WorldWideScience

Sample records for subscriber identity module

  1. Forensic Tools for Mobile Phone Subscriber Identity Modules

    Directory of Open Access Journals (Sweden)

    Wayne Jansen

    2006-06-01

    Full Text Available Mobile phones and other handheld devices incorporating cellular capabilities, such as Personal Digital Assistants, are ubiquitous.  Besides placing calls, these devices allow users to perform other useful tasks, including text messaging and phonebook entry management.  When cell phones and cellular devices are involved in a crime or other incident, forensic specialists require tools that allow the proper retrieval and speedy examination of data present on the device.  For devices conforming to the Global System for Mobile Communications (GSM standards, certain data such as dialed numbers, text messages, and phonebook entries are maintained on a Subscriber Identity Module (SIM.  This paper gives a snapshot of the state of the art of forensic software tools for SIMs and an explanation of the types of digital evidence they can recover.

  2. Side-channel Analysis of Subscriber Identity Modules

    Science.gov (United States)

    2013-06-01

    12 ADF application dedicated file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 ADN Abbreviated Dialing...storage are the Abbreviated Dialing Numbers ( ADN ) and Last Numbers Dialed (LND) files. The ADN file contains 5 standard phonebook-style name-number

  3. Cosine-Modulated Multitone for Very-High-Speed Digital Subscriber Lines

    Directory of Open Access Journals (Sweden)

    Lin Lekun

    2006-01-01

    Full Text Available In this paper, the use of cosine-modulated filter banks (CMFBs for multicarrier modulation in the application of very-high-speed digital subscriber lines (VDSLs is studied. We refer to this modulation technique as cosine-modulated multitone (CMT. CMT has the same transmitter structure as discrete wavelet multitone (DWMT. However, the receiver structure in CMT is different from its DWMT counterpart. DWMT uses linear combiner equalizers, which typically have more than 20 taps per subcarrier. CMT, on the other hand, adopts a receiver structure that uses only two taps per subcarrier for equalization. This paper has the following contributions. (i A modification that reduces the computational complexity of the receiver structure of CMT is proposed. (ii Although traditionally CMFBs are designed to satisfy perfect-reconstruction (PR property, in transmultiplexing applications, the presence of channel destroys the PR property of the filter bank, and thus other criteria of filter design should be adopted. We propose one such method. (iii Through extensive computer simulations, we compare CMT with zipper discrete multitone (z-DMT and filtered multitone (FMT, the two modulation techniques that have been included in the VDSL draft standard. Comparisons are made in terms of computational complexity, transmission latency, achievable bit rate, and resistance to radio ingress noise.

  4. Multi-Carrier Modulation and MIMO Principle Application on Subscriber Lines

    Directory of Open Access Journals (Sweden)

    J. Vodrazka

    2007-12-01

    Full Text Available The multi-carrier modulation is used in many applications, primary for a wireless transmission, for example Wi-Fi and WiMAX networks or DVB-T. But the same physical principle can be used also for metallic lines in access or local networks, for example ADSL and VDSL. The multi-carrier modulation in these cases is called DMT. The dominant source of noise in multi-pair metallic cables is crosstalk when the information capacity is limited dramatically. However, information capacity of metallic lines can be increased, if the system is using MIMO principles, concrete VDMT modulation and line bounding concept. The methods for VDMT modulation and partial crosstalk cancellation are discussed and simulation results are presented.

  5. EBULLETIN: SUBSCRIBE NOW!

    CERN Multimedia

    2002-01-01

    You can now subscribe to the Web version of the Weekly Bulletin. With the new alert system, you will receive an e-mail message every Friday at 8.00 a.m. with the Web link to the latest issue. It is very easy to subscribe, just click on the link 'Subscribe' on the home page of the electronic Bulletin.

  6. Subscribing to Transparency

    DEFF Research Database (Denmark)

    He, Yinghua; Nielsson, Ulf; Guo, Hong

    2014-01-01

    The paper empirically explores how more trade transparency affects market liquidity. The analysis takes advantage of a unique setting in which the Shanghai Stock Exchange offered more trade transparency to market participants subscribing to a new software package. First, the results show...... that the additional data disclosure increased trading activity, but also increased transactions costs through wider bid-ask spreads. Thus, in contrast to popular policy belief, the paper finds that more transparency need not improve market liquidity. Second, the paper finds a particularly strong immediate liquidity...... impact accompanied by altered trading behavior, which suggests a significant impact on institutional traders subscribing relatively early. Lastly, since the effective level of market transparency is bound to depend on how many traders are subscribing to the data, the study can empirically establish...

  7. Subscribing to Transparency

    DEFF Research Database (Denmark)

    He, Yinghua; Nielsson, Ulf; Guo, Hong

    The paper empirically explores how more trade transparency affects market liquidity. The analysis takes advantage of a unique setting in which the Shanghai Stock Exchange offered more trade transparency to market participants subscribing to a new software package. First, the results show...... that the additional data disclosure increased trading activity, but also increased transactions costs through wider bid-ask spreads. Thus, in contrast to popular policy belief, the paper finds that more transparency need not improve market liquidity. Second, the paper finds a particularly strong immediate liquidity...... impact accompanied by altered trading behavior, which suggests a significant impact on institutional traders subscribing relatively early. Lastly, since the effective level of market transparency is bound to depend on how many traders are subscribing to the data, the study can empirically establish...

  8. Fiber-optic subscriber system based on passive optical network architecture

    Energy Technology Data Exchange (ETDEWEB)

    Kitazawa, M.; Yamazaki, M.; Himi, S. (Hitachi, Ltd., Tokyo (Japan))

    1994-04-01

    The subscriber line terminal and optical network unit were developed for the fiber-optic subscriber system based on a passive double star (PDS) optical network architecture which allows narrowband ISDN (integrated services digital network) services and video image transmission. Various LSIs were developed to implement the major system functions such as fast bit-synchronization, time division multiple access control, subscriber multiplexing/demultiplexing and 16-channel multiprocessing. For the optical interface module, the wavelength division multiplexing chip was hermetically sealed together with laser diode and photodiode chips by adopting high-silica based optical-waveguide technology to reduce a system dimension. The PDS fiber-optic subscriber system is useful for construction of economic optical subscriber networks because it allows multiple subscribers to share a single optical transmission line and a central equipment unit through a star coupler. 4 refs., 10 figs., 1 tab.

  9. Asymmetric Digital Subscriber Line (ADSL

    Directory of Open Access Journals (Sweden)

    Slavko Šarić

    2012-10-01

    Full Text Available ADSL (Asymmetric Digital Subscriber Line is a technologythat allows transmission at 8.488 Mbps over the existingtelephone copper line (speed range depending on the distance.ADSL circuit connects the ADSL modems by twisted-pairtelephone lines creating three infonnation channels: high speedsimplex (maximum 9 Mbps, medium speed duplex channel(maximum 2 Mbps and plain old telephone service channel.ADSL technology supports up to seven synchronous channelsthat can be configured to meet the needs of the end user.One could simultaneously view four movies stored in MPEG 1fonnat on separate television sets (MPEG 1 transmitted at 1.5Mbps, hold a video-conference (transmitted at 348 kbps,download data files from a server at 128 kbps via ISDN andeven receive a telephone call.

  10. The new OGC Publish-Subscribe specification - status of work

    Science.gov (United States)

    Bigagli, Lorenzo; Echterhoff, Johannes; Braeckel, Aaron

    2013-04-01

    scope was identified after a public phase of analysis and requirements gathering. The PubSub standard version 1.0 in scheduled for release in the summer of 2013. Afterwards, specific PubSub extensions are expected to be defined for OGC Web Services (e.g. WCS, WFS, SOS). The cross-service requirements identified for PubSub 1.0 enable: • Notification capabilities as a module to existing services, with no impact on existing service semantics and by reusing service-specific filtering semantics; • Notifications of service and dataset updates in order to simplify/optimize harvesting by catalogues; • Actual data push and/or update notifications from access services (i.e. WCS, WFS, SOS) to the clients. The use-cases identified for PubSub 1.0 include: • Service Filtered Data Push and Notification. • Notification of Threshold Crossings. • Brokered publish/subscribe. • Distributed Data Synchronization. PubSub 1.0 comprises a core and two extension documents: • Core: defines an abstract description of the mandatory PubSub functionality, independent of the underlying binding technology (several extension classes are also defined, for optional capabilities). • SOAP binding: defines how the PubSub functionality is realized in SOAP services (i.e. leveraging WS-Notification). • RESTful binding: defines how the PubSub functionality is realized in RESTful services.

  11. Electronic Voting Using Identity Domain Separation and Hardware Security Modules

    Science.gov (United States)

    Rössler, Thomas

    E-voting increasingly gains interest in e-Democracy and e-Government movements. Not only the technical security issues of electronic voting systems are of paramount importance, but also the necessity of following an all-embracing approach is challenging and needs to be addressed. This paper discusses e-voting as being a supreme discipline of e-Government. It introduces an innovative e-voting concept using the Internet as the voting channel. The concept introduced is based on Austrian e-Government elements and the Austrian identity management concept in particular. As a result, this paper presents a novel approach of building an e-voting system relying on two core principles: strong end-to-end encryption and stringent identity domain separation.

  12. Publish Subscribe Systems Design and Principles

    CERN Document Server

    Tarkoma, Sasu

    2012-01-01

    This book offers an unified treatment of the problems solved by publish/subscribe, how to design and implement the solutions In this book, the author provides an insight into the publish/subscribe technology including the design, implementation, and evaluation of new systems based on the technology.  The book also addresses the basic design patterns and solutions, and discusses their application in practical application scenarios. Furthermore, the author examines current standards and industry best practices as well as recent research proposals in the area. Finally, necessary content ma

  13. Funding Alert Subscribe Confirmation | IDRC - International ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Thank you. Please check your email ( ) to confirm your subscription to the IDRC Funding Alerts. Please note: the link in your confirmation email is valid for 3 days, so please reply promptly. We fund researchers driving global change. Careers · Contact Us · Subscribe · Unsubscribe · Site map. Follow us; Facebook · Twitter ...

  14. Subscribe to Newsletter | IDRC - International Development ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Innovation. Solutions. Careers · Contact Us · Site map. Sign up now for IDRC news and views sent directly to your inbox each month. Subscribe · Copyright · Open access policy · Privacy policy · Research ethics · Transparency · Website usage. Follow us; Facebook · Twitter · Youtube · Linked In · RSS Feed. © 2016 IDRC.

  15. Reconfiguration Service for Publish/Subscribe Middleware

    NARCIS (Netherlands)

    Zieba, Bogumil; Glandrup, Maurice; van Sinderen, Marten J.; Wegdam, M.

    2006-01-01

    Mission-critical, distributed systems are often designed as a set of distributed, components that interact using publish/subscribe middleware. Currently, in these systems, software components are usually statically allocated to the nodes to fulfil predictability, reliability requirements. However, a

  16. Sinkronisasi Content E-learning Terdistribusi Berbasis Model Komunikasi Indirect Menggunakan Sistem Publish-Subscribe

    Directory of Open Access Journals (Sweden)

    Sufrendo Saputra

    2017-01-01

    Full Text Available Sinkronisasi content antar e-learning memungkinkan beberapa e-learning memiliki content yang sama secara konsisten. Perubahan content pada salah satu e-learning akan membuat sistem memastikan e-learning lain mengetahui perubahan tersebut. Model komunikasi yang memungkinkan adanya sinkronisasi ini merupakan komunikasi indirect berbasis publish-subscribe. Setiap e-learning memiliki content-nya masing-masing yang secara otomatis akan di-publish oleh sistem. E-learning lain yang tergabung dalam sistem sinkronisasi kemudian dapat memilih content mana yang ingin di-subscribe. Jika terdapat perubahan pada sebuah content, dan content tersebut memiliki subscriber, maka sistem akan memberitahu subscriber bahwa telah terjadi perubahan pada content. Teknologi utama yang digunakan dalam sistem ini adalah Moodle, PHP, dan Java. Moodle sebagai modul yang digunakan untuk mensimulasikan e-learning. PHP dan Java sebagai framework dari sistem sinkronisasi. Model komunikasi yang digunakan merupakan komunikasi indirect berbasis publish-subscribe. Model komunikasi ini menempatkan sebuah perantara bagi komunikasi antar e-learning.

  17. Mathematical model of subscriber extension line

    OpenAIRE

    Petříková, Iva; Diviš, Zdeněk; Tesař, Zdeněk

    2012-01-01

    The paper focuses on measurement properties of metallic subscriber extension lines to build regression mathematical model for a symmetric pair cable. The regression model is compared with an analytical model based on a theoretical description of transfer parameters for this type of line. The output of the paper should demonstrate the impact of electromagnetic interference on the symmetric pair. The paper also describes the method to identify the interference sources and ...

  18. Post-learning intranasal oxytocin modulates human memory for facial identity.

    Science.gov (United States)

    Savaskan, Egemen; Ehrhardt, Rike; Schulz, André; Walter, Marc; Schächinger, Hartmut

    2008-04-01

    The nanopeptide oxytocin has physiological functions during labour and lactation. In addition, oxytocin is known to modulate aggression, anxiety, social behaviour and cognition. Little is known about its effects on memory for emotional stimuli. In the present single-blind, placebo-controlled, randomised study we have investigated the short- and long-term effects of a single post-learning dose (20 IU) of intranasal oxytocin on memory for facial identity and expression in 36 healthy young females and males using a face portrait recognition test. In the acquisition phase of the test, 60 different male faces with happy, angry or neutral expressions were presented to the volunteers. Thirty minutes and 24h after oxytocin administration, recognition memory tests were performed using portraits with neutral facial expressions, only. Oxytocin improved identity recognition memory independently of participant's gender, for neutral and angry faces, whereas this effect was not present for happy faces. Oxytocin-treated subjects had a lower bias to judge not previously seen faces as being previously seen. Oxytocin had no effect on facial expression memory. In conclusion, oxytocin has distinct effects on memory performance for facial identity and may contribute to the modulation of social behaviour.

  19. Subscriber loop optical distribution architecture: a cost-effective TDM/TDMA subscriber loop system

    Science.gov (United States)

    Rueda, Javier; Eldering, Charles A.

    1992-02-01

    While it is clear that the development of the laser and low loss optical fiber has had an unmistakable impact on the field of telecommunications, the deployment of optical fiber in the subscriber (local) loop is an especially challenging task. It requires development of low cost equipment that will initially be used at low bit rates (Transmission of TV data, in either analog or digital form, will make more efficient use of the fiber bandwidth and generate additional revenues. But as seen from the perspective of the telephony industry, basic telephone services are the principal source of revenue and economic justification for the installation of subscriber loop fiber systems. For large scale deployment in the subscriber loop, the fiber optic system must provide basic telephone services with equal or better performance at a cost that is competitive with that of existing copper pair technology. In this paper we examine a number of possible fiber-to-the-home (FTTH) and fiber-to-the-curb (FTTC) architectures, and present an architecture for urban areas that is best classified as fiber-to-the-building (FTTB). We examine the costs and performance characteristics of the various networks. We show how demographic information can be used to optimize the capacity of the remote terminals. It is shown that for the demography of Spain (where in urban areas the majority of the population resides in apartment buildings with 10 or more dwellings) a remote terminal with a variable subscriber capacity presents a cost savings over remote terminals with a fixed number of subscriber channels.

  20. Adaptive Modulation with Best User Selection over Non-Identical Nakagami Fading Channels

    KAUST Repository

    Rao, Anlei

    2012-09-08

    In this paper, we analyze the performance of adaptive modulation with single-cell multiuser scheduling over independent but not identical distributed (i.n.i.d.) Nakagami fading channels. Closed-form expressions are derived for the average channel capacity, spectral efficiency, and bit-error-rate (BER) for both constant-power variable-rate and variable-power variable-rate uncoded M-ary quadrature amplitude modulation (M-QAM) schemes. We also study the impact of time delay on the average BER of adaptive M-QAM. Selected numerical results show that the multiuser diversity brings a considerably better performance even over i.n.i.d. fading environments.

  1. Multiuser Diversity with Adaptive Modulation in Non-Identically Distributed Nakagami Fading Environments

    KAUST Repository

    Rao, Anlei

    2012-09-08

    In this paper, we analyze the performance of adaptive modulation with single-cell multiuser scheduling over independent but not identical distributed (i.n.i.d.) Nakagami fading channels. Closed-form expressions are derived for the average channel capacity, spectral efficiency, and bit-error-rate (BER) for both constant-power variable-rate and variable-power variable-rate uncoded/coded M-ary quadrature amplitude modulation (M-QAM) schemes. We also study the impact of time delay on the average BER of adaptive M-QAM. Selected numerical results show that the multiuser diversity brings a considerably better performance even over i.n.i.d. fading environments.

  2. Cultural modulation of self-referential brain activity for personality traits and social identities.

    Science.gov (United States)

    Sul, Sunhae; Choi, Incheol; Kang, Pyungwon

    2012-01-01

    Cross-cultural studies have shown that personality traits are less central and social identities are more important to the selfhood of collectivistic people. However, most cultural neuroscience studies using the self-reference effect (SRE) paradigm have only used personality traits to explore cultural differences in the neural circuits of self-referential processes. In the present study, we used both personality traits and social identities as stimuli in the SRE paradigm and investigated whether and how one's cultural orientation (i.e., individualism vs. collectivism) affects the SRE in the brain. The results showed that the medial prefrontal cortex, anterior cingulate, bilateral temporoparietal regions, and precuneus were involved in self-representation for both personality traits and social identities. Importantly, cultural orientation predicted differential activation patterns in these regions. Collectivists showed stronger activation in the left temporoparietal regions than individualists, who mainly recruited the medial prefrontal regions. Our findings suggest that the personal and social self share common neural substrates, the activation of which can be modulated by one's cultural orientation.

  3. 47 CFR 10.270 - Subscribers' right to terminate subscription.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 1 2010-10-01 2010-10-01 false Subscribers' right to terminate subscription. 10.270 Section 10.270 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL COMMERCIAL MOBILE ALERT SYSTEM Election to Participate in Commercial Mobile Alert System § 10.270 Subscribers' right to...

  4. Utilization and challenges of online subscribed databases by ...

    African Journals Online (AJOL)

    The paper investigated the Utilization and Challenges of Online Databases Subscribed to by university libraries in Katsina State. Objectives of the study were to find out the types of online subscribed databases used by academics in universities in Katsina; the extent to which the academics in the universities use the online ...

  5. Identity's identities

    DEFF Research Database (Denmark)

    Jensen, Kim Ebensgaard

    in Academic English and more everyday-based English, identity as a lexeme is definitely worth having a look at. This paper presents a lexicological study of identity in which some of its senses are identified and their behaviors in actual discourse are observed. Drawing on data from the 2011 section......The word identity is interesting for a number of reasons. Firstly, it covers a number of specialized functions stemming from decades of research into both identity as a theoretical concept itself and into various identities and types of identity. Secondly, it also figures in non......-specialized language in which it also serves a number of functions – some of which are quite fundamental to society as such. In other words, the lexeme identity is a polysemic word and has multiple, well, identities. Given that it appears to have a number of functions in a variety of registers, including terminologies...

  6. Motif Subscriber Menonton Channel YouTube Raditya Dika

    OpenAIRE

    Mellyaningsih, Adinda

    2016-01-01

    Penelitian ini dilakukan untuk mengetahui motif para subscriber dalam menonton channelYouTube Raditya Dika. Raditya Dika merupakan YouTuber Indonesia dengan jumlah subscriber terbanyak dan merupakan orang pertama di Indonesia yang mendapatkan penghargaan Certifies Award oleh YouTube. Peneliti menggunakan teori Uses and Gratification dengan empat indikator, yaitu hiburan dan relaksasi, hubungan antar pribadi, mencari informasi, dan persahabatan. Metode dalam penelitian ini adalah online survei...

  7. Expectations about person identity modulate the face-sensitive N170.

    Science.gov (United States)

    Johnston, Patrick; Overell, Anne; Kaufman, Jordy; Robinson, Jonathan; Young, Andrew W

    2016-12-01

    Identifying familiar faces is a fundamentally important aspect of social perception that requires the ability to assign very different (ambient) images of a face to a common identity. The current consensus is that the brain processes face identity at approximately 250-300 msec following stimulus onset, as indexed by the N250 event related potential. However, using two experiments we show compelling evidence that where experimental paradigms induce expectations about person identity, changes in famous face identity are in fact detected at an earlier latency corresponding to the face-sensitive N170. In Experiment 1, using a rapid periodic stimulation paradigm presenting highly variable ambient images, we demonstrate robust effects of low frequency, periodic face-identity changes in N170 amplitude. In Experiment 2, we added infrequent aperiodic identity changes to show that the N170 was larger to both infrequent periodic and infrequent aperiodic identity changes than to high frequency identities. Our use of ambient stimulus images makes it unlikely that these effects are due to adaptation of low-level stimulus features. In line with current ideas about predictive coding, we therefore suggest that when expectations about the identity of a face exist, the visual system is capable of detecting identity mismatches at a latency consistent with the N170. Copyright © 2016 Elsevier Ltd. All rights reserved.

  8. Subscribers' Complaints and Response of the Global Satellite ...

    African Journals Online (AJOL)

    The GSM subscribers on their part also face many problems, major of which is constant network failure. Other problems include card recharging problem; checking of balance difficulty and wrong deduction of credit. The study was therefore designed to examine how the GSM Network operators respond to the complaints of ...

  9. Subscribe to NIH MedlinePlus the Magazine

    Science.gov (United States)

    ... turn Javascript on. Subscribe to NIH MedlinePlus the magazine NIH MedlinePlus the magazine is published quarterly, in print and on the ... up for a free subscription to NIH MedlinePlus Magazine. Librarians may order this magazine in bulk . Please ...

  10. Subscriber Behavior and Attitudes One Year after PM-AM Conversion.

    Science.gov (United States)

    Rarick, Galen R.; Lemert, James B.

    Because newspapers have begun switching from evening to morning publication with increasing frequency, a study investigated subscriber response to change in publication time and in subscriber behavior over time. In follow-up to an earlier study on subscriber reactions to the conversion to morning publication of the weekday Eugene (Oregon)…

  11. Top-Down Modulation on the Perception and Categorization of Identical Pitch Contours in Speech and Music

    Directory of Open Access Journals (Sweden)

    Joey L. Weidema

    2016-06-01

    Full Text Available Whether pitch in language and music is governed by domain-specific or domain-general cognitive mechanisms is contentiously debated. The aim of the present study was to investigate whether mechanisms governing pitch contour perception operate differently when pitch information is interpreted as either speech or music. By modulating listening mode, this study aspired to demonstrate that pitch contour perception relies on domain-specific cognitive mechanisms, which are regulated by top-down influences from language and music. Three groups of participants (Mandarin speakers, Dutch speaking non-musicians, and Dutch musicians were exposed to identical pitch contours, and tested on their ability to identify these contours in a language and musical context. Stimuli consisted of disyllabic words spoken in Mandarin, and melodic tonal analogues, embedded in a linguistic and melodic carrier phrase, respectively. Participants classified identical pitch contours as significantly different depending on listening mode. Top-down influences from language appeared to alter the perception of pitch contour in speakers of Mandarin. This was not the case for non-musician speakers of Dutch. Moreover, this effect was lacking in Dutch speaking musicians. The classification patterns of pitch contours in language and music seem to suggest that domain-specific categorization is modulated by top-down influences from language and music.

  12. MOBILE SUBSCRIBERS' SATISFACTION TOWARDS SERVICE QUALITY IN TUTICORIN DIST

    OpenAIRE

    Asst. Prof. S. Anthony Rahul Golden

    2017-01-01

    Due to huge competition in the service sector, service providers have to focus on lots of aspects in connection with satisfying the customer. Especially, the providers need to focus on increasing the service quality to maintain their position in the competitive market. Subscribers’ satisfaction is one of the determinants of service quality and perception carried by subscribers plays an important role in choosing a mobile service provider. This paper presents a service quality analysis of mobi...

  13. Suppressing sensorimotor activity modulates the discrimination of auditory emotions but not speaker identity.

    Science.gov (United States)

    Banissy, Michael J; Sauter, Disa Anna; Ward, Jamie; Warren, Jane E; Walsh, Vincent; Scott, Sophie K

    2010-10-13

    Our ability to recognize the emotions of others is a crucial feature of human social cognition. Functional neuroimaging studies indicate that activity in sensorimotor cortices is evoked during the perception of emotion. In the visual domain, right somatosensory cortex activity has been shown to be critical for facial emotion recognition. However, the importance of sensorimotor representations in modalities outside of vision remains unknown. Here we use continuous theta-burst transcranial magnetic stimulation (cTBS) to investigate whether neural activity in the right postcentral gyrus (rPoG) and right lateral premotor cortex (rPM) is involved in nonverbal auditory emotion recognition. Three groups of participants completed same-different tasks on auditory stimuli, discriminating between the emotion expressed and the speakers' identities, before and following cTBS targeted at rPoG, rPM, or the vertex (control site). A task-selective deficit in auditory emotion discrimination was observed. Stimulation to rPoG and rPM resulted in a disruption of participants' abilities to discriminate emotion, but not identity, from vocal signals. These findings suggest that sensorimotor activity may be a modality-independent mechanism which aids emotion discrimination.

  14. People matter: Perceived sender identity modulates cerebral processing of socio-emotional language feedback.

    Science.gov (United States)

    Schindler, Sebastian; Kissler, Johanna

    2016-07-01

    How do human brains integrate content with social context in communication? Recent research demonstrates that the perceived communicative embedding of perceptually identical language messages alters their cortical processing. When emotional trait-adjectives are perceived as human-generated personality feedback, event-related brain potentials are considerably larger than when the same adjectives are perceived as random computer-generated feedback. Here, we investigate the unique role of ascribed sender humanness for the underlying neural mechanisms. Participants were told that they were going to receive written positive, negative, or neutral feedback from an unknown stranger or from a socially intelligent computer system while high-density EEG was recorded. In the event-related potential (ERP), feedback from the 'human sender' elicited larger P2, Early Posterior Negativity (EPN), P3, and Late Positive Potential (LPP) components. The sources of this activity were localized in extended visual cortex, but also in the right superior frontal gyri, related to mentalizing about others, and the bilateral postcentral gyri implicated in embodied language processing. For emotional feedback, larger EPN, P3 and LPP amplitudes were also observed, resulting from enhanced activity in visual and temporal regions. Finally, for the EPN an interaction between sender and emotion was found, showing substantially increased visual processing of human-generated emotional feedback. These data confirm visual amplification effects induced by motivated attention but crucially also reveal distinct effects of perceiving a communication partner as human that activate 'social brain' structures. Obviously who is perceived as saying something can be as relevant as what is said and induce specific brain activity. Copyright © 2016 Elsevier Inc. All rights reserved.

  15. Transmission Delay Modeling of Packet Communication over Digital Subscriber Line

    Directory of Open Access Journals (Sweden)

    Jiri Vodrazka

    2013-01-01

    Full Text Available Certain multimedia and voice services, such as VoIP, IPTV, etc., are significantly delay sensitive and their performance is influenced by the overall transmission delay and its variance. One of the most common solutions used in access networks are xDSL lines, especially ADSL2+ or VDSL2. Although these subscriber lines also use packet communication, there are several differences and mechanisms, which influence their resulting delay. Their delay characteristics are also dependent on the individual settings of each xDSL provider, therefore we decided to investigate this area for typical commercially available lines in Czech Republic. Based on the measured values and experiments with real ADSL2+ lines we also developed a potential modeling method, which is presented in this article as well. The parameters for packet jitter based on the generalized Pareto distribution were modeled.

  16. 47 CFR 10.280 - Subscribers' right to opt out of CMAS notifications.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 1 2010-10-01 2010-10-01 false Subscribers' right to opt out of CMAS notifications. 10.280 Section 10.280 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL COMMERCIAL MOBILE ALERT SYSTEM Election to Participate in Commercial Mobile Alert System § 10.280 Subscribers' right...

  17. Secret Forwarding of Events over Distributed Publish/Subscribe Overlay Network.

    Directory of Open Access Journals (Sweden)

    Young Yoon

    Full Text Available Publish/subscribe is a communication paradigm where loosely-coupled clients communicate in an asynchronous fashion. Publish/subscribe supports the flexible development of large-scale, event-driven and ubiquitous systems. Publish/subscribe is prevalent in a number of application domains such as social networking, distributed business processes and real-time mission-critical systems. Many publish/subscribe applications are sensitive to message loss and violation of privacy. To overcome such issues, we propose a novel method of using secret sharing and replication techniques. This is to reliably and confidentially deliver decryption keys along with encrypted publications even under the presence of several Byzantine brokers across publish/subscribe overlay networks. We also propose a framework for dynamically and strategically allocating broker replicas based on flexibly definable criteria for reliability and performance. Moreover, a thorough evaluation is done through a case study on social networks using the real trace of interactions among Facebook users.

  18. EXtending Mobility to Publish/Subscribe Systems Using a Pro-Active Caching Approach

    Directory of Open Access Journals (Sweden)

    Abdulbaset Gaddah

    2010-01-01

    Full Text Available The publish/subscribe communication paradigm has many characteristics that lend themselves well to mobile wireless networks. Our research investigates the extension of current publish/subscribe systems to support subscriber mobility in such networks. We present a novel mobility management scheme based on a pro-active caching approach to overcome the challenges and the performance concerns of disconnected operations in publish/subscribe systems. We discuss the mechanism of our proposed scheme and present a comprehensive experimental evaluation of our approach and alternative state-of-the-art solutions based on reactive approaches and durable subscriptions. The obtained results illustrate significant performance benefits of our proposed scheme across a range of scenarios. We conclude our work by discussing a modeling approach that can be used to extrapolate the performance of our approach in a near-size environment (in terms of broker network and/or subscriber population to our experimental testbed.

  19. Selection of Digital Subscriber Lines Ready for Next Generation Access

    Directory of Open Access Journals (Sweden)

    Petr Jares

    2015-01-01

    Full Text Available Nowadays, in the EU a lot of project concerning broadband access to the Internet for end users is being developed. The aim of those projects is to support the creation of access communication networks that can meet defined performance criteria for providing the broadband services. Such networks are in general called Next Generation Access. One of the first tasks is to identify appropriate transmission technologies that could meet the required performance criteria. For each transmission technology, it is necessary to carry out a detailed performance analysis of the transmission depending on certain transmission conditions. To perform a detailed analysis means to carry out modelling of transmission’s specific conditions for each technology. This article, specifically, discusses hybrid optical networks, which in conjunction with digital subscriber lines are one of the possible solutions for Next Generation Access. In the access network topology that combines copper and optical cables, it is necessary to optimize the mutual ratio of both infrastructure’s length. Therefore, the article also describes this issue that refers to a certain technology for the Next Generation Access. Specific performance criteria of transmission for access network in the Czech Republic are considered and the optimized location of the external node digital line access multiplexer is discussed.

  20. Teachers Who Teach Their Practice: The Modulation of Hybridised Professional Teacher Identities in Work-Related Educational Programmes in Canada

    Science.gov (United States)

    Farnsworth, Valerie; Higham, Jeremy

    2012-01-01

    This article explores diversity in the identity of vocational teachers and the ways these identities are both situated in cultural and political contexts and built upon life and career histories. The analysis is developed from a study of work-related programmes offered to students aged 15-18 in one school board in Canada, with a particular focus…

  1. An active 3-dimensional localization scheme for femtocell subscribers using E-UTRAN

    KAUST Repository

    Mohammed, Aquil Mirza

    2012-05-01

    Femtocells provide an efficient solution to overcome the indoor coverage problems and also to deal with the traffic within Macro cells. The possibility of localizing femtocell subscriber stations based on the timing ranging advance parameter (TRAP), obtained from E-UTRAN (Evolved UMTS Terrestrial Radio Access Network), within the network signal internals is challenging and is studied throughout in this paper. The principle approach to localization based on Euclidean distances from multiple base stations is outlined.We investigate the specifications of the timing parameters or TRAP used for air interface of 4G network as they relate to calculating the subscriber distances. Computer simulation is used to demonstrate the localization accuracy using multiple base station networks when estimating likely locations of femtocell subscribers stations on a twodimensional coordinate mapping system. However, we further extend our simulations to demonstrate expected location accuracy of subscriber stations, for multiple base station networks, on a three dimensional coordinate mapping scheme. The possibility of of error-fixes shows eight times greater accuracy than in previous results is expected to achieve by applying timing advance techniques to Global System for Mobile communications networks, by using a two-dimensional coordinate mapping scheme. We later compare our study with the effect of global positioning system (GPS) by using a three-dimensional coordinate mapping scheme, which is predicted to give an 72.4 cms accuracy of subscriber station location. © 2012 IEEE.

  2. Authenticated Location-Aware Publish/Subscribe Services in Untrusted Outsourced Environments

    Directory of Open Access Journals (Sweden)

    Han Yan

    2017-01-01

    Full Text Available Location-aware publish/subscribe is an important location-based service based on server-initiated model. Often times, the owner of massive spatio-textual messages and subscriptions outsources its location-aware publish/subscribe services to a third-party service provider, for example, cloud service provider, who is responsible for delivering messages to their relevant subscribers. The issue arising here is that the messages delivered by the service provider might be tailored for profit purposes, intentionally or not. Therefore, it is essential to develop mechanisms which allow subscribers to verify the correctness of the messages delivered by the service provider. In this paper, we study the problem of authenticating messages in outsourced location-aware publish/subscribe services. We propose an authenticated framework which not only can deliver the messages efficiently but also can make the subscribers’ authentication available with low cost. Extensive experiments on a real-world dataset demonstrate the effectiveness and efficiency of our proposed authenticated framework.

  3. Social identity-based motivation modulates attention bias toward negative information: an event-related brain potential study.

    Science.gov (United States)

    Montalan, Benoît; Boitout, Alexis; Veujoz, Mathieu; Leleu, Arnaud; Germain, Raymonde; Personnaz, Bernard; Lalonde, Robert; Rebaï, Mohamed

    2011-01-01

    Research has demonstrated that people readily pay more attention to negative than to positive and/or neutral stimuli. However, evidence from recent studies indicated that such an attention bias to negative information is not obligatory but sensitive to various factors. Two experiments using intergroup evaluative tasks (Study 1: a gender-related groups evaluative task and Study 2: a minimal-related groups evaluative task) was conducted to determine whether motivation to strive for a positive social identity - a part of one's self-concept - drives attention toward affective stimuli. Using the P1 component of event-related brain potentials (ERPs) as a neural index of attention, we confirmed that attention bias toward negative stimuli is not mandatory but it can depend on a motivational focus on affective outcomes. Results showed that social identity-based motivation is likely to bias attention toward affectively incongruent information. Thereby, early onset processes - reflected by the P1 component - appeared susceptible to top-down attentional influences induced by the individual's motivation to strive for a positive social identity.

  4. Is Personal Identity Evaluative? | Poltera | South African Journal of ...

    African Journals Online (AJOL)

    Martha Nussbaum subscribes to the view that our identity is an evaluative question determined by our common, deeply held beliefs about what is worthwhile in human life. In so doing, she asserts that for an account of ethics to have “philosophical power” it needs to be grounded in an account of human nature that is both ...

  5. List of subscribers as the source of data on book history and the history of reading: case study of book subscribers' lists printed in Dalmatia in the early 19th century

    Directory of Open Access Journals (Sweden)

    Jelena Lakuš

    2013-02-01

    Full Text Available Customer networks or lists of subscribers as a new publishing phenomenon first occurred in Dalmatia in the early 19th century. It was a model of collective funding of book, magazine and newspaper publishing, which gradually replaced the earlier system of individual patronage. It resulted in the publication of lists of subscribers that contained the names of all those who financially supported the printing of a book. The data on names of subscribers, their occupation, place of residence and number of copies ordered, which was the usual content of subscribers, lists, make them very valuable sources for research on the history of books and reading. This paper tries to show the research potential of such lists by presenting a case-study of five preserved and available subscribers' lists found in publications printed between 1835 and 1848 in the Zadar print shop of Battara brothers. The paper analyses the quantitative data on subscribers, their geographical distribution, professional profile and gender, which does not exhaust their research potential in full. The analysis has shown that despite the austere educational opportunities, high incidence of unemployment, and many other limitations, there were people who treasured the written word. The subscribers mostly came from coastal cities like Zadar, Split and Dubrovnik, which were the most important publishing and cultural centres. Even though the subscribers came from Austria, Military Border, Italy, Croatia proper and Slavonia, as well as Bosnia and Herzegovina, which was then part of the Ottoman Empire, they make up only one eight of the total number of subscribers in the corpus. The subscribers are both Roman-Catholic and Orthodox, who mostly subscribed to books printed in the Cyrillic script. The subscribers come from a wide range of professions, mostly from the church circles in Dalmatia, and the fewest of them were professors and teachers, members of the army and the police. As expected

  6. A Uniform Publish-Subscribe Infrastructure for Communication in Wireless Mobile Environments

    DEFF Research Database (Denmark)

    Brønsted, Jeppe; Hansen, Klaus Marius; Thorup, Rolf

    2006-01-01

    provides a good communication abstraction for wireless networks of mobile nodes. In this paper we present PSI, a uniform publish-subscribe based infrastructure, for communication in wireless mobile environments. In PSI the application is divided into software components that each handles a well defined...... systems and therefore it is important to have communication middleware that hides the complexity of low level network programming and presents a clean and understandable abstraction over communication to the application programmer. It has previously been shown that the publish-subscribe messaging paradigm...

  7. Alien Crosstalk Cancellation for Multipair Digital Subscriber Line Systems

    Directory of Open Access Journals (Sweden)

    Ginis George

    2006-01-01

    Full Text Available An overview of alien crosstalk cancellation for DSL systems with multiple pairs is here presented. It is shown that when a common crosstalk source affects the receivers of multiple pairs, the noise exhibits a certain correlation among the pairs. In a DMT system, the frequency-domain noise samples are most strongly correlated between pairs when they correspond to the same tone. Thus, noise decorrelation algorithms applied independently for each tone can provide significant performance enhancements. Three possible methods are described for noise decorrelation, one is suitable for two-sided coordination and two are suited for receiver coordination among the pairs. It is theoretically proven that the data-rate performance of these three methods is identical from the perspective of the sum rate over all pairs. Simulation results corresponding to an ADSL2+ two-pair system with a T1 disturber are presented to illustrate the noise correlation property and to indicate the potential performance benefits.

  8. Photonic analog-to-digital converter using Mach-Zehnder modulators having identical half-wave voltages with improved bit resolution.

    Science.gov (United States)

    Yang, Shuna; Wang, Chao; Chi, Hao; Zhang, Xianmin; Zheng, Shilie; Jin, Xiaofeng; Yao, Jianping

    2009-08-01

    A novel approach to perform photonic analog-to-digital conversion with improved bit resolution is proposed and investigated. Instead of using Mach-Zehnder modulators (MZMs) with geometrically-scaled half-wave voltages, the MZMs in the approach have identical half-wave voltages, which greatly simplifies the implementation. To improve the bit resolution without increasing the number of MZMs, each MZM is connected with multiple comparators having multiple thresholds. The quantization and encoding are performed based on the symmetrical number system (SNS) technique. Three new quantization and encoding schemes based on the SNS are proposed and demonstrated. A 4 bit photonic analog-to-digital conversion based on the given schemes is investigated. For the given schemes, two MZMs are needed with the numbers of comparators being 14, 16, and 9, respectively. Numerical simulations and experiments are performed. The effectiveness of the proposed schemes is verified.

  9. Distributing Knight. Using Type-Based Publish/Subscribe for Building Distributed Collaboration Tools

    DEFF Research Database (Denmark)

    Damm, Christian Heide; Hansen, Klaus Marius

    2002-01-01

    more important. We present Distributed Knight, an extension to the Knight tool, for distributed, collaborative, and gesture-based object-oriented modelling. Distributed Knight was built using the type-based publish/subscribe paradigm. Based on this case, we argue that type-based publish...

  10. Crisis states of Helpline subscribers: issues of diagnosis and psychological care

    Directory of Open Access Journals (Sweden)

    G.S. Bannikov

    2014-08-01

    Full Text Available In recent years, the number of calls to the Helpline from people who are in crisis state, often with suicidal tendencies, has increased significantly. It is therefore particularly important that a helpline counselor had instant recognition skills of crisis state and the ability to quickly build a strategy for crisis counseling. The study described in the article was focused on crisis state structure of helpline subscribers using developed “Crisis state maps”. The subject of the study was the critical state of the individual subscribers seeking psychological help. We tested the assumption that the strategies and methods of psychological assistance are directly related to the features of crisis. We studied crisis state in 70 subscribers. Of these, 59 were females (12 to 66 years old and 11 males (11 to 40 years old. The average age of women was 34,5 years, of men – 23,4 years. The overall average age was 28,65 years. The study result was the portrait of typical helpline subscriber personality. We show the possible strategies of counseling

  11. Quantitative Analysis of Commercial Online Resources Subscribed to by Twenty-Three Academic Libraries

    Science.gov (United States)

    Orr, Sandy; Head, Jennifer; Nance, Jim

    2010-01-01

    Collection development for commercial online resources can be difficult without established standards, such as those librarians have for books. Using the Carnegie Classification System can be a good tool for generating a list of comparable universities to discover what they subscribe to. Librarians at the Paul Meek Library at the University of…

  12. 7 CFR 1735.13 - Location of facilities and service for nonrural subscribers.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 11 2010-01-01 2010-01-01 false Location of facilities and service for nonrural subscribers. 1735.13 Section 1735.13 Agriculture Regulations of the Department of Agriculture (Continued) RURAL UTILITIES SERVICE, DEPARTMENT OF AGRICULTURE GENERAL POLICIES, TYPES OF LOANS, LOAN REQUIREMENTS-TELECOMMUNICATIONS PROGRAM Loan Purposes and...

  13. Geolocation of WiMAX Subscriber Stations Based on the Timing Adjust Ranging Parameter

    Science.gov (United States)

    2009-12-01

    actual location. Such a GUI was developed in HTML with JavaScript, utilizing the Google Maps API to provide access to global satellite and terrain maps...idealized honeycomb cell layout, they are generally spaced to provide maximum coverage with the least number of towers dependent on subscriber

  14. Improving Packet Delivery Performance of Publish/Subscribe Protocols in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Ernesto García Davis

    2013-01-01

    Full Text Available MQTT-S and CoAP are two protocols able to use the publish/subscribe model in Wireless Sensor Networks (WSNs. The high scalability provided by the publish/subscribe model may incur a high packet loss and therefore requires an efficient reliability mechanism to cope with this situation. The reliability mechanism of MQTT-S and CoAP employs a method which defines a fixed value for the retransmission timeout (RTO. This article argues that this method is not efficient for deploying publish/subscribe in WSN, because it may be unable to recover a packet, therefore resulting in a lower packet delivery ratio (PDR at the subscriber nodes. This article proposes and evaluates an adaptive RTO method, which consists in using a Smooth Round-trip Time and multiplying it by a constant parameter (K. Thanks to this method, the reliability mechanism of MQTT-S and CoAP would be able to react properly to packet loss and would also be lightweight in terms of energy, memory and computing for sensor nodes where these resources are critical. We present a detailed evaluation of the effects of the K value on the calculation of the adaptive RTO method. We also establish the setting for obtaining the highest PDR on the subscriber nodes for single-hop and multi-hop scenarios. The results for single-hop scenario show that use of the appropriate K value for the adaptive RTO method increases the PDR up to 76% for MQTT-S and up to 38% for CoAP when compared with the use of fixed RTO method for both protocols, respectively. Meanwhile the same comparison for multi-hop scenario, the adaptive RTO method increases the PDR up to 36% for MQTT-S and up to 14% for CoAP.

  15. Improving packet delivery performance of publish/subscribe protocols in wireless sensor networks.

    Science.gov (United States)

    Davis, Ernesto García; Calveras, Anna; Demirkol, Ilker

    2013-01-04

    MQTT-S and CoAP are two protocols able to use the publish/subscribe model in Wireless Sensor Networks (WSNs). The high scalability provided by the publish/subscribe model may incur a high packet loss and therefore requires an efficient reliability mechanism to cope with this situation. The reliability mechanism of MQTT-S and CoAP employs a method which defines a fixed value for the retransmission timeout (RTO). This article argues that this method is not efficient for deploying publish/subscribe in WSN, because it may be unable to recover a packet, therefore resulting in a lower packet delivery ratio (PDR) at the subscriber nodes. This article proposes and evaluates an adaptive RTO method, which consists in using a Smooth Round-trip Time and multiplying it by a constant parameter (K). Thanks to this method, the reliability mechanism of MQTT-S and CoAP would be able to react properly to packet loss and would also be lightweight in terms of energy, memory and computing for sensor nodes where these resources are critical. We present a detailed evaluation of the effects of the K value on the calculation of the adaptive RTO method. We also establish the setting for obtaining the highest PDR on the subscriber nodes for single-hop and multi-hop scenarios. The results for single-hop scenario show that use of the appropriate K value for the adaptive RTO method increases the PDR up to 76% for MQTT-S and up to 38% for CoAP when compared with the use of fixed RTO method for both protocols, respectively. Meanwhile the same comparison for multi-hop scenario, the adaptive RTO method increases the PDR up to 36% for MQTT-S and up to 14% for CoAP.

  16. Realizing IoT service's policy privacy over publish/subscribe-based middleware.

    Science.gov (United States)

    Duan, Li; Zhang, Yang; Chen, Shiping; Wang, Shiyao; Cheng, Bo; Chen, Junliang

    2016-01-01

    The publish/subscribe paradigm makes IoT service collaborations more scalable and flexible, due to the space, time and control decoupling of event producers and consumers. Thus, the paradigm can be used to establish large-scale IoT service communication infrastructures such as Supervisory Control and Data Acquisition systems. However, preserving IoT service's policy privacy is difficult in this paradigm, because a classical publisher has little control of its own event after being published; and a subscriber has to accept all the events from the subscribed event type with no choice. Few existing publish/subscribe middleware have built-in mechanisms to address the above issues. In this paper, we present a novel access control framework, which is capable of preserving IoT service's policy privacy. In particular, we adopt the publish/subscribe paradigm as the IoT service communication infrastructure to facilitate the protection of IoT services policy privacy. The key idea in our policy-privacy solution is using a two-layer cooperating method to match bi-directional privacy control requirements: (a) data layer for protecting IoT events; and (b) application layer for preserving the privacy of service policy. Furthermore, the anonymous-set-based principle is adopted to realize the functionalities of the framework, including policy embedding and policy encoding as well as policy matching. Our security analysis shows that the policy privacy framework is Chosen-Plaintext Attack secure. We extend the open source Apache ActiveMQ broker by building into a policy-based authorization mechanism to enforce the privacy policy. The performance evaluation results indicate that our approach is scalable with reasonable overheads.

  17. Oct-3/4 regulates stem cell identity and cell fate decisions by modulating Wnt/β-catenin signalling

    Science.gov (United States)

    Abu-Remaileh, Monther; Gerson, Ariela; Farago, Marganit; Nathan, Gili; Alkalay, Irit; Zins Rousso, Sharon; Gur, Michal; Fainsod, Abraham; Bergman, Yehudit

    2010-01-01

    Although the transcriptional regulatory events triggered by Oct-3/4 are well documented, understanding the proteomic networks that mediate the diverse functions of this POU domain homeobox protein remains a major challenge. Here, we present genetic and biochemical studies that suggest an unexpected novel strategy for Oct-3/4-dependent regulation of embryogenesis and cell lineage determination. Our data suggest that Oct-3/4 specifically interacts with nuclear β-catenin and facilitates its proteasomal degradation, resulting in the maintenance of an undifferentiated, early embryonic phenotype both in Xenopus embryos and embryonic stem (ES) cells. Our data also show that Oct-3/4-mediated control of β-catenin stability has an important function in regulating ES cell motility. Down-regulation of Oct-3/4 increases β-catenin protein levels, enhancing Wnt signalling and initiating invasive cellular activity characteristic of epithelial-mesenchymal transition. Our data suggest a novel mode of regulation by which a delicate balance between β-catenin, Tcf3 and Oct-3/4 regulates maintenance of stem cell identity. Altering the balance between these proteins can direct cell fate decisions and differentiation. PMID:20736927

  18. Einsatz einer Echtzeit-Publish/Subscribe-Kommunikation für die Teleoperation mobiler Roboter

    Science.gov (United States)

    Lindhorst, Timo; Herms, André; Schulze, Michael

    In der Telerobotik werden mobile Roboter über ein Kommunikationsnetz durch einen Operator ferngesteuert. Um interaktiv zu operieren, mussen Daten in beide Richtungen in Echtzeit kommuniziert werden. Zusätzlich ist eine hohe Ausfallsicherheit des Systems zu gewährleisten. Diese Arbeit beschreibt die Umsetzung ernes solchen Szenarios unter Verwendung einer Echtzeit-Publish/Subscribe-Kommunikation. Ein drahtloses Mesh-Netzwerk erfüllt durch redundante Verbindungen die Anforderungen an die Kommunikation. Eine Publish/Subscribe-Middleware ermöglicht eine inhaltsbasierte Kommunikation und erlaubt dadurch eine hohe Flexibilität der Teilnehmer. Durch die modulare Software-Architektur der Applikationen entsteht ein verteiltes System, in dem mobile Roboter durch netzwerktransparente Kommunikation gesteuert werden.

  19. Building flexible, distributed collaboration tools using type-based publish/subscribe - The Distributed Knight case

    DEFF Research Database (Denmark)

    Hansen, Klaus Marius; Damm, Christian Heide

    2004-01-01

    Distributed collaboration is becoming increasingly impor tant also in software development. Combined with an in creasing interest in experimental and agile approaches to software development, this poses challenges to tool sup port for software development. Specifically, tool support is needed...... for flexible, distributed collaboration. We intro duce the Distributed Knight tool that provides flexible and lightweight support for distributed collaboration in object oriented modelling. The Distributed Knight implementa tion builds crucially on the type-based publish/subscribe distributed communication...

  20. Structured P2P Overlay of Mobile Brokers for Realizing Publish/Subscribe Communication in VANET

    Directory of Open Access Journals (Sweden)

    Tulika Pandey

    2014-01-01

    Full Text Available Publish/subscribe communication paradigm provides asynchrony and decoupling, making it an elegant alternative for designing applications in distributed and dynamic environment such as vehicular ad hoc networks (VANETs. In this paradigm, the broker is the most important component that decouples other two components, namely, publisher and subscriber. Previous research efforts have either utilized the deployment of distributed brokers on stationary road side info-stations or have assigned the role of broker to any moving vehicle on ad hoc basis. In one approach, lots of preinstalled infrastructures are needed whereas, in another, the quality of service is not guaranteed due to unpredictable moving and stopping patterns of vehicles. In this paper, we present the architecture of distributed mobile brokers which are dynamically reconfigurable in the form of structured P2P overlay and act as rendezvous points for matching publications and subscriptions. We have taken city buses in urban settings to act as mobile brokers whereas other vehicles are considered to be in role of publishers and subscribers. These mobile brokers also assist in locating a vehicle for successful and timely transfer of notifications. We have performed an extensive simulation study to compare our approach with previously proposed approaches. Simulation results establish the applicability of our approach.

  1. Structured P2P Overlay of Mobile Brokers for Realizing Publish/Subscribe Communication in VANET

    Science.gov (United States)

    Pandey, Tulika; Garg, Deepak; Gore, Manoj Madhava

    2014-01-01

    Publish/subscribe communication paradigm provides asynchrony and decoupling, making it an elegant alternative for designing applications in distributed and dynamic environment such as vehicular ad hoc networks (VANETs). In this paradigm, the broker is the most important component that decouples other two components, namely, publisher and subscriber. Previous research efforts have either utilized the deployment of distributed brokers on stationary road side info-stations or have assigned the role of broker to any moving vehicle on ad hoc basis. In one approach, lots of preinstalled infrastructures are needed whereas, in another, the quality of service is not guaranteed due to unpredictable moving and stopping patterns of vehicles. In this paper, we present the architecture of distributed mobile brokers which are dynamically reconfigurable in the form of structured P2P overlay and act as rendezvous points for matching publications and subscriptions. We have taken city buses in urban settings to act as mobile brokers whereas other vehicles are considered to be in role of publishers and subscribers. These mobile brokers also assist in locating a vehicle for successful and timely transfer of notifications. We have performed an extensive simulation study to compare our approach with previously proposed approaches. Simulation results establish the applicability of our approach. PMID:24523629

  2. Understanding the Self-Directed Online Learning Preferences, Goals, Achievements, and Challenges of MIT OpenCourseWare Subscribers

    National Research Council Canada - National Science Library

    Curtis J Bonk; Mimi Miyoung Lee; Xiaojing Kou; Shuya Xu; Feng-Ru Sheu

    2015-01-01

      This research targeted the learning preferences, goals and motivations, achievements, challenges, and possibilities for life change of self-directed online learners who subscribed to the monthly OpenCourseWare (OCW...

  3. OPTIMASI PUBLISH-SUBSCRIBE ADAPTIF UNTUK MONITORING KEAMANAN SELASAR GEDUNG G4 TEKNIK ELEKTRO UNIVERSITAS NEGERI MALANG

    Directory of Open Access Journals (Sweden)

    I Made Wirawan

    2017-10-01

    Full Text Available Security and comfort become very important for every educational institution, especially college. Security and comfort should be properly integrated to create an ideal academic atmosphere. This research designs online security monitoring system of G4 TEUM's hallway area by utilizing social media using adaptive Publish Subscribe system. Publisher i.e. students upload the current condition of the G4 TEUM's hallway by utilizing social media: twitter, facebook or instagram, then brokers choose the uploaded data corresponding to G4 content to be sent in the form of notification to subscriber, which is TEUM security in the form of dynamic web application. The experimental results show that by using adaptive Publish-Subscribe method, the cpu usage is reduced by 31,76% and bandwith usage by 39,4%, compared with non-adaptive method, on data event obtained by both publisher and subscribe. Rasa aman dan nyaman merupakan salah satu hal  yang sangat berpengaruh pada dunia pendidikan dalam pembelajaran, khususnya di perguruan tinggi. Keamanan dan kenyamanan harus diintegrasikan dengan baik untuk menciptakan atmosfer akademik yang ideal. Penelitian ini merancang sistem pemantauan keamanan online di area selasar G4 TEUM dengan memanfaatkan media sosial yang menggunakan sistem Publish-Subscribe Adaptif. Publisher yaitu mahasiswa mengunggah kondisi terkini dari selasar G4 TEUM dengan memanfaatkan media sosial, seperti twitter, facebook, dan instagram, kemudian broker memilih data upload sesuai dengan konten G4 yang akan dikirimkan berupa notifikasi ke Subscriber, yaitu pihak keamanan TEUM dalam bentuk aplikasi web dinamis. Hasil percobaan menunjukkan bahwa dengan menggunakan metode Publish-Subscribe adaptif, penggunaan CPU berkurang sebesar 31,76% dan penggunaan bandwidth sebesar 39,4%, dibandingkan dengan metode non adaptif, pada data event yang diperoleh baik pada Publisher maupun Subscriber.

  4. A Generational Comparison of Social Networking Site Use: The Influence of Age and Social Identity

    Science.gov (United States)

    Barker, Valerie

    2012-01-01

    An online survey (N = 256) compared social networking site (SNS) use among younger (millennial: 18-29) and older (baby-boomer: 41-64) subscribers focusing on the influence of collective self-esteem and group identity on motives for SNS use. Younger participants reported higher positive collective self-esteem, social networking site use for peer…

  5. Fashioning Identity

    DEFF Research Database (Denmark)

    Mackinney-Valentin, Maria

    of identity displays, and creating tension between personal statements and social performances. Fashioning Identity explores how this tension is performed through fashion production and consumption,by examining a diverse series of case studies - from ninety-year old fashion icons to the paradoxical rebellion...... by readdressing Fred Davis' seminal concept of 'identity ambivalence' in Fashion, Culture and Identity (1992), Mackinney-Valentin argues that we are in an epoch of 'status ambivalence', in which fashioning one's own identity has become increasingly complicated....

  6. A Traffic Prediction Model for Self-Adapting Routing Overlay Network in Publish/Subscribe System

    Directory of Open Access Journals (Sweden)

    Meng Chi

    2017-01-01

    Full Text Available In large-scale location-based service, an ideal situation is that self-adapting routing strategies use future traffic data as input to generate a topology which could adapt to the changing traffic well. In the paper, we propose a traffic prediction model for the broker in publish/subscribe system, which can predict the traffic of the link in future by neural network. We first introduced our traffic prediction model and then described the model integration. Finally, the experimental results show that our traffic prediction model could predict the traffic of link well.

  7. Solidarity or financial sustainability: an analysis of the values of community-based health insurance subscribers and promoters in Senegal.

    Science.gov (United States)

    Ouimet, Marie-Jo; Fournier, Pierre; Diop, Idrissa; Haddad, Slim

    2007-01-01

    Although community-based health insurance (CBHI) seemed promising to improve access to health care, its implementation has been slow and laborious. We hypothesize that the existing tension between the competing objectives of solidarity and financial sustainability that are pursued by CBHI may partly account for this. This paper aims to evaluate if there is a gap between CBHI subscribers' values and their promoters', and to determine which characteristics of subscribers and CBHIs are associated with their values. A study of all Senegal CBHI organizations was undertaken in 2002. The analysis includes: 1) content of interviews with subscribers and promoters; and 2) multilevel logistical analysis of the links between characteristics of subscribers (n = 394) and organizations (n = 46) and composite indicators representing values (redistribution, solidarity when difficulties, solidarity between healthy and unhealthy). Promoters emphasize financial sustainability; subscribers are split between financial sustainability and solidarity. Men, polygamous families and individuals with a lower socio-professional status are twice as likely to be in favour of redistribution; subscribers who participate in decision-making and those who think their CBHI is facing difficulties are less in favour of solidarity. At CBHI level, although the variance was significant, none of the variables were retained. More attention should be given to reducing the gap between promoters' and subscribers' values, and to increasing member participation in the processes involved in implementing CBHI. This could help all actors involved to understand and improve determinants of enrolment in, and performance of CBHI, thus increasing access to health care for vulnerable populations in developing countries.

  8. Hard Identity and Soft Identity

    Directory of Open Access Journals (Sweden)

    Hassan Rachik

    2006-04-01

    Full Text Available Often collective identities are classified depending on their contents and rarely depending on their forms. Differentiation between soft identity and hard identity is applied to diverse collective identities: religious, political, national, tribal ones, etc. This classification is made following the principal dimensions of collective identities: type of classification (univocal and exclusive or relative and contextual, the absence or presence of conflictsof loyalty, selective or totalitarian, objective or subjective conception, among others. The different characteristics analysed contribute to outlining an increasingly frequent type of identity: the authoritarian identity.

  9. An Analytic Hierarchy Process Analysis: Application to Subscriber Retention Decisions in the Nigerian Mobile Telecommunications

    Directory of Open Access Journals (Sweden)

    Adebiyi Sulaimon Olanrewaju

    2015-12-01

    Full Text Available The introduction of mobile number portability (MNP in the Nigerian telecommunications industry has brought a new challenge for mobile operators. This study investigates the use of Analytic Hierarchy Process (AHP in customer retention decisions in the Nigerian telecommunication industry using a cross-sectional survey design. Primary data were obtained through questionnaires administered to 480 mobile telecommunications subscribers in six tertiary institutions located in Lagos State, Nigeria. These educational institutions were chosen using a multistage sampling technique. Of 438 questionnaires received from subscribers, 408 were valid. Based on this sample data an AHP model was built to assess the determinants of customer retention decisions. Next, eigen values, an eigen vector and maximum lambda (λMax were obtained using the AHP analysis for the matrices. This analysis shows that customers considered call quality as the important in the retention decision. We conclude that AHP is a meaningful tool for determining what motivates retention decisions, that can help network operators formulate effective customer retention strategies.

  10. Appropriate Roles for the Subscriber, Publisher, Editor, Author, and Reviewer in the Archives of Plastic Surgery

    Directory of Open Access Journals (Sweden)

    Kun Hwang

    2013-11-01

    Full Text Available Authors, editors and reviewers, publishers, and subscribers all play their role in scientific journals. These 5 stakeholders are essential to journals. In this paper, firstly, I briefly summarize the role of each journal stakeholder and their respective goals. Secondly, the status of each participant in the Archives of Plastic Surgery is described. Finally, I propose an appropriate role and plan for each of them. Specific roles and responsibilities include the following: subscribers should welcome and submit the critiques of published papers in letters to the editor. Publishers should trust editors and provide them with adequate financial support for ongoing quality improvement of the journal. The editor-in-chief should be given a sufficient period of time-several years-to build up journal quality and train the incoming editor. The editors, including section editors, are also responsible for increasing the author pool. One editor might be designated a 'devil's referee', that is, a kind of devil's advocate with the responsibility of examining the originality of the manuscript, taking a skeptical view of the manuscript, and looking for holes in the methods and results of reported experiments. Authors' responsibilities include submitting manuscripts with scientific integrity and being ready to take responsibility for their articles even long after publication. Finally, reviewers' responsibilities include identifying similar articles not cited. Reviewers are also welcome to write a discussion on the article they review.

  11. Determinants of Customer Loyalty among Mobile Telecom Subscribers in the Brong Ahafo Region of Ghana

    Directory of Open Access Journals (Sweden)

    Kwabena Adjei

    2014-01-01

    Full Text Available The purpose of this study is to investigate the determinants of brand equity among mobile telecom users in Brong Ahafo Region of Ghana. Mobile telecommunication providers have a great role in strengthening the economy and encouraging the efficiency among a large number of subscribers across the country. The success of any business depends on the strength of their brands, which attracts new and existing customers for continuous growth.  In Ghana, there are six mobile telecom providers operating in the market (Vodafone, Airtel, MTN, Tigo, Glo, & Expresso. Primary data was obtained through a questionnaire and residents of Sunyani Municipality were targeted for the study. 200 questionnaires were self-administered by the researchers to the subscribers of all the mobile telecom providers and 194 questionnaires were returned. The questionnaires were analysed using SPSS 16 and pearson correlation was used to establish the relationship between the dependent and independent variables. The results identified call rate/quality, network coverage and sales promotion as having significant positive relationship to customer loyalty. In addition, brand image and prompt customer service were seen to have a less effect on customer loyalty.

  12. Appropriate roles for the subscriber, publisher, editor, author, and reviewer in the archives of plastic surgery.

    Science.gov (United States)

    Hwang, Kun

    2013-11-01

    Authors, editors and reviewers, publishers, and subscribers all play their role in scientific journals. These 5 stakeholders are essential to journals. In this paper, firstly, I briefly summarize the role of each journal stakeholder and their respective goals. Secondly, the status of each participant in the Archives of Plastic Surgery is described. Finally, I propose an appropriate role and plan for each of them. Specific roles and responsibilities include the following: subscribers should welcome and submit the critiques of published papers in letters to the editor. Publishers should trust editors and provide them with adequate financial support for ongoing quality improvement of the journal. The editor-in-chief should be given a sufficient period of time-several years-to build up journal quality and train the incoming editor. The editors, including section editors, are also responsible for increasing the author pool. One editor might be designated a 'devil's referee', that is, a kind of devil's advocate with the responsibility of examining the originality of the manuscript, taking a skeptical view of the manuscript, and looking for holes in the methods and results of reported experiments. Authors' responsibilities include submitting manuscripts with scientific integrity and being ready to take responsibility for their articles even long after publication. Finally, reviewers' responsibilities include identifying similar articles not cited. Reviewers are also welcome to write a discussion on the article they review.

  13. Enabling Large-Scale IoT-Based Services through Elastic Publish/Subscribe.

    Science.gov (United States)

    Vavassori, Sergio; Soriano, Javier; Fernández, Rafael

    2017-09-19

    In this paper, we report an algorithm that is designed to leverage the cloud as infrastructure to support Internet of Things (IoT) by elastically scaling in/out so that IoT-based service users never stop receiving sensors' data. This algorithm is able to provide an uninterrupted service to end users even during the scaling operation since its internal state repartitioning is transparent for publishers or subscribers; its scaling operation is time-bounded and depends only on the dimension of the state partitions to be transmitted to the different nodes. We describe its implementation in E-SilboPS, an elastic content-based publish/subscribe (CBPS) system specifically designed to support context-aware sensing and communication in IoT-based services. E-SilboPS is a key internal asset of the FIWARE IoT services enablement platform, which offers an architecture of components specifically designed to capture data from, or act upon, IoT devices as easily as reading/changing the value of attributes linked to context entities. In addition, we discuss the quantitative measurements used to evaluate the scale-out process, as well as the results of this evaluation. This new feature rounds out the context-aware content-based features of E-SilboPS by providing, for example, the necessary middleware for constructing dashboards and monitoring panels that are capable of dynamically changing queries and continuously handling data in IoT-based services.

  14. Leadership identities

    DEFF Research Database (Denmark)

    Holmgreen, Lise-Lotte

    2018-01-01

    Questioning the assumption that identities can be controlled through a shared organisational culture, the article explores the inculcation of a discourse of diversity into leadership identities in a Danish bank and building society. Thus, it intends to demonstrate that, on the one hand, discourse...... plays a significant role in identity construction and, on the other, that leaders’ constructions may have many sources of inspiration within and outside the organisation, emphasising that identity construction is a complex process in which organisational efforts to promote a common leadership identity...... to construct their leadership identities. While the respondents present comparable identities to the interviewer, the analysis reveals that the they draw on different discourses and employ a number of different discursive means to present this identity. This, the article argues, may be the result of a number...

  15. Roles of publishers, subscription agents, and institutional subscribers in the academic journal business : Opinions after reading the “Series: Perspectives on serials crisis and scholarly communication practice”

    Science.gov (United States)

    Taguchi, Nobuyuki

    Roles of publishers, subscription agents, and institutional subscribers in the academic journal business : Opinions after reading the “Series: Perspectives on serials crisis and scholarly communication practice”

  16. Performing Identities

    DEFF Research Database (Denmark)

    von Wallpach, Sylvia; Hemetsberger, Andrea; Espersen, Peter

    2017-01-01

    performative approaches to branding, this study applies a performativity theory perspective. Brand performances—encompassing playing and liking, basement building and showcasing, creating and innovating, community building and facilitating, storytelling, missionizing, and marketplace developing—exhibit generic...... ludic, creative, economic, and socializing qualities and co-construct involved identities. The findings contribute to a dynamic view of brand identity, highlighting brand identity's performative construction alongside constructions of stakeholder identities and the strong interrelatedness of company...

  17. Organizational Identity

    DEFF Research Database (Denmark)

    Hatch, Mary Jo; Schultz, Majken

    This text presents the classic works on organizational identity alongside more current thinking on the issues. Ranging from theoretical contributions to empirical studies, the readings in this volume address the key issues of organizational identity, and show how these issues have developed through...... contributions from such diverse fields of study as sociology, psychology, management studies and cultural studies. The readings examine questions such as how organizations understand who they are, why organizations develop a sense of identity and belonging, where the boundaries of identity lie...... and the implications of postmodern and critical theories' challenges to the concept of identity as deeply-rooted and authentic....

  18. Identity Assemblages

    DEFF Research Database (Denmark)

    Horn, Line Helverskov

    The study aims at exploring how identity is enacted within the context of a two-year programme in Service, Hospitality, and Tourism Management (SHTM). This research thus investigates how students and educators go about their daily lives in different educational contexts both on and off campus......, the IDENTITY ASSEMBLAGES 8 analysis unfolds the relational understanding of identity by introducing the concept of ‘identity assemblages’, that is, complex actor-networks of the human/non-human and material/immaterial. Furthermore, the analysis describes how the enactment of identities is made possible...... or hindered by organisational patterns, that is, modes of ordering (Law 1994). This is, in essence, an argument for identities as organisational effects. The study’s main contributions may be structured in three categories. First, it explores the applicability of ANT to identity studies and thereby serves...

  19. Secure publish-subscribe protocols for heterogeneous medical wireless body area networks.

    Science.gov (United States)

    Picazo-Sanchez, Pablo; Tapiador, Juan E; Peris-Lopez, Pedro; Suarez-Tangil, Guillermo

    2014-11-28

    Security and privacy issues in medical wireless body area networks (WBANs) constitute a major unsolved concern because of the challenges posed by the scarcity of resources in WBAN devices and the usability restrictions imposed by the healthcare domain. In this paper, we describe a WBAN architecture based on the well-known publish-subscribe paradigm. We present two protocols for publishing data and sending commands to a sensor that guarantee confidentiality and fine-grained access control. Both protocols are based on a recently proposed ciphertext policy attribute-based encryption (CP-ABE) scheme that is lightweight enough to be embedded into wearable sensors. We show how sensors can implement lattice-based access control (LBAC) policies using this scheme, which are highly appropriate for the eHealth domain. We report experimental results with a prototype implementation demonstrating the suitability of our proposed solution.

  20. Identity paradoxes

    Directory of Open Access Journals (Sweden)

    Đurić Jelena

    2010-01-01

    Full Text Available The article considers paradoxical nature of identity that emerges from: 1 the very concept of identity whose abstract generality unites various and even opposite features; 2 the processual nature of reality that is easier to express in the poetical metaphors or abstract principles than in unambiguous conceptual networks; 3 the oppose relationship between being and knowledge, mind and matter, subject and object, self and personality. Entangled in the labyrinth which evade efforts to be conceptually defined, the modern thinking of identity moves towards abandoning the idea of “self” on behalf of the “ego” and towards the misapprehension of identity as being identical. This corresponds to the “time of the lost spirit” stretched between the simultaneous need to find an identity and to give it up.

  1. Medical Identity

    DEFF Research Database (Denmark)

    Musaeus, Peter

    2015-01-01

    Purpose: To examine philosophical stances underpinning medical identity and assess the conceptual relationship between physician, medical practice and culture. Argument: Medical identity is about the ideals and moral positions that physicians take when justifying themselves. Medical identity...... hedonistic versus sentimentalist approaches to medical identity. The sociocultural philosophical analysis of medical identity can shed light on what it means conceptually for a physician to harbor beliefs associated with him/her being taken to be an autonomous professional. It is important because it touches...... on the meaning of being a compassionate, good and skilled physician, making its relevance to person-centered medicine self-evident. Conclusion: Medical identity should be analyzed with reference to literature, philosophy and medical practice in order for the physician to exercise a reflective position...

  2. Federated Identity Management for Research Collaborations

    CERN Document Server

    Broeder, Daan; Kelsey, David; Kershaw, Philip; Lüders, Stefan; Lyall, Andrew; Nyrönen, Tommi; Wartel, Romain; Weyer, Heinz J

    2012-01-01

    Federated identity management (FIM) is an arrangement that can be made among multiple organisations that lets subscribers use the same identification data to obtain access to the secured resources of all organisations in the group. Identity federation offers economic advantages, as well as convenience, to organisations and their users. For example, multiple institutions can share a single application, with resultant cost savings and consolidation of resources. In order for FIM to be effective, the partners must have a sense of mutual trust. A number of laboratories including national and regional research organizations are facing the challenge of a deluge of scientific data that needs to be accessed by expanding user bases in dynamic collaborations that cross organisational and national boundaries. Driven by these needs, representatives from a variety of research communities, including photon/neutron facilities, social science & humanities, high-energy physics, atmospheric science, bioinformatics and fusi...

  3. Implications of New Technological Adaptions on Switching Barriers: An Empirical Study of Mobile Telecommunication Subscribers in Sri Lanka

    Directory of Open Access Journals (Sweden)

    EACP Karunarathne

    2017-02-01

    Full Text Available With the technological advancements in the past few years in the mobile telecommunication industry, customer requirements and their behavioral patterns changed a lot. Implications of two of most popular such technological approaches which are independent from the service provider were discussed in this paper. Usually, firms have identified the value of maintaining a higher level of switching barriers since it is one kind of successful strategic aspects in mobile telecommunication. But, the importance of these strategies was challenged with the adoptions of new technologies. Therefore, to study its’ implication, data set was obtained by conducting a survey from randomly select mobile subscribers in Sri Lanka. Descriptive statistics, correlation analysis, t-test and factorial ANOVA test were used for the data analysis purpose. According to the analysis, it is revealed that these two technological advancements are weakened the level of switching barriers significantly. It may allow subscribers to switch service providers easily. On the other hand, subscribers with higher relationship age are having the highest switching barrier level even though they are users of those new technologies. But a significant difference among users and non-users has been identified through the study. Thus, policy makers are required to come up with new strategies to retain those subscribers within the network.

  4. Civil Identity

    DEFF Research Database (Denmark)

    Petersen, Lars Axel

    of Israel to Luce Irigaray's Feminist agenda of elaborating gender specific civil identities. My intention is to investigate whether these different employments of 'civil identity' point towards a common, and fairly well defined object field asking questions of contemporary relevance to the philosophy......In this paper I will go through a catalogue of examples of contexts in which the term civil identity is currently used, ranging from the formal and technical process of linking a set of administrative and other events to an individual biological person by means of identity cards, fingerprints, iris...

  5. Identity Management

    Data.gov (United States)

    Social Security Administration — Provides information for identity management services on the creation, modification and eventual deletion of accounts and entitlements based on user relationships on...

  6. Challenging Identities

    DEFF Research Database (Denmark)

    Identity is a keyword in a number of academic fields as well as in public debate and in politics. During the last decades, references to identity have proliferated, yet there is no simple definition available that corresponds to the use of the notion in all contexts. The significance of the notio...

  7. Ritual Identity

    NARCIS (Netherlands)

    van der Beek, Suzanne

    2017-01-01

    Rituals are often used as opportunities for self-reflection and identity construction. The Camino to Santiago de Compostela, which has become a singularly popular pilgrimage since the late 1980s, is an example of a ritual that is explicitly used to gain a deeper understanding of one’s identity

  8. Bridging Identities

    Science.gov (United States)

    Deaux, Kay; Burke, Peter

    2010-01-01

    Sociology and psychology are no strangers in the theoretical world of self and identity. Early works by William James (1890), a psychologist, and George Herbert Mead (1934), a sociologist, are often taken as a starting point by investigators in both fields. In more recent years, with the development of a number of identity theories in both fields,…

  9. Brand Identity.

    Science.gov (United States)

    Lawlor, John

    1998-01-01

    Instead of differentiating themselves by building "brand identities," colleges and universities often focus on competing with price. As a result, fewer and fewer institutions base their identities on value, the combination of quality and price. Methods of building two concepts to influence customers' brand image and brand loyalty are…

  10. Bridging Identities through Identity Change

    Science.gov (United States)

    Cantwell, Allison M.; Martiny, Sarah E.

    2010-01-01

    As indicated by Deaux and Burke (this volume), sociology and psychology have shared a tradition of discourse allowing social psychologists to build upon each other's ideas. A conversation between social identity theory and identity theory was initiated fifteen years ago and addressed the similarities and differences between these theories. This…

  11. Electronic identity

    CERN Document Server

    de Andrade, Norberto Nuno Gomes; Argles, David

    2014-01-01

    With the increasing availability of electronic services, security and a reliable means by which identity is verified is essential.Written by Norberto Andrade the first chapter of this book provides an overview of the main legal and regulatory aspects regarding electronic identity in Europe and assesses the importance of electronic identity for administration (public), business (private) and, above all, citizens. It also highlights the role of eID as a key enabler of the economy.In the second chapter Lisha Chen-Wilson, David Argles, Michele Schiano di Zenise and Gary Wills discuss the user-cent

  12. Identity Management

    CERN Document Server

    Pace, A

    2008-01-01

    This paper introduces identity management concepts and discusses various issues associated with its implementation. It will try to highlight technical, legal, and social aspects that must been foreseen when defining the numerous processes that an identity management infrastructure must support. Grid interoperability as well as cross platform interoperability is addressed on the technical aspect, followed by a short discussion on social consequences on user’s privacy when completed traceability is enforced and some examples on how identity management has been implemented at CERN

  13. Theatre Involvement and Well-Being, Age Differences, and Lessons From Long-Time Subscribers.

    Science.gov (United States)

    Meeks, Suzanne; Shryock, Sarah Kelly; Vandenbroucke, Russell J

    2017-04-08

    Activities that provide positive emotions, meaningful social interaction, and psychological stimulation can bolster well-being throughout life. We tested a model of psychological benefit from, and age differences in, adult ticket buyers' involvement with a large regional theatre. We sent online surveys to Actors Theatre of Louisville ticketbuyers, measuring involvement with the theatre, satisfaction/enjoyment, social engagement, flow, and sense of belonging while attending, and well-being. Structural models (N = 496) tested a model of well-being and age differences; focus groups of older subscribers (N = 20) elaborated quantitative findings. As hypothesized, theatre involvement was indirectly related to satisfaction and enjoyment of the theatre, hedonic well-being, and social functioning, through the psychosocial benefits of flow, social engagement, and belonging. Age moderated the model relationships: involvement was more strongly related to benefits for younger than older participants, but there were no age differences in the relationship between benefits and well-being. Focus group participants articulated how theatre contributes to a sense of community and pride of place, connecting individual well-being to community well-being. Involvement in performing arts organizations may have lifelong benefits. The relationship between involvement and psychosocial benefit may be particularly strong for younger audience members despite the fact that older adults have more involvement. Older adults with long-term involvement appear to benefit even when they reduce their involvement. Our qualitative findings underscore the great richness of experience that younger generations might lose as a result of lower participation.

  14. Pull vs. Push: How OmniEarth Delivers Better Earth Observation Information to Subscribers

    Science.gov (United States)

    Fish, C.; Slagowski, S.; Dyrud, L.; Fentzke, J.; Hargis, B.; Steerman, M.

    2015-04-01

    Until very recently, the commercialization of Earth observation systems has largely occurred in two ways: either through the detuning of government satellites or the repurposing of NASA (or other science) data for commercial use. However, the convergence of cloud computing and low-cost satellites is enabling Earth observation companies to tailor observation data to specific markets. Now, underserved constituencies, such as agriculture and energy, can tap into Earth observation data that is provided at a cadence, resolution and cost that can have a real impact to their bottom line. To connect with these markets, OmniEarth fuses data from a variety of sources, synthesizes it into useful and valuable business information, and delivers it to customers via web or mobile interfaces. The "secret sauce" is no longer about having the highest resolution imagery, but rather it is about using that imagery - in conjunction with a number of other sources - to solve complex problems that require timely and contextual information about our dynamic and changing planet. OmniEarth improves subscribers' ability to visualize the world around them by enhancing their ability to see, analyze, and react to change in real time through a solutions-as-a-service platform.

  15. An Electric Vehicle Charging Management Scheme Based on Publish/Subscribe Communication Framework

    Science.gov (United States)

    Cao, Yue; Wang, Ning; Kamel, George; Kim, Young-Jin

    2017-09-01

    Motivated by alleviating CO$_2$ pollution, Electric Vehicle (EV) based applications have recently received wide interests from both commercial and research communities by using electric energy instead of traditional fuel energy. Although EVs are inherently with limited travelling distance, such limitation could be overcome by deploying public Charging Stations (CSs) to recharge EVs battery during their journeys. In this paper we propose a novel communication framework for on-the-move EV charging scenario, based on the Publish/Subscribe (P/S) mechanism for disseminating necessary CS information to EVs, in order for them to make optimized decisions on where to charge. A core part of our communication framework is the utilization of Road Side Units (RSUs) to bridge the information flow from CSs to EVs, which has been regarded as a type of cost-efficient communication infrastructure. Under this design, we introduce two complementary communication modes of signalling protocols, namely Push and Pull Modes, in order to enable the required information dissemination operation. Both analysis and simulation show the advantage of Pull Mode, in which the information is cached at RSUs to support asynchronous communication. We further propose a remote reservation service based on the Pull Mode, such that the CS-selection decision making can utilize the knowledge of EVs' charging reservation, as published from EVs through RSUs to CSs. Results show that both the performance at CS and EV sides are further improved based on using this anticipated information.

  16. Challenging Identities

    DEFF Research Database (Denmark)

    , cultural, and political practices. Notions of national identity and national politics are challenged by European integration, as well as by increasing demographic heterogeneity due to migration, and migrants experience conflicts of identification stemming from clashes between cultural heritage...

  17. Challenging Identities

    DEFF Research Database (Denmark)

    Identity is a keyword in a number of academic fields as well as in public debate and in politics. During the last decades, references to identity have proliferated, yet there is no simple definition available that corresponds to the use of the notion in all contexts. The significance of the notion...... depends on the conceptual or ideological constellation in which it takes part. This volume on one hand demonstrates the role of notions of identity in a variety of European contexts, and on the other hand highlights how there may be reasons to challenge the use of the term and corresponding social......, cultural, and political practices. Notions of national identity and national politics are challenged by European integration, as well as by increasing demographic heterogeneity due to migration, and migrants experience conflicts of identification stemming from clashes between cultural heritage...

  18. Insomnia identity.

    Science.gov (United States)

    Lichstein, Kenneth L

    2017-10-01

    Insomnia identity refers to the conviction that one has insomnia, and this sleep complaint can be measured independently of sleep. Conventional wisdom predicts that sleep complaints are synchronous with poor sleep, but crossing the presence or absence of poor sleep with the presence or absence of insomnia identity reveals incongruity with expected patterns. This review of existing research on insomnia identity processes and influence finds that about one-fourth of the population are uncoupled sleepers, meaning there is an uncoupling of sleep and sleep appraisal, and daytime impairment accrues more strongly to those who endorse an insomnia identity. Research supports the conclusion that there is a cost to pathologizing sleep. Individuals claiming an insomnia identity, regardless of sleep status, are at greater risk for a range of sequelae including self-stigma, depression, suicidal ideation, anxiety, hypertension, and fatigue. A broad research agenda is proposed with hypotheses about the sources, clinical mechanisms, and clinical management of insomnia identity. Copyright © 2017 Elsevier Ltd. All rights reserved.

  19. Identity, identity politics, and neoliberalism

    Directory of Open Access Journals (Sweden)

    Wrenn Mary

    2014-01-01

    Full Text Available With the intensification of neoliberalism, it is useful to examine how some individuals might cope with the irrationality of the system. Neoliberalism cloaks the execution of the corporate agenda behind rhetorical manipulation that advocates for limited government. The corollary absence of government involvement on behalf of the citizenry writ large disarms the means of social redress for the individual. Democracy funded and fueled by corporate power thereby disenfranchises the individual, provoking some to search for empowerment through identity politics. The argument set forth suggests that individuals construct, reinforce, or escalate allegiance to identities as a coping mechanism, some of which manifest in violent identity politics.

  20. Self-Adapting Routing Overlay Network for Frequently Changing Application Traffic in Content-Based Publish/Subscribe System

    Directory of Open Access Journals (Sweden)

    Meng Chi

    2014-01-01

    Full Text Available In the large-scale distributed simulation area, the topology of the overlay network cannot always rapidly adapt to frequently changing application traffic to reduce the overall traffic cost. In this paper, we propose a self-adapting routing strategy for frequently changing application traffic in content-based publish/subscribe system. The strategy firstly trains the traffic information and then uses this training information to predict the application traffic in the future. Finally, the strategy reconfigures the topology of the overlay network based on this predicting information to reduce the overall traffic cost. A predicting path is also introduced in this paper to reduce the reconfiguration numbers in the process of the reconfigurations. Compared to other strategies, the experimental results show that the strategy proposed in this paper could reduce the overall traffic cost of the publish/subscribe system in less reconfigurations.

  1. [Identity theft

    CERN Multimedia

    Wolinksy, H

    2003-01-01

    "A new survey by the Federal Trade Commission indicates that over the last five years one in four American households has been hit by identity theft, which can result in thieves tapping their victims' credit cards or bank accounts" (1 page).

  2. Mediating Identity

    DEFF Research Database (Denmark)

    Kjærgaard, Annemette Leonhardt; Morsing, Mette; Ravasi, Davide

    2011-01-01

    This paper reports a longitudinal field study on the effects of positive media coverage on the reconstruction of organizational identity. The study highlights how intense positive coverage – to the point of turning an organization into a ‘celebrity’– influences both the way members understand the...

  3. Designer's Identity

    DEFF Research Database (Denmark)

    Kunrath, Kamila; Cash, Philip; Li-Ying, Jason

    2016-01-01

    A designer’s professional identity (DPI) develops through both education and professional experience, building on core personality traits and innate skills. In this paper a systematic literature review and a secondary narrative review were developed in order to map personal attributes and design...

  4. Challenging Identities

    DEFF Research Database (Denmark)

    to the Balkans, the contributions demonstrate uses and abuses of the notion of identity. Authors: Ceglar Keydar, Bogazici (Bosporus) University ; Manuela Marin, Spanish National Research Council ; Allan Janik, Forschungsinstitut Brenner-Archiv ; Richard Wolin, City University of New York Graduate Center ; Mikael...

  5. Challenging Identities

    DEFF Research Database (Denmark)

    , cultural, and political practices. Notions of national identity and national politics are challenged by European integration, as well as by increasing demographic heterogeneity due to migration, and migrants experience conflicts of identification stemming from clashes between cultural heritage...... Rask Madsen, JUR Center for International CourtsOrganisation ; Henning Koch, JUR Center for retskulturelle studierOrganisation ; Peter E. Nielsen ; Catharina Raudvere, Institut for Tværkulturelle og Regionale StudierOrganisation: Institut ; Barbara Törnqvist-Plewa, University of Lund, Sweden ; Karl...

  6. Identity transformation

    DEFF Research Database (Denmark)

    Neergaard, Helle; Robinson, Sarah; Jones, Sally

    This paper develops the concept of ‘pedagogical nudging’ and examines four interventions in an entrepreneurship classroom and the potential it has for student identity transformation. Pedagogical nudging is positioned as a tool, which in the hands of a reflective, professional, with an understand......This paper develops the concept of ‘pedagogical nudging’ and examines four interventions in an entrepreneurship classroom and the potential it has for student identity transformation. Pedagogical nudging is positioned as a tool, which in the hands of a reflective, professional......, as well as the resources they have when they come to the classroom. It also incorporates perspectives from (ii) transformational learning and explores the concept of (iii) nudging from a pedagogical viewpoint, proposing it as an important tool in entrepreneurship education. The study incorporates......) assists students in straddling the divide between identities, the emotions and tensions this elicits, and (iv) transform student understanding. We extend nudging theory into a new territory. Pedagogical nudging techniques may be able to unlock doors and bring our students beyond the unacknowledged...

  7. Designer's Identity

    DEFF Research Database (Denmark)

    Kunrath, Kamila; Cash, Philip; Li-Ying, Jason

    2016-01-01

    A designer’s professional identity (DPI) develops through both education and professional experience, building on core personality traits and innate skills. In this paper a systematic literature review and a secondary narrative review were developed in order to map personal attributes and design...... skills that comprise the DPI. Just a few works in literature dealt with these two elements holistically. Thus, in order to address this gap a holistic understanding of these elements, in context, is proposed as a cohesive framework where a DPI can be described as it evolves over time....

  8. Challenging Identities

    DEFF Research Database (Denmark)

    , cultural, and political practices. Notions of national identity and national politics are challenged by European integration, as well as by increasing demographic heterogeneity due to migration, and migrants experience conflicts of identification stemming from clashes between cultural heritage...... and the cultures of the new habitat. European horizons—frames of mind, historical memories, and expectations at the level of groups or communities, at the national level, and at the general European level—are at odds. Analyzing a series of issues in European countries from Turkey to Spain and from Scandinavia...

  9. Analisis Kinerja Subscriber Station WiMAX di Urban Area Bandung

    Directory of Open Access Journals (Sweden)

    DWI ARYANTA

    2017-06-01

    results show the highest CINR value is 31 dB with 64 QAM modulation - ¾ and the lowest value of 10 dB with BPSK modulation half. The highest RSSI value of -54 dBm being the lowest and -89 dBm RSSI value. The highest throughput for streaming video services by 1000.8 kbps ( downlink with 64 QAM modulation - ¾. The lowest value was 56.247 ms delay in LOS conditions and the highest was 139.5 ms in NLOS conditions. The greatest value by 20 % packet loss is the farthest measurement locations 14.3 km.   Keywords : delay, packet loss, RSSI, CINR, throughput, CPE, WiMAX .

  10. Photovoltaic module and module arrays

    Energy Technology Data Exchange (ETDEWEB)

    Botkin, Jonathan [El Cerrito, CA; Graves, Simon [Berkeley, CA; Lenox, Carl J. S. [Oakland, CA; Culligan, Matthew [Berkeley, CA; Danning, Matt [Oakland, CA

    2012-07-17

    A photovoltaic (PV) module including a PV device and a frame. The PV device has a PV laminate defining a perimeter and a major plane. The frame is assembled to and encases the laminate perimeter, and includes leading, trailing, and side frame members, and an arm that forms a support face opposite the laminate. The support face is adapted for placement against a horizontal installation surface, to support and orient the laminate in a non-parallel or tilted arrangement. Upon final assembly, the laminate and the frame combine to define a unitary structure. The frame can orient the laminate at an angle in the range of 3.degree.-7.degree. from horizontal, and can be entirely formed of a polymeric material. Optionally, the arm incorporates integral feature(s) that facilitate interconnection with corresponding features of a second, identically formed PV module.

  11. Photovoltaic module and module arrays

    Energy Technology Data Exchange (ETDEWEB)

    Botkin, Jonathan; Graves, Simon; Lenox, Carl J. S.; Culligan, Matthew; Danning, Matt

    2013-08-27

    A photovoltaic (PV) module including a PV device and a frame, The PV device has a PV laminate defining a perimeter and a major plane. The frame is assembled to and encases the laminate perimeter, and includes leading, trailing, and side frame members, and an arm that forms a support face opposite the laminate. The support face is adapted for placement against a horizontal installation surface, to support and orient the laminate in a non-parallel or tilted arrangement. Upon final assembly, the laminate and the frame combine to define a unitary structure. The frame can orient the laminate at an angle in the range of 3.degree.-7.degree. from horizontal, and can be entirely formed of a polymeric material. Optionally, the arm incorporates integral feature(s) that facilitate interconnection with corresponding features of a second, identically formed PV module.

  12. Alternative Identities in Multicultural Schools in Israel: Emancipatory Identity, Mixed Identity and Transnational Identity

    Science.gov (United States)

    Resnik, Julia

    2006-01-01

    Economic and technological processes of globalization and the increasing migrations of people in the world undermine dominant national identities. One of the main characteristics of our time is the instability of identities and the continuous invention of new/old identities. Traditions and ethnic identities are deconstructed and reconstructed.…

  13. Personal Identity in Italy

    Science.gov (United States)

    Crocetti, Elisabetta; Rabaglietti, Emanuela; Sica, Luigia Simona

    2012-01-01

    This chapter discusses specifics of identity formation in Italian adolescents and emerging adults. We review consistent evidence illustrating that, in Italy, a progressive deferral of transition to adulthood strongly impacts youth identity development by stimulating identity exploration and postponement of identity commitments. We also consider…

  14. A communication model to integrate the Request-Response and the Publish-Subscribe paradigms into ubiquitous systems.

    Science.gov (United States)

    Rodríguez-Domínguez, Carlos; Benghazi, Kawtar; Noguera, Manuel; Garrido, José Luis; Rodríguez, María Luisa; Ruiz-López, Tomás

    2012-01-01

    The Request-Response (RR) paradigm is widely used in ubiquitous systems to exchange information in a secure, reliable and timely manner. Nonetheless, there is also an emerging need for adopting the Publish-Subscribe (PubSub) paradigm in this kind of systems, due to the advantages that this paradigm offers in supporting mobility by means of asynchronous, non-blocking and one-to-many message distribution semantics for event notification. This paper analyzes the strengths and weaknesses of both the RR and PubSub paradigms to support communications in ubiquitous systems and proposes an abstract communication model in order to enable their seamless integration. Thus, developers will be focused on communication semantics and the required quality properties, rather than be concerned about specific communication mechanisms. The aim is to provide developers with abstractions intended to decrease the complexity of integrating different communication paradigms commonly needed in ubiquitous systems. The proposal has been applied to implement a middleware and a real home automation system to show its applicability and benefits.

  15. A Communication Model to Integrate the Request-Response and the Publish-Subscribe Paradigms into Ubiquitous Systems

    Directory of Open Access Journals (Sweden)

    Tomás Ruiz-López

    2012-06-01

    Full Text Available The Request-Response (RR paradigm is widely used in ubiquitous systems to exchange information in a secure, reliable and timely manner. Nonetheless, there is also an emerging need for adopting the Publish-Subscribe (PubSub paradigm in this kind of systems, due to the advantages that this paradigm offers in supporting mobility by means of asynchronous, non-blocking and one-to-many message distribution semantics for event notification. This paper analyzes the strengths and weaknesses of both the RR and PubSub paradigms to support communications in ubiquitous systems and proposes an abstract communication model in order to enable their seamless integration. Thus, developers will be focused on communication semantics and the required quality properties, rather than be concerned about specific communication mechanisms. The aim is to provide developers with abstractions intended to decrease the complexity of integrating different communication paradigms commonly needed in ubiquitous systems. The proposal has been applied to implement a middleware and a real home automation system to show its applicability and benefits.

  16. What can and cannot be willed: how politicians talk about national identity and immigrants

    DEFF Research Database (Denmark)

    Jensen, Kristian Kriegbaum

    2014-01-01

    The ethnic-civic framework remains widely used in nationalism research. However, in the context of European immigrant integration politics, where almost all ‘nation talk’ is occurring in civic and liberal registers, the framework has a hard time identifying how conceptions of national identity...... is tested on the political debate on immigrant integration in Denmark and Norway in selected years. Indeed, the framework enables us to move beyond the widespread idea that Danish politicians subscribe to an ethnic conception of the nation, while Norwegian political thought is somewhere in between an ethnic...

  17. Asian American Adolescent Identity

    OpenAIRE

    Ohm, Julie Juhye

    1999-01-01

    The formation of ego identity in Asian American late adolescents attending Virginia Tech was examined within the frameworks of Erikson's psychosocial theory and Berry, Trimble, and Olmedo's model of acculturation. Ego identity was measured using the Achieved sub-scale of the Revised Version of the Extended Objective Measure of Ego Identity Status, an instrument based on the theoretical constructs of Erikson. Ethnic identity was measured using the Multigroup Ethnic Identity Measure and America...

  18. European Identity between Ethnic and Civic Identities

    Directory of Open Access Journals (Sweden)

    Paul Kun

    2015-11-01

    Full Text Available The European identity is not a reality, but a necessity for a stabile future of the European political construction. The democratic deficit problem results from the fact that the European project was conceived as a top-down type of action. Its legitimization is however a bottom-up process. For this reason, the institutional project needs to be supported by an ideological project for a European identity. There are two ways, two different patterns for the second charge: the ethnic-cultural identity or the civic identity. Each has his advantages, but also disadvantages. This paper analyzes the results of one sociological research among young Romanian students.

  19. Identity Work and Emotions

    DEFF Research Database (Denmark)

    Winkler, Ingo

    2018-01-01

    This paper reviews the empirical literature on identity work and identifies two distinct approaches to incorporating emotion. The majority of empirical studies use emotion to describe the experiences of identity work. In doing so, the authors (a) mention the emotions that people feel in situations...... that trigger identity work, (b) illustrate identity work as an emotional endeavour, and (c) describe the emotional impact of successful and unsuccessful identity work. There is also an emerging literature that examines the mutual constitution of emotions and identity work. These authors address emotional...... labour, affective social identification, emotional attachment and detachment, and humour when studying identity work. This paper suggests that, to understand better the relation between emotions and identity work, future research should examine the role of emotions in problematizing identity...

  20. The Identity and Identity Identification of Teachers

    Science.gov (United States)

    Qu, Zhengwei

    2008-01-01

    When we tend to analyze the living conditions of teachers, system arrangement and identity identification can be considered a significant method for analysis. In reality, there appears a phenomenon of overlapping identification in the identity identification of teachers in China, which leads to plural selections in the identification manners of…

  1. From National Identity to European Identity

    Directory of Open Access Journals (Sweden)

    Radu CINPOES

    2008-04-01

    Full Text Available Since the Maastricht Treaty in 1992, and especially in the past few years, the European Union has been going through a mixed process of expansion and consolidation. In the last ten years alone there were two new waves of accession, the EU launched the single currency and failed attempts have been made to introduce a constitution. With all these transformations taking place, attention is more and more centred on the question whether a European identity is emerging. This article investigates this issue examining comparativelythe patterns of national identity and of European identity formation and focusing on whether the relationship between the two is a zero-sum type. The aim is to show that although national identity is not necessarily an obstacle for the development of European identity, nationalism is.

  2. Identities as organizational practices

    DEFF Research Database (Denmark)

    Oshima, Sae; Asmuß, Birte

    Identity has been widely acknowledged as playing a central role in various organizational processes, yet there is still a need to better understand the dynamics and functions of identity work in modern organizations. The present paper is centered within this concern, and examines identity......) reveal the intersubjective, multimodal and embodied nature of identity work; 2) demonstrate identity work as organizational practices, used in order to accomplish specific actions; and 3) pose a question on the view on identity as a layered/leveled phenomenon....

  3. Teachers' interpersonal role identity

    NARCIS (Netherlands)

    van der Want, Anna C.; den Brok, Perry; Beijaard, Douwe; Brekelmans, Mieke; Claessens, Luce C A; Pennings, Helena J M

    2014-01-01

    This article investigates the link between teachers' appraisal of specific interpersonal situations in classrooms and their more general interpersonal identity standard, which together form their interpersonal role identity. Using semi-structured and video-stimulated interviews, data on teachers'

  4. Teachers' Interpersonal Role Identity

    NARCIS (Netherlands)

    van der Want, Anna C.; den Brok, Perry; Beijaard, Douwe; Brekelmans, Mieke; Claessens, Luce C A; Pennings, Helena J M

    2015-01-01

    This article investigates the link between teachers' appraisal of specific interpersonal situations in classrooms and their more general interpersonal identity standard, which together form their interpersonal role identity. Using semi-structured and video-stimulated interviews, data on teachers'

  5. Negotiating work identity

    Directory of Open Access Journals (Sweden)

    Tamsen Saayman

    2011-03-01

    Full Text Available Orientation: The study explored the dynamics of work identity negotiation and construction.Research purpose: The aim of the study was to investigate identity tensions and demands that mobilise identity work in the work environment.Motivation for the study: The study hoped to improve the understanding of the dynamics of identity construction and negotiation.Research design, approach and method: Using grounded theory methodology in the context of qualitative field research, the researchers conducted two unstructured interviews with 28 employees of a South African manufacturing company.Main findings: The five primary dimensions the data yielded were personal identity, individual agency, social identity, social practice and job.Practical/managerial implications: This study has implications for organisations that want to improve productivity through understanding work identity.Contribution/value-add: The article presents a conceptual model of the demands and tensions that influence work identity.

  6. Diversity of deaf identities.

    Science.gov (United States)

    Bat-Chava, Y

    2000-12-01

    Social Identity Theory (Tajfel, 1981) posits that members of minority groups achieve positive social identity by (a) attempting to gain access to the mainstream through individual mobility or (b) working with other group members to bring about social change. Some people may use a combination of both strategies. Through the use of cluster analysis, the existence of three identities associated with these strategies was discerned in a sample of 267 deaf adults: culturally hearing identity, culturally deaf identity, and bicultural identity, each comprising about a third of the sample. A subset of 56 people were interviewed in depth; excerpts are presented to illustrate the identity types. Qualified support was found for the prediction that people with culturally deaf and bicultural identities would have higher self-esteem.

  7. Understanding Identity and Organizations

    DEFF Research Database (Denmark)

    Christensen, Lars Thøger

    2013-01-01

    The article reviews the book "Understanding Identity and Organizations," by Kate Kenny, Andrea Whitle, and Hugh Wilmott.......The article reviews the book "Understanding Identity and Organizations," by Kate Kenny, Andrea Whitle, and Hugh Wilmott....

  8. Researching Identity and Interculturality

    DEFF Research Database (Denmark)

    Lønsmann, Dorte

    2016-01-01

    Review of: Researching Identity and Interculturality / by F. Dervin and K. Risager (eds.). Routledge 2015, 245 pp.......Review of: Researching Identity and Interculturality / by F. Dervin and K. Risager (eds.). Routledge 2015, 245 pp....

  9. Mobile Identity Management

    NARCIS (Netherlands)

    Hoepman, J.J.

    2011-01-01

    Identity management consists of the processes and all underlying technologies for the creation, management, and usage of digital identities. Business rely on identity management systems to simplify the management of access rights to their systems and services for both their employees and their

  10. Language, Power and Identity

    Science.gov (United States)

    Wodak, Ruth

    2012-01-01

    How are identities constructed in discourse? How are national and European identities tied to language and communication? And what role does power have--power in discourse, over discourse and of discourse? This paper seeks to identify and analyse processes of identity construction within Europe and at its boundaries, particularly the diversity of…

  11. Identity Security Awareness

    OpenAIRE

    Philipsen, Nayna C.

    2004-01-01

    Identity theft is an increasing concern when organizations, businesses, and even childbirth educators ask for a client's Social Security number for identification purposes. In this column, the author suggests ways to protect one's identity and, more importantly, decrease the opportunities for identity theft.

  12. Teachers' Interpersonal Role Identity

    Science.gov (United States)

    van der Want, Anna C.; den Brok, Perry; Beijaard, Douwe; Brekelmans, Mieke; Claessens, Luce C. A.; Pennings, Helena J. M.

    2015-01-01

    This article investigates the link between teachers' appraisal of specific interpersonal situations in classrooms and their more general interpersonal identity standard, which together form their interpersonal role identity. Using semi-structured and video-stimulated interviews, data on teachers' appraisals and interpersonal identity standards…

  13. Identity and Professional Networking.

    Science.gov (United States)

    Raj, Medha; Fast, Nathanael J; Fisher, Oliver

    2017-06-01

    Despite evidence that large professional networks afford a host of financial and professional benefits, people vary in how motivated they are to build such networks. To help explain this variance, the present article moves beyond a rational self-interest account to examine the possibility that identity shapes individuals' intentions to network. Study 1 established a positive association between viewing professional networking as identity-congruent and the tendency to prioritize strengthening and expanding one's professional network. Study 2 revealed that manipulating the salience of the self affects networking intentions, but only among those high in networking identity-congruence. Study 3 further established causality by experimentally manipulating identity-congruence to increase networking intentions. Study 4 examined whether identity or self-interest is a better predictor of networking intentions, providing support for the former. These findings indicate that identity influences the networks people develop. Implications for research on the self, identity-based motivation, and professional networking are discussed.

  14. Neurodegeneration and Identity.

    Science.gov (United States)

    Strohminger, Nina; Nichols, Shaun

    2015-09-01

    There is a widespread notion, both within the sciences and among the general public, that mental deterioration can rob individuals of their identity. Yet there have been no systematic investigations of what types of cognitive damage lead people to appear to no longer be themselves. We measured perceived identity change in patients with three kinds of neurodegenerative disease: frontotemporal dementia, Alzheimer's disease, and amyotrophic lateral sclerosis. Structural equation models revealed that injury to the moral faculty plays the primary role in identity discontinuity. Other cognitive deficits, including amnesia, have no measurable impact on identity persistence. Accordingly, frontotemporal dementia has the greatest effect on perceived identity, and amyotrophic lateral sclerosis has the least. We further demonstrated that perceived identity change fully mediates the impact of neurodegenerative disease on relationship deterioration between patient and caregiver. Our results mark a departure from theories that ground personal identity in memory, distinctiveness, dispositional emotion, or global mental function. © The Author(s) 2015.

  15. On a class of semicommutative modules

    Indian Academy of Sciences (India)

    Abstract. Let R be a ring with identity, M a right R-module and S = EndR(M). In this note, we introduce S-semicommutative, S-Baer, S-q.-Baer and S-p.q.-Baer modules. We study the relations between these classes of modules. Also we prove if M is an. S-semicommutative module, then M is an S-p.q.-Baer module if and only ...

  16. Neural correlates of adaptation to voice identity.

    Science.gov (United States)

    Schweinberger, Stefan R; Walther, Christian; Zäske, Romi; Kovács, Gyula

    2011-11-01

    Apart from speech content, the human voice also carries paralinguistic information about speaker identity. Voice identification and its neural correlates have received little scientific attention up to now. Here we use event-related potentials (ERPs) in an adaptation paradigm, in order to investigate the neural representation and the time course of vocal identity processing. Participants adapted to repeated utterances of vowel-consonant-vowel (VCV) of one personally familiar speaker (either A or B), before classifying a subsequent test voice varying on an identity continuum between these two speakers. Following adaptation to speaker A, test voices were more likely perceived as speaker B and vice versa, and these contrastive voice identity aftereffects (VIAEs) were much more pronounced when the same syllable, rather than a different syllable, was used as adaptor. Adaptation induced amplitude reductions of the frontocentral N1-P2 complex and a prominent reduction of the parietal P3 component, for test voices preceded by identity-corresponding adaptors. Importantly, only the P3 modulation remained clear for across-syllable combinations of adaptor and test stimuli. Our results suggest that voice identity is contrastively processed by specialized neurons in auditory cortex within ∼250 ms after stimulus onset, with identity processing becoming less dependent on speech content after ∼300 ms. ©2011 The British Psychological Society.

  17. Commons of Identity: Sherpa Identity Management

    Directory of Open Access Journals (Sweden)

    Leif Rune Loland

    2006-12-01

    Full Text Available The recent history of Sherpas demonstrates how identities can be scarce goods. While ‘Sherpa’ refers to an ethnic identity, ‘Sherpa’ refers to a crucial occupation in the trekking industry.i Their privileged position in Nepal’s international tourist industry is related to their common reputation. Their collective use of identity seems to help them getting access to an economic niche, and work in tourism seems to be an aspect of being Sherpa. Thus, an individual that operates in the tourist market does not only manage material assets but also identity assets to maintain the Sherpa reputation. Consequently, one can expect it to be a collective concern to husband their image, ie to control each member’s behaviour which could affect the Sherpa image. This article on Sherpa identity in encounters with outsiders analyses Sherpaness as a manageable resource that constitutes a collectively sanctioned commons. My point of departure is Barth’s analysis of ethnic boundary dynamics (1969, 1994 combined with Bourdieu’s concept of ‘capital’ and Hardin’s perspective on commons.DOI: 10.3126/dsaj.v1i0.288Dhaulagiri Vol.1 (2005 pp.176-192

  18. Exploring medical identity theft.

    Science.gov (United States)

    Mancilla, Desla; Moczygemba, Jackie

    2009-09-16

    The crime of medical identity theft is a growing concern in healthcare institutions. A mixed-method study design including a two-stage electronic survey, telephone survey follow-up, and on-site observations was used to evaluate current practices in admitting and registration departments to reduce the occurrence of medical identity theft. Survey participants were chief compliance officers in acute healthcare organizations and members of the Health Care Compliance Association. Study results indicate variance in whether or how patient identity is confirmed in healthcare settings. The findings of this study suggest that information systems need to be designed for more efficient identity management. Admitting and registration staff must be trained, and compliance with medical identity theft policies and procedures must be monitored. Finally, biometric identity management solutions should be considered for stronger patient identification verification.

  19. The role of national identity representation in the relation between in-group identification and out-group derogation: ethnic versus civic representation.

    Science.gov (United States)

    Meeus, Joke; Duriez, Bart; Vanbeselaere, Norbert; Boen, Filip

    2010-06-01

    Two studies investigated whether the content of in-group identity affects the relation between in-group identification and ethnic prejudice. The first study among university students, tested whether national identity representations (i.e., ethnic vs. civic) moderate or mediate the relation between Flemish in-group identification and ethnic prejudice. A moderation hypothesis is supported when those higher in identification who subscribe to a more ethnic representation display higher ethnic prejudice levels than those higher in identification who subscribe to a more civic representation. A mediation hypothesis is supported when those higher in identification tend towards one specific representation, which in turn, should predict ethnic prejudice. Results supported a mediation hypothesis and showed that the more respondents identified with the Flemish in-group, the more ethnic their identity representation, and the more they were inclined to display ethnic prejudice. The second study tested this mediation from a longitudinal perspective in a two-wave study among high school students. In-group identification at Time 1 predicted over-time changes in identity representation, which in turn, predicted changes in ethnic prejudice. In addition to this, changes in identity representation were predicted by initial ethnic prejudice levels. The implications of these findings are discussed.

  20. Professional entrepreneurial identity construction

    DEFF Research Database (Denmark)

    Ramsgaard, Michael Breum

    2014-01-01

    The present study investigates the construction of a professional identity as an entrepreneur in a sample of people with educational background in nutrition and health. The study examines the connection between professional identity construction and entrepreneurial business emergence using...... ‘entrepreneurial preparedness’ as parameter. This research seeks to address the following questions: What significant components or characteristics do entrepreneurs rely on in the early processes of constructing an entrepreneurial identity....

  1. Gender, identity, culture

    OpenAIRE

    Poláková, Markéta

    2011-01-01

    The dissertation work Gender, identity, culture presents an analysis of a picture of a man and a woman in the contemporary Czech society. The fundamental research theme is a transformation of gender identity under influence of cultural changes which have be in progress since the end of 19th century. In the theoretical part of the work, a research of biological and cultural factors that influence the creation of our gender identity is mapped. More emphasis is put on modern technologies and med...

  2. Journalists' professional identity

    OpenAIRE

    Grubenmann, Stephanie; Meckel, Miriam

    2015-01-01

    The internet, and particularly social media, have brought far-reaching change to journalism by calling into question how journalists’ traditional roles are perceived. We introduce social identity theory (Tajfel and Turner 1986) ― specifically the concept of professional identity ― as a complementary approach to study journalistic role conceptions from a dynamic perspective. Building on existing findings in both research streams (professional identity and journalistic role conceptions), we und...

  3. Professional entrepreneurial identity construction

    DEFF Research Database (Denmark)

    Ramsgaard, Michael Breum

    The present study investigates the construction of a professional identity as an entrepreneur in a sample of people with educational background in nutrition and health. The study examines the connection between professional identity construction and entrepreneurial business emergence using...... ‘entrepreneurial preparedness’ as parameter. This research seeks to address the following questions: What significant components or characteristics do entrepreneurs rely on in the early processes of constructing an entrepreneurial identity....

  4. Known and Unknown Identity

    DEFF Research Database (Denmark)

    Henze-Pedersen, Sofie

    This qualitative study investigates the relationship between openness and identity among 18 adoptees. Many studies have argued that a high degree of openness is important for the identity formation of adoptees. However, few studies have explored this relationship. Two types of openness (biographi......This qualitative study investigates the relationship between openness and identity among 18 adoptees. Many studies have argued that a high degree of openness is important for the identity formation of adoptees. However, few studies have explored this relationship. Two types of openness...

  5. Identity/Time

    Directory of Open Access Journals (Sweden)

    Nancy J. Knauer

    2013-09-01

    Full Text Available This paper engages the unspoken fourth dimension of intersectionality—time. Using the construction of lesbian, gay, bisexual, and transgender (LGBT identities as an example, it establishes that identity, as it is lived and experienced, is not only multivalent, but also historically contingent. It then raises a number of points regarding the temporal locality of identity—the influence of time on issues of identity and understanding, its implications for legal interventions, social movement building, and paradigms of progressive change. As the title suggests, the paper asks us to consider the frame of identity over time.

  6. Personal Identity in Enhancement

    Directory of Open Access Journals (Sweden)

    Jana Podroužková

    2015-09-01

    Full Text Available The aim of this paper is to introduce the concept of human enhancement, its methods and its relation to personal identity. Also several approaches to personal identity will be described. Transhumanism is a special think tank supporting human enhancement through modern technologies and some of its representatives claim, that even great changes to human organisms will not affect their personal identity. I will briefly describe the most important means of human enhancment and consider the problem of personal identity for each of them separately.

  7. Corporate visual identity : Case study: changing visual identity

    OpenAIRE

    Nykänen, Heidi

    2013-01-01

    Every company has an identity, which distinguishes it from others. Corporate identity has today an important role in customers’ decision making process, because they do not only buy the product, but they also buy the company with it. Corporate visual identity is the outer side of identity. The main elements of visual identity are name, logo/symbol, colour, typography and slogan. A well designed corporate visual identity represents the company’s identity and business idea. The aim of this...

  8. Elective Identities, (Culture, Identization and Integration)

    NARCIS (Netherlands)

    S.J. Magala (Slawomir)

    2002-01-01

    textabstractMost of contemporary individual and social identities (constructed with societal, cultural and technological resources) are radically autonomous, nomadic and virtual - i.e. they are de-traditionalized, open to negotiation and not based on a single interpretation of a tradition.

  9. Identity of psychology, identity and psychology

    Directory of Open Access Journals (Sweden)

    Mirjana Nastran Ule

    2003-09-01

    Full Text Available The article deals with epistemic issues of modern psychology with the starting hypothesis being that scientific psychology must satisfy three main interests: scientific, practical and emancipatory interest. Particularly important is the emancipatory interest, which is based on the social reflection of scientific work and conclusions. Psychological knowledge involves not only neutral descriptions of facts, but also implicit rules, expectations regarding values or norms, and criticism of undesirable behavior. The traditional psychological model attempts to satisfy the scientific interest and partly practical interest, while avoiding emancipatory interest. But I believe modern socio-historical models of psychology to be significant precisely owing to the inclusion of emancipatory interest. The difference between these two models of psychology is most obvious in their perception of identity i.e. individuality. Conventional perceptions follow the logic of "possessive individualism" in which the individual is seen as an autonomous bearer and owner of his/her psychological states and processes. The conventional model of identity supports the modernist concept of the individual as being focused on his/her self or personal identity. Socio-historical models, on the other hand, see the individual as a being embedded in social relations and social interactions, and one who builds and expresses his/her individuality through the reflection on social interactions, discursive practices, and response to the hierarchy of power and social mechanisms of control. According to this model, identity evolves through a series of social constructions which are embodied in the individual and represent him/her in society. Identity thus becomes a notion that combines individuality and social context, subjectivation and objectivation of the individual, and historical and biographical time.

  10. Expressive Faces Confuse Identity.

    Science.gov (United States)

    Redfern, Annabelle S; Benton, Christopher P

    2017-01-01

    We used highly variable, so-called 'ambient' images to test whether expressions affect the identity recognition of real-world facial images. Using movie segments of two actors unknown to our participants, we created image pairs - each image within a pair being captured from the same film segment. This ensured that, within pairs, variables such as lighting were constant whilst expressiveness differed. We created two packs of cards, one containing neutral face images, the other, their expressive counterparts. Participants sorted the card packs into piles, one for each perceived identity. As with previous studies, the perceived number of identities was higher than the veridical number of two. Interestingly, when looking within piles, we found a strong difference between the expressive and neutral sorting tasks. With expressive faces, identity piles were significantly more likely to contain cards of both identities. This finding demonstrates that, over and above other image variables, expressiveness variability can cause identity confusion; evidently, expression is not disregarded or factored out when we classify facial identity in real-world images. Our results provide clear support for a face processing architecture in which both invariant and changeable facial information may be drawn upon to drive our decisions of identity.

  11. Capturing Chemical Identity Thinking

    Science.gov (United States)

    Ngai, Courtney; Sevian, Hannah

    2017-01-01

    Chemical identity, the idea that every substance has at least one property that makes it unique and able to be differentiated from other substances, is core to the practice of chemistry. Such practice requires using properties to classify as well as to differentiate. Learning which substance properties are productive in chemical identity thinking…

  12. Chains and identity

    NARCIS (Netherlands)

    Grijpink, J.H.A.M.

    2012-01-01

    This article is available in English and DutchGuidelines are presented to cope with identity problems in chains. A chain is a collaboration of a great number of autonomous organisations and professionals to tackle a dominant chain problem. In many chains identity fraud is an aspect of the dominant

  13. Identity without Membership?

    DEFF Research Database (Denmark)

    Dobusch, Leonhard; Schoeneborn, Dennis

    the formation of organizational identity in more fluid organizational settings. Drawing on an empirical study of the hacker collective Anonymous, we show that organizational identity is formed through public communicative events that are subject to meaning negotiation whether or not actions can be attributed...

  14. Identity Management Processes Automation

    Directory of Open Access Journals (Sweden)

    A. Y. Lavrukhin

    2010-03-01

    Full Text Available Implementation of identity management systems consists of two main parts, consulting and automation. The consulting part includes development of a role model and identity management processes description. The automation part is based on the results of consulting part. This article describes the most important aspects of IdM implementation.

  15. Academic Identities under Threat?

    Science.gov (United States)

    Clegg, Sue

    2008-01-01

    This article focuses on the lived experience of practising academics as part of an inquiry into the vexed question of "academic identities". Identity is understood not as a fixed property, but as part of the lived complexity of a person's project. The article reports on data from a small study in one university. The data suggest that…

  16. Personal Identity in Japan

    Science.gov (United States)

    Sugimura, Kazumi; Mizokami, Shinichi

    2012-01-01

    This chapter explores characteristics of identity formation among Japanese adolescents and young adults living in a cultural context where individualism has been increasingly emphasized even while maintaining collectivism. We argue that, to develop a sense of identity in Japanese culture, adolescents and young adults carefully consider others'…

  17. Self and social identity

    NARCIS (Netherlands)

    Ellemers, N; Spears, R; Doosje, B

    2002-01-01

    In this chapter, we examine the self and identity by considering the different conditions under which these are affected by the groups to which people belong. From a social identity perspective we argue that group commitment, on the one hand, and features of the social context, on the other hand,

  18. Children's Social Identities

    Science.gov (United States)

    Bennett, Mark

    2011-01-01

    This paper provides a brief overview of recent developmental research on themes related to children's social identities. Initially, consideration is given to the capacity for social categorization, following which attention is given to children's developing conceptions of social identities, their identification with social groups, and the…

  19. Corporate identity. Brand designs.

    Science.gov (United States)

    Mathieson, Steve

    2004-02-19

    The past two years have seen a steadily more consistent brand identity for the NHS. Branding will become more important as foundation status and PCT commissioning makes acute hospitals more competitive. This has put pressure on some trusts that have their own strong identities.

  20. Value Conditionality of Identity

    Directory of Open Access Journals (Sweden)

    M M Yusupov

    2013-12-01

    Full Text Available The article considers theoretical approaches to the study of values and identity, and reveals the role of values in the formation of the ethnic, regional and Russian identity on the example of Chechnya and the North Caucasus, with the sociological indicators characterizing value orientations and self-identification.

  1. General Jacobi Identity Revisited

    OpenAIRE

    Nishimura, Hirokazu

    1999-01-01

    In a previous paper (Nishimura, 1997) we probedthe deeper structure of the Jacobi identity of vectorfields with respect to Lie brackets within the realm ofsynthetic differential geometry to find what might be called the general Jacobi identity ofmicrocubes. The main objective of this paper is topresent a less esoteric and more lucid proof ofit.

  2. Identity after Death

    DEFF Research Database (Denmark)

    Gerstrøm, Anna

    2015-01-01

    Purpose: The purpose of this paper is to explore how legacy organizational identity and death relate to each other and, thereby, contribute to closing the gap in knowledge on organizational identity constructions in times of death. Design/methodology/approach: The paper opted for an exploratory s...

  3. Identity as wrapping up

    DEFF Research Database (Denmark)

    Nickelsen, Niels Christian Mossfeldt

    2015-01-01

    The aim of this paper is to provide an understanding of cross-professional collaboration and to develop a notion of professional identity based in practice. The background of the paper is science and technology studies and more precisely actor network theory. The method used: The empirical analysis...... in close relation to the making of a report concerning the cross-professional collaboration. Findings are that “Identity as wrapping up” points to the way in which certain actors, by other actors, are maneuvered into certain pockets in a network. Identity as wrapping up is emphasized as a way...... of participating, which is closely connected to the intention to control the relation towards the other. Thus identity as wrapping up is argued to be a strategy to optimize the situation of one’s own profession. Conclusion: This articulation of identity contributes to the actor network literature as well...

  4. Visual identity and rebranding

    Directory of Open Access Journals (Sweden)

    Katarzyna Wrona

    2015-06-01

    Full Text Available The goal of this article is to highlight the essence of visual identification and rebranding, as well as to discuss elements of corporate identity, which are subject to revitalization in the process of refreshing the image of a brand. In the first part the article the analysis of the term visual identification is conducted. In the analysis special attention is drawn to the role of visual identification in creating a coherent identity of an organization. In the subsequent chapters further components of corporate identity are presented in detail – starting with logotype, through business forms, advertisements, accompanying materials and Internet websites to signs on buildings. Moreover, corporate identity book as a collection of standards and guidelines for application of corporate identity rules is discussed. The deliberations are based on the study of literature. The last chapter presented the transformation of the brand of Institute of Aviation.

  5. Identities-in-action

    DEFF Research Database (Denmark)

    Stentoft, Diana; Valero, Paola

    2009-01-01

    The notion of identity is often used in mathematics education research in an attempt to link individual and social understandings of mathematical learning. In this paper we review existing research making use of the notion of identity, and we point to some of the strengths and weaknesses in the w...... identities in action allows us to bring attention to what is normally considered as ”noise” or ”impossibilities” in our understandings of mathematics education and classroom interaction.......The notion of identity is often used in mathematics education research in an attempt to link individual and social understandings of mathematical learning. In this paper we review existing research making use of the notion of identity, and we point to some of the strengths and weaknesses...

  6. Status-Based Identity.

    Science.gov (United States)

    Destin, Mesmin; Rheinschmidt-Same, Michelle; Richeson, Jennifer A

    2017-03-01

    Psychological research on socioeconomic status (SES) has grown significantly over the past decade. In this article, we build upon and integrate existing approaches to direct greater attention toward investigating the subjective meaning and value that people attach to understanding their own SES as an identity. We use the term status-based identity to organize relevant research and examine how people understand and make meaning of their SES from moment to moment in real time. Drawing from multiple areas of research on identity, we suggest that even temporary shifts in how people construe their status-based identities predict changes in thought, affect, motivation, and behavior. This novel focus is positioned to examine the psychological effects of status transitions (e.g., upward or downward mobility). Further, in initial empirical work, we introduce a new measure to assess uncertainty regarding one's SES (i.e., status-based identity uncertainty) and offer evidence that greater uncertainty regarding one's status-based identity is associated with lower individual well-being. In sum, we argue that insight from the literature on identity will both expand and serve to organize the burgeoning literature on the psychology of SES and, in so doing, reveal promising new directions for research.

  7. Adolescence: Search for an Identity

    Science.gov (United States)

    Kasinath, H. M.

    2013-01-01

    James Marcia (1991, 1994, 1999, 2002) expanded on Erikson's theory of identity formation. Specifically, he focused on two essential processes in achieving a mature identity: exploration and commitment. Erikson's observations about identity were extended by Marcia, who described four identity statuses: identity diffusion, foreclosure, moratorium…

  8. Vocational Identity and Ego Identity Status in Korean Nursing Students

    Directory of Open Access Journals (Sweden)

    Hyun-Young Koo, PhD, RN

    2016-03-01

    Conclusions: These findings show that nursing students in identity achievement status have secure and clear vocational identities. Further longitudinal and qualitative studies are needed to find out if identity formation among nursing students changes with age.

  9. Identity negotiations in meetings

    DEFF Research Database (Denmark)

    Asmuß, Birte; Oshima, Sae

    Meetings are places, where identity negotiation is a central activity and where members’ local practices recurrently inform and are informed by larger categories (Antaki and Widdicombe 1998). Correspondingly, the approach to understanding organization (macro) by way of identity work (micro) has...... of the company, and all members know (and display) that he holds some information that the rest don’t have access to. Our analysis shows that the participants evoke various identities of the manager, sometimes orienting to the structure of the organization, and other times orienting to wider social categories...

  10. [Diagnosing gender identity].

    Science.gov (United States)

    Kaltiala-Heino, Riittakerttu; Mattila, Aino; Kärnä, Teemu; Joutsenneimi, Kaisla

    2015-01-01

    Transsexualism and other variations of gender identity are based on a stable sense of identity. The aetiology of this phenomenon is not fully known. Suffering caused by gender dysphoria is alleviated with sex reassignment. The psychiatric assessment of both adolescents and adults has been centralized in Finland to two university hospitals, the Helsinki University Hospital and Tampere University Hospital. In both hospitals, multidisciplinary teams aim at differential diagnosis by using well-known psychiatric and psychological instruments. Wishes for sex reassignment that are caused by a mental health disorder are excluded. Assessment in adolescence is challenging because the identity in youth is still forming.

  11. Credit and identity theft

    OpenAIRE

    Kahn, Charles M.; Roberds, William

    2005-01-01

    The quintessential crime of the information age is identity theft, the malicious use of personal identifying data. In this paper we model “identity” and its use in credit transactions. Various types of identity theft occur in equilibrium, including “new account fraud,” “existing account fraud,” and “friendly fraud.” The equilibrium incidence of identity theft represents a tradeoff between a desire to avoid costly or invasive monitoring of individuals on the one hand and the need to control tr...

  12. Linguistic identity matching

    CERN Document Server

    Lisbach, Bertrand

    2013-01-01

    Regulation, risk awareness and technological advances are increasingly drawing identity search functionality into business, security and data management processes, as well as fraud investigations and counter-terrorist measures.Over the years, a number of techniques have been developed for searching identity data, traditionally focusing on logical algorithms. These techniques often failed to take into account the complexities of language and culture that provide the rich variations  seen in names used around the world. A new paradigm has now emerged for understanding the way that identity data

  13. Action recognition is sensitive to the identity of the actor.

    Science.gov (United States)

    Ferstl, Ylva; Bülthoff, Heinrich; de la Rosa, Stephan

    2017-09-01

    Recognizing who is carrying out an action is essential for successful human interaction. The cognitive mechanisms underlying this ability are little understood and have been subject of discussions in embodied approaches to action recognition. Here we examine one solution, that visual action recognition processes are at least partly sensitive to the actor's identity. We investigated the dependency between identity information and action related processes by testing the sensitivity of neural action recognition processes to clothing and facial identity information with a behavioral adaptation paradigm. Our results show that action adaptation effects are in fact modulated by both clothing information and the actor's facial identity. The finding demonstrates that neural processes underlying action recognition are sensitive to identity information (including facial identity) and thereby not exclusively tuned to actions. We suggest that such response properties are useful to help humans in knowing who carried out an action. Copyright © 2017 The Author(s). Published by Elsevier B.V. All rights reserved.

  14. Pre-charging of module capacitors of MMC when the module ...

    Indian Academy of Sciences (India)

    It is based on cascade connection of multiple identical modules using IGBTs as switching devices. Module switches of MMC are preferably driven by a source derived from the modulecapacitor. In each MMC module, the control circuit, consisting of gate drivers, is powered from a dc supply derived from the local capacitor.

  15. IDENTITY AS PROXY

    National Research Council Canada - National Science Library

    Lauren Sudeall Lucas

    2015-01-01

    As presently constructed, equal protection doctrine is an identitybased jurisprudence, meaning that the level of scrutiny applied to an alleged act of discrimination turns on the identity category at issue...

  16. The Supermalt identity

    DEFF Research Database (Denmark)

    Bech-Larsen, Tino; Esbjerg, Lars; Grunert, Klaus G.

    2007-01-01

    Purpose - The objective of this article is to conduct a case study of the Supermalt brand of malt beer, which has become the preferred beverage of Afro-Caribbean consumers in Brixton on a very limited marketing budget. Design/methodology/approach - The article uses the concepts of personal identity...... aiming to develop strong brands with a limited marketing budget. Based on the Supermalt case, suggestions are made regarding branding in relation to ethnic minorities. Originality/value - This article provides a study of a brand that has become strong within a narrowly defined group of consumers....... and brand identity in a qualitative study to explore how Brixtonbased Afro-Caribbean consumers construct their self-identities and the brand identity of Supermalt. Semi-structured interviews were conducted with 14 Afro-Caribbean consumers. Each interview was divided into three parts. The first part focused...

  17. Autoethnography: Inquiry into Identity

    Science.gov (United States)

    Hoppes, Steve

    2014-01-01

    This chapter provides guidelines and suggestions for assessing student development using autoethnography, a qualitative research method. Autoethnography guides students in examining the nexus between personal and professional identities, including skills, challenges, values, histories, and hopes for the future.

  18. Music, culture and identity

    Directory of Open Access Journals (Sweden)

    Ilir Ramadani

    2017-03-01

    Full Text Available At the time of globalization it is difficult to pretend avoiding music culture and identity from political, cultural and social developments. Thus, it is impossible for the music to be unshakable and to represent national identity by not taking and giving nothing to culture. The dynamics of life and the rapid development of technology make it impossible for the culture to remain unaffected in terms of sharing experiences social experiences. Culture represents our current course, both in terms of politics, also in the social and human aspects. Through the technology it is possible for our children to be equal with children of all other countries, to exchange information and to connect directly with all countries of the world. Musical education is one of the main factors of cultural development and preservation of national identity. Identity consists of everything we posses and reflect. We are those who distinguish from each other and have a common denominator compared to other nations.

  19. Primary Identity in Literature

    DEFF Research Database (Denmark)

    Graham, Brian Russell

    In our times, literary criticism, as well as larger political and cultural developments, is characterized by identity politics, meaning that our discourses are structured around the notion of different socially identifiable populations in society. In relation to literature, this results in our...... viewing the characters in literature in terms of these political identities. Literature is consequently discussed in relation to political causes. Literary criticism is animated by the same causes, and is viewed as having a direct intervention in society in relation to them. In this paper, I will discuss......, in relation to Frye’s works, the idea that the primary identities of characters in literature were and, to a considerable extent, continue to be those of family-member identities. As such, literature should not be appropriated to a political context too readily. Whereas viewing characters in terms of...

  20. Researcher Identities in Transition

    DEFF Research Database (Denmark)

    Castelló, Montserrat; Wisker, Gina; Kobayashi, Sofie

    Researchers are now embarked upon what we define as a ‘risk career’, rather than, as previously, a relatively more predictable academic career. In this changing context, traditional milestones that enabled early career researchers to build their identities are disappearing. Instead, what we define...... as other emergent ‘signals’, the latent or clear indications from institutions and academic communities regarding career directions and necessary professional skills and attitudes should be identified and interpreted for researchers to adequately develop their new identities. The aim of this paper...... is twofold: a) to present a comprehensive framework of the notion of researcher identity by means of analysing those spheres of activity related to researcher and career development; and b) to relate researcher identities to the experiences of early career researchers with issues concerning signals...

  1. Identities in Conflict

    Directory of Open Access Journals (Sweden)

    Kanika Ahuja

    2016-01-01

    Full Text Available Kashmir has witnessed violent conflict for many years, and India has been one of the main players in this conflict. This study used the method of drawings to assess how this ongoing conflict has shaped the identities of young Muslims in Kashmir. The identities they expressed were compared with those expressed by young Muslims in Delhi. At each location, one group of participants was asked to draw on the theme “Me and my country” while the other group was asked to draw whatever they desired. When allowed to draw what they wished, adolescents in Kashmir drew symbols of regional identity more often and symbols of India less often than adolescents in Delhi. “I dominant” identities were depicted only by the Delhi-based sample. Drawings from Kashmir did not represent high levels of violence or a fractured relationship with the Indian state. Possible reasons have been discussed.

  2. Personal Identity Online

    DEFF Research Database (Denmark)

    Rodogno, Raffaele

    2012-01-01

    of the question. In Section 2, I describe a number of possible meanings of personal identity observed in everyday contexts and more philosophical ones. With some caveats, I argue that it is the specific context in which the question arises that disambiguates the meaning of the question. Online contexts are novel......Philosophers concerned with the question of personal identity have typically been asking the so-called re-identification question: what are the conditions under which a person at one point in time is properly re-identified at another point in time? This is a rather technical question. In our...... everyday interactions, however, we do raise a number of personal identity questions that are quite distinct from it. In order to explore the variety of ways in which the Internet may affect personal identity, I propose in this study to broaden the typical philosophical horizon to other more mundane senses...

  3. Experiencing with Identity

    DEFF Research Database (Denmark)

    Pors, Justine Grønbæk

    2012-01-01

    This article studies how a political organization begins to experiment with its identity. By use of an empirical case of the Danish Ministry of Education, I examine how a political organization supplements its identity of a legislating power with identities of a supervisor, beacon and facilitator...... of reflection processes. I analyse how the Danish Ministry of Education observes that its initial attempts to strengthen evaluation in the Danish public schools did not have the wanted effects because the values and professional norms of public school teachers constitute a resistance towards interference from...... of evaluation in public schools. Out of a paralysis emerge new innovative strategies of governing, aimed at the schools’ self-governing capacity. The identity of the political system thus emerges as oscillations between different roles of a legislating power and a supervising coach. The case study suggests...

  4. Avoiding Medical Identity Theft

    Science.gov (United States)

    ... victim’s name leaving a trail of falsified information in medical records that can plague your medical and financial life for years, or even put your health at risk. Tips for Preventing and Detecting Medical Identity Theft ...

  5. Educating in European Identity?

    National Research Council Canada - National Science Library

    Enrique Banús

    2007-01-01

    In the last decades, the claim for a "European identity" has been manifested sometimes as a solution for the citizens' distance to the European project, sometimes also as a precondition for a further...

  6. Identity politics and politicized identities: Identity processes and the dynamics of protest

    NARCIS (Netherlands)

    Klandermans, P.G.

    2014-01-01

    Over the last decades, the concept of identity has become increasingly central in the social psychology of protest. Collective identity, politicized collective identity, dual identity, and multiple identities are concepts that help to understand and describe the social psychological dynamics of

  7. On a New Trigonometric Identity

    Science.gov (United States)

    Chen, Hongwei

    2002-01-01

    A new trigonometric identity derived from factorizations and partial fractions is given. This identity is used to evaluate the Poisson integral via Riemann sum and to establish some trigonometric summation identities.

  8. Cultural Identity Through CLIL

    Directory of Open Access Journals (Sweden)

    Oprescu Monica

    2015-11-01

    Full Text Available The CLIL approach is a modern manner of teaching English, which has been adapted in Romanian schools and universities. An interesting aspect of learning a foreign language is the contact with its culture/s and the changes it produces in terms of identity. Therefore, a challenging question to be answered is whether a CLIL approach focusing on culture influences students' cultural identity.

  9. Introduction: Discourses of Identity

    DEFF Research Database (Denmark)

    Madsen, Peter

    2016-01-01

    Analysis of usages of ideas of 'identity' in relation to migration in Britain, France, and Germany, as well as in the Serbian anti-muslim war - with a view of demonstrating conceptual context of the usages.......Analysis of usages of ideas of 'identity' in relation to migration in Britain, France, and Germany, as well as in the Serbian anti-muslim war - with a view of demonstrating conceptual context of the usages....

  10. WORK AND LEARNER IDENTITY

    DEFF Research Database (Denmark)

    Kondrup, Sissel

    2015-01-01

    The aim of this article is to suggest a theoretical framework than can assess to how people’s engagement in specific historical and social work practices are significant to their development, maintenance or transformation of a learner identity. Such a framework is crucial in order to grasp how di...... different groups have distinctive conditions for meeting the obligation of forming a proactive learner identity and engage in lifelong learning prevalent in both national and transnational policies on lifelong learning....

  11. IDENTITY AND GLOBALISATION

    OpenAIRE

    Sabauri, Tinatin; Pataridze, Salome

    2016-01-01

    The main features ofglobalization and identity are discussed in this paper. There are talking aboutthe essence of globalization, the historical stages, the directions and themain signs. Here is analyzed the views of the researchers of globalization, hyperglobalists, skeptics, transformationists on this topic. Here are somehistorical analogies of globalization on the examples of politicalglobalization, economic globalization and cultural globalization.Identity is analyzed asa counterweight to ...

  12. Names and Collective Identity

    Directory of Open Access Journals (Sweden)

    Otto Krogseth

    2012-08-01

    Full Text Available The preceding two decades have displayed a remarkable awareness for a connection between the concepts "identity" and "cultural memory". David Lowenthal speaks of a "current craze for heritage"! Cultural heritage has become extremely popular, especially in combination with tourism, and has accordingly been converted into a modern system of meaning a type of "secular religion". With reference to collective identity and cultural memory, it is important to ask the cul- tural analytical questions: "Why identity now? Why heritage now?" My reply is that we experience a critical identity crisis. Three central aspects signify individual and collective identity: Continuity, coherence and individuality. The three aspects, constituting the concept of identity, are exposed to serious threats in the post-modern era: The danger of changeability, fragmentation and standardisation. This ten- dency has, however, met various compensating counter reactions like for instance "re-traditionalisation". In my presentation, I will examine the phenomenon cultural memory through examples from the German tradition -- principally from the works of Aleida and Jan Assmann.

  13. Entrepreneurship Education as Identity Workspace

    DEFF Research Database (Denmark)

    Frederiksen, Signe Hedeboe

    2016-01-01

    of themselves as entrepreneurs. This article investigates how entrepreneurship education is practiced as an identity workspace, when reflective identity work is turned into a pedagogical strategy for entrepreneurial learning. I present empirical data from a qualitative fieldstudy in an eleven week mandatory......Entrepreneurship education theory and practice show increasing interest in identity work as an important part of entrepreneurial learning. Entrepreneurship programs become identity workspaces where pedagogical designs stimulate entrepreneurial identity work and support individuals’ discovery...... the functionalist framing of entrepreneurship education as an identity workspace and the one-sided focus on the potentials of identity work and individual strategies for tailoring entrepreneurial identities to fit a sense of self....

  14. Tools for Understanding Identity

    Energy Technology Data Exchange (ETDEWEB)

    Creese, Sadie; Gibson-Robinson, Thomas; Goldsmith, Michael; Hodges, Duncan; Kim, Dee DH; Love, Oriana J.; Nurse, Jason R.; Pike, William A.; Scholtz, Jean

    2013-12-28

    Identity attribution and enrichment is critical to many aspects of law-enforcement and intelligence gathering; this identity typically spans a number of domains in the natural-world such as biographic information (factual information – e.g. names, addresses), biometric information (e.g. fingerprints) and psychological information. In addition to these natural-world projections of identity, identity elements are projected in the cyber-world. Conversely, undesirable elements may use similar techniques to target individuals for spear-phishing attacks (or worse), and potential targets or their organizations may want to determine how to minimize the attack surface exposed. Our research has been exploring the construction of a mathematical model for identity that supports such holistic identities. The model captures the ways in which an identity is constructed through a combination of data elements (e.g. a username on a forum, an address, a telephone number). Some of these elements may allow new characteristics to be inferred, hence enriching the holistic view of the identity. An example use-case would be the inference of real names from usernames, the ‘path’ created by inferring new elements of identity is highlighted in the ‘critical information’ panel. Individual attribution exercises can be understood as paths through a number of elements. Intuitively the entire realizable ‘capability’ can be modeled as a directed graph, where the elements are nodes and the inferences are represented by links connecting one or more antecedents with a conclusion. The model can be operationalized with two levels of tool support described in this paper, the first is a working prototype, the second is expected to reach prototype by July 2013: Understanding the Model The tool allows a user to easily determine, given a particular set of inferences and attributes, which elements or inferences are of most value to an investigator (or an attacker). The tool is also able to take

  15. The European Identity

    Directory of Open Access Journals (Sweden)

    Alberto Martinelli

    2017-09-01

    Full Text Available European identity is not only a scientifically interesting question, but also a politically important issue: in fact, sixty years after the signing of the Treaty of Rome, the European Union finds itself for the first time facing risks that threaten its own existence. The European Union is a limited and incomplete project because Europe’s economic integration has not been accompanied by a genuine supranational political union and greater cultural integration. The deficit of democratic representation and cultural integration is due to the fact that the community process is based only on economic rationality and not on a feeling of common belonging. In the current situation in which the Union faces difficult challenges which threaten to undermine the future, it necessary to affirm the policy of interests with a policy of identity. In this essay, we will first concentrate on the concept of identity – that is on the nucleus of values and common institutions –; then we will discuss how the European identity has changed over time (also in relation to national identities and what are the mechanisms that may favour its taking root in the current situation. The European project of political unification needs to be re-emphasized, finding the way to a European collective identity, not contrasted with but alongside the different national identities, referring to loyalty and shared commitment to a whole collection of cultural values: fundamental human rights, civil liberties, democratic political institutions, rule of law, freedom of movement of people, goods and capital, social justice and non-violent resolution of conflicts.

  16. Dogs discriminate identical twins.

    Directory of Open Access Journals (Sweden)

    Ludvík Pinc

    Full Text Available Earlier studies have shown variation among experimental attempts to establish whether human monozygotic twins that are genetically identical also have identical individual scents. In none of the cases were the dogs able to distinguish all the individual scents of monozygotic twins living in the same environment if the scents were presented to them separately. Ten specially trained police German Shepherd dogs of three Czech Republic Police Regional Headquarters were used for scent identification in our study. The dogs were supposed to match scents of two monozygotic pairs (5 and 7 years old and two dizygotic twin pairs (8 and 13 years old. Scents were collected on cotton squares stored in glass jars. Dog handlers were blind to the experiment details. In each trial (line-up, one scent was used as a starting scent and the dog was then sent to determine if any of the 7 presented glass jars contained a matching scent. Scents of children of similar ages were used as distractors. In the matching procedure, the dogs matched correctly the scent of one twin with the other, as well as two scents collected from every single identical and non-identical twin to prove their efficacy and likewise, the presence of the matching twin scent in any given glass jar. All dogs in all trials distinguished correctly the scents of identical as well as non-identical twins. All dogs similarly matched positively two scents collected from the same individuals. Our findings indicated that specially trained German Shepherd dogs are able to distinguish individual scents of identical twins despite the fact that they live in the same environment, eat the same food and even if the scents are not presented to them simultaneously.

  17. Dogs Discriminate Identical Twins

    Science.gov (United States)

    Pinc, Ludvík; Bartoš, Luděk; Reslová, Alice; Kotrba, Radim

    2011-01-01

    Earlier studies have shown variation among experimental attempts to establish whether human monozygotic twins that are genetically identical also have identical individual scents. In none of the cases were the dogs able to distinguish all the individual scents of monozygotic twins living in the same environment if the scents were presented to them separately. Ten specially trained police German Shepherd dogs of three Czech Republic Police Regional Headquarters were used for scent identification in our study. The dogs were supposed to match scents of two monozygotic pairs (5 and 7 years old) and two dizygotic twin pairs (8 and 13 years old). Scents were collected on cotton squares stored in glass jars. Dog handlers were blind to the experiment details. In each trial (line-up), one scent was used as a starting scent and the dog was then sent to determine if any of the 7 presented glass jars contained a matching scent. Scents of children of similar ages were used as distractors. In the matching procedure, the dogs matched correctly the scent of one twin with the other, as well as two scents collected from every single identical and non-identical twin to prove their efficacy and likewise, the presence of the matching twin scent in any given glass jar. All dogs in all trials distinguished correctly the scents of identical as well as non-identical twins. All dogs similarly matched positively two scents collected from the same individuals. Our findings indicated that specially trained German Shepherd dogs are able to distinguish individual scents of identical twins despite the fact that they live in the same environment, eat the same food and even if the scents are not presented to them simultaneously. PMID:21698282

  18. Preventing leaf identity theft with hormones.

    Science.gov (United States)

    Lumba, Shelley; McCourt, Peter

    2005-10-01

    Genetic analysis of plant development has begun to demonstrate the importance of hormone synthesis and transport in regulating morphogenesis. In the case of leaf development, for example, auxin pooling determines where a primordium will emerge and leads to the activation of transcription factors, which determine leaf identities by modulating abscisic acid (ABA) and gibberellic acid (GA) concentrations. Signal transduction studies suggest that negative regulation of transcription factors through protein turnover is commonly used as a mechanism of hormone action. Together, these findings suggest that auxin might degrade a repressor that allows the activation of genes that modulate ABA/GA ratios in emerging leaves. With our increased understanding of the molecular basis of hormone signaling, it is becoming possible to overlay important regulators onto signaling modules that determine morphological outputs.

  19. The Process of Identity Work: Negotiating a Work Identity

    NARCIS (Netherlands)

    Crafford, A.; Adams, B.G.; Saayman, T.; Vinkenburg, C.J.; Jansen, P.G.W.; Roodt, G.

    2015-01-01

    Identity work is an important process in negotiating, regulating and maintaining a coherent sense of self-(identity). In this chapter we discuss how identity work is particularly useful in establishing a work identity. The crux of the discussion in this chapter is based on the qualitative phase of

  20. The Rogers-Ramanujan identities: Lie theoretic interpretation and proof.

    Science.gov (United States)

    Lepowsky, J; Wilson, R L

    1981-02-01

    The two Rogers-Ramanujan identities, which equate certain infinite products with infinite sums, are among the most intriguing of the classical formal power series identitites. It has been found by Lepowsky and Milne that the product side of each of them differs by a certain factor from the principally specialized character of a certain standard module for the Euclidean Kac-Moody Lie algebra A(1) ((1)). On the other hand, the present authors have introduced an infinite-dimensional Heisenberg subalgebra [unk] of A(1) ((1)) which leads to a construction of A(1) ((1)) in terms of differential operators given by the homogeneous components of an "exponential generating function." In the present announcement, we use [unk] to formulate a natural "abstract Rogers-Ramanujan identity" for an arbitrary standard A(1) ((1))-module which turns out to coincide with the classical identities in the cases of the two corresponding standard modules. The abstract identity equates two expressions, one a product and the other a sum, for the principally specialized character of the space Omega of highest weight vectors or "vacuum states" for [unk] in the module. The construction of A(1) ((1)) leads to a concrete realization of Omega as the span of certain spaces of symmetric polynomials occurring as the homogeneous components of exponential generating functions. The summands in the Rogers-Ramanujan identities turn out to "count" the dimensions of these spaces. For general standard A(1) ((1))-modules, we conjecture that the abstract identities agree with generalizations of the Rogers-Ramanujan identities due to Gordon, Andrews, and Bressoud.

  1. Identity work and identity regulation in managers' personal development training

    OpenAIRE

    Andersson, Thomas

    2008-01-01

    This article describes the role of personal development training in managers’ identity processes. Personal development training constitutes a local management discourse, which can influence both identity work and identity regulation processes. The study emphasizes the importance of personal life stories in understanding how managers are influenced by personal development training. The training provokes different processes of identity work and identity regulation, and managers actively work wi...

  2. Identity work: processes and dynamics of identity formations

    OpenAIRE

    Beech, N.; MacIntosh, R.; McInnes, P.

    2008-01-01

    Our aim is to elucidate a position that takes identity to be dynamic and changeable over time and to propose a conceptualisation that provides a way of mapping alternative imperatives and opportunities for identity work. It is argued that dynamic identity is inherently complex, being constructed through interaction between the self and others. These interactive activities are conceptualised as ‘identity work’ (Sveningsson and Alvesson, 2003). We regard an understanding of identity work to be ...

  3. Fluidity, Identity, and Organizationality

    DEFF Research Database (Denmark)

    Dobusch, Leonhard; Schoeneborn, Dennis

    2015-01-01

    that the organizationality of a social collective is accomplished through “identity claims”—i.e., speech acts that concern what the social collective is or does—and negotiations on whether or not these claims have been made on the collective's behalf. We empirically examine the case of the hacker collective Anonymous......This paper examines how fluid social collectives, where membership is latent, contested, or unclear, achieve “organizationality”, that is, how they achieve organizational identity and actorhood. Drawing on the “communicative constitution of organizations” perspective, we argue...... and analyze relevant identity claims to investigate two critical episodes in which the organizationality of Anonymous was contested. Our study contributes to organization studies by showing that fluid social collective are able to temporarily reinstate organizational actorhood through the performance...

  4. When design meets identities

    DEFF Research Database (Denmark)

    Dau, Susanne

    2013-01-01

    for teacher and radiography affects knowledge development and which are the constraints or challenges to take into consideration in the process of implementation. The research takes its departure in the two different models of blended learning designed by teachers in undergraduate education centers...... is analyzed and interpreted through a critical hermeneutical process of prefiguration, configuration and refiguration. The results illustrate a significant impact of students identities as a part of the referential whole, since it is both prerequisite and an obstruction in the activation of blended learning...... environments. It is significant that students’ identities are related to sociality, where both the self and the others take part in the process of knowledge development. Students’ identities and learning are intertwined and related to age, movements, spaces and practice. On basis of the derived results...

  5. Learning as Negotiating Identities

    DEFF Research Database (Denmark)

    Jørgensen, Kenneth Mølbjerg; Keller, Hanne Dauer

    of time - caught in the notion of trajectories of learning - that integrate past, present and future. Working with the learners' notion of time is significant because it is here that new learning possibilities become visible and meaningful for individuals. Further, we argue that the concept of identity......The paper explores the contribution of Communities of Practice (COP) to Human Resource Development (HRD). Learning as negotiating identities captures the contribution of COP to HRD. In COP the development of practice happens through negotiation of meaning. The learning process also involves modes...... of belonging constitutive of our identities. We suggest that COP makes a significant contribution by linking learning and identification. This means that learning becomes much less instrumental and much more linked to fundamental questions of being. We argue that the COP-framework links learning with the issue...

  6. On the fundamentals of identity

    NARCIS (Netherlands)

    van der Gaag, Mandy

    Various new perspectives on identity have been introduced or have increased in popularity over the past two decades. These include identity as dynamic system (Kunnen & Bosma, 2001), a narrative approach to identity (McAdams, 2001), multi-dimensional models of identity formation (Luyckx et al., 2006;

  7. Cultivating a Global Identity

    Directory of Open Access Journals (Sweden)

    Joseph de Rivera

    2015-12-01

    Full Text Available Increasing economic globalization creates conflicts that can only be constructively managed if individuals and groups realize they now belong to a single people. The required sense of such a community does not involve a social group identity—as though being human consisted of being categorized as a member of a superordinate group. Rather, it involves the realization that personal identity depends on the socio-emotional relations involved in community and that the current situation requires a community that is global rather than local or national. The nature of this personal global identity and the sort of global community that is needed is explored in this article. Developing a sense of unity amongst people has always required ritual celebration, and achieving the consciousness that persons worldwide now form a global community will require a particular type of ritual whose nature is described. The authors report on some pilot studies which demonstrate that it is possible to present the idea of global identity in a way that emphasizes personal active relationships rather than group belonging, that this may increase a sense of global identification, and that one can create a celebration that may enhance the sense of personal identity in a global community. We conclude by exploring the ways in which conceiving personal identity in communal terms has implications for research on global identity and conflict. And, finally, we report on present day initiatives that may develop a global communal consciousness, and identify and describe celebrations of community that may advance a sense of global community.

  8. Developing Teenage Youth's Science Identity Through an Astronomy Apprenticeship: Summative Evaluation Results

    Science.gov (United States)

    Barros-Smith, R.; Porro, I.; Norland, E.

    2012-08-01

    We report on the results from the summative evaluation of the Youth Astronomy Apprenticeship (YAA) covering three years of implementation of the program. YAA is a year-long, out-of-school time initiative that connects urban teenage youth with astronomy as an effective way to promote scientific literacy and overall positive youth development. The program employs the strategies of a traditional apprenticeship model, common in crafts and trade guilds as well as in higher education. During the apprenticeship, youth develop knowledge and skills to create informal science education projects; through these projects they demonstrate their understanding of astronomy and use their communication skills to connect to general audiences. For some youth, participation extends across multiple years and their responsibilities for program implementation become multifaceted. Through exposing youth to astronomy investigations and providing opportunities to connect with audiences outside their program and communities, YAA expands scientific literacy to include assuming a science identity. We subscribe to the concept of science identity that describes personal ownership and integration of science into an individual's sense of self through processes of comprehension and personal meaning making. In the YAA context, science identity extends to and includes assuming an actual science advocacy role. Our methods for measuring the development of a science identity included assessments of a youth's perceived and actual understanding of science (cognitive construct), leadership in science (behavior construct), and commitment to science (affective construct).

  9. Scripting Professional Identities

    DEFF Research Database (Denmark)

    Bévort, Frans; Suddaby, Roy

    2016-01-01

    on a longitudinal ethnography of professionals in a Big Four accounting firm we analyse the process by which individual professionals make sense of their new roles and integrate the conflicting demands of professional and managerial logics. We find that individuals are active authors of their own identity scripts....... We further observe considerable interpretive variation in how identity scripts are reproduced and enacted. We contribute to the emerging understanding of institutions as ‘inhabited’ by individuals and extend this literature by demonstrating that the institutional work of reinterpreting competing...

  10. Splitting Ward identity

    Energy Technology Data Exchange (ETDEWEB)

    Safari, Mahmoud [Institute for Research in Fundamental Sciences (IPM), School of Particles and Accelerators, P.O. Box 19395-5531, Tehran (Iran, Islamic Republic of)

    2016-04-15

    Within the background-field framework we present a path integral derivation of the splitting Ward identity for the one-particle irreducible effective action in the presence of an infrared regulator, and make connection with earlier works on the subject. The approach is general in the sense that it does not rely on how the splitting is performed. This identity is then used to address the problem of background dependence of the effective action at an arbitrary energy scale. We next introduce the modified master equation and emphasize its role in constraining the effective action. Finally, application to general gauge theories within the geometric approach is discussed. (orig.)

  11. Splitting Ward identity

    Science.gov (United States)

    Safari, Mahmoud

    2016-04-01

    Within the background-field framework we present a path integral derivation of the splitting Ward identity for the one-particle irreducible effective action in the presence of an infrared regulator, and make connection with earlier works on the subject. The approach is general in the sense that it does not rely on how the splitting is performed. This identity is then used to address the problem of background dependence of the effective action at an arbitrary energy scale. We next introduce the modified master equation and emphasize its role in constraining the effective action. Finally, application to general gauge theories within the geometric approach is discussed.

  12. Editorial: Negotiating Gamer Identities

    Directory of Open Access Journals (Sweden)

    Matthew Barr

    2016-07-01

    Full Text Available The term ‘gamer identity’ is hotly contested, and certainly not understood as a broadly accepted term. From the outdated stereotype of white, heterosexual, teenage boys playing Nintendo in their parents’ basement to the equally contested proclamation that “‘gamers’ are over”, the current game culture climate is such that movements as divisive and controversial as #gamergate can flourish. For this latest special issue of Press Start, we invited submissions regarding the recent controversies surrounding the notion of player identities, with the aim of receiving papers from different viewpoints on gamer identity and culture.

  13. Identity-based encryption

    CERN Document Server

    Chatterjee, Sanjit

    2011-01-01

    Identity Based Encryption (IBE) is a type of public key encryption and has been intensely researched in the past decade. Identity-Based Encryption summarizes the available research for IBE and the main ideas that would enable users to pursue further work in this area. This book will also cover a brief background on Elliptic Curves and Pairings, security against chosen Cipher text Attacks, standards and more. Advanced-level students in computer science and mathematics who specialize in cryptology, and the general community of researchers in the area of cryptology and data security will find Ide

  14. Professions and their Identities

    DEFF Research Database (Denmark)

    Krejsler, John

    2005-01-01

    PROFESSIONS AND THEIR IDENTITIES: HOW TO EXPLORE PROFESSIONAL DEVELOPMENT AMONG (SEMI-)PROFESSIONS This article explores conditions for discussing what it means to be professional among teachers, pre-school teachers, nurses and social workers. From an epistemological point of view it explores how...... analytical strategies can frame in sufficiently complex ways what it means to be a professional today. It is assumed that at least four main issues must be dealt with in order to conduct a satisfactory analysis of professions and their identities. Firstly, it is of fundamental strategic importance that one...

  15. Identity-based consumer behavior

    OpenAIRE

    Reed, Americus; Forehand, Mark; Puntoni, Stefano; Warlop, Luk

    2012-01-01

    This is the authors’ final, accepted and refereed manuscript to the article Although the influence of identity on consumer behavior has been documented in many streams of literature, the absence of a consistent definition of identity and of generally accepted principles regarding the drivers of identity-based behavior complicates comparisons across these literatures. To resolve that problem, we propose a simple but inclusive definition of identity. Identity can be defined as any category l...

  16. Identity-based consumer behavior

    OpenAIRE

    Reed, Americus; Forehand, Mark; Puntoni, Stefano; Warlop, Luk

    2012-01-01

    Although the influence of identity on consumer behavior has been documented in many streams of literature, the absence of a consistent definition of identity and of generally accepted principles regarding the drivers of identity-based behavior complicates comparisons across these literatures. To resolve that problem, we propose a simple but inclusive definition of identity. Identity can be defined as any category label with which a consumer self-associates that is amenable to a clear picture ...

  17. Religion in the face of uncertainty: an uncertainty-identity theory account of religiousness.

    Science.gov (United States)

    Hogg, Michael A; Adelman, Janice R; Blagg, Robert D

    2010-02-01

    The authors characterize religions as social groups and religiosity as the extent to which a person identifies with a religion, subscribes to its ideology or worldview, and conforms to its normative practices. They argue that religions have attributes that make them well suited to reduce feelings of self-uncertainty. According to uncertainty-identity theory, people are motivated to reduce feelings of uncertainty about or reflecting on self; and identification with groups, particularly highly entitative groups, is a very effective way to reduce uncertainty. All groups provide belief systems and normative prescriptions related to everyday life. However, religions also address the nature of existence, invoking sacred entities and associated rituals and ceremonies. They are entitative groups that provide a moral compass and rules for living that pervade a person's life, making them particularly attractive in times of uncertainty. The authors document data supporting their analysis and discuss conditions that transform religiosity into religious zealotry and extremism.

  18. Gerbes, Clifford modules and the index theorem

    OpenAIRE

    Murray, Michael K.; Singer, Michael A.

    2003-01-01

    The use of bundle gerbes and bundle gerbe modules is considered as a replacement for the usual theory of Clifford modules on manifolds that fail to be spin. It is shown that both sides of the Atiyah-Singer index formula for coupled Dirac operators can be given natural interpretations using this language and that the resulting formula is still an identity.

  19. Facial identity and emotional expression as predictors during economic decisions.

    Science.gov (United States)

    Alguacil, Sonia; Madrid, Eduardo; Espín, Antonio M; Ruz, María

    2017-04-01

    Two sources of information most relevant to guide social decision making are the cooperative tendencies associated with different people and their facial emotional displays. This electrophysiological experiment aimed to study how the use of personal identity and emotional expressions as cues impacts different stages of face processing and their potential isolated or interactive processing. Participants played a modified trust game with 8 different alleged partners, and in separate blocks either the identity or the emotions carried information regarding potential trial outcomes (win or loss). Behaviorally, participants were faster to make decisions based on identity compared to emotional expressions. Also, ignored (nonpredictive) emotions interfered with decisions based on identity in trials where these sources of information conflicted. Electrophysiological results showed that expectations based on emotions modulated processing earlier in time than those based on identity. Whereas emotion modulated the central N1 and VPP potentials, identity judgments heightened the amplitude of the N2 and P3b. In addition, the conflict that ignored emotions generated was reflected on the N170 and P3b potentials. Overall, our results indicate that using identity or emotional cues to predict cooperation tendencies recruits dissociable neural circuits from an early point in time, and that both sources of information generate early and late interactive patterns.

  20. Migration, Narration, Identity

    DEFF Research Database (Denmark)

    Leese, Peter

    three consecutive summers from 2010 to 2012. The articles focus on various aspects of the migrant experience and try to answer questions about migrant identity and its representations in literature and the media. The book closes with an original play by Carlos Morton, the Chicano playwright working...

  1. Dissociative Identity Disorder

    Science.gov (United States)

    Schmidt, Tom

    2007-01-01

    Few psychological disorders in the Diagnostic Statistical Manual have generated as much controversy as Dissociative Identity Disorder (DID). For the past 35 years diagnoses of DID, previously referred to as Multiple Personality Disorder (MPD), have increased exponentially, causing various psychological researchers and clinicians to question the…

  2. Language, Identity, and Exile

    Science.gov (United States)

    Erdinast-Vulcan, Daphna

    2010-01-01

    The exilic mode of being, a living on boundary-lines, produces a constant relativization of one's home, one's culture, one's language, and one's self, through the acknowledgement of otherness. It is a homesickness without nostalgia, without the desire to return to the same, to be identical to oneself. The encounter with the other which produces a…

  3. Graduate Identity and Employability

    Science.gov (United States)

    Hinchliffe, Geoffrey William; Jolly, Adrienne

    2011-01-01

    This paper develops the concept of graduate identity as a way of deepening the understanding of graduate employability. It does this through presenting research in which over 100 employers in East Anglia were asked to record their perceptions of graduates in respect of their employability. The findings suggest a composite and complex graduate…

  4. Spatial Identity in Gagauzia

    Directory of Open Access Journals (Sweden)

    A. V. Salavatova

    2015-01-01

    Full Text Available Historically the gagauz developed a self-perception based on their difference from Moldova as well as the ‘Turkish world’. The article argues that this fact has determined their pro-Russian political orientation as the only possible way of maintaining their identity

  5. Language and Identity Explored

    Directory of Open Access Journals (Sweden)

    Thomas Rozanov

    2016-06-01

    Full Text Available The relationship between language and identity is widely discussed in applied linguistics, sociology, communications and other related scholarly fields. Furthermore, many researchers have focused on the post-Soviet region, which given its unique historical context allows for testing of this relationship. The widespread bilingualism as a result of historical russification and the linguistic transformations that occurred after the collapse of the Soviet Union make the region a ‘sociolinguistic playground’. Recent events in Ukraine have given grounds to further explore this relationship, now in attempt to link language and identity as potential forces for geopolitical change in the region. This paper presents an overview of existing research, theories, and opposing perspectives related to the relationship between language and identity, and considers complications such as historical russification, religious influence, socioeconomic factors, and education with regards to the Ukrainian and post-Soviet context.  I aim to illustrate the significance of language and its effects on socio-political change in the case of Ukraine, by presenting arguments and complications in support of the relationship between language and identity.

  6. Keeping identity private

    DEFF Research Database (Denmark)

    Adjei, Joseph K.; Olesen, Henning

    2011-01-01

    is an attempt to understand the relationship between individuals’ intentions to disclose personal information, their actual personal information disclosure behaviours, and how these can be leveraged to develop privacy-enhancing identity management systems (IDMS) that users can trust. Legal, regu...

  7. Discourses of Identity

    Science.gov (United States)

    Van Leeuwen, Theo

    2009-01-01

    This lecture discusses the concept of lifestyle, which emerged in the field of marketing in the 1970s, as a new, and increasingly pervasive, discourse of identity cutting through older "demographic" discourses. Distributed by mediated experts and role models, and realized through the semiotics of "composites of connotation", it redraws the…

  8. Researcher Identity in Transition

    DEFF Research Database (Denmark)

    Castelló, Montserrat; Kobayashi, Sofie; McGinn, Michelle K.

    2015-01-01

    Within the current higher education context, early career researchers (ECRs) face a ‘risk-career’ in which predictable, stable academic careers have become increasingly rare. Traditional milestones to signal progress toward a sustainable research career are disappearing or subject to reinterpreta......Within the current higher education context, early career researchers (ECRs) face a ‘risk-career’ in which predictable, stable academic careers have become increasingly rare. Traditional milestones to signal progress toward a sustainable research career are disappearing or subject...... to reinterpretation, and ECRs need to attend to new or reimagined signals in their efforts to develop a researcher identity in this current context. In this article, we present a comprehensive framework for researcher identity in relation to the ways ECRs recognise and respond to divergent signals across spheres...... of activity. We illustrate this framework through eight identity stories drawn from our earlier research projects. Each identity story highlights the congruence (or lack of congruence) between signals across spheres of activity and emphasises the different ways ECRs respond to these signals. The proposed...

  9. Identity and Youth

    Directory of Open Access Journals (Sweden)

    Fernando Yurman

    2010-06-01

    Full Text Available Youth is an abstract entity, determined by an imaginary and symbolical changing dimension. Youth and identity are linked because both of them desire simultaneously the change and establishment. This friction is essential, not only because of social history but because of life cycles. This is a field of ideals, where rules return with the possibility of restarting. Identity is indeed an avoidable reference to get close to this period, so identity forms must be distinguished. To social and cultural differences, and globalization and new places, we can add the crumbling process of youth. Probably Internet -a place with no time and no space- determines this youth as a new form of an ancient time. Digital citizen absorb all ages, and is been changed by virtuality. Each morning one should choose between look through the home window, or to the get the planet through de computer; and this divergence constitutes this citizen, his/her identity, face his/her own body and his/her alter. Links and unlinks between virtuality and reality debate on a different temporality, and ages (like youth lose their traditional limits.

  10. Bilingualism versus identity

    DEFF Research Database (Denmark)

    Hermann, Jesper

    1988-01-01

    During the last hundred years psychologists, philosophers and theologians have developed two different conceptions of personal identity. One of them insists that each person is a unique and transcendental being, whereas the other finds the personality deriving from interaction with other persons....

  11. MacWilliams Identities?

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 10; Issue 1. MacWilliams Identities? Madhu Sudan. Classroom Volume 10 Issue 1 January ... Author Affiliations. Madhu Sudan1. Department of Electrical Engineering and Computer Science Massachussetts Institute of Technology, MA 02139-4307, USA ...

  12. Regional identity and family

    Directory of Open Access Journals (Sweden)

    Tripković Gordana D.

    2003-01-01

    Full Text Available This paper is a continuation of a study on regionalisation and family, within the project named Sociological Aspects of Multiculturality and Regionalisation and their influence on the development of AP Vojvodina and the Republic of Serbia. The author focuses her attention to operationalisation of the theoretical and methodological premises that were developed in the previous paper (Tripković, 2002: 111-127, which means that it represents the results of the second phase of the research plan. This phase includes adjusting of theoretical concepts to the fieldwork displaying the results of the research and the analysis of the findings that put a family in the context of confronting different identities, above all national and regional. As possible "identity difference" was emphasized in the research, theoretical and methodological apparatus was adjusted to this goal. That is why in this paper the replies of interviewees that can suggest or reject the assumption that their national identity can influence significantly the evaluation of identity specificities are presented and analyzed, concerning more or less visible aspects of family life, like welfare status, relations between spouses, respect to the elder, family harmony, number of children, connections with relatives, etc.

  13. Imagining Geographies, Mapping Identities

    Directory of Open Access Journals (Sweden)

    Matthew Graves

    2015-03-01

    Full Text Available The ambition of this issue of Portal is to reach across the methodological boundaries of history, politics, literature and geography to apply their complementary perspectives to the study of identity and its relation to space and place, an aim that involves attempting to identify the many different ways the notoriously slippery concepts of identity and geography may intersect. For this issue we have selected articles that cast a fresh perspective on two areas where identity and geography intersect: the construction of identity through the imaginative recreation of place in literature: Mapping Literary Spaces; and the study of the shifting relationships of centre and periphery, exclusion and inclusion in urban settings and geopolitical confrontations: Social and Political Peripheries. Gerard Toal has written that geography is not a noun but a verb: it does not describe what space is but studies what we do with space, imaginatively and politically. The articles in this issue illustrate the exercise of the literary and political imagination and the role of materiality and memory in the creation of geographic representation. They show too a new awareness of the centrality of space in the constitution of identities, and the need for a new geocritical reading of its discourse, as the interrelations of place and community are played out on the many scales of social and political life, from the local to the global.   The special issue is organised thus: Introduction Matthew Graves (Aix-Marseille University & Liz Rechniewski (Sydney University: “Imagining Geographies, Mapping Identities.” I. Mapping Literary Spaces - Isabelle Avila (University of Paris XIII, "Les Cartes de l'Afrique au XIXe siècle et Joseph Conrad : Perceptions d'une Révolution Cartographique." - Daniela Rogobete (University of Craiova, "Global vs Glocal: Dimensions of the post-1981 Indian English Novel." II. Social and Political Peripheries - Elizabeth Rechniewski (Sydney

  14. The war veteran identity

    Directory of Open Access Journals (Sweden)

    Marković-Savić Olivera S.

    2015-01-01

    Full Text Available The paper discusses how war veterans perceive themselves and how they answer the question 'Who am I?'. War veterans face many challenges in the process of re-socialization from a state of war and war traumatization to a peacetime society. There are several reasons why their re-socialization is a slow process: the first one is that a war engagement is in itself a highly stressful situation which carries traumas of different degrees, the other reason is the changed system of values in relation to war engagement. Namely, at the time they went to war, they had a strong social support, but at the time of their return and today this support is lost to the point of judgment. And the third reason which limits their re-socialization is the situation of social transition they found on their return from war, which specifically means that a large percentage of the population in general, and thus the war veterans after returning from the war, lost their jobs, creating a large social group of 'transition losers'. Such a condition often generates an identity crisis. This set of socio-cultural circumstances together with the ontological insecurity carried by war trauma generate an identity crisis, which is manifested among the respondents in nihilistic answers when responding to questions about their own personality. Studying the identity of war veterans, it was found that a strong attachment to the veteran identity is dominant. In fact, this paper discusses the different ways in which this attachment is refracted in the personality and identity of subjects, from negative attitudes to the pride in belonging to a group of war veterans and personal fulfillment in the activism in associations of war participants.

  15. Vocational Identity and Ego Identity Status in Korean Nursing Students.

    Science.gov (United States)

    Koo, Hyun-Young; Kim, Eun-Jung

    2016-03-01

    The purpose of this study was to investigate the association between vocational identity and ego identity status among Korean nursing students. The participants were 311 nursing students in South Korea who were attending either a 4-year bachelor's program or a 3-year diploma program. Data were collected using self-report questionnaires that addressed vocational identity, ego identity status, and demographic information. The data were analyzed using descriptive statistics, one-way analysis of variance, t test, and Chi-square test. In terms of ego identity status, 31.5% of nursing students were classified as being in diffusion status, followed by 28.3% in low profile moratorium status, 14.8% in moratorium status, 14.1% in foreclosure status, and 11.3% in achievement status. Vocational identity differed according to ego identity status; vocational identity among students who were in achievement status was higher than for those in all other statuses. Vocational identity also differed according to grade level and monthly family income. Ego identity status was related to the type of program enrolled in, grade level, and monthly family income. These findings show that nursing students in identity achievement status have secure and clear vocational identities. Further longitudinal and qualitative studies are needed to find out if identity formation among nursing students changes with age. Copyright © 2016. Published by Elsevier B.V.

  16. On A Generalization of Semisimple Modules

    Indian Academy of Sciences (India)

    65

    NAZIM AGAYEV, CES˙IM C¸EL˙IK, AND TAH˙IRE ¨OZEN. Abstract. Let R be a ring with identity. A module MR is called an r-semisimple module if for any right ideal I of R, MI is a direct summand of MR which is a generalization of semisimple and second modules. We investigate when an r-semisimple ring is semisimple.

  17. 用戶著作權侵權之網路服務業者責任 Internet Service Provider Liability for Subscriber Copyright Infrigement

    Directory of Open Access Journals (Sweden)

    蔡蕙芳 Hui-Fang Tsai

    2004-12-01

    Full Text Available 網路服務業者的責任可說是網路上最具爭議的問題。本文的目的在於從一般性原則上討論用戶涉及著作權侵權時,網路服務業者是否可能成立民事侵權與刑事犯罪責任。個案的深入討論並不在本文範圍內。本文首先介紹美國侵權法上網路服務業者責任,內容包括法院判決、學說見解與國會立法。其次,本文將從刑法理論來分析用戶成立直接正犯之同時,網路服務業者可能構成共同正犯、正犯後正犯或共犯。此外,也將分別檢討正犯與共犯之成立要件。最後,本文將檢討我國法上相關法律如何適用以解決網路服務 業者責任,並提出增訂網路服務業者責任規定之建議。 The liability of internet service provider (ISP is perhaps the most controversial legal issue to emerge from cyberspace. The purpose of this paper is to explore the general principles as to whether there should be civil and criminal liability for ISP concerning subscriber copyright infringement. An in-depth treatment of case study is beyond the scope of this paper. The first section provides an overview of the doctrine of ISP copyright infringement liability in America, followed by the introduction of judicial decisions, opinions of scholars and new legislation. Focusing on criminal liability that could be imposed upon ISP for copyright infringement initiated by subscribers, the second section seeks to illustrate the observation that the individuals who post copyright infringement materials act as principals in the first degree, and ISP would qualify as an accomplice, principal in the second degree, or accessory to the crimes. Furthermore, this section discusses in turn the qualifications for the perpetrators and accomplices. Finally, the third section reviews the current Taiwan tort and criminal law and its application to ISP and concludes that the Taiwan copyright law should make specific provision for

  18. The Memory Identity Record: Politics of Memory and National identity

    National Research Council Canada - National Science Library

    Juan David Villa Gómez; Daniela Barrera Machado

    2017-01-01

    .... To thateffect, the article examines a series of research projects describing the relations between memory and identity and studying national identity on the basis of the political constructions of collective memory...

  19. Constructing nurses' professional identity through social identity theory.

    Science.gov (United States)

    Willetts, Georgina; Clarke, David

    2014-04-01

    The profession of nursing continues to struggle with defining and clarifying its professional identity. The definitive recognition of nursing as a profession was the moving of training from the hospital apprentice model to the tertiary sector. However, this is only part of the story of professional identity in nursing. Once training finishes and enculturation into the workplace commences, professional identity becomes a complicated social activity. This paper proposes social identity theory as a valuable research framework to assist with clarifying and describing the professional identity of nurses. The paper outlines the key elements of a profession and then goes on to describe the main concepts of social identity theory. Lastly, a connection is made between the usefulness of using social identity theory in researching professional identity in nursing, recognizing the contextual nature of the social activity of the profession within its workplace environment. © 2013 Wiley Publishing Asia Pty Ltd.

  20. Entanglement by Path Identity

    Science.gov (United States)

    Krenn, Mario; Hochrainer, Armin; Lahiri, Mayukh; Zeilinger, Anton

    2017-02-01

    Quantum entanglement is one of the most prominent features of quantum mechanics and forms the basis of quantum information technologies. Here we present a novel method for the creation of quantum entanglement in multipartite and high-dimensional systems. The two ingredients are (i) superposition of photon pairs with different origins and (ii) aligning photons such that their paths are identical. We explain the experimentally feasible creation of various classes of multiphoton entanglement encoded in polarization as well as in high-dimensional Hilbert spaces—starting only from nonentangled photon pairs. For two photons, arbitrary high-dimensional entanglement can be created. The idea of generating entanglement by path identity could also apply to quantum entities other than photons. We discovered the technique by analyzing the output of a computer algorithm. This shows that computer designed quantum experiments can be inspirations for new techniques.

  1. Shifting Design Consultancy Identities

    DEFF Research Database (Denmark)

    Larsen, Henry; Huijboom, Nina; Holm Nielsen, Anne

    2014-01-01

    Knowledge-intensive business services, such as design consultancies are perceived as key drivers for innovation and competitiveness. However, many designers create their own companies, which often remain as one-man companies. By interviewing designers who own small design firms we found patterns...... and identities that resonate more with freelancing and portfolio careers than with the intention of creating firms that are intended to expand. We recognized a pattern where freelancers build up their work as a portfolio by moving from one engagement to another, a process that we will call sequential freelancing....... This paper aims to understand the emergence of such identities amongst designers and we suggest that instead of focusing on their individual firms as entities of growth, other strategies such as networking might be more fruitful. If this approach was adopted, we believe that those local authorities who focus...

  2. When design meets identities

    DEFF Research Database (Denmark)

    Dau, Susanne

    2013-01-01

    . It is significant that students’ identities are related to sociality, where both the self and the others take part in the process of knowledge development. Students’ identities and learning are intertwined and related to age, movements, spaces and practice. On basis of the derived results, it is stressed......The aim of this paper is to present result from the first period of implementing models of blended learning in two Danish educations centers at a University College. The question addressed is how activation of blended learning models in undergraduate education for teacher and radiography affects...... knowledge development and which are the constraints or challenges to take into consideration in the process of implementation. The research takes its departure in the two different models of blended learning designed by teachers in undergraduate education centers. This is an investigation of the first...

  3. Identity Management Systems

    OpenAIRE

    HABAZIN, ANDREJ

    2016-01-01

    Identity management systems allow larger organizations management and control over resources, used by identites. Primarily, these systems maintain and enforce security and other organizational policies. Secondary task is to provide a framework for automation of repetitive tasks and self service processes, which allows a reduction of workload on helpdesk services and yet provides traceability for individual request. We’ll go through some of most important supporting security ...

  4. Identity Styles and Religiosity: Examining the Role of Identity Commitment

    Science.gov (United States)

    Grajales, Tevni E.; Sommers, Brittany

    2016-01-01

    This study observed the role of identity styles, identity commitment, and identity statuses in predicting religiosity in a sample of undergraduate students attending a Seventh-day Adventist university (N = 138). Two structural models were evaluated via path analysis. Results revealed two strong models for the prediction of religiosity. Identity…

  5. Identity Construction, Negotiation, and Resistance: Reconsideration of "Japanese" Identity

    Science.gov (United States)

    Fukuda, Chie

    2010-01-01

    This dissertation explores identity construction, mainly focusing on the ethnonational identity of "Japanese," in contrast to that of "non-Japanese" from ethnomethodological and social constructionist perspectives. Within these approaches, identity is not given "a priori" but emerges through sociohistorical contexts…

  6. Corporate Brand Identity in SMEs

    DEFF Research Database (Denmark)

    Mäläskä, Minna; Jones, Richard Ian

    challenge existing notions that brand identity is based solely on the values of the entrepreneur. This typology suggests that SMEs should be open to creating an identity that draws from their stakeholder eco-system. Originality / value: this research challenges the existing assumption that brand identity...... with key stakeholders in the brand ecosystem. Brand identity underwent several transformation as the focal firm sought to balance isomorphic (market) pressures with the need for a clear and distinctive brand identity. Research limitations / implications: this research is limited by the number of case...... studies. The research is important since it suggests an iterative and co-creative approach to brand identity. A typology of brand identity formation for SMEs is presented: entrepreneur driven, market driven, stakeholder driven. Practical implications: The three paths to creating a strong brand identity...

  7. Context-Aware Identity Delegation

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.

    2009-01-01

    due to its complicated and complex structure. Identity delegation at authentication level provides improved usability, which reduces the risk of circumventing the delegation mechanism; at the same time, however, identity delegation violates the principle of least privileges. We use contextual...

  8. An"Other" Identity: A View of Myself

    Science.gov (United States)

    Atkinson-Baldwyn, Lesley

    2009-01-01

    In this piece the author explores the role and impact of her changing identity in the context of study on a doctoral program. The author has a business background which proves a contrast to the experiences she encounters. The doctorate is a taught program incorporating structured modules for the first 2 years followed by a research thesis. The…

  9. Gender Socialization and Identity Theory

    OpenAIRE

    Michael J. Carter

    2014-01-01

    Gender socialization is examined through a social psychological lens by applying identity theory and identity control theory. Current research from the fields of family and sociological social psychology are surveyed to provide a better conception of how the family operates as agents of socialization, and how identities that are cultivated and fostered in youth provide meaning throughout the life course and maintain the social order. The application of identity theory shows how gender is a di...

  10. Social Identity Simulation System (SISTEM)

    Science.gov (United States)

    2014-03-31

    its expected costs. The following subsections describe various strategies of social identity entrepreneurship in more detail. Calling for...Haslam, S. A., & Reicher, S. (2007). Identity Entrepreneurship and the consequences of identity failure: the dynamics of leadership in the BBC prison...study. Social Psychology Quarterly, 70(2), 125-147. Lal, B. (1997). Ethnic Identity Entrepreneurs: Their Role in Transracial and Intercountry Adoptions. Asian Pacific Migration Journal, 6, 385-441.

  11. John locke on personal identity.

    Science.gov (United States)

    Nimbalkar, Namita

    2011-01-01

    John Locke speaks of personal identity and survival of consciousness after death. A criterion of personal identity through time is given. Such a criterion specifies, insofar as that is possible, the necessary and sufficient conditions for the survival of persons. John Locke holds that personal identity is a matter of psychological continuity. He considered personal identity (or the self) to be founded on consciousness (viz. memory), and not on the substance of either the soul or the body.

  12. Social identity process within organizations

    OpenAIRE

    Bazarov, Takhir; Kuzmina, Maria

    2005-01-01

    Expanding and complex social realities cause new types of identity. Variety in organizations and workgroups (where people are involved), implies a special kind of social identity which can be defined as professional, organizational or managerial. The study of the social identity processes in organizations is a new interdisciplinary sphere that is presented especially commonly in European Social Psychology. The result of its theoretical comprehension is Social Identity Theory. In the article l...

  13. An 'open source' networked identity

    DEFF Research Database (Denmark)

    Larsen, Malene Charlotte

    2013-01-01

    This paper examines the concept of identity in relation to youth practices on social network sites (SNS). The paper illustrates how writing “I love you” or other emotional statements on each other’s profiles on SNS is not only a common way for Danish teenagers to communicate and practice friendship...... communicative actions – are not only performing their own identity, but are becoming co-constructors of each other's identities, which the author characterizes as an 'open source' networked identity....

  14. Evolutionary perspectives on social identity

    OpenAIRE

    Park, Justin H; Van Leeuwen, Florian

    2015-01-01

    A complete understanding of the psychology of social identity requires not only descriptions of how social identification processes work but also an account of why the underlying psychological mechanisms have evolved. This chapter focuses on the evolution of coalitional (or “tribal”) social identity (i.e., the type of social identity associated with nationality, ethnicity, religion, and class). Coalitional social identity appears to involve a readiness to incur costs for the collective, which...

  15. Identity and Fear of Success.

    Science.gov (United States)

    Larkin, Linda

    1987-01-01

    Investigated the relation between ego identity and fear of success using the Rasmussen Ego Identity Scale (EIS), the Marcia interview for identity status, the Cohen People Knowing Questionnaire (PKO) to measure fear of success, and an occupational behavior and attitude questionnaire. EIS and PKO scores correlated significantly with each other and…

  16. Queering Black Racial Identity Development

    Science.gov (United States)

    Johnson, Alandis A.; Quaye, Stephen John

    2017-01-01

    We used queer theory to encourage readers to think differently about previous theories about Black racial identity development. Queer theory facilitates new and deeper understandings of how Black people develop their racial identities, prompting more fluidity and nuance. Specifically, we present a queered model of Black racial identity development…

  17. Identity Education in Multicultural Germany.

    Science.gov (United States)

    Luchtenberg, Sigrid

    1998-01-01

    Addresses conditions of identity education in Germany within the framework of multicultural education. Particular focus is on the interaction theory of Krappmann (1971), which provides a framework for dealing with the necessities of identity education for migrant and German students. The importance of identity education for migrant students and…

  18. Identity theft and your practice.

    Science.gov (United States)

    Asbell, Lisa

    2010-01-01

    Medical identity theft is a growing problem in America. The federal government has passed laws to help "prevent" identity theft. However, several powerful medical associations are fighting the legislation. Americans need to know what is happening with these laws and why these laws are important to protect providers from lawsuits and consumers of healthcare from medical identity theft.

  19. Identity formation in multiparty negotiations

    NARCIS (Netherlands)

    Swaab, R; Postmes, T.; Spears, R.

    Based on the recently proposed Interactive Model of Identity Formation, we examine how top-down deductive and bottom-up inductive identity formations influence intentions and behaviour in multiparty negotiations. Results show that a shared identity can be deduced from the social context through

  20. Mistaken identity: activating conservative political identities induces "conservative" financial decisions.

    Science.gov (United States)

    Morris, Michael W; Carranza, Erica; Fox, Craig R

    2008-11-01

    Four studies investigated whether activating a social identity can lead group members to choose options that are labeled in words associated with that identity. When political identities were made salient, Republicans (but not Democrats) became more likely to choose the gamble or investment option labeled "conservative." This shift did not occur in a condition in which the same options were unlabeled. Thus, the mechanism underlying the effect appears to be not activated identity-related values prioritizing low risk, but rather activated identity-related language (the group label "conservative"). Indeed, when political identities were salient, Republicans favored options labeled "conservative" regardless of whether the options were low or high risk. Finally, requiring participants to explain the label "conservative" before making their choice did not diminish the effect, which suggests that it does not merely reflect inattention to content or construct accessibility. We discuss the implications of these results for the literatures on identity, priming, choice, politics, and marketing.

  1. Social identity change: shifts in social identity during adolescence.

    Science.gov (United States)

    Tanti, Chris; Stukas, Arthur A; Halloran, Michael J; Foddy, Margaret

    2011-06-01

    This study investigated the proposition that adolescence involves significant shifts in social identity as a function of changes in social context and cognitive style. Using an experimental design, we primed either peer or gender identity with a sample of 380 early- (12-13 years), mid- (15-16 years), and late-adolescents (18-20 years) and then measured the effect of the prime on self-stereotyping and ingroup favouritism. The findings showed significant differences in social identity across adolescent groups, in that social identity effects were relatively strong in early- and late-adolescents, particularly when peer group identity rather than gender identity was salient. While these effects were consistent with the experience of change in educational social context, differences in cognitive style were only weakly related to ingroup favouritism. The implications of the findings for theory and future research on social identity during adolescence are discussed. Crown Copyright © 2010. Published by Elsevier Ltd. All rights reserved.

  2. Identities in Migration

    Directory of Open Access Journals (Sweden)

    Montserrat Clua i Fainé

    2017-08-01

    Full Text Available Young Catalans in London build their identity as immigrants in a close dialectic between their own imaginary about immigration in their country of origin and British perceptions of them. Given the negative stigma attached to the category of «immigrant», not all recognise themselves as such. Some simply refuse to acknowledge they belong to this category, while others use the projection of prejudices on immigrants towards Spaniards as a strategy from which they distance themselves by establishing a distinction between Catalans and Spaniards.

  3. Migration, Narration, Identity

    DEFF Research Database (Denmark)

    Leese, Peter

    three consecutive summers from 2010 to 2012. The articles focus on various aspects of the migrant experience and try to answer questions about migrant identity and its representations in literature and the media. The book closes with an original play by Carlos Morton, the Chicano playwright working......(co-editor with Carly McLaughlin and Wladyslaw Witalisz) This book presents articles resulting from joint research on the representations of migration conducted in connection with the Erasmus Intensive Programme entitled «Migration and Narration» taught to groups of international students over...

  4. Identity Management A Primer

    CERN Document Server

    Sharoni, Ilan; Williamson, Graham; Yip, David

    2009-01-01

    In an age in which the boundaries between the real and the virtual are becoming increasingly blurred, this timely guide teaches both the key issues of identity management as well as appropriate strategies and preventative measures for ensuring personal safety in the virtual world. In a corporate setting, it is essential to identify and control the way in which the organization deals with customers, suppliers, employees, and other users who may interact with the information systems of the company. Providing strategies for overcoming this task in real-world terms as well as questions that assist

  5. Racial Identity and Education

    OpenAIRE

    Patacchini, Eleonora; Zenou, Yves

    2006-01-01

    We investigate the sources of differences in school performance between students of different races by focusing on identity issues. We find that having a higher percentage of same-race friends has a positive effect of white teenagers’ test score while having a negative effect on blacks’ test scores. However, the higher the education level of a black teenager’s parent, the lower this negative effect, while for whites, it is the reverse. It is thus the combination of the choice of friends (whic...

  6. Digital identity management

    CERN Document Server

    Laurent, Maryline

    2015-01-01

    In the past four decades, information technology has altered chains of value production, distribution, and information access at a significant rate. These changes, although they have shaken up numerous economic models, have so far not radically challenged the bases of our society.This book addresses our current progress and viewpoints on digital identity management in different fields (social networks, cloud computing, Internet of Things (IoT)), with input from experts in computer science, law, economics and sociology. Within this multidisciplinary and scientific context, having crossed analys

  7. Identity Management Technology

    OpenAIRE

    Sánchez Reíllo, Raúl

    2008-01-01

    This offer comes from researchers and professors from a Spanish University. They offer solutions in Identity Management for human beings (from Identification Cards to Biometrics). They offer cooperation in R&D task, as well as Assisting in Management, Dissemination of results and Standardization. They have proved experience in both national and european projects (e.g. eEpoch, BioSec). Contrato Programa de Comercialización e Internacionalización. Sistema Regional de Investigación Científ...

  8. Identity and the Management Project

    DEFF Research Database (Denmark)

    Jørgensen, Kenneth Mølbjerg; Dehlin, Erlend

    The paper discusses the concept of identity in relation to management. We take our starting point in Wittgenstein’s concept language games. We argue that identity is a question of using linguistic tools to construct reality. Two elements of the language game metaphor are central here: rules...... and family resemblance. As such, managing identity in organizations is closely linked to rules and family resemblance. Organizations manage identity through the definition of norms and values for right or wrong, appropriate or inappropriate, to name but a few. Norms and values are important as reference...... points for constructing identities. Managing identity has become more important because the rules-of-the-game have become more unstable. Managing identity is important if the bonds between individuals and organizations are to be sustained. But this task is contradictory and paradoxical of its very nature...

  9. Identity style and coping strategies.

    Science.gov (United States)

    Berzonsky, M D

    1992-12-01

    This study examined the relationship between identity style and strategies used to cope with stressors that potentially threaten one's sense of identity. Identity style refers to differences in the way individuals construct and revise or maintain their sense of identity. An informational style involves actively seeking out, evaluating, and utilizing self-relevant information. A normative style highlights the expectations and standards of significant others. A diffuse/avoidant style is characterized by procrastination and situation-specific reactions. Late-adolescent college subjects were administered measures of identity style, ways of coping with academic stressors, and test anxiety. Within this self-as-student context, subjects with diffuse and normative identity styles employed avoidant-oriented coping strategies (wishful thinking, distancing, and tension reduction). An informational style was associated with deliberate, problem-focused coping. Findings are discussed in terms of a process model of identity development.

  10. Holy Nations. Global Identities

    DEFF Research Database (Denmark)

    Along with the processes of globalisation and the end of the cold war we have seen an upsurge in religious nationalism and an increasing focus on the role of religion as a legitimising force in democratic secular states. Holy Nations & Global Identities draws on the combined theoretical and histo......Along with the processes of globalisation and the end of the cold war we have seen an upsurge in religious nationalism and an increasing focus on the role of religion as a legitimising force in democratic secular states. Holy Nations & Global Identities draws on the combined theoretical...... and historical insight of historians, political scientists and social scientists on the question of nationalism and globalisation with the methodological knowledge of religion presented by sociologists of religion. The book brings genuine theoretical explorations and original case studies on civil religion......, nationalism and globalization. It also provides an introduction to the research history of the fields and aims to develop and elaborate on the theories and methodology of the investigated subjects....

  11. Addressee Identity and Morphosyntactic Processing in Basque Allocutive Agreement.

    Science.gov (United States)

    Wolpert, Max; Mancini, Simona; Caffarra, Sendy

    2017-01-01

    Information about interlocutor identity is pragmatic in nature and has traditionally been distinguished from explicitly coded linguistic information, including mophosyntax. Study of speaker identity in language processing has questioned this distinction, but addressee identity has been less considered. We used Basque to explore how addressee identity is processed during morphosyntactic analysis. In the familiar register hika, Basque has obligatory allocutive agreement, where verbal morphology represents the gender of a non-argument addressee. We manipulated the gender of the allocutive verb and the congruence of addressee gender in conversations between two interlocutors. Items with person agreement manipulations were included as a control comparison. Basque speakers familiar with hika completed speeded acceptability judgments and unspeeded, offline naturalness ratings for each conversation. Results showed a main effect of addressee identity congruence for naturalness ratings, but there was no main effect for addressee identity congruence for reaction times or accuracy in the acceptability judgment. Interactions and correlations with biographical data showed that the effect of congruence was modulated by the gender of the allocutive verb and that hika proficiency was related to participants' performance for the acceptability judgment. These results show an interaction between morphosyntactic and pragmatic information and are the first experimental data of allocutive processing. In comparison, clear effects were seen for the person agreement condition, indicating that person disagreement is more disruptive to processing than addressee identity incongruence. This study has implications for investigation of the role of extralinguistic information in morphosyntactic processing, and suggests that not all such information plays an equal role.

  12. Measuring ethnic identity in the Ethnic Identity Scale and the Multigroup Ethnic Identity Measure-Revised.

    Science.gov (United States)

    Yoon, Eunju

    2011-04-01

    This study examined the newly developed ethnic identity measures of the Ethnic Identity Scale (EIS) and the Multigroup Ethnic Identity Measure-Revised (MEIM-R) from psychometric and theoretical perspectives. Survey data from 289 counseling students in California were analyzed. Confirmatory factor analyses supported three correlated factors of the EIS (exploration, resolution, and affirmation) and two correlated factors of the MEIM-R (exploration, commitment) for both European American and minority students. Consistent with the theories of Erikson's and Marcia's identity development, the EIS and the MEIM-R nicely depicted (a) Marcia's 4 (2 × 2) identity statuses of diffusion, foreclosure, moratorium, and achievement and (b) the hierarchy of identity statuses in relation to subjective well-being as an indicator of adjustment, especially for minority students. Additionally, European American and minority students revealed differences as to the salience and importance of ethnic identity. Recommendations for using the EIS and the MEIM-R are provided.

  13. XRTPS – EXTENSIBLE REAL-TIME PUBLISH-SUBSCRIBE: MIDDLEWARE MULTICAST PARA TROCA DE DADOS BASEADO EM XML PARA REDES DE TEMPO REAL

    Directory of Open Access Journals (Sweden)

    Jalerson Raposo Ferreira de Lima

    2011-06-01

    Full Text Available Um fator recorrente das redes de escritório é a busca por maior desempenho, ou seja, redes que executem suas tarefas no menor tempo possível. Porém, para redes industriais o desempenho médio não é o fator mais relevante, isso porque o desempenho de um sistema de tempo real está diretamente relacionado com a previsibilidade imposta pelo ambiente. Enquanto as redes de escritório são orientadas a obter o melhor desempenho médio possível, as redes industriais são orientadas a requisitos temporais, dado que o fator de cumprimento das metas temporais é imperativo em muitas aplicações de tempo real, ou seja, o determinismo. O padrão Ethernet é a principal tecnologia de interconexão de redes locais, porém ainda não foi estabelecido como padrão para redes industriais porque o seu método de acesso ao meio, o CSMA/CD, não atende aos requisitos temporais exigidos por esse tipo de rede. Esse trabalho teve como objetivo desenvolver um middleware em Java para troca de dados em redes industriais, denominado Extensible Real-Time Publish Subscribe. Java foi escolhida como a tecnologia de desenvolvimento a fim de garantir a independência de plataforma provida pela Máquina Virtual Java. Essa independência também é provida pelo próprio middleware, uma vez que suas mensagens são formatadas em XML, que por se tratar de um padrão mundial estabelecido pela W3C, pode ser manipulado por diferentes tecnologias.

  14. Swiss identity smells like chocolate: Social identity shapes olfactory judgments

    Science.gov (United States)

    Coppin, Géraldine; Pool, Eva; Delplanque, Sylvain; Oud, Bastiaan; Margot, Christian; Sander, David; Van Bavel, Jay J.

    2016-01-01

    There is extensive evidence that social identities can shape people’s attitudes and behavior, but what about sensory judgments? We examined the possibility that social identity concerns may also shape the judgment of non-social properties—namely, olfactory judgment. In two experiments, we presented Swiss and non-Swiss participants with the odor of chocolate, for which Switzerland is world-famous, and a control odor (popcorn). Swiss participants primed with Swiss identity reported the odor of chocolate (but not popcorn) as more intense than non-Swiss participants (Experiments 1 and 2) and than Swiss participants primed with individual identity or not primed (Experiment 2). The self-reported intensity of chocolate smell tended to increase as identity accessibility increased—but only among Swiss participants (Experiment 1). These results suggest that identity priming can counter-act classic sensory habituation effects, allowing identity-relevant smells to maintain their intensity after repeated presentations. This suggests that social identity dynamically influences sensory judgment. We discuss the potential implications for models of social identity and chemosensory perception. PMID:27725715

  15. Identity at work: Exploring strategies for Identity Work

    Directory of Open Access Journals (Sweden)

    Byron G. Adams

    2012-01-01

    Full Text Available Orientation: This study explored strategies for identity work that are central to the negotiation and regulation of employee work identity.Research purpose: The main aim of this study was to explore employee narratives and identify the strategies available to them in the process of identity work, as they defined themselves at work.Motivation for the study: As there is a scarcity of research on identity work in South Africa, this study wanted to advance knowledge about identity work and the strategies used for regulating and negotiating an identity at work by exploring these constructs in this context.Research design, approach and method: A qualitative research process formed the basis for this study. Nineteen employees from a global manufacturing company participated in two semi-structured in-depth interviews. Grounded theory was applied to analyse and interpret the data.Main findings: Nine strategies for identity work were identified and categorised into four broad themes (personal philosophies; relationships; career management and negotiating balance.Practical/managerial implications: Employees followed various strategies for defining themselves at work and this may have some implications for employee work engagement and productivity.Contribution/value-add: This study expands on current theoretical knowledge of identity work, and provides insights into the strategies people use to regulate and negotiate their identities at work. 

  16. Swiss identity smells like chocolate: Social identity shapes olfactory judgments.

    Science.gov (United States)

    Coppin, Géraldine; Pool, Eva; Delplanque, Sylvain; Oud, Bastiaan; Margot, Christian; Sander, David; Van Bavel, Jay J

    2016-10-11

    There is extensive evidence that social identities can shape people's attitudes and behavior, but what about sensory judgments? We examined the possibility that social identity concerns may also shape the judgment of non-social properties-namely, olfactory judgment. In two experiments, we presented Swiss and non-Swiss participants with the odor of chocolate, for which Switzerland is world-famous, and a control odor (popcorn). Swiss participants primed with Swiss identity reported the odor of chocolate (but not popcorn) as more intense than non-Swiss participants (Experiments 1 and 2) and than Swiss participants primed with individual identity or not primed (Experiment 2). The self-reported intensity of chocolate smell tended to increase as identity accessibility increased-but only among Swiss participants (Experiment 1). These results suggest that identity priming can counter-act classic sensory habituation effects, allowing identity-relevant smells to maintain their intensity after repeated presentations. This suggests that social identity dynamically influences sensory judgment. We discuss the potential implications for models of social identity and chemosensory perception.

  17. Playing with social identities

    DEFF Research Database (Denmark)

    Winther-Lindqvist, Ditte Alexandra

    2013-01-01

    as pretence, children’s play is understood as an activity involving rules of the social order (roles and positions) as well as identification processes (imagined situations). The theoretical argumentation builds on empirical examples obtained in two different Danish day-care centres. The chapter is informed...... by ethnographic observations and draws on illustrative examples with symbolic group play as well as game-play with rules (soccer) among 5 year old boys. Findings suggest that day-care children’s play, involves negotiation of roles, positioning and identification, and rules – and that these negotiations...... are intrinsically concerned with processes of social identities, both those that are anchored in the social reality as well as those anticipated and imagined...

  18. Identities at Odds

    DEFF Research Database (Denmark)

    Hazel, Spencer

    2015-01-01

    This study offers an interaction analytic account of how linguistic identities in internationalized workplaces in Denmark are indexed against members’ institutional positions in particular interactional settings. Where language policy may not be explicitly articulated between members, it is still...... embedded in how participants micro-manage their interactions, and implicit in how member’s display orientations to deviance, in the case of encountering others in the workplace whose language repertoires or preferences do not meet with expectation pertaining to the institutional position they hold....... The study uses recordings of naturally occurring interaction in different international workplace settings, and argues for greater attention to be paid to the actual language-policy practices in international workplace settings, as a entry point into developing a more nuanced understanding of the practices...

  19. Law and Identity

    DEFF Research Database (Denmark)

    Schmidt, Garbi

    2011-01-01

    In Denmark, the practice of transnational arranged marriages among immigrants has stirred debate on several levels of society. One effect of the debate is a tightened regulation of family formation migration, seen as an effective means both of limiting the number of immigrants and of furthering...... processes of social integration. Within media-based and political debates, transnational marriages are frequently described as practices destructive both to individual freedom and to Danish national identity. Nonetheless, it is a practice in which both minority and majority citizens engage, one that frames...... both their family lives and their lives as citizens. This article analyses the dynamic relationship between public discourse and practices of transnational marriage. The first part describes how political and legislative perceptions of transnational (arranged) marriages are situated within a discussion...

  20. Biometrics and Identity Management

    DEFF Research Database (Denmark)

    management. BIOID 2008. The papers are categorized in four classes. These classes represent the 4 working groups of the COST Action 2101. For more information, see http://www.cost2101.org/.   Biometric data quality and multimodal biometric templates, Unsupervised interactive interfaces for multimodal......A key driving factor for biometrics is the widespread national and international deployment of biometric systems that has been initiated in the past two years and is about to accelerate. While nearly all current biometric deployments are government-led and principally concerned with national...... security and border control scenarios it is now apparent that the widespread availability of biometrics in everyday life will also spin out an ever increasing number of (private) applications in other domains. Crucial to this vision is the management of the user's identity, which does not only imply...

  1. Identities in Conflict

    DEFF Research Database (Denmark)

    Clausen, Lars

    2015-01-01

    the national public school system. The main hypothesis is, that parts of the dysfunction stems from the national lack of semantics and competence to understand and discuss experience with warzone extremes, children and spouses of Danish Soldiers and Veterans miss the language to talk and be silent. I propose...... 'inbetween'. In public education, those Soldier-kids often show abnormal behaviour and dysfunctional social integration and mental regulation. Health Care Systems and social workers turn to diagnoses of secondary traumatization, attachment disorder and develop therapies to calm the effects of exposure to War......, that systems theory is both able and competent to analyze the missing gaps and empty spaces of the competing identities inside and outside the forms of peace and war. Through the use of Luhmannian systems theory and form analysis, the children and partners of war veterans give us the chance to observe...

  2. Creation, Identity and Reflection

    Directory of Open Access Journals (Sweden)

    Alina Beatrice Cheşcă

    2015-05-01

    Full Text Available The paper “Creation, Identity and Reflection” approaches the identification in the “mirror” of reality with creation, in other words seeking the authors’ identity in the reflected images. Reflection means attempting to find oneself, the mirror being the main principle of creation. Many characters become interesting only when they step into the world beyond the mirror, when their faces are doubled by the other self or when their selves are returned by other characters. The narcissistic concept of the mirror, i.e. the reflection in the mirror and the representation of the mirror itself, is a recurrent one in literature, but the reflection of the self which is not the self (as it is a reflection does not necessarily appear in a mirror or in a photograph or portrait. Sometimes, the not-self is returned to the self by another person or character. As far as Oscar Wilde’s theories are concerned, the main idea is that people are interesting for their masks, not for their inner nature. What Wilde calls “inner nature” is the characters’ un-reflected self and the mask is the reflection, the self in the mirror. Some characters’ relationships develop within a fiction that they dramatically try to preserve and protect with the risk of suffering. They refuse to take off the masks which define them in the others’ minds and hearts; the narcissistic individuals (both artists and characters seek and love their own image which they project upon facts, thus creating a fictive realm.

  3. Distributed acoustic cues for caller identity in macaque vocalization.

    Science.gov (United States)

    Fukushima, Makoto; Doyle, Alex M; Mullarkey, Matthew P; Mishkin, Mortimer; Averbeck, Bruno B

    2015-12-01

    Individual primates can be identified by the sound of their voice. Macaques have demonstrated an ability to discern conspecific identity from a harmonically structured 'coo' call. Voice recognition presumably requires the integrated perception of multiple acoustic features. However, it is unclear how this is achieved, given considerable variability across utterances. Specifically, the extent to which information about caller identity is distributed across multiple features remains elusive. We examined these issues by recording and analysing a large sample of calls from eight macaques. Single acoustic features, including fundamental frequency, duration and Weiner entropy, were informative but unreliable for the statistical classification of caller identity. A combination of multiple features, however, allowed for highly accurate caller identification. A regularized classifier that learned to identify callers from the modulation power spectrum of calls found that specific regions of spectral-temporal modulation were informative for caller identification. These ranges are related to acoustic features such as the call's fundamental frequency and FM sweep direction. We further found that the low-frequency spectrotemporal modulation component contained an indexical cue of the caller body size. Thus, cues for caller identity are distributed across identifiable spectrotemporal components corresponding to laryngeal and supralaryngeal components of vocalizations, and the integration of those cues can enable highly reliable caller identification. Our results demonstrate a clear acoustic basis by which individual macaque vocalizations can be recognized.

  4. Perancangan Corporate Identity Brotherwood Decoration

    OpenAIRE

    Ciputra, Ongky Permana; Bangsa, Petrus Gogor; Christianna, Aniendya

    2015-01-01

    Sebagai Perusahaan interior di Surabaya, “BROTHERWOOD” sedang membangun citra positif melalui penguatan corporate identity secara menyeluruh.Oleh karena itu “Brotherwood” memerlukan corporate identity dan mengaplikasikannya pada media promosi dan informasi yang sesuai dengan karakter dari target audience dan target market-nya.Dengan menggunakan corporate identity diharapkan “Brotherwood” menjadi lebih dikenal oleh target audience dan target market-nya sehingga membuat market “Brotherwood” men...

  5. Analysis and Adjustment of Vertebral Subluxation as a Separate and Distinct Identity for the Chiropractic Profession: A Commentary.

    Science.gov (United States)

    Hart, John

    2016-12-01

    The purpose of this paper is to discuss various statements related to chiropractic identity from1 D. D. Palmer2; selected chiropractic organizations, associations, and colleges; and3 attitudes and perceptions of chiropractic from chiropractic students, practitioners, and patients. For comparison purposes, identity statements and perceptions from the various chiropractic associations and colleges, as well as from students and patients, were explored. Identity statements for chiropractic were searched in various sources such as Palmer's 1910 textbook, recent literature on viewpoints from chiropractic students and practitioners, and websites for chiropractic colleges and organizations. Palmer taught that the chiropractor's focus was on vertebral subluxation. Today, a number of chiropractic colleges and organizations continue to include the vertebral subluxation model in their instruction, with a majority of students and practitioners subscribing to the model. Conversely, a number of other colleges and organizations portray chiropractic as being essentially about the treatment of back and neck pain, which is what patients associate with chiropractic. However, settling on any particular identity for the chiropractic profession will likely be met with resistance by some, given the plethora of opinions among chiropractic professionals as to what the identity of the chiropractic profession should be. Common ground between the different factions within the chiropractic profession might be found in a unifying expression such as "functional neurology." When a profession's identity is not clear with respect to its area of interest and mission, then the public may be less inclined to seek its services. Identifying the chiropractic profession with a focus on vertebral subluxation would give the profession uniqueness not duplicated by other health care professions and, therefore, might legitimatize the existence of chiropractic as a health care profession. An identity having a

  6. An 'open source' networked identity

    DEFF Research Database (Denmark)

    Larsen, Malene Charlotte

    2016-01-01

    This chapter examines the concept of identity in relation to youth practices on social network sites (SNSs). The chapter illustrates how writing “I love you” or other emotional statements on each other’s profiles on SNSs is not only a common way for Danish teenagers to communicate and practice...... their emotional communicative actions – are not only staging their own identity, but are co-constructors of each other’s identities, which the author characterises as an “open source”, networked identity....

  7. Prevention for HIV-Seropositive Persons: Successive Approximation Toward a New Identity

    Science.gov (United States)

    Lightfoot, Marguerita; Rotheram-Borus, Mary Jane; Milburn, Norweeta G.; Swendeman, Dallas

    2005-01-01

    This article presents a three-module intervention based on social action theory that focuses on health promotion and social identity formation for seropositive youth. The modules are designed to reduce transmission of HIV by reducing sexual and substance abuse acts, increasing healthy acts and adherence to care, and maintaining positive behavioral…

  8. Identity Support, Identity Devaluation, and Well-Being among Lesbians

    Science.gov (United States)

    Beals, Kristin P.; Peplau, Letitia Anne

    2005-01-01

    This research tested predictions about the association of identity support and identity devaluation with psychological well-being (self-esteem, life satisfaction, and depression). Lesbian women completed baseline surveys (N=42), then provided daily experience reports during a 2-week period (n=38), and completed a 2-month follow-up survey (n=34).…

  9. Threading "Stitches" to Approach Gender Identity, Sexual Identity, and Difference

    Science.gov (United States)

    North, Connie E.

    2010-01-01

    As LGBTQI (lesbian, gay, bisexual, transgender, queer/questioning, and intersex) issues become increasingly integrated into multicultural education discourses, we as educators need to examine the implications of our pedagogies for teaching about gender and sexual identities. This article explores my teaching of non-conforming gender identities in…

  10. Social Identity Change: Shifts in Social Identity during Adolescence

    Science.gov (United States)

    Tanti, Chris; Stukas, Arthur A.; Halloran, Michael J.; Foddy, Margaret

    2011-01-01

    This study investigated the proposition that adolescence involves significant shifts in social identity as a function of changes in social context and cognitive style. Using an experimental design, we primed either peer or gender identity with a sample of 380 early- (12-13 years), mid- (15-16 years), and late-adolescents (18-20 years) and then…

  11. Men as Victims: "Victim" Identities, Gay Identities, and Masculinities

    Science.gov (United States)

    Dunn, Peter

    2012-01-01

    The impact and meanings of homophobic violence on gay men's identities are explored with a particular focus on their identities as men and as gay men. Homosexuality can pose a challenge to conventional masculinities, and for some gay men, being victimized on account of sexual orientation reawakens conflicts about their masculinity that they…

  12. Teacher Investment in Learner Identity

    Science.gov (United States)

    Reeves, Jenelle

    2009-01-01

    From a sociocultural perspective, teacher identity is constructed in relation to others, including other teachers and students. Drawing on positioning theory and the concept of investment, this study analyzed the case of a secondary English teacher who negotiated his teacher identity in relation to English language learners (ELLs). Findings…

  13. The Identity Factor in Multiculturalism.

    Science.gov (United States)

    Crenshaw, Kimberle

    1995-01-01

    It is argued that the O. J. Simpson murder trial reflects impoverished discourse in America about social identity and power, particularly relating to race, gender, and class. The debate over the relevance and centrality of identity divides American society deeply because it is at the heart of the discrepancy between what America wants to be and…

  14. Identity development in deaf adolescents

    NARCIS (Netherlands)

    Kunnen, E. Saskia

    2014-01-01

    We studied identity development during 5 years in 11 deaf adolescents who attend a school for deaf children in the highest level of regular secondary education (age between 14 and 19 years). Identity development is conceptualized by the processes of exploration and commitment formation, as

  15. Gender identity development in adolescence

    NARCIS (Netherlands)

    Steensma, T.D.; Kreukels, B.P.C.; de Vries, A.L.C.; Cohen-Kettenis, P.T.

    2013-01-01

    This article is part of a Special Issue "Puberty and Adolescence".This article aims to provide an outline of what is currently known on trajectories, and contributing factors to gender identity development in adolescence. We give a historical overview of the concept of gender identity, and describe

  16. Food, Identity, and Environmental Education

    Science.gov (United States)

    Stapleton, Sarah Riggs

    2015-01-01

    While food is an exceedingly rich area for environmental education, I caution environmental educators and researchers from moving too quickly into messaging about what people "should" eat, given the many complexities around food and identity. Eating, as an inherently identity-laden practice, is fraught with complicated meanings,…

  17. Gender identity development in adolescence.

    Science.gov (United States)

    Steensma, Thomas D; Kreukels, Baudewijntje P C; de Vries, Annelou L C; Cohen-Kettenis, Peggy T

    2013-07-01

    This article is part of a Special Issue "Puberty and Adolescence".This article aims to provide an outline of what is currently known on trajectories, and contributing factors to gender identity development in adolescence. We give a historical overview of the concept of gender identity, and describe general identity development in adolescence, gender identity development in the general population and in gender variant youth. Possible psychosocial (such as child and parental characteristics) and biological factors (such as the effects of prenatal exposure to gonadal hormones and the role of genetics) contributing to a gender variant identity are discussed. Studies focusing on a number of psychosocial and biological factors separately, indicate that each of these factors influence gender identity formation, but little is known about the complex interplay between the factors, nor about the way individuals themselves contribute to the process. Research into normative and gender variant identity development of adolescents is clearly lagging behind. However, studies on persons with gender dysphoria and disorders of sex development, show that the period of adolescence, with its changing social environment and the onset of physical puberty, seems to be crucial for the development of a non-normative gender identity. Copyright © 2013 Elsevier Inc. All rights reserved.

  18. Identity Research in Mathematics Education

    Science.gov (United States)

    Darragh, Lisa

    2016-01-01

    This paper examines the literature on identity within mathematics education published in journals over the past two decades. It analyses the theoretical underpinnings, research methods and definitions of identity, providing a critique rather than a summary of the literature. A total of 188 articles from 85 different journals are reviewed in the…

  19. The Joint Accomplishment of Identity

    Science.gov (United States)

    Hand, Victoria; Gresalfi, Melissa

    2015-01-01

    Identity has become a central concept in the analysis of learning from social perspectives. In this article, we draw on a situative perspective to conceptualize identity as a "joint accomplishment" between individuals and their interactions with norms, practices, cultural tools, relationships, and institutional and cultural contexts.…

  20. Black Youth, Identity, and Ethics

    Science.gov (United States)

    Duncan, Garrett Albert

    2005-01-01

    This article examines stage models of racial identity that researchers and educators use to explain the subjective processes that influence how black youth navigate school. Despite the explicit challenge that most models of racial identity have posed to racist discourses in the research literature, the underlying ethics of their developmental…

  1. Social Identity and Group Contests

    NARCIS (Netherlands)

    Zaunbrecher, Henrik; Riedl, Arno

    2016-01-01

    Social identity has been shown to successfully enhance cooperation and effort in cooperation and coordination games. Little is known about the causal effect of social identity on the propensity to engage in group conflict. In this paper we explore theoretically and experimentally whether social

  2. Generalized Cherednik-Macdonald identities

    NARCIS (Netherlands)

    Stokman, J.V.

    2008-01-01

    We derive generalizations of the Cherednik-Macdonald constant term identities associated to root systems which depend, besides on the usual Multiplicity function, symmetrically on two additional parameters omega +/-. They are natural analogues of the Cherednik-Macdonald constant term q-identities in

  3. Relationship between Values and Religious Identity in Buddhist Adolescents

    Directory of Open Access Journals (Sweden)

    Shorokhova V.A.,

    2016-04-01

    Full Text Available The paper describes results of a social psychological study on religious identity in Buddhist schoolchil- dren. The study involved 184 students of 9—10 classes of a school in the Aginskoye settlement (Aginsky Buryatsky Okrug, Zabaykalsky Krai. According to G. Allport’s concept and R. Gorsuch & S. McPherson measurements, religious identity is considered not only as practicing Buddhism, but as a complex social psychological formation with a four-factor structure base on the following scales: personal/social and in- trinsic/extrinsic. Different components of religious identity are explored in the context of their relation- ship with value orientations (as described by S. Schwartz and G. Hofstede. The following techniques were employed: the adapted version of D. Van Camp’s Individual/Social Religious Identity Measure, Schwartz’s Portrait Values Questionnaire (PVQ-R2, and Hofstede’s Values Survey Module. As it was revealed, al- most all values related to various components of religious identity of the Buddhist adolescents refer to the social focus. The paper concludes that religious identity in modern Buddhist young people has a distinctive social character.

  4. STORYTELLING AND UNIVERSITY BRANDING IDENTITY

    Directory of Open Access Journals (Sweden)

    ANDREEA MONICA STATE

    2016-08-01

    Full Text Available The present article sets out to clarify the concepts of storytelling and branding, with a focus on university branding and visual identity – the latter being a vital element to a brand’s uniqueness. Storytelling is an important method of brand construction, and it entails a strong power of seduction. Branding is increasingly more about storytelling. Practically, a story is an image made up of facts, feelings and interpretations, which are often told to us solely by the university itself. As such, the brand appears on the market accompanied by its identity. Identity is what we aim to express with help of the brand. Implementing a system of visual identity that would help to harmoniously develop a university brand requires a handbook of visual identity. The present article aims to be a starting point for such a handbook serving the University of Bucharest, which currently does not own such a handbook

  5. Identity change and informed consent

    Science.gov (United States)

    Witt, Karsten

    2017-01-01

    In this paper, I focus on a kind of medical intervention that is at the same time fascinating and disturbing: identity-changing interventions. My guiding question is how such interventions can be ethically justified within the bounds of contemporary bioethical mainstream that places great weight on the patient's informed consent. The answer that is standardly given today is that patients should be informed about the identity effects, thus suggesting that changes in identity can be treated like ‘normal’ side effects. In the paper, I argue that this approach is seriously lacking because it misses important complexities going along with decisions involving identity changes and consequently runs into mistakes. As a remedy I propose a new approach, the ‘perspective-sensitive account’, which avoids these mistakes and thus provides the conceptual resources to systematically reflect on and give a valid consent to identity-changing interventions. PMID:28320773

  6. Social identities and shared realities.

    Science.gov (United States)

    Hogg, Michael A; Rinella, Mark J

    2017-11-04

    People are fundamentally motivated to establish a shared reality with others to validate their identity and experiences. Guided by social identity theory, we examine how social identity processes, such as self-categorization and depersonalization, create a shared identity and a sense of shared reality. Research demonstrates that internal states such as attitudes, feelings, and emotions are often shared among members of a group. Furthermore, research has shown that self-uncertainty motivates people to establish shared realities through group identification, often with highly entitative groups that are associated with a self-saturating reality that is shared absolutely. Finally, we review research on how group-defining norms that serve as the bases of these identity-related shared realities are constructed and communicated through group-membership based influence. Copyright © 2017 Elsevier Ltd. All rights reserved.

  7. Monetary Organization and National Identity

    DEFF Research Database (Denmark)

    Ravn Sørensen, Anders

    2016-01-01

    This article develops a detailed overview of literature on the relationship between monetary organization, understood as currencies and central banks, and issues of national identity and nationalism. It demonstrates how the literature on this subject for the past 20 years has developed into a dis......This article develops a detailed overview of literature on the relationship between monetary organization, understood as currencies and central banks, and issues of national identity and nationalism. It demonstrates how the literature on this subject for the past 20 years has developed...... organization to an emphasis on how collective identities legitimize monetary organization. Based on the literature review, the article points to two underdeveloped themes for future research to investigate: (1) further studies on the interrelation between the legitimacy of monetary organization and national...... identity, (2) an increased focus on central banks and monetary authorities, as well as the historical development in which monetary organization evolved in concert with ideas of the national identity and nationalism....

  8. Ethnic Identities of University Students

    Directory of Open Access Journals (Sweden)

    Gözde Özdikmenli-Demir

    2014-06-01

    Full Text Available The aim of this article is to understand the relationship between ethnic identity, victimization/witnessing community violence, ethnic discrimination, and aggression in a sample of university students living in the South East Region of Turkey. The participants were 263 university students of predominantly Kurdish ethnic origin. The results showed that males had higher levels of ethnic identity in the dimensions of exploration and commitment. Males also presented higher scores for witnessing community violence and lifetime exposure to ethnic discrimination. The most important predictor of participants’ ethnic identity was witnessing community violence. Participants who witnessed violent acts in their social environment had higher ethnic identity levels. Although the predictor variables could not explain an important part of the participants’ aggression levels, only perceived ethnic discrimination was positively related to aggressive behavior. The role of native language efficiency in ethnic identity is also discussed.

  9. Gender identity disorder.

    LENUS (Irish Health Repository)

    De Gascun, C

    2006-05-01

    Gender Identity Disorder (GID) is a relatively rare condition of atypical gender development in which there is a psychological perception of self as masculine or feminine which is incongruent with ones phenotype. GID replaced the term Transsexualism in DSM-IV in 1994. The demographics of GID in Ireland have not been established. Since 2000 we have received 52 referrals of individuals with confirmed GID to our endocrine service for consideration for hormonal treatment (HT). Of the 52 patients 45 have male to female (MTF) GID (mean age 38.9 years) and 7 have female to male (FTM) GID (mean age 30.7 years). The age at presentation in this group is approximately 9 years older than in international series for both MTF (39 years v 30yrs) and FTM (31 yrs v 22yrs). The karyotype where analysed has been normal for their phenotypic sex. Twenty-three of the patients had received HT prior to attending our clinic that in only one case had been prescribed by a specialist. A number of patients had obtained HT via the internet or from overseas sources without medical review. Eighteen of the patients have been or are married and 14 of the group have children. The scale of referrals confirms that GID exists in the Irish population to a significant degree. Thus an appropriate care pathway for people with the condition needs to be established. This will facilitate optimum medical management of the patient group and a coherent approach to the many difficult social issues faced individuals with this disorder.

  10. Opposite brain emotion-regulation patterns in identity states of dissociative identity disorder: a PET study and neurobiological model.

    Science.gov (United States)

    Reinders, Antje A T S; Willemsen, Antoon T M; den Boer, Johan A; Vos, Herry P J; Veltman, Dick J; Loewenstein, Richard J

    2014-09-30

    Imaging studies in posttraumatic stress disorder (PTSD) have shown differing neural network patterns between hypo-aroused/dissociative and hyper-aroused subtypes. Since dissociative identity disorder (DID) involves different emotional states, this study tests whether DID fits aspects of the differing brain-activation patterns in PTSD. While brain activation was monitored using positron emission tomography, DID individuals (n=11) and matched DID-simulating healthy controls (n=16) underwent an autobiographic script-driven imagery paradigm in a hypo-aroused and a hyper-aroused identity state. Results were consistent with those previously found in the two PTSD subtypes for the rostral/dorsal anterior cingulate, the prefrontal cortex, and the amygdala and insula, respectively. Furthermore, the dissociative identity state uniquely activated the posterior association areas and the parahippocampal gyri, whereas the hyper-aroused identity state uniquely activated the caudate nucleus. Therefore, we proposed an extended PTSD-based neurobiological model for emotion modulation in DID: the hypo-aroused identity state activates the prefrontal cortex, cingulate, posterior association areas and parahippocampal gyri, thereby overmodulating emotion regulation; the hyper-aroused identity state activates the amygdala and insula as well as the dorsal striatum, thereby undermodulating emotion regulation. This confirms the notion that DID is related to PTSD as hypo-aroused and hyper-arousal states in DID and PTSD are similar. Copyright © 2014 Elsevier Ireland Ltd. All rights reserved.

  11. Identity and Intimacy during Adolescence: Connections among Identity Styles, Romantic Attachment and Identity Commitment

    Science.gov (United States)

    Kerpelman, Jennifer L.; Pittman, Joe F.; Cadely, Hans Saint-Eloi; Tuggle, Felicia J.; Harrell-Levy, Marinda K.; Adler-Baeder, Francesca M.

    2012-01-01

    Integration of adult attachment and psychosocial development theories suggests that adolescence is a time when capacities for romantic intimacy and identity formation are co-evolving. The current study addressed direct, indirect and moderated associations among identity and romantic attachment constructs with a diverse sample of 2178 middle…

  12. Contested identities: Identity constructions in a youth recreational drug culture

    DEFF Research Database (Denmark)

    Ravn, Signe

    2012-01-01

    as responsible drug users. The article studies this recreational drug culture and its internal distinctions, conceptions and norms as they are expressed discursively. The analysis identifies six dimensions of the identity as a responsible, recreational drug user: drug practice, general drug knowledge, context......This article examines young recreational drug users’ identity constructions. Combining a poststructuralist theoretical framework with focus group method, the article investigates how the participants in a focus group interview position themselves and others, thereby negotiating an identity......-specific drug knowledge, practices for checking drugs, acknowledging one’s position in the surrounding drug scene and age. The analysis shows how being able to perform a coherent identity in line with these dimensions is necessary for being acknowledged as a responsible, recreational drug user....

  13. Perancangan Corporate Identity Astro Rent Car Surabaya

    OpenAIRE

    Gunardi, Yohanes Calvin; Negara, I Nengah Sudika; Aryanto, Hendro

    2017-01-01

    Corporate Identity merupakan hal yang krusial dalam perkembangan sebuah Perusahaan dalam segi internal maupun eksternal. Dalam membuat perancangan Corporate identity yang efektif, perancangan ini menampilkan segala teori dan ilmu yang berhubungan dengan Corporate identity. Dengan adanya perancangan ini diharapkan para pembaca mengerti betapa pentingnya peran sebuah corporate identity yang tepat dan mengena.Kata kunci: corporate identity, Astro, logo.

  14. Looking for Daisy: Constructing Teacher Identities

    Science.gov (United States)

    Ritchie, Stephen M.

    2009-01-01

    Research on teacher identities is both important and increasing. In this forum contribution I re-interpret assertions about an African American science teacher's identities in terms of Jonathon Turner's ("2002") constructs of role identity and sub-identity. I contest the notion of renegotiation of identities, suggesting that particular role…

  15. Identity In and Around Organisations

    DEFF Research Database (Denmark)

    Schultz, Majken; Maguire, Steve

    2013-01-01

    concept may not be the best way of approaching and managing your organisation. Rather, Majken Schultz and Steve Maguire argue that organisations would benefit from adopting a process-based view of identity, which integrates history, ongoing change and market instability into its definition.......At the heart of any successful organisation lies a powerful conception of identity: the coherent way in which it presents itself to its stakeholders and employees, containing its purpose, goals and key characteristics. However, the traditional idea of identity as a stable, solid and reliable...

  16. Persons : their identity and individuation

    OpenAIRE

    Melin, Roger

    1998-01-01

    This study is about the nature of persons and personal identity. It belongs to a tradition that maintains that in order to understand what it is to be a person we must clarify what personal identity consists in. In this pursuit, I differentiate between the problems (i) How do persons persist? and (ii) What facts, if any, does personal identity consist in? Concerning the first question, I argue that persons persist three-dimensionally (the endurance view), and not four-dimensionally (the perdu...

  17. From identity to organisation identity: The evolution of a concept

    Directory of Open Access Journals (Sweden)

    C. L. Van Tonder

    2003-10-01

    Full Text Available The view that corporate and/or organisation identity is a contributing factor to organisational success, is increasingly observed in the media. At the same time research interest in the concept appears to be on the increase. While identity is not a novel concept and has presented in different forms, it remains shrouded in ambiguity and is in need of more precise articulation. The present study revisited the origins of the identity concept and reviewed various perspectives on identity. A specific meaning structure and theoretical framework for the organization identity concept is proposed and it is concluded that contemporary views of identity are increasingly embracing earlier psychological perspectives. Opsomming Die siening dat korporatiewe en/of organisasie-identiteit ’n bydraende faktor tot organisasiesukses is, word toenemend in die media waargeneem. Navorsingsbelangstelling in die konsep skyn terselfdertyd toe te neem. Terwyl identiteit geensins ’n nuwe konsep is nie en in verskillende vorme voorkom, bly dit in vaagheid gehul en word ’n meer duidelike omskrywing daarvan benodig. Die huidige studie het die oorsprong van die indentiteitskonsep nagespeur en verskeie perspektiewe op identiteit in oënskou geneem. ’n Bepaalde betekenisstruktuur en teoretiese raamwerk word vir die identiteitskonsep voorgestel en die gevolgtrekking word gemaak dat kontemporêre sienings van identiteit toenemend besig is om vroeëre psigologiese perspektiewe te omsluit.

  18. Thermionic modules

    Science.gov (United States)

    King, Donald B.; Sadwick, Laurence P.; Wernsman, Bernard R.

    2002-06-18

    Modules of assembled microminiature thermionic converters (MTCs) having high energy-conversion efficiencies and variable operating temperatures manufactured using MEMS manufacturing techniques including chemical vapor deposition. The MTCs incorporate cathode to anode spacing of about 1 micron or less and use cathode and anode materials having work functions ranging from about 1 eV to about 3 eV. The MTCs also exhibit maximum efficiencies of just under 30%, and thousands of the devices and modules can be fabricated at modest costs.

  19. Identity styles, dimensions, statuses, and functions : Making connections among identity conceptualizations

    NARCIS (Netherlands)

    Crocetti, E.; Sica, L.S.; Schwarz, S.J.; Serafini, T.; Meeus, W.H.J.

    2013-01-01

    Introduction Identity styles (Berzonsky, 1989), identity dimensions and statuses (Marcia, 1966; Crocetti, Rubini, Luyckx, & Meeus, 2008), and identity functions (Adams & Marshall, 1996) represent important identity conceptualizations. However, the interrelationships among these constructs are not

  20. Trainer module for security control center operations

    Energy Technology Data Exchange (ETDEWEB)

    Bernard, E.A.

    1982-01-01

    An operator trainer module has been developed to be used with the security control center equipment to be installed as part of a safeguards physical protection system. The module is designed to provide improved training and testing capabilities for control center operators through the use of simulations for perimeter equipment operations. Operators, through the trainer module, can be challenged with a variety of realistic situations which require responsive action identical to that needed in an actual system. This permits a consistent evaluation and confirmation of operator capabilities prior to assignment as an operator and allows for periodic retesting to verify that adequate performance levels are maintained.

  1. Dual Identity in Interethnic Context

    Directory of Open Access Journals (Sweden)

    Barbara Sólyom

    2014-05-01

    Full Text Available The field of social psychology, over the past few years, has created a new term to describe threats to collective identity called social identity threat. This study sets out to present how social identity threat may arise between different ethnic groups, describes its conditions and determining factors, possible responses and forms of reaction to such dangers; furthermore, it also covers factors which decide what self-defense strategy one may choose. Finally, the possible outcomes and consequences are examined. The article discusses the phenomenon of social identity threat using empirics of theoretical and international research applied to the coexistence of ethnic Germans and Hungarians in a village in Hungary. Exploring the life of the settlement is part of a broader empirical research.

  2. CULTURAL IDENTITY IN BILINGUAL SCHOOLS

    National Research Council Canada - National Science Library

    Katia Ester Pretelt Montero

    2016-01-01

      The present research study sought to analyze if the daily and systematic teaching of a foreign culture within the context of a bilingual school in Barranquilla constituted a risk factor for mainstream cultural identity...

  3. On Identities in Modern Networks

    Directory of Open Access Journals (Sweden)

    Libor Polcak

    2014-09-01

    Full Text Available Communicating parties inside computer networks use different kind of identifiers. Some of these identifiers are stable, e.g., logins used to access a specific service, some are only temporary, e.g., dynamically assigned IP addresses. This paper tackles several challenges of lawful interception that emerged in modern networks. The main contribution is the graph model that links identities learnt from various sources distributed in a network. The inferred identities result into an interception of more detailed data in conformance with the issued court order. The approach deals with network address translation, short-lived identifiers and simultaneous usage of different identities. The approach was evaluated to be viable during real network testing based on various means to learn identities of users connected to a network.

  4. Some Remarkable Identities Involving Numbers

    Directory of Open Access Journals (Sweden)

    Ziobro Rafał

    2014-09-01

    Full Text Available The article focuses on simple identities found for binomials, their divisibility, and basic inequalities. A general formula allowing factorization of the sum of like powers is introduced and used to prove elementary theorems for natural numbers.

  5. Unhealthy Paradoxes of Healthy Identities

    NARCIS (Netherlands)

    S.J. Magala (Slawomir)

    2003-01-01

    textabstractComparative cross-cultural studies and identity research in social psychology focused on national and organizational differences, clashes and dimensions (Hofstede, Barsoux & Schneider, Jackson, Ward, Bochner & Furnham, Capoza & Brown). Mapping cultural software of individuals and

  6. Unskilled Work and Learner Identity

    DEFF Research Database (Denmark)

    Kondrup, Sissel

    2014-01-01

    The paper examines how unskilled work forms conditions for meeting the obligation to position oneself as an educable subject and engage in formal learning activities. Sensitivity to peoples’ work-life-experiences is necessary to understand their orientation toward different learning activities...... a critical theoretical approach inspired by Salling-Olesen’s and Archer’s concepts of identity and concerns can contribute to an understanding of the relationship between work and learner identity. Through narrative work-life interviews I examine how engagement in unskilled work in small and medium sized....... The main argument is that participation research must abandon the notion of motivation as an individual attribute and apply a dialectic concept of learner identity acknowledging work-life as a pivotal space for learning and formation of identity. I outline how a work-life-historical approach combining...

  7. Unskilled Work and Learner Identity

    DEFF Research Database (Denmark)

    Kondrup, Sissel

    The paper examines how unskilled work forms conditions for meeting the obligation to position oneself as an educable subject and engage in formal learning activities. Sensitivity to peoples’ work-life-experiences is necessary to understand their orientation toward different learning activities...... a critical theoretical approach inspired by Salling- Olesen’s and Archer’s concepts of identity and concerns can contribute to an understanding of the relationship between work and learner identity. Through narrative work-life interviews I examine how engagement in unskilled work in small and medium sized....... The main argument is that participation research must abandon the notion of motivation as an individual attribute and apply a dialectic concept of learner identity acknowledging work-life as a pivotal space for learning and formation of identity. I outline how a work-life-historical approach combining...

  8. Identity, Diversity and Diversity Management

    DEFF Research Database (Denmark)

    Holck, Lotte; Muhr, Sara Louise; Villeseche, Florence

    2016-01-01

    The purpose of this paper is to examine the relationship between the identity and diversity literatures and discuss how a better understanding of the theoretical connections between the two informs both diversity research and diversity management practices. Design/methodology/approach – Literature...... review followed by a discussion of the theoretical and practical consequences of connecting the identity and diversity literatures. Findings – The authors inform future research in three ways. First, by showing how definitions of identity influence diversity theorizing in specific ways. Second...... and limitations – is crucial for successful diversity management research and practice. Research limitations/implications – The authors argue for a better understanding of differences, overlaps and limits of different identity perspectives, and for a stronger engagement with practice. Practical implications...

  9. Science Identity in Informal Education

    Science.gov (United States)

    Schon, Jennifer A.

    The national drive to increase the number of students pursuing Science Technology, Engineering, and Math (STEM) careers has brought science identity into focus for educators, with the need to determine what encourages students to pursue and persist in STEM careers. Science identity, the degree to which students think someone like them could be a scientist is a potential indicator of students pursuing and persisting in STEM related fields. Science identity, as defined by Carlone and Johnson (2007) consists of three constructs: competence, performance, and recognition. Students need to feel like they are good at science, can perform it well, and that others recognize them for these achievements in order to develop a science identity. These constructs can be bolstered by student visitation to informal education centers. Informal education centers, such as outdoor science schools, museums, and various learning centers can have a positive impact on how students view themselves as scientists by exposing them to novel and unique learning opportunities unavailable in their school. Specifically, the University of Idaho's McCall Outdoor Science School (MOSS) focuses on providing K-12 students with the opportunity to learn about science with a place-based, hands-on, inquiry-based curriculum that hopes to foster science identity development. To understand the constructs that lead to science identity formation and the impact the MOSS program has on science identity development, several questions were explored examining how students define the constructs and if the MOSS program impacted how they rate themselves within each construct. A mixed-method research approach was used consisting of focus group interviews with students and pre, post, one-month posttests for visiting students to look at change in science identity over time. Results from confirmatory factor analysis indicate that the instrument created is a good fit for examining science identity and the associated

  10. The processes of identity integration

    Directory of Open Access Journals (Sweden)

    Đurić Jelena

    2009-01-01

    Full Text Available Despite inevitable elusiveness of its meanings, explication of the persisting issues of identity remains the challenge for contemporary humans. Inability to achieve full insight into its complexity points to the need to corelate basic ideas as the essential way of self-cognition and self-awareness, which represent the meaning, value and the purpose of humanity. The development of global processes can, in the same spirit, be viewed as a contribution to the conscious transformation and integration of identities.

  11. Corporate Visual Identity Systems origin

    OpenAIRE

    Raposo, D.

    2009-01-01

    Este artigo trata de fazer um pequeno recorrido histórico sobre como a marca se converteu nos sistemas de identidade visual corporativa. Alguns dos principais projectos de identidade ajudam a entender quais as motivações que originaram a necessidade de organização dos sistemas de identidade. Abstract: This paper is a short path about how brands became Corporate Visual Identity Systems. Some of the biggest and emblematic corporate identity projects are helpful to understand which moti...

  12. On Identities in Modern Networks

    OpenAIRE

    Libor Polcak; Radek Hranicky; Tomas Martinek

    2014-01-01

    Communicating parties inside computer networks use different kind of identifiers. Some of these identifiers are stable, e.g., logins used to access a specific service, some are only temporary, e.g., dynamically assigned IP addresses. This paper tackles several challenges of lawful interception that emerged in modern networks. The main contribution is the graph model that links identities learnt from various sources distributed in a network. The inferred identities result into an interception ...

  13. Conflicted Pasts and National Identities

    DEFF Research Database (Denmark)

    With reference to current theories of cultural memory, the book explores how memories of war and conflict are passed from generation to generation, how these complex processes have transformed and shaped collective identities, and how they still inform national "conversations".......With reference to current theories of cultural memory, the book explores how memories of war and conflict are passed from generation to generation, how these complex processes have transformed and shaped collective identities, and how they still inform national "conversations"....

  14. Memory Modulation

    NARCIS (Netherlands)

    Roozendaal, Benno; McGaugh, James L.

    2011-01-01

    Our memories are not all created equally strong: Some experiences are well remembered while others are remembered poorly, if at all. Research on memory modulation investigates the neurobiological processes and systems that contribute to such differences in the strength of our memories. Extensive

  15. Module descriptor

    DEFF Research Database (Denmark)

    Vincenti, Gordon; Klausen, Bodil; Kjær Jensen, Jesper

    2016-01-01

    The Module Descriptor including a Teacher’s Guide explains and describes how to work innovatively and co-creatively with wicked problems and young people. The descriptor shows how interested educators and lecturers in Europe can copy the lessons of the Erasmus+ project HIP when teaching their own...

  16. Examining the Social Context in Identity Theory

    OpenAIRE

    Carter, Michael J.

    2010-01-01

    This study advances identity theory, a prominent sociological social psychological theory, by investigating how the moral identity, moral behavior, and emotions operate in different social contexts, specifically when the moral identity is activated (or not activated) and when individuals are alone or in different types of groups. This extends identity theory by including key processes in social identity theory (identity activation and group membership) which have not been examined in the exis...

  17. The Quandary of the Identity Debate

    OpenAIRE

    Behrooz Moazami

    2017-01-01

    Concepts of identity, identity formation, identity politics, and collective identity, despite being vague, are among the most used notions in social theory, historical analysis, and everyday life and politics. In the last four or five decades “identity” has become a catchword that could explain almost any political or cultural development. In this paper, I discuss existential and social dimensions of identity and identity formation, decode the relational and historical conditions of their con...

  18. Resolving an identity crisis: Implicit drinking identity and implicit alcohol identity are related but not the same.

    Science.gov (United States)

    Ramirez, Jason J; Olin, Cecilia C; Lindgren, Kristen P

    2017-09-01

    Two variations of the Implicit Association Test (IAT), the Drinking Identity IAT and the Alcohol Identity IAT, assess implicit associations held in memory between one's identity and alcohol-related constructs. Both have been shown to predict numerous drinking outcomes, but these IATs have never been directly compared to one another. The purpose of this study was to compare these IATs and evaluate their incremental predictive validity. US undergraduate students (N=64, 50% female, mean age=21.98years) completed the Drinking Identity IAT, the Alcohol Identity IAT, an explicit measure of drinking identity, as well as measures of typical alcohol consumption and hazardous drinking. When evaluated in separate regression models that controlled for explicit drinking identity, results indicated that the Drinking Identity IAT and the Alcohol Identity IAT were significant, positive predictors of typical alcohol consumption, and that the Drinking Identity IAT, but not the Alcohol Identity IAT, was a significant predictor of hazardous drinking. When evaluated in the same regression models, the Drinking Identity IAT, but not the Alcohol Identity IAT, was significantly associated with typical and hazardous drinking. These results suggest that the Drinking Identity IAT and Alcohol Identity IAT are related but not redundant. Moreover, given that the Drinking Identity IAT, but not the Alcohol Identity IAT, incrementally predicted variance in drinking outcomes, identification with drinking behavior and social groups, as opposed to identification with alcohol itself, may be an especially strong predictor of drinking outcomes. Copyright © 2017 Elsevier Ltd. All rights reserved.

  19. Addressee Identity and Morphosyntactic Processing in Basque Allocutive Agreement

    Directory of Open Access Journals (Sweden)

    Max Wolpert

    2017-09-01

    Full Text Available Information about interlocutor identity is pragmatic in nature and has traditionally been distinguished from explicitly coded linguistic information, including mophosyntax. Study of speaker identity in language processing has questioned this distinction, but addressee identity has been less considered. We used Basque to explore how addressee identity is processed during morphosyntactic analysis. In the familiar register hika, Basque has obligatory allocutive agreement, where verbal morphology represents the gender of a non-argument addressee. We manipulated the gender of the allocutive verb and the congruence of addressee gender in conversations between two interlocutors. Items with person agreement manipulations were included as a control comparison. Basque speakers familiar with hika completed speeded acceptability judgments and unspeeded, offline naturalness ratings for each conversation. Results showed a main effect of addressee identity congruence for naturalness ratings, but there was no main effect for addressee identity congruence for reaction times or accuracy in the acceptability judgment. Interactions and correlations with biographical data showed that the effect of congruence was modulated by the gender of the allocutive verb and that hika proficiency was related to participants' performance for the acceptability judgment. These results show an interaction between morphosyntactic and pragmatic information and are the first experimental data of allocutive processing. In comparison, clear effects were seen for the person agreement condition, indicating that person disagreement is more disruptive to processing than addressee identity incongruence. This study has implications for investigation of the role of extralinguistic information in morphosyntactic processing, and suggests that not all such information plays an equal role.

  20. Exploring the identity and "sense of identity" of organisations

    Directory of Open Access Journals (Sweden)

    C L Van Tonder

    2006-03-01

    Full Text Available During the past two decades a steady increase in scholarly contributions in the area of organisation identity have been observed – to the point that the phenomenon is now the subject of a sustainable discourse in several disciplines. Many theoretical and conceptual dilemmas however remain, largely as a result of the low incidence of empirical research in the area. This study reports the results of an exploratory investigation that adapted Schley and Wagenfield’s (1979 concept of identity for use in an organisational setting. Interviews were conducted with 152 top managers representing 10 companies. The results indicate that organisational responses to the question “who am I?�? elicit distinctive organisational self-descriptions and some awareness of identity issues.

  1. PERSONAL IDENTITY IN DEAF ADOLESCENTS

    Directory of Open Access Journals (Sweden)

    Joanna KOSSEWSKA

    2008-06-01

    Full Text Available The purpose of this study was to investigate the factors influencing the identity deaf adolescents. The study involved 67 deaf adolescents (38 boys and 29 girls aged 16 to 19 students of secondary school. Ninety-three hearing children constituted a comparison group. The structure of identity was explored on the basis of identification references given by the subjects who were to reply in writing, 20 times running, to the question: „Who Am I?” the test, adapted from M. H. Kuhn and T. S. McPartland by Martines and Silvestre (1995 given in written and signed mode.Results showed that the hearing status as well as mode of communication influence the description of personal identity. It was found that deaf adoles­cents used more descriptions especially in the fol­lowing categories: Civil Status, Body and Physical Appearance, Tastes and Activities, Friendship and Relationships, Personal and Social Situation, Negative Personal Traits, and Neutral Personality Traits. Although this study could demonstrate im­pact independent variables on identity, the data raise the need for further, preferably longitudinal, research. This complex phenomenon has to be examined more closely.Combined self-descriptive processes lead to the development of an organized, learned and dynamic identity, and subjective description of an individ­ual has strong emotional consequences for the in­dividual in question.

  2. Hierarchy of modular graph identities

    Energy Technology Data Exchange (ETDEWEB)

    D’Hoker, Eric; Kaidi, Justin [Mani L. Bhaumik Institute for Theoretical Physics, Department of Physics and Astronomy,University of California,Los Angeles, CA 90095 (United States)

    2016-11-09

    The low energy expansion of Type II superstring amplitudes at genus one is organized in terms of modular graph functions associated with Feynman graphs of a conformal scalar field on the torus. In earlier work, surprising identities between two-loop graphs at all weights, and between higher-loop graphs of weights four and five were constructed. In the present paper, these results are generalized in two complementary directions. First, all identities at weight six and all dihedral identities at weight seven are obtained and proven. Whenever the Laurent polynomial at the cusp is available, the form of these identities confirms the pattern by which the vanishing of the Laurent polynomial governs the full modular identity. Second, the family of modular graph functions is extended to include all graphs with derivative couplings and worldsheet fermions. These extended families of modular graph functions are shown to obey a hierarchy of inhomogeneous Laplace eigenvalue equations. The eigenvalues are calculated analytically for the simplest infinite sub-families and obtained by Maple for successively more complicated sub-families. The spectrum is shown to consist solely of eigenvalues s(s−1) for positive integers s bounded by the weight, with multiplicities which exhibit rich representation-theoretic patterns.

  3. At the Intersection of Identities

    Directory of Open Access Journals (Sweden)

    Hidasi Judit

    2016-12-01

    Full Text Available It is assumed that part of today’s societal difficulties, uncertainties and crisis worldwide can be attributed to the competing of multiple identities, to their intersections and their overlapping nature – on the level of nations, on the level of communities and also on the level of the individual. We aim at presenting a typology of identities that come into play in the public and in the private domain of the individual. It is hypothesized that there is a strong interdependence of cultural heritage, human values and social traditions in the competition of identities. These questions, which are interrelated and interconnected with each other through a common denominator, namely “cultural-mental programming” and “reprogramming efforts,” are going to be pondered about in the presentation. In the context of globalization the relevance of this topic is reinforced by the need to adapt to changes within the ever-intensifying shift from intercultural to multicultural environment in communities, in business and in work places. Attempts will be made to articulate some projections with respect to future trends that are to be expected: the way to go from competing identities to establishing a competitive identity (Simon Anholt. The contribution does not offer ready solutions but rather serves as fuel for further discussions.

  4. Medios sociales y autogestión del perfil digital: identidad y pedagogía con blogs en un máster Social Media and Self-curatorship: Reflections on Identity and Pedagogy through Blogging on a Masters Module

    Directory of Open Access Journals (Sweden)

    John Potter

    2012-03-01

    group of students who use an online module to study media, culture and communication as part of a wider master's programme. The students were invited to reflect in a more reflexive and theoretical manner than is commonly used in a standard course evaluation about their experiences of engaging with social media as both the medium and the subject of the course. The article discusses the student experience as it unfolded in the context of an assessed piece of project work. In discussing the findings the authors locate the arguments in the context of debates about new literacies, pedagogy and social media as well as in an emergent theory of self-curatorship as a metaphorical frame for understanding the production and representation of identity in digital media.

  5. Identity during Adolescence and Adulthood from the Viewpoints of Individuality-based Identity and Relatedness-based Identity

    OpenAIRE

    宗田, 直子; 岡本, 祐子

    2008-01-01

    Identity during adolescence and adulthood was investigated from the viewpoint of individuality-based identity and relatedness-based identity, especially the dimensions of "relatedness." Individuality Based Identity Scale (IBIS) and Relatedness Based Identity Scale (RBIS) were administered to adolescent (n=198) and adult (n=321) participants. Analysis of the responses to the scales indicated the following. (1) RBIS subscale score; "relatedness before ego formation" was similar between adolesce...

  6. Constructing leadership identities through stories

    DEFF Research Database (Denmark)

    Frimann, Søren; Hersted, Lone

    2016-01-01

    This article analyzes the construction of leadership identities through stories found in four narrative interviews from a qualitative study and leadership development project based on social constructionism and action learning. We argue that leadership development and the construction of leadership...... identities in a postmodern paradigm are based on the negotiation and co-construction of meanings, relationships, and stories. The following questions are investigated: What happens when a group of leaders from different organizations construct, deconstruct, and reconstruct their identity as leaders through...... narrative interviews about their challenges as leaders? In addition, how do these discursive constructions restrict or enable new perspectives, other voices, and the possibilities for learning and change? Our analysis identified traces of both modern and postmodern leadership discourses. We suggest...

  7. [Identity and aging: psychosocial approaches].

    Science.gov (United States)

    Danko, Marianna; Arnaud, Christiane; Gély-Nargeot, Marie-Christine

    2009-12-01

    This review is devoted to the notion of identity with regard to the process of aging from various approaches in social sciences. Continuity or transformation of identity is challenged in advanced age according to the place reserved in the society for the elderly subjects and their social age groups. Study methods are discussed in relation with the theoretical models, and their relevance to address aging people singularity and influence of environment. Changes of identity among elderly subjects appear to proceed in two ways. In the first one, called "rebirth", they establish a new self. In the second way, termed "turning point", better strategy for coping the aging effects is obtained by revealing untapped dimensions of the Self.

  8. National identity in multicultural environment

    Directory of Open Access Journals (Sweden)

    Milena Öbrink Hobzová

    2017-11-01

    Full Text Available In today's globalized world, it is important to find a relationship to our own culture as well as to the other cultures which we encounter due to migration. This goal should be met in multicultural education. As a result of the so-called migration crisis, effectiveness of multicultural education was discussed on social networks and in media. At the same time, national interests and security began to appear in the programmes of political parties. It seems that, due to the fear of refugees, national identity started becoming more important. The situation is reflected in the research presented below. It aimed to determine whether there was a link between the sense of national identity and attitudes to foreigners. The investigation was carried out in 2015 on a sample of 245 respondents. The results showed that the growing sense of national identity deepened the negative attitude to foreigners. It is necessary to work with this fact in multicultural education at schools.

  9. Constructing leadership identities through stories

    DEFF Research Database (Denmark)

    Frimann, Søren; Hersted, Lone

    2016-01-01

    This article analyzes the construction of leadership identities through stories found in four narrative interviews from a qualitative study and leadership development project based on social constructionism and action learning. We argue that leadership development and the construction of leadership...... narrative interviews about their challenges as leaders? In addition, how do these discursive constructions restrict or enable new perspectives, other voices, and the possibilities for learning and change? Our analysis identified traces of both modern and postmodern leadership discourses. We suggest...... identities in a postmodern paradigm are based on the negotiation and co-construction of meanings, relationships, and stories. The following questions are investigated: What happens when a group of leaders from different organizations construct, deconstruct, and reconstruct their identity as leaders through...

  10. CORPORATE IDENTITY SEJARAH DAN APLIKASINYA

    Directory of Open Access Journals (Sweden)

    Christine Suharto Cenadi

    1999-01-01

    Full Text Available In the recent globalization era%2C and the developed market%2C many companies compete to attract consumers to buy their products. One of the keys to compete and survive in this developing market is by creating an image and graphic identity. This paper will discuss about corporate identity%2C image%2C its purpose and applications. Abstract in Bahasa Indonesia : Dalam era globalisasi dewasa ini%2C dan dengan berkembangnya pasar (market%2C banyak perusahaan bersaing untuk menarik perhatian konsumen untuk membeli produknya. Salah satu cara untuk bersaing dan dapat bertahan di dalam pasar yang terus berkembang ini adalah dengan menciptakan suatu image dan identitas graphic. Tulisan ini akan membahas tentang corporate identity%2C image%2C fungsi dan aplikasinya

  11. Social Trust of Virtual Identities

    Science.gov (United States)

    Seigneur, Jean-Marc

    Most other chapters of this book discuss computational models of trust in broader terms, giving definitions of trust, explaining how trust should evolve over time, surveying the different facets of trust .On the other hand, this chapter has a clear focus on the important element of identity in computational trust mechanisms. Trust and reputation are easier to form in face-to-face situations than in situations involving the use of computers and networks because the identity of the trustee is more difficult to verify. In this chapter, the different means to recognise virtual identities are surveyed. Next, their integration into computational trust engines is discussed, especially according to four main requirements: Adaptability, Security, Usability and Privacy (ASUP).

  12. The Moral Self: Applying Identity Theory

    Science.gov (United States)

    Stets, Jan E.; Carter, Michael J.

    2011-01-01

    This research applies identity theory to understand the moral self. In identity theory, individuals act on the basis of their identity meanings, and they regulate the meanings of their behavior so that those meanings are consistent with their identity meanings. An inconsistency produces negative emotions and motivates individuals to behave…

  13. Applications of an identity of Andrews

    Directory of Open Access Journals (Sweden)

    D.D. Somashekara

    2014-07-01

    Full Text Available In this paper, we give a bilateral form of an identity of Andrews, which is a generalization of the 1ψ1 summation formula of Ramanujan. Using Andrews’ identity, we deduce some new identities involving mock theta functions of second order and finally, we deduce some q-gamma, q-beta and eta function identities.

  14. Identity and Diversity in Today's World

    Science.gov (United States)

    Gee, James Paul

    2017-01-01

    This paper develops a thesis about identity and diversity. I first look at activity-based identities, identities like being a gardener, birder, citizen scientist or fan-fiction writer. These are freely chosen identities and they are proliferating at a great rate today thanks to participatory culture, the Maker Movement and digital and social…

  15. A Dialogical Approach to Conceptualizing Teacher Identity

    Science.gov (United States)

    Akkerman, Sanne F.; Meijer, Paulien C.

    2011-01-01

    In recent attempts to address the notion of teacher identity, scholars have stressed how identity is dynamically evolving, intrinsically related to others, and consists of multiple identities. Though these postmodern characterizations represent radically new perceptions of identity, they are not extensively discussed in relation to previous…

  16. Teacher Educators' Identity: A Review of Literature

    Science.gov (United States)

    Izadinia, Mahsa

    2014-01-01

    Research suggests that the development of a teacher educator identity is a central process in becoming a teacher educator. Recently, there has been an increasing interest in the concept of teacher identity. However, teacher educator identity seems to be still under-researched. In this article, a review of literature on teacher educator identity is…

  17. Self, identity and identity formation: From the perspectives of three major theories

    OpenAIRE

    Hüseyin Cinoğlu; Yusuf Arıkan

    2012-01-01

    This study revealed that there are three major perspectives in explaining the identity and identity formation. The first one is social identity theory where the founders see the group membership as the driving force for identity formation. The next theory is identity theory, in which the roles that are assigned to individuals are deemed as the major source for energy to identity formation. The last theory talks about the importance of personal values in explaining the identity a...

  18. Blended Identities: Identity Work, Equity and Marginalization in Blended Learning

    Science.gov (United States)

    Heikoop, Will

    2013-01-01

    This article is a theoretical study of the self-presentation strategies employed by higher education students online; it examines student identity work via profile information and avatars in a blended learning environment delivered through social networking sites and virtual worlds. It argues that students are faced with difficult choices when…

  19. National Identity and Distinctiveness: Developing a Common Identity ...

    African Journals Online (AJOL)

    After a brief assessment of mainstream theories of nationalism with an emphasis on civic and primordialist approaches, the following question is posed: How important is the association of national identity to the stability of the nation-state? The objectives are firstly to assert that in a state such as South Africa, the social ...

  20. Integrating Identities: Ethnic and Academic Identities among Diverse College Students

    Science.gov (United States)

    Walker, Lovey H. M.; Syed, Moin

    2013-01-01

    Background/Context: Students of Color continue to be underrepresented at the undergraduate level. Recent research has demonstrated the importance of non-academic psychosocial factors for understanding college experiences. One factor, identity, is a broad, multidimensional construct that comprises numerous distinct domains, including political,…

  1. Function projective synchronization of identical and non-identical ...

    Indian Academy of Sciences (India)

    identical modified finance systems (MFS) and Shimizu-Morioka system (S-MS) are studied via active control technique. The technique is applied to construct a response system which synchronizes with a given drive system for a desired function ...

  2. A new family of algebras underlying the Rogers-Ramanujan identities and generalizations.

    Science.gov (United States)

    Lepowsky, J; Wilson, R L

    1981-12-01

    The classical Rogers-Ramanujan identities have been interpreted by Lepowsky-Milne and the present authors in terms of the representation theory of the Euclidean Kac-Moody Lie algebra A(1) ((1)). Also, the present authors have introduced certain "vertex" differential operators providing a construction of A(1) ((1)) on its basic module, and Kac, Kazhdan, and we have generalized this construction to a general class of Euclidean Lie algebras. Starting from this viewpoint, we now introduce certain new algebras [unk](v) which centralize the action of the principal Heisenberg subalgebra of an arbitrary Euclidean Lie algebra [unk] on a highest weight [unk]-module V. We state a general (tautological) Rogers-Ramanujan-type identity, which by our earlier theorem includes the classical identities, and we show that [unk](v) can be used to reformulate the general identity. For [unk] = A(1) ((1)), we develop the representation theory of [unk](v) in considerable detail, allowing us to prove our earlier conjecture that our general Rogers-Ramanujan-type identity includes certain identities of Gordon, Andrews, and Bressoud. In the process, we construct explicit bases of all of the standard and Verma modules of nonzero level for A(1) ((1)), with an explicit realization of A(1) ((1)) as operators in each case. The differential operator constructions mentioned above correspond to the trivial case [unk](v) = (1) of the present theory.

  3. A New Family of Algebras Underlying the Rogers--Ramanujan Identities and Generalizations

    Science.gov (United States)

    Lepowsky, James; Wilson, Robert Lee

    1981-12-01

    The classical Rogers-Ramanujan identities have been interpreted by Lepowsky-Milne and the present authors in terms of the representation theory of the Euclidean Kac-Moody Lie algebra A1(1). Also, the present authors have introduced certain ``vertex'' differential operators providing a construction of A1(1) on its basic module, and Kac, Kazhdan, and we have generalized this construction to a general class of Euclidean Lie algebras. Starting from this viewpoint, we now introduce certain new algebras LV which centralize the action of the principal Heisenberg subalgebra of an arbitrary Euclidean Lie algebra germ{g} on a highest weight germ{g}-module V. We state a general (tautological) Rogers-Ramanujan-type identity, which by our earlier theorem includes the classical identities, and we show that LV can be used to reformulate the general identity. For germ{g}=A1(1), we develop the representation theory of LV in considerable detail, allowing us to prove our earlier conjecture that our general Rogers-Ramanujan-type identity includes certain identities of Gordon, Andrews, and Bressoud. In the process, we construct explicit bases of all of the standard and Verma modules of nonzero level for A1(1), with an explicit realization of A1(1) as operators in each case. The differential operator constructions mentioned above correspond to the trivial case LV = (1) of the present theory.

  4. Saving Face and Group Identity

    DEFF Research Database (Denmark)

    Eriksson, Tor; Mao, Lei; Villeval, Marie-Claire

    2015-01-01

    Are people willing to sacrifice resources to save one's and others' face? In a laboratory experiment, we study whether individuals forego resources to avoid the public exposure of the least performer in their group. We show that a majority of individuals are willing to pay to preserve not only...... their self- but also other group members' image. This behavior is frequent even in the absence of group identity. When group identity is more salient, individuals help regardless of whether the least performer is an in-group or an out-group. This suggests that saving others' face is a strong social norm....

  5. Homosexuality, ethics and identity synthesis.

    Science.gov (United States)

    Yarhouse, Mark

    2004-01-01

    Implicit metaphysical assumptions concerning the nature of sexual orientation are reflected in the language used to frame ethical debates concerning "reorientation" therapies. An alternative metaphysical construal is presented concerning sexual orientation and sexual identity development and synthesis. This alternative construal allows for humility concerning what we know and do not know about sexual orientation, underscores the client's self-determination and autonomy, and demonstrates regard for personal and religious valuative frameworks. Rather than focusing on therapies aimed specifically at sexual reorientation, clinicians would do well to provide clients with informed consent and to facilitate identity development and synthesis in keeping with their clients' requests for professional services.

  6. RFID identity theft and countermeasures

    Science.gov (United States)

    Herrigel, Alexander; Zhao, Jian

    2006-02-01

    This paper reviews the ICAO security architecture for biometric passports. An attack enabling RFID identity theft for a later misuse is presented. Specific countermeasures against this attack are described. Furthermore, it is shown that robust high capacity digital watermarking for the embedding and retrieving of binary digital signature data can be applied as an effective mean against RFID identity theft. This approach requires only minimal modifications of the passport manufacturing process and is an enhancement of already proposed solutions. The approach may also be applied in combination with a RFID as a backup solution (damaged RFID chip) to verify with asymmetric cryptographic techniques the authenticity and the integrity of the passport data.

  7. Invited essay: Identity and borderline personality disorder.

    Science.gov (United States)

    Jørgensen, Carsten René

    2010-06-01

    The general consensus is that disturbed identity is one of the defining characteristics of borderline personality disorder. So far it has not been possible to reach a generally accepted definition of identity, and the clinical phenomenon of identity disturbance involves inner subjective states that are not directly accessible to observation and reliable assessment. In this article a preliminary definition of identity is suggested and different levels, dimensions, and categories of identity are delineated. Essential elements of identity disturbance or identity diffusion in BPD patients are described and related to other aspects of borderline personality disorder: mentalization failures, disrupted relationships, impulsive or nonvolitional behavior, deficits in memory, dissociation, and dysfunctional self-narratives.

  8. National Identity in Quebec Linguistic Consciousness

    Directory of Open Access Journals (Sweden)

    Зульфия Ахатовна Усманова

    2014-12-01

    Full Text Available The problem of defining the structure of national identity takes central place in current research. The paper examines the category of national identity through the lens of the linguo-cultural paradigm. Specifically, the content of the concepts identity , Quebec , Quebecois , the French language and distinct society are analyzed. The results of the experiments demonstrate that historic traditions, national self-identity and the value of the French language are the most important characteristics of Quebec national identity.

  9. Corporate brand identity – a conceptual redefinition

    OpenAIRE

    Barros, Teresa; Martins, Francisco Vitorino

    2008-01-01

    There is a wide agreement that identity is a multidisciplinary concept. Branding is an identity expression. Although there are some frameworks to assess brand identity there isn’t an accepted definition. The authors consider this a gap in literature and investigate the components to assess brand identity under a holistic approach. Literature was reviewed and reinterpreted under an integrated perspective evolving corporate and brand identity studies. The authors propose a definitio...

  10. Constructing and Reconstructing Narrative Identity

    Directory of Open Access Journals (Sweden)

    Gabriele Lucius-Hoene

    2000-06-01

    Full Text Available The research work done by the author investigates a phenomenological field—the subjective experience of chronic illness and disability—by means of a specific research instrument, the autobiographical narrative interview. It focuses on the concept of narrative identity and its empirical substrate in the scientifically generated texts. Narrative identity is regarded as a situated, pragmatic, autoepistemic and interactive activity drawing on culturally transmitted narrative conventions which is performed within the research context. We have been working with a systematic analytic approach which covers interactive and contextual aspects of the interview situation as well as rhetoric and positioning strategies in the act of telling. Other research questions concern the concept of "narrative coping" and the comparison of partner's narratives on problems of illness and disability, especially on scrutinizing aspects of identity and alterity (self and other in the texts. This work can be understood as combining aspects of the research domains of narratology, identity and coping on the background of a qualitative methodology. URN: urn:nbn:de:0114-fqs0002189

  11. Identity Over Time: Objectively, Subjectively

    NARCIS (Netherlands)

    van Fraassen, B.C.; Peschard, I.F.

    2008-01-01

    In the philosophy of science, identity over time emerges as a central concern both as an ontological category in the interpretation of physical theories, and as an epistemological problem concerning the conditions of possibility of knowledge. In Reichenbach and subsequent writers on the problem of

  12. 6 Keys to Identity Management

    Science.gov (United States)

    Shoham, Idan

    2011-01-01

    An Identity and Access Management (IAM) project on campus can feel like a Sisyphean task: Just when access rights have finally been sorted out, the semester ends--and users change roles, leave campus, or require new processes. IT departments face a constantly changing technical landscape: (1) integrating new applications and retiring old ones; (2)…

  13. The Ambiguous Identity of Auditing

    DEFF Research Database (Denmark)

    Lindeberg, Tobias Høygaard

    2007-01-01

    This paper analyses the identity of auditing by comparing performance auditing to financial auditing and programme evaluation. Based on an analysis of textbooks, it is concluded that these evaluative practices are situated on a continuum. This implies that studies that rely on ‘audit’ as a label...

  14. Violent protests and gendered identities

    African Journals Online (AJOL)

    Violent protests and gendered identities. Yandisa Sikweyiya1. Gender and Health Research Unit, South African Medical Research Council, Pretoria;. School of Public Health, Faculty of Health Sciences, University of the Witwatersrand,. Johannesburg. Sebenzile Nkosi. Alcohol, Tobacco, and Other Drug Research Unit, ...

  15. Rethinking Materiality, Memory and Identity

    Directory of Open Access Journals (Sweden)

    Tracy Ireland

    2016-12-01

    Full Text Available This introductory article  considers and questions exactly how materials and people constitute social worlds and relationships which sustain identity and memory and, in turn, the social and political structures or norms that these attachments invest in, stabilise and maintain.

  16. Developing Designer Identity through Reflection

    Science.gov (United States)

    Tracey, Monica W.; Hutchinson, Alisa

    2013-01-01

    As designers utilize design thinking while moving through a design space between problem and solution, they must rely on design intelligence, precedents, and intuition in order to arrive at meaningful and inventive outcomes. Thus, instructional designers must constantly re-conceptualize their own identities and what it means to be a designer.…

  17. Cultural heritage and identity politics

    NARCIS (Netherlands)

    During, R.

    2011-01-01

    ‘As the authors in this fascinating volume point out, both heritage and identity discourse can be instrumentalized, by proponents and opponents of European integration, as they can be commodified, in branding efforts with various implementations. Just as in Macchiavelli’s Europe, political and

  18. Gender Identity Disorder in Children.

    Science.gov (United States)

    Redmond, Dionne; Flauto, Phil

    Identity formation involves the development of self esteem, social skills, and a sense of self. Many gay and lesbian adults have noted that they were aware of their attraction to members of the same sex as early as five- and six-years-old. Reactions they received from parents and others often added to their stress. Following a description of the…

  19. Identity, Diversity and Diversity Management

    DEFF Research Database (Denmark)

    Holck, Lotte; Muhr, Sara Louise; Villeseche, Florence

    2016-01-01

    The purpose of this paper is to examine the relationship between the identity and diversity literatures and discuss how a better understanding of the theoretical connections between the two informs both diversity research and diversity management practices. Design/methodology/approach – Literatur...

  20. identical stations and random failures

    Directory of Open Access Journals (Sweden)

    Dennis E. Blumenfeld

    2005-01-01

    line with identical workstations and buffers of equal size. It is a closed-form expression that shows the mathematical relationships between the system parameters, and that can be used to gain basic insight into system behavior at the initial design stage.

  1. Developing Students' Professional Digital Identity

    Science.gov (United States)

    Cochrane, Thomas; Antonczak, Laurent

    2015-01-01

    In contrast to the myth of the "Digital Native" and the ubiquity of Facebook use, we have found that students' digital identities are predominantly social with their online activity beyond Facebook limited to being social media consumers rather than producers. Within a global economy students need to learn new digital literacy skills to…

  2. Understanding Academic Identity through Metaphor

    Science.gov (United States)

    Billot, Jennie; King, Virginia

    2015-01-01

    Metaphors used by higher education teachers in their narratives of academic life provide insight into aspects of academic identity. Drawing on an international study of leader/follower dynamics, the teachers' narratives reveal how academics interpret their interactions with leaders; the perceived distance between expectations and experience, and…

  3. Identity Theft: Trends and Issues

    Science.gov (United States)

    2010-05-27

    addition to the costs incurred by consumers, identity theft presents cost burdens to the financial services industry as well. However, this cost is... financial services industry . 3 Federal Trade Commission, Consumer Sentinel Network Data Book for January – December, 2009, February, 2010, http...widespread.82 Some industries, such as the financial services industry , have stricter requirements for safeguarding personally identifying information

  4. [Identity and narration: autobiographical quests].

    Science.gov (United States)

    Arfuch, Leonor

    2013-01-01

    This paper aims to tackle the subtle relation between autobiographical narratives and identity construction, from a non essentialist conception of identity. In a perspective that articulates philosophy of language, psychoanalysis, semiotics and literary critique, we posit the concept of biographical space as an analytical instrument to make a critical update of the reconfiguration of identities and subjectivities in contemporary culture, marked by the predominance of the biographical, the private and a kind of "public intimacy". This look is more symptomatic than descriptive: it intends to account for the rise of auto/biographical narratives and life-stories, from canonic genres to their multiple derivations in the media, social networks and the most diverse artistic practices, a phenomenon that seems to reaffirm the notion of narrative identities by Ricoeur. Our analysis here, from an ethic, aesthetic and political point of view, will focus on two visual arts experiences that have recently taken place for the first time in Buenos Aires: Christian Boltanski's and Tracey Emin's, solo exhibitions, each of them with a different biographical approach.

  5. Identity disturbance in distant patients.

    Science.gov (United States)

    Hoffman, Irwin

    2013-04-01

    Chronically distant, emotionally isolated patients often present with identity disturbance. Identity, it is argued, develops as a thematic pattern of narcissism, shaped by the nature of the mother's early libidinal influences on the child's sense of self. Identity provides a form of self-definition that addresses the question, Who am I? In the treatment of these patients, resistances to narcissistic vulnerabilities (narcissistic resistances) provide an illusory sense of security and induce the analyst to avoid attention to a central pathological problem: primitive and frightening needs for, and unconscious fantasies of, dependence on, and functionality for, another. Patients' avoidance of material and therapeutic interactions that deal with their dependencies are aspects of a tacit contract with the analyst to foreclose examination of their considerable problems with inner stability. Among these problems are anxieties regarding intrusion and loss of separateness. As analysis proceeds, elements of such a patient's identity become clarified and are used to understand and organize the material for both analyst and patient. This can allow the patient to articulate a more embodied and vital experience of individuality. A case is presented to illustrate the analysis of a patient using this approach.

  6. Cultural Identity in Tibetan Diasporas

    Science.gov (United States)

    Giles, Howard; Dorjee, Tenzin

    2005-01-01

    Tibetan civilisation is over two millenniums old and, today, its struggles in diaspora open up a new chapter in Tibetan history. Diasporic Tibetans (e.g. in India and the USA) have made tremendous efforts over the last few decades to maintain their way of life. We focus on cultural identity in the Tibetan diasporas, with special attention focused…

  7. Identity, Culture and Cosmopolitan Futures

    Science.gov (United States)

    Rizvi, Fazal

    2005-01-01

    This paper examines the policy notion of multiculturalism, and suggests that it is no longer adequate for understanding contemporary forms of interculturality that span across the globe, and are deeply affected by the processes of cultural globalization. Cultural identities can no longer be assumed as static and nation-bound, and are created…

  8. Brand: Identity, Image, and Relationships

    Science.gov (United States)

    Danker, Stephanie Harvey

    2014-01-01

    Adolescents face complex dilemmas such as challenging issues of identity and self-concept, and struggles with building and maintaining relationships. These issues must be embraced in the art classroom. This Instructional Resource will focus on the concept of brand--connecting visual art, marketing, and psychology--and center on ideas found in the…

  9. Counselor Identity: Conformity or Distinction?

    Science.gov (United States)

    McLaughlin, Jerry E.; Boettcher, Kathryn

    2009-01-01

    The authors explore 3 debates in other disciplines similar to counseling's identity debate in order to learn about common themes and outcomes. Conformity, distinction, and cohesion emerged as common themes. They conclude that counselors should retain their distinctive, humanistic approach rather than conforming to the dominant, medical approach.

  10. Feminist Identity among Latina Adolescents

    Science.gov (United States)

    Manago, Adriana M.; Brown, Christia Spears; Leaper, Campbell

    2009-01-01

    This study explores developing conceptions of feminism among Latina adolescents, their prevalence of feminist endorsement, and whether home environment and well-being are related to feminist identity. One hundred and forty Latina girls (Grades 9 to 12, M age = 15) wrote personal narratives of their understanding of feminism and whether they…

  11. Digital photography: communication, identity, memory

    NARCIS (Netherlands)

    van Dijck, J.

    2008-01-01

    Taking photographs seems no longer primarily an act of memory intended to safeguard a family's pictorial heritage, but is increasingly becoming a tool for an individual's identity formation and communication. Digital cameras, cameraphones, photoblogs and other multipurpose devices are used to

  12. Towards a Digital Learner Identity

    NARCIS (Netherlands)

    Berlanga, Adriana; Sloep, Peter

    2011-01-01

    Berlanga, A. J., & Sloep, P. B. (2011). Towards a Digital Learner Identity. In F. Abel, V. Dimitrova, E. Herder, & G. J. Houben (Eds.), Augmenting User Models with Real World Experiences Workshop (AUM). In conjunction with UMAP 2011. July, 15, 2011, Girona, Spain.

  13. DepHining membrane identity.

    Science.gov (United States)

    Hammond, Gerald R V

    2018-01-02

    How do organelles coordinate their unique molecular identities between their cytosolic-facing surface membranes and their interior? In this issue, Naufer et al. (2017. J. Cell Biol. https://doi.org/10.1083/jcb.201702179) discover an intriguing link between phagosome acidification and lipid signposts on their outer membrane. © 2018 Hammond.

  14. Facilitating Conversations about Managerial Identities

    DEFF Research Database (Denmark)

    Madsen, Mona Toft

    -based organization in the engineering consulting sector b) a reflection meeting, where the same three managers were gathered, and conversations were facilitated based on identity work in the context of earlier interviews. More specifically, three themes were discussed; flat organizational structure, tensions between...

  15. Digital identity in ambient environments

    NARCIS (Netherlands)

    B.A.M. Ben Schouten; Onkar Ambekar

    2006-01-01

    Embedded systems and ambient technology enable users to interact at any time and anywhere. In the BASIS project for identity management, CWI investigates transparent biometrics in home environments. Possible application areas are user profiling for shopping , listening to one's favourite music and

  16. When speaker identity is unavoidable: Neural processing of speaker identity cues in natural speech.

    Science.gov (United States)

    Tuninetti, Alba; Chládková, Kateřina; Peter, Varghese; Schiller, Niels O; Escudero, Paola

    2017-11-01

    Speech sound acoustic properties vary largely across speakers and accents. When perceiving speech, adult listeners normally disregard non-linguistic variation caused by speaker or accent differences, in order to comprehend the linguistic message, e.g. to correctly identify a speech sound or a word. Here we tested whether the process of normalizing speaker and accent differences, facilitating the recognition of linguistic information, is found at the level of neural processing, and whether it is modulated by the listeners' native language. In a multi-deviant oddball paradigm, native and nonnative speakers of Dutch were exposed to naturally-produced Dutch vowels varying in speaker, sex, accent, and phoneme identity. Unexpectedly, the analysis of mismatch negativity (MMN) amplitudes elicited by each type of change shows a large degree of early perceptual sensitivity to non-linguistic cues. This finding on perception of naturally-produced stimuli contrasts with previous studies examining the perception of synthetic stimuli wherein adult listeners automatically disregard acoustic cues to speaker identity. The present finding bears relevance to speech normalization theories, suggesting that at an unattended level of processing, listeners are indeed sensitive to changes in fundamental frequency in natural speech tokens. Copyright © 2017 Elsevier Inc. All rights reserved.

  17. Bridging Identity Gaps : Supporting Identity Performance in Citizen Service Encounters

    DEFF Research Database (Denmark)

    Borchorst, Nikolaj Gandrup; McPhail, Brenda; Smith, Karen Louise

    2012-01-01

    administrative processes and the quality and swiftness of the service they receive. As we bring to light in this paper, this “fitting in” with rigid bureaucratic procedures and IT systems interestingly requires a substantial collaborative effort between the receiver(s) of the service and a complex constellation...... of surrounding stakeholders and intermediaries. This collaboration and the performing of multiple identities raises challenges for the design of e-government systems aimed at supporting physical and digital citizen service provision, as well as issues regarding privacy, citizenship, and public service quality......This paper explores in situ citizen service encounters in government offices. Drawing upon ethnographically informed fieldwork in Canada and Denmark, we discuss the challenges to supporting citizens in constructing and performing identities in public service settings. Our data suggests...

  18. Psychobiological characteristics of dissociative identity disorder : A symptom provocation study

    NARCIS (Netherlands)

    Reinders, A. A. T. Simone; Nijenhuis, Ellert R. S.; Quak, Jacqueline; Korf, Jakob; Haaksma, Jaap; Paans, Anne M. J.; Willemsen, Antoon T. M.; den Boer, Johan A.

    2006-01-01

    Background: Dissociative identity disorder (DID) patients function as two or more identities or dissociative identity states (DIS), categorized as 'neutral identity states' (NIS) and 'traumatic identity states' (TIS). NIS inhibit access to traumatic memories thereby enabling daily life functioning.

  19. MEMORY MODULATION

    Science.gov (United States)

    Roozendaal, Benno; McGaugh, James L.

    2011-01-01

    Our memories are not all created equally strong: Some experiences are well remembered while others are remembered poorly, if at all. Research on memory modulation investigates the neurobiological processes and systems that contribute to such differences in the strength of our memories. Extensive evidence from both animal and human research indicates that emotionally significant experiences activate hormonal and brain systems that regulate the consolidation of newly acquired memories. These effects are integrated through noradrenergic activation of the basolateral amygdala which regulates memory consolidation via interactions with many other brain regions involved in consolidating memories of recent experiences. Modulatory systems not only influence neurobiological processes underlying the consolidation of new information, but also affect other mnemonic processes, including memory extinction, memory recall and working memory. In contrast to their enhancing effects on consolidation, adrenal stress hormones impair memory retrieval and working memory. Such effects, as with memory consolidation, require noradrenergic activation of the basolateral amygdala and interactions with other brain regions. PMID:22122145

  20. Identity

    Science.gov (United States)

    Ransom, Liz

    2012-01-01

    The National Association of Hispanic Journalists tracks the presence of Latinos in the news. It reports that news stories in which Latinos are the subject most often concern immigration, poverty and crime. And Hollywood does no better in reflecting the broad reality of Latino life. Latino characters are often portrayed as poor and uneducated. In…

  1. Evolution of Modulated Dispersive Electron Waves in a Plasma

    DEFF Research Database (Denmark)

    Sugai, H.; Lynov, Jens-Peter; Michelsen, Poul

    1979-01-01

    The linear propagation of amplitude-modulated electron waves was examined in a low-density Q-machine plasma. Three effects of the strong dispersion on the modulated wave have been demonstrated: (i) a wavepacket expands along its direction of propagation, followed by a shift of the frequency through...... the wavepacket, (ii) the number of oscillations in the temporally observed packet is not identical with that in the spatially observed packet and (iii) continuously modulated waves exhibit recurrence of modulation. The experimental results agree with both a simple analysis based on the Schrodinger equation...

  2. Upward social mobility and identity.

    Science.gov (United States)

    Destin, Mesmin; Debrosse, Régine

    2017-12-01

    As psychological research on socioeconomic status (SES) continues to expand, greater attention should be devoted to the influence of social mobility and the dynamic and malleable aspects of SES on people's lives. Status-based identity describes how people's socioeconomic circumstances relate to their broader sense of self and the meaning that they make of their own SES. Such an approach allows for complex study of the challenges and consequences of a change in SES. Research related to status-based identity suggests that although social mobility is often considered a signifier of reduced inequality, upward social mobility may also exacerbate other forms of inequality by instigating a destabilizing sense of status uncertainty that impairs motivation and well-being for class migrants. Copyright © 2017 Elsevier Ltd. All rights reserved.

  3. The Identity of "Chromium Malate".

    Science.gov (United States)

    Smart, Megan; Brown, Silas; Tannehill, Haley; Lockart, Molly; Bowman, Michael K; Vincent, John B

    2017-05-18

    Recently, several studies on the effects of a compound named "chromium malate," with the proposed formula "Cr2malate3·xH2O" where x = 3.5 or 5, on the health of healthy and diabetic rats have appeared. However, the compound is poorly characterized, and knowing the identity of this material could be important in the interpretation of the previous and of future studies on the effects of this compound in animals. Consequently, the synthesis, characterization, and identity of this material were explored. A combination of spectroscopic, magnetic, and elemental analyses and mass spectral studies reveal that the compound is probably a polymer, not a discrete molecule, and does not have the composition previously reported. The repeating unit of the polymer possesses an antiferromagnetically coupled trinuclear Cr(III) core. The current study suggests that previous reports on chromium malate and its effects in animals must be viewed with caution.

  4. Context-Aware Identity Delegation

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.

    2009-01-01

    In emerging ubiquitous computing, related nomadic users often perform similar tasks and share the same computing infrastructure.This means that security of the shared resources is of prime importance.Frequent delegation of tasks among users must be anticipated as most nomadic environments...... are hectic and very dynamic. A delegation mechanism with a slightly complicated user interface will not only reduce the productivity but also provide nomadic users with a strong motivation to circumvent the mechanism itself. Delegation in access control domain is not practical for the most of nomadic users...... due to its complicated and complex structure. Identity delegation at authentication level provides improved usability, which reduces the risk of circumventing the delegation mechanism; at the same time, however, identity delegation violates the principle of least privileges. We use contextual...

  5. Eriksonian Identity Theory in Counterterrorism

    Directory of Open Access Journals (Sweden)

    Cally O'Brien

    2010-01-01

    Full Text Available Certain terrorists come from unexpected backgrounds. They give up comfortable lives and opportunities in order to wage jihad. Their existence has puzzled various theorists since they came to light. This article will explain how a theory of psychosocial identity formation created by Erik Erikson and his student James Marcia may explain this phenomenon. It will also explain how Erikson's theoretical legacy has contributed to current attempts at increasing moderation in the Middle East through education. Many of those attempts reflect ideas that are drawn from Eriksonian theory, although they are not typically described in Eriksonian terms. Meanwhile, while some theorists have considered the applications of various aspects of Eriksonian theory, especially negative identity, to terrorism few have focused on radical Islam or evaluated specific biographies against Marcia's additions to the framework.

  6. About identities: What is "hinchada"?

    Directory of Open Access Journals (Sweden)

    Daniel Zambaglione

    2008-11-01

    Full Text Available This text belongs to Chapter I of the master's hesis "The endurance in the body" Building identity of the fans of a club of Argentine football. Such work investigation was developing on a predominantly qualitative approach, involve different methods such as e-depth interviews, participant observation and not a participant and focus groups. In this chapter, we will present to the fans, their practices and performances. Showing the subjects and their actions. , Exhibiting the main mechanisms of association to the group "The stamina." Also, as it conforms rebuild on the one hand as a symbol of prestige and honor. And for another, as one of the most important factors in the formation of identity, understood this from a position constructivita traveling in reverse strict sense of the essential sights

  7. Othering, identity formation and agency

    Directory of Open Access Journals (Sweden)

    Sune Qvotrup Jensen

    2011-10-01

    Full Text Available The article examines the potentials of the concept of othering to describe identity formation among ethnic minorities. First, it outlines the history of the concept, its contemporary use, as well as some criticisms. Then it is argued that young ethnic minority men in Denmark are subject to intersectional othering, which contains elements of exoticist fascination of the other. On the basis of ethnographic material, it is analysed how young marginalized ethnic minority men react to othering. Two types of reactions are illustrated: 1 capitalization on being positioned as the other, and 2 refusing to occupy the position of the other by disidentification and claims to normality. Finally, it is argued that the concept of othering is well suited for understanding the power structures as well as the historic symbolic meanings conditioning such identity formation, but problematic in terms of agency.

  8. Fannish tattooing and sacred identity

    Directory of Open Access Journals (Sweden)

    Bethan Jones

    2015-03-01

    Full Text Available Pleasure is an important motivation for fans to adopt texts. Fannish tattoos function to demonstrate affective investments in a text; they are also a performance of fandom and an example of sacred fan identity. Like engaging in cosplay or wearing clothing that features logos, fannish tattoos mark people as fans of a text. Furthermore, the more obscure the logo or fannish reference, the more performative the tattoo. Fannish tattoos help to construct a sacred fan identity. The sacred experience (as theorized by Émile Durkheim and his concept of the totem is imbued with meaning through choices that set it aside from the mundane. Within the context of fannish tattoos, fan affect gains similar significance.

  9. Oncolytic Viruses: Therapeutics With an Identity Crisis.

    Science.gov (United States)

    Breitbach, Caroline J; Lichty, Brian D; Bell, John C

    2016-07-01

    Oncolytic viruses (OV) are replicating viral therapeutics for the treatment of cancer and have been in laboratory development for about twenty years. Recently, the FDA approved Imlygic, a herpes virus based therapeutic for the treatment of melanoma and thus OVs have entered a new era where they are a weapon in the armament of the oncologist. OVs are unique therapeutics with multiple mechanisms of therapeutic activity. The exact path for their development and eventual uptake by pharmaceutical companies is somewhat clouded by an uncertain identity. Are they vaccines, tumour lysing therapeutics, inducers of innate immunity, gene therapy vectors, anti-vascular agents or all of the above? Should they be developed as stand-alone loco-regional therapeutics, systemically delivered tumour hunters or immune modulators best tested as combination therapeutics? We summarize data here supporting the idea, depending upon the virus, that OVs can be any or all of these things. Pursuing a "one-size fits all" approach is counter-productive to their clinical development and instead as a field we should build on the strengths of individual virus platforms. Copyright © 2016 The Authors. Published by Elsevier B.V. All rights reserved.

  10. Oncolytic Viruses: Therapeutics With an Identity Crisis

    Directory of Open Access Journals (Sweden)

    Caroline J. Breitbach

    2016-07-01

    Full Text Available Oncolytic viruses (OV are replicating viral therapeutics for the treatment of cancer and have been in laboratory development for about twenty years. Recently, the FDA approved Imlygic, a herpes virus based therapeutic for the treatment of melanoma and thus OVs have entered a new era where they are a weapon in the armament of the oncologist. OVs are unique therapeutics with multiple mechanisms of therapeutic activity. The exact path for their development and eventual uptake by pharmaceutical companies is somewhat clouded by an uncertain identity. Are they vaccines, tumour lysing therapeutics, inducers of innate immunity, gene therapy vectors, anti-vascular agents or all of the above? Should they be developed as stand-alone loco-regional therapeutics, systemically delivered tumour hunters or immune modulators best tested as combination therapeutics? We summarize data here supporting the idea, depending upon the virus, that OVs can be any or all of these things. Pursuing a “one-size fits all” approach is counter-productive to their clinical development and instead as a field we should build on the strengths of individual virus platforms.

  11. Autonoesis and dissociative identity disorder.

    Science.gov (United States)

    Morton, John

    2018-01-01

    Dissociative identity disorder is characterised by the presence in one individual of two or more alternative personality states (alters). For such individuals, the memory representation of a particular event can have full episodic, autonoetic status for one alter, while having the status of knowledge or even being inaccessible to a second alter. This phenomenon appears to create difficulties for a purely representational theory and is presented to Mahr & Csibra (M&C) for their consideration.

  12. Social Psychological Debates about Identity

    OpenAIRE

    Jaspal, Rusi

    2013-01-01

    We live in an ever-changing social world, which constantly calls forth changes to our identities and actions. Advances in science, technology and medicine, political upheaval, and economic development are just some examples of social change that can impact upon how we live our lives, how we view ourselves and each other, and how we communicate. Social change can result in the salience and visibility of particular social categories, changes in the assimilation, accommodation and evaluation of ...

  13. Arla and Danish National Identity

    DEFF Research Database (Denmark)

    Mordhorst, Mads

    2014-01-01

    into modernity that is more democratic than the traditional process of industrialisation seen in other European countries. Thus the narrative of the co-operatives has become part of Danish memory and identity. In the post-war years, however, and especially in the last two decades, the process of globalisation...... on a cultural-historical framework, narrative theory and Pierre Nora's notion of memory....

  14. Music teacher identity and professionalism

    DEFF Research Database (Denmark)

    Holgersen, Sven-Erik

    2017-01-01

    The present article is concerned with transformative learning and identity formation in student music teachers acting as researchers of a music education practice as part of their MA study programme. More specific, the aim is to discuss how engaging in a research perspective may serve as an eye......-opener for student music teachers and widen their perspective on subject didactics, teaching/learning issues and professional practice....

  15. Foreign language didactics: Identity questions

    OpenAIRE

    Michaela Píšová

    2011-01-01

    The efforts to emancipate foreign language didactics have been an ongoingand non-linear process launched in our country in the 50s of the previous century.Its key aspects may be presented as foreign language didactics identity questions.These include explicit delineation of the object and methodology of foreign languagedidactics on the basis of developmental analysis, current state of knowledge andtrends/approaches to the discipline. The issues related to the full-fledged scientificstatus of ...

  16. integrated identity and integrated identity and access management

    African Journals Online (AJOL)

    eobe

    processes, provides medical service data mining functionality and offers examination screening module which checks students into examination centres checks students into examination centres by cross-referencing database enrolment with course registration status. referencing database enrolment with course registration ...

  17. Identity vicissitudes in work organizations

    Directory of Open Access Journals (Sweden)

    Giovanni Di Stefano

    2014-10-01

    Full Text Available Today’s pressing scientific and technological changes, while having an impact on the organizational life of our post-industrial world, are producing drastic transformations within organizations, creating in workers new feelings of anxiety and uncertainty. The features of the present state of crises - instability, uncertainty, weakening of family bonds – define a peculiar social and psychological uneasiness, proper of our time, as a consequence of the technological business culture prevailing today, which is destabilizing the institutional role of organizations, namely fixing the various forms of personal identity. This contribution offers, also by presenting a training experience in a business setting, a critical psycho-socio-analysis of the roles that individuals and organizations must presently face to foster development and, at the same time, provides directions to avoid the perverse drift of today’s culture and promote the identity process through the reactivation of the learning/changing capacity aimed at the definition of new shared meanings.Keywords: Identity; Organization; Psycho-socio-analysis

  18. Identity vicissitudes in work organizations

    Directory of Open Access Journals (Sweden)

    Giovanni Di Stefano

    2014-09-01

    Full Text Available Today’s pressing scientific and technological changes, while having an impact on the organizational life of our post-industrial world, are producing drastic transformations within organizations, creating in workers new feelings of anxiety and uncertainty. The features of the present state of crises - instability, uncertainty, weakening of family bonds – define a peculiar social and psychological uneasiness, proper of our time, as a consequence of the technological business culture prevailing today, which is destabilizing the institutional role of organizations, namely fixing the various forms of personal identity. This contribution offers, also by presenting a training experience in a business setting, a critical psycho-socio-analysis of the roles that individuals and organizations must presently face to foster development and, at the same time, provides directions to avoid the perverse drift of today’s culture and promote the identity process through the reactivation of the learning/changing capacity aimed at the definition of new shared meanings.Keywords: identity, organization, psycho-socio-analysis

  19. Gender Identity as Sociocultural Determinant of Shyness

    Directory of Open Access Journals (Sweden)

    G N Kameneva

    2014-12-01

    Full Text Available The article is devoted to gender identity as a factor of shyness and displays the results of the empirical studies of gender identity and shyness in the Serbian and Russian students.

  20. Retirees' social identity and satisfaction with retirement.

    Science.gov (United States)

    Michinov, Estelle; Fouquereau, Evelyne; Fernandez, Anne

    2008-01-01

    The purpose of this study was to examine the structure of retirees' social identity and its impact on satisfaction with retirement. From social identity theory formulations, we assumed that (1) retiree-identity was comprised of three distinct components (cognitive, evaluative, and affective), and (2) only the affective component would play a role in satisfaction with retirement. Results of the present study conducted with 154 retired people in France revealed only two components of social identity: a cognitive identity which refers to self-categorization as "retired people", and an affective identity which refers to evaluation of the group and affective involvement. As expected, regression analyses results indicated that only affective identity was a predictor of satisfaction with retirement. These results will be discussed in the framework of social identity theory literature.

  1. Reflections on music and identity in Ethnomusicology

    Directory of Open Access Journals (Sweden)

    Rajs Timoti

    2007-01-01

    Full Text Available The relationship between music and identity became a commonplace theme in ethnomusicology beginning in the early 1980s. This article surveys all 17 articles published in the journal Ethnomusicology in the last 25 years with the word ′identity′ in the title in order to understand how ethnomusicologists have treated this subject. The survey reveals that the authors of these articles neither cite the general literature on identity nor one another. As a consequence, this article takes on the task of analyzing the ethnomusicological literature around basic questions found in the general literature, including what is identity, where does identity come from, how many identities do we possess, how is identity created, and who defines and institutionalizes identity. It concludes with some reflections on what music contributes to the construction and symbolization of identity.

  2. Fuzzy Identities and Attribute-Based Encryption

    Science.gov (United States)

    Sahai, Amit; Waters, Brent

    We introduce a new type of Identity-Based Encryption (IBE) scheme that we call Fuzzy Identity-Based Encryption. In fuzzy IBE, we view an identity as a set of descriptive attributes. A fuzzy IBE scheme allows for a private key for an identity,ωù, to decrypt a ciphertext encrypted with an identity, ùω´, if and only if the identities ùω and ùω´are close to each other as measured by the "set overlap" distance metric. A fuzzy IBE scheme can be applied to enable encryption using biometric inputs as identities; the error-tolerance property of a fuzzy IBE scheme is precisely what allows for the use of biometric identities, which inherently will have some noise each time they are sampled. Additionally, we show that fuzzy IBE can be used for a type of application that we term "attribute-based encryption."

  3. The Risky Path to a Followership Identity

    DEFF Research Database (Denmark)

    Larsson, Magnus; Nielsen, Mie Femø

    2017-01-01

    Followership research has increased recently, but little attention has been paid to the complexities and challenges of creating a followership identity. Researchers typically portray followership as a safe alternative to leadership identity, but we challenge this assumption by using naturally...

  4. Identity and power in Ukraine

    Directory of Open Access Journals (Sweden)

    Karina V. Korostelina

    2013-01-01

    Full Text Available This paper analyzes the coercive and legitimate forms of power in Ukraine. It describes the crisis of legitimacy in Ukraine as a contradiction between a blatantly cruel system of capitalism dominated by a few oligarchs, and the lingering remnants of a Soviet mentality. Two strategies are used by the Government to stoke the crisis. First, increased identification with ethnic or regional groups are instrumentally used by the Government to take attention from economic and class issues. Second, the incorporation of a Soviet meaning of power into the new national identity and presentation of it as core norms, believes, and values of the people of Ukraine competes with alternative Ukrainian identity concepts. The paper analyzes five main features of the Soviet meanings of power – political, social, and economic paternalism, perception of power as source of profit and violence, and the dual reality of power with the gap between official narratives of power and a real life. The process of incorporation of the Soviet concept of power into national identity is facilitated by the process of national identity formation that helped to preserve the Soviet perception of power, because of the absence of a new ideology, a lack of critical assessment of the Soviet past, an absence of the vision of outcome, an embryonic culture of democracy, and contributions of all the presidents to the preservation of the Soviet meaning of power. People justify the system as legitimate and fair for many reasons: out of historic habit and deemed moral obligations, self-interests and/or a fear of sanctions, identification with the ruler, zones of indifference, an absence of will and self-confidence, desire to support a strong leader based on ambiguity intolerance, hierarchy – enhancing ideologies, and a general tolerance of injustice. The obedience of subjects is connected with the strength of will of the subjects and the social structures of the society. In Ukraine, the

  5. Christian identity of secular Europe

    Directory of Open Access Journals (Sweden)

    Malešević Miroslava

    2006-01-01

    Full Text Available The Jyllands-Posten Muhammad cartoons controversy began after twelve editorial cartoons, most of which depicted the Islamic prophet Muhammad, were published in the Danish newspaper Jyllands-Posten on September 30, 2005. The newspaper explained that this publication was a contribution to debate regarding criticism of Islam and self-censorship. In response, Danish Muslim organizations held public protests and spread knowledge of Jyllands-Postens publication. As the controversy grew, some or all of the cartoons were reprinted in newspapers in more than fifty other countries, which led to violent protests, particularly in the Muslim world. Critics of the cartoons describe them as islamophobic and argue that they are blasphemous, intended to humiliate a marginalized Danish minority, and a manifestation of ignorance about the history of western imperialism, from colonialism to the current conflicts in the Middle East. Supporters of the cartoons claim they illustrate an important issue in an age of Islamic extremist terrorism and that their publication is a legitimate exercise of the right of free speech. They also note that similar cartoons about other religions are frequently printed, arguing that the followers of Islam were not targeted in a discriminatory way. The dispute has again pointed out to the relevance of religion and religious differences in the contemporary world. Again, several questions presented themselves as significant: citizen freedom, values and the rights to exercise them, secularism, tolerance, multiculturalism majority-minority relationships and so on. The resolution to these issues appears as of the outmost importance, considering the existing tendencies of united Europe to even more firmly establish cultural, economic, and political associations, in order to launch a one, joined European identity with vanishing national, ethnic and religious differences. Therefore, the question becomes: what could serve as a foundation for

  6. Perception, experience and body identity.

    Science.gov (United States)

    López-Ibor, Juan J; Ortiz, Tomás; López-Ibor, María I

    2011-12-01

    Physician has to know the patient in the disease and not only the disease in the patient, from the dual perspective of the body as object and the body as subject. This also affects the patient who has to cope with the reality of having a body that bursts into the subject's consciousness as a vital threat, as source of discomfort and inability and being a body (Marcel). The human body in its dual aspect has been and is a great unknown, if not a great outrage in spite of the fact that we are our body and our body is each of us. We sometimes do not feel as we are and thus a confrontation arises, sometimes more normal, others more morbid. This forces the physician to face complex ethics considerations and the scientist to accept a personal identity disorder. Dualism considers that there are two substances in us, one that distinguishes us from other beings and from the rest of the individuals of the human species, the soul, the psychic life, mind or consciousness, and another more insubstancial one, the body. The aim of the first substance is to dominate the body, to survive it after death when it is, already a corpse is meant to become putrefied, is buried, incinerated or thrown to the depth of the sea. This dualism aims to explain the origin of the evil and the attitude to defeat it and it does so efficiently. This anthropology has very ancient roots (the Upvanishads, in the orphic texts, in Plato), it is the core of Gnostic thought and the foundation of the modern science since Descartes. Some monist perspectives are a masked dualism or a mereologic fallacy, according to which, the brain is conscious, when that what is conscious is the subject, although the subject, with the brain could not be conscious. Therefore, a new perspective is proposed, chiasmatic or janicular monism, that considers the adaptive value of focusing on the reality from two perspectives, as physical universe and the world of interpersonal relationships. In the agnosias and in the phantom limb

  7. 'Hidden identities': perceptions of sexual identity in Beijing.

    Science.gov (United States)

    Miles-Johnson, Toby; Wang, Yurong

    2017-07-08

    This article draws upon responses given by volunteers who work in the Beijing LGBT Centre regarding perceptions of sexual identity, and how Chinese culture affects hidden or open sexual identities of Chinese lesbian and gay people in this region. The insights gained from those working carefully to create social change offers an important and original contribution to the field of gay and lesbian studies in China. The findings indicate the volunteers at the Beijing LGBT Centre are frustrated by the lack of acceptance of non-heterosexual relationships among Chinese culture and society, and by the disregard of lesbian gay and bisexual (LGB) people by the Chinese government. The findings also illustrate stigmatization of homosexuality in China is enacted in structural terms (such as in the lack of policy, legislation and positive endorsement by governmental and socio-political organizations), public expression (such as negative attitudes, beliefs or reactions towards LGB people) and internalized repression (through fear of stigmatization, and subsequent abuse due to negative societal attitudes and discrimination). Influenced by the Chinese tradition of conforming to group values, the findings from this study show that volunteers at the Beijing LGBT Centre believe LGB people in China are generally hesitant to disclose their sexual identities, and reject the idea that there had been a collective shift in Chinese culture regarding increased acceptance of LGB people. It also finds volunteers at the LGBT Centre in Beijing blame Chinese culture for its lack of acceptance of non-heterosexual relationships, and state stigmatization of homosexuality in China is due to deep-rooted cultural homophobia. © London School of Economics and Political Science 2017.

  8. Corporate Brand Identity Development in SMEs

    DEFF Research Database (Denmark)

    Gyrd-Jones, Richard; Törmälä, Minna

    2016-01-01

    We study the interactive narratives that underpin the emergence of corporate brand identity in new venture SMEs. We apply a process perspective that considers the complex interactions between layers of identities and sense-making in and around the organisation in the stakeholder eco-system. We...... propose a typology of brand identity drivers that reflects a co-creative approach to the emergence of brand identity....

  9. Competition and Social Identity in the Workplace

    DEFF Research Database (Denmark)

    Kato, Takao; Shu, Pian

    2016-01-01

    We study the impact of social identity on worker competition by exploiting the well-documented social divide between urban resident workers and rural migrant workers in urban Chinese firms. We analyze data on weekly output, individual characteristics, and coworker composition for all weavers...... identity, but not against those sharing her own identity. The results are mainly driven by urban weavers competing aggressively against rural coworkers. Our results highlight the important role of social identity in mitigating or enhancing competition....

  10. Reorienting Deliberation: Identity Politics in Multicultural Societies

    Directory of Open Access Journals (Sweden)

    Rebecca Mason

    2010-03-01

    Full Text Available Many political theorists argue that cross-cultural communication within multicultural democracies is not best served by a commitment to identity politics. In response, I argue that identity politics only interfere with democratic participation according to an erroneous interpretation of the relationship between identity and reasoning. I argue that recognizing the importance of identity to the intelligibility of reasons offered in the context of civic deliberation is the first step towards the kind of dialogue that democratic participation requires.

  11. 21 CFR 701.11 - Identity labeling.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 7 2010-04-01 2010-04-01 false Identity labeling. 701.11 Section 701.11 Food and... COSMETIC LABELING Package Form § 701.11 Identity labeling. (a) The principal display panel of a cosmetic in package form shall bear as one of its principal features a statement of the identity of the commodity. (b...

  12. Negotiation of identities in intercultural communication

    Directory of Open Access Journals (Sweden)

    Janík Zdeněk

    2017-01-01

    Full Text Available Negotiation of identities in communication entails affirming the identities we want others to recognize in us and ascription of identities we mutually assign to each other in communication. The study of intercultural communication focuses on cultural identity as the principal identity component that defines intercultural communication. In this article, the assumption that cultural group membership factors determine the context of intercultural communication is questioned. The article examines how intercultural interlocutors negotiate their identities in various intercultural interactions. The aims of the research presented in this paper are: 1 to examine which identities - cultural, personal, or social - intercultural interlocutors activate in intercultural communication; 2 to determine whether interlocutors’ intercultural communication is largely influenced by their cultural identities; 3 and to identify situations in which they activate their cultural identities (3. The research data were collected from 263 international students studying at Masaryk University in Brno in the years 2010 - 2016. Although the research results are not conclusive, they indicate that cultural identities predominate in the students’ ethnocentric views and that stereotypes constrain the students’ cultural identities and affect the negotiation of identities in intercultural communication.

  13. Toward the Theoretical Measurement of Ethnic Identity

    Science.gov (United States)

    Pegg, Phillip O.; Plybon, Laura E.

    2005-01-01

    The purpose of this study was to examine the psychometric qualities of two theoretical subscales of the Multigroup Ethnic Identity Measure (MEIM), Ethnic Identity Exploration and Ethnic Identity Commitment, that have been supported in research with early adolescent samples. The study was conducted to further validate the MEIM as a two-factor…

  14. Retirees' Social Identity and Satisfaction with Retirement

    Science.gov (United States)

    Michinov, Estelle; Fouquereau, Evelyne; Fernandez, Anne

    2008-01-01

    The purpose of this study was to examine the structure of retirees' social identity and its impact on satisfaction with retirement. From social identity theory formulations, we assumed that (1) retiree-identity was comprised of three distinct components (cognitive, evaluative, and affective), and (2) only the affective component would play a role…

  15. Recovering core identity, hermeneutical and contextual preaching

    African Journals Online (AJOL)

    2016-07-08

    Jul 8, 2016 ... identity – certainly when it answers the questions 'who are we?' and 'what are we called to be and/or do' – it lacks significantly in its missional identity. Contributing factors are mentioned and remedial action is proposed. Recovering core identity, hermeneutical and contextual preaching. Read online:.

  16. Changes in Postmortem Identity and Grief.

    Science.gov (United States)

    Doka, Kenneth J

    2017-01-01

    This article reviews the concept of postmortem identity, noting its relationships to other concepts such as relational trauma. Identity is a very fluid concept that can change even after an individual's death as new information becomes available or even as social values change. Such modifications of postmortem identity can affect the course of bereavement-complication reactions to loss.

  17. 21 CFR 610.14 - Identity.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 7 2010-04-01 2010-04-01 false Identity. 610.14 Section 610.14 Food and Drugs... BIOLOGICAL PRODUCTS STANDARDS General Provisions § 610.14 Identity. The contents of a final container of each filling of each lot shall be tested for identity after all labeling operations shall have been completed...

  18. On an extension of a combinatorial identity

    Indian Academy of Sciences (India)

    Using Frobenius partitions we extend the main results of [4]. This leads to an infinite family of 4-way combinatorial identities. In some particular cases we get even 5-way combinatorial identities which give us four new combinatorial versions of Göllnitz–Gordon identities.

  19. 40 CFR 725.85 - Microorganism identity.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 30 2010-07-01 2010-07-01 false Microorganism identity. 725.85 Section... to Information § 725.85 Microorganism identity. (a) Claims applicable to the period prior to... specific microorganism identity at the time of submission of the information. This claim will apply only to...

  20. 40 CFR 720.85 - Chemical identity.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 30 2010-07-01 2010-07-01 false Chemical identity. 720.85 Section 720... PREMANUFACTURE NOTIFICATION Confidentiality and Public Access to Information § 720.85 Chemical identity. (a... submits information to EPA under this part may assert a claim of confidentiality for the chemical identity...

  1. Career Identity among Community College Students

    Science.gov (United States)

    Stringer, Kate J.; Kerpelman, Jennifer L.

    2014-01-01

    Career identity development is salient in adolescence and young adulthood, but little research has assessed career identity in populations other than four-year college students. Context should be considered when examining career identity, and to address this gap in the literature, the current study examined the extent to which parental support for…

  2. Questions of Identity and Self Determination

    DEFF Research Database (Denmark)

    Dybbroe, Susanne

    1996-01-01

    This essay on Inuit identity seeks to describe identity in terms of individual experience and of collective processes. These two elements are subsequently put into relation with the political situation of contemporary Inuit, particularly with their quest for self-determination. The author concludes...... that the maintenance of cultural identity is a process related to symbolic control....

  3. Local identities involving Jacobi elliptic functions

    Indian Academy of Sciences (India)

    cyclic identities. Second, we obtain a generalization to cyclic identities in which successive terms have a multiplicative phase factor exp(2iπ/s), where s is any integer. Third, we systematize the local identities by ...... [3] I S Gradshteyn and I M Ryzhik, Table of integrals, series and products (Academic. Press, New York, 1980).

  4. American Identity in the USA: Youth Perspectives

    Science.gov (United States)

    Jahromi, Parissa

    2011-01-01

    National identity, how one sees oneself as a member of a given nation, is an important form of social identity. Feelings toward one's country are a matter of both individual and collective concern. In an increasingly diverse world, the issue of identifying with a nation is complex and consequential for individual identity formation as well as…

  5. Under Construction (Identities, Communities and Visual Overkill)

    NARCIS (Netherlands)

    S.J. Magala (Slawomir)

    2001-01-01

    textabstractMost of modern identities emerge from mediated interactions in public and virtual spaces. There are no acknowledged authorities to watch over organizational identities and grant them legitimacy. These identities are renegotiated in real and virtual communities, often carry a permanent

  6. Gender, Legitimation, and Identity Verification in Groups

    Science.gov (United States)

    Burke, Peter J.; Stets, Jan E.; Cerven, Christine

    2007-01-01

    Drawing upon identity theory, expectation states theory, and legitimation theory, we examine how the task leader identity in task-oriented groups is more likely to be verified for persons with high status characteristics. We hypothesize that identity verification will be accomplished more readily for male group members and legitimated task leaders…

  7. Pre-Service Teacher Cultural Identity Development

    Science.gov (United States)

    Cunningham, Maurella Louise

    2013-01-01

    The main purpose of this study is to conduct exploratory qualitative research to investigate how PSTs and practicing teachers experience cultural and racial identity development or changes in identity. Rather than examine the "what" or contributors to identity development, I will explore the "how" or processes of identity…

  8. Ego Identity, Egocentrism, and Formal Operations.

    Science.gov (United States)

    Protinsky, Howard; Wilkerson, Jackie

    1986-01-01

    Examined the relationship between ego identity, formal operations, and egocentrism in adolescents. Results indicated significant positive correlations between ego identity and formal operations and between ego identity and grade in school. Grade in school explained 21 percent of the variance while formal operational thinking, egocentrism, and sex…

  9. Identity formation in the New Testament

    OpenAIRE

    Markus Cromhout

    2009-01-01

    This article is a review of the book entitled Identity Formation in the New Testament (edited by Bengt Holmberg and Mikael Winninge, Mohr Siebeck, Tübingen, 2008). It is a collection of various articles using intertextuality, literary theory (and social identity approaches), gender studies and postcolonial theory when investigating identity formation in the New Testament.

  10. Developing a Leadership Identity: A Grounded Theory

    Science.gov (United States)

    Komives, Susan R.; Owen, Julie E; Longerbeam, Susan D.; Mainella, Felicia C.; Osteen, Laura

    2005-01-01

    This grounded theory study on developing a leadership identity revealed a 6-stage developmental process. The thirteen diverse students in this study described their leadership identity as moving from a leader-centric view to one that embraced leadership as a collaborative, relational process. Developing a leadership identity was connected to the…

  11. The Development of Ethnic Identity during Adolescence

    Science.gov (United States)

    French, Sabine Elizabeth; Seidman, Edward; Allen, LaRue; Aber, J. Lawrence

    2006-01-01

    The development of ethnic identity is a critical facet of adolescence, particularly for adolescents of color. In order to examine the developmental trajectory of ethnic identity, African American, Latino American, and European American early and middle adolescents (N=420) were assessed over 3 years. Two components of ethnic identity were…

  12. 86 NATIONAL IDENTITY VERSUS SOCIAL COHESION: AN ...

    African Journals Online (AJOL)

    User

    Again, Olaoye quoting. Solanke states that “the most effective engine of a people's culture is their mother tongue. Indigenous languages are treasures of our culture and self identity; in other words, it is the indicator of history and self identification” (p. 50). Here, the author sees self identity and by extension national identity ...

  13. Centripetal modules and ancient introns.

    Science.gov (United States)

    Roy, S W; Nosaka, M; de Souza, S J; Gilbert, W

    1999-09-30

    We have created an algorithm which instantiates the centripetal definition of modules, compact regions of protein structure, as introduced by Go and Nosaka (M. Go and M. Nosaka, 1987. Protein architecture and the origin of introns. Cold Spring Harbor Symp. Quant. Bio. 52, 915-924). That definition seeks the minima of a function that sums the squares of C-alpha carbon distances over a window around each amino acid residue in a three-dimensional protein structure and identifies such minima with module boundaries. We analyze a set of 44 ancient conserved proteins, with known three-dimensional structures, which have intronless homologues in bacteria and intron-containing homologues in the eukaryotes, with a corresponding set of 988 intron positions. We show that the phase zero intron positions are significantly correlated with the module boundaries (p = 0.0002), while the intron positions that lie within codons, in phase one and phase two, are not correlated with these 'centripetal' module boundaries. Furthermore, we analyze the phylogenetic distribution of intron positions and identify a subset of putatively 'ancient' intron positions: phase zero positions in one phylogenetic kingdom which have an associated intron either in an identical position or within three codons in another phylogenetic kingdom (a notion of intron sliding). This subset of 120 'ancient' introns lies closer to the module boundaries than does the full set of phase zero introns with high significance, a p-value of 0.008. We conclude that the behavior of this set of introns supports the prediction of a mixed theory: that some introns are very old and were used for exon shuffling in the progenote, while many introns have been lost and added since.

  14. The Construction of the ‘Self’ in Mark Twain's The Innocents Abroad: 'The Positional Superiority' of the American Identity in the Nineteenth-century Travel Narrative

    Directory of Open Access Journals (Sweden)

    Fatin AbuHilal

    2014-10-01

    Full Text Available An analysis of Mark Twain's The Innocents Abroad with its emphasis on cultural representations in the American culture, touches very significantly upon the question of the rising of the American identity and its connection with the American Travel Narrative in the nineteenth century. While it is believed that the novel produces "pure" "true knowledge”, or "a neutral exercise" of basic facts and realties, we argue that Twain’s narrative entails a genre of political knowledge that is premised on the basic requirement of self/other constructions. The ideological apparatus of Americanized emerging identity, nationalism, power and authority are fundamental issues in the Twains narrative. Furthermore, it is not only the personal motif that is the basis of Twain's The Innocents Abroad, as he claims in his preface, nor is it a "Great Pleasure Excursion," as he pretends.  The novel structures relations according to the rising American norms and values in the nineteenth century clearly acquired and absorbed by the American travelers in The Innocents Abroad. It also subscribes to the complication of the American character in order to develop, process and reconstruct cultural relations in the narrative. In this sense, we argue that Twain's narrative raises discursive ideological questions about the rising of the American national identity and its connection with other cultural components, the Oriental, in particular.

  15. Comparative Associations Between Achieved Bicultural Identity, Achieved Ego Identity, and Achieved Religious Identity and Adaptation Among Australian Adolescent Muslims.

    Science.gov (United States)

    Abu-Rayya, Hisham M; Abu-Rayya, Maram H; White, Fiona A; Walker, Richard

    2017-01-01

    This study examined the comparative roles of biculturalism, ego identity, and religious identity in the adaptation of Australian adolescent Muslims. A total of 504 high school Muslim students studying at high schools in metropolitan Sydney and Melbourne, Australia, took part in this study which required them to complete a self-report questionnaire. Analyses indicated that adolescent Muslims' achieved religious identity seems to play a more important role in shaping their psychological and socio-cultural adaptation compared to adolescents' achieved bicultural identity. Adolescents' achieved ego identity tended also to play a greater role in their psychological and socio-cultural adaptation than achieved bicultural identity. The relationships between the three identities and negative indicators of psychological adaptation were consistently indifferent. Based on these findings, we propose that the three identity-based forces-bicultural identity development, religious identity attainment, and ego identity formation-be amalgamated into one framework in order for researchers to more accurately examine the adaptation of Australian adolescent Muslims.

  16. Module theory, extending modules and generalizations

    CERN Document Server

    Tercan, Adnan

    2016-01-01

    The main focus of this monograph is to offer a comprehensive presentation of known and new results on various generalizations of CS-modules and CS-rings. Extending (or CS) modules are generalizations of injective (and also semisimple or uniform) modules. While the theory of CS-modules is well documented in monographs and textbooks, results on generalized forms of the CS property as well as dual notions are far less present in the literature. With their work the authors provide a solid background to module theory, accessible to anyone familiar with basic abstract algebra. The focus of the book is on direct sums of CS-modules and classes of modules related to CS-modules, such as relative (injective) ejective modules, (quasi) continuous modules, and lifting modules. In particular, matrix CS-rings are studied and clear proofs of fundamental decomposition results on CS-modules over commutative domains are given, thus complementing existing monographs in this area. Open problems round out the work and establish the...

  17. Racial Identity Attitudes and Ego Identity Statuses in Dominican and Puerto Rican College Students

    Science.gov (United States)

    Sanchez, Delida

    2013-01-01

    This study explored the relation between racial identity attitudes and ego identity statuses in 94 Dominican and Puerto Rican Latino college students in an urban public college setting. Simultaneous regression analyses were conducted to test the relation between racial identity attitudes and ego identity statuses, and findings indicated that…

  18. Cultural Mistrust, Ethnic Identity, Racial Identity, and Self-Esteem among Ethnically Diverse Black University Students.

    Science.gov (United States)

    Phelps, Rosemary E.; Taylor, Janice D.; Gerard, Phyllis A.

    2001-01-01

    Examines cultural mistrust, ethnic identity, racial identity, and self-esteem among Black university students (N=160). African American students' scores were statistically different from those of African and West Indian/Caribbean students on cultural mistrust, racial identity, and ethnic identity measures. There were no statistically significant…

  19. Corporate visual identity: a case in hospitals.

    Science.gov (United States)

    Alkibay, Sanem; Ozdogan, F Bahar; Ermec, Aysegul

    2007-01-01

    This paper aims to present a perspective to better understand corporate identity through examining the perceptions of Turkish patients and develop a corporate visual identity scale. While there is no study related to corporate identity research on hospitals in Turkey as a developing country, understanding consumer's perceptions about corporate identity efforts of hospitals could provide different perspectives for recruiters. When the hospitals are considered in two different groups as university and state hospitals, the priority of the characteristics of corporate visual identity may change, whereas the top five characteristics remain the same for all the hospitals.

  20. The insignificance of personal identity for bioethics.

    Science.gov (United States)

    Shoemaker, David

    2010-11-01

    It has long been thought that certain key bioethical views depend heavily on work in personal identity theory, regarding questions of either our essence or the conditions of our numerical identity across time. In this paper I argue to the contrary, that personal identity is actually not significant at all in this arena. Specifically, I explore three topics where considerations of identity are thought to be essential - abortion, definition of death, and advance directives - and I show in each case that the significant work is being done by a relation other than identity. © 2009 Blackwell Publishing Ltd.

  1. [Dissociative identity disorder or schizophrenia?].

    Science.gov (United States)

    Tschöke, S; Steinert, T

    2010-01-01

    We present a case of dissociative identity disorder in which Schneiderian first rank symptoms were present besides of various states of consciousness. Thus the diagnosis of schizophrenia had to be considered. Formally, the symptoms met ICD-10 criteria for schizophrenia. However, taking into account the lack of formal thought disorder and of negative symptoms as well as a typical history of severe and prolonged traumatisation, we did not diagnose a co-morbid schizophrenic disorder. There is good evidence for the existence of psychotic symptoms among patients with dissociative disorders. However, in clinical practice this differential diagnosis is rarely considered.

  2. Microsoft Windows Identity Foundation Cookbook

    CERN Document Server

    Chanda, Sandeep

    2012-01-01

    This book is written in a simple, easy to understand format, with lots of screenshots and step-by-step explanations.If you are a .NET developer looking forward to building access control in your applications using claims-based identity, then this is the best guide for you. This book is also an excellent choice for professionals and IT administrators trying to enable Single Sign-On across applications within the enterprise, and in the cloud spanning interoperable platforms. No previous knowledge on the subject is necessary, however a strong foundation in the C# programming language and .NET Fra

  3. Fighters, Girls and Other Identities

    DEFF Research Database (Denmark)

    Madsen, Lian Malai

    an analytically nuanced contribution to the study of contemporary sociolinguistic processes and identity practices. The author explores how the young participants negotiate their place in the social order, create and maintain friendship groups and relate to different social categories using the ecological......This book examines how young people at a martial arts club in an urban setting participate and interact in a recreational social community. The author relates analyses of their interactions to discussions of relevance to the sociology of sports, anthropology and education, ultimately providing...

  4. Christian identity of secular Europe

    Directory of Open Access Journals (Sweden)

    Malešević Miroslava

    2007-01-01

    Full Text Available Among other things, intensification of process of European integrations has imposed the need for realization and strengthening of common European cultural identity, that is for creating a new set of values, which would be common to all European citizens and which would be the basis for their permanent feeling of community and an experience of belonging to Europe as a common area. What are the chances of such a project since, on one hand, Islam is appearing in Europe as a religion that does not know secularity and, on the other hand, an important part of European inhabitants is showing the rise of anti-immigrant and , especially, anti-Islamic feelings, opposition to the presence of foreigners, fear of majorization and the loss of one's own identity and the values of European culture? The existing conflict with Islam is, most often, described as a conflict between secularized West where religion is a matter of private choice and religious (primarily Islamic world where religion is regulating every aspect of life. However, innumerable examples all around us (starting with the fact that the time is counted according to the Christian calendar, Christian holidays and iconography, Biblical myths, moral codes, architecture, toponims-to mention only few constantly reminds how much Christianity (primarily as a cultural tradition is strongly present in the lives of the secular Europeans, how much is that secular context in fact permeated with Christian story. Vestiges of that past, which are all around us, are not in fact perceived as a Christian story - in meeting with European secularism such recognition comes only to "others" to whom that story is not familiar. On what premises then can such a common forum be created on which all would really feel equally at home? In this work I will try to consider possible directions in which, considering the existing circumstances, Europe could move in search of the new common denominator. Since nations, according to

  5. Ectodermal dysplasia in identical twins

    Directory of Open Access Journals (Sweden)

    Gurkar Haraswarupa Puttaraju

    2013-01-01

    Full Text Available Hereditary hypohidrotic ectodermal dysplasia (HED is typically inherited as an X-linked recessive trait, characterized by deformity of at least two or more of the ectodermal structures - hair, teeth, nails and sweat glands. Two cases of hereditary HED involving identical male twins, is being documented for the rarity of its occurrence with special attention given to genetics, pathophysiology, clinical, intraoral manifestations and to the methods to improve the masticatory function, the facial esthetics and psychology of patients affected by this disease.

  6. Comparison of photovoltaic cell temperatures in modules operating with exposed and enclosed back surfaces

    Science.gov (United States)

    Namkoong, D.; Simon, F. F.

    1981-01-01

    Four different photovoltaic module designs were tested to determine the cell temperature of each design. The cell temperatures were compared to those obtained on identical design, using the same nominal operating cell temperature (NOCT) concept. The results showed that the NOCT procedure does not apply to the enclosed configurations due to continuous transient conditions. The enclosed modules had higher cell temperatures than the open modules, and insulated modules higher than the uninsulated. The severest performance loss - when translated from cell temperatures - 17.5 % for one enclosed, insulated module as a compared to that module mounted openly.

  7. Recognizing Moral Identity as a Cultural Construct.

    Science.gov (United States)

    Jia, Fanli; Krettenauer, Tobias

    2017-01-01

    Current research on moral identity shows that moral identity predicts moral action in Western cultures but not in non-Western cultures. The present paper argues that this may be due to the fact that the concept of moral identity is culturally biased. In order to remedy this situation, we argue that researchers should broaden their scopes of inquiry by adding a cultural lens to their studies of moral identity. This change is important because although some concept of moral identity likely exists in all cultures, it may function in different ways and at different levels in each place. We propose that moral identity is a context-dependent construct tied to varying social and cultural obligations. We argue that Western moral identity stresses an individually oriented morality, whereas, people from Eastern cultures consider a highly moral person to be societally oriented. We conclude by discussing the implications of this view for future research.

  8. Post-colonial identity in Greenland?

    DEFF Research Database (Denmark)

    Gad, Ulrik Pram

    2009-01-01

    In the gradual unravelling of Greenland’s colonial relationship to Denmark, an essentialist conceptualization of Greenlandic identity has played a significant role. However, both our scholarly understanding of post-colonial Greenlandic identity and the process towards independence for Greenland...... could be furthered by bringing politics back in. Based on a discourse analysis of the Greenlandic debate on language, this paper makes three claims: First, the identity projects promoted in Greenland are based on an essentialist conception of identity. Secondly, Greenlandic identity discourse combines...... elements of traditional Inuit culture and elements of colonial modernity. Thirdly, monolingual Greenlanders are those with the most to gain from abandoning the dichotomy of essentialist identities. Strategically, the paper suggests a post-post-colonial Greenlandic identity as a means of avoiding...

  9. Identities, social representations and critical thinking

    Science.gov (United States)

    López-Facal, Ramón; Jiménez-Aleixandre, María Pilar

    2009-09-01

    This comment on L. Simonneaux and J. Simonneaux paper focuses on the role of identities in dealing with socio-scientific issues. We argue that there are two types of identities (social representations) influencing the students' positions: On the one hand their social representations of the bears' and wolves' identities as belonging to particular countries (Slovenia versus France for bears, France and Italy for wolves), in other words, as having national identities; on the other hand representations of their own identities as belonging to the field of agricultural practitioners, and so sharing this socio-professional identity with shepherds and breeders, as opposed to ecologists. We discuss how these representations of identities influenced students' reasoning and argumentation, blocking in some cases the evaluation of evidence. Implications for developing critical thinking and for dealing with SSI in the classrooms are outlined.

  10. Co-creating Stakeholder and Brand Identities

    DEFF Research Database (Denmark)

    von Wallpach, Sylvia; Voyer, Benjamin; Kastanakis, Minas

    2017-01-01

    and from consumer to multi-stakeholder approaches in marketing, this special section develops a dynamic, process-oriented perspective on brand identity. Brand identity continuously emerges as a dynamic outcome of social processes of stakeholder interaction. Reciprocally, brand identity plays a potentially......This article introduces the special section on reciprocal co-creation of stakeholder and brand identities. Branding research and practice traditionally focus on the managerial creation and implementation of brand identity. Based on recent paradigmatic shifts from managerial to co-creative branding...... important role in ongoing interactive identity development processes of stakeholders. The special section contributes to deepening the understanding of this reciprocal co-creation of stakeholder and brand identities, through a series of conceptual and empirical articles. The Introduction reviews four...

  11. Perspectives on Sexual Identity Formation, Identity Practices, and Identity Transitions Among Men Who Have Sex With Men in India.

    Science.gov (United States)

    Tomori, Cecilia; Srikrishnan, Aylur K; Ridgeway, Kathleen; Solomon, Sunil S; Mehta, Shruti H; Solomon, Suniti; Celentano, David D

    2018-01-01

    Men who have sex with men (MSM) remain at high risk for HIV infection. Culturally specific sexual identities, encompassing sexual roles, behavior, and appearance, may shape MSM's experiences of stigmatization and discrimination, and affect their vulnerability to HIV. This multi-site qualitative study (n = 363) encompassing 31 focus group discussions (FGDs) and 121 in-depth interviews (IDIs) across 15 sites in India investigated sexual identity formation, identity practices, and transitions and their implications for HIV prevention. IDIs and FGDs were transcribed, translated, and underwent thematic analysis. Our findings document heterogeneous sexual identity formation, with MSM who have more gender nonconforming behaviors or appearance reporting greater family- and community-level disapproval, harassment, violence, and exclusion. Concealing feminine aspects of sexual identities was important in daily life, especially for married MSM. Some participants negotiated their identity practices in accordance with socioeconomic and cultural pressures, including taking on identity characteristics to suit consumer demand in sex work and on extended periods of joining communities of hijras (sometimes called TG or transgender women). Participants also reported that some MSM transition toward more feminine and hijra or transgender women identities, motivated by intersecting desires for feminine gender expression and by social exclusion and economic marginalization. Future studies should collect information on gender nonconformity stigma, and any changes in sexual identity practices or plans for transitions to other identities over time, in relation to HIV risk behaviors and outcomes.

  12. Analysis of the role of the Islamic Revolution in constructing religious identity and preventing identity crisis

    OpenAIRE

    Habil Heidarkhani; Leila Hajiaghaei; Reza MehdiPoor; Hassan Elahian

    2014-01-01

    generally, identity is what distinguishes one person from another. Identity is rooted in the natural human need to be recognized and introduced to thing and place. The need of belonging is an essential need that there exists in any human. So, identifying identity is very important for people. Nowadays, all people in society, especially among young people of different identities provided by the environment are in following a stable identity to determine the behavioral and belief values ​​and n...

  13. Ballasted photovoltaic module and module arrays

    Science.gov (United States)

    Botkin, Jonathan [El Cerrito, CA; Graves, Simon [Berkeley, CA; Danning, Matt [Oakland, CA

    2011-11-29

    A photovoltaic (PV) module assembly including a PV module and a ballast tray. The PV module includes a PV device and a frame. A PV laminate is assembled to the frame, and the frame includes an arm. The ballast tray is adapted for containing ballast and is removably associated with the PV module in a ballasting state where the tray is vertically under the PV laminate and vertically over the arm to impede overt displacement of the PV module. The PV module assembly can be installed to a flat commercial rooftop, with the PV module and the ballast tray both resting upon the rooftop. In some embodiments, the ballasting state includes corresponding surfaces of the arm and the tray being spaced from one another under normal (low or no wind) conditions, such that the frame is not continuously subjected to a weight of the tray.

  14. Globalization and the identity dilemma

    Directory of Open Access Journals (Sweden)

    Alina-Petronela NEGREA

    2012-09-01

    Full Text Available The paper begins with a review of theoretical aspects including a conceptual delimitation of the term “economic globalization” from the perspective of different theorists, its main features, dimensions and vectors that boost and promote the process expansion. The phenolmenon is extensive, complex and difficult to control, fact that includes in this “wave” of globalization advantages and disadvantages also.The globalization of the economic activity is studied through globalization indicators such as: FDI, financial dimension, the role of transnational economic actors in the global economy, the relationship between international trade growth and increased domestic production, internationalization of the financial markets. The structure of the global economic system and the problems that the current global economy is facing are also analysed.The “thorny” subject of the influence that globalization has on national identity from an economic perspective is seen through the eyes of Romania, analyzing the economic implications of globalization for our country, how much the identity of Romanian companies was affected over the last years, which are now the Romanian multinationals and what challenges and opportunities globalization has brought to the country that was written with envy during the interwar period that is has “oil and wheat”.

  15. Postmodernist Identity Construction and Consumption

    Directory of Open Access Journals (Sweden)

    Reyhan KARABABA

    2016-09-01

    Full Text Available Abstract. With the transition from modernism to postmodernism, identity as a concept has started to become redefined in sociology literature. The aim of this study is to show that postmodernism and symbolic interactionism are fused together to delineate both the scene as well as an actor’s identity. In that way, the interaction of a social structure with a culture that won’t be completely ignored, and, with the opinion that the categorized roles can skillfully be shaped and diversified by actors, it is possible to refrain from a pure determinism. But the transformation to enter different roles lacks meaning. Individuals pay more attention to their appearance more than who they are in order to be accepted by each group. In this manner, a metaphysical shell game begins. In the following study, the “Social Appearance Anxiety” was used as an indicator of this game.  And to determine who is willing to play the game, cultural parameters were utilized.       This study was based on the analysis of the data collected through two questionnaires given to 181 students studying at Hitit University. The INDCOL questionnaire [Singelis et al., 1995] measuring cultural values and “Social Appearance Anxiety” scale developed by [Hart, 2008] were used in the study.

  16. Facial Expression at Retrieval Affects Recognition of Facial Identity

    Directory of Open Access Journals (Sweden)

    Wenfeng eChen

    2015-06-01

    Full Text Available It is well known that memory can be modulated by emotional stimuli at the time of encoding and consolidation. For example, happy faces create better identity recognition than faces with certain other expressions. However, the influence of facial expression at the time of retrieval remains unknown in the literature. To separate the potential influence of expression at retrieval from its effects at earlier stages, we had participants learn neutral faces but manipulated facial expression at the time of memory retrieval in a standard old/new recognition task. The results showed a clear effect of facial expression, where happy test faces were identified more successfully than angry test faces. This effect is unlikely due to greater image similarity between the neutral learning face and the happy test face, because image analysis showed that the happy test faces are in fact less similar to the neutral learning faces relative to the angry test faces. In the second experiment, we investigated whether this emotional effect is influenced by the expression at the time of learning. We employed angry or happy faces as learning stimuli, and angry, happy, and neutral faces as test stimuli. The results showed that the emotional effect at retrieval is robust across different encoding conditions with happy or angry expressions. These findings indicate that emotional expressions affect the retrieval process in identity recognition, and identity recognition does not rely on emotional association between learning and test faces.

  17. Ethnic identity, identity coherence, and psychological functioning: testing basic assumptions of the developmental model.

    Science.gov (United States)

    Syed, Moin; Juang, Linda P

    2014-04-01

    The purpose of the present study was to test three fundamental theoretical propositions from Phinney's (1990) developmental model about the relations among ethnic identity, identity coherence, and psychological functioning: (a) ethnic identity is more strongly related to identity coherence for ethnic minorities than for Whites; (b) ethnic identity is more strongly related to psychological functioning for ethnic minorities than for Whites; and (c) identity coherence mediates the association between ethnic identity and psychological functioning for ethnic minorities, but not for Whites. These hypotheses were tested in three independent samples of ethnically diverse youth. In general, we found weak to moderate support for these three hypotheses, suggesting that the theoretically proposed differences in ethnic identity between ethnic minorities and Whites may not be supported by data. Implications for theory and measurement of ethnic identity are discussed.

  18. Unskilled work and learner identity

    DEFF Research Database (Denmark)

    Kondrup, Sissel

    The main argument in this paper is: In order to comprehend the ‘invisible’ conditions for forming motivation to participate in different kinds of learning activities (formal, non-formal and informal) in relation to work-life it is crucial to develop a dialectic concept of learner identity....... A concept enabling researcher in the field of work and learning to examine how the orientation toward learning activities are situated in and conditioned by specific work-life experiences. Based on a qualitative research-project (Kondrup 2012) the paper outlines how unskilled work forms a specific condition...... for engaging in learning. The aim of the project was to examine the challenges in order to fulfil the Danish national strategy on Lifelong learning and training for all. Danish as well as international research reveals that low skilled workers and workers in small and medium sized private companies tend...

  19. Children Literature: Shaping Gender Identities

    Directory of Open Access Journals (Sweden)

    IQRA JABEEN

    2014-02-01

    Full Text Available The aim of this paper is to analyze stereotype construction of gender roles in the text of children's stories which inculcate in the children’s crude minds socially developed gender differences. For this purpose, the study followed Dell Hymes’ speaking model. This model has sixteen components that can be applied to different types of Discourse (speech interaction: message form; message content; setting; scene; Speaker/sender; address or; the hearer/receiver/audience; addressee; purposes (outcomes; purposes (goals; key; channels; forms of speech; norms of interaction; norms of interpretation; and genres. Selected children's stories were analyzed to identify their role as primary thought developing sources in the mind of young learners thus shaping their gender identities. This study would be beneficial in drawing the attention of authors, editors and writers of children's literature to redefine gender roles in order to minimize gender differences.

  20. Identity transformation in medical students.

    Science.gov (United States)

    Cohen, Mitchell J M; Kay, Abigail; Youakim, James M; Balaicuis, John M; Balacius, John M

    2009-03-01

    This paper reviews the literature on the impact of medical school on personal development and consolidation of core identity. The limited literature relies on reports from medical students' journaling exercises, discussion groups, post-graduation surveys, and repeated personality testing. We review forces acting on medical students, with potential transforming effects. These forces include high external expectations and internal fear of superficial knowledge and skills, entry into the culture of medicine with its insider jargon and hierarchy, high academic workload, and the emotional burdens of confronting cadavers and death as well as bearing witness to patients' suffering. Potential developmental delay, emergence of substance abuse and hedonic acting out, cynicism, and loss of individual core values are possible consequences. Protections against these adverse outcomes include identification of strong mentors and role models, developing post-conventional morality and relativistic thinking, finding healthy coping strategies such as peer support, and remaining intellectually creative and personally reflective.

  1. Mitochondrial Replacement: Ethics and Identity.

    Science.gov (United States)

    Wrigley, Anthony; Wilkinson, Stephen; Appleby, John B

    2015-11-01

    Mitochondrial replacement techniques (MRTs) have the potential to allow prospective parents who are at risk of passing on debilitating or even life-threatening mitochondrial disorders to have healthy children to whom they are genetically related. Ethical concerns have however been raised about these techniques. This article focuses on one aspect of the ethical debate, the question of whether there is any moral difference between the two types of MRT proposed: Pronuclear Transfer (PNT) and Maternal Spindle Transfer (MST). It examines how questions of identity impact on the ethical evaluation of each technique and argues that there is an important difference between the two. PNT, it is argued, is a form of therapy based on embryo modification while MST is, instead, an instance of selective reproduction. The article's main ethical conclusion is that, in some circumstances, there is a stronger obligation to use PNT than MST. © 2015 The Authors. Bioethics published by John Wiley & Sons Ltd.

  2. Rethinking social identity theory in international encounters:

    DEFF Research Database (Denmark)

    Lauring, Jakob

    2008-01-01

    In a globalized business environment, interaction across linguistic boundaries is becoming a normal part of everyday life. In these encounters language differences may affect the formation of social identities among organization members. While studies based on Social Identity Theory perceive...... on the encounter between expatriates and local employees of a Danish subsidiary in England. The findings show that identity making may be actualized by competition for resources and recognition. This can be done by investing certain objects such as the symbolic application of language with certain identifications...... the link between identity and language to be linear, this article takes a different approach. By drawing on anthropological theories on ethnic identity it is argued that the relation between language and social identity is negotiated in interaction. In the empirical analysis the article focuses...

  3. Political Identities and Latin American Film Portraits

    Directory of Open Access Journals (Sweden)

    Juan Bautista Lucca

    2015-07-01

    Full Text Available This assay uses the cinema as an expression of culture that has the ability to portray different ways to build identities, to condense on an image different identities path. For example, in the film Machuca, we can see how political identities experience a social split; in Memoria del saqueo we can observe how social and political construction of an identity could be understood as a sign of the past that came back to the present; in Fresa y chocolate and also the films Santera, La estrategia del caracol and La ley de Herodes, we can observe the identity clash with the “other”, that shapes and stressed that thing “we” are; finally, a film is also becomes a field to think about identity construction process that open a new future like in Diario de motocicleta, or open the possibility to return to our old certainties like in El hijo de la novia. Keywords:

  4. Identity uncertainty and commitment making across adolescence : Five-year within-person associations using daily identity reports

    NARCIS (Netherlands)

    Becht, Andrik I.; Nelemans, Stefanie A.; Branje, Susan J. T.; Vollebergh, Wilma A. M.; Koot, Hans M.; Meeus, W.H.J.

    2017-01-01

    A central assumption of identity theory is that adolescents reconsider current identity commitments and explore identity alternatives before they make new commitments in various identity domains (Erikson, 1968; Marcia, 1966). Yet, little empirical evidence is available on how commitment and

  5. Stop identity cue as a cue to language identity

    Science.gov (United States)

    Castonguay, Paula Lisa

    The purpose of the present study was to determine whether language membership could potentially be cued by the acoustic-phonetic detail of word-initial stops and retained all the way through the process of lexical access to aid in language identification. Of particular interest were language-specific differences in CE and CF word-initial stops. Experiment 1 consisted of an interlingual homophone production task. The purpose of this study was to examine how word-initial stop consonants differ in terms of acoustic properties in Canadian English (CE) and Canadian French (CF) interlingual homophones. The analyses from the bilingual speakers in Experiment 1 indicate that bilinguals do produce language-specific differences in CE and CF word-initial stops, and that closure duration, voice onset time, and burst spectral SD may provide cues to language identity in CE and CF stops. Experiment 2 consisted of a Phoneme and Language Categorization task. The purpose of this study was to examine how stop identity cues, such as VOT and closure duration, influence a listener to identify word-initial stop consonants as belonging to Canadian English (CE) or Canadian French (CF). The RTs from the bilingual listeners in this study indicate that bilinguals do perceive language-specific differences in CE and CF word-initial stops, and that voice onset time may provide cues to phoneme and language membership in CE and CF stops. Experiment 3 consisted of a Phonological-Semantic priming task. The purpose of this study was to examine how subphonetic variations, such as changes in the VOT, affect lexical access. The results of Experiment 3 suggest that language-specific cues, such as VOT, affects the composition of the bilingual cohort and that the extent to which English and/or French words are activated is dependent on the language-specific cues present in a word. The findings of this study enhanced our theoretical understanding of lexical structure and lexical access in bilingual speakers

  6. Human identity versus gender identity: The perception of sexual addiction among Iranian women.

    Science.gov (United States)

    Moshtagh, Mozhgan; Mirlashari, Jila; Rafiey, Hassan; Azin, Ali; Farnam, Robert

    2017-07-01

    This qualitative study was conducted to explore the images of personal identity from the perspective of women with sexual addiction. The data required for the study were collected through 31 in-depth interviews. Sensing a threat to personal identity, dissatisfaction with gender identity, dissociation with the continuum of identity, and identity reconstruction in response to threat were four of the experiences that were common among women with sexual addiction. Painful emotional experiences appear to have created a sense of gender and sexual conflict or weakness in these women and thus threatened their personal identity and led to their sexual addiction.

  7. Regulation of Cellular Identity in Cancer

    OpenAIRE

    Roy, Nilotpal; Hebrok, Matthias

    2015-01-01

    Neoplastic transformation requires changes in cellular identity. Emerging evidence increasingly points to cellular reprogramming, a process during which fully differentiated and functional cells lose aspects of their identity while gaining progenitor characteristics, as a critical early step during cancer initiation. This cell identity crisis persists even at the malignant stage in certain cancers, suggesting that reactivation of progenitor functions supports tumorigenicity. Here, we review r...

  8. I am remix your web identity

    CERN Document Server

    Sordi, Paolo

    2015-01-01

    I Am: Remix Your Web Identity explores methods of designing and developing a personal website with RSS feeds that aggregate blog posts along with posts on social networks, such as Flickr, YouTube, Goodreads, Last.fm, and Delicious, in order to regain control and ownership (as well as authorship) of one's identity in one consistent and customized location. The book provides a short overview of the evolution of digital identity and the transformation of personal websites from Geocities to blogs...

  9. Guernsey French, identity and language endangerment

    OpenAIRE

    Sallabank, Julia

    2006-01-01

    This chapter looks examines the effects of identity on revitalization efforts in the context of a small and dwindling language community. It discusses the nature and inter-relationship of identity, ethnicity and culture, and their roles in language choice and attitudes, relating these to the ethnolinguistic vitality of the indigenous language in Guernsey.\\ud \\ud It is often assumed in discourse on language endangerment that language plays an significant part in identity, but this view is not ...

  10. National identity, ethnicity, (critical) memory culture

    OpenAIRE

    Radenović Sandra

    2006-01-01

    This article deals with the analysis of concepts of national identity and ethnicity (ethnic identity) as the "cluster of ideas" and/or concepts which have similar constitutive elements. This article intends to analyze the relationship between these concepts and the concept of (critical) memory culture. Finally, the author is attempting to discuss the concept of (critical) memory culture as the segment of cultural identity.

  11. Perancangan Corporate Identity Hotel Idas Kuta - Bali

    OpenAIRE

    Beatric, Stephani; Soehardjo, A. J; Prasetyadi, Budi

    2013-01-01

    Hotel Idas Kuta-Bali memerlukan perancangan corporate identity yang baru guna membangun citra Perusahaan.Konsep perancangan corporate identity Hotel Idas dibuat sesuai dengan identitas dari hotel ini, yaitu hoteldengan konsep nuansa alam yang nyaman serta menyediakan fasilitas lengkap dengan harga terjangkau. Melaluipembuatan logo pada corporate identity dengan kesan simpel yang unik serta menunjukkan kepribadian darihotel, kemudian mengaplikasikannya pada berbagai media promosi yang berkaitan.

  12. International Corporate Visual Identity: Standardization or Localization?

    OpenAIRE

    Melewar, T. C.; John Saunders

    1999-01-01

    This study examines the influences on the international standardization of corporate visual identity for a sample of U.K. multinationals. The results suggest that market entry form and equity holding are associated with the degree of corporate visual identity standardization. Further findings show the influence of culture, nationalism and product attributes on corporate visual identity standardization.© 1999 JIBS. Journal of International Business Studies (1999) 30, 583–598

  13. Preventing and responding to medical identity theft.

    Science.gov (United States)

    Amori, Geraldine

    2008-01-01

    Medical identity theft is a crime with two victims: patients and providers. It is easy to commit and lucrative because healthcare record keeping and business interactions are complex and mainly electronic. Patients whose identity has been stolen are vulnerable to both medical error and financial loss. Providers may suffer both reputation loss and financial loss. There are steps to help prevent and to respond appropriately to medical identity theft.

  14. An existentialist account of identity formation.

    Science.gov (United States)

    Bilsker, D

    1992-06-01

    An account of James Marcia's identity formation model is given in the language of existentialist philosophy. Parallels between ego-identity and existentialist approaches are examined and identity is described in terms of existentialist concepts formulated by Martin Heidegger (Being and Time) and Jean-Paul Sartre (Being and Nothingness). While identity formation has previously been formulated in terms of ego-analytic theory, this paper argues and seeks to demonstrate that significant benefits accrue from an existentialist account. These benefits include clarification of difficult theoretical issues, delineation of specific research directions and enrichment of clinical understanding.

  15. Identity theory and personality theory: mutual relevance.

    Science.gov (United States)

    Stryker, Sheldon

    2007-12-01

    Some personality psychologists have found a structural symbolic interactionist frame and identity theory relevant to their work. This frame and theory, developed in sociology, are first reviewed. Emphasized in the review are a multiple identity conception of self, identities as internalized expectations derived from roles embedded in organized networks of social interaction, and a view of social structures as facilitators in bringing people into networks or constraints in keeping them out, subsequently, attention turns to a discussion of the mutual relevance of structural symbolic interactionism/identity theory and personality theory, looking to extensions of the current literature on these topics.

  16. Self-identity as a construct

    DEFF Research Database (Denmark)

    Sudzina, Frantisek

    Self-identity is a private assessment of one’s beliefs and values. The self is an active agent in the decision process that drives people to act in accordance with the behavior that they see appropriate for themselves. According to Triandis, one’s self-definition motivates behavior...... that is consistent with that definition. Self-identity has been shown to influence the acceptance and use of technology. Prior research has shown that self-identity includes the factors of innovativeness, tech savviness, and opinion leadership. The aim of the research is to test the self-identity construct...

  17. Smoker Identity Development among Adolescents who Smoke

    Science.gov (United States)

    Hertel, Andrew W.; Mermelstein, Robin J.

    2016-01-01

    Adolescents who smoke are more likely to escalate their smoking frequency if they believe smoking is self-defining. Knowing factors that are associated with development of a smoker identity among adolescents who smoke may help to identify who will become a regular smoker. We investigated whether smoker identity development is associated with internal and external motives for smoking. For comparison, we also investigated whether social smoker identity development is associated with internal and external motives for smoking. Adolescents who smoke (n = 292) completed measures of smoker and social smoker identity, internal motives for smoking (negative affect coping, positive affect enhancement), and external motives for smoking (social fit) at baseline, 6-, 15-, and 24-month assessments of an ongoing longitudinal study of smoking patterns. We examined whether change in smoker and social smoker identity from 6 to 24 months was associated with change in motives at earlier assessment waves. We also explored whether gender moderated these relationships. Increases in negative affect coping motives were associated with smoker identity development among both males and females. Increases in social motives were associated with smoker identity development among males, and increases in negative affect coping motives were associated with social smoker identity development among females. Smoker and social smoker identities are signaled by negative affect coping as well as social motives for smoking. PMID:27136374

  18. A Temporal Perspective on Organizational Identity

    DEFF Research Database (Denmark)

    Schultz, Majken; Hernes, Tor

    2013-01-01

    We offer as our main theoretical contribution a conceptual framework for how the past is evoked in present identity reconstruction and the ways in which the past influences the articulation of claims for future identity. We introduce the notion of textual, material, and oral memory forms...... as the means by which organizational actors evoke the past. The conceptual framework is applied in a study of two occasions of identity reconstruction in the LEGO Group, which revealed differences in ways that the past was evoked and influenced claims for future identity. Our study suggests that (1) a longer...

  19. Advertising identities: virtual galleries as places of identity

    Directory of Open Access Journals (Sweden)

    Alexandra Zontea

    2010-10-01

    Full Text Available This paper is focused on the public presentation of self through virtual art galleries, singling out the field of photography. Photography has always been disputed as being part of the highbrow arts because of its popular character. Today, anyone who owes a photo camera can experience photography as art, without a rigorous training. Everybody is able to expose the photos freely to a large number of people, on the Internet. Consequently, the Internet opens up a virtual space, in which photo artists and amateurs can promote their works and exhibit them in a personal online gallery, which represents their place in the virtual vastness. Therefore, my research approaches the matter of the virtual gallery as an identitary place, being focused on finding out why artists choose to exhibit in virtual galleries. I asked myself what are the new functions of the virtual art galleries?Are they understood as online markers that distinguish the owners in these virtual environments? In other words, are these personal galleries a way of expressing online identities?

  20. I. Monographic SectionEthnic Identities, Collective Identities, Religious Identities. Open Questions in the diachronic perspective

    Directory of Open Access Journals (Sweden)

    Luca Arcari (a cura di

    2015-06-01

    Full Text Available Today it emerges as really diriment an historical and historiographical discussion around questions and terms as “identity/identities”, as well as around adjectives as “ethnic/collective/religious”, especially according to the renewed perspective of the longue durée (in the title of the monographic section, the so-called “diachronic perspective”. Such a perspective aims at measuring wastes and clashes emerging from sources referring to a wider cultural and chronological horizon. We aims at proposing a multi-situated approach, in order to measure persistences and traditional lines of contact as regards ethnic, collective as well as religious self-definitions, especially in their dimensions of cultural re-functionalisations and oriented instruments of self-definitions in and for specific cultural and historical contexts.