WorldWideScience

Sample records for subscriber identity module

  1. Forensic Tools for Mobile Phone Subscriber Identity Modules

    Directory of Open Access Journals (Sweden)

    Wayne Jansen

    2006-06-01

    Full Text Available Mobile phones and other handheld devices incorporating cellular capabilities, such as Personal Digital Assistants, are ubiquitous.  Besides placing calls, these devices allow users to perform other useful tasks, including text messaging and phonebook entry management.  When cell phones and cellular devices are involved in a crime or other incident, forensic specialists require tools that allow the proper retrieval and speedy examination of data present on the device.  For devices conforming to the Global System for Mobile Communications (GSM standards, certain data such as dialed numbers, text messages, and phonebook entries are maintained on a Subscriber Identity Module (SIM.  This paper gives a snapshot of the state of the art of forensic software tools for SIMs and an explanation of the types of digital evidence they can recover.

  2. Cosine-Modulated Multitone for Very-High-Speed Digital Subscriber Lines

    Directory of Open Access Journals (Sweden)

    Lin Lekun

    2006-01-01

    Full Text Available In this paper, the use of cosine-modulated filter banks (CMFBs for multicarrier modulation in the application of very-high-speed digital subscriber lines (VDSLs is studied. We refer to this modulation technique as cosine-modulated multitone (CMT. CMT has the same transmitter structure as discrete wavelet multitone (DWMT. However, the receiver structure in CMT is different from its DWMT counterpart. DWMT uses linear combiner equalizers, which typically have more than 20 taps per subcarrier. CMT, on the other hand, adopts a receiver structure that uses only two taps per subcarrier for equalization. This paper has the following contributions. (i A modification that reduces the computational complexity of the receiver structure of CMT is proposed. (ii Although traditionally CMFBs are designed to satisfy perfect-reconstruction (PR property, in transmultiplexing applications, the presence of channel destroys the PR property of the filter bank, and thus other criteria of filter design should be adopted. We propose one such method. (iii Through extensive computer simulations, we compare CMT with zipper discrete multitone (z-DMT and filtered multitone (FMT, the two modulation techniques that have been included in the VDSL draft standard. Comparisons are made in terms of computational complexity, transmission latency, achievable bit rate, and resistance to radio ingress noise.

  3. Subscriber Number Forecasting Tool Based on Subscriber Attribute Distribution for Evaluating Improvement Strategies

    OpenAIRE

    Hiramatsu, Ayako; Shono, Yuji; Oiso, Hiroaki; Komoda, Norihisa

    2005-01-01

    In this paper, a subscriber number forecasting tool that evaluates quiz game mobile content improvement strategies is developed. Unsubscription rates depend on such subscriber attributes such as consecutive months, stages, rankings, and so on. In addition, content providers can anticipate change in unsubscription rates for each content improvement strategy. However, subscriber attributes change dynamically. Therefore, a method that deals with dynamic subscriber attribute changes is proposed. ...

  4. Sinkronisasi Content E-learning Terdistribusi Berbasis Model Komunikasi Indirect Menggunakan Sistem Publish-Subscribe

    Directory of Open Access Journals (Sweden)

    Sufrendo Saputra

    2017-01-01

    Full Text Available Sinkronisasi content antar e-learning memungkinkan beberapa e-learning memiliki content yang sama secara konsisten. Perubahan content pada salah satu e-learning akan membuat sistem memastikan e-learning lain mengetahui perubahan tersebut. Model komunikasi yang memungkinkan adanya sinkronisasi ini merupakan komunikasi indirect berbasis publish-subscribe. Setiap e-learning memiliki content-nya masing-masing yang secara otomatis akan di-publish oleh sistem. E-learning lain yang tergabung dalam sistem sinkronisasi kemudian dapat memilih content mana yang ingin di-subscribe. Jika terdapat perubahan pada sebuah content, dan content tersebut memiliki subscriber, maka sistem akan memberitahu subscriber bahwa telah terjadi perubahan pada content. Teknologi utama yang digunakan dalam sistem ini adalah Moodle, PHP, dan Java. Moodle sebagai modul yang digunakan untuk mensimulasikan e-learning. PHP dan Java sebagai framework dari sistem sinkronisasi. Model komunikasi yang digunakan merupakan komunikasi indirect berbasis publish-subscribe. Model komunikasi ini menempatkan sebuah perantara bagi komunikasi antar e-learning.

  5. Subscribing to Transparency

    DEFF Research Database (Denmark)

    He, Yinghua; Nielsson, Ulf; Guo, Hong

    2014-01-01

    The paper empirically explores how more trade transparency affects market liquidity. The analysis takes advantage of a unique setting in which the Shanghai Stock Exchange offered more trade transparency to market participants subscribing to a new software package. First, the results show...... that the additional data disclosure increased trading activity, but also increased transactions costs through wider bid-ask spreads. Thus, in contrast to popular policy belief, the paper finds that more transparency need not improve market liquidity. Second, the paper finds a particularly strong immediate liquidity...... impact accompanied by altered trading behavior, which suggests a significant impact on institutional traders subscribing relatively early. Lastly, since the effective level of market transparency is bound to depend on how many traders are subscribing to the data, the study can empirically establish...

  6. Subscribing to Transparency

    DEFF Research Database (Denmark)

    He, Yinghua; Nielsson, Ulf; Guo, Hong

    The paper empirically explores how more trade transparency affects market liquidity. The analysis takes advantage of a unique setting in which the Shanghai Stock Exchange offered more trade transparency to market participants subscribing to a new software package. First, the results show...... that the additional data disclosure increased trading activity, but also increased transactions costs through wider bid-ask spreads. Thus, in contrast to popular policy belief, the paper finds that more transparency need not improve market liquidity. Second, the paper finds a particularly strong immediate liquidity...... impact accompanied by altered trading behavior, which suggests a significant impact on institutional traders subscribing relatively early. Lastly, since the effective level of market transparency is bound to depend on how many traders are subscribing to the data, the study can empirically establish...

  7. Segmenting the Cable Audience by Reason for Subscribing.

    Science.gov (United States)

    Umphrey, Don

    1988-01-01

    Compares the habits and attitudes of those who subscribed to cable television for better reception with those who subscribed for either greater programing selection or more movies. Finds attitudes vary more than television use between those who subscribe to get better reception and those who subscribe to get more programs. (RS)

  8. Side-channel Analysis of Subscriber Identity Modules

    Science.gov (United States)

    2013-06-01

    such as NXP, Atmel, Samsung, and STMicrosystems have similar product lineups . 7 The CPU operates at clock rates from 3.57 MHz up to 66 MHz, depending on...verification procedure confounds both of these expectations. First, the SIM lock-out counter only allows the acquisition of two traces (in the case of the PIN...Ferenc, Jakub. “Power analysis of the PIN verification procedure on smart cards (English title, translated)”, 2006 [cit. 2013-05-13]. URL http

  9. Quality-constrained routing in publish/subscribe systems

    NARCIS (Netherlands)

    Zieba, Bogumil; van Sinderen, Marten J.; Wegdam, M.

    2005-01-01

    Routing in publish/subscribe (pub/sub) features a communication model where messages are not given explicit destination addresses, but destinations are determined by matching the subscription declared by subscribers. For a dynamic computing environment with applications that have quality demands,

  10. Publish Subscribe Systems Design and Principles

    CERN Document Server

    Tarkoma, Sasu

    2012-01-01

    This book offers an unified treatment of the problems solved by publish/subscribe, how to design and implement the solutions In this book, the author provides an insight into the publish/subscribe technology including the design, implementation, and evaluation of new systems based on the technology.  The book also addresses the basic design patterns and solutions, and discusses their application in practical application scenarios. Furthermore, the author examines current standards and industry best practices as well as recent research proposals in the area. Finally, necessary content ma

  11. Secret Forwarding of Events over Distributed Publish/Subscribe Overlay Network.

    Science.gov (United States)

    Yoon, Young; Kim, Beom Heyn

    2016-01-01

    Publish/subscribe is a communication paradigm where loosely-coupled clients communicate in an asynchronous fashion. Publish/subscribe supports the flexible development of large-scale, event-driven and ubiquitous systems. Publish/subscribe is prevalent in a number of application domains such as social networking, distributed business processes and real-time mission-critical systems. Many publish/subscribe applications are sensitive to message loss and violation of privacy. To overcome such issues, we propose a novel method of using secret sharing and replication techniques. This is to reliably and confidentially deliver decryption keys along with encrypted publications even under the presence of several Byzantine brokers across publish/subscribe overlay networks. We also propose a framework for dynamically and strategically allocating broker replicas based on flexibly definable criteria for reliability and performance. Moreover, a thorough evaluation is done through a case study on social networks using the real trace of interactions among Facebook users.

  12. Utilization and challenges of online subscribed databases by ...

    African Journals Online (AJOL)

    The paper investigated the Utilization and Challenges of Online Databases Subscribed to by university libraries in Katsina State. Objectives of the study were to find out the types of online subscribed databases used by academics in universities in Katsina; the extent to which the academics in the universities use the online ...

  13. Secret Forwarding of Events over Distributed Publish/Subscribe Overlay Network.

    Directory of Open Access Journals (Sweden)

    Young Yoon

    Full Text Available Publish/subscribe is a communication paradigm where loosely-coupled clients communicate in an asynchronous fashion. Publish/subscribe supports the flexible development of large-scale, event-driven and ubiquitous systems. Publish/subscribe is prevalent in a number of application domains such as social networking, distributed business processes and real-time mission-critical systems. Many publish/subscribe applications are sensitive to message loss and violation of privacy. To overcome such issues, we propose a novel method of using secret sharing and replication techniques. This is to reliably and confidentially deliver decryption keys along with encrypted publications even under the presence of several Byzantine brokers across publish/subscribe overlay networks. We also propose a framework for dynamically and strategically allocating broker replicas based on flexibly definable criteria for reliability and performance. Moreover, a thorough evaluation is done through a case study on social networks using the real trace of interactions among Facebook users.

  14. Authenticated Location-Aware Publish/Subscribe Services in Untrusted Outsourced Environments

    Directory of Open Access Journals (Sweden)

    Han Yan

    2017-01-01

    Full Text Available Location-aware publish/subscribe is an important location-based service based on server-initiated model. Often times, the owner of massive spatio-textual messages and subscriptions outsources its location-aware publish/subscribe services to a third-party service provider, for example, cloud service provider, who is responsible for delivering messages to their relevant subscribers. The issue arising here is that the messages delivered by the service provider might be tailored for profit purposes, intentionally or not. Therefore, it is essential to develop mechanisms which allow subscribers to verify the correctness of the messages delivered by the service provider. In this paper, we study the problem of authenticating messages in outsourced location-aware publish/subscribe services. We propose an authenticated framework which not only can deliver the messages efficiently but also can make the subscribers’ authentication available with low cost. Extensive experiments on a real-world dataset demonstrate the effectiveness and efficiency of our proposed authenticated framework.

  15. Motif Subscriber Menonton Channel YouTube Raditya Dika

    OpenAIRE

    Mellyaningsih, Adinda

    2016-01-01

    Penelitian ini dilakukan untuk mengetahui motif para subscriber dalam menonton channelYouTube Raditya Dika. Raditya Dika merupakan YouTuber Indonesia dengan jumlah subscriber terbanyak dan merupakan orang pertama di Indonesia yang mendapatkan penghargaan Certifies Award oleh YouTube. Peneliti menggunakan teori Uses and Gratification dengan empat indikator, yaitu hiburan dan relaksasi, hubungan antar pribadi, mencari informasi, dan persahabatan. Metode dalam penelitian ini adalah online survei...

  16. List of subscribers as the source of data on book history and the history of reading: case study of book subscribers' lists printed in Dalmatia in the early 19th century

    Directory of Open Access Journals (Sweden)

    Jelena Lakuš

    2013-02-01

    Full Text Available Customer networks or lists of subscribers as a new publishing phenomenon first occurred in Dalmatia in the early 19th century. It was a model of collective funding of book, magazine and newspaper publishing, which gradually replaced the earlier system of individual patronage. It resulted in the publication of lists of subscribers that contained the names of all those who financially supported the printing of a book. The data on names of subscribers, their occupation, place of residence and number of copies ordered, which was the usual content of subscribers, lists, make them very valuable sources for research on the history of books and reading. This paper tries to show the research potential of such lists by presenting a case-study of five preserved and available subscribers' lists found in publications printed between 1835 and 1848 in the Zadar print shop of Battara brothers. The paper analyses the quantitative data on subscribers, their geographical distribution, professional profile and gender, which does not exhaust their research potential in full. The analysis has shown that despite the austere educational opportunities, high incidence of unemployment, and many other limitations, there were people who treasured the written word. The subscribers mostly came from coastal cities like Zadar, Split and Dubrovnik, which were the most important publishing and cultural centres. Even though the subscribers came from Austria, Military Border, Italy, Croatia proper and Slavonia, as well as Bosnia and Herzegovina, which was then part of the Ottoman Empire, they make up only one eight of the total number of subscribers in the corpus. The subscribers are both Roman-Catholic and Orthodox, who mostly subscribed to books printed in the Cyrillic script. The subscribers come from a wide range of professions, mostly from the church circles in Dalmatia, and the fewest of them were professors and teachers, members of the army and the police. As expected

  17. Reconfiguration Service for Publish/Subscribe Middleware

    NARCIS (Netherlands)

    Zieba, Bogumil; Glandrup, Maurice; van Sinderen, Marten J.; Wegdam, M.

    2006-01-01

    Mission-critical, distributed systems are often designed as a set of distributed, components that interact using publish/subscribe middleware. Currently, in these systems, software components are usually statically allocated to the nodes to fulfil predictability, reliability requirements. However, a

  18. Subscriber Response System. Progress Report.

    Science.gov (United States)

    Callais, Richard T.

    Results of preliminary tests made prior and subsequent to the installation of a two-way interactive communication system which involves a computer complex termed the Local Processing Center and subscriber terminals located in the home or business location are reported. This first phase of the overall test plan includes tests made at Theta-Com…

  19. How new subscribers use cancer-related online mailing lists.

    Science.gov (United States)

    Rimer, Barbara K; Lyons, Elizabeth J; Ribisl, Kurt M; Bowling, J Michael; Golin, Carol E; Forlenza, Michael J; Meier, Andrea

    2005-07-01

    Online cancer-related support is an under-studied resource that may serve an important function in the information seeking, care, and support of cancer patients and their families. With over 9.8 million cancer survivors (defined as anyone living with cancer) in the United States alone and the number growing worldwide, it is important to understand how they seek and use online resources to obtain the information they need, when they need it, and in a form and manner appropriate to them. These are stated cancer communication goals of the US National Cancer Institute. Our purposes are to (1) present background information about online mailing lists and electronic support groups, (2) describe the rationale and methodology for the Health eCommunities (HeC) study, and (3) present preliminary baseline data on new subscribers to cancer-related mailing lists. In particular, we describe subscribers' use of mailing lists, their reasons for using them, and their reactions to participating shortly after joining the lists. From April to August 2004, we invited all new subscribers to 10 Association of Cancer Online Resources mailing lists to complete Web-based surveys. We analyzed baseline data from the respondents to examine their perceptions about cancer-related mailing lists and to describe how cancer patients and survivors used these lists in the period shortly after joining them. Cumulative email invitations were sent to 1368 new mailing list subscribers; 293 Web surveys were completed within the allotted time frame (21.4% response rate). Most respondents were over age 50 (n = 203, 72%), white (n = 286, 98%), college graduates (n = 161, 55%), and had health insurance (n = 283, 97%). About 41% (n = 116) of new subscribers reported spending 1 to 3 hours per day reading and responding to list messages. They used the mailing lists for several reasons. Among the most frequently reported, 62% (n = 179) strongly agreed they used mailing lists to obtain information on how to deal

  20. Identity modulates short-term memory for facial emotion.

    Science.gov (United States)

    Galster, Murray; Kahana, Michael J; Wilson, Hugh R; Sekuler, Robert

    2009-12-01

    For some time, the relationship between processing of facial expression and facial identity has been in dispute. Using realistic synthetic faces, we reexamined this relationship for both perception and short-term memory. In Experiment 1, subjects tried to identify whether the emotional expression on a probe stimulus face matched the emotional expression on either of two remembered faces that they had just seen. The results showed that identity strongly influenced recognition short-term memory for emotional expression. In Experiment 2, subjects' similarity/dissimilarity judgments were transformed by multidimensional scaling (MDS) into a 2-D description of the faces' perceptual representations. Distances among stimuli in the MDS representation, which showed a strong linkage of emotional expression and facial identity, were good predictors of correct and false recognitions obtained previously in Experiment 1. The convergence of the results from Experiments 1 and 2 suggests that the overall structure and configuration of faces' perceptual representations may parallel their representation in short-term memory and that facial identity modulates the representation of facial emotion, both in perception and in memory. The stimuli from this study may be downloaded from http://cabn.psychonomic-journals.org/content/supplemental.

  1. 47 CFR 64.1170 - Reimbursement procedures where the subscriber has paid charges.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 3 2010-10-01 2010-10-01 false Reimbursement procedures where the subscriber... Preferred Telecommunications Service Providers § 64.1170 Reimbursement procedures where the subscriber has... reimburse the authorized carrier for reasonable expenses. (e) If the authorized carrier has not received...

  2. Subscribe to NIH MedlinePlus the Magazine

    Science.gov (United States)

    ... turn Javascript on. Subscribe to NIH MedlinePlus the magazine NIH MedlinePlus the magazine is published quarterly, in print and on the ... up for a free subscription to NIH MedlinePlus Magazine. Librarians may order this magazine in bulk . Please ...

  3. 47 CFR 76.1619 - Information on subscriber bills.

    Science.gov (United States)

    2010-10-01

    ... subscriber within 30 days. (c) A cable franchise authority may enforce the customer service standards set forth in this section against cable operators. The franchise authority must provide affected cable...

  4. Realizing IoT service's policy privacy over publish/subscribe-based middleware.

    Science.gov (United States)

    Duan, Li; Zhang, Yang; Chen, Shiping; Wang, Shiyao; Cheng, Bo; Chen, Junliang

    2016-01-01

    The publish/subscribe paradigm makes IoT service collaborations more scalable and flexible, due to the space, time and control decoupling of event producers and consumers. Thus, the paradigm can be used to establish large-scale IoT service communication infrastructures such as Supervisory Control and Data Acquisition systems. However, preserving IoT service's policy privacy is difficult in this paradigm, because a classical publisher has little control of its own event after being published; and a subscriber has to accept all the events from the subscribed event type with no choice. Few existing publish/subscribe middleware have built-in mechanisms to address the above issues. In this paper, we present a novel access control framework, which is capable of preserving IoT service's policy privacy. In particular, we adopt the publish/subscribe paradigm as the IoT service communication infrastructure to facilitate the protection of IoT services policy privacy. The key idea in our policy-privacy solution is using a two-layer cooperating method to match bi-directional privacy control requirements: (a) data layer for protecting IoT events; and (b) application layer for preserving the privacy of service policy. Furthermore, the anonymous-set-based principle is adopted to realize the functionalities of the framework, including policy embedding and policy encoding as well as policy matching. Our security analysis shows that the policy privacy framework is Chosen-Plaintext Attack secure. We extend the open source Apache ActiveMQ broker by building into a policy-based authorization mechanism to enforce the privacy policy. The performance evaluation results indicate that our approach is scalable with reasonable overheads.

  5. An active 3-dimensional localization scheme for femtocell subscribers using E-UTRAN

    KAUST Repository

    Mohammed, Aquil Mirza; Muhammad, Zeeshan Shakir; Alouini, Mohamed-Slim

    2012-01-01

    Femtocells provide an efficient solution to overcome the indoor coverage problems and also to deal with the traffic within Macro cells. The possibility of localizing femtocell subscriber stations based on the timing ranging advance parameter (TRAP), obtained from E-UTRAN (Evolved UMTS Terrestrial Radio Access Network), within the network signal internals is challenging and is studied throughout in this paper. The principle approach to localization based on Euclidean distances from multiple base stations is outlined.We investigate the specifications of the timing parameters or TRAP used for air interface of 4G network as they relate to calculating the subscriber distances. Computer simulation is used to demonstrate the localization accuracy using multiple base station networks when estimating likely locations of femtocell subscribers stations on a twodimensional coordinate mapping system. However, we further extend our simulations to demonstrate expected location accuracy of subscriber stations, for multiple base station networks, on a three dimensional coordinate mapping scheme. The possibility of of error-fixes shows eight times greater accuracy than in previous results is expected to achieve by applying timing advance techniques to Global System for Mobile communications networks, by using a two-dimensional coordinate mapping scheme. We later compare our study with the effect of global positioning system (GPS) by using a three-dimensional coordinate mapping scheme, which is predicted to give an 72.4 cms accuracy of subscriber station location. © 2012 IEEE.

  6. An active 3-dimensional localization scheme for femtocell subscribers using E-UTRAN

    KAUST Repository

    Mohammed, Aquil Mirza

    2012-05-01

    Femtocells provide an efficient solution to overcome the indoor coverage problems and also to deal with the traffic within Macro cells. The possibility of localizing femtocell subscriber stations based on the timing ranging advance parameter (TRAP), obtained from E-UTRAN (Evolved UMTS Terrestrial Radio Access Network), within the network signal internals is challenging and is studied throughout in this paper. The principle approach to localization based on Euclidean distances from multiple base stations is outlined.We investigate the specifications of the timing parameters or TRAP used for air interface of 4G network as they relate to calculating the subscriber distances. Computer simulation is used to demonstrate the localization accuracy using multiple base station networks when estimating likely locations of femtocell subscribers stations on a twodimensional coordinate mapping system. However, we further extend our simulations to demonstrate expected location accuracy of subscriber stations, for multiple base station networks, on a three dimensional coordinate mapping scheme. The possibility of of error-fixes shows eight times greater accuracy than in previous results is expected to achieve by applying timing advance techniques to Global System for Mobile communications networks, by using a two-dimensional coordinate mapping scheme. We later compare our study with the effect of global positioning system (GPS) by using a three-dimensional coordinate mapping scheme, which is predicted to give an 72.4 cms accuracy of subscriber station location. © 2012 IEEE.

  7. Scalable Security and Accounting Services for Content-Based Publish/Subscribe Systems

    OpenAIRE

    Himanshu Khurana; Radostina K. Koleva

    2006-01-01

    Content-based publish/subscribe systems offer an interaction scheme that is appropriate for a variety of large-scale dynamic applications. However, widespread use of these systems is hindered by a lack of suitable security services. In this paper, we present scalable solutions for confidentiality, integrity, and authentication for these systems. We also provide verifiable usage-based accounting services, which are required for e-commerce and e-business applications that use publish/subscribe ...

  8. Subscribe to the Preserve America E-Newsletter

    Science.gov (United States)

    ; the U.S. Departments of Defense, Interior, Agriculture, Commerce, Housing and Urban Development . Department of Commerce seal U.S. Department of Housing and Urban Development logo U.S. Department of the Interior seal Subscribe to the Preserve America E-Newsletter Sign up for the periodical Preserve America e

  9. Multiuser Diversity with Adaptive Modulation in Non-Identically Distributed Nakagami Fading Environments

    KAUST Repository

    Rao, Anlei; Alouini, Mohamed-Slim

    2012-01-01

    In this paper, we analyze the performance of adaptive modulation with single-cell multiuser scheduling over independent but not identical distributed (i.n.i.d.) Nakagami fading channels. Closed-form expressions are derived for the average channel

  10. Is Personal Identity Evaluative? | Poltera | South African Journal of ...

    African Journals Online (AJOL)

    Martha Nussbaum subscribes to the view that our identity is an evaluative question determined by our common, deeply held beliefs about what is worthwhile in human life. In so doing, she asserts that for an account of ethics to have “philosophical power” it needs to be grounded in an account of human nature that is both ...

  11. OPTIMASI PUBLISH-SUBSCRIBE ADAPTIF UNTUK MONITORING KEAMANAN SELASAR GEDUNG G4 TEKNIK ELEKTRO UNIVERSITAS NEGERI MALANG

    Directory of Open Access Journals (Sweden)

    I Made Wirawan

    2017-10-01

    Full Text Available Security and comfort become very important for every educational institution, especially college. Security and comfort should be properly integrated to create an ideal academic atmosphere. This research designs online security monitoring system of G4 TEUM's hallway area by utilizing social media using adaptive Publish Subscribe system. Publisher i.e. students upload the current condition of the G4 TEUM's hallway by utilizing social media: twitter, facebook or instagram, then brokers choose the uploaded data corresponding to G4 content to be sent in the form of notification to subscriber, which is TEUM security in the form of dynamic web application. The experimental results show that by using adaptive Publish-Subscribe method, the cpu usage is reduced by 31,76% and bandwith usage by 39,4%, compared with non-adaptive method, on data event obtained by both publisher and subscribe. Rasa aman dan nyaman merupakan salah satu hal  yang sangat berpengaruh pada dunia pendidikan dalam pembelajaran, khususnya di perguruan tinggi. Keamanan dan kenyamanan harus diintegrasikan dengan baik untuk menciptakan atmosfer akademik yang ideal. Penelitian ini merancang sistem pemantauan keamanan online di area selasar G4 TEUM dengan memanfaatkan media sosial yang menggunakan sistem Publish-Subscribe Adaptif. Publisher yaitu mahasiswa mengunggah kondisi terkini dari selasar G4 TEUM dengan memanfaatkan media sosial, seperti twitter, facebook, dan instagram, kemudian broker memilih data upload sesuai dengan konten G4 yang akan dikirimkan berupa notifikasi ke Subscriber, yaitu pihak keamanan TEUM dalam bentuk aplikasi web dinamis. Hasil percobaan menunjukkan bahwa dengan menggunakan metode Publish-Subscribe adaptif, penggunaan CPU berkurang sebesar 31,76% dan penggunaan bandwidth sebesar 39,4%, dibandingkan dengan metode non adaptif, pada data event yang diperoleh baik pada Publisher maupun Subscriber.

  12. Predicting subscriber dissatisfaction and improving retention in the wireless telecommunications industry.

    Science.gov (United States)

    Mozer, M C; Wolniewicz, R; Grimes, D B; Johnson, E; Kaushansky, H

    2000-01-01

    Competition in the wireless telecommunications industry is fierce. To maintain profitability, wireless carriers must control churn, which is the loss of subscribers who switch from one carrier to another.We explore techniques from statistical machine learning to predict churn and, based on these predictions, to determine what incentives should be offered to subscribers to improve retention and maximize profitability to the carrier. The techniques include logit regression, decision trees, neural networks, and boosting. Our experiments are based on a database of nearly 47,000 U.S. domestic subscribers and includes information about their usage, billing, credit, application, and complaint history. Our experiments show that under a wide variety of assumptions concerning the cost of intervention and the retention rate resulting from intervention, using predictive techniques to identify potential churners and offering incentives can yield significant savings to a carrier. We also show the importance of a data representation crafted by domain experts. Finally, we report on a real-world test of the techniques that validate our simulation experiments.

  13. Distributing Knight. Using Type-Based Publish/Subscribe for Building Distributed Collaboration Tools

    DEFF Research Database (Denmark)

    Damm, Christian Heide; Hansen, Klaus Marius

    2002-01-01

    more important. We present Distributed Knight, an extension to the Knight tool, for distributed, collaborative, and gesture-based object-oriented modelling. Distributed Knight was built using the type-based publish/subscribe paradigm. Based on this case, we argue that type-based publish......Distributed applications are hard to understand, build, and evolve. The need for decoupling, flexibility, and heterogeneity in distributed collaboration tools present particular problems; for such applications, having the right abstractions and primitives for distributed communication becomes even....../subscribe provides a natural and effective abstraction for developing distributed collaboration tools....

  14. Multiuser Diversity with Adaptive Modulation in Non-Identically Distributed Nakagami Fading Environments

    KAUST Repository

    Rao, Anlei

    2012-09-08

    In this paper, we analyze the performance of adaptive modulation with single-cell multiuser scheduling over independent but not identical distributed (i.n.i.d.) Nakagami fading channels. Closed-form expressions are derived for the average channel capacity, spectral efficiency, and bit-error-rate (BER) for both constant-power variable-rate and variable-power variable-rate uncoded/coded M-ary quadrature amplitude modulation (M-QAM) schemes. We also study the impact of time delay on the average BER of adaptive M-QAM. Selected numerical results show that the multiuser diversity brings a considerably better performance even over i.n.i.d. fading environments.

  15. Adaptive Modulation with Best User Selection over Non-Identical Nakagami Fading Channels

    KAUST Repository

    Rao, Anlei

    2012-09-08

    In this paper, we analyze the performance of adaptive modulation with single-cell multiuser scheduling over independent but not identical distributed (i.n.i.d.) Nakagami fading channels. Closed-form expressions are derived for the average channel capacity, spectral efficiency, and bit-error-rate (BER) for both constant-power variable-rate and variable-power variable-rate uncoded M-ary quadrature amplitude modulation (M-QAM) schemes. We also study the impact of time delay on the average BER of adaptive M-QAM. Selected numerical results show that the multiuser diversity brings a considerably better performance even over i.n.i.d. fading environments.

  16. A Generational Comparison of Social Networking Site Use: The Influence of Age and Social Identity

    Science.gov (United States)

    Barker, Valerie

    2012-01-01

    An online survey (N = 256) compared social networking site (SNS) use among younger (millennial: 18-29) and older (baby-boomer: 41-64) subscribers focusing on the influence of collective self-esteem and group identity on motives for SNS use. Younger participants reported higher positive collective self-esteem, social networking site use for peer…

  17. Architectural Analysis of Systems Based on the Publisher-Subscriber Style

    Science.gov (United States)

    Ganesun, Dharmalingam; Lindvall, Mikael; Ruley, Lamont; Wiegand, Robert; Ly, Vuong; Tsui, Tina

    2010-01-01

    Architectural styles impose constraints on both the topology and the interaction behavior of involved parties. In this paper, we propose an approach for analyzing implemented systems based on the publisher-subscriber architectural style. From the style definition, we derive a set of reusable questions and show that some of them can be answered statically whereas others are best answered using dynamic analysis. The paper explains how the results of static analysis can be used to orchestrate dynamic analysis. The proposed method was successfully applied on the NASA's Goddard Mission Services Evolution Center (GMSEC) software product line. The results show that the GMSEC has a) a novel reusable vendor-independent middleware abstraction layer that allows the NASA's missions to configure the middleware of interest without changing the publishers' or subscribers' source code, and b) some high priority bugs due to behavioral discrepancies, which were eluded during testing and code reviews, among different implementations of the same APIs for different vendors.

  18. A generational comparison of social networking site use: the influence of age and social identity.

    Science.gov (United States)

    Barker, Valerie

    2012-01-01

    An online survey (N=256) compared social networking site (SNS) use among younger (millennial: 18-29) and older (baby-boomer: 41-64) subscribers focusing on the influence of collective self-esteem and group identity on motives for SNS use. Younger participants reported higher positive collective self-esteem, social networking site use for peer communication, and social compensation. Regardless of age, participants reporting high collective self-esteem and group identity were more likely to use social networking sites for peer communication and social identity gratifications, while those reporting negative collective self-esteem were more likely to use social networking sites for social compensation. The theoretical implications of the strong relationship between social identity gratifications and social compensation are discussed.

  19. Understanding the Self-Directed Online Learning Preferences, Goals, Achievements, and Challenges of MIT OpenCourseWare Subscribers

    Science.gov (United States)

    Bonk, Curtis J.; Lee, Mimi Miyoung; Kou, Xiaojing; Xu, Shuya; Sheu, Feng-Ru

    2015-01-01

    This research targeted the learning preferences, goals and motivations, achievements, challenges, and possibilities for life change of self-directed online learners who subscribed to the monthly OpenCourseWare (OCW) e-newsletter from MIT. Data collection included a 25-item survey of 1,429 newsletter subscribers; 613 of whom also completed an…

  20. Federated Identity Management for Research Collaborations

    CERN Document Server

    Broeder, Daan; Kelsey, David; Kershaw, Philip; Lüders, Stefan; Lyall, Andrew; Nyrönen, Tommi; Wartel, Romain; Weyer, Heinz J

    2012-01-01

    Federated identity management (FIM) is an arrangement that can be made among multiple organisations that lets subscribers use the same identification data to obtain access to the secured resources of all organisations in the group. Identity federation offers economic advantages, as well as convenience, to organisations and their users. For example, multiple institutions can share a single application, with resultant cost savings and consolidation of resources. In order for FIM to be effective, the partners must have a sense of mutual trust. A number of laboratories including national and regional research organizations are facing the challenge of a deluge of scientific data that needs to be accessed by expanding user bases in dynamic collaborations that cross organisational and national boundaries. Driven by these needs, representatives from a variety of research communities, including photon/neutron facilities, social science & humanities, high-energy physics, atmospheric science, bioinformatics and fusi...

  1. The application and analyze of the publish-subscribe communication system for radiation and environmental monitoring system

    International Nuclear Information System (INIS)

    Ismet Isnaini; I Putu Susila; Istofa

    2016-01-01

    As part of the RAMONA (Radiation and Meteorological Monitoring Analysis System), a publish and subscribe communication system has been designed and implemented, to enable the Ultrasonic Device of Maretron WS0100 which is connected to the client computer to communicate with the server and/or other client. The Maretron is connected to other devices through an interface which use an NMEA2000 protocol, a communication protocol standard set by the National Maritime Electrical Association (NMEA), which usually used in the communication between sensors in the ships and its display. The Maretron device has several sensors embedded such as humidity, wind direction and speed, temperature as well as speed. The communication between Maretron is utilizing a MQTT (Message Queueing Telemetry Transport) system, a publish/subscribe protocol, in which a client publish its data to a data bus with a certain topic, while the server or other client who subscribe to that topic through a broker will then grab and process the data. The data format sent by the Maretron is in JSON (Java Scrip Object Notation) format, which will be parsed by the subscriber and later will be saved on a database or displayed in a website as per requirement. (author)

  2. 47 CFR 68.214 - Changes in other than “fully protected” premises wiring that serves fewer than four subscriber...

    Science.gov (United States)

    2010-10-01

    ... premises wiring that serves fewer than four subscriber access lines. 68.214 Section 68.214... other than “fully protected” premises wiring that serves fewer than four subscriber access lines. Operations associated with the installation, connection, reconfiguration and removal (other than final...

  3. The role of national identity representation in the relation between in-group identification and out-group derogation: Ethnic versus civic representation

    OpenAIRE

    Meeus, Joke; Duriez, Bart; Vanbeselaere, Norbert; Boen, Filip

    2010-01-01

    Two studies investigated whether the content of in-group identity affects the relation between in-group identification and ethnic prejudice. The first study among university students, tested whether national identity representations (i.e. ethnic vs. civic) moderate or mediate the relation between Flemish in-group identification and ethnic prejudice. A moderation hypothesis is supported when those higher in identification who subscribe to a more ethnic representation display higher ethnic prej...

  4. 26 CFR 1.823-7 - Subscribers of reciprocal underwriters and interinsurers.

    Science.gov (United States)

    2010-04-01

    ... (CONTINUED) INCOME TAX (CONTINUED) INCOME TAXES Mutual Insurance Companies (other Than Life and Certain Marine Insurance Companies and Other Than Fire Or Flood Insurance Companies Which Operate on Basis of... extent the insurance premium constituted a deductible expense when paid or accrued, the subscriber's...

  5. Collecting Social Network Data from Mobile Phone SIM Cards

    Science.gov (United States)

    Peseckas, Ryan

    2016-01-01

    I used a subscriber identity module card reader to copy the lists of saved contacts from 170 mobile phones in Fiji. This approach has both advantages and disadvantages compared to other techniques for collecting telephone network data. Copying phone contacts avoids recall biases associated with survey-based name generators. It also obviates the…

  6. 7 CFR 1735.13 - Location of facilities and service for nonrural subscribers.

    Science.gov (United States)

    2010-01-01

    ...-TELECOMMUNICATIONS PROGRAM Loan Purposes and Basic Policies § 1735.13 Location of facilities and service for nonrural... times be necessary to provide loan funds to finance telephone facilities which (1) will also serve nonrural subscribers, or (2) are located in nonrural areas. Loans may be approved to finance such...

  7. The Levi-Civita Tensor and Identities in Vector Analysis. Vector Field Identities. Modules and Monographs in Undergraduate Mathematics and Its Applications Project. UMAP Unit 427.

    Science.gov (United States)

    Yiu, Chang-li; Wilde, Carroll O.

    Vector analysis is viewed to play a key role in many branches of engineering and the physical sciences. This unit is geared towards deriving identities and establishing "machinery" to make derivations a routine task. It is noted that the module is not an applications unit, but has as its primary objective the goal of providing science,…

  8. A community-based event delivery protocol in publish/subscribe systems for delay tolerant sensor networks.

    Science.gov (United States)

    Liu, Nianbo; Liu, Ming; Zhu, Jinqi; Gong, Haigang

    2009-01-01

    The basic operation of a Delay Tolerant Sensor Network (DTSN) is to finish pervasive data gathering in networks with intermittent connectivity, while the publish/subscribe (Pub/Sub for short) paradigm is used to deliver events from a source to interested clients in an asynchronous way. Recently, extension of Pub/Sub systems in DTSNs has become a promising research topic. However, due to the unique frequent partitioning characteristic of DTSNs, extension of a Pub/Sub system in a DTSN is a considerably difficult and challenging problem, and there are no good solutions to this problem in published works. To ad apt Pub/Sub systems to DTSNs, we propose CED, a community-based event delivery protocol. In our design, event delivery is based on several unchanged communities, which are formed by sensor nodes in the network according to their connectivity. CED consists of two components: event delivery and queue management. In event delivery, events in a community are delivered to mobile subscribers once a subscriber comes into the community, for improving the data delivery ratio. The queue management employs both the event successful delivery time and the event survival time to decide whether an event should be delivered or dropped for minimizing the transmission overhead. The effectiveness of CED is demonstrated through comprehensive simulation studies.

  9. Structured P2P overlay of mobile brokers for realizing publish/subscribe communication in VANET.

    Science.gov (United States)

    Pandey, Tulika; Garg, Deepak; Gore, Manoj Madhava

    2014-01-01

    Publish/subscribe communication paradigm provides asynchrony and decoupling, making it an elegant alternative for designing applications in distributed and dynamic environment such as vehicular ad hoc networks (VANETs). In this paradigm, the broker is the most important component that decouples other two components, namely, publisher and subscriber. Previous research efforts have either utilized the deployment of distributed brokers on stationary road side info-stations or have assigned the role of broker to any moving vehicle on ad hoc basis. In one approach, lots of preinstalled infrastructures are needed whereas, in another, the quality of service is not guaranteed due to unpredictable moving and stopping patterns of vehicles. In this paper, we present the architecture of distributed mobile brokers which are dynamically reconfigurable in the form of structured P2P overlay and act as rendezvous points for matching publications and subscriptions. We have taken city buses in urban settings to act as mobile brokers whereas other vehicles are considered to be in role of publishers and subscribers. These mobile brokers also assist in locating a vehicle for successful and timely transfer of notifications. We have performed an extensive simulation study to compare our approach with previously proposed approaches. Simulation results establish the applicability of our approach.

  10. Structured P2P Overlay of Mobile Brokers for Realizing Publish/Subscribe Communication in VANET

    Directory of Open Access Journals (Sweden)

    Tulika Pandey

    2014-01-01

    Full Text Available Publish/subscribe communication paradigm provides asynchrony and decoupling, making it an elegant alternative for designing applications in distributed and dynamic environment such as vehicular ad hoc networks (VANETs. In this paradigm, the broker is the most important component that decouples other two components, namely, publisher and subscriber. Previous research efforts have either utilized the deployment of distributed brokers on stationary road side info-stations or have assigned the role of broker to any moving vehicle on ad hoc basis. In one approach, lots of preinstalled infrastructures are needed whereas, in another, the quality of service is not guaranteed due to unpredictable moving and stopping patterns of vehicles. In this paper, we present the architecture of distributed mobile brokers which are dynamically reconfigurable in the form of structured P2P overlay and act as rendezvous points for matching publications and subscriptions. We have taken city buses in urban settings to act as mobile brokers whereas other vehicles are considered to be in role of publishers and subscribers. These mobile brokers also assist in locating a vehicle for successful and timely transfer of notifications. We have performed an extensive simulation study to compare our approach with previously proposed approaches. Simulation results establish the applicability of our approach.

  11. Maximizing the number of satisfied subscribers in Pub/Sub systems under capacity constraints

    NARCIS (Netherlands)

    Setty, V.J.; Kreitz, G; Urdaneta, G; Vitenberg, R; van Steen, M.R.

    2014-01-01

    Publish/subscribe (pub/sub) is a popular communication paradigm in the design of large-scale distributed systems. A provider of a pub/sub service (whether centralized, peer-assisted, or based on a federated organization of cooperatively managed servers) commonly faces a fundamental challenge: given

  12. E-lifestyle, Customer Satisfaction and Loyalty among Mobile Subscribers in Thailand

    OpenAIRE

    Hassan, Siti Hasnah; Thurasamy, T. Ramayah; Loi, Wai Yee

    2017-01-01

    This paper aims at assessing the relationship between e-lifestyle, customer satisfaction, and loyalty among mobile service subscribers in Thailand. The results reveal that e-lifestyle has a substantial effect on customer satisfaction. Subsequently, customer satisfaction affects strongly on consumer loyalty towards telecommunication service providers. Moreover, customer satisfaction mediates the relationship between e-lifestyle and consumer loyalty. The study concludes that e-lifestyle has to ...

  13. A Community-Based Event Delivery Protocol in Publish/Subscribe Systems for Delay Tolerant Sensor Networks

    Directory of Open Access Journals (Sweden)

    Haigang Gong

    2009-09-01

    Full Text Available The basic operation of a Delay Tolerant Sensor Network (DTSN is to finish pervasive data gathering in networks with intermittent connectivity, while the publish/subscribe (Pub/Sub for short paradigm is used to deliver events from a source to interested clients in an asynchronous way. Recently, extension of Pub/Sub systems in DTSNs has become a promising research topic. However, due to the unique frequent partitioning characteristic of DTSNs, extension of a Pub/Sub system in a DTSN is a considerably difficult and challenging problem, and there are no good solutions to this problem in published works. To ad apt Pub/Sub systems to DTSNs, we propose CED, a community-based event delivery protocol. In our design, event delivery is based on several unchanged communities, which are formed by sensor nodes in the network according to their connectivity. CED consists of two components: event delivery and queue management. In event delivery, events in a community are delivered to mobile subscribers once a subscriber comes into the community, for improving the data delivery ratio. The queue management employs both the event successful delivery time and the event survival time to decide whether an event should be delivered or dropped for minimizing the transmission overhead. The effectiveness of CED is demonstrated through comprehensive simulation studies.

  14. Publish/Subscribe on Top of DHT Using RETE Algorithm

    Science.gov (United States)

    Shvartzshnaider, Yan; Ott, Maximilian; Levy, David

    This paper discusses the construction of a Global Semantic Graph (GSG) [1] to support future information- and collaboration-centric applications and services. The GSG is a publish/subscribe (pub/sub) based architecture that supports publication of tuples and subscriptions with standing graph queries. We believe that an implementation of an efficient pattern matching algorithm such as Rete [2] on top of a distributed environment might serve as a possible substrate for GSG's pub/sub facility. Rete operates on loosely coupled alpha, beta and join nodes and therefore has been chosen by us for implementation in a distributed setting.

  15. Approximate spatio-temporal top-k publish/subscribe

    KAUST Repository

    Chen, Lisi

    2018-04-26

    Location-based publish/subscribe plays a significant role in mobile information disseminations. In this light, we propose and study a novel problem of processing location-based top-k subscriptions over spatio-temporal data streams. We define a new type of approximate location-based top-k subscription, Approximate Temporal Spatial-Keyword Top-k (ATSK) Subscription, that continuously feeds users with relevant spatio-temporal messages by considering textual similarity, spatial proximity, and information freshness. Different from existing location-based top-k subscriptions, Approximate Temporal Spatial-Keyword Top-k (ATSK) Subscription can automatically adjust the triggering condition by taking the triggering score of other subscriptions into account. The group filtering efficacy can be substantially improved by sacrificing the publishing result quality with a bounded guarantee. We conduct extensive experiments on two real datasets to demonstrate the performance of the developed solutions.

  16. Approximate spatio-temporal top-k publish/subscribe

    KAUST Repository

    Chen, Lisi; Shang, Shuo

    2018-01-01

    Location-based publish/subscribe plays a significant role in mobile information disseminations. In this light, we propose and study a novel problem of processing location-based top-k subscriptions over spatio-temporal data streams. We define a new type of approximate location-based top-k subscription, Approximate Temporal Spatial-Keyword Top-k (ATSK) Subscription, that continuously feeds users with relevant spatio-temporal messages by considering textual similarity, spatial proximity, and information freshness. Different from existing location-based top-k subscriptions, Approximate Temporal Spatial-Keyword Top-k (ATSK) Subscription can automatically adjust the triggering condition by taking the triggering score of other subscriptions into account. The group filtering efficacy can be substantially improved by sacrificing the publishing result quality with a bounded guarantee. We conduct extensive experiments on two real datasets to demonstrate the performance of the developed solutions.

  17. Status and Subscribing: A Response to Schwitzgebel

    Science.gov (United States)

    Hewson, Peter W.; Lemberger, John

    Schwitzgebel (1999) has proposed an account of theories that can be used in deciding whether children's cognitive development is like theory change in science. In this article we outline an account of conceptual learning in terms of the conceptions that people hold, the status they award to their conceptions, and the conceptual ecology containing the criteria they use in determining status. A comparison of our account with Schwitzgebel's shows an equivalence between Schwitzgebel's subscribing and one component of status (fruitfulness), but no counterpart to another (plausibility). In addition, Schwitzgebel's account predicts that people possess an explanation-seeking curiosity that is associated with patterns of arousal and affect when anomalous phenomena are encountered. We present the results of empirical work that demonstrates that students do exhibit strong affective reactions to awareness of experimental anomalies and their resolution.

  18. Creation of an online multimedia radiology module access to Internet

    International Nuclear Information System (INIS)

    Alejo, J.P.; Vega, J.M.; Perez, R.

    1996-01-01

    Using freely distributed programs, we have created a radiology data server in the world wide web (WWW) system, which includes among its services a radiological teaching module developed entirely in Spanish. This server is linked to Internet, the extensive worldwide computer network, to which WWW subscribers have access. The data is presented in hypertext and hypermedia format. (Author) 9 refs

  19. A Comparison Between Publish-and-Subscribe and Client-Server Models in Distributed Control System Networks

    Science.gov (United States)

    Boulanger, Richard P., Jr.; Kwauk, Xian-Min; Stagnaro, Mike; Kliss, Mark (Technical Monitor)

    1998-01-01

    The BIO-Plex control system requires real-time, flexible, and reliable data delivery. There is no simple "off-the-shelf 'solution. However, several commercial packages will be evaluated using a testbed at ARC for publish- and-subscribe and client-server communication architectures. Point-to-point communication architecture is not suitable for real-time BIO-Plex control system. Client-server architecture provides more flexible data delivery. However, it does not provide direct communication among nodes on the network. Publish-and-subscribe implementation allows direct information exchange among nodes on the net, providing the best time-critical communication. In this work Network Data Delivery Service (NDDS) from Real-Time Innovations, Inc. ARTIE will be used to implement publish-and subscribe architecture. It offers update guarantees and deadlines for real-time data delivery. Bridgestone, a data acquisition and control software package from National Instruments, will be tested for client-server arrangement. A microwave incinerator located at ARC will be instrumented with a fieldbus network of control devices. BridgeVIEW will be used to implement an enterprise server. An enterprise network consisting of several nodes at ARC and a WAN connecting ARC and RISC will then be setup to evaluate proposed control system architectures. Several network configurations will be evaluated for fault tolerance, quality of service, reliability and efficiency. Data acquired from these network evaluation tests will then be used to determine preliminary design criteria for the BIO-Plex distributed control system.

  20. Fiber To The Subscriber: Look At Narrowband Services First

    Science.gov (United States)

    Mangum, Karen L.

    1990-01-01

    Today, it's not easy to find a telecommunications publication that doesn't have a feature article on fiber to the home. Not only do these articles appear in telecommunications publications but in newspapers like in the Wall Street Journal and USA Today. What concerns me about these articles is the immediate emphasis on CATV and video on demand services. Fiber is indeed a broadband transmission medium. However, from BellSouths point of view, the video services are not necessary to the economic equation for placing fiber to the subscriber. Our objective is to place fiber in the network for POTS like services first and upgrade the electronics based on customer demand.

  1. CMSG - A PUBLISH/SUBSCRIBE INTERPROCESS COMMUNICATION PACKAGE

    International Nuclear Information System (INIS)

    Wolin, Elliott; Timmer, Carl; Gyurjyan, Vardan; Heyes, William; Jastrzembski, Edward; Lawrence, David; Abbott, David

    2008-01-01

    Publish/subscribe message passing is an extremely simple, flexible, and powerful interprocess communication (IPC) paradigm. It is widely used in industry, but not nearly so in High Energy and Nuclear Physics (HENP), perhaps due to the cost of commercial implementations. cMsg, developed at Jefferson Lab in the US, contains a full-featured pub/sub interprocess communication package that is simple to install and use. It is very efficient, and implements both point-to-point and pub/sub communications, server redundancy, hot server failover, and a server discovery service. In addition, for developers cMsg provides a framework within which one can deploy multiple underlying communication packages that do not necessarily need to implement the full pub/sub paradigm. This allows for unification of all communication in a control system under a single API, shortens development time, and allows for simple upgrade or replacement of underlying communication packages and protocols.

  2. Top-Down Modulation on the Perception and Categorization of Identical Pitch Contours in Speech and Music

    Directory of Open Access Journals (Sweden)

    Joey L. Weidema

    2016-06-01

    Full Text Available Whether pitch in language and music is governed by domain-specific or domain-general cognitive mechanisms is contentiously debated. The aim of the present study was to investigate whether mechanisms governing pitch contour perception operate differently when pitch information is interpreted as either speech or music. By modulating listening mode, this study aspired to demonstrate that pitch contour perception relies on domain-specific cognitive mechanisms, which are regulated by top-down influences from language and music. Three groups of participants (Mandarin speakers, Dutch speaking non-musicians, and Dutch musicians were exposed to identical pitch contours, and tested on their ability to identify these contours in a language and musical context. Stimuli consisted of disyllabic words spoken in Mandarin, and melodic tonal analogues, embedded in a linguistic and melodic carrier phrase, respectively. Participants classified identical pitch contours as significantly different depending on listening mode. Top-down influences from language appeared to alter the perception of pitch contour in speakers of Mandarin. This was not the case for non-musician speakers of Dutch. Moreover, this effect was lacking in Dutch speaking musicians. The classification patterns of pitch contours in language and music seem to suggest that domain-specific categorization is modulated by top-down influences from language and music.

  3. Self-Adapting Routing Overlay Network for Frequently Changing Application Traffic in Content-Based Publish/Subscribe System

    Directory of Open Access Journals (Sweden)

    Meng Chi

    2014-01-01

    Full Text Available In the large-scale distributed simulation area, the topology of the overlay network cannot always rapidly adapt to frequently changing application traffic to reduce the overall traffic cost. In this paper, we propose a self-adapting routing strategy for frequently changing application traffic in content-based publish/subscribe system. The strategy firstly trains the traffic information and then uses this training information to predict the application traffic in the future. Finally, the strategy reconfigures the topology of the overlay network based on this predicting information to reduce the overall traffic cost. A predicting path is also introduced in this paper to reduce the reconfiguration numbers in the process of the reconfigurations. Compared to other strategies, the experimental results show that the strategy proposed in this paper could reduce the overall traffic cost of the publish/subscribe system in less reconfigurations.

  4. An Analytic Hierarchy Process Analysis: Application to Subscriber Retention Decisions in the Nigerian Mobile Telecommunications

    Directory of Open Access Journals (Sweden)

    Adebiyi Sulaimon Olanrewaju

    2015-12-01

    Full Text Available The introduction of mobile number portability (MNP in the Nigerian telecommunications industry has brought a new challenge for mobile operators. This study investigates the use of Analytic Hierarchy Process (AHP in customer retention decisions in the Nigerian telecommunication industry using a cross-sectional survey design. Primary data were obtained through questionnaires administered to 480 mobile telecommunications subscribers in six tertiary institutions located in Lagos State, Nigeria. These educational institutions were chosen using a multistage sampling technique. Of 438 questionnaires received from subscribers, 408 were valid. Based on this sample data an AHP model was built to assess the determinants of customer retention decisions. Next, eigen values, an eigen vector and maximum lambda (λMax were obtained using the AHP analysis for the matrices. This analysis shows that customers considered call quality as the important in the retention decision. We conclude that AHP is a meaningful tool for determining what motivates retention decisions, that can help network operators formulate effective customer retention strategies.

  5. Enabling Large-Scale IoT-Based Services through Elastic Publish/Subscribe.

    Science.gov (United States)

    Vavassori, Sergio; Soriano, Javier; Fernández, Rafael

    2017-09-19

    In this paper, we report an algorithm that is designed to leverage the cloud as infrastructure to support Internet of Things (IoT) by elastically scaling in/out so that IoT-based service users never stop receiving sensors' data. This algorithm is able to provide an uninterrupted service to end users even during the scaling operation since its internal state repartitioning is transparent for publishers or subscribers; its scaling operation is time-bounded and depends only on the dimension of the state partitions to be transmitted to the different nodes. We describe its implementation in E-SilboPS, an elastic content-based publish/subscribe (CBPS) system specifically designed to support context-aware sensing and communication in IoT-based services. E-SilboPS is a key internal asset of the FIWARE IoT services enablement platform, which offers an architecture of components specifically designed to capture data from, or act upon, IoT devices as easily as reading/changing the value of attributes linked to context entities. In addition, we discuss the quantitative measurements used to evaluate the scale-out process, as well as the results of this evaluation. This new feature rounds out the context-aware content-based features of E-SilboPS by providing, for example, the necessary middleware for constructing dashboards and monitoring panels that are capable of dynamically changing queries and continuously handling data in IoT-based services.

  6. Heterogeneity of neuroblastoma cell identity defined by transcriptional circuitries.

    Science.gov (United States)

    Boeva, Valentina; Louis-Brennetot, Caroline; Peltier, Agathe; Durand, Simon; Pierre-Eugène, Cécile; Raynal, Virginie; Etchevers, Heather C; Thomas, Sophie; Lermine, Alban; Daudigeos-Dubus, Estelle; Geoerger, Birgit; Orth, Martin F; Grünewald, Thomas G P; Diaz, Elise; Ducos, Bertrand; Surdez, Didier; Carcaboso, Angel M; Medvedeva, Irina; Deller, Thomas; Combaret, Valérie; Lapouble, Eve; Pierron, Gaelle; Grossetête-Lalami, Sandrine; Baulande, Sylvain; Schleiermacher, Gudrun; Barillot, Emmanuel; Rohrer, Hermann; Delattre, Olivier; Janoueix-Lerosey, Isabelle

    2017-09-01

    Neuroblastoma is a tumor of the peripheral sympathetic nervous system, derived from multipotent neural crest cells (NCCs). To define core regulatory circuitries (CRCs) controlling the gene expression program of neuroblastoma, we established and analyzed the neuroblastoma super-enhancer landscape. We discovered three types of identity in neuroblastoma cell lines: a sympathetic noradrenergic identity, defined by a CRC module including the PHOX2B, HAND2 and GATA3 transcription factors (TFs); an NCC-like identity, driven by a CRC module containing AP-1 TFs; and a mixed type, further deconvoluted at the single-cell level. Treatment of the mixed type with chemotherapeutic agents resulted in enrichment of NCC-like cells. The noradrenergic module was validated by ChIP-seq. Functional studies demonstrated dependency of neuroblastoma with noradrenergic identity on PHOX2B, evocative of lineage addiction. Most neuroblastoma primary tumors express TFs from the noradrenergic and NCC-like modules. Our data demonstrate a previously unknown aspect of tumor heterogeneity relevant for neuroblastoma treatment strategies.

  7. Perceptions of the Concerned Reader: An Analysis of the Subscribers of E/The Environmental Magazine.

    Science.gov (United States)

    Labbe, Colleen P.; Fortner, Rosanne W.

    2001-01-01

    Describes a study aimed at determining if 'E/The Environmental Magazine' has met two goals: (1) its subscribers' need for environmental information and (2) its publishers' goal of inspiring environmentally responsible behavior. Results indicate that the level of the magazine's influence varied according to the reader's behavior category.…

  8. Weakly Coretractable Modules

    Science.gov (United States)

    Hadi, Inaam M. A.; Al-aeashi, Shukur N.

    2018-05-01

    If R is a ring with identity and M is a unitary right R-module. Here we introduce the class of weakly coretractable module. Some basic properties are investigated and some relationships between these modules and other related one are introduced.

  9. Anonymous authentication and location privacy preserving schemes for LTE-A networks

    Directory of Open Access Journals (Sweden)

    Zaher Jabr Haddad

    2017-11-01

    Full Text Available Long Term Evaluation Advanced (LTE-A is the third generation partnership project for cellular network that allows subscribers to roam into networks (i.e., the Internet and wireless connections using spacial purpose base-stations, such as wireless access points and home node B. In such LTE-A based networks, neither base-stations, nor the Internet and wireless connections are trusted because base-stations are operated by un-trusted subscribers. Attackers may exploit these vulnerabilities to violate the privacy of the LTE-A subscribers. On the other hand, the tradeoff between privacy and authentication is another challenge in such networks. Therefore, in this paper, we propose two anonymous authentication schemes based on one-time pseudonymes and Schnorr Zero Knowledge Protocols. Instead of the international mobile subscriber identity, these schemes enable the user equipment, base-stations and mobility management entity to mutually authenticate each others and update the location of the user equipment without evolving the home subscriber server. The security analysis demonstrate that the proposed schemes thwart security and privacy attacks, such as malicious, international mobile subscriber identity catching, and tracking attacks. Additionally, our proposed schemes preserve the location privacy of user equipment since no entity except the mobility management entity and Gate-Way Mobile Location Center can link between the pseudonymes and the international mobile subscriber identity. Also attackers have no knowledge about international mobile subscriber identity. Hence, the proposed schemes achieve backward/forward secrecy. Furthermore, the performance evaluation shows that the proposed handover schemes impose a small overhead on the mobile nodes and it has smaller computation and communication overheads than those in other schemes.

  10. Subscribers and newspaper subscriptions in Spain at the beginning of the XX century. Notes from an asturian perspective

    Directory of Open Access Journals (Sweden)

    Víctor Rodríguez Infiesta

    2008-12-01

    Full Text Available In the first decades of the XX century the possibility of a particular newspaper having a high number of subscribers was, from the point of view of the newspaper publishers, the best guarantee of its stability. However it was not all advantages in a system which gave rise to numerous complaints and created a peculiar relationship with the subscriber. By various means —delivery men, the post and public establishments, principally— the subscription service continually generated situations illustrative of the level of development of the Spanish press in years in which progress accelerates and deficiencies and limitations also become apparent. Limitations which, particularly in an outlying region with mostly inadequate means of communication such as Asturias, could become one of the main factors delaying the establishment of a large press with mass-readership.

  11. Determinants of Customer Loyalty among Mobile Telecom Subscribers in the Brong Ahafo Region of Ghana

    Directory of Open Access Journals (Sweden)

    Kwabena Adjei

    2014-01-01

    Full Text Available The purpose of this study is to investigate the determinants of brand equity among mobile telecom users in Brong Ahafo Region of Ghana. Mobile telecommunication providers have a great role in strengthening the economy and encouraging the efficiency among a large number of subscribers across the country. The success of any business depends on the strength of their brands, which attracts new and existing customers for continuous growth.  In Ghana, there are six mobile telecom providers operating in the market (Vodafone, Airtel, MTN, Tigo, Glo, & Expresso. Primary data was obtained through a questionnaire and residents of Sunyani Municipality were targeted for the study. 200 questionnaires were self-administered by the researchers to the subscribers of all the mobile telecom providers and 194 questionnaires were returned. The questionnaires were analysed using SPSS 16 and pearson correlation was used to establish the relationship between the dependent and independent variables. The results identified call rate/quality, network coverage and sales promotion as having significant positive relationship to customer loyalty. In addition, brand image and prompt customer service were seen to have a less effect on customer loyalty.

  12. Transmission Delay Modeling of Packet Communication over Digital Subscriber Line

    Directory of Open Access Journals (Sweden)

    Jiri Vodrazka

    2013-01-01

    Full Text Available Certain multimedia and voice services, such as VoIP, IPTV, etc., are significantly delay sensitive and their performance is influenced by the overall transmission delay and its variance. One of the most common solutions used in access networks are xDSL lines, especially ADSL2+ or VDSL2. Although these subscriber lines also use packet communication, there are several differences and mechanisms, which influence their resulting delay. Their delay characteristics are also dependent on the individual settings of each xDSL provider, therefore we decided to investigate this area for typical commercially available lines in Czech Republic. Based on the measured values and experiments with real ADSL2+ lines we also developed a potential modeling method, which is presented in this article as well. The parameters for packet jitter based on the generalized Pareto distribution were modeled.

  13. Building flexible, distributed collaboration tools using type-based publish/subscribe - The Distributed Knight case

    DEFF Research Database (Denmark)

    Hansen, Klaus Marius; Damm, Christian Heide

    2004-01-01

    Distributed collaboration is becoming increasingly impor tant also in software development. Combined with an in creasing interest in experimental and agile approaches to software development, this poses challenges to tool sup port for software development. Specifically, tool support is needed...... for flexible, distributed collaboration. We intro duce the Distributed Knight tool that provides flexible and lightweight support for distributed collaboration in object oriented modelling. The Distributed Knight implementa tion builds crucially on the type-based publish/subscribe distributed communication...... paradigm, which provides an effective and natural abstraction for developing distributed collaboration tools....

  14. Identities and derivations for Jacobian algebras

    International Nuclear Information System (INIS)

    Dzhumadil'daev, A.S.

    2001-09-01

    Constructions of n-Lie algebras by strong n-Lie-Poisson algebras are given. First cohomology groups of adjoint module of Jacobian algebras are calculated. Minimal identities of 3-Jacobian algebra are found. (author)

  15. Distributed acoustic cues for caller identity in macaque vocalization.

    Science.gov (United States)

    Fukushima, Makoto; Doyle, Alex M; Mullarkey, Matthew P; Mishkin, Mortimer; Averbeck, Bruno B

    2015-12-01

    Individual primates can be identified by the sound of their voice. Macaques have demonstrated an ability to discern conspecific identity from a harmonically structured 'coo' call. Voice recognition presumably requires the integrated perception of multiple acoustic features. However, it is unclear how this is achieved, given considerable variability across utterances. Specifically, the extent to which information about caller identity is distributed across multiple features remains elusive. We examined these issues by recording and analysing a large sample of calls from eight macaques. Single acoustic features, including fundamental frequency, duration and Weiner entropy, were informative but unreliable for the statistical classification of caller identity. A combination of multiple features, however, allowed for highly accurate caller identification. A regularized classifier that learned to identify callers from the modulation power spectrum of calls found that specific regions of spectral-temporal modulation were informative for caller identification. These ranges are related to acoustic features such as the call's fundamental frequency and FM sweep direction. We further found that the low-frequency spectrotemporal modulation component contained an indexical cue of the caller body size. Thus, cues for caller identity are distributed across identifiable spectrotemporal components corresponding to laryngeal and supralaryngeal components of vocalizations, and the integration of those cues can enable highly reliable caller identification. Our results demonstrate a clear acoustic basis by which individual macaque vocalizations can be recognized.

  16. Combining Diffusion Models and Macroeconomic Indicators with a Modified Genetic Programming Method: Implementation in Forecasting the Number of Mobile Telecommunications Subscribers in OECD Countries

    Directory of Open Access Journals (Sweden)

    Konstantinos Salpasaranis

    2014-01-01

    Full Text Available This paper proposes a modified Genetic Programming method for forecasting the mobile telecommunications subscribers’ population. The method constitutes an expansion of the hybrid Genetic Programming (hGP method improved by the introduction of diffusion models for technological forecasting purposes in the initial population, such as the Logistic, Gompertz, and Bass, as well as the Bi-Logistic and LogInLog. In addition, the aforementioned functions and models expand the function set of hGP. The application of the method in combination with macroeconomic indicators such as Gross Domestic Product per Capita (GDPpC and Consumer Prices Index (CPI leads to the creation of forecasting models and scenarios for medium- and long-term level of predictability. The forecasting module of the program has also been improved with the multi-levelled use of the statistical indices as fitness functions and model selection indices. The implementation of the modified-hGP in the datasets of mobile subscribers in the Organisation for Economic Cooperation and Development (OECD countries shows very satisfactory forecasting performance.

  17. Segregation of odor identity and intensity during odor discrimination in Drosophila mushroom body.

    Science.gov (United States)

    Xia, Shouzhen; Tully, Tim

    2007-10-02

    Molecular and cellular studies have begun to unravel a neurobiological basis of olfactory processing, which appears conserved among vertebrate and invertebrate species. Studies have shown clearly that experience-dependent coding of odor identity occurs in "associative" olfactory centers (the piriform cortex in mammals and the mushroom body [MB] in insects). What remains unclear, however, is whether associative centers also mediate innate (spontaneous) odor discrimination and how ongoing experience modifies odor discrimination. Here we show in naïve flies that Galphaq-mediated signaling in MB modulates spontaneous discrimination of odor identity but not odor intensity (concentration). In contrast, experience-dependent modification (conditioning) of both odor identity and intensity occurs in MB exclusively via Galphas-mediated signaling. Our data suggest that spontaneous responses to odor identity and odor intensity discrimination are segregated at the MB level, and neural activity from MB further modulates olfactory processing by experience-independent Galphaq-dependent encoding of odor identity and by experience-induced Galphas-dependent encoding of odor intensity and identity.

  18. Review of Forensic Tools for Smartphones

    Science.gov (United States)

    Jahankhani, Hamid; Azam, Amir

    The technological capability of mobile devices in particular Smartphones makes their use of value to the criminal community as a data terminal in the facilitation of organised crime or terrorism. The effective targeting of these devices from criminal and security intelligence perspectives and subsequent detailed forensic examination of the targeted device will significantly enhance the evidence available to the law enforcement community. When phone devices are involved in crimes, forensic examiners require tools that allow the proper retrieval and prompt examination of information present on these devices. Smartphones that are compliant to Global System for Mobile Communication (GSM) standards, will maintains their identity and user's personal information on Subscriber Identity Module (SIM). Beside SIM cards, substantial amount of information is stored on device's internal memory and external memory modules. The aim of this paper is to give an overview of the currently available forensic software tools that are developed to carry out forensic investigation of mobile devices and point to current weaknesses within this process.

  19. A Uniform Publish-Subscribe Infrastructure for Communication in Wireless Mobile Environments

    DEFF Research Database (Denmark)

    Brønsted, Jeppe; Hansen, Klaus Marius; Thorup, Rolf

    2006-01-01

    In near future the transportation sector will be communication enabled. Devices in vehicles will be able to communicate and thus make a new range of services possible. However, heterogeneous communication capabilities and vehicle mobility complicates the art of designing and implementing these ne...... communication is handled uniformly. By showing how the infrastructure is used in a concrete instance we argue that it meets the requirements for middleware stated above and provides a good programming model for distributed systems in mobile environments......In near future the transportation sector will be communication enabled. Devices in vehicles will be able to communicate and thus make a new range of services possible. However, heterogeneous communication capabilities and vehicle mobility complicates the art of designing and implementing these new...... systems and therefore it is important to have communication middleware that hides the complexity of low level network programming and presents a clean and understandable abstraction over communication to the application programmer. It has previously been shown that the publish-subscribe messaging paradigm...

  20. Explicit Context Matching in Content-Based Publish/Subscribe Systems

    Directory of Open Access Journals (Sweden)

    Miguel Jiménez

    2013-03-01

    Full Text Available Although context could be exploited to improve performance, elasticity and adaptation in most distributed systems that adopt the publish/subscribe (P/S communication model, only a few researchers have focused on the area of context-aware matching in P/S systems and have explored its implications in domains with highly dynamic context like wireless sensor networks (WSNs and IoT-enabled applications. Most adopted P/S models are context agnostic or do not differentiate context from the other application data. In this article, we present a novel context-aware P/S model. SilboPS manages context explicitly, focusing on the minimization of network overhead in domains with recurrent context changes related, for example, to mobile ad hoc networks (MANETs. Our approach represents a solution that helps to effciently share and use sensor data coming from ubiquitous WSNs across a plethora of applications intent on using these data to build context awareness. Specifically, we empirically demonstrate that decoupling a subscription from the changing context in which it is produced and leveraging contextual scoping in the filtering process notably reduces (unsubscription cost per node, while improving the global performance/throughput of the network of brokers without altering the cost of SIENA-like topology changes.

  1. 47 CFR 76.985 - Subscriber bill itemization.

    Science.gov (United States)

    2010-10-01

    ...) The amount of the total bill assessed as a franchise fee and the identity of the franchising authority... fees and costs itemized pursuant to this section. (c) Local franchising authorities may adopt...

  2. Segregation of odor identity and intensity during odor discrimination in Drosophila mushroom body.

    Directory of Open Access Journals (Sweden)

    Shouzhen Xia

    2007-10-01

    Full Text Available Molecular and cellular studies have begun to unravel a neurobiological basis of olfactory processing, which appears conserved among vertebrate and invertebrate species. Studies have shown clearly that experience-dependent coding of odor identity occurs in "associative" olfactory centers (the piriform cortex in mammals and the mushroom body [MB] in insects. What remains unclear, however, is whether associative centers also mediate innate (spontaneous odor discrimination and how ongoing experience modifies odor discrimination. Here we show in naïve flies that Galphaq-mediated signaling in MB modulates spontaneous discrimination of odor identity but not odor intensity (concentration. In contrast, experience-dependent modification (conditioning of both odor identity and intensity occurs in MB exclusively via Galphas-mediated signaling. Our data suggest that spontaneous responses to odor identity and odor intensity discrimination are segregated at the MB level, and neural activity from MB further modulates olfactory processing by experience-independent Galphaq-dependent encoding of odor identity and by experience-induced Galphas-dependent encoding of odor intensity and identity.

  3. Prevention for HIV-Seropositive Persons: Successive Approximation Toward a New Identity

    Science.gov (United States)

    Lightfoot, Marguerita; Rotheram-Borus, Mary Jane; Milburn, Norweeta G.; Swendeman, Dallas

    2005-01-01

    This article presents a three-module intervention based on social action theory that focuses on health promotion and social identity formation for seropositive youth. The modules are designed to reduce transmission of HIV by reducing sexual and substance abuse acts, increasing healthy acts and adherence to care, and maintaining positive behavioral…

  4. Kipling’s Ecclectic Religious Identity

    Directory of Open Access Journals (Sweden)

    Serdar Ozturk

    2009-11-01

    Full Text Available Joseph Rudyard Kipling (1865 -1936 is one of the most popular writers in English, in both prose and verse, in the late 19th and early 20th centuries. Rudyard Kipling does not subscribe to any particular religion, but he is deeply a religious man because he believes in one absolute God, and the divine purpose behind the creation of man. Although Rudyard Kipling uses a lot of Christian symbols in his works, he is not a Christian. In some of his stories, he shows a unique insight into the redeeming power of love, which is the main pillar of Sufism. He also accepts some of the Islamic precepts however he is not a Muslim. He is very sympathetic to Buddhism and Hinduism and always alludes to Hindu gods and goddesses, but he does not believe in Hinduism or Buddhism. Rudyard Kipling uses a lot of religious themes, motives and symbols in his Works but he does not subscribe to any particular religious views at all.

  5. Introducing voluntary private health insurance in a mixed medical economy: are Hong Kong citizens willing to subscribe?

    Science.gov (United States)

    He, Alex Jingwei

    2017-08-25

    Struggling to correct the public-private imbalance in its health care system, the Hong Kong SAR Government seeks to introduce a government-regulated voluntary health insurance scheme, or VHIS, a distinctive financing instrument that combines the characteristics of private insurance with strong government regulation. This study examines citizens' responses to the new scheme and their willingness to subscribe. First-hand data were collected from a telephone survey that randomly sampled 1793 Hong Kong adults from September 2014 to February 2015. Univariate and multivariate methods were employed in data analysis. More than one third of the respondents explicitly stated intention of subscribing to the VHIS, a fairly high figure considering the scheme's voluntary nature. Multivariate analysis revealed moderate evidence of adverse selection, defined as individuals' opportunistic behaviors when making insurance purchasing decision based on their own assessment of risks or likelihood of making a claim. The excellent performance of Hong Kong's public medical system has had two parallel impacts. On the one hand, high-risk residents, particularly the uninsured, do not face a pressing need to switch out of the overloaded public system despite its inadequacies; this, in turn, may reduce the impact of adverse selection that may lead to detrimental effects to the insurance market. On the other hand, high satisfaction reinforces the interests of those who have both the need for better services and the ability to pay for supplementary insurance. Furthermore, the high-risk population demonstrates a moderate interest in the insurance despite the availability of government subsidies. This may offset the intended effect of the reform to some extent.

  6. Religion in the face of uncertainty: an uncertainty-identity theory account of religiousness.

    Science.gov (United States)

    Hogg, Michael A; Adelman, Janice R; Blagg, Robert D

    2010-02-01

    The authors characterize religions as social groups and religiosity as the extent to which a person identifies with a religion, subscribes to its ideology or worldview, and conforms to its normative practices. They argue that religions have attributes that make them well suited to reduce feelings of self-uncertainty. According to uncertainty-identity theory, people are motivated to reduce feelings of uncertainty about or reflecting on self; and identification with groups, particularly highly entitative groups, is a very effective way to reduce uncertainty. All groups provide belief systems and normative prescriptions related to everyday life. However, religions also address the nature of existence, invoking sacred entities and associated rituals and ceremonies. They are entitative groups that provide a moral compass and rules for living that pervade a person's life, making them particularly attractive in times of uncertainty. The authors document data supporting their analysis and discuss conditions that transform religiosity into religious zealotry and extremism.

  7. Dissociating effects of stimulus identity and load on working memory attentional guidance: lengthening encoding time eliminates the effect of load but not identity.

    Science.gov (United States)

    Tsvetanov, Kamen A; Arvanitis, Theodoros N; Humphreys, Glyn W

    2012-01-01

    Effects of the identity and load of items in working memory (WM) on visual attention were examined. With a short interval between the WM item and a subsequent search task, there were effects of both load (slowed overall reaction times, RTs, in a WM condition relative to a mere repetition baseline) and identity (search RTs were affected by re-presentation of the item in WM in the search display). As the time to encode the initial display increased, the effects of load decreased while the effect of identity remained. The data indicate that the identity of stimuli in WM can affect the subsequent deployment of attention even when time is allowed for consolidation of the stimuli in WM, and that the WM effects are not causally related to the presence of cognitive load. The results are consistent with the identity of stimuli in WM modulating attention post the memory consolidation stage.

  8. Identity's identities

    DEFF Research Database (Denmark)

    Jensen, Kim Ebensgaard

    -specialized language in which it also serves a number of functions – some of which are quite fundamental to society as such. In other words, the lexeme identity is a polysemic word and has multiple, well, identities. Given that it appears to have a number of functions in a variety of registers, including terminologies...... in Academic English and more everyday-based English, identity as a lexeme is definitely worth having a look at. This paper presents a lexicological study of identity in which some of its senses are identified and their behaviors in actual discourse are observed. Drawing on data from the 2011 section...... of the Corpus of Contemporary American English, a behavioral profile of the distributional characteristics of identity is set up. Behavioral profiling is a lexicographical method developed by the corpus linguist Stefan Th. Gries which, by applying semantic ID tagging and statistical analysis, provides a fine...

  9. Action recognition is sensitive to the identity of the actor.

    Science.gov (United States)

    Ferstl, Ylva; Bülthoff, Heinrich; de la Rosa, Stephan

    2017-09-01

    Recognizing who is carrying out an action is essential for successful human interaction. The cognitive mechanisms underlying this ability are little understood and have been subject of discussions in embodied approaches to action recognition. Here we examine one solution, that visual action recognition processes are at least partly sensitive to the actor's identity. We investigated the dependency between identity information and action related processes by testing the sensitivity of neural action recognition processes to clothing and facial identity information with a behavioral adaptation paradigm. Our results show that action adaptation effects are in fact modulated by both clothing information and the actor's facial identity. The finding demonstrates that neural processes underlying action recognition are sensitive to identity information (including facial identity) and thereby not exclusively tuned to actions. We suggest that such response properties are useful to help humans in knowing who carried out an action. Copyright © 2017 The Author(s). Published by Elsevier B.V. All rights reserved.

  10. Relationship between Values and Religious Identity in Buddhist Adolescents

    Directory of Open Access Journals (Sweden)

    Shorokhova V.A.,

    2016-04-01

    Full Text Available The paper describes results of a social psychological study on religious identity in Buddhist schoolchil- dren. The study involved 184 students of 9—10 classes of a school in the Aginskoye settlement (Aginsky Buryatsky Okrug, Zabaykalsky Krai. According to G. Allport’s concept and R. Gorsuch & S. McPherson measurements, religious identity is considered not only as practicing Buddhism, but as a complex social psychological formation with a four-factor structure base on the following scales: personal/social and in- trinsic/extrinsic. Different components of religious identity are explored in the context of their relation- ship with value orientations (as described by S. Schwartz and G. Hofstede. The following techniques were employed: the adapted version of D. Van Camp’s Individual/Social Religious Identity Measure, Schwartz’s Portrait Values Questionnaire (PVQ-R2, and Hofstede’s Values Survey Module. As it was revealed, al- most all values related to various components of religious identity of the Buddhist adolescents refer to the social focus. The paper concludes that religious identity in modern Buddhist young people has a distinctive social character.

  11. Opposite brain emotion-regulation patterns in identity states of dissociative identity disorder: a PET study and neurobiological model.

    Science.gov (United States)

    Reinders, Antje A T S; Willemsen, Antoon T M; den Boer, Johan A; Vos, Herry P J; Veltman, Dick J; Loewenstein, Richard J

    2014-09-30

    Imaging studies in posttraumatic stress disorder (PTSD) have shown differing neural network patterns between hypo-aroused/dissociative and hyper-aroused subtypes. Since dissociative identity disorder (DID) involves different emotional states, this study tests whether DID fits aspects of the differing brain-activation patterns in PTSD. While brain activation was monitored using positron emission tomography, DID individuals (n=11) and matched DID-simulating healthy controls (n=16) underwent an autobiographic script-driven imagery paradigm in a hypo-aroused and a hyper-aroused identity state. Results were consistent with those previously found in the two PTSD subtypes for the rostral/dorsal anterior cingulate, the prefrontal cortex, and the amygdala and insula, respectively. Furthermore, the dissociative identity state uniquely activated the posterior association areas and the parahippocampal gyri, whereas the hyper-aroused identity state uniquely activated the caudate nucleus. Therefore, we proposed an extended PTSD-based neurobiological model for emotion modulation in DID: the hypo-aroused identity state activates the prefrontal cortex, cingulate, posterior association areas and parahippocampal gyri, thereby overmodulating emotion regulation; the hyper-aroused identity state activates the amygdala and insula as well as the dorsal striatum, thereby undermodulating emotion regulation. This confirms the notion that DID is related to PTSD as hypo-aroused and hyper-arousal states in DID and PTSD are similar. Copyright © 2014 Elsevier Ireland Ltd. All rights reserved.

  12. Hard Identity and Soft Identity

    Directory of Open Access Journals (Sweden)

    Hassan Rachik

    2006-04-01

    Full Text Available Often collective identities are classified depending on their contents and rarely depending on their forms. Differentiation between soft identity and hard identity is applied to diverse collective identities: religious, political, national, tribal ones, etc. This classification is made following the principal dimensions of collective identities: type of classification (univocal and exclusive or relative and contextual, the absence or presence of conflictsof loyalty, selective or totalitarian, objective or subjective conception, among others. The different characteristics analysed contribute to outlining an increasingly frequent type of identity: the authoritarian identity.

  13. Vacuum Ward identities for higher genera

    International Nuclear Information System (INIS)

    Zamolodchikov, A.B.

    1989-01-01

    The minimal models of two-dimensional conformal field theory are considered on surfaces with nontrivial topology. Due to degeneration of the vacuum module in these models, the stress tensor components satisfy special equations of motion - the vacuum Ward identities. It is shown that these identities can be written in the form of partial differential equations on the moduli space, satisfied by the partition function of the theory. Some examples are written down explicitly in the case of torus and g=2 surface, represented as a double-fold covering of a sphere. For the simplest minimal theory M(2/5), equations are closed on hyperelliptic surface of any genus and the situation is governed by the other minimal model M(3/10). (orig.)

  14. Hermeneutics in identity formation: Paul's use of Genesis in ...

    African Journals Online (AJOL)

    Test

    2010-08-06

    Aug 6, 2010 ... psychological functioning and large-scale social processes .... the Christian's life of service to God as a spiritual battle; however, military terms dominate .... subscribes to Dunn's thesis that Paul's law-polemic addressed Jewish ...

  15. cMsg - A general purpose, publish-subscribe, interprocess communication implementation and framework

    International Nuclear Information System (INIS)

    Timmer, C; Abbott, D; Gyurjyan, V; Heyes, G; Jastrzembski, E; Wolin, E

    2008-01-01

    cMsg is software used to send and receive messages in the Jefferson Lab online and runcontrol systems. It was created to replace the several IPC software packages in use with a single API. cMsg is asynchronous in nature, running a callback for each message received. However, it also includes synchronous routines for convenience. On the framework level, cMsg is a thin API layer in Java, C, or C++ that can be used to wrap most message-based interprocess communication protocols. The top layer of cMsg uses this same API and multiplexes user calls to one of many such wrapped protocols (or domains) based on a URL-like string which we call a Uniform Domain Locator or UDL. One such domain is a complete implementation of a publish-subscribe messaging system using network communications and written in Java (user APIs in C and C++ too). This domain is built in a way which allows it to be used as a proxy server to other domains (protocols). Performance is excellent allowing the system not only to be used for messaging but also as a data distribution system

  16. Bunch identification module

    International Nuclear Information System (INIS)

    Fox, J.D.

    1981-01-01

    This module provides bunch identification and timing signals for the PEP Interaction areas. Timing information is referenced to the PEP master oscillator, and adjusted in phase as a function of region. Identification signals are generated in a manner that allows observers in all interaction regions to agree on an unambiguous bunch identity. The module provides bunch identification signals via NIM level logic, upon CAMAC command, and through LED indicators. A front panel ''region select'' switch allows the same module to be used in all regions. The module has two modes of operation: a bunch identification mode and a calibration mode. In the identification mode, signals indicate which of the three bunches of electrons and positrons are interacting, and timing information about beam crossing is provided. The calibration mode is provided to assist experimenters making time of flight measurements. In the calibration mode, three distinct gating signals are referenced to a selected bunch, allowing three timing systems to be calibrated against a common standard. Physically, the bunch identifier is constructed as a single width CAMAC module. 2 figs., 1 tab

  17. Managing two cultural identities: the malleability of bicultural identity integration as a function of induced global or local processing.

    Science.gov (United States)

    Mok, Aurelia; Morris, Michael W

    2012-02-01

    Increasingly, individuals identify with two or more cultures. Prior research has found the degree to which individuals chronically integrate these identities (bicultural identity integration; BII) moderates responses to cultural cues: High BII individuals assimilate (adopting biases that are congruent with norms of the cued culture), whereas low BII individuals contrast (adopting biases that are incongruent with these norms). The authors propose BII can also be a psychological state and modulated by shifts in processing styles. In four experiments, the authors induced a global or local processing style using physical posture (Experiment 1) and cognitive manipulations (Experiments 2-4) and found that BII is enhanced in contexts facilitating a more global processing style (i.e., smiling, high-level construal, and similarity focus). The authors also found that contrastive responses to cultural cues are diminished when BII is situationally enhanced. Implications for research on processing style, identity integration, and performance in culture-based situations are discussed.

  18. Pull vs. Push: How OmniEarth Delivers Better Earth Observation Information to Subscribers

    Science.gov (United States)

    Fish, C.; Slagowski, S.; Dyrud, L.; Fentzke, J.; Hargis, B.; Steerman, M.

    2015-04-01

    Until very recently, the commercialization of Earth observation systems has largely occurred in two ways: either through the detuning of government satellites or the repurposing of NASA (or other science) data for commercial use. However, the convergence of cloud computing and low-cost satellites is enabling Earth observation companies to tailor observation data to specific markets. Now, underserved constituencies, such as agriculture and energy, can tap into Earth observation data that is provided at a cadence, resolution and cost that can have a real impact to their bottom line. To connect with these markets, OmniEarth fuses data from a variety of sources, synthesizes it into useful and valuable business information, and delivers it to customers via web or mobile interfaces. The "secret sauce" is no longer about having the highest resolution imagery, but rather it is about using that imagery - in conjunction with a number of other sources - to solve complex problems that require timely and contextual information about our dynamic and changing planet. OmniEarth improves subscribers' ability to visualize the world around them by enhancing their ability to see, analyze, and react to change in real time through a solutions-as-a-service platform.

  19. Proposed method of assembly for the BCD silicon strip vertex detector modules

    International Nuclear Information System (INIS)

    Lindenmeyer, C.

    1989-01-01

    The BCD Silicon strip Vertex Detector is constructed of 10 identical central region modules and 18 similar forward region modules. This memo describes a method of assembling these modules from individual silicon wafers. Each wafer is fitted with associated front end electronics and cables and has been tested to insure that only good wafers reach the final assembly stage. 5 figs

  20. Impact of Self-Interference on the Performance of Joint Partial RAKE Receiver and Adaptive Modulation

    KAUST Repository

    Nam, Sung Sik; Choi, Yungho; Alouini, Mohamed-Slim; Choi, Seyeong

    2016-01-01

    In this paper, we investigate the impact of self-interference on the performance of a joint partial RAKE (PRAKE) receiver and adaptive modulation over both independent and identically distributed and independent but non-identically distributed

  1. Memory-Modulation: Self-Improvement or Self-Depletion?

    Science.gov (United States)

    Lavazza, Andrea

    2018-01-01

    Autobiographical memory is fundamental to the process of self-construction. Therefore, the possibility of modifying autobiographical memories, in particular with memory-modulation and memory-erasing, is a very important topic both from the theoretical and from the practical point of view. The aim of this paper is to illustrate the state of the art of some of the most promising areas of memory-modulation and memory-erasing, considering how they can affect the self and the overall balance of the "self and autobiographical memory" system. Indeed, different conceptualizations of the self and of personal identity in relation to autobiographical memory are what makes memory-modulation and memory-erasing more or less desirable. Because of the current limitations (both practical and ethical) to interventions on memory, I can only sketch some hypotheses. However, it can be argued that the choice to mitigate painful memories (or edit memories for other reasons) is somehow problematic, from an ethical point of view, according to some of the theories of the self and personal identity in relation to autobiographical memory, in particular for the so-called narrative theories of personal identity, chosen here as the main case of study. Other conceptualizations of the "self and autobiographical memory" system, namely the constructivist theories, do not have this sort of critical concerns. However, many theories rely on normative (and not empirical) conceptions of the self: for them, the actions aimed at mitigating or removing specific (negative) memories can be seen either as an improvement or as a depletion or impairment of the self.

  2. Memory-Modulation: Self-Improvement or Self-Depletion?

    Directory of Open Access Journals (Sweden)

    Andrea Lavazza

    2018-04-01

    Full Text Available Autobiographical memory is fundamental to the process of self-construction. Therefore, the possibility of modifying autobiographical memories, in particular with memory-modulation and memory-erasing, is a very important topic both from the theoretical and from the practical point of view. The aim of this paper is to illustrate the state of the art of some of the most promising areas of memory-modulation and memory-erasing, considering how they can affect the self and the overall balance of the “self and autobiographical memory” system. Indeed, different conceptualizations of the self and of personal identity in relation to autobiographical memory are what makes memory-modulation and memory-erasing more or less desirable. Because of the current limitations (both practical and ethical to interventions on memory, I can only sketch some hypotheses. However, it can be argued that the choice to mitigate painful memories (or edit memories for other reasons is somehow problematic, from an ethical point of view, according to some of the theories of the self and personal identity in relation to autobiographical memory, in particular for the so-called narrative theories of personal identity, chosen here as the main case of study. Other conceptualizations of the “self and autobiographical memory” system, namely the constructivist theories, do not have this sort of critical concerns. However, many theories rely on normative (and not empirical conceptions of the self: for them, the actions aimed at mitigating or removing specific (negative memories can be seen either as an improvement or as a depletion or impairment of the self.

  3. Trainer module for security control center operations

    International Nuclear Information System (INIS)

    Bernard, E.A.

    1982-01-01

    An operator trainer module has been developed to be used with the security control center equipment to be installed as part of a safeguards physical protection system. The module is designed to provide improved training and testing capabilities for control center operators through the use of simulations for perimeter equipment operations. Operators, through the trainer module, can be challenged with a variety of realistic situations which require responsive action identical to that needed in an actual system. This permits a consistent evaluation and confirmation of operator capabilities prior to assignment as an operator and allows for periodic retesting to verify that adequate performance levels are maintained

  4. Islamic Identity and Competitive Identities (Global, National and Ethnic Identity; A Case Study of Shiraz University Students

    Directory of Open Access Journals (Sweden)

    Mohammadtaghi Iman

    2013-06-01

    Full Text Available The verse of holy Koran "verily the most honored of you in the sight of Allah is [he who is] the most virtuous of you" directly shows that in god's willing there is no superiority of a man or a group than others except those who have piety to god. In fact, the Islamic identity focuses on the superiority of piety among humans and does not focus on superiority of a man or a group that causes Islamic identity theoretically be against other competitive identities such as ethnic, global and national identity. Therefore, this research aims to study the relationship between Islamic identity and competitive identities (ethnic, national and global. In this way based on Sheldon Stryker theory and survey method, 431 students have elected and have analyzed. The results have shown that there was positive significant relationship between Islamic identity, national and ethnic identity, and negative significant relationship between Islamic identity and global identity. In addition, multivariate regression results have shown that the variables national and global identities have explained 45 percent of the variation of Islamic identity variable. The results shows that national and ethnic identity amplify the Islamic identity and they have positive relationship with it and in fact they are not a competitive identity for Islamic identity but global identity has negative relationship with Islamic identity and therefore it is a competitive identity for Islamic identity.

  5. A communication model to integrate the Request-Response and the Publish-Subscribe paradigms into ubiquitous systems.

    Science.gov (United States)

    Rodríguez-Domínguez, Carlos; Benghazi, Kawtar; Noguera, Manuel; Garrido, José Luis; Rodríguez, María Luisa; Ruiz-López, Tomás

    2012-01-01

    The Request-Response (RR) paradigm is widely used in ubiquitous systems to exchange information in a secure, reliable and timely manner. Nonetheless, there is also an emerging need for adopting the Publish-Subscribe (PubSub) paradigm in this kind of systems, due to the advantages that this paradigm offers in supporting mobility by means of asynchronous, non-blocking and one-to-many message distribution semantics for event notification. This paper analyzes the strengths and weaknesses of both the RR and PubSub paradigms to support communications in ubiquitous systems and proposes an abstract communication model in order to enable their seamless integration. Thus, developers will be focused on communication semantics and the required quality properties, rather than be concerned about specific communication mechanisms. The aim is to provide developers with abstractions intended to decrease the complexity of integrating different communication paradigms commonly needed in ubiquitous systems. The proposal has been applied to implement a middleware and a real home automation system to show its applicability and benefits.

  6. AlGaInAs EML having high extinction ratios fabricated by identical epitaxial layer technique

    Science.gov (United States)

    Deng, Qiufang; Guo, Lu; Liang, Song; Sun, Siwei; Xie, Xiao; Zhu, Hongliang; Wang, Wei

    2018-04-01

    AlGaInAs electroabsorption-modulated lasers (EMLs) fabricated by identical epitaxial layer technique are demonstrated. The EML device shows an infinite characteristic temperature when the temperature ranges from 20 oC to 30 oC. The integrated modulator has static extinction ratios of larger than 20 dB at a reverse bias voltage of - 2 V. The small signal modulation bandwidth of the modulator is larger than 11 GHz. At 10 Gb/s data modulation, the dynamic extinction ratio is about 9.5 dB in a back to back test configuration. Because only a simple fabrication procedure is needed, our EMLs are promising low cost light sources for optical fiber transmission applications.

  7. Interactions between facial emotion and identity in face processing: evidence based on redundancy gains.

    Science.gov (United States)

    Yankouskaya, Alla; Booth, David A; Humphreys, Glyn

    2012-11-01

    Interactions between the processing of emotion expression and form-based information from faces (facial identity) were investigated using the redundant-target paradigm, in which we specifically tested whether identity and emotional expression are integrated in a superadditive manner (Miller, Cognitive Psychology 14:247-279, 1982). In Experiments 1 and 2, participants performed emotion and face identity judgments on faces with sad or angry emotional expressions. Responses to redundant targets were faster than responses to either single target when a universal emotion was conveyed, and performance violated the predictions from a model assuming independent processing of emotion and face identity. Experiment 4 showed that these effects were not modulated by varying interstimulus and nontarget contingencies, and Experiment 5 demonstrated that the redundancy gains were eliminated when faces were inverted. Taken together, these results suggest that the identification of emotion and facial identity interact in face processing.

  8. When speaker identity is unavoidable: Neural processing of speaker identity cues in natural speech.

    Science.gov (United States)

    Tuninetti, Alba; Chládková, Kateřina; Peter, Varghese; Schiller, Niels O; Escudero, Paola

    2017-11-01

    Speech sound acoustic properties vary largely across speakers and accents. When perceiving speech, adult listeners normally disregard non-linguistic variation caused by speaker or accent differences, in order to comprehend the linguistic message, e.g. to correctly identify a speech sound or a word. Here we tested whether the process of normalizing speaker and accent differences, facilitating the recognition of linguistic information, is found at the level of neural processing, and whether it is modulated by the listeners' native language. In a multi-deviant oddball paradigm, native and nonnative speakers of Dutch were exposed to naturally-produced Dutch vowels varying in speaker, sex, accent, and phoneme identity. Unexpectedly, the analysis of mismatch negativity (MMN) amplitudes elicited by each type of change shows a large degree of early perceptual sensitivity to non-linguistic cues. This finding on perception of naturally-produced stimuli contrasts with previous studies examining the perception of synthetic stimuli wherein adult listeners automatically disregard acoustic cues to speaker identity. The present finding bears relevance to speech normalization theories, suggesting that at an unattended level of processing, listeners are indeed sensitive to changes in fundamental frequency in natural speech tokens. Copyright © 2017 Elsevier Inc. All rights reserved.

  9. Object width modulates object-based attentional selection.

    Science.gov (United States)

    Nah, Joseph C; Neppi-Modona, Marco; Strother, Lars; Behrmann, Marlene; Shomstein, Sarah

    2018-04-24

    Visual input typically includes a myriad of objects, some of which are selected for further processing. While these objects vary in shape and size, most evidence supporting object-based guidance of attention is drawn from paradigms employing two identical objects. Importantly, object size is a readily perceived stimulus dimension, and whether it modulates the distribution of attention remains an open question. Across four experiments, the size of the objects in the display was manipulated in a modified version of the two-rectangle paradigm. In Experiment 1, two identical parallel rectangles of two sizes (thin or thick) were presented. Experiments 2-4 employed identical trapezoids (each having a thin and thick end), inverted in orientation. In the experiments, one end of an object was cued and participants performed either a T/L discrimination or a simple target-detection task. Combined results show that, in addition to the standard object-based attentional advantage, there was a further attentional benefit for processing information contained in the thick versus thin end of objects. Additionally, eye-tracking measures demonstrated increased saccade precision towards thick object ends, suggesting that Fitts's Law may play a role in object-based attentional shifts. Taken together, these results suggest that object-based attentional selection is modulated by object width.

  10. Constructing nurses' professional identity through social identity theory.

    Science.gov (United States)

    Willetts, Georgina; Clarke, David

    2014-04-01

    The profession of nursing continues to struggle with defining and clarifying its professional identity. The definitive recognition of nursing as a profession was the moving of training from the hospital apprentice model to the tertiary sector. However, this is only part of the story of professional identity in nursing. Once training finishes and enculturation into the workplace commences, professional identity becomes a complicated social activity. This paper proposes social identity theory as a valuable research framework to assist with clarifying and describing the professional identity of nurses. The paper outlines the key elements of a profession and then goes on to describe the main concepts of social identity theory. Lastly, a connection is made between the usefulness of using social identity theory in researching professional identity in nursing, recognizing the contextual nature of the social activity of the profession within its workplace environment. © 2013 Wiley Publishing Asia Pty Ltd.

  11. Construction and Tests of Modules for the ATLAS Pixel Detector

    CERN Document Server

    AUTHOR|(CDS)2068490

    2003-01-01

    The ATLAS Pixel Detector is the innermost layer of the ATLAS tracking system and will contribute significantly to the ATLAS track and vertex reconstruction. The detector consists of identical sensor-chip-hybrid modules, arranged in three barrels in the centre and three disks on either side for the forward region. The position of the pixel detector near the interaction point requires excellent radiation hardness, mechanical and thermal robustness, good long-term stability, all combined with a low material budget. The pre-production phase of such pixel modules has nearly finished, yielding fully functional modules. Results are presented of tests with these modules.

  12. Resolving an identity crisis: Implicit drinking identity and implicit alcohol identity are related but not the same.

    Science.gov (United States)

    Ramirez, Jason J; Olin, Cecilia C; Lindgren, Kristen P

    2017-09-01

    Two variations of the Implicit Association Test (IAT), the Drinking Identity IAT and the Alcohol Identity IAT, assess implicit associations held in memory between one's identity and alcohol-related constructs. Both have been shown to predict numerous drinking outcomes, but these IATs have never been directly compared to one another. The purpose of this study was to compare these IATs and evaluate their incremental predictive validity. US undergraduate students (N=64, 50% female, mean age=21.98years) completed the Drinking Identity IAT, the Alcohol Identity IAT, an explicit measure of drinking identity, as well as measures of typical alcohol consumption and hazardous drinking. When evaluated in separate regression models that controlled for explicit drinking identity, results indicated that the Drinking Identity IAT and the Alcohol Identity IAT were significant, positive predictors of typical alcohol consumption, and that the Drinking Identity IAT, but not the Alcohol Identity IAT, was a significant predictor of hazardous drinking. When evaluated in the same regression models, the Drinking Identity IAT, but not the Alcohol Identity IAT, was significantly associated with typical and hazardous drinking. These results suggest that the Drinking Identity IAT and Alcohol Identity IAT are related but not redundant. Moreover, given that the Drinking Identity IAT, but not the Alcohol Identity IAT, incrementally predicted variance in drinking outcomes, identification with drinking behavior and social groups, as opposed to identification with alcohol itself, may be an especially strong predictor of drinking outcomes. Copyright © 2017 Elsevier Ltd. All rights reserved.

  13. Leadership identities

    DEFF Research Database (Denmark)

    Holmgreen, Lise-Lotte

    2018-01-01

    Questioning the assumption that identities can be controlled through a shared organisational culture, the article explores the inculcation of a discourse of diversity into leadership identities in a Danish bank and building society. Thus, it intends to demonstrate that, on the one hand, discourse...... plays a significant role in identity construction and, on the other, that leaders’ constructions may have many sources of inspiration within and outside the organisation, emphasising that identity construction is a complex process in which organisational efforts to promote a common leadership identity...... to construct their leadership identities. While the respondents present comparable identities to the interviewer, the analysis reveals that the they draw on different discourses and employ a number of different discursive means to present this identity. This, the article argues, may be the result of a number...

  14. PS-Modules over Ore Extensions and Skew Generalized Power Series Rings

    Directory of Open Access Journals (Sweden)

    Refaat M. Salem

    2015-01-01

    Full Text Available A right R-module MR is called a PS-module if its socle, SocMR, is projective. We investigate PS-modules over Ore extension and skew generalized power series extension. Let R be an associative ring with identity, MR a unitary right R-module, O=Rx;α,δ Ore extension, MxO a right O-module, S,≤ a strictly ordered additive monoid, ω:S→EndR a monoid homomorphism, A=RS,≤,ω the skew generalized power series ring, and BA=MS,≤RS,≤, ω the skew generalized power series module. Then, under some certain conditions, we prove the following: (1 If MR is a right PS-module, then MxO is a right PS-module. (2 If MR is a right PS-module, then BA is a right PS-module.

  15. Identity at work: Exploring strategies for Identity Work

    Directory of Open Access Journals (Sweden)

    Byron G. Adams

    2012-01-01

    Full Text Available Orientation: This study explored strategies for identity work that are central to the negotiation and regulation of employee work identity.Research purpose: The main aim of this study was to explore employee narratives and identify the strategies available to them in the process of identity work, as they defined themselves at work.Motivation for the study: As there is a scarcity of research on identity work in South Africa, this study wanted to advance knowledge about identity work and the strategies used for regulating and negotiating an identity at work by exploring these constructs in this context.Research design, approach and method: A qualitative research process formed the basis for this study. Nineteen employees from a global manufacturing company participated in two semi-structured in-depth interviews. Grounded theory was applied to analyse and interpret the data.Main findings: Nine strategies for identity work were identified and categorised into four broad themes (personal philosophies; relationships; career management and negotiating balance.Practical/managerial implications: Employees followed various strategies for defining themselves at work and this may have some implications for employee work engagement and productivity.Contribution/value-add: This study expands on current theoretical knowledge of identity work, and provides insights into the strategies people use to regulate and negotiate their identities at work. 

  16. Self-Esteem and Self-in-Relation Identity among Mexican American Adolescents.

    Science.gov (United States)

    Perez, Gabriela L.; Russell, Todd T.

    Traditional theories of development view separation and individuation as primary tasks of adolescents; the self-in-relation framework, however, argues that the autonomous and separate self-paradigm does not describe female development. Current research suggests that self-esteem arises from subscribing to separate self-definitions for males and…

  17. Identity, identity politics, and neoliberalism

    Directory of Open Access Journals (Sweden)

    Wrenn Mary

    2014-01-01

    Full Text Available With the intensification of neoliberalism, it is useful to examine how some individuals might cope with the irrationality of the system. Neoliberalism cloaks the execution of the corporate agenda behind rhetorical manipulation that advocates for limited government. The corollary absence of government involvement on behalf of the citizenry writ large disarms the means of social redress for the individual. Democracy funded and fueled by corporate power thereby disenfranchises the individual, provoking some to search for empowerment through identity politics. The argument set forth suggests that individuals construct, reinforce, or escalate allegiance to identities as a coping mechanism, some of which manifest in violent identity politics.

  18. A Communication Model to Integrate the Request-Response and the Publish-Subscribe Paradigms into Ubiquitous Systems

    Directory of Open Access Journals (Sweden)

    Tomás Ruiz-López

    2012-06-01

    Full Text Available The Request-Response (RR paradigm is widely used in ubiquitous systems to exchange information in a secure, reliable and timely manner. Nonetheless, there is also an emerging need for adopting the Publish-Subscribe (PubSub paradigm in this kind of systems, due to the advantages that this paradigm offers in supporting mobility by means of asynchronous, non-blocking and one-to-many message distribution semantics for event notification. This paper analyzes the strengths and weaknesses of both the RR and PubSub paradigms to support communications in ubiquitous systems and proposes an abstract communication model in order to enable their seamless integration. Thus, developers will be focused on communication semantics and the required quality properties, rather than be concerned about specific communication mechanisms. The aim is to provide developers with abstractions intended to decrease the complexity of integrating different communication paradigms commonly needed in ubiquitous systems. The proposal has been applied to implement a middleware and a real home automation system to show its applicability and benefits.

  19. A Communication Model to Integrate the Request-Response and the Publish-Subscribe Paradigms into Ubiquitous Systems

    Science.gov (United States)

    Rodríguez-Domínguez, Carlos; Benghazi, Kawtar; Noguera, Manuel; Garrido, José Luis; Rodríguez, María Luisa; Ruiz-López, Tomás

    2012-01-01

    The Request-Response (RR) paradigm is widely used in ubiquitous systems to exchange information in a secure, reliable and timely manner. Nonetheless, there is also an emerging need for adopting the Publish-Subscribe (PubSub) paradigm in this kind of systems, due to the advantages that this paradigm offers in supporting mobility by means of asynchronous, non-blocking and one-to-many message distribution semantics for event notification. This paper analyzes the strengths and weaknesses of both the RR and PubSub paradigms to support communications in ubiquitous systems and proposes an abstract communication model in order to enable their seamless integration. Thus, developers will be focused on communication semantics and the required quality properties, rather than be concerned about specific communication mechanisms. The aim is to provide developers with abstractions intended to decrease the complexity of integrating different communication paradigms commonly needed in ubiquitous systems. The proposal has been applied to implement a middleware and a real home automation system to show its applicability and benefits. PMID:22969366

  20. Change in Identity Diffusion and Psychopathology in a Specialized Inpatient Treatment for Borderline Personality Disorder.

    Science.gov (United States)

    Sollberger, Daniel; Gremaud-Heitz, Daniela; Riemenschneider, Anke; Agarwalla, Puspa; Benecke, Cord; Schwald, Oliver; Küchenhoff, Joachim; Walter, Marc; Dammann, Gerhard

    2015-01-01

    Patients with borderline personality disorder (BPD) show various psychopathological symptoms and suffer especially from disturbance in their identity. The purpose of the study was to investigate changes-particularly in affective BPD symptoms and identity diffusion-during a structured, disorder-specific inpatient treatment (DST) that combined a psychodynamic transference-focused psychotherapy approach with modules of dialectical behavioural skills training. In a prospective, two-group comparison trial, 44 patients with BPD were assessed with questionnaires addressing identity diffusion and state, as well as trait affective psychopathology, before and after 12 weeks of inpatient treatment. Thirty-two patients received DST, whereas 12 patients were given inpatient treatment-as-usual (TAU). The patients were allocated in a non-random procedure for two groups, in order of admission and availability of treatment options in the DST unit. In the pre-post-comparison, the DST group showed a significant decrease in identity diffusion (p borderline symptomatology and in the personality structure feature of identity diffusion. This highlights the significance of a short-term specific inpatient therapy for BPD. A structured, disorder-specific inpatient treatment of patients diagnosed with borderline personality disorder (BPD) combined a psychodynamic transference-focused psychotherapy treatment approach (focusing on pathological features in personality organization, particularly on non-integrated images of self and others) with modules of dialectical behavioural skills training. This treatment is associated with a decrease in identity diffusion of these patients after 12 weeks of treatment. The treatment is also related to a significant decrease in borderline typical psychopathological symptoms such as depressive symptoms, as well as an improvement in state anger. The outcomes of this structured, disorder-specific inpatient treatment of severely ill BPD patients indicated

  1. The Process of Identity Work: Negotiating a Work Identity

    NARCIS (Netherlands)

    Crafford, A.; Adams, B.G.; Saayman, T.; Vinkenburg, C.J.; Jansen, P.G.W.; Roodt, G.

    2015-01-01

    Identity work is an important process in negotiating, regulating and maintaining a coherent sense of self-(identity). In this chapter we discuss how identity work is particularly useful in establishing a work identity. The crux of the discussion in this chapter is based on the qualitative phase of

  2. Comparison of photovoltaic cell temperatures in modules operating with exposed and enclosed back surfaces

    Science.gov (United States)

    Namkoong, D.; Simon, F. F.

    1981-01-01

    Four different photovoltaic module designs were tested to determine the cell temperature of each design. The cell temperatures were compared to those obtained on identical design, using the same nominal operating cell temperature (NOCT) concept. The results showed that the NOCT procedure does not apply to the enclosed configurations due to continuous transient conditions. The enclosed modules had higher cell temperatures than the open modules, and insulated modules higher than the uninsulated. The severest performance loss - when translated from cell temperatures - 17.5 % for one enclosed, insulated module as a compared to that module mounted openly.

  3. Medical Identity

    DEFF Research Database (Denmark)

    Musaeus, Peter

    2015-01-01

    Purpose: To examine philosophical stances underpinning medical identity and assess the conceptual relationship between physician, medical practice and culture. Argument: Medical identity is about the ideals and moral positions that physicians take when justifying themselves. Medical identity...... hedonistic versus sentimentalist approaches to medical identity. The sociocultural philosophical analysis of medical identity can shed light on what it means conceptually for a physician to harbor beliefs associated with him/her being taken to be an autonomous professional. It is important because it touches...... on the meaning of being a compassionate, good and skilled physician, making its relevance to person-centered medicine self-evident. Conclusion: Medical identity should be analyzed with reference to literature, philosophy and medical practice in order for the physician to exercise a reflective position...

  4. Using Combinatorial Approach to Improve Students' Learning of the Distributive Law and Multiplicative Identities

    Science.gov (United States)

    Tsai, Yu-Ling; Chang, Ching-Kuch

    2009-01-01

    This article reports an alternative approach, called the combinatorial model, to learning multiplicative identities, and investigates the effects of implementing results for this alternative approach. Based on realistic mathematics education theory, the new instructional materials or modules of the new approach were developed by the authors. From…

  5. Identity at work: Exploring strategies for Identity Work

    Directory of Open Access Journals (Sweden)

    Byron G. Adams

    2012-09-01

    Research purpose: The main aim of this study was to explore employee narratives and identify the strategies available to them in the process of identity work, as they defined themselves at work. Motivation for the study: As there is a scarcity of research on identity work in South Africa, this study wanted to advance knowledge about identity work and the strategies used for regulating and negotiating an identity at work by exploring these constructs in this context. Research design, approach and method: A qualitative research process formed the basis for this study. Nineteen employees from a global manufacturing company participated in two semi-structured in-depth interviews. Grounded theory was applied to analyse and interpret the data. Main findings: Nine strategies for identity work were identified and categorised into four broad themes (personal philosophies; relationships; career management and negotiating balance. Practical/managerial implications: Employees followed various strategies for defining themselves at work and this may have some implications for employee work engagement and productivity. Contribution/value-add: This study expands on current theoretical knowledge of identity work, and provides insights into the strategies people use to regulate and negotiate their identities at work.

  6. Identity paradoxes

    Directory of Open Access Journals (Sweden)

    Đurić Jelena

    2010-01-01

    Full Text Available The article considers paradoxical nature of identity that emerges from: 1 the very concept of identity whose abstract generality unites various and even opposite features; 2 the processual nature of reality that is easier to express in the poetical metaphors or abstract principles than in unambiguous conceptual networks; 3 the oppose relationship between being and knowledge, mind and matter, subject and object, self and personality. Entangled in the labyrinth which evade efforts to be conceptually defined, the modern thinking of identity moves towards abandoning the idea of “self” on behalf of the “ego” and towards the misapprehension of identity as being identical. This corresponds to the “time of the lost spirit” stretched between the simultaneous need to find an identity and to give it up.

  7. Federated Identity Management

    OpenAIRE

    Chadwick, David W.

    2009-01-01

    Abstract. This paper addresses the topic of federated identity management. It discusses in detail the following topics: what is digital identity, what is identity management, what is federated identity management, Kim Camerons 7 Laws of Identity, how can we protect the users privacy in a federated environment, levels of assurance, some past and present federated identity management systems, and some current research in FIM.

  8. Social identity change: shifts in social identity during adolescence.

    Science.gov (United States)

    Tanti, Chris; Stukas, Arthur A; Halloran, Michael J; Foddy, Margaret

    2011-06-01

    This study investigated the proposition that adolescence involves significant shifts in social identity as a function of changes in social context and cognitive style. Using an experimental design, we primed either peer or gender identity with a sample of 380 early- (12-13 years), mid- (15-16 years), and late-adolescents (18-20 years) and then measured the effect of the prime on self-stereotyping and ingroup favouritism. The findings showed significant differences in social identity across adolescent groups, in that social identity effects were relatively strong in early- and late-adolescents, particularly when peer group identity rather than gender identity was salient. While these effects were consistent with the experience of change in educational social context, differences in cognitive style were only weakly related to ingroup favouritism. The implications of the findings for theory and future research on social identity during adolescence are discussed. Crown Copyright © 2010. Published by Elsevier Ltd. All rights reserved.

  9. Comparative Associations Between Achieved Bicultural Identity, Achieved Ego Identity, and Achieved Religious Identity and Adaptation Among Australian Adolescent Muslims.

    Science.gov (United States)

    Abu-Rayya, Hisham M; Abu-Rayya, Maram H; White, Fiona A; Walker, Richard

    2018-04-01

    This study examined the comparative roles of biculturalism, ego identity, and religious identity in the adaptation of Australian adolescent Muslims. A total of 504 high school Muslim students studying at high schools in metropolitan Sydney and Melbourne, Australia, took part in this study which required them to complete a self-report questionnaire. Analyses indicated that adolescent Muslims' achieved religious identity seems to play a more important role in shaping their psychological and socio-cultural adaptation compared to adolescents' achieved bicultural identity. Adolescents' achieved ego identity tended also to play a greater role in their psychological and socio-cultural adaptation than achieved bicultural identity. The relationships between the three identities and negative indicators of psychological adaptation were consistently indifferent. Based on these findings, we propose that the three identity-based forces-bicultural identity development, religious identity attainment, and ego identity formation-be amalgamated into one framework in order for researchers to more accurately examine the adaptation of Australian adolescent Muslims.

  10. Coastal Changes in Temperature and Salinity Observed during Hurricane Isaac Recorded and Downloaded by NASA DRIFTERs Moored in Heron Bay and at Half Moon Island, Louisiana

    Science.gov (United States)

    Kalcic, Maria; Iturriaga, Rodolfo H.; Kuper, Philip D.; O'Neal, Stanford Duane; Underwood, Lauren; Fletcher, Rose

    2012-01-01

    Major changes in salinity (approx.14 ppt.) and temperature (approx.40C) were continuously registered by two prototype NASA DRIFTERs, surface moored floaters, that NASA's Applied Science and Technology Project Office (ASTPO) has developed. The DRIFTER floating sensor module is equipped with an Arduino open-source electronics prototyping platform and programming language (http://www.arduino.cc), a GPS (Global Positioning System) module with antenna, a cell phone SIM (Subscriber Identity Module) card and a cellular antenna which is used to transmit data, and a probe to measure temperature and conductivity (from which salinity can be derived). The DRIFTER is powered by a solar cell panel and all the electronic components are mounted and sealed in [ waterproof encasement. Position and measurement data are transmitted via short message service (SMS) messaging to a Twitter site (DRIFTER 002@NASADRIFTER_002 and DRIFTER 004@NASADRIFTER_004), which provides a live feed. These data are the imported into a Google spreadsheet where conductivity is converted to salinity, and graphed in real-time. The spreadsheet data will be imported into a webpage maintained by ASTPO, where it will be displayed available for dO\\\\1lload.

  11. Swiss identity smells like chocolate: Social identity shapes olfactory judgments

    Science.gov (United States)

    Coppin, Géraldine; Pool, Eva; Delplanque, Sylvain; Oud, Bastiaan; Margot, Christian; Sander, David; Van Bavel, Jay J.

    2016-01-01

    There is extensive evidence that social identities can shape people’s attitudes and behavior, but what about sensory judgments? We examined the possibility that social identity concerns may also shape the judgment of non-social properties—namely, olfactory judgment. In two experiments, we presented Swiss and non-Swiss participants with the odor of chocolate, for which Switzerland is world-famous, and a control odor (popcorn). Swiss participants primed with Swiss identity reported the odor of chocolate (but not popcorn) as more intense than non-Swiss participants (Experiments 1 and 2) and than Swiss participants primed with individual identity or not primed (Experiment 2). The self-reported intensity of chocolate smell tended to increase as identity accessibility increased—but only among Swiss participants (Experiment 1). These results suggest that identity priming can counter-act classic sensory habituation effects, allowing identity-relevant smells to maintain their intensity after repeated presentations. This suggests that social identity dynamically influences sensory judgment. We discuss the potential implications for models of social identity and chemosensory perception. PMID:27725715

  12. Swiss identity smells like chocolate: Social identity shapes olfactory judgments.

    Science.gov (United States)

    Coppin, Géraldine; Pool, Eva; Delplanque, Sylvain; Oud, Bastiaan; Margot, Christian; Sander, David; Van Bavel, Jay J

    2016-10-11

    There is extensive evidence that social identities can shape people's attitudes and behavior, but what about sensory judgments? We examined the possibility that social identity concerns may also shape the judgment of non-social properties-namely, olfactory judgment. In two experiments, we presented Swiss and non-Swiss participants with the odor of chocolate, for which Switzerland is world-famous, and a control odor (popcorn). Swiss participants primed with Swiss identity reported the odor of chocolate (but not popcorn) as more intense than non-Swiss participants (Experiments 1 and 2) and than Swiss participants primed with individual identity or not primed (Experiment 2). The self-reported intensity of chocolate smell tended to increase as identity accessibility increased-but only among Swiss participants (Experiment 1). These results suggest that identity priming can counter-act classic sensory habituation effects, allowing identity-relevant smells to maintain their intensity after repeated presentations. This suggests that social identity dynamically influences sensory judgment. We discuss the potential implications for models of social identity and chemosensory perception.

  13. Adaptive Modulation with Best User Selection over Non-Identical Nakagami Fading Channels

    KAUST Repository

    Rao, Anlei; Alouini, Mohamed-Slim

    2012-01-01

    capacity, spectral efficiency, and bit-error-rate (BER) for both constant-power variable-rate and variable-power variable-rate uncoded M-ary quadrature amplitude modulation (M-QAM) schemes. We also study the impact of time delay on the average BER

  14. Buying a house with solar cells. Survey among subscribers and buyers of newly built houses in Amsterdam, Netherlands

    International Nuclear Information System (INIS)

    Van Mierlo, B.; Sprengers, M.

    1995-12-01

    In a new housing estate in Amsterdam in 1995 the regional energy utility (EBA) has integrated a photovoltaic (PV) system (250 kWp) into 63 houses out of 245 houses. The parts of these owner-occupied houses with PV panels are not owned by the occupants. In order to determine which are the motives to buy solar houses and in order to analyze changes in their attitudes questionnaires were sent to potential occupants twice. First to the people who registered for the new housing project (subscribers), and second to the people who bought one of the 245 houses either with or without PV (buyers). The overall conclusion is that PV does not play an important role in the decision making process when buying a new house. It is recommended to study differences in PV preferences and opinions a few years after the buyers have moved to their new houses. 10 figs., 17 tabs., 9 refs., 3 appendices

  15. Transmission modulation system for mobile phone reduces battery consumption without increasing bit error rate

    NARCIS (Netherlands)

    Moretti, M.; Janssen, G.J.M.

    2000-01-01

    The transmission modulation system minimizes the wasted 'out of band' power. The digital data (1) to be transmitted is fed via a pulse response filter (2) to a mixer (4) where it modulates a carrier wave (4). The digital data is also fed via a delay circuit (5) and identical filter (6) to a second

  16. Story work in the organisation

    DEFF Research Database (Denmark)

    Strunck, Jeanne; Holmgreen, Lise-Lotte

    or authoritative narratives, attracting attention to the struggles over meanings, values and identities that consistently take place in organisations (Mumby 1987). In the bank, these struggles are exemplified through the discursive construction of recruitment policies and practices, with managers both subscribing...

  17. Impact of Self-Interference on the Performance of Joint Partial RAKE Receiver and Adaptive Modulation

    KAUST Repository

    Nam, Sung Sik

    2016-11-23

    In this paper, we investigate the impact of self-interference on the performance of a joint partial RAKE (PRAKE) receiver and adaptive modulation over both independent and identically distributed and independent but non-identically distributed Rayleigh fading channels. To better observe the impact of self-interference, our approach starts from considering the signal to interference plus noise ratio. Specifically, we accurately analyze the outage probability, the average spectral efficiency, and the average bit error rate as performance measures in the presence of self-interference. Several numerical and simulation results are selected to present the performance of the joint PRAKE receiver and adaptive modulation subject to self-interference.

  18. The Supermalt identity

    DEFF Research Database (Denmark)

    Bech-Larsen, Tino; Esbjerg, Lars; Grunert, Klaus G.

    2007-01-01

    on consumers' self-identities. The second part explored the role of food and beverage products in the construction of self-identities. The final part focused on the construction of brand identity for Supermalt. Findings - The article provides information on the self-identities constructed by Afro......-Caribbean informants. The food and beverage consumption of informants reflects their mixed cultural identity. The brand identity Supermalt appears to be malleable, with ample room for consumer co-construction. Perceptions of brand identity differ markedly among informants, who are all able to construct Supermalt......Purpose - The objective of this article is to conduct a case study of the Supermalt brand of malt beer, which has become the preferred beverage of Afro-Caribbean consumers in Brixton on a very limited marketing budget. Design/methodology/approach - The article uses the concepts of personal identity...

  19. Fashioning Identity

    DEFF Research Database (Denmark)

    Mackinney-Valentin, Maria

    We dress to communicate who we are, or who we would like others to think we are, telling seductive fashion narratives through our adornment. Yet, today, fashion has been democratized through high-low collaborations, social media and real-time fashion mediation, complicating the basic dynamic...... of identity displays, and creating tension between personal statements and social performances. Fashioning Identity explores how this tension is performed through fashion production and consumption,by examining a diverse series of case studies - from ninety-year old fashion icons to the paradoxical rebellion...... by readdressing Fred Davis' seminal concept of 'identity ambivalence' in Fashion, Culture and Identity (1992), Mackinney-Valentin argues that we are in an epoch of 'status ambivalence', in which fashioning one's own identity has become increasingly complicated....

  20. Identity Assemblages

    DEFF Research Database (Denmark)

    Horn, Line Helverskov

    The study aims at exploring how identity is enacted within the context of a two-year programme in Service, Hospitality, and Tourism Management (SHTM). This research thus investigates how students and educators go about their daily lives in different educational contexts both on and off campus...... as a contribution to the body of literature of ANT-based studies. Second, it contributes to existing identity theories by exemplifying a socio-material approach to identity issues. Third, the study enables reflections upon how educational institutions as fundamentally identity-producing organisations acknowledge...

  1. Civil Identity

    DEFF Research Database (Denmark)

    Petersen, Lars Axel

    In this paper I will go through a catalogue of examples of contexts in which the term civil identity is currently used, ranging from the formal and technical process of linking a set of administrative and other events to an individual biological person by means of identity cards, fingerprints, iris...... of Israel to Luce Irigaray's Feminist agenda of elaborating gender specific civil identities. My intention is to investigate whether these different employments of 'civil identity' point towards a common, and fairly well defined object field asking questions of contemporary relevance to the philosophy...

  2. On Fay identity

    International Nuclear Information System (INIS)

    Michev, Iordan P.

    2006-01-01

    In the first part of this paper we consider the transformation of the cubic identities for general Korteweg-de Vries (KdV) tau functions from [Mishev, J. Math. Phys. 40, 2419-2428 (1999)] to the specific identities for trigonometric KdV tau functions. Afterwards, we consider the Fay identity as a functional equation and provide a wide set of solutions of this equation. The main result of this paper is Theorem 3.4, where we generalize the identities from Mishev. An open problem is the transformation of the cubic identities from Mishev to the specific identities for elliptic KdV tau functions

  3. Function and Evolution of Vibrato-like Frequency Modulation in Mammals.

    Science.gov (United States)

    Charlton, Benjamin D; Taylor, Anna M; Reby, David

    2017-09-11

    Why do distantly related mammals like sheep, giant pandas, and fur seals produce bleats that are characterized by vibrato-like fundamental frequency (F0) modulation? To answer this question, we used psychoacoustic tests and comparative analyses to investigate whether this distinctive vocal feature has evolved to improve the perception of formants, key acoustic components of animal calls that encode important information about the caller's size and identity [1]. Psychoacoustic tests on humans confirmed that vibrato-like F0 modulation improves the ability of listeners to detect differences in the formant patterns of synthetic bleat-like stimuli. Subsequent phylogenetically controlled comparative analyses revealed that vibrato-like F0 modulation has evolved independently in six mammalian orders in vocal signals with relatively high F0 and, therefore, low spectral density (i.e., less harmonic overtones). We also found that mammals modulate the vibrato in these calls over greater frequency extents when the number of harmonic overtones per formant is low, suggesting that this is a mechanism to improve formant perception in calls with low spectral density. Our findings constitute the first evidence that formant perception in non-speech sounds is improved by fundamental frequency modulation and provide a mechanism for the convergent evolution of bleat-like calls in mammals. They also indicate that selection pressures for animals to transmit important information encoded by formant frequencies (on size and identity, for example) are likely to have been a key driver in the evolution of mammal vocal diversity. Copyright © 2017 Elsevier Ltd. All rights reserved.

  4. Identity and identity conflict in the workplace

    NARCIS (Netherlands)

    K.E. Horton (Kate); P.S. Bayerl (Saskia); G. Belschak-Jacobs (Gabriele)

    2014-01-01

    textabstractAs individuals, we define ourselves according to various characteristics that include our values and beliefs. This gives us our identity. As organisations become increasingly complex, understanding the concept of identity conflict may mean the difference between success and failure.

  5. Mistaken identity: activating conservative political identities induces "conservative" financial decisions.

    Science.gov (United States)

    Morris, Michael W; Carranza, Erica; Fox, Craig R

    2008-11-01

    Four studies investigated whether activating a social identity can lead group members to choose options that are labeled in words associated with that identity. When political identities were made salient, Republicans (but not Democrats) became more likely to choose the gamble or investment option labeled "conservative." This shift did not occur in a condition in which the same options were unlabeled. Thus, the mechanism underlying the effect appears to be not activated identity-related values prioritizing low risk, but rather activated identity-related language (the group label "conservative"). Indeed, when political identities were salient, Republicans favored options labeled "conservative" regardless of whether the options were low or high risk. Finally, requiring participants to explain the label "conservative" before making their choice did not diminish the effect, which suggests that it does not merely reflect inattention to content or construct accessibility. We discuss the implications of these results for the literatures on identity, priming, choice, politics, and marketing.

  6. Teacher educators: their identities, sub-identities and implications for professional development

    NARCIS (Netherlands)

    Swennen, J.M.H.; Jones, K.; Volman, M.L.L.

    2010-01-01

    In this article we address the question: 'What sub-identities of teacher educators emerge from the research literature about teacher educators and what are the implications of the sub-identities for the professional development of teacher educators?' Like other professional identities, the identity

  7. Identity after Death

    DEFF Research Database (Denmark)

    Gerstrøm, Anna

    2015-01-01

    Purpose: The purpose of this paper is to explore how legacy organizational identity and death relate to each other and, thereby, contribute to closing the gap in knowledge on organizational identity constructions in times of death. Design/methodology/approach: The paper opted for an exploratory....../value: This paper addresses an apparent gap in the literature on identity and death; exploring identity narratives in a bankrupted bank, the paper considers constructions of legacy organizational identities in times of disruptive death....

  8. Identity/Time

    Directory of Open Access Journals (Sweden)

    Nancy J. Knauer

    2013-09-01

    Full Text Available This paper engages the unspoken fourth dimension of intersectionality—time. Using the construction of lesbian, gay, bisexual, and transgender (LGBT identities as an example, it establishes that identity, as it is lived and experienced, is not only multivalent, but also historically contingent. It then raises a number of points regarding the temporal locality of identity—the influence of time on issues of identity and understanding, its implications for legal interventions, social movement building, and paradigms of progressive change. As the title suggests, the paper asks us to consider the frame of identity over time.

  9. Vocational Identity and Ego Identity Status in Korean Nursing Students

    Directory of Open Access Journals (Sweden)

    Hyun-Young Koo, PhD, RN

    2016-03-01

    Conclusions: These findings show that nursing students in identity achievement status have secure and clear vocational identities. Further longitudinal and qualitative studies are needed to find out if identity formation among nursing students changes with age.

  10. Ternutator identities

    International Nuclear Information System (INIS)

    Devchand, Chandrashekar; Fairlie, David; Nuyts, Jean; Weingart, Gregor

    2009-01-01

    The ternary commutator or ternutator, defined as the alternating sum of the product of three operators, has recently drawn much attention as an interesting structure generalizing the commutator. The ternutator satisfies cubic identities analogous to the quadratic Jacobi identity for the commutator. We present various forms of these identities and discuss the possibility of using them to define ternary algebras.

  11. Ethnic Identity in Everyday Life: The Influence of Identity Development Status

    Science.gov (United States)

    Yip, Tiffany

    2013-01-01

    The current study explores the intersection of ethnic identity development and significance in a sample of 354 diverse adolescents (mean age 14). Adolescents completed surveys 5 times a day for 1 week. Cluster analyses revealed 4 identity clusters: diffused, foreclosed, moratorium, achieved. Achieved adolescents reported the highest levels of identity salience across situations, followed by moratorium adolescents. Achieved and moratorium adolescents also reported a positive association between identity salience and private regard. For foreclosed and achieved adolescents reporting low levels of centrality, identity salience was associated with lower private regard. For foreclosed and achieved adolescents reporting high levels of centrality, identity salience was associated with higher private regard. PMID:23581701

  12. Experiencing with Identity

    DEFF Research Database (Denmark)

    Pors, Justine Grønbæk

    2012-01-01

    This article studies how a political organization begins to experiment with its identity. By use of an empirical case of the Danish Ministry of Education, I examine how a political organization supplements its identity of a legislating power with identities of a supervisor, beacon and facilitator...... of evaluation in public schools. Out of a paralysis emerge new innovative strategies of governing, aimed at the schools’ self-governing capacity. The identity of the political system thus emerges as oscillations between different roles of a legislating power and a supervising coach. The case study suggests...... that a society of experimentalism is emerging. Thus, the relevant object of study is no longer organizational identity, but the experiments with different identities that modern organizations are performing....

  13. A Comparison of Phase-Shift Self- Oscillating and Carrier-based PWM Modulation for Embedded Audio Amplifiers

    OpenAIRE

    Huffenus , Alexandre; Pillonnet , Gaël; Abouchi , Nacer; Goutti , Frédéric

    2010-01-01

    International audience; This paper compares two modulation schemes for Class-D amplifiers: Phase-Shift Self-Oscillating (PSSO) and Carrier-Based Pulse Width Modulation (PWM). Theoretical analysis (modulation, frequency of oscillation, bandwidth…), design procedure, and IC silicon evaluation will be shown for mono and stereo operation (on the same silicon die) on both structures. The design of both architectures will use as many identical building blocks as possible, to provide a fair, "all el...

  14. Identity Work and Emotions

    DEFF Research Database (Denmark)

    Winkler, Ingo

    2018-01-01

    This paper reviews the empirical literature on identity work and identifies two distinct approaches to incorporating emotion. The majority of empirical studies use emotion to describe the experiences of identity work. In doing so, the authors (a) mention the emotions that people feel in situations...... that trigger identity work, (b) illustrate identity work as an emotional endeavour, and (c) describe the emotional impact of successful and unsuccessful identity work. There is also an emerging literature that examines the mutual constitution of emotions and identity work. These authors address emotional...... labour, affective social identification, emotional attachment and detachment, and humour when studying identity work. This paper suggests that, to understand better the relation between emotions and identity work, future research should examine the role of emotions in problematizing identity...

  15. Spacing Identity

    DEFF Research Database (Denmark)

    Stang Våland, Marianne; Georg, Susse

    2018-01-01

    In this paper, we analyze how architectural design, and the spatial and material changes this involves, contributes to the continuous shaping of identities in an organization. Based upon a case study of organizational and architectural change in a municipal administration at a time of major public...... sector reforms, we examine how design interventions were used to (re)form work and professional relationships. The paper examines how engagements with spatial arrangements and material artifacts affected people’s sense of both occupational and organizational identity. Taking a relational approach...... to sociomateriality, the paper contributes to the further theorizing of space in organization studies by proposing the concept of spacing identity to capture the fluidity of identity performance....

  16. Perspectives on Sexual Identity Formation, Identity Practices, and Identity Transitions Among Men Who Have Sex With Men in India.

    Science.gov (United States)

    Tomori, Cecilia; Srikrishnan, Aylur K; Ridgeway, Kathleen; Solomon, Sunil S; Mehta, Shruti H; Solomon, Suniti; Celentano, David D

    2018-01-01

    Men who have sex with men (MSM) remain at high risk for HIV infection. Culturally specific sexual identities, encompassing sexual roles, behavior, and appearance, may shape MSM's experiences of stigmatization and discrimination, and affect their vulnerability to HIV. This multi-site qualitative study (n = 363) encompassing 31 focus group discussions (FGDs) and 121 in-depth interviews (IDIs) across 15 sites in India investigated sexual identity formation, identity practices, and transitions and their implications for HIV prevention. IDIs and FGDs were transcribed, translated, and underwent thematic analysis. Our findings document heterogeneous sexual identity formation, with MSM who have more gender nonconforming behaviors or appearance reporting greater family- and community-level disapproval, harassment, violence, and exclusion. Concealing feminine aspects of sexual identities was important in daily life, especially for married MSM. Some participants negotiated their identity practices in accordance with socioeconomic and cultural pressures, including taking on identity characteristics to suit consumer demand in sex work and on extended periods of joining communities of hijras (sometimes called TG or transgender women). Participants also reported that some MSM transition toward more feminine and hijra or transgender women identities, motivated by intersecting desires for feminine gender expression and by social exclusion and economic marginalization. Future studies should collect information on gender nonconformity stigma, and any changes in sexual identity practices or plans for transitions to other identities over time, in relation to HIV risk behaviors and outcomes.

  17. A practical field study of performances of solar modules at various positions in Serbia

    OpenAIRE

    Pantić Lana S.; Pavlović Tomislav M.; Milosavljević Dragana D.

    2015-01-01

    In this paper, results of practical field study of performances of three identical monocrystalline solar modules, single power of 60 W, with different inclinations (horizontal, optimally inclined oriented toward South and vertically oriented toward South) in real meteorological conditions, in Nis, Serbia, in 2013, are presented. On the basis of the measurement results of solar energy intensity and electrical power generated with solar modules, efficiency (η...

  18. Identity Presentation: The Construction of Identity in Asynchronous Discussion

    Directory of Open Access Journals (Sweden)

    Brian Morgan

    2008-08-01

    Full Text Available This study examines the use of e-mail as a tool for long term discussion between teachers and grade six students. E-mail messages between grade six students and teachers were collected over the course of one academic year. Methods of conversation analysis within a framework of social practice are used to examine the data. While identity is more readily constructed and more fully developed in contexts which allow for physical embodiment such as face-to-face discussion, this analysis found that identity can be constructed in a context that does not provide for the physical embodiment of identity: Identity was constructed using the social, cultural, and technological tools provided and supported by e-mail to develop social practices germane to the e-mail discussion. This study has implications for further understanding the relation between identity, goals, constraints and affordances, and the collaborative creation of social practices in asynchronous computer mediated communication. URN: urn:nbn:de:0114-fqs0803185

  19. Identity Styles and Religiosity: Examining the Role of Identity Commitment

    Science.gov (United States)

    Grajales, Tevni E.; Sommers, Brittany

    2016-01-01

    This study observed the role of identity styles, identity commitment, and identity statuses in predicting religiosity in a sample of undergraduate students attending a Seventh-day Adventist university (N = 138). Two structural models were evaluated via path analysis. Results revealed two strong models for the prediction of religiosity. Identity…

  20. Political, religious and occupational identities in context: placing identity status paradigm in context.

    Science.gov (United States)

    Solomontos-Kountouri, Olga; Hurry, Jane

    2008-04-01

    This study critically contrasts global identity with domain-specific identities (political, religious and occupational) and considers context and gender as integral parts of identity. In a cross-sectional survey, 1038 Greek Cypriot adolescents (449 boys and 589 girls, mean age 16.8) from the three different types of secondary schools (state, state technical and private) and from different SES completed part of the Extended Objective Measure of Ego Identity Status-2 (EOMEIS-2). The macro-context of Greek Cypriot society is used to understand the role of context in adolescents' identities. Results showed that Greek Cypriot young people were not in the same statuses across their global, political, religious and occupational identities. This heterogeneity in the status of global identity and of each identity domain is partially explained by differences in gender, type of school and SES (socio-economic status). The fact that identity status is found to be reactive to context suggests that developmental stage models of identity status should place greater emphasis on context.

  1. Identities as organizational practices

    DEFF Research Database (Denmark)

    Oshima, Sae; Asmuß, Birte

    Identity has been widely acknowledged as playing a central role in various organizational processes, yet there is still a need to better understand the dynamics and functions of identity work in modern organizations. The present paper is centered within this concern, and examines identity......) reveal the intersubjective, multimodal and embodied nature of identity work; 2) demonstrate identity work as organizational practices, used in order to accomplish specific actions; and 3) pose a question on the view on identity as a layered/leveled phenomenon....

  2. Mobile Identity Management

    NARCIS (Netherlands)

    Hoepman, J.J.

    2011-01-01

    Identity management consists of the processes and all underlying technologies for the creation, management, and usage of digital identities. Business rely on identity management systems to simplify the management of access rights to their systems and services for both their employees and their

  3. Constellation modulation - an approach to increase spectral efficiency.

    Science.gov (United States)

    Dash, Soumya Sunder; Pythoud, Frederic; Hillerkuss, David; Baeuerle, Benedikt; Josten, Arne; Leuchtmann, Pascal; Leuthold, Juerg

    2017-07-10

    Constellation modulation (CM) is introduced as a new degree of freedom to increase the spectral efficiency and to further approach the Shannon limit. Constellation modulation is the art of encoding information not only in the symbols within a constellation but also by encoding information by selecting a constellation from a set of constellations that are switched from time to time. The set of constellations is not limited to sets of partitions from a given constellation but can e.g., be obtained from an existing constellation by applying geometrical transformations such as rotations, translations, scaling, or even more abstract transformations. The architecture of the transmitter and the receiver allows for constellation modulation to be used on top of existing modulations with little penalties on the bit-error ratio (BER) or on the required signal-to-noise ratio (SNR). The spectral bandwidth used by this modulation scheme is identical to the original modulation. Simulations demonstrate a particular advantage of the scheme for low SNR situations. So, for instance, it is demonstrated by simulation that a spectral efficiency increases by up to 33% and 20% can be obtained at a BER of 10 -3 and 2×10 -2 for a regular BPSK modulation format, respectively. Applying constellation modulation, we derive a most power efficient 4D-CM-BPSK modulation format that provides a spectral efficiency of 0.7 bit/s/Hz for an SNR of 0.2 dB at a BER of 2 × 10 -2 .

  4. Selective spatial attention modulates bottom-up informational masking of speech.

    Science.gov (United States)

    Carlile, Simon; Corkhill, Caitlin

    2015-03-02

    To hear out a conversation against other talkers listeners overcome energetic and informational masking. Largely attributed to top-down processes, information masking has also been demonstrated using unintelligible speech and amplitude-modulated maskers suggesting bottom-up processes. We examined the role of speech-like amplitude modulations in information masking using a spatial masking release paradigm. Separating a target talker from two masker talkers produced a 20 dB improvement in speech reception threshold; 40% of which was attributed to a release from informational masking. When across frequency temporal modulations in the masker talkers are decorrelated the speech is unintelligible, although the within frequency modulation characteristics remains identical. Used as a masker as above, the information masking accounted for 37% of the spatial unmasking seen with this masker. This unintelligible and highly differentiable masker is unlikely to involve top-down processes. These data provides strong evidence of bottom-up masking involving speech-like, within-frequency modulations and that this, presumably low level process, can be modulated by selective spatial attention.

  5. Identity Management

    CERN Document Server

    Pace, A

    2008-01-01

    This paper introduces identity management concepts and discusses various issues associated with its implementation. It will try to highlight technical, legal, and social aspects that must been foreseen when defining the numerous processes that an identity management infrastructure must support. Grid interoperability as well as cross platform interoperability is addressed on the technical aspect, followed by a short discussion on social consequences on user’s privacy when completed traceability is enforced and some examples on how identity management has been implemented at CERN

  6. Identity management

    International Nuclear Information System (INIS)

    Pace, A

    2008-01-01

    This paper introduces identity management concepts and discusses various issues associated with their implementation. It will try to highlight technical, legal, and social aspects that must been foreseen when defining the numerous processes that an identity management infrastructure must support. Grid interoperability as well as cross platform interoperability is addressed on the technical aspect, followed by a short discussion on social consequences on user's privacy when completed traceability is enforced. The paper will finally give some examples on how identity management has been implemented at CERN

  7. Language and culture modulate online semantic processing.

    Science.gov (United States)

    Ellis, Ceri; Kuipers, Jan R; Thierry, Guillaume; Lovett, Victoria; Turnbull, Oliver; Jones, Manon W

    2015-10-01

    Language has been shown to influence non-linguistic cognitive operations such as colour perception, object categorization and motion event perception. Here, we show that language also modulates higher level processing, such as semantic knowledge. Using event-related brain potentials, we show that highly fluent Welsh-English bilinguals require significantly less processing effort when reading sentences in Welsh which contain factually correct information about Wales, than when reading sentences containing the same information presented in English. Crucially, culturally irrelevant information was processed similarly in both Welsh and English. Our findings show that even in highly proficient bilinguals, language interacts with factors associated with personal identity, such as culture, to modulate online semantic processing. © The Author (2015). Published by Oxford University Press.

  8. Effective Remote Control of Several Outdoor Security Lights by SMS and Wifi Technology

    Directory of Open Access Journals (Sweden)

    M. F. Akorede

    2017-08-01

    Full Text Available The aim of this study was to design and develop a control system using Short Message Service (SMS and wireless networking (WiFi technology to remotely control outdoor security lights in large organisations. The device comprises four main units, namely: the mobile phone or a computer system, the Global System for Mobile communication (GSM modem, the switching unit and the WiFi module. One feature that makes the developed system better than other related existing works is its ability to use two means of control. It makes use of WiFi when the operator is within the coverage area of the network of about 100 m to the device, at no cost, otherwise it uses SMS containing certain codes to control the lights. A Subscriber Identity Module (SIM card is placed in the GSM modem and SMS from the transmitter are sent to that mobile number. The module is also constantly checked by the microcontroller unit, processes the information, extracts the message and command from the GSM modem and WiFi module respectively and then acts accordingly. Owing to its simplicity, C programming is used to programme the microcontroller. The developed device when tested with three lighting points operating on 230V power supply, gives an impressive performance in terms of accuracy and promptness with both SMS and WiFi technology.

  9. Chemical Composition and Labeling of Substances Marketed as Selective Androgen Receptor Modulators and Sold via the Internet.

    Science.gov (United States)

    Van Wagoner, Ryan M; Eichner, Amy; Bhasin, Shalender; Deuster, Patricia A; Eichner, Daniel

    2017-11-28

    Recent reports have described the increasing use of nonsteroidal selective androgen receptor modulators, which have not been approved by the US Food and Drug Administration (FDA), to enhance appearance and performance. The composition and purity of such products is not known. To determine the chemical identity and the amounts of ingredients in dietary supplements and products marketed and sold through the internet as selective androgen receptor modulators and compare the analyzed contents with product labels. Web-based searches were performed from February 18, 2016, to March 25, 2016, using the Google search engine on the Chrome and Internet Explorer web browsers to identify suppliers selling selective androgen receptor modulators. The products were purchased and the identities of the compounds and their amounts were determined from April to August 2016 using chain-of-custody and World Anti-Doping Association-approved analytical procedures. Analytical findings were compared against the label information. Products marketed and sold as selective androgen receptor modulators. Chemical identities and the amount of ingredients in each product marketed and sold as selective androgen receptor modulators. Among 44 products marketed and sold as selective androgen receptor modulators, only 23 (52%) contained 1 or more selective androgen receptor modulators (Ostarine, LGD-4033, or Andarine). An additional 17 products (39%) contained another unapproved drug, including the growth hormone secretagogue ibutamoren, the peroxisome proliferator-activated receptor-δ agonist GW501516, and the Rev-ErbA agonist SR9009. Of the 44 tested products, no active compound was detected in 4 (9%) and substances not listed on the label were contained in 11 (25%). In only 18 of the 44 products (41%), the amount of active compound in the product matched that listed on the label. The amount of the compounds listed on the label differed substantially from that found by analysis in 26 of 44 products

  10. Identity management

    Energy Technology Data Exchange (ETDEWEB)

    Pace, A [CERN, Geneva (Switzerland)

    2008-07-01

    This paper introduces identity management concepts and discusses various issues associated with their implementation. It will try to highlight technical, legal, and social aspects that must been foreseen when defining the numerous processes that an identity management infrastructure must support. Grid interoperability as well as cross platform interoperability is addressed on the technical aspect, followed by a short discussion on social consequences on user's privacy when completed traceability is enforced. The paper will finally give some examples on how identity management has been implemented at CERN.

  11. Asian American Adolescent Identity

    OpenAIRE

    Ohm, Julie Juhye

    1999-01-01

    The formation of ego identity in Asian American late adolescents attending Virginia Tech was examined within the frameworks of Erikson's psychosocial theory and Berry, Trimble, and Olmedo's model of acculturation. Ego identity was measured using the Achieved sub-scale of the Revised Version of the Extended Objective Measure of Ego Identity Status, an instrument based on the theoretical constructs of Erikson. Ethnic identity was measured using the Multigroup Ethnic Identity Measure and America...

  12. Forging T-Lymphocyte Identity: Intersecting Networks of Transcriptional Control.

    Science.gov (United States)

    Rothenberg, Ellen V; Ungerbäck, Jonas; Champhekar, Ameya

    2016-01-01

    T-lymphocyte development branches off from other lymphoid developmental programs through its requirement for sustained environmental signals through the Notch pathway. In the thymus, Notch signaling induces a succession of T-lineage regulatory factors that collectively create the T-cell identity through distinct steps. This process involves both the staged activation of T-cell identity genes and the staged repression of progenitor-cell-inherited regulatory genes once their roles in self-renewal and population expansion are no longer needed. With the recent characterization of innate lymphoid cells (ILCs) that share transcriptional regulation programs extensively with T-cell subsets, T-cell identity can increasingly be seen as defined in modular terms, as the processes selecting and actuating effector function are potentially detachable from the processes generating and selecting clonally unique T-cell receptor structures. The developmental pathways of different classes of T cells and ILCs are distinguished by the numbers of prerequisites of gene rearrangement, selection, and antigen contact before the cells gain access to nearly common regulatory mechanisms for choosing effector function. Here, the major classes of transcription factors that interact with Notch signals during T-lineage specification are discussed in terms of their roles in these programs, the evidence for their spectra of target genes at different stages, and their cross-regulatory and cooperative actions with each other. Specific topics include Notch modulation of PU.1 and GATA-3, PU.1-Notch competition, the relationship between PU.1 and GATA-3, and the roles of E proteins, Bcl11b, and GATA-3 in guiding acquisition of T-cell identity while avoiding redirection to an ILC fate. © 2016 Elsevier Inc. All rights reserved.

  13. The constitution of marginalized identity in Signs of identity by Juan Goytisolo

    Directory of Open Access Journals (Sweden)

    Jelica Veljović

    2014-12-01

    Full Text Available The main objective of the article is to investigate the modes of constitution of a marginalized and exiled identity in the novel Signs of identity by Juan Goytisolo. It is categorised as a “testimony and postwar novel”, and the subjects’ constant search of themselves, of their Self and all the elements that constitute their identity is central to the work. The novel is set in the postwar socio-historical period and the protagonist – Alvaro Mendiola – searches for his identity in his childhood memories and family pictures, but also amongst all the Others whose life stories intertwine with his journey of identification. Tracing his line of identity formation, we found three different routes: the first through the genealogical records, the second through the concept of Otherness and the last one through love. We find Identity as a kaleidoscope containing all the Others who served as moulds for his Identity, yet leaving it undefined and incomplete. Therefore, the identity of an exiled and marginalized individual is always in flux, continually reinitiating the constitution of the Self that had been eradicated from its first and formative imagery: the family and the fatherland.

  14. Human identity versus gender identity: The perception of sexual addiction among Iranian women.

    Science.gov (United States)

    Moshtagh, Mozhgan; Mirlashari, Jila; Rafiey, Hassan; Azin, Ali; Farnam, Robert

    2017-07-01

    This qualitative study was conducted to explore the images of personal identity from the perspective of women with sexual addiction. The data required for the study were collected through 31 in-depth interviews. Sensing a threat to personal identity, dissatisfaction with gender identity, dissociation with the continuum of identity, and identity reconstruction in response to threat were four of the experiences that were common among women with sexual addiction. Painful emotional experiences appear to have created a sense of gender and sexual conflict or weakness in these women and thus threatened their personal identity and led to their sexual addiction.

  15. Organizational Identity

    DEFF Research Database (Denmark)

    Hatch, Mary Jo; Schultz, Majken

    This text presents the classic works on organizational identity alongside more current thinking on the issues. Ranging from theoretical contributions to empirical studies, the readings in this volume address the key issues of organizational identity, and show how these issues have developed through...

  16. Identities in Harmony: Gender-Work Identity Integration Moderates Frame Switching in Cognitive Processing

    Science.gov (United States)

    Sacharin, Vera; Lee, Fiona; Gonzalez, Richard

    2009-01-01

    Professional women's identity integration--the perceived compatibility between work and gender identities--plays a role in how task or relationship information is processed. Seventy female business school students were primed with either their professional or their gender identity. Business women with higher identity integration showed an…

  17. Corporate Brand Identity in SMEs

    DEFF Research Database (Denmark)

    Mäläskä, Minna; Jones, Richard Ian

    Purpose: To study the emergence of corporate brand identity in SMEs and to develop a typology of brand identity drivers that reflects a co-creative approach to the emergence of brand identity. Design / Methodology / Approach : Existing approaches to brand identity are summarised. A narrative...... studies. The research is important since it suggests an iterative and co-creative approach to brand identity. A typology of brand identity formation for SMEs is presented: entrepreneur driven, market driven, stakeholder driven. Practical implications: The three paths to creating a strong brand identity...... challenge existing notions that brand identity is based solely on the values of the entrepreneur. This typology suggests that SMEs should be open to creating an identity that draws from their stakeholder eco-system. Originality / value: this research challenges the existing assumption that brand identity...

  18. Electronic identity

    CERN Document Server

    de Andrade, Norberto Nuno Gomes; Argles, David

    2014-01-01

    With the increasing availability of electronic services, security and a reliable means by which identity is verified is essential.Written by Norberto Andrade the first chapter of this book provides an overview of the main legal and regulatory aspects regarding electronic identity in Europe and assesses the importance of electronic identity for administration (public), business (private) and, above all, citizens. It also highlights the role of eID as a key enabler of the economy.In the second chapter Lisha Chen-Wilson, David Argles, Michele Schiano di Zenise and Gary Wills discuss the user-cent

  19. Thinking identity differently: dynamics of identity in self and institutional boundary

    Science.gov (United States)

    Albrecht, Nancy J.; Fortney, Brian S.

    2011-03-01

    In research oriented universities, research and teaching are often viewed as separate. Aydeniz and Hodge present one professor's struggles to synthesize an identity from three different spaces, each with competing values and core beliefs. As Mr. G's story unfolds, and he reflects upon his negotiation between teaching and research responsibilities, we seek to expand the discussion by presenting a caution to identity researchers. The caution pertains to construction of understanding on how identities are created, and the role that individual stories take in how identities are created and enacted. In this forum contribution, we present several questions in the hopes of furthering the discussion on identity research, and our understanding of the conceptualization of institutional boundaries and objectivity, as well as questions on participant involvement in the process of research.

  20. Multicultural identity processes.

    Science.gov (United States)

    Hong, Ying-Yi; Zhan, Siran; Morris, Michael W; Benet-Martínez, Verónica

    2016-04-01

    The study of multicultural identity has gained prominence in recent decades and will be even more urgent as the mobility of individuals and social groups becomes the 'new normal'. This paper reviews the state-of-the-art theoretical advancements and empirical discoveries of multicultural identity processes at the intrapersonal, interpersonal, and collective (e.g., organizational, societal) levels. First, biculturalism has more benefits for individuals' psychological and sociocultural adjustment than monoculturalism. Bicultural individuals' racial essentialist beliefs and Bicultural Identity Integration affect cultural frame switching, racial categorization, and creativity. Second, identity denial and identity-based discrimination by other people or groups threaten multicultural individuals' psychological health and performance. Third, multiculturalism and interculturalism policies are associated with different conceptions of and attitudes toward diversity, and have distinct outcomes for multicultural individuals and societies. Copyright © 2015 Elsevier Ltd. All rights reserved.

  1. Social Identity in People with Multiple Sclerosis: An Examination of Family Identity and Mood.

    Science.gov (United States)

    Barker, Alex B; Lincoln, Nadina B; Hunt, Nigel; dasNair, Roshan

    2018-01-01

    Mood disorders are highly prevalent in people with multiple sclerosis (MS). MS causes changes to a person's sense of self. The Social Identity Model of Identity Change posits that group membership can have a positive effect on mood during identity change. The family is a social group implicated in adjustment to MS. The objectives of this study were to investigate whether family identity can predict mood in people with MS and to test whether this prediction was mediated by social support and connectedness to others. This cross-sectional survey of 195 participants comprised measures of family identity, family social support, connectedness to others, and mood. Family identity predicted mood both directly and indirectly through parallel mediators of family social support and connectedness to others. Family identity predicted mood as posited by the Social Identity Model of Identity Change. Involving the family in adjustment to MS could reduce low mood.

  2. Identity-specific motivation: How distinct identities direct self-regulation across distinct situations.

    Science.gov (United States)

    Browman, Alexander S; Destin, Mesmin; Molden, Daniel C

    2017-12-01

    Research on self-regulation has traditionally emphasized that people's thoughts and actions are guided by either (a) domain-general motivations that emerge from a cumulative history of life experiences, or (b) situation-specific motivations that emerge in immediate response to the incentives present in a particular context. However, more recent studies have illustrated the importance of understanding the interplay between such domain-general and situation-specific motivations across the types of contexts people regularly encounter. The present research, therefore, expands existing perspectives on self-regulation by investigating how people's identities -the internalized roles, relationships, and social group memberships that define who they are-systemically guide when and how different domain-general motivations are activated within specific types of situations. Using the motivational framework described by regulatory focus theory (Higgins, 1997), Studies 1 and 2 demonstrate that people indeed have distinct, identity-specific motivations that uniquely influence their current self-regulation when such identities are active. Studies 3-5 then begin to explore how identity-specific motivations are situated within people's larger self-concept. Studies 3a and 3b demonstrate that the less compatible people's specific identities, the more distinct are the motivations connected to those identities. Studies 4-5 then provide some initial, suggestive evidence that identity-specific motivations are not a separate, superordinate feature of people's identities that then alter how they pursue any subordinate, identity-relevant traits, but instead that such motivations emerge from the cumulative motivational significance of the subordinate traits to which the identities themselves become attached. Implications for understanding the role of the self-concept in self-regulation are discussed. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  3. Memory transfer for emotionally valenced words between identities in dissociative identity disorder.

    Science.gov (United States)

    Huntjens, Rafaële J C; Peters, Madelon L; Woertman, Liesbeth; van der Hart, Onno; Postma, Albert

    2007-04-01

    The present study aimed to determine interidentity retrieval of emotionally valenced words in dissociative identity disorder (DID). Twenty-two DID patients participated together with 25 normal controls and 25 controls instructed to simulate DID. Two wordlists A and B were constructed including neutral, positive and negative material. List A was shown to one identity, while list B was shown to another identity claiming total amnesia for the words learned by the first identity. The identity claiming amnesia was tested for intrusions from list A words into the recall of words from list B and recognition of the words learned by both identities. Test results indicated no evidence of total interidentity amnesia for emotionally valenced material in DID. It is argued that dissociative amnesia in DID may more adequately be described as a disturbance in meta-memory functioning instead of an actual retrieval inability.

  4. Ritual Identity

    NARCIS (Netherlands)

    van der Beek, Suzanne

    2017-01-01

    Rituals are often used as opportunities for self-reflection and identity construction. The Camino to Santiago de Compostela, which has become a singularly popular pilgrimage since the late 1980s, is an example of a ritual that is explicitly used to gain a deeper understanding of one’s identity

  5. Brand Identity.

    Science.gov (United States)

    Lawlor, John

    1998-01-01

    Instead of differentiating themselves by building "brand identities," colleges and universities often focus on competing with price. As a result, fewer and fewer institutions base their identities on value, the combination of quality and price. Methods of building two concepts to influence customers' brand image and brand loyalty are…

  6. Identity and Professional Networking.

    Science.gov (United States)

    Raj, Medha; Fast, Nathanael J; Fisher, Oliver

    2017-06-01

    Despite evidence that large professional networks afford a host of financial and professional benefits, people vary in how motivated they are to build such networks. To help explain this variance, the present article moves beyond a rational self-interest account to examine the possibility that identity shapes individuals' intentions to network. Study 1 established a positive association between viewing professional networking as identity-congruent and the tendency to prioritize strengthening and expanding one's professional network. Study 2 revealed that manipulating the salience of the self affects networking intentions, but only among those high in networking identity-congruence. Study 3 further established causality by experimentally manipulating identity-congruence to increase networking intentions. Study 4 examined whether identity or self-interest is a better predictor of networking intentions, providing support for the former. These findings indicate that identity influences the networks people develop. Implications for research on the self, identity-based motivation, and professional networking are discussed.

  7. Transfer of newly acquired stimulus valence between identities in dissociative identity disorder (DID).

    Science.gov (United States)

    Huntjens, Rafaële J C; Peters, Madelon L; Postma, Albert; Woertman, Liesbeth; Effting, Marieke; van der Hart, Onno

    2005-02-01

    Patients with Dissociative Identity Disorder (DID) frequently report episodes of interidentity amnesia, that is amnesia for events experienced by other identities. The goal of the present experiment was to test the implicit transfer of trauma-related information between identities in DID. We hypothesized that whereas declarative information may transfer from one identity to another, the emotional connotation of the memory may be dissociated, especially in the case of negative, trauma-related emotional valence. An evaluative conditioning procedure was combined with an affective priming procedure, both performed by different identities. In the evaluative conditioning procedure, previously neutral stimuli come to refer to a negative or positive connotation. The affective priming procedure was used to test the transfer of this acquired valence to an identity reporting interidentity amnesia. Results indicated activation of stimulus valence in the affective priming task, that is transfer of emotional material between identities.

  8. Challenging Identities

    DEFF Research Database (Denmark)

    Identity is a keyword in a number of academic fields as well as in public debate and in politics. During the last decades, references to identity have proliferated, yet there is no simple definition available that corresponds to the use of the notion in all contexts. The significance of the notion...

  9. Men as victims: "victim" identities, gay identities, and masculinities.

    Science.gov (United States)

    Dunn, Peter

    2012-11-01

    The impact and meanings of homophobic violence on gay men's identities are explored with a particular focus on their identities as men and as gay men. Homosexuality can pose a challenge to conventional masculinities, and for some gay men, being victimized on account of sexual orientation reawakens conflicts about their masculinity that they thought they had resolved. Being victimized can reinvoke shame that is rooted in failure or unwillingness to uphold masculine norms. For some gay men, victimization therefore has connotations of nonmasculinity that make being a victim an undesirable status, yet that status must be claimed to obtain a response from criminal justice or victim services. Men who experience homophobic abuse are helped by accepting a victim identity, but only if they can quickly move on from it by reconstructing a masculine gay (nonvictim) identity. This process can be facilitated by agencies such as the police and victim services, provided they help men exercise agency in "fighting back," that is, resisting further victimization and recovering.

  10. Comprehensive Investigation on Current Imbalance among Parallel Chips inside MW-Scale IGBT Power Modules

    DEFF Research Database (Denmark)

    Wu, Rui; Smirnova, Liudmila; Wang, Huai

    2015-01-01

    With the demands for increasing the power rating and improving reliability level of the high power IGBT modules, there are further needs of understanding how to achieve stable paralleling and identical current sharing between the chips. This paper investigates the stray parameters imbalance among...... parallel chips inside the 1.7 kV/1 kA high power IGBT modules at different frequencies by Ansys Q3D parastics extractor. The resulted current imbalance is further confirmed by experimental measurement....

  11. Entrepreneurship Education as Identity Workspace

    DEFF Research Database (Denmark)

    Frederiksen, Signe Hedeboe

    2016-01-01

    Entrepreneurship education theory and practice show increasing interest in identity work as an important part of entrepreneurial learning. Entrepreneurship programs become identity workspaces where pedagogical designs stimulate entrepreneurial identity work and support individuals’ discovery...... of themselves as entrepreneurs. This article investigates how entrepreneurship education is practiced as an identity workspace, when reflective identity work is turned into a pedagogical strategy for entrepreneurial learning. I present empirical data from a qualitative fieldstudy in an eleven week mandatory...... and identities. Exposed to identity work practices in class, learners experienced conflicting demands participating as succesful students and participating as potential entrepreneurs. The study draws attention to how an education setting contextualises identity work as a social practice. It critisises...

  12. Facial Expression at Retrieval Affects Recognition of Facial Identity

    Directory of Open Access Journals (Sweden)

    Wenfeng eChen

    2015-06-01

    Full Text Available It is well known that memory can be modulated by emotional stimuli at the time of encoding and consolidation. For example, happy faces create better identity recognition than faces with certain other expressions. However, the influence of facial expression at the time of retrieval remains unknown in the literature. To separate the potential influence of expression at retrieval from its effects at earlier stages, we had participants learn neutral faces but manipulated facial expression at the time of memory retrieval in a standard old/new recognition task. The results showed a clear effect of facial expression, where happy test faces were identified more successfully than angry test faces. This effect is unlikely due to greater image similarity between the neutral learning face and the happy test face, because image analysis showed that the happy test faces are in fact less similar to the neutral learning faces relative to the angry test faces. In the second experiment, we investigated whether this emotional effect is influenced by the expression at the time of learning. We employed angry or happy faces as learning stimuli, and angry, happy, and neutral faces as test stimuli. The results showed that the emotional effect at retrieval is robust across different encoding conditions with happy or angry expressions. These findings indicate that emotional expressions affect the retrieval process in identity recognition, and identity recognition does not rely on emotional association between learning and test faces.

  13. BRANDING AND IDENTITY BUILDING FOR A SMALL COMPANY : Focused on Visual Identity

    OpenAIRE

    Näveri, Mattea

    2015-01-01

    The topic of this thesis is branding and identity of a small business, with a focus on visual identity. The major part of this thesis focuses on the research done on visual identity and the basic ideation of branding. The other half specifically focuses on the visual identity, the creation of a logo for the company, defining typography and colour and ephemera, and particularly, the company’s business card. The main goal was to execute a unique, individualized branding, which showcases...

  14. Nearly identical cycles of the quasi-biennial oscillation in the equatorial lower stratosphere

    Science.gov (United States)

    Dunkerton, T. J.

    2017-08-01

    As a nonlinear dynamical system with limit cycles but subject to periodic forcings associated with the seasonal cycle, the quasi-biennial oscillation (QBO) displays seasonal modulation such that phase transitions are more likely to occur in certain months than in others. Modulation is distinct from seasonal synchronization, defined as quantized QBO periods and identical cycles. Instead, nearly identical QBO cycles can be identified in the data having similar period, internal structure, and (optionally) timing with respect to the calendar year. Four such categories are found using a spectral phase method based on the 2-D phase space of the leading rotated principal components (RPCs) of near-equatorial monthly mean zonal wind in the layer 70-10 hPa. The most prominent category, containing as many as 15 cycles of the 28 observed thus far, is "nearly biennial" with period slightly greater than 24 months. All results, prior to the recent QBO anomaly in Cycle 28, are demonstrated to be statistically stationary in the sense that the RPCs are temporally invariant and insensitive to the inclusion of data to 100 hPa and with higher vertical resolution. Inclusion of Cycle 28 has no effect on the rotated empirical orthogonal functions but a microscopic change in the long-term average, since strong easterlies are missing in the anomalous cycle. For objective definition of QBO cycles in physical space-time, westerly onsets in the 40-53 hPa layer are least likely to stall and provide unambiguous starting times. Half of these onsets cluster in April-May, consistent with the seasonal modulation obtained with the spectral phase method.

  15. Exploring medical identity theft.

    Science.gov (United States)

    Mancilla, Desla; Moczygemba, Jackie

    2009-09-16

    The crime of medical identity theft is a growing concern in healthcare institutions. A mixed-method study design including a two-stage electronic survey, telephone survey follow-up, and on-site observations was used to evaluate current practices in admitting and registration departments to reduce the occurrence of medical identity theft. Survey participants were chief compliance officers in acute healthcare organizations and members of the Health Care Compliance Association. Study results indicate variance in whether or how patient identity is confirmed in healthcare settings. The findings of this study suggest that information systems need to be designed for more efficient identity management. Admitting and registration staff must be trained, and compliance with medical identity theft policies and procedures must be monitored. Finally, biometric identity management solutions should be considered for stronger patient identification verification.

  16. Testing the precision optical calibration module for PINGU

    Energy Technology Data Exchange (ETDEWEB)

    Jurkovic, Martin; Holzapfel, Kilian [TU Muenchen, Physik-Department, Excellence Cluster Universe, Boltzmannstr. 2, 85748 Garching (Germany); Collaboration: IceCube-Collaboration

    2015-07-01

    The Precision IceCube Next Generation Upgrade (PINGU) is primarily designed to determine the neutrino mass hierarchy. This measurement requires an accurate calibration of the detector in order to reduce systematic uncertainties. The Precision Optical Calibration Modules (POCAM) will be placed in the detector as a well calibrated artificial light source in the ice. The POCAM will be enclosed in a glass sphere identical to those used for the detector modules. To construct and simulate a prototype of the POCAM, every component needs to be analyzed by their optical characteristics and by the behavior in temperatures down to -50 C. Therefore a highly shielded an isolated environment has to be build up. We report the status of the testing environment and the hardware selected.

  17. Media identities and media-influenced indentifications Visibility and identity recognition in the media

    Directory of Open Access Journals (Sweden)

    Víctor Fco. Sampedro Blanco

    2004-10-01

    Full Text Available The media establish, in large part, the patterns of visibility and public recognition of collective identities. We define media identities as those that are the object of production and diffusion by the media. From this discourse, the communities and individuals elaborate media-influenced identifications; that is, processes of recognition or banishment; (rearticulating the identity markers that the media offer with other cognitive and emotional sources. The generation and appropriation of the identities are subjected to a media hierarchisation that influences their normalisation or marginalisation. The identities presented by the media and assumed by the audience as part of the official, hegemonic discourse are normalised, whereas the identities and identifications formulated in popular and minority terms are marginalised. After presenting this conceptual and analytical framework, this study attempts to outline the logics that condition the presentation, on the one hand, andthe public recognition, on the other hand, of contemporary identities.

  18. An assessment of envelope-based demodulation in case of proximity of carrier and modulation frequencies

    Science.gov (United States)

    Shahriar, Md Rifat; Borghesani, Pietro; Randall, R. B.; Tan, Andy C. C.

    2017-11-01

    Demodulation is a necessary step in the field of diagnostics to reveal faults whose signatures appear as an amplitude and/or frequency modulation. The Hilbert transform has conventionally been used for the calculation of the analytic signal required in the demodulation process. However, the carrier and modulation frequencies must meet the conditions set by the Bedrosian identity for the Hilbert transform to be applicable for demodulation. This condition, basically requiring the carrier frequency to be sufficiently higher than the frequency of the modulation harmonics, is usually satisfied in many traditional diagnostic applications (e.g. vibration analysis of gear and bearing faults) due to the order-of-magnitude ratio between the carrier and modulation frequency. However, the diversification of the diagnostic approaches and applications shows cases (e.g. electrical signature analysis-based diagnostics) where the carrier frequency is in close proximity to the modulation frequency, thus challenging the applicability of the Bedrosian theorem. This work presents an analytic study to quantify the error introduced by the Hilbert transform-based demodulation when the Bedrosian identity is not satisfied and proposes a mitigation strategy to combat the error. An experimental study is also carried out to verify the analytical results. The outcome of the error analysis sets a confidence limit on the estimated modulation (both shape and magnitude) achieved through the Hilbert transform-based demodulation in case of violated Bedrosian theorem. However, the proposed mitigation strategy is found effective in combating the demodulation error aroused in this scenario, thus extending applicability of the Hilbert transform-based demodulation.

  19. Coming to an Asexual Identity: Negotiating Identity, Negotiating Desire.

    Science.gov (United States)

    Scherrer, Kristin S

    2008-10-01

    Sexuality is generally considered an important aspect of self-hood. Therefore, individuals who do not experience sexual attraction, and embrace an asexual identity are in a unique position to inform the social construction of sexuality. This study explores the experiences of asexual individuals utilizing open ended Internet survey data from 102 self-identified asexual people. In this paper I describe several distinct aspects of asexual identities: the meanings of sexual, and therefore, asexual behaviors, essentialist characterizations of asexuality, and lastly, interest in romance as a distinct dimension of sexuality. These findings have implications not only for asexual identities, but also for the connections of asexuality with other marginalized sexualities.

  20. LFI 30 and 44 GHz receivers Back-End Modules

    International Nuclear Information System (INIS)

    Artal, E; Aja, B; Fuente, M L de la; Pascual, J P; Mediavilla, A; Martinez-Gonzalez, E; Pradell, L; Paco, P de; Bara, M; Blanco, E; GarcIa, E; Davis, R; Kettle, D; Roddis, N; Wilkinson, A; Bersanelli, M; Mennella, A; Tomasi, M; Butler, R C; Cuttaia, F

    2009-01-01

    The 30 and 44 GHz Back End Modules (BEM) for the Planck Low Frequency Instrument are broadband receivers (20% relative bandwidth) working at room temperature. The signals coming from the Front End Module are amplified, band pass filtered and finally converted to DC by a detector diode. Each receiver has two identical branches following the differential scheme of the Planck radiometers. The BEM design is based on MMIC Low Noise Amplifiers using GaAs P-HEMT devices, microstrip filters and Schottky diode detectors. Their manufacturing development has included elegant breadboard prototypes and finally qualification and flight model units. Electrical, mechanical and environmental tests were carried out for the characterization and verification of the manufactured BEMs. A description of the 30 and 44 GHz Back End Modules of Planck-LFI radiometers is given, with details of the tests done to determine their electrical and environmental performances. The electrical performances of the 30 and 44 GHz Back End Modules: frequency response, effective bandwidth, equivalent noise temperature, 1/f noise and linearity are presented.

  1. Development and application of visual support module for remote operator in 3D virtual environment

    International Nuclear Information System (INIS)

    Choi, Kyung Hyun; Cho, Soo Jeong; Yang, Kyung Boo; Bae, Chang Hyun

    2006-02-01

    In this research, the 3D graphic environment was developed for remote operation, and included the visual support module. The real operation environment was built by employing a experiment robot, and also the identical virtual model was developed. The well-designed virtual models can be used to retrieve the necessary conditions for developing the devices and processes. The integration of 3D virtual models, the experimental operation environment, and the visual support module was used for evaluating the operation efficiency and accuracy by applying different methods such as only monitor image and with visual support module

  2. Development and application of visual support module for remote operator in 3D virtual environment

    Energy Technology Data Exchange (ETDEWEB)

    Choi, Kyung Hyun; Cho, Soo Jeong; Yang, Kyung Boo [Cheju Nat. Univ., Jeju (Korea, Republic of); Bae, Chang Hyun [Pusan Nat. Univ., Busan (Korea, Republic of)

    2006-02-15

    In this research, the 3D graphic environment was developed for remote operation, and included the visual support module. The real operation environment was built by employing a experiment robot, and also the identical virtual model was developed. The well-designed virtual models can be used to retrieve the necessary conditions for developing the devices and processes. The integration of 3D virtual models, the experimental operation environment, and the visual support module was used for evaluating the operation efficiency and accuracy by applying different methods such as only monitor image and with visual support module.

  3. Generating systems: PV modules. Interconnections, operation and installation. The photovoltaic generator

    International Nuclear Information System (INIS)

    Lorenzo, E.

    1992-01-01

    A method to predict the electrical performances of a photovoltaic generator, at any operation mode, is given. Data are taken from manufactures catalogues and assuming all the cells identical. On the other hand, it is demonstrated the necessity to attach the modules following determined rules to minimize dispersion losses and use diodes to avoid the formation of hot spots

  4. Rethinking Compassion Fatigue Through the Lens of Professional Identity: The Case of Child-Protection Workers.

    Science.gov (United States)

    Geoffrion, Steve; Morselli, Carlo; Guay, Stéphane

    2016-07-01

    Compassion fatigue is currently the dominant model in work-related stress studies that explain the consequences of caring for others on child-protection workers. Based on a deterministic approach, this model excludes the role of cognition a priori and a posteriori in the understanding of the impact of caregiving or providing social support. By integrating the notion of professional identity, this article adds a subjective perspective to the compassion fatigue model allowing for the consideration of positive outcomes and takes into account the influence of stress caused by accountability. Mainly, it is argued that meanings derived from identity and given to situations may protect or accelerate the development of compassion fatigue or compassion satisfaction. To arrive at this proposition, the notions of compassion fatigue and identity theory are first reviewed. These concepts are then articulated around four work-related stressors specific to child-protection work. In light of this exercise, it is argued that professional identity serves as a subjective interpretative framework that guides the understanding of work-related situations. Therefore, compassion fatigue is not only a simple reaction to external stimuli. It is influenced by meanings given to the situation. Furthermore, professional identity modulates the impact of compassion fatigue on psychological well-being. Practice, policy, and research implications in light of these findings are also discussed. © The Author(s) 2015.

  5. Identity Support, Identity Devaluation, and Well-Being among Lesbians

    Science.gov (United States)

    Beals, Kristin P.; Peplau, Letitia Anne

    2005-01-01

    This research tested predictions about the association of identity support and identity devaluation with psychological well-being (self-esteem, life satisfaction, and depression). Lesbian women completed baseline surveys (N=42), then provided daily experience reports during a 2-week period (n=38), and completed a 2-month follow-up survey (n=34).…

  6. Racial Identity Attitudes and Ego Identity Statuses in Dominican and Puerto Rican College Students

    Science.gov (United States)

    Sanchez, Delida

    2013-01-01

    This study explored the relation between racial identity attitudes and ego identity statuses in 94 Dominican and Puerto Rican Latino college students in an urban public college setting. Simultaneous regression analyses were conducted to test the relation between racial identity attitudes and ego identity statuses, and findings indicated that…

  7. Bridging Identities

    Science.gov (United States)

    Deaux, Kay; Burke, Peter

    2010-01-01

    Sociology and psychology are no strangers in the theoretical world of self and identity. Early works by William James (1890), a psychologist, and George Herbert Mead (1934), a sociologist, are often taken as a starting point by investigators in both fields. In more recent years, with the development of a number of identity theories in both fields,…

  8. Components of Sexual Identity

    Science.gov (United States)

    Shively, Michael G.; DeCecco, John P.

    1977-01-01

    This paper examines the four components of sexual identity: biological sex, gender identity, social sex-role, and sexual orientation. Theories about the development of each component and how they combine and conflict to form the individual's sexual identity are discussed. (Author)

  9. Korean Adoptee Identity: Adoptive and Ethnic Identity Profiles of Adopted Korean Americans

    Science.gov (United States)

    Beaupre, Adam J.; Reichwald, Reed; Zhou, Xiang; Raleigh, Elizabeth; Lee, Richard M.

    2015-01-01

    Adopted Korean adolescents face the task of grappling with their identity as Koreans and coming to terms with their adoptive status. In order to explore these dual identities, the authors conducted a person-centered study of the identity profiles of 189 adopted Korean American adolescents. Using cluster analytic procedures, the study examined…

  10. How Do Acquired Political Identities Influence Our Neural Processing toward Others within the Context of a Trust Game?

    Science.gov (United States)

    Wu, Chien-Te; Fan, Yang-Teng; Du, Ye-Rong; Yang, Tien-Tun; Liu, Ho-Ling; Yen, Nai-Shing; Chen, Shu-Heng; Hsung, Ray-May

    2018-01-01

    Trust is essential for mutually beneficial human interactions in economic exchange and politics and people's social identities notably have dramatic effects on trust behaviors toward others. Previous literature concerning social identities generally suggests that people tend to show in-group favoritism toward members who share the same identity. However, how our brains process signals of identity while facing uncertain situations in interpersonal interactions remains largely unclear. To address this issue, we performed an fMRI experiment with 54 healthy adults who belonged to two identity groups of opposing political orientations. The identity information of participants was extracted from a large-scale social survey on the 2012 Taiwan presidential election. Accordingly, participants were categorized as either the Kuomintang (KMT) or the Democratic Progressive Party (DPP) supporters. During the experiment, participants played trust games with computer agents with labels of the same or the opposing political identity. Interestingly, our results suggest that the behaviors of the two groups cannot be equally attributed to in-group favoritism. Behaviorally, only the DPP supporter group showed a significant trust preference toward in-group members, which did not hold for the KMT supporter group. Consistently, neurophysiological findings further revealed that only the DPP supporter group showed neuronal responses to both unexpected negative feedback from in-group members in anterior insula, temporoparietal junction, and dorsal lateral prefrontal cortex, as well as to unexpected rewards from out-group members in caudate. These findings therefore suggest that acquired identities play a more complex role in modulating people's social expectation in interpersonal trust behaviors under identity-relevant contexts.

  11. How Do Acquired Political Identities Influence Our Neural Processing toward Others within the Context of a Trust Game?

    Directory of Open Access Journals (Sweden)

    Chien-Te Wu

    2018-02-01

    Full Text Available Trust is essential for mutually beneficial human interactions in economic exchange and politics and people’s social identities notably have dramatic effects on trust behaviors toward others. Previous literature concerning social identities generally suggests that people tend to show in-group favoritism toward members who share the same identity. However, how our brains process signals of identity while facing uncertain situations in interpersonal interactions remains largely unclear. To address this issue, we performed an fMRI experiment with 54 healthy adults who belonged to two identity groups of opposing political orientations. The identity information of participants was extracted from a large-scale social survey on the 2012 Taiwan presidential election. Accordingly, participants were categorized as either the Kuomintang (KMT or the Democratic Progressive Party (DPP supporters. During the experiment, participants played trust games with computer agents with labels of the same or the opposing political identity. Interestingly, our results suggest that the behaviors of the two groups cannot be equally attributed to in-group favoritism. Behaviorally, only the DPP supporter group showed a significant trust preference toward in-group members, which did not hold for the KMT supporter group. Consistently, neurophysiological findings further revealed that only the DPP supporter group showed neuronal responses to both unexpected negative feedback from in-group members in anterior insula, temporoparietal junction, and dorsal lateral prefrontal cortex, as well as to unexpected rewards from out-group members in caudate. These findings therefore suggest that acquired identities play a more complex role in modulating people’s social expectation in interpersonal trust behaviors under identity-relevant contexts.

  12. How Do Acquired Political Identities Influence Our Neural Processing toward Others within the Context of a Trust Game?

    Science.gov (United States)

    Wu, Chien-Te; Fan, Yang-Teng; Du, Ye-Rong; Yang, Tien-Tun; Liu, Ho-Ling; Yen, Nai-Shing; Chen, Shu-Heng; Hsung, Ray-May

    2018-01-01

    Trust is essential for mutually beneficial human interactions in economic exchange and politics and people’s social identities notably have dramatic effects on trust behaviors toward others. Previous literature concerning social identities generally suggests that people tend to show in-group favoritism toward members who share the same identity. However, how our brains process signals of identity while facing uncertain situations in interpersonal interactions remains largely unclear. To address this issue, we performed an fMRI experiment with 54 healthy adults who belonged to two identity groups of opposing political orientations. The identity information of participants was extracted from a large-scale social survey on the 2012 Taiwan presidential election. Accordingly, participants were categorized as either the Kuomintang (KMT) or the Democratic Progressive Party (DPP) supporters. During the experiment, participants played trust games with computer agents with labels of the same or the opposing political identity. Interestingly, our results suggest that the behaviors of the two groups cannot be equally attributed to in-group favoritism. Behaviorally, only the DPP supporter group showed a significant trust preference toward in-group members, which did not hold for the KMT supporter group. Consistently, neurophysiological findings further revealed that only the DPP supporter group showed neuronal responses to both unexpected negative feedback from in-group members in anterior insula, temporoparietal junction, and dorsal lateral prefrontal cortex, as well as to unexpected rewards from out-group members in caudate. These findings therefore suggest that acquired identities play a more complex role in modulating people’s social expectation in interpersonal trust behaviors under identity-relevant contexts. PMID:29456496

  13. Capillary condensation and evaporation in alumina nanopores with controlled modulations.

    Science.gov (United States)

    Bruschi, Lorenzo; Mistura, Giampaolo; Liu, Lifeng; Lee, Woo; Gösele, Ulrich; Coasne, Benoit

    2010-07-20

    Capillary condensation in nanoporous anodic aluminum oxide presenting not interconnected pores with controlled modulations is studied using adsorption experiments and molecular simulations. Both the experimental and simulation data show that capillary condensation and evaporation are driven by the smallest size of the nanopore (constriction). The adsorption isotherms for the open and closed pores are almost identical if constrictions are added to the system. The latter result implies that the type of pore ending does not matter in modulated pores. Thus, the presence of hysteresis loops observed in adsorption isotherms measured in straight nanopores with closed bottom ends can be explained in terms of geometrical inhomogeneities along the pore axis. More generally, these results provide a general picture of capillary condensation and evaporation in constricted or modulated pores that can be used for the interpretation of adsorption in disordered porous materials.

  14. Regional Commonalities and Regional Identities: Forging a Normative Understanding of Southeast Asian Identity

    Directory of Open Access Journals (Sweden)

    Gürol Baba

    2016-01-01

    Full Text Available In the last two decades, most of the IR academia’s attention on Southeast Asian regionalism utilised constructivism and/or realism and has focused on ASEAN and its derivatives. This article aims to skew this angle by elaborating a possible relationship between Asian values and a normative understanding of Southeast Asian identity. The major reason for this article’s focus on a normative interpretation is that a practical application of Southeast Asian identity is not very achievable due to various ethnic, cultural, political, territorial, and historical diversities. While the region is diverse, there are also a number of commonalities among its states. Asian values, from a Confucian perspective, account for some of these commonalities. By using constructivists’ claims on both the links between norms and identity and the dynamic interaction between values and norms, this article argues that Asian values could contribute to the development of Amitav Acharya’s widely cited normative/ideational format of Southeast Asian identity. The article takes ASEAN identity as a case study and aims to show why a normative identity is more achievable than a practical identity among Southeast Asians, and how Asian values might contribute to the creation of this shared identity.

  15. Social Identity Change: Shifts in Social Identity during Adolescence

    Science.gov (United States)

    Tanti, Chris; Stukas, Arthur A.; Halloran, Michael J.; Foddy, Margaret

    2011-01-01

    This study investigated the proposition that adolescence involves significant shifts in social identity as a function of changes in social context and cognitive style. Using an experimental design, we primed either peer or gender identity with a sample of 380 early- (12-13 years), mid- (15-16 years), and late-adolescents (18-20 years) and then…

  16. Targeting and tailoring message-framing: the moderating effect of racial identity on receptivity to colorectal cancer screening among African-Americans.

    Science.gov (United States)

    Lucas, Todd; Manning, Mark; Hayman, Lenwood W; Blessman, James

    2018-06-07

    This study demonstrates the potential of racial identity to moderate how gain and loss-framed messaging, as well as culturally-targeted messaging, can affect receptivity to preventive health screening. African-Americans (N = 132) who were noncompliant with recommended colorectal cancer (CRC) screening completed a measure of racial identity centrality-encompassing the extent to which racial identity is a core component of self-concept-and then participated in an online education module about CRC screening, during which either gain or loss-framed messaging was introduced. Half of African-Americans were also exposed to a culturally-targeted self-help message about preventing CRC. Theory of Planned Behavior measures of attitudes, normative beliefs, perceived behavioral control, and intentions to obtain a CRC screen served as outcomes. Results confirmed that effects of messaging on receptivity to CRC screening depended on racial identity. Among low racial identity African Americans, gain-framed messaging most effectively increased normative beliefs about obtaining CRC screening, whereas among high racial identity African Americans loss-framed messaging was most compelling. However, these effects most strongly emerged when culturally-targeted self-help messaging was included. We discuss implications for health disparities theory and research, including a potential to simultaneously deploy culturally-targeted and tailored messaging based on racial identity.

  17. Inter-identity autobiographical amnesia in patients with dissociative identity disorder.

    Science.gov (United States)

    Huntjens, Rafaële J C; Verschuere, Bruno; McNally, Richard J

    2012-01-01

    A major symptom of Dissociative Identity Disorder (DID; formerly Multiple Personality Disorder) is dissociative amnesia, the inability to recall important personal information. Only two case studies have directly addressed autobiographical memory in DID. Both provided evidence suggestive of dissociative amnesia. The aim of the current study was to objectively assess transfer of autobiographical information between identities in a larger sample of DID patients. Using a concealed information task, we assessed recognition of autobiographical details in an amnesic identity. Eleven DID patients, 27 normal controls, and 23 controls simulating DID participated. Controls and simulators were matched to patients on age, education level, and type of autobiographical memory tested. Although patients subjectively reported amnesia for the autobiographical details included in the task, the results indicated transfer of information between identities. The results call for a revision of the DID definition. The amnesia criterion should be modified to emphasize its subjective nature.

  18. Collective Endeavors to Address Institutional Contradiction between Gender Identity and Occupational Identity

    DEFF Research Database (Denmark)

    Villeseche, Florence

    or leaders and their social identity as women. Accordingly, I here seek to answer the following question: what dilemmas arise from the collective institutional work performed by actors facing institutional contradiction between their occupational and gender identity, and how are those dilemmas addressed? I......Women’s presence in the labor market is one of the major institutional changes of the past century. However, in particular at higher hierarchical levels, gender equality still remains a distant objective. The ideal-type of the worker, manager or leader is this largely a masculine one, thus...... associating the related occupational identity to a masculine gender social identity. Thus, it can be argued that women in organizations can face an “institutional contradiction” between their occupation and their gender – i.e a perceived discordancy between their social occupational identity as managers...

  19. Being Tolerant about Identity?

    NARCIS (Netherlands)

    van Rooij, R.; Gutzmann, D.; Köpping, J.; Meier, C.

    2014-01-01

    Identity and identification are very important concepts in philosophy and logic. They are crucial for the analysis of quantification and for counting. According to some philosophers, many examples that are supposed to show that identity is contingent, in fact show that the notion of identity is

  20. Post-colonial identity in Greenland?

    DEFF Research Database (Denmark)

    Gad, Ulrik Pram

    2009-01-01

    could be furthered by bringing politics back in. Based on a discourse analysis of the Greenlandic debate on language, this paper makes three claims: First, the identity projects promoted in Greenland are based on an essentialist conception of identity. Secondly, Greenlandic identity discourse combines......In the gradual unravelling of Greenland’s colonial relationship to Denmark, an essentialist conceptualization of Greenlandic identity has played a significant role. However, both our scholarly understanding of post-colonial Greenlandic identity and the process towards independence for Greenland...... elements of traditional Inuit culture and elements of colonial modernity. Thirdly, monolingual Greenlanders are those with the most to gain from abandoning the dichotomy of essentialist identities. Strategically, the paper suggests a post-post-colonial Greenlandic identity as a means of avoiding...

  1. On the fundamentals of identity

    NARCIS (Netherlands)

    van der Gaag, Mandy

    Various new perspectives on identity have been introduced or have increased in popularity over the past two decades. These include identity as dynamic system (Kunnen & Bosma, 2001), a narrative approach to identity (McAdams, 2001), multi-dimensional models of identity formation (Luyckx et al., 2006;

  2. Personal Identity in Enhancement

    Directory of Open Access Journals (Sweden)

    Jana Podroužková

    2015-09-01

    Full Text Available The aim of this paper is to introduce the concept of human enhancement, its methods and its relation to personal identity. Also several approaches to personal identity will be described. Transhumanism is a special think tank supporting human enhancement through modern technologies and some of its representatives claim, that even great changes to human organisms will not affect their personal identity. I will briefly describe the most important means of human enhancment and consider the problem of personal identity for each of them separately.

  3. Known and Unknown Identity

    DEFF Research Database (Denmark)

    Henze-Pedersen, Sofie

    This qualitative study investigates the relationship between openness and identity among 18 adoptees. Many studies have argued that a high degree of openness is important for the identity formation of adoptees. However, few studies have explored this relationship. Two types of openness...... (biographical knowledge and communicative openness) are used to categorise the empirical material, making it possible to illuminate how different types of openness influence identity. The findings suggest that there is no direct link between a high degree of openness and positive identity formation. Instead...

  4. Responses to professional identity threat: Identity management strategies in incident narratives of health care professionals.

    Science.gov (United States)

    van Os, Annemiek; de Gilder, Dick; van Dyck, Cathy; Groenewegen, Peter

    2015-01-01

    The purpose of this paper is to explore sensemaking of incidents by health care professionals through an analysis of the role of professional identity in narratives of incidents. Using insights from social identity theory, the authors argue that incidents may create a threat of professional identity, and that professionals make use of identity management strategies in response to this identity threat. The paper draws on a qualitative analysis of incident narratives in 14 semi-structured interviews with physicians, nurses, and residents at a Dutch specialist hospital. The authors used an existing framework of identity management strategies to categorize the narratives. The analysis yielded two main results. First, nurses and residents employed multiple types of identity management strategies simultaneously, which points to the possible benefit of combining different strategies. Second, physicians used the strategy of patronization of other professional groups, a specific form of downward comparison. The authors discuss the implications of the findings in terms of the impact of identity management strategies on the perpetuation of hierarchical differences in health care. The authors argue that efforts to manage incident handling may profit from considering social identity processes in sensemaking of incidents. This is the first study that systematically explores how health care professionals use identity management strategies to maintain a positive professional identity in the face of incidents. This study contributes to research on interdisciplinary cooperation in health care.

  5. Design and test of a prototype silicon detector module for ATLAS Semiconductor Tracker endcaps

    International Nuclear Information System (INIS)

    Clark, A.G.; Donega, M.; D'Onofrio, M.

    2005-01-01

    The ATLAS Semiconductor Tracker (SCT) will be a central part of the tracking system of the ATLAS experiment. The SCT consists of four concentric barrels of silicon detectors as well as two silicon endcap detectors formed by nine disks each. The layout of the forward silicon detector module presented in this paper is based on the approved layout of the silicon detectors of the SCT, their geometry and arrangement in disks, but uses otherwise components identical to the barrel modules of the SCT. The module layout is optimized for excellent thermal management and electrical performance, while keeping the assembly simple and adequate for a large scale module production. This paper summarizes the design and layout of the module and present results of a limited prototype production, which has been extensively tested in the laboratory and testbeam. The module design was not finally adopted for series production because a dedicated forward hybrid layout was pursued

  6. Linguistic identity matching

    CERN Document Server

    Lisbach, Bertrand

    2013-01-01

    Regulation, risk awareness and technological advances are increasingly drawing identity search functionality into business, security and data management processes, as well as fraud investigations and counter-terrorist measures.Over the years, a number of techniques have been developed for searching identity data, traditionally focusing on logical algorithms. These techniques often failed to take into account the complexities of language and culture that provide the rich variations  seen in names used around the world. A new paradigm has now emerged for understanding the way that identity data

  7. Exploring the identity and "sense of identity" of organisations

    Directory of Open Access Journals (Sweden)

    C L Van Tonder

    2006-04-01

    Full Text Available During the past two decades a steady increase in scholarly contributions in the area of organisation identity have been observed – to the point that the phenomenon is now the subject of a sustainable discourse in several disciplines. Many theoretical and conceptual dilemmas however remain, largely as a result of the low incidence of empirical research in the area. This study reports the results of an exploratory investigation that adapted Schley and Wagenfield’s (1979 concept of identity for use in an organisational setting. Interviews were conducted with 152 top managers representing 10 companies. The results indicate that organisational responses to the question “who am I?�? elicit distinctive organisational self-descriptions and some awareness of identity issues.

  8. Inter-Identity Autobiographical Amnesia in Patients with Dissociative Identity Disorder

    Science.gov (United States)

    Huntjens, Rafaële J. C.; Verschuere, Bruno; McNally, Richard J.

    2012-01-01

    Background A major symptom of Dissociative Identity Disorder (DID; formerly Multiple Personality Disorder) is dissociative amnesia, the inability to recall important personal information. Only two case studies have directly addressed autobiographical memory in DID. Both provided evidence suggestive of dissociative amnesia. The aim of the current study was to objectively assess transfer of autobiographical information between identities in a larger sample of DID patients. Methods Using a concealed information task, we assessed recognition of autobiographical details in an amnesic identity. Eleven DID patients, 27 normal controls, and 23 controls simulating DID participated. Controls and simulators were matched to patients on age, education level, and type of autobiographical memory tested. Findings Although patients subjectively reported amnesia for the autobiographical details included in the task, the results indicated transfer of information between identities. Conclusion The results call for a revision of the DID definition. The amnesia criterion should be modified to emphasize its subjective nature. PMID:22815769

  9. Inter-identity autobiographical amnesia in patients with dissociative identity disorder.

    Directory of Open Access Journals (Sweden)

    Rafaële J C Huntjens

    Full Text Available BACKGROUND: A major symptom of Dissociative Identity Disorder (DID; formerly Multiple Personality Disorder is dissociative amnesia, the inability to recall important personal information. Only two case studies have directly addressed autobiographical memory in DID. Both provided evidence suggestive of dissociative amnesia. The aim of the current study was to objectively assess transfer of autobiographical information between identities in a larger sample of DID patients. METHODS: Using a concealed information task, we assessed recognition of autobiographical details in an amnesic identity. Eleven DID patients, 27 normal controls, and 23 controls simulating DID participated. Controls and simulators were matched to patients on age, education level, and type of autobiographical memory tested. FINDINGS: Although patients subjectively reported amnesia for the autobiographical details included in the task, the results indicated transfer of information between identities. CONCLUSION: The results call for a revision of the DID definition. The amnesia criterion should be modified to emphasize its subjective nature.

  10. Perceived state of self during motion can differentially modulate numerical magnitude allocation.

    Science.gov (United States)

    Arshad, Q; Nigmatullina, Y; Roberts, R E; Goga, U; Pikovsky, M; Khan, S; Lobo, R; Flury, A-S; Pettorossi, V E; Cohen-Kadosh, R; Malhotra, P A; Bronstein, A M

    2016-09-01

    Although a direct relationship between numerical allocation and spatial attention has been proposed, recent research suggests that these processes are not directly coupled. In keeping with this, spatial attention shifts induced either via visual or vestibular motion can modulate numerical allocation in some circumstances but not in others. In addition to shifting spatial attention, visual or vestibular motion paradigms also (i) elicit compensatory eye movements which themselves can influence numerical processing and (ii) alter the perceptual state of 'self', inducing changes in bodily self-consciousness impacting upon cognitive mechanisms. Thus, the precise mechanism by which motion modulates numerical allocation remains unknown. We sought to investigate the influence that different perceptual experiences of motion have upon numerical magnitude allocation while controlling for both eye movements and task-related effects. We first used optokinetic visual motion stimulation (OKS) to elicit the perceptual experience of either 'visual world' or 'self'-motion during which eye movements were identical. In a second experiment, we used a vestibular protocol examining the effects of perceived and subliminal angular rotations in darkness, which also provoked identical eye movements. We observed that during the perceptual experience of 'visual world' motion, rightward OKS-biased judgments towards smaller numbers, whereas leftward OKS-biased judgments towards larger numbers. During the perceptual experience of 'self-motion', judgments were biased towards larger numbers irrespective of the OKS direction. Contrastingly, vestibular motion perception was found not to modulate numerical magnitude allocation, nor was there any differential modulation when comparing 'perceived' vs. 'subliminal' rotations. We provide a novel demonstration that numerical magnitude allocation can be differentially modulated by the perceptual state of self during visual but not vestibular mediated motion

  11. Will Veterans Answer Sexual Orientation and Gender Identity Questions?

    Science.gov (United States)

    Ruben, Mollie A; Blosnich, John R; Dichter, Melissa E; Luscri, Lorry; Shipherd, Jillian C

    2017-09-01

    The Veterans Health Administration does not routinely collect and document sexual orientation and gender identity (SOGI) data, despite existing health disparities among sexual and gender minority Veterans. Because of the legacy of previous Department of Defense (DoD) policies that prohibited disclosure of sexual or gender minority identities among active duty personnel, Veterans may be reluctant to respond to SOGI questions. This population-based study assesses item nonresponse to SOGI questions by Veteran status. This is a secondary analysis of data from a population-based sample of adults in 20 US states that elected to administer a SOGI module in the 2014 Behavioral Risk Factor Surveillance System survey. Prevalence of SOGI refusals and responses of "don't know" were compared for Veterans and non-Veterans. Veterans (n=22,587) and non-Veterans (n=146,475) were surveyed. Nearly all Veteran respondents (≥98%) completed the SOGI questions, with 95.4% identifying as heterosexual, 1.2% as gay or lesbian, 1.2% as bisexual, and 0.59% as transgender. A significantly lower proportion of Veterans than non-Veterans refuse to answer sexual orientation (1.5% vs. 1.9%). There was no difference between Veterans and non-Veterans in responses for gender identity. Veterans are just as likely as non-Veterans to complete SOGI items in survey research. Asking Veterans about SOGI is unlikely to yield significant nonresponse. These data suggest that future research should investigate Veterans' perspectives on being asked about SOGI in research settings and as part of routine clinical care.

  12. 7 CFR 52.771 - Identity.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 2 2010-01-01 2010-01-01 false Identity. 52.771 Section 52.771 Agriculture... United States Standards for Grades of Canned Red Tart Pitted Cherries 1 Identity and Grades § 52.771 Identity. Canned red tart pitted cherries is the product represented as defined in the standard of identity...

  13. Identity and the Management Project

    DEFF Research Database (Denmark)

    Jørgensen, Kenneth Mølbjerg; Dehlin, Erlend

    The paper discusses the concept of identity in relation to management. We take our starting point in Wittgenstein’s concept language games. We argue that identity is a question of using linguistic tools to construct reality. Two elements of the language game metaphor are central here: rules...... and family resemblance. As such, managing identity in organizations is closely linked to rules and family resemblance. Organizations manage identity through the definition of norms and values for right or wrong, appropriate or inappropriate, to name but a few. Norms and values are important as reference...... points for constructing identities. Managing identity has become more important because the rules-of-the-game have become more unstable. Managing identity is important if the bonds between individuals and organizations are to be sustained. But this task is contradictory and paradoxical of its very nature...

  14. Identity style and coping strategies.

    Science.gov (United States)

    Berzonsky, M D

    1992-12-01

    This study examined the relationship between identity style and strategies used to cope with stressors that potentially threaten one's sense of identity. Identity style refers to differences in the way individuals construct and revise or maintain their sense of identity. An informational style involves actively seeking out, evaluating, and utilizing self-relevant information. A normative style highlights the expectations and standards of significant others. A diffuse/avoidant style is characterized by procrastination and situation-specific reactions. Late-adolescent college subjects were administered measures of identity style, ways of coping with academic stressors, and test anxiety. Within this self-as-student context, subjects with diffuse and normative identity styles employed avoidant-oriented coping strategies (wishful thinking, distancing, and tension reduction). An informational style was associated with deliberate, problem-focused coping. Findings are discussed in terms of a process model of identity development.

  15. Tools for Understanding Identity

    Energy Technology Data Exchange (ETDEWEB)

    Creese, Sadie; Gibson-Robinson, Thomas; Goldsmith, Michael; Hodges, Duncan; Kim, Dee DH; Love, Oriana J.; Nurse, Jason R.; Pike, William A.; Scholtz, Jean

    2013-12-28

    Identity attribution and enrichment is critical to many aspects of law-enforcement and intelligence gathering; this identity typically spans a number of domains in the natural-world such as biographic information (factual information – e.g. names, addresses), biometric information (e.g. fingerprints) and psychological information. In addition to these natural-world projections of identity, identity elements are projected in the cyber-world. Conversely, undesirable elements may use similar techniques to target individuals for spear-phishing attacks (or worse), and potential targets or their organizations may want to determine how to minimize the attack surface exposed. Our research has been exploring the construction of a mathematical model for identity that supports such holistic identities. The model captures the ways in which an identity is constructed through a combination of data elements (e.g. a username on a forum, an address, a telephone number). Some of these elements may allow new characteristics to be inferred, hence enriching the holistic view of the identity. An example use-case would be the inference of real names from usernames, the ‘path’ created by inferring new elements of identity is highlighted in the ‘critical information’ panel. Individual attribution exercises can be understood as paths through a number of elements. Intuitively the entire realizable ‘capability’ can be modeled as a directed graph, where the elements are nodes and the inferences are represented by links connecting one or more antecedents with a conclusion. The model can be operationalized with two levels of tool support described in this paper, the first is a working prototype, the second is expected to reach prototype by July 2013: Understanding the Model The tool allows a user to easily determine, given a particular set of inferences and attributes, which elements or inferences are of most value to an investigator (or an attacker). The tool is also able to take

  16. Perceived consequences of hypothetical identity-inconsistent sexual experiences: effects of perceiver's sex and sexual identity.

    Science.gov (United States)

    Preciado, Mariana A; Johnson, Kerri L

    2014-04-01

    Most people organize their sexual orientation under a single sexual identity label. However, people may have sexual experiences that are inconsistent with their categorical sexual identity label. A man might identify as heterosexual but still experience some attraction to men; a woman might identify as lesbian yet enter into a romantic relationship with a man. Identity-inconsistent experiences are likely to have consequences. In the present study, we examined lay perceptions of the consequences of identity-inconsistent sexual experiences for self-perceived sexuality and for social relationships among a sexually diverse sample (N = 283). We found that the perceived consequences of identity-inconsistent experiences for self-perception, for social stigmatization, and for social relationships varied as a function of participant sex, participant sexual identity (heterosexual, gay, lesbian), and experience type (fantasy, attraction, behavior, love). We conclude that not all identity-inconsistent sexual experiences are perceived as equally consequential and that the perceived consequences of such experiences vary predictably as a function of perceiver sex and sexual identity. We discuss the role lay perceptions of the consequences of identity-inconsistent sexual experiences may play in guiding attitudes and behavior.

  17. A Key Establishment Protocol for RFID User in IPTV Environment

    Science.gov (United States)

    Jeong, Yoon-Su; Kim, Yong-Tae; Sohn, Jae-Min; Park, Gil-Cheol; Lee, Sang-Ho

    In recent years, the usage of IPTV (Internet Protocol Television) has been increased. The reason is a technological convergence of broadcasting and telecommunication delivering interactive applications and multimedia content through high speed Internet connections. The main critical point of IPTV security requirements is subscriber authentication. That is, IPTV service should have the capability to identify the subscribers to prohibit illegal access. Currently, IPTV service does not provide a sound authentication mechanism to verify the identity of its wireless users (or devices). This paper focuses on a lightweight authentication and key establishment protocol based on the use of hash functions. The proposed approach provides effective authentication for a mobile user with a RFID tag whose authentication information is communicated back and forth with the IPTV authentication server via IPTV set-top box (STB). That is, the proposed protocol generates user's authentication information that is a bundle of two public keys derived from hashing user's private keys and RFID tag's session identifier, and adds 1bit to this bundled information for subscriber's information confidentiality before passing it to the authentication server.

  18. The change of expression configuration affects identity-dependent expression aftereffect but not identity-independent expression aftereffect

    Directory of Open Access Journals (Sweden)

    Miao eSong

    2015-12-01

    Full Text Available The present study examined the influence of expression configuration on cross-identity expression aftereffect. The expression configuration refers to the spatial arrangement of facial features in a face for conveying an emotion, e.g., an open-mouth smile versus a closed-mouth smile. In the first of two experiments, the expression aftereffect is measured using across-identity/cross-expression configuration factorial design. The facial identities of test faces were the same or different from the adaptor, while orthogonally, the expression configurations of those facial identities were also the same or different. The result shows that the change of expression configuration impaired the expression aftereffect when the facial identities of adaptor and tests were the same; however, the impairment effect disappears when facial identities were different, indicating the identity-independent expression representation is more robust to the change of the expression configuration in comparison with the identity-dependent expression representation. In the second experiment, we used schematic line faces as adaptors and real faces as tests to minimize the similarity between the adaptor and tests, which is expected to exclude the contribution from the identity-dependent expression representation to expression aftereffect. The second experiment yields a similar result as the identity-independent expression aftereffect observed in Experiment 1. The findings indicate the different neural sensitivities to expression configuration for identity-dependent and identity-independent expression systems.

  19. Negotiation of identities in intercultural communication

    Directory of Open Access Journals (Sweden)

    Janík Zdeněk

    2017-01-01

    Full Text Available Negotiation of identities in communication entails affirming the identities we want others to recognize in us and ascription of identities we mutually assign to each other in communication. The study of intercultural communication focuses on cultural identity as the principal identity component that defines intercultural communication. In this article, the assumption that cultural group membership factors determine the context of intercultural communication is questioned. The article examines how intercultural interlocutors negotiate their identities in various intercultural interactions. The aims of the research presented in this paper are: 1 to examine which identities - cultural, personal, or social - intercultural interlocutors activate in intercultural communication; 2 to determine whether interlocutors’ intercultural communication is largely influenced by their cultural identities; 3 and to identify situations in which they activate their cultural identities (3. The research data were collected from 263 international students studying at Masaryk University in Brno in the years 2010 - 2016. Although the research results are not conclusive, they indicate that cultural identities predominate in the students’ ethnocentric views and that stereotypes constrain the students’ cultural identities and affect the negotiation of identities in intercultural communication.

  20. Online Identities and Social Networking

    Science.gov (United States)

    Maheswaran, Muthucumaru; Ali, Bader; Ozguven, Hatice; Lord, Julien

    Online identities play a critical role in the social web that is taking shape on the Internet. Despite many technical proposals for creating and managing online identities, none has received widespread acceptance. Design and implementation of online identities that are socially acceptable on the Internet remains an open problem. This chapter discusses the interplay between online identities and social networking. Online social networks (OSNs) are growing at a rapid pace and has millions of members in them. While the recent trend is to create explicit OSNs such as Facebook and MySpace, we also have implicit OSNs such as interaction graphs created by email and instant messaging services. Explicit OSNs allow users to create profiles and use them to project their identities on the web. There are many interesting identity related issues in the context of social networking including how OSNs help and hinder the definition of online identities.

  1. Personal Identity Online

    DEFF Research Database (Denmark)

    Rodogno, Raffaele

    2012-01-01

    Philosophers concerned with the question of personal identity have typically been asking the so-called re-identification question: what are the conditions under which a person at one point in time is properly re-identified at another point in time? This is a rather technical question. In our...... everyday interactions, however, we do raise a number of personal identity questions that are quite distinct from it. In order to explore the variety of ways in which the Internet may affect personal identity, I propose in this study to broaden the typical philosophical horizon to other more mundane senses...... of the question. In Section 2, I describe a number of possible meanings of personal identity observed in everyday contexts and more philosophical ones. With some caveats, I argue that it is the specific context in which the question arises that disambiguates the meaning of the question. Online contexts are novel...

  2. Researcher Identity in Transition

    DEFF Research Database (Denmark)

    Castelló, Montserrat; Kobayashi, Sofie; McGinn, Michelle K.

    2015-01-01

    to reinterpretation, and ECRs need to attend to new or reimagined signals in their efforts to develop a researcher identity in this current context. In this article, we present a comprehensive framework for researcher identity in relation to the ways ECRs recognise and respond to divergent signals across spheres...... of activity. We illustrate this framework through eight identity stories drawn from our earlier research projects. Each identity story highlights the congruence (or lack of congruence) between signals across spheres of activity and emphasises the different ways ECRs respond to these signals. The proposed...... comprehensive framework allows for the analysis of researcher identity development through the complex and intertwined activities in which ECRs are involved. We advance this approach as a foundation for a sustained research agenda to understand how ECRs identify and respond to relevant signals, and...

  3. Synchronization of time-delayed systems with chaotic modulation and cryptography

    International Nuclear Information System (INIS)

    Banerjee, Santo

    2009-01-01

    This paper presents a method of synchronization between two time-delayed systems where the delay times are modulated by a common chaotic signal of the driving system. The technique is well applied to two identical autonomous continuous-time-delayed systems with numerical simulations. Finally, a new method of encryption is generated for digital messages. This method is illustrated with two different encryption processes for text as well as picture messages.

  4. Effect of orthographic processes on letter-identity and letter-position encoding in dyslexic children

    Directory of Open Access Journals (Sweden)

    Caroline eReilhac

    2012-05-01

    Full Text Available The ability to identify letters and encode their position is a crucial step of the word recognition process. However and despite their word identification problem, the ability of dyslexic children to encode letter-identity and letter-position within strings was not systematically investigated. This study aimed at filling this gap and further explored how letter identity and letter position encoding is modulated by letter context in developmental dyslexia. For this purpose, a letter-string comparison task was administered to French dyslexic children and two chronological-age (CA and reading-age (RA-matched control groups. Children had to judge whether two successively and briefly presented 4-letter-strings were identical or different. Letter-position and letter-identity were manipulated through the transposition (e.g., RTGM vs. RMGT or substitution of two letters (e.g., TSHF vs. TGHD. Non-words, pseudo-words and words were used as stimuli to investigate sub-lexical and lexical effects on letter encoding. Dyslexic children showed both substitution and transposition detection problems relative to CA controls. A substitution advantage over transpositions was only found for words in dyslexic children whereas it extended to pseudo-words in RA controls and to all type of items in CA controls. Letters were better identified in the dyslexic group when belonging to orthographically familiar strings. Letter position encoding was very impaired in dyslexic children who did not show any word context effect in contrast to CA controls. Overall, the current findings point to a strong letter identity and letter position encoding disorder in developmental dyslexia.

  5. (Re)scaling identities

    DEFF Research Database (Denmark)

    Koefoed, Lasse Martin; Simonsen, Kirsten

    2012-01-01

    of Pakistani origin, the study employs theoretical ideas of estrangement, identification and recognition in order to obtain a thorough understanding of the complexity and the contradictory character of their spatial identities and affiliations. A turning point in the double processes of estrangement...... of identity....

  6. Identity without Membership?

    DEFF Research Database (Denmark)

    Dobusch, Leonhard; Schoeneborn, Dennis

    the formation of organizational identity in more fluid organizational settings. Drawing on an empirical study of the hacker collective Anonymous, we show that organizational identity is formed through public communicative events that are subject to meaning negotiation whether or not actions can be attributed...

  7. On the use of OSL of chip card modules with molding for retrospective and accident dosimetry

    International Nuclear Information System (INIS)

    Woda, Clemens; Fiedler, Irene; Spöttl, Thomas

    2012-01-01

    The potential of optically stimulated luminescence of wire-bond chip card modules with molded encapsulations for retrospective and accident dosimetry is investigated. Contact-based and contactless modules were studied, the latter finding potential use in electronic documents (e.g. electronic passports, electronic identity cards). Investigations were carried out on intact as well as chemically prepared modules, extracting the filler material. Contact-based modules are characterized according to zero dose signal, correlation between OSL and TL, dose response and long-term signal stability. For prepared modules, the minimum detectable dose immediately after irradiation is 3 mGy and between 20 and 200 mGy for contact-based and contactless modules, respectively. Dose recovery tests on contact-based modules indicate that the developed methodology yields results with sufficient accuracy for measurements promptly after irradiation, whereas a systematic underestimation is observed for longer delay times. The reasons for this behaviour are as yet not fully understood.

  8. Gendered discursive constructions of bank manager positions

    DEFF Research Database (Denmark)

    Lassen, Inger

    2009-01-01

    Human beings are notorious categorizers with a predilection for defining, labelling and evaluating. By referring to categories like for instance sex, age, religion and occupation, we construct social roles for ourselves and for our fellow human beings; we thereby develop identities that give us...... of freedom. This chapter subscribes to the social constructionist view that identities are discursively constructed and negotiated in social encounters. This will be illustrated on the basis of two sets of data obtained from focus group interviews. In the first set of data, female employees in a Danish bank...

  9. Identity uncertainty and commitment making across adolescence : Five-year within-person associations using daily identity reports

    NARCIS (Netherlands)

    Becht, Andrik I.; Nelemans, Stefanie A.; Branje, Susan J. T.; Vollebergh, Wilma A. M.; Koot, Hans M.; Meeus, W.H.J.

    2017-01-01

    A central assumption of identity theory is that adolescents reconsider current identity commitments and explore identity alternatives before they make new commitments in various identity domains (Erikson, 1968; Marcia, 1966). Yet, little empirical evidence is available on how commitment and

  10. The neuronal identity bias behind neocortical GABAergic plasticity.

    Science.gov (United States)

    Allene, Camille; Lourenço, Joana; Bacci, Alberto

    2015-09-01

    In the neocortex, different types of excitatory and inhibitory neurons connect to one another following a detailed blueprint, defining functionally-distinct subnetworks, whose activity and modulation underlie complex cognitive functions. We review the cell-autonomous plasticity of perisomatic inhibition onto principal excitatory neurons. We propose that the tendency of different cortical layers to exhibit depression or potentiation of perisomatic inhibition is dictated by the specific identities of principal neurons (PNs). These are mainly defined by their projection targets and by their preference to be innervated by specific perisomatic-targeting basket cell types. Therefore, principal neurons responsible for relaying information to subcortical nuclei are differentially inhibited and show specific forms of plasticity compared to other PNs that are specialized in more associative functions. Copyright © 2015 Elsevier Ltd. All rights reserved.

  11. Identity as wrapping up

    DEFF Research Database (Denmark)

    Nickelsen, Niels Christian Mossfeldt

    2015-01-01

    The aim of this paper is to provide an understanding of cross-professional collaboration and to develop a notion of professional identity based in practice. The background of the paper is science and technology studies and more precisely actor network theory. The method used: The empirical analysis...... in close relation to the making of a report concerning the cross-professional collaboration. Findings are that “Identity as wrapping up” points to the way in which certain actors, by other actors, are maneuvered into certain pockets in a network. Identity as wrapping up is emphasized as a way...... of participating, which is closely connected to the intention to control the relation towards the other. Thus identity as wrapping up is argued to be a strategy to optimize the situation of one’s own profession. Conclusion: This articulation of identity contributes to the actor network literature as well...

  12. Visual identity and rebranding

    Directory of Open Access Journals (Sweden)

    Katarzyna Wrona

    2015-06-01

    Full Text Available The goal of this article is to highlight the essence of visual identification and rebranding, as well as to discuss elements of corporate identity, which are subject to revitalization in the process of refreshing the image of a brand. In the first part the article the analysis of the term visual identification is conducted. In the analysis special attention is drawn to the role of visual identification in creating a coherent identity of an organization. In the subsequent chapters further components of corporate identity are presented in detail – starting with logotype, through business forms, advertisements, accompanying materials and Internet websites to signs on buildings. Moreover, corporate identity book as a collection of standards and guidelines for application of corporate identity rules is discussed. The deliberations are based on the study of literature. The last chapter presented the transformation of the brand of Institute of Aviation.

  13. Children's Social Identities

    Science.gov (United States)

    Bennett, Mark

    2011-01-01

    This paper provides a brief overview of recent developmental research on themes related to children's social identities. Initially, consideration is given to the capacity for social categorization, following which attention is given to children's developing conceptions of social identities, their identification with social groups, and the…

  14. When moral identity symbolization motivates prosocial behavior: the role of recognition and moral identity internalization.

    Science.gov (United States)

    Winterich, Karen Page; Aquino, Karl; Mittal, Vikas; Swartz, Richard

    2013-09-01

    This article examines the role of moral identity symbolization in motivating prosocial behaviors. We propose a 3-way interaction of moral identity symbolization, internalization, and recognition to predict prosocial behavior. When moral identity internalization is low, we hypothesize that high moral identity symbolization motivates recognized prosocial behavior due to the opportunity to present one's moral characteristics to others. In contrast, when moral identity internalization is high, prosocial behavior is motivated irrespective of the level of symbolization and recognition. Two studies provide support for this pattern examining volunteering of time. Our results provide a framework for predicting prosocial behavior by combining the 2 dimensions of moral identity with the situational factor of recognition. PsycINFO Database Record (c) 2013 APA, all rights reserved

  15. The Identity Crisis. Security, Privacy and Usability Issues in Identity Management

    NARCIS (Netherlands)

    Alpár, G.; Hoepman, J.H.; Siljee, B.I.J.

    2011-01-01

    This paper studies the current "identity crisis" caused by the substantial security, privacy and usability shortcomings encountered in existing systems for identity management. Some of these issues are well known, while others are much less understood. This paper brings them together in a single,

  16. Intensity modulated radiation therapy: Analysis of patient specific quality control results, experience of Rene-Gauducheau Centre; Radiotherapie conformationnelle avec modulation d'intensite: analyse des resultats des controles precliniques, experience du centre Rene-Gauducheau

    Energy Technology Data Exchange (ETDEWEB)

    Chiavassa, S.; Brunet, G.; Gaudaire, S.; Munos-Llagostera, C.; Delpon, G.; Lisbona, A. [Service de physique medicale, centre Rene-Gauducheau, CLCC Nantes Atlantique, site hospitalier Nord, boulevard Jacques-Monod, 44805 Nantes Saint-Herblain cedex (France)

    2011-07-15

    Purpose. - Systematic verifications of patient's specific intensity-modulated radiation treatments are usually performed with absolute and relative measurements. The results constitute a database which allows the identification of potential systematic errors. Material and methods. - We analyzed 1270 beams distributed in 232 treatment plans. Step-and-shoot intensity-modulated radiation treatments were performed with a Clinac (6 and 23 MV) and sliding window intensity-modulated radiation treatments with a Novalis (6 MV). Results. - The distributions obtained do not show systematic error and all the control meet specified tolerances. Conclusion. - These results allow us to reduce controls specific patients for treatments performed under identical conditions (location, optimization and segmentation parameters of treatment planning system, etc.). (authors)

  17. Reciprocal Associations between Educational Identity and Vocational Identity in Adolescence: A Three-wave Longitudinal Investigation.

    Science.gov (United States)

    Negru-Subtirica, Oana; Pop, Eleonora Ioana

    2018-04-01

    Education and vocation are core identity domains in adolescence. School is a normative social context in this developmental time frame and the formation of an educational identity is embedded in the goals that youth pursue in school. One of the main goals of education is to prepare young people for their future careers. Hence, educational identity should support the formation of vocational identity during adolescence. Considering the limited evidence on the longitudinal links between these two domain-specific identities, we conducted a three-wave investigation, testing the moderating role of age group, gender, and type of school. Participants (N = 1030; 59.3% female) were adolescents (M age  = 16.72 years, SD age  = 1.23, age range 14-19 years) who completed self-report measures of educational and vocational identity three times during an academic year. We underscored reciprocal associations between educational identity and vocational identity. The results indicate that strong educational commitments supported the formation of strong vocational commitments across time. Adolescents who were involved in the in-depth exploration of their educational choices also reported more vocational exploration during the school year. In turn, vocational identity processes also supported educational identity formation, especially the reconsideration of educational commitments. In terms of moderators, we underscored that vocational commitment making and vocational flexibility bolstered educational commitment only in early-to-middle adolescents. Educational in-depth exploration fostered the identification with vocational commitments only in girls. Educational reconsideration of commitment promoted vocational self-doubt only in adolescents attending work-bound high-schools. Implications for research and practice are discussed.

  18. Ego identity formation in middle adolescence.

    Science.gov (United States)

    Lavoie, J C

    1976-12-01

    Assumed determinants of ego identity were investigated in this study using sophomore, junior, and senior high school males and females. Subjects were administered the Marcia Ego Identity Status Scale and measures of sex-role identification, personality development, psychological functioning, self-concept, and parental socialization practices. Data analyses, using a median split on identity score, showed that high-identity adolescents obtained more positive scores on sex-role identification, personality development, psychological adjustment, and self-concept than low-identity adolescents. Socialization practices also differed for the two groups. The sex differences which emerged were congruent with the identity literature. Overall, the data supported Erikson's theory of ego identity development.

  19. Professional entrepreneurial identity construction

    DEFF Research Database (Denmark)

    Ramsgaard, Michael Breum

    The present study investigates the construction of a professional identity as an entrepreneur in a sample of people with educational background in nutrition and health. The study examines the connection between professional identity construction and entrepreneurial business emergence using...... ‘entrepreneurial preparedness’ as parameter. This research seeks to address the following questions: What significant components or characteristics do entrepreneurs rely on in the early processes of constructing an entrepreneurial identity....

  20. Identities-in-action

    DEFF Research Database (Denmark)

    Stentoft, Diana; Valero, Paola

    2009-01-01

    The notion of identity is often used in mathematics education research in an attempt to link individual and social understandings of mathematical learning. In this paper we review existing research making use of the notion of identity, and we point to some of the strengths and weaknesses in the w...

  1. Balancing Fairness and Efficiency: The Impact of Identity-Blind and Identity-Conscious Accountability on Applicant Screening

    Science.gov (United States)

    Self, William T.; Mitchell, Gregory; Mellers, Barbara A.; Tetlock, Philip E.; Hildreth, J. Angus D.

    2015-01-01

    This study compared two forms of accountability that can be used to promote diversity and fairness in personnel selections: identity-conscious accountability (holding decision makers accountable for which groups are selected) versus identity-blind accountability (holding decision makers accountable for making fair selections). In a simulated application screening process, undergraduate participants (majority female) sorted applicants under conditions of identity-conscious accountability, identity-blind accountability, or no accountability for an applicant pool in which white males either did or did not have a human capital advantage. Under identity-conscious accountability, participants exhibited pro-female and pro-minority bias, particularly in the white-male-advantage applicant pool. Under identity-blind accountability, participants exhibited no biases and candidate qualifications dominated interview recommendations. Participants exhibited greater resentment toward management under identity-conscious accountability. PMID:26660723

  2. Gender identity development in adolescence.

    Science.gov (United States)

    Steensma, Thomas D; Kreukels, Baudewijntje P C; de Vries, Annelou L C; Cohen-Kettenis, Peggy T

    2013-07-01

    This article is part of a Special Issue "Puberty and Adolescence".This article aims to provide an outline of what is currently known on trajectories, and contributing factors to gender identity development in adolescence. We give a historical overview of the concept of gender identity, and describe general identity development in adolescence, gender identity development in the general population and in gender variant youth. Possible psychosocial (such as child and parental characteristics) and biological factors (such as the effects of prenatal exposure to gonadal hormones and the role of genetics) contributing to a gender variant identity are discussed. Studies focusing on a number of psychosocial and biological factors separately, indicate that each of these factors influence gender identity formation, but little is known about the complex interplay between the factors, nor about the way individuals themselves contribute to the process. Research into normative and gender variant identity development of adolescents is clearly lagging behind. However, studies on persons with gender dysphoria and disorders of sex development, show that the period of adolescence, with its changing social environment and the onset of physical puberty, seems to be crucial for the development of a non-normative gender identity. Copyright © 2013 Elsevier Inc. All rights reserved.

  3. Vection is modulated by the semantic meaning of stimuli and experimental instructions.

    Science.gov (United States)

    Ogawa, Masaki; Seno, Takeharu

    2014-01-01

    Vection strength is modulated by the semantic meanings of stimuli. In experiment 1--even though vection stimuli were of uniform size, color, and luminance--when they also had semantic meaning as falling objects, vection was inhibited. Specifically, stimuli perceived as feathers, petals, and leaves did not effectively induce vection. In experiment 2 we used the downward motion of identical dots to induce vection. Participants observed stimuli while holding either an umbrella or a wooden sword. Results showed that vection was inhibited when participants held the umbrella and the stimuli was perceived as rain or snow falling. The two experiments suggest that vection is modulated by the semantic meaning of stimuli.

  4. Social Identity and Group Contests

    OpenAIRE

    Zaunbrecher, Henrik; Riedl, Arno

    2016-01-01

    Social identity has been shown to successfully enhance cooperation and effort in cooperation and coordination games. Little is known about the causal effect of social identity on the propensity to engage in group conflict. In this paper we explore theoretically and experimentally whether social identity increases investments in group contests. We show theoretically that increased social identity with the own group implies higher investments in Tullock contests. Empirically we find that induce...

  5. Social identity process within organizations

    OpenAIRE

    Bazarov, Takhir; Kuzmina, Maria

    2005-01-01

    Expanding and complex social realities cause new types of identity. Variety in organizations and workgroups (where people are involved), implies a special kind of social identity which can be defined as professional, organizational or managerial. The study of the social identity processes in organizations is a new interdisciplinary sphere that is presented especially commonly in European Social Psychology. The result of its theoretical comprehension is Social Identity Theory. In the article l...

  6. Characteristics of Place Identity as Part of Professional Identity Development among Pre-Service Teachers

    Science.gov (United States)

    Gross, Michal; Hochberg, Nurit

    2016-01-01

    How do pre-service teachers perceive place identity, and is there a connection between their formative place identity and the development of their professional teaching identity? These questions are probed among pre-service teachers who participated in a course titled "Integrating Nature into Preschool." The design of the course was…

  7. Critical Look at Physics Identity: An Operationalized Framework for Examining Race and Physics Identity

    Science.gov (United States)

    Hyater-Adams, Simone; Fracchiolla, Claudia; Finkelstein, Noah; Hinko, Kathleen

    2018-01-01

    Studies on physics identity are appearing more frequently and often responding to increased awareness of the underrepresentation of students of color in physics. In our broader research, we focus our efforts on understanding how racial identity and physics identity are negotiated throughout the experiences of Black physicists. In this paper, we…

  8. Religiosity as identity: toward an understanding of religion from a social identity perspective.

    Science.gov (United States)

    Ysseldyk, Renate; Matheson, Kimberly; Anisman, Hymie

    2010-02-01

    As a social identity anchored in a system of guiding beliefs and symbols, religion ought to serve a uniquely powerful function in shaping psychological and social processes. Religious identification offers a distinctive "sacred" worldview and "eternal" group membership, unmatched by identification with other social groups. Thus, religiosity might be explained, at least partially, by the marked cognitive and emotional value that religious group membership provides. The uniqueness of a positive social group, grounded in a belief system that offers epistemological and ontological certainty, lends religious identity a twofold advantage for the promotion of well-being. However, that uniqueness may have equally negative impacts when religious identity itself is threatened through intergroup conflict. Such consequences are illustrated by an examination of identities ranging from religious fundamentalism to atheism. Consideration of religion's dual function as a social identity and a belief system may facilitate greater understanding of the variability in its importance across individuals and groups.

  9. John locke on personal identity.

    Science.gov (United States)

    Nimbalkar, Namita

    2011-01-01

    John Locke speaks of personal identity and survival of consciousness after death. A criterion of personal identity through time is given. Such a criterion specifies, insofar as that is possible, the necessary and sufficient conditions for the survival of persons. John Locke holds that personal identity is a matter of psychological continuity. He considered personal identity (or the self) to be founded on consciousness (viz. memory), and not on the substance of either the soul or the body.

  10. John Locke on Personal Identity**

    OpenAIRE

    Nimbalkar, Namita

    2011-01-01

    John Locke speaks of personal identity and survival of consciousness after death. A criterion of personal identity through time is given. Such a criterion specifies, insofar as that is possible, the necessary and sufficient conditions for the survival of persons. John Locke holds that personal identity is a matter of psychological continuity. He considered personal identity (or the self) to be founded on consciousness (viz. memory), and not on the substance of either the soul or the body.

  11. The theory of planned behaviour: self-identity, social identity and group norms.

    Science.gov (United States)

    Terry, D J; Hogg, M A; White, K M

    1999-09-01

    The aim of the present study was to examine further the role that self-identity plays in the theory of planned behaviour and, more specifically, to: (1) examine the combined effects of self-identity and social identity constructs on intention and behaviour, and (2) examine the effects of self-identity as a function of past experience of performing the behaviour. The study was concerned with the prediction of intention to engage in household recycling and reported recycling behaviour. A sample of 143 community residents participated in the study. It was prospective in design: measures of the predictors and intention were obtained at the first wave of data collection, whereas behaviour was assessed two weeks later. Self-identity significantly predicted behavioural intention, a relationship that was not dependent on the extent to which the behaviour had been performed in the past. As expected, there was also evidence that the perceived norm of a behaviourally relevant reference group was related to behavioural intention, but only for participants who identified strongly with the group, whereas the relationship between perceived behavioural control (a personal factor) and intention was strongest for low identifiers.

  12. Relations of Work Identity, Family Identity, Situational Demands, and Sex with Employee Work Hours

    Science.gov (United States)

    Greenhaus, Jeffrey H.; Peng, Ann C.; Allen, Tammy D.

    2012-01-01

    This study examined relations of multiple indicators of work identity and family identity with the number of weekly hours worked by 193 married business professionals. We found that men generally worked long hours regardless of the situational demands to work long hours and the strength of their work and family identities. Women's work hours, on…

  13. When dual identity becomes a liability: identity and political radicalism among migrants.

    Science.gov (United States)

    Simon, Bernd; Reichert, Frank; Grabow, Olga

    2013-03-01

    This article examines the role of dual identity in political radicalism among migrants. Dual identity is defined as identification with both one's ethnocultural minority in-group and one's society of residence. We employed a longitudinal research design using members of the two largest migrant groups in Germany (Turkish migrants and Russian migrants) as participants. We reasoned that when dual identity is burdened with incompatibility between component identifications, it may foster controversial or even destructive forms of political mobilization, such as radicalism. Multiple regression analysis controlling for other influences confirmed the hypothesized moderated relationship between dual identification and sympathy for radical action. When accompanied by high, as opposed to low, perceived identity incompatibility, dual identification predicted increases in sympathy for radical action among both Turkish migrants and Russian migrants. The implications for public life in ethnically and culturally heterogeneous societies are discussed.

  14. Co-creating Stakeholder and Brand Identities

    DEFF Research Database (Denmark)

    von Wallpach, Sylvia; Voyer, Benjamin; Kastanakis, Minas

    2017-01-01

    This article introduces the special section on reciprocal co-creation of stakeholder and brand identities. Branding research and practice traditionally focus on the managerial creation and implementation of brand identity. Based on recent paradigmatic shifts from managerial to co-creative branding...... and from consumer to multi-stakeholder approaches in marketing, this special section develops a dynamic, process-oriented perspective on brand identity. Brand identity continuously emerges as a dynamic outcome of social processes of stakeholder interaction. Reciprocally, brand identity plays a potentially...... important role in ongoing interactive identity development processes of stakeholders. The special section contributes to deepening the understanding of this reciprocal co-creation of stakeholder and brand identities, through a series of conceptual and empirical articles. The Introduction reviews four...

  15. Reconceptualising "Identity Slippage": Additional Language Learning and (L2) Identity Development

    Science.gov (United States)

    Armour, William

    2009-01-01

    This paper reconsiders the theoretical concept of "identity slippage" by considering a detailed exegesis of three model conversations taught to learners of Japanese as an additional language. To inform my analysis of these conversations and how they contribute to identity slippage, I have used the work of the systemic-functional linguist Jay Lemke…

  16. Elective Identities, (Culture, Identization and Integration)

    NARCIS (Netherlands)

    S.J. Magala (Slawomir)

    2002-01-01

    textabstractMost of contemporary individual and social identities (constructed with societal, cultural and technological resources) are radically autonomous, nomadic and virtual - i.e. they are de-traditionalized, open to negotiation and not based on a single interpretation of a tradition.

  17. An 'open source' networked identity

    DEFF Research Database (Denmark)

    Larsen, Malene Charlotte

    2013-01-01

    This paper examines the concept of identity in relation to youth practices on social network sites (SNS). The paper illustrates how writing “I love you” or other emotional statements on each other’s profiles on SNS is not only a common way for Danish teenagers to communicate and practice friendship...... communicative actions – are not only performing their own identity, but are becoming co-constructors of each other's identities, which the author characterizes as an 'open source' networked identity....

  18. Human Rights and the Excess of Identity

    Science.gov (United States)

    Al Tamimi, Yussef

    2017-01-01

    Identity is a central theme in contemporary politics, but legal academia lacks a rigorous analysis of this concept. The aim of this article is twofold: (i) firstly, it aims to reveal presumptions on identity in human rights law by mapping how the European Court of Human Rights approaches identity and (ii) secondly, it seeks to analyse these presumptions using theoretical insights on identity. By merging legal and theoretical analysis, this article contributes a reading of the Court’s case law which suggests that the tension between the political and apolitical is visible as a common thread in the Court’s use of identity. In case law concerning paternity, the Court appears to hold a specific view of what is presented as an unquestionable part of identity. This ostensibly pre-political notion of identity becomes untenable in cases where the nature of an identity feature, such as the headscarf, is contended or a minority has adopted a national identity that conflicts with the majoritarian national identity. The Court’s approach to identity in such cases reflects a paradox that is inherent to identity; identity is personal while simultaneously constituted and shaped by overarching power mechanisms. PMID:29881144

  19. Inter-identity autobiographical amnesia in patients with dissociative identity disorder

    OpenAIRE

    Huntjens, Rafaele JC; Verschuere, Bruno; McNally, Richard J

    2012-01-01

    Background: A major symptom of Dissociative Identity Disorder (DID; formerly Multiple Personality Disorder) is dissociative amnesia, the inability to recall important personal information. Only two case studies have directly addressed autobiographical memory in DID. Both provided evidence suggestive of dissociative amnesia. The aim of the current study was to objectively assess transfer of autobiographical information between identities in a larger sample of DID patients. Methods: Using a c...

  20. Queering Black Racial Identity Development

    Science.gov (United States)

    Johnson, Alandis A.; Quaye, Stephen John

    2017-01-01

    We used queer theory to encourage readers to think differently about previous theories about Black racial identity development. Queer theory facilitates new and deeper understandings of how Black people develop their racial identities, prompting more fluidity and nuance. Specifically, we present a queered model of Black racial identity development…

  1. Developing a workable teacher identity: Building and negotiating identity within a professional network

    Science.gov (United States)

    Rostock, Roseanne

    The challenge of attracting and retaining the next generation of teachers who are skilled and committed to meeting the growing demands of the profession is of increasing concern to researchers and policy makers, particularly since 45--50% of beginning teachers leave the profession within five years (Ingersoll & Smith, 2003). Reasons for such attrition include compensation, status and working conditions; however, there is growing evidence that a critical factor in new teacher retention hinges on teachers' ability to accomplish the difficult task of forming a workable professional identity in the midst of competing discourses about teaching (Alsup, 2006; Britzman, 2003). There is little research on professional identity development among those beginning teachers at highest risk for attrition (secondary math and science teachers, and those with strong academic backgrounds). This study explores the professional identity development of early-career math and science teachers who are part of the Knowles Science Teaching Foundation's (KSTF) teaching fellowship program, an external support network that aims to address many of the issues leading to high attrition among this particular population of teachers. Using narrative research methods, I examine three case studies of beginning teachers, exploring how they construct professional identity in relation to various discourse communities and negotiate tensions across multiple discourses. The cases identify both dominant discourses and counter-discourses that the teachers draw upon for important identity development resources. They also demonstrate that the way a teacher manages tensions across competing discourses is important to how well one can negotiate a workable professional identity. In particular, they emphasize the importance of engaging in borderland discourses (Gee, 1996) as a way of taking agency in one's own identity development as well as in transforming one's discourse communities. These cases shed light on how

  2. Understanding Identity and Organizations

    DEFF Research Database (Denmark)

    Christensen, Lars Thøger

    2013-01-01

    The article reviews the book "Understanding Identity and Organizations," by Kate Kenny, Andrea Whitle, and Hugh Wilmott.......The article reviews the book "Understanding Identity and Organizations," by Kate Kenny, Andrea Whitle, and Hugh Wilmott....

  3. Researching Identity and Interculturality

    DEFF Research Database (Denmark)

    Lønsmann, Dorte

    2016-01-01

    Review of: Researching Identity and Interculturality / by F. Dervin and K. Risager (eds.). Routledge 2015, 245 pp.......Review of: Researching Identity and Interculturality / by F. Dervin and K. Risager (eds.). Routledge 2015, 245 pp....

  4. Optical properties of spontaneous lateral composition modulation in AlAs/InAs short-period superlattices

    International Nuclear Information System (INIS)

    Francoeur, S.; Zhang, Yong; Norman, A. G.; Alsina, F.; Mascarenhas, A.; Reno, J. L.; Jones, E. D.; Lee, S. R.; Follstaedt, D. M.

    2000-01-01

    The effect of lateral composition modulation, spontaneously generated during the epitaxial growth of an AlAs/InAs short-period superlattice, on the electronic band structure is investigated using phototransmission and photoluminescence spectroscopy. Compared with uniform layers of identical average composition, the presence of the composition modulation considerably reduces the band-gap energy and produces strongly polarized emission and absorption spectra. We demonstrate that the dominant polarization direction can selectively be aligned along the [1(bar sign)10] or [010] crystallographic directions. In compressively strained samples, the use of (001) InP substrates slightly miscut toward (111)A or (101) resulted in modulation directions along [110] or [100], respectively, and dominant polarization directions along a direction orthogonal to the respective composition modulation. Band-gap reductions as high as 350 and 310 meV are obtained for samples with composition modulation along [110] and [100], respectively. Ratios of polarized intensities up to 26 are observed in transmission spectra. (c) 2000 American Institute of Physics

  5. Researcher Identities in Transition

    DEFF Research Database (Denmark)

    Castelló, Montserrat; Wisker, Gina; Kobayashi, Sofie

    as other emergent ‘signals’, the latent or clear indications from institutions and academic communities regarding career directions and necessary professional skills and attitudes should be identified and interpreted for researchers to adequately develop their new identities. The aim of this paper......Researchers are now embarked upon what we define as a ‘risk career’, rather than, as previously, a relatively more predictable academic career. In this changing context, traditional milestones that enabled early career researchers to build their identities are disappearing. Instead, what we define...... is twofold: a) to present a comprehensive framework of the notion of researcher identity by means of analysing those spheres of activity related to researcher and career development; and b) to relate researcher identities to the experiences of early career researchers with issues concerning signals...

  6. Rights of Identity

    Directory of Open Access Journals (Sweden)

    Daniel Kofman

    2017-01-01

    Full Text Available A person’s identity is their sense of who and what they are, of who stands in significant relations to them, and of what is valuable to them. This is inevitably very broad, an immediate implication of which is that the concept of identity taken alone cannot do significant normative work. In some cases a person’s identity is bound up with the evil that they do or wish to do, and cannot thereby give them any right to do it. In other cases very powerful elements of a person’s identity – such as their attachment to loved ones – is certainly related to important rights, but it is not entirely clear that one needs the concept of identity to explicate or justify these rights; the deep involvement of their identity is arguably a byproduct of other important values in these cases (such as love, and those values can do the grounding work of the rights by themselves and more simply and clearly. Nevertheless, when suitably qualified, a person’s identity is central to accounting for important political rights. These ranges from rights to participate in cultural practices of one’s group, which sometimes implies duties on governments to support minorities threatened with extinction, to – at the outer limit – rights to arrange political administration. These rights are connected to both autonomy and fairness. Cultural rights are often taken either to be opposed to autonomy, or at best instrumental to personal autonomy (by providing ‘options’, but in fact, the ideal of autonomy, expressed by Mill as being the author of one’s life, requires that one be in control of significant aspects of one’s identity. Significant aspects of one’s identity are collectively determined within a culture. Cultures are not static, and their development is particularly affected by political boundaries. A fundamental right of autonomy implies, therefore, that groups be allowed, within reasonable constraints of general feasibility and stability, to arrange

  7. The Quest for Identity in Adolescence: Heterogeneity in Daily Identity Formation and Psychosocial Adjustment across 5 Years

    Science.gov (United States)

    Becht, Andrik I.; Nelemans, Stefanie A.; Branje, Susan J. T.; Vollebergh, Wilma A. M.; Koot, Hans M.; Denissen, Jaap J. A.; Meeus, Wim H. J.

    2016-01-01

    Identity formation is one of the key developmental tasks in adolescence. According to Erikson (1968) experiencing identity uncertainty is normative in adolescence. However, empirical studies investigating identity uncertainty on a daily basis are lacking. Hence, studying individual differences in daily certainty (i.e., identity commitment levels)…

  8. Identity Development in Deaf Adolescents

    Science.gov (United States)

    Kunnen, E. Saskia

    2014-01-01

    We studied identity development during 5 years in seven deaf adolescents who attended a school for deaf children in the highest level of regular secondary education (age between 14 and 18 years), administering identity interviews every year. Identity development is conceptualized as the processes of exploration and commitment formation (Bosma,…

  9. Science Identity in Informal Education

    Science.gov (United States)

    Schon, Jennifer A.

    The national drive to increase the number of students pursuing Science Technology, Engineering, and Math (STEM) careers has brought science identity into focus for educators, with the need to determine what encourages students to pursue and persist in STEM careers. Science identity, the degree to which students think someone like them could be a scientist is a potential indicator of students pursuing and persisting in STEM related fields. Science identity, as defined by Carlone and Johnson (2007) consists of three constructs: competence, performance, and recognition. Students need to feel like they are good at science, can perform it well, and that others recognize them for these achievements in order to develop a science identity. These constructs can be bolstered by student visitation to informal education centers. Informal education centers, such as outdoor science schools, museums, and various learning centers can have a positive impact on how students view themselves as scientists by exposing them to novel and unique learning opportunities unavailable in their school. Specifically, the University of Idaho's McCall Outdoor Science School (MOSS) focuses on providing K-12 students with the opportunity to learn about science with a place-based, hands-on, inquiry-based curriculum that hopes to foster science identity development. To understand the constructs that lead to science identity formation and the impact the MOSS program has on science identity development, several questions were explored examining how students define the constructs and if the MOSS program impacted how they rate themselves within each construct. A mixed-method research approach was used consisting of focus group interviews with students and pre, post, one-month posttests for visiting students to look at change in science identity over time. Results from confirmatory factor analysis indicate that the instrument created is a good fit for examining science identity and the associated

  10. CRISPR-Cas and Contact-Dependent Secretion Systems Present on Excisable Pathogenicity Islands with Conserved Recombination Modules.

    Science.gov (United States)

    Carpenter, Megan R; Kalburge, Sai S; Borowski, Joseph D; Peters, Molly C; Colwell, Rita R; Boyd, E Fidelma

    2017-05-15

    Pathogenicity islands (PAIs) are mobile integrated genetic elements that contain a diverse range of virulence factors. PAIs integrate into the host chromosome at a tRNA locus that contains their specific bacterial attachment site, attB , via integrase-mediated site-specific recombination generating attL and attR sites. We identified conserved recombination modules (integrases and att sites) previously described in choleragenic Vibrio cholerae PAIs but with novel cargo genes. Clustered regularly interspaced short palindromic repeat (CRISPR)-associated proteins (Cas proteins) and a type VI secretion system (T6SS) gene cluster were identified at the Vibrio pathogenicity island 1 (VPI-1) insertion site in 19 V. cholerae strains and contained the same recombination module. Two divergent type I-F CRISPR-Cas systems were identified, which differed in Cas protein homology and content. The CRISPR repeat sequence was identical among all V. cholerae strains, but the CRISPR spacer sequences and the number of spacers varied. In silico analysis suggests that the CRISPR-Cas systems were active against phages and plasmids. A type III secretion system (T3SS) was present in 12 V. cholerae strains on a 68-kb island inserted at the same tRNA-serine insertion site as VPI-2 and contained the same recombination module. Bioinformatics analysis showed that two divergent T3SSs exist among the strains examined. Both the CRISPR and T3SS islands excised site specifically from the bacterial chromosome as complete units, and the cognate integrases were essential for this excision. These data demonstrated that identical recombination modules that catalyze integration and excision from the chromosome can acquire diverse cargo genes, signifying a novel method of acquisition for both CRISPR-Cas systems and T3SSs. IMPORTANCE This work demonstrated the presence of CRISPR-Cas systems and T3SSs on PAIs. Our work showed that similar recombination modules can associate with different cargo genes and

  11. Identity and Diversity in Today's World

    Science.gov (United States)

    Gee, James Paul

    2017-01-01

    This paper develops a thesis about identity and diversity. I first look at activity-based identities, identities like being a gardener, birder, citizen scientist or fan-fiction writer. These are freely chosen identities and they are proliferating at a great rate today thanks to participatory culture, the Maker Movement and digital and social…

  12. Lift of dilogarithm to partition identities

    International Nuclear Information System (INIS)

    Terhoeven, M.

    1992-11-01

    For the whole set of dilogarithm identities found recently using the thermodynamic Bethe-Ansatz for the ADET series of purely elastic scattering theories we give partition identities which involve characters of those conformal field theories which correspond to the UV-limits of the scattering theories. These partition identities in turn allow to derive the dilogarithm identities using modular invariance and a saddle point approximation. We conjecture on possible generalizations of this correspondance, namely, a lift from dilogarithm to partition identities. (orig.)

  13. The effects of smoking self-identity and quitting self-identity on attempts to quit smoking

    NARCIS (Netherlands)

    van den Putte, B.; Yzer, M.C.; Willemsen, M.C.; de Bruijn, G.J.

    2009-01-01

    Objective: To examine the effect of two types of self-identity on attempts to quit smoking: self-identity in terms of smoking and self-identity in terms of quitting. Design: A prospective survey among an initial sample of 3,411 smokers. Smoking history variables and psychosocial variables from the

  14. Intensity modulated radiation therapy: Analysis of patient specific quality control results, experience of Rene-Gauducheau Centre

    International Nuclear Information System (INIS)

    Chiavassa, S.; Brunet, G.; Gaudaire, S.; Munos-Llagostera, C.; Delpon, G.; Lisbona, A.

    2011-01-01

    Purpose. - Systematic verifications of patient's specific intensity-modulated radiation treatments are usually performed with absolute and relative measurements. The results constitute a database which allows the identification of potential systematic errors. Material and methods. - We analyzed 1270 beams distributed in 232 treatment plans. Step-and-shoot intensity-modulated radiation treatments were performed with a Clinac (6 and 23 MV) and sliding window intensity-modulated radiation treatments with a Novalis (6 MV). Results. - The distributions obtained do not show systematic error and all the control meet specified tolerances. Conclusion. - These results allow us to reduce controls specific patients for treatments performed under identical conditions (location, optimization and segmentation parameters of treatment planning system, etc.). (authors)

  15. Strengthen Cloud Computing Security with Federal Identity Management Using Hierarchical Identity-Based Cryptography

    Science.gov (United States)

    Yan, Liang; Rong, Chunming; Zhao, Gansen

    More and more companies begin to provide different kinds of cloud computing services for Internet users at the same time these services also bring some security problems. Currently the majority of cloud computing systems provide digital identity for users to access their services, this will bring some inconvenience for a hybrid cloud that includes multiple private clouds and/or public clouds. Today most cloud computing system use asymmetric and traditional public key cryptography to provide data security and mutual authentication. Identity-based cryptography has some attraction characteristics that seem to fit well the requirements of cloud computing. In this paper, by adopting federated identity management together with hierarchical identity-based cryptography (HIBC), not only the key distribution but also the mutual authentication can be simplified in the cloud.

  16. 21 CFR 610.14 - Identity.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 7 2010-04-01 2010-04-01 false Identity. 610.14 Section 610.14 Food and Drugs... BIOLOGICAL PRODUCTS STANDARDS General Provisions § 610.14 Identity. The contents of a final container of each filling of each lot shall be tested for identity after all labeling operations shall have been completed...

  17. Primary Identity in Literature

    DEFF Research Database (Denmark)

    Graham, Brian Russell

    In our times, literary criticism, as well as larger political and cultural developments, is characterized by identity politics, meaning that our discourses are structured around the notion of different socially identifiable populations in society. In relation to literature, this results in our...... viewing the characters in literature in terms of these political identities. Literature is consequently discussed in relation to political causes. Literary criticism is animated by the same causes, and is viewed as having a direct intervention in society in relation to them. In this paper, I will discuss......, in relation to Frye’s works, the idea that the primary identities of characters in literature were and, to a considerable extent, continue to be those of family-member identities. As such, literature should not be appropriated to a political context too readily. Whereas viewing characters in terms of...

  18. Phonological experience modulates voice discrimination: Evidence from functional brain networks analysis.

    Science.gov (United States)

    Hu, Xueping; Wang, Xiangpeng; Gu, Yan; Luo, Pei; Yin, Shouhang; Wang, Lijun; Fu, Chao; Qiao, Lei; Du, Yi; Chen, Antao

    2017-10-01

    Numerous behavioral studies have found a modulation effect of phonological experience on voice discrimination. However, the neural substrates underpinning this phenomenon are poorly understood. Here we manipulated language familiarity to test the hypothesis that phonological experience affects voice discrimination via mediating the engagement of multiple perceptual and cognitive resources. The results showed that during voice discrimination, the activation of several prefrontal regions was modulated by language familiarity. More importantly, the same effect was observed concerning the functional connectivity from the fronto-parietal network to the voice-identity network (VIN), and from the default mode network to the VIN. Our findings indicate that phonological experience could bias the recruitment of cognitive control and information retrieval/comparison processes during voice discrimination. Therefore, the study unravels the neural substrates subserving the modulation effect of phonological experience on voice discrimination, and provides new insights into studying voice discrimination from the perspective of network interactions. Copyright © 2017. Published by Elsevier Inc.

  19. Ethnic Identity, Bicultural Identity Integration, and Psychological Well-Being among Transracial Adoptees: A Longitudinal Study

    Science.gov (United States)

    Ferrari, Laura; Rosnati, Rosa; Manzi, Claudia; Benet-Martínez, Verònica

    2015-01-01

    The ethnic identity development plays a crucial role in adolescence and emerging adulthood and may be more complex for adoptees who do not share their ethnic identity with their adoptive families. Evidence from the studies was mixed, with strong ethnic identity not always found to be indicative of improved psychological adjustment. Recently…

  20. Biography, Identity, Improvisation, Sound: Intersections of Personal and Social Identity through Improvisation

    Science.gov (United States)

    Smilde, Rineke

    2016-01-01

    This essay addresses the relationship of improvisation and identity. Biographical research that was conducted by the author into professional musicians' lifelong learning showed the huge importance of improvisation for personal expression. Musically, the concept of "sound" appeared to serve as a strong metaphor for identity. In addition,…

  1. Optimal Experience and Optimal Identity: A Multinational Study of the Associations Between Flow and Social Identity

    Science.gov (United States)

    Mao, Yanhui; Roberts, Scott; Pagliaro, Stefano; Csikszentmihalyi, Mihaly; Bonaiuto, Marino

    2016-01-01

    Eudaimonistic identity theory posits a link between activity and identity, where a self-defining activity promotes the strength of a person’s identity. An activity engaged in with high enjoyment, full involvement, and high concentration can facilitate the subjective experience of flow. In the present paper, we hypothesized in accordance with the theory of psychological selection that beyond the promotion of individual development and complexity at the personal level, the relationship between flow and identity at the social level is also positive through participation in self-defining activities. Three different samples (i.e., American, Chinese, and Spanish) filled in measures for flow and social identity, with reference to four previously self-reported activities, characterized by four different combinations of skills (low vs. high) and challenges (low vs. high). Findings indicated that flow was positively associated with social identity across each of the above samples, regardless of participants’ gender and age. The results have implications for increasing social identity via participation in self-defining group activities that could facilitate flow. PMID:26924995

  2. Optimal Experience and Optimal Identity: A Multinational Study of the Associations Between Flow and Social Identity.

    Science.gov (United States)

    Mao, Yanhui; Roberts, Scott; Pagliaro, Stefano; Csikszentmihalyi, Mihaly; Bonaiuto, Marino

    2016-01-01

    Eudaimonistic identity theory posits a link between activity and identity, where a self-defining activity promotes the strength of a person's identity. An activity engaged in with high enjoyment, full involvement, and high concentration can facilitate the subjective experience of flow. In the present paper, we hypothesized in accordance with the theory of psychological selection that beyond the promotion of individual development and complexity at the personal level, the relationship between flow and identity at the social level is also positive through participation in self-defining activities. Three different samples (i.e., American, Chinese, and Spanish) filled in measures for flow and social identity, with reference to four previously self-reported activities, characterized by four different combinations of skills (low vs. high) and challenges (low vs. high). Findings indicated that flow was positively associated with social identity across each of the above samples, regardless of participants' gender and age. The results have implications for increasing social identity via participation in self-defining group activities that could facilitate flow.

  3. Identity theft and your practice.

    Science.gov (United States)

    Asbell, Lisa

    2010-01-01

    Medical identity theft is a growing problem in America. The federal government has passed laws to help "prevent" identity theft. However, several powerful medical associations are fighting the legislation. Americans need to know what is happening with these laws and why these laws are important to protect providers from lawsuits and consumers of healthcare from medical identity theft.

  4. Social Identity Simulation System (SISTEM)

    Science.gov (United States)

    2014-03-31

    Report Individuation Individuation refers to when an individual attempts to preserve self-esteem by psychologically separating oneself from a...its expected costs. The following subsections describe various strategies of social identity entrepreneurship in more detail. Calling for...Haslam, S. A., & Reicher, S. (2007). Identity Entrepreneurship and the consequences of identity failure: the dynamics of leadership in the BBC prison

  5. A Temporal Perspective on Organizational Identity

    DEFF Research Database (Denmark)

    Schultz, Majken; Hernes, Tor

    2013-01-01

    time perspective in the use of memory enabled a longer time perspective in formulating claims for future identity, (2) a broader scope of articulated identity claims for the future was related to the combination of a broader range of memory forms, and (3) the depth of claims for future identity...... was related to the way in which memory forms were combined. At a more general level, our paper illustrates how viewing identity construction from the perspective of an ongoing present adds a new dimension to understanding the temporal dynamics of organizational identity....

  6. Stories we live, identities we build: how are elementary teachers' science identities shaped by their lived experiences?

    Science.gov (United States)

    Avraamidou, Lucy

    2018-02-01

    The aim of this multiple case study was to uncover a series of critical events and experiences related to the formation of the science identities of four beginning elementary female teachers, through a life-history approach and a conceptualization of teacher identity as lived experience. Grounded within the theoretical framework of Figured Worlds, the study used qualitative, interpretive methods for data collection (interviews, biographies, teaching philosophies) and analysis. The analysis shed light on the ways in which various experiences situated within different Figured Worlds (science, family and childhood, schooling, out-of-school, university, professional) impacted the participants' identity trajectories. The findings provided three main insights that contribute to science identity research and have implications for elementary teacher preparation: (a) science teacher identity is multidimensional and extends beyond cognitive domains of becoming to include affective dimensions; (b) science teacher identity is relational, linked and shaped by various other constructs or sub-identities; (c) place and time, defined as a space with meaning created by experiences, and science teacher identity are inextricably bound to one another.

  7. Generalized Cherednik-Macdonald identities

    NARCIS (Netherlands)

    Stokman, J.V.

    2008-01-01

    We derive generalizations of the Cherednik-Macdonald constant term identities associated to root systems which depend, besides on the usual Multiplicity function, symmetrically on two additional parameters omega +/-. They are natural analogues of the Cherednik-Macdonald constant term q-identities in

  8. Constructing leadership identities through stories

    DEFF Research Database (Denmark)

    Frimann, Søren; Hersted, Lone

    2016-01-01

    This article analyzes the construction of leadership identities through stories found in four narrative interviews from a qualitative study and leadership development project based on social constructionism and action learning. We argue that leadership development and the construction of leadership...... that the concept of coauthoring is useful in developing leadership and leadership identities through reflexive dialogs and emerging stories....... identities in a postmodern paradigm are based on the negotiation and co-construction of meanings, relationships, and stories. The following questions are investigated: What happens when a group of leaders from different organizations construct, deconstruct, and reconstruct their identity as leaders through...

  9. A practical field study of performances of solar modules at various positions in Serbia

    Directory of Open Access Journals (Sweden)

    Pantić Lana S.

    2015-01-01

    Full Text Available In this paper, results of practical field study of performances of three identical monocrystalline solar modules, single power of 60 W, with different inclinations (horizontal, optimally inclined oriented toward South and vertically oriented toward South in real meteorological conditions, in Nis, Serbia, in 2013, are presented. On the basis of the measurement results of solar energy intensity and electrical power generated with solar modules, efficiency (η, Performance Ratio (PR and fill factor (FF were calculated. In 2013, optimally inclined solar module generated 62.8 kWh, horizontal solar module 58.1 kWh and vertical solar module 43.9 kWh of electrical energy. It was found that annually the vertical solar module had the highest value of efficiency (10.9%, then horizontal solar module (10.6% and finally, optimally inclined solar module (10.2%. Annually, the vertical solar module had the highest value of Performance Ratio (0.93, then follows horizontal solar module (0.91 and finally, optimally inclined solar module (0.86. Annually, the horizontal solar module had the highest value of Fill Factor (67.7, then follows vertical solar module (66.6 and, finally, optimally inclined solar module (63.3. It was found that embodied energy payback time (EEPBT for a horizontal, optimally inclined and vertical BIPV system of 1020Wp would be 11.8, 10.9 and 15.6 years, respectively. The results obtained by this study could be used in planning and constructing building-integrated photovoltaics (BIPV, in Serbia. [Projekat Ministarstva nauke Republike Srbije, br. TR 33009

  10. Validation of keypad user identity using a novel biometric technique

    International Nuclear Information System (INIS)

    Grabham, N J; White, N M

    2007-01-01

    This paper presents initial work on the development of a keypad incorporating sensors to enable the biometric identity validation of the person using the keypad. The technique reported here is covert and non-intrusive and in use, requires no additional actions on the part of the user. Test systems have been developed using commercially available keypads, modified with mass-produced force sensors to facilitate measurement of key-press dynamics. Measurements are accomplished using a DAQ module attached to a PC running custom software to extract the biometric data and perform the validation. The design of the test system and the results from initial trials are presented. For a system designed for a false rejection ratio of 0%, a false acceptance rate of around 15% can be achieved

  11. Sexuality and gender identity teaching within preclinical medical training in New Zealand: content, attitudes and barriers.

    Science.gov (United States)

    Taylor, Oscar; Rapsey, Charlene M; Treharne, Gareth J

    2018-06-22

    To investigate inclusion of sexuality and gender identity content, attitudes and barriers to inclusion of content in preclinical curricula of New Zealand medical schools from the perspective of key teaching staff. Staff responsible for curriculum oversight at New Zealand's two medical schools were invited to complete a mixed-methods survey about sexuality and gender identity content in their modules. Of 24 respondents, the majority included very little content relating to sexuality or gender identity (33%) or none at all (54%). This content was deemed important by most participants (69%), and none believed there should be less such content in their curriculum. Time was reported to be the main barrier limiting inclusion of such content. Our finding of limited content is consistent with international literature. Our findings extend the literature by revealing that barriers to greater inclusion of content are not due to overt negative attitudes. Staff responsible for preclinical medical curriculum oversight have positive attitudes about content relating to sexuality and gender identity but perceive curriculum space to be a limiting barrier. This is important as it informs approaches to change. Future interventions with medical schools should focus on methods to increase diverse content as part of existing teaching, education to increase knowledge of LGBTQI relevant material and potentially incorporate strategies used to address unconscious bias. Addressing the perceived barriers of time constraints and lack of relevance is required to ensure medical students receive training to develop the competencies to provide positive healthcare experiences for all patients regardless of sexuality and gender identity.

  12. Analisis Kinerja Subscriber Station WiMAX di Urban Area Bandung

    Directory of Open Access Journals (Sweden)

    DWI ARYANTA

    2017-06-01

    results show the highest CINR value is 31 dB with 64 QAM modulation - ¾ and the lowest value of 10 dB with BPSK modulation half. The highest RSSI value of -54 dBm being the lowest and -89 dBm RSSI value. The highest throughput for streaming video services by 1000.8 kbps ( downlink with 64 QAM modulation - ¾. The lowest value was 56.247 ms delay in LOS conditions and the highest was 139.5 ms in NLOS conditions. The greatest value by 20 % packet loss is the farthest measurement locations 14.3 km.   Keywords : delay, packet loss, RSSI, CINR, throughput, CPE, WiMAX .

  13. Modulating mind-wandering in dysphoria

    Directory of Open Access Journals (Sweden)

    Fionnuala Catherine Murphy

    2013-11-01

    Full Text Available Depression is associated with significant difficulty staying ‘in the moment’ as the mind tends to wander away from current activity to focus instead on personal concerns. Mind-wandering (MW may in some instances be a precursor for depressive rumination, a thinking style believed to confer vulnerability to the likelihood and extent of depression. Though the majority of evidence examining MW and mood has been correlational, evidence indicates that MW may be not only a consequence but also a cause of low mood. Identifying a paradigm that could modulate MW, particularly in depressed individuals, would allow future studies to test whether elevated rates of MW causally drive cognitive-affective features of depression, such as rumination and anhedonia. This study therefore explored the feasibility of using an existing task manipulation to modulate behavioural and self-report indices of MW in participants with varying levels of self-reported dysphoria. Participants completed two go/no-go tasks – the SART and a high target probability task – and measures of state and trait MW. The two tasks were identical in all respects apart from the lower probability of no-go targets on the SART, a feature considered to encourage mindless, or inattentive, responding. Across participants, errors of commission (a behavioural indicator of MW were elevated on the SART relative to the high probability task, a pattern than was particularly pronounced in dysphoric participants. Dysphoric individuals furthermore reported elevated levels of MW, though the modulation of these subjective reports by task was present to a similar rather than greater extent in the dysphoric individuals. These findings provide encouraging preliminary support for the use of this paradigm as one that modulates MW in depressed individuals. The implications of these results and directions for future research are discussed.

  14. Education and identity of adult educators

    Directory of Open Access Journals (Sweden)

    Zoran Jelenc

    2010-10-01

    Full Text Available Adult education and learning has because of its wide extensiveness and variability huge difficulties with its identity. Difficulties appear in all three spheres of identity: professional identity of adult education; societal identity of the field; and personal identity with the profession. In our contribution we list and describe difficulties in all three identity areas. Insufficient identity is a great obstacle for continuing education and further training of those who work or wish to work in adult education or they are obliged to carry out such education. They are all named ‘adult educators’ but their roles and tasks in education are different. Contents and ways of realization of programs have to be adapted to that. We recommend: modular programs for different target groups should be created from a wide list of contents; more sophisticated methods of marketing and recruiting should be used for the better realization of programs; programs should enable participants to get publicly recognized certificates and in this way current program of pedagogical-andragogical education which does not follow enough above-named difficulties of identity should be replaced; successful programs should be distributed all over Slovenia and performed in cooperation with another providers.

  15. Moral identity and emotion in athletes.

    Science.gov (United States)

    Kavussanu, Maria; Willoughby, Adrian; Ring, Christopher

    2012-12-01

    The purpose of this study was to investigate the effects of moral identity on physiological responses to affective pictures, namely, the startle blink reflex and pain-related evoked potential. Male (n = 48) and female (n = 46) athletes participating in contact team sports were randomly assigned to either a moral identity group or a non-moral identity group and viewed a series of unpleasant, neutral, and pleasant sport-specific pictures. During picture viewing, a noxious electrocutaneous stimulus was delivered as the startle probe and the startle blink and pain-related evoked potential were measured. Upon completion of physiological measures, participants reviewed the pictures and rated them for valence and arousal. ANOVAs revealed that participants in the moral identity group displayed larger startle blinks and smaller pain-related potentials than did those in the non-moral identity group across all picture valence categories. However, the difference in the magnitude of startle blinks between the moral and non-moral identity groups was larger in response to unpleasant than pleasant and neutral pictures. Our findings suggest that moral identity affects physiological responses to sport-specific affective pictures, thereby providing objective evidence for the link between moral identity and emotion in athletes.

  16. Female versus male biological identities of nanoparticles determine the interaction with immune cells in fish

    DEFF Research Database (Denmark)

    Hayashi, Yuya; Miclaus, Teodora; Murugadoss, Sivakumar

    2017-01-01

    Biomolecule decoration of nanoparticles provides a corona that modulates how the nanoparticles interact with biological milieus. The corona composition has proved to reflect the differences in the repertoire of proteins to which the nanoparticles are exposed, and as a result the same nanoparticles...... and myeloid populations of the blood cells preferentially accumulated the nanoparticles with a female biological identity, irrespective of the sex of the fish from which the cells were obtained. The concept of repertoire differences in the corona proteome therefore deserves further attention, as various...

  17. The emergence, structure and development of ethnic identity during childhood: the case of Roma identity.

    Science.gov (United States)

    Pnevmatikos, Dimitris; Geka, Maria; Divane, Maria

    2010-12-01

    This study investigates the emergence, development and structure of ethnic identity during childhood. Forty Roma children living in Greece aged between 2.8 and 11.9 years answered questions about their awareness/recognition of four aspects of their ethnic identity-namely place of habitation, traditional costumes, the Roma language, and early betrothal of children-their identity and their sense of stability and constancy. The study also investigates how the children feel about the abandonment of those four aspects. The evidence from the current data supports the hypothesis that awareness of ethnic identity emerges before the age of 4. Moreover, this study offers direct empirical evidence of the multidimensionality of ethnic identity. A model of three concentric rings is proposed, extending from a core containing the most highly valued aspects of ethnic identity to the outer annulus that comprises the nonpermanent and nonstable aspects of ethnic identity. The aspects in each annulus differ in terms of the development of the sense of stability and constancy and the feelings associated with loss of the aspects in question. Even the youngest participants considered the aspects in the core to be stable and constant as well as emotionally charged; and even the 11-year-olds did not consider the aspects contained in the outer, more fluid annulus as stable and constant aspects of their ethnic identity. The development of an aspect is determined by what the majority of adults in a society, at a particular time in history, consider to be most important.

  18. Intergroup Leadership Across Distinct Subgroups and Identities.

    Science.gov (United States)

    Rast, David E; Hogg, Michael A; van Knippenberg, Daan

    2018-03-01

    Resolving intergroup conflict is a significant and often arduous leadership challenge, yet existing theory and research rarely, if ever, discuss or examine this situation. Leaders confront a significant challenge when they provide leadership across deep divisions between distinct subgroups defined by self-contained identities-The challenge is to avoid provoking subgroup identity distinctiveness threat. Drawing on intergroup leadership theory, three studies were conducted to test the core hypothesis that, where identity threat exists, leaders promoting an intergroup relational identity will be better evaluated and are more effective than leaders promoting a collective identity; in the absence of threat, leaders promoting a collective identity will prevail. Studies 1 and 2 ( N = 170; N = 120) supported this general proposition. Study 3 ( N = 136) extended these findings, showing that leaders promoting an intergroup relational identity, but not a collective identity, improved intergroup attitudes when participants experienced an identity distinctiveness threat.

  19. GSM and web-based flood monitoring system

    International Nuclear Information System (INIS)

    Pagatpat, J C; Arellano, A C; Gerasta, O J

    2015-01-01

    The purpose of this project is to develop a local real-time river flood monitoring and warning system for the selected communities near Mandulog River. This study focuses only on the detection and early warning alert system (via website and/or cell phone text messages) that alerts local subscribers of potential flood events. Furthermore, this system is interactive wherein all non-registered subscribers could inquire the actual water level of the desired area location they want to monitor. An estimated time a particular river waterway will overflow is also included in the analyses. The hardware used in the design is split into several parts namely: the water level detector, GSM module, and microcontroller development board. (paper)

  20. Fingerprint recognition with identical twin fingerprints.

    Science.gov (United States)

    Tao, Xunqiang; Chen, Xinjian; Yang, Xin; Tian, Jie

    2012-01-01

    Fingerprint recognition with identical twins is a challenging task due to the closest genetics-based relationship existing in the identical twins. Several pioneers have analyzed the similarity between twins' fingerprints. In this work we continue to investigate the topic of the similarity of identical twin fingerprints. Our study was tested based on a large identical twin fingerprint database that contains 83 twin pairs, 4 fingers per individual and six impressions per finger: 3984 (83*2*4*6) images. Compared to the previous work, our contributions are summarized as follows: (1) Two state-of-the-art fingerprint identification methods: P071 and VeriFinger 6.1 were used, rather than one fingerprint identification method in previous studies. (2) Six impressions per finger were captured, rather than just one impression, which makes the genuine distribution of matching scores more realistic. (3) A larger sample (83 pairs) was collected. (4) A novel statistical analysis, which aims at showing the probability distribution of the fingerprint types for the corresponding fingers of identical twins which have same fingerprint type, has been conducted. (5) A novel analysis, which aims at showing which finger from identical twins has higher probability of having same fingerprint type, has been conducted. Our results showed that: (a) A state-of-the-art automatic fingerprint verification system can distinguish identical twins without drastic degradation in performance. (b) The chance that the fingerprints have the same type from identical twins is 0.7440, comparing to 0.3215 from non-identical twins. (c) For the corresponding fingers of identical twins which have same fingerprint type, the probability distribution of five major fingerprint types is similar to the probability distribution for all the fingers' fingerprint type. (d) For each of four fingers of identical twins, the probability of having same fingerprint type is similar.

  1. Fingerprint recognition with identical twin fingerprints.

    Directory of Open Access Journals (Sweden)

    Xunqiang Tao

    Full Text Available Fingerprint recognition with identical twins is a challenging task due to the closest genetics-based relationship existing in the identical twins. Several pioneers have analyzed the similarity between twins' fingerprints. In this work we continue to investigate the topic of the similarity of identical twin fingerprints. Our study was tested based on a large identical twin fingerprint database that contains 83 twin pairs, 4 fingers per individual and six impressions per finger: 3984 (83*2*4*6 images. Compared to the previous work, our contributions are summarized as follows: (1 Two state-of-the-art fingerprint identification methods: P071 and VeriFinger 6.1 were used, rather than one fingerprint identification method in previous studies. (2 Six impressions per finger were captured, rather than just one impression, which makes the genuine distribution of matching scores more realistic. (3 A larger sample (83 pairs was collected. (4 A novel statistical analysis, which aims at showing the probability distribution of the fingerprint types for the corresponding fingers of identical twins which have same fingerprint type, has been conducted. (5 A novel analysis, which aims at showing which finger from identical twins has higher probability of having same fingerprint type, has been conducted. Our results showed that: (a A state-of-the-art automatic fingerprint verification system can distinguish identical twins without drastic degradation in performance. (b The chance that the fingerprints have the same type from identical twins is 0.7440, comparing to 0.3215 from non-identical twins. (c For the corresponding fingers of identical twins which have same fingerprint type, the probability distribution of five major fingerprint types is similar to the probability distribution for all the fingers' fingerprint type. (d For each of four fingers of identical twins, the probability of having same fingerprint type is similar.

  2. Interplay Between Intended Brand Identity and Identities in a Nike Related Brand Community

    DEFF Research Database (Denmark)

    Kornum, Niels; Gyrd-Jones, Richard; Al Zagir, Nadia

    2017-01-01

    While branding research traditionally views brand identity as an inside-out management controlled phenomenon, recent research emphasizes that a wide variety of stakeholders in the brand ecosystem enact and co-create brand identity. Following this theoretical perspective, management forms the inte...

  3. Perancangan Corporate Identity Astro Rent Car Surabaya

    OpenAIRE

    Gunardi, Yohanes Calvin; Negara, I Nengah Sudika; Aryanto, Hendro

    2017-01-01

    Corporate Identity merupakan hal yang krusial dalam perkembangan sebuah Perusahaan dalam segi internal maupun eksternal. Dalam membuat perancangan Corporate identity yang efektif, perancangan ini menampilkan segala teori dan ilmu yang berhubungan dengan Corporate identity. Dengan adanya perancangan ini diharapkan para pembaca mengerti betapa pentingnya peran sebuah corporate identity yang tepat dan mengena.Kata kunci: corporate identity, Astro, logo.

  4. Māori identity signatures: A latent profile analysis of the types of Māori identity.

    Science.gov (United States)

    Greaves, Lara M; Houkamau, Carla; Sibley, Chris G

    2015-10-01

    Māori are the indigenous peoples of New Zealand. However, the term 'Māori' can refer to a wide range of people of varying ethnic compositions and cultural identity. We present a statistical model identifying 6 distinct types, or 'Māori Identity Signatures,' and estimate their proportion in the Māori population. The model is tested using a Latent Profile Analysis of a national probability sample of 686 Māori drawn from the New Zealand Attitudes and Values Study. We identify 6 distinct signatures: Traditional Essentialists (22.6%), Traditional Inclusives (16%), High Moderates (31.7%), Low Moderates (18.7%), Spiritually Orientated (4.1%), and Disassociated (6.9%). These distinct Identity Signatures predicted variation in deprivation, age, mixed-ethnic affiliation, and religion. This research presents the first formal statistical model assessing how people's identity as Māori is psychologically structured, documents the relative proportion of these different patterns of structures, and shows that these patterns reliably predict differences in core demographics. We identify a range of patterns of Māori identity far more diverse than has been previously proposed based on qualitative data, and also show that the majority of Māori fit a moderate or traditional identity pattern. The application of our model for studying Māori health and identity development is discussed. (c) 2015 APA, all rights reserved).

  5. Corporate identity. Brand designs.

    Science.gov (United States)

    Mathieson, Steve

    2004-02-19

    The past two years have seen a steadily more consistent brand identity for the NHS. Branding will become more important as foundation status and PCT commissioning makes acute hospitals more competitive. This has put pressure on some trusts that have their own strong identities.

  6. Ethnic Identities of University Students

    Directory of Open Access Journals (Sweden)

    Gözde Özdikmenli-Demir

    2014-06-01

    Full Text Available The aim of this article is to understand the relationship between ethnic identity, victimization/witnessing community violence, ethnic discrimination, and aggression in a sample of university students living in the South East Region of Turkey. The participants were 263 university students of predominantly Kurdish ethnic origin. The results showed that males had higher levels of ethnic identity in the dimensions of exploration and commitment. Males also presented higher scores for witnessing community violence and lifetime exposure to ethnic discrimination. The most important predictor of participants’ ethnic identity was witnessing community violence. Participants who witnessed violent acts in their social environment had higher ethnic identity levels. Although the predictor variables could not explain an important part of the participants’ aggression levels, only perceived ethnic discrimination was positively related to aggressive behavior. The role of native language efficiency in ethnic identity is also discussed.

  7. Self-identity as a construct

    DEFF Research Database (Denmark)

    Sudzina, Frantisek

    Self-identity is a private assessment of one’s beliefs and values. The self is an active agent in the decision process that drives people to act in accordance with the behavior that they see appropriate for themselves. According to Triandis, one’s self-definition motivates behavior that is consis......Self-identity is a private assessment of one’s beliefs and values. The self is an active agent in the decision process that drives people to act in accordance with the behavior that they see appropriate for themselves. According to Triandis, one’s self-definition motivates behavior...... that is consistent with that definition. Self-identity has been shown to influence the acceptance and use of technology. Prior research has shown that self-identity includes the factors of innovativeness, tech savviness, and opinion leadership. The aim of the research is to test the self-identity construct...

  8. Development and Validation of a Q-Sort Measure of Identity Processing Style: The Identity Processing Style Q-Sort

    Science.gov (United States)

    Pittman, Joe F.; Kerpelman, Jennifer L.; Lamke, Leanne K.; Sollie, Donna L.

    2009-01-01

    Identity styles represent strategies individuals use to explore identity-related issues. Berzonsky (Berzonsky, M. D. (1992). Identity style and coping strategies. "Journal of Personality, 60", 771-788) identified three styles: informational, normative, and diffuse. In three studies, this paper presents (a) the identity processing style Q-sort…

  9. Strengthening quitter self-identity: An experimental study.

    Science.gov (United States)

    Meijer, Eline; Gebhardt, Winifred A; van Laar, Colette; van den Putte, Bas; Evers, Andrea W M

    2018-06-10

    Smoking-related self-identity processes are important for smoking cessation. We examined whether quitter self-identity (i.e. identification with quitting smoking) could be strengthened through a writing exercise, and whether expected social support for quitting, manipulated through vignettes, could facilitate identification with quitting. Participants (N = 339 daily smokers) were randomly assigned to a 2 (identity: strengthened quitter self-identity vs. control) × 3 (social support: present vs. absent vs. neutral control) between-participants design. The main outcome was post-test quitter self-identity. Post-test quitter self-identity was not strengthened successfully. Only a small and marginally significant intervention effect was found on quitter self-identity, which did not generalise to positively influence quit-intention or behaviour. The social support manipulation did not facilitate quitter self-identity. Secondary content analyses showed that quitter self-identity was strengthened among participants who linked quitting smoking to their lifestyle, wanted to become quitters for health reasons, and whose reasons for becoming quitters included approach of positive aspects of quitting, but not among participants who linked quitter self-identity to their self-perceptions. Results provide insight into the content of smokers' self-conceptualizations as quitters. Writing exercises should be improved and tested to eventually successfully strengthen quitter identities.

  10. Perancangan Corporate Identity Brotherwood Decoration

    OpenAIRE

    Ciputra, Ongky Permana; Bangsa, Petrus Gogor; Christianna, Aniendya

    2015-01-01

    Sebagai Perusahaan interior di Surabaya, “BROTHERWOOD” sedang membangun citra positif melalui penguatan corporate identity secara menyeluruh.Oleh karena itu “Brotherwood” memerlukan corporate identity dan mengaplikasikannya pada media promosi dan informasi yang sesuai dengan karakter dari target audience dan target market-nya.Dengan menggunakan corporate identity diharapkan “Brotherwood” menjadi lebih dikenal oleh target audience dan target market-nya sehingga membuat market “Brotherwood” men...

  11. Perceived parenting dimensions and identity styles: exploring the socialization of adolescents' processing of identity-relevant information.

    Science.gov (United States)

    Smits, Ilse; Soenens, Bart; Luyckx, Koen; Duriez, Bart; Berzonsky, Michael; Goossens, Luc

    2008-04-01

    This study examined the relationships between crucial dimensions of perceived parenting (support, behavioral control, and psychological control) and the three identity styles defined by Berzonsky [Berzonsky, M. D. (1990). Self-construction over the life span: A process perspective on identity formation. Advances in Personal Construct Psychology, 1, 155-186.]. Each identity style was hypothesized to relate to a specific pattern of perceived parenting dimensions. Hypotheses were examined in a sample of middle and late adolescents (n=674). An information-oriented style was positively predicted by parental support. Contrary to expectations, however, an information-oriented style was also positively predicted by psychological control. A normative identity style was positively predicted by support and behavioral control. In line with expectations, a diffuse-avoidant identity style was positively predicted by psychological control and negatively by maternal (but not paternal) behavioral control. Findings are discussed in light of the literature on the socialization of identity formation and directions for future research are outlined.

  12. Music, culture and identity

    Directory of Open Access Journals (Sweden)

    Ilir Ramadani

    2017-03-01

    Full Text Available At the time of globalization it is difficult to pretend avoiding music culture and identity from political, cultural and social developments. Thus, it is impossible for the music to be unshakable and to represent national identity by not taking and giving nothing to culture. The dynamics of life and the rapid development of technology make it impossible for the culture to remain unaffected in terms of sharing experiences social experiences. Culture represents our current course, both in terms of politics, also in the social and human aspects. Through the technology it is possible for our children to be equal with children of all other countries, to exchange information and to connect directly with all countries of the world. Musical education is one of the main factors of cultural development and preservation of national identity. Identity consists of everything we posses and reflect. We are those who distinguish from each other and have a common denominator compared to other nations.

  13. At the confluence of organisation development (OD and organisation identity theory (OIT: Enter identity interventions

    Directory of Open Access Journals (Sweden)

    C L Van Tonder

    2004-10-01

    Full Text Available The identity concept has been around in the form of “corporate identity" for some time, but its appearance as “organisation identity" is more recent. Emerging theory and initial empirical research suggest that an identity approach and “identity interventions" in particular, offer promising avenues to the organisation development practitioner for enhancing organisational focus, building resilience in the face of major change, and improving performance. Identity interventions in and of themselves, but also employed as pre-change interventions, build organisational capacity that would stave off premature organisational “death" and extend the organisation’s life expectancy. Opsomming Die identiteitskonsep is in die vorm van korporatiewe identiteit reeds ’n geruime tyd in omgang, maar die verskyning daarvan as “organisasie-identiteit? is meer onlangs. Ontluikende teorie en aanvanklike empiriese navorsing suggereer dat ’n identiteitsbenadering en "identiteitsintervensies" in die besonder, belowende geleenthede aan die organisasie- ontwikkelingspraktisyn bied om organisasiefokus te verbeter, die organisasie se veerkragtigheid ten aanskoue van omvangryke verandering te bou, en prestasie te verbeter. Identiteitsintervensies op sigself bou organisasiekapasiteit, maar kan ook as voorveranderingsintervensies aangewend word wat premature organisasie "sterftes" sal vermy en die organisasie se lewensverwagting sal verleng.

  14. integrated identity and integrated identity and access management

    African Journals Online (AJOL)

    eobe

    Management System (T-IAMS) is a fingerprint biometric database that centrally manages students' identity, course a fingerprint ... registration, library and medical services information. .... based application and a web-based application.

  15. G-identities of non-associative algebras

    International Nuclear Information System (INIS)

    Bakhturin, Yu A; Zaitsev, M V; Sehgal, S K

    1999-01-01

    The main class of algebras considered in this paper is the class of algebras of Lie type. This class includes, in particular, associative algebras, Lie algebras and superalgebras, Leibniz algebras, quantum Lie algebras, and many others. We prove that if a finite group G acts on such an algebra A by automorphisms and anti-automorphisms and A satisfies an essential G-identity, then A satisfies an ordinary identity of degree bounded by a function that depends on the degree of the original identity and the order of G. We show in the case of ordinary Lie algebras that if L is a Lie algebra, a finite group G acts on L by automorphisms and anti-automorphisms, and the order of G is coprime to the characteristic of the field, then the existence of an identity on skew-symmetric elements implies the existence of an identity on the whole of L, with the same kind of dependence between the degrees of the identities. Finally, we generalize Amitsur's theorem on polynomial identities in associative algebras with involution to the case of alternative algebras with involution

  16. Social Media Social Comparison of Ability (but not Opinion) Predicts Lower Identity Clarity: Identity Processing Style as a Mediator.

    Science.gov (United States)

    Yang, Chia-Chen; Holden, Sean M; Carter, Mollie D K

    2018-01-11

    Social comparison on social media has received increasing attention, but most research has focused on one type of social comparison and its psycho-emotional implications. Little is known about how different types of social comparison influence youth's identity development. Drawing on the theories of identity processing styles and social comparison, we examined how two different forms of social comparison on social media related to three identity processing styles, which in turn predicted youth's global self-esteem and identity clarity. We surveyed 219 college freshmen (M age  = 18.29; 74% female) once in the Fall and once in the Spring. Social comparison of ability on social media was related to concurrent diffuse-avoidant identity processing style, which predicted lower identity clarity months later. In contrast, social comparison of opinion on social media did not influence college freshmen's global self-esteem and identity clarity through identity processing styles. The findings clarified the implications of online social comparison for youth's identity development.

  17. Interplay of Language Policy, Ethnic Identity and National Identity in Five Different Linguistic Settings

    Directory of Open Access Journals (Sweden)

    Mehdi Gran Hemat

    2012-11-01

    Full Text Available This study, as a concise and critical literature review, examines related studies that investigated the interplay of the three constructs: ethnic identity, national identity and language policy. To do this, five related research articles were located and their similarities and differences in terms of their findings and methodologies were compared and contrasted. The literature review reveals that the researchers have utilized both quantitative and qualitative methods to obtain data. The findings show that ethnic identity is the contextualization of history, beliefs, customs, spiritual values, etc. of a speech community which practice their culture and values via the medium of language. National identity which emerges in time can be defined as an embodiment of the all common cultural values and social practices of different ethnic groups inside the borders of any country, and this is also manifested through a common language used as the formal and official language of their country. However, identity is a notion that remains rather illusive in its operationalization. Finally, language policy may be representative of a body of law, regulation and authoritative linguistic planned programs which are imposed on societies by governments. Language policies as nation building activities can improve the sense of nationality and reduce ethnic discords, and in the event may also suppress the maintenance or development of ethnic identity.

  18. Quantum entanglement of identical particles

    International Nuclear Information System (INIS)

    Shi Yu

    2003-01-01

    We consider entanglement in a system with a fixed number of identical particles. Since any operation should be symmetrized over all the identical particles and there is the precondition that the spatial wave functions overlap, the meaning of identical-particle entanglement is fundamentally different from that of distinguishable particles. The identical-particle counterpart of the Schmidt basis is shown to be the single-particle basis in which the one-particle reduced density matrix is diagonal. But it does not play a special role in the issue of entanglement, which depends on the single-particle basis chosen. The nonfactorization due to (anti)symmetrization is naturally excluded by using the (anti)symmetrized basis or, equivalently, the particle number representation. The natural degrees of freedom in quantifying the identical-particle entanglement in a chosen single-particle basis are occupation numbers of different single-particle basis states. The entanglement between effectively distinguishable spins is shown to be a special case of the occupation-number entanglement

  19. STORYTELLING AND UNIVERSITY BRANDING IDENTITY

    Directory of Open Access Journals (Sweden)

    ANDREEA MONICA STATE

    2016-08-01

    Full Text Available The present article sets out to clarify the concepts of storytelling and branding, with a focus on university branding and visual identity – the latter being a vital element to a brand’s uniqueness. Storytelling is an important method of brand construction, and it entails a strong power of seduction. Branding is increasingly more about storytelling. Practically, a story is an image made up of facts, feelings and interpretations, which are often told to us solely by the university itself. As such, the brand appears on the market accompanied by its identity. Identity is what we aim to express with help of the brand. Implementing a system of visual identity that would help to harmoniously develop a university brand requires a handbook of visual identity. The present article aims to be a starting point for such a handbook serving the University of Bucharest, which currently does not own such a handbook

  20. Leisure Time and Social Identity

    Directory of Open Access Journals (Sweden)

    Rasoul Rabbani

    2010-01-01

    Full Text Available How could patterns of leisure represent social identity? Whether they are sub-ordinate to the class identity or in the contemporary context of consumption and the post-modern cultural transformations, they could represent some other different social identities based on the patterns of consumption? Considering “leisure time” as a part of “style of life”, the present study attempts to explore social identity. There are two parts in methodology; first the qualitative one, carried through deep interview technique; and the other, surveying through questionnaire. Results distinguish the determining role “social class”, and the combination of “gender” and social class play in modeling distinctions in leisure patterns. In other words, leisure –as the arena for individual choice- is restricted to the social class and gender –as the structural and contextual variables. The strong correlation identity has with the social class and gender denies the post-modern interpretations which emphasis on consumption as the cause of social differentiations.

  1. Three Identities of the Catalan-Qi Numbers

    OpenAIRE

    Mansour Mahmoud; Feng Qi

    2016-01-01

    In the paper, the authors find three new identities of the Catalan-Qi numbers and provide alternative proofs of two identities of the Catalan numbers. The three identities of the Catalan-Qi numbers generalize three identities of the Catalan numbers.

  2. Personal Identity in Japan

    Science.gov (United States)

    Sugimura, Kazumi; Mizokami, Shinichi

    2012-01-01

    This chapter explores characteristics of identity formation among Japanese adolescents and young adults living in a cultural context where individualism has been increasingly emphasized even while maintaining collectivism. We argue that, to develop a sense of identity in Japanese culture, adolescents and young adults carefully consider others'…

  3. Three Identities of the Catalan-Qi Numbers

    Directory of Open Access Journals (Sweden)

    Mansour Mahmoud

    2016-05-01

    Full Text Available In the paper, the authors find three new identities of the Catalan-Qi numbers and provide alternative proofs of two identities of the Catalan numbers. The three identities of the Catalan-Qi numbers generalize three identities of the Catalan numbers.

  4. Exploring Japanese university English teachers' professional identity

    CERN Document Server

    Nagatomo, Diane Hawley

    2012-01-01

    This book examines the professional identities of Japanese university English teachers. It focuses on how relatively new teachers develop their professional identities, how gender impacts the professional identities of female professors, and how teaching practices and beliefs reflect personal and professional identity.

  5. Foreign Language Teaching and Cultural Identity.

    Science.gov (United States)

    Nasr, Raja T., Ed.; And Others

    A collection of works on the role of cultural identity in second language learning and teaching includes: "Linguas estrangeiras e ideologia" (Roberto Ballalai); "Cultural Identity and Bilinguality" (Josiane F. Hamers, Michel Blanc); "Foreign Language Teaching and Cultural Identity" (Lakshmie K. Cumaranatunge);…

  6. Value Conditionality of Identity

    Directory of Open Access Journals (Sweden)

    M M Yusupov

    2013-12-01

    Full Text Available The article considers theoretical approaches to the study of values and identity, and reveals the role of values in the formation of the ethnic, regional and Russian identity on the example of Chechnya and the North Caucasus, with the sociological indicators characterizing value orientations and self-identification.

  7. Self and social identity

    NARCIS (Netherlands)

    Ellemers, N; Spears, R; Doosje, B

    2002-01-01

    In this chapter, we examine the self and identity by considering the different conditions under which these are affected by the groups to which people belong. From a social identity perspective we argue that group commitment, on the one hand, and features of the social context, on the other hand,

  8. Nonlocal hyperconcentration on entangled photons using photonic module system

    Energy Technology Data Exchange (ETDEWEB)

    Cao, Cong; Wang, Tie-Jun; Mi, Si-Chen [School of Science, Beijing University of Posts and Telecommunications, Beijing 100876 (China); State Key Laboratory of Information Photonics and Optical Communications, Beijing University of Posts and Telecommunications, Beijing 100876 (China); Zhang, Ru [School of Science, Beijing University of Posts and Telecommunications, Beijing 100876 (China); State Key Laboratory of Information Photonics and Optical Communications, Beijing University of Posts and Telecommunications, Beijing 100876 (China); School of Ethnic Minority Education, Beijing University of Posts and Telecommunications, Beijing 100876 (China); Wang, Chuan, E-mail: wangchuan@bupt.edu.cn [School of Science, Beijing University of Posts and Telecommunications, Beijing 100876 (China); State Key Laboratory of Information Photonics and Optical Communications, Beijing University of Posts and Telecommunications, Beijing 100876 (China)

    2016-06-15

    Entanglement distribution will inevitably be affected by the channel and environment noise. Thus distillation of maximal entanglement nonlocally becomes a crucial goal in quantum information. Here we illustrate that maximal hyperentanglement on nonlocal photons could be distilled using the photonic module and cavity quantum electrodynamics, where the photons are simultaneously entangled in polarization and spatial-mode degrees of freedom. The construction of the photonic module in a photonic band-gap structure is presented, and the operation of the module is utilized to implement the photonic nondestructive parity checks on the two degrees of freedom. We first propose a hyperconcentration protocol using two identical partially hyperentangled initial states with unknown coefficients to distill a maximally hyperentangled state probabilistically, and further propose a protocol by the assistance of an ancillary single photon prepared according to the known coefficients of the initial state. In the two protocols, the total success probability can be improved greatly by introducing the iteration mechanism, and only one of the remote parties is required to perform the parity checks in each round of iteration. Estimates on the system requirements and recent experimental results indicate that our proposal is realizable with existing or near-further technologies.

  9. Nonlocal hyperconcentration on entangled photons using photonic module system

    International Nuclear Information System (INIS)

    Cao, Cong; Wang, Tie-Jun; Mi, Si-Chen; Zhang, Ru; Wang, Chuan

    2016-01-01

    Entanglement distribution will inevitably be affected by the channel and environment noise. Thus distillation of maximal entanglement nonlocally becomes a crucial goal in quantum information. Here we illustrate that maximal hyperentanglement on nonlocal photons could be distilled using the photonic module and cavity quantum electrodynamics, where the photons are simultaneously entangled in polarization and spatial-mode degrees of freedom. The construction of the photonic module in a photonic band-gap structure is presented, and the operation of the module is utilized to implement the photonic nondestructive parity checks on the two degrees of freedom. We first propose a hyperconcentration protocol using two identical partially hyperentangled initial states with unknown coefficients to distill a maximally hyperentangled state probabilistically, and further propose a protocol by the assistance of an ancillary single photon prepared according to the known coefficients of the initial state. In the two protocols, the total success probability can be improved greatly by introducing the iteration mechanism, and only one of the remote parties is required to perform the parity checks in each round of iteration. Estimates on the system requirements and recent experimental results indicate that our proposal is realizable with existing or near-further technologies.

  10. Emotional modulation of pain: is it the sensation or what we recall?

    Science.gov (United States)

    Godinho, Fabio; Magnin, Michel; Frot, Maud; Perchet, Caroline; Garcia-Larrea, Luis

    2006-11-01

    Emotions modulate pain perception, although the mechanisms underlying this phenomenon remain unclear. In this study, we show that intensity reports significantly increased when painful stimuli were concomitant to images showing human pain, whereas pictures with identical emotional values but without somatic content failed to modulate pain. Early somatosensory responses (emotions. Conversely, late responses showed a significant enhancement associated with increased pain ratings, localized to the right prefrontal, right temporo-occipital junction, and right temporal pole. In contrast to selective attention, which enhances pain ratings by increasing sensory gain, emotions triggered by seeing other people's pain did not alter processing in SI-SII (primary and second somatosensory areas), but may have biased the transfer to, and the representation of pain in short-term memory buffers (prefrontal), as well as the affective assignment to this representation (temporal pole). Memory encoding and recall, rather than sensory processing, appear to be modulated by empathy with others' physical suffering.

  11. MULTICULTURAL LITERATURE: THE IDENTITY CONSTRUCTION IN INDONESIAN NOVELS

    Directory of Open Access Journals (Sweden)

    Akhmad Taufiq

    2014-02-01

    Full Text Available This paper examines multicultural literature as a significant and strategic object of study in response to solving national problems. In this context, multicultural literature focuses mainly on multicultural problems frequently found in literary works. One of the main issues is concerned with identity. This article examines Indonesian novels, focusing mainly on the issues of identity: (1 identity and identity problems; (2 identity articulation; (3 text representation on identity discourse in Indonesian novels. The literature sociological approach was adopted to comprehend the reality in multicultural literary texts in Indonesian novels and its relation with the phenomena of identity problems in other field of studies. The results of study indicate that the process of identity articulation and text representation on identity discourse in multicultural social phenomena deserve more serious attention. Furthermore, the problems of identity and the process of identity articulation in multicultural society also require serious attention since identity problems are closely associated with nationality. National identity is not stable but dynamic in dealing with the development of a nation. The lack of concerns on this issue may cause a serious problem of national integrity.

  12. Generalized Jacobi identities in gauge theories

    International Nuclear Information System (INIS)

    Chaves, F.M.P.

    1990-01-01

    A spatial generalized Jacobi identity obeyed by the polarization-dependent factors of the vertices in a q q-bar - Wγ process is studied. The amplitude of a scattering gluon-gluon with five particles is worked out. By reorganizing this amplitude in analogy with an interaction process photon-pion, the non existence of the spatial generalized Jacobi identity, but instead many spatial partial identities that compose themselves, in the case of a four particle process, in one single identity is shown. A process with four particles, three of them scalar fields, but in the one loop approximation is studied. In this case also, the non existence of the spatial generalized Jacobi identity is demonstrated. (author)

  13. RELATIONSHIPS BETWEEN IDENTITY AND ACADEMIC MOTIVATION.

    Science.gov (United States)

    Matsushima, Rumi; Ozaki, Hitomi

    2015-08-01

    This study examined university students' academic motivation, focusing on individual differences in their sense of identity. The participants were 109 female Japanese students from two private universities (age range = 19-22 yr., M = 19.3, SD = 0.6). They completed four scales: the Multidimensional Ego Identity Scale, the Scale of Students' Attitude Toward Their Classes, the Academic Motivation Inventory, and the Scale of Lecture Self-Evaluation. Correlational analyses assessed the relationships between subscales. Then, path analysis was conducted to evaluate whether sense of identity affected attitude toward classes, academic motivation, and lecture self-evaluation. Differences particularly in psychosocial identity and self-identity accounted for significant variance in the students' attitudes toward classes, academic motivation, and lecture self-evaluation.

  14. Identity Management

    Data.gov (United States)

    Social Security Administration — Provides information for identity management services on the creation, modification and eventual deletion of accounts and entitlements based on user relationships on...

  15. Adaptation of the Utrecht-Management of Identity Commitments Scale (U-MICS) to the measurement of the parental identity domain.

    Science.gov (United States)

    Piotrowski, Konrad

    2018-04-01

    The present studies examined the psychometric properties of the Utrecht-Management of Identity Commitments Scale (U-MICS) adapted to the measurement of identity formation in the parental identity domain. As the parental identity domain has only been studied within the neo-Eriksonian approach to a very limited extent, the aim of these studies was to prepare a short, valid and reliable tool for the measurement of parental identity in order to fill this gap. The associations of commitment, in-depth exploration and reconsideration of commitment in the parental domain with well-being and with other identity constructs were analyzed. The results showed that parental identity formation is associated with mothers' satisfaction with life and trait anxiety and with identity formation in other areas as well. The initial results suggest that the adapted version of the U-MICS is a valid and reliable measure that can be used in future studies on parental identity formation. © 2017 The Author. Scandinavian Journal of Psychology published by Scandinavian Psychological Associations and John Wiley & Sons Ltd.

  16. On an extension of a combinatorial identity

    Indian Academy of Sciences (India)

    to an infinite family of 4-way combinatorial identities. In some particular cases we get even 5-way combinatorial identities which give us four new combinatorial versions of. Göllnitz–Gordon identities. Keywords. n-Color partitions; lattice paths; Frobenius partitions; Göllnitz–Gordon identities; combinatorial interpretations. 1.

  17. Structural basis for the ATP-independent proteolytic activity of LonB proteases and reclassification of their AAA+ modules.

    Science.gov (United States)

    An, Young Jun; Na, Jung-Hyun; Kim, Myung-Il; Cha, Sun-Shin

    2015-10-01

    Lon proteases degrade defective or denature proteins as well as some folded proteins for the control of cellular protein quality. There are two types of Lon proteases, LonA and LonB. Each consists of two functional components: a protease component and an ATPase associated with various cellular activities (AAA+ module). Here, we report the 2.03 -resolution crystal structure of the isolated AAA+ module (iAAA+ module) of LonB from Thermococcus onnurineus NA1 (TonLonB). The iAAA+ module, having no bound nucleotide, adopts a conformation virtually identical to the ADP-bound conformation of AAA+ modules in the hexameric structure of TonLonB; this provides insights into the ATP-independent proteolytic activity observed in a LonB protease. Structural comparison of AAA+ modules between LonA and LonB revealed that the AAA+ modules of Lon proteases are separated into two distinct clades depending on their structural features. The AAA+ module of LonB belongs to the -H2 & Ins1 insert clade (HINS clade)- defined for the first time in this study, while the AAA+ module of LonA is a member of the HCLR clade.

  18. Identity approach in translation : sociocultural implications

    Directory of Open Access Journals (Sweden)

    Alicja Żuchelkowska

    2012-01-01

    Full Text Available The objective of this text consists in presenting how it is necessary for contemporary translators and interpreters (both literary and specialised to acquire and develop the ability to recognize elements of identity discourse in translated texts. Nowadays, the need for inter-cultural exchange is inevitably connected with the necessity of establishing harmonious co-existence for numerous cultures and identities. Therefore, it is crucial to educate translators in a way that enables them to pay special attention to identity and cultural perturbations present in translated texts (culture and language hybridisation, multiple identity, cultural dislocation, presence in linguistic and political discourse of minority cultures, regardless of their genre or form. Such a strong emphasis on identity problems in the translation is especially relevant in the European context, where the attention of researchers and politicians directed at identity problems stemming from ethnical and cultural issues sets the framework for a new cultural paradigm that determines the future development of the Eu. Becoming acquainted with this paradigm which emphasises fl uency, identity unmarkedness and the new model of European collectivity is indispensable for a translator aspiring to become a true cultural mediator.

  19. The Identity of Czech Deaf Roma

    OpenAIRE

    Kalousová, Josefina

    2012-01-01

    With the definition of Deaf people as a cultural and linguistic minority the research of Deaf identity became possible. Following this, questions of identity of minority deaf persons emerged. Do these persons affiliate to the Deaf community or to their ethnic minority? This bachelor thesis focuses on the topic of Czech deaf Roma identity. The underlying assumption of the paper is that identity is a continuing process dependent on the interaction of an individual and society and that it consti...

  20. Human Rights and the Excess of Identity: A Legal and Theoretical Inquiry into the Notion of Identity in Strasbourg Case Law.

    Science.gov (United States)

    Al Tamimi, Yussef

    2018-06-01

    Identity is a central theme in contemporary politics, but legal academia lacks a rigorous analysis of this concept. The aim of this article is twofold: (i) firstly, it aims to reveal presumptions on identity in human rights law by mapping how the European Court of Human Rights approaches identity and (ii) secondly, it seeks to analyse these presumptions using theoretical insights on identity. By merging legal and theoretical analysis, this article contributes a reading of the Court's case law which suggests that the tension between the political and apolitical is visible as a common thread in the Court's use of identity. In case law concerning paternity, the Court appears to hold a specific view of what is presented as an unquestionable part of identity. This ostensibly pre-political notion of identity becomes untenable in cases where the nature of an identity feature, such as the headscarf, is contended or a minority has adopted a national identity that conflicts with the majoritarian national identity. The Court's approach to identity in such cases reflects a paradox that is inherent to identity; identity is personal while simultaneously constituted and shaped by overarching power mechanisms.

  1. 17 CFR 201.65 - Identity and signature.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Identity and signature. 201.65... of 1934 § 201.65 Identity and signature. Applications pursuant to this subpart may omit the identity, mailing address, and signature of the applicant; provided, that such identity, mailing address and...

  2. Theta function identities associated with Ramanujan's modular ...

    Indian Academy of Sciences (India)

    In Chapter 20 of his second notebook [6], Ramanujan recorded several theta function identities associated with modular equations of composite degree 15. These identities have previously been proved by Berndt in [3]. But he proved most of these theta function identities using modular equations. These identities can also ...

  3. On Identities in Modern Networks

    Directory of Open Access Journals (Sweden)

    Libor Polcak

    2014-09-01

    Full Text Available Communicating parties inside computer networks use different kind of identifiers. Some of these identifiers are stable, e.g., logins used to access a specific service, some are only temporary, e.g., dynamically assigned IP addresses. This paper tackles several challenges of lawful interception that emerged in modern networks. The main contribution is the graph model that links identities learnt from various sources distributed in a network. The inferred identities result into an interception of more detailed data in conformance with the issued court order. The approach deals with network address translation, short-lived identifiers and simultaneous usage of different identities. The approach was evaluated to be viable during real network testing based on various means to learn identities of users connected to a network.

  4. Leadership as social identity management: Introducing the Identity Leadership Inventory (ILI) to assess and validate a four-dimensional model

    OpenAIRE

    Steffens, Niklas K.; Haslam, S. Alexander; Reicher, Stephen D.; Platow, Michael J.; Fransen, Katrien; Yang, Jie; Ryan, Michelle K.; Jetten, Jolanda; Peters, Kim O.; Boen, Filip

    2014-01-01

    Although nearly two decades of research has provided support for the social identity approach to leadership, most previous work has focused on leaders’ identity prototypicality while neglecting the assessment of other equally important dimensions of social identity management. However, recent theoretical developments have argued that in order to mobilize and direct followers’ energies, leaders need not only to ‘be one of us’ (identity prototypicality), but also to ‘do it for us’ (identity adv...

  5. Real-Time Closed Loop Modulated Turbine Cooling

    Science.gov (United States)

    Shyam, Vikram; Culley, Dennis E.; Eldridge, Jeffrey; Jones, Scott; Woike, Mark; Cuy, Michael

    2014-01-01

    It has been noted by industry that in addition to dramatic variations of temperature over a given blade surface, blade-to-blade variations also exist despite identical design. These variations result from manufacturing variations, uneven wear and deposition over the life of the part as well as limitations in the uniformity of coolant distribution in the baseline cooling design. It is proposed to combine recent advances in optical sensing, actuation, and film cooling concepts to develop a workable active, closed-loop modulated turbine cooling system to improve by 10 to 20 the turbine thermal state over the flight mission, to improve engine life and to dramatically reduce turbine cooling air usage and aircraft fuel burn. A reduction in oxides of nitrogen (NOx) can also be achieved by using the excess coolant to improve mixing in the combustor especially for rotorcraft engines. Recent patents filed by industry and universities relate to modulating endwall cooling using valves. These schemes are complex, add weight and are limited to the endwalls. The novelty of the proposed approach is twofold 1) Fluidic diverters that have no moving parts are used to modulate cooling and can operate under a wide range of conditions and environments. 2) Real-time optical sensing to map the thermal state of the turbine has never been attempted in realistic engine conditions.

  6. The Relation of Racial Identity, Ethnic Identity, and Racial Socialization to Discrimination-Distress: A Meta-Analysis of Black Americans

    Science.gov (United States)

    Lee, Debbiesiu L.; Ahn, Soyeon

    2013-01-01

    This meta-analysis synthesized the results of 27 studies examining the relations of racial identity, ethnic identity, and racial socialization to discrimination-distress for Black Americans. The purpose was to uncover which constructs connected to racial identity, ethnic identity, and racial socialization most strongly correlate with racial…

  7. Language and Identity Explored

    Directory of Open Access Journals (Sweden)

    Thomas Rozanov

    2016-06-01

    Full Text Available The relationship between language and identity is widely discussed in applied linguistics, sociology, communications and other related scholarly fields. Furthermore, many researchers have focused on the post-Soviet region, which given its unique historical context allows for testing of this relationship. The widespread bilingualism as a result of historical russification and the linguistic transformations that occurred after the collapse of the Soviet Union make the region a ‘sociolinguistic playground’. Recent events in Ukraine have given grounds to further explore this relationship, now in attempt to link language and identity as potential forces for geopolitical change in the region. This paper presents an overview of existing research, theories, and opposing perspectives related to the relationship between language and identity, and considers complications such as historical russification, religious influence, socioeconomic factors, and education with regards to the Ukrainian and post-Soviet context.  I aim to illustrate the significance of language and its effects on socio-political change in the case of Ukraine, by presenting arguments and complications in support of the relationship between language and identity.

  8. 40 CFR 725.85 - Microorganism identity.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 30 2010-07-01 2010-07-01 false Microorganism identity. 725.85 Section... to Information § 725.85 Microorganism identity. (a) Claims applicable to the period prior to... specific microorganism identity at the time of submission of the information. This claim will apply only to...

  9. 40 CFR 720.85 - Chemical identity.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 30 2010-07-01 2010-07-01 false Chemical identity. 720.85 Section 720... PREMANUFACTURE NOTIFICATION Confidentiality and Public Access to Information § 720.85 Chemical identity. (a... submits information to EPA under this part may assert a claim of confidentiality for the chemical identity...

  10. Pre-Service Teacher Cultural Identity Development

    Science.gov (United States)

    Cunningham, Maurella Louise

    2013-01-01

    The main purpose of this study is to conduct exploratory qualitative research to investigate how PSTs and practicing teachers experience cultural and racial identity development or changes in identity. Rather than examine the "what" or contributors to identity development, I will explore the "how" or processes of identity…

  11. #MisconstruedIdentitiesMustFall collective: Identity formation in the current South African context: A practical theological perspective

    Directory of Open Access Journals (Sweden)

    Alfred R. Brunsdon

    2017-03-01

    Full Text Available In South Africa, 2015 was violently ushered out by several ‘must fall’ campaigns, of which the most prominent were the ‘fees’ and ‘Zuma must fall’ campaigns. These ‘must fall’ campaigns conveyed a new sense of urgency by the disgruntled masses towards certain institutions and individuals. Aligning with the ‘must fall’ analogy, the focus of this article is on combatting the notion of misconstrued identities in post-apartheid South Africa. Based on negative generalisation and perceptions of the ‘others’, misconstrued identities prohibit the formation of a collective identity that allows for peaceful co-existence. Consequently, the dynamics of collective identity formation and some of the possibilities for identity formation that reside within the Christian faith are investigated from a practical theological perspective. Given that a practical theological investigation takes both the context and theological reflection as points of departure, it is argued that it can contribute towards the dismantling of misconstrued identities to provide clues for the formation of a positive collective identity for South Africans.

  12. 16 CFR 500.4 - Statement of identity.

    Science.gov (United States)

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Statement of identity. 500.4 Section 500.4... PACKAGING AND LABELING ACT § 500.4 Statement of identity. (a) The principal display panel of a consumer commodity shall bear a specification of the identity of the commodity. (b) Such specification of identity...

  13. Teacher Identity Work in Mathematics Teacher Education

    Science.gov (United States)

    Neumayer-Depiper, Jill

    2013-01-01

    Becoming a teacher is not developing an identity, but is developing identity as a continuous process of constructing and deconstructing understandings within the complexities of social practice, beliefs, experiences, and social norms. I take up this stance on identity as articulated in Judith Butler's (1999) work with gender identity and…

  14. The Risky Path to a Followership Identity

    DEFF Research Database (Denmark)

    Larsson, Magnus; Nielsen, Mie Femø

    2017-01-01

    Followership research has increased recently, but little attention has been paid to the complexities and challenges of creating a followership identity. Researchers typically portray followership as a safe alternative to leadership identity, but we challenge this assumption by using naturally...... occurring workplace interactions to identify active contributions as well as risks associated with a follower identity. In this study, we use conversation analysis to examine how people collaboratively construct identities, and how identity development shapes and organizes interactions between people...

  15. Module theory, extending modules and generalizations

    CERN Document Server

    Tercan, Adnan

    2016-01-01

    The main focus of this monograph is to offer a comprehensive presentation of known and new results on various generalizations of CS-modules and CS-rings. Extending (or CS) modules are generalizations of injective (and also semisimple or uniform) modules. While the theory of CS-modules is well documented in monographs and textbooks, results on generalized forms of the CS property as well as dual notions are far less present in the literature. With their work the authors provide a solid background to module theory, accessible to anyone familiar with basic abstract algebra. The focus of the book is on direct sums of CS-modules and classes of modules related to CS-modules, such as relative (injective) ejective modules, (quasi) continuous modules, and lifting modules. In particular, matrix CS-rings are studied and clear proofs of fundamental decomposition results on CS-modules over commutative domains are given, thus complementing existing monographs in this area. Open problems round out the work and establish the...

  16. [Asymmetric effect of in-group social values on identity with common-identity and common-bond in-groups].

    Science.gov (United States)

    Nakashima, Ken'ichiro; Isobe, Chikae; Toshihiko, Souma; Ura, Mitsuhiro

    2013-06-01

    Moderating effects of group type on the relationship between in-group social values and group identity were investigated. Previous research has indicated that values attached to the in-group, such as its status, privileges, and power, lead to increased group identity. However, these studies have not investigated the role of the type of in-groups on this effect. We conducted an experiment that manipulated the in-group type. In the common-identity type of in-group condition, formation of in- and out-groups on the basis of social categorization was established. In the common-bond type of in-group condition, interactions between the group members were conducted. Results indicated that in the former condition, the degree of in-group social values affected group identity; however, this effect was not found in the latter condition. These results suggest that social values of the in-group have an asymmetric effect on group identity, depending upon the in-group type as a common-identity or common-bond group.

  17. Imagining Geographies, Mapping Identities

    Directory of Open Access Journals (Sweden)

    Matthew Graves

    2015-03-01

    Full Text Available The ambition of this issue of Portal is to reach across the methodological boundaries of history, politics, literature and geography to apply their complementary perspectives to the study of identity and its relation to space and place, an aim that involves attempting to identify the many different ways the notoriously slippery concepts of identity and geography may intersect. For this issue we have selected articles that cast a fresh perspective on two areas where identity and geography intersect: the construction of identity through the imaginative recreation of place in literature: Mapping Literary Spaces; and the study of the shifting relationships of centre and periphery, exclusion and inclusion in urban settings and geopolitical confrontations: Social and Political Peripheries. Gerard Toal has written that geography is not a noun but a verb: it does not describe what space is but studies what we do with space, imaginatively and politically. The articles in this issue illustrate the exercise of the literary and political imagination and the role of materiality and memory in the creation of geographic representation. They show too a new awareness of the centrality of space in the constitution of identities, and the need for a new geocritical reading of its discourse, as the interrelations of place and community are played out on the many scales of social and political life, from the local to the global.   The special issue is organised thus: Introduction Matthew Graves (Aix-Marseille University & Liz Rechniewski (Sydney University: “Imagining Geographies, Mapping Identities.” I. Mapping Literary Spaces - Isabelle Avila (University of Paris XIII, "Les Cartes de l'Afrique au XIXe siècle et Joseph Conrad : Perceptions d'une Révolution Cartographique." - Daniela Rogobete (University of Craiova, "Global vs Glocal: Dimensions of the post-1981 Indian English Novel." II. Social and Political Peripheries - Elizabeth Rechniewski (Sydney

  18. Personal identity and eastern thought

    Directory of Open Access Journals (Sweden)

    Correia Carlos João

    2009-01-01

    Full Text Available This paper aims to show that the problem of personal identity is a fundamental question of the classical Indian thought. Usually we tend to think that personal identity is a Western philosophical subject, and so we tend to forget the significance of the Self (Atman in Hinduism and even in Buddhism. The author shows how the Indian thought approached the question of personal identity and which was the singular solution outlined in the work consensually attributed to Gotama, the Buddha.

  19. Survivorship and discourses of identity.

    Science.gov (United States)

    Little, Miles; Paul, Kim; Jordens, Christopher F C; Sayers, Emma-Jane

    2002-01-01

    Personal identity is self-evidently important to us all. Identity is a philosophically complex subject, but there is some agreement that memory, embodiment and continuity are essential components. The sense of memory includes 'future memory', the kind of memory we would like to construct for ourselves as our lives proceed. While the sense of personal identity is internal to the individual, a sense of that person's identity exists in the minds of others. Extreme experiences threaten the element of continuity, because they may bring bodily changes as well as cognitive changes that challenge central values. Restoring or preserving continuity is a major task for survivors. The ways in which people experience discontinuity because of cancer illness, and the ways in which they manage this experience emerges from the narratives of the survivors of cancer and in the narratives of health care workers who look after them. People manage discontinuity by reference to stable 'anchor points' in their beliefs and values; by re-constructing versions of their pre-experience identities, drawing on past memory and finding ways to preserve a continuity between past memory, present experience and constructions of the future; by using the experience to develop established facets of identity; and by imbuing the experience with meaning and recognising the enlarged identity made possible by survival. Those who cannot achieve a sense of continuity may feel alienated from themselves, their friends and family. All these methods of management may be used by one person to negotiate the post-experience identity in its different social interactions. The experience of the survivor can be further understood by recognising the challenge posed by extreme experience to the sense of continuity of both embodied self and memory. A satisfactory discourse of survival has yet to enter the public domain. This lack adds to the burdens of survivors, including those who have survived cancer. Copyright 2002 John

  20. 21 CFR 801.61 - Statement of identity.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 8 2010-04-01 2010-04-01 false Statement of identity. 801.61 Section 801.61 Food... DEVICES LABELING Labeling Requirements for Over-the-Counter Devices § 801.61 Statement of identity. (a... principal features a statement of the identity of the commodity. (b) Such statement of identity shall be in...

  1. 7 CFR 868.36 - Loss of identity.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 7 2010-01-01 2010-01-01 false Loss of identity. 868.36 Section 868.36 Agriculture... identity. (a) Lots. The identity of a packaged lot, bulk lot, or sublot of a commodity shall be considered... or location after the time of original inspection, unless the identity is preserved; or (2) More...

  2. The Meanings and Dimensions of Citizens’ Political Identity: Approaching an Understanding of the Concept of Political Identity

    DEFF Research Database (Denmark)

    Kristensen, Niels Nørgaard

    The present article seeks to explore approaches to political identity in order to discuss and suggest an understanding of the term. There are several reasons for such a focus related to the salience of political identities in political affairs, as well as how identities function in people’s lives...

  3. Unskilled Work and Learner Identity

    DEFF Research Database (Denmark)

    Kondrup, Sissel

    2014-01-01

    . The main argument is that participation research must abandon the notion of motivation as an individual attribute and apply a dialectic concept of learner identity acknowledging work-life as a pivotal space for learning and formation of identity. I outline how a work-life-historical approach combining......The paper examines how unskilled work forms conditions for meeting the obligation to position oneself as an educable subject and engage in formal learning activities. Sensitivity to peoples’ work-life-experiences is necessary to understand their orientation toward different learning activities...... a critical theoretical approach inspired by Salling-Olesen’s and Archer’s concepts of identity and concerns can contribute to an understanding of the relationship between work and learner identity. Through narrative work-life interviews I examine how engagement in unskilled work in small and medium sized...

  4. Career identity in the veterinary profession.

    Science.gov (United States)

    Page-Jones, S; Abbey, G

    2015-04-25

    This research investigates vet and vet nurse career identity through the qualitative methodology of narrative enquiry. It derives learning and understanding from these empirical data to assist the veterinary profession to adjust to the changing industry landscape. Through a case series of 20 vets and vet nurses' career stories, this paper seeks understanding about career identity and its impact on individuals and organisations in the light of industry consolidation. Findings suggest that career is central to identity for many veterinary professionals who tend to have a strong sense of self; this is particularly evident around self as learner and technically competent, teacher and educator, ethical and moral and dedicated and resilient. Consequently, mismatches between 'who I am' and 'what I do' tend not to lead to identity customisation (to fit self into role or organisation) but to the search for alternative, more identity-compatible employment. This study offers a valuable insight for employers, veterinary professionals and universities. It suggests that businesses can gain competitive advantage and employees achieve validation and enrichment by working towards organisational and individual identity congruence and that teaching veterinary professionals with contemporary business in mind may develop graduates with a more sustainable identity. British Veterinary Association.

  5. Dehistoricized Cultural Identity and Cultural Othering

    Science.gov (United States)

    Weiguo, Qu

    2013-01-01

    The assumption that each culture has its own distinctive identity has been generally accepted in the discussion of cultural identities. Quite often identity formation is not perceived as a dynamic and interactive ongoing process that engages other cultures and involves change in its responses to different challenges at different times. I will…

  6. 21 CFR 201.50 - Statement of identity.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 4 2010-04-01 2010-04-01 false Statement of identity. 201.50 Section 201.50 Food... identity. (a) The label of prescription and insulin-containing drugs in package form shall bear as one of its principal features a statement of the identity of the drug. (b) Such statement of identity shall...

  7. 21 CFR 201.61 - Statement of identity.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 4 2010-04-01 2010-04-01 false Statement of identity. 201.61 Section 201.61 Food...: GENERAL LABELING Labeling Requirements for Over-the-Counter Drugs § 201.61 Statement of identity. (a) The... features a statement of the identity of the commodity. (b) Such statement of identity shall be in terms of...

  8. Biracial Japanese American identity: an evolving process.

    Science.gov (United States)

    Collins, J F

    2000-05-01

    This qualitative study explored the complexity of biracial identity development in Japanese Americans. It is based on the constant comparable method of analysis, or grounded theory. The study focused on how Japanese Americans perceived themselves in relation to other individuals, groups, and their environment. The data consisted of 15 extensive semistructured interviews with 8 men and 7 women (ages 20 to 40 years), each with 1 Japanese parent and 1 non-Asian parent. Findings relate to participants' initiating explorations of identity and perseverance in pursuing a biracial identity, which depended on the degree of support or negative experience within their social networks. Participants explored identity options attempting to develop their own meaning of identity, to develop a confident sense of themselves, and to secure a positive ethnic identity. Identity development among participants varied. It was a long-term process involving changes in the individual-environment relationship, which differed in the way individual participants influenced or selected from environmental opportunities, even creating or recreating some aspects. Within a given setting, as youths, the potential for social experiences were relatively fixed and changed only gradually. As adults, there were opportunities for participants to select their own social and geographic settings, providing opportunity for change. In their new environments, participants were exposed to new contacts and role models, acquired new behavioral repertoire, and underwent role transitions. Depending on this, new and different aspects of biracial identity developed. Participants indicated it was an emotional and conflictual process to positive assertion of identity. Before reaching this, all of the participants experienced periods of confusion. Most asserted biracial identity gradually, through a process of racial identity development consisting of the individual's changing or maintaining certain reference group

  9. Oncolytic Viruses: Therapeutics With an Identity Crisis

    Directory of Open Access Journals (Sweden)

    Caroline J. Breitbach

    2016-07-01

    Full Text Available Oncolytic viruses (OV are replicating viral therapeutics for the treatment of cancer and have been in laboratory development for about twenty years. Recently, the FDA approved Imlygic, a herpes virus based therapeutic for the treatment of melanoma and thus OVs have entered a new era where they are a weapon in the armament of the oncologist. OVs are unique therapeutics with multiple mechanisms of therapeutic activity. The exact path for their development and eventual uptake by pharmaceutical companies is somewhat clouded by an uncertain identity. Are they vaccines, tumour lysing therapeutics, inducers of innate immunity, gene therapy vectors, anti-vascular agents or all of the above? Should they be developed as stand-alone loco-regional therapeutics, systemically delivered tumour hunters or immune modulators best tested as combination therapeutics? We summarize data here supporting the idea, depending upon the virus, that OVs can be any or all of these things. Pursuing a “one-size fits all” approach is counter-productive to their clinical development and instead as a field we should build on the strengths of individual virus platforms.

  10. Further Conceptualizing Ethnic and Racial Identity Research: The Social Identity Approach and Its Dynamic Model.

    Science.gov (United States)

    Verkuyten, Maykel

    2016-11-01

    This article proposes a further conceptualization of ethnic and racial identity (ERI) as a fundamental topic in developmental research. Adding to important recent efforts to conceptually integrate and synthesize this field, it is argued that ERI research will be enhanced by more fully considering the implications of the social identity approach. These implications include (a) the conceptualization of social identity, (b) the importance of identity motives, (c) systematic ways for theorizing and examining the critical role of situational and societal contexts, and (d) a dynamic model of the relation between ERI and context. These implications have not been fully considered in the developmental literature but offer important possibilities for moving the field forward in new directions. © 2016 The Author. Child Development © 2016 Society for Research in Child Development, Inc.

  11. Concealable Stigmatized Identities and Psychological Well-Being

    OpenAIRE

    Quinn, Diane M.; Earnshaw, Valerie A.

    2013-01-01

    Many people have concealable stigmatized identities: Identities that can be hidden from others and that are socially devalued and negatively stereotyped. Understanding how these concealable stigmatized identities affect psychological well-being is critical. We present our model of the components of concealable stigmatized identities including valenced content – internalized stigma, experienced discrimination, anticipated stigma, disclosure reactions, and counter-stereotypic/positive informati...

  12. Identity Politics, the Ethos of Vulnerability, and Education

    Science.gov (United States)

    Brunila, Kristiina; Rossi, Leena-Maija

    2018-01-01

    In this article, identity politics is understood as a form of politics stressing collective but malleable group identities as the basis of political action. This notion of identity politics also allows thinking of identity as intersectional. The focus of this article, and a problem related to identity politics, is that when discussed in the…

  13. The effect of varying talker identity and listening conditions on gaze behavior during audiovisual speech perception.

    Science.gov (United States)

    Buchan, Julie N; Paré, Martin; Munhall, Kevin G

    2008-11-25

    During face-to-face conversation the face provides auditory and visual linguistic information, and also conveys information about the identity of the speaker. This study investigated behavioral strategies involved in gathering visual information while watching talking faces. The effects of varying talker identity and varying the intelligibility of speech (by adding acoustic noise) on gaze behavior were measured with an eyetracker. Varying the intelligibility of the speech by adding noise had a noticeable effect on the location and duration of fixations. When noise was present subjects adopted a vantage point that was more centralized on the face by reducing the frequency of the fixations on the eyes and mouth and lengthening the duration of their gaze fixations on the nose and mouth. Varying talker identity resulted in a more modest change in gaze behavior that was modulated by the intelligibility of the speech. Although subjects generally used similar strategies to extract visual information in both talker variability conditions, when noise was absent there were more fixations on the mouth when viewing a different talker every trial as opposed to the same talker every trial. These findings provide a useful baseline for studies examining gaze behavior during audiovisual speech perception and perception of dynamic faces.

  14. Recognizing Moral Identity as a Cultural Construct.

    Science.gov (United States)

    Jia, Fanli; Krettenauer, Tobias

    2017-01-01

    Current research on moral identity shows that moral identity predicts moral action in Western cultures but not in non-Western cultures. The present paper argues that this may be due to the fact that the concept of moral identity is culturally biased. In order to remedy this situation, we argue that researchers should broaden their scopes of inquiry by adding a cultural lens to their studies of moral identity. This change is important because although some concept of moral identity likely exists in all cultures, it may function in different ways and at different levels in each place. We propose that moral identity is a context-dependent construct tied to varying social and cultural obligations. We argue that Western moral identity stresses an individually oriented morality, whereas, people from Eastern cultures consider a highly moral person to be societally oriented. We conclude by discussing the implications of this view for future research.

  15. How Places Shape Identity: The Origins of Distinctive LBQ Identities in Four Small U.S. Cities.

    Science.gov (United States)

    Brown-Saracino, Japonica

    2015-07-01

    Tools from the study of neighborhood effects, place distinction, and regional identity are employed in an ethnography of four small cities with growing populations of lesbian, bisexual, and queer-identified (LBQ) women to explain why orientations to sexual identity are relatively constant within each site, despite informants' within-city demographic heterogeneity, but vary substantially across the sites, despite common place-based attributes. The author introduces the concept of "sexual identity cultures"--and reveals the defining role of cities in shaping their contours. She finds that LBQ numbers and acceptance, place narratives, and newcomers' encounters with local social attributes serve as touchstones. The article looks beyond major categorical differences (e.g., urban/rural) to understand how and why identities evolve and vary and to reveal the fundamental interplay of demographic, cultural, and other city features previously thought isolatable. The findings challenge notions of identity as fixed and emphasize the degree to which self-understanding and group understanding remain collective accomplishments.

  16. Regional identity and family

    Directory of Open Access Journals (Sweden)

    Tripković Gordana D.

    2003-01-01

    Full Text Available This paper is a continuation of a study on regionalisation and family, within the project named Sociological Aspects of Multiculturality and Regionalisation and their influence on the development of AP Vojvodina and the Republic of Serbia. The author focuses her attention to operationalisation of the theoretical and methodological premises that were developed in the previous paper (Tripković, 2002: 111-127, which means that it represents the results of the second phase of the research plan. This phase includes adjusting of theoretical concepts to the fieldwork displaying the results of the research and the analysis of the findings that put a family in the context of confronting different identities, above all national and regional. As possible "identity difference" was emphasized in the research, theoretical and methodological apparatus was adjusted to this goal. That is why in this paper the replies of interviewees that can suggest or reject the assumption that their national identity can influence significantly the evaluation of identity specificities are presented and analyzed, concerning more or less visible aspects of family life, like welfare status, relations between spouses, respect to the elder, family harmony, number of children, connections with relatives, etc.

  17. The challenge of plural identity

    Directory of Open Access Journals (Sweden)

    Jovanović Bojan

    2005-01-01

    Full Text Available The complexity of collective existence is expressed through an awareness of its real identity, which then entails an appropriate attitude towards its own negativity. Within the hierarchically structured identity, different levels of its generality make it possible to consider them as factors of a plural reality. If negativity is raised to consciousness, then its dark side is dismantled. Thus, instead of being a factor of conflict, negativity becomes an element of complementariness and a factor in the construction of a shared identity at a higher level of generality.

  18. Identity In and Around Organisations

    DEFF Research Database (Denmark)

    Schultz, Majken; Maguire, Steve

    2013-01-01

    concept may not be the best way of approaching and managing your organisation. Rather, Majken Schultz and Steve Maguire argue that organisations would benefit from adopting a process-based view of identity, which integrates history, ongoing change and market instability into its definition.......At the heart of any successful organisation lies a powerful conception of identity: the coherent way in which it presents itself to its stakeholders and employees, containing its purpose, goals and key characteristics. However, the traditional idea of identity as a stable, solid and reliable...

  19. Smoker Identity Development among Adolescents who Smoke

    Science.gov (United States)

    Hertel, Andrew W.; Mermelstein, Robin J.

    2016-01-01

    Adolescents who smoke are more likely to escalate their smoking frequency if they believe smoking is self-defining. Knowing factors that are associated with development of a smoker identity among adolescents who smoke may help to identify who will become a regular smoker. We investigated whether smoker identity development is associated with internal and external motives for smoking. For comparison, we also investigated whether social smoker identity development is associated with internal and external motives for smoking. Adolescents who smoke (n = 292) completed measures of smoker and social smoker identity, internal motives for smoking (negative affect coping, positive affect enhancement), and external motives for smoking (social fit) at baseline, 6-, 15-, and 24-month assessments of an ongoing longitudinal study of smoking patterns. We examined whether change in smoker and social smoker identity from 6 to 24 months was associated with change in motives at earlier assessment waves. We also explored whether gender moderated these relationships. Increases in negative affect coping motives were associated with smoker identity development among both males and females. Increases in social motives were associated with smoker identity development among males, and increases in negative affect coping motives were associated with social smoker identity development among females. Smoker and social smoker identities are signaled by negative affect coping as well as social motives for smoking. PMID:27136374

  20. The career planning, athletic identity, and student role identity of intercollegiate student athletes.

    Science.gov (United States)

    Lally, Patricia S; Kerr, Gretchen A

    2005-09-01

    The purpose of this study was to examine the career planning of university student athletes and relationships between their career planning and athletic and student role identities. Two retrospective in-depth interviews were held with four male and four female university student athletes. Participants entered university with vague or nonexistent career objectives and invested heavily in their athletic roles. In the latter years of their college career, the participants discarded their sport career ambitions and allowed the student role to become more prominent in their identity hierarchies. The current findings support Brown and Hartley's (1998) suggestion that student athletes may invest in both the athlete and student role identities simultaneously and that investing in the latter may permit the exploration of nonsport career options.

  1. Identity and Conflict: Personality, Sociality and Culturality

    Directory of Open Access Journals (Sweden)

    Rik Pinxten

    1997-05-01

    Full Text Available We presented a model which describes the field of questions on identity as a field of dynamics. It is structured by means of particular, temporal configurations of identity through time and space. The theory of dynamic systems provides us with precise models for the representation of forms of identity, or of their evolution towards types of so-called chaos, given certain conditions. The model allows us to work in a comparative perspective, which is a sure advantage in conflict analysis. The complexity of identity phenomena is captured covering individual, group and community dynamics of identity.

  2. Corporate visual identity: a case in hospitals.

    Science.gov (United States)

    Alkibay, Sanem; Ozdogan, F Bahar; Ermec, Aysegul

    2007-01-01

    This paper aims to present a perspective to better understand corporate identity through examining the perceptions of Turkish patients and develop a corporate visual identity scale. While there is no study related to corporate identity research on hospitals in Turkey as a developing country, understanding consumer's perceptions about corporate identity efforts of hospitals could provide different perspectives for recruiters. When the hospitals are considered in two different groups as university and state hospitals, the priority of the characteristics of corporate visual identity may change, whereas the top five characteristics remain the same for all the hospitals.

  3. From Inclusive Identities to Inclusive Societies: Exploring Complex Social Identity in the Macedonian Context

    Directory of Open Access Journals (Sweden)

    Dr.Sc. Ali Pajaziti

    2016-01-01

    Full Text Available Republic of Macedonia is an entity described as cultural mosaic, with strong multiethnic and multi-confessional basis, it is a point where East and West meet, it is well-known for the system of Macedonian salad. But, this society even after 25 year of social transition and 2001 Ohrid Agreement did not achieve to find the way of conclusive peace, stability and social eudemonia. The diversity is issue that from time to time produces turbulences, especially at the line of two main identity groups Macedonians-Christian Orthodox and Albanians-Muslim community. Quantitative data in this study were obtained on a sample of 219 young adults from Skopje (95 of Macedonian and 17 of Albanian ethnicity and Tetovo (76 of Albanian and 31 of Macedonian ethnicity, aged from 18 to 35 years (M = 24.85, SD = 3.2. Main research question is that if there exist differences between young Macedonians and Albanians in their ethnic, religious and national identity? The objective of this paper is to give a scientific picture how categories as gender, marriage, family, ethnicity, religion, living place, Balkan, Europe are perceived by the youth, all this in favour of using them in producing affirmative actions, more productive societal policies and constructive society-building. Multiple social identities: their complexity and inclusiveness, the correlation of identity variables with SII and SIC are among issues analyzed in this paper. National dominance was more frequent among Macedonians. Our findings demonstrate that Albanian participants expressed strong social identity, as Albanians and as being Muslims. Only social identity inclusiveness is significantly related to societal and political attitudes, but ethnicity should be taken into consideration when this relationship is explored.

  4. Canonical ward identities in generalized QCD

    International Nuclear Information System (INIS)

    Li Ziping

    1995-01-01

    The canonical Ward identities for a system with singular higher-order Lagrangian are derived and some application to the generalized QCD are given. The new relations of the Ward identities for gauge ghost field proper vertices are obtained which differ from the usual Ward-Takahashi identities arising from BRS invariance. The expressions for PCAC and generalized PCAC of AVV vertices are also obtained

  5. Rethinking social identity theory in international encounters:

    DEFF Research Database (Denmark)

    Lauring, Jakob

    2008-01-01

    In a globalized business environment, interaction across linguistic boundaries is becoming a normal part of everyday life. In these encounters language differences may affect the formation of social identities among organization members. While studies based on Social Identity Theory perceive...... the link between identity and language to be linear, this article takes a different approach. By drawing on anthropological theories on ethnic identity it is argued that the relation between language and social identity is negotiated in interaction. In the empirical analysis the article focuses...... on the encounter between expatriates and local employees of a Danish subsidiary in England. The findings show that identity making may be actualized by competition for resources and recognition. This can be done by investing certain objects such as the symbolic application of language with certain identifications...

  6. Tracking moving identities: after attending the right location, the identity does not come for free.

    Directory of Open Access Journals (Sweden)

    Yaïr Pinto

    Full Text Available Although tracking identical moving objects has been studied since the 1980's, only recently the study into tracking moving objects with distinct identities has started (referred to as Multiple Identity Tracking, MIT. So far, only behavioral studies into MIT have been undertaken. These studies have left a fundamental question regarding MIT unanswered, is MIT a one-stage or a two-stage process? According to the one-stage model, after a location has been attended, the identity is released without effort. However, according to the two-stage model, there are two effortful stages in MIT, attending to a location, and attending to the identity of the object at that location. In the current study we investigated this question by measuring brain activity in response to tracking familiar and unfamiliar targets. Familiarity is known to automate effortful processes, so if attention to identify the object is needed, this should become easier. However, if no such attention is needed, familiarity can only affect other processes (such as memory for the target set. Our results revealed that on unfamiliar trials neural activity was higher in both attentional networks, and visual identification networks. These results suggest that familiarity in MIT automates attentional identification processes, thus suggesting that attentional identification is needed in MIT. This then would imply that MIT is essentially a two-stage process, since after attending the location, the identity does not seem to come for free.

  7. Identity transformation

    DEFF Research Database (Denmark)

    Neergaard, Helle; Robinson, Sarah; Jones, Sally

    , as well as the resources they have when they come to the classroom. It also incorporates perspectives from (ii) transformational learning and explores the concept of (iii) nudging from a pedagogical viewpoint, proposing it as an important tool in entrepreneurship education. The study incorporates......This paper develops the concept of ‘pedagogical nudging’ and examines four interventions in an entrepreneurship classroom and the potential it has for student identity transformation. Pedagogical nudging is positioned as a tool, which in the hands of a reflective, professional......) assists students in straddling the divide between identities, the emotions and tensions this elicits, and (iv) transform student understanding. We extend nudging theory into a new territory. Pedagogical nudging techniques may be able to unlock doors and bring our students beyond the unacknowledged...

  8. Identity Theft - The National Guard

    Science.gov (United States)

    Legislative Liaison Small Business Programs Social Media State Websites Videos Featured Videos On Every Front identity theft you discover someone is still fraudulently using your Social Security Number, you can Features Blended Retirement System Diversity Features by Year Identity Theft Posture Statement State

  9. On the performance of multiuser scheduling with post-examining under non-identical fading

    KAUST Repository

    Gaaloul, Fakhreddine

    2012-06-11

    We investigate the performance of a multiuser downlink access scheme based on a post-selection switch and examine algorithm. The studied scheme sequentially switches over the users that experience independent and non-identically distributed fading conditions, and selects a single user with an acceptable channel quality as compared to a pre-selected signal-to-noise ratio (SNR) threshold. If no one of the users can satisfy the target channel quality, the base station (BS) takes the advantage of the knowledge of all users channels and serves the user with the best channel quality among all users. This scheme reduces considerably the feedback load but offers a lower average spectral efficiency (ASE) as compared to that of the full feedback system with instantaneous best user selection. On the other hand, it improves the system performances, such as outage probability and average bit error rate (BER), as compared to a system that is based on a standard switching scheme without post-selection. Numerical results for the ASE average BER, and average feed back load, are presented for the cases of outdated and non-outdated rate-adaptive modulation scheme operating over independent and non-identically distributed users.

  10. On the performance of multiuser scheduling with post-examining under non-identical fading

    KAUST Repository

    Gaaloul, Fakhreddine; Alouini, Mohamed-Slim; Radaydeh, Redha M.; Yang, Hong-Chuan

    2012-01-01

    We investigate the performance of a multiuser downlink access scheme based on a post-selection switch and examine algorithm. The studied scheme sequentially switches over the users that experience independent and non-identically distributed fading conditions, and selects a single user with an acceptable channel quality as compared to a pre-selected signal-to-noise ratio (SNR) threshold. If no one of the users can satisfy the target channel quality, the base station (BS) takes the advantage of the knowledge of all users channels and serves the user with the best channel quality among all users. This scheme reduces considerably the feedback load but offers a lower average spectral efficiency (ASE) as compared to that of the full feedback system with instantaneous best user selection. On the other hand, it improves the system performances, such as outage probability and average bit error rate (BER), as compared to a system that is based on a standard switching scheme without post-selection. Numerical results for the ASE average BER, and average feed back load, are presented for the cases of outdated and non-outdated rate-adaptive modulation scheme operating over independent and non-identically distributed users.

  11. Human Rights and Cultural Identity

    Directory of Open Access Journals (Sweden)

    John-Stewart Gordon

    2015-12-01

    Full Text Available Universal human rights and particular cultural identities, which are relativistic by nature, seem to stand in conflict with each other. It is commonly suggested that the relativistic natures of cultural identities undermine universal human rights and that human rights might compromise particular cultural identities in a globalised world. This article examines this supposed clash and suggests that it is possible to frame a human rights approach in such a way that it becomes the starting point and constraining framework for all non-deficient cultural identities. In other words, it is possible to depict human rights in a culturally sensitive way so that universal human rights can meet the demands of a moderate version of meta-ethical relativism which acknowledges a small universal core of objectively true or false moral statements and avers that, beyond that small core, all other moral statements are neither objectively true nor false.

  12. Social Identity Perspective on Brand loyalty

    OpenAIRE

    He, Hongwei; Li, Yan; Harris, Lloyd

    2012-01-01

    This paper proposes a social identity perspective of customer–brand relationship and integrates brand identity and identification with value, trust and satisfaction in predicting brand loyalty. Two studies' empirical results support this path to brand loyalty framework. The results offer several theoretical implications. First, this research confirms the presence of significant direct and indirect effects of brand identity and brand identification on traditional antecedents of brand loyalty (...

  13. Irreducible Specht modules are signed Young modules

    OpenAIRE

    Hemmer, David J.

    2005-01-01

    Recently Donkin defined signed Young modules as a simultaneous generalization of Young and twisted Young modules for the symmetric group. We show that in odd characteristic, if a Specht module $S^\\lambda$ is irreducible, then $S^\\lambda$ is a signed Young module. Thus the set of irreducible Specht modules coincides with the set of irreducible signed Young modules. This provides evidence for our conjecture that the signed Young modules are precisely the class of indecomposable self-dual module...

  14. Introduction: Discourses of Identity

    DEFF Research Database (Denmark)

    Madsen, Peter

    2016-01-01

    Analysis of usages of ideas of 'identity' in relation to migration in Britain, France, and Germany, as well as in the Serbian anti-muslim war - with a view of demonstrating conceptual context of the usages.......Analysis of usages of ideas of 'identity' in relation to migration in Britain, France, and Germany, as well as in the Serbian anti-muslim war - with a view of demonstrating conceptual context of the usages....

  15. Identity development in deaf adolescents

    NARCIS (Netherlands)

    Kunnen, E. Saskia

    2014-01-01

    We studied identity development during 5 years in 11 deaf adolescents who attend a school for deaf children in the highest level of regular secondary education (age between 14 and 19 years). Identity development is conceptualized by the processes of exploration and commitment formation, as

  16. Social Identity and Group Contests

    NARCIS (Netherlands)

    Zaunbrecher, Henrik; Riedl, Arno

    2016-01-01

    Social identity has been shown to successfully enhance cooperation and effort in cooperation and coordination games. Little is known about the causal effect of social identity on the propensity to engage in group conflict. In this paper we explore theoretically and experimentally whether social

  17. Corporate identity: The concept, its measurement and management

    NARCIS (Netherlands)

    C.B.M. van Riel (Cees); J.M.T. Balmer (John)

    1997-01-01

    textabstractArticulates the main trends in the literature on corporate identity; defines corporate identity; explains the rationale for corporate identity management and describes the main methods used to reveal the desired and the actual corporate identity. Particular reference will be made to two

  18. Hierarchy of modular graph identities

    Energy Technology Data Exchange (ETDEWEB)

    D’Hoker, Eric; Kaidi, Justin [Mani L. Bhaumik Institute for Theoretical Physics, Department of Physics and Astronomy,University of California,Los Angeles, CA 90095 (United States)

    2016-11-09

    The low energy expansion of Type II superstring amplitudes at genus one is organized in terms of modular graph functions associated with Feynman graphs of a conformal scalar field on the torus. In earlier work, surprising identities between two-loop graphs at all weights, and between higher-loop graphs of weights four and five were constructed. In the present paper, these results are generalized in two complementary directions. First, all identities at weight six and all dihedral identities at weight seven are obtained and proven. Whenever the Laurent polynomial at the cusp is available, the form of these identities confirms the pattern by which the vanishing of the Laurent polynomial governs the full modular identity. Second, the family of modular graph functions is extended to include all graphs with derivative couplings and worldsheet fermions. These extended families of modular graph functions are shown to obey a hierarchy of inhomogeneous Laplace eigenvalue equations. The eigenvalues are calculated analytically for the simplest infinite sub-families and obtained by Maple for successively more complicated sub-families. The spectrum is shown to consist solely of eigenvalues s(s−1) for positive integers s bounded by the weight, with multiplicities which exhibit rich representation-theoretic patterns.

  19. Hierarchy of modular graph identities

    International Nuclear Information System (INIS)

    D’Hoker, Eric; Kaidi, Justin

    2016-01-01

    The low energy expansion of Type II superstring amplitudes at genus one is organized in terms of modular graph functions associated with Feynman graphs of a conformal scalar field on the torus. In earlier work, surprising identities between two-loop graphs at all weights, and between higher-loop graphs of weights four and five were constructed. In the present paper, these results are generalized in two complementary directions. First, all identities at weight six and all dihedral identities at weight seven are obtained and proven. Whenever the Laurent polynomial at the cusp is available, the form of these identities confirms the pattern by which the vanishing of the Laurent polynomial governs the full modular identity. Second, the family of modular graph functions is extended to include all graphs with derivative couplings and worldsheet fermions. These extended families of modular graph functions are shown to obey a hierarchy of inhomogeneous Laplace eigenvalue equations. The eigenvalues are calculated analytically for the simplest infinite sub-families and obtained by Maple for successively more complicated sub-families. The spectrum is shown to consist solely of eigenvalues s(s−1) for positive integers s bounded by the weight, with multiplicities which exhibit rich representation-theoretic patterns.

  20. Affiliative and "self-as-doer" identities: Relationships between social identity, social support, and emotional status amongst survivors of acquired brain injury (ABI).

    Science.gov (United States)

    Walsh, R Stephen; Muldoon, Orla T; Gallagher, Stephen; Fortune, Donal G

    2015-01-01

    Social support is an important factor in rehabilitation following acquired brain injury (ABI). Research indicates that social identity makes social support possible and that social identity is made possible by social support. In order to further investigate the reciprocity between social identity and social support, the present research applied the concepts of affiliative and "self-as-doer" identities to an analysis of relationships between social identity, social support, and emotional status amongst a cohort of 53 adult survivors of ABI engaged in post-acute community neurorehabilitation. Path analysis was used to test a hypothesised mediated model whereby affiliative identities have a significant indirect relationship with emotional status via social support and self-as-doer identification. Results support the hypothesised model. Evidence supports an "upward spiral" between social identity and social support such that affiliative identity makes social support possible and social support drives self-as-doer identity. Our discussion emphasises the importance of identity characteristics to social support, and to emotional status, for those living with ABI.

  1. Shifting identities : the musician as theatrical perfomer

    NARCIS (Netherlands)

    Hübner, Falk

    2013-01-01

    The artistic PhD research "Shifting Identities" investigates the musicians' professional identity and how this identity might shift when musicians start acting as theatrical performers. In most of the theatrical situations where musicians "perform", their profession is extended by additional tasks

  2. Claiming and displaying national identity: Irish travellers' and students' strategic use of 'banal' and 'hot' national identity in talk.

    Science.gov (United States)

    Joyce, Carmel; Stevenson, Clifford; Muldoon, Orla

    2013-09-01

    Two complementary explanations have been offered by social psychologists to account for the universal hold of national identity, first that national identity is ideologically assumed, as it forms the 'banal' background of everyday life, and second that national identity is 'hotly' constructed and contested in political and everyday settings to great effect. However, 'banal' and 'hot' aspects of national identity have been found to be distributed unevenly across national and subnational groups and banality itself can be strategically used to distinguish between different groups. The present paper develops these ideas by examining possible reasons for these different modes and strategies of identity expression. Drawing upon intergroup theories of minority and majority relations, we examine how a group who see themselves unequivocally as a minority, Irish Travellers, talk about their national identity in comparison to an age and gender-matched sample of Irish students. We find that Travellers proactively display and claim 'hot' national identity in order to establish their Irishness. Irish students 'do banality', police the boundaries and reputation of Irishness, and actively reject and disparage proactive displays of Irishness. The implications for discursive understandings of identity, the study of intra-national group relations and policies of minority inclusion are discussed. © 2012 The British Psychological Society.

  3. Identity, storytelling and the philanthropic journey

    Science.gov (United States)

    Maclean, Mairi; Harvey, Charles; Gordon, Jillian; Shaw, Eleanor

    2015-01-01

    This article develops theoretical understanding of the involvement of wealthy entrepreneurs in socially transformative projects by offering a foundational theory of philanthropic identity narratives. We show that these narratives are structured according to the metaphorical framework of the journey, through which actors envision and make sense of personal transformation. The journey provides a valuable metaphor for conceptualizing narrative identities in entrepreneurial careers as individuals navigate different social landscapes, illuminating identities as unfolding through a process of wayfinding in response to events, transitions and turning-points. We delineate the journey from entrepreneurship to philanthropy, and propose a typology of rewards that entrepreneurs claim to derive from giving. We add to the expanding literature on narrative identities by suggesting that philanthropic identity narratives empower wealthy entrepreneurs to generate a legacy of the self that is both self- and socially oriented, these ‘generativity scripts’ propelling their capacity for action while ensuring the continuation of their journeys. PMID:26456976

  4. Identity, storytelling and the philanthropic journey.

    Science.gov (United States)

    Maclean, Mairi; Harvey, Charles; Gordon, Jillian; Shaw, Eleanor

    2015-10-01

    This article develops theoretical understanding of the involvement of wealthy entrepreneurs in socially transformative projects by offering a foundational theory of philanthropic identity narratives. We show that these narratives are structured according to the metaphorical framework of the journey , through which actors envision and make sense of personal transformation. The journey provides a valuable metaphor for conceptualizing narrative identities in entrepreneurial careers as individuals navigate different social landscapes, illuminating identities as unfolding through a process of wayfinding in response to events, transitions and turning-points. We delineate the journey from entrepreneurship to philanthropy, and propose a typology of rewards that entrepreneurs claim to derive from giving. We add to the expanding literature on narrative identities by suggesting that philanthropic identity narratives empower wealthy entrepreneurs to generate a legacy of the self that is both self- and socially oriented, these 'generativity scripts' propelling their capacity for action while ensuring the continuation of their journeys.

  5. Adolescent identity development and distress in a clinical sample.

    Science.gov (United States)

    Wiley, Rachel E; Berman, Steven L

    2013-12-01

    The purpose of this study was to examine the relationships of identity development and identity distress to psychological adjustment within adolescents affected by psychological problems. Participants included 88 adolescents (43.2% female) ranging from 11 to 20 years of age who were receiving services from a community mental health center. A high proportion of the participants (22.7%) met the Diagnostic and Statistical Manual of Mental Disorders Fourth Edition Text Revision criteria for Identity Problem. Regression analyses found psychopathology symptom score was associated with identity distress, identity exploration, and identity commitment, while identity distress was only related to psychopathology symptom score and not the other two identity variables. Adolescents with a clinical diagnosis may report significant levels of identity distress. Given that the relationship between psychopathology and identity distress may be reciprocal, assessing for identity issues might be prudent when conducting clinical diagnostic interviews and useful in treatment planning. © 2013 Wiley Periodicals, Inc.

  6. Microscopic mechanism of identical multi-quasiparticle bands

    International Nuclear Information System (INIS)

    Lei Yian; Zhao Enguang; Zeng Jinyan

    1997-01-01

    Identical one-quasiparticle and two-quasiparticle bands in neighboring odd-and even-mass nuclei are recognized; The intrinsic structure of identical bands is demonstrated by using the particle-number-conserving (PNC) treatment. The occurrence of almost identical moments of inertia is the result of competition among the shell effect (including shape variation), pairing (anti-alignment) effect and blocking (anti-pairing) effect. The observed moments of inertia of identical multi-quasiparticle bands are reproduced quite well by the PNC calculation

  7. John Locke on persons and personal identity

    OpenAIRE

    Boeker, Ruth

    2013-01-01

    John Locke claims both that ‘person’ is a forensic term and that personal identity consists in sameness of consciousness. The aim of my dissertation is to explain and critically assess how Locke links his moral and legal account of personhood to his account of personal identity in terms of sameness of consciousness. My interpretation of Locke’s account of persons and personal identity is embedded in Locke’s sortal-dependent account of identity. Locke’s sortal-dependent ac...

  8. Biometrics and Identity Management

    DEFF Research Database (Denmark)

    management. BIOID 2008. The papers are categorized in four classes. These classes represent the 4 working groups of the COST Action 2101. For more information, see http://www.cost2101.org/.   Biometric data quality and multimodal biometric templates, Unsupervised interactive interfaces for multimodal...... security and border control scenarios it is now apparent that the widespread availability of biometrics in everyday life will also spin out an ever increasing number of (private) applications in other domains. Crucial to this vision is the management of the user's identity, which does not only imply...... biometrics, Biometric attacks and countermeasures, Standards and privacy issues for biometrics in identity documents and smart cards. BIOID 2008 is an initiative of the COST Action 2101 on Biometrics for Identity Documents and Smart Cards. It is supported by the EU Framework 7 Programme. Other sponsors...

  9. Learning as Negotiating Identities

    DEFF Research Database (Denmark)

    Jørgensen, Kenneth Mølbjerg; Keller, Hanne Dauer

    The paper explores the contribution of Communities of Practice (COP) to Human Resource Development (HRD). Learning as negotiating identities captures the contribution of COP to HRD. In COP the development of practice happens through negotiation of meaning. The learning process also involves modes...... of belonging constitutive of our identities. We suggest that COP makes a significant contribution by linking learning and identification. This means that learning becomes much less instrumental and much more linked to fundamental questions of being. We argue that the COP-framework links learning with the issue...... of time - caught in the notion of trajectories of learning - that integrate past, present and future. Working with the learners' notion of time is significant because it is here that new learning possibilities become visible and meaningful for individuals. Further, we argue that the concept of identity...

  10. Singapore: The Politics of Inventing National Identity

    Directory of Open Access Journals (Sweden)

    Stephan Ortmann

    2009-01-01

    Full Text Available This study wants to shed new light on the politics of Singapore’s national identity invention. Since independence in 1965, the Singaporean government has tried to generate a sense of national identity in Singapore. While at first, the priority was on pragmatic values to promote the economic development, this changed in the late 1980s when the government became concerned with the widespread materialism within the society. As an alternative, so-called Asian values sought to provide an ideological alternative and a new basis for a stronger national identity. At the same time, average Singaporeans have developed their own unique conceptions of the city-state’s national identity, which sometimes contradict the official nation-building efforts and thus constitute a subtle form of opposition. Many Singaporeans demand greater participation in the negotiation of their Singaporean identity, which demonstrates the difficulty of constructing a sustainable authoritarian civic national identity.

  11. Social interactions and the salience of social identity

    OpenAIRE

    McLeish, Kendra N.; Oxoby, Robert J.

    2008-01-01

    In this paper, we explore the effect of identity salience on behavior in a simple social interaction. Specifically, we compare behavior in a ultimatum game across three treatments: priming subjects with a shared identity, priming subjects with an identity distinct from those with whom they will interact, and priming subjects with no particular identity. We find that subjects are most cooperative in the identity-priming treatment and least cooperative in the distinctiveness-priming treatment. ...

  12. Intersecting Sexual, Gender, and Professional Identities among Social Work Students: The Importance of Identity Integration

    Science.gov (United States)

    Craig, Shelley L.; Iacono, Gio; Paceley, Megan S.; Dentato, Michael P.; Boyle, Kerrie E. H.

    2017-01-01

    Discrimination toward lesbian, gay, bisexual, transgender, and queer (LGBTQ) social work students can negatively affect academic performance and personal and professional identity development. Intersectionality is a conceptual approach that states that social identities interact to form different meanings and experiences from those that could be…

  13. Developing Identity for Lawyers

    OpenAIRE

    Høedt-Rasmussen, Inger

    2014-01-01

    The role of the lawyer is in transition and the formerly predominantly homogeneous profes-sion has become a heterogeneous group of lawyers with diverging perceptions of the lawyer’s identity and of the main characteristics of the profession. The European Union has extended the perception of democracy and the fundamental rights to include more collective rights, social concerns, global responsibility and sustainability. The dissertation’s main question is: How can the identity and competen...

  14. Specific Kaliningrad character of the Russian identity

    Directory of Open Access Journals (Sweden)

    Klemeshev Andrey

    2017-12-01

    Full Text Available There are different levels of territorial identity perceived as a sense of belonging to a particular social and territorial community. People residing in any region identify themselves with these levels to a different degree. Since 2001, the authors have been doing sociological research into the territorial identity of the population of the Kaliningrad region, which became a Russia’s exclave after the demise the USSR. The research shows that residents of the Kaliningrad region associate themselves with different territorial communities to a varying degree starting with an ever strengthening sense of national identity, followed by the regional and local identity. The sense of macro-regional (European and global identity is significantly lower.

  15. The national identity politics of Danish humanitarianism

    DEFF Research Database (Denmark)

    Christiansen, Lene Bull

    and proposes to look beyond the mainstream US/UK contexts in order to make this point. The paper takes point of departure in the annual Danish aid telethon Danmarks Indsamling (Denmark’s Collection). Against the backdrop of the local identity politics in Denmark revolving around immigration policies...... of a collective identity narrative are seen to draw on the above-mentioned gendered and colonialist discourses while simultaneously engaging in local politics around diversity and national identity......., 2009; Jefferess, 2002; Repo and Yrjölä, 2011). While these studies provide important insights, another side remains – that of collective identity narratives associated with humanitarian appeals. This paper posits that collective identity narratives have a vital importance in many humanitarian appeals...

  16. Ward identities at finite temperature

    International Nuclear Information System (INIS)

    DOlivo, J.C.; Torres, M.; Tututi, E.

    1996-01-01

    The Ward identities for QED at finite temperature are derived using the functional real-time formalism. They are verified by an explicit one-loop calculation. An effective causal vertex is constructed which satisfy the Ward identity with the associated retarded self-energy. copyright 1996 American Institute of Physics

  17. 16 CFR 614.1 - Appropriate proof of identity.

    Science.gov (United States)

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Appropriate proof of identity. 614.1 Section... IDENTITY § 614.1 Appropriate proof of identity. (a) Consumer reporting agencies shall develop and implement reasonable requirements for what information consumers shall provide to constitute proof of identity for...

  18. 'Gay times': identity, locality, memory, and the Brixton squats in 1970's London.

    Science.gov (United States)

    Cook, Matt

    2013-01-01

    Through a thick description of a gay squatting community in south London in the 1970s, this piece explores the ways in which local histories complicate broader accounts of gay life, politics, and culture. Such a focus alerts us to the impact of personal encounters, of local politics, and material circumstances, of coincident local communities, of jobs (or the lack of them), and of major local events (like the Brixton riots of 1981). The local focus and the oral history sources also illuminate the complex ways in which unspoken and often unconscious imperatives associated with ethnicity, class, and the familial, social, and cultural contexts of our upbringings are played out under new and changing circumstances. Taking this approach fractures homogenizing assumptions about gay identity and community--even of a self-identified gay community like this squatting collective. It can also decentre sexuality as a primary category of identity and analysis as other factors come into sharper focus and shed light on the ebb and flow of identification and on the ways in which broader histories are woven into everyday lives. The piece thus considers different scales of analysis, the limits of identification, the inclusions and exclusions enacted when communities come together and identities coalesce, the continuities and discontinuities between broader and counter cultures (especially in relation to ideas and lived experiences of home), and the way memories of the squats and of the 1970s are modulated by subsequent national and gay politics, by AIDS, and by a profound sense of loss.

  19. Identity, History, Tolerance

    Directory of Open Access Journals (Sweden)

    Surovtsev V.A.

    2016-01-01

    Full Text Available The article discusses the role of historical narratives in the formation of identity. Rüsen’s thesis on the contradiction of traditional historical identities that suggest an ethnocentric position with the processes of intercultural communication is analyzed. The potential of historical narratives in overcoming (or restricting ethnocentrism is considered. It is shown that ethnocentrism is constituted by kinds of the configuration of historical writing rather than by a subjective position of historical narrative authors. The types of stories suggest a the way of making history using only the criteria of success and failure in the interpretation of the past; b interpretation of history as teleological continuity; c merely the necessity to justify (to substantiate claims or to discredit something. It is alleged that the realization that the form of historical knowledge constructs, not discovers, can facilitate liberation from referential fallacy on the whole and enslavement by certain kinds of stories in particular. It is concluded that the recognition of the constitutive nature of historical narratives allows being independent from the traditional forms of historical knowledge and traditional ideas about their cultural value. In particular, it allows reconsidering the need to apply historical knowledge when constructing identity.

  20. Reorienting Deliberation: Identity Politics in Multicultural Societies

    Directory of Open Access Journals (Sweden)

    Rebecca Mason

    2010-03-01

    Full Text Available Many political theorists argue that cross-cultural communication within multicultural democracies is not best served by a commitment to identity politics. In response, I argue that identity politics only interfere with democratic participation according to an erroneous interpretation of the relationship between identity and reasoning. I argue that recognizing the importance of identity to the intelligibility of reasons offered in the context of civic deliberation is the first step towards the kind of dialogue that democratic participation requires.

  1. [Identity theft

    CERN Multimedia

    Wolinksy, H

    2003-01-01

    "A new survey by the Federal Trade Commission indicates that over the last five years one in four American households has been hit by identity theft, which can result in thieves tapping their victims' credit cards or bank accounts" (1 page).

  2. The Multiple In-group Identity Framework

    OpenAIRE

    Lock, Daniel; Funk, D.C.

    2016-01-01

    The effects of team identification on sport consumer behaviour are well established. Recent research, however, has moved beyond this perspective to examine how groups within and beyond the team identity influence consumption. Assimilating previous research findings, we advance a Multiple In-group Identity Framework (MIIF), which consists of three levels: (1) superordinate (e.g., team identity), (2) subgroup (e.g., specific stadium area), and (3) relational group (e.g., friends or family). In ...

  3. Material Construction of Care Workers’ Identity

    OpenAIRE

    Sanna Laulainen; Anneli Hujala

    2016-01-01

    This article takes a critical look at the unconscious and unnoticed effects of materiality on care workers’ identity. The data was collected through nonactive role-playing using written accounts, in which the respondents described how they felt about working in fictitious ‘good’ or ‘bad’ elderly care homes. The data was analyzed with rhetorical analysis. Five different identity strategies were identified in the accounts. Strong professional identity was defended by downplaying the significanc...

  4. Toward automatic phenotyping of retinal images from genetically determined mono- and dizygotic twins using amplitude modulation-frequency modulation methods

    Science.gov (United States)

    Soliz, P.; Davis, B.; Murray, V.; Pattichis, M.; Barriga, S.; Russell, S.

    2010-03-01

    This paper presents an image processing technique for automatically categorize age-related macular degeneration (AMD) phenotypes from retinal images. Ultimately, an automated approach will be much more precise and consistent in phenotyping of retinal diseases, such as AMD. We have applied the automated phenotyping to retina images from a cohort of mono- and dizygotic twins. The application of this technology will allow one to perform more quantitative studies that will lead to a better understanding of the genetic and environmental factors associated with diseases such as AMD. A method for classifying retinal images based on features derived from the application of amplitude-modulation frequency-modulation (AM-FM) methods is presented. Retinal images from identical and fraternal twins who presented with AMD were processed to determine whether AM-FM could be used to differentiate between the two types of twins. Results of the automatic classifier agreed with the findings of other researchers in explaining the variation of the disease between the related twins. AM-FM features classified 72% of the twins correctly. Visual grading found that genetics could explain between 46% and 71% of the variance.

  5. 27 CFR 5.22 - The standards of identity.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2010-04-01 2010-04-01 false The standards of identity..., DEPARTMENT OF THE TREASURY LIQUORS LABELING AND ADVERTISING OF DISTILLED SPIRITS Standards of Identity for Distilled Spirits § 5.22 The standards of identity. Standards of identity for the several classes and types...

  6. Fibonacci Identities via the Determinant Sum Property

    Science.gov (United States)

    Spivey, Michael

    2006-01-01

    We use the sum property for determinants of matrices to give a three-stage proof of an identity involving Fibonacci numbers. Cassini's and d'Ocagne's Fibonacci identities are obtained at the ends of stages one and two, respectively. Catalan's Fibonacci identity is also a special case.

  7. Signed Young Modules and Simple Specht Modules

    OpenAIRE

    Danz, Susanne; Lim, Kay Jin

    2015-01-01

    By a result of Hemmer, every simple Specht module of a finite symmetric group over a field of odd characteristic is a signed Young module. While Specht modules are parametrized by partitions, indecomposable signed Young modules are parametrized by certain pairs of partitions. The main result of this article establishes the signed Young module labels of simple Specht modules. Along the way we prove a number of results concerning indecomposable signed Young modules that are of independent inter...

  8. Splitting Ward identity

    Energy Technology Data Exchange (ETDEWEB)

    Safari, Mahmoud [Institute for Research in Fundamental Sciences (IPM), School of Particles and Accelerators, P.O. Box 19395-5531, Tehran (Iran, Islamic Republic of)

    2016-04-15

    Within the background-field framework we present a path integral derivation of the splitting Ward identity for the one-particle irreducible effective action in the presence of an infrared regulator, and make connection with earlier works on the subject. The approach is general in the sense that it does not rely on how the splitting is performed. This identity is then used to address the problem of background dependence of the effective action at an arbitrary energy scale. We next introduce the modified master equation and emphasize its role in constraining the effective action. Finally, application to general gauge theories within the geometric approach is discussed. (orig.)

  9. Splitting Ward identity

    International Nuclear Information System (INIS)

    Safari, Mahmoud

    2016-01-01

    Within the background-field framework we present a path integral derivation of the splitting Ward identity for the one-particle irreducible effective action in the presence of an infrared regulator, and make connection with earlier works on the subject. The approach is general in the sense that it does not rely on how the splitting is performed. This identity is then used to address the problem of background dependence of the effective action at an arbitrary energy scale. We next introduce the modified master equation and emphasize its role in constraining the effective action. Finally, application to general gauge theories within the geometric approach is discussed. (orig.)

  10. Law and Identity

    DEFF Research Database (Denmark)

    Schmidt, Garbi

    2011-01-01

    processes of social integration. Within media-based and political debates, transnational marriages are frequently described as practices destructive both to individual freedom and to Danish national identity. Nonetheless, it is a practice in which both minority and majority citizens engage, one that frames...... both their family lives and their lives as citizens. This article analyses the dynamic relationship between public discourse and practices of transnational marriage. The first part describes how political and legislative perceptions of transnational (arranged) marriages are situated within a discussion......' expressions of autonomy and choice and their adaptations of such concepts to understandings of social belonging, inclusion and identity formation vis--vis the Danish nation-state....

  11. Protecting Personal Information in the Era of Identity Theft: Just how Safe is Our Personal Information from Identity Thieves?

    Directory of Open Access Journals (Sweden)

    Fawzia Cassim

    2015-07-01

    Full Text Available Identity theft has become one of the fastest growing white collar crimes in the world. It occurs when an individual's personal information such as inter alia his or her name, date of birth or credit card details is used by another individual to commit identity fraud. Identity theft can be committed via physical means or online. The increased use of the Internet for business and financial transactions, social networking and the storage of personal information has facilitated the work of identity thieves. Identity theft has an impact on the personal finances and emotional well-being of victims, and on the financial institutions and economies of countries. It presents challenges for law enforcement agencies and governments worldwide. This article examines how identity thieves use the personal information of individuals to commit identity fraud and theft, and looks at legislative solutions introduced in South Africa, the United States of America, the United Kingdom and India to combat identity theft crimes. The article examines measures introduced by the respective governments in these countries to counteract such crimes. Finally, the article will propose a way forward to counteract such crimes in the future. The study reveals that identity theft is a growing and evolving problem that requires a multi-faceted and multi-disciplinary approach by law enforcement agencies, businesses, individuals and collaboration between countries. It is advocated that businesses and institutions should take measures to protect personal information better and that individuals should be educated about their rights, and be vigilant and protect their personal information offline and in cyberspace.

  12. Political Identities and Latin American Film Portraits

    Directory of Open Access Journals (Sweden)

    Juan Bautista Lucca

    2015-07-01

    Full Text Available This assay uses the cinema as an expression of culture that has the ability to portray different ways to build identities, to condense on an image different identities path. For example, in the film Machuca, we can see how political identities experience a social split; in Memoria del saqueo we can observe how social and political construction of an identity could be understood as a sign of the past that came back to the present; in Fresa y chocolate and also the films Santera, La estrategia del caracol and La ley de Herodes, we can observe the identity clash with the “other”, that shapes and stressed that thing “we” are; finally, a film is also becomes a field to think about identity construction process that open a new future like in Diario de motocicleta, or open the possibility to return to our old certainties like in El hijo de la novia. Keywords:

  13. Exploring Leader Identity and Development.

    Science.gov (United States)

    Priest, Kerry L; Middleton, Eric

    2016-01-01

    Taking on a leader identity can be a motivating force for pursuing leader development. This chapter explores the reciprocal and recursive nature of identity development and leader development, emphasizing how shifting views of self influence one's motivation to develop as a leader. © 2016 Wiley Periodicals, Inc., A Wiley Company.

  14. Social identities as pathways into and out of addiction

    Directory of Open Access Journals (Sweden)

    Genevieve Anita Dingle

    2015-11-01

    Full Text Available There exists a predominant identity loss and redemption narrative in the addiction literature describing how individuals move from a substance user identity to a recovery identity. However, other identity related pathways influencing onset, treatment seeking and recovery may exist, and the process through which social identities unrelated to substance use change over time is not well understood. This study was designed to provide a richer understanding of such social identities processes. Semi-structured interviews were conducted with 21 adults residing in a drug and alcohol therapeutic community (TC and thematic analysis revealed two distinct identity-related pathways leading into and out of addiction. Some individuals experienced a loss of valued identities during addiction onset that were later renewed during recovery (consistent with the existing redemption narrative. However, a distinct identity gain pathway emerged for socially isolated individuals, who described the onset of their addiction in terms of a new valued social identity. Almost all participants described their TC experience in terms of belonging to a recovery community. Participants on the identity loss pathway aimed to renew their pre-addiction identities after treatment while those on the identity gain pathway aimed to build aspirational new identities involving study, work, or family roles. These findings help to explain how social factors are implicated in the course of addiction, and may act as either motivations for or barriers to recovery. The qualitative analysis yielded a testable model for future research in other samples and settings.

  15. Social Identities as Pathways into and out of Addiction

    Science.gov (United States)

    Dingle, Genevieve A.; Cruwys, Tegan; Frings, Daniel

    2015-01-01

    There exists a predominant identity loss and “redemption” narrative in the addiction literature describing how individuals move from a “substance user” identity to a “recovery” identity. However, other identity related pathways influencing onset, treatment seeking and recovery may exist, and the process through which social identities unrelated to substance use change over time is not well understood. This study was designed to provide a richer understanding of such social identities processes. Semi-structured interviews were conducted with 21 adults residing in a drug and alcohol therapeutic community (TC) and thematic analysis revealed two distinct identity-related pathways leading into and out of addiction. Some individuals experienced a loss of valued identities during addiction onset that were later renewed during recovery (consistent with the existing redemption narrative). However, a distinct identity gain pathway emerged for socially isolated individuals, who described the onset of their addiction in terms of a new valued social identity. Almost all participants described their TC experience in terms of belonging to a recovery community. Participants on the identity loss pathway aimed to renew their pre-addiction identities after treatment while those on the identity gain pathway aimed to build aspirational new identities involving study, work, or family roles. These findings help to explain how social factors are implicated in the course of addiction, and may act as either motivations for or barriers to recovery. The qualitative analysis yielded a testable model for future research in other samples and settings. PMID:26648882

  16. Constructing and enforcing "authentic" identity online: Facebook, real names, and non-normative identities

    OpenAIRE

    Haimson, Oliver L.; Hoffmann, Anna Lauren

    2016-01-01

    Despite the participatory and democratic promises of Web 2.0, many marginalized individuals with fluid or non-normative identities continue to struggle to represent themselves online. Facebook users, in particular, are told to use “authentic identities,” an idea reinforced throughout the site’s documentation, “real name” and other policies, and in public statements by company representatives. Facebook’s conception of authenticity and real names, however, has created problems for certain users...

  17. PERSONAL IDENTITY IN DEAF ADOLESCENTS

    Directory of Open Access Journals (Sweden)

    Joanna KOSSEWSKA

    2008-06-01

    Full Text Available The purpose of this study was to investigate the factors influencing the identity deaf adolescents. The study involved 67 deaf adolescents (38 boys and 29 girls aged 16 to 19 students of secondary school. Ninety-three hearing children constituted a comparison group. The structure of identity was explored on the basis of identification references given by the subjects who were to reply in writing, 20 times running, to the question: „Who Am I?” the test, adapted from M. H. Kuhn and T. S. McPartland by Martines and Silvestre (1995 given in written and signed mode.Results showed that the hearing status as well as mode of communication influence the description of personal identity. It was found that deaf adoles­cents used more descriptions especially in the fol­lowing categories: Civil Status, Body and Physical Appearance, Tastes and Activities, Friendship and Relationships, Personal and Social Situation, Negative Personal Traits, and Neutral Personality Traits. Although this study could demonstrate im­pact independent variables on identity, the data raise the need for further, preferably longitudinal, research. This complex phenomenon has to be examined more closely.Combined self-descriptive processes lead to the development of an organized, learned and dynamic identity, and subjective description of an individ­ual has strong emotional consequences for the in­dividual in question.

  18. The Responders’ Gender Stereotypes Modulate the Strategic Decision-Making of Proposers playing the Ultimatum Game

    OpenAIRE

    Fabre, Eve Floriane; Causse, Mickael; Pesciarelli, Francesca; Cacciari, Cristina

    2016-01-01

    Despite the wealth of studies investigating factors affecting decisions, not much is known about the impact of stereotypical beliefs on strategic economic decision-making. In the present study, we used the ultimatum game paradigm to investigate how participants playing as proposer modulate their strategic economic behavior, according to their game counterparts’ stereotypical identity (i.e., responders). The latter were introduced to the participants using occupational role nouns stereotypical...

  19. Authenticity in Leadership: Intersectionality of Identities.

    Science.gov (United States)

    Jones, Susan R

    2016-12-01

    This chapter situates leadership and the process of becoming a leader within an understanding of identity, particularly intersecting social identities and intersectionality. © 2016 Wiley Periodicals, Inc., A Wiley Company.

  20. WORK AND LEARNER IDENTITY

    DEFF Research Database (Denmark)

    Kondrup, Sissel

    2015-01-01

    The aim of this article is to suggest a theoretical framework than can assess to how people’s engagement in specific historical and social work practices are significant to their development, maintenance or transformation of a learner identity. Such a framework is crucial in order to grasp how...... different groups have distinctive conditions for meeting the obligation of forming a proactive learner identity and engage in lifelong learning prevalent in both national and transnational policies on lifelong learning....

  1. The Multicultural Identity Integration Scale (MULTIIS): Developing a comprehensive measure for configuring one's multiple cultural identities within the self.

    Science.gov (United States)

    Yampolsky, Maya A; Amiot, Catherine E; de la Sablonnière, Roxane

    2016-04-01

    The research investigating how one's multiple cultural identities are configured within the self has yet to account for existing cultural identity configurations aside from integration, and for identifying with more than 2 cultural groups at once. The current research addresses these issues by constructing the Multicultural Identity Integration Scale (MULTIIS) to examine 3 different multicultural identity configurations, and their relationship to well-being based on Amiot and colleagues' (2007) cognitive-developmental model of social identity integration (CDSMII). Diverse samples of multicultural individuals completed the MULTIIS along with identity and well-being measures. (Study 1A: N = 407; 1B: N = 310; 2A = 338 and 2A = 254) RESULTS: Reliability and confirmatory factorial analyses (Studies 1A and 2A) all supported the factorial structure of the MULTIIS. Regression analyses (Studies 1B and 2B) confirmed that the integration subscale of the MULTIIS positively predicted well-being, whereas compartmentalization negatively predicted well-being. Categorization was inconsistently related to well-being. These findings support the CDSMII and the usefulness of the MULTIIS measure, and suggest that each identity configuration is uniquely related to well-being outcomes. (c) 2016 APA, all rights reserved).

  2. Application and the Identity of Mathematics

    DEFF Research Database (Denmark)

    Jensen, Kasper Bjering Søby

    In the paper a conceptual framework for discussing the identity of mathematics as a school subject is constructed with particular emphasize on application of mathematics. The framework is used to analyze the identity of mathematics, as it appears on two different kinds of domains: the political s...... system and the teachers. At the end it is discussed whether this frameworks gives us new insights into mathematics teaching. It is concluded that the framework can articulates important aspects.......In the paper a conceptual framework for discussing the identity of mathematics as a school subject is constructed with particular emphasize on application of mathematics. The framework is used to analyze the identity of mathematics, as it appears on two different kinds of domains: the political...

  3. Identity as a narrative of autobiography

    Directory of Open Access Journals (Sweden)

    Luba Jakubowska

    2010-12-01

    Full Text Available This article is a proposal of identity research through its process and narrative character. As a starting point I present a definition of identity understood as the whole life process of finding identification. Next I present my own model of auto/biography-narrative research inspired by hermeneutic and phenomenological traditions of thinking about experiencing reality. I treat auto/biography-narrative research as a means of exploratory conduct, based on the narrator’s biography data, also considering the researcher’s autobiographical thought. In the final part of the article I focus on showing the narrative structure of identity and autobiography. I emphasise this relation in definitions qualifying autobiography as written life narration and identity as a narration of autobiography.

  4. Identity negotiations in meetings

    DEFF Research Database (Denmark)

    Asmuß, Birte; Oshima, Sae

    of the company, and all members know (and display) that he holds some information that the rest don’t have access to. Our analysis shows that the participants evoke various identities of the manager, sometimes orienting to the structure of the organization, and other times orienting to wider social categories......Meetings are places, where identity negotiation is a central activity and where members’ local practices recurrently inform and are informed by larger categories (Antaki and Widdicombe 1998). Correspondingly, the approach to understanding organization (macro) by way of identity work (micro) has...... company, and in the data recorded over 10 days, the employees frequently complain about the many changes that have taken place. Our focus lies in a unique occasion where one of the managers makes an unusual appearance at the lunchroom. In this situation, he is the only one that is on the business side...

  5. An integrated developmental model for studying identity content in context.

    Science.gov (United States)

    Galliher, Renee V; McLean, Kate C; Syed, Moin

    2017-11-01

    Historically, identity researchers have placed greater emphasis on processes of identity development (how people develop their identities) and less on the content of identity (what the identity is). The relative neglect of identity content may reflect the lack of a comprehensive framework to guide research. In this article, we provide such a comprehensive framework for the study of the content of identity, including 4 levels of analysis. At the broadest level, we situate individual identity within historical, cultural, and political contexts, elaborating on identity development within the context of shifting cultural norms, values, and attitudes. Histories of prejudice and discrimination are relevant in shaping intersections among historically marginalized identities. Second, we examine social roles as unique and central contexts for identity development, such that relationship labels become integrated into a larger identity constellation. Third, domains of individual or personal identity content intersect to yield a sense of self in which various aspects are subjectively experienced as an integrated whole. We explore the negotiation of culturally marginalized and dominant identity labels, as well as idiosyncratic aspects of identities based on unique characteristics or group memberships. Finally, we argue that the content of identity is enacted at the level of everyday interactions, the "micro-level" of identity. The concepts of identity conflict, coherence, and compartmentalization are presented as strategies used to navigate identity content across these 4 levels. This framework serves as an organizing tool for the current literature, as well as for designing future studies on the identity development. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  6. Modulating bacterial and gut mucosal interactions with engineered biofilm matrix proteins.

    Science.gov (United States)

    Duraj-Thatte, Anna M; Praveschotinunt, Pichet; Nash, Trevor R; Ward, Frederick R; Joshi, Neel S

    2018-02-22

    Extracellular appendages play a significant role in mediating communication between bacteria and their host. Curli fibers are a class of bacterial fimbria that is highly amenable to engineering. We demonstrate the use of engineered curli fibers to rationally program interactions between bacteria and components of the mucosal epithelium. Commensal E. coli strains were engineered to produce recombinant curli fibers fused to the trefoil family of human cytokines. Biofilms formed from these strains bound more mucins than those producing wild-type curli fibers, and modulated mucin rheology as well. When treated with bacteria producing the curli-trefoil fusions mammalian cells behaved identically in terms of their migration behavior as when they were treated with the corresponding soluble trefoil factors. Overall, this demonstrates the potential utility of curli fibers as a scaffold for the display of bioactive domains and an untapped approach to rationally modulating host-microbe interactions using bacterial matrix proteins.

  7. Designer's Identity

    DEFF Research Database (Denmark)

    Kunrath, Kamila; Cash, Philip; Li-Ying, Jason

    2016-01-01

    A designer’s professional identity (DPI) develops through both education and professional experience, building on core personality traits and innate skills. In this paper a systematic literature review and a secondary narrative review were developed in order to map personal attributes and design...

  8. Citizenship education and identity in Europe

    OpenAIRE

    Ross, Alistair

    2007-01-01

    This article surveys some of the theoretical bases of identity and citizenship and their implications for potential European identity and citizenship, and relates these to the CiCe network of teacher educators and others. CiCe (Children’s identity and Citizenship in Europe) is a European Commission supported network of 100 European Universities, in 19 countries, who have worked together since 1998 in building links in higher education courses and research, in the education of teachers, socia...

  9. Play Memories and Place Identity.

    Science.gov (United States)

    Sandberg, Anette

    2003-01-01

    This retrospective study examined play memories from childhood to adulthood of 478 university students between ages 20 and 62 as exhibited in drawings of play memories and questionnaire responses. The study focused on the role of the physical environment and place identity in play memories and individual identity development. Findings showed that…

  10. Role-meanings as a critical factor in understanding doctor managers' identity work and different role identities.

    Science.gov (United States)

    Cascón-Pereira, Rosalía; Chillas, Shiona; Hallier, Jerry

    2016-12-01

    This study examines "identity work" among hybrid doctor-managers (DMs) in the Spanish National Health System to make sense of their managerial roles. In particular, the meanings underlying DMs experience of their hybrid role are investigated using a Grounded Theory methodology, exposing distinctions in role-meanings. Our findings provide evidence that using different social sources of comparison (senior managers or clinicians) to construct the meaning of managerial roles leads to different role-meanings and role identities, which are the source of the two established types of DM in the literature, the reluctant and the enthusiast. The contribution is twofold: our findings lead us to theorize DMs' identity work processes by adding an overlooked role-meaning dimension to identity work; and raise practical reflections for those who wish to develop enthusiast doctor managers. Copyright © 2016 Elsevier Ltd. All rights reserved.

  11. Developing a Leadership Identity: A Grounded Theory

    Science.gov (United States)

    Komives, Susan R.; Owen, Julie E; Longerbeam, Susan D.; Mainella, Felicia C.; Osteen, Laura

    2005-01-01

    This grounded theory study on developing a leadership identity revealed a 6-stage developmental process. The thirteen diverse students in this study described their leadership identity as moving from a leader-centric view to one that embraced leadership as a collaborative, relational process. Developing a leadership identity was connected to the…

  12. Layering spatial identities: the identity discourses of new regions

    NARCIS (Netherlands)

    Terlouw, K.; van Gorp, B.H.

    2014-01-01

    The number and importance of regions are increasing at the same time as traditional regional identities are undermined through processes like globalisation and individualisation. Local and other administrations increasingly cooperate and create new regions which are too changeable for a distinct

  13. Suicidal Ideation and Attempt among Adolescents Reporting "Unsure" Sexual Identity or Heterosexual Identity Plus Same-Sex Attraction or Behavior: Forgotten Groups?

    Science.gov (United States)

    Zhao, Yue; Montoro, Richard; Igartua, Karine; Thombs, Brett D.

    2010-01-01

    Objective: To compare risk of suicide ideation and attempts in adolescents with 1) gay, lesbian, or bisexual (GLB) identity, 2) "unsure" identity, or 3) heterosexual identity with same-sex attraction/fantasy or behavior, to heterosexual identity without same-sex attraction/fantasy or behavior. Method: A total of 1,856 students 14 years…

  14. Superconformal Ward identities and the supertorus

    International Nuclear Information System (INIS)

    Grundberg, J.; Nakayama, R.

    1987-12-01

    We derive superconformal Ward identities in the context of superspace supergravity. From these Ward identities we extract operator product expansions and the case of a supertorus is studied in some detail. (orig.)

  15. Group membership and social identity in addiction recovery.

    Science.gov (United States)

    Buckingham, Sarah A; Frings, Daniel; Albery, Ian P

    2013-12-01

    Despite a growing interest in how group membership can positively impact health, little research has addressed directly the role social identity processes can have on recovery from addiction. Drawing on social identity theory and self-categorization theory, the present study investigated how recovery group membership can introduce a new social identity associated with recovery, compared to the social identity associated with addiction. We hypothesized that two processes--evaluative differentiation and identity preference--would be linked with higher self-efficacy and positive health outcomes (i.e., reduced relapse, lower levels of appetitive behavior, and elevated feelings of social connectedness [Study 2]). Study 1 recruited members (N = 61) from United Kingdom based mutual aid groups of Alcoholics Anonymous and Narcotics Anonymous. Study 2 recruited ex-smokers (N = 81) from online sources. In Study 1, evaluative differentiation was significantly related to lowered relapse and reduced appetitive behavior. Identity preference was related to higher levels of self-efficacy, which was related to months drug-free and reduced levels of appetitive behaviors. In Study 2, evaluative differentiation was related to identity preference. Identity preference was also related to higher self-efficacy, which in turn was related to lower relapse. Although exploratory, these results suggest that developing a social identity as a "recovering addict" or an "ex-smoker" and subsequently highlighting the difference between such identities may be a useful strategy for reducing relapse among people with problems associated with addictive behaviors. PsycINFO Database Record (c) 2013 APA, all rights reserved.

  16. 7 CFR 800.88 - Loss of identity.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 7 2010-01-01 2010-01-01 false Loss of identity. 800.88 Section 800.88 Agriculture... Methods and Procedures § 800.88 Loss of identity. (a) Lots. Except as noted in paragraph (d) of this... personnel performing a reinspection, appeal inspection, or Board appeal inspection service, the identity of...

  17. 30 CFR 41.20 - Legal identity report.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 1 2010-07-01 2010-07-01 false Legal identity report. 41.20 Section 41.20... ADMINISTRATIVE REQUIREMENTS NOTIFICATION OF LEGAL IDENTITY Operator's Report to the Mine Safety and Health Administration § 41.20 Legal identity report. Each operator of a coal or other mine shall file notification of...

  18. 28 CFR 802.13 - Verifying your identity.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Verifying your identity. 802.13 Section... COLUMBIA DISCLOSURE OF RECORDS Privacy Act § 802.13 Verifying your identity. (a) Requests for your own records. When you make a request for access to records about yourself, you must verify your identity. You...

  19. Retirees' Social Identity and Satisfaction with Retirement

    Science.gov (United States)

    Michinov, Estelle; Fouquereau, Evelyne; Fernandez, Anne

    2008-01-01

    The purpose of this study was to examine the structure of retirees' social identity and its impact on satisfaction with retirement. From social identity theory formulations, we assumed that (1) retiree-identity was comprised of three distinct components (cognitive, evaluative, and affective), and (2) only the affective component would play a role…

  20. [Identity and narration: autobiographical quests].

    Science.gov (United States)

    Arfuch, Leonor

    2013-01-01

    This paper aims to tackle the subtle relation between autobiographical narratives and identity construction, from a non essentialist conception of identity. In a perspective that articulates philosophy of language, psychoanalysis, semiotics and literary critique, we posit the concept of biographical space as an analytical instrument to make a critical update of the reconfiguration of identities and subjectivities in contemporary culture, marked by the predominance of the biographical, the private and a kind of "public intimacy". This look is more symptomatic than descriptive: it intends to account for the rise of auto/biographical narratives and life-stories, from canonic genres to their multiple derivations in the media, social networks and the most diverse artistic practices, a phenomenon that seems to reaffirm the notion of narrative identities by Ricoeur. Our analysis here, from an ethic, aesthetic and political point of view, will focus on two visual arts experiences that have recently taken place for the first time in Buenos Aires: Christian Boltanski's and Tracey Emin's, solo exhibitions, each of them with a different biographical approach.

  1. Constructing and Reconstructing Narrative Identity

    Directory of Open Access Journals (Sweden)

    Gabriele Lucius-Hoene

    2000-06-01

    Full Text Available The research work done by the author investigates a phenomenological field—the subjective experience of chronic illness and disability—by means of a specific research instrument, the autobiographical narrative interview. It focuses on the concept of narrative identity and its empirical substrate in the scientifically generated texts. Narrative identity is regarded as a situated, pragmatic, autoepistemic and interactive activity drawing on culturally transmitted narrative conventions which is performed within the research context. We have been working with a systematic analytic approach which covers interactive and contextual aspects of the interview situation as well as rhetoric and positioning strategies in the act of telling. Other research questions concern the concept of "narrative coping" and the comparison of partner's narratives on problems of illness and disability, especially on scrutinizing aspects of identity and alterity (self and other in the texts. This work can be understood as combining aspects of the research domains of narratology, identity and coping on the background of a qualitative methodology. URN: urn:nbn:de:0114-fqs0002189

  2. Identity, causality, and pronoun ambiguity.

    Science.gov (United States)

    Sagi, Eyal; Rips, Lance J

    2014-10-01

    This article looks at the way people determine the antecedent of a pronoun in sentence pairs, such as: Albert invited Ron to dinner. He spent hours cleaning the house. The experiment reported here is motivated by the idea that such judgments depend on reasoning about identity (e.g., the identity of the he who cleaned the house). Because the identity of an individual over time depends on the causal-historical path connecting the stages of the individual, the correct antecedent will also depend on causal connections. The experiment varied how likely it is that the event of the first sentence (e.g., the invitation) would cause the event of the second (the house cleaning) for each of the two individuals (the likelihood that if Albert invited Ron to dinner, this would cause Albert to clean the house, versus cause Ron to clean the house). Decisions about the antecedent followed causal likelihood. A mathematical model of causal identity accounted for most of the key aspects of the data from the individual sentence pairs. Copyright © 2014 Cognitive Science Society, Inc.

  3. Monetary Organization and National Identity

    DEFF Research Database (Denmark)

    Ravn Sørensen, Anders

    2016-01-01

    This article develops a detailed overview of literature on the relationship between monetary organization, understood as currencies and central banks, and issues of national identity and nationalism. It demonstrates how the literature on this subject for the past 20 years has developed into a dis......This article develops a detailed overview of literature on the relationship between monetary organization, understood as currencies and central banks, and issues of national identity and nationalism. It demonstrates how the literature on this subject for the past 20 years has developed...... into a distinct research field and the article sketches a set of different methodological approaches as well as geographical and thematical variations within the field. In particular, the overview points to a recent shift in focus from a preoccupation with the identity-cultivating qualities of monetary...... organization to an emphasis on how collective identities legitimize monetary organization. Based on the literature review, the article points to two underdeveloped themes for future research to investigate: (1) further studies on the interrelation between the legitimacy of monetary organization and national...

  4. I am remix your web identity

    CERN Document Server

    Sordi, Paolo

    2015-01-01

    I Am: Remix Your Web Identity explores methods of designing and developing a personal website with RSS feeds that aggregate blog posts along with posts on social networks, such as Flickr, YouTube, Goodreads, Last.fm, and Delicious, in order to regain control and ownership (as well as authorship) of one's identity in one consistent and customized location. The book provides a short overview of the evolution of digital identity and the transformation of personal websites from Geocities to blogs...

  5. IDENTITY AND THE EUROPEAN UNION

    Directory of Open Access Journals (Sweden)

    Abrudan Cristina

    2008-05-01

    Full Text Available The purpose of this article is to throw some light on the question of identity in the European Union. The challenge is to understand how identity formation takes place in the contemporary world. The European integration has to be understood both as a process of socio-economic convergence among European states but also as a process of co-operation on different other levels, too. It seems that cultures, traditions and interests are more and more interconnected as societies become increasingly multicultural. This is the reason why people are concerned with the concept of identity and the recognition of their uniqueness in terms of traditions, values and ways of lives.

  6. Social identity and cooperation in cultural evolution.

    Science.gov (United States)

    Smaldino, Paul E

    2017-12-06

    I discuss the function of social identity signaling in facilitating cooperative group formation, and how the nature of that function changes with the structure of social organization. I propose that signals of social identity facilitate assortment for successful coordination in large-scale societies, and that the multidimensional, context-dependent nature of social identity is crucial for successful coordination when individuals have to cooperate in different contexts. Furthermore, the structure of social identity is tied to the structure of society, so that as societies grow larger and more interconnected, the landscape of social identities grows more heterogeneous. This discussion bears directly on the need to articulate the dynamics of emergent, ephemeral groups as a major factor in human cultural evolution. Copyright © 2017 The Author. Published by Elsevier B.V. All rights reserved.

  7. Competition and Social Identity in the Workplace

    DEFF Research Database (Denmark)

    Kato, Takao; Shu, Pian

    2016-01-01

    We study the impact of social identity on worker competition by exploiting the well-documented social divide between urban resident workers and rural migrant workers in urban Chinese firms. We analyze data on weekly output, individual characteristics, and coworker composition for all weavers...... in an urban Chinese textile firm during a 53-week period. The firm adopts relative performance incentives in addition to piece rates to encourage competition in the workplace. We find that social identity has a significant impact on competition: a weaver only competes against coworkers with a different social...... identity, but not against those sharing her own identity. The results are mainly driven by urban weavers competing aggressively against rural coworkers. Our results highlight the important role of social identity in mitigating or enhancing competition....

  8. Collective Identity Formation in Hybrid Organizations

    DEFF Research Database (Denmark)

    Boulongne, Romain; Boxenbaum, Eva

    The present article examines the process of collective identity formation in the context of hybrid organizing. Empirically, we investigate hybrid organizing in a collaborative structure at the interface of two heterogeneous organizations in the domain of new renewable energies. We draw...... on the literature on knowledge sharing across organizational boundaries, particularly the notions of transfer, translation and transformation, to examine in real time how knowledge sharing in a hybrid setting contributes (or not) to the emergence of a new collective identity at the interface of two heterogeneous...... organizations. Our findings point to two factors that limit knowledge sharing and hence to new collective identity formation in a hybrid space: 1) ambiguous or multiple organizational roles and 2) strong identities of the collaborating organizations. These findings contribute to illuminating the initial...

  9. 21 CFR 21.44 - Verification of identity.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 1 2010-04-01 2010-04-01 false Verification of identity. 21.44 Section 21.44 Food... Verification of identity. (a) An individual seeking access to records in a Privacy Act Record System may be... identity. The identification required shall be suitable considering the nature of the records sought. No...

  10. 20 CFR 401.45 - Verifying your identity.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Verifying your identity. 401.45 Section 401... INFORMATION The Privacy Act § 401.45 Verifying your identity. (a) When required. Unless you are making a... representative, you must verify your identity in accordance with paragraph (b) of this section if: (1) You make a...

  11. 22 CFR 50.9 - Card of identity.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Card of identity. 50.9 Section 50.9 Foreign... of United States Nationality of a Person Abroad § 50.9 Card of identity. When authorized by the Department, consular offices or designated nationality examiners may issue a card of identity for travel to...

  12. Religious Identity and Cultural Diversity: Exploring the Relationships between Religious Identity, Sexism, Homophobia, and Multicultural Competence

    Science.gov (United States)

    Balkin, Richard S.; Schlosser, Lewis Z.; Levitt, Dana Heller

    2009-01-01

    In this article, the authors present the results from a national study investigating the relationships between religious identity, sexism, homophobia, and multicultural competence. Participants were 111 randomly sampled counseling professionals and graduate students. The results indicated a relationship between religious identity and various…

  13. The Brand Identity: A Strategic Shift for Success

    Directory of Open Access Journals (Sweden)

    Victor Danciu

    2010-06-01

    Full Text Available The strong identity is a key condition for the real success of a brand strategy. The identity reflects the inner value of the brand and describes its potential success. In order to maximize this value a brand identity should include and develop all dimensions of its complex structure. The product, the organizational, the personality and the symbolic dimension of the brand identity could develop a greatcapability for many associations that could be made to the brand.Apple is a brand that has a distinct and clear identity. All four dimensions of a good brand identity could be identified in the Apple case. This provides a high level of quality, performance and valuethat are able to win the customer’s respect and loyalty.

  14. A Q-methodological study of smoking identities.

    Science.gov (United States)

    Farrimond, Hannah; Joffe, Helene; Stenner, Paul

    2010-10-01

    In contrast to the psychological literature on adolescent smoking, little research has investigated the social identities of adult smokers. This study aimed to identify shared 'smoking identities' amongst a sample of 64 British smokers from different socio-economic groups using Q-methodology. Participants were asked to sort 70 items concerning smoking and smokers according to their agreement/disagreement with them. The 64 Q-sorts were then subjected to a by-person factor analysis yielding six factors, with the first four interpretable factors being presented here. Each factor is understood to represent a distinct 'identity position'. The first two, the 'addicted' smoker, and the 'in control' smoker, oriented around a biomedical model of smoking as an addictive health risk. The final two, the 'no big deal' smoker and the 'proud' smoker reflected alternative understandings and values. The identity positions also differed in the extent to which smoking was considered a core part of self-identity. Unpacking the 'smoking identities' of current smokers offers the opportunity to devise targeted health promotion.

  15. Identity Expansion and Transcendence

    Directory of Open Access Journals (Sweden)

    William Sims Bainbridge

    2014-05-01

    Full Text Available Emerging developments in communications and computing technology may transform the nature of human identity, in the process rendering obsolete the traditional philosophical and scientific frameworks for understanding the nature of individuals and groups.  Progress toward an evaluation of this possibility and an appropriate conceptual basis for analyzing it may be derived from two very different but ultimately connected social movements that promote this radical change. One is the governmentally supported exploration of Converging Technologies, based in the unification of nanoscience, biology, information science and cognitive science (NBIC. The other is the Transhumanist movement, which has been criticized as excessively radical yet is primarily conducted as a dignified intellectual discussion within a new school of philosophy about human enhancement.  Together, NBIC and Transhumanism suggest the immense transformative power of today’s technologies, through which individuals may explore multiple identities by means of online avatars, semi-autonomous intelligent agents, and other identity expansions.

  16. Identities under risk or risk as identity? Youth’s health and the contemporary life

    Directory of Open Access Journals (Sweden)

    Luis David Castiel

    2007-04-01

    Full Text Available This is an essay on the issue of the identity of the Brazilian youth related to risks in our contemporary culture. There is a brief approach towards conceptual dimensions connected to categories such as ‘health’, ‘contemporaneity’, ‘identity’, ‘youth’. Some statistical aspects related to morbidity and mortality are presented in order to generate a synthetic framework of the epidemiological situation in our context. An analysis is proposed, from a sociological point of view, concerning the construction of fluid identities in a society characterized by precariousness and excess in many levels. At last, it is suggested how the link between risk and ambivalence in many ways frame respective attitudes of exposure (adventure and avoidance (prevention. Keywords: risk, identity, youth, social sciences in health.

  17. School sports and identity formation: socialisation or selection?

    Science.gov (United States)

    Pot, Niek; Schenk, Niels; van Hilvoorde, Ivo

    2014-01-01

    It seems common knowledge that school sport participation leads to all kinds of social, educational and health outcomes. However, it may also be that students with a certain predisposition, sometimes referred to as sporting habitus, are more inclined to participate in school sports and that the 'outcomes' were already present before participation. Several studies indicated that identity formation mediates between sport participation and the outcomes described. Therefore, a longitudinal survey study was used to investigate whether participation in an elementary school sport competition brought about changes in the formation of sport identity and student identity of students. The results of the study showed that participation in the competition was not related to changes in the sport identity and student identity of the children. In contrast to commonplace assumptions about the socialising effects of school sport participation, the results indicate that participating in this school sport competition did not influence the student identity and sport identity of children. It may be that a selected, predisposed group of children with a strong sport identity participates in school sports, although future research is necessary to test this hypothesis.

  18. Strengthening National Identity through National Symbols and ...

    African Journals Online (AJOL)

    South Africans vacillate in their national identity and remain largely attached to their racial and ethnic group identities. The aim of this article is to illustrate the manner in which a sense of understanding, familiarity and pride with regard to national symbols and thus to national identity can be attained. The objective is that the ...

  19. Convolution identities for quasiprobabilities for Bose functions

    International Nuclear Information System (INIS)

    Haake, F.; Lewenstein, M.

    1982-01-01

    We present identities relating the equations of motion of various quasiprobabilities for quantum oscillators. These identities turn out useful for checking the consistency of approximations made in constructing the equations of motion with the basic Bose commutator. Moreover, our identities allow to identify the quasiprobability distributions which have the easiest-to-solve equations of motion. (orig.)

  20. Drinker Identity: Key Risk Factor for Adolescent Alcohol Use.

    Science.gov (United States)

    Lee, Chia-Kuei; Corte, Colleen; Stein, Karen F

    2018-03-01

    Adolescent alcohol use continues to be a critical public health problem with both short- and long-term negative health consequences. Defining oneself in terms of alcohol, a drinking-related identity, has been shown to predict high levels of alcohol use. Because adolescence is the developmental period during which identity development is most salient, preventing the development of the drinker identity and early identification of youth who have a developing drinker identity may be important for prevention and early intervention. We review the theory- and evidence-based literature about identity development and the effects of a drinker identity on alcohol use behaviors in adolescents, discuss potential determinants of the drinker identity, and discuss future implications for practice and research. There is some evidence that the drinker identity forms in early adolescence and becomes more well-developed during adolescence. The drinker identity predicts alcohol use behaviors both concurrently and over time in adolescence and young adulthood. There is also some evidence that early exposure to alcohol may contribute to formation of the drinker identity. Identity-based approaches may be promising strategies to identify adolescents who are at risk for alcohol use and to intervene with early prevention or treatment within the school setting. © 2018, American School Health Association.