly speeds up hash-consing. The seemingly imperative nature of hash-consing is hidden beneath a simple combinator language. The overall implementation remains pure functional and easy to reason about.

  15. Identity of psychology, identity and psychology

    Directory of Open Access Journals (Sweden)

    Mirjana Nastran Ule

    2003-09-01

    Full Text Available The article deals with epistemic issues of modern psychology with the starting hypothesis being that scientific psychology must satisfy three main interests: scientific, practical and emancipatory interest. Particularly important is the emancipatory interest, which is based on the social reflection of scientific work and conclusions. Psychological knowledge involves not only neutral descriptions of facts, but also implicit rules, expectations regarding values or norms, and criticism of undesirable behavior. The traditional psychological model attempts to satisfy the scientific interest and partly practical interest, while avoiding emancipatory interest. But I believe modern socio-historical models of psychology to be significant precisely owing to the inclusion of emancipatory interest. The difference between these two models of psychology is most obvious in their perception of identity i.e. individuality. Conventional perceptions follow the logic of "possessive individualism" in which the individual is seen as an autonomous bearer and owner of his/her psychological states and processes. The conventional model of identity supports the modernist concept of the individual as being focused on his/her self or personal identity. Socio-historical models, on the other hand, see the individual as a being embedded in social relations and social interactions, and one who builds and expresses his/her individuality through the reflection on social interactions, discursive practices, and response to the hierarchy of power and social mechanisms of control. According to this model, identity evolves through a series of social constructions which are embodied in the individual and represent him/her in society. Identity thus becomes a notion that combines individuality and social context, subjectivation and objectivation of the individual, and historical and biographical time.

  16. Chimpanzees share forbidden fruit.

    Directory of Open Access Journals (Sweden)

    Kimberley J Hockings

    Full Text Available The sharing of wild plant foods is infrequent in chimpanzees, but in chimpanzee communities that engage in hunting, meat is frequently used as a 'social tool' for nurturing alliances and social bonds. Here we report the only recorded example of regular sharing of plant foods by unrelated, non-provisioned wild chimpanzees, and the contexts in which these sharing behaviours occur. From direct observations, adult chimpanzees at Bossou (Republic of Guinea, West Africa very rarely transferred wild plant foods. In contrast, they shared cultivated plant foods much more frequently (58 out of 59 food sharing events. Sharing primarily consists of adult males allowing reproductively cycling females to take food that they possess. We propose that hypotheses focussing on 'food-for-sex and -grooming' and 'showing-off' strategies plausibly account for observed sharing behaviours. A changing human-dominated landscape presents chimpanzees with fresh challenges, and our observations suggest that crop-raiding provides adult male chimpanzees at Bossou with highly desirable food commodities that may be traded for other currencies.

  17. Identity without Membership?

    DEFF Research Database (Denmark)

    Dobusch, Leonhard; Schoeneborn, Dennis

    the formation of organizational identity in more fluid organizational settings. Drawing on an empirical study of the hacker collective Anonymous, we show that organizational identity is formed through public communicative events that are subject to meaning negotiation whether or not actions can be attributed...

  18. Corporate identity. Brand designs.

    Science.gov (United States)

    Mathieson, Steve

    2004-02-19

    The past two years have seen a steadily more consistent brand identity for the NHS. Branding will become more important as foundation status and PCT commissioning makes acute hospitals more competitive. This has put pressure on some trusts that have their own strong identities.

  19. Capturing Chemical Identity Thinking

    Science.gov (United States)

    Ngai, Courtney; Sevian, Hannah

    2017-01-01

    Chemical identity, the idea that every substance has at least one property that makes it unique and able to be differentiated from other substances, is core to the practice of chemistry. Such practice requires using properties to classify as well as to differentiate. Learning which substance properties are productive in chemical identity thinking…

  20. Personal Identity in Japan

    Science.gov (United States)

    Sugimura, Kazumi; Mizokami, Shinichi

    2012-01-01

    This chapter explores characteristics of identity formation among Japanese adolescents and young adults living in a cultural context where individualism has been increasingly emphasized even while maintaining collectivism. We argue that, to develop a sense of identity in Japanese culture, adolescents and young adults carefully consider others'…

  1. Identities-in-action

    DEFF Research Database (Denmark)

    Stentoft, Diana; Valero, Paola

    2009-01-01

    The notion of identity is often used in mathematics education research in an attempt to link individual and social understandings of mathematical learning. In this paper we review existing research making use of the notion of identity, and we point to some of the strengths and weaknesses in the w...

  2. Teachers' interpersonal role identity

    NARCIS (Netherlands)

    van der Want, Anna C.; den Brok, Perry; Beijaard, Douwe; Brekelmans, Mieke; Claessens, Luce C A; Pennings, Helena J M

    2014-01-01

    This article investigates the link between teachers' appraisal of specific interpersonal situations in classrooms and their more general interpersonal identity standard, which together form their interpersonal role identity. Using semi-structured and video-stimulated interviews, data on teachers' ap

  3. Teachers' Interpersonal Role Identity

    NARCIS (Netherlands)

    van der Want, Anna C.; den Brok, Perry; Beijaard, Douwe; Brekelmans, Mieke; Claessens, Luce C A; Pennings, Helena J M

    2015-01-01

    This article investigates the link between teachers' appraisal of specific interpersonal situations in classrooms and their more general interpersonal identity standard, which together form their interpersonal role identity. Using semi-structured and video-stimulated interviews, data on teachers' ap

  4. Cultural Identity Through CLIL

    OpenAIRE

    Oprescu Monica

    2015-01-01

    The CLIL approach is a modern manner of teaching English, which has been adapted in Romanian schools and universities. An interesting aspect of learning a foreign language is the contact with its culture/s and the changes it produces in terms of identity. Therefore, a challenging question to be answered is whether a CLIL approach focusing on culture influences students' cultural identity.

  5. Value Conditionality of Identity

    Directory of Open Access Journals (Sweden)

    M M Yusupov

    2013-12-01

    Full Text Available The article considers theoretical approaches to the study of values and identity, and reveals the role of values in the formation of the ethnic, regional and Russian identity on the example of Chechnya and the North Caucasus, with the sociological indicators characterizing value orientations and self-identification.

  6. Knowledge grows when shared

    DEFF Research Database (Denmark)

    Elbæk, Mikael Karstensen

    2010-01-01

    Knowledge is one of the few commodities that don’t devalue when used. Actually knowledge grows when shared and the free online access to peer-reviewed scientific publications is a potent ingredient the process of sharing. The sharing of knowledge is facilitated by the Open Access Movement. However...... infrastructure for Open Access was launched in Ghent, Belgium. This project and initiative is facilitating the success of the Open Access Pilot in FP7 as presented earlier in this journal. In this brief article I will present some of the most interesting issues that were discussed during the first session...

  7. Global resource sharing

    CERN Document Server

    Frederiksen, Linda; Nance, Heidi

    2011-01-01

    Written from a global perspective, this book reviews sharing of library resources on a global scale. With expanded discovery tools and massive digitization projects, the rich and extensive holdings of the world's libraries are more visible now than at any time in the past. Advanced communication and transmission technologies, along with improved international standards, present a means for the sharing of library resources around the globe. Despite these significant improvements, a number of challenges remain. Global Resource Sharing provides librarians and library managers with a comprehensive

  8. Too Much Information Sharing?

    DEFF Research Database (Denmark)

    Ganuza, Juan José; Jansen, Jos

    2013-01-01

    By using general information structures and precision criteria based on the dispersion of conditional expectations, we study how oligopolists’ information acquisition decisions may change the effects of information sharing on the consumer surplus. Sharing information about individual cost...... parameters gives the following trade-off in Cournot oligopoly. On the one hand, it decreases the expected consumer surplus for a given information precision, as the literature shows. On the other hand, information sharing increases the firms’ incentives to acquire information, and the consumer surplus...... increases in the precision of the firms’ information. Interestingly, the latter effect may dominate the former effect....

  9. Getting Behind B Shares

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    China Ocean Shipping(Group)Co.(COSCO) employs an experimental strategy of making acquisitions through the purchase of B shares COSCO Pacific Ltd.and its affili- ated companies held 4.5 million shares of China International Marine Containers(Grouo)Co.Ltd.(CIMC) as of March 6. Four months ago,the board of direc- tors of COSCO Container Industries Ltd. (COSCO Container)decided to buy more B shares of CIMC through the securities mar- ket.COSCO Container is a shell company registered in the British Virgin Islands with a

  10. Identity And Privacy Services

    Directory of Open Access Journals (Sweden)

    Harry Katzan, Jr.

    2010-12-01

    Full Text Available Personal identity and privacy are important topics in information systems in general and data analytics in particular.  Normally associated with digital security, the scope of identity and privacy is much greater and affects most aspects of everyday life.  Related subjects are behavioral tracking, personal-identifiable information (PII, privacy data relevance, data repurposing, identity theft, and homeland security.  Identity and Privacy Services is an admixture of the major issues in the area of personal identity and privacy and the security of individual rights in a complex societal environment.  This is a general paper on this important subject, intended to give exposure to the constituent topics.

  11. Identity as wrapping up

    DEFF Research Database (Denmark)

    Nickelsen, Niels Christian Mossfeldt

    2015-01-01

    The aim of this paper is to provide an understanding of cross-professional collaboration and to develop a notion of professional identity based in practice. The background of the paper is science and technology studies and more precisely actor network theory. The method used: The empirical analysis...... in close relation to the making of a report concerning the cross-professional collaboration. Findings are that “Identity as wrapping up” points to the way in which certain actors, by other actors, are maneuvered into certain pockets in a network. Identity as wrapping up is emphasized as a way...... of participating, which is closely connected to the intention to control the relation towards the other. Thus identity as wrapping up is argued to be a strategy to optimize the situation of one’s own profession. Conclusion: This articulation of identity contributes to the actor network literature as well...

  12. Visual identity and rebranding

    Directory of Open Access Journals (Sweden)

    Katarzyna Wrona

    2015-06-01

    Full Text Available The goal of this article is to highlight the essence of visual identification and rebranding, as well as to discuss elements of corporate identity, which are subject to revitalization in the process of refreshing the image of a brand. In the first part the article the analysis of the term visual identification is conducted. In the analysis special attention is drawn to the role of visual identification in creating a coherent identity of an organization. In the subsequent chapters further components of corporate identity are presented in detail – starting with logotype, through business forms, advertisements, accompanying materials and Internet websites to signs on buildings. Moreover, corporate identity book as a collection of standards and guidelines for application of corporate identity rules is discussed. The deliberations are based on the study of literature. The last chapter presented the transformation of the brand of Institute of Aviation.

  13. Practicing Identity: A Crafty Ideal?

    Science.gov (United States)

    Brysbaert, A.; Vetters, M.

    This paper focuses on the materialization of technological practices as a form of identity expression. Contextual analyses of a Mycenaean workshop area in the Late Bronze Age citadel of Tiryns (Argolis, Greece) are presented to investigate the interaction of different artisans under changing socio-political and economic circumstances. The case study indicates that although certain technological practices are often linked to specific crafts, they do not necessarily imply the separation of job tasks related to the working of one specific material versus another. Shared technological practices and activities, therefore, may be a factor in shaping cohesive group identities of specialized artisans. Since tracing artisans' identities is easier said than done on the basis of excavated materials alone, we employ the concepts of multiple chaînes opératoires combined with cross-craft interactions as a methodology in order to retrieve distinctive sets of both social and technological practices from the archaeological remains. These methodological concepts are not restricted to a specific set of steps in the production cycle, but ideally encompass reconstructing contexts of extraction, manufacture, distribution and discard/reuse for a range of artefacts. Therefore, these concepts reveal both technological practices, and, by contextualising these technological practices in their spatial layout, equally focus on social contacts that would have taken place during any of these actions. Our detailed contextual study demonstrates that the material remains when analysed in their entirety are complementary to textual evidence. In this case study they even form a source of information on palatial spheres of life about which the fragmentary Linear B texts, so far, remain silent.

  14. Identity cues and dementia in nursing home intervention.

    Science.gov (United States)

    Vézina, Aline; Robichaud, Line; Voyer, Philippe; Pelletier, Daniel

    2011-01-01

    This study examines the identity cues that family caregivers and healthcare personnel use with seniors living with dementia and living in nursing homes. The identity cues represent biographical knowledge used to stimulate the dementia sufferer, trigger signals and incite interaction. Our grounded approach hinges on three objectives: to identify and categorize identity cues; to document their uses; and to gain a better understanding of their effectiveness. We interviewed nine family caregivers and 12 healthcare workers. Qualitative data indicates that the participants use identity cues that evoke seniors' sociological, relational and individual characteristics. These identity cues play a central role in communication and constitute important information that the family caregivers can share with healthcare personnel. They sustain memory, facilitate care and reinforce seniors' self-value. These results help to define identity, foster a greater role for family caregivers, and constitute a sound basis for the implementation of personalized interventions.

  15. Shared decision making

    Science.gov (United States)

    ... the rest of your life Having major surgery Getting genetic or cancer screening tests Talking together about your options helps your provider know how you feel and what you value. How Shared Decision Making Works When facing a decision, your ...

  16. Sharing resources@CERN

    CERN Multimedia

    Maximilien Brice

    2002-01-01

    The library is launching a 'sharing resources@CERN' campaign, aiming to increase the library's utility by including the thousands of books bought by individual groups at CERN. This will improve sharing of information among CERN staff and users. Photo 01: L. to r. Eduardo Aldaz, from the PS division, Corrado Pettenati, Head Librarian, and Isabel Bejar, from the ST division, read their divisional copies of the same book.

  17. The Tradable Shares Puzzle

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    A huge number of restricted shares were made tradable in March in the mainland stock market,testing the capability of the fragile capital market Ping An of China has been made the main scapegoat of this year s stock market plunge.A month after its refinancing plan announcement- equivalent to recreating a new Ping An- its 3.12 billion restricted shares were made tradable on March 3,accounting for almost

  18. Performing the sharing economy.

    OpenAIRE

    Richardson, L

    2015-01-01

    The sharing economy converges around activities facilitated through digital platforms that enable peer-to-peer access to goods and services. It constitutes an apparent paradox, framed as both part of the capitalist economy and as an alternative. This duplicity necessitates focusing on the performances of the sharing economy: how it simultaneously constructs diverse economic activities whilst also inviting the deconstruction of ongoing practices of dominance. Such performances hold open the qu...

  19. Regulating the sharing economy

    Directory of Open Access Journals (Sweden)

    Kristofer Erickson

    2016-06-01

    Full Text Available In this introductory essay, we explore definitions of the ‘sharing economy’, a concept indicating both social (relational, communitarian and economic (allocative, profit-seeking aspects which appear to be in tension. We suggest combining the social and economic logics of the sharing economy to focus on the central features of network enabled, aggregated membership in a pool of offers and demands (for goods, services, creative expressions. This definition of the sharing economy distinguishes it from other related peer-to-peer and collaborative forms of production. Understanding the social and economic motivations for and implications of participating in the sharing economy is important to its regulation. Each of the papers in this special issue contributes to knowledge by linking the social and economic aspects of sharing economy practices to regulatory norms and mechanisms. We conclude this essay by suggesting future research to further clarify and render intelligible the sharing economy, not as a contradiction in terms but as an empirically observable realm of socio-economic activity.

  20. Information partnerships--shared data, shared scale.

    Science.gov (United States)

    Konsynski, B R; McFarlan, F W

    1990-01-01

    How can one company gain access to another's resources or customers without merging ownership, management, or plotting a takeover? The answer is found in new information partnerships, enabling diverse companies to develop strategic coalitions through the sharing of data. The key to cooperation is a quantum improvement in the hardware and software supporting relational databases: new computer speeds, cheaper mass-storage devices, the proliferation of fiber-optic networks, and networking architectures. Information partnerships mean that companies can distribute the technological and financial exposure that comes with huge investments. For the customer's part, partnerships inevitably lead to greater simplification on the desktop and more common standards around which vendors have to compete. The most common types of partnership are: joint marketing partnerships, such as American Airline's award of frequent flyer miles to customers who use Citibank's credit card; intraindustry partnerships, such as the insurance value-added network service (which links insurance and casualty companies to independent agents); customer-supplier partnerships, such as Baxter Healthcare's electronic channel to hospitals for medical and other equipment; and IT vendor-driven partnerships, exemplified by ESAB (a European welding supplies and equipment company), whose expansion strategy was premised on a technology platform offered by an IT vendor. Partnerships that succeed have shared vision at the top, reciprocal skills in information technology, concrete plans for an early success, persistence in the development of usable information for all partners, coordination on business policy, and a new and imaginative business architecture.

  1. [Diagnosing gender identity].

    Science.gov (United States)

    Kaltiala-Heino, Riittakerttu; Mattila, Aino; Kärnä, Teemu; Joutsenneimi, Kaisla

    2015-01-01

    Transsexualism and other variations of gender identity are based on a stable sense of identity. The aetiology of this phenomenon is not fully known. Suffering caused by gender dysphoria is alleviated with sex reassignment. The psychiatric assessment of both adolescents and adults has been centralized in Finland to two university hospitals, the Helsinki University Hospital and Tampere University Hospital. In both hospitals, multidisciplinary teams aim at differential diagnosis by using well-known psychiatric and psychological instruments. Wishes for sex reassignment that are caused by a mental health disorder are excluded. Assessment in adolescence is challenging because the identity in youth is still forming.

  2. Linguistic identity matching

    CERN Document Server

    Lisbach, Bertrand

    2013-01-01

    Regulation, risk awareness and technological advances are increasingly drawing identity search functionality into business, security and data management processes, as well as fraud investigations and counter-terrorist measures.Over the years, a number of techniques have been developed for searching identity data, traditionally focusing on logical algorithms. These techniques often failed to take into account the complexities of language and culture that provide the rich variations  seen in names used around the world. A new paradigm has now emerged for understanding the way that identity data

  3. Credit and identity theft

    OpenAIRE

    Charles M. Kahn; Roberds, William

    2005-01-01

    The quintessential crime of the information age is identity theft, the malicious use of personal identifying data. In this paper we model “identity” and its use in credit transactions. Various types of identity theft occur in equilibrium, including “new account fraud,” “existing account fraud,” and “friendly fraud.” The equilibrium incidence of identity theft represents a tradeoff between a desire to avoid costly or invasive monitoring of individuals on the one hand and the need to control tr...

  4. Adolescence: Search for an Identity

    Science.gov (United States)

    Kasinath, H. M.

    2013-01-01

    James Marcia (1991, 1994, 1999, 2002) expanded on Erikson's theory of identity formation. Specifically, he focused on two essential processes in achieving a mature identity: exploration and commitment. Erikson's observations about identity were extended by Marcia, who described four identity statuses: identity diffusion, foreclosure, moratorium…

  5. Vocational Identity and Ego Identity Status in Korean Nursing Students

    Directory of Open Access Journals (Sweden)

    Hyun-Young Koo, PhD, RN

    2016-03-01

    Conclusions: These findings show that nursing students in identity achievement status have secure and clear vocational identities. Further longitudinal and qualitative studies are needed to find out if identity formation among nursing students changes with age.

  6. Gender Identity: Intersex Individuals

    Directory of Open Access Journals (Sweden)

    Ilhame Khabar

    2016-12-01

    Full Text Available According to past beliefs and social norms, society has been taught that their has only been two types of biological structures regarding the ideal male and female. The majority of society has also believed that gender identity was specific only to those structures, as most have had a very fixed perspective of men and women and the sexual organs that are associated. In today's society, there has been an observed increase of many variations in sexual orientation, gender identity, gender expression, and sex anatomy. Awareness has been subtle, yet growing on gender identity and intersex individuals; however, some studies and popular media stories have also shown that many of these individuals have experienced trauma and hardship due to their ambiguous genitalia and how it has affected their gender identity.

  7. Identity after Death

    DEFF Research Database (Denmark)

    Gerstrøm, Anna

    2015-01-01

    of the financial industry. Findings: The paper finds that members of a dead organization construct a bankruptcy narrative that is also a legacy organizational identity narrative including a legacy organizational identity transformation and several identities that have positive and negative aspects...... evidence on ways that legacy organizational identity from a dead organization play a substantial role in a living organization. Research limitations/implications: Because of the chosen research approach, the research results may lack generalizability. Practical implications: The paper holds insight...... that can help practitioners understand members of a dying organization -- including the ways they come to form and perform in a new organizational context; an understanding that is a prerequisite for helping and supporting these members in coming to perform satisfyingly in the new organization. Originality/value...

  8. Researcher Identities in Transition

    DEFF Research Database (Denmark)

    Castelló, Montserrat; Wisker, Gina; Kobayashi, Sofie

    as other emergent ‘signals’, the latent or clear indications from institutions and academic communities regarding career directions and necessary professional skills and attitudes should be identified and interpreted for researchers to adequately develop their new identities. The aim of this paper...... is twofold: a) to present a comprehensive framework of the notion of researcher identity by means of analysing those spheres of activity related to researcher and career development; and b) to relate researcher identities to the experiences of early career researchers with issues concerning signals......Researchers are now embarked upon what we define as a ‘risk career’, rather than, as previously, a relatively more predictable academic career. In this changing context, traditional milestones that enabled early career researchers to build their identities are disappearing. Instead, what we define...

  9. Autoethnography: Inquiry into Identity

    Science.gov (United States)

    Hoppes, Steve

    2014-01-01

    This chapter provides guidelines and suggestions for assessing student development using autoethnography, a qualitative research method. Autoethnography guides students in examining the nexus between personal and professional identities, including skills, challenges, values, histories, and hopes for the future.

  10. Personal Identity Online

    DEFF Research Database (Denmark)

    Rodogno, Raffaele

    2012-01-01

    Philosophers concerned with the question of personal identity have typically been asking the so-called re-identification question: what are the conditions under which a person at one point in time is properly re-identified at another point in time? This is a rather technical question. In our...... everyday interactions, however, we do raise a number of personal identity questions that are quite distinct from it. In order to explore the variety of ways in which the Internet may affect personal identity, I propose in this study to broaden the typical philosophical horizon to other more mundane senses...... of the question. In Section 2, I describe a number of possible meanings of personal identity observed in everyday contexts and more philosophical ones. With some caveats, I argue that it is the specific context in which the question arises that disambiguates the meaning of the question. Online contexts are novel...

  11. The Supermalt identity

    DEFF Research Database (Denmark)

    Bech-Larsen, Tino; Esbjerg, Lars; Grunert, Klaus G.

    2007-01-01

    aiming to develop strong brands with a limited marketing budget. Based on the Supermalt case, suggestions are made regarding branding in relation to ethnic minorities. Originality/value - This article provides a study of a brand that has become strong within a narrowly defined group of consumers.......Purpose - The objective of this article is to conduct a case study of the Supermalt brand of malt beer, which has become the preferred beverage of Afro-Caribbean consumers in Brixton on a very limited marketing budget. Design/methodology/approach - The article uses the concepts of personal identity...... and brand identity in a qualitative study to explore how Brixtonbased Afro-Caribbean consumers construct their self-identities and the brand identity of Supermalt. Semi-structured interviews were conducted with 14 Afro-Caribbean consumers. Each interview was divided into three parts. The first part focused...

  12. Personal Identity Online

    DEFF Research Database (Denmark)

    Rodogno, Raffaele

    2012-01-01

    Philosophers concerned with the question of personal identity have typically been asking the so-called re-identification question: what are the conditions under which a person at one point in time is properly re-identified at another point in time? This is a rather technical question. In our...... everyday interactions, however, we do raise a number of personal identity questions that are quite distinct from it. In order to explore the variety of ways in which the Internet may affect personal identity, I propose in this study to broaden the typical philosophical horizon to other more mundane senses...... of the question. In Section 2, I describe a number of possible meanings of personal identity observed in everyday contexts and more philosophical ones. With some caveats, I argue that it is the specific context in which the question arises that disambiguates the meaning of the question. Online contexts are novel...

  13. Labia Majora Share

    Science.gov (United States)

    Lee, Hanjing; Yap, Yan Lin; Low, Jeffrey Jen Hui

    2017-01-01

    Defects involving specialised areas with characteristic anatomical features, such as the nipple, upper eyelid, and lip, benefit greatly from the use of sharing procedures. The vulva, a complex 3-dimensional structure, can also be reconstructed through a sharing procedure drawing upon the contralateral vulva. In this report, we present the interesting case of a patient with chronic, massive, localised lymphedema of her left labia majora that was resected in 2011. Five years later, she presented with squamous cell carcinoma over the left vulva region, which is rarely associated with chronic lymphedema. To the best of our knowledge, our management of the radical vulvectomy defect with a labia majora sharing procedure is novel and has not been previously described. The labia major flap presented in this report is a shared flap; that is, a transposition flap based on the dorsal clitoral artery, which has consistent vascular anatomy, making this flap durable and reliable. This procedure epitomises the principle of replacing like with like, does not interfere with leg movement or patient positioning, has minimal donor site morbidity, and preserves other locoregional flap options for future reconstruction. One limitation is the need for a lax contralateral vulva. This labia majora sharing procedure is a viable option in carefully selected patients. PMID:28194353

  14. Esperanto & cultural identity

    OpenAIRE

    Lehrmann, Ask; Christensen, Julie Hellesøe; Dzieza, Malgorzata; Hansen, Nathalie Gylling

    2007-01-01

    The topic of this project is the relationship between culture, cultural identity and language, and their relationship to the ambiguous concept of neutrality. Taking a case study of Esperanto, an artificial language designed with the specific intention of being a completely neutral and nationless language, we will explore how languages relate to the world. By comparing the thoughts on culture and group identity of various authors, we will then try to explore the concept of neutrality – for can...

  15. Visual identity and rebranding

    OpenAIRE

    Katarzyna Wrona

    2015-01-01

    The goal of this article is to highlight the essence of visual identification and rebranding, as well as to discuss elements of corporate identity, which are subject to revitalization in the process of refreshing the image of a brand. In the first part the article the analysis of the term visual identification is conducted. In the analysis special attention is drawn to the role of visual identification in creating a coherent identity of an organization. In the subsequent chapters further comp...

  16. Cultural Identity Through CLIL

    Directory of Open Access Journals (Sweden)

    Oprescu Monica

    2015-11-01

    Full Text Available The CLIL approach is a modern manner of teaching English, which has been adapted in Romanian schools and universities. An interesting aspect of learning a foreign language is the contact with its culture/s and the changes it produces in terms of identity. Therefore, a challenging question to be answered is whether a CLIL approach focusing on culture influences students' cultural identity.

  17. Wide content and psychological continuity views of personal identity

    OpenAIRE

    Kilcran, A. M.

    2016-01-01

    Externalism about mental content is the thesis that the content of at least some of a subject’s mental states is individuated by things in the subject’s environment. Psychological continuity accounts of personal identity claim that what it takes for a person to persist over time is to be share a suffi- cient degree of psychological similarity with themselves. I will argue that the truth of externalism about content implies that psychological continuity accounts of personal identity violate a ...

  18. Identity theft: where do we go from here?

    OpenAIRE

    Julia S. Cheney

    2004-01-01

    The identity theft forum sponsored by the Payment Cards Center of the Federal Reserve Bank of Philadelphia and the Gartner Fellows Program brought together a broad range of stakeholders to discuss the important issue of identity theft. Participants from the financial services and merchant industries, Internet service and technology providers, and regulatory and law enforcement agencies examined issues faced by consumers, merchants, and banks in fighting this financial crime. Discussants share...

  19. Names and Collective Identity

    Directory of Open Access Journals (Sweden)

    Otto Krogseth

    2012-08-01

    Full Text Available The preceding two decades have displayed a remarkable awareness for a connection between the concepts "identity" and "cultural memory". David Lowenthal speaks of a "current craze for heritage"! Cultural heritage has become extremely popular, especially in combination with tourism, and has accordingly been converted into a modern system of meaning a type of "secular religion". With reference to collective identity and cultural memory, it is important to ask the cul- tural analytical questions: "Why identity now? Why heritage now?" My reply is that we experience a critical identity crisis. Three central aspects signify individual and collective identity: Continuity, coherence and individuality. The three aspects, constituting the concept of identity, are exposed to serious threats in the post-modern era: The danger of changeability, fragmentation and standardisation. This ten- dency has, however, met various compensating counter reactions like for instance "re-traditionalisation". In my presentation, I will examine the phenomenon cultural memory through examples from the German tradition -- principally from the works of Aleida and Jan Assmann.

  20. On a New Trigonometric Identity

    Science.gov (United States)

    Chen, Hongwei

    2002-01-01

    A new trigonometric identity derived from factorizations and partial fractions is given. This identity is used to evaluate the Poisson integral via Riemann sum and to establish some trigonometric summation identities.

  1. Shared care (comanagement).

    Science.gov (United States)

    Montero Ruiz, E

    2016-01-01

    Surgical departments have increasing difficulties in caring for their hospitalised patients due to the patients' advanced age and comorbidity, the growing specialisation in medical training and the strong political-healthcare pressure that a healthcare organisation places on them, where surgical acts take precedence over other activities. The pressure exerted by these departments on the medical area and the deficient response by the interconsultation system have led to the development of a different healthcare organisation model: Shared care, which includes perioperative medicine. In this model, 2 different specialists share the responsibility and authority in caring for hospitalised surgical patients. Internal Medicine is the most appropriate specialty for shared care. Internists who exercise this responsibility should have certain characteristics and must overcome a number of concerns from the surgeon and anaesthesiologist. Copyright © 2015 Elsevier España, S.L.U. y Sociedad Española de Medicina Interna (SEMI). All rights reserved.

  2. Sharing big biomedical data.

    Science.gov (United States)

    Toga, Arthur W; Dinov, Ivo D

    The promise of Big Biomedical Data may be offset by the enormous challenges in handling, analyzing, and sharing it. In this paper, we provide a framework for developing practical and reasonable data sharing policies that incorporate the sociological, financial, technical and scientific requirements of a sustainable Big Data dependent scientific community. Many biomedical and healthcare studies may be significantly impacted by using large, heterogeneous and incongruent datasets; however there are significant technical, social, regulatory, and institutional barriers that need to be overcome to ensure the power of Big Data overcomes these detrimental factors. Pragmatic policies that demand extensive sharing of data, promotion of data fusion, provenance, interoperability and balance security and protection of personal information are critical for the long term impact of translational Big Data analytics.

  3. Sharing the dance -

    DEFF Research Database (Denmark)

    He, Jing; Ravn, Susanne

    2017-01-01

    to the highly specialized field of elite sports dance, we aim at exploring the way in which reciprocity unfolds in intensive deliberate practices of movement. In our analysis, we specifically argue that the ongoing dynamics of two separate flows of movement constitute a shared experience of dancing together....... In this sense, moving together, in sports dance, is a practical way of understanding each other. In agreement with Zahavi, our analysis emphasizes the bi-directed nature of sharing. However, at the same time, we contribute to Zahavi’s ongoing endeavour as the special case of sports dance reveals how reciprocity...

  4. Towards A Shared Mission

    DEFF Research Database (Denmark)

    Staunstrup, Jørgen; Orth Gaarn-Larsen, Carsten

    A mission shared by stakeholders, management and employees is a prerequisite for an engaging dialog about the many and substantial changes and challenges currently facing universities. Too often this essen-tial dialog reveals mistrust and misunderstandings about the role and outcome of the univer......A mission shared by stakeholders, management and employees is a prerequisite for an engaging dialog about the many and substantial changes and challenges currently facing universities. Too often this essen-tial dialog reveals mistrust and misunderstandings about the role and outcome...

  5. Shared values and normality

    Institute of Scientific and Technical Information of China (English)

    ZHANG Wen-hua; PANG Xue-cheng

    2006-01-01

    This paper investigates the relationship between the normality and the shared values for a meromorphic function on the unit disc △.Based on Marty's normality criterion and through a detailed analysis of the meromorphic functions,it is shown that if for every f∈F,f and f(k) share a and b on △ and the zeros of f(z)-a are of multiplicity k≥3,then F is normal on △,where F is a family of meromorphic functions on the unit disc △,and a and b are distinct values.

  6. Tools for Understanding Identity

    Energy Technology Data Exchange (ETDEWEB)

    Creese, Sadie; Gibson-Robinson, Thomas; Goldsmith, Michael; Hodges, Duncan; Kim, Dee DH; Love, Oriana J.; Nurse, Jason R.; Pike, William A.; Scholtz, Jean

    2013-12-28

    Identity attribution and enrichment is critical to many aspects of law-enforcement and intelligence gathering; this identity typically spans a number of domains in the natural-world such as biographic information (factual information – e.g. names, addresses), biometric information (e.g. fingerprints) and psychological information. In addition to these natural-world projections of identity, identity elements are projected in the cyber-world. Conversely, undesirable elements may use similar techniques to target individuals for spear-phishing attacks (or worse), and potential targets or their organizations may want to determine how to minimize the attack surface exposed. Our research has been exploring the construction of a mathematical model for identity that supports such holistic identities. The model captures the ways in which an identity is constructed through a combination of data elements (e.g. a username on a forum, an address, a telephone number). Some of these elements may allow new characteristics to be inferred, hence enriching the holistic view of the identity. An example use-case would be the inference of real names from usernames, the ‘path’ created by inferring new elements of identity is highlighted in the ‘critical information’ panel. Individual attribution exercises can be understood as paths through a number of elements. Intuitively the entire realizable ‘capability’ can be modeled as a directed graph, where the elements are nodes and the inferences are represented by links connecting one or more antecedents with a conclusion. The model can be operationalized with two levels of tool support described in this paper, the first is a working prototype, the second is expected to reach prototype by July 2013: Understanding the Model The tool allows a user to easily determine, given a particular set of inferences and attributes, which elements or inferences are of most value to an investigator (or an attacker). The tool is also able to take

  7. Entire functions sharing one small function

    Institute of Scientific and Technical Information of China (English)

    LI Yun-tong; CAO Yao

    2007-01-01

    The uniqueness problem of entire functions sharing one small function was studied. By Picard's Theorem, we proved that for two transcendental entire functions f (z) and g(z), a positive integer n≥9, and a(z) (not identically eaqual to zero) being a common small function related to f (z) and g(z), if f n(z)(f(z)-1)f'(z) and gn(z)(g'z)-1)g'(z) share a(z) CM, where CM is counting multiplicity, then g(z)≡f (z). This is an extended version of Fang and Hong's theorem [ Fang ML, Hong W, A unicity theorem for entire functions concerning differential polynomials, Journal of Indian Pure Applied Mathematics, 2001, 32 (9): 1343-1348].

  8. SharedSpaces mingle

    NARCIS (Netherlands)

    Handberg, L.; Gullström, C.; Kort, J.; Nyström, J.

    2016-01-01

    SharedSpaces is a WebRTC design prototype that creates a virtual media space where people can mingle and interact. Although you are in different locations, you appear side by side in front of a chosen backdrop. This interactive installation addresses spatial and social connectedness, stressing the

  9. Shared goals and development

    DEFF Research Database (Denmark)

    Blomberg, Olle

    2015-01-01

    undemanding for children to engage in, and therefore has the potential to play a part in fostering their understanding of other minds. Part of the functional role of shared goals is to enable agents to choose means that are appropriate to realising a goal with others rather than individually. By offering...

  10. Shared Oral Care

    DEFF Research Database (Denmark)

    Hede, Børge; Elmelund Poulsen,, Johan; Christophersen, Rasmus

    2014-01-01

    Shared Oral Care - Forebyggelse af orale sygdomme på plejecentre Introduktion og formål: Mangelfuld mundhygiejne hos plejekrævende ældre er et alment og veldokumenteret sundhedsproblem, der kan føre til massiv udvikling af tandsygdomme, og som yderligere kan være medvirkende årsag til alvorlige...

  11. Shared Care in Diabetes?

    DEFF Research Database (Denmark)

    Bødker, Keld

    2006-01-01

    The Danish National Board of Health has recently released a report that is intended to mark the start of a new project to establish it support for shared care in diabetes. In this paper I raise a number of concerns where lack of attention towards participation from prospective users constitute...

  12. Sharing Expertise: Consulting

    Science.gov (United States)

    Graves, Bill

    2011-01-01

    A special breed of superintendents who have developed expertise in a particular area find ways of sharing it in other venues as outside consultants. They pull extra duty to put their special skills into practice, to give back to their communities, to stay current and grounded in the field, or to enhance their professional reputations. They teach…

  13. 'Smart Power' for' Sharing'

    Institute of Scientific and Technical Information of China (English)

    Wang Ting

    2010-01-01

    @@ As an attitude of life The Interstoff Asia Essential Spring will be held from March 17th to 19th,2010,in Hong Kong Convention & Exhibition Centre.During this exhibition,the Interstoff Asia Directions trend committee will present its apparel fabric trend forecast for next season's wardrobes,unfolding a story of'Smart Power' of 'Sharing'.

  14. Decreasing serial cost sharing

    DEFF Research Database (Denmark)

    Hougaard, Jens Leth; Østerdal, Lars Peter Raahave

    2009-01-01

    The increasing serial cost sharing rule of Moulin and Shenker (Econometrica 60:1009-1037, 1992) and the decreasing serial rule of de Frutos (J Econ Theory 79:245-275, 1998) are known by their intuitive appeal and striking incentive properties. An axiomatic characterization of the increasing serial...

  15. Promoting teachers’ knowledge sharing

    NARCIS (Netherlands)

    Runhaar, P.R.; Sanders, K.

    2016-01-01

    Teachers’ professional development is nowadays seen as key in efforts to improve education. Knowledge sharing is a learning activity with which teachers not only professionalize themselves, but contribute to the professional development of their colleagues as well. This paper presents two studies,

  16. Decreasing Serial Cost Sharing

    DEFF Research Database (Denmark)

    Hougaard, Jens Leth; Østerdal, Lars Peter

    The increasing serial cost sharing rule of Moulin and Shenker [Econometrica 60 (1992) 1009] and the decreasing serial rule of de Frutos [Journal of Economic Theory 79 (1998) 245] have attracted attention due to their intuitive appeal and striking incentive properties. An axiomatic characterization...

  17. Sharing Research Results

    Science.gov (United States)

    Ashbrook, Peggy

    2011-01-01

    There are many ways to share a collection of data and students' thinking about that data. Explaining the results of science inquiry is important--working scientists and amateurs both contribute information to the body of scientific knowledge. Students can collect data about an activity that is already happening in a classroom (e.g., the qualities…

  18. Promoting teachers’ knowledge sharing

    NARCIS (Netherlands)

    Runhaar, P.R.; Sanders, K.

    2016-01-01

    Teachers’ professional development is nowadays seen as key in efforts to improve education. Knowledge sharing is a learning activity with which teachers not only professionalize themselves, but contribute to the professional development of their colleagues as well. This paper presents two studies, a

  19. Share the Fruits

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    Procter & Gamble Co,extends its employee stock ownership plan to benefit its Chinese employees The Procter & Gamble Co.(P&G) launched its Chinese employee stock ownership plan(ESOP)on April 1 after five years of preparation.The plan entitles its more than 7,000 employees in China to buy P&G stocks and share its growth benefits.

  20. Beyond processor sharing

    NARCIS (Netherlands)

    Aalto, S.; Ayesta, U.; Borst, S.C.; Misra, V.; Núñez Queija, R.

    2007-01-01

    While the (Egalitarian) Processor-Sharing (PS) discipline offers crucial insights in the performance of fair resource allocation mechanisms, it is inherently limited in analyzing and designing differentiated scheduling algorithms such as Weighted Fair Queueing and Weighted Round-Robin. The Discrimin

  1. Power Sharing Courts

    Directory of Open Access Journals (Sweden)

    Stefan Graziadei

    2016-06-01

    Full Text Available In this paper, I introduce a novel concept, the one of power sharing courts. Scholars of judicial politics look at the reasons behind judicial selection and the patterns of decision making within courts through the lens of ideology (left-right. However, the resulting fertile scholarly analysis has not been extended to divided societies, where the main cleavages are not partisan but ethno-national. In these societies, the liberal model of selecting judges and taking decisions within an apex court is often corrected to specifically include politically salient ascriptive cleavages (such as ethnicity/nationality/language/religion. The main thrust of my argument is that there is a model of selecting judges, taking decisions and sharing posts of influence within apex courts in divided societies that has not yet been conceptually captured: power sharing courts. In analogy to consociationalism in the political system, power sharing in the judiciary aims to solve salient inter-community conflicts by including all relevant groups in these bodies on a basis of parity or proportionality. The paper is of equal interest to scholars of constitutional courts, consociationalists, comparatists, as well as country specialists.

  2. The Sharing Economy

    DEFF Research Database (Denmark)

    Hamari, Juho; Sjöklint, Mimmi; Ukkonen, Antti

    2016-01-01

    Information and communications technologies (ICTs) have enabled the rise of so-called “Collaborative Consumption” (CC): the peer-to-peer-based activity of obtaining, giving, or sharing the access to goods and services, coordinated through community-based online services. CC has been expected...

  3. Promoting teachers’ knowledge sharing

    NARCIS (Netherlands)

    Runhaar, P.R.; Sanders, K.

    2016-01-01

    Teachers’ professional development is nowadays seen as key in efforts to improve education. Knowledge sharing is a learning activity with which teachers not only professionalize themselves, but contribute to the professional development of their colleagues as well. This paper presents two studies, a

  4. Moral identity in psychopathy

    Directory of Open Access Journals (Sweden)

    Andrea L. Glenn

    2010-12-01

    Full Text Available Several scholars have recognized the limitations of theories of moral reasoning in explaining moral behavior. They have argued that moral behavior may also be influenced by moral identity, or how central morality is to one's sense of self. This idea has been supported by findings that people who exemplify moral behavior tend to place more importance on moral traits when defining their self-concepts (Colby and Damon, 1995. This paper takes the next step of examining individual variation in a construct highly associated with IMMORAL behavior --- psychopathy. In Study 1, we test the hypothesis that individuals with a greater degree of psychopathic traits have a weaker moral identity. Within a large online sample, we found that individuals who scored higher on a measure of psychopathic traits were less likely to base their self-concepts on moral traits. In Study 2, we test whether this reduced sense of moral identity can be attributed to differences in moral judgment, which is another factor that could influence immoral behavior. Our results indicated that the reduced sense of moral identity among more psychopathic individuals was independent of variation in moral judgment. These results suggest that individuals with psychopathic traits may display immoral behavior partially because they do not construe their personal identities in moral terms.

  5. Narrating Career, Positioning Identity: Career Identity as a Narrative Practice

    Science.gov (United States)

    LaPointe, Kirsi

    2010-01-01

    In contrast to traditional definitions of career identity as an individual construct, this article argues for a discursive approach to career identity as a narrative practice. Career identity is conceptualized as a practice of articulating, performing and negotiating identity positions in narrating career experiences. By using the concept of…

  6. Researcher Identity in Transition

    DEFF Research Database (Denmark)

    Castelló, Montserrat; Kobayashi, Sofie; McGinn, Michelle K.

    2015-01-01

    Within the current higher education context, early career researchers (ECRs) face a ‘risk-career’ in which predictable, stable academic careers have become increasingly rare. Traditional milestones to signal progress toward a sustainable research career are disappearing or subject...... to reinterpretation, and ECRs need to attend to new or reimagined signals in their efforts to develop a researcher identity in this current context. In this article, we present a comprehensive framework for researcher identity in relation to the ways ECRs recognise and respond to divergent signals across spheres...... comprehensive framework allows for the analysis of researcher identity development through the complex and intertwined activities in which ECRs are involved. We advance this approach as a foundation for a sustained research agenda to understand how ECRs identify and respond to relevant signals, and...

  7. Learning as Negotiating Identities

    DEFF Research Database (Denmark)

    Jørgensen, Kenneth Mølbjerg; Keller, Hanne Dauer

    of time - caught in the notion of trajectories of learning - that integrate past, present and future. Working with the learners' notion of time is significant because it is here that new learning possibilities become visible and meaningful for individuals. Further, we argue that the concept of identity......The paper explores the contribution of Communities of Practice (COP) to Human Resource Development (HRD). Learning as negotiating identities captures the contribution of COP to HRD. In COP the development of practice happens through negotiation of meaning. The learning process also involves modes...... of belonging constitutive of our identities. We suggest that COP makes a significant contribution by linking learning and identification. This means that learning becomes much less instrumental and much more linked to fundamental questions of being. We argue that the COP-framework links learning with the issue...

  8. Identity work and identity regulation in managers' personal development training

    OpenAIRE

    Andersson, Thomas

    2008-01-01

    This article describes the role of personal development training in managers’ identity processes. Personal development training constitutes a local management discourse, which can influence both identity work and identity regulation processes. The study emphasizes the importance of personal life stories in understanding how managers are influenced by personal development training. The training provokes different processes of identity work and identity regulation, and managers actively work wi...

  9. Policy enabled information sharing system

    Science.gov (United States)

    Jorgensen, Craig R.; Nelson, Brian D.; Ratheal, Steve W.

    2014-09-02

    A technique for dynamically sharing information includes executing a sharing policy indicating when to share a data object responsive to the occurrence of an event. The data object is created by formatting a data file to be shared with a receiving entity. The data object includes a file data portion and a sharing metadata portion. The data object is encrypted and then automatically transmitted to the receiving entity upon occurrence of the event. The sharing metadata portion includes metadata characterizing the data file and referenced in connection with the sharing policy to determine when to automatically transmit the data object to the receiving entity.

  10. Professions and their Identities

    DEFF Research Database (Denmark)

    Krejsler, John

    2005-01-01

    PROFESSIONS AND THEIR IDENTITIES: HOW TO EXPLORE PROFESSIONAL DEVELOPMENT AMONG (SEMI-)PROFESSIONS This article explores conditions for discussing what it means to be professional among teachers, pre-school teachers, nurses and social workers. From an epistemological point of view it explores how...... analytical strategies can frame in sufficiently complex ways what it means to be a professional today. It is assumed that at least four main issues must be dealt with in order to conduct a satisfactory analysis of professions and their identities. Firstly, it is of fundamental strategic importance that one...

  11. Splitting Ward identity

    Energy Technology Data Exchange (ETDEWEB)

    Safari, Mahmoud [Institute for Research in Fundamental Sciences (IPM), School of Particles and Accelerators, P.O. Box 19395-5531, Tehran (Iran, Islamic Republic of)

    2016-04-15

    Within the background-field framework we present a path integral derivation of the splitting Ward identity for the one-particle irreducible effective action in the presence of an infrared regulator, and make connection with earlier works on the subject. The approach is general in the sense that it does not rely on how the splitting is performed. This identity is then used to address the problem of background dependence of the effective action at an arbitrary energy scale. We next introduce the modified master equation and emphasize its role in constraining the effective action. Finally, application to general gauge theories within the geometric approach is discussed. (orig.)

  12. Identity-based encryption

    CERN Document Server

    Chatterjee, Sanjit

    2011-01-01

    Identity Based Encryption (IBE) is a type of public key encryption and has been intensely researched in the past decade. Identity-Based Encryption summarizes the available research for IBE and the main ideas that would enable users to pursue further work in this area. This book will also cover a brief background on Elliptic Curves and Pairings, security against chosen Cipher text Attacks, standards and more. Advanced-level students in computer science and mathematics who specialize in cryptology, and the general community of researchers in the area of cryptology and data security will find Ide

  13. On the fundamentals of identity

    NARCIS (Netherlands)

    van der Gaag, Mandy

    2016-01-01

    Various new perspectives on identity have been introduced or have increased in popularity over the past two decades. These include identity as dynamic system (Kunnen & Bosma, 2001), a narrative approach to identity (McAdams, 2001), multi-dimensional models of identity formation (Luyckx et al., 2006;

  14. On the fundamentals of identity.

    NARCIS (Netherlands)

    van der Gaag, Mandy

    2016-01-01

    Various new perspectives on identity have been introduced or have increased in popularity over the past two decades. These include identity as dynamic system (Kunnen & Bosma, 2001), a narrative approach to identity (McAdams, 2001), multi-dimensional models of identity formation (Luyckx et al., 2006;

  15. A literary analysis of global female identity, health, and equity.

    Science.gov (United States)

    Hagan, Teresa L; Cohen, Susan M

    2014-01-01

    Females' experiences of identity, health, and equity share similar features around the world. This literary analysis describes the narratives of 4 female protagonists from popular fiction novels to identify similarities between their personal and contextualized experiences. The impact these private realities and public structures have on female health will be used to demonstrate the universal ecological threats to women's health. In conclusion, we offer suggestions on how to incorporate the shared female movement from domination and separation toward liberation and connection into modern health care practices that emphasize shared decision making, open communication, and social activism.

  16. The evolution of extreme cooperation via shared dysphoric experiences

    Science.gov (United States)

    Whitehouse, Harvey; Jong, Jonathan; Buhrmester, Michael D.; Gómez, Ángel; Bastian, Brock; Kavanagh, Christopher M.; Newson, Martha; Matthews, Miriam; Lanman, Jonathan A.; McKay, Ryan; Gavrilets, Sergey

    2017-01-01

    Willingness to lay down one’s life for a group of non-kin, well documented historically and ethnographically, represents an evolutionary puzzle. Building on research in social psychology, we develop a mathematical model showing how conditioning cooperation on previous shared experience can allow individually costly pro-group behavior to evolve. The model generates a series of predictions that we then test empirically in a range of special sample populations (including military veterans, college fraternity/sorority members, football fans, martial arts practitioners, and twins). Our empirical results show that sharing painful experiences produces “identity fusion” – a visceral sense of oneness – which in turn can motivate self-sacrifice, including willingness to fight and die for the group. Practically, our account of how shared dysphoric experiences produce identity fusion helps us better understand such pressing social issues as suicide terrorism, holy wars, sectarian violence, gang-related violence, and other forms of intergroup conflict. PMID:28290499

  17. Corporate Brand Identity in SMEs

    DEFF Research Database (Denmark)

    Mäläskä, Minna; Jones, Richard Ian

    studies. The research is important since it suggests an iterative and co-creative approach to brand identity. A typology of brand identity formation for SMEs is presented: entrepreneur driven, market driven, stakeholder driven. Practical implications: The three paths to creating a strong brand identity......Purpose: To study the emergence of corporate brand identity in SMEs and to develop a typology of brand identity drivers that reflects a co-creative approach to the emergence of brand identity. Design / Methodology / Approach : Existing approaches to brand identity are summarised. A narrative...... approach to understanding the emergence of brand identity is employed in case studies of 10 case companies reflecting both B-to-B and B-to-C companies. Findings: In all cases we see that brand identity is not a clear, enduring identity as suggested in the literature but is formed in a co-creative process...

  18. Shared care and boundaries:

    DEFF Research Database (Denmark)

    Winthereik, Brit Ross

    2008-01-01

    and technology studies. Findings – The paper shows how a version of “the responsible patient” emerges from the project which is different from the version envisioned by the project organisation. The emerging one is concerned with the boundary between primary and secondary sector care, and not with the boundary...... of healthcare in relation to IT design. Originality/value – The paper shows that “unshared” care does not exist; care is always shared among human and nonhuman actors. It also points to the value of studying how boundaries are enacted in projects that seek to create continuity across boundaries. Udgivelsesdato......Purpose – The paper seeks to examine how an online maternity record involving pregnant women worked as a means to create shared maternity care. Design/methodology/approach – Ethnographic techniques have been used. The paper adopts a theoretical/methodological framework based on science...

  19. Shared goals and development

    DEFF Research Database (Denmark)

    Blomberg, Olle

    2015-01-01

    In 'Joint Action and Development', Stephen Butterfill argues that if several agents' actions are driven by what he calls a "shared goal" -- a certain pattern of goal-relations and expectations -- then these actions constitute a joint action. This kind of joint action is sufficiently cognitively...... undemanding for children to engage in, and therefore has the potential to play a part in fostering their understanding of other minds. Part of the functional role of shared goals is to enable agents to choose means that are appropriate to realising a goal with others rather than individually. By offering...... a counterexample, I show that the pattern of goal-relations and expectations specified by Butterfill cannot play this role. I then provide an appropriately conceptually and cognitively undemanding amendment with which the account can be saved....

  20. Does Knowledge Sharing Pay?

    DEFF Research Database (Denmark)

    Mahnke, Volker; Pedersen, Torben; Venzin, Markus

    This empirical paper explores knowledge outflow from MNC subsidiaries and its impact on the MNC performance. We develop and test hypotheses derived from literature on MNC knowledge flows integrated with the perspective of knowledge-creating, self-interested MNC subsidiaries. The hypotheses...... are developed using a simultaneous equation model applied to a unique dataset encompassing a German MNC, HeidelbergCement. Enablers and impediments of knowledge outflows are assessed in order to explain why subsidiaries share their knowledge with other MNC units. Implications are examined by studying the link...... between knowledge outflows and subsidiary performance. Our findings suggest that knowledge outflows increase a subsidiary's performance only up to a certain point and that too much knowledge sharing may be detrimental to the contributing subsidiary's performance....

  1. Federated Identity Management for Research Collaborations

    CERN Document Server

    Broeder, Daan; Kelsey, David; Kershaw, Philip; Lüders, Stefan; Lyall, Andrew; Nyrönen, Tommi; Wartel, Romain; Weyer, Heinz J

    2012-01-01

    Federated identity management (FIM) is an arrangement that can be made among multiple organisations that lets subscribers use the same identification data to obtain access to the secured resources of all organisations in the group. Identity federation offers economic advantages, as well as convenience, to organisations and their users. For example, multiple institutions can share a single application, with resultant cost savings and consolidation of resources. In order for FIM to be effective, the partners must have a sense of mutual trust. A number of laboratories including national and regional research organizations are facing the challenge of a deluge of scientific data that needs to be accessed by expanding user bases in dynamic collaborations that cross organisational and national boundaries. Driven by these needs, representatives from a variety of research communities, including photon/neutron facilities, social science & humanities, high-energy physics, atmospheric science, bioinformatics and fusi...

  2. Decreasing Serial Cost Sharing

    DEFF Research Database (Denmark)

    Hougaard, Jens Leth; Østerdal, Lars Peter

    The increasing serial cost sharing rule of Moulin and Shenker [Econometrica 60 (1992) 1009] and the decreasing serial rule of de Frutos [Journal of Economic Theory 79 (1998) 245] have attracted attention due to their intuitive appeal and striking incentive properties. An axiomatic characterization...... of the increasing serial rule was provided by Moulin and Shenker [Journal of Economic Theory 64 (1994) 178]. This paper gives an axiomatic characterization of the decreasing serial rule...

  3. Does Knowledge Sharing Pay?

    DEFF Research Database (Denmark)

    Mahnke, Volker; Pedersen, Torben; Venzin, Markus

    This empirical paper explores knowledge outflow from MNC subsidiaries and its impact on the MNC performance. We develop and test hypotheses derived from literature on MNC knowledge flows integrated with the perspective of knowledge-creating, self-interested MNC subsidiaries. The hypotheses are de...... between knowledge outflows and subsidiary performance. Our findings suggest that knowledge outflows increase a subsidiary's performance only up to a certain point and that too much knowledge sharing may be detrimental to the contributing subsidiary's performance....

  4. Sharing data increases citations

    DEFF Research Database (Denmark)

    Drachen, Thea Marie; Ellegaard, Ole; Larsen, Asger Væring

    2016-01-01

    This paper presents some indications to the existence of a citation advantage related to sharing data using astrophysics as a case. Through bibliometric analyses we find a citation advantage for astrophysical papers in core journals. The advantage arises as indexed papers are associated with data...... by bibliographical links, and consists of papers receiving on average significantly more citations per paper per year, than do papers not associated with links to data....

  5. Sharing resources@CERN

    CERN Multimedia

    2002-01-01

    The library is launching a 'sharing resources@CERN' campaign, aiming to increase the library's utility by including the thousands of books bought by individual groups at CERN. This will improve sharing of information among CERN staff and users. Until now many people were unaware that copies of the same book (or standard, or journal) are often held not only by the library but by different divisions. (Here Eduardo Aldaz, from the PS division, and Isabel Bejar, from the ST division, read their divisional copies of the same book.) The idea behind the library's new sharing resources@CERN' initiative is not at all to collect the books in individual collections at the CERN library, but simply to register them in the Library database. Those not belonging to the library will in principle be unavailable for loan, but should be able to be consulted by anybody at CERN who is interested. "When you need a book urgently and it is not available in the library,' said PS Division engineer Eduardo Aldaz Carroll, it is a sham...

  6. Bonobos share with strangers.

    Directory of Open Access Journals (Sweden)

    Jingzhi Tan

    Full Text Available Humans are thought to possess a unique proclivity to share with others--including strangers. This puzzling phenomenon has led many to suggest that sharing with strangers originates from human-unique language, social norms, warfare and/or cooperative breeding. However, bonobos, our closest living relative, are highly tolerant and, in the wild, are capable of having affiliative interactions with strangers. In four experiments, we therefore examined whether bonobos will voluntarily donate food to strangers. We show that bonobos will forego their own food for the benefit of interacting with a stranger. Their prosociality is in part driven by unselfish motivation, because bonobos will even help strangers acquire out-of-reach food when no desirable social interaction is possible. However, this prosociality has its limitations because bonobos will not donate food in their possession when a social interaction is not possible. These results indicate that other-regarding preferences toward strangers are not uniquely human. Moreover, language, social norms, warfare and cooperative breeding are unnecessary for the evolution of xenophilic sharing. Instead, we propose that prosociality toward strangers initially evolves due to selection for social tolerance, allowing the expansion of individual social networks. Human social norms and language may subsequently extend this ape-like social preference to the most costly contexts.

  7. IDENTITY THEFT COMMITTED THROUGH INTERNET

    OpenAIRE

    Adrian Cristian MOISE

    2015-01-01

    In this study, starting with the presentation of some aspects regarding management of identity in cyberspace, it is carried out the analysis of the offence of identity theft committed through Internet. The term “identity theft” describes the criminal acts through which the offender obtains and uses in a fraudulent manner the identity of other person. These criminal acts may be carried out through the use of information and communication technology, too. The cases of identity theft committed t...

  8. Identity-based consumer behavior.

    OpenAIRE

    Reed, Americus; Forehand, Mark; Puntoni, Stefano; Warlop, Luk

    2012-01-01

    Although the influence of identity on consumer behavior has been documented in many streams of literature, the absence of a consistent definition of identity and of generally accepted principles regarding the drivers of identity-based behavior complicates comparisons across these literatures. To resolve that problem, we propose a simple but inclusive definition of identity. Identity can be defined as any category label with which a consumer self-associates that is amenable to a clear picture ...

  9. Fluidity, Identity, and Organizationality

    DEFF Research Database (Denmark)

    Dobusch, Leonhard; Schoeneborn, Dennis

    2015-01-01

    that the organizationality of a social collective is accomplished through “identity claims”—i.e., speech acts that concern what the social collective is or does—and negotiations on whether or not these claims have been made on the collective's behalf. We empirically examine the case of the hacker collective Anonymous...

  10. Gendered Avatar Identity

    Science.gov (United States)

    Woolums, Viola

    2011-01-01

    Gendered appearance in "World of Warcraft" is of particular interest because it seems to infiltrate interactions between individuals without serving a functional purpose within the game itself. It provides an opportunity to look at avatar choice in environments that have a primary purpose aside from existing as an arena for creating identity, and…

  11. Dissociative Identity Disorder

    Science.gov (United States)

    Schmidt, Tom

    2007-01-01

    Few psychological disorders in the Diagnostic Statistical Manual have generated as much controversy as Dissociative Identity Disorder (DID). For the past 35 years diagnoses of DID, previously referred to as Multiple Personality Disorder (MPD), have increased exponentially, causing various psychological researchers and clinicians to question the…

  12. The Visual Identity Project

    Science.gov (United States)

    Tennant-Gadd, Laurie; Sansone, Kristina Lamour

    2008-01-01

    Identity is the focus of the middle-school visual arts program at Cambridge Friends School (CFS) in Cambridge, Massachusetts. Sixth graders enter the middle school and design a personal logo as their first major project in the art studio. The logo becomes a way for students to introduce themselves to their teachers and to represent who they are…

  13. Bilingualism versus identity

    DEFF Research Database (Denmark)

    Hermann, Jesper

    1988-01-01

    During the last hundred years psychologists, philosophers and theologians have developed two different conceptions of personal identity. One of them insists that each person is a unique and transcendental being, whereas the other finds the personality deriving from interaction with other persons........ (This is the prevailing view today.) These theories are placed in relation to the difficulties an immigrant encounters....

  14. Gender, Identity and CMC.

    Science.gov (United States)

    Yates, Simeon J.

    1997-01-01

    Some research and popularized accounts have claimed computer-mediated communication (CMC) based interactions are free of gender inequality though a growing body of research has documented gender differences in access and practice. This article examines both positions and cultural aspects of gender identities to make clear the centrality of gender…

  15. What about Linguistic Identity?

    Science.gov (United States)

    Andrews, Micah

    2010-01-01

    The recent influx of Latino immigrants in the Mid-West U.S. has also increased the number of Mexican students in schools. As recent immigrants, one of the challenges Mexican students face besides learning a different language is the construction of new identities in unfamiliar environments. Learning a language involves acquiring another identity…

  16. Teaching European Identities

    Science.gov (United States)

    Raento, Pauliina

    2008-01-01

    The political, cultural and social make-up of Europe is changing fast. A new European identity is under construction, but old contradictions and diversity challenge its contents, forms and boundaries. Migration, the changing role of the nation-state and Europe's regions, the reshaping of politico-administrative and perceptional boundaries, the…

  17. Language and Identity Explored

    Directory of Open Access Journals (Sweden)

    Thomas Rozanov

    2016-06-01

    Full Text Available The relationship between language and identity is widely discussed in applied linguistics, sociology, communications and other related scholarly fields. Furthermore, many researchers have focused on the post-Soviet region, which given its unique historical context allows for testing of this relationship. The widespread bilingualism as a result of historical russification and the linguistic transformations that occurred after the collapse of the Soviet Union make the region a ‘sociolinguistic playground’. Recent events in Ukraine have given grounds to further explore this relationship, now in attempt to link language and identity as potential forces for geopolitical change in the region. This paper presents an overview of existing research, theories, and opposing perspectives related to the relationship between language and identity, and considers complications such as historical russification, religious influence, socioeconomic factors, and education with regards to the Ukrainian and post-Soviet context.  I aim to illustrate the significance of language and its effects on socio-political change in the case of Ukraine, by presenting arguments and complications in support of the relationship between language and identity.

  18. Spatial Identity in Gagauzia

    Directory of Open Access Journals (Sweden)

    A. V. Salavatova

    2015-01-01

    Full Text Available Historically the gagauz developed a self-perception based on their difference from Moldova as well as the ‘Turkish world’. The article argues that this fact has determined their pro-Russian political orientation as the only possible way of maintaining their identity

  19. Graduate Identity and Employability

    Science.gov (United States)

    Hinchliffe, Geoffrey William; Jolly, Adrienne

    2011-01-01

    This paper develops the concept of graduate identity as a way of deepening the understanding of graduate employability. It does this through presenting research in which over 100 employers in East Anglia were asked to record their perceptions of graduates in respect of their employability. The findings suggest a composite and complex graduate…

  20. Language and Social Identity

    Institute of Scientific and Technical Information of China (English)

    2012-01-01

    A person' s language and social identity are in fact an inseparable entity. When I was in Australia, as I can recall, my neighbour practised his speaking every morning, making it both pleasant and a privilege to hear, for the purpose of getting into parliament.

  1. Migration, Narration, Identity

    DEFF Research Database (Denmark)

    Leese, Peter

    three consecutive summers from 2010 to 2012. The articles focus on various aspects of the migrant experience and try to answer questions about migrant identity and its representations in literature and the media. The book closes with an original play by Carlos Morton, the Chicano playwright working...

  2. Discourses of Identity

    Science.gov (United States)

    Van Leeuwen, Theo

    2009-01-01

    This lecture discusses the concept of lifestyle, which emerged in the field of marketing in the 1970s, as a new, and increasingly pervasive, discourse of identity cutting through older "demographic" discourses. Distributed by mediated experts and role models, and realized through the semiotics of "composites of connotation", it redraws the…

  3. WORK AND LEARNER IDENTITY

    DEFF Research Database (Denmark)

    Kondrup, Sissel

    2015-01-01

    The aim of this article is to suggest a theoretical framework than can assess to how people’s engagement in specific historical and social work practices are significant to their development, maintenance or transformation of a learner identity. Such a framework is crucial in order to grasp how...

  4. Story Telling: Crafting Identities

    Science.gov (United States)

    McMahon, Mary; Watson, Mark

    2013-01-01

    Career guidance clients are seeking to craft new identities that better position them in their careers. The focus of the present article is on narrative career counselling's potential contribution in providing a meaningful and useful experience for career guidance clients. To illustrate the potential of narrative career counselling, the story…

  5. Making Meaning: Identity Development of Black Undergraduate Women

    Science.gov (United States)

    Porter, Christa J.; Dean, Laura A.

    2015-01-01

    The purpose of this preliminary, phenomenological study was to identify factors that influence identity development and meaning-making of Black undergraduate women at a predominately White institution. The goal of this research was two-fold: to share diverse experiences of Black undergraduate women in order to understand the essence of their lived…

  6. Identity Management and Trust Services: Foundations for Cloud Computing

    Science.gov (United States)

    Suess, Jack; Morooney, Kevin

    2009-01-01

    Increasingly, IT organizations will move from providing IT services locally to becoming an integrator of IT services--some provided locally and others provided outside the institution. As a result, institutions must immediately begin to plan for shared services and must understand the essential role that identity management and trust services play…

  7. New Academics and Identities: Research as a Process of "Becoming"

    Science.gov (United States)

    McLeod, Heather; Badenhorst, Cecile

    2014-01-01

    We are new academics involved in the process of becoming researchers. We believe that gathering, reflecting, sharing and producing knowledge are important parts of constructing a strong identity as a researcher that we produce and own rather than being produced by the prevailing academic discourse. We decenter research as a product and bring into…

  8. Imagining Geographies, Mapping Identities

    Directory of Open Access Journals (Sweden)

    Matthew Graves

    2015-03-01

    Full Text Available The ambition of this issue of Portal is to reach across the methodological boundaries of history, politics, literature and geography to apply their complementary perspectives to the study of identity and its relation to space and place, an aim that involves attempting to identify the many different ways the notoriously slippery concepts of identity and geography may intersect. For this issue we have selected articles that cast a fresh perspective on two areas where identity and geography intersect: the construction of identity through the imaginative recreation of place in literature: Mapping Literary Spaces; and the study of the shifting relationships of centre and periphery, exclusion and inclusion in urban settings and geopolitical confrontations: Social and Political Peripheries. Gerard Toal has written that geography is not a noun but a verb: it does not describe what space is but studies what we do with space, imaginatively and politically. The articles in this issue illustrate the exercise of the literary and political imagination and the role of materiality and memory in the creation of geographic representation. They show too a new awareness of the centrality of space in the constitution of identities, and the need for a new geocritical reading of its discourse, as the interrelations of place and community are played out on the many scales of social and political life, from the local to the global.   The special issue is organised thus: Introduction Matthew Graves (Aix-Marseille University & Liz Rechniewski (Sydney University: “Imagining Geographies, Mapping Identities.” I. Mapping Literary Spaces - Isabelle Avila (University of Paris XIII, "Les Cartes de l'Afrique au XIXe siècle et Joseph Conrad : Perceptions d'une Révolution Cartographique." - Daniela Rogobete (University of Craiova, "Global vs Glocal: Dimensions of the post-1981 Indian English Novel." II. Social and Political Peripheries - Elizabeth Rechniewski (Sydney

  9. Music and collective identities

    Directory of Open Access Journals (Sweden)

    Milanović Biljana

    2007-01-01

    Full Text Available This paper presents some introductory observations on the ways in which the opposition between the modern and post-modern understanding of social identities can be overcome in the context of musicology. It is based on the consideration of identities as dynamic and changeable categories, as well as on the importance of the relation between individual and collective positionings, on the complexities of the multiple identifications and on the understanding of music as a social construction of identity. Due attention is paid to basic theoretical and methodological aspects in the interdisciplinary analysis of ′self′ and ′other′. In music, the problems of self-presentation appropriation, difference, power, control, authenticity, hybridity, as well as other issues that blur the boundaries between musicology, ethnomusicology and the studies of popular music, are made relevant by these interdisciplinary terms. Both the modern and post-modern understanding of identity can first be placed in the context of the binary questions: ′How to construct the identity and maintain it?′ and ′How to avoid the construction of the fixed identity and thus leave the door open for the possibility of change?′. It seems that the deconstruction of these opposite approaches has now grown in importance. This paper focuses especially on that kind of theorizing about music and socio-cultural identities. The views of Georgina Born and David Hesmondhalgh, that older and recent models of music representation are not ′either/or′ categories but rather complement each other, are especially singled out. These authors show by numerous examples that music can invariably both reflect existing identities and construct new ones. They conclude that possible shortcomings, such as the danger of essentialism in the earlier approach, and of later reductionism, could be avoided by carefully using the homology and process models of music representation. Their typology of music

  10. Identity: key to children's understanding of belief.

    Science.gov (United States)

    Perner, Josef; Mauer, M Christine; Hildenbrand, Monika

    2011-07-22

    Is knowledge structured and acquired as independent facts and concepts, as parcels of independent domains, or as domains that share conceptual abilities? For an answer, we looked at the development of two concepts, belief and identity. These concepts are not part of the same domain, but the application of both depends on the common ability to separate sense from reference. We show that both capacities become functional between the ages of 3 and 5 years, which provides empirical support for the contention that deep conceptual structures play an important role in cognitive development.

  11. Identity Entrepreneurship and the Consequences of Identity Failure: The Dynamics of Leadership in the BBC Prison Study

    Science.gov (United States)

    Haslam, S. Alexander; Reicher, Stephen

    2007-01-01

    The BBC Prison Study was an experimental case study in which participants were randomly assigned to groups as prisoners or guards. This paper examines the impact of interventions designed to increase prisoners' sense of shared social identity on processes of leadership. It presents psychometric, behavioral, and observational data which support the…

  12. As Canadian as possible ... under what circumstances?: Public opinion on national identity in Canada outside Quebec.

    Science.gov (United States)

    Raney, Tracey

    2009-01-01

    Public opinion on national identity in Canada is changing. Using data from the International Social Science Programme, this essay presents evidence that most Canadians have a strong national identity rooted in universal conceptions that everyone can share, such as citizenship. Data also show, however, that a growing number of Canadians define their national identity narrowly, such as through birthplace and religion. Drawing on research from social psychology, the essay suggests that theories of Canadian identity need to take into account the fact that many Canadians have strong national identities that do not fit cleanly into the civic/ethnic theoretical dichotomy.

  13. Identity Development and Identity Formation: A Theoretical Assessment

    Directory of Open Access Journals (Sweden)

    Hasan Atak

    2011-03-01

    Full Text Available Basic function of adolescence -one of the human life periods when physical and mental changes are experienced most heavily- is suggested to be identity development. Recent developmental psychology studies hypothesized that identity development starts during adolescence but intensifies during transi-tion to adulthood. This study addresses identity concept, in detail, from a theoretical point of view and in the scope of empirical studies. Literature offers quite different explanations and models as well as a few basic theories in this framework. The number of studies on identity subject is higher than the number of studies on other psycho-social study subjects. This study presents the theories offering basic explanations about identity (such as the works of Erikson, Marcia, Berzonsky, Waterman and the theories referring to identity (such as the works of Blos, Arnett, Kegan. Theories related to identity are addressed under the titles of identity exploration, identity status and identity styles. Almost all of the identity studies conducted in Turkey focused on identity status. In this context, new theories and tendencies may be taken into consideration in the studies to be made in Turkey on identity development.

  14. Fixed Access Network Sharing

    Science.gov (United States)

    Cornaglia, Bruno; Young, Gavin; Marchetta, Antonio

    2015-12-01

    Fixed broadband network deployments are moving inexorably to the use of Next Generation Access (NGA) technologies and architectures. These NGA deployments involve building fiber infrastructure increasingly closer to the customer in order to increase the proportion of fiber on the customer's access connection (Fibre-To-The-Home/Building/Door/Cabinet… i.e. FTTx). This increases the speed of services that can be sold and will be increasingly required to meet the demands of new generations of video services as we evolve from HDTV to "Ultra-HD TV" with 4k and 8k lines of video resolution. However, building fiber access networks is a costly endeavor. It requires significant capital in order to cover any significant geographic coverage. Hence many companies are forming partnerships and joint-ventures in order to share the NGA network construction costs. One form of such a partnership involves two companies agreeing to each build to cover a certain geographic area and then "cross-selling" NGA products to each other in order to access customers within their partner's footprint (NGA coverage area). This is tantamount to a bi-lateral wholesale partnership. The concept of Fixed Access Network Sharing (FANS) is to address the possibility of sharing infrastructure with a high degree of flexibility for all network operators involved. By providing greater configuration control over the NGA network infrastructure, the service provider has a greater ability to define the network and hence to define their product capabilities at the active layer. This gives the service provider partners greater product development autonomy plus the ability to differentiate from each other at the active network layer.

  15. Shared clinical decision making

    Science.gov (United States)

    AlHaqwi, Ali I.; AlDrees, Turki M.; AlRumayyan, Ahmad; AlFarhan, Ali I.; Alotaibi, Sultan S.; AlKhashan, Hesham I.; Badri, Motasim

    2015-01-01

    Objectives: To determine preferences of patients regarding their involvement in the clinical decision making process and the related factors in Saudi Arabia. Methods: This cross-sectional study was conducted in a major family practice center in King Abdulaziz Medical City, Riyadh, Saudi Arabia, between March and May 2012. Multivariate multinomial regression models were fitted to identify factors associated with patients preferences. Results: The study included 236 participants. The most preferred decision-making style was shared decision-making (57%), followed by paternalistic (28%), and informed consumerism (14%). The preference for shared clinical decision making was significantly higher among male patients and those with higher level of education, whereas paternalism was significantly higher among older patients and those with chronic health conditions, and consumerism was significantly higher in younger age groups. In multivariate multinomial regression analysis, compared with the shared group, the consumerism group were more likely to be female [adjusted odds ratio (AOR) =2.87, 95% confidence interval [CI] 1.31-6.27, p=0.008] and non-dyslipidemic (AOR=2.90, 95% CI: 1.03-8.09, p=0.04), and the paternalism group were more likely to be older (AOR=1.03, 95% CI: 1.01-1.05, p=0.04), and female (AOR=2.47, 95% CI: 1.32-4.06, p=0.008). Conclusion: Preferences of patients for involvement in the clinical decision-making varied considerably. In our setting, underlying factors that influence these preferences identified in this study should be considered and tailored individually to achieve optimal treatment outcomes. PMID:26620990

  16. Mobile energy sharing futures

    DEFF Research Database (Denmark)

    Worgan, Paul; Knibbe, Jarrod; Plasencia, Diego Martinez

    2016-01-01

    We foresee a future where energy in our mobile devices can be shared and redistributed to suit our current task needs. Many of us are beginning to carry multiple mobile devices and we seek to re-evaluate the traditional view of a mobile device as only accepting energy. In our vision, we can...... leverage the energy stored in our devices to wirelessly distribute energy between our friends, family, colleagues and strangers devices. In this paper we explore the opportunities and interactions presented by such spontaneous energy transfer interactions and present some envisaged collaborative energy...

  17. Sharing Keynote Slideshows

    CERN Document Server

    Clark, Josh

    2010-01-01

    Slideshows have come a long way since overhead projectors were your only option. You can show share your ideas with the world via email, DVD, PDF, YouTube, iPhone, or kiosk. Once your show is polished to perfection, this thorough, accessible guide shows you how to export and deliver it all possible ways-even as a PowerPoint file, QuickTime movie, or web site. As a bonus, you'll find advice on setting up your equipment and delivering an effective presentation.

  18. Transformation from Identity Stone Age to Digital Identity

    Directory of Open Access Journals (Sweden)

    Mohit Kohli

    2011-05-01

    Full Text Available Technological conversion, political interests and Business drivers has triggered a means, to establish individual characterization and personalization.People started raising concerns on multiple identities managed across various zones and hence various solutions were designed. Technological advancement has brought various issues and concerns around Identity assurance, privacy and policy enabled common Authentication framework. A compressive framework is needed to established common identity model to address national needs like standards, regulation and laws, minimum risk, interoperability and to provide user with a consistent context or user experience.This document focuses on Transformation path of identity stone age to Identity as in state. It defines a digital identity zone model (DIZM to showcase the Global Identity defined across the ecosystem. Also, provide insight of emerging Technology trend to enable Identity assurance, privacy and policy enabled common Authentication framework.

  19. Transformation from Identity Stone Age to Digital Identity

    CERN Document Server

    Kohli, Mohit

    2011-01-01

    Technological conversion, political interests and Business drivers has triggered a means, to establish individual characterization and personalization. People started raising concerns on multiple identities managed across various zones and hence various solutions were designed. Technological advancement has brought various issues and concerns around Identity assurance, privacy and policy enabled common Authentication framework. A compressive framework is needed to established common identity model to address national needs like standards, regulation and laws, minimum risk, interoperability and to provide user with a consistent context or user experience. This document focuses on Transformation path of identity stone age to Identity as in state. It defines a digital identity zone model (DIZM) to showcase the Global Identity defined across the ecosystem. Also, provide insight of emerging Technology trend to enable Identity assurance, privacy and policy enabled common Authentication framework.

  20. Social identities and risk

    DEFF Research Database (Denmark)

    Blok, Anders; Jensen, Mette; Kaltoft, Pernille

    2008-01-01

    Expert-based environmental and health risk regulation is widely believed to suffer from a lack of public understanding and legitimacy. On controversial issues such as genetically modified organisms and food-related chemicals, a "lay-expert discrepancy" in the assessment of risks is clearly visible...... of social identities. On the basis of qualitative interviews with citizens and experts, respectively, we focus on the multiple ways in which identities come to be employed in actors' risk accounts. Empirically, we identify salient characteristics of "typical" imagined experts and lay-people, while arguing...... that these conceptions vary identifiably in-between four groups of citizens and experts. On the basis of our findings, some implications for bridging the lay-expert discrepancy on risk issues are sketched out....

  1. Novell Identity Manager 4

    Institute of Scientific and Technical Information of China (English)

    王志超

    2010-01-01

    本刊讯 5月27日,Novell推出Identity Manager 4解决方案系列,它可在跨物理、虚拟和云环境中安全地进行身份和访问管理。Novell Identity Manager4是业界首个在企业整体IT生态系统中,可确保身份、安全和合规策略连贯一致的解决方案,并在云环境中提供与数据中心环境相同水平的高安全性和稳定性。

  2. Holy Nations. Global Identities

    DEFF Research Database (Denmark)

    Along with the processes of globalisation and the end of the cold war we have seen an upsurge in religious nationalism and an increasing focus on the role of religion as a legitimising force in democratic secular states. Holy Nations & Global Identities draws on the combined theoretical and histo......Along with the processes of globalisation and the end of the cold war we have seen an upsurge in religious nationalism and an increasing focus on the role of religion as a legitimising force in democratic secular states. Holy Nations & Global Identities draws on the combined theoretical...... and historical insight of historians, political scientists and social scientists on the question of nationalism and globalisation with the methodological knowledge of religion presented by sociologists of religion. The book brings genuine theoretical explorations and original case studies on civil religion...

  3. Identity in craft

    Directory of Open Access Journals (Sweden)

    Agneta Knutas

    2013-06-01

    Full Text Available In contrast to efficiency, a bakery on the countryside in Norway is known for its slow pace of work. The slow pace allows the product, as well as the craftsperson, time in production and quality in relation to market. Therefore, the emphasis is on the importance of the aesthetic in craft, the building of identity as well as the association of tradition as part of the craft. Furthermore, allowing the time to understand both craft and tradition is what makes knowledge meaningful (Arendt, 1998/1958. Closely following craftsmen at a bakery in Norway, for two days, allowed the collection of observations and interviews. This paper is presented in narrative format. The study utilises support from Sennett (2009 and Arendt (1998/1958 in the analysis of the collected empirical data. The results regarding identity and enhancing vocational education in craft point towards the importance of concentration, judgement, an unhurried education process and a sociable master.

  4. Keeping identity private

    DEFF Research Database (Denmark)

    Adjei, Joseph K.; Olesen, Henning

    2011-01-01

    Privacy has become a major issue for policy makers. This has been impelled by the rapid development of technologies that facilitate collection, distribution, storage, and manipulation of personal information. Business organizations are finding new ways of leveraging the value derived from consumer...... is an attempt to understand the relationship between individuals’ intentions to disclose personal information, their actual personal information disclosure behaviours, and how these can be leveraged to develop privacy-enhancing identity management systems (IDMS) that users can trust. Legal, regu...

  5. Processes and Content of Narrative Identity Development in Adolescence: Gender and Well-Being

    Science.gov (United States)

    McLean, Kate C.; Breen, Andrea V.

    2009-01-01

    The present study examined narrative identity in adolescence (14-18 years) in terms of narrative content and processes of identity development. Age- and gender-related differences in narrative patterns in turning point memories and gender differences in the content and functions for sharing those memories were examined, as was the relationship…

  6. Animal Research Practices and Doctoral Student Identity Development in a Scientific Community

    Science.gov (United States)

    Holley, Karri

    2009-01-01

    This article examines doctoral student identity development in regard to engagement with research practices. Using animal research as a contextual lens, it considers how students develop an identity congruent to their perception of the community which facilitates their social and cognitive activities. The shared, interpretive understanding among…

  7. VHA Data Sharing Agreement Repository

    Data.gov (United States)

    Department of Veterans Affairs — The VHA Data Sharing Agreement Repository serves as a centralized location to collect and report on agreements that share VHA data with entities outside of VA. It...

  8. BOREL'S DIRECTIONS AND SHARED VALUES

    Institute of Scientific and Technical Information of China (English)

    Qingcai ZHANG

    2013-01-01

    In this article,we study the problems of Borel's directions of meromorphic functions concerning shared values and prove that if two meromorphic functions of infinite order share three distinct values,their Borel's directions are same.

  9. Vaccines, our shared responsibility.

    Science.gov (United States)

    Pagliusi, Sonia; Jain, Rishabh; Suri, Rajinder Kumar

    2015-05-05

    The Developing Countries Vaccine Manufacturers' Network (DCVMN) held its fifteenth annual meeting from October 27-29, 2014, New Delhi, India. The DCVMN, together with the co-organizing institution Panacea Biotec, welcomed over 240 delegates representing high-profile governmental and nongovernmental global health organizations from 36 countries. Over the three-day meeting, attendees exchanged information about their efforts to achieve their shared goal of preventing death and disability from known and emerging infectious diseases. Special praise was extended to all stakeholders involved in the success of polio eradication in South East Asia and highlighted challenges in vaccine supply for measles-rubella immunization over the coming decades. Innovative vaccines and vaccine delivery technologies indicated creative solutions for achieving global immunization goals. Discussions were focused on three major themes including regulatory challenges for developing countries that may be overcome with better communication; global collaborations and partnerships for leveraging investments and enable uninterrupted supply of affordable and suitable vaccines; and leading innovation in vaccines difficult to develop, such as dengue, Chikungunya, typhoid-conjugated and EV71, and needle-free technologies that may speed up vaccine delivery. Moving further into the Decade of Vaccines, participants renewed their commitment to shared responsibility toward a world free of vaccine-preventable diseases. Copyright © 2015 The Authors. Published by Elsevier Ltd.. All rights reserved.

  10. Shared consultant physician posts.

    LENUS (Irish Health Repository)

    Cooke, J

    2012-01-31

    Our aim was to assess the acceptability and cost-efficiency of shared consultancy posts. Two consultant physicians worked alternate fortnights for a period of twelve months. Questionnaires were distributed to general practitioners, nurses, consultants and junior doctors affected by the arrangement. Patients or their next of kin were contacted by telephone. 1\\/17 of consultants described the experience as negative. 14\\/19 junior doctors reported a positive experience. 11 felt that training had been improved while 2 felt that it had been adversely affected. 17\\/17 GPs were satisfied with the arrangement. 1\\/86 nurses surveyed reported a negative experience. 1\\/48 patients were unhappy with the arrangement. An extra 2.2 (p<0.001) patients were seen per clinic. Length of stay was shortened by 2.49 days (p<0.001). A saving of 69,212 was made due to decreased locum requirements. We present data suggesting structured shared consultancy posts can be broadly acceptable and cost efficient in Ireland.

  11. Configurations of self-identity formations of adults who stutter.

    Science.gov (United States)

    Kathard, Harsha; Norman, Vivienne; Pillay, Mershen

    2010-12-01

    It is important for clinicians to understand how adults who stutter construct who they are, i.e. their self-identity, in order to offer personally meaningful interventions. Early research on stuttering and self-concept provided initial knowledge, but there has been a dearth of further research in this field. This article, the third in a series of papers emanating from a doctoral study, provides new insight into the configurations of self-identity formations of adults who stutter. Previous articles from the study described how 'Able' (positive self-identity) and 'DisOther' (negative self-identity) self-identity formations developed over time. This paper describes the configurations of self-identities, Able and DisOther, evident across participants' stories. The study used a life-history methodology in which 7 adult participants (5 men and 2 women) shared their experiences of living with stuttering through open-ended interviews. The data from the interviews were analysed at two levels. The first level of analysis resulted in a description of the types of self-identity formations (positive and negative) and processes (personal, social and temporal) shaping the self-identity formations. This result was represented as a research story for each participant. The second level of analysis described the configurations of the self-identities, Able and DisOther, across the research stories. The main findings, illustrated through three research stories, were that the two types of self-identity formations, Able and DisOther, were present in singular and dual configurations. The dual presentation of self-identity formations occurred in co-existing, competing and coalescing configurations at particular time periods, illuminating the complexity of the stuttering experience. The clinical implications are discussed.

  12. EOS situational data shared service mechanism

    Science.gov (United States)

    Lv, L.; Xu, Q.; Lan, C. Z.; Shi, Q. S.; Lu, W. J.; Wu, W. Q.

    2016-11-01

    With the rapid development of aerospace and remote sensing technology, various high-resolution Earth Observation Systems (EOS) are widely used in economic, social, military and other fields and playing an increasingly prominent role in the construction of Digital Earth and national strategic planning. The normal operation of the system is the premise of high quality data acquisition. Compared with the ground observation mode, EOS itself and the surrounding environment are more complex, and its operation control mainly depends on all kinds of Space Situational Awareness (SSA) data acquisition and analysis. SSA data has more extensive sources, larger volume, stronger time-effectiveness and more complicated structure than traditional geographical spatial data. For effective data sharing and utilization, combined with the analysis of data types and structures, a SSA data sharing identity language SSDSML is designed based on the extensible mark-up language XML, which realizes a comprehensive description of satellites and their attributes, space environment, ground stations, etc. Then EOS situational data shared service mechanism is established and provides a powerful data support for the normal operation of the system.

  13. Identity Construction, Negotiation, and Resistance: Reconsideration of "Japanese" Identity

    Science.gov (United States)

    Fukuda, Chie

    2010-01-01

    This dissertation explores identity construction, mainly focusing on the ethnonational identity of "Japanese," in contrast to that of "non-Japanese" from ethnomethodological and social constructionist perspectives. Within these approaches, identity is not given "a priori" but emerges through sociohistorical contexts…

  14. Identity Styles and Religiosity: Examining the Role of Identity Commitment

    Science.gov (United States)

    Grajales, Tevni E.; Sommers, Brittany

    2016-01-01

    This study observed the role of identity styles, identity commitment, and identity statuses in predicting religiosity in a sample of undergraduate students attending a Seventh-day Adventist university (N = 138). Two structural models were evaluated via path analysis. Results revealed two strong models for the prediction of religiosity. Identity…

  15. Does Everyone Have a Musical Identity?: Reflections on "Musical Identities"

    Science.gov (United States)

    Gracyk, Theodore

    2004-01-01

    The book, "Musical Identities" (Raymond MacDonald, David Hargreaves, Dorothy Miell, eds.; Oxford and New York: Oxford University Press, 2002) consists of 11 essays on the psychology of music. The editors divided the essays into two groups: those on developing musical identities ("identities in music" involving recognizable social and cultural…

  16. Identity Styles and Religiosity: Examining the Role of Identity Commitment

    Science.gov (United States)

    Grajales, Tevni E.; Sommers, Brittany

    2016-01-01

    This study observed the role of identity styles, identity commitment, and identity statuses in predicting religiosity in a sample of undergraduate students attending a Seventh-day Adventist university (N = 138). Two structural models were evaluated via path analysis. Results revealed two strong models for the prediction of religiosity. Identity…

  17. Shared Consumption : A Technological Analysis

    OpenAIRE

    John A. Weymark

    2004-01-01

    James Buchanan (Economica, [1966]) has argued that Alfred Marshall's theory of jointly-supplied goods can be extended to analyze the allocation of impure public goods. This article introduces a way of modelling sharing technologies for jointly-supplied goods that captures the essential features of Buchanan's proposal. Public and private goods are special cases of shared goods obtained by appropriately specifying the sharing technology. Necessary conditions for an allocation in a shared goods ...

  18. Competition in the sharing economy

    OpenAIRE

    Demary, Vera

    2015-01-01

    Sharing goods, services or knowledge is at the center of the so-called Sharing Economy. Businesses are usually based on online platforms that match demand and supply which is in many cases, but not always provided by individuals. Sharing Economy companies typically compete with traditional companies in many different markets. The main challenge of this type of competition currently is the application of the existing regulation. While incumbent firms adhere to this, Sharing Economy companies o...

  19. Fractions: How to Fair Share

    Science.gov (United States)

    Wilson, P. Holt; Edgington, Cynthia P.; Nguyen, Kenny H.; Pescosolido, Ryan S.; Confrey, Jere

    2011-01-01

    Children learn from a very early age what it means to get their "fair share." Whether it is candy or birthday cake, many children successfully create equal-size groups or parts of a collection or whole but later struggle to create fair shares of multiple wholes, such as fairly sharing four pies among a family of seven. Recent research suggests…

  20. Entrepreneurship Education as Identity Workspace

    DEFF Research Database (Denmark)

    Frederiksen, Signe Hedeboe

    2016-01-01

    and identities. Exposed to identity work practices in class, learners experienced conflicting demands participating as succesful students and participating as potential entrepreneurs. The study draws attention to how an education setting contextualises identity work as a social practice. It critisises......Entrepreneurship education theory and practice show increasing interest in identity work as an important part of entrepreneurial learning. Entrepreneurship programs become identity workspaces where pedagogical designs stimulate entrepreneurial identity work and support individuals’ discovery...... of themselves as entrepreneurs. This article investigates how entrepreneurship education is practiced as an identity workspace, when reflective identity work is turned into a pedagogical strategy for entrepreneurial learning. I present empirical data from a qualitative fieldstudy in an eleven week mandatory...

  1. Object Identity in Database Systems

    Institute of Scientific and Technical Information of China (English)

    李天柱

    1995-01-01

    The concept of object identity and implementation of object identity in some systems have been explained in literature.Based on an analysis on the idea of data scheme in ANSI/X3/SPARC,this paper presents the concept of full-identity,which includes entity identity,conceptual object identity,and internal object identity,In addition,the equality of objects,which is richer and more practical,is discussed based on the full identity of objects.Therefore,the semantics and constructions of the identity for the complex objects are fully observed,and some appliactions in object management,version management,and user interface are found.Also,it could support the combination of O-O model with V-O model.

  2. John locke on personal identity.

    Science.gov (United States)

    Nimbalkar, Namita

    2011-01-01

    John Locke speaks of personal identity and survival of consciousness after death. A criterion of personal identity through time is given. Such a criterion specifies, insofar as that is possible, the necessary and sufficient conditions for the survival of persons. John Locke holds that personal identity is a matter of psychological continuity. He considered personal identity (or the self) to be founded on consciousness (viz. memory), and not on the substance of either the soul or the body.

  3. John locke on personal identity

    Directory of Open Access Journals (Sweden)

    Nimbalkar Namita

    2011-01-01

    Full Text Available John Locke speaks of personal identity and survival of consciousness after death. A criterion of personal identity through time is given. Such a criterion specifies, insofar as that is possible, the necessary and sufficient conditions for the survival of persons. John Locke holds that personal identity is a matter of psychological continuity. He considered personal identity (or the self to be founded on consciousness (viz. memory, and not on the substance of either the soul or the body.

  4. John locke on personal identity

    Directory of Open Access Journals (Sweden)

    Namita Nimbalkar

    2011-03-01

    Full Text Available John Locke speaks of personal identity and survival of consciousness after death. A criterion of personal identity through time is given. Such a criterion specifies, insofar as that is possible, the necessary and sufficient conditions for the survival of persons. John Locke holds that personal identity is a matter of psychological continuity. He considered personal identity (or the self to be founded on consciousness (viz. memory, and not on the substance of either the soul or the body.

  5. Social Identity Simulation System (SISTEM)

    Science.gov (United States)

    2014-03-31

    number of people G = identity group (e.g. gender, ethnicity, etc.) D = identity (e.g. male/ female , White/Black/Spanish/… etc.) R = real resources for an...actions as part of a collective. The collective actions are driven by social identity entrepreneurs (SIDs) (Haslam & Reicher, 2007; Lal, 1997). These...social identity entrepreneurs only advocate a collective action on behalf of the group when they perceive benefits of advocating being greater than

  6. SHARED TECHNOLOGY TRANSFER PROGRAM

    Energy Technology Data Exchange (ETDEWEB)

    GRIFFIN, JOHN M. HAUT, RICHARD C.

    2008-03-07

    The program established a collaborative process with domestic industries for the purpose of sharing Navy-developed technology. Private sector businesses were educated so as to increase their awareness of the vast amount of technologies that are available, with an initial focus on technology applications that are related to the Hydrogen, Fuel Cells and Infrastructure Technologies (Hydrogen) Program of the U.S. Department of Energy. Specifically, the project worked to increase industry awareness of the vast technology resources available to them that have been developed with taxpayer funding. NAVSEA-Carderock and the Houston Advanced Research Center teamed with Nicholls State University to catalog NAVSEA-Carderock unclassified technologies, rated the level of readiness of the technologies and established a web based catalog of the technologies. In particular, the catalog contains technology descriptions, including testing summaries and overviews of related presentations.

  7. Identity Development in Deaf Adolescents

    Science.gov (United States)

    Kunnen, E. Saskia

    2014-01-01

    We studied identity development during 5 years in seven deaf adolescents who attended a school for deaf children in the highest level of regular secondary education (age between 14 and 18 years), administering identity interviews every year. Identity development is conceptualized as the processes of exploration and commitment formation (Bosma,…

  8. New identities for sessile drops

    CERN Document Server

    Hajirahimi, Maryam; Fatollahi, Amir H

    2014-01-01

    A new set of mathematical identities is presented for axi-symmetric sessile drops on flat and curved substrates. The geometrical parameters, including the apex curvature and height, and the contact radius, are related by the identities. The validity of the identities are checked by various numerical solutions both for flat and curved substrates.

  9. Identity theft and your practice.

    Science.gov (United States)

    Asbell, Lisa

    2010-01-01

    Medical identity theft is a growing problem in America. The federal government has passed laws to help "prevent" identity theft. However, several powerful medical associations are fighting the legislation. Americans need to know what is happening with these laws and why these laws are important to protect providers from lawsuits and consumers of healthcare from medical identity theft.

  10. Ethnic Identity: Crisis and Resolution.

    Science.gov (United States)

    Ruiz, Aureliano Sandoval

    1990-01-01

    Presents Chicano/Latino ethnic identity development model that fosters understanding of ethnic identity conflicts particular to Chicano and Latino clients. Presents five stages (causal, cognitive, consequence, working through, and successful resolution) in relationship to ethnic identity conflicts, interventions, and resolution. Combines several…

  11. Primary Identity in Literature

    DEFF Research Database (Denmark)

    Graham, Brian Russell

    viewing the characters in literature in terms of these political identities. Literature is consequently discussed in relation to political causes. Literary criticism is animated by the same causes, and is viewed as having a direct intervention in society in relation to them. In this paper, I will discuss...... in opposite directions towards the fulfillment of desire at one end of experience and a world of fear and despair at the other, and in relation to its notion of a better society, what interests literature is a society of contented families joined through the marriage of their adult children....

  12. Digital identity management

    CERN Document Server

    Laurent, Maryline

    2015-01-01

    In the past four decades, information technology has altered chains of value production, distribution, and information access at a significant rate. These changes, although they have shaken up numerous economic models, have so far not radically challenged the bases of our society.This book addresses our current progress and viewpoints on digital identity management in different fields (social networks, cloud computing, Internet of Things (IoT)), with input from experts in computer science, law, economics and sociology. Within this multidisciplinary and scientific context, having crossed analys

  13. FINDING MY IDENTITY

    Institute of Scientific and Technical Information of China (English)

    Keith Farnish

    2010-01-01

    @@ I have found an identity. Is that really such a big deal? The thing is,I didn't realize I was missing one.There are so many things I could call myself: a human,male,a father,a husband,a writer,a thinker,a gardener,a campaigner...so many things that I feel pretty comfortable with,yet until a couple of weeks ago I didn't realize there was something missing; something that yawned inside me,empty and lacking substance.

  14. Shifting Design Consultancy Identities

    DEFF Research Database (Denmark)

    Larsen, Henry; Huijboom, Nina; Holm Nielsen, Anne

    2014-01-01

    and identities that resonate more with freelancing and portfolio careers than with the intention of creating firms that are intended to expand. We recognized a pattern where freelancers build up their work as a portfolio by moving from one engagement to another, a process that we will call sequential freelancing...... on design for innovation as a strategy for growth might well benefit if they understand that other companies in their municipality can grow if they actively support designers and help them develop their networking capabilities....

  15. What is digital identity?

    OpenAIRE

    Ertzscheid, Olivier

    2016-01-01

    The question of digital identity and e-reputation is central in today’s Internet ecosystem, both in terms of individual and collective use. This book is an accessible guide to cutting-edge research on the subject and provides an overview of the fundamental issues that individuals need to master in order to retain control over their or their organization’s online presence. This is a book for readers who wish to discover more about this rich and complex issue, as well as for businesses, organi...

  16. Understanding your digital identity

    OpenAIRE

    Williams, Shirley Ann; Fleming, Sarah Christine; Lundqvist, Karsten Oster; Parslow, Patrick Neil

    2010-01-01

    The term “Digital Identity” is used here to describe the persona a person projects across the internet. Your Digital Identity as perceived by other people is made up of material that you post yourself (for example photographs on Flickr and your own web page) but it also is made up of material other people put there about you (blog posts that mention you, photographs in which you are tagged). The “This is Me” project has developed resources that can be used by students and others to appreci...

  17. Identity Management A Primer

    CERN Document Server

    Sharoni, Ilan; Williamson, Graham; Yip, David

    2009-01-01

    In an age in which the boundaries between the real and the virtual are becoming increasingly blurred, this timely guide teaches both the key issues of identity management as well as appropriate strategies and preventative measures for ensuring personal safety in the virtual world. In a corporate setting, it is essential to identify and control the way in which the organization deals with customers, suppliers, employees, and other users who may interact with the information systems of the company. Providing strategies for overcoming this task in real-world terms as well as questions that assist

  18. Multiparty Quantum Secret Sharing of Quantum States with Quantum Registers

    Institute of Scientific and Technical Information of China (English)

    GUO Ying; ZENG Gui-Hua; CHEN Zhi-Gang

    2007-01-01

    A quantum secret sharing scheme is proposed by making use of quantum registers.In the proposed scheme,secret message state is encoded into multipartite entangled states.Several identical multi-particle entanglement states are generated and each particle of the entanglement state is filled in different quantum registers which act as shares of the secret message.Two modes,j.e.the detecting mode and the message mode,are employed so that the eavesdropping can be detected easily and the secret message may be recovered.The seeurity analysis shows that the proposed scheme is secure against eavesdropping of eavesdropper and cheating of participants.

  19. Secret Sharing and Proactive Renewal of Shares in Hierarchical Groups

    CERN Document Server

    Naskar, Ruchira; 10.5121/ijcsit.2010.2312

    2010-01-01

    Secret sharing in user hierarchy represents a challenging area for research. Although a lot of work has already been done in this direc- tion, this paper presents a novel approach to share a secret among a hierarchy of users while overcoming the limitations of the already exist- ing mechanisms. Our work is based on traditional (k +1; n)-threshold secret sharing, which is secure as long as an adversary can compromise not more than k secret shares. But in real life it is often feasible for an adversary to obtain more than k shares over a long period of time. So, in our work we also present a way to overcome this vulnerability, while implementing our hierarchical secret sharing scheme. The use of Elliptic Curve Cryptography makes the computations easier and faster in our work.

  20. Contextuality of identical particles

    Science.gov (United States)

    Kurzyński, Paweł

    2017-01-01

    There exist quantum phenomena that cannot be explained by noncontextual hidden-variable theories, yet the majority of them requires measurements that are performed on a single quantum system at a time. This fact constrains the phenomenon of contextuality to the microscopic domain. It is therefore natural to ask if quantum contextuality can be observed in measurements on collections of particles. Since particles in nature are identical, one can expect that such contextuality would be linked to bosonic and fermionic properties. Analysis of quantum contextuality in such scenarios would broaden our understanding of nonclassical effects in composite systems and perhaps would give us a hint on how to observe quantum phenomena in the macroscopic world. In this work I propose a generalization of quantum contextuality to the case of many identical particles. I show that a type of contextuality exhibited by a collection of particles (state dependent, state independent, or noncontextual) depends on their type and their number. I also discuss further properties of this generalization and identify major open questions.

  1. Online Identities and Social Networking

    Science.gov (United States)

    Maheswaran, Muthucumaru; Ali, Bader; Ozguven, Hatice; Lord, Julien

    Online identities play a critical role in the social web that is taking shape on the Internet. Despite many technical proposals for creating and managing online identities, none has received widespread acceptance. Design and implementation of online identities that are socially acceptable on the Internet remains an open problem. This chapter discusses the interplay between online identities and social networking. Online social networks (OSNs) are growing at a rapid pace and has millions of members in them. While the recent trend is to create explicit OSNs such as Facebook and MySpace, we also have implicit OSNs such as interaction graphs created by email and instant messaging services. Explicit OSNs allow users to create profiles and use them to project their identities on the web. There are many interesting identity related issues in the context of social networking including how OSNs help and hinder the definition of online identities.

  2. Gender Socialization and Identity Theory

    Directory of Open Access Journals (Sweden)

    Michael J. Carter

    2014-05-01

    Full Text Available Gender socialization is examined through a social psychological lens by applying identity theory and identity control theory. Current research from the fields of family and sociological social psychology are surveyed to provide a better conception of how the family operates as agents of socialization, and how identities that are cultivated and fostered in youth provide meaning throughout the life course and maintain the social order. The application of identity theory shows how gender is a diffuse status characteristic, which is salient in person, role, and social (group identities, and also across social situations. Identity control theory is applied to show how emotions operate within an internal control system to stabilize gendered identities and perpetuate the social structure. Both theories are specifically applied to understand socialization dynamics that exist for children and families.

  3. Between constitution and interpretation: Identity as history

    Directory of Open Access Journals (Sweden)

    Hilt Annette

    2015-01-01

    Full Text Available The paper focuses on the possibilities to constitute meaning in the „borderline- situations“ (Jaspers of the social sphere, such as the loss of validity of orientation within and experience of reality in the socially shared structures of the lifeworld. On the one hand, I will refer to A. Schutz’ and his constitution-analysis of foreign understanding and of shared meaning; on the other hand, I bear onto I. Kertész literary project to narrate the biography of an Auschwitz-survivor as close to his experiential perspective as possible. I will focus both on the concept of constitution and of interpretation with respect to their enabling of the transcending of a typologized everyday’s world which suppresses subjective meaning and its individual articulation. The main guideline is the problem how identity – i.e. a life-story – is configured out of subjective meaning without recourse to everyday reality. A. Schutz’s and Th. Luckmann’s note on a range of social transcendences and on biographical categories referring to the constitution of a socially shared meaning offer a theoretical perspective for dealing with constitutive differences within the reach of understanding social meaning; Kertész’ narrative mode expandes this theoretical stance as it problematizes exemplary subjective experience.

  4. Data sharing in neuroimaging research

    Directory of Open Access Journals (Sweden)

    Jean-Baptiste ePoline

    2012-04-01

    Full Text Available Significant resources around the world have been invested in neuroimaging studies of brain function and disease. Easier access to this large body of work should have profound impact on research in cognitive neuroscience and psychiatry, leading to advances in the diagnosis and treatment of psychiatric and neurological disease. A trend toward increased sharing of neuroimaging data has emerged in recent years. Nevertheless, a number of barriers continue to impede momentum. Many researchers and institutions remain uncertain about how to share data or lack the tools and expertise to participate in data sharing. The use of electronic data capture methods for neuroimaging greatly simplifies the task of data collection and has the potential to help standardize many aspects of data sharing. We review here the motivations for sharing neuroimaging data, the current data sharing landscape, and the sociological or technical barriers that still need to be addressed. The INCF Task Force on Neuroimaging Datasharing, in conjunction with several collaborative groups around the world, has started work on several tools to ease and eventually automate the practice of data sharing. It is hoped that such tools will allow researchers to easily share raw, processed, and derived neuroimaging data, with appropriate metadata and provenance records, and will improve the reproducibility of neuroimaging studies. By providing seamless integration of data sharing and analysis tools within a commodity research environment, the Task Force seeks to identify and minimize barriers to data sharing in the field of neuroimaging.

  5. 2012 Information Sharing Environment Performance Data

    Data.gov (United States)

    Information Sharing Environment — This is a survey of federal departments and agencies who share terrorism information and are therefore considered part of the Information Sharing Environment. The...

  6. 2013 Information Sharing Environment Performance Data

    Data.gov (United States)

    Information Sharing Environment — This is a survey of federal departments and agencies who share terrorism information and are therefore considered part of the Information Sharing Environment. The...

  7. Chaotic Dynamics and Application of LCR Oscillators Sharing Common Nonlinearity

    Science.gov (United States)

    Jeevarekha, A.; Paul Asir, M.; Philominathan, P.

    2016-06-01

    This paper addresses the problem of sharing common nonlinearity among nonautonomous and autonomous oscillators. By choosing a suitable common nonlinear element with the driving point characteristics capable of bringing out chaotic motion in a combined system, we obtain identical chaotic states. The dynamics of the coupled system is explored through numerical and experimental studies. Employing the concept of common nonlinearity, a simple chaotic communication system is modeled and its performance is verified through Multisim simulation.

  8. SharePoint User's Guide

    CERN Document Server

    Corporation, Infusion Development

    2009-01-01

    This straightforward guide shows SharePoint users how to create and use web sites for sharing and collaboration. Learn to use the document and picture libraries for adding and editing content, add discussion boards and surveys, receive alerts when documents and information have been added or changed, and enhance security. Designed to help you find answers quickly, the book shows how to make the most of SharePoint for productivity and collaboration.

  9. Challenges in sharing information effectively

    DEFF Research Database (Denmark)

    Sonnenwald, Diane H.

    2006-01-01

    were not recognized; implications of relevant information were not shared; differences in the role and expression of emotions when sharing information was not understood; and, the need to reestablish trust was not recognized. Conclusion. The challenges in information sharing identified here may extend...... to other high stress, unique and complex situations, such as natural disasters. Recommendations for more effective information behaviour techniques in dynamic group work situations are presented....

  10. Challenges in sharing information effectively

    DEFF Research Database (Denmark)

    Sonnenwald, Diane H.

    2006-01-01

    Introduction. The goal of information sharing is to change a person's image of the world and to develop a shared working understanding. It is an essential component of collaboration. This paper examines barriers to sharing information effectively in dynamic group work situations. Method. Three...... to other high stress, unique and complex situations, such as natural disasters. Recommendations for more effective information behaviour techniques in dynamic group work situations are presented....

  11. Keeping identity private

    DEFF Research Database (Denmark)

    Adjei, Joseph K.; Olesen, Henning

    2011-01-01

    Privacy has become a major issue for policy makers. This has been impelled by the rapid development of technologies that facilitate collection, distribution, storage, and manipulation of personal information. Business organizations are finding new ways of leveraging the value derived from consumer...... is an attempt to understand the relationship between individuals’ intentions to disclose personal information, their actual personal information disclosure behaviours, and how these can be leveraged to develop privacy-enhancing identity management systems (IDMS) that users can trust. Legal, regu...... information. On the other hand, consumers have expressed concerns that their rights and ability to control their personal information are violated. Paradoxically, it appears that users provide personal data freely and willingly, as it has been observed on Facebook and other social networks. This study...

  12. When design meets identities

    DEFF Research Database (Denmark)

    Dau, Susanne

    2013-01-01

    The aim of this paper is to present result from the first period of implementing models of blended learning in two Danish educations centers at a University College. The question addressed is how activation of blended learning models in undergraduate education for teacher and radiography affects...... knowledge development and which are the constraints or challenges to take into consideration in the process of implementation. The research takes its departure in the two different models of blended learning designed by teachers in undergraduate education centers. This is an investigation of the first...... through a critical hermeneutical process of prefiguration, configuration and refiguration. The results illustrate a significant impact of students identities as a part of the referential whole, since it is both prerequisite and an obstruction in the activation of blended learning environments...

  13. Identities at Odds

    DEFF Research Database (Denmark)

    Hazel, Spencer

    2015-01-01

    This study offers an interaction analytic account of how linguistic identities in internationalized workplaces in Denmark are indexed against members’ institutional positions in particular interactional settings. Where language policy may not be explicitly articulated between members, it is still...... embedded in how participants micro-manage their interactions, and implicit in how member’s display orientations to deviance, in the case of encountering others in the workplace whose language repertoires or preferences do not meet with expectation pertaining to the institutional position they hold....... The study uses recordings of naturally occurring interaction in different international workplace settings, and argues for greater attention to be paid to the actual language-policy practices in international workplace settings, as a entry point into developing a more nuanced understanding of the practices...

  14. Biometrics and Identity Management

    DEFF Research Database (Denmark)

    security and border control scenarios it is now apparent that the widespread availability of biometrics in everyday life will also spin out an ever increasing number of (private) applications in other domains. Crucial to this vision is the management of the user's identity, which does not only imply...... management. BIOID 2008. The papers are categorized in four classes. These classes represent the 4 working groups of the COST Action 2101. For more information, see http://www.cost2101.org/.   Biometric data quality and multimodal biometric templates, Unsupervised interactive interfaces for multimodal...... of the Workshop are: The European Biometrics Forum, The Danish Biometrics Research Project Consortium, the UK Biometrics Institute and the Institution of Engineering and Technology. The BIOID workshop was jointly organized and held at the Roskilde University in Denmark from May 7 — May 9, 2008....

  15. Identities in Conflict

    DEFF Research Database (Denmark)

    Andersen, Dorte Jagetic

    2015-01-01

    the national public school system. The main hypothesis is, that parts of the dysfunction stems from the national lack of semantics and competence to understand and discuss experience with warzone extremes, children and spouses of Danish Soldiers and Veterans miss the language to talk and be silent. I propose......, that systems theory is both able and competent to analyze the missing gaps and empty spaces of the competing identities inside and outside the forms of peace and war. Through the use of Luhmannian systems theory and form analysis, the children and partners of war veterans give us the chance to observe...... 'inbetween'. In public education, those Soldier-kids often show abnormal behaviour and dysfunctional social integration and mental regulation. Health Care Systems and social workers turn to diagnoses of secondary traumatization, attachment disorder and develop therapies to calm the effects of exposure to War...

  16. Scripting Professional Identities

    DEFF Research Database (Denmark)

    Bévort, Frans; Suddaby, Roy

    2016-01-01

    This article examines how individual accountants subjectively interpret competing logics of professionalism as they transform from practicing accountants to managerial roles and as their organizations transform from traditional professional partnerships to more corporate organizational forms. Based...... on a longitudinal ethnography of professionals in a Big Four accounting firm we analyse the process by which individual professionals make sense of their new roles and integrate the conflicting demands of professional and managerial logics. We find that individuals are active authors of their own identity scripts...... logics is based less of inter-subjective interactions, as prior literature has assumed, and is, instead, based on individual cognition and interpretive subjectivity. We also contribute to research in professional service firms by offering a conceptual model of the individual micro-processes required...

  17. Nostalgia and lost identity.

    Science.gov (United States)

    Pourtova, Elena

    2013-02-01

    Nostalgia for the Soviet Union is a major social phenomenon in Russia today due to the irrevocable losses of the recent past in which Soviet citizens involuntarily became immigrants in their own country. With reference to discussions of nostalgia in philosophical and psychoanalytic literature, I suggest that nostalgia may represent either a defensive regression to the past or a progressive striving for wholeness through re-connecting with what has been lost in the service of a greater integration. I compare this with the processes of adaptation seen in immigrants and provide a clinical illustration of a young man coming to terms with loss and change in the post-Soviet era. When nostalgia is recognized as a legitimate emotional experience it may facilitate mourning and enable the integration of the past with the present and the development of a new identity.

  18. When design meets identities

    DEFF Research Database (Denmark)

    Dau, Susanne

    2013-01-01

    The aim of this paper is to present result from the first period of implementing models of blended learning in two Danish educations centers at a University College. The question addressed is how activation of blended learning models in undergraduate education for teacher and radiography affects...... through a critical hermeneutical process of prefiguration, configuration and refiguration. The results illustrate a significant impact of students identities as a part of the referential whole, since it is both prerequisite and an obstruction in the activation of blended learning environments...... knowledge development and which are the constraints or challenges to take into consideration in the process of implementation. The research takes its departure in the two different models of blended learning designed by teachers in undergraduate education centers. This is an investigation of the first...

  19. Bridges or Barriers? Conceptualization of the Role of Multiple Identity Gateway Groups in Intergroup Relations

    Directory of Open Access Journals (Sweden)

    Aharon Levy

    2017-06-01

    Full Text Available The modern era of globalization has been accompanied by a massive growth in interconnections between groups, and has led to the sharing of multiple identities by individuals and groups. Following these developments, research has focused on the issue of multiple identities, and has shed important light on how individuals who hold these complex forms of identity feel and behave, and on the reactions they elicit from members of other groups. However, the potential of groups with such multiple identities (e.g., biracials, immigrants, etc. to affect the intergroup relations between the groups that represent the respective sources of the different identities (e.g., Blacks and Whites, country of origin and country of residence, etc. has not been examined to date. Accordingly, in this paper, we first systematically explore the potential of groups in which people identify with multiple social categories, or groups that are perceived as such by others, to play a role in intergroup dynamics. Next, we offer a theoretical framework outlining what functions groups of people with shared multiple identities may serve (as bridges or barriers by proposing how their presence may facilitate or deteriorate intergroup relations. Finally, we present recent empirical research examining how groups of people with shared multiple identities can act as gateways and bridge the cleft between two separate groups that represent the respective sources of their different identities, and discuss the theoretical and practical implications for the field of intergroup relations.

  20. Creation, Identity and Reflection

    Directory of Open Access Journals (Sweden)

    Alina Beatrice Cheşcă

    2015-05-01

    Full Text Available The paper “Creation, Identity and Reflection” approaches the identification in the “mirror” of reality with creation, in other words seeking the authors’ identity in the reflected images. Reflection means attempting to find oneself, the mirror being the main principle of creation. Many characters become interesting only when they step into the world beyond the mirror, when their faces are doubled by the other self or when their selves are returned by other characters. The narcissistic concept of the mirror, i.e. the reflection in the mirror and the representation of the mirror itself, is a recurrent one in literature, but the reflection of the self which is not the self (as it is a reflection does not necessarily appear in a mirror or in a photograph or portrait. Sometimes, the not-self is returned to the self by another person or character. As far as Oscar Wilde’s theories are concerned, the main idea is that people are interesting for their masks, not for their inner nature. What Wilde calls “inner nature” is the characters’ un-reflected self and the mask is the reflection, the self in the mirror. Some characters’ relationships develop within a fiction that they dramatically try to preserve and protect with the risk of suffering. They refuse to take off the masks which define them in the others’ minds and hearts; the narcissistic individuals (both artists and characters seek and love their own image which they project upon facts, thus creating a fictive realm.

  1. Identity at work: Exploring strategies for Identity Work

    Directory of Open Access Journals (Sweden)

    Byron G. Adams

    2012-01-01

    Full Text Available Orientation: This study explored strategies for identity work that are central to the negotiation and regulation of employee work identity.Research purpose: The main aim of this study was to explore employee narratives and identify the strategies available to them in the process of identity work, as they defined themselves at work.Motivation for the study: As there is a scarcity of research on identity work in South Africa, this study wanted to advance knowledge about identity work and the strategies used for regulating and negotiating an identity at work by exploring these constructs in this context.Research design, approach and method: A qualitative research process formed the basis for this study. Nineteen employees from a global manufacturing company participated in two semi-structured in-depth interviews. Grounded theory was applied to analyse and interpret the data.Main findings: Nine strategies for identity work were identified and categorised into four broad themes (personal philosophies; relationships; career management and negotiating balance.Practical/managerial implications: Employees followed various strategies for defining themselves at work and this may have some implications for employee work engagement and productivity.Contribution/value-add: This study expands on current theoretical knowledge of identity work, and provides insights into the strategies people use to regulate and negotiate their identities at work. 

  2. Swiss identity smells like chocolate: Social identity shapes olfactory judgments.

    Science.gov (United States)

    Coppin, Géraldine; Pool, Eva; Delplanque, Sylvain; Oud, Bastiaan; Margot, Christian; Sander, David; Van Bavel, Jay J

    2016-10-11

    There is extensive evidence that social identities can shape people's attitudes and behavior, but what about sensory judgments? We examined the possibility that social identity concerns may also shape the judgment of non-social properties-namely, olfactory judgment. In two experiments, we presented Swiss and non-Swiss participants with the odor of chocolate, for which Switzerland is world-famous, and a control odor (popcorn). Swiss participants primed with Swiss identity reported the odor of chocolate (but not popcorn) as more intense than non-Swiss participants (Experiments 1 and 2) and than Swiss participants primed with individual identity or not primed (Experiment 2). The self-reported intensity of chocolate smell tended to increase as identity accessibility increased-but only among Swiss participants (Experiment 1). These results suggest that identity priming can counter-act classic sensory habituation effects, allowing identity-relevant smells to maintain their intensity after repeated presentations. This suggests that social identity dynamically influences sensory judgment. We discuss the potential implications for models of social identity and chemosensory perception.

  3. Modeling Shared Variables in VHDL

    DEFF Research Database (Denmark)

    Madsen, Jan; Brage, Jens P.

    1994-01-01

    A set of concurrent processes communicating through shared variables is an often used model for hardware systems. This paper presents three modeling techniques for representing such shared variables in VHDL, depending on the acceptable constraints on accesses to the variables. Also a set of guide......A set of concurrent processes communicating through shared variables is an often used model for hardware systems. This paper presents three modeling techniques for representing such shared variables in VHDL, depending on the acceptable constraints on accesses to the variables. Also a set...

  4. Technology Mediated Information Sharing (Monitor Sharing) in Primary Care Encounters

    Science.gov (United States)

    Asan, Onur

    2013-01-01

    The aim of this dissertation study was to identify and describe the use of electronic health records (EHRs) for information sharing between patients and clinicians in primary-care encounters and to understand work system factors influencing information sharing. Ultimately, this will promote better design of EHR technologies and effective training…

  5. Processor-sharing queues and resource sharing in wireless LANs

    NARCIS (Netherlands)

    Cheung, Sing Kwong

    2007-01-01

    In the past few decades, the processor-sharing (PS) model has received considerable attention in the queueing theory community and in the field of performance evaluation of computer and communication systems. The scarce resource is simultaneously shared among all users in these systems. PS models ar

  6. Efficient identity management and access control in cloud environment

    Science.gov (United States)

    Gloster, Jonathan

    2013-05-01

    As more enterprises are enticed to move data to a cloud environment to enhance data sharing and reduce operating costs by exploiting shared resources, concerns have risen over the ability to secure information within the cloud. This paper examines how a traditional Identity and Access Control (IDAM) architecture can be adapted to address security concerns of a cloud environment. We propose changing the paradigm of IDAM form a pure trust model to a risk based model will enable information to be protected securely in a cloud environment without impacting efficiencies of cloud environments.

  7. CILogon: An Integrated Identity and Access Management Platform for Science

    Science.gov (United States)

    Basney, J.

    2016-12-01

    When scientists work together, they use web sites and other software to share their ideas and data. To ensure the integrity of their work, these systems require the scientists to log in and verify that they are part of the team working on a particular science problem. Too often, the identity and access verification process is a stumbling block for the scientists. Scientific research projects are forced to invest time and effort into developing and supporting Identity and Access Management (IAM) services, distracting them from the core goals of their research collaboration. CILogon provides an IAM platform that enables scientists to work together to meet their IAM needs more effectively so they can allocate more time and effort to their core mission of scientific research. The CILogon platform enables federated identity management and collaborative organization management. Federated identity management enables researchers to use their home organization identities to access cyberinfrastructure, rather than requiring yet another username and password to log on. Collaborative organization management enables research projects to define user groups for authorization to collaboration platforms (e.g., wikis, mailing lists, and domain applications). CILogon's IAM platform serves the unique needs of research collaborations, namely the need to dynamically form collaboration groups across organizations and countries, sharing access to data, instruments, compute clusters, and other resources to enable scientific discovery. CILogon provides a software-as-a-service platform to ease integration with cyberinfrastructure, while making all software components publicly available under open source licenses to enable re-use. Figure 1 illustrates the components and interfaces of this platform. CILogon has been operational since 2010 and has been used by over 7,000 researchers from more than 170 identity providers to access cyberinfrastructure including Globus, LIGO, Open Science Grid

  8. Drug-Related Identity Change

    Directory of Open Access Journals (Sweden)

    ferydoon Seyed Rabiee

    2004-02-01

    Full Text Available Our study is concentrating on understanding drug-related identity process which may enter important sociological visions into drug abuse pathology. It is in the framework of symbolic proactivity، cultural studies and the existing model for analyzing drug-related identity (Anderson – 1994. In this study، we have used a qualitative survey and a model test in a statistical sample cosisting white/black males and females who are under drug abuse treatment in Middle Michigan. Our data shows that identity change occures during childihood or early adolescence and is accompanied with experiences of isolationism before drug abuse which facilitates the creation of an afflicted identity as well as the loss of the ability to control the personal identity. Assimilation and drug abuse subculture have represented altenative identities for resolving such an unsuitable situation.

  9. The construction of identities, a task attributed to the school and the teachers

    Directory of Open Access Journals (Sweden)

    Francisco Rodríguez Lestegás

    2008-04-01

    Full Text Available The traditional conceptualization of a collective identity linked to a state-nation is being seriously questioned. The vindication of specific identities on the part of several regional, ethnic or cultural groups coexists with a globalisation process that tends towards cultural standardization and the uniformity of ways of life and shared values. This paper deals with the process of incorporation of the knowledge of Europe into the school culture and the outstanding role of the school and the teachers in the construction of an intercultural European identity based on the acceptance of multiple simultaneous identities.

  10. Representing Identity and Equivalence for Scientific Data

    Science.gov (United States)

    Wickett, K. M.; Sacchi, S.; Dubin, D.; Renear, A. H.

    2012-12-01

    Matters of equivalence and identity are central to the stewardship of scientific data. In order to properly prepare for and manage the curation, preservation and sharing of digitally-encoded data, data stewards must be able to characterize and assess the relationships holding between data-carrying digital resources. However, identity-related questions about resources and their information content may not be straightforward to answer: for example, what exactly does it mean to say that two files contain the same data, but in different formats? Information content is frequently distinguished from particular representations, but there is no adequately developed shared understanding of what this really means and how the relationship between content and its representations hold. The Data Concepts group at the Center for Informatics Research in Science and Scholarship (CIRSS), University of Illinois at Urbana Champaign, is developing a logic-based framework of fundamental concepts related to scientific data to support curation and integration. One project goal is to develop precise accounts of information resources carrying the same data. We present two complementary conceptual models for information representation: the Basic Representation Model (BRM) and the Systematic Assertion Model (SAM). We show how these models provide an analytical account of digitally-encoded scientific data and a precise understanding of identity and equivalence. The Basic Representation Model identifies the core entities and relationships involved in representing information carried by digital objects. In BRM, digital objects are symbol structures that express propositional content, and stand in layered encoding relationships. For example, an RDF description may be serialized as either XML or N3, and those expressions in turn may be encoded as either UTF-8 or UTF-16 sequences. Defining this encoding stack reveals distinctions necessary for a precise account of identity and equivalence

  11. Personal identity and eastern thought

    Directory of Open Access Journals (Sweden)

    Correia Carlos João

    2009-01-01

    Full Text Available This paper aims to show that the problem of personal identity is a fundamental question of the classical Indian thought. Usually we tend to think that personal identity is a Western philosophical subject, and so we tend to forget the significance of the Self (Atman in Hinduism and even in Buddhism. The author shows how the Indian thought approached the question of personal identity and which was the singular solution outlined in the work consensually attributed to Gotama, the Buddha.

  12. An 'open source' networked identity

    DEFF Research Database (Denmark)

    Larsen, Malene Charlotte

    2013-01-01

    , but also an important part of their self-presentation online. It is discussed why these emotional statements are almost always publically available – or even strategically, intentionally placed on the young people's profiles. In relation to this, it is argued that young people – through their emotional...... communicative actions – are not only performing their own identity, but are becoming co-constructors of each other's identities, which the author characterizes as an 'open source' networked identity....

  13. NEW MEDIA AS A CATALYST OF EUROPEAN IDENTITY

    Directory of Open Access Journals (Sweden)

    Elena-Madalina VATAMANESCU

    2015-10-01

    Full Text Available The European Union continuously endeavors to submit to an integrative framework which support the formation of a European spirit and identity. Among the accelerating factors, new media stands for a catalyst of European integration, online networks supporting the users to share opinions, experiences, information, etc. The interactivity provided by new media allow Europeans to learn more about each other and to discover similar or subsidiary objectives. Here, the paper aims to investigate the role of new media in the reconfiguration of social relationships which encompass a shared identity. To this end, several in-depth interviews were conducted with active users who are anchored in online European debates. As the findings showed, new media facilitate people’s engagement in virtual relations and supports the creation of social groups with similar values and standpoints on the European constructs.

  14. Risk Sharing in Labour Markets

    NARCIS (Netherlands)

    Bigsten, Arne; Collier, Paul; Dercon, Stefan; Fafchamps, Marcel; Gunning, Jan Willem; Oduro, Abena; Oostendorp, Remco; Pattillo, Cathy; Soderbom, Mans; Teal, Francis; Zeufack, Albert

    2003-01-01

    Empirical work in labour economics has focused on rent sharing as an explanation for the observed correlation in cross-sections between wages and profitability. The alternative explanation of risk sharing between workers and employers has not been tested. Using a unique panel data set for four Afric

  15. Resource Sharing in Community Colleges.

    Science.gov (United States)

    Meyer, Frank; Hines, Edward; Lupo, Anita; Ley, Connie

    1998-01-01

    Presents a study analyzing voluntary resource sharing practices in a state population of 49 community colleges. Asserts that while resource sharing has been used primarily to solve short-term needs, it should be integrated in strategic and long-term fiscal planning. (JDI)

  16. The Nominal Share Price Puzzle

    National Research Council Canada - National Science Library

    William C. Weld; Roni Michaely; Richard H. Thaler; Shlomo Benartzi

    2009-01-01

    ... investigate in this paper is whether vestigial norms and customs affect corporate decision making. Consider the following fact: The average nominal price for a share of stock on the New York Stock exchange has remained roughly constant (about $35) since the Great Depression. The mechanism that has allowed share prices to remain remarkably con...

  17. Food Sharing: An Evolutionary Perspective.

    Science.gov (United States)

    Feinman, Saul

    Food altruism and the consumption of food are examined from a sociological perspective which assumes that humans share food as inclusive fitness actors. Inclusive fitness implies the representation of an individual's genes in future generations through his own or others' offspring. The discussion includes characteristics of food sharing among kin…

  18. Knowledge Sharing: Developing from within

    Science.gov (United States)

    Patrick, Keith; Dotsika, Fefie

    2007-01-01

    Purpose: If collaboration and knowledge sharing lie at the core of providing added-value to either services or products can we improve this process? The purpose of this paper is to suggest that it can be improved and this lies in how we develop the systems that support collaboration and knowledge sharing. This can be achieved within the…

  19. Food Sharing: An Evolutionary Perspective.

    Science.gov (United States)

    Feinman, Saul

    Food altruism and the consumption of food are examined from a sociological perspective which assumes that humans share food as inclusive fitness actors. Inclusive fitness implies the representation of an individual's genes in future generations through his own or others' offspring. The discussion includes characteristics of food sharing among kin…

  20. SECTORAL SHARES AND ECONOMIC GROWTH

    DEFF Research Database (Denmark)

    Ahmad, Nisar; Naveed, Amjad; Naz, Amber

    2013-01-01

    In developed countries, the share of services and industrial sector has increased in the past few decades and at the same time the share of agriculture sector went down considerably. In the literature, there exists a debate about structural change in the developed countries. Neoclassical economists...

  1. Work sharing in Kerela's fisheries

    NARCIS (Netherlands)

    Berg, van den M.M.; Lensing, B.J.

    2007-01-01

    Earlier studies suggest that once population growth and market integration reach a certain critical level, traditional practices of work sharing tend to degenerate or disappear altogether. Work sharing has, however, survived to date in small-scale fisheries in Kerala, India. Artisanal fishermen

  2. Governing Individual Knowledge Sharing Behavior

    DEFF Research Database (Denmark)

    Minbaeva, Dana; Pedersen, Torben

    2010-01-01

    The emerging Knowledge Governance Approach asserts the need to build microfoundations grounded in individual action. Toward this goal, using the Theory of Planned Behavior, we aim to explain individual knowledge sharing behavior as being determined by the intention to share knowledge and its...

  3. Threading "Stitches" to Approach Gender Identity, Sexual Identity, and Difference

    Science.gov (United States)

    North, Connie E.

    2010-01-01

    As LGBTQI (lesbian, gay, bisexual, transgender, queer/questioning, and intersex) issues become increasingly integrated into multicultural education discourses, we as educators need to examine the implications of our pedagogies for teaching about gender and sexual identities. This article explores my teaching of non-conforming gender identities in…

  4. High School Identity Climate and Student Identity Development

    Science.gov (United States)

    Rich, Yisrael; Schachter, Elli P.

    2012-01-01

    This research investigated whether schools characterized by high school students as being rich in identity promoting features contribute to student identity development. A theoretical model posited that student perceptions of teachers as caring role models and their school as cultivating the whole student will foster student exploration and…

  5. Networked identity: how immigrant youth employ online identity resources

    NARCIS (Netherlands)

    Prinsen, Fleur; de Haan, Mariette; Leander, Kevin

    2015-01-01

    In recent years, practices of online social networking and their implications for migrant youth identity development have been heavily debated. The nature of access to resources for identification is changing, and by using a social network perspective, this research conceptualizes identity as a netw

  6. Social Identity Change: Shifts in Social Identity during Adolescence

    Science.gov (United States)

    Tanti, Chris; Stukas, Arthur A.; Halloran, Michael J.; Foddy, Margaret

    2011-01-01

    This study investigated the proposition that adolescence involves significant shifts in social identity as a function of changes in social context and cognitive style. Using an experimental design, we primed either peer or gender identity with a sample of 380 early- (12-13 years), mid- (15-16 years), and late-adolescents (18-20 years) and then…

  7. Identity Support, Identity Devaluation, and Well-Being among Lesbians

    Science.gov (United States)

    Beals, Kristin P.; Peplau, Letitia Anne

    2005-01-01

    This research tested predictions about the association of identity support and identity devaluation with psychological well-being (self-esteem, life satisfaction, and depression). Lesbian women completed baseline surveys (N=42), then provided daily experience reports during a 2-week period (n=38), and completed a 2-month follow-up survey (n=34).…

  8. Men as Victims: "Victim" Identities, Gay Identities, and Masculinities

    Science.gov (United States)

    Dunn, Peter

    2012-01-01

    The impact and meanings of homophobic violence on gay men's identities are explored with a particular focus on their identities as men and as gay men. Homosexuality can pose a challenge to conventional masculinities, and for some gay men, being victimized on account of sexual orientation reawakens conflicts about their masculinity that they…

  9. Identity Support, Identity Devaluation, and Well-Being among Lesbians

    Science.gov (United States)

    Beals, Kristin P.; Peplau, Letitia Anne

    2005-01-01

    This research tested predictions about the association of identity support and identity devaluation with psychological well-being (self-esteem, life satisfaction, and depression). Lesbian women completed baseline surveys (N=42), then provided daily experience reports during a 2-week period (n=38), and completed a 2-month follow-up survey (n=34).…

  10. Exploring the Key Factors of Knowledge Sharing via Employee Weblogs

    Directory of Open Access Journals (Sweden)

    Saeed Rahimi Moghadam

    2013-10-01

    Full Text Available In this study, two dependent variables of individual's intention and attitude have been defined for knowledge sharing via the employee weblog and independent variables have been determined in 3 groups of social influence factor, technology acceptance factor and social cognitive factor with subset variables including the subjective norm, social identity, group norm (first group, perceived usefulness, perceived ease of use, perceived enjoyment (second group, self-efficacy, personal outcome expectation, altruism and trust (third group. This research reviews the previous studies in the field of knowledge sharing via the employee weblog. The main difference of this research with other studies is to collect and complete a full set of factors affecting the knowledge sharing according to the factors raised in previous studies. Finally the suggestions have been provided for conducting the statistical studies in Iran.

  11. Cognition and Knowledge Sharing in Post-acquisition Integration

    DEFF Research Database (Denmark)

    Jaura, Manya; Michailova, Snejina

    2014-01-01

    Purpose:The purpose of this paper is to examine the influence of cognition on knowledge sharing between members of the acquiring and acquired organisations in the post-acquisition integration process. It specifically analyses differentiation between in-groups and out-groups, the perception...... of organisational identity and interaction among members of the acquired and acquiring organisations and how these three factors affect knowledge sharing. Design/methodology/approach: The authors develop theoretical propositions and conduct an explorative pilot study on the basis of original interview data...... conducted with ten respondents in four Indian IT companies that have acquired firms abroad. Findings: The authors find evidence for supporting the negative effect of in- and out-groups differentiation and the positive effect of interpersonal interaction on knowledge sharing among employees of the acquired...

  12. Knowledge Sharing and National Culture

    DEFF Research Database (Denmark)

    Michailova, Snejina; Hutchings, Kate

    2004-01-01

    Much of the knowledge management literature tends to assume a rather universalistunderstanding of knowledge sharing. Yet, attitudes to knowledge sharing as well as actualknowledge-sharing behaviour depend on conditions that vary across institutional and culturalenvironments. This paper contributes...... to the knowledge-sharing literature by specificallydiscussing the interplay between knowledge-sharing and national cultural factors in the context oftransition countries. The paper engages in a comparative examination of two major transitionsocieties, China and Russia, and contributes to understanding...... the complexity of differencesbetween transition economies. The paper is written as a set of theoretical arguments andpropositions that is designed to elucidate more nuanced ways of thinking about knowledgesharing in China and Russia. We argue that in the case of China and Russia, verticalindividualism...

  13. AKUISISI DAN BUDAYA KNOWLEDGE SHARING

    Directory of Open Access Journals (Sweden)

    Nuril Kusumawardhani Soeprapto Putri

    2011-05-01

    Full Text Available Large companies which are experiencing barriers in innovation often take a radical step to acquire knowledge, namely acquisition. Though innovation is not the only reason, acquisition will result in the company wishes to achieve competitive advantage affected by the creation of ideas, creativity and innovation. The three points can be achieved more easily when the knowledge sharing within the organization / company runs well. However, the acquisition maybe impacts as a counter-attack for the knowledge sharing culture both in the acquisitor and company which obtains the acquisition. Therefore, a key to succeed the acquisition is a sharing culture among individuals within a company that runs well or even better. Individuals from the acquisitor and those of the company that obtains the acquisition can adapt to each other and have confidence in order not to hinder them to share knowledge. This study discusses in detail the potential impacts of an acquisition upon a knowledge sharing culture in a company.

  14. Knowledge Sharing and National Culture

    DEFF Research Database (Denmark)

    Michailova, Snejina; Hutchings, Kate

    2004-01-01

    Much of the knowledge management literature tends to assume a rather universalistunderstanding of knowledge sharing. Yet, attitudes to knowledge sharing as well as actualknowledge-sharing behaviour depend on conditions that vary across institutional and culturalenvironments. This paper contributes...... to the knowledge-sharing literature by specificallydiscussing the interplay between knowledge-sharing and national cultural factors in the context oftransition countries. The paper engages in a comparative examination of two major transitionsocieties, China and Russia, and contributes to understanding...... the complexity of differencesbetween transition economies. The paper is written as a set of theoretical arguments andpropositions that is designed to elucidate more nuanced ways of thinking about knowledgesharing in China and Russia. We argue that in the case of China and Russia, verticalindividualism...

  15. Identity text: an educational intervention to foster cultural interaction

    Directory of Open Access Journals (Sweden)

    Zareen Zaidi

    2016-11-01

    Full Text Available Background: Sociocultural theories state that learning results from people participating in contexts where social interaction is facilitated. There is a need to create such facilitated pedagogical spaces where participants can share their ways of knowing and doing. The aim of this exploratory study was to introduce pedagogical space for sociocultural interaction using ‘Identity Text’. Methods: Identity Texts are sociocultural artifacts produced by participants, which can be written, spoken, visual, musical, or multimodal. In 2013, participants of an international medical education fellowship program were asked to create their own Identity Texts to promote discussion about participants’ cultural backgrounds. Thematic analysis was used to make the analysis relevant to studying the pedagogical utility of the intervention. Result: The Identity Text intervention created two spaces: a ‘reflective space’, which helped participants reflect on sensitive topics such as institutional environments, roles in interdisciplinary teams, and gender discrimination, and a ‘narrative space’, which allowed participants to tell powerful stories that provided cultural insights and challenged cultural hegemony; they described the conscious and subconscious transformation in identity that evolved secondary to struggles with local power dynamics and social demands involving the impact of family, peers, and country of origin. Conclusion: While the impact of providing pedagogical space using Identity Text on cognitive engagement and enhanced learning requires further research, the findings of this study suggest that it is a useful pedagogical strategy to support cross-cultural education.

  16. Configurations of self-identity formations of adults who stutter

    Directory of Open Access Journals (Sweden)

    Harsha Kathard

    2010-12-01

    Full Text Available The aims of this paper are twofold: Firstly, to describe the configuration of self-identity formations evident across and within research stories of adults living with stuttering; and secondly, to discuss the clinical implications of these findings. The study on which this paper is based used life history narratives to describe the types, processes and configurations of self-identity formations of adults who stuttered since childhood. Through open-ended, in-depth interviews 7 participants shared their experiences of living with stuttering. The interviews were analysed at a first level using narrative analysis and at a second level to further describe the types, processes and configurations of self-identity formations evident in the stories. The findings on configurations of self-identity formations were that the two types of self-identity formations Able and DisOther were present in singular and dual configurations. The dual self-identity formations occurred in co-existing, competing and coalescing relationships within particular time periods in their stories. The clinical implications of the findings are discussed.

  17. Identity text: an educational intervention to foster cultural interaction.

    Science.gov (United States)

    Zaidi, Zareen; Verstegen, Daniëlle; Naqvi, Rahat; Dornan, Tim; Morahan, Page

    2016-01-01

    Sociocultural theories state that learning results from people participating in contexts where social interaction is facilitated. There is a need to create such facilitated pedagogical spaces where participants can share their ways of knowing and doing. The aim of this exploratory study was to introduce pedagogical space for sociocultural interaction using 'Identity Text'. Identity Texts are sociocultural artifacts produced by participants, which can be written, spoken, visual, musical, or multimodal. In 2013, participants of an international medical education fellowship program were asked to create their own Identity Texts to promote discussion about participants' cultural backgrounds. Thematic analysis was used to make the analysis relevant to studying the pedagogical utility of the intervention. The Identity Text intervention created two spaces: a 'reflective space', which helped participants reflect on sensitive topics such as institutional environments, roles in interdisciplinary teams, and gender discrimination, and a 'narrative space', which allowed participants to tell powerful stories that provided cultural insights and challenged cultural hegemony; they described the conscious and subconscious transformation in identity that evolved secondary to struggles with local power dynamics and social demands involving the impact of family, peers, and country of origin. While the impact of providing pedagogical space using Identity Text on cognitive engagement and enhanced learning requires further research, the findings of this study suggest that it is a useful pedagogical strategy to support cross-cultural education.

  18. Habermas on European Constitution and European Identity

    Directory of Open Access Journals (Sweden)

    Éva Biró-Kaszás

    2010-12-01

    Full Text Available For the last two decades or so philosophers have been reflecting on a set of practical and political concerns in connection with the new political structural arrangements beyond the nation-state. In this article two essays by Jürgen Habermas shall be examined. An attempt shall be made to tackle Habermas’ philosophical concepts of personal and collective identity as well as the role that a constitution may play in building the post-national constellation. It has been shown that Habermas has normative answers. Firstly, according to him, the fragile balance between the legal order and the particular cultures and traditions of a community has to be protected by the constitutional state. For that reason the political culture has to be “decoupled” from the majority culture. Secondly, the democratically structured attempt to achieve shared meaning has to find the delicate balance between the context-transcending universal normative claims and the claims of particular individual and collective life. Thirdly, it is possible to expand legally mediated civil solidarity trans-nationally, across Europe – we may recognize this development as the emergence of European identity –, since the process of democratic will-formation of citizens may get loose from the structures provided by the state if both shared democratic political cultures as well as a European-wide public sphere exist. The European Constitution may have a catalytic function in materialization of these conditions. It has been shown that in his deliberations Habermas tried to find a reflective equilibrium between the normative and the empirical.

  19. Inferring Identity From Language: Linguistic Intergroup Bias Informs Social Categorization.

    Science.gov (United States)

    Porter, Shanette C; Rheinschmidt-Same, Michelle; Richeson, Jennifer A

    2016-01-01

    The present research examined whether a communicator's verbal, implicit message regarding a target is used as a cue for inferring that communicator's social identity. Previous research has found linguistic intergroup bias (LIB) in individuals' speech: They use abstract language to describe in-group targets' desirable behaviors and concrete language to describe their undesirable behaviors (favorable LIB), but use concrete language for out-group targets' desirable behaviors and abstract language for their undesirable behaviors (unfavorable LIB). Consequently, one can infer the type of language a communicator is likely to use to describe in-group and out-group targets. We hypothesized and found evidence for the reverse inference. Across four studies, individuals inferred a communicator's social identity on the basis of the communicator's use of an LIB. Specifically, participants more strongly believed that a communicator and target shared a social identity when the communicator used the favorable, rather than the unfavorable, LIB in describing that target.

  20. Origin and identity of Fejervarya (Anura: Dicroglossidae) on Guam

    Science.gov (United States)

    Wostl, Elijah; Smith, Eric N.; Reed, Robert

    2016-01-01

    We used morphological and molecular data to infer the identity and origin of frogs in the genus Fejervarya that have been introduced to the island of Guam. Mensural and meristic data were collected from 96 specimens from throughout their range on the island and a principal component analysis was used to investigate the distribution of these data in morphological space. We also amplified a fragment of the 16S ribosomal ribonucleic acid mitochondrial gene from 27 of these specimens and compared it to 63 published sequences of Fejervarya and the morphologically similar Zakerana. All examined Fejervarya from Guam are morphologically indistinguishable and share an identical haplotype. The molecular data identify them as Fejervarya cancrivora with a haplotype identical to F. cancrivora from Taiwan.

  1. Supporting Biracial Children's Identity Development.

    Science.gov (United States)

    Morrison, Johnetta Wade; Bordere, Tashel

    2001-01-01

    Discusses stages of identity development in early childhood, as well as ways teachers can be supportive of that development. Addresses components of identity development in young children, parental preferences, valuing diversity, and curriculum recommendations. Provides suggestions appropriate for children of any racial combination. (SD)

  2. Teacher Investment in Learner Identity

    Science.gov (United States)

    Reeves, Jenelle

    2009-01-01

    From a sociocultural perspective, teacher identity is constructed in relation to others, including other teachers and students. Drawing on positioning theory and the concept of investment, this study analyzed the case of a secondary English teacher who negotiated his teacher identity in relation to English language learners (ELLs). Findings…

  3. Identity and the Management Project

    DEFF Research Database (Denmark)

    Jørgensen, Kenneth Mølbjerg; Dehlin, Erlend

    and family resemblance. As such, managing identity in organizations is closely linked to rules and family resemblance. Organizations manage identity through the definition of norms and values for right or wrong, appropriate or inappropriate, to name but a few. Norms and values are important as reference...

  4. Food, Identity, and Environmental Education

    Science.gov (United States)

    Stapleton, Sarah Riggs

    2015-01-01

    While food is an exceedingly rich area for environmental education, I caution environmental educators and researchers from moving too quickly into messaging about what people "should" eat, given the many complexities around food and identity. Eating, as an inherently identity-laden practice, is fraught with complicated meanings,…

  5. Identity development in deaf adolescents

    NARCIS (Netherlands)

    Kunnen, E. Saskia

    2014-01-01

    We studied identity development during 5 years in 11 deaf adolescents who attend a school for deaf children in the highest level of regular secondary education (age between 14 and 19 years). Identity development is conceptualized by the processes of exploration and commitment formation, as

  6. Fibonacci Identities, Matrices, and Graphs

    Science.gov (United States)

    Huang, Danrun

    2005-01-01

    General strategies used to help discover, prove, and generalize identities for Fibonacci numbers are described along with some properties about the determinants of square matrices. A matrix proof for identity (2) that has received immense attention from many branches of mathematics, like linear algebra, dynamical systems, graph theory and others…

  7. Identity development in deaf adolescents

    NARCIS (Netherlands)

    Kunnen, E. Saskia

    2014-01-01

    We studied identity development during 5 years in 11 deaf adolescents who attend a school for deaf children in the highest level of regular secondary education (age between 14 and 19 years). Identity development is conceptualized by the processes of exploration and commitment formation, as formulate

  8. Gender identity development in adolescence.

    Science.gov (United States)

    Steensma, Thomas D; Kreukels, Baudewijntje P C; de Vries, Annelou L C; Cohen-Kettenis, Peggy T

    2013-07-01

    This article is part of a Special Issue "Puberty and Adolescence".This article aims to provide an outline of what is currently known on trajectories, and contributing factors to gender identity development in adolescence. We give a historical overview of the concept of gender identity, and describe general identity development in adolescence, gender identity development in the general population and in gender variant youth. Possible psychosocial (such as child and parental characteristics) and biological factors (such as the effects of prenatal exposure to gonadal hormones and the role of genetics) contributing to a gender variant identity are discussed. Studies focusing on a number of psychosocial and biological factors separately, indicate that each of these factors influence gender identity formation, but little is known about the complex interplay between the factors, nor about the way individuals themselves contribute to the process. Research into normative and gender variant identity development of adolescents is clearly lagging behind. However, studies on persons with gender dysphoria and disorders of sex development, show that the period of adolescence, with its changing social environment and the onset of physical puberty, seems to be crucial for the development of a non-normative gender identity. Copyright © 2013 Elsevier Inc. All rights reserved.

  9. Teacher Investment in Learner Identity

    Science.gov (United States)

    Reeves, Jenelle

    2009-01-01

    From a sociocultural perspective, teacher identity is constructed in relation to others, including other teachers and students. Drawing on positioning theory and the concept of investment, this study analyzed the case of a secondary English teacher who negotiated his teacher identity in relation to English language learners (ELLs). Findings…

  10. National Identity in Korean Curriculum

    Science.gov (United States)

    Kim, Hyojeong

    2004-01-01

    The concept of national identity has evolved during the last half century within the Korean social studies curriculum. There have been seven curricular revisions since the first national curriculum was released in 1955. Each time the concept of national identity was changed with the biggest changes to this concept within the last two iterations of…

  11. Exploring Leader Identity and Development.

    Science.gov (United States)

    Priest, Kerry L; Middleton, Eric

    2016-01-01

    Taking on a leader identity can be a motivating force for pursuing leader development. This chapter explores the reciprocal and recursive nature of identity development and leader development, emphasizing how shifting views of self influence one's motivation to develop as a leader.

  12. Identity Research in Mathematics Education

    Science.gov (United States)

    Darragh, Lisa

    2016-01-01

    This paper examines the literature on identity within mathematics education published in journals over the past two decades. It analyses the theoretical underpinnings, research methods and definitions of identity, providing a critique rather than a summary of the literature. A total of 188 articles from 85 different journals are reviewed in the…

  13. Explanatory Identities and Conceptual Change

    Science.gov (United States)

    Thagard, Paul

    2014-01-01

    Although mind-brain identity remains controversial, many other identities of ordinary things with scientific ones are well established. For example, air is a mixture of gases, water is H[subscript 2]O, and fire is rapid oxidation. This paper examines the history of 15 important identifications: air, blood, cloud, earth, electricity, fire, gold,…

  14. Cosmopolitanism and Identity

    Directory of Open Access Journals (Sweden)

    Sami Şener

    2014-11-01

    Full Text Available Cosmopolitism is a complicated concept and has different properties. Pure tangible objects in the world are worth more than those mixed. This character distinguishes objects and gives them a special value. Is the same situation true in the spiritual and moral worlds? Already, every object finds its value in their value world. In particular, this also applies in the real social world in general. Social world has a meaning because of living with others. So, our world enriches with disparateness and this situation adds new values to our life. For this reason It is very importance to know how to keep different cultures together. In general, we mainly reserve a share in a narrow mentality for ourselves. But, when we look to the events from other people‘s perspectives we discern different realities. Today, we face many chaos and social problems. The cause of it that we could not endure living together with others and do not have toleration culture about different groups. Such a behaviour stems from psychological weakness and keep ourselves in the forefront in ethnical issues. Whereas all great success in the history has been obtained by civilizations and leaders who had understood the differentiations as richness. In this subject culture as life philosophy and value of law are quite important concepts. Most important issues will lead us to success and understanding of law in this issue. With this approach we have to behave most suitable attitude to the life and human being without hegemonic or ethnic perspective.

  15. Hierarchy of Modular Graph Identities

    CERN Document Server

    D'Hoker, Eric

    2016-01-01

    The low energy expansion of Type II superstring amplitudes at genus one is organized in terms of modular graph functions associated with Feynman graphs of a conformal scalar field on the torus. In earlier work, surprising identities between two-loop graphs at all weights, and between higher-loop graphs of weights four and five were constructed. In the present paper, these results are generalized in two complementary directions. First, all identities at weight six and all dihedral identities at weight seven are obtained and proven. Whenever the Laurent polynomial at the cusp is available, the form of these identities confirms the pattern by which the vanishing of the Laurent polynomial governs the full modular identity. Second, the family of modular graph functions is extended to include all graphs with derivative couplings and worldsheet fermions. These extended families of modular graph functions are shown to obey a hierarchy of inhomogeneous Laplace eigenvalue equations. The eigenvalues are calculated analy...

  16. National Development Generates National Identities

    Science.gov (United States)

    2016-01-01

    The purpose of the article is to test the relationship between national identities and modernisation. We test the hypotheses that not all forms of identity are equally compatible with modernisation as measured by Human Development Index. The less developed societies are characterised by strong ascribed national identities based on birth, territory and religion, but also by strong voluntarist identities based on civic features selected and/or achieved by an individual. While the former decreases with further modernisation, the latter may either decrease or remain at high levels and coexist with instrumental supranational identifications, typical for the most developed countries. The results, which are also confirmed by multilevel regression models, thus demonstrate that increasing modernisation in terms of development contributes to the shifts from classical, especially ascribed, identities towards instrumental identifications. These findings are particularly relevant in the turbulent times increasingly dominated by the hardly predictable effects of the recent mass migrations. PMID:26841050

  17. Unskilled Work and Learner Identity

    DEFF Research Database (Denmark)

    Kondrup, Sissel

    2014-01-01

    . The main argument is that participation research must abandon the notion of motivation as an individual attribute and apply a dialectic concept of learner identity acknowledging work-life as a pivotal space for learning and formation of identity. I outline how a work-life-historical approach combining...... a critical theoretical approach inspired by Salling-Olesen’s and Archer’s concepts of identity and concerns can contribute to an understanding of the relationship between work and learner identity. Through narrative work-life interviews I examine how engagement in unskilled work in small and medium sized...... Danish enterprises causes a multitude of different and ambiguous immediate experiences and concerns pivotal for the workers’ learner identities....

  18. STORYTELLING AND UNIVERSITY BRANDING IDENTITY

    Directory of Open Access Journals (Sweden)

    ANDREEA MONICA STATE

    2016-08-01

    Full Text Available The present article sets out to clarify the concepts of storytelling and branding, with a focus on university branding and visual identity – the latter being a vital element to a brand’s uniqueness. Storytelling is an important method of brand construction, and it entails a strong power of seduction. Branding is increasingly more about storytelling. Practically, a story is an image made up of facts, feelings and interpretations, which are often told to us solely by the university itself. As such, the brand appears on the market accompanied by its identity. Identity is what we aim to express with help of the brand. Implementing a system of visual identity that would help to harmoniously develop a university brand requires a handbook of visual identity. The present article aims to be a starting point for such a handbook serving the University of Bucharest, which currently does not own such a handbook

  19. Ethnic Identities of University Students

    Directory of Open Access Journals (Sweden)

    Gözde Özdikmenli-Demir

    2014-06-01

    Full Text Available The aim of this article is to understand the relationship between ethnic identity, victimization/witnessing community violence, ethnic discrimination, and aggression in a sample of university students living in the South East Region of Turkey. The participants were 263 university students of predominantly Kurdish ethnic origin. The results showed that males had higher levels of ethnic identity in the dimensions of exploration and commitment. Males also presented higher scores for witnessing community violence and lifetime exposure to ethnic discrimination. The most important predictor of participants’ ethnic identity was witnessing community violence. Participants who witnessed violent acts in their social environment had higher ethnic identity levels. Although the predictor variables could not explain an important part of the participants’ aggression levels, only perceived ethnic discrimination was positively related to aggressive behavior. The role of native language efficiency in ethnic identity is also discussed.

  20. Simulation Analysis of Data Sharing in Shared Memory Multiprocessors

    Science.gov (United States)

    2016-06-14

    Arch86] J. Archibald and J. Baer, "An Evaluation of Cache Coherence So lutions in Shared-Bus Multiprocessors", ACM Transactions on Computer Systen...Agarwal and A. Gupta, "Memory-Refer ence Olaracteristics of Multiprocessor Applications under MACH", Proceedings of the 1 988 ACM Sigmerrics Conference on...Evaluation of Cache Coherence Solutions in Shared-Bus Multiprocessors", ACM Transactions on Computer Systems, 4, 4 (November 1986), 273-298. [Baro85

  1. Gender identity disorder.

    LENUS (Irish Health Repository)

    De Gascun, C

    2006-05-01

    Gender Identity Disorder (GID) is a relatively rare condition of atypical gender development in which there is a psychological perception of self as masculine or feminine which is incongruent with ones phenotype. GID replaced the term Transsexualism in DSM-IV in 1994. The demographics of GID in Ireland have not been established. Since 2000 we have received 52 referrals of individuals with confirmed GID to our endocrine service for consideration for hormonal treatment (HT). Of the 52 patients 45 have male to female (MTF) GID (mean age 38.9 years) and 7 have female to male (FTM) GID (mean age 30.7 years). The age at presentation in this group is approximately 9 years older than in international series for both MTF (39 years v 30yrs) and FTM (31 yrs v 22yrs). The karyotype where analysed has been normal for their phenotypic sex. Twenty-three of the patients had received HT prior to attending our clinic that in only one case had been prescribed by a specialist. A number of patients had obtained HT via the internet or from overseas sources without medical review. Eighteen of the patients have been or are married and 14 of the group have children. The scale of referrals confirms that GID exists in the Irish population to a significant degree. Thus an appropriate care pathway for people with the condition needs to be established. This will facilitate optimum medical management of the patient group and a coherent approach to the many difficult social issues faced individuals with this disorder.

  2. Body integrity identity disorder.

    Directory of Open Access Journals (Sweden)

    Rianne M Blom

    Full Text Available INTRODUCTION: Body Integrity Identity Disorder (BIID is a rare, infrequently studied and highly secretive condition in which there is a mismatch between the mental body image and the physical body. Subjects suffering from BIID have an intense desire to amputate a major limb or severe the spinal cord in order to become paralyzed. Aim of the study is to broaden the knowledge of BIID amongst medical professionals, by describing all who deal with BIID. METHODS: Somatic, psychiatric and BIID characteristic data were collected from 54 BIID individuals using a detailed questionnaire. Subsequently, data of different subtypes of BIID (i.e. wish for amputation or paralyzation were evaluated. Finally, disruption in work, social and family life due to BIID in subjects with and without amputation were compared. RESULTS: Based on the subjects' reports we found that BIID has an onset in early childhood. The main rationale given for their desire for body modification is to feel complete or to feel satisfied inside. Somatic and severe psychiatric co-morbidity is unusual, but depressive symptoms and mood disorders can be present, possibly secondary to the enormous distress BIID puts upon a person. Amputation and paralyzation variant do not differ in any clinical variable. Surgery is found helpful in all subjects who underwent amputation and those subjects score significantly lower on a disability scale than BIID subjects without body modification. CONCLUSIONS: The amputation variant and paralyzation variant of BIID are to be considered as one of the same condition. Amputation of the healthy body part appears to result in remission of BIID and an impressive improvement of quality of life. Knowledge of and respect for the desires of BIID individuals are the first steps in providing care and may decrease the huge burden they experience.

  3. Theatrically Digital: Education and Online Identity

    Directory of Open Access Journals (Sweden)

    Nastaran Khoshsabk

    2017-08-01

    Full Text Available The dramaturgical aspects of using social media are applied in this study from a sociological perspective (Goffman, 1959 to describe the process of gaining a sense of self through learning in online-environments. The exploration of data in this qualitative case study sheds light on the theatrical dimension of virtual self-presentation which can encourage individuals to become engaged in interacting online and, in the process of doing so, learn actively though using social media via its unique audio-visual digital content. Social media tools provide a space for information sharing to fill the gaps when students are unwilling to communicate in face-to-face classrooms because of a particular socio-cultural context. The codes and themes from six months’ Facebook analysis of adult social media users were analysed based on the self-representation of the digital self with relation to their language and cultural background and its influence on the formation of identity. The ‘actual self’, as described in interviews, was being manipulated by individuals for different reasons such as its influence on their social/cultural identity and the development of the self-image. Increasingly, educators in all educational domains are using online social media platforms to support engagement in teaching and learning. It is hoped that this research, by offering increased understanding of the importance of online-communities, will have implications for learning from online contexts, particularly in contexts with socio-cultural boundaries.

  4. On Converting Secret Sharing Scheme to Visual Secret Sharing Scheme

    Directory of Open Access Journals (Sweden)

    Wang Daoshun

    2010-01-01

    Full Text Available Abstract Traditional Secret Sharing (SS schemes reconstruct secret exactly the same as the original one but involve complex computation. Visual Secret Sharing (VSS schemes decode the secret without computation, but each share is m times as big as the original and the quality of the reconstructed secret image is reduced. Probabilistic visual secret sharing (Prob.VSS schemes for a binary image use only one subpixel to share the secret image; however the probability of white pixels in a white area is higher than that in a black area in the reconstructed secret image. SS schemes, VSS schemes, and Prob. VSS schemes have various construction methods and advantages. This paper first presents an approach to convert (transform a -SS scheme to a -VSS scheme for greyscale images. The generation of the shadow images (shares is based on Boolean XOR operation. The secret image can be reconstructed directly by performing Boolean OR operation, as in most conventional VSS schemes. Its pixel expansion is significantly smaller than that of VSS schemes. The quality of the reconstructed images, measured by average contrast, is the same as VSS schemes. Then a novel matrix-concatenation approach is used to extend the greyscale -SS scheme to a more general case of greyscale -VSS scheme.

  5. One Share-One Vote

    DEFF Research Database (Denmark)

    Poulsen, Thomas; Eklund, Johan E.

    Shares with more voting rights than cash flow rights provide their owners with a disproportional influence that is often found to destroy the value of outside equity. This is taken as evidence of discretionary use of power. However, concentration of power does not necessarily result from control...... enhancing mechanisms; it could also be that some shareholders retain a large block in a one share-one vote structure. In this paper, we develop a methodology to disentangle disproportionality, which allows us to test the effect of deviations from one share-one vote more precisely. Our empirical findings add...

  6. Knowledge Sharing is Knowledge Creation

    DEFF Research Database (Denmark)

    Greve, Linda

    2015-01-01

    Knowledge sharing and knowledge transfer are important to knowledge communication. However when groups of knowledge workers engage in knowledge communication activities, it easily turns into mere mechanical information processing despite other ambitions. This article relates literature of knowledge...... reducing complexity and dividing knowledge into to dichotomies or hierarchies, knowledge workers should be enabled to use different strategies for knowledge sharing, -transfer and –creation depending on the task and the nature of the knowledge. However if the ambition is to have a strategy for sharing...

  7. Almost-perfect secret sharing

    CERN Document Server

    Kaced, Tarik

    2011-01-01

    Splitting a secret s between several participants, we generate (for each value of s) shares for all participants. The goal: authorized groups of participants should be able to reconstruct the secret but forbidden ones get no information about it. In this paper we introduce several notions of non- perfect secret sharing, where some small information leak is permitted. We study its relation to the Kolmogorov complexity version of secret sharing (establishing some connection in both directions) and the effects of changing the secret size (showing that we can decrease the size of the secret and the information leak at the same time).

  8. i-Review: Sharing Code

    Directory of Open Access Journals (Sweden)

    Jonas Kubilius

    2014-02-01

    Full Text Available Sharing code is becoming increasingly important in the wake of Open Science. In this review I describe and compare two popular code-sharing utilities, GitHub and Open Science Framework (OSF. GitHub is a mature, industry-standard tool but lacks focus towards researchers. In comparison, OSF offers a one-stop solution for researchers but a lot of functionality is still under development. I conclude by listing alternative lesser-known tools for code and materials sharing.

  9. Identity and Intimacy during Adolescence: Connections among Identity Styles, Romantic Attachment and Identity Commitment

    Science.gov (United States)

    Kerpelman, Jennifer L.; Pittman, Joe F.; Cadely, Hans Saint-Eloi; Tuggle, Felicia J.; Harrell-Levy, Marinda K.; Adler-Baeder, Francesca M.

    2012-01-01

    Integration of adult attachment and psychosocial development theories suggests that adolescence is a time when capacities for romantic intimacy and identity formation are co-evolving. The current study addressed direct, indirect and moderated associations among identity and romantic attachment constructs with a diverse sample of 2178 middle…

  10. Medicaid Disproportionate Share Hospital Payments

    Data.gov (United States)

    U.S. Department of Health & Human Services — Medicaid Disproportionate Share Hospital (DSH) Payments This link provides you with information about Medicaid DSH Payments. You can find information on DSH Audit...

  11. COAST Map Sharing Plugin Project

    Data.gov (United States)

    National Aeronautics and Space Administration — We propose the development of a capability which will allow ecosystem managers to share a map view in terms of location, magnification level, and data layers (to...

  12. Share capitalism and worker wellbeing().

    Science.gov (United States)

    Bryson, Alex; Clark, Andrew E; Freeman, Richard B; Green, Colin P

    2016-10-01

    We show that worker wellbeing is determined not only by the amount of compensation workers receive but also by how compensation is determined. While previous theoretical and empirical work has often been preoccupied with individual performance-related pay, we find that the receipt of a range of group-performance schemes (profit shares, group bonuses and share ownership) is associated with higher job satisfaction. This holds conditional on wage levels, so that pay methods are associated with greater job satisfaction in addition to that coming from higher wages. We use a variety of methods to control for unobserved individual and job-specific characteristics. We suggest that half of the share-capitalism effect is accounted for by employees reciprocating for the "gift"; we also show that share capitalism helps dampen the negative wellbeing effects of what we typically think of as "bad" aspects of job quality.

  13. Authenticated quantum secret sharing with quantum dialogue based on Bell states

    Science.gov (United States)

    Abulkasim, Hussein; Hamad, Safwat; El Bahnasy, Khalid; Rida, Saad Z.

    2016-08-01

    This work proposes a scheme that combines the advantages of a quantum secret sharing procedure and quantum dialogue. The proposed scheme enables the participants to simultaneously make mutual identity authentications, in a simulated scenario where the boss, Alice, shares a secret with her two agents Bob and Charlie. The secret is protected by checking photons to keep untrustworthy agents and outer attacks from getting useful information. Before the two agents cooperate to recover Alice’s secret, they must authenticate their identity using parts of a pre-shared key. In addition, the whole pre-shared key is reused as part of recovering the secret data to avoid any leaks of information. In comparison with previous schemes, the proposed method can efficiently detect eavesdropping and it is free from information leaks. Furthermore, the proposed scheme proved to be secure against man-in-the-middle attacks, impersonation attacks, entangled-and-measure attacks, participant attacks, modification attacks and Trojan-horse attacks.

  14. An Image Secret Sharing Method

    Science.gov (United States)

    2006-07-01

    M. E. Hellman, “On secret sharing systems,” vol. IT-29, no. 1, pp. 35–41, Jan. 1983. [10] K. Kurosawa , K. Okada, K. Sakano, W. Ogata, and S. Tsujii...Ed., Berlin, Germany, 1994, pp. 1–12. [14] W. Ogata and K. Kurosawa , “Some ba- sic properties of general nonperfect secret sharing schemes,” J.UCS

  15. Information Sharing and Environmental Policies

    Directory of Open Access Journals (Sweden)

    Nikos Tsakiris

    2010-10-01

    Full Text Available Based on the assumption that in a standard eco-dumping model governments are uncertain about future product demand and allowing governments to obtain information from firms, we examine governments’ and firms’ incentives to share information. We show that when governments regulate polluting firms through emission standards, then governments and firms will reach an agreement concerning information sharing. The opposite holds when governments regulate pollution through emission taxes.

  16. Developing SharePoint applications

    OpenAIRE

    Rupnik, Gašper

    2011-01-01

    The thesis includes a research on SharePoint 2010 programming capabilities and a display of products created by this knowledge. The introduction part includes background information on how the topic was chosen and how the thesis was developed. The second chapter presents the SharePoint platform, which includes a description of its structure, function and usability. The third chapter focuses solely on the programming of the platform. First, some of the most useful software tools for i...

  17. Normal Functions Concerning Shared Values

    Institute of Scientific and Technical Information of China (English)

    WANG XIAO-JING

    2009-01-01

    In this paper we discuss normal functions concerning shared values. We obtain the follow result. Let F be a family of meromorphic functions in the unit disc △, and a be a nonzero finite complex number. If for any f ∈ F, the zeros of f are of multiplicity, f and f' share a, then there exists a positive number M such that for any f ∈ F, (1 -|z|~2)(|f'(z)|)/(1+|f(z)|~2)≤ M.

  18. The value of shared services.

    Science.gov (United States)

    Wallace, Beverly B

    2011-07-01

    A multisite shared services organization, combined with a robust business continuity plan, provides infrastructure and redundancies that mitigate risk for hospital CFOs. These structures can position providers to do the following: move essential operations out of a disaster impact zone, if necessary. Allow resources to focus on immediate patient care needs. Take advantage of economies of scale in temporary staffing. Leverage technology. Share in investments in disaster preparedness and business continuity solutions

  19. Shared Year Exchange in Nursing

    DEFF Research Database (Denmark)

    Vedsegaard, Helle Wendner; Wederkinck, Elisabeth

    2010-01-01

    Beskrivelse af Shared Year Exchange in Nursing, et udviklingsporjekt omhandlende udvikling, beskrivelse og implementering af et fælles studieår for sygeplejerskestuderende ved Metropol og La Trobe University Australien.......Beskrivelse af Shared Year Exchange in Nursing, et udviklingsporjekt omhandlende udvikling, beskrivelse og implementering af et fælles studieår for sygeplejerskestuderende ved Metropol og La Trobe University Australien....

  20. integrated identity and integrated identity and access management ...

    African Journals Online (AJOL)

    eobe

    a fingerprint biometric database that centrally manages students' identity, course .... widening use, motivated the use of biometrics ... System and Examination Screening and Attendance ... of each person's entry into examination/lecture halls,.

  1. Capacity sharing of water reservoirs

    Science.gov (United States)

    Dudley, Norman J.; Musgrave, Warren F.

    1988-05-01

    The concept of a water use property right is developed which does not apply to water volumes as such but to a share of the capacity (not contents) of river storage reservoirs and their inflows. The shareholders can withdraw water from their share over time in accordance with their preferences for stability of water deliveries. The reservoir authority does not manage reservoir releases but keeps record of individual shareholder's withdrawals and net inflows to monitor the quantity of water in each shareholder's capacity share. A surplus of total reservoir contents over the sum of the contents of the individual shareholder's capacity shares will accrue over time. Two different criteria for its periodic distribution among shareholders are compared. A previous paper Dudley (this issue(b)) noted a loss of short-run economic efficiency as reservoir and farm management decision making become separated. This is largely overcome by capacity sharing which allows each user to integrate the management of their portion of the reservoir and their farming operations. The nonattenuated nature of the capacity sharing water rights also promotes long-run economic efficiency.

  2. An 'open source' networked identity

    DEFF Research Database (Denmark)

    Larsen, Malene Charlotte

    2016-01-01

    friendship, but also an important part of their self-presentation online. It examines why these emotional statements are almost always publicly available – or even strategically and intentionally placed on the young people’s profiles. In relation to this, it is argued that young people – through...... their emotional communicative actions – are not only staging their own identity, but are co-constructors of each other’s identities, which the author characterises as an “open source”, networked identity....

  3. Ward Identities for Hall Transport

    CERN Document Server

    Hoyos, Carlos; Oz, Yaron

    2014-01-01

    We derive quantum field theory Ward identities based on linear area preserving and conformal transformations in 2+1 dimensions. The identities relate Hall viscosities, Hall conductivities and the angular momentum. They apply both for relativistic and non relativistic systems, at zero and at finite temperature. We consider systems with or without translation invariance, and introduce an external magnetic field and viscous drag terms. A special case of the identities yields the well known relation between the Hall conductivity and half the angular momentum density.

  4. Identity In and Around Organisations

    DEFF Research Database (Denmark)

    Schultz, Majken; Maguire, Steve

    2013-01-01

    At the heart of any successful organisation lies a powerful conception of identity: the coherent way in which it presents itself to its stakeholders and employees, containing its purpose, goals and key characteristics. However, the traditional idea of identity as a stable, solid and reliable...... concept may not be the best way of approaching and managing your organisation. Rather, Majken Schultz and Steve Maguire argue that organisations would benefit from adopting a process-based view of identity, which integrates history, ongoing change and market instability into its definition....

  5. From identity to organisation identity: The evolution of a concept

    Directory of Open Access Journals (Sweden)

    C. L. Van Tonder

    2003-10-01

    Full Text Available The view that corporate and/or organisation identity is a contributing factor to organisational success, is increasingly observed in the media. At the same time research interest in the concept appears to be on the increase. While identity is not a novel concept and has presented in different forms, it remains shrouded in ambiguity and is in need of more precise articulation. The present study revisited the origins of the identity concept and reviewed various perspectives on identity. A specific meaning structure and theoretical framework for the organization identity concept is proposed and it is concluded that contemporary views of identity are increasingly embracing earlier psychological perspectives. Opsomming Die siening dat korporatiewe en/of organisasie-identiteit ’n bydraende faktor tot organisasiesukses is, word toenemend in die media waargeneem. Navorsingsbelangstelling in die konsep skyn terselfdertyd toe te neem. Terwyl identiteit geensins ’n nuwe konsep is nie en in verskillende vorme voorkom, bly dit in vaagheid gehul en word ’n meer duidelike omskrywing daarvan benodig. Die huidige studie het die oorsprong van die indentiteitskonsep nagespeur en verskeie perspektiewe op identiteit in oënskou geneem. ’n Bepaalde betekenisstruktuur en teoretiese raamwerk word vir die identiteitskonsep voorgestel en die gevolgtrekking word gemaak dat kontemporêre sienings van identiteit toenemend besig is om vroeëre psigologiese perspektiewe te omsluit.

  6. Chicana Identity Construction: Pushing the Boundaries

    Science.gov (United States)

    Vera, Helen; De Los Santos, Esmeralda

    2005-01-01

    Identity concepts that Chicana feminists have described as central to their developmental experience are not reflected in the traditional views of identity, feminist accounts of women's identity, or ethnic identity theory. Chicana feminist Gloria Anzaldua initially postulated that in the straddling of two cultures, a hybrid or mestiza identity is…

  7. 7 CFR 1980.391 - Equity sharing.

    Science.gov (United States)

    2010-01-01

    ... property. Shared equity will be the lesser of the interest assistance granted or the amount of value appreciation available for shared equity. Value appreciation available for shared equity means the market value... amount of shared equity. The RHS approval official will calculate shared equity when a borrower's...

  8. Display Sharing: An Alternative Paradigm

    Science.gov (United States)

    Brown, Michael A.

    2010-01-01

    The current Johnson Space Center (JSC) Mission Control Center (MCC) Video Transport System (VTS) provides flight controllers and management the ability to meld raw video from various sources with telemetry to improve situational awareness. However, maintaining a separate infrastructure for video delivery and integration of video content with data adds significant complexity and cost to the system. When considering alternative architectures for a VTS, the current system's ability to share specific computer displays in their entirety to other locations, such as large projector systems, flight control rooms, and back supporting rooms throughout the facilities and centers must be incorporated into any new architecture. Internet Protocol (IP)-based systems also support video delivery and integration. IP-based systems generally have an advantage in terms of cost and maintainability. Although IP-based systems are versatile, the task of sharing a computer display from one workstation to another can be time consuming for an end-user and inconvenient to administer at a system level. The objective of this paper is to present a prototype display sharing enterprise solution. Display sharing is a system which delivers image sharing across the LAN while simultaneously managing bandwidth, supporting encryption, enabling recovery and resynchronization following a loss of signal, and, minimizing latency. Additional critical elements will include image scaling support, multi -sharing, ease of initial integration and configuration, integration with desktop window managers, collaboration tools, host and recipient controls. This goal of this paper is to summarize the various elements of an IP-based display sharing system that can be used in today's control center environment.

  9. Unhealthy Paradoxes of Healthy Identities

    NARCIS (Netherlands)

    S.J. Magala (Slawomir)

    2003-01-01

    textabstractComparative cross-cultural studies and identity research in social psychology focused on national and organizational differences, clashes and dimensions (Hofstede, Barsoux & Schneider, Jackson, Ward, Bochner & Furnham, Capoza & Brown). Mapping cultural software of individuals and dynamic

  10. Conflicted Pasts and National Identities

    DEFF Research Database (Denmark)

    With reference to current theories of cultural memory, the book explores how memories of war and conflict are passed from generation to generation, how these complex processes have transformed and shaped collective identities, and how they still inform national "conversations"....

  11. Unskilled Work and Learner Identity

    DEFF Research Database (Denmark)

    Kondrup, Sissel

    2014-01-01

    The paper examines how unskilled work forms conditions for meeting the obligation to position oneself as an educable subject and engage in formal learning activities. Sensitivity to peoples’ work-life-experiences is necessary to understand their orientation toward different learning activities....... The main argument is that participation research must abandon the notion of motivation as an individual attribute and apply a dialectic concept of learner identity acknowledging work-life as a pivotal space for learning and formation of identity. I outline how a work-life-historical approach combining...... a critical theoretical approach inspired by Salling-Olesen’s and Archer’s concepts of identity and concerns can contribute to an understanding of the relationship between work and learner identity. Through narrative work-life interviews I examine how engagement in unskilled work in small and medium sized...

  12. Unskilled Work and Learner Identity

    DEFF Research Database (Denmark)

    Kondrup, Sissel

    The paper examines how unskilled work forms conditions for meeting the obligation to position oneself as an educable subject and engage in formal learning activities. Sensitivity to peoples’ work-life-experiences is necessary to understand their orientation toward different learning activities....... The main argument is that participation research must abandon the notion of motivation as an individual attribute and apply a dialectic concept of learner identity acknowledging work-life as a pivotal space for learning and formation of identity. I outline how a work-life-historical approach combining...... a critical theoretical approach inspired by Salling- Olesen’s and Archer’s concepts of identity and concerns can contribute to an understanding of the relationship between work and learner identity. Through narrative work-life interviews I examine how engagement in unskilled work in small and medium sized...

  13. Unskilled Work and Learner Identity

    DEFF Research Database (Denmark)

    Kondrup, Sissel

    a critical theoretical approach inspired by Salling- Olesen’s and Archer’s concepts of identity and concerns can contribute to an understanding of the relationship between work and learner identity. Through narrative work-life interviews I examine how engagement in unskilled work in small and medium sized......The paper examines how unskilled work forms conditions for meeting the obligation to position oneself as an educable subject and engage in formal learning activities. Sensitivity to peoples’ work-life-experiences is necessary to understand their orientation toward different learning activities....... The main argument is that participation research must abandon the notion of motivation as an individual attribute and apply a dialectic concept of learner identity acknowledging work-life as a pivotal space for learning and formation of identity. I outline how a work-life-historical approach combining...

  14. Human Rights and Cultural Identity

    Directory of Open Access Journals (Sweden)

    John-Stewart Gordon

    2015-12-01

    Full Text Available Universal human rights and particular cultural identities, which are relativistic by nature, seem to stand in conflict with each other. It is commonly suggested that the relativistic natures of cultural identities undermine universal human rights and that human rights might compromise particular cultural identities in a globalised world. This article examines this supposed clash and suggests that it is possible to frame a human rights approach in such a way that it becomes the starting point and constraining framework for all non-deficient cultural identities. In other words, it is possible to depict human rights in a culturally sensitive way so that universal human rights can meet the demands of a moderate version of meta-ethical relativism which acknowledges a small universal core of objectively true or false moral statements and avers that, beyond that small core, all other moral statements are neither objectively true nor false.

  15. Ward identity in noncommutative QED

    OpenAIRE

    Mariz, T.; Pires, C. A. de S.; R F Ribeiro

    2002-01-01

    Although noncommutative QED presents a nonabelian structure, it does not present structure constants. In view of this we investigate how Ward identity is satisfied in pair annihilation process and $\\gamma \\gamma \\to \\gamma \\gamma$ scattering in noncommutative QED.

  16. Monetary Organization and National Identity

    DEFF Research Database (Denmark)

    Ravn Sørensen, Anders

    2016-01-01

    This article develops a detailed overview of literature on the relationship between monetary organization, understood as currencies and central banks, and issues of national identity and nationalism. It demonstrates how the literature on this subject for the past 20 years has developed...... identity, (2) an increased focus on central banks and monetary authorities, as well as the historical development in which monetary organization evolved in concert with ideas of the national identity and nationalism....... organization to an emphasis on how collective identities legitimize monetary organization. Based on the literature review, the article points to two underdeveloped themes for future research to investigate: (1) further studies on the interrelation between the legitimacy of monetary organization and national...

  17. Digital Identity - The Legal Person?

    Science.gov (United States)

    Sullivan, Clare

    This paper examines the concept of digital identity which the author asserts is now evident in the United Kingdom as a consequence of the Identity Cards Act (UK) 2006 and the National Identity Scheme it establishes. The nature and functions of the concept, particularly the set of information which constitutes an individual’s transactional identity, are examined. The paper then considers the central question of who, or what, is the legal person in a transaction i.e. who or what enters into legal relations. The analysis presents some intriguing results which were almost certainly not envisaged by the legislature. The implications extend beyond the United Kingdom to similar schemes in other jurisdictions, and to countries, like Australia, which may implement such a scheme.

  18. Children Literature: Shaping Gender Identities

    National Research Council Canada - National Science Library

    IQRA JABEEN; ASAD MEHMOOD

    2014-01-01

    ...; norms of interpretation; and genres. Selected children's stories were analyzed to identify their role as primary thought developing sources in the mind of young learners thus shaping their gender identities...

  19. Science Identity in Informal Education

    Science.gov (United States)

    Schon, Jennifer A.

    The national drive to increase the number of students pursuing Science Technology, Engineering, and Math (STEM) careers has brought science identity into focus for educators, with the need to determine what encourages students to pursue and persist in STEM careers. Science identity, the degree to which students think someone like them could be a scientist is a potential indicator of students pursuing and persisting in STEM related fields. Science identity, as defined by Carlone and Johnson (2007) consists of three constructs: competence, performance, and recognition. Students need to feel like they are good at science, can perform it well, and that others recognize them for these achievements in order to develop a science identity. These constructs can be bolstered by student visitation to informal education centers. Informal education centers, such as outdoor science schools, museums, and various learning centers can have a positive impact on how students view themselves as scientists by exposing them to novel and unique learning opportunities unavailable in their school. Specifically, the University of Idaho's McCall Outdoor Science School (MOSS) focuses on providing K-12 students with the opportunity to learn about science with a place-based, hands-on, inquiry-based curriculum that hopes to foster science identity development. To understand the constructs that lead to science identity formation and the impact the MOSS program has on science identity development, several questions were explored examining how students define the constructs and if the MOSS program impacted how they rate themselves within each construct. A mixed-method research approach was used consisting of focus group interviews with students and pre, post, one-month posttests for visiting students to look at change in science identity over time. Results from confirmatory factor analysis indicate that the instrument created is a good fit for examining science identity and the associated

  20. Corporate Visual Identity Systems origin

    OpenAIRE

    Raposo, D.

    2009-01-01

    Este artigo trata de fazer um pequeno recorrido histórico sobre como a marca se converteu nos sistemas de identidade visual corporativa. Alguns dos principais projectos de identidade ajudam a entender quais as motivações que originaram a necessidade de organização dos sistemas de identidade. Abstract: This paper is a short path about how brands became Corporate Visual Identity Systems. Some of the biggest and emblematic corporate identity projects are helpful to understand which moti...

  1. Theoretical Simulation for Identical Bands

    Institute of Scientific and Technical Information of China (English)

    CHEN Yong-Jing; CHEN Yong-Shou; GAO Zao-Chun

    2004-01-01

    @@ The frequency of occurrence of identical bands is studied by analysing a large number of rotational bands calculated with the reflection asymmetric shell model, and the statistical properties of identical bands indicated in all the experimental observations are reproduced within the mean field approximation and beyond mean field treatment, such as angular momentum projection. The distributions of the calculated J(2), Eγ and the fractional change of J(2) are discussed.

  2. Applications of the lantern identity

    CERN Document Server

    Garoufalidis, S

    1997-01-01

    The purpose of this note is to unify the role of the lantern identity in the proof of several finiteness theorems. In particular, we show that for every nonnegative integer m, the vector space (over the rationals) of type m (resp. T-type m) invariants of integral homology 3-spheres are finite dimensional. These results have already been obtained by [Oh] and [GL2] respectively; our derivation however is simpler, conceptual and relates to several other applications of the lantern identity.

  3. Organisation identity : an exploratory study.

    OpenAIRE

    2012-01-01

    D.Litt. et Phil. Recent studies have found that the life expectancy of organisations is rapidly declining (currently between 40 and 50 years) and that organisational decline and bankruptcy were increasing at disturbing rates. Equally recent contributions in the popular and business press have suggested that the expensive path to corporate failure could be linked to the "identity" or "corporate identity" of the organisation (more specifically the absence thereof). With the exception of the ...

  4. Parent and child influences on the development of a Black-White biracial identity

    OpenAIRE

    Stone, Dana J.

    2009-01-01

    In this qualitative study, the interactive process of exploring and developing shared, familial meanings about biracial identity development was investigated from the perspectives of both parents and children in Black-White multiracial families. Specifically, this study examined how monoracial parents and their biracial children describe the influence parents have on the biracial childrenâ s identity development process from the biracial individualsâ youth into adulthood. Monoracial parent...

  5. On the Role of Social Identity and Cohesion in Characterizing Online Social Communities

    OpenAIRE

    Purohit, Hemant; Ruan, Yiye; Fuhry, David; Parthasarathy, Srinivasan; Sheth, Amit

    2012-01-01

    Two prevailing theories for explaining social group or community structure are cohesion and identity. The social cohesion approach posits that social groups arise out of an aggregation of individuals that have mutual interpersonal attraction as they share common characteristics. These characteristics can range from common interests to kinship ties and from social values to ethnic backgrounds. In contrast, the social identity approach posits that an individual is likely to join a group based o...

  6. Patient satisfaction and ethnic identity among American Indian older adults.

    Science.gov (United States)

    Garroutte, Eva Marie; Kunovich, Robert M; Jacobsen, Clemma; Goldberg, Jack

    2004-12-01

    Work in the field of culturally competent medical care draws on studies showing that minority Americans often report lower satisfaction with care than White Americans and recommends that providers should adapt care to patients' cultural needs. However, empirical evidence in support of cultural competence models is limited by reliance upon measurements of racial rather than ethnic identity and also by a near-total neglect of American Indians. This project explored the relationship between ethnic identity and satisfaction using survey data collected from 115 chronically ill American Indian patients >or=50 years at a Cherokee Nation clinic. Satisfaction scores were high overall and comparable to those found in the general population. Nevertheless, analysis using hierarchical linear modeling showed that patients' self-rated American Indian ethnic identity was significantly associated with satisfaction. Specifically, patients who rated themselves high on the measure of American Indian ethnic identity reported reduced scores on satisfaction with health care providers' social skill and attentiveness, as compared to those who rated themselves lower. Significant associations remained after controlling for patients' sex, age, education, marital status, self-reported health, wait time, and number of previous visits. There were no significant associations between patients' American Indian ethnic identity and satisfaction with provider's technical skill and shared decision-making. Likewise, there were no significant associations between satisfaction and a separate measure of White American ethnic identity, although a suggestive trend was observed for satisfaction with provider's social skill. Our findings demonstrate the importance of including measures of ethnic identity in studies of medical satisfaction in racial minority populations. They support the importance of adapting care to patient's cultural needs, and they highlight the particular significance of interpersonal

  7. Knowledge sharing in diverse organizations

    DEFF Research Database (Denmark)

    Lauring, Jakob; Selmer, Jan

    2012-01-01

    It has been argued that both strengths and weaknesses of diversity in organisations stem from the different demographic, national, linguistic, social and cultural backgrounds of their members. However, few attempts have been made to link different types of diversity to knowledge sharing despite....... As predicted, results showed that diversity related to internationalisation (cultural and linguistic) had more positive associations with knowledge sharing than inherent demographic diversity (age and gender), which generally had negative or no relationships with knowledge sharing. The implications...... the fact that organisations which can make full use of their collective knowledge and expertise could be expected to be more efficient, effective and creative. Therefore, a survey was directed towards 16 diverse academic departments in three large universities in Denmark, and 489 academics took part...

  8. Vibrio chromosomes share common history

    Directory of Open Access Journals (Sweden)

    Gevers Dirk

    2010-05-01

    Full Text Available Abstract Background While most gamma proteobacteria have a single circular chromosome, Vibrionales have two circular chromosomes. Horizontal gene transfer is common among Vibrios, and in light of this genetic mobility, it is an open question to what extent the two chromosomes themselves share a common history since their formation. Results Single copy genes from each chromosome (142 genes from chromosome I and 42 genes from chromosome II were identified from 19 sequenced Vibrionales genomes and their phylogenetic comparison suggests consistent phylogenies for each chromosome. Additionally, study of the gene organization and phylogeny of the respective origins of replication confirmed the shared history. Conclusions Thus, while elements within the chromosomes may have experienced significant genetic mobility, the backbones share a common history. This allows conclusions based on multilocus sequence analysis (MLSA for one chromosome to be applied equally to both chromosomes.

  9. Content Sharing for Mobile Devices

    CERN Document Server

    Ball, Rudi

    2008-01-01

    The miniaturisation of computing devices has seen computing devices become increasingly pervasive in society. With this increased pervasiveness, the technologies of small computing devices have also improved. Mobile devices are now capable of capturing various forms of multimedia and able to communicate wirelessly using increasing numbers of communication techniques. The owners and creators of local content are motivated to share this content in ever increasing volume; the conclusion has been that social networks sites are seeing a revolution in the sharing of information between communities of people. As load on centralised systems increases, we present a novel decentralised peer-to-peer approach dubbed the Market Contact Protocol (MCP) to achieve cost effective, scalable and efficient content sharing using opportunistic networking (pocket switched networking), incentive, context-awareness, social contact and mobile devices. Within the report we describe how the MCP is simulated with a superimposed geographi...

  10. Availability Cascades & the Sharing Economy

    DEFF Research Database (Denmark)

    Netter, Sarah

    2014-01-01

    In search of a new concept that will provide answers to as to how modern societies should not only make sense but also resolve the social and environmental problems linked with our modes of production and consumption, collaborative consumption and the sharing economy are increasingly attracting...... attention. This conceptual paper attempts to explain the emergent focus on the sharing economy and associated business and consumption models by applying cascade theory. Risks associated with this behavior will be especially examined with regard to the sustainability claim of collaborative consumption....... With academics, practitioners, and civil society alike having a shared history in being rather fast in accepting new concepts that will not only provide business opportunities but also a good conscience, this study proposes a critical study of the implications of collaborative consumption, before engaging...

  11. Availability Cascades & the Sharing Economy

    DEFF Research Database (Denmark)

    Netter, Sarah

    2015-01-01

    In search of a new concept that will provide answers to as to how modern societies should not only make sense but also resolve the social and environmental problems linked with our modes of production and consumption, collaborative consumption and the sharing economy are increasingly attracting...... attention. This conceptual paper attempts to explain the emergent focus on the sharing economy and associated business and consumption models by applying cascade theory. Risks associated with this behavior will be especially examined with regard to the sustainability claim of collaborative consumption....... With academics, practitioners, and civil society alike having a shared history in being rather fast in accepting new concepts that will not only provide business opportunities but also a good conscience, this study proposes a critical study of the implications of collaborative consumption, before engaging...

  12. Who requests their sperm donor's identity? The first ten years of information releases to adults with open-identity donors.

    Science.gov (United States)

    Scheib, Joanna E; Ruby, Alice; Benward, Jean

    2017-02-01

    To report findings from 10 years of requests from adults eligible to obtain their open-identity sperm donor's information. Analysis of archived family and donor data. Semistructured interviews at information releases. Not applicable. A total of 85 DI adults requesting 43 donor identities; program data on 256 DI families. None. We identified [1] demographic predictors of requesting donor identities, [2] information release timing and length, and [3] request motives. Just >35% of eligible DI adults requested their donor's identity. Adults ranged from 18-27 years, requesting at median age 18 years. More women than men requested. Proportionally fewer adults requested when they had heterosexual-couple parents, and proportionally more when they had one rather than two parents. In interviews, the common theme was wanting to know more about the donor, especially about shared characteristics. Most adults planned to contact their donor. More than 94% of adults had donors who were open to contact; adults expressed modest expectations about this contact. In 2001, the first adults became eligible to obtain their open-identity sperm donor's information. Ten years of identity requests at one program indicates that information about one's donor is important to a significant proportion of these DI adults. Most requested their donor's identity soon after becoming eligible, suggesting some urgency to wanting the information. Interview data highlighted the role of donor information in helping adults better understand themselves and their ancestry. Findings hold important implications for practice and policy. Copyright © 2016 American Society for Reproductive Medicine. Published by Elsevier Inc. All rights reserved.

  13. Knowledge Sharing is Knowledge Creation

    DEFF Research Database (Denmark)

    Greve, Linda

    2015-01-01

    communication and knowledge creation to an intervention study in a large Danish food production company. For some time a specific group of employees uttered a wish for knowledge sharing, but it never really happened. The group was observed and submitted to metaphor analysis as well as analysis of co......-creation strategies. Confronted with the results, the group completely altered their approach to knowledge sharing and let it become knowledge co-creation. The conclusions are, that knowledge is and can only be a diverse and differentiated concept, and that groups are able to embrace this complexity. Thus rather than...

  14. Sharing best practice in partnerships

    DEFF Research Database (Denmark)

    Mosgaard, Mette; Remmen, Arne; Pedersen, Claus Stig

    In this paper, the promotion of sustainable products through the sharing of best practices in product chains is examined. The general understanding is that the interactions in the supply chain are changing from a traditional focus on the supply of goods “just in time” towards a focus on value...... upstream in the supply chain, and “business development” of sustainable products and product service systems. Sharing best practice in partnerships is an example of the latter, but Supply Chain Management goes beyond product chains and into partnerships where the focus is not on one main company...

  15. Circular threshold quantum secret sharing

    Institute of Scientific and Technical Information of China (English)

    Yang Yu-Guang; Wen Qiao-Yan

    2008-01-01

    This paper proposes a circular threshold quantum secret sharing (TQSS) scheme with polarized single photons.A polarized single photon sequence runs circularly among any t or more of n parties and any t or more of n parties can reconstruct the secret key when they collaborate.It shows that entanglement is not necessary for quantum secret sharing.Moreover,the theoretic efficiency is improved to approach 100% as the single photons carrying the secret key are deterministically forwarded among any t or more of n parties,and each photon can carry one bit of information without quantum storage.This protocol is feasible with current technology.

  16. Exploring the identity and "sense of identity" of organisations

    Directory of Open Access Journals (Sweden)

    C L Van Tonder

    2006-03-01

    Full Text Available During the past two decades a steady increase in scholarly contributions in the area of organisation identity have been observed – to the point that the phenomenon is now the subject of a sustainable discourse in several disciplines. Many theoretical and conceptual dilemmas however remain, largely as a result of the low incidence of empirical research in the area. This study reports the results of an exploratory investigation that adapted Schley and Wagenfield’s (1979 concept of identity for use in an organisational setting. Interviews were conducted with 152 top managers representing 10 companies. The results indicate that organisational responses to the question “who am I?�? elicit distinctive organisational self-descriptions and some awareness of identity issues.

  17. Measurements of Charge Sharing Effects in Pixilated CZT/CdTe Detectors

    DEFF Research Database (Denmark)

    Kuvvetli, Irfan; Budtz-Jørgensen, Carl

    2007-01-01

    Te pixel detector samples. The results are used for the development of the large area X-ray and Gamma ray detector for the Atmosphere-Space Interactions Monitor (ASIM) planned for the ISS ESA Columbus module. Charge sharing measurements on detector samples with identical size and pixel geometry......In this paper, charge sharing and charge loss effects in pixilated CZT/CdTe detectors are investigated by measurements. We measured charge sharing effects function of the inter-pixel gap (with same pixel pitch), the photon energy and the detector bias voltage for a large numbers of CZT and Cd...

  18. Contested identities: Identity constructions in a youth recreational drug culture

    DEFF Research Database (Denmark)

    Ravn, Signe

    2012-01-01

    as responsible drug users. The article studies this recreational drug culture and its internal distinctions, conceptions and norms as they are expressed discursively. The analysis identifies six dimensions of the identity as a responsible, recreational drug user: drug practice, general drug knowledge, context......-specific drug knowledge, practices for checking drugs, acknowledging one’s position in the surrounding drug scene and age. The analysis shows how being able to perform a coherent identity in line with these dimensions is necessary for being acknowledged as a responsible, recreational drug user....

  19. PERSONAL IDENTITY IN DEAF ADOLESCENTS

    Directory of Open Access Journals (Sweden)

    Joanna KOSSEWSKA

    2008-06-01

    Full Text Available The purpose of this study was to investigate the factors influencing the identity deaf adolescents. The study involved 67 deaf adolescents (38 boys and 29 girls aged 16 to 19 students of secondary school. Ninety-three hearing children constituted a comparison group. The structure of identity was explored on the basis of identification references given by the subjects who were to reply in writing, 20 times running, to the question: „Who Am I?” the test, adapted from M. H. Kuhn and T. S. McPartland by Martines and Silvestre (1995 given in written and signed mode.Results showed that the hearing status as well as mode of communication influence the description of personal identity. It was found that deaf adoles­cents used more descriptions especially in the fol­lowing categories: Civil Status, Body and Physical Appearance, Tastes and Activities, Friendship and Relationships, Personal and Social Situation, Negative Personal Traits, and Neutral Personality Traits. Although this study could demonstrate im­pact independent variables on identity, the data raise the need for further, preferably longitudinal, research. This complex phenomenon has to be examined more closely.Combined self-descriptive processes lead to the development of an organized, learned and dynamic identity, and subjective description of an individ­ual has strong emotional consequences for the in­dividual in question.

  20. At the Intersection of Identities

    Directory of Open Access Journals (Sweden)

    Hidasi Judit

    2016-12-01

    Full Text Available It is assumed that part of today’s societal difficulties, uncertainties and crisis worldwide can be attributed to the competing of multiple identities, to their intersections and their overlapping nature – on the level of nations, on the level of communities and also on the level of the individual. We aim at presenting a typology of identities that come into play in the public and in the private domain of the individual. It is hypothesized that there is a strong interdependence of cultural heritage, human values and social traditions in the competition of identities. These questions, which are interrelated and interconnected with each other through a common denominator, namely “cultural-mental programming” and “reprogramming efforts,” are going to be pondered about in the presentation. In the context of globalization the relevance of this topic is reinforced by the need to adapt to changes within the ever-intensifying shift from intercultural to multicultural environment in communities, in business and in work places. Attempts will be made to articulate some projections with respect to future trends that are to be expected: the way to go from competing identities to establishing a competitive identity (Simon Anholt. The contribution does not offer ready solutions but rather serves as fuel for further discussions.

  1. Hierarchy of modular graph identities

    Energy Technology Data Exchange (ETDEWEB)

    D’Hoker, Eric; Kaidi, Justin [Mani L. Bhaumik Institute for Theoretical Physics, Department of Physics and Astronomy,University of California,Los Angeles, CA 90095 (United States)

    2016-11-09

    The low energy expansion of Type II superstring amplitudes at genus one is organized in terms of modular graph functions associated with Feynman graphs of a conformal scalar field on the torus. In earlier work, surprising identities between two-loop graphs at all weights, and between higher-loop graphs of weights four and five were constructed. In the present paper, these results are generalized in two complementary directions. First, all identities at weight six and all dihedral identities at weight seven are obtained and proven. Whenever the Laurent polynomial at the cusp is available, the form of these identities confirms the pattern by which the vanishing of the Laurent polynomial governs the full modular identity. Second, the family of modular graph functions is extended to include all graphs with derivative couplings and worldsheet fermions. These extended families of modular graph functions are shown to obey a hierarchy of inhomogeneous Laplace eigenvalue equations. The eigenvalues are calculated analytically for the simplest infinite sub-families and obtained by Maple for successively more complicated sub-families. The spectrum is shown to consist solely of eigenvalues s(s−1) for positive integers s bounded by the weight, with multiplicities which exhibit rich representation-theoretic patterns.

  2. The challenges of knowledge sharing in practice a social approach

    CERN Document Server

    Widen-Wulff, Gunilla

    2007-01-01

    Addresses the key skills that are required in organisations in the information intensive society. The book examines the power of information behaviour on the construction of different kinds of shared knowledge and social identity in a group. An introduction to the different dimensions of social capital that is structural and cognitive, and looks at the relational aspects of information behaviour in organisations. Experiences are analysed in two different case studies - in the financial and biotechnology industries - in order to gain additional insights in how the internal organisation environm

  3. The cloud storage service bwSync&Share at KIT

    CERN Document Server

    CERN. Geneva

    2014-01-01

    The Karlsruhe Institute of Technology introduced the bwSync&Share collaboration service in January 2014. The service is an on-premise alternative to existing public cloud storage solutions for students and scientists in the German state of Baden-Württemberg, which allows the synchronization and sharing of documents between multiple devices and users. The service is based on the commercial software PowerFolder and is deployed on a virtual environment to support high reliability and scalability for potential 450,000 users. The integration of the state-wide federated identity management system (bwIDM) and a centralized helpdesk portal allows the service to be used by all academic institutions in the state of Baden-Württemberg. Since starting, approximately 15 organizations and 8,000 users joined the service. The talk gives an overview of related challenges, technical and organizational requirements, current architecture and future development plans.

  4. Neither invented nor shared here

    DEFF Research Database (Denmark)

    Burcharth, Ana Luiza de Araújo; Knudsen, M. P.; Søndergaard, Helle Alsted

    2014-01-01

    against the sourcing of external knowledge (the Not-invented-here (NIH) syndrome) and against the external exploitation of knowledge assets (the Not-shared-here (NSH) syndrome). Using survey data collected from 331 firms, this article empirically assesses the theoretical assertion that the NIH and NSH...

  5. Building a Shared Information Network.

    Science.gov (United States)

    Stanat, Ruth

    1991-01-01

    Discussion of information needs in a business environment focuses on how to build a shared information network. Highlights include the evolution of corporate intelligence systems; results of a survey that examined the information networking needs of large corporations; and a case study of the development of an information network at Citibank N.A.…

  6. Natural deduction : sharing by presentation

    NARCIS (Netherlands)

    Loeb, Iris

    2007-01-01

    Part I of this thesis studies a fragment of natural deduction to which we have added the notion of sharing of subresults. This formalism is called 'deduction graphs'. We show some properties of cut-elimination on deduction graphs, like strong normalisation and confluence. We discuss connections with

  7. Car sharing à la carte

    CERN Multimedia

    Anaïs Schaeffer

    2012-01-01

    Do you want to make your commute to CERN easier, while saving money at the same time? Would you prefer not to spend a quarter of an hour crawling round the CERN car parks looking for a space? If so, read on: this article might well be of great interest to you.   We would like to draw your attention to a well established, albeit sadly under-used, method of transport: car sharing. To promote car-sharing, the GS Department has stepped in to call on the services of the Swiss firm Green Monkeys which specialises in this user-friendly and intelligent transport scheme. The company’s slogan is:  “Car-sharing as you want, when you want and as much as you want”. The principle is very straightforward. To use this car-sharing facility, you simply complete your free online registration with Green Monkeys, providing the following details: your journey, departure time, arrival time and days of the week, and indicating whether you are a passenger or driver or both. &a...

  8. Normal Families and Shared Functions

    Institute of Scientific and Technical Information of China (English)

    WANG Xue-qin; LEI Chun-lin

    2015-01-01

    Let k be a positive integer, let h be a holomorphic function in a domain D, h 6≡0 and let F be a family of nonvanishing meromorphic functions in D. If each pair of functions f and g in F , f (k) and g(k) share h in D, then F is normal in D.

  9. Secret sharing using biometric traits

    Science.gov (United States)

    Kholmatov, Alisher; Yanikoglu, Berrin; Savas, Erkay; Levi, Albert

    2006-04-01

    In biometric based authentication, biometric traits of a person are matched against his/her stored biometric profile and access is granted if there is sufficient match. However, there are other access scenarios, which require participation of multiple previously registered users for a successful authentication or to get an access grant for a certain entity. For instance, there are cryptographic constructs generally known as secret sharing schemes, where a secret is split into shares and distributed amongst participants in such a way that it is reconstructed/revealed only when the necessary number of share holders come together. The revealed secret can then be used for encryption or authentication (if the revealed key is verified against the previously registered value). In this work we propose a method for the biometric based secret sharing. Instead of splitting a secret amongst participants, as is done in cryptography, a single biometric construct is created using the biometric traits of the participants. During authentication, a valid cryptographic key is released out of the construct when the required number of genuine participants present their biometric traits.

  10. Interlibrary Cooperation and Resource Sharing.

    Science.gov (United States)

    Kittel, Dorothy

    Based on fiscal year 1985 annual reports from 48 states, this report describes interlibrary cooperation and resource-sharing activities supported by Library Services and Construction Act (LSCA), Title III, funds during 1985. A summary of types of activities reported includes the establishment, maintenance, and expansion of communication networks…

  11. Moralities of sharing and caring

    NARCIS (Netherlands)

    Niehof, A.; Wahlen, S.

    2017-01-01

    This paper propounds the concept of the moral household economy in order to understand and explain gender performances in food practices of sharing and caring in the socio-cultural domain of unpaid food work. Households are the immediate context for meeting people’s food and nutrition needs and for

  12. Interlibrary Cooperation and Resource Sharing.

    Science.gov (United States)

    Kittel, Dorothy

    Based on fiscal year 1986 annual reports from 48 states, Guam, Puerto Rico, and the Virgin Islands, this report describes interlibrary cooperation and resource sharing activities supported by the Library Services and Construction Act (LSCA), Title III, funds. In response to the 1984 amendment to Title III (which required each state to include in…

  13. Scalable shared-memory multiprocessing

    CERN Document Server

    Lenoski, Daniel E

    1995-01-01

    Dr. Lenoski and Dr. Weber have experience with leading-edge research and practical issues involved in implementing large-scale parallel systems. They were key contributors to the architecture and design of the DASH multiprocessor. Currently, they are involved with commercializing scalable shared-memory technology.

  14. Benefit sharing in health research

    African Journals Online (AJOL)

    2015-08-02

    Aug 2, 2015 ... [4] Those who contribute to scientific research ought to share ... 2 Managing director; Right to Care, Department of Medicine, Clinical HIV Research Unit, Internal Medicine ..... boration with the United Nations and the World Health Organization ... a benefitsharing model that tempers (not diminish) commercial.

  15. Dynamic Spectrum Sharing among Femtocells

    DEFF Research Database (Denmark)

    Da Costa, Gustavo Wagner Oliveira

    2012-01-01

    The ever-growing demand for mobile broadband is leading to an imminent spectrum scarcity. In order to cope with such situation dynamic spectrum sharing and the widespread deployment of small cells (femtocells) are promising solutions. Delivering such a view is not short of challenges. Massive dep...

  16. Moralities of sharing and caring

    NARCIS (Netherlands)

    Niehof, A.; Wahlen, S.

    2017-01-01

    This paper propounds the concept of the moral household economy in order to understand and explain gender performances in food practices of sharing and caring in the socio-cultural domain of unpaid food work. Households are the immediate context for meeting people’s food and nutrition needs and for

  17. Buchmann-Williams Authenticated Key Agreement Protocol With Pre-shared Password

    Directory of Open Access Journals (Sweden)

    Soufiane Mezroui

    2014-07-01

    Full Text Available Based on Buchmann-Williams key exchange protocol, a Buchmann-Williams Authenticated Key Agreement (BWAKA protocol with pre-shared password is proposed. Its security relies on the Discrete Logarithm Problem over class groups of number fields. It provides identity authentication, perfect forward secrecy and key validation.

  18. Inference for shared-frailty survival models with left-truncated data

    NARCIS (Netherlands)

    van den Berg, G.J.; Drepper, B.

    2016-01-01

    Shared-frailty survival models specify that systematic unobserved determinants of duration outcomes are identical within groups of individuals. We consider random-effects likelihood-based statistical inference if the duration data are subject to left-truncation. Such inference with left-truncated da

  19. ELLIPTIC CURVE CRYPTOGRAPHY BASED AUTHENTICATED KEY AGREEMENT WITH PRE-SHARED PASSWORD

    Institute of Scientific and Technical Information of China (English)

    Sui Aifen; Lucas C.K.Hui; Yang Yixian; K.P.Chow

    2005-01-01

    Based on elliptic curve Diffie-Hellman algorithm, an Elliptic Curve Authenticated Key Agreement (ECAKA) protocol with pre-shared password is proposed. Its security relies on the Elliptic Curve Discrete Logarithm Problem (ECDLP). It provides identity authentication,key validation and perfect forward secrecy, and it can foil man-in-the-middle attacks.

  20. Identity, Diversity and Diversity Management

    DEFF Research Database (Denmark)

    Holck, Lotte; Muhr, Sara Louise; Villeseche, Florence

    2016-01-01

    – The work can encourage policy makers, diversity and HR managers to question their own practices and assumptions leading to more theoretical informed diversity management practices. Originality/value – The theoretical connections between identity and diversity literature have so far not been reviewed...... systematically. The work foregrounds how important it is for diversity scholars to consider identity underpinnings of diversity research to help further develop the field within and beyond the three streams the authors discuss.......The purpose of this paper is to examine the relationship between the identity and diversity literatures and discuss how a better understanding of the theoretical connections between the two informs both diversity research and diversity management practices. Design/methodology/approach – Literature...

  1. CORPORATE IDENTITY SEJARAH DAN APLIKASINYA

    Directory of Open Access Journals (Sweden)

    Christine Suharto Cenadi

    1999-01-01

    Full Text Available In the recent globalization era%2C and the developed market%2C many companies compete to attract consumers to buy their products. One of the keys to compete and survive in this developing market is by creating an image and graphic identity. This paper will discuss about corporate identity%2C image%2C its purpose and applications. Abstract in Bahasa Indonesia : Dalam era globalisasi dewasa ini%2C dan dengan berkembangnya pasar (market%2C banyak perusahaan bersaing untuk menarik perhatian konsumen untuk membeli produknya. Salah satu cara untuk bersaing dan dapat bertahan di dalam pasar yang terus berkembang ini adalah dengan menciptakan suatu image dan identitas graphic. Tulisan ini akan membahas tentang corporate identity%2C image%2C fungsi dan aplikasinya

  2. Identity Authentication over Noisy Channels

    Directory of Open Access Journals (Sweden)

    Fanfan Zheng

    2015-07-01

    Full Text Available Identity authentication is the process of verifying users’ validity. Unlike classical key-based authentications, which are built on noiseless channels, this paper introduces a general analysis and design framework for identity authentication over noisy channels. Specifically, the authentication scenarios of single time and multiple times are investigated. For each scenario, the lower bound on the opponent’s success probability is derived, and it is smaller than the classical identity authentication’s. In addition, it can remain the same, even if the secret key is reused. Remarkably, the Cartesian authentication code proves to be helpful for hiding the secret key to maximize the secrecy performance. Finally, we show a potential application of this authentication technique.

  3. Drawing Identity: Beginning Pre-Service Teachers' Professional Identities

    Science.gov (United States)

    Beltman, Susan; Glass, Christine; Dinham, Judith; Chalk, Beryl; Nguyen, Bich

    2015-01-01

    Developing a professional teacher identity can be complex as pre-service teachers engage with a process informed by their previous experiences of teachers and teaching, by learning in their pre-service course, by field placements, and by societal expectations. Using drawing as the method for gathering data, pre-service teachers in an Australian…

  4. Black German identities : validating the multidimensional inventory of black identity

    NARCIS (Netherlands)

    Wandert, T.; Ochsmann, R.; Brug, P.; Chybicka, A.; Lacassagne, M.F.; Verkuyten, M.J.A.M.

    2009-01-01

    This study examines the reliability and validity of a German version of the Multidimensional Inventory of Black Identity (MIBI) in a sample of 170 Black Germans. The internal consistencies of all subscales are at least moderate. The factorial structure of the MIBI, as assessed by principal component

  5. "Doing Identity" in the Botswana Classroom: Negotiating Gendered Institutional Identities

    Science.gov (United States)

    Humphreys, Sara

    2013-01-01

    Drawing on post-structural and post-colonial conceptions of gender, this paper explores multiple student masculinities and femininities in the classrooms of four junior secondary schools in Botswana. These gendered identities, it is argued, are negotiated within broader institutional constraints that have been socio-historically produced. Such…

  6. Bridging Identity Gaps : Supporting Identity Performance in Citizen Service Encounters

    DEFF Research Database (Denmark)

    Borchorst, Nikolaj Gandrup; McPhail, Brenda; Smith, Karen Louise

    2012-01-01

    . Lastly, we turn to a discussion of how the established identity gaps can be addressed through design. Information and communication technologies as well as face-to-face encounters have an important role to play in the building of an interface to government. Here, it is paramount to consider the context...

  7. Identity in Flux: Negotiating Identity While Studying Abroad

    Science.gov (United States)

    Young, Jennifer T.; Natrajan-Tyagi, Rajeswari; Platt, Jason J.

    2015-01-01

    Study abroad is one aspect of global movement that connects individuals of diverse backgrounds. Individuals studying abroad are proffered to negotiate self-identity when they confront novelty and new contexts. This study chose to use the qualitative method of phenomenological interviews to examine how individuals experience themselves and others…

  8. Integrating Identities: Ethnic and Academic Identities among Diverse College Students

    Science.gov (United States)

    Walker, Lovey H. M.; Syed, Moin

    2013-01-01

    Background/Context: Students of Color continue to be underrepresented at the undergraduate level. Recent research has demonstrated the importance of non-academic psychosocial factors for understanding college experiences. One factor, identity, is a broad, multidimensional construct that comprises numerous distinct domains, including political,…

  9. Blended Identities: Identity Work, Equity and Marginalization in Blended Learning

    Science.gov (United States)

    Heikoop, Will

    2013-01-01

    This article is a theoretical study of the self-presentation strategies employed by higher education students online; it examines student identity work via profile information and avatars in a blended learning environment delivered through social networking sites and virtual worlds. It argues that students are faced with difficult choices when…

  10. Saving Face and Group Identity

    DEFF Research Database (Denmark)

    Eriksson, Tor; Mao, Lei; Villeval, Marie-Claire

    2015-01-01

    their self- but also other group members' image. This behavior is frequent even in the absence of group identity. When group identity is more salient, individuals help regardless of whether the least performer is an in-group or an out-group. This suggests that saving others' face is a strong social norm.......Are people willing to sacrifice resources to save one's and others' face? In a laboratory experiment, we study whether individuals forego resources to avoid the public exposure of the least performer in their group. We show that a majority of individuals are willing to pay to preserve not only...

  11. RFID identity theft and countermeasures

    Science.gov (United States)

    Herrigel, Alexander; Zhao, Jian

    2006-02-01

    This paper reviews the ICAO security architecture for biometric passports. An attack enabling RFID identity theft for a later misuse is presented. Specific countermeasures against this attack are described. Furthermore, it is shown that robust high capacity digital watermarking for the embedding and retrieving of binary digital signature data can be applied as an effective mean against RFID identity theft. This approach requires only minimal modifications of the passport manufacturing process and is an enhancement of already proposed solutions. The approach may also be applied in combination with a RFID as a backup solution (damaged RFID chip) to verify with asymmetric cryptographic techniques the authenticity and the integrity of the passport data.

  12. Constructing leadership identities through stories

    DEFF Research Database (Denmark)

    Frimann, Søren; Hersted, Lone

    2016-01-01

    This article analyzes the construction of leadership identities through stories found in four narrative interviews from a qualitative study and leadership development project based on social constructionism and action learning. We argue that leadership development and the construction of leadership...... narrative interviews about their challenges as leaders? In addition, how do these discursive constructions restrict or enable new perspectives, other voices, and the possibilities for learning and change? Our analysis identified traces of both modern and postmodern leadership discourses. We suggest...... that the concept of coauthoring is useful in developing leadership and leadership identities through reflexive dialogs and emerging stories....

  13. Identity, culture and shared experiences: The power of cogenerative dialogues in urban science classrooms

    Science.gov (United States)

    Bayne, Gillian Ursula

    2007-05-01

    The research presented in this dissertation details four major examples of work that took place during a three-year longitudinal study in a small urban New York City public high school for high achieving youth. It aims to play a role in contributing to the understanding of the breakdown between and amongst those parties involved in urban science education. The work outlined herein responds to the calls for improvement within urban education, utilizing the experiences, knowledge and practices of its students, in order to help inform and improve science teaching and learning. Theoretical lenses upon which this critical ethnographic research is grounded primarily involve those that are socio-cultural in nature and examine the sociology of emotions. In this research, I address how urban students, who have been historically alienated by science, develop forms of culture, enact them in science classes and then make transitions from participating marginally toward participating more centrally, demonstrating increasing science and science-like practices with higher levels of expertise. This work involves investigating human agency and its expansion as it becomes increasingly incorporated and internalized into individual and collective habitus. The protocol utilized in this critical ethnography (videotapes of cogenerative dialogues, classroom practices and interviews; journal entries, field notes, student and teacher generated artifacts) facilitates the exploration and understanding of the ways by which aligning culture and expanding student roles, both inside and outside of the classroom can occur. The results of this study include concrete examples and interpretations of these expansions and, provide suggestions by which more adaptable forms of teaching and learning can be enacted. These practices ultimately benefit a wider variety of students who as result will become better at creating their own structures to succeed.

  14. When Communities Collide: The Shared Construction and Defence of Community and Identity during a Teaching Practicum

    Science.gov (United States)

    Trent, John

    2014-01-01

    This article describes the results of a qualitative multiple case study investigation of the experiences of preservice teachers during a teaching practicum in Hong Kong. The study uses in-depth interviews with pairs of student teachers and their school-based supporting teachers to understand how the former positioned themselves as particular types…

  15. Constructing a minority group identity out of shared rejection : The case of international students

    NARCIS (Netherlands)

    Schmitt, MT; Spears, R; Branscombe, NR

    2003-01-01

    With a sample of international students, we investigated how perceptions of rejection by the host community are related to a sense of identification with other international students. Based on the rejection-identification model (Branscombe, Schmitt, & Harvey, 1999) we predicted that perceiving preju

  16. Work-Sharing: Panacea or Palliative?

    Science.gov (United States)

    Dawkins, Peter J.

    1983-01-01

    Recently, high unemployment and a high perceived rate of technological change have created interest in work-sharing. Definitions of different types of work-sharing and theoretical and practical issues related to work-sharing are covered. Work-sharing is not necessarily a panacea, but it does show the potential to help. (Author/IS)

  17. Politicized Collective Identity: A Social Psychological Analysis.

    Science.gov (United States)

    Simon, Bernd; Klandermans, Bert

    2001-01-01

    Develops a social psychological model of politicized collective identity that revolves around three conceptual themes (collective identity, the struggle for power, and the wider societal context of that power struggle). Discusses how collective identity has been politicized, showing that politicized collective identity has important consequences…

  18. An Existentialist Account of Identity Formation.

    Science.gov (United States)

    Bilsker, Dan

    1992-01-01

    Gives account of Marcia's identity formation model in language of existentialist philosophy. Examines parallels between ego-identity and existentialist approaches. Describes identity in terms of existentialist concepts of Heidegger and Sartre. Argues that existentialist account of identity formation has benefits of clarification of difficult…

  19. Teacher Identity Work in Mathematics Teacher Education

    Science.gov (United States)

    Neumayer-Depiper, Jill

    2013-01-01

    Becoming a teacher is not developing an identity, but is developing identity as a continuous process of constructing and deconstructing understandings within the complexities of social practice, beliefs, experiences, and social norms. I take up this stance on identity as articulated in Judith Butler's (1999) work with gender identity and…

  20. Teacher Educators' Identity: A Review of Literature

    Science.gov (United States)

    Izadinia, Mahsa

    2014-01-01

    Research suggests that the development of a teacher educator identity is a central process in becoming a teacher educator. Recently, there has been an increasing interest in the concept of teacher identity. However, teacher educator identity seems to be still under-researched. In this article, a review of literature on teacher educator identity is…