Sample records for identity management solution

  1. Playing It Safe: Identity Management and Single Sign-On

    ERIC Educational Resources Information Center

    Alawneh, John

    2012-01-01

    Whenever thousands of users need to connect seamlessly to a vast number of online resources, identity management (IDM) becomes a critical capability. Although several products on the market can deliver a robust identity management solution, there is no one-size-fits-all. Identity management requires business processes and a supporting…

  2. Claims and Identity: On-Premise and Cloud Solutions

    NASA Astrophysics Data System (ADS)

    Bertocci, Vittorio

    Today's identity-management practices are often a patchwork of partial solutions, which somehow accommodate but never really integrate applications and entities separated by technology and organizational boundaries. The rise of Software as a Service (SaaS) and cloud computing, however, will force organizations to cross such boundaries so often that ad hoc solutions will simply be untenable. A new approach that tears down identity silos and supports a de-perimiterized IT by design is in order.This article will walk you through the principles of claims-based identity management, a model which addresses both traditional and cloud scenarios with the same efficacy. We will explore the most common token exchange patterns, highlighting the advantages and opportunities they offer when applied on cloud computing solutions and generic distributed systems.

  3. 76 FR 13666 - Pitney Bowes, Inc., Mailing Solutions Management, Global Engineering Group, Including On-Site...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-14

    ...., Mailing Solutions Management, Global Engineering Group, Including On-Site Leased Workers From Guidant... workers and former workers of Pitney Bowes, Inc., Mailing Solutions Management Division, Engineering... reviewed the certification to clarify the subject worker group's identity. Additional information revealed...

  4. 76 FR 2710 - Pitney Bowes, Inc., Mailing Solutions Management Division Including On-Site Leased Workers of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-01-14

    ...., Mailing Solutions Management Division Including On-Site Leased Workers of Guidant Group, and Teleworkers... Bowes, Inc., Mailing Solutions Management Division, Engineering Quality Assurance, Shelton, Connecticut... identity of the subject worker group. The worker group consists of workers of Pitney Bowes, Inc., the...

  5. Identity management and privacy languages technologies: Improving user control of data privacy

    NASA Astrophysics Data System (ADS)

    García, José Enrique López; García, Carlos Alberto Gil; Pacheco, Álvaro Armenteros; Organero, Pedro Luis Muñoz

    The identity management solutions have the capability to bring confidence to internet services, but this confidence could be improved if user has more control over the privacy policy of its attributes. Privacy languages could help to this task due to its capability to define privacy policies for data in a very flexible way. So, an integration problem arises: making work together both identity management and privacy languages. Despite several proposals for accomplishing this have already been defined, this paper suggests some topics and improvements that could be considered.

  6. Dissociative identity disorder (DID) in clinical practice - what you don't see may hurt you.

    PubMed

    Leonard, David; Tiller, John

    2016-02-01

    To identify problems that interfere with the recognition, diagnosis and management of people with dissociative identity disorder (DID) presenting to psychiatric outpatient and inpatient services and suggest solutions. Problems and suggested solutions associated with clinical presentations and management of people with DID are outlined with references to relevant literature. Problems in the recognition and management of DID are described. These lead to delays in diagnosis and costly, inappropriate management, destructive to services, staff and patients alike. Problems include lack of understanding and experience and scepticism about the disorder, resulting in failure to provide appropriate treatment.Some suggestions to improve recognition and management are included. Better recognition, diagnosis and management of DID will lead to better and more cost effective outcomes. © The Royal Australian and New Zealand College of Psychiatrists 2015.

  7. A Federated Digital Identity Management Approach for Business Processes

    NASA Astrophysics Data System (ADS)

    Bertino, Elisa; Ferrini, Rodolfo; Musci, Andrea; Paci, Federica; Steuer, Kevin J.

    Business processes have gained a lot of attention because of the pressing need for integrating existing resources and services to better fulfill customer needs. A key feature of business processes is that they are built from composable services, referred to as component services, that may belong to different domains. In such a context, flexible multi-domain identity management solutions are crucial for increased security and user-convenience. In particular, it is important that during the execution of a business process the component services be able to verify the identity of the client to check that it has the required permissions for accessing the services. To address the problem of multi-domain identity management, we propose a multi-factor identity attribute verification protocol for business processes that assures clients privacy and handles naming heterogeneity.

  8. Exploring Medical Identity Theft

    PubMed Central

    Mancilla, Desla; Moczygemba, Jackie

    2009-01-01

    The crime of medical identity theft is a growing concern in healthcare institutions. A mixed-method study design including a two-stage electronic survey, telephone survey follow-up, and on-site observations was used to evaluate current practices in admitting and registration departments to reduce the occurrence of medical identity theft. Survey participants were chief compliance officers in acute healthcare organizations and members of the Health Care Compliance Association. Study results indicate variance in whether or how patient identity is confirmed in healthcare settings. The findings of this study suggest that information systems need to be designed for more efficient identity management. Admitting and registration staff must be trained, and compliance with medical identity theft policies and procedures must be monitored. Finally, biometric identity management solutions should be considered for stronger patient identification verification. PMID:20169017

  9. Exploring medical identity theft.

    PubMed

    Mancilla, Desla; Moczygemba, Jackie

    2009-09-16

    The crime of medical identity theft is a growing concern in healthcare institutions. A mixed-method study design including a two-stage electronic survey, telephone survey follow-up, and on-site observations was used to evaluate current practices in admitting and registration departments to reduce the occurrence of medical identity theft. Survey participants were chief compliance officers in acute healthcare organizations and members of the Health Care Compliance Association. Study results indicate variance in whether or how patient identity is confirmed in healthcare settings. The findings of this study suggest that information systems need to be designed for more efficient identity management. Admitting and registration staff must be trained, and compliance with medical identity theft policies and procedures must be monitored. Finally, biometric identity management solutions should be considered for stronger patient identification verification.

  10. Biometric identity management for standard mobile medical networks.

    PubMed

    Egner, Alexandru; Soceanu, Alexandru; Moldoveanu, Florica

    2012-01-01

    The explosion of healthcare costs over the last decade has prompted the ICT industry to respond with solutions for reducing costs while improving healthcare quality. The ISO/IEEE 11073 family of standards recently released is the first step towards interoperability of mobile medical devices used in patient environments. The standards do not, however, tackle security problems, such as identity management, or the secure exchange of medical data. This paper proposes an enhancement of the ISO/IEEE 11073-20601 protocol with an identity management system based on biometry. The paper describes a novel biometric-based authentication process, together with the biometric key generation algorithm. The proposed extension of the ISO/IEEE 11073-20601 is also presented.

  11. Patient identity management for secondary use of biomedical research data in a distributed computing environment.

    PubMed

    Nitzlnader, Michael; Schreier, Günter

    2014-01-01

    Dealing with data from different source domains is of increasing importance in today's large scale biomedical research endeavours. Within the European Network for Cancer research in Children and Adolescents (ENCCA) a solution to share such data for secondary use will be established. In this paper the solution arising from the aims of the ENCCA project and regulatory requirements concerning data protection and privacy is presented. Since the details of secondary biomedical dataset utilisation are often not known in advance, data protection regulations are met with an identity management concept that facilitates context-specific pseudonymisation and a way of data aggregation using a hidden reference table later on. Phonetic hashing is proposed to prevent duplicated patient registration and re-identification of patients is possible via a trusted third party only. Finally, the solution architecture allows for implementation in a distributed computing environment, including cloud-based elements.

  12. Intergroup conflict management strategies as related to perceptions of dual identity and separate groups.

    PubMed

    Bizman, Aharon; Yinon, Yoel

    2004-04-01

    The authors examined the relations between (a) the perceptions of dual identity and separate groups and (b) intergroup conflict management strategies, in two contexts: the conflict between the secular and religious sectors in Israel and the allocation of resources among organizational subunits. In both contexts, contention (i.e., forcing one's will on the other party) was associated with the perception of separate groups. Only in the organizational context, avoidance (i.e., doing nothing or discontinuing participation in the conflict) was associated with the perception of dual identity. Problem solving (i.e., finding a solution that is acceptable to both parties) was related to the perception of dual identity in the secular-religious context. In the organizational context, this relation appeared only under a low perception of separate groups. Yielding (i.e., satisfying the other party's needs at the expense of one's own) was related to the perception of dual identity in the organizational context. In the secular-religious context, this relation appeared only under a high perception of separate groups. The authors discussed the varying pattern of the associations between (a) the perceptions of dual identity and separate groups and (b) the conflict management strategies in the two contexts in terms of the Dual Concern Model and the perceived feasibility of the strategies.

  13. Solving Identity Management and Interoperability Problems at Pan-European Level

    NASA Astrophysics Data System (ADS)

    Sánchez García, Sergio; Gómez Oliva, Ana

    In a globalized digital world, it is essential for persons and entities to have a recognized and unambiguous electronic identity that allows them to communicate with one another. The management of this identity by public administrations is an important challenge that becomes even more crucial when interoperability among public administrations of different countries becomes necessary, as persons and entities have different credentials depending on their own national legal frameworks. More specifically, different credentials and legal frameworks cause interoperability problems that prevent reliable access to public services in a cross-border scenarios like today's European Union. Work in this doctoral thesis try to analyze the problem in a carefully detailed manner by studying existing proposals (basically in Europe), proposing improvements in defined architectures and performing practical work to test the viability of solutions. Moreover, this thesis will also address the long-standing security problem of identity delegation, which is especially important in complex and heterogeneous service delivery environments like those mentioned above. This is a position paper.

  14. Dual Management of Commercially Available Items - Information and Imaging Solutions.

    DTIC Science & Technology

    1998-06-03

    Pentagon, Washington, D.C. 20301-1900. The identity of each writer and caller is fully protected. Acronyms DISC Defense Industrial Supply Center DLA...Defense Logistics Agency GSA General Services Administration JWOD Javits-Wagner-O’Day NIB National Industries for the Blind f INSPECTOR GENERAL...Defense Industrial Supply Center issued a solicitation to establish a prime vendor for its office solutions initiative. An amendment to the solicitation

  15. Best Practices and Controls for Mitigating Insider Threats

    DTIC Science & Technology

    2013-08-08

    for plagiarism in academic papers, the process is virtually identical Solution: Managing The Insider Threat: What Every Organization Should Know...University Plagiarism Detection & DLP Managing The Insider Threat: What Every Organization Should Know Twitter #CERTinsiderthreat © 2013 Carnegie...How do we test document similarity? •  Cosine similarity algorithms •  Laymen’s terms: Plagiarism Detection •  Even though we’re not checking

  16. Enterprise Risk Management Solutions: A Case Study

    DTIC Science & Technology

    2008-06-01

    help manage risk in only AFC’s credit and retail departments. However, after the crisis that occurred in financial markets at the turn of the...my research of the company. After conducting independent research, I was able to determine that Open Pages and Methodware are almost identical in...the software they offer, much like a pair of basketball shoes provided by Nike vice Adidas . What allows them to operate successfully as independent

  17. Security, safety, and related technology - the triangle of eHealth service provision.

    PubMed

    Savastano, Mario; Hovsto, Asbjorn; Pharow, Peter; Blobel, Bernd

    2008-01-01

    The developing of innovative solutions in the emerging eHealth market requires strong economic efforts which may be justified only in presence of particularly suitable boundary conditions. Among the factors retained of primary importance for the development of eHealth, a correct approach to id-management is unanimously considered fundamental. Three keywords in the id-management context appear particularly important: standardization, security and safety. Standardization may contribute to increase the size and duration of the eHealth market, while security and safety may encourage all the stakeholders to trust in a appropriate and safe management of all the very sensitive personal data involved in the eHealth applications. The aim of the present paper is analyzing some security and safety issues in eHealth from the particular prospective of the identity management and standardization. The paper highlights the mission of the EU funded "BioHealth" project whose mission is to increase the stakeholders' knowledge about existing and emerging standards in eHealth with particular reference to identity management.

  18. Controller–Pilot Data Link Communication Security

    PubMed Central

    Polishchuk, Tatiana; Wernberg, Max

    2018-01-01

    The increased utilization of the new types of cockpit communications, including controller–pilot data link communications (CPDLC), puts the airplane at higher risk of hacking or interference than ever before. We review the technological characteristics and properties of the CPDLC and construct the corresponding threat model. Based on the limitations imposed by the system parameters, we propose several solutions for the improved security of the data messaging communication used in air traffic management (ATM). We discuss the applicability of elliptical curve cryptography (ECC), protected aircraft communications addressing and reporting systems (PACARs) and the Host Identity Protocol (HIP) as possible countermeasures to the identified security threats. In addition, we consider identity-defined networking (IDN) as an example of a genuine security solution which implies global changes in the whole air traffic communication system. PMID:29783791

  19. Controller⁻Pilot Data Link Communication Security.

    PubMed

    Gurtov, Andrei; Polishchuk, Tatiana; Wernberg, Max

    2018-05-20

    The increased utilization of the new types of cockpit communications, including controller⁻pilot data link communications (CPDLC), puts the airplane at higher risk of hacking or interference than ever before. We review the technological characteristics and properties of the CPDLC and construct the corresponding threat model. Based on the limitations imposed by the system parameters, we propose several solutions for the improved security of the data messaging communication used in air traffic management (ATM). We discuss the applicability of elliptical curve cryptography (ECC), protected aircraft communications addressing and reporting systems (PACARs) and the Host Identity Protocol (HIP) as possible countermeasures to the identified security threats. In addition, we consider identity-defined networking (IDN) as an example of a genuine security solution which implies global changes in the whole air traffic communication system.

  20. The Electronic FERPA: Access in the Digital Age

    ERIC Educational Resources Information Center

    McConahay, Mark; Hanson, Karen; West, Ann; Woodbeck, Dean

    2009-01-01

    On every college and university campus, common themes weave throughout identity and access management (IAM) and its relationship to Family Educational Rights and Privacy Act (FERPA). Institutions approach IAM differently as there is not a one-size-fits-all solution. Nevertheless, all face common elements. Over the past few years, a number of…

  1. Trust-Based and Context-Aware Authentication in a Software Architecture for Context and Proximity-Aware Services

    NASA Astrophysics Data System (ADS)

    Lenzini, Gabriele

    We describe an existing software architecture for context and proximity aware services that enables trust-based and context-aware authentication. A service is proximity aware when it automatically detects the presence of entities in its proximity. Authentication is context-aware when it uses contextual information to discern among different identities and to evaluate to which extent they are authentic. The software architecture that we describe here is functioning in our Institute: It manages a sensor network to detect the presence and location of users and their devices. A context manager is responsible to merge the different sources of contextual information, to solve potential contradictions, and to determine the level of authentication of the identity of the person approaching one of the services offered in the coffee-break corners of our Institute. In our solution for context-aware authentication, sensors are managed as if they were recommenders having subjective belief, disbelief, and uncertainty (i.e., trust) on the position and identity of users. A sensor’s subjective trust depends on what it has been sensing in the environment. We discuss the results of an array of simulations that we conducted to validate our concept of trust-based and context-aware authentication. We use Subjective Logic to manage trust.

  2. Can banks offer digital keys for health care?

    PubMed

    Casillas, John

    2013-01-01

    In the quest to implement electronic health care records, health care stakeholders have uncovered an elephant in the room - how to implement patient identity and integrity solutions. Without this, linking the unique records of an individual is impossible. An inaccurate record can be dangerous for prescribing treatment. Yet many consider a unique patient identifier as an unacceptable privacy risk. Medical banking, or the convergence of banking and heath IT systems, is spawning new ideas that could impact on this difficult area. This article suggests that new forms of efficiency in payment processing may yield a common, cross-industry technology platform for managing digital identity by banks. Redefining a bank based on core competencies, the article looks at three areas: (1) the "identity theft arms race"; (2) innovations in payment processing; and (3) consumer engagement, and suggests that, as banking and health care systems converge, digital identity may become the new money. This realization may find banks fully engaged in helping health care to overcome the challenge of patient identity and integrity.

  3. Thermally conductive tough flexible elastomers as composite of slide-ring materials and surface modified boron nitride particles via plasma in solution

    NASA Astrophysics Data System (ADS)

    Goto, Taku; Iida, Masaki; Tan, Helen; Liu, Chang; Mayumi, Koichi; Maeda, Rina; Kitahara, Koichi; Hatakeyama, Kazuto; Ito, Tsuyohito; Shimizu, Yoshiki; Yokoyama, Hideaki; Kimura, Kaoru; Ito, Kohzo; Hakuta, Yukiya; Terashima, Kazuo

    2018-03-01

    We have developed a thermally conductive flexible elastomer as a composite material with slide-ring (SR) materials and boron nitride (BN) particles surface-modified via plasma in solution. This composite shows excellent properties as a flexible insulator for thermal management. Surface modification of BN particles using plasma in solution increases the tensile strength, extension ratio at break, toughness, and rubber characteristics of the composites, compared to SR and non-modified BN, while the Young's modulus values are identical. Furthermore, the thermal conductivity also improved as a result of plasma surface modification.

  4. Common Capabilities for Trust and Security in Service Oriented Infrastructures

    NASA Astrophysics Data System (ADS)

    Brossard, David; Colombo, Maurizio

    In order to achieve agility of the enterprise and shorter concept-to-market timescales for new services, IT and communication providers and their customers increasingly use technologies and concepts which come together under the banner of the Service Oriented Infrastructure (SOI) approach. In this paper we focus on the challenges relating to SOI security. The solutions presented cover the following areas: i) identity federation, ii) distributed usage & access management, and iii) context-aware secure messaging, routing & transformation. We use a scenario from the collaborative engineering space to illustrate the challenges and the solutions.

  5. Strategies for improving employee retention.

    PubMed

    Verlander, Edward G; Evans, Martin R

    2007-03-28

    This article proposes a solution to the perennial problem of talent retention in the clinical laboratory. It includes the presentation of 12 strategies that may be used to significantly improve institutional identity formation and establishment of the psychological contract that employees form with laboratory management. Identity formation and psychological contracting are deemed as essential in helping reduce employee turnover and increase retention. The 12 conversational strategies may be used as a set of best practices for all employees, but most importantly for new employees, and should be implemented at the critical moment when employees first join the laboratory. This time is referred to as "retention on-boarding"--the period of induction and laboratory orientation. Retention on-boarding involves a dialogue between employees and management that is focused on the psychological, practical, cultural, and political dimensions of the laboratory. It is placed in the context of the modern clinical laboratory, which is faced with employing and managing Generation X knowledge workers. Specific topics and broad content areas of those conversations are outlined.

  6. Collaborative eHealth Meets Security: Privacy-Enhancing Patient Profile Management.

    PubMed

    Sanchez-Guerrero, Rosa; Mendoza, Florina Almenarez; Diaz-Sanchez, Daniel; Cabarcos, Patricia Arias; Lopez, Andres Marin

    2017-11-01

    Collaborative healthcare environments offer potential benefits, including enhancing the healthcare quality delivered to patients and reducing costs. As a direct consequence, sharing of electronic health records (EHRs) among healthcare providers has experienced a noteworthy growth in the last years, since it enables physicians to remotely monitor patients' health and enables individuals to manage their own health data more easily. However, these scenarios face significant challenges regarding security and privacy of the extremely sensitive information contained in EHRs. Thus, a flexible, efficient, and standards-based solution is indispensable to guarantee selective identity information disclosure and preserve patient's privacy. We propose a privacy-aware profile management approach that empowers the patient role, enabling him to bring together various healthcare providers as well as user-generated claims into an unique credential. User profiles are represented through an adaptive Merkle Tree, for which we formalize the underlying mathematical model. Furthermore, performance of the proposed solution is empirically validated through simulation experiments.

  7. A Conditions Data Management System for HEP Experiments

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Laycock, P. J.; Dykstra, D.; Formica, A.

    Conditions data infrastructure for both ATLAS and CMS have to deal with the management of several Terabytes of data. Distributed computing access to this data requires particular care and attention to manage request-rates of up to several tens of kHz. Thanks to the large overlap in use cases and requirements, ATLAS and CMS have worked towards a common solution for conditions data management with the aim of using this design for data-taking in Run 3. In the meantime other experiments, including NA62, have expressed an interest in this cross- experiment initiative. For experiments with a smaller payload volume and complexity,more » there is particular interest in simplifying the payload storage. The conditions data management model is implemented in a small set of relational database tables. A prototype access toolkit consisting of an intermediate web server has been implemented, using standard technologies available in the Java community. Access is provided through a set of REST services for which the API has been described in a generic way using standard Open API specications, implemented in Swagger. Such a solution allows the automatic generation of client code and server stubs and further allows changes in the backend technology transparently. An important advantage of using a REST API for conditions access is the possibility of caching identical URLs, addressing one of the biggest challenges that large distributed computing solutions impose on conditions data access, avoiding direct DB access by means of standard web proxy solutions.« less

  8. Integrating MPI and deduplication engines: a software architecture roadmap.

    PubMed

    Baksi, Dibyendu

    2009-03-01

    The objective of this paper is to clarify the major concepts related to architecture and design of patient identity management software systems so that an implementor looking to solve a specific integration problem in the context of a Master Patient Index (MPI) and a deduplication engine can address the relevant issues. The ideas presented are illustrated in the context of a reference use case from Integrating the Health Enterprise Patient Identifier Cross-referencing (IHE PIX) profile. Sound software engineering principles using the latest design paradigm of model driven architecture (MDA) are applied to define different views of the architecture. The main contribution of the paper is a clear software architecture roadmap for implementors of patient identity management systems. Conceptual design in terms of static and dynamic views of the interfaces is provided as an example of platform independent model. This makes the roadmap applicable to any specific solutions of MPI, deduplication library or software platform. Stakeholders in need of integration of MPIs and deduplication engines can evaluate vendor specific solutions and software platform technologies in terms of fundamental concepts and can make informed decisions that preserve investment. This also allows freedom from vendor lock-in and the ability to kick-start integration efforts based on a solid architecture.

  9. Responses to professional identity threat: Identity management strategies in incident narratives of health care professionals.

    PubMed

    van Os, Annemiek; de Gilder, Dick; van Dyck, Cathy; Groenewegen, Peter

    2015-01-01

    The purpose of this paper is to explore sensemaking of incidents by health care professionals through an analysis of the role of professional identity in narratives of incidents. Using insights from social identity theory, the authors argue that incidents may create a threat of professional identity, and that professionals make use of identity management strategies in response to this identity threat. The paper draws on a qualitative analysis of incident narratives in 14 semi-structured interviews with physicians, nurses, and residents at a Dutch specialist hospital. The authors used an existing framework of identity management strategies to categorize the narratives. The analysis yielded two main results. First, nurses and residents employed multiple types of identity management strategies simultaneously, which points to the possible benefit of combining different strategies. Second, physicians used the strategy of patronization of other professional groups, a specific form of downward comparison. The authors discuss the implications of the findings in terms of the impact of identity management strategies on the perpetuation of hierarchical differences in health care. The authors argue that efforts to manage incident handling may profit from considering social identity processes in sensemaking of incidents. This is the first study that systematically explores how health care professionals use identity management strategies to maintain a positive professional identity in the face of incidents. This study contributes to research on interdisciplinary cooperation in health care.

  10. Working to reduce the effects of discrimination: Identity management strategies in organizations.

    PubMed

    Shih, Margaret; Young, Maia J; Bucher, Amy

    2013-04-01

    Despite efforts to dispel discrimination, workplace discrimination still occurs. We introduce two classes of identity management strategies individuals use to mitigate the negative consequences of discrimination: identity switching (i.e., deemphasizing target identities and recategorizing to a more positively valued identity) and identity redefinition (i.e., stereotype reassociation and regeneration). Organizations adopting a color-blind approach may make it more difficult for individuals to use identity switching because the policies deemphasize differences in social identities. In contrast, organizations adopting a multicultural approach may make it more difficult for individuals to use identity redefinition. Multicultural approaches, applied superficially, may celebrate group differences that might actually reinforce culturally dominant stereotypes. We explore the likelihood that individuals will adopt each strategy given these organizational approaches to diversity. We outline steps organizations can take to reduce the need for identity management strategies and to facilitate identity management when necessary.

  11. The medical leadership challenge in healthcare is an identity challenge.

    PubMed

    Andersson, Thomas

    2015-01-01

    The purpose of this article is to describe and analyse the identity challenges that physicians with medical leadership positions face. Four qualitative case studies were performed to address the fact that identity is processual, relational and situational. Physicians with managerial roles were interviewed, as well as their peers, supervisors and subordinates. Furthermore, observations were made to understand how different identities are displayed in action. This study illustrates that medical leadership implies identity struggles when physicians have manager positions, because of the different characteristics of the social identities of managers and physicians. Major differences are related between physicians as autonomous individuals in a system and managers as subordinates to the organizational system. There are psychological mechanisms that evoke the physician identity more often than the managerial identity among physicians who are managers, which explains why physicians who are managers tend to remain foremost physicians. The implications of the findings, that there are major identity challenges by being both a physician and manager, suggest that managerial physicians might not be the best prerequisite for medical leadership, but instead, cooperative relationships between physicians and non-physician managers might be a less difficult way to support medical leadership. Acknowledging and addressing identity challenges can be important both in creating structures in organizations and designing the training for managers in healthcare (both physicians and non-physicians) to support medical leadership. Medical leadership is most often related to organizational structure and/or leadership skills, but this paper discusses identity requirements and challenges related to medical leadership.

  12. Globus Identity, Access, and Data Management: Platform Services for Collaborative Science

    NASA Astrophysics Data System (ADS)

    Ananthakrishnan, R.; Foster, I.; Wagner, R.

    2016-12-01

    Globus is software-as-a-service for research data management, developed at, and operated by, the University of Chicago. Globus, accessible at www.globus.org, provides high speed, secure file transfer; file sharing directly from existing storage systems; and data publication to institutional repositories. 40,000 registered users have used Globus to transfer tens of billions of files totaling hundreds of petabytes between more than 10,000 storage systems within campuses and national laboratories in the US and internationally. Web, command line, and REST interfaces support both interactive use and integration into applications and infrastructures. An important component of the Globus system is its foundational identity and access management (IAM) platform service, Globus Auth. Both Globus research data management and other applications use Globus Auth for brokering authentication and authorization interactions between end-users, identity providers, resource servers (services), and a range of clients, including web, mobile, and desktop applications, and other services. Compliant with important standards such as OAuth, OpenID, and SAML, Globus Auth provides mechanisms required for an extensible, integrated ecosystem of services and clients for the research and education community. It underpins projects such as the US National Science Foundation's XSEDE system, NCAR's Research Data Archive, and the DOE Systems Biology Knowledge Base. Current work is extending Globus services to be compliant with FEDRAMP standards for security assessment, authorization, and monitoring for cloud services. We will present Globus IAM solutions and give examples of Globus use in various projects for federated access to resources. We will also describe how Globus Auth and Globus research data management capabilities enable rapid development and low-cost operations of secure data sharing platforms that leverage Globus services and integrate them with local policy and security.

  13. Similarly Torn, Differentially Shorn? The Experience and Management of Conflict between Multiple Roles, Relationships, and Social Categories

    PubMed Central

    Jones, Janelle M.; Hynie, Michaela

    2017-01-01

    In three studies we examined the experience and management of conflict between different types of multiple identities. Participants described a conflict between pairs of role, relational, or social identities before rating the experience (i.e., magnitude, stress, and growth) and management of conflict on a newly developed scale assessing four strategies: reconciliation, where identities are integrated, realignment, where one identity is chosen over another, retreat, where both identities are avoided, and reflection, where fit (with others, situation) determines identity selection. In general, the types of identities mattered for conflict management but not its experience: Magnitude and growth did not differ, however, stress was greater for role identity conflicts (Study 3 only) and participants endorsed the use of more realignment for role conflicts (Study 2) and more retreat for relational conflicts (Study 3) relative to other types of identity conflicts. Furthermore, findings suggested that the perceived flexibility of identities, not their importance or valence, were associated with realignment and retreat for roles and with retreat for relationships. Experiencing conflicts between multiple identities leaves people similarly torn, but multiple roles and relationships may be differentially shorn to manage conflict. PMID:29051744

  14. Similarly Torn, Differentially Shorn? The Experience and Management of Conflict between Multiple Roles, Relationships, and Social Categories.

    PubMed

    Jones, Janelle M; Hynie, Michaela

    2017-01-01

    In three studies we examined the experience and management of conflict between different types of multiple identities. Participants described a conflict between pairs of role, relational, or social identities before rating the experience (i.e., magnitude, stress, and growth) and management of conflict on a newly developed scale assessing four strategies: reconciliation , where identities are integrated, realignment , where one identity is chosen over another, retreat , where both identities are avoided, and reflection , where fit (with others, situation) determines identity selection. In general, the types of identities mattered for conflict management but not its experience: Magnitude and growth did not differ, however, stress was greater for role identity conflicts ( Study 3 only ) and participants endorsed the use of more realignment for role conflicts ( Study 2 ) and more retreat for relational conflicts ( Study 3 ) relative to other types of identity conflicts. Furthermore, findings suggested that the perceived flexibility of identities, not their importance or valence, were associated with realignment and retreat for roles and with retreat for relationships. Experiencing conflicts between multiple identities leaves people similarly torn, but multiple roles and relationships may be differentially shorn to manage conflict.

  15. Exploiting OAuth 2.0: from User Delegation for OGC Services to a Generic Federation-as-a-Service Solution for Federated Identity Management

    NASA Astrophysics Data System (ADS)

    Kershaw, Philip; Jensen, Jens; Stephens, Ag; van Engen, Willem

    2013-04-01

    We explore an application of OAuth to enable user delegation for OGC-based services and the evolution of this solution to form part of a wider Federation-as-a-Service offering for federated identity management. OAuth has established itself in the commercial sector as a means for users to delegate access to secured resources under their control to third parties. It has also found its way into the academic and research domains as a solution for user delegation. Notable examples including the CILogon project for Teragrid in the US, and also, closer to the Earth Sciences, as part of the OGC Web Services, Phase 6 Testbed. Both are examples of OAuth 1.0 implementations. Version 2.0 has seen significant changes to this original specification which have not been without controversy but it has arguably provided a greater degree of flexibility in how it can be applied and the use cases that it can address. At CEDA (Centre for Environmental Data Archival, STFC), a Python implementation of OAuth 2.0 was made to explore these capabilities with a focus on providing a solution for user delegation for data access, processing and visualisation services for the Earth Observation and Climate sciences domains. The initial goal was to provide a means of delegating short-lived user credentials to trusted services along the same lines as the established approach of Proxy certificates widely used in Grid computing. For the OGC and other HTTP-based services employed by CEDA, OAuth makes a natural fit for this role, integrating with minimal impact on existing interfaces. Working implementations have been made for CEDA's COWS Web Processing Service and Web Map Service. Packaging the software and making it available in Open Source repositories together with the generic nature of the solution have made it readily exploitable in other application domains. At the Max Planck Institute for Psycholinguistics (Nijmegen, The Netherlands), the software will be used to integrate some tools in the CLARIN infrastructure*. Enhancements have been fedback to the package through this activity. Collaboration with STFC's Scientific Computing department has also seen this solution expand and evolve to support a more demanding set of use cases required to meet the needs for Contrail, an EU Framework 7 project. The goal of Contrail is to develop an Open Source solution for federating resources from multiple Cloud providers. Bringing the solution developed with OAuth together with technologies such as SAML and OpenID it has been possible to develop a generic suite of services to support federated access and identity management, a Federation-as-a-Service package. This is showing promise with trials with the EUDAT project. A deployment of the Contrail software is also planned for CEMS (the facility for Climate and Environmental Monitoring from Space), a new joint academic-industry led facility based at the STFC Harwell site providing access to large-volume Earth Observation and Climate datasets through a Cloud-based service model. * This work is part of the programme of BiG Grid, the Dutch e-Science Grid, which is financially supported by the Netherlands Organisation for Scientific Research, NWO.

  16. Clustering excellence to exert transformative change: the Hartford Geriatric Nursing Initiative (HGNI).

    PubMed

    McBride, Angela Barron; Watman, Rachael; Escobedo, Marcus; Beilenson, John

    2011-01-01

    This paper describes how the John A. Hartford Foundation sought to maximize the influence of its various geriatric nursing projects by organizing and managing them collectively as the Hartford Geriatric Nursing Initiative (HGNI). This initiative aimed to develop a shared identity, encouraged cross-pollination of efforts, convened project leaders to address opportunities and problems, launched across-project collaborations, and created tools and resources to support overall efforts. This paper ends with some reflections on the processes implemented to maximize HGNI effectiveness, particularly the importance of forging a common identity in order to encourage expanded solutions. The HGNI can serve as an example of how intersecting interests can fuel new ideas, thus helping others think more strategically about change efforts in the future. Copyright © 2011 Elsevier Inc. All rights reserved.

  17. dCache, towards Federated Identities & Anonymized Delegation

    NASA Astrophysics Data System (ADS)

    Ashish, A.; Millar, AP; Mkrtchyan, T.; Fuhrmann, P.; Behrmann, G.; Sahakyan, M.; Adeyemi, O. S.; Starek, J.; Litvintsev, D.; Rossi, A.

    2017-10-01

    For over a decade, dCache has relied on the authentication and authorization infrastructure (AAI) offered by VOMS, Kerberos, Xrootd etc. Although the established infrastructure has worked well and provided sufficient security, the implementation of procedures and the underlying software is often seen as a burden, especially by smaller communities trying to adopt existing HEP software stacks [1]. Moreover, scientists are increasingly dependent on service portals for data access [2]. In this paper, we describe how federated identity management systems can facilitate the transition from traditional AAI infrastructure to novel solutions like OpenID Connect. We investigate the advantages offered by OpenID Connect in regards to ‘delegation of authentication’ and ‘credential delegation for offline access’. Additionally, we demonstrate how macaroons can provide a more fine-granular authorization mechanism that supports anonymized delegation.

  18. Searching for Extended Identity: The Problematised Role of Managing People Development, as Illuminated by the Frontline Management Initiative.

    ERIC Educational Resources Information Center

    Barratt-Pugh, Llandis

    Australia's Frontline Management Initiative (FMI) marks a political move toward workplace learning and provides evidence concerning development of managing identities and management of such workplace learning. The FMI was examined as a technology of identity within the discourse of enterprise and an instrument of textualization of the workplace.…

  19. Working to Reduce the Effects of Discrimination: Identity Management Strategies in Organizations

    ERIC Educational Resources Information Center

    Shih, Margaret; Young, Maia J.; Bucher, Amy

    2013-01-01

    Despite efforts to dispel discrimination, workplace discrimination still occurs. We introduce two classes of identity management strategies individuals use to mitigate the negative consequences of discrimination: identity switching (i.e., deemphasizing target identities and recategorizing to a more positively valued identity) and identity…

  20. Assessing Vulnerability of Biometric Technologies for Identity Management Applications

    DTIC Science & Technology

    2011-10-01

    de vulnérabilité et d’analyse de la relation entre la performance du système et la force de sécurité de la fonction. En Octobre 2010, IBG-Canada...Les agences et ministères du gouvernement du Canada ont besoin d’information sur la performance , les vulnérabilités et l’efficacité des solutions...négligent des éléments humains qui peuvent stimuler la performance , de sécurité et les

  1. A theoretical and computational study of lithium-ion battery thermal management for electric vehicles using heat pipes

    NASA Astrophysics Data System (ADS)

    Greco, Angelo; Cao, Dongpu; Jiang, Xi; Yang, Hong

    2014-07-01

    A simplified one-dimensional transient computational model of a prismatic lithium-ion battery cell is developed using thermal circuit approach in conjunction with the thermal model of the heat pipe. The proposed model is compared to an analytical solution based on variable separation as well as three-dimensional (3D) computational fluid dynamics (CFD) simulations. The three approaches, i.e. the 1D computational model, analytical solution, and 3D CFD simulations, yielded nearly identical results for the thermal behaviours. Therefore the 1D model is considered to be sufficient to predict the temperature distribution of lithium-ion battery thermal management using heat pipes. Moreover, a maximum temperature of 27.6 °C was predicted for the design of the heat pipe setup in a distributed configuration, while a maximum temperature of 51.5 °C was predicted when forced convection was applied to the same configuration. The higher surface contact of the heat pipes allows a better cooling management compared to forced convection cooling. Accordingly, heat pipes can be used to achieve effective thermal management of a battery pack with confined surface areas.

  2. An overview of the DII-HEP OpenStack based CMS data analysis

    NASA Astrophysics Data System (ADS)

    Osmani, L.; Tarkoma, S.; Eerola, P.; Komu, M.; Kortelainen, M. J.; Kraemer, O.; Lindén, T.; Toor, S.; White, J.

    2015-05-01

    An OpenStack based private cloud with the Cluster File System has been built and used with both CMS analysis and Monte Carlo simulation jobs in the Datacenter Indirection Infrastructure for Secure High Energy Physics (DII-HEP) project. On the cloud we run the ARC middleware that allows running CMS applications without changes on the job submission side. Our test results indicate that the adopted approach provides a scalable and resilient solution for managing resources without compromising on performance and high availability. To manage the virtual machines (VM) dynamically in an elastic fasion, we are testing the EMI authorization service (Argus) and the Execution Environment Service (Argus-EES). An OpenStackplugin has been developed for Argus-EES. The Host Identity Protocol (HIP) has been designed for mobile networks and it provides a secure method for IP multihoming. HIP separates the end-point identifier and locator role for IP address which increases the network availability for the applications. Our solution leverages HIP for traffic management. This presentation gives an update on the status of the work and our lessons learned in creating an OpenStackbased cloud for HEP.

  3. The importance of values in shaping how health systems governance and management can support universal health coverage.

    PubMed

    Fattore, Giovanni; Tediosi, Fabrizio

    2013-01-01

    In this article, we use cultural theory to investigate the nature of health systems governance and management, showing that it may be helpful in identifying key aspects of the debate about how to promote universal health coverage. Cultural theory argues that "how" we govern and manage health services depends on what we think about the nature of government organizations and the legitimacy of their scope of action. The values that are implied by universal health coverage underlie choices about "how" health systems are governed and their organizations are managed. We draw two main conclusions. First, the translation of principles and goals into practice requires exceptional efforts to design adequate decision-making arrangements (the essence of governance) and management practices. Management and governance, or "how" policies are decided and conducted, are not secondary to the selection of the best policy solutions (the "what"). Second, governance and management solutions are not independent of the values that they are expected to serve. Instead, they should be designed to be consonant with these values. Cultural theory suggests-and experience supports-the idea that "group identity" is favorable for shaping different forms of social life and public administrations. This approach should thus be a starting point for those who strive to obtain universal health coverage. Copyright © 2013 International Society for Pharmacoeconomics and Outcomes Research (ISPOR). Published by Elsevier Inc. All rights reserved.

  4. Developing an Assessment of Sexual Identity Management for Lesbian and Gay Workers.

    ERIC Educational Resources Information Center

    Anderson, Mary Z.; Croteau, James M.; DiStefano, Teresa M.; Chung, Y. Barry

    2001-01-01

    Psychometric properties of the Workplace Sexual Identity Management Measure were tested with 172 professionals. Results suggest it successfully assesses a continuum of lesbian and gay identity management strategies (passing, covering, implicitly out, explicitly out). (Contains 27 references.) (SK)

  5. Achieving Privacy in a Federated Identity Management System

    NASA Astrophysics Data System (ADS)

    Landau, Susan; Le van Gong, Hubert; Wilton, Robin

    Federated identity management allows a user to efficiently authenticate and use identity information from data distributed across multiple domains. The sharing of data across domains blurs security boundaries and potentially creates privacy risks. We examine privacy risks and fundamental privacy protections of federated identity- management systems. The protections include minimal disclosure and providing PII only on a “need-to-know” basis. We then look at the Liberty Alliance system and analyze previous privacy critiques of that system. We show how law and policy provide privacy protections in federated identity-management systems, and that privacy threats are best handled using a combination of technology and law/policy tools.

  6. Improving Measurement of Workplace Sexual Identity Management

    ERIC Educational Resources Information Center

    Lance, Teresa S.; Anderson, Mary Z.; Croteau, James M.

    2010-01-01

    The purpose of this study was to advance measurement of sexual identity management for lesbian, gay, and bisexual workers. Psychometric properties of a revised version of the Workplace Sexual Identity Management Measure (WSIMM; Anderson, Croteau, Chung, & DiStefano, 2001) were examined on a sample of 64 predominantly White K-12 teachers.…

  7. "I'm Scared of the Disappointment": Young Adult Smokers' Relational Identity Gaps and Management Strategies as Sites of Communication Intervention.

    PubMed

    Stanley, Samantha J; Pitts, Margaret Jane

    2018-02-22

    While cigarette smoking is decreasing among young adults, rates of nicotine consumption through other devices, most notably electronic cigarettes, are on the rise. Framed by communication theory of identity, this study examines young adult smokers' experiences with relational others in regard to their smoking. Focus group discussions and individual interviews convened with 20 young adult cigarette and electronic cigarette smokers revealed identity gaps implicating the relational layer of identity, including personal-relational, enacted-relational, and personal-enacted-relational identity gaps. Participants used communicative and behavioral strategies to manage relational discrepancies. The documented identity gaps and management strategies present opportunities for targeted smoking cessation interventions that amplify dissonance created through identity gaps as a motivational tactic.

  8. Electromagnetic inverse scattering

    NASA Technical Reports Server (NTRS)

    Bojarski, N. N.

    1972-01-01

    A three-dimensional electromagnetic inverse scattering identity, based on the physical optics approximation, is developed for the monostatic scattered far field cross section of perfect conductors. Uniqueness of this inverse identity is proven. This identity requires complete scattering information for all frequencies and aspect angles. A nonsingular integral equation is developed for the arbitrary case of incomplete frequence and/or aspect angle scattering information. A general closed-form solution to this integral equation is developed, which yields the shape of the scatterer from such incomplete information. A specific practical radar solution is presented. The resolution of this solution is developed, yielding short-pulse target resolution radar system parameter equations. The special cases of two- and one-dimensional inverse scattering and the special case of a priori knowledge of scatterer symmetry are treated in some detail. The merits of this solution over the conventional radar imaging technique are discussed.

  9. Linking User Identities Across the DataONE Federation of Data Repositories

    NASA Astrophysics Data System (ADS)

    Jones, M. B.; Mecum, B.; Leinfelder, B.; Jones, C. S.; Walker, L.

    2016-12-01

    DataONE provides services for identifying, authenticating, and authorizing researchers to access and contribute data to repositories within the DataONE federation. In the earth sciences, thousands of institutional and disciplinary repositories have created their own user identity and authentication systems with their own user directory based on a database or web content management systems. Thus, researchers have many identities that are neither linked nor interoperable, making it difficult to reference the identity of these users across systems. Key user information is hidden, and only a non-disambiguated name is often available. From a sample of 160,000 data sets within DataONE, a super-majority of references to the data creators lack even an email address. In an attempt to disambiguate these people via the GeoLink project, we conservatively estimate they represent at least 57,000 unique identities, but without a clear user identifier, there could be as many as 223,000. Interoperability among repositories is critical to improving the scope of scientific synthesis and capabilities for research collaboration. While many have focused on the convenience of Single Sign-On (SSO), we have found that sharing user identifiers is far more useful for interoperability. With an unambiguous user identity in incoming metadata, DataONE has built user-profiles that present that user's data across repositories, that link users and their organizational affiliations, and that allow users to work collaboratively in private groups that span repository systems. DataONE's user identity solution leverages existing systems such as InCommon, CILogon, Google, and ORCID to not further proliferate user identities. DataONE provides a core service allowing users to link their multiple identities so that authenticating with one identity (e.g., ORCID) can authorize access to data protected via another identity (e.g., InCommon). Currently, DataONE is using ORCID identities to link and identify users, but challenges must still be overcome to support historical records for which ORCIDs can not be used because the associated people are unavailable to confirm their identity. DataONE's identity systems facilitate crosslinking between user identities and scientific metadata to accelerate collaboration and synthesis.

  10. The KP hierarchy with self-consistent sources: construction, Wronskian solutions and bilinear identities

    NASA Astrophysics Data System (ADS)

    Lin, Runliang; Liu, Xiaojun; Zeng, Yunbo

    2014-10-01

    In this paper, we will present some of our results on the soliton hierarchy with self-consistent sources (SHSCSs). The Kadomtsev-Petviashvili (KP) hierarchy will be used as an illustrative example to show the method to construct the SHSCSs. Some properties of the KP hierarchy with self-consistent sources will also be given, such as the dressing approach, the Wronskian solutions (including soliton solutions), its bilinear identities and the tau function.

  11. Social identity management strategies used by workers with acquired hearing loss.

    PubMed

    Jennings, Mary Beth; Southall, Kenneth; Gagné, Jean-Pierre

    2013-01-01

    There is a paucity of knowledge about social identity-management by persons with hearing loss. The objective of the study was to gain an understanding from the perspective of the participants, the ways in which workers with acquired hearing loss manage their identity in the workplace. Twelve persons with acquired hearing loss, who were gainfully employed in a variety of settings and occupations in three Canadian cities, participated in audio-recorded semi-structured interviews. A secondary qualitative analysis was conducted on transcripts of interviews collected in a previous study on factors that influence disclosure of hearing loss in the workplace. A qualitative descriptive research paradigm was adopted and content analyses were used to extract pertinent information from verbatim transcripts. Participants described a range of identity-management strategies enacted in the workplace. Five recurrent themes emerged as important considerations in the Art of Identity Management in the workplace: 1. Managing the situation, 2. Having a buddy system, 3. Feeling comfortable, 4. Using personal resources, 5. It gets easier with time. Social identity-management is a complex process. Although persons with acquired hearing loss experience different challenges from other persons with invisible stigmas, similarities in the range of social identity-management strategies employed were evident in our findings. In addition, the social cognitive learning model of disclosure appears to be relevant to the experiences of our participants. The implications of the findings emphasize the importance of all stakeholders working collaboratively to address the issues of the growing population of workers with hearing loss.

  12. Conversations outside the Comfort Zone: Identity Formation in SME Manager Action Learning

    ERIC Educational Resources Information Center

    Anderson, Lisa; Gold, Jeff

    2009-01-01

    In this paper we consider the construction of narrative identity and particularly how managers of small businesses may construct new narrative identities within the activity of the action learning situation. We build on recent work to suggest that the "world" of managers can be explored through a consideration of Vygotsky's socio-cultural theory…

  13. Control system estimation and design for aerospace vehicles with time delay

    NASA Technical Reports Server (NTRS)

    Allgaier, G. R.; Williams, T. L.

    1972-01-01

    The problems of estimation and control of discrete, linear, time-varying systems are considered. Previous solutions to these problems involved either approximate techniques, open-loop control solutions, or results which required excessive computation. The estimation problem is solved by two different methods, both of which yield the identical algorithm for determining the optimal filter. The partitioned results achieve a substantial reduction in computation time and storage requirements over the expanded solution, however. The results reduce to the Kalman filter when no delays are present in the system. The control problem is also solved by two different methods, both of which yield identical algorithms for determining the optimal control gains. The stochastic control is shown to be identical to the deterministic control, thus extending the separation principle to time delay systems. The results obtained reduce to the familiar optimal control solution when no time delays are present in the system.

  14. Dissolution of spent nuclear fuel in carbonate-peroxide solution

    NASA Astrophysics Data System (ADS)

    Soderquist, Chuck; Hanson, Brady

    2010-01-01

    This study shows that spent UO2 fuel can be completely dissolved in a room temperature carbonate-peroxide solution apparently without attacking the metallic Mo-Tc-Ru-Rh-Pd fission product phase. In parallel tests, identical samples of spent nuclear fuel were dissolved in nitric acid and in an ammonium carbonate, hydrogen peroxide solution. The resulting solutions were analyzed for strontium-90, technetium-99, cesium-137, europium-154, plutonium, and americium-241. The results were identical for all analytes except technetium, where the carbonate-peroxide dissolution had only about 25% of the technetium that the nitric acid dissolution had.

  15. British-Pakistani women's perspectives of diabetes self-management: the role of identity.

    PubMed

    Majeed-Ariss, Rabiya; Jackson, Cath; Knapp, Peter; Cheater, Francine M

    2015-09-01

    To explore the effects of type 2 diabetes on British-Pakistani women's identity and its relationship with self-management. Type 2 diabetes is more prevalent and has worse outcomes among some ethnic minority groups. This may be due to poorer self-management and an inadequate match of health services to patient needs. The influence that type 2 diabetes has on British-Pakistani women's identity and subsequent self-management has received limited attention. An explorative qualitative study. Face-to-face semi-structured English and Urdu language interviews were conducted with a purposively selected heterogeneous sample of 15 British-Pakistani women with type 2 diabetes. Transcripts were analysed thematically. Four themes emerged: Perceived change in self emphasised how British-Pakistani women underwent a conscious adaptation of identity following diagnosis; Familiarity with ill health reflected women's adjustment to their changed identity over time; Diagnosis improves social support enabled women to accept changes within themselves and Supporting family is a barrier to self-management demonstrated how family roles were an aspect of women's identities that was resilient to change. The over-arching theme Role re-alignment enables successful self-management encapsulated how self-management was a continuous process where achievements needed to be sustained. Inter-generational differences were also noted: first generation women talked about challenges associated with ageing and co-morbidities; second generation women talked about familial and work roles competing with self-management. The complex nature of British-Pakistani women's self-identification requires consideration when planning and delivering healthcare. Culturally competent practice should recognise how generational status influences self-identity and diabetes self-management in ethnically diverse women. Health professionals should remain mindful of effective self-management occurring alongside, and being influenced by, other aspects of life. © 2015 John Wiley & Sons Ltd.

  16. When and how experienced incivility dissuades proactive performance: An integration of sociometer and self-identity orientation perspectives.

    PubMed

    Schilpzand, Pauline; Huang, Lei

    2018-04-16

    In this article we build on relational Sociometer Theory (Leary, 2005; Leary & Baumeister, 2000) to posit the impact of the belongingness threat of experienced incivility in one's work team on employee feelings of ostracism and subsequent engagement in proactive performance. Integrating the social-relational framework of Self-Identity Orientation Theory (Brewer & Gardner, 1996; Cooper & Thatcher, 2010), we nuance our predictions by hypothesizing that chronic self-identification orientations influence both the effect that experiencing incivility in one's work team exerts on feeling ostracized, and the impact that feeling ostracized has on subsequent employee proactive performance. Using a sample of 212 employees and their 51 supervising managers employed in an Internet service and solution company in China, we found support for our hypothesized model. Implications for theory and practice are discussed. (PsycINFO Database Record (c) 2018 APA, all rights reserved).

  17. Relationship between self-confidence and sex role identity among managerial women and men.

    PubMed

    Chusmir, L H; Koberg, C S

    1991-12-01

    The self-confidence and sex role identities of 437 American female and male managers were examined by using three subscales of the Adjective Check List. Results showed that, contrary to stereotypes and older research, female and male managers were strikingly similar. Women and men with cross-sex role identities showed lower levels of self-confidence than those did with androgynous orientations; high self-confidence was linked with masculine and androgynous orientations. The managers were not significantly different in self-confidence when demographic variables and sex role identity were held constant. Sex role identity (but not gender) was a major factor in the level of self-confidence.

  18. Professional Identities of Middle Managers: A Case Study in the Faculty of Health and Social Care

    ERIC Educational Resources Information Center

    Thomas-Gregory, Annette

    2014-01-01

    This article presents and discusses the findings of a recent study on the professional identities of middle managers in a school of healthcare in a selected Chartered (pre-1992) UK university. Attention focuses on the career backgrounds of the middle managers, perception of identity and the interactional balance between the professional, academic…

  19. Determining the disease management process for epileptic patients: A qualitative study.

    PubMed

    Hosseini, Nazafarin; Sharif, Farkhondeh; Ahmadi, Fazlollah; Zare, Mohammad

    2016-01-01

    Epilepsy exposes patients to many physical, social, and emotional challenges. Thus, it seems to portray a complex picture and needs holistic care. Medical treatment and psychosocial part of epilepsy remain central to managing and improving the patient's qualify of life through team efforts. Some studies have shown the dimensions of self-management, but its management process of epilepsy patients, especially in Iran, is not clear. This study aimed to determine the disease management process in patients with epilepsy in Iran. This qualitative approach and grounded theory study was conducted from January 2009 to February 2012 in Isfahan city (Iran). Thirty-two participants were recruited by the goal-oriented, and snowball sample selection and theoretical sampling methods. After conducting a total of 43 in-depth interviews with the participants, the researchers reached data saturation. Data were analyzed using Strauss and Corbin method. With a focus on disease management process, researchers found three main themes and seven sub-themes as a psychosocial process (PSP). The main themes were: perception of threat to self-identity, effort to preserve self-identity, and burn out. The psychosocial aspect of the disease generated one main variable "the perception of identity loss" and one central variable "searching for self-identity." Participants attributed threat to self-identity and burn out to the way their disease was managed requiring efforts to preserve their identity. Recommendations consist of support programs and strategies to improve the public perception of epilepsy in Iran, help patients accept their condition and preserve self-identity, and most importantly, enhance medical management of epilepsy.

  20. Transfer Function of Multi-Stage Active Filters: A Solution Based on Pascal's Triangle and a General Expression

    ERIC Educational Resources Information Center

    Levesque, Luc

    2012-01-01

    A method is proposed to simplify analytical computations of the transfer function for electrical circuit filters, which are made from repetitive identical stages. A method based on the construction of Pascal's triangle is introduced and then a general solution from two initial conditions is provided for the repetitive identical stage. The present…

  1. Identity and Access Management and Security in Higher Education.

    ERIC Educational Resources Information Center

    Bruhn, Mark; Gettes, Michael; West, Ann

    2003-01-01

    Discusses the drivers for an identity management system (IdM), components of this system, and its role within a school security strategy, focusing on: basic access management; requirements for access management; middleware support for an access management system; IdM implementation considerations (e.g., access eligibilities, authentication…

  2. Recycle of Inorganic Nutrients for Hydroponic Crop Production Following Incineration of Inedible Biomass

    NASA Technical Reports Server (NTRS)

    Bubenheim, David L.; Wignarajah, Kanapathipillai; Kliss, Mark H. (Technical Monitor)

    1996-01-01

    Recovery of resources from waste streams is essential for future implementation and reliance on a regenerative life support system. The major waste streams of concern are from human activities and plant wastes. Carbon, water and inorganics are the primary desired raw materials of interest. The goal of resource recovery is maintenance of product quality to insure support of reliable and predictable levels of life support function performance by the crop plant component. Further, these systems must be maintained over extended periods of time, requiring maintenance of nutrient solutions to avoid toxicity and deficiencies. Today, reagent grade nutrients are used to make nutrient solutions for hydroponic culture and these solutions are frequently changed during the life cycle or sometimes managed for only one crop life cycle. The focus of this study was to determine the suitability of the ash product following incineration of inedible biomass as a source of inorganic nutrients for hydroponic crop production. Inedible wheat biomass was incinerated and ash quality characterized. The incinerator ash was dissolved in adequate nitric acid to establish a consistent nitrogen concentration in all nutrient solution treatments. Four experimental nutrient treatments were included: control, ash only, ash supplemented to match control, and ash only quality formulated with reagent grade chemicals. When nutrient solutions are formulated using only ash following-incineration of inedible biomass, a balance in solution is established representing elemental retention following incineration and nutrient proportions present in the original biomass. The resulting solution is not identical to the control. This imbalance resulted in suppression of crop growth. When the ash is supplemented with nutrients to establish the same balance as in the control, growth is identical to the control. The ash appears to carry no phytotoxic materials. Growth in solution formulated with reagent grade chemicals but matching the quality of the ash only treatment resulted in growth similar to that of the ash only treatment. The ash product resulting from incineration of inedible biomass appears to be a suitable form for recycle of inorganic nutrients to crop production.

  3. Determining the disease management process for epileptic patients: A qualitative study

    PubMed Central

    Hosseini, Nazafarin; Sharif, Farkhondeh; Ahmadi, Fazlollah; Zare, Mohammad

    2016-01-01

    Background: Epilepsy exposes patients to many physical, social, and emotional challenges. Thus, it seems to portray a complex picture and needs holistic care. Medical treatment and psychosocial part of epilepsy remain central to managing and improving the patient's qualify of life through team efforts. Some studies have shown the dimensions of self-management, but its management process of epilepsy patients, especially in Iran, is not clear. This study aimed to determine the disease management process in patients with epilepsy in Iran. Materials and Methods: This qualitative approach and grounded theory study was conducted from January 2009 to February 2012 in Isfahan city (Iran). Thirty-two participants were recruited by the goal-oriented, and snowball sample selection and theoretical sampling methods. After conducting a total of 43 in-depth interviews with the participants, the researchers reached data saturation. Data were analyzed using Strauss and Corbin method. Results: With a focus on disease management process, researchers found three main themes and seven sub-themes as a psychosocial process (PSP). The main themes were: perception of threat to self-identity, effort to preserve self-identity, and burn out. The psychosocial aspect of the disease generated one main variable “the perception of identity loss” and one central variable “searching for self-identity.” Conclusions: Participants attributed threat to self-identity and burn out to the way their disease was managed requiring efforts to preserve their identity. Recommendations consist of support programs and strategies to improve the public perception of epilepsy in Iran, help patients accept their condition and preserve self-identity, and most importantly, enhance medical management of epilepsy. PMID:26985223

  4. Does identity shape leadership and management practice? Experiences of PHC facility managers in Cape Town, South Africa

    PubMed Central

    Daire, Judith; Gilson, Lucy

    2014-01-01

    In South Africa, as elsewhere, Primary Health Care (PHC) facilities are managed by professional nurses. Little is known about the dimensions and challenges of their job, or what influences their managerial practice. Drawing on leadership and organizational theory, this study explored what the job of being a PHC manager entails, and what factors influence their managerial practice. We specifically considered whether the appointment of professional nurses as facility managers leads to an identity transition, from nurse to manager. The overall intention was to generate ideas about how to support leadership development among PHC facility managers. Adopting case study methodology, the primary researcher facilitated in-depth discussions (about their personal history and managerial experiences) with eight participating facility managers from one geographical area. Other data were collected through in-depth interviews with key informants, document review and researcher field notes/journaling. Analysis involved data triangulation, respondent and peer review and cross-case analysis. The experiences show that the PHC facility manager’s job is dominated by a range of tasks and procedures focused on clinical service management, but is expected to encompass action to address the population and public health needs of the surrounding community. Managing with and through others, and in a complex system, requiring self-management, are critical aspects of the job. A range of personal, professional and contextual factors influence managerial practice, including professional identity. The current largely facility-focused management practice reflects the strong nursing identity of managers and broader organizational influences. However, three of the eight managers appear to self-identify an emerging leadership identity and demonstrate related managerial practices. Nonetheless, there is currently limited support for an identity transition towards leadership in this context. Better support for leadership development could include talent-spotting and nurturing, induction and peer-mentoring for newly appointed facility managers, ongoing peer-support once in post and continuous reflective practice. PMID:25274644

  5. LMIP/AAA: Local Authentication, Authorization and Accounting (AAA) Protocol for Mobile IP

    NASA Astrophysics Data System (ADS)

    Chenait, Manel

    Mobile IP represents a simple and scalable global mobility solution. However, it inhibits various vulnerabilities to malicious attacks and, therefore, requires the integration of appropriate security services. In this paper, we discuss two authentication schemes suggested for Mobile IP: standard authentication and Mobile IP/AAA authentication. In order to provide Mobile IP roaming services including identity verication, we propose an improvement to Mobile/AAA authentication scheme by applying a local politic key management in each domain, hence we reduce hando latency by avoiding the involvement of AAA infrastructure during mobile node roaming.

  6. Strategies for managing impressions of racial identity in the workplace.

    PubMed

    Roberts, Laura Morgan; Cha, Sandra E; Kim, Sung Soo

    2014-10-01

    This article deepens understanding of the workplace experiences of racial minorities by investigating racial identity-based impression management (RIM) by Asian American journalists. Racial centrality, directly or indirectly, predicted the use of 4 RIM strategies (avoidance, enhancement, affiliation, and racial humor). Professional centrality also predicted strategy use, which was related to life satisfaction and perceived career success. By shedding light on proactive strategies that individuals use to influence colleagues' impressions of their racial identity, we contribute to research on diversity in organizations, impression management, and racial identity. (PsycINFO Database Record (c) 2014 APA, all rights reserved).

  7. Author identities an interoperability problem solved by a collaborative solution

    NASA Astrophysics Data System (ADS)

    Fleischer, D.; Czerniak, A.; Schirnick, C.

    2012-12-01

    The identity of authors and data providers is crucial for personalized interoperability. The marketplace of available identifiers is packed and the right choice is getting more and more complicated. Even though there are more then 15 different systems available there are still some under development and proposed to come up by the end of 2012 ('PubMed Central Author ID' and ORCID). Data Management on a scale beyond the size of a single research institute but on the scale of a scientific site including a university with student education program needs to tackle this problem and so did the Kiel Data Management an Infrastructure. The main problem with the identities of researchers is the quite high frequency changes in positions during a scientist life. The required system needed to be a system that already contained the potential of preregistered people with their scientific publications from other countries, institutions and organizations. Scanning the author ID marketplace brought up, that there us a high risk of additional workload to the researcher itself or the administration due to the fact that individuals need to register an ID for themselves or the chosen register is not yet big enough to simply find the right entry. On the other hand libraries deal with authors and their publications now for centuries and they have high quality catalogs with person identities already available. Millions of records internationally mapped are available by collaboration with libraries and can be used in exactly the same scope. The international collaboration between libraries (VIAF) provides a mapping between libraries from the US, CA, UK, FR, GER and many more. The international library author identification system made it possible to actually reach at the first matching a success of 60% of all scientists. The additional advantage is that librarians can finalize the Identity system in a kind of background process. The Kiel Data Management Infrastructure initiated a web service at Kiel for mapping from one ID to another. This web service supports the scientific workflows for automation of the data archiving process at world data archive PANGAEA. The long-lasting concept of the library identifier enables the use of these identifiers beyond the employment period, while it has nothing to do with the institutional IDM. The access rights and ownership of data can be assured for very long time since the national library with its national scope hosts the basic system. Making use of this existing system released resourced planed for this task and enabled the chance of interoperability on an international scale for a regional data management infrastructure.

  8. Globus Nexus: A Platform-as-a-Service Provider of Research Identity, Profile, and Group Management.

    PubMed

    Chard, Kyle; Lidman, Mattias; McCollam, Brendan; Bryan, Josh; Ananthakrishnan, Rachana; Tuecke, Steven; Foster, Ian

    2016-03-01

    Globus Nexus is a professionally hosted Platform-as-a-Service that provides identity, profile and group management functionality for the research community. Many collaborative e-Science applications need to manage large numbers of user identities, profiles, and groups. However, developing and maintaining such capabilities is often challenging given the complexity of modern security protocols and requirements for scalable, robust, and highly available implementations. By outsourcing this functionality to Globus Nexus, developers can leverage best-practice implementations without incurring development and operations overhead. Users benefit from enhanced capabilities such as identity federation, flexible profile management, and user-oriented group management. In this paper we present Globus Nexus, describe its capabilities and architecture, summarize how several e-Science applications leverage these capabilities, and present results that characterize its scalability, reliability, and availability.

  9. Globus Nexus: A Platform-as-a-Service provider of research identity, profile, and group management

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chard, Kyle; Lidman, Mattias; McCollam, Brendan

    Globus Nexus is a professionally hosted Platform-as-a-Service that provides identity, profile and group management functionality for the research community. Many collaborative e-Science applications need to manage large numbers of user identities, profiles, and groups. However, developing and maintaining such capabilities is often challenging given the complexity of modern security protocols and requirements for scalable, robust, and highly available implementations. By outsourcing this functionality to Globus Nexus, developers can leverage best-practice implementations without incurring development and operations overhead. Users benefit from enhanced capabilities such as identity federation, flexible profile management, and user-oriented group management. In this paper we present Globus Nexus,more » describe its capabilities and architecture, summarize how several e-Science applications leverage these capabilities, and present results that characterize its scalability, reliability, and availability.« less

  10. Globus Nexus: A Platform-as-a-Service Provider of Research Identity, Profile, and Group Management

    PubMed Central

    Lidman, Mattias; McCollam, Brendan; Bryan, Josh; Ananthakrishnan, Rachana; Tuecke, Steven; Foster, Ian

    2015-01-01

    Globus Nexus is a professionally hosted Platform-as-a-Service that provides identity, profile and group management functionality for the research community. Many collaborative e-Science applications need to manage large numbers of user identities, profiles, and groups. However, developing and maintaining such capabilities is often challenging given the complexity of modern security protocols and requirements for scalable, robust, and highly available implementations. By outsourcing this functionality to Globus Nexus, developers can leverage best-practice implementations without incurring development and operations overhead. Users benefit from enhanced capabilities such as identity federation, flexible profile management, and user-oriented group management. In this paper we present Globus Nexus, describe its capabilities and architecture, summarize how several e-Science applications leverage these capabilities, and present results that characterize its scalability, reliability, and availability. PMID:26688598

  11. Academic Manager or Managed Academic? Academic Identity Schisms in Higher Education

    ERIC Educational Resources Information Center

    Winter, Richard

    2009-01-01

    The relationship between values and academic identity has received scant attention in the higher education literature with some notable exceptions (Churchman, 2006; Harley, 2002; Henkel, 2005). This paper contends that the perceived need to align all academics around corporate values and goals has given rise to academic identity schisms in higher…

  12. 77 FR 13337 - Agency Information Collection Activities: Proposed Collection; Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-06

    ... ``Part B'' of the QualityNet Identity Management System Account Form (CMS-10267; OCN: 0938-1050). Once the ESRD System Access Form is approved, the QualityNet Identity Management System (QIMS) Account Form... the ESRD systems through the creation of user IDs and passwords within the QualityNet Identity...

  13. The Effects of Virtual Communities on Group Identity in Classroom Management

    ERIC Educational Resources Information Center

    Ho, Tu-Kuang; Lin, Yu-Tzeng

    2016-01-01

    Group identity is a critical component in developing effective classroom management. While there have been numerous studies on group identity, they have primarily focused on its effects on the physical classroom entity. Advances in information technology, however, have enabled the creation of virtual communities, which have become a vital channel…

  14. RFID identity theft and countermeasures

    NASA Astrophysics Data System (ADS)

    Herrigel, Alexander; Zhao, Jian

    2006-02-01

    This paper reviews the ICAO security architecture for biometric passports. An attack enabling RFID identity theft for a later misuse is presented. Specific countermeasures against this attack are described. Furthermore, it is shown that robust high capacity digital watermarking for the embedding and retrieving of binary digital signature data can be applied as an effective mean against RFID identity theft. This approach requires only minimal modifications of the passport manufacturing process and is an enhancement of already proposed solutions. The approach may also be applied in combination with a RFID as a backup solution (damaged RFID chip) to verify with asymmetric cryptographic techniques the authenticity and the integrity of the passport data.

  15. 21 CFR 178.1005 - Hydrogen peroxide solution.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 21 Food and Drugs 3 2014-04-01 2014-04-01 false Hydrogen peroxide solution. 178.1005 Section 178... Growth of Microorganisms § 178.1005 Hydrogen peroxide solution. Hydrogen peroxide solution identified in...)(1) of this section. (a) Identity. For the purpose of this section, hydrogen peroxide solution is an...

  16. The Formation of Professional Identity in French "Apprenti" Managers

    ERIC Educational Resources Information Center

    Angot, Jacques; Malloch, Hedley; Kleymann, Birgit

    2008-01-01

    Purpose: The paper aims to show how professional identity is constructed at a very early stage of initial management education. In so doing, it questions the notion of "le metier" in management. Design/methodology/approach: The paper is based on a study of the experiences of six French management apprentices (or apprentis) who…

  17. 24 CFR 30.68 - Section 8 owners.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... an identity of interest and identity of interest agent. An entity: (1) That has management..., decisions, duties, employment, or personnel of the management agent. Entity. An individual corporation... participation. An indirect interest includes equity participation in any entity that holds a management interest...

  18. CILogon: An Integrated Identity and Access Management Platform for Science

    NASA Astrophysics Data System (ADS)

    Basney, J.

    2016-12-01

    When scientists work together, they use web sites and other software to share their ideas and data. To ensure the integrity of their work, these systems require the scientists to log in and verify that they are part of the team working on a particular science problem. Too often, the identity and access verification process is a stumbling block for the scientists. Scientific research projects are forced to invest time and effort into developing and supporting Identity and Access Management (IAM) services, distracting them from the core goals of their research collaboration. CILogon provides an IAM platform that enables scientists to work together to meet their IAM needs more effectively so they can allocate more time and effort to their core mission of scientific research. The CILogon platform enables federated identity management and collaborative organization management. Federated identity management enables researchers to use their home organization identities to access cyberinfrastructure, rather than requiring yet another username and password to log on. Collaborative organization management enables research projects to define user groups for authorization to collaboration platforms (e.g., wikis, mailing lists, and domain applications). CILogon's IAM platform serves the unique needs of research collaborations, namely the need to dynamically form collaboration groups across organizations and countries, sharing access to data, instruments, compute clusters, and other resources to enable scientific discovery. CILogon provides a software-as-a-service platform to ease integration with cyberinfrastructure, while making all software components publicly available under open source licenses to enable re-use. Figure 1 illustrates the components and interfaces of this platform. CILogon has been operational since 2010 and has been used by over 7,000 researchers from more than 170 identity providers to access cyberinfrastructure including Globus, LIGO, Open Science Grid, SeedMe, and XSEDE. The "CILogon 2.0" platform, launched in 2016, adds support for virtual organization (VO) membership management, identity linking, international collaborations, and standard integration protocols, through integration with the Internet2 COmanage collaboration software.

  19. Recent progress in irrational conformal field theory

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Halpern, M.B.

    1993-09-01

    In this talk, I will review the foundations of irrational conformal field theory (ICFT), which includes rational conformal field theory as a small subspace. Highlights of the review include the Virasoro master equation, the Ward identities for the correlators of ICFT and solutions of the Ward identities. In particular, I will discuss the solutions for the correlators of the g/h coset construction and the correlators of the affine-Sugawara nests on g {contains} h{sub 1} {contains} {hor_ellipsis} {contains} h{sub n}. Finally, I will discuss the recent global solution for the correlators of all the ICFT`s in the master equation.

  20. An EMSO data case study within the INDIGO-DC project

    NASA Astrophysics Data System (ADS)

    Monna, Stephen; Marcucci, Nicola M.; Marinaro, Giuditta; Fiore, Sandro; D'Anca, Alessandro; Antonacci, Marica; Beranzoli, Laura; Favali, Paolo

    2017-04-01

    We present our experience based on a case study within the INDIGO-DataCloud (INtegrating Distributed data Infrastructures for Global ExplOitation) project (www.indigo-datacloud.eu). The aim of INDIGO-DC is to develop a data and computing platform targeting scientific communities. Our case study is an example of activities performed by INGV using data from seafloor observatories that are nodes of the infrastructure EMSO (European Multidisciplinary Seafloor and water column Observatory)-ERIC (www.emso-eu.org). EMSO is composed of several deep-seafloor and water column observatories, deployed at key sites in the European waters, thus forming a widely distributed pan-European infrastructure. In our case study we consider data collected by the NEMO-SN1 observatory, one of the EMSO nodes used for geohazard monitoring, located in the Western Ionian Sea in proximity of Etna volcano. Starting from the case study, through an agile approach, we defined some requirements for INDIGO developers, and tested some of the proposed INDIGO solutions that are of interest for our research community. Given that EMSO is a distributed infrastructure, we are interested in INDIGO solutions that allow access to distributed data storage. Access should be both user-oriented and machine-oriented, and with the use of a common identity and access system. For this purpose, we have been testing: - ONEDATA (https://onedata.org), as global data management system. - INDIGO-IAM as Identity and Access Management system. Another aspect we are interested in is the efficient data processing, and we have focused on two types of INDIGO products: - Ophidia (http://ophidia.cmcc.it), a big data analytics framework for eScience for the analysis of multidimensional data. - A collection of INDIGO Services to run processes for scientific computing through the INDIGO Orchestrator.

  1. Brief Report: The Identity Style Inventory (ISI-3) and the Utrecht-Management of Identity Commitments Scale (U-MICS)--Factor Structure, Reliability, and Convergent Validity in French-Speaking University Students

    ERIC Educational Resources Information Center

    Zimmermann, Gregoire; Mahaim, Elodie Biermann; Mantzouranis, Gregory; Genoud, Philippe A.; Crocetti, Elisabetta

    2012-01-01

    The purpose of this study was to evaluate the factor structure and the reliability of the French versions of the Identity Style Inventory (ISI-3) and the Utrecht-Management of Identity Commitments Scale (U-MICS) in a sample of college students (N = 457, 18-25 years old). Confirmatory factor analyses confirmed the hypothesized three-factor solution…

  2. Does identity shape leadership and management practice? Experiences of PHC facility managers in Cape Town, South Africa.

    PubMed

    Daire, Judith; Gilson, Lucy

    2014-09-01

    In South Africa, as elsewhere, Primary Health Care (PHC) facilities are managed by professional nurses. Little is known about the dimensions and challenges of their job, or what influences their managerial practice. Drawing on leadership and organizational theory, this study explored what the job of being a PHC manager entails, and what factors influence their managerial practice. We specifically considered whether the appointment of professional nurses as facility managers leads to an identity transition, from nurse to manager. The overall intention was to generate ideas about how to support leadership development among PHC facility managers. Adopting case study methodology, the primary researcher facilitated in-depth discussions (about their personal history and managerial experiences) with eight participating facility managers from one geographical area. Other data were collected through in-depth interviews with key informants, document review and researcher field notes/journaling. Analysis involved data triangulation, respondent and peer review and cross-case analysis. The experiences show that the PHC facility manager's job is dominated by a range of tasks and procedures focused on clinical service management, but is expected to encompass action to address the population and public health needs of the surrounding community. Managing with and through others, and in a complex system, requiring self-management, are critical aspects of the job. A range of personal, professional and contextual factors influence managerial practice, including professional identity. The current largely facility-focused management practice reflects the strong nursing identity of managers and broader organizational influences. However, three of the eight managers appear to self-identify an emerging leadership identity and demonstrate related managerial practices. Nonetheless, there is currently limited support for an identity transition towards leadership in this context. Better support for leadership development could include talent-spotting and nurturing, induction and peer-mentoring for newly appointed facility managers, ongoing peer-support once in post and continuous reflective practice. Published by Oxford University Press in association with The London School of Hygiene and Tropical Medicine © The Author 2014; all rights reserved.

  3. [Meanings attributed to management as an explanation for clinician managers' attitudes and professional identity].

    PubMed

    Cascón-Pereira, Rosalía; Valverde, Mireia

    2014-01-01

    To understand the process by which clinician managers construct their professional identities and develop their attitudes toward managing. A qualitative study was performed, based on grounded theory, through in-depth interviews with 20 clinician managers selected through theoretical sampling in two public hospitals of Catalonia (Spain), participant observation, and documentation. Clinician managers' role meanings are constructed by comparing their roles with those of senior managers and clinicians. In this process, clinician managers seek to differentiate themselves from senior managers through the meanings constructed. In particular, they use proximity with reality and clinical knowledge as the main sources of differentiation. This study sheds light on why clinician managers develop adverse attitudes to managing and why they define themselves as clinicians rather than as managers. The explanation lies in the construction of the meanings they assign to managing as the basis of their attitudes to this role and professional identity. These findings have some practical implications for healthcare management. Copyright © 2014. Published by Elsevier Espana.

  4. Adequate Security Protocols Adopt in a Conceptual Model in Identity Management for the Civil Registry of Ecuador

    NASA Astrophysics Data System (ADS)

    Toapanta, Moisés; Mafla, Enrique; Orizaga, Antonio

    2017-08-01

    We analyzed the problems of security of the information of the civil registries and identification at world level that are considered strategic. The objective is to adopt the appropriate security protocols in a conceptual model in the identity management for the Civil Registry of Ecuador. In this phase, the appropriate security protocols were determined in a Conceptual Model in Identity Management with Authentication, Authorization and Auditing (AAA). We used the deductive method and exploratory research to define the appropriate security protocols to be adopted in the identity model: IPSec, DNSsec, Radius, SSL, TLS, IEEE 802.1X EAP, Set. It was a prototype of the location of the security protocols adopted in the logical design of the technological infrastructure considering the conceptual model for Identity, Authentication, Authorization, and Audit management. It was concluded that the adopted protocols are appropriate for a distributed database and should have a direct relationship with the algorithms, which allows vulnerability and risk mitigation taking into account confidentiality, integrity and availability (CIA).

  5. Bringing social identity to work: the influence of manifestation and suppression on perceived discrimination, job satisfaction, and turnover intentions.

    PubMed

    Madera, Juan M; King, Eden B; Hebl, Michelle R

    2012-04-01

    In the current article, we explored whether manifesting or suppressing an identity (race/ethnicity, gender, age, religion, sexual orientation, or disability) at work is related to perceived discrimination, job satisfaction, and turnover intentions. Participants included 211 working adults who completed an online survey. The results showed that efforts to suppress a group identity were positively (and behavioral manifestations of group identity negatively) related to perceived discrimination, which predicted job satisfaction and turnover intentions. These results suggest that diverse employees actively manage their nonwork identities while at work and that these identity management strategies have important consequences. PsycINFO Database Record (c) 2012 APA, all rights reserved.

  6. Building an Identity Management Governance Process

    ERIC Educational Resources Information Center

    Berg, Joanne E.; Kraemer, Ron; Raatz, Carla; Devoti, Steve

    2009-01-01

    A particular challenge in any campus environment is determining how requests for access to services and resources are managed. Who decides the technology, infrastructure, policy, business process and procedure? The involvement of key institutional leaders and stakeholders in identity management governance is the driving force behind the way the…

  7. Leveraging Commercially Issued Multi-Factor Identification Credentials

    NASA Technical Reports Server (NTRS)

    Baldridge, Tim W.

    2010-01-01

    This slide presentation reviews the Identity, Credential and Access Management (ICAM) system. This system is a complete system of identity management, access to desktops and applications, use of smartcards, and building access throughout NASA.

  8. 75 FR 39696 - Agency Information Collection Activities: Proposed Collection; Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-12

    ...; Title of Information Collection: QualityNet Identity Management System (QIMS) Account Form; Use: The QualityNet Identity Management System (QIMS) account registration form must be completed by any new...

  9. A Contextual Model for Identity Management (IdM) Interfaces

    ERIC Educational Resources Information Center

    Fuller, Nathaniel J.

    2014-01-01

    The usability of Identity Management (IdM) systems is highly dependent upon design that simplifies the processes of identification, authentication, and authorization. Recent findings reveal two critical problems that degrade IdM usability: (1) unfeasible techniques for managing various digital identifiers, and (2) ambiguous security interfaces.…

  10. Research Management in Portugal: A Quest for Professional Identity

    ERIC Educational Resources Information Center

    Trindade, Margarida; Agostinho, Marta

    2014-01-01

    Research managers at science-intensive institutions appear as a continuously evolving group of professionals whose identity is somewhat fragmented, even to themselves. In Portugal, specialized research manager roles have rapidly emerged over the last years alongside the development of a small but consolidated scientific system. In order to get an…

  11. The Role of Individual Differences and Situational Variables in the Use of Workplace Sexual Identity Management Strategies.

    PubMed

    Reed, Louren; Leuty, Melanie E

    2016-07-01

    Examination of individual difference variables have been largely ignored within research on the use of workplace sexual identity management strategies. The current study examined personality traits (extraversion, openness, and neuroticism), facets of sexual identity development (identity confusion, internalized heterosexism), and situational variables (e.g., perceptions of workplace climate and heterosexism) in explaining the use of management strategies, as well as possible interactions between individual and situational factors. Perceptions of the workplace climate toward lesbian and gay individuals significantly related to the use each of the management strategies, and Internalized Heterosexism was found to significantly predict the use of the Explicitly Out strategy. Most interactions between individual difference and situational variables were not supported, with the exception of an interaction between workplace heterosexism and internalized homophobia in explaining the use of the Explicitly Out strategy.

  12. 21 CFR 58.83 - Reagents and solutions.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 21 Food and Drugs 1 2011-04-01 2011-04-01 false Reagents and solutions. 58.83 Section 58.83 Food and Drugs FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL GOOD... solutions. All reagents and solutions in the laboratory areas shall be labeled to indicate identity, titer...

  13. 75 FR 57035 - Agency Information Collection Activities: Submission for OMB Review; Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-17

    ... collection; Title of Information Collection: QualityNet Identity Management System (QIMS) Account Form; Use: The QualityNet Identity Management System (QIMS) account registration form must be completed by any...

  14. Adaptation of the Utrecht-Management of Identity Commitments Scale (U-MICS) to the measurement of the parental identity domain.

    PubMed

    Piotrowski, Konrad

    2018-04-01

    The present studies examined the psychometric properties of the Utrecht-Management of Identity Commitments Scale (U-MICS) adapted to the measurement of identity formation in the parental identity domain. As the parental identity domain has only been studied within the neo-Eriksonian approach to a very limited extent, the aim of these studies was to prepare a short, valid and reliable tool for the measurement of parental identity in order to fill this gap. The associations of commitment, in-depth exploration and reconsideration of commitment in the parental domain with well-being and with other identity constructs were analyzed. The results showed that parental identity formation is associated with mothers' satisfaction with life and trait anxiety and with identity formation in other areas as well. The initial results suggest that the adapted version of the U-MICS is a valid and reliable measure that can be used in future studies on parental identity formation. © 2017 The Author. Scandinavian Journal of Psychology published by Scandinavian Psychological Associations and John Wiley & Sons Ltd.

  15. Trusted computing strengthens cloud authentication.

    PubMed

    Ghazizadeh, Eghbal; Zamani, Mazdak; Ab Manan, Jamalul-lail; Alizadeh, Mojtaba

    2014-01-01

    Cloud computing is a new generation of technology which is designed to provide the commercial necessities, solve the IT management issues, and run the appropriate applications. Another entry on the list of cloud functions which has been handled internally is Identity Access Management (IAM). Companies encounter IAM as security challenges while adopting more technologies became apparent. Trust Multi-tenancy and trusted computing based on a Trusted Platform Module (TPM) are great technologies for solving the trust and security concerns in the cloud identity environment. Single sign-on (SSO) and OpenID have been released to solve security and privacy problems for cloud identity. This paper proposes the use of trusted computing, Federated Identity Management, and OpenID Web SSO to solve identity theft in the cloud. Besides, this proposed model has been simulated in .Net environment. Security analyzing, simulation, and BLP confidential model are three ways to evaluate and analyze our proposed model.

  16. Trusted Computing Strengthens Cloud Authentication

    PubMed Central

    2014-01-01

    Cloud computing is a new generation of technology which is designed to provide the commercial necessities, solve the IT management issues, and run the appropriate applications. Another entry on the list of cloud functions which has been handled internally is Identity Access Management (IAM). Companies encounter IAM as security challenges while adopting more technologies became apparent. Trust Multi-tenancy and trusted computing based on a Trusted Platform Module (TPM) are great technologies for solving the trust and security concerns in the cloud identity environment. Single sign-on (SSO) and OpenID have been released to solve security and privacy problems for cloud identity. This paper proposes the use of trusted computing, Federated Identity Management, and OpenID Web SSO to solve identity theft in the cloud. Besides, this proposed model has been simulated in .Net environment. Security analyzing, simulation, and BLP confidential model are three ways to evaluate and analyze our proposed model. PMID:24701149

  17. Spoiled Group Identities and Backstage Work: A Theory of Stigma Management Rehearsals

    ERIC Educational Resources Information Center

    O'Brien, John

    2011-01-01

    How do persons with a stigmatized identity learn potential responses to discrimination and harassment? Drawing on three and a half years of ethnographic data, this paper demonstrates how members of a group of Muslim American youth are socialized in locally dominant stigma management strategies through stigma management rehearsals. Stigma…

  18. "Managing by Not Managing": How Gay Engineering Students Manage Sexual Orientation Identity

    ERIC Educational Resources Information Center

    Hughes, Bryce E.

    2017-01-01

    From a social constructivist paradigm I explored the experiences of 7 openly gay engineering students to understand how, if at all, they made sense of the intersections between their engineering and sexual orientation identities. By eliciting stories through individual and focus group interviews, a narrative approach allowed me to capture the…

  19. Wildland recreationists’ natural resource management purposes and preferences: a connection to environmental identity

    Treesearch

    Patricia L. Winter; Deborah J. Chavez

    2008-01-01

    Wilderness and day use recreationists’ preferences for natural resource management and their perceptions of purposes for management are examined in this paper. Environmental identity (EID) salience is used to help shed light on variations in recreationists’ preferences for how natural resources should be managed. Findings from two studies are reported; the first was...

  20. Fermionic solution of the Andrews-Baxter-Forrester model. II. Proof of Melzer`s polynomial identities

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Warnaar, S.O.

    1996-07-01

    We compute the one-dimensional configuration sums of the AFB model using the fermionic techniques introduced in part I of this paper. Combined with the results of Andrews, Baxter, and Forrester, we prove polynominal identities for finitizations of the Virasoro characters {sub {chi}b, a}{sup (r-1, r)}(q) as conjectured by Melzer. In the thermodynamic limit these identities reproduce Rogers-Ramanujan-type identities for the unitary minimal Virasoro characters conjectured by the Stony Brook group. We also present a list of additional Virasoro character identities which follow from our proof of Melzer`s identities and application of Bailey`s lemma.

  1. Family support in the transition to adulthood in Portugal--its effects on identity capital development, uncertainty management and psychological well-being.

    PubMed

    Oliveira, José Egídio; Mendonça, Marina; Coimbra, Susana; Fontaine, Anne Marie

    2014-12-01

    In a familistic southern European society such as the Portuguese, the family has historically played a prominent role in supporting the negotiation of transition pathways into adulthood. The present study aimed at capturing (1) the relative weight of parental financial support and autonomy support in contributing to the youngsters' psychological well-being (PWB), and (2) the mediating role of identity capital and uncertainty management in this relationship. A total of 620 participants completed measures of parental support, identity capital, uncertainty management and PWB. Autonomy support was found to be the strongest predictor of PWB, both directly and indirectly through its effects on identity capital and the use of target focused uncertainty management strategies. Conversely, financial support evidenced only a minor indirect impact through the mediation of tangible identity capital. Autonomy stimulation may constitute one of the most developmentally determinant family challenges in assisting the process of coming of age in Portugal. Copyright © 2014 The Foundation for Professionals in Services for Adolescents. Published by Elsevier Ltd. All rights reserved.

  2. 21 CFR 58.83 - Reagents and solutions.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... and Drugs FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL GOOD LABORATORY PRACTICE FOR NONCLINICAL LABORATORY STUDIES Testing Facilities Operation § 58.83 Reagents and solutions. All reagents and solutions in the laboratory areas shall be labeled to indicate identity, titer...

  3. Managing Quality, Identity and Adversaries in Public Discourse with Machine Learning

    ERIC Educational Resources Information Center

    Brennan, Michael

    2012-01-01

    Automation can mitigate issues when scaling and managing quality and identity in public discourse on the web. Discourse needs to be curated and filtered. Anonymous speech has to be supported while handling adversaries. Reliance on human curators or analysts does not scale and content can be missed. These scaling and management issues include the…

  4. Dialogue, Language and Identity: Critical Issues for Networked Management Learning

    ERIC Educational Resources Information Center

    Ferreday, Debra; Hodgson, Vivien; Jones, Chris

    2006-01-01

    This paper draws on the work of Mikhail Bakhtin and Norman Fairclough to show how dialogue is central to the construction of identity in networked management learning. The paper is based on a case study of a networked management learning course in higher education and attempts to illustrate how participants negotiate issues of difference,…

  5. 76 FR 73604 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-29

    ... Defense. Deletion: K890.12 Identity Management (IDM) (March 18, 2010, 75 FR 13090). Reason: Due to policy... (SAAM) project (formerly known as Identity Management). [FR Doc. 2011-30698 Filed 11-28-11; 8:45 am... Docket Management System Office, 4800 Mark Center Drive, East Tower, 2nd floor, Suite 02G09, Alexandria...

  6. The Policy Maker's Anguish: Regulating Personal Data Behavior Between Paradoxes and Dilemmas

    NASA Astrophysics Data System (ADS)

    Compañó, Ramón; Lusoli, Wainer

    Regulators in Europe and elsewhere are paying great attention to identity, privacy and trust in online and converging environments. Appropriate regulation of identity in a ubiquitous information environment is seen as one of the major drivers of the future Internet economy. Regulation of personal identity data has come to the fore including mapping conducted on digital personhood by the OECD; work on human rights and profiling by the Council of Europe andmajor studies by the European Commission with regard to self-regulation in the privacy market, electronic identity technical interoperability and enhanced safety for young people. These domains overlap onto an increasingly complex model of regulation of individuals' identity management, online and offline. This chapter argues that policy makers struggle to deal with issues concerning electronic identity, due to the apparently irrational and unpredictable behavior of users when engaging in online interactions involving identity management. Building on empirical survey evidence from four EU countries, we examine the first aspect in detail - citizens' management of identity in a digital environment. We build on data from a large scale (n = 5,265) online survey of attitudes to electronic identity among young Europeans (France, Germany, Spain, UK) conducted in August 2008. The survey asked questions about perceptions and acceptance of risks, general motivations, attitudes and behaviors concerning electronic identity. Four behavioral paradoxes are identified in the analysis: a privacy paradox (to date well known), but also a control paradox, a responsibility paradox and an awareness paradox. The chapter then examines the paradoxes in relation of three main policy dilemmas framing the debate on digital identity. The paper concludes by arguing for an expanded identity debate spanning policy circles and the engineering community.

  7. Report: Improvements Needed in CSB’s Identity and Access Management and Incident Response Security Functions

    EPA Pesticide Factsheets

    Report #18-P-0030, October 30, 2017. Weaknesses in the Identity and Access Management and Incident Response metric domains leave the CSB vulnerable to attacks occurring and not being detected in a timely manner.

  8. Air traffic surveillance and control using hybrid estimation and protocol-based conflict resolution

    NASA Astrophysics Data System (ADS)

    Hwang, Inseok

    The continued growth of air travel and recent advances in new technologies for navigation, surveillance, and communication have led to proposals by the Federal Aviation Administration (FAA) to provide reliable and efficient tools to aid Air Traffic Control (ATC) in performing their tasks. In this dissertation, we address four problems frequently encountered in air traffic surveillance and control; multiple target tracking and identity management, conflict detection, conflict resolution, and safety verification. We develop a set of algorithms and tools to aid ATC; These algorithms have the provable properties of safety, computational efficiency, and convergence. Firstly, we develop a multiple-maneuvering-target tracking and identity management algorithm which can keep track of maneuvering aircraft in noisy environments and of their identities. Secondly, we propose a hybrid probabilistic conflict detection algorithm between multiple aircraft which uses flight mode estimates as well as aircraft current state estimates. Our algorithm is based on hybrid models of aircraft, which incorporate both continuous dynamics and discrete mode switching. Thirdly, we develop an algorithm for multiple (greater than two) aircraft conflict avoidance that is based on a closed-form analytic solution and thus provides guarantees of safety. Finally, we consider the problem of safety verification of control laws for safety critical systems, with application to air traffic control systems. We approach safety verification through reachability analysis, which is a computationally expensive problem. We develop an over-approximate method for reachable set computation using polytopic approximation methods and dynamic optimization. These algorithms may be used either in a fully autonomous way, or as supporting tools to increase controllers' situational awareness and to reduce their work load.

  9. Verifying Parentage and Confirming Identity in Blackberry with a Fingerprinting Set

    USDA-ARS?s Scientific Manuscript database

    Parentage and identity confirmation is an important aspect of clonally propagated crops outcrossing. Potential errors resulting misidentification include off-type pollination events, labeling errors, or sports of clones. DNA fingerprinting sets are an excellent solution to quickly identify off-type ...

  10. Rethinking the ethical approach to health information management through narration: pertinence of Ricœur's 'little ethics'.

    PubMed

    Mouton Dorey, Corine

    2016-12-01

    The increased complexity of health information management sows the seeds of inequalities between health care stakeholders involved in the production and use of health information. Patients may thus be more vulnerable to use of their data without their consent and breaches in confidentiality. Health care providers can also be the victims of a health information system that they do not fully master. Yet, despite its possible drawbacks, the management of health information is indispensable for advancing science, medical care and public health. Therefore, the central question addressed by this paper is how to manage health information ethically? This article argues that Paul Ricœur's "little ethics", based on his work on hermeneutics and narrative identity, provides a suitable ethical framework to this end. This ethical theory has the merit of helping to harmonise self-esteem and solicitude amongst patients and healthcare providers, and at the same time provides an ethics of justice in public health. A matrix, derived from Ricœur's ethics, has been developed as a solution to overcoming possible conflicts between privacy interests and the common good in the management of health information.

  11. [Effects of an integrated self-management program on self-management, glycemic control, and maternal identity in women with gestational diabetes mellitus].

    PubMed

    Kim, HeeSook; Kim, Sue

    2013-02-01

    The purpose of the study was to investigate the effects of an integrated self-management program on self-management, glycemic control, and maternal identity in women with gestational diabetes mellitus (GDM). A non-equivalent control group non-synchronized quasi-experimental design was used. A total of 55 women with GDM were recruited from Cheil General Hospital, Seoul, Korea and were assigned to an experimental (n=28) or control group (n=27). The participants were 24-30 weeks pregnant women who had been diagnosed with GDM as of July 30, 2010. The program was conducted as a 1 hour small group meeting 3 out of 5 times and by telephone-counseling 2 out of 5 times. The integrated self-management program was verified by an expert panel. Although there was no significant reduction in HbA1c (U= -1.17, p=.238), there were statistically significant increases in self-management (U= -3.80, p<.001) and maternal identity (U= -4.48, p<.001), and decreased 2-h postprandial glucose levels (U= -2.43, p<.015) in the experimental group compared to the control group. These findings suggest that an integrated self-management program for women with GDM improves self-management, maternal identity, and glycemic control. Further studies are needed to identify the effects of an integrated self-management program on pregnancy and neonatal outcomes.

  12. A Social Identity Analysis of Climate Change and Environmental Attitudes and Behaviors: Insights and Opportunities

    PubMed Central

    Fielding, Kelly S.; Hornsey, Matthew J.

    2016-01-01

    Environmental challenges are often marked by an intergroup dimension. Political conservatives and progressives are divided on their beliefs about climate change, farmers come into conflict with scientists and environmentalists over water allocation or species protection, and communities oppose big business and mining companies that threaten their local environment. These intergroup tensions are reminders of the powerful influence social contexts and group memberships can have on attitudes, beliefs, and actions relating to climate change and the environment more broadly. In this paper, we use social identity theory to help describe and explain these processes. We review literature showing, how conceiving of oneself in terms of a particular social identity influences our environmental attitudes and behaviors, how relations between groups can impact on environmental outcomes, and how the content of social identities can direct group members to act in more or less pro-environmental ways. We discuss the similarities and differences between the social identity approach to these phenomena and related theories, such as cultural cognition theory, the theory of planned behavior, and value-belief-norm theory. Importantly, we also advance social-identity based strategies to foster more sustainable environmental attitudes and behaviors. Although this theoretical approach can provide important insights and potential solutions, more research is needed to build the empirical base, especially in relation to testing social identity solutions. PMID:26903924

  13. A Social Identity Analysis of Climate Change and Environmental Attitudes and Behaviors: Insights and Opportunities.

    PubMed

    Fielding, Kelly S; Hornsey, Matthew J

    2016-01-01

    Environmental challenges are often marked by an intergroup dimension. Political conservatives and progressives are divided on their beliefs about climate change, farmers come into conflict with scientists and environmentalists over water allocation or species protection, and communities oppose big business and mining companies that threaten their local environment. These intergroup tensions are reminders of the powerful influence social contexts and group memberships can have on attitudes, beliefs, and actions relating to climate change and the environment more broadly. In this paper, we use social identity theory to help describe and explain these processes. We review literature showing, how conceiving of oneself in terms of a particular social identity influences our environmental attitudes and behaviors, how relations between groups can impact on environmental outcomes, and how the content of social identities can direct group members to act in more or less pro-environmental ways. We discuss the similarities and differences between the social identity approach to these phenomena and related theories, such as cultural cognition theory, the theory of planned behavior, and value-belief-norm theory. Importantly, we also advance social-identity based strategies to foster more sustainable environmental attitudes and behaviors. Although this theoretical approach can provide important insights and potential solutions, more research is needed to build the empirical base, especially in relation to testing social identity solutions.

  14. 24 CFR 30.68 - Section 8 owners.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... an identity of interest and identity of interest agent. An entity: (1) That has management..., decisions, duties, employment, or personnel of the management agent. Entity. An individual corporation... thereof; or any other organization or group of people. Ownership interest. Any direct or indirect interest...

  15. 24 CFR 30.68 - Section 8 owners.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... an identity of interest and identity of interest agent. An entity: (1) That has management..., decisions, duties, employment, or personnel of the management agent. Entity. An individual corporation... thereof; or any other organization or group of people. Ownership interest. Any direct or indirect interest...

  16. 24 CFR 30.68 - Section 8 owners.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... an identity of interest and identity of interest agent. An entity: (1) That has management..., decisions, duties, employment, or personnel of the management agent. Entity. An individual corporation... thereof; or any other organization or group of people. Ownership interest. Any direct or indirect interest...

  17. 24 CFR 30.68 - Section 8 owners.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... an identity of interest and identity of interest agent. An entity: (1) That has management..., decisions, duties, employment, or personnel of the management agent. Entity. An individual corporation... thereof; or any other organization or group of people. Ownership interest. Any direct or indirect interest...

  18. Revisiting the two formulations of Bianchi identities and their implications on moduli stabilization

    NASA Astrophysics Data System (ADS)

    Shukla, Pramod

    2016-08-01

    In the context of non-geometric type II orientifold compactifications, there have been two formulations for representing the various NS-NS Bianchi-identities. In the first formulation, the standard three-form flux ( H 3), the geometric flux ( ω) and the non-geometric fluxes ( Q and R) are expressed by using the real six-dimensional indices (e.g. {H}_{ijk}, {ω_{ij}}^k, {Q_i}{_{jk}} and R ijk ), and this formulation has been heavily utilized for simplifying the scalar potentials in toroidal-orientifolds. On the other hand, relevant for the studies beyond toroidal backgrounds, a second formulation is utilized in which all flux components are written in terms of various involutively even/odd (2 , 1)- and (1 , 1)-cohomologies of the complex threefold. In the lights of recent model building interests and some observations made in [1, 2], in this article, we revisit two most commonly studied toroidal examples in detail to illustrate that the present forms of these two formulations are not completely equivalent. To demonstrate the same, we translate all the identities of the first formulation into cohomology ingredients, and after a tedious reshuffling of the subsequent constraints, interestingly we find that all the identities of the second formulation are embedded into the first formulation which has some additional constraints. In addition, we look for the possible solutions of these Bianchi identities in a detailed analysis, and we find that some solutions can reduce the size of scalar potential very significantly, and in some cases are too strong to break the no-scale structure completely. Finally, we also comment on the influence of imposing some of the solutions of Bianchi identities in studying moduli stabilization.

  19. Structural characterization of metal complexes in aqueous solutions: a XAS study of stannous fluoride

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Alsina, Marco A.; Gaillard, Jean-François

    The identity and structure of tin(ii)-fluoride complexes formed in aqueous solutions are determined by combining X-ray absorption spectroscopy, thermodynamic modeling and quantum mechanical calculations.

  20. Adolescents at School: Perspectives on Youth, Identity, and Education.

    ERIC Educational Resources Information Center

    Sadowski, Michael, Ed.

    This collection of papers suggests ways to foster the success of all students in schools and classrooms, focusing on the complex, changing identities young people manage while confronting the challenges of school. The papers are: "Introduction: Why Identity Matters at School" (Michael Sadowski); (1) "Identity and Possibility:…

  1. Use of standardized multidimensional evaluation tools and the emergence of the case manager's professional identity in France.

    PubMed

    Nugue, Mathilde; De Stampa, Matthieu; Couturier, Yves; Somme, Dominique

    2012-01-01

    In France, the national public health plan proposes a group of innovations including the initiation of case management for older adults in complex situations, particularly those with cognitive disorders. In this context, public authorities asked case managers to use a standardized multidimensional evaluation tool. The results of a qualitative study on the pertinence of such a tool relative to the emergence of this new professional field are described. Early use of an evaluation tool seems to be linked to the emergence of a new professional identity for recently recruited case managers. Factors determining the strength of this link are training tool standardization, computerization, and local structure's involvement. Our results contribute to identifying one of the ways by which professional identity can be changed to become a case manager.

  2. Autonomous Information Unit: Why Making Data Smart Can also Make Data Secured?

    NASA Technical Reports Server (NTRS)

    Chow, Edward T.

    2006-01-01

    In this paper, we introduce a new fine-grain distributed information protection mechanism which can self-protect, self-discover, self-organize, and self-manage. In our approach, we decompose data into smaller pieces and provide individualized protection. We also provide a policy control mechanism to allow 'smart' access control and context based re-assembly of the decomposed data. By combining smart policy with individually protected data, we are able to provide better protection of sensitive information and achieve more flexible access during emergency conditions. As a result, this new fine-grain protection mechanism can enable us to achieve better solutions for problems such as distributed information protection and identity theft.

  3. 21 CFR 1311.105 - Requirements for obtaining an authentication credential-Individual practitioners.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... Office of Technology Strategy/Division of Identity Management to conduct identity proofing that meets the... assurance level or above. (b) The practitioner must submit identity proofing information to the credential...

  4. Who do we think we are? Analysing the content and form of identity work in the English National Health Service.

    PubMed

    McDermott, Imelda; Checkland, Kath; Harrison, Stephen; Snow, Stephanie; Coleman, Anna

    2013-01-01

    The language used by National Health Service (NHS) "commissioning" managers when discussing their roles and responsibilities can be seen as a manifestation of "identity work", defined as a process of identifying. This paper aims to offer a novel approach to analysing "identity work" by triangulation of multiple analytical methods, combining analysis of the content of text with analysis of its form. Fairclough's discourse analytic methodology is used as a framework. Following Fairclough, the authors use analytical methods associated with Halliday's systemic functional linguistics. While analysis of the content of interviews provides some information about NHS Commissioners' perceptions of their roles and responsibilities, analysis of the form of discourse that they use provides a more detailed and nuanced view. Overall, the authors found that commissioning managers have a higher level of certainty about what commissioning is not rather than what commissioning is; GP managers have a high level of certainty of their identity as a GP rather than as a manager; and both GP managers and non-GP managers oscillate between multiple identities depending on the different situations they are in. This paper offers a novel approach to triangulation, based not on the usual comparison of multiple data sources, but rather based on the application of multiple analytical methods to a single source of data. This paper also shows the latent uncertainty about the nature of commissioning enterprise in the English NHS.

  5. Does the non-identity problem block a class of arguments against cloning?

    PubMed

    Green, Richard

    2004-01-01

    One class of argument against cloning human beings in the contemporary literature focuses on the bad consequences that will befall the clone or "later-twin." In this paper I consider whether this line of argumentation can be blocked by invoking Parfit's non-identity problem. I canvass two general strategies for solving the non-identity problem: a consequentialist strategy and non-consequentialist, rights based strategy. I argue that while each general strategy offers a plausible solution to the non-identity problem as applied to the cases most frequently discussed in the non-identity problem literature, neither provides a reason for putting aside the non-identity problem when applied to cloning. I conclude (roughly) that the non-identity problem does serve to block this class of argument against cloning.

  6. Sustainable Drainage, Green Infrastructure or Natural Flood Management - which should you choose?

    NASA Astrophysics Data System (ADS)

    Wingfield, Thea; Potter, Karen; Jones, Gareth; Spees, Jack; Macdonald, Neil

    2016-04-01

    River catchments as management units are more effective than administrative boundaries to integrate and coordinate efforts of organisations that utilise and manage water, soil and habitat quality. The UK government announced a pilot integrated water management initiative called, 'The Catchment Based Approach', on World Water Day 2011. After successful trials the scheme was extended to all river catchments in England during the summer of 2013. This policy has been designed to improve the collaboration, partnership and coordination of organisations involved in water and land management through locally led partnership groups. The lead organisations are all charitable bodies with significantly varying levels of experience of stormwater management; a key component of integrated water management and of great concern to communities at risk. These partnerships have implemented a number of Nature Based Solutions, but these have been presented in different ways by the different groups. In the UK there are three terms commonly used to describe Nature Based Solutions for managing the drainage of stormwater: Sustainable Drainage (SuDS), Green Infrastructure (GI) and Natural Flood Management (NFM). The definitions of each refers to the replication of natural hydrological processes in order to slow the flow of water through the landscape. But, there has been some concerns as to which of these nature based terms should be applied and why they appear to be used interchangeably. This study demonstrates that, despite the definitions of these three terms being almost identical, in practice they are not the same and should not be used interchangeably. The terms were developed by different professional groups in response to their own objectives and histories. The hydrological processes used to manage storm-water may be the same and the suggested interventions may show a degree of convergence. Yet, they operate at different scales, both geographically and organisationally. The different professional disciplines have their own ideologies and work to distinct governing regulations which manage and perceive operational risk in varying ways. All of these factors lead to storm-water nature based solutions not just being applied differently within a catchment but viewed and understood differently by organisations that are working in partnership. The catchment partnerships will be better equipped to incorporate or employ nature based storm water management in the UK through this research. By understanding the factors and agents behind the development of SuDS, GI and NFM and providing ways in which to visualise and communicate this at a catchment level it is hoped to reduce some of the barriers to their practical implementation.

  7. Transformation of Professional Identity in an Experienced Primary School Principal: A New Zealand Case Study

    ERIC Educational Resources Information Center

    Robertson, Sylvia

    2017-01-01

    School principals have unique identities that influence capacity to manage change. This New Zealand study explores professional identity in educational leadership and addresses a lesser researched area of identity transformation in longer-serving principals. Principals were asked how they perceived themselves as changing or changed as they led…

  8. Identity Formation in Adolescents from Italian, Mixed, and Migrant Families

    ERIC Educational Resources Information Center

    Crocetti, Elisabetta; Fermani, Alessandra; Pojaghi, Barbara; Meeus, Wim

    2011-01-01

    The purpose of this study was to compare identity formation in adolescents from Italian (n = 261), mixed (n = 100), and migrant families (n =148). Participants completed the Italian version of the Utrecht-Management of Identity Commitments Scale that assesses identity processes in educational and relational domains. Within a variable-centered…

  9. Using a generalised identity reference model with archetypes to support interoperability of demographics information in electronic health record systems.

    PubMed

    Xu Chen; Berry, Damon; Stephens, Gaye

    2015-01-01

    Computerised identity management is in general encountered as a low-level mechanism that enables users in a particular system or region to securely access resources. In the Electronic Health Record (EHR), the identifying information of both the healthcare professionals who access the EHR and the patients whose EHR is accessed, are subject to change. Demographics services have been developed to manage federated patient and healthcare professional identities and to support challenging healthcare-specific use cases in the presence of diverse and sometimes conflicting demographic identities. Demographics services are not the only use for identities in healthcare. Nevertheless, contemporary EHR specifications limit the types of entities that can be the actor or subject of a record to health professionals and patients, thus limiting the use of two level models in other healthcare information systems. Demographics are ubiquitous in healthcare, so for a general identity model to be usable, it should be capable of managing demographic information. In this paper, we introduce a generalised identity reference model (GIRM) based on key characteristics of five surveyed demographic models. We evaluate the GIRM by using it to express the EN13606 demographics model in an extensible way at the metadata level and show how two-level modelling can support the exchange of instances of demographic identities. This use of the GIRM to express demographics information shows its application for standards-compliant two-level modelling alongside heterogeneous demographics models. We advocate this approach to facilitate the interoperability of identities between two-level model-based EHR systems and show the validity and the extensibility of using GIRM for the expression of other health-related identities.

  10. Rewriting Dominant Narratives of the Academy: Women Faculty of Color and Identity Management

    ERIC Educational Resources Information Center

    Motha, Suhanthie; Varghese, Manka M.

    2018-01-01

    Drawing on Delgado and Yosso's "counterstory," Yosso's "community cultural wealth," and Alsup's "borderland discourses," the authors, who are women of color academics, use narratives from their lives to discuss the ways in which they draw on resources in managing and reconfiguring their multiple identities within the…

  11. Identity and Access Management: Technological Implementation of Policy

    ERIC Educational Resources Information Center

    von Munkwitz-Smith, Jeff; West, Ann

    2004-01-01

    Navigating the multiple processes for accessing ever-multiplying campus information systems can be a daunting task for students, faculty, and staff. This article provides a brief overview of Identity and Access Management Services. The authors review key characteristics and components of this new information architecture and address the issue of…

  12. Diversifying Academic and Professional Identities in Higher Education: Some Management Challenges

    ERIC Educational Resources Information Center

    Whitchurch, Celia; Gordon, George

    2010-01-01

    This paper draws on an international study of the management challenges arising from diversifying academic and professional identities in higher education. These challenges include, for instance, the introduction of practice-based disciplines with different traditions such as health and social care, the changing aspirations and expectations of…

  13. Contemplation and the "Performative Absolute": Submission and Identity in Managerial Modernity

    ERIC Educational Resources Information Center

    Roberts, Richard H.

    2013-01-01

    Practices derived from the "vita contemplativa" and other spiritual sources are drawn upon by management, but as the power of human resources management (HRM) is extended so the relationship between "contemplation" and the surrender of self-identity required by HRM demands critical examination. The conscious construction of the…

  14. Stability of Attachment Representations during Adolescence: The Influence of Ego-Identity Status.

    ERIC Educational Resources Information Center

    Zimmermann, Peter; Becker-Stoll, Fabienne

    2002-01-01

    Examines two core assumptions of attachment theory: internal working models of attachment should increase in stability during development, and attachment is related to the adaptive solution of stage-salient issues, in adolescence, specifically to identity formation. Results show secure attachment representation was positively associated with the…

  15. Developing Designer Identity through Reflection

    ERIC Educational Resources Information Center

    Tracey, Monica W.; Hutchinson, Alisa

    2013-01-01

    As designers utilize design thinking while moving through a design space between problem and solution, they must rely on design intelligence, precedents, and intuition in order to arrive at meaningful and inventive outcomes. Thus, instructional designers must constantly re-conceptualize their own identities and what it means to be a designer.…

  16. Patient privacy protection using anonymous access control techniques.

    PubMed

    Weerasinghe, D; Rajarajan, M; Elmufti, K; Rakocevic, V

    2008-01-01

    The objective of this study is to develop a solution to preserve security and privacy in a healthcare environment where health-sensitive information will be accessed by many parties and stored in various distributed databases. The solution should maintain anonymous medical records and it should be able to link anonymous medical information in distributed databases into a single patient medical record with the patient identity. In this paper we present a protocol that can be used to authenticate and authorize patients to healthcare services without providing the patient identification. Healthcare service can identify the patient using separate temporary identities in each identification session and medical records are linked to these temporary identities. Temporary identities can be used to enable record linkage and reverse track real patient identity in critical medical situations. The proposed protocol provides main security and privacy services such as user anonymity, message privacy, message confidentiality, user authentication, user authorization and message replay attacks. The medical environment validates the patient at the healthcare service as a real and registered patient for the medical services. Using the proposed protocol, the patient anonymous medical records at different healthcare services can be linked into one single report and it is possible to securely reverse track anonymous patient into the real identity. The protocol protects the patient privacy with a secure anonymous authentication to healthcare services and medical record registries according to the European and the UK legislations, where the patient real identity is not disclosed with the distributed patient medical records.

  17. A qualitative investigation of masculine identity after traumatic brain injury.

    PubMed

    MacQueen, Ruth; Fisher, Paul; Williams, Deirdre

    2018-04-30

    Men are twice as likely as women to experience a traumatic brain injury (TBI), suggesting that aspects of masculine identity contribute to how people acquire their brain injuries. Research also suggests that masculine identity impacts on how people manage their health experiences. The current study aimed to explore the experience of masculine identity following TBI. Individual interviews were conducted with 10 men aged 21-67 years who had experienced a TBI. All were living in the community. Interpretative phenomenological analysis was used to consider lived experiences and to explore the meaning of the TBI experience in relation to masculine identity. Three superordinate themes emerged from the analysis: doing life and relationships differently, self-perceptions and the perceived view of others, and managing the impact of TBI as a man. These themes are considered in relation to how participants' experiences interacted with dominant social ideals of masculine identity. The findings highlighted how masculine identity may be a valuable aspect of self in considering threats to and reconstruction of self-identity after TBI. Aspects of gender identity should be considered in order to promote engagement, support adjustment and achieve meaningful outcomes in rehabilitation.

  18. Integrating Identity Management With Federated Healthcare Data Models

    NASA Astrophysics Data System (ADS)

    Hu, Jun; Peyton, Liam

    In order to manage performance and provide integrated services, health care data needs to be linked and aggregated across data sources from different organizations. The Internet and secure B2B networks offer the possibility of providing near real-time integration. However, there are three major stumbling blocks. One is to standardize and agree upon a common data model across organizations. The second is to match identities between different locations in order to link and aggregate records. The third is to protect identity and ensure compliance with privacy laws. In this paper, we analyze three main approaches to the problem and use a healthcare scenario to illustrate how each one addresses different aspects of the problem while failing to address others. We then present a systematic framework in which the different approaches can be flexibly combined for a more comprehensive approach to integrate identity management with federated healthcare data models.

  19. Topics in elementary particle physics

    NASA Astrophysics Data System (ADS)

    Jin, Xiang

    The author of this thesis discusses two topics in elementary particle physics: n-ary algebras and their applications to M-theory (Part I), and functional evolution and Renormalization Group flows (Part II). In part I, Lie algebra is extended to four different n-ary algebraic structure: generalized Lie algebra, Filippov algebra, Nambu algebra and Nambu-Poisson tensor; though there are still many other n-ary algebras. A natural property of Generalized Lie algebras — the Bremner identity, is studied, and proved with a totally different method from its original version. We extend Bremner identity to n-bracket cases, where n is an arbitrary odd integer. Filippov algebras do not focus on associativity, and are defined by the Fundamental identity. We add associativity to Filippov algebras, and give examples of how to construct Filippov algebras from su(2), bosonic oscillator, Virasoro algebra. We try to include fermionic charges into the ternary Virasoro-Witt algebra, but the attempt fails because fermionic charges keep generating new charges that make the algebra not closed. We also study the Bremner identity restriction on Nambu algebras and Nambu-Poisson tensors. So far, the only example 3-algebra being used in physics is the BLG model with 3-algebra A4, describing two M2-branes interactions. Its extension with Nambu algebra, BLG-NB model, is believed to describe infinite M2-branes condensation. Also, there is another propose for M2-brane interactions, the ABJM model, which is constructed by ordinary Lie algebra. We compare the symmetry properties between them, and discuss the possible approaches to include these three models into a grand unification theory. In Part II, we give an approximate solution for Schroeder's equations, based on series and conjugation methods. We use the logistic map as an example, and demonstrate that this approximate solution converges to known analytical solutions around the fixed point, around which the approximate solution is constructed. Although the closed-form solutions for Schroeder's equations can not always be approached analytically, by fitting the approximation solutions, one can still obtain closed-form solutions sometimes. Based on Schroeder's theory, approximate solutions for trajectories, velocities and potentials can also be constructed. The approximate solution is significantly useful to calculate the beta function in renormalization group trajectory. By "wrapping" the series solutions with the conjugations from different inverse functions, we generate different branches of the trajectory, and construct a counterexample for a folk theorem about limited cycles.

  20. Identity management strategies among HIV-positive Colombian gay men in London.

    PubMed

    Jaspal, Rusi; Williamson, Iain

    2017-12-01

    This study set out to explore the social-psychological aspects of living with HIV among a group of HIV-positive Colombian gay men in London, and the strategies that they deployed to manage ensuing threats to their identities. Focus group and individual interview data were collected from 14 Colombian gay men living with HIV, and were analysed using qualitative thematic analysis and identity process theory. The following themes are discussed: (1) identity struggles and conflicts in Colombia, (2), managing multiple layers of social stigma in England, and (3) changing interpersonal and intergroup dynamics, which highlight the inter-connections between sexual prejudice, sexual risk-taking and HIV stigma. Identity may be chronically threatened due to the multiple layers of stigma, which can limit the coping strategies available to individuals. Findings strongly support the need for action and programmes to highlight and tackle both racism and HIV stigma on the gay scene and to fund more specific resources for sub-communities of gay, bisexual and other men who have sex with men, which employ appropriately trained and culturally competent staff.

  1. Identity Formation in Career Development for Gifted Women.

    ERIC Educational Resources Information Center

    Phelps, Christine E.

    1991-01-01

    Necessary developmental tasks concerned with identity development of gifted college women include developing competence, managing emotions, developing autonomy, establishing identity, freeing interpersonal relationships, developing purpose, and developing integrity. These issues may be used as counseling interventions to raise career aspirations.…

  2. On the contact interaction of two identical stringers with an elastic semi-infinite continuous or vertically cracked plate

    NASA Astrophysics Data System (ADS)

    Grigoryan, M. S.

    2018-04-01

    This paper considers two connected contact problems on the interaction of stringers with an elastic semi-infinite plate. In the first problem, an elastic half-infinite continuous plate is reinforced on its boundary by two identical stringers exposed to a tensile external force. In the second problem, in the presence of the same stringers, the plate contains a collinear system of cracks on its vertical axis. The solution of both problems is reduced to the solution of singular integral equations (SIE) that are solved by a known numerical-analytical method.

  3. Viewing equitable practices through the lens of intersecting identities

    NASA Astrophysics Data System (ADS)

    Lyons, Renée; Dsouza, Nikeetha; Quigley, Cassie

    2016-12-01

    This review explores Archer, Dawson, Seakins, and Wong's "Disorienting, fun or meaningful? Disadvantaged families' experiences of a science museum visit" by examining the analytic frameworks guiding this study. To expand on Archer et al.'s use of feminist post-structuralist theories of identity we draw from the theory of intersectionality to provide a more robust framework for analyzing barriers to engagement within an informal learning space. Our response to this work ends by exploring the types of solutions generated from an intersectionality framework—solutions aimed at transforming institutional programs and practices to create more equitable spaces for learning.

  4. An exploration of mothers' and fathers' views of their identities in chronic-kidney-disease management: parents as students?

    PubMed

    Swallow, Veronica

    2008-12-01

    To explore parents' views of their identities as they learn to manage their child's chronic kidney disease. Parents are expected to participate in management and usually learn necessary skills from the multidisciplinary team. Research highlights the importance of professionals defining parents' management roles in chronic disease; but little is known about parents' views on their own identities as the complex and dynamic process of teaching and learning unfolds around their child's condition. According to positioning theory, identity development is a dynamic and fluid process that occurs during interaction, with each person positioning themselves while simultaneously positioning the other person, yet this concept has not been considered in relation to parents' contributions to disease management. A longitudinal, grounded theory study conducted in a UK Children's Kidney Unit. This paper focuses on one aspect of a larger study exploring family learning in disease management. Six mothers and two fathers of six children with a recently diagnosed chronic kidney disease participated in a total of 21 semi-structured interviews during the 18 months after referral to the unit. Interviews included discussion about the parts they played in relation to professionals during the management process. Findings were interpreted within a framework of positioning theory. Parents participated in teaching/learning/assessment that was both planned (involving allocated clinical lessons and tasks) and spontaneous (in response to current situations), to facilitate their participation. They positioned multidisciplinary team members as teachers as well as professionals, simultaneously positioning themselves as students as well as parents. Parents' clinical duties and obligations are not an automatic part of parenting but become part of the broader process of sharing disease management, this can lead to them assuming the additional identity of a 'student'. Involving parents in ongoing discussions about their positions in management may help promote their active and informed participation.

  5. Statistical t Analysis for the Solution of Prediction Trash Management in Dusun Tanjung Sari Kec. Ngaglik Kab Sleman, Yogyakarta

    NASA Astrophysics Data System (ADS)

    Salmahaminati; Husnaqilati, Atina; Yahya, Amri

    2017-01-01

    Trash management is one of the society participation to have a good hygiene for each area or nationally. Trash is known as the remainder of regular consumption that should be disposed to do waste processing which will be beneficial and improve the hygiene. The way to do is by sorting plastic which is processed into goods in accordance with the waste. In this study, we will know what are the factors that affect the desire of citizens to process the waste. The factors would have the identity and the state of being of each resident, having known of these factors will be the education about waste management, so it can be compared how the results of the extension by using preliminary data prior to the extension and the final data after extension. The analysis uses multiple logistic regression is the identify factors that influence people’s to desire the waste while the comparison results using t analysis. Data is derived from statistical instrument in the form of a questionnaire.

  6. When Social Identities Collide: Commentary on "Gender in the Management Education Classroom"

    ERIC Educational Resources Information Center

    Patton, Eric

    2010-01-01

    This commentary to "Gender in the Management Education Classroom" (Bilimoria, O'Neil, Hopkins, & Murphy, 2010) employs social identity and self-categorization theory to analyze the incident described in the article. In any MBA classroom, students are dealing with multiple group memberships. Similar to workplace settings, when the focus is on…

  7. Identity Management and Trust Services: Foundations for Cloud Computing

    ERIC Educational Resources Information Center

    Suess, Jack; Morooney, Kevin

    2009-01-01

    Increasingly, IT organizations will move from providing IT services locally to becoming an integrator of IT services--some provided locally and others provided outside the institution. As a result, institutions must immediately begin to plan for shared services and must understand the essential role that identity management and trust services play…

  8. Leadership, New Public Management and the Re-Modelling and Regulation of Teacher Identities

    ERIC Educational Resources Information Center

    Hall, David; Gunter, Helen; Bragg, Joanna

    2013-01-01

    This article examines the rapidly shifting relationship between teachers and the state and efforts to re-model teacher identities within the wider context of public sector modernization and the New Public Management. The construction and development of officially authorized and normative discursive practices relating to leadership and the…

  9. 6 Keys to Identity Management

    ERIC Educational Resources Information Center

    Shoham, Idan

    2011-01-01

    An Identity and Access Management (IAM) project on campus can feel like a Sisyphean task: Just when access rights have finally been sorted out, the semester ends--and users change roles, leave campus, or require new processes. IT departments face a constantly changing technical landscape: (1) integrating new applications and retiring old ones; (2)…

  10. We're Decent People: Constructing and Managing Family Identity in Rural Workingclass Communities

    ERIC Educational Resources Information Center

    Kiter Edwards, Margie L.

    2004-01-01

    Using grounded theory methodology, I establish family identity management as an important type of invisible work that connects women's household-based domestic activities with community members perceptions and treatment of them and their family members. Detailed observations of household routines and family interactions, as well as in-depth…

  11. "Managing identities" and parental disclosure of HIV sero-status in Zimbabwe.

    PubMed

    Muparamoto, Nelson; Chiweshe, Manase Kudzai

    2015-01-01

    Drawing from a small sample of HIV infected respondents, this paper examines parents' perceptions on the decision to disclose or not to disclose their HIV sero-status to their children. It explores how parents control the information in the interactional ritual with their children. The paper uses Goffman's concept of dramaturgy to analyse how parents manage and control disclosure within a context where HIV and AIDS is associated with stigma. Disclosure is a strategic encounter in which the interactants (parents) manage to create a desired identity or spoil an identity. Qualitative research incorporating focus group discussions and in-depth interviews was used to examine the perceptions of parents who are HIV positive on disclosure of their status to their children. Such a methodological approach allows for a nuanced understanding of the context in which decision to disclose status happens. The study findings show that in a social context involving parents and children as actors there are complex expectations which affect parental disclosure of HIV sero-status to their children. The desire to manage an expected identity militated or enabled disclosure in a parental relationship.

  12. Campus Single Sign-On und hochschulübergreifendes Identity Management

    NASA Astrophysics Data System (ADS)

    Hommel, Wolfgang

    Das im Rahmen von IntegraTUM für die TUM geschaffene Identity & Access Management System setzt das Paradigma unified login um, d. h. ein Benutzer kann alle für ihn relevanten Dienste innerhalb der Hochschule mit derselben Loginname-/Passwortkombination nutzen. Dieser Artikel zeigt, wie auf Basis der Software Shibboleth und der deutschlandweiten Hochschulföderation DFN-AAI als weitere Mehrwerte das campusweite web single sign-on und die nahtlose Nutzung zahlreicher externer Web-Anwendungen erreicht werden. Als Beispiel für die Abläufe bei der Erschließung neuer Dienste für die hochschulübergreifende Nutzung wird die Anbindung von Learning Management Systemen auf Basis des DFN-AAI E-Learning-Profils diskutiert. Den umfassenden Vorteilen werden schließlich die aktuellen technischen Grenzen bei der Umsetzung des hochschulübergreifenden Identity Management gegenübergestellt.

  13. Juggling identities of rheumatoid arthritis, motherhood and paid work - a grounded theory study.

    PubMed

    Feddersen, Helle; Mechlenborg Kristiansen, Tine; Tanggaard Andersen, Pernille; Hørslev-Petersen, Kim; Primdahl, Jette

    2018-02-01

    To explore how women with rheumatoid arthritis manage their illness, motherhood, and work life. A constructivist, grounded theory approach based on individual interviews and participant observations with 20 women with rheumatoid arthritis who participated in work life and had children living at home or were pregnant. After initial and focused coding Goffman's concepts of social identity were applied. A core category: "Juggling meaningful identities" and three conceptual categories were developed: (1) Work life as the strongest identity marker; (2) Motherhood: a two-sided act; (3) Living with rheumatoid arthritis as an identity? Paid work, motherhood, and illness are linked to the women's social identities. The women construct and change their identities in interactions with children, partners, other parents, colleagues, and employers. The women attribute the highest priority to their professional identity, spending the majority of their time and energy in an effort to appear as "good stable workers". The disease is seen as a hindrance in this regard, and the illness identity is almost completely rejected. In motherhood, the women prioritize close interaction with their children, and deprioritize external activities. Extended outbreaks of the disease and issues regarding the children force the women to deprioritize working life. Implications for rehabilitation Juggling meaningful identities of rheumatoid arthritis, motherhood, and paid work challenge women in managing their everyday lives. Therefore, rehabilitation professionals should support individuals to develop new strategies to manage the challenges they experience regarding juggling motherhood and work ability. Work is a dominant identity marker for women with rheumatoid arthritis therefore, rehabilitation professionals have an important role to play in investigating possible ways for the individual to maintain employment or return to work. Living with rheumatoid arthritis and being a paid worker challenge women's role performance and thereby their identification as mothers. Therefore, rehabilitation professionals have to support the women and their families.

  14. Modelling a Learning Journey towards Teacher Ecological Self

    ERIC Educational Resources Information Center

    Raus, Rea

    2016-01-01

    The article discusses the notion of the ecological self as a key concept for teacher identity construction during teacher education in the context of sustainable development (SD). Substantial amount of literature supports the understanding that the solution to the global sustainability crisis lies in the field of education where teacher identity,…

  15. Partial Row-Sums of Pascal's Triangle

    ERIC Educational Resources Information Center

    Ollerton, Richard L.

    2007-01-01

    Identities for many and varied combinations of binomial coefficients abound. Indeed, because of the wide range of interrelationships it is possible that a great deal of mathematical effort has been wasted in proving essentially equivalent formulae. As well as proving identities these methods can be used to rule out closed form solutions (at least…

  16. CACREP Accreditation: A Solution to License Portability and Counselor Identity Problems

    ERIC Educational Resources Information Center

    Mascari, J. Barry; Webber, Jane

    2013-01-01

    A confluence of forces addressing counselor identity occurred with the 20/20: A Vision for the Future of Counseling initiative, the 2009 Standards of the Council for Accreditation of Counseling and Related Education Programs (CACREP), and the quest by the American Association of State Counseling Boards to establish license portability. This…

  17. Kinetic titration with differential thermometric determination of the end-point.

    PubMed

    Sajó, I

    1968-06-01

    A method has been described for the determination of concentrations below 10(-4)M by applying catalytic reactions and using thermometric end-point determination. A reference solution, identical with the sample solution except for catalyst, is titrated with catalyst solution until the rates of reaction become the same, as shown by a null deflection on a galvanometer connected via bridge circuits to two opposed thermistors placed in the solutions.

  18. Curvature tensors unified field equations on SEXn

    NASA Astrophysics Data System (ADS)

    Chung, Kyung Tae; Lee, Il Young

    1988-09-01

    We study the curvature tensors and field equations in the n-dimensional SE manifold SEXn. We obtain several basic properties of the vectors S λ and U λ and then of the SE curvature tensor and its contractions, such as a generalized Ricci identity, a generalized Bianchi identity, and two variations of the Bianchi identity satisfied by the SE Einstein tensor. Finally, a system of field equations is discussed in SEXn and one of its particular solutions is constructed and displayed.

  19. Gregory the Great's metaphor of the physician of the heart as a model for pastoral identity.

    PubMed

    McGrath-Merkle, Clare

    2011-06-01

    The identity of the Roman Catholic priesthood remains in serious crisis. Scholars have called for a return to traditional sources to find possible solutions, including the Early Church Fathers and the Hebrew Bible. Following Oden, this article further explores Pope Gregory the Great's The Book of Pastoral Rule and his ideals regarding pastoral identity. Of unique importance is his notion of the pastor as a "physician of the heart," unrecognized previously as central to his project.

  20. Phase-space quantum mechanics study of two identical particles in an external oscillatory potential

    NASA Technical Reports Server (NTRS)

    Nieto, Luis M.; Gadella, Manuel

    1993-01-01

    This simple example is used to show how the formalism of Moyal works when it is applied to systems of identical particles. The symmetric and antisymmetric Moyal propagators are evaluated for this case; from them, the correct energy levels of energy are obtained, as well as the Wigner functions for the symmetric and antisymmetric states of the two identical particle system. Finally, the solution of the Bloch equation is straightforwardly obtained from the expressions of the Moyal propagators.

  1. Issues of E-Learning Standards and Identity Management for Mobility and Collaboration in Higher Education

    ERIC Educational Resources Information Center

    Alves, Paulo; Uhomoibhi, James

    2010-01-01

    Purpose: This paper seeks to investigate and report on the status of identity management systems and e-learning standards across Europe for promoting mobility, collaboration and the sharing of contents and services in higher education institutions. Design/methodology/approach: The present research work examines existing e-learning standards and…

  2. Spanning Professional and Academic: The Changing Identity of Professional Administrators and Managers in Hong Kong's Higher Education Context

    ERIC Educational Resources Information Center

    Cheng, Tak-Iak

    2017-01-01

    This paper builds on Whitchurch's notion of the "blended professional" which aims to examine how mixed professional activity affects professional administrators and managers' identity disposition in universities in Hong Kong. In response to complex missions and demands of contemporary higher education globally, diverse projected-oriented…

  3. The Construction of Early Career Teachers' Identities: Coping or Managing?

    ERIC Educational Resources Information Center

    Hong, Ji; Day, Christopher; Greene, Barbara

    2018-01-01

    This paper examines how early career teachers cope with or manage the challenges that they experience during the transition from pre-service to the first and then the second year of teaching as they seek to establish stable, positive, professional identities and teach effectively in various school and policy contexts. Findings from three waves of…

  4. Work-Life Dilemmas Emerging from Lesbian Executives' Narratives

    ERIC Educational Resources Information Center

    Heintz, Phyllis A.

    2012-01-01

    This qualitative study was an in-depth exploration of lesbian executives' sexual identity management experiences. These women navigated an invisible identity in a privileged, visible organizational position, yet their lesbian identity often made them vulnerable to discrimination and remained a subtext that permeated their relationships with…

  5. Towards Interconnecting the Nordic Identity Federations

    ERIC Educational Resources Information Center

    Tveter, Walter M.; Melve, Ingrid; Linden, Mikael

    2007-01-01

    Purpose: This paper aims to outline considerations for trust management between established national identity federations in education and research. It also aims to discuss policy issues related to cross-federation and to compare existing academic identity federations. The paper seeks to investigate Nordic national federations and to introduce the…

  6. Solutions for correlations along the coexistence curve and at the critical point of a kagomé lattice gas with three-particle interactions

    NASA Astrophysics Data System (ADS)

    Barry, J. H.; Muttalib, K. A.; Tanaka, T.

    2008-01-01

    We consider a two-dimensional (d=2) kagomé lattice gas model with attractive three-particle interactions around each triangular face of the kagomé lattice. Exact solutions are obtained for multiparticle correlations along the liquid and vapor branches of the coexistence curve and at criticality. The correlation solutions are also determined along the continuation of the curvilinear diameter of the coexistence region into the disordered fluid region. The method generates a linear algebraic system of correlation identities with coefficients dependent only upon the interaction parameter. Using a priori knowledge of pertinent solutions for the density and elementary triplet correlation, one finds a closed and linearly independent set of correlation identities defined upon a spatially compact nine-site cluster of the kagomé lattice. Resulting exact solution curves of the correlations are plotted and discussed as functions of the temperature and are compared with corresponding results in a traditional kagomé lattice gas having nearest-neighbor pair interactions. An example of application for the multiparticle correlations is demonstrated in cavitation theory.

  7. The NSF Cybersecurity Center of Excellence: Translating Identity Management and Cybersecurity into Scientific Collaboration

    NASA Astrophysics Data System (ADS)

    Welch, V.

    2016-12-01

    Scientists care deeply about their collaborations: who is a member, who can access, produce, and correct data, and manager instruments critical to their science missions. The communities of cybersecurity and identity management professionals develop tools to support collaborations and the undertaking of trustworthy science, but there are large cultural and linguistic gaps between these communities and the scientists they service. The National Science Foundation has recently funded a NSF Cybersecurity Center of Excellence to help its community of projects by providing leadership and addressing the challenges of trustworthy science. A key goal of this NSF Center has been translating between the goals of the science community into requirements and risks understood by identity management and cybersecurity communities. This talk will give an update on the Center's efforts and other services it provides to the NSF community to bridge these cultures.

  8. Acidities of Water and Methanol in Aqueous Solution and DMSO

    ERIC Educational Resources Information Center

    Gao, Daqing

    2009-01-01

    The relative acidities of water and methanol have been a nagging issue. In gas phase, methanol is more acidic than water by 36.0 kJ/mol; however, in aqueous solution, the acidities of methanol and water are almost identical. The acidity of an acid in solution is determined by both the intrinsic gas-phase ionization Gibbs energy and the solvent…

  9. 'Even though it's a small checkbox, it's a big deal': stresses and strains of managing sexual identity(s) on Facebook.

    PubMed

    Rubin, Jennifer D; McClelland, Sara I

    2015-01-01

    Facebook offers a socialisation context in which young people from ethnic, gender and sexual minorities must continually manage the potential for prejudice and discrimination in the form of homophobia and racism. In-depth interviews were conducted with eight young women, aged 16-19 years, who self-identified as queer and as women of colour. A detailed analysis of these interviews--focusing in particular on how young people described navigating expectations of rejection from family and friends--offered insight into the psychological and health consequences associated with managing sexual identity(s) while online. The 'closet' ultimately takes on new meaning in this virtual space: participants described trying to develop social relationships within Facebook, which demands sharing one's thoughts, behaviours and ideas, while also hiding and silencing their emerging sexuality. In this 'virtual closet', tempering self-presentation to offset social exclusion has become a continuous, yet personally treacherous, activity during the daily practice of using Facebook.

  10. Metaheuristic simulation optimisation for the stochastic multi-retailer supply chain

    NASA Astrophysics Data System (ADS)

    Omar, Marina; Mustaffa, Noorfa Haszlinna H.; Othman, Siti Norsyahida

    2013-04-01

    Supply Chain Management (SCM) is an important activity in all producing facilities and in many organizations to enable vendors, manufacturers and suppliers to interact gainfully and plan optimally their flow of goods and services. A simulation optimization approach has been widely used in research nowadays on finding the best solution for decision-making process in Supply Chain Management (SCM) that generally faced a complexity with large sources of uncertainty and various decision factors. Metahueristic method is the most popular simulation optimization approach. However, very few researches have applied this approach in optimizing the simulation model for supply chains. Thus, this paper interested in evaluating the performance of metahueristic method for stochastic supply chains in determining the best flexible inventory replenishment parameters that minimize the total operating cost. The simulation optimization model is proposed based on the Bees algorithm (BA) which has been widely applied in engineering application such as training neural networks for pattern recognition. BA is a new member of meta-heuristics. BA tries to model natural behavior of honey bees in food foraging. Honey bees use several mechanisms like waggle dance to optimally locate food sources and to search new ones. This makes them a good candidate for developing new algorithms for solving optimization problems. This model considers an outbound centralised distribution system consisting of one supplier and 3 identical retailers and is assumed to be independent and identically distributed with unlimited supply capacity at supplier.

  11. Controlling Long-Lived Triplet Generation from Intramolecular Singlet Fission in the Solid State

    DOE PAGES

    Pace, Natalie A.; Zhang, Weimin; Arias, Dylan H.; ...

    2017-11-30

    The conjugated polymer poly(benzothiophene dioxide) (PBTDO1) has recently been shown to exhibit efficient intramolecular singlet fission in solution. We investigate the role of intermolecular interactions in triplet separation dynamics after singlet fission. We use transient absorption spectroscopy to determine the singlet fission rate and triplet yield in two polymers differing only by side-chain motif in both solution and the solid state. Whereas solid-state films show singlet fission rates identical to those measured in solution, the average lifetime of the triplet population increases dramatically and is strongly dependent on side-chain identity. These results show that it may be necessary to carefullymore » engineer the solid-state microstructure of these 'singlet fission polymers' to produce the long-lived triplets needed to realize efficient photovoltaic devices.« less

  12. Controlling Long-Lived Triplet Generation from Intramolecular Singlet Fission in the Solid State

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Pace, Natalie A.; Zhang, Weimin; Arias, Dylan H.

    The conjugated polymer poly(benzothiophene dioxide) (PBTDO1) has recently been shown to exhibit efficient intramolecular singlet fission in solution. We investigate the role of intermolecular interactions in triplet separation dynamics after singlet fission. We use transient absorption spectroscopy to determine the singlet fission rate and triplet yield in two polymers differing only by side-chain motif in both solution and the solid state. Whereas solid-state films show singlet fission rates identical to those measured in solution, the average lifetime of the triplet population increases dramatically and is strongly dependent on side-chain identity. These results show that it may be necessary to carefullymore » engineer the solid-state microstructure of these 'singlet fission polymers' to produce the long-lived triplets needed to realize efficient photovoltaic devices.« less

  13. Edge-Enabled Tactical Systems (Poster)

    DTIC Science & Technology

    2014-10-23

    Recently added capabilities allow fine grained network and data optimization in Disconnected, Intermittent, Low-Bandwidth (DIL) environments by...Research Focus Establishing Trusted Identities in Disconnected Tactical Environments We will develop trusted identity solutions that work within the...constraints of DIL environments in which there is no consistent access to third-party online trusted authorities that validate the credentials of

  14. "It's an Acceptable Identity": Constructing "Girl" at the Intersections of Health, Media, and Meaning-Making

    ERIC Educational Resources Information Center

    Little, J. Nicole; Hoskins, Marie L.

    2004-01-01

    This article explores the authors' critical reflections that arose while engaging in research with girls recovering from an eating disorder. The authors address issues related to media, consumerism, and identity construction. They emphasize that while there are no clear solutions to dilemmas facing girls in North American culture, researchers and…

  15. Design Ideas, Reflection, and Professional Identity: How Graduate Students Explore the Idea Generation Process

    ERIC Educational Resources Information Center

    Hutchinson, Alisa; Tracey, Monica W.

    2015-01-01

    Within design thinking, designers are responsible for generating, testing, and refining design ideas as a means to refine the design problem and arrive at an effective solution. Thus, understanding one's individual idea generation experiences and processes can be seen as a component of professional identity for designers, which involves the…

  16. New Century, New Identities: Building on a Typology of Nonheterosexual College Men

    ERIC Educational Resources Information Center

    Dilley, Patrick

    2010-01-01

    Drawing on recent ethnographic studies of nonheterosexual youth, nonheterosexual identity development, and online collegiate identity management, this article outlines an extension of prior typological work concerning nonheterosexual male college students proposed by the author. Two new types ("Twitter Twinks" and "Lads Without Labels") are…

  17. 5 CFR 736.103 - Protecting the identity of a source.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 5 Administrative Personnel 2 2012-01-01 2012-01-01 false Protecting the identity of a source. 736.103 Section 736.103 Administrative Personnel OFFICE OF PERSONNEL MANAGEMENT (CONTINUED) CIVIL SERVICE REGULATIONS (CONTINUED) PERSONNEL INVESTIGATIONS Scope § 736.103 Protecting the identity of a source. When a...

  18. 5 CFR 736.103 - Protecting the identity of a source.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 5 Administrative Personnel 2 2013-01-01 2013-01-01 false Protecting the identity of a source. 736.103 Section 736.103 Administrative Personnel OFFICE OF PERSONNEL MANAGEMENT (CONTINUED) CIVIL SERVICE REGULATIONS (CONTINUED) PERSONNEL INVESTIGATIONS Scope § 736.103 Protecting the identity of a source. When a...

  19. 5 CFR 736.103 - Protecting the identity of a source.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 5 Administrative Personnel 2 2011-01-01 2011-01-01 false Protecting the identity of a source. 736.103 Section 736.103 Administrative Personnel OFFICE OF PERSONNEL MANAGEMENT (CONTINUED) CIVIL SERVICE REGULATIONS (CONTINUED) PERSONNEL INVESTIGATIONS Scope § 736.103 Protecting the identity of a source. When a...

  20. 5 CFR 736.103 - Protecting the identity of a source.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 5 Administrative Personnel 2 2014-01-01 2014-01-01 false Protecting the identity of a source. 736.103 Section 736.103 Administrative Personnel OFFICE OF PERSONNEL MANAGEMENT (CONTINUED) CIVIL SERVICE REGULATIONS (CONTINUED) PERSONNEL INVESTIGATIONS Scope § 736.103 Protecting the identity of a source. When a...

  1. 5 CFR 736.103 - Protecting the identity of a source.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 5 Administrative Personnel 2 2010-01-01 2010-01-01 false Protecting the identity of a source. 736.103 Section 736.103 Administrative Personnel OFFICE OF PERSONNEL MANAGEMENT (CONTINUED) CIVIL SERVICE REGULATIONS (CONTINUED) PERSONNEL INVESTIGATIONS Scope § 736.103 Protecting the identity of a source. When a...

  2. 18 CFR 3b.222 - Identification requirements.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... disclose a social security number. (h) No verification of identity will be required of individuals seeking... in the record will be used to determine identity. (c) If the system manager determines that the data... individual involved, a signed notarized statement asserting identity or some other reasonable means to verify...

  3. Intersections of Organizational Justice and Identity under the New Policy Direction: Important Understandings for Educational Leaders

    ERIC Educational Resources Information Center

    Poole, Wendy L.

    2008-01-01

    The application of market-based principles to school management and the onset of heavy-handed accountability represent a new policy direction in education. The new policy direction has led to a reconceptualization of the purpose of education, the redesign of teaching work and attempts to manage teacher identities to align them with the new…

  4. East Europe Report

    DTIC Science & Technology

    1987-02-02

    technology-intensive investments) is increasing. "The situation concerning matters of science is identical with that pertaining to natural forces. Once...and modernization of existing plants and production sectors that turn out technologically identical or similar products. 10 Another goal of...self-management limited, to five enterprises in a state of crisis , in which the elections were more open and a true capacity for self-management was

  5. Identity and stammering: negotiating hesitation, side-stepping repetition, and sometimes avoiding deviation.

    PubMed

    Butler, Clare

    2013-09-01

    Individuals who experience speech dysfluency are often stigmatised because their speech acts differ from the communicative norm. This article is located in and seeks to further the identity debates in exploring how individuals who are subject to the intermittent emergence of a stigmatised characteristic manage this randomised personal discrediting in their identity work. Through a series of focus groups and semi-structured interviews participants grudgingly report their management approaches which include concealing, drafting in unwitting others, role-playing and segregating self from their stammer. In describing how they manage their stammer they detail their use of the social space in a number of ways, including as a hiding place; a site for 'it' (the stammer); a gap in which to switch words; and a different area in which to perform. This study offers important insights, increasing our understanding of the often hidden negotiations of identity work and the sometime ingenious use of space in the management of a social stigma. © 2013 The Author. Sociology of Health & Illness © 2013 Foundation for the Sociology of Health & Illness/John Wiley © Sons Ltd. Published by John Wiley © Sons Ltd.

  6. When the Plus Sign is a Negative: Challenging and Reinforcing Embodied Stigmas Through Outliers and Counter-Narratives.

    PubMed

    Lippert, Alexandra

    2017-11-30

    When individuals become aware of their stigma, they attempt to manage their identity through discourses that both challenge and reinforce power. Identity management is fraught with tensions between the desire to fit normative social constructions and counter the same discourse. This essay explores identity management in the midst of the embodied stigmas concerning unplanned pregnancy during college and raising a biracial son. In doing so, this essay points to the difference between outlier narratives and counter-narratives. The author encourages health communication scholars to explore conditions under which storytelling moves beyond the personal to the political. Emancipatory intent does not guarantee emancipatory outcomes. Storytelling can function therapeutically for individuals while failing to redress forces that constrain human potential and agency.

  7. Managing identity impacts associated with disclosure of HIV status: a qualitative investigation

    PubMed Central

    Frye, Victoria; Fortin, Princess; MacKenzie, Sonja; Purcell, David; Edwards, Lorece V.; Mitchell, Shannon Gwin; Valverde, Eduardo; Garfein, R.; Metsch, Lisa; Latka, Mary H

    2011-01-01

    Disclosure of HIV status to potential and current sex partners by HIV-positive people (HIVPP) is a complex issue that has received a significant amount of attention. Research has found that disclosure depends upon the evaluation by HIVPP of potential benefits and risks, especially of the risks stemming from the profound social stigma of HIV and AIDS. Drawing on concepts from Goffman’s classic stigma theory and Anderson’s more recently developed cultural-identity theory of drug abuse, we analyzed data from in-depth, post-intervention qualitative interviews with 116 heterosexually active, HIV-positive injection drug users enrolled in a randomized trial of a behavioral intervention to prevent HIV transmission. We explored how disclosure experiences lead to “identity impacts” defined as: (1) identity challenges (i.e. interactions that challenge an individual’s self-concept as a “normal” or non-deviant individual); and (2) identity transformations (i.e. processes whereby an individual comes to embrace a new identity and reject behaviors and values of an old one, resulting in the conscious adoption of a social and/or public identity as an HIV-positive individual). Participants engaged in several strategies to manage the identity impacts associated with disclosure. Implications of these findings for research and prevention programming are discussed. PMID:20024764

  8. The importance of social identities in the management of and recovery from 'Diabulimia': A qualitative exploration.

    PubMed

    Hastings, Amy; McNamara, Niamh; Allan, Jacqueline; Marriott, Mike

    2016-12-01

    A significant barrier to recovery for individuals with co-morbid eating disorders and type 1 diabetes is the way in which group members self-categorise. Nonetheless, identity issues are neglected during the recovery process. The aim of this paper is to explore how group memberships (and the associated identities) both contribute to and hinder recovery in this cohort. Transcripts from five online focus groups with 13 members of an online support group for individuals with 'Diabulimia' were thematically analysed. Findings suggested that those with whom one shares a recovery identity can be well placed to provide psychological resources necessary for successful recovery although such connections can be damaging if group norms are not managed. Members recognised that other important relationships (including family and friends and health professionals) are also key to recovery; these other group memberships (and the associated identities) can be facilitated through the recovery identity group membership, which allows for external validation of the recovery identity, provides encouragement to disclose the illness to supportive others, and provides information to facilitate positive service interactions. While clinical interventions typically focus on eliminating disordered behaviours, we suggest that these should also include strengthening important group memberships that promote recovery.

  9. Management Communication for the New Millennium: An Australian Perspective.

    ERIC Educational Resources Information Center

    More, Elizabeth A.; Irwin, Harry T.

    2000-01-01

    Discusses management communications in the general area of identity, and the Australian situation involving management communication scholarship, management communication education, and the future of the field in Australia. (NH)

  10. The gender identity/gender dysphoria questionnaire for adolescents and adults.

    PubMed

    Deogracias, Joseph J; Johnson, Laurel L; Meyer-Bahlburg, Heino F L; Kessler, Suzanne J; Schober, Justine M; Zucker, Kenneth J

    2007-11-01

    The present study reports on the construction of a dimensional measure of gender identity (gender dysphoria) for adolescents and adults. The 27-item gender identity/gender dysphoria questionnaire for adolescents and adults (GIDYQ-AA) was administered to 389 university students (heterosexual and nonheterosexual) and 73 clinic-referred patients with gender identity disorder. Principal axis factor analysis indicated that a one-factor solution, accounting for 61.3% of the total variance, best fits the data. Factor loadings were all >or= .30 (median, .82; range, .34-.96). A mean total score (Cronbach's alpha, .97) was computed, which showed strong evidence for discriminant validity in that the gender identity patients had significantly more gender dysphoria than both the heterosexual and nonheterosexual university students. Using a cut-point of 3.00, we found the sensitivity was 90.4% for the gender identity patients and specificity was 99.7% for the controls. The utility of the GIDYQ-AA is discussed.

  11. Is Identical Really Identical? An Investigation of Equivalency Theory and Online Learning

    ERIC Educational Resources Information Center

    Lapsley, Ruth; Kulik, Brian; Moody, Rex; Arbaugh, J. B.

    2008-01-01

    This study investigates the validity of equivalency theory among 63 students by comparing two introductory upper-division human resource management courses: one taught online, the other in a traditional classroom. Commonalities included same term, same professor, and identical assignments/tests in the same order, thus allowing a direct comparison…

  12. "Treat Me as a Human Being--Don't Look at Me as a Woman": Femininities and Professional Identities in Further Education

    ERIC Educational Resources Information Center

    Leathwood, Carole

    2005-01-01

    This article draws on case study research in two further education (FE) colleges to explore the ways in which women administrators, lecturers and managers negotiate and construct their (gendered, racialized and classed) identities in the workplace. The context is that of the restructuring of education, the 'feminization' of educational management,…

  13. The Dynamics of Networks of Identical Theta Neurons.

    PubMed

    Laing, Carlo R

    2018-02-05

    We consider finite and infinite all-to-all coupled networks of identical theta neurons. Two types of synaptic interactions are investigated: instantaneous and delayed (via first-order synaptic processing). Extensive use is made of the Watanabe/Strogatz (WS) ansatz for reducing the dimension of networks of identical sinusoidally-coupled oscillators. As well as the degeneracy associated with the constants of motion of the WS ansatz, we also find continuous families of solutions for instantaneously coupled neurons, resulting from the reversibility of the reduced model and the form of the synaptic input. We also investigate a number of similar related models. We conclude that the dynamics of networks of all-to-all coupled identical neurons can be surprisingly complicated.

  14. Action recognition is sensitive to the identity of the actor.

    PubMed

    Ferstl, Ylva; Bülthoff, Heinrich; de la Rosa, Stephan

    2017-09-01

    Recognizing who is carrying out an action is essential for successful human interaction. The cognitive mechanisms underlying this ability are little understood and have been subject of discussions in embodied approaches to action recognition. Here we examine one solution, that visual action recognition processes are at least partly sensitive to the actor's identity. We investigated the dependency between identity information and action related processes by testing the sensitivity of neural action recognition processes to clothing and facial identity information with a behavioral adaptation paradigm. Our results show that action adaptation effects are in fact modulated by both clothing information and the actor's facial identity. The finding demonstrates that neural processes underlying action recognition are sensitive to identity information (including facial identity) and thereby not exclusively tuned to actions. We suggest that such response properties are useful to help humans in knowing who carried out an action. Copyright © 2017 The Author(s). Published by Elsevier B.V. All rights reserved.

  15. Sorption potential of alkaline treated straw and a soil for sulfonylurea herbicide removal from aqueous solutions: An environmental management strategy.

    PubMed

    Cara, Irina-Gabriela; Rusu, Bogdan-George; Raus, Lucian; Jitareanu, Gerard

    2017-11-01

    The adsorption potential of alkaline treated straw (wheat and corn) in mixture with soil, has been investigated for the removal of sulfonylurea molecules from an aqueous solutions. The surface characteristics were investigated by scanning electron microscopy and Fourier Transform Infrared - FTIR, while the adsorbent capacity was evaluated using batch sorption tests and liquid chromatography coupled with mass spectrometry. Surface analysis of alkaline treated straw samples by scanning electron microscopy - SEM showed the increasing of the surface roughness improving their functional surface activity. An increase (337.22 mg g -1 ) of adsorption capacity of sulfonylurea molecules was obtained for all studied straw. The Langmuir isotherm model was the best model for the mathematical description of the adsorption process indicating the forming of a surface sorption monolayer with a finite number of identical sites. The kinetics of sulfonylurea herbicide followed the pseudo-second order mechanism corresponding to strong chemical interactions. The results sustained that the alkaline treated straw have biosorption characteristics, being suitable adsorbent materials. Copyright © 2017 Elsevier Ltd. All rights reserved.

  16. Is It Facebook Official? Coming Out and Passing Strategies of Young Adult Gay Men on Social Media.

    PubMed

    Owens, Zachary D

    2017-01-01

    The rapid proliferation of social media, mobile applications, and Internet technologies has shifted a wide variety of social interaction from physical spaces to an online environment. Drawing from 42 semistructured, in-depth interviews with gay college-aged men between the ages of 18 and 27, this article explores these changing patterns of social interaction among gay men. I discuss three strategies of identity management college-aged gay men use to disclose or conceal their sexual identity to others. The first group of men, "Out and Proud," uses Facebook as a way to celebrate and reaffirm their sexual identity, in addition to actively coming out to others on the social media Web site. The second group, "Out and Discreet," uses Facebook to indirectly come out to some of their friends while hiding this information from others. The men in the last group I identify, "Facebook Closeted," actively manage their online profiles to ensure their sexual identity is not exposed. Facebook is both transformative and risky for college-aged gay men, as it represents a new platform for them to come out as gay to friends and family, as well as other areas of their lives where they must actively manage the presentation of their sexual identity.

  17. E-dating, identity and HIV prevention: theorising sexualities, risk and network society.

    PubMed

    Davis, Mark; Hart, Graham; Bolding, Graham; Sherr, Lorraine; Elford, Jonathan

    2006-05-01

    This paper addresses how London gay men use the internet to meet sexual partners, or for e-dating. Based on qualitative interviews conducted face-to-face or via the internet, this research develops an account of how information technologies mediate the negotiation of identity and risk in connection with sexual practice. E-dating itself is a bricolage, or heterogeneous DIY practice of internet-based-communication (IBC). A central aspect of IBC is "filtering" in and out prospective e-dates based on the images and texts used to depict sexual identities. Interpretations and depictions of personal HIV risk management approaches in IBC are framed by the meanings of different identities, such as the stigma associated with being HIV positive. This paper argues for a sexualities perspective in a theory of network society. Further, HIV prevention in e-dating can potentially be addressed by considering the interplay of the HIV prevention imperatives associated with different HIV serostatus identities. There is a case for encouraging more explicit IBC about risk in e-dating and incorporating the expertise of e-daters in prevention activity. There is also a need to rethink traditional conceptions of risk management in HIV prevention to make space for the risk management bricolage of network society.

  18. "It Was Not Me That Was Sick, It Was the Building": Rhetorical Identity Management Strategies in the Context of Observed or Suspected Indoor Air Problems in Workplaces.

    PubMed

    Finell, Eerika; Seppälä, Tuija; Suoninen, Eero

    2018-07-01

    Suffering from a contested illness poses a serious threat to one's identity. We analyzed the rhetorical identity management strategies respondents used when depicting their health problems and lives in the context of observed or suspected indoor air (IA) problems in the workplace. The data consisted of essays collected by the Finnish Literature Society. We used discourse-oriented methods to interpret a variety of language uses in the construction of identity strategies. Six strategies were identified: respondents described themselves as normal and good citizens with strong characters, and as IA sufferers who received acknowledge from others, offered positive meanings to their in-group, and demanded recognition. These identity strategies located on two continua: (a) individual- and collective-level strategies and (b) dissolved and emphasized (sub)category boundaries. The practical conclusion is that professionals should be aware of these complex coping strategies when aiming to interact effectively with people suffering from contested illnesses.

  19. Social work management in emerging health care systems.

    PubMed

    Kenney, J J

    1990-02-01

    An overview of the health care industry's trend toward multihealth systems is presented and specific adaptive strategies for social work managers in health care are suggested. The challenges to social work leaders during this transition from largely free-standing, privately owned health care institutions to corporately owned, horizontally and vertically integrated delivery systems are discussed in terms of identity, style, and substance. Directors of social work departments in multihealth corporations will need to resolve issues of institutional versus corporate identity as well as those of corporate versus professional identity. A multioptional management style that incorporates networking and political expertise should be cultivated. Substantive demands in the areas of management information systems, productivity, quality assurance, and budgeting also must be addressed. The emergence of multihealth systems poses major challenges and unique opportunities to the social work profession. Awareness of managerial strategies and critical content areas can help social work leaders enhance the role and contribution of social work in these exciting and complex health care delivery systems.

  20. Professional Identity, Adaptation and the Self: Cases of New Zealand School Principals during a Time of Change

    ERIC Educational Resources Information Center

    Notman, Ross

    2017-01-01

    There is developing interest in how professional identity can support educational leaders' management of change. This article explores the conceptualisation and interplay of identity formation with adaptive and contingent forms of educational leadership. The article draws on qualitative data obtained from two New Zealand school principals and…

  1. "They're Different from Who I Am": Making Relevant Identities in the Middle through Talk-in-Interaction

    ERIC Educational Resources Information Center

    Mossman, Tim

    2012-01-01

    This qualitative study builds on earlier research on language and identity by focusing on how Canadian Generation 1.5 university students enact their identities through talk-in-interaction. Drawing on (applied) Conversational Analysis (CA) to analyze critically the production and management of social institutions in talk-in-interaction in tandem…

  2. 49 CFR 386.73 - Operations out of service and record consolidation proceedings (reincarnated carriers).

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... freight forwarder under a new identity or as an affiliated entity to: (1) Avoid complying with an FMCSA..., or freight forwarder under a new identity or as an affiliated entity to: (1) Avoid complying with an... current companies; (6) Commonality of officers and management personnel; (7) Identity of physical or...

  3. 49 CFR 386.73 - Operations out of service and record consolidation proceedings (reincarnated carriers).

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... freight forwarder under a new identity or as an affiliated entity to: (1) Avoid complying with an FMCSA..., or freight forwarder under a new identity or as an affiliated entity to: (1) Avoid complying with an... current companies; (6) Commonality of officers and management personnel; (7) Identity of physical or...

  4. "I'm Not an Immigrant!": Resistance, Redefinition, and the Role of Resources in Identity Work

    ERIC Educational Resources Information Center

    Killian, Caitlin; Johnson, Cathryn

    2006-01-01

    In this paper we examine the identity negotiation processes of North African immigrant women in France. Participants engaged in various forms of identity work, including selective association and management of appearance, as well as resisting others' attempts to categorize them as immigrants. Given that these women have chosen to move to France…

  5. "Everybody Puts Their Whole Life on Facebook": Identity Management and the Online Social Networks of LGBTQ Youth.

    PubMed

    McConnell, Elizabeth; Néray, Bálint; Hogan, Bernie; Korpak, Aaron; Clifford, Antonia; Birkett, Michelle

    2018-05-26

    Lesbian, gay, bisexual, transgender, and queer (LGBTQ) youth and young adults almost inevitably "come out", or self-disclose their identity to others. Some LGBTQ youth are more uniformly "out", while others may disclose to some groups but not others. This selective disclosure is complicated on real name social media sites, which tend to encourage a unified presentation of self across social contexts. We explore these complications with a cohort of LBGTQ youth on Facebook ( N = 199, M age = 24.13). Herein we ask: How do LBGTQ youth manage the disclosure of their sexual orientation and/or gender identity to different people in their lives? Further, are there identifiable differences in the online social network structure for LGBTQ youth who manage outness in different ways? Finally, how do LGBTQ young people describe their experiences on Facebook? We answer these questions using a mixed methods approach, combining statistical cluster analysis, network visualization, and qualitative data. Our findings illustrate patterns in network structure by outness cluster type, highlighting both the work involved in managing one's online identity as well as the costs to (semi-) closeted individuals including a considerably lower overall network connectivity. In particular, outness to family characterized LGBTQ young people's experiences on Facebook.

  6. Introduction to the Special Section on Racial and Ethnic Identity in Counseling Psychology: Conceptual and Methodological Challenges and Proposed Solutions

    ERIC Educational Resources Information Center

    Ponterotto, Joseph G.; Mallinckrodt, Brent

    2007-01-01

    Racial and ethnic identity development have been important topics in counseling psychology research for the last four decades. At present, however, there appears to be some confusion and debate regarding the quality of theory and measurement in the topical area. The present article serves as an introduction to this Journal of Counseling Psychology…

  7. Interaction and dynamics of (alkylamide + electrolyte) deep eutectics: Dependence on alkyl chain-length, temperature, and anion identity

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Guchhait, Biswajit; Das, Suman; Daschakraborty, Snehasis

    Here we investigate the solute-medium interaction and solute-centered dynamics in (RCONH{sub 2} + LiX) deep eutectics (DEs) via carrying out time-resolved fluorescence measurements and all-atom molecular dynamics simulations at various temperatures. Alkylamides (RCONH{sub 2}) considered are acetamide (CH{sub 3}CONH{sub 2}), propionamide (CH{sub 3}CH{sub 2}CONH{sub 2}), and butyramide (CH{sub 3}CH{sub 2}CH{sub 2}CONH{sub 2}); the electrolytes (LiX) are lithium perchlorate (LiClO{sub 4}), lithium bromide (LiBr), and lithium nitrate (LiNO{sub 3}). Differential scanning calorimetric measurements reveal glass transition temperatures (T{sub g}) of these DEs are ∼195 K and show a very weak dependence on alkyl chain-length and electrolyte identity. Time-resolved and steady statemore » fluorescence measurements with these DEs have been carried out at six-to-nine different temperatures that are ∼100–150 K above their individual T{sub g}s. Four different solute probes providing a good spread of fluorescence lifetimes have been employed in steady state measurements, revealing strong excitation wavelength dependence of probe fluorescence emission peak frequencies. Extent of this dependence, which shows sensitivity to anion identity, has been found to increase with increase of amide chain-length and decrease of probe lifetime. Time-resolved measurements reveal strong fractional power dependence of average rates for solute solvation and rotation with fraction power being relatively smaller (stronger viscosity decoupling) for DEs containing longer amide and larger (weaker decoupling) for DEs containing perchlorate anion. Representative all-atom molecular dynamics simulations of (CH{sub 3}CONH{sub 2} + LiX) DEs at different temperatures reveal strongly stretched exponential relaxation of wavevector dependent acetamide self dynamic structure factor with time constants dependent both on ion identity and temperature, providing justification for explaining the fluorescence results in terms of temporal heterogeneity and amide clustering in these multi-component melts.« less

  8. Identity threat at work: how social identity threat and situational cues contribute to racial and ethnic disparities in the workplace.

    PubMed

    Emerson, Katherine T U; Murphy, Mary C

    2014-10-01

    Significant disparities remain between racial and ethnic minorities' and Whites' experiences of American workplaces. Traditional prejudice and discrimination approaches explain these gaps in hiring, promotion, satisfaction, and well-being by pointing to the prejudice of people within organizations such as peers, managers, and executives. Grounded in social identity threat theory, this theoretical review instead argues that particular situational cues-often communicated by well-meaning, largely unprejudiced employees and managers-signal to stigmatized groups whether their identity is threatened and devalued or respected and affirmed. First, we provide an overview of how identity threat shapes the psychological processes of racial and ethnic minorities by heightening vigilance to certain situational cues in the workplace. Next, we outline several of these cues and their role in creating and sustaining perceptions of identity threat (or safety). Finally, we provide empirically grounded suggestions that organizations may use to increase identity safety among their employees of color. Taken together, the research demonstrates how situational cues contribute to disparate psychological experiences for racial and ethnic minorities at work, and suggests that by altering threatening cues, organizations may create more equitable, respectful, and inclusive environments where all people may thrive. (PsycINFO Database Record (c) 2014 APA, all rights reserved).

  9. Balancing Fairness and Efficiency: The Impact of Identity-Blind and Identity-Conscious Accountability on Applicant Screening

    PubMed Central

    Self, William T.; Mitchell, Gregory; Mellers, Barbara A.; Tetlock, Philip E.; Hildreth, J. Angus D.

    2015-01-01

    This study compared two forms of accountability that can be used to promote diversity and fairness in personnel selections: identity-conscious accountability (holding decision makers accountable for which groups are selected) versus identity-blind accountability (holding decision makers accountable for making fair selections). In a simulated application screening process, undergraduate participants (majority female) sorted applicants under conditions of identity-conscious accountability, identity-blind accountability, or no accountability for an applicant pool in which white males either did or did not have a human capital advantage. Under identity-conscious accountability, participants exhibited pro-female and pro-minority bias, particularly in the white-male-advantage applicant pool. Under identity-blind accountability, participants exhibited no biases and candidate qualifications dominated interview recommendations. Participants exhibited greater resentment toward management under identity-conscious accountability. PMID:26660723

  10. On the simplest binary system of rotating black holes

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Manko, V. S.; Rodchenko, E. D.; Sadovnikov, B. I.

    Exact axisymmetric stationary solution of the Einstein equations describing a system of two counter-rotating identical Kerr black holes is worked out in a physical parametrization within the framework of the Ernst formalism and analytically extended double-Kerr solution. The derivation of the limiting case of extreme constituents is also discussed.

  11. Analytical Results from Salt Solution Feed Tank (SSFT) Samples HTF-16-6 and HTF-16-40

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Peters, T.

    Two samples from the Salt Solution Feed Tank (SSFT) were analyzed by SRNL, HTF-16-6 and HTF-16-40. Multiple analyses of these samples indicate a general composition almost identical to that of the Salt Batch 8-B feed and the Tank 21H sample results.

  12. On the global well-posedness of BV weak solutions to the Kuramoto-Sakaguchi equation

    NASA Astrophysics Data System (ADS)

    Amadori, Debora; Ha, Seung-Yeal; Park, Jinyeong

    2017-01-01

    The Kuramoto model is a prototype phase model describing the synchronous behavior of weakly coupled limit-cycle oscillators. When the number of oscillators is sufficiently large, the dynamics of Kuramoto ensemble can be effectively approximated by the corresponding mean-field equation, namely "the Kuramoto-Sakaguchi (KS) equation". This KS equation is a kind of scalar conservation law with a nonlocal flux function due to the mean-field interactions among oscillators. In this paper, we provide a unique global solvability of bounded variation (BV) weak solutions to the kinetic KS equation for identical oscillators using the method of front-tracking in hyperbolic conservation laws. Moreover, we also show that our BV weak solutions satisfy local-in-time L1-stability with respect to BV-initial data. For the ensemble of identical Kuramoto oscillators, we explicitly construct an exponentially growing BV weak solution generated from BV perturbation of incoherent state for any positive coupling strength. This implies the nonlinear instability of incoherent state in a positive coupling strength regime. We provide several numerical examples and compare them with our analytical results.

  13. 77 FR 20889 - Proposed Information Collection (Request One-VA Identification Verification Card) Activity...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-06

    ... solicits comments on information needed to issue a Personal Identity Verification (PIV) identification card... Personnel Security and Identity Management (07C), Department of Veterans Affairs, 810 Vermont Avenue NW...

  14. Factorial Invariance and Convergent Validity of the Group-Based Medical Mistrust Scale across Gender and Ethnoracial Identity.

    PubMed

    Wheldon, Christopher W; Kolar, Stephanie K; Hernandez, Natalie D; Daley, Ellen M

    2017-01-01

    The objective of this study was to assess the factorial invariance and convergent validity of the Group-Based Medical Mistrust Scale (GBMMS) across gender (male and female) and ethnoracial identity (Latino and Black). Minority students (N = 686) attending a southeastern university were surveyed in the fall of 2011. Psychometric analysis of the GBMMS was performed. A three-factor solution fit the data after the omission of two problematic items. This revised version of the GBMMS exhibited sufficient configural, metric, and scalar invariance. Convergence of the GBMMS with conceptually related measures provided further evidence of validity; however, there was variation across ethnoracial identity. The GBMMS has viable psychometric properties across gender and ethnoracial identity in Black and Latino populations.

  15. The Family as a Site for Gendered Ethnic Identity Work among Asian Indian Immigrants

    ERIC Educational Resources Information Center

    Mehrotra, Meeta; Calasanti, Toni M.

    2010-01-01

    Research on immigrants often points to the family as a source of support and a location for oppression. Using in-depth interviews with 38 first-generation immigrant Indians, this study adds to this literature by exploring families as sites of identity work where first-generation immigrants manage their gendered ethnic identities. Relocation into a…

  16. The Influence of Field Teaching Practice on Pre-service Teachers’ Professional Identity: A Mixed Methods Study

    PubMed Central

    Zhao, Hongyu; Zhang, Xiaohui

    2017-01-01

    The current study used mixed methods to research pre-service teachers’ professional identity. Ninety-eight pre-service teachers were investigated and twelve teachers were interviewed in China. The results were as follows: (1) The results of quantitative data showed that compared with before the field teaching practice, pre-service teachers’ professional identity increased after the field teaching practice—specifically, intrinsic value identity increased, and extrinsic value identity did not significantly change; (2) The results of qualitative data validated and elaborated the results of quantitative data in more detail with regard to changes in professional identity. Specifically, compared with before the field teaching practice, intrinsic value identity including work content, work pattern, etc., increased and extrinsic value identity including work environment, income, and social status, etc., did not significantly change after experiencing teaching practice; (3) The results of qualitative data also showed that mentor support at field school promoted the development of pre-service teachers’ professional identity. Moreover, the development of pre-service teachers’ professional identity during field teaching practice further promoted their professional commitment; that is, it promoted their emotional evaluation and belief in the teaching profession. The study discussed these results and proposed solutions and suggestions for future studies. PMID:28790956

  17. The Influence of Field Teaching Practice on Pre-service Teachers' Professional Identity: A Mixed Methods Study.

    PubMed

    Zhao, Hongyu; Zhang, Xiaohui

    2017-01-01

    The current study used mixed methods to research pre-service teachers' professional identity. Ninety-eight pre-service teachers were investigated and twelve teachers were interviewed in China. The results were as follows: (1) The results of quantitative data showed that compared with before the field teaching practice, pre-service teachers' professional identity increased after the field teaching practice-specifically, intrinsic value identity increased, and extrinsic value identity did not significantly change; (2) The results of qualitative data validated and elaborated the results of quantitative data in more detail with regard to changes in professional identity. Specifically, compared with before the field teaching practice, intrinsic value identity including work content, work pattern, etc., increased and extrinsic value identity including work environment, income, and social status, etc., did not significantly change after experiencing teaching practice; (3) The results of qualitative data also showed that mentor support at field school promoted the development of pre-service teachers' professional identity. Moreover, the development of pre-service teachers' professional identity during field teaching practice further promoted their professional commitment; that is, it promoted their emotional evaluation and belief in the teaching profession. The study discussed these results and proposed solutions and suggestions for future studies.

  18. Zeolite crystal growth in space - What has been learned

    NASA Technical Reports Server (NTRS)

    Sacco, A., Jr.; Thompson, R. W.; Dixon, A. G.

    1993-01-01

    Three zeolite crystal growth experiments developed at WPI have been performed in space in last twelve months. One experiment, GAS-1, illustrated that to grow large, crystallographically uniform crystals in space, the precursor solutions should be mixed in microgravity. Another experiment evaluated the optimum mixing protocol for solutions that chemically interact ('gel') on contact. These results were utilized in setting the protocol for mixing nineteen zeolite solutions that were then processed and yielded zeolites A, X and mordenite. All solutions in which the nucleation event was influenced produced larger, more 'uniform' crystals than did identical solutions processed on earth.

  19. Why do I dread looking old?: A test of social identity theory, terror management theory, and the double standard of aging.

    PubMed

    Chonody, Jill M; Teater, Barbra

    2016-01-01

    Outward appearance is one of the means by which age is determined, and fear of looking old may stem from fears about social identity and death. This study explored how social identity theory and terror management theory may help to explain the dread of looking old. University students from the United States, England, and Australia (N = 1,042) completed a questionnaire regarding their attitudes about aging and older adults. Results indicated that sex, age, beliefs about personal aging, and death anxiety explained 30.4% of the variance for participants' dread of looking old. Theoretical hypotheses were supported by our findings.

  20. Achieving network level privacy in Wireless Sensor Networks.

    PubMed

    Shaikh, Riaz Ahmed; Jameel, Hassan; d'Auriol, Brian J; Lee, Heejo; Lee, Sungyoung; Song, Young-Jae

    2010-01-01

    Full network level privacy has often been categorized into four sub-categories: Identity, Route, Location and Data privacy. Achieving full network level privacy is a critical and challenging problem due to the constraints imposed by the sensor nodes (e.g., energy, memory and computation power), sensor networks (e.g., mobility and topology) and QoS issues (e.g., packet reach-ability and timeliness). In this paper, we proposed two new identity, route and location privacy algorithms and data privacy mechanism that addresses this problem. The proposed solutions provide additional trustworthiness and reliability at modest cost of memory and energy. Also, we proved that our proposed solutions provide protection against various privacy disclosure attacks, such as eavesdropping and hop-by-hop trace back attacks.

  1. Achieving Network Level Privacy in Wireless Sensor Networks†

    PubMed Central

    Shaikh, Riaz Ahmed; Jameel, Hassan; d’Auriol, Brian J.; Lee, Heejo; Lee, Sungyoung; Song, Young-Jae

    2010-01-01

    Full network level privacy has often been categorized into four sub-categories: Identity, Route, Location and Data privacy. Achieving full network level privacy is a critical and challenging problem due to the constraints imposed by the sensor nodes (e.g., energy, memory and computation power), sensor networks (e.g., mobility and topology) and QoS issues (e.g., packet reach-ability and timeliness). In this paper, we proposed two new identity, route and location privacy algorithms and data privacy mechanism that addresses this problem. The proposed solutions provide additional trustworthiness and reliability at modest cost of memory and energy. Also, we proved that our proposed solutions provide protection against various privacy disclosure attacks, such as eavesdropping and hop-by-hop trace back attacks. PMID:22294881

  2. Multibiometric Systems: Fusion Strategies and Template Security

    DTIC Science & Technology

    2008-01-01

    Biometric authentication, or simply biometrics, offers a natural and reliable solution to the problem of identity determination by establishing the identity...applications [99]. Therefore, there is no universally best biometric trait and the choice of biometric depends on the nature and requirements of the...result in a significant reduction in the GAR of a biometric system [72,204]. • Non-universality: If every individual in the target population is able

  3. Identities of Finitely Generated Algebras Over AN Infinite Field

    NASA Astrophysics Data System (ADS)

    Kemer, A. R.

    1991-02-01

    It is proved that for each finitely generated associative PI-algebra U over an infinite field F, there is a finite-dimensional F-algebra C such that the ideals of identities of the algebras U and C coincide. This yields a positive solution to the local problem of Specht for algebras over an infinite field: A finitely generated free associative algebra satisfies the maximum condition for T-ideals.

  4. Social identity and worldview validation: the effects of ingroup identity primes and mortality salience on value endorsement.

    PubMed

    Halloran, Michael J; Kashima, Emiko S

    2004-07-01

    In this article, the authors report an investigation of the relationship between terror management and social identity processes by testing for the effects of social identity salience on worldview validation. Two studies, with distinct populations, were conducted to test the hypothesis that mortality salience would lead to worldview validation of values related to a salient social identity. In Study 1, reasonable support for this hypothesis was found with bicultural Aboriginal Australian participants (N = 97). It was found that thoughts of death led participants to validate ingroup and reject outgroup values depending on the social identity that had been made salient. In Study 2, when their student and Australian identities were primed, respectively, Anglo-Australian students (N = 119) validated values related to those identities, exclusively. The implications of the findings for identity-based worldview validation are discussed.

  5. DoD ESI

    Science.gov Websites

    Information Management, Microsoft Platform Management, Identity & Access Management, Endpoint Systems /2016-24054/category-management). OMB released this IT Success Story for "Information Sharing Management of Common Information Technology: Mobile Devices and Services 7/1/2016 Category Management Policy

  6. 5 CFR 919.905 - Affiliate.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... management, ownership, or principal employees as the excluded person. ... Administrative Personnel OFFICE OF PERSONNEL MANAGEMENT (CONTINUED) CIVIL SERVICE REGULATIONS (CONTINUED... include, but are not limited to— (a) Interlocking management or ownership; (b) Identity of interests among...

  7. 9 CFR 381.169 - Ready-to-cook poultry products to which solutions are added.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 9 Animals and Animal Products 2 2011-01-01 2011-01-01 false Ready-to-cook poultry products to which solutions are added. 381.169 Section 381.169 Animals and Animal Products FOOD SAFETY AND... Definitions and Standards of Identity or Composition § 381.169 Ready-to-cook poultry products to which...

  8. Dealing with resistance in temporary agency nurses. The role of fear in identity-building processes.

    PubMed

    Cicellin, Mariavittoria; Pezzillo Iacono, Mario; Berni, Alessia; Esposito, Vincenza

    2015-01-01

    The purpose of this paper is to interpret employees' resistance using the perspective of a Foucaultian/post-structuralist approach in critical management studies. The authors examine the relationship between management of diversity, based on employment contract, emotional construction of identity and processes of resistance. The authors explore the ways in which temporary agency nurses understand and experience their contract, respond to tensions regarding temporary employment, develop collective emotions and show processes of resistance. The study adopted an interpretive and qualitative approach. The authors analysed empirical material collected in the Haematology Department of a hospital in Naples, Italy, to illustrate actual experiences in the workplace. Fear turns out to be the discursive resource through which resistance is actually exerted. Through emotions, temporary nurses build a community of coping and enhance their collective identity. They use fear to develop solidarity and to mobilize collective resistance in the workplace. Although no traditional resistance behaviours are reported, they aim to undermine the reputation of top managers and challenge and re-write the prevailing discourses of the organization. The paper contributes to the critical literature because the authors analysed a relationship that is rarely theoretically and empirically examined in literature, that between employment contract, collective identity-building dynamics and processes of resistance. We showed that the creation of a community of coping enabled minorities to voice their distance from and opposition to management.

  9. Black Plane Solutions and Localized Gravitational Energy

    PubMed Central

    Roberts, Jennifer

    2015-01-01

    We explore the issue of gravitational energy localization for static plane-symmetric solutions of the Einstein-Maxwell equations in 3+1 dimensions with asymptotic anti-de Sitter behavior. We apply three different energy-momentum complexes, the Einstein, Landau-Lifshitz, and Møller prescriptions, to the metric representing this category of solutions and determine the energy distribution for each. We find that the three prescriptions offer identical energy distributions, suggesting their utility for this type of model. PMID:27347499

  10. Counting Knights and Knaves

    ERIC Educational Resources Information Center

    Levin,Oscar; Roberts, Gerri M.

    2013-01-01

    To understand better some of the classic knights and knaves puzzles, we count them. Doing so reveals a surprising connection between puzzles and solutions, and highlights some beautiful combinatorial identities.

  11. Regenerative Life Support Systems Test Bed performance - Lettuce crop characterization

    NASA Technical Reports Server (NTRS)

    Barta, Daniel J.; Edeen, Marybeth A.; Eckhardt, Bradley D.

    1992-01-01

    System performance in terms of human life support requirements was evaluated for two crops of lettuce (Lactuca sative cv. Waldmann's Green) grown in the Regenerative Life Support Systems Test Bed. Each crop, grown in separate pots under identical environmental and cultural conditions, was irrigated with half-strength Hoagland's nutrient solution, with the frequency of irrigation being increased as the crop aged over the 30-day crop tests. Averaging over both crop tests, the test bed met the requirements of 2.1 person-days of oxygen production, 2.4 person-days of CO2 removal, and 129 person-days of potential potable water production. Gains in the mass of water and O2 produced and CO2 removed could be achieved by optimizing environmental conditions to increase plant growth rate and by optimizing cultural management methods.

  12. Older Adults' Uptake and Adherence to Exercise Classes: Instructors' Perspectives.

    PubMed

    Hawley-Hague, Helen; Horne, Maria; Skelton, Dawn A; Todd, Chris

    2016-01-01

    Exercise classes provide a range of benefits for older adults, but adherence levels are poor. We know little of instructors' experiences of delivering exercise classes to older adults. Semistructured interviews, informed by the Theory of Planned Behavior (TPB), were conducted with instructors (n = 19) delivering multicomponent exercise classes to establish their perspectives on older adults' uptake and adherence to exercise classes. Analysis revealed 'barriers' to uptake related to identity, choice/control, cost, and venue, and 'solutions' included providing choice/control, relating exercise to identity, a personal touch, and social support. Barriers to adherence included unrealistic expectations and social influences, and solutions identified were encouraging commitment, creating social cohesion, and an emphasis on achieving outcomes. Older adults' attitudes were an underlying theme, which related to all barriers and solutions. The instructor plays an important, but not isolated, role in older adults' uptake and adherence to classes. Instructors' perspectives help us to further understand how we can design successful exercise classes.

  13. On generalized Melvin solution for the Lie algebra E_6

    NASA Astrophysics Data System (ADS)

    Bolokhov, S. V.; Ivashchuk, V. D.

    2017-10-01

    A multidimensional generalization of Melvin's solution for an arbitrary simple Lie algebra G is considered. The gravitational model in D dimensions, D ≥ 4, contains n 2-forms and l ≥ n scalar fields, where n is the rank of G. The solution is governed by a set of n functions H_s(z) obeying n ordinary differential equations with certain boundary conditions imposed. It was conjectured earlier that these functions should be polynomials (the so-called fluxbrane polynomials). The polynomials H_s(z), s = 1,\\ldots ,6, for the Lie algebra E_6 are obtained and a corresponding solution for l = n = 6 is presented. The polynomials depend upon integration constants Q_s, s = 1,\\ldots ,6. They obey symmetry and duality identities. The latter ones are used in deriving asymptotic relations for solutions at large distances. The power-law asymptotic relations for E_6-polynomials at large z are governed by the integer-valued matrix ν = A^{-1} (I + P), where A^{-1} is the inverse Cartan matrix, I is the identity matrix and P is a permutation matrix, corresponding to a generator of the Z_2-group of symmetry of the Dynkin diagram. The 2-form fluxes Φ ^s, s = 1,\\ldots ,6, are calculated.

  14. 34 CFR 682.411 - Lender due diligence in collecting guaranty agency loans.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... receives a valid identity theft report or notification from a credit bureau that information furnished is a result of an alleged identity theft as defined in § 682.402(e)(14). (Approved by the Office of Management...

  15. A Generalization of the Doubling Construction for Sums of Squares Identities

    NASA Astrophysics Data System (ADS)

    Zhang, Chi; Huang, Hua-Lin

    2017-08-01

    The doubling construction is a fast and important way to generate new solutions to the Hurwitz problem on sums of squares identities from any known ones. In this short note, we generalize the doubling construction and obtain from any given admissible triple [r,s,n] a series of new ones [r+ρ(2^{m-1}),2^ms,2^mn] for all positive integer m, where ρ is the Hurwitz-Radon function.

  16. Identity-Based Verifiably Encrypted Signatures without Random Oracles

    NASA Astrophysics Data System (ADS)

    Zhang, Lei; Wu, Qianhong; Qin, Bo

    Fair exchange protocol plays an important role in electronic commerce in the case of exchanging digital contracts. Verifiably encrypted signatures provide an optimistic solution to these scenarios with an off-line trusted third party. In this paper, we propose an identity-based verifiably encrypted signature scheme. The scheme is non-interactive to generate verifiably encrypted signatures and the resulting encrypted signature consists of only four group elements. Based on the computational Diffie-Hellman assumption, our scheme is proven secure without using random oracles. To the best of our knowledge, this is the first identity-based verifiably encrypted signature scheme provably secure in the standard model.

  17. Collocation and Galerkin Time-Stepping Methods

    NASA Technical Reports Server (NTRS)

    Huynh, H. T.

    2011-01-01

    We study the numerical solutions of ordinary differential equations by one-step methods where the solution at tn is known and that at t(sub n+1) is to be calculated. The approaches employed are collocation, continuous Galerkin (CG) and discontinuous Galerkin (DG). Relations among these three approaches are established. A quadrature formula using s evaluation points is employed for the Galerkin formulations. We show that with such a quadrature, the CG method is identical to the collocation method using quadrature points as collocation points. Furthermore, if the quadrature formula is the right Radau one (including t(sub n+1)), then the DG and CG methods also become identical, and they reduce to the Radau IIA collocation method. In addition, we present a generalization of DG that yields a method identical to CG and collocation with arbitrary collocation points. Thus, the collocation, CG, and generalized DG methods are equivalent, and the latter two methods can be formulated using the differential instead of integral equation. Finally, all schemes discussed can be cast as s-stage implicit Runge-Kutta methods.

  18. Exercisers' identities and exercise dependence: the mediating effect of exercise commitment.

    PubMed

    Lu, Frank Jing-Horng; Hsu, Eva Ya-Wen; Wang, Junn-Ming; Huang, Mei-Yao; Chang, Jo-Ning; Wang, Chien-Hsin

    2012-10-01

    The purpose of this study was to examine the associations of exercise identity, exercise commitment, exercise dependence, and, particularly, the mediating effects of exercise commitment on the relationship between exercise identity and exercise dependence. 253 Taiwanese regular exercisers completed measures, including the Exercise Dependence Scale-Revised, the Exercise Identity Scale, the Exercise Commitment Scale, and the Godin Leisure Time Exercise Questionnaire. Results showed that exercise identity, exercise dependence, and two types of exercise commitment were moderately to highly correlated. Furthermore, structural equation modelling indicated that a "have to" commitment partially mediated the relationship between exercise identity and exercise dependence. Based on the mediating role of a "have to" commitment, the findings are particularly informative to exercise instructors and for exercise program managers.

  19. Online Identities and Social Networking

    NASA Astrophysics Data System (ADS)

    Maheswaran, Muthucumaru; Ali, Bader; Ozguven, Hatice; Lord, Julien

    Online identities play a critical role in the social web that is taking shape on the Internet. Despite many technical proposals for creating and managing online identities, none has received widespread acceptance. Design and implementation of online identities that are socially acceptable on the Internet remains an open problem. This chapter discusses the interplay between online identities and social networking. Online social networks (OSNs) are growing at a rapid pace and has millions of members in them. While the recent trend is to create explicit OSNs such as Facebook and MySpace, we also have implicit OSNs such as interaction graphs created by email and instant messaging services. Explicit OSNs allow users to create profiles and use them to project their identities on the web. There are many interesting identity related issues in the context of social networking including how OSNs help and hinder the definition of online identities.

  20. Iron chelates: a challenge to chemists and Mössbauer spectroscopists

    NASA Astrophysics Data System (ADS)

    Homonnay, Z.; Szilágyi, P. Á.; Vértes, A.; Kuzmann, E.; Sharma, V. K.; Molnár, G.; Bousseksou, A.; Grenèche, J.-M.; Brausam, A.; Meier, R.; van Eldik, R.

    2008-02-01

    The speciation of iron in aqueous solutions containing Fe3 + and selected chelates such as EDTA, EDDA, CDTA and HEDTA has been studied using transmission 57Fe Mössbauer spectrometry in frozen solutions. The protonation of various complexes as well as binuclear complex formation could be detected as a function of pH. Autoreduction of Fe3 + to Fe2 + was observed in several cases. Reaction with hydrogen peroxide proved to be rather different for the four ligands, while the dihapto complex [XFe( η 2-O2)]3 - had surprisingly identical Mössbauer parameters for X = EDTA, CDTA or HEDTA. Paramagnetic spin relaxation observed in the Mössbauer spectra was found to be strongly influenced by the identity of the chelating ligand, despite the basically spin-spin origin of the phenomenon.

  1. 40 CFR 792.31 - Testing facility management.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 31 2010-07-01 2010-07-01 true Testing facility management. 792.31... facility management. For each study, testing facility management shall: (a) Designate a study director as... appropriately tested for identity, strength, purity, stability, and uniformity, as applicable. (e) Assure that...

  2. 44 CFR 6.30 - Form of requests.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 44 Emergency Management and Assistance 1 2010-10-01 2010-10-01 false Form of requests. 6.30 Section 6.30 Emergency Management and Assistance FEDERAL EMERGENCY MANAGEMENT AGENCY, DEPARTMENT OF... manager, at his discretion, may accept oral requests for access subject to verification of identity. ...

  3. Special solutions to Chazy equation

    NASA Astrophysics Data System (ADS)

    Varin, V. P.

    2017-02-01

    We consider the classical Chazy equation, which is known to be integrable in hypergeometric functions. But this solution has remained purely existential and was never used numerically. We give explicit formulas for hypergeometric solutions in terms of initial data. A special solution was found in the upper half plane H with the same tessellation of H as that of the modular group. This allowed us to derive some new identities for the Eisenstein series. We constructed a special solution in the unit disk and gave an explicit description of singularities on its natural boundary. A global solution to Chazy equation in elliptic and theta functions was found that allows parametrization of an arbitrary solution to Chazy equation. The results have applications to analytic number theory.

  4. 76 FR 44855 - Common or Usual Name for Raw Meat and Poultry Products Containing Added Solutions

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-27

    .... FSIS-2010-0012] RIN 0583-AD41 Common or Usual Name for Raw Meat and Poultry Products Containing Added... name for raw meat and poultry products that do not meet standard of identity regulations and to which... description of the raw meat or poultry component, the percentage of added solution incorporated into the raw...

  5. Analytic solution to variance optimization with no short positions

    NASA Astrophysics Data System (ADS)

    Kondor, Imre; Papp, Gábor; Caccioli, Fabio

    2017-12-01

    We consider the variance portfolio optimization problem with a ban on short selling. We provide an analytical solution by means of the replica method for the case of a portfolio of independent, but not identically distributed, assets. We study the behavior of the solution as a function of the ratio r between the number N of assets and the length T of the time series of returns used to estimate risk. The no-short-selling constraint acts as an asymmetric \

  6. Achieving Harmony among Different Social Identities within the Self-Concept: The Consequences of Internalising a Group-Based Philosophy of Life

    PubMed Central

    Turner-Zwinkels, Felicity M.; Postmes, Tom; van Zomeren, Martijn

    2015-01-01

    It can be hard for individuals to manage multiple group identities within their self-concept (e.g., being a Christian and a woman). We examine how the inter-identity fit between potentially conflicting identities can become more harmonious through a self-defining group philosophy for life. Specifically, we test the hypothesis that holistic group identities (based in group philosophies for life that prescribe the behavior of their members in any situation, such as religion) become more strongly related to other identities in the self-concept (e.g., gender) when they are strongly self-defining (i.e., devotedly applied to daily life). In three studies we investigated the inter-identity fit between individuals’ (highly holistic) religious identity and (less holistic) gender identity. Results provided converging support for our hypothesis across diverging methods (explicit questionnaires, more implicit associations, and a novel network analysis of group traits). We discuss the importance of understanding how some (i.e., holistic and self-defining) group identities may harmonize otherwise less harmonious group identities within one’s self-concept. PMID:26618917

  7. Achieving Harmony among Different Social Identities within the Self-Concept: The Consequences of Internalising a Group-Based Philosophy of Life.

    PubMed

    Turner-Zwinkels, Felicity M; Postmes, Tom; van Zomeren, Martijn

    2015-01-01

    It can be hard for individuals to manage multiple group identities within their self-concept (e.g., being a Christian and a woman). We examine how the inter-identity fit between potentially conflicting identities can become more harmonious through a self-defining group philosophy for life. Specifically, we test the hypothesis that holistic group identities (based in group philosophies for life that prescribe the behavior of their members in any situation, such as religion) become more strongly related to other identities in the self-concept (e.g., gender) when they are strongly self-defining (i.e., devotedly applied to daily life). In three studies we investigated the inter-identity fit between individuals' (highly holistic) religious identity and (less holistic) gender identity. Results provided converging support for our hypothesis across diverging methods (explicit questionnaires, more implicit associations, and a novel network analysis of group traits). We discuss the importance of understanding how some (i.e., holistic and self-defining) group identities may harmonize otherwise less harmonious group identities within one's self-concept.

  8. Bringing Federated Identity to Grid Computing

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Teheran, Jeny

    The Fermi National Accelerator Laboratory (FNAL) is facing the challenge of providing scientific data access and grid submission to scientific collaborations that span the globe but are hosted at FNAL. Users in these collaborations are currently required to register as an FNAL user and obtain FNAL credentials to access grid resources to perform their scientific computations. These requirements burden researchers with managing additional authentication credentials, and put additional load on FNAL for managing user identities. Our design integrates the existing InCommon federated identity infrastructure, CILogon Basic CA, and MyProxy with the FNAL grid submission system to provide secure access formore » users from diverse experiments and collab orations without requiring each user to have authentication credentials from FNAL. The design automates the handling of certificates so users do not need to manage them manually. Although the initial implementation is for FNAL's grid submission system, the design and the core of the implementation are general and could be applied to other distributed computing systems.« less

  9. The effect of professional identity on comprehensiveness in strategic decision making: physician executives in the Canadian health care context.

    PubMed

    Karmali, Shazia

    2012-01-01

    This paper explores differences in decision-making approaches between physician executives and nonphysician executives in a managerial setting. Fredrickson and Mitchell's (1984) conceptualization of the construct of comprehensiveness in strategic decision making is the central construct of this paper. Theories of professional identity, socialization, and institutional/dominant logics are applied to illustrate their impact on strategic decision-making approaches of physician and nonphysician executives. This paper proposes that high-status professionals, specifically physicians, occupying senior management roles are likely to approach decision making in a way that is consistent with their professional identity, and by extension, that departments led by physician executives are less likely to exhibit comprehensiveness in strategic decision-making processes than departments led by nonphysician executives. This paper provides conceptual evidence that physicians and nonphysicians approach management differently, and introduces the utility of comprehensiveness as a construct for strategic decision making in the context of health care management.

  10. 21 CFR 58.31 - Testing facility management.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 21 Food and Drugs 1 2010-04-01 2010-04-01 false Testing facility management. 58.31 Section 58.31... management. For each nonclinical laboratory study, testing facility management shall: (a) Designate a study... appropriately tested for identity, strength, purity, stability, and uniformity, as applicable. (e) Assure that...

  11. Black Managers in White Corporations.

    ERIC Educational Resources Information Center

    Fernandez, John P.

    The study examines the major determinants of the career patterns of black managers in white businesses and the effects of corporations on their black managers' identities and relationships to the black community. Analyzed were occupational mobility theories; white and black managers' career patterns, goals, and related factors; company employment…

  12. Establishing Remote Student Identity: Results of an AACRAO/InCommon Federation Survey

    ERIC Educational Resources Information Center

    McConahay, Mark; West, Ann

    2012-01-01

    Successful administration of remote programs and services requires that information technology (IT) professionals and university administrators address two critical identity management factors: (1) linking the institutional electronic record representing an individual with the "real" person; and (2) establishing a mechanism/protocol…

  13. "(Un)covering" in the Classroom: Managing Stigma beyond the Closet

    ERIC Educational Resources Information Center

    Branfman, Jonathan

    2017-01-01

    While many instructors closet stigmatized identities, others "downplay" them--a tactic that sociologist Erving Goffman terms "covering." What are the personal, ethical, and pedagogical costs of covering? What are the gains? How can feminist university instructors cover stigmatized identities without fueling oppressive…

  14. Brief report: the Utrecht-Management of Identity Commitments Scale (U-MICS): gender and age measurement invariance and convergent validity of the Turkish version.

    PubMed

    Morsunbul, Umit; Crocetti, Elisabetta; Cok, Figen; Meeus, Wim

    2014-08-01

    The purpose of this study was to evaluate the factor structure and convergent validity of the Turkish version of the Utrecht-Management of Identity Commitments Scale (U-MICS). Participants were 1201 (59.6% females) youth aged between 12 and 24 years (M(age) = 17.53 years, SD(age) = 3.25). Results indicated that the three-factor model consisting of commitment, in-depth exploration, and reconsideration of commitment provided a very good fit to the data and applied equally well to boys and girls as well as to three age groups (early adolescents, middle adolescents, and emerging adults). Significant relations between identity processes and self-concept clarity, personality, internalizing and externalizing problem behaviors, and parental relationships supported convergent validity. Thus, the Turkish version of U-MICS is a reliable tool for assessing identity in Turkish-speaking respondents. Copyright © 2014 The Foundation for Professionals in Services for Adolescents. Published by Elsevier Ltd. All rights reserved.

  15. Identity management, negotiation and resistance among women in the sex trade in London, Ontario.

    PubMed

    Orchard, Treena; Farr, Sara; Macphail, Susan; Wender, Cass; Young, Dawn

    2013-01-01

    Sex work, and ideas about women in the trade, have long been represented as tragic and/or threatening. However, such portrayals tell us very little about how women think about themselves and the kinds of work they do. The data for this paper come from an ethnographic, community-based study in London, Ontario, that involves women in street-based, indoor and transactional sex work. This discussion focuses on how women develop different individual identities, including the management of multiple selves, their sexual identities and what we have termed the 'good junkie' identity. We also examine how these women employ aspects of dominant representation of sex workers, namely the low status accorded to those in street-based work and the defamatory term 'whore' or 'ho', when negotiating the moral hierarchies that exist within various kinds of sex work (i.e., stripping, massage parlours) and making sense of their professional and personal lives. The work that goes into the creation and maintenance of the women's divergent identities sheds important light on this complicated and tremendously demanding, yet inadequately understood, aspect of life as women in the sex trade.

  16. Mini-review: Assessing the drivers of ship biofouling management--aligning industry and biosecurity goals.

    PubMed

    Davidson, Ian; Scianni, Christopher; Hewitt, Chad; Everett, Richard; Holm, Eric; Tamburri, Mario; Ruiz, Gregory

    2016-01-01

    Biofouling exerts a frictional and cost penalty on ships and is a direct cause of invasion by marine species. These negative consequences provide a unifying purpose for the maritime industry and biosecurity managers to prevent biofouling accumulation and transfer, but important gaps exist between these sectors. This mini-review examines the approach to assessments of ship biofouling among sectors (industry, biosecurity and marine science) and the implications for existing and emerging management of biofouling. The primary distinctions between industry and biosecurity in assessment of vessels biofouling revolve around the resolution of biological information collected and the specific wetted surface areas of primary concern to each sector. The morphological characteristics of biofouling and their effects on propulsion dynamics are of primary concern to industry, with an almost exclusive focus on the vertical sides and flat bottom of hulls and an emphasis on antifouling and operational performance. In contrast, the identity, biogeography, and ecology of translocated organisms is of highest concern to invasion researchers and biosecurity managers and policymakers, especially as it relates to species with known histories of invasion elsewhere. Current management practices often provide adequate, although not complete, provision for hull surfaces, but niche areas are well known to enhance biosecurity risk. As regulations to prevent invasions emerge in this arena, there is a growing opportunity for industry, biosecurity and academic stakeholders to collaborate and harmonize efforts to assess and manage biofouling of ships that should lead to more comprehensive biofouling solutions that promote industry goals while reducing biosecurity risk and greenhouse gas emissions.

  17. 41 CFR 105-64.209 - What special conditions apply to accessing law enforcement and security records?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false What special conditions... and Property Management Federal Property Management Regulations System (Continued) GENERAL SERVICES... identity would remain confidential. ...

  18. 75 FR 55827 - Justice Management Division; Agency Information Collection Activities: Proposed Collection...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-14

    ... DEPARTMENT OF JUSTICE [OMB Number 1103-0016] Justice Management Division; Agency Information Collection Activities: Proposed Collection; Comments Requested ACTION: 30-Day Notice of Information Collection Under Review: Certification of Identity. The Department of Justice (DOJ), Justice Management...

  19. 'Everyone here wants everyone else to get better': The role of social identity in eating disorder recovery.

    PubMed

    McNamara, Niamh; Parsons, Harriet

    2016-12-01

    Retention of a positively valued illness identity contributes to poor outcomes for individuals with eating disorders (EDs). Consequently, dis-identification from the illness identity and the adoption of a recovery identity are vital for successful recovery. While social identity processes have been shown to influence ED maintenance, their role in recovery is rarely considered. This study explores how a sense of shared identity helps individuals with EDs manage their condition and promotes recovery. Transcripts from 18 online support sessions involving 75 participants were thematically analysed. Our findings suggest that the illness identity initially operates as a social identity that forms the basis for connections with similar others. For those wishing to recover, identity-based support is then perceived to be more effective than that found outside the group. Online interactions also facilitate construction of a new shared recovery identity which promotes a shift from the illness identity as a primary source of definition and endorses group norms of illness disclosure and treatment engagement. While in the clinical literature, ED identity is seen as problematic and interventions are targeted at challenging an individual's self-concept, we suggest that interventions could instead harness identity resources to support a transition to a recovery identity. © 2016 The British Psychological Society.

  20. 24 CFR 30.45 - Multifamily and section 202 or 811 mortgagors.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... only: (1) Agent employed to manage the property that has an identity of interest and identity of... individual corporation; company; association; partnership; authority; firm; society; trust; state, local government or agency thereof; or any other organization or group of people. (4) Multifamily property...

  1. 24 CFR 30.45 - Multifamily and section 202 or 811 mortgagors.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... only: (1) Agent employed to manage the property that has an identity of interest and identity of... individual corporation; company; association; partnership; authority; firm; society; trust; state, local government or agency thereof; or any other organization or group of people. (4) Multifamily property...

  2. 24 CFR 30.45 - Multifamily and section 202 or 811 mortgagors.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... only: (1) Agent employed to manage the property that has an identity of interest and identity of... individual corporation; company; association; partnership; authority; firm; society; trust; state, local government or agency thereof; or any other organization or group of people. (4) Multifamily property...

  3. 24 CFR 30.45 - Multifamily and section 202 or 811 mortgagors.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... only: (1) Agent employed to manage the property that has an identity of interest and identity of... individual corporation; company; association; partnership; authority; firm; society; trust; state, local government or agency thereof; or any other organization or group of people. (4) Multifamily property...

  4. 24 CFR 30.45 - Multifamily and section 202 or 811 mortgagors.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... only: (1) Agent employed to manage the property that has an identity of interest and identity of... individual corporation; company; association; partnership; authority; firm; society; trust; state, local government or agency thereof; or any other organization or group of people. (4) Multifamily property...

  5. "Unhomely" Academic Developer Identities: More Post-Colonial Explorations

    ERIC Educational Resources Information Center

    Manathunga, Catherine

    2007-01-01

    Academic developers are very often disciplinary migrants, performing hybrid, liminal roles at the "fault lines" between teachers and learners, between academics and managers, and between teaching and research. As a result, their identities as scholars can be described as "unhomely." While this in-between space is uncomfortable…

  6. Reliability of MEG source imaging of anterior temporal spikes: analysis of an intracranially characterized spike focus.

    PubMed

    Wennberg, Richard; Cheyne, Douglas

    2014-05-01

    To assess the reliability of MEG source imaging (MSI) of anterior temporal spikes through detailed analysis of the localization and orientation of source solutions obtained for a large number of spikes that were separately confirmed by intracranial EEG to be focally generated within a single, well-characterized spike focus. MSI was performed on 64 identical right anterior temporal spikes from an anterolateral temporal neocortical spike focus. The effects of different volume conductors (sphere and realistic head model), removal of noise with low frequency filters (LFFs) and averaging multiple spikes were assessed in terms of the reliability of the source solutions. MSI of single spikes resulted in scattered dipole source solutions that showed reasonable reliability for localization at the lobar level, but only for solutions with a goodness-of-fit exceeding 80% using a LFF of 3 Hz. Reliability at a finer level of intralobar localization was limited. Spike averaging significantly improved the reliability of source solutions and averaging 8 or more spikes reduced dependency on goodness-of-fit and data filtering. MSI performed on topographically identical individual spikes from an intracranially defined classical anterior temporal lobe spike focus was limited by low reliability (i.e., scattered source solutions) in terms of fine, sublobar localization within the ipsilateral temporal lobe. Spike averaging significantly improved reliability. MSI performed on individual anterior temporal spikes is limited by low reliability. Reduction of background noise through spike averaging significantly improves the reliability of MSI solutions. Copyright © 2013 International Federation of Clinical Neurophysiology. Published by Elsevier Ireland Ltd. All rights reserved.

  7. The hair-trigger effect for a class of nonlocal nonlinear equations

    NASA Astrophysics Data System (ADS)

    Finkelshtein, Dmitri; Tkachov, Pasha

    2018-06-01

    We prove the hair-trigger effect for a class of nonlocal nonlinear evolution equations on which have only two constant stationary solutions, 0 and . The effect consists in that the solution with an initial condition non identical to zero converges (when time goes to ) to θ locally uniformly in . We also find sufficient conditions for existence, uniqueness and comparison principle in the considered equations.

  8. Short Message Service (SMS) Security Solution for Mobile Devices

    DTIC Science & Technology

    2006-12-01

    correspondences, all reside on the mobile device . Once the data is compromised, the owner, family members, and friends may be subjected to identity theft ...SERVICE (SMS) SECURITY SOLUTION FOR MOBILE DEVICES by Yu Loon Ng December 2006 Thesis Advisor: Gurminder Singh Co-Advisor: John Gibson...in military settings are also discussed. 15. NUMBER OF PAGES 113 14. SUBJECT TERMS GSM security, SMS security, mobile device security

  9. A note on the self-similar solutions to the spontaneous fragmentation equation

    NASA Astrophysics Data System (ADS)

    Breschi, Giancarlo; Fontelos, Marco A.

    2017-05-01

    We provide a method to compute self-similar solutions for various fragmentation equations and use it to compute their asymptotic behaviours. Our procedure is applied to specific cases: (i) the case of mitosis, where fragmentation results into two identical fragments, (ii) fragmentation limited to the formation of sufficiently large fragments, and (iii) processes with fragmentation kernel presenting a power-like behaviour.

  10. Change management in health care.

    PubMed

    Campbell, Robert James

    2008-01-01

    This article introduces health care managers to the theories and philosophies of John Kotter and William Bridges, 2 leaders in the evolving field of change management. For Kotter, change has both an emotional and situational component, and methods for managing each are expressed in his 8-step model (developing urgency, building a guiding team, creating a vision, communicating for buy-in, enabling action, creating short-term wins, don't let up, and making it stick). Bridges deals with change at a more granular, individual level, suggesting that change within a health care organization means that individuals must transition from one identity to a new identity when they are involved in a process of change. According to Bridges, transitions occur in 3 steps: endings, the neutral zone, and beginnings. The major steps and important concepts within the models of each are addressed, and examples are provided to demonstrate how health care managers can actualize the models within their health care organizations.

  11. Conditioning of the Stable, Discrete-time Lyapunov Operator

    NASA Technical Reports Server (NTRS)

    Tippett, Michael K.; Cohn, Stephen E.; Todling, Ricardo; Marchesin, Dan

    2000-01-01

    The Schatten p-norm condition of the discrete-time Lyapunov operator L(sub A) defined on matrices P is identical with R(sup n X n) by L(sub A) P is identical with P - APA(sup T) is studied for stable matrices A is a member of R(sup n X n). Bounds are obtained for the norm of L(sub A) and its inverse that depend on the spectrum, singular values and radius of stability of A. Since the solution P of the the discrete-time algebraic Lyapunov equation (DALE) L(sub A)P = Q can be ill-conditioned only when either L(sub A) or Q is ill-conditioned, these bounds are useful in determining whether P admits a low-rank approximation, which is important in the numerical solution of the DALE for large n.

  12. x509-free access to WLCG resources

    NASA Astrophysics Data System (ADS)

    Short, H.; Manzi, A.; De Notaris, V.; Keeble, O.; Kiryanov, A.; Mikkonen, H.; Tedesco, P.; Wartel, R.

    2017-10-01

    Access to WLCG resources is authenticated using an x509 and PKI infrastructure. Even though HEP users have always been exposed to certificates directly, the development of modern Web Applications by the LHC experiments calls for simplified authentication processes keeping the underlying software unmodified. In this work we will show a solution with the goal of providing access to WLCG resources using the user’s home organisations credentials, without the need for user-acquired x509 certificates. In particular, we focus on identity providers within eduGAIN, which interconnects research and education organisations worldwide, and enables the trustworthy exchange of identity-related information. eduGAIN has been integrated at CERN in the SSO infrastructure so that users can authenticate without the need of a CERN account. This solution achieves x509-free access to Grid resources with the help of two services: STS and an online CA. The STS (Security Token Service) allows credential translation from the SAML2 format used by Identity Federations to the VOMS-enabled x509 used by most of the Grid. The IOTA CA (Identifier-Only Trust Assurance Certification Authority) is responsible for the automatic issuing of short-lived x509 certificates. The IOTA CA deployed at CERN has been accepted by EUGridPMA as the CERN LCG IOTA CA, included in the IGTF trust anchor distribution and installed by the sites in WLCG. We will also describe the first pilot projects which are integrating the solution.

  13. Multiple bio-monitoring system using visible light for electromagnetic-wave free indoor healthcare

    NASA Astrophysics Data System (ADS)

    An, Jinyoung; Pham, Ngoc Quan; Chung, Wan-Young

    2017-12-01

    In this paper, a multiple biomedical data transmission system with visible light communication (VLC) is proposed for an electromagnetic-wave-free indoor healthcare. VLC technology has emerged as an alternative solution to radio-frequency (RF) wireless systems, due to its various merits, e.g., ubiquity, power efficiency, no RF radiation, and security. With VLC, critical bio-medical signals, including electrocardiography (ECG), can be transmitted in places where RF radiation is restricted. This potential advantage of VLC could save more lives in emergency situations. A time hopping (TH) scheme is employed to transfer multiple medical-data streams in real time with a simple system design. Multiple data streams are transmitted using identical color LEDs and go into an optical detector. The received multiple data streams are demodulated and rearranged using a TH-based demodulator. The medical data is then monitored and managed to provide the necessary medical care for each patient.

  14. 29 CFR 406.4 - Terminal report.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Relating to Labor OFFICE OF LABOR-MANAGEMENT STANDARDS, DEPARTMENT OF LABOR LABOR-MANAGEMENT STANDARDS... during his fiscal year loses his identity as a reporting entity through merger, consolidation...-Management Standards, on Form LM-21 signed by the president and treasurer or corresponding principal officers...

  15. 2 CFR 180.905 - Affiliate.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... exclusion of a person which has the same or similar management, ownership, or principal employees as the... and Agreements OFFICE OF MANAGEMENT AND BUDGET GOVERNMENTWIDE GUIDANCE FOR GRANTS AND AGREEMENTS... management or ownership; (b) Identity of interests among family members; (c) Shared facilities and equipment...

  16. Gender Identity and Career Aspiration to Top Management of Malaysian Graduate Students

    ERIC Educational Resources Information Center

    Karami, Roya; Ismail, Maimunah; Sail, Rahim Md.

    2011-01-01

    This article examines the relationship between gender identity and career aspirations of a group of Iranian international postgraduate students studying at a Malaysian public university. This study uses the Farmer's Achievement Motivation Theory and Astin's Sociopsychological Model of Career Choice as theoretical framework. The data were collected…

  17. Willy Loman's Lesson: Teaching Identity Management with "Death of a Salesman" (Teaching Aid Reviews).

    ERIC Educational Resources Information Center

    Zorn, Theodore E.

    1991-01-01

    Discusses how the movie "Death of a Salesman" (a 1986 movie starring Dustin Hoffman in the role of Willy Loman) is useful for teaching communication concepts. Examines how the movie provides a rich case study for illustrating the negotiation of identities. (KEH)

  18. 29 CFR 458.67 - Standards complaint; initiation of proceedings.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Section 458.67 Labor Regulations Relating to Labor OFFICE OF LABOR-MANAGEMENT STANDARDS, DEPARTMENT OF... believes it appropriate, refrain from disclosing the identity of any person who called the violation to his... shall include the following: (a) The name and identity of each respondent. (b) A clear and concise...

  19. 77 FR 49817 - Submission for OMB Review; Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-08-17

    ... identity and comply with the statutory requirement that federal Office of Child Support Enforcement (OCSE... persons. 42 U.S.C. 653(m)(2). After identity is authenticated, secure accounts will be created for... directly to the following: Office of Management and Budget, Paperwork Reduction Project, 725 17th Street NW...

  20. Governance and Corporate Identity in Network Universities.

    ERIC Educational Resources Information Center

    Smith, Robert

    1992-01-01

    A discussion of university autonomy and institutional image is presented with reference to politics at the newly established University of New England (Australia). Elements of institutional image or identity are examined, including (1) symbolic issues such as logo and location of administration; (2) leadership and management structures; (3)…

  1. Noncredit and Credit Divisions in Community Colleges: The Dilemma of Multiple Organizational Identities

    ERIC Educational Resources Information Center

    Palter Gill, Dianne

    2012-01-01

    Despite the importance of effective linkages between credit and noncredit divisions, significant barriers interfere with and detract from these units working well together. Community college leaders are challenged to manage these multiple and sometimes competing organizational identities in a complex and rapidly-changing educational landscape.…

  2. Discourse, Power Interplays and "Disordered Identities": An Intersectional Framework for Analysis and Policy Development

    ERIC Educational Resources Information Center

    Liasidou, Anastasia

    2016-01-01

    While acknowledging the discursive constitution of student identities through the interplay of unequal power relations and discriminatory processes, the article discusses the ways in which social, emotional and behaviour difficulties (SEBD) are "produced" and "managed" within current schooling. SEBD are routinely framed in…

  3. Development of Professional Identity in SMEs.

    ERIC Educational Resources Information Center

    Puurula, Arja; Lofstrom, Erika

    This paper describes a study of the development of professional identity among employees in small and medium sized enterprises (SMEs) participating in large-scale company-wide training programs. Managers and employees in 175 SMEs in Finland participated. These two research questions were posed: (1) are there differences in the perceptions of…

  4. Traditionalism and Feminism: A Typology of Strategies Used by University Women to Manage Career-Family Conflicts.

    ERIC Educational Resources Information Center

    Cote, James E.

    1986-01-01

    Presents an Eriksonian analysis of the impact of traditionalism and feminism on the identity formation of university-attending women and postulates four "identity strategies": traditionalism, ambivalent semi-traditionalism, confident semi-traditionalism, and feminism. Describes a study assessing the reliability and validity of an…

  5. Negotiating Contexts to Construct an Identity as a Mathematics Teacher

    ERIC Educational Resources Information Center

    Hodges, Thomas E.; Cady, Jo Ann

    2012-01-01

    The authors focused on 1 middle-grades mathematics teacher's identity and her efforts to implement standards-based instructional practices. As professionals, teachers participate in multiple professional communities and must negotiate and manage conflicting agendas. The authors analyze how the contexts of these communities influence the teacher's…

  6. Professional Development in Japanese Non-Native English Speaking Teachers' Identity and Efficacy

    ERIC Educational Resources Information Center

    Takayama, Hiromi

    2015-01-01

    This mixed methods study investigates how Japanese non-native English speaking teachers' (NNESTs) efficacy and identity are developed and differentiated from those of native English speaking teachers (NESTs). To explore NNESTs' efficacy, this study focuses on the contributing factors, such as student engagement, classroom management, instructional…

  7. SAVAH: Source Address Validation with Host Identity Protocol

    NASA Astrophysics Data System (ADS)

    Kuptsov, Dmitriy; Gurtov, Andrei

    Explosive growth of the Internet and lack of mechanisms that validate the authenticity of a packet source produced serious security and accounting issues. In this paper, we propose validating source addresses in LAN using Host Identity Protocol (HIP) deployed in a first-hop router. Compared to alternative solutions such as CGA, our approach is suitable both for IPv4 and IPv6. We have implemented SAVAH in Wi-Fi access points and evaluated its overhead for clients and the first-hop router.

  8. Implementing case management in New York State's partnerships for publicly funded breast cancer screening.

    PubMed

    Lillquist, Patricia P

    2008-04-01

    This research aimed to explore differences in the implementation of case management among local breast cancer screening partnerships in New York State after changes in federal public policy in 1998 and to achieve a better understanding of case management in a new and distinct practice setting. Capacity and willingness to implement change were theorized to explain local differences in implementation. Local breast cancer screening programs that received federal funding through the New York State Department of Health were invited to participate in the study. A mail survey was administered to the directors of New York's 53 local breast cancer screening partnerships in 2003. The survey included questions about willingness and capacity to implement case management and a scale to assess case management program philosophy. Factor analysis and correlations were used to compare willingness and capacity with differences in implementation. Two common factors--task focus and self-identity focus--were identified as factors that differentiated case management programs. Task-focus partnerships undertook a broader range of tasks but were less likely to report autonomy in making program changes. Self-identity partnerships were less likely to report difficulties with other agencies and scored highly on innovation, involvement in work, and interest in client service. Having a nurse as the case manager, being aware of the standards of case management, and providing health education were associated with both task focus and self-identity focus. The study identified distinct styles of implementation. These styles have implications for the breadth of services provided, such as whether client-level services only are offered. Interagency coordination was facilitated in partnerships with comprehensive case management.

  9. ‘Stealing me from myself’: identity and recovery in personal accounts of mental illness

    PubMed Central

    Bruce, Kevin; Saedi, Goal Auzeen; Weis, Teresa; Green, Carla A.

    2013-01-01

    Objectives To understand and promote recovery from serious mental illnesses, it is important to study the perspectives of individuals who are coping with mental health problems. The aim of the present study was to examine identity-related themes in published self-narratives of family members and individuals with serious mental illness. It adds to the body of research addressing how identity affects the process of recovery and identifies potential opportunities for using published narratives to support individuals as they move toward positive identities that facilitate recovery. Method Forty-five personal accounts from individuals with severe mental illness, which were published in two prominent research journals between 1998 and 2003, were qualitatively analysed. Results Individuals with mental illness and their family members described a loss of self and identity that had to be overcome, or at least managed, for recovery to become possible. Writers described (i) a loss of self, (ii) the duality of (ill/well) selves, (iii) perceptions of normality, (iv) specific concerns about parenting and identity, and (v) hope and reconciliation. Conclusions Individuals’ stories of their experiences of severe mental illness describe severe challenges managing identity. Efforts to publish personal accounts that focus on strengths-based patient-centred stories, rather than on deficits, could be helpful to provide hope for patients. These published narratives highlight the importance of moving recovery and hope to the forefront among patient, family, and clinician groups. Increasing such information and role models can provide important resources to individuals working to redefine themselves and create a sense of self-worth and stable identity that will support productive, happy lives. PMID:18465375

  10. Optimal trajectories based on linear equations

    NASA Technical Reports Server (NTRS)

    Carter, Thomas E.

    1990-01-01

    The Principal results of a recent theory of fuel optimal space trajectories for linear differential equations are presented. Both impulsive and bounded-thrust problems are treated. A new form of the Lawden Primer vector is found that is identical for both problems. For this reason, starting iteratives from the solution of the impulsive problem are highly effective in the solution of the two-point boundary-value problem associated with bounded thrust. These results were applied to the problem of fuel optimal maneuvers of a spacecraft near a satellite in circular orbit using the Clohessy-Wiltshire equations. For this case two-point boundary-value problems were solved using a microcomputer, and optimal trajectory shapes displayed. The results of this theory can also be applied if the satellite is in an arbitrary Keplerian orbit through the use of the Tschauner-Hempel equations. A new form of the solution of these equations has been found that is identical for elliptical, parabolic, and hyperbolic orbits except in the way that a certain integral is evaluated. For elliptical orbits this integral is evaluated through the use of the eccentric anomaly. An analogous evaluation is performed for hyperbolic orbits.

  11. How the past weighs on the present: social representations of history and their role in identity politics.

    PubMed

    Liu, James H; Hilton, Denis J

    2005-12-01

    Socially shared representations of history have been important in creating, maintaining and changing a people's identity. Their management and negotiation are central to interethnic and international relations. We present a narrative framework to represent how collectively significant events become (selectively) incorporated in social representations that enable positioning of ethnic, national and supranational identities. This perspective creates diachronic (temporal) links between the functional (e.g. realistic conflict theory), social identity, and cognitive perspectives on intergroup relations. The charters embedded in these representations condition nations with similar interests to adopt different political stances in dealing with current events, and can influence the perceived stability and legitimacy of social orders. They are also instrumental in determining social identity strategies for reacting to negative social comparisons, and can influence the relationships between national and ethnic identities.

  12. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Cembranos, Jose A.R.; Valcarcel, Jorge Gigante, E-mail: cembra@fis.ucm.es, E-mail: jorgegigante@ucm.es

    We derive a new exact static and spherically symmetric vacuum solution in the framework of the Poincaré gauge field theory with dynamical massless torsion. This theory is built in such a form that allows to recover General Relativity when the first Bianchi identity of the model is fulfilled by the total curvature. The solution shows a Reissner-Nordström type geometry with a Coulomb-like curvature provided by the torsion field. It is also shown the existence of a generalized Reissner-Nordström-de Sitter solution when additional electromagnetic fields and/or a cosmological constant are coupled to gravity.

  13. 41 CFR 102-41.155 - Is unclaimed personal property available for transfer to another Federal agency?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false Is unclaimed personal... and Property Management Federal Property Management Regulations System (Continued) FEDERAL MANAGEMENT... transferred property then loses its identity as unclaimed property and becomes property of the Government, and...

  14. The Gibbs paradox and the physical criteria for indistinguishability of identical particles

    NASA Astrophysics Data System (ADS)

    Unnikrishnan, C. S.

    2016-08-01

    Gibbs paradox in the context of statistical mechanics addresses the issue of additivity of entropy of mixing gases. The usual discussion attributes the paradoxical situation to classical distinguishability of identical particles and credits quantum theory for enabling indistinguishability of identical particles to solve the problem. We argue that indistinguishability of identical particles is already a feature in classical mechanics and this is clearly brought out when the problem is treated in the language of information and associated entropy. We pinpoint the physical criteria for indistinguishability that is crucial for the treatment of the Gibbs’ problem and the consistency of its solution with conventional thermodynamics. Quantum mechanics provides a quantitative criterion, not possible in the classical picture, for the degree of indistinguishability in terms of visibility of quantum interference, or overlap of the states as pointed out by von Neumann, thereby endowing the entropy expression with mathematical continuity and physical reasonableness.

  15. How does a servant leader fuel the service fire? A multilevel model of servant leadership, individual self identity, group competition climate, and customer service performance.

    PubMed

    Chen, Zhijun; Zhu, Jing; Zhou, Mingjian

    2015-03-01

    Building on a social identity framework, our cross-level process model explains how a manager's servant leadership affects frontline employees' service performance, measured as service quality, customer-focused citizenship behavior, and customer-oriented prosocial behavior. Among a sample of 238 hairstylists in 30 salons and 470 of their customers, we found that hair stylists' self-identity embedded in the group, namely, self-efficacy and group identification, partially mediated the positive effect of salon managers' servant leadership on stylists' service performance as rated by the customers, after taking into account the positive influence of transformational leadership. Moreover, group competition climate strengthened the positive relationship between self-efficacy and service performance. PsycINFO Database Record (c) 2015 APA, all rights reserved.

  16. On High-Order Upwind Methods for Advection

    NASA Technical Reports Server (NTRS)

    Huynh, Hung T.

    2017-01-01

    Scheme III (piecewise linear) and V (piecewise parabolic) of Van Leer are shown to yield identical solutions provided the initial conditions are chosen in an appropriate manner. This result is counter intuitive since it is generally believed that piecewise linear and piecewise parabolic methods cannot produce the same solutions due to their different degrees of approximation. The result also shows a key connection between the approaches of discontinuous and continuous representations.

  17. 31 CFR 19.905 - Affiliate.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... to— (a) Interlocking management or ownership; (b) Identity of interests among family members; (c... organized following the exclusion of a person which has the same or similar management, ownership, or principal employees as the excluded person. ...

  18. Group affiliation in self-management: support or threat to identity?

    PubMed

    Bossy, Dagmara; Knutsen, Ingrid Ruud; Rogers, Anne; Foss, Christina

    2017-02-01

    Self-management is considered important in chronic illness, and contemporary health policy recommends participation in support groups for individuals with chronic conditions. Although withdrawal from or non-participation in support groups is an important problem, there is limited knowledge about individuals' own motivation for participation in or withdrawal from self-management support groups. To investigate how individuals with type 2 diabetes perceive participation in group-based self-management support. This is a qualitative focus group study using a semi-structured interview guide. Sixteen participants diagnosed with type 2 diabetes were included in the study. Individuals with and without group affiliations were mixed in three focus groups to trigger discussions. In the analysis, reoccurring themes of engagement and discussions between participants were focused within a theoretical frame of institutional logic. The focus groups are seen as social spaces where participants construct identity. Both participation and non-participation in group-based self-management support are associated with dealing with the stigma of having type 2 diabetes. Negotiations contribute to constructing an illness dignity as a response to the logic of moral responsibility for the disease. Contemporary policy contributes to societal understandings of individuals with type 2 diabetes as morally inadequate. Our study shows that group-based self-management support may counteract blame and contribute in negotiations of identity for individuals with type 2 diabetes. This mechanism makes participation in groups beneficial for some but stigma inducing for others. © 2016 The Authors. Health Expectations Published by John Wiley & Sons Ltd.

  19. Data management for the internet of things: design primitives and solution.

    PubMed

    Abu-Elkheir, Mervat; Hayajneh, Mohammad; Ali, Najah Abu

    2013-11-14

    The Internet of Things (IoT) is a networking paradigm where interconnected, smart objects continuously generate data and transmit it over the Internet. Much of the IoT initiatives are geared towards manufacturing low-cost and energy-efficient hardware for these objects, as well as the communication technologies that provide objects interconnectivity. However, the solutions to manage and utilize the massive volume of data produced by these objects are yet to mature. Traditional database management solutions fall short in satisfying the sophisticated application needs of an IoT network that has a truly global-scale. Current solutions for IoT data management address partial aspects of the IoT environment with special focus on sensor networks. In this paper, we survey the data management solutions that are proposed for IoT or subsystems of the IoT. We highlight the distinctive design primitives that we believe should be addressed in an IoT data management solution, and discuss how they are approached by the proposed solutions. We finally propose a data management framework for IoT that takes into consideration the discussed design elements and acts as a seed to a comprehensive IoT data management solution. The framework we propose adapts a federated, data- and sources-centric approach to link the diverse Things with their abundance of data to the potential applications and services that are envisioned for IoT.

  20. Data Management for the Internet of Things: Design Primitives and Solution

    PubMed Central

    Abu-Elkheir, Mervat; Hayajneh, Mohammad; Ali, Najah Abu

    2013-01-01

    The Internet of Things (IoT) is a networking paradigm where interconnected, smart objects continuously generate data and transmit it over the Internet. Much of the IoT initiatives are geared towards manufacturing low-cost and energy-efficient hardware for these objects, as well as the communication technologies that provide objects interconnectivity. However, the solutions to manage and utilize the massive volume of data produced by these objects are yet to mature. Traditional database management solutions fall short in satisfying the sophisticated application needs of an IoT network that has a truly global-scale. Current solutions for IoT data management address partial aspects of the IoT environment with special focus on sensor networks. In this paper, we survey the data management solutions that are proposed for IoT or subsystems of the IoT. We highlight the distinctive design primitives that we believe should be addressed in an IoT data management solution, and discuss how they are approached by the proposed solutions. We finally propose a data management framework for IoT that takes into consideration the discussed design elements and acts as a seed to a comprehensive IoT data management solution. The framework we propose adapts a federated, data- and sources-centric approach to link the diverse Things with their abundance of data to the potential applications and services that are envisioned for IoT. PMID:24240599

  1. [Present status of critical hemorrhage and its management in the operating room].

    PubMed

    Irita, Kazuo

    2014-12-01

    Hemorrhage is a major cause of cardiac arrest in the operating room. Many human factors, including surgical procedures, transfusion practices, blood supply, and anesthetic management, are involved in the process that leads to hemorrhage developing into a critical situation. It is desirable for hospital transfusion committees to prepare hospital-based regulations on 'actions to be taken to manage critical hemorrhage', and practice the implementation of these regulations with simulated drills. If intraoperative hemorrhage may become critical, a state of emergency should immediately be declared to the operating room staff, the blood transfusion service staff, and blood bank staff in order to organize a systematic approach to the ongoing problem and keep all responsible staff working outside the operating room informed of events developing in the room. To rapidly deal with critical hemorrhage, not only cooperation between anesthesiologists and surgeons but also linkage of operating rooms with blood transfusion services and a blood bank are important. When time is short, cross-matching tests are omitted, and ABO-identical red blood cells are used. When supplies of ABO-identical red blood cells are not available, ABO-compatible, non-identical red blood cells are used. Because a systematic, not individual, approach is required to prevent and manage critical hemorrhage, whether or not a hospital can establish a procedure to deal with it depends on the overall capability of critical and crisis management of the hospital. (Review).

  2. Key exchange using biometric identity based encryption for sharing encrypted data in cloud environment

    NASA Astrophysics Data System (ADS)

    Hassan, Waleed K.; Al-Assam, Hisham

    2017-05-01

    The main problem associated with using symmetric/ asymmetric keys is how to securely store and exchange the keys between the parties over open networks particularly in the open environment such as cloud computing. Public Key Infrastructure (PKI) have been providing a practical solution for session key exchange for loads of web services. The key limitation of PKI solution is not only the need for a trusted third partly (e.g. certificate authority) but also the absent link between data owner and the encryption keys. The latter is arguably more important where accessing data needs to be linked with identify of the owner. Currently available key exchange protocols depend on using trusted couriers or secure channels, which can be subject to man-in-the-middle attack and various other attacks. This paper proposes a new protocol for Key Exchange using Biometric Identity Based Encryption (KE-BIBE) that enables parties to securely exchange cryptographic keys even an adversary is monitoring the communication channel between the parties. The proposed protocol combines biometrics with IBE in order to provide a secure way to access symmetric keys based on the identity of the users in unsecure environment. In the KE-BIOBE protocol, the message is first encrypted by the data owner using a traditional symmetric key before migrating it to a cloud storage. The symmetric key is then encrypted using public biometrics of the users selected by data owner to decrypt the message based on Fuzzy Identity-Based Encryption. Only the selected users will be able to decrypt the message by providing a fresh sample of their biometric data. The paper argues that the proposed solution eliminates the needs for a key distribution centre in traditional cryptography. It will also give data owner the power of finegrained sharing of encrypted data by control who can access their data.

  3. Application of the enterprise management tools Lean Six Sigma and PMBOK in developing a program of research management.

    PubMed

    Hors, Cora; Goldberg, Anna Carla; Almeida, Ederson Haroldo Pereira de; Babio Júnior, Fernando Galan; Rizzo, Luiz Vicente

    2012-01-01

    Introduce a program for the management of scientific research in a General Hospital employing the business management tools Lean Six Sigma and PMBOK for project management in this area. The Lean Six Sigma methodology was used to improve the management of the institution's scientific research through a specific tool (DMAIC) for identification, implementation and posterior analysis based on PMBOK practices of the solutions found. We present our solutions for the management of institutional research projects at the Sociedade Beneficente Israelita Brasileira Albert Einstein. The solutions were classified into four headings: people, processes, systems and organizational culture. A preliminary analysis of these solutions showed them to be completely or partially compliant to the processes described in the PMBOK Guide. In this post facto study, we verified that the solutions drawn from a project using Lean Six Sigma methodology and based on PMBOK enabled the improvement of our processes dealing with the management of scientific research carried out in the institution and constitutes a model to contribute to the search of innovative science management solutions by other institutions dealing with scientific research in Brazil.

  4. Alternative Framings, Countervailing Visions: Locating the "P" in Professional Identity Formation.

    PubMed

    Hafferty, Frederic W; Michalec, Barret; Martimianakis, Maria Athina Tina; Tilburt, Jon C

    2016-02-01

    Professional identity formation in medical education is referenced increasingly as an object for educational reform. The authors introduce core concepts from two largely untapped literatures on identity and formation, contrasting framings on occupational preparation from within the organizational socialization literature with issues of socialization and professional acculturation from a military sciences perspective.The organizational sciences literature emphasizes socializing a workforce to "fit in," raising questions about how organization values might clash with core professional values concerning patient primary and social justice. The military literature, in turn, advances the notions of professional identity as a collective property, and that a particular social other (the public) must participate in shaping the group's identity as a profession.The authors extrapolate from these reviews that the training of physicians-as-professionals, and thus issues of socialization and identity formation, require intentionality and specificity around these contrasting issues. In turn, they argue that medical educators must attend to socializing trainees to a professional group identity while at the same time producing health care professionals who retain the capacity to resist the bureaucratic application of standardized solutions to contemporary problems. Educators must thus strive to identify the skills, knowledge, and attitudes necessary that will allow physicians-qua-professionals to function as a quasi-subversive work force and to disrupt the very system that helped to shape their identity, so that they may fulfill their mission to their patients.

  5. Effects of the TCARE® intervention on caregiver burden and depressive symptoms: preliminary findings from a randomized controlled study.

    PubMed

    Montgomery, Rhonda J V; Kwak, Jung; Kosloski, Karl; O'Connell Valuch, Katharine

    2011-09-01

    We examined the effects of a manualized care management protocol specifically designed for care managers working with caregivers, the Tailored Caregiver Assessment and Referral® (TCARE®) protocol, on caregiver identity discrepancy, burden, and depressive symptoms. Preliminary data from a longitudinal, randomized, controlled intervention study with 266 family caregivers served by 52 care managers in 4 states were analyzed using repeated measures random effects regression procedures. Caregivers in the intervention and control groups were repeatedly assessed for up to 9 months on caregiver identity discrepancy, 3 areas of caregiving burden-objective, relationship, and stress burdens; depression; and intention for nursing home placement. We found significant group by time interaction effects for caregiver identity discrepancy, relationship burden, stress burden, depression, and intention for nursing home placement. Caregivers in the intervention group experienced significant improvement on these measures, whereas caregivers in the control group worsened on these measures over time. The preliminary findings provide strong support for effectiveness of the TCARE® protocol on improving caregiver well-being and mental health outcomes.

  6. Effects of the TCARE® Intervention on Caregiver Burden and Depressive Symptoms: Preliminary Findings From a Randomized Controlled Study

    PubMed Central

    Kwak, Jung; Kosloski, Karl; O’Connell Valuch, Katharine

    2011-01-01

    Objectives. We examined the effects of a manualized care management protocol specifically designed for care managers working with caregivers, the Tailored Caregiver Assessment and Referral® (TCARE®) protocol, on caregiver identity discrepancy, burden, and depressive symptoms. Methods. Preliminary data from a longitudinal, randomized, controlled intervention study with 266 family caregivers served by 52 care managers in 4 states were analyzed using repeated measures random effects regression procedures. Caregivers in the intervention and control groups were repeatedly assessed for up to 9 months on caregiver identity discrepancy, 3 areas of caregiving burden—objective, relationship, and stress burdens; depression; and intention for nursing home placement. Results. We found significant group by time interaction effects for caregiver identity discrepancy, relationship burden, stress burden, depression, and intention for nursing home placement. Caregivers in the intervention group experienced significant improvement on these measures, whereas caregivers in the control group worsened on these measures over time. Discussion. The preliminary findings provide strong support for effectiveness of the TCARE® protocol on improving caregiver well-being and mental health outcomes. PMID:21840840

  7. 41 CFR 105-8.170-5 - Notification to the Architectural and Transportation Barriers Compliance Board.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false Notification to the... Property Management Federal Property Management Regulations System (Continued) GENERAL SERVICES... agency shall not include in the report the identity of any complainant. ...

  8. 41 CFR 105-56.031 - Notice.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false Notice. 105-56.031 Section 105-56.031 Public Contracts and Property Management Federal Property Management Regulations System... the amount of offset taken; (ii) The identity of the creditor agency identified by the disbursing...

  9. 44 CFR 5.43 - Waiver or reduction of fees.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 44 Emergency Management and Assistance 1 2010-10-01 2010-10-01 false Waiver or reduction of fees. 5.43 Section 5.43 Emergency Management and Assistance FEDERAL EMERGENCY MANAGEMENT AGENCY... requester's and/or intended user's identity and qualifications, expertise in the subject area and ability...

  10. 24 CFR 242.1 - Definitions.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ...: Interlocking management or ownership, identity of interests among family members, shared facilities and... a person or entity that has the same or similar management, ownership, or principal employees as the..., management, or operation of the land or the improvements or are located on the land or in the improvements...

  11. 24 CFR 242.1 - Definitions.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ...: Interlocking management or ownership, identity of interests among family members, shared facilities and... a person or entity that has the same or similar management, ownership, or principal employees as the..., management, or operation of the land or the improvements or are located on the land or in the improvements...

  12. Crossing Borders: New Teachers Co-Constructing Professional Identity in Performative Times

    ERIC Educational Resources Information Center

    Wilkins, Chris; Busher, Hugh; Kakos, Michalis; Mohamed, Carmen; Smith, Joan

    2012-01-01

    This paper draws on a range of theoretical perspectives on the construction of new teachers' professional identity. It focuses particularly on the impact of the development in many national education systems of a performative culture of the management and regulation of teachers' work. Whilst the role of interactions with professional colleagues…

  13. The Reluctant Academic: Early-Career Academics in a Teaching-Orientated University

    ERIC Educational Resources Information Center

    Gale, Helen

    2011-01-01

    This paper is based on research into academic identities amongst early-career academics in a UK post-1992, teaching-orientated university. Literature around academic identity suggests five major academic roles: teaching, research, management, writing and networking. However, this appears to be a picture of an established mid-career academic in a…

  14. 21 CFR 1311.105 - Requirements for obtaining an authentication credential-Individual practitioners.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... Technology Strategy/Division of Identity Management to conduct identity proofing that meets the requirements....08. (2) For digital certificates, a certification authority that is cross-certified with the Federal... authentication credential using two channels (e.g., e-mail, mail, or telephone call). If one of the factors used...

  15. Texts of Our Institutional Lives: Performing the Rhetorical Freak Show--Disability, Student Writing, and College Admissions

    ERIC Educational Resources Information Center

    Vidali, Amy

    2007-01-01

    In this article, the author explores the confluence of discourses surrounding disability, identity, and institutional writing to better understand the rhetorical politics of disability. She argues that a fresh theoretical frame is needed to understand the ways in which students rhetorically manage "risky" bodily identities, particularly in…

  16. Microsatellite fingerprinting in the International Cocoa Genebank, Trinidad: Accession and plot homogeneity information for germplasm management

    USDA-ARS?s Scientific Manuscript database

    The International Cocoa Genebank, Trinidad (ICG,T) is the largest public domain field gene bank collection of cacao and the correct identity of each tree is crucial for germplasm movement, evaluation and phenotypic characterization. Nine microsatellite loci were used to assess the identity of 1480 t...

  17. Harvesting influences functional identity and diversity over time in forests of the northeastern U.S.A.

    Treesearch

    M.T. Curzon; A.W. D' Amato; S. Fraver; B.J. Palik; A. Bottero; J.R. Foster; K.E. Gleason

    2017-01-01

    Concern over global environmental change and associated uncertainty has given rise to greater emphasis on fostering resilience through forest management. We examined the impact of standard silvicultural systems (including clearcutting, shelterwood, and selection) compared with unharvested controls on tree functional identity and functional diversity in three forest...

  18. 30 CFR 280.52 - When geophysical data and information are obtained by a third party, what must we both do?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... MANAGEMENT SERVICE, DEPARTMENT OF THE INTERIOR OFFSHORE PROSPECTING FOR MINERALS OTHER THAN OIL, GAS, AND... other agreements, including the identity of the recipient of the data and information; or (d) For... identity of the recipient of the data and information. Reimbursement ...

  19. 30 CFR 280.70 - What data and information will be protected from public disclosure?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... from public disclosure? 280.70 Section 280.70 Mineral Resources MINERALS MANAGEMENT SERVICE, DEPARTMENT... keep confidential the identity of third-party recipients of data and information collected under a permit. We will not release the identity unless you and the third parties agree to the disclosure. (3...

  20. Lesbian Teachers' Identity, Power and the Public/Private Boundary

    ERIC Educational Resources Information Center

    Rudoe, Naomi

    2010-01-01

    This article examines lesbian teachers' negotiation of the public/private boundary in the school, focusing on identity management in the context of the heterosexualised space of this public institution. The study is based on interviews conducted with six lesbian teachers working in London secondary schools. I examine the teachers' responses, and…

  1. 22 CFR 201.32 - Suppliers of delivery services.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... Financial Management, USAID, Washington, DC 20523-7792, all adjustments in the purchase price in favor of..., flight or inland carrier run number), date of the bill(s) of lading, the identity and address of the assured, and the identity and address of the assignee of the assured to whom payment has actually been...

  2. 77 FR 39317 - 30-Day Notice of Proposed Information Collection, DS-5520, Supplemental Questionnaire to...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-07-02

    ..., Supplemental Questionnaire to Determine Identity for a U.S. Passport, 1405-XXXX ACTION: Notice of request for... Collection: Supplemental Questionnaire to Determine Identity for a U.S. Passport. OMB Control Number: None... of Consular Affairs, Passport Services, Office of Project Management and Operational Support, Program...

  3. "Would I Hire Me?" Examining the Presence of Students' Online Past

    ERIC Educational Resources Information Center

    Crook, Brittani; Pastorek, Angie

    2015-01-01

    Managing one's online identity, with a focus on constructing a "professional" identity, is of paramount importance for college students (Back et al., 2010; Cheney & Ashcraft, 2007; Metzger, Flanagin, & Medders, 2010). This is because employers often search for potential candidates online before they choose to interview them…

  4. Special Education at the Crossroad: An Identity Crisis and the Need for a Scientific Reconstruction

    ERIC Educational Resources Information Center

    Kauffman, James M.; Anastasiou, Dimitris; Maag, John W.

    2017-01-01

    Special education is losing its identity--its visibility, distinctiveness, budget, and basic functions are all at risk. Special education functions include (a) sorting, categorizing, and labeling students who need it; (b) making the right comparisons; (c) honoring diversity but changing "particular" differences; (d) managing stigma; (e)…

  5. Full-Time, Part-Time Full-Time, and Part-Time Fathers: Father Identities Following Divorce

    ERIC Educational Resources Information Center

    Troilo, Jessica; Coleman, Marilyn

    2012-01-01

    This grounded theory study examined how 20 newly divorced, nonresidential fathers manage their fatherhood identities. The theory created from this study proposes that fathers' perceptions of (a) father-child relationships, (b) how their children's fiscal needs are met, and (c) barriers to their physical interactions with their children influence…

  6. Intersections and Translocations: New Paradigms for Thinking about Cultural Diversity and Social Identities

    ERIC Educational Resources Information Center

    Anthias, Floya

    2011-01-01

    This article reflects on the concepts of cultural diversity, belonging and identity which inform important debates for managing "difference" in contemporary European societies. These address issues relating to transnational migration, ethnic diversity and racialisation in a range of social contexts. The article also reflects on the concept of…

  7. Relational identity theory: a systematic approach for transforming the emotional dimension of conflict.

    PubMed

    Shapiro, Daniel L

    2010-10-01

    Emotions are a vital dimension in conflicts among nation-states and communities affiliated by common ethnic, economic, or political interests. Yet the individuals most responsible for managing such conflicts--heads of state, CEOs, intellectual or religious leaders--are often blind to the psychological forces affecting their interests. During 20 years of international research, consulting, and teaching, I have developed a program for teaching thought leaders how to apply psychological principles to achieve their aims while also reducing negative outcomes such as violence, social upheaval, and economic displacement. In this article, I present relational identity theory (RIT), a theoretical and intellectual framework I have originated to help people understand and deal with key emotional dimensions of conflict management. I argue that national and communal bonds are essentially tribal in nature, and I describe how a tribe's unaddressed relational identity concerns make it susceptible to what I term the tribes effect, a rigidification of its relational identity. I provide strategies based on RIT for mitigating the tribes effect and thus enhancing global security. (c) 2010 APA, all rights reserved

  8. National and Gender Measurement Invariance of the Utrecht-Management of Identity Commitments Scale (U-MICS): A 10-Nation Study With University Students.

    PubMed

    Crocetti, Elisabetta; Cieciuch, Jan; Gao, Cheng-Hai; Klimstra, Theo; Lin, Ching-Ling; Matos, Paula Mena; Morsünbül, Ümit; Negru, Oana; Sugimura, Kazumi; Zimmermann, Grégoire; Meeus, Wim

    2015-12-01

    The purpose of this study was to examine the psychometric properties of the Utrecht-Management of Identity Commitments Scale (U-MICS), a self-report measure aimed at assessing identity processes of commitment, in-depth exploration, and reconsideration of commitment. We tested its factor structure in university students from a large array of cultural contexts, including 10 nations located in Europe (i.e., Italy, the Netherlands, Poland, Portugal, Romania, and Switzerland), Middle East (i.e., Turkey), and Asia (i.e., China, Japan, and Taiwan). Furthermore, we tested national and gender measurement invariance. Participants were 6,118 (63.2% females) university students aged from 18 to 25 years (Mage = 20.91 years). Results indicated that the three-factor structure of the U-MICS fitted well in the total sample, in each national group, and in gender groups. Furthermore, national and gender measurement invariance were established. Thus, the U-MICS can be fruitfully applied to study identity in university students from various Western and non-Western contexts. © The Author(s) 2015.

  9. Cultural Sensitivity and Challenges in Management of the Transgender Patient With ESRD in Transplantation.

    PubMed

    Hoch, Deborah Ann; Bulman, Maya; McMahon, Dorn W

    2016-03-01

    Transgender patients with end-stage renal disease (ESRD) present with specific challenges during the transplant evaluation, perioperative management, and postoperative phase of care. Demographic information, health-care records, chosen name, and gender identity along with documentation of specific health-care needs can become a challenge when gender assigned at birth is incongruent with the patients gender identity. Medical care involves addressing the end-organ disease as well as addressing those aspects of care specific to the transgender patient. This review article provides information on defining transgender, the impact of ESRD, and transgender in the transplant process and considerations in the throughout phases of care. Current recommendations for management of this unique population are provided. © 2016, NATCO.

  10. Effects of Place Identity, Place Dependence, and Experience-Use History on Perceptions of Recreation Impacts in a Natural Setting

    NASA Astrophysics Data System (ADS)

    White, Dave D.; Virden, Randy J.; van Riper, Carena J.

    2008-10-01

    It is generally accepted that recreation use in natural environments results in some degree of negative social and environmental impact. Environmental managers are tasked with mitigating the impact while providing beneficial recreation opportunities. Research on the factors that influence visitors’ perceptions of environmental and social conditions is necessary to inform sound environmental management of protected natural areas. This study examines the effect of prior experience with the setting and two dimensions of place attachment (i.e., place identity and place dependence) on visitors’ perceptions of three types of recreation impacts (i.e., depreciative behavior, environmental impacts, and recreation conflict). Principal components analysis, confirmatory factor analysis, and structural equation modeling were used to test the study hypotheses using data collected from 351 visitors through on-site questionnaires (response rate of 93 percent). The results show that prior experience exhibited a moderate and significant direct positive effect on place identity, place dependence, and visitors’ perceptions of recreation impacts. Contrary to study hypotheses and prior research, neither place dependence nor place identity exhibited a significant effect on the dependent variables. The results show that prior experience causes visitors to be more sensitive to depreciative behaviors, environmental impacts, and recreation conflict. These findings raise concerns over potential visitor displacement and deterioration of site conditions. Implications for resource managers are discussed, which include education, modifying visitor use patterns, and site design strategies.

  11. Effects of place identity, place dependence, and experience-use history on perceptions of recreation impacts in a natural setting.

    PubMed

    White, Dave D; Virden, Randy J; van Riper, Carena J

    2008-10-01

    It is generally accepted that recreation use in natural environments results in some degree of negative social and environmental impact. Environmental managers are tasked with mitigating the impact while providing beneficial recreation opportunities. Research on the factors that influence visitors' perceptions of environmental and social conditions is necessary to inform sound environmental management of protected natural areas. This study examines the effect of prior experience with the setting and two dimensions of place attachment (i.e., place identity and place dependence) on visitors' perceptions of three types of recreation impacts (i.e., depreciative behavior, environmental impacts, and recreation conflict). Principal components analysis, confirmatory factor analysis, and structural equation modeling were used to test the study hypotheses using data collected from 351 visitors through on-site questionnaires (response rate of 93 percent). The results show that prior experience exhibited a moderate and significant direct positive effect on place identity, place dependence, and visitors' perceptions of recreation impacts. Contrary to study hypotheses and prior research, neither place dependence nor place identity exhibited a significant effect on the dependent variables. The results show that prior experience causes visitors to be more sensitive to depreciative behaviors, environmental impacts, and recreation conflict. These findings raise concerns over potential visitor displacement and deterioration of site conditions. Implications for resource managers are discussed, which include education, modifying visitor use patterns, and site design strategies.

  12. Multiple bubbles in a Hele-Shaw cell

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Vasconcelos, G.L.

    A new class of exact solutions is reported for an infinite stream of identical groups of bubbles moving with a constant velocity [ital U] in a Hele-Shaw cell when surface tension is neglected. It is suggested that the existence of these solutions might explain some of the complex behavior observed in recent experiments on rising bubbles in a Hele-Shaw cell. Solutions for a finite number of bubbles in a channel are also obtained. In this case, it is shown that solutions with an arbitrary bubble velocity [ital U][gt][ital V], where [ital V] is the fluid velocity at infinity, can inmore » general be obtained from a simple transformation of the solutions for [ital U]=2[ital V].« less

  13. Management Development in the NHS: Nurses and Managers, Discourses and Identities

    ERIC Educational Resources Information Center

    Sambrook, Sally

    2006-01-01

    Purpose: Aims to provide a brief discussion of discourses of HRD, then a brief review of HRD within the NHS, including stakeholders in HRD, and particularly management development. To explore some of the different discourses used by different managers, particularly those with a nursing background and those without, and the possible reasons for the…

  14. Multiple use management preferences by visitors with differing leisure identity salience

    Treesearch

    Ingrid E. Schneider; Patricia B. Winter

    1998-01-01

    Multiple use area management is of particular interest to both outdoor and urban planners due to an increase in and diversity of users. These areas pose special management challenges due to the diverse and potential conflicting interests involved. Diverse users are frequently excluded from management decisions, however. Further, when visitor input is solicited, it is...

  15. The effects of moral judgment and moral identity on moral behavior: an empirical examination of the moral individual.

    PubMed

    Reynolds, Scott J; Ceranic, Tara L

    2007-11-01

    Recognizing limitations in classic cognitive moral development theory, several scholars have drawn from theories of identity to suggest that moral behavior results from both moral judgments and moral identity. The authors conducted 2 survey-based studies with more than 500 students and managers to test this argument. Results demonstrated that moral identity and moral judgments both independently influenced moral behavior. In addition, in situations in which social consensus regarding the moral behavior was not high, moral judgments and moral identity interacted to shape moral behavior. This interaction effect indicated that those who viewed themselves as moral individuals pursued the most extreme alternatives (e.g., never cheating, regularly cheating)--a finding that affirms the motivational power of a moral identity. The authors conclude by considering the implications of this research for both theory and practice. (c) 2007 APA

  16. Friction-term response to boundary-condition type in flow models

    USGS Publications Warehouse

    Schaffranek, R.W.; Lai, C.

    1996-01-01

    The friction-slope term in the unsteady open-channel flow equations is examined using two numerical models based on different formulations of the governing equations and employing different solution methods. The purposes of the study are to analyze, evaluate, and demonstrate the behavior of the term in a set of controlled numerical experiments using varied types and combinations of boundary conditions. Results of numerical experiments illustrate that a given model can respond inconsistently for the identical resistance-coefficient value under different types and combinations of boundary conditions. Findings also demonstrate that two models employing different dependent variables and solution methods can respond similarly for the identical resistance-coefficient value under similar types and combinations of boundary conditions. Discussion of qualitative considerations and quantitative experimental results provides insight into the proper treatment, evaluation, and significance of the friction-slope term, thereby offering practical guidelines for model implementation and calibration.

  17. Two-target game model of an air combat with fire-and-forget all-aspect missiles

    NASA Technical Reports Server (NTRS)

    Davidovitz, A.; Shinar, J.

    1989-01-01

    An air combat duel between similar aggressive fighter aircraft, both equipped with the same type of guided missiles, is formulated as a two-target differential game using the dynamic model of the game of two identical cars. Each of the identical target sets represents the effective firing envelope of an all-aspect fire-and-forget air-to-air missile. The firing range limits depend on the target aspect angle and are approximated by analytical functions. The maximum range, computed by taking into account the optimal missile avoidance maneuver of the target, determines the no-escape firing envelope. The solution consists of the decomposition of the game space into four regions: the respective winning zones of the two opponents, the draw zone, and the region where the game terminates by a mutual kill. The solution provides a new insight for future air combat analysis.

  18. Gender identity, gender assignment and reassignment in individuals with disorders of sex development: a major of dilemma.

    PubMed

    Fisher, A D; Ristori, J; Fanni, E; Castellini, G; Forti, G; Maggi, M

    2016-11-01

    Disorders of Sex Development (DSD) are a wide range of congenital conditions characterized by an incongruence of components involved in sexual differentiation, including gender psychosexual development. The management of such disorders is complex, and one of the most crucial decision is represented by gender assignment. In fact, the primary goal in DSD is to have a gender assignment consistent with the underlying gender identity in order to prevent the distress related to a forthcoming Gender Dysphoria. Historically, gender assignment was based essentially on surgical outcomes, assuming the neutrality of gender identity at birth. This policy has been challenged in the past decade refocusing on the importance of prenatal and postnatal hormonal and genetic influences on psychosexual development. (1) to update the main psychological and medical issues that surround DSD, in particular regarding gender identity and gender assignment; (2) to report specific clinical recommendations according to the different diagnosis. A systematic search of published evidence was performed using Medline (from 1972 to March 2016). Review of the relevant literature and recommendations was based on authors' expertise. A review of gender identity and assignment in DSD is provided as well as clinical recommendations for the management of individuals with DSD. Given the complexity of this management, DSD individuals and their families need to be supported by a specialized multidisciplinary team, which has been universally recognized as the best practice for intersexual conditions. In case of juvenile GD in DSD, the prescription of gonadotropin-releasing hormone analogues, following the World Professional Association for Transgender Health and the Endocrine Society guidelines, should be considered. It should always be taken into account that every DSD person is unique and has to be treated with individualized care. In this perspective, international registries are crucial to improve the understanding of these challenging conditions and clinical practice, in providing a better prediction of gender identity.

  19. Identity Federation and Its Importance for NASA's Future: The SharePoint Extranet Pilot

    NASA Technical Reports Server (NTRS)

    Baturin, Rebecca R.

    2013-01-01

    My project at Kennedy Space Center (KSC) during the spring 2013 Project Management and Systems Engineering Internship was to functionalJy test and deploy the SharePoint Extranet system and ensure successful completion of the project's various lifecycle milestones as described by NASA Procedural Requirement (NPR) 7 120.7. I worked alongside NASA Project Managers, Systems Integration Engineers, and Information Technology (IT) Professionals to pilot this collaboration capability between NASA and its External Partners. The use of identity federation allows NASA to leverage externally-issued credentials of other federal agencies and private aerospace and defense companies, versus the traditional process of granting and maintaining full NASA identities for these individuals. This is the first system of its kind at NASA and it will serve as a pilot for the Federal Government. Recognizing the novelty of this service, NASA's initial approach for deployment included a pilot period where nearby employees of Patrick Air Force Base would assist in testing and deployment. By utilizing a credential registration process, Air Force users mapped their Air Force-issued Common Access Cards (CAC) to a NASA identity for access to the External SharePoint. Once the Air Force stands up an Active Directory Federation Services (ADFS) instance within their Data Center and establishes a direct trust with NASA, true identity federation can be established. The next partner NASA is targeting for collaboration is Lockheed Martin (LMCO), since they collaborate frequently for the ORION Program. Through the use of Exostar as an identity hub, LMCO employees will be able to access NASA data on a need to know basis, with NASA ultimately managing access. In a time when every dollar and resource is being scrutinized, this capability is an exciting new way for NASA to continue its collaboration efforts in a cost and resource effective manner.

  20. Organization aesthetics in nursing homes.

    PubMed

    Hujala, Anneli; Rissanen, Sari

    2011-05-01

    The aim of this study was to make visible the material dimensions of nursing management.   Management theories have mainly ignored the material dimensions, namely the physical spaces in which management actually takes place as well as the physical bodies of organization members. The perspective of organization aesthetics enhances our understanding of the role of materiality in nursing management. The data were collected in 2009 using observation and interviews in eight nursing homes. Qualitative content analysis with critical interpretations was used. Three main issues of organizational aesthetics related to nursing management were identified: (1) the functionality of working spaces and equipment; (2) the relevance of 'organizational' space; and (3) the emotional-aesthetic dimension of daily work. Materiality is closely related to management topics, such as decision-making, values and identity formation of organizational members. Aesthetic dimensions of care are constructed by management practices which, in their turn, influence the nature of management. Implications for nursing management  Nurse managers need to be aware of the unintended and unnoticed consequences of materiality and aesthetics. Space and body issues may have considerable effects, for example, on the identity of care workers and on the attractiveness of the care branch. © 2011 The Authors. Journal compilation © 2011 Blackwell Publishing Ltd.

  1. CNAs Making Meaning of Direct Care

    PubMed Central

    Pfefferle, Susan G.; Weinberg, Dana Beth

    2009-01-01

    Using qualitative data from 87 focus groups with CNAs in 16 nursing homes in Massachusetts, this study explores ways CNAs make meaning of their work despite devaluations such as lack of respect from management and residents, and the physical and emotional demands of such low status work. CNAs' meaning-making represents an effort to assert a positive identity rather than accept the stigmatization associated with their work. Assertions of the value help CNAs reconstitute their identities. Assertions of meaning, which depend upon providing good care to residents regardless of financial reward or management respect and support, make CNAs vulnerable to exploitation. PMID:18552321

  2. An Efficient Identity-Based Key Management Scheme for Wireless Sensor Networks Using the Bloom Filter

    PubMed Central

    Qin, Zhongyuan; Zhang, Xinshuai; Feng, Kerong; Zhang, Qunfang; Huang, Jie

    2014-01-01

    With the rapid development and widespread adoption of wireless sensor networks (WSNs), security has become an increasingly prominent problem. How to establish a session key in node communication is a challenging task for WSNs. Considering the limitations in WSNs, such as low computing capacity, small memory, power supply limitations and price, we propose an efficient identity-based key management (IBKM) scheme, which exploits the Bloom filter to authenticate the communication sensor node with storage efficiency. The security analysis shows that IBKM can prevent several attacks effectively with acceptable computation and communication overhead. PMID:25264955

  3. 78 FR 18534 - Transportation Worker Identification Credential (TWIC)-Reader Requirements

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-27

    ... Security Administration (TSA) established the TWIC program to address identity management shortcomings and... http://www.regulations.gov on or before May 21, 2013, or reach the Docket Management Facility by that...) Mail: Docket Management Facility (M-30), U.S. Department of Transportation, West Building Ground Floor...

  4. 29 CFR 452.14 - Newly formed or merged labor organizations.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 452.14 Labor Regulations Relating to Labor OFFICE OF LABOR-MANAGEMENT STANDARDS, DEPARTMENT OF LABOR LABOR-MANAGEMENT STANDARDS GENERAL STATEMENT CONCERNING THE ELECTION PROVISIONS OF THE LABOR-MANAGEMENT... identity the terms of its officers may not be extended beyond the maximum period specified by the Act for...

  5. 29 CFR 405.4 - Terminal report.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Relating to Labor OFFICE OF LABOR-MANAGEMENT STANDARDS, DEPARTMENT OF LABOR LABOR-MANAGEMENT STANDARDS... of this part, who during its fiscal year loses its identity as a reporting employer through merger... employer report, and one copy, with the Office of Labor-Management Standards on Form LM-10 signed by the...

  6. 78 FR 20558 - Transportation Worker Identification Credential (TWIC)-Reader Requirements

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-05

    ... TWIC program to address identity management shortcomings and vulnerabilities identified in the nation's... docket via http://www.regulations.gov on or before May 21, 2013, or reach the Docket Management Facility... Management Facility (M-30), U.S. Department of Transportation, West Building Ground Floor, Room W12-140, 1200...

  7. 78 FR 20289 - Transportation Worker Identification Credential (TWIC)-Reader Requirements

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-04

    ... TWIC program to address identity management shortcomings and vulnerabilities identified in the nation's... docket via http://www.regulations.gov on or before May 21, 2013, or reach the Docket Management Facility... Management Facility (M-30), U.S. Department of Transportation, West Building Ground Floor, Room W12-140, 1200...

  8. 41 CFR 105-56.021 - Notice.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false Notice. 105-56.021 Section 105-56.021 Public Contracts and Property Management Federal Property Management Regulations System... description of the payment and the amount of offset taken; (ii) The identity of GSA as the creditor agency...

  9. 78 FR 22218 - Transportation Worker Identification Credential (TWIC)-Reader Requirements

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-15

    ... TWIC program to address identity management shortcomings and vulnerabilities identified in the nation's... docket via http://www.regulations.gov on or before May 21, 2013, or reach the Docket Management Facility... Management Facility (M-30), U.S. Department of Transportation, West Building Ground Floor, Room W12-140, 1200...

  10. 44 CFR 73.3 - Denial of flood insurance coverage.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 44 Emergency Management and Assistance 1 2010-10-01 2010-10-01 false Denial of flood insurance coverage. 73.3 Section 73.3 Emergency Management and Assistance FEDERAL EMERGENCY MANAGEMENT AGENCY... sufficient to confirm its identity and location; (2) A clear and unequivocal declaration that the property is...

  11. Double-Wronskian solitons and rogue waves for the inhomogeneous nonlinear Schrödinger equation in an inhomogeneous plasma

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Sun, Wen-Rong; Tian, Bo, E-mail: tian_bupt@163.com; Jiang, Yan

    2014-04-15

    Plasmas are the main constituent of the Universe and the cause of a vast variety of astrophysical, space and terrestrial phenomena. The inhomogeneous nonlinear Schrödinger equation is hereby investigated, which describes the propagation of an electron plasma wave packet with a large wavelength and small amplitude in a medium with a parabolic density and constant interactional damping. By virtue of the double Wronskian identities, the equation is proved to possess the double-Wronskian soliton solutions. Analytic one- and two-soliton solutions are discussed. Amplitude and velocity of the soliton are related to the damping coefficient. Asymptotic analysis is applied for us tomore » investigate the interaction between the two solitons. Overtaking interaction, head-on interaction and bound state of the two solitons are given. From the non-zero potential Lax pair, the first- and second-order rogue-wave solutions are constructed via a generalized Darboux transformation, and influence of the linear and parabolic density profiles on the background density and amplitude of the rogue wave is discussed. -- Highlights: •Double-Wronskian soliton solutions are obtained and proof is finished by virtue of some double Wronskian identities. •Asymptotic analysis is applied for us to investigate the interaction between the two solitons. •First- and second-order rogue-wave solutions are constructed via a generalized Darboux transformation. •Influence of the linear and parabolic density profiles on the background density and amplitude of the rogue wave is discussed.« less

  12. Multiscale Modeling of Hall Thrusters. Chapter 7: Plume Modeling

    DTIC Science & Technology

    2012-03-06

    Quasineutral Potential Fix Finally, a ”quasi-neutral” switch has been implemented in the Draco Gauss - Seidel Solver. Implementation in the PCG solver is...unlimited. 4 (a) (b) Figure 7.2: Potential solution obtained for a single and multiple (16) zones Hence, part of the development effort went into...be seen from this plot, the two solutions are identical. The division of mesh into multiple zones had another benefit for parallel compu- tations

  13. Reproductive autonomy, the non-identity problem, and the non-person problem.

    PubMed

    DiSilvestro, Russell

    2009-01-01

    The Non-Identity Problem is the problem of explaining the apparent wrongness of a decision that does not harm people, especially since some of the people affected by the decision would not exist at all were it not for the decision. One approach to this problem, in the context of reproductive decisions, is to focus on wronging, rather than harming, one's offspring. But a Non-Person Problem emerges for any view that claims (1) that only persons can be wronged and (2) that the person-making properties allow for there to be human non-persons. Consider an individual human organism that is prevented from ever possessing the person-making properties. On person-only accounts of the victims of wronging, this organism cannot be wronged by anyone. Hence even individuals whose decisions prevent it from ever possessing the person-making properties cannot wrong it. But this is counter-intuitive. We can think of examples where a human organism is wronged by precisely those decisions that prevent it from possessing the person-making properties. The best solution to this problem, in the case where the person-making property is rational self-governance in pursuit of a meaningful life, is to adjust the concept of a person so that it refers, not merely to those with the immediate capacity for rational self-governance in pursuit of a meaningful life, but also to those with a higher-order capacity for such self-governance. Any solution to the Non-Identity Problem that focuses on wronging rather than harming should incorporate this sort of solution to the Non-Person Problem.

  14. Collision of Identical Solitary Waves in Hertzian Chains

    NASA Astrophysics Data System (ADS)

    Sen, Surajit; Manciu, Marian; Hurd, Alan J.

    2000-03-01

    We consider a chain of elastic beads, which repel upon contact according to the non-linear Hertz potential. We further assume that the chain is under zero loading, i.e., the grains have zero initial overlap. We show via careful numerical solution of the equations of motion that an impulse propagates as a solitary wave and that the collision of identical solitary waves propagating in opposite directions along the chain spawns a hierarchy of multiple weak solitary waves [1]. [1] M. Manciu, S. Sen and A.J. Hurd, Phys Lett A (submitted).

  15. Identical Collision Terms/Solutions of Kinetic Eqn. and Explanation of Damping of Waves in Plasmas and Solids Known by Different Names

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Sharma, S. K.

    2010-11-23

    In this paper we show that identical collision terms are known by different names in gaseous plasmas and solids. Method used by plasma physicists and the one used by solid state physicists to solve Kinetic equation are also exactly same but they are also known by different names. In fact the physical explanation of damping of plasma Waves given by plasma physicists is quite similar to that given by solid state physicists to explain the absorption of acoustic waves in solids.

  16. Factors influencing the development and implementation of advanced radiographer practice in Australia – a qualitative study using an interpretative phenomenological approach

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Page, Barbara A, E-mail: barbpage09@gmail.com; Bernoth, Maree; Davidson, Rob

    2014-09-15

    The purpose of this study was to explore the factors influencing the implementation or the lack of implementation of advanced practitioner role in Australia. This study uses an interpretative phenomenological approach to explore the in-depth real life issues, which surround the advanced practitioner as a solution to radiologist workforce shortages in Australia. Research participants are radiographers, radiation therapists and health managers registered with the Australian Institute of Radiography (AIR) and holding senior professional and AIR Board positions with knowledge of current advanced practice. In total, seven interviews were conducted revealing education, governance, technical, people issues, change management, government, costs andmore » timing as critical factors influencing advanced practice in Australia. Seven participants in this study perceived an advanced practice role might have major benefits and a positive impact on the immediate and long-term management of patients. Another finding is the greater respect and appreciation of each other's roles and expertise within the multidisciplinary healthcare team. Engagement is required of the critical stakeholders that have been identified as ‘blockers’ (radiologists, health departments) as well as identified allies (e.g. emergency clinicians, supportive radiologists, patient advocacy groups). The research supports that the AIR has a role to play for the professional identity of radiographers and shaping the advanced practice role in Australia.« less

  17. Analysis of Docudrama Techniques and Negotiating One's Identity in David Edgar's "Pentecost"

    ERIC Educational Resources Information Center

    Al Sharadgeh, Samer Ziyad

    2018-01-01

    Edgar manages to invert the subordinate function of generally accepted objective indicators of membership of a particular national group--language, religion, common history, and territory--into the essential mode of imperative distinction shaping the unique national identity. In other words, it is the fresco and the value assigned to it that…

  18. Nonimmigrant Overstays: Brief Synthesis of the Issue

    DTIC Science & Technology

    2010-01-15

    finger biometric system for immigration identification17 to the major identity management and screening... finger scans and digital photographs) to check identity. Enhanced Border Security and Visa Entry Reform Act of 2002 The Enhanced Border Security ...further provides: “A determination by the Secretary of Homeland Security that an alien who applied for authorization to travel to the United States

  19. Silence, Words that Wound and Sexual Identity: A Conversation with Applebaum

    ERIC Educational Resources Information Center

    Jackson, Liz

    2008-01-01

    In this paper, I continue a conversation initiated by Barbara Applebaum on how to manage irreconcilable difference, harmful language or "words that wound" and various implications of power in the classroom. Referencing emerging works on the nature of speech and silence, classroom power and queer identity, I pose three questions to Applebaum in…

  20. Identity Strategies in Light of a Low-Prestige Occupation: The Case of Retail Apprentices

    ERIC Educational Resources Information Center

    Duemmler, Kerstin; Caprani, Isabelle

    2017-01-01

    Occupations differ in their prestige, but little research has examined how workers manage working in a low-prestige occupation. This case study with retail-clerk apprentices in Switzerland uncovers the identity strategies the apprentices employ to help them normalise the situation they find themselves in: they are learning an occupation that is…

  1. Managing Digital Identity on Twitter: The Case of School Administrators

    ERIC Educational Resources Information Center

    Cho, Vincent; Jimerson, Jo Beth

    2017-01-01

    What does it mean to be and to act like a school leader online? Although many school leaders might be comfortable navigating issues of identity in face-to-face environments, online environments may present new and unprecedented challenges. These challenges may range from concerns about privacy and surveillance to questions about how best to…

  2. The Presentation of Self in Scholarly Life: Identity and Marginalization in Academic Homepages

    ERIC Educational Resources Information Center

    Hyland, Ken

    2011-01-01

    The academic homepage is now a ubiquitous genre of scholarly life, but despite considerable interest in issues of identity and the ways individuals self-consciously manage the impression they give of themselves, it has been slow to attract the attention of ESP researchers. This may be because of the institutional control exercised by employing…

  3. Disturbance decoupling, decentralized control and the Riccati equation

    NASA Technical Reports Server (NTRS)

    Garzia, M. R.; Loparo, K. A.; Martin, C. F.

    1981-01-01

    The disturbance decoupling and optimal decentralized control problems are looked at using identical mathematical techniques. A statement of the problems and the development of their solution approach is presented. Preliminary results are given for the optimal decentralized control problem.

  4. SuperIdentity: Fusion of Identity across Real and Cyber Domains

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Black, Sue; Creese, Sadie; Guest, Richard

    Under both benign and malign circumstances, people now manage a spectrum of identities across both real-world and cyber domains. Our belief, however, is that all these instances ultimately track back for an individual to reflect a single 'SuperIdentity'. This paper outlines the assumptions underpinning the SuperIdentity Project, describing the innovative use of data fusion to incorporate novel real-world and cyber cues into a rich framework appropriate for modern identity. The proposed combinatorial model will support a robust identification or authentication decision, with confidence indexed both by the level of trust in data provenance, and the diagnosticity of the identity factorsmore » being used. Additionally, the exploration of correlations between factors may underpin the more intelligent use of identity information so that known information may be used to predict previously hidden information. With modern living supporting the 'distribution of identity' across real and cyber domains, and with criminal elements operating in increasingly sophisticated ways in the hinterland between the two, this approach is suggested as a way forwards, and is discussed in terms of its impact on privacy, security, and the detection of threat.« less

  5. Providing solid angle formalism for skyshine calculations.

    PubMed

    Gossman, Michael S; Pahikkala, A Jussi; Rising, Mary B; McGinley, Patton H

    2010-08-17

    We detail, derive and correct the technical use of the solid angle variable identified in formal guidance that relates skyshine calculations to dose-equivalent rate. We further recommend it for use with all National Council on Radiation Protection and Measurements (NCRP), Institute of Physics and Engineering in Medicine (IPEM) and similar reports documented. In general, for beams of identical width which have different resulting areas, within ± 1.0 % maximum deviation the analytical pyramidal solution is 1.27 times greater than a misapplied analytical conical solution through all field sizes up to 40 × 40 cm². Therefore, we recommend determining the exact results with the analytical pyramidal solution for square beams and the analytical conical solution for circular beams.

  6. 77 FR 31643 - Siltronic Corporation FAB1 Plant Including On-Site Leased Workers From Express Temporaries...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-29

    ... Secure Solutions USA, SBM Management Services, LP, ALSCO Portland Industrial, VWR International, Inc... G4S Secure Solutions USA, SBM Management Services, LP, Alsco Portland Industrial, VWR International... workers from Express Temporaries, Aerotek Commercial Staffing, G4S Secure Solutions USA, SBM Management...

  7. 76 FR 25379 - Submission for Review; Extension of Existing Information Collection; OMB Control Number 3206-0248...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-04

    ... proposed information collection to the U.S. Office of Personnel Management, Human Resources Solutions... obtained by contacting the U.S. Office of Personnel Management, Human Resources Solutions, Administrative... Analysis Agency: Human Resources Solutions, U.S. Office of Personnel Management. Title: Application for...

  8. Solutions Network Formulation Report. The Potential Contributions of the Global Precipitation Measurement Mission to Estuary Management in Acadia National Park

    NASA Technical Reports Server (NTRS)

    Anderson, Daniel; Hilbert, Kent; Lewis, David

    2007-01-01

    This candidate solution suggests the use of GPM precipitation observations to enhance the Acadia National Park NLERDSS. Simulated GPM data should provide measurements that would enable analysis of how precipitation affects runoff and nutrient load in the park?s wetlands. This solution benefits society by aiding park and resource managers in making predictions based on hypothetical changes and in identifying effective mitigation scenarios. This solution supports the Coastal Management, Water Management, and Ecological Forecasting National Applications.

  9. An intervention for pulmonary rehabilitators to develop a social identity for patients attending exercise rehabilitation: a feasibility and pilot randomised control trial protocol.

    PubMed

    Levy, Andrew R; Matata, Bashir; Pilsworth, Sam; Mcgonigle, Adrian; Wigelsworth, Lyndsey; Jones, Linda; Pott, Nicola; Bettany, Max; Midgley, Adrian W

    2018-01-01

    Chronic obstructive pulmonary disease (COPD) is a degenerative condition that can impair health-related quality of life (HRQoL). A number of self-management interventions, employing a variety of behavioural change techniques (BCTs), have been adopted to improve HRQoL for COPD patients. However, a lack of attention has been given to group management interventions with an emphasis on incorporating BCTs into rehabilitators' practice. This study aims to pilot and feasibly explore a social identity group management intervention, delivered by COPD rehabilitation staff to patients attending exercise pulmonary rehabilitation. Doing so will help inform the plausibility of the intervention before conducting a full trial to evaluate its effectiveness to improve HRQoL. This is a two-centre, randomised cross-over controlled trial. Two pulmonary rehabilitation centres based in the UK will be randomly allocated to two treatment arms (standard care and intervention). Outcome measurements relating to HRQoL and social identity will be completed pre- and post-exercise rehabilitation. Focus group interviews will be conducted at the end of exercise rehabilitation to capture participants' contextualised experiences of the intervention. COPD rehabilitators will undertake semi-structured interviews at the end of the trial to garner their holistic perspectives of intervention fidelity and implementation. This is the first study to adopt a social identity approach to develop a rehabilitator-led, group management intervention for COPD patients attending exercise pulmonary rehabilitation. The results of this study will provide evidence for the feasibility and sample size requirements to inform a larger study, which can ascertain the intervention's effectiveness for improving HRQoL for COPD patients. ClinicalTrials.gov NCT02288039. Date 31 October 2014.

  10. 'I can actually talk to them now': qualitative results of an educational intervention for emergency nurses caring for clients who self-injure.

    PubMed

    McAllister, Margaret; Moyle, Wendy; Billett, Stephen; Zimmer-Gembeck, Melanie

    2009-10-01

    This Australian study evaluated the effectiveness of a solution-focused education intervention in extending and improving emergency nursing responses to patients who present because of self-injury. Emergency nurses commonly report lack of training and feeling unskilled in managing people who present because of self-harm. Most educational interventions have provided content knowledge, yet rarely have they focused on conveying the value of health promotion strategies such as proactive skills and coping strategies. A mixed method pretest-posttest group design was used. Nurses (n = 36) were interviewed to examine differences in professional identity, awareness of self-injury and clinical reasoning. The qualitative results are presented in this paper and these showed improvements in knowledge and understanding of self-harm, self-belief in nurses' capacity to positively influence clients and the value of health promotion skills. The intervention produced a positive attitudinal shift towards clients and an expressed intention to act in ways that were more person-centred and change oriented. The solution-focused education intervention appears to show promise as an intervention for enabling nurses to value their unique contribution to providing a health service that is more proactive and health-promoting. Interactive education bringing psychosocial skills to technical nursing staff builds confidence, competence and more person-focused care.

  11. Thermodynamics of charged Lifshitz black holes with quadratic corrections

    NASA Astrophysics Data System (ADS)

    Bravo-Gaete, Moisés; Hassaïne, Mokhtar

    2015-03-01

    In arbitrary dimension, we consider the Einstein-Maxwell Lagrangian supplemented by the more general quadratic-curvature corrections. For this model, we derive four classes of charged Lifshitz black hole solutions for which the metric function is shown to depend on a unique integration constant. The masses of these solutions are computed using the quasilocal formalism based on the relation established between the off-shell Abbott-Deser-Tekin and Noether potentials. Among these four solutions, three of them are interpreted as extremal in the sense that their masses vanish identically. For the last family of solutions, both the quasilocal mass and the electric charge are shown to depend on the integration constant. Finally, we verify that the first law of thermodynamics holds for each solution and a Smarr formula is also established for the four solutions.

  12. Knowledge and power necessary to reconstruct nursing after management changes at a teaching hospital.

    PubMed

    Bernardino, Elizabeth; Felli, Vanda Elisa Andres

    2008-01-01

    This study was carried out at a teaching hospital in Southern Brazil, which adopted a management model that provoked the dismantling of the nursing service and the disbandment of nursing professionals. Its general goal was to promote changes that would be implemented in the re-organization of nursing work. It is a case study with a historical-dialectic approach, whose data were collected in March and April 2005 through the focal group technique. The study subjects were eight nurses, two technicians and two nursing auxiliaries. Data were analyzed through thematic content analysis. Results evidenced that the greatest challenges nursing faced at this hospital were: to construct a new identity, carry out teamwork while maintaining its professional identity, acquire visibility in the institution, change care and expand management.

  13. Cation–Anion Interactions within the Nucleic Acid Ion Atmosphere Revealed by Ion Counting

    PubMed Central

    Gebala, Magdalena; Giambasu, George M.; Lipfert, Jan; Bisaria, Namita; Bonilla, Steve; Li, Guangchao; York, Darrin M.; Herschlag, Daniel

    2016-01-01

    The ion atmosphere is a critical structural, dynamic, and energetic component of nucleic acids that profoundly affects their interactions with proteins and ligands. Experimental methods that “count” the number of ions thermodynamically associated with the ion atmosphere allow dissection of energetic properties of the ion atmosphere, and thus provide direct comparison to theoretical results. Previous experiments have focused primarily on the cations that are attracted to nucleic acid polyanions, but have also showed that anions are excluded from the ion atmosphere. Herein, we have systematically explored the properties of anion exclusion, testing the zeroth-order model that anions of different identity are equally excluded due to electrostatic repulsion. Using a series of monovalent salts, we find, surprisingly, that the extent of anion exclusion and cation inclusion significantly depends on salt identity. The differences are prominent at higher concentrations and mirror trends in mean activity coefficients of the electrolyte solutions. Salts with lower activity coefficients exhibit greater accumulation of both cations and anions within the ion atmosphere, strongly suggesting that cation–anion correlation effects are present in the ion atmosphere and need to be accounted for to understand electrostatic interactions of nucleic acids. To test whether the effects of cation–anion correlations extend to nucleic acid kinetics and thermodynamics, we followed the folding of P4–P6, a domain of the Tetrahymena group I ribozyme, via single-molecule fluorescence resonance energy transfer in solutions with different salts. Solutions of identical concentration but lower activity gave slower and less favorable folding. Our results reveal hitherto unknown properties of the ion atmosphere and suggest possible roles of oriented ion pairs or anion-bridged cations in the ion atmosphere for electrolyte solutions of salts with reduced activity. Consideration of these new results leads to a reevaluation of the strengths and limitations of Poisson–Boltzmann theory and highlights the need for next-generation atomic-level models of the ion atmosphere. PMID:26517731

  14. Integrated Approach to User Account Management

    NASA Technical Reports Server (NTRS)

    Kesselman, Glenn; Smith, William

    2007-01-01

    IT environments consist of both Windows and other platforms. Providing user account management for this model has become increasingly diffi cult. If Microsoft#s Active Directory could be enhanced to extend a W indows identity for authentication services for Unix, Linux, Java and Macintosh systems, then an integrated approach to user account manag ement could be realized.

  15. The Ineffectiveness of "Effective" Management Strategies: First-Year Teachers, Behavior Management, and Identity

    ERIC Educational Resources Information Center

    Dugas, Daryl

    2016-01-01

    This article presents a research project that challenges the skills-based approach to classroom management in teacher education, particularly in the domain of responding to student misbehaviors. In 90-minute narrative-based interviews, 16 first-year Chicago Public School (CPS) teachers were prompted for narratives of their experiences responding…

  16. Construction of the Mid-Level Management Position

    ERIC Educational Resources Information Center

    Tyrell, Steve

    2014-01-01

    The role of the mid-level manager as an organizer, communicator, and problem-solver in student affairs has been examined within the literature, but current discussion generally excludes the perspective of managers at community colleges. This chapter focuses on the importance of managerial identity and roles, particularly as it is enacted within a…

  17. Work-Nonwork Boundary Management Profiles: A Person-Centered Approach

    ERIC Educational Resources Information Center

    Kossek, Ellen Ernst; Ruderman, Marian N.; Braddy, Phillip W.; Hannum, Kelly M.

    2012-01-01

    The goal of this paper is to advance the measurement and theory of work-nonwork boundary management styles. Boundary management styles are defined as the approaches individuals use to demarcate boundaries and attend to work and family and other nonwork roles, given identity centralities and perceived boundary control. We argue that research should…

  18. VET Manager Identities: Culture, Philosophy and Professional Practice

    ERIC Educational Resources Information Center

    Foley, Annette

    2011-01-01

    Using a post-structural approach this article investigates the working lives of frontline managers in VET and how they negotiate change in their day to day practices and decision making. The article is organised around accounts made by managers from different types of Vocational Education and Training (VET) organisations, namely: Technical and…

  19. TIUPAM: A Framework for Trustworthiness-Centric Information Sharing

    NASA Astrophysics Data System (ADS)

    Xu, Shouhuai; Sandhu, Ravi; Bertino, Elisa

    Information is essential to decision making. Nowadays, decision makers are often overwhelmed with large volumes of information, some of which may be inaccurate, incorrect, inappropriate, misleading, or maliciously introduced. With the advocated shift of information sharing paradigm from “need to know” to “need to share” this problem will be further compounded. This poses the challenge of achieving assured information sharing so that decision makers can always get and utilize the up-to-date information for making the right decisions, despite the existence of malicious attacks and without breaching privacy of honest participants. As a first step towards answering this challenge this paper proposes a systematic framework we call TIUPAM, which stands for “Trustworthiness-centric Identity, Usage, Provenance, and Attack Management.” The framework is centered at the need of trustworthiness and risk management for decision makers, and supported by four key components: identity management, usage management, provenance management and attack management. We explore the characterization of both the core functions and the supporting components in the TIUPAM framework, which may guide the design and realization of concrete schemes in the future.

  20. The importance of social identity content in a setting of chronic social conflict: understanding intergroup relations in Northern Ireland.

    PubMed

    Livingstone, Andrew; Haslam, S Alexander

    2008-03-01

    Two studies (N=117, 112) were conducted with school students in Northern Ireland to investigate the neglected relationship between social identity content and intergroup relations. Study 1 tested and found support for two hypotheses. The first was that the association between in-group identification and negative behavioural intentions would be moderated by antagonistic identity content. The second was that the antagonistic identity content mediates the relationship between the experience of intergroup antagonism and negative behavioural intentions. Study 2 replicated these findings at a time of reduced intergroup violence, and supplemented them with a qualitative-quantitative analysis of participants' written responses. In addition, findings demonstrate the importance of appreciating the content and meaning of social identities when theorizing about intergroup relations and developing conflict management interventions.

  1. Huygens’ clocks revisited

    PubMed Central

    Kitanov, Petko M.; Langford, William F.

    2017-01-01

    In 1665, Huygens observed that two identical pendulum clocks, weakly coupled through a heavy beam, soon synchronized with the same period and amplitude but with the two pendula swinging in opposite directions. This behaviour is now called anti-phase synchronization. This paper presents an analysis of the behaviour of a large class of coupled identical oscillators, including Huygens' clocks, using methods of equivariant bifurcation theory. The equivariant normal form for such systems is developed and the possible solutions are characterized. The transformation of the physical system parameters to the normal form parameters is given explicitly and applied to the physical values appropriate for Huygens' clocks, and to those of more recent studies. It is shown that Huygens' physical system could only exhibit anti-phase motion, explaining why Huygens observed exclusively this. By contrast, some more recent researchers have observed in-phase or other more complicated motion in their own experimental systems. Here, it is explained which physical characteristics of these systems allow for the existence of these other types of stable solutions. The present analysis not only accounts for these previously observed solutions in a unified framework, but also introduces behaviour not classified by other authors, such as a synchronized toroidal breather and a chaotic toroidal breather. PMID:28989780

  2. Deaf in the time of the cochlea.

    PubMed

    Humphries, Tom; Humphries, Jacqueline

    2011-01-01

    The American Deaf community for several decades has been involved in sometimes complicated and often contested ways of defining what it means to be Deaf. It is our thesis that the processes of identity construction and the recent discourse of Deaf identity are not unique phenomena at all but echo the experience of other embedded cultural groups around the world, particularly those that are stressed by the assertion of hegemony over them by others. We turn to 2 particular theorists, Jose Martí and W. E. B. DuBois, to help us understand both the dilemmas that Deaf people face and the possible solutions that they propose. This article argues that identities are constructed not just within Deaf communities but within the social contexts in which Deaf communities are embedded.

  3. "I didn't know if it would work, but I tried it anyway".

    PubMed

    Davidhizar, R

    1996-03-01

    To be an excellent manager, daring, creative, and innovative solutions should be tried for management problems. A manager may feel he or she is treading on ground where no one walked before; however, the manager who takes no risk will never come up with the novel and original solutions. This article supplies guidelines for the evaluation of creative and innovative solutions. These guidelines are especially appropriate for the employee who needs a smooth transition into management.

  4. Gray and multigroup radiation transport through 3D binary stochastic media with different sphere radii distributions

    DOE PAGES

    Olson, Gordon Lee

    2016-12-06

    Here, gray and multigroup radiation is transported through 3D media consisting of spheres randomly placed in a uniform background. Comparisons are made between using constant radii spheres and three different distributions of sphere radii. Because of the computational cost of 3D calculations, only the lowest angle order, n=1, is tested. If the mean chord length is held constant, using different radii distributions makes little difference. This is true for both gray and multigroup solutions. 3D transport solutions are compared to 2D and 1D solutions with the same mean chord lengths. 2D disk and 3D sphere media give solutions that aremore » nearly identical while 1D slab solutions are fundamentally different.« less

  5. Gray and multigroup radiation transport through 3D binary stochastic media with different sphere radii distributions

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Olson, Gordon Lee

    Here, gray and multigroup radiation is transported through 3D media consisting of spheres randomly placed in a uniform background. Comparisons are made between using constant radii spheres and three different distributions of sphere radii. Because of the computational cost of 3D calculations, only the lowest angle order, n=1, is tested. If the mean chord length is held constant, using different radii distributions makes little difference. This is true for both gray and multigroup solutions. 3D transport solutions are compared to 2D and 1D solutions with the same mean chord lengths. 2D disk and 3D sphere media give solutions that aremore » nearly identical while 1D slab solutions are fundamentally different.« less

  6. Expanding the disaster risk management framework: Measuring the constructed level of national identity as a factor of political risk

    PubMed Central

    2016-01-01

    Political risk is identified as a dominant risk category of disaster risk management (DRM) which could negatively affect the success of those measures implemented to reduce disaster risk. Key to political risk is the construct of national identity which, if poorly constructed, could greatly contribute to political risk. This article proposed a tool to measure the construct of national identity and to provide recommendations to strengthen the construct in order to mitigate the exacerbating influence it may have on political risk and ultimately on DRM. The design of the measurement tool consisted of a mixed methodological approach employing both quantitative and qualitative data. The data collection instruments included a literature review (which is shortly provided in the previous sections) and an empirical study that utilised data obtained through structured questionnaires. Although the results of the proposed measuring instrument did not include a representative sample of all the cultures in South Africa, the results alluded to different levels for the construction of national identity among black and white respondents, possibly because of different ideological expectations among these groups. The results of the study should be considered as a validation of the measuring tool and not necessarily of the construct of national identity in South Africa. The measuring tool is thus promising for future studies to reduce political risk and ultimately disaster risk.

  7. New nurse transition: success through aligning multiple identities.

    PubMed

    Leong, Yee Mun Jessica; Crossman, Joanna

    2015-01-01

    The purpose of this paper is to explore the perceptions of new nurses in Singapore of their experiences of role transition and to examine the implications for managers in terms of employee training, development and retention. This qualitative study was conducted using a constructivist grounded theory approach. In total 26 novice nurses and five preceptors (n=31) from five different hospitals participated in the study. Data were collected from semi-structured interviews and reflective journal entries and analysed using the constant comparative method. The findings revealed that novice nurses remained emotionally and physically challenged when experiencing role transition. Two major constructs appear to play an important part in the transition process; learning how to Fit in and aligning personal with professional and organisational identities. The findings highlight factors that facilitate or impede Fitting in and aligning these identities. Although the concept of Fitting in and its relation to the attrition of novice nurses has been explored in global studies, that relationship has not yet been theorised as the dynamic alignment of multiple identities. Also, whilst most research around Fitting in, identity and retention has been conducted in western countries, little is known about these issues and their interrelationship in the context of Singapore. The study should inform decision making by healthcare organisations, nurse managers and nursing training institutions with respect to improving the transition experience of novice nurses.

  8. Recycling of inorganic nutrients for hydroponic crop production following incineration of inedible biomass.

    PubMed

    Bubenheim, D L; Wignarajah, K

    1997-01-01

    The goal of resource recovery in a regenerative life support system is maintenance of product quality to sure support of reliable and predictable levels of life support function performance by the crop plant component. Further, these systems must be maintained over extended periods of time, requiring maintenance of nutrient solutions to avoid toxicity and deficiencies. The focus of this study was to determine the suitability of the ash product following incineration of inedible biomass as a source of inorganic nutrients for hydroponic crop production. Inedible wheat biomass was incinerated and ash quality characterized. The incinerator ash was dissolved in adequate nitric acid to establish a consistent nitrogen concentration is all nutrient solution treatments. Four experimental nutrient treatments were included: control, ash only, ash supplemented to match the control treatment, and ash only quality formulated with reagent grade chemicals. When nutrient solutions were formulated using only ash following incineration of inedible biomass, a balance in solution is established representing elemental retention following incineration and nutrient proportions present in the original biomass. The resulting solution is not identical to the control. This imbalance resulted in a suppression of crop growth. When the ash is supplemented with reagent grade chemicals to establish the same balance as in the control--growth is identical to the control. The ash appears to carry no phytotoxic materials. Growth in solution formulated with reagent grade chemicals but matching the quality of the ash only treatment resulted in similar growth to that of the ash only treatment. The ash product resulting from incineration of inedible biomass appears to be a suitable form for recycle of inorganic nutrients to crop production.

  9. The Intention and Reflection Model of Self-Disclosure: Social Work Education for Student Identity Management in Gay Men

    ERIC Educational Resources Information Center

    Satterly, Brent A.

    2007-01-01

    Little research exists on how self-disclosure is taught in social work education (Pianko, 2001). Few social work education programs include precontemplative components of exploring identity for gay male students. In this study, the data from 4 focus groups of gay male therapists, who discussed their self-disclosure, decision-making processes, were…

  10. 30 CFR 280.42 - When geological data and information are obtained by a third party, what must we both do?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... MANAGEMENT SERVICE, DEPARTMENT OF THE INTERIOR OFFSHORE PROSPECTING FOR MINERALS OTHER THAN OIL, GAS, AND... in writing within 30 days of the sale, trade, or other agreement, including the identity of the..., in writing, of the license agreement, including the identity of the recipient of the data and...

  11. Signature scheme based on bilinear pairs

    NASA Astrophysics Data System (ADS)

    Tong, Rui Y.; Geng, Yong J.

    2013-03-01

    An identity-based signature scheme is proposed by using bilinear pairs technology. The scheme uses user's identity information as public key such as email address, IP address, telephone number so that it erases the cost of forming and managing public key infrastructure and avoids the problem of user private generating center generating forgery signature by using CL-PKC framework to generate user's private key.

  12. 75 FR 39972 - Agency Information Collection Activities: Proposed collection; comments requested

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-13

    ... DEPARTMENT OF JUSTICE Justice Management Division [OMB Number 1103-0016] Agency Information Collection Activities: Proposed collection; comments requested ACTION: 60-Day Notice of Information Collection Under Review: Certification of Identity. The Department of Justice (DOJ), Justice Management...

  13. Who is likely to help and hurt? Profiles of African American adolescents with prosocial and aggressive behavior.

    PubMed

    Belgrave, Faye Z; Nguyen, Anh B; Johnson, Jessica L; Hood, Kristina

    2011-08-01

    Prosocial behavior and aggression among children and adolescents are important indicators of social and interpersonal competence. The goal of this study was to investigate whether there are different prototypes among African American adolescents that can help explain prosocial and aggressive (relational and overt) behaviors. Also of interest was whether these profiles differed for boys and girls. The selection of independent variables (e.g., empathy, anger management, normative beliefs about aggression, and ethnic identity) was guided by an information processing model of aggression and prosocial behaviors. The sample consisted of 789 (57% female) African American adolescents between the ages of 11 and 14. Cluster analysis produced three profiles that were similar for boys and girls. These were labeled "well-adjusted," "poorly adjusted," and "low identity." A fourth profile was labeled "low empathy" for girls and "poor anger management" for boys. These four clusters significantly differentiated who engaged in prosocial behavior and relational and overt aggression. Findings suggest that prevention programs may consider targeting well-adjusted youth to serve as peer modes. Additionally, programs that promote empathy, anger management, ethnic identity, and normative beliefs against aggression may be useful for reducing aggression and increasing prosocial behavior among poorly adjusted youth.

  14. TERENA eScience PKI

    NASA Astrophysics Data System (ADS)

    Sova, Milan

    Several National Research and Education Networks associated in TERENA have joined their efforts to build a shared PKI able to serve potentially millions of users from their constituency. The TCS eScience Personal CA takes advantage of national identity federations to facilitate user identity vetting and enrollment procedures. The system uses identity management systems (IdMS) at participating institutions to perform the functions of registration authorities. The certificate enrollment application acts as a SAML Service Provider relying on information provided by IdMS performing as SAML Identity Providers (IdP). When applying for a personal certificate, users authenticate at their home IdP using credentials they normally use to access local services. The IdP controls the certificate issuance process by releasing SAML attributes specifying the user's eligibility for the service and the information to be included in the certificate such as the user's name and email address. The TCS eScience Personal CA is part of the TERENA Certificate Service that uses a commercial PKI provider. Outsourcing the actual CA machinery to a specialized company results in professional-level services such as CRL and OCSP management. The paper describes the legal, organizational and technical aspects of the TCS eScience PKI.

  15. Managing wilderness recreation use: common problems and potential solutions

    Treesearch

    David N. Cole; Margaret E. Petersen; Robert C. Lucas

    1987-01-01

    Describes pros and cons of potential solutions to common wilderness recreation problems. Covers the purpose of each potential solution, costs to visitors and management, effectiveness, other considerations, and sources of additional information.

  16. Levee Setbacks: An Innovative, Cost Effective, and Sustainable Solution for Improved Flood Risk management

    DTIC Science & Technology

    2017-06-30

    ER D C/ EL S R- 17 -3 Levee Setbacks: An Innovative, Cost-Effective, and Sustainable Solution for Improved Flood Risk Management En vi...EL SR-17-3 June 2017 Levee Setbacks: An Innovative, Cost-Effective, and Sustainable Solution for Improved Flood Risk Management David L. Smith...describes levee setbacks as alternatives to traditional levees for flood risk management and environmental benefits. It is organized into five sections

  17. Implementing Proactive Network Management Solutions in the Residence Halls

    ERIC Educational Resources Information Center

    Bedi, Param

    2005-01-01

    This paper discusses how to implement networking solutions in residence halls at Arcadia University in Philadelphia. Sections of the paper include: (1) About Arcadia University; (2) Residence Halls Network; (3) How Campus Manager Helped Arcadia University; (4) What Is Campus Manager; (5) How Campus Manager Works; (6) Campus Manager Remediation…

  18. Social and psychological creativity in gay male midlife identity management.

    PubMed

    Hajek, Christopher

    2016-06-01

    This study utilizes a qualitative thematic analysis methodology and a social identity theory framework to explore ways in which early midlife gay men report enhancing their social identities through social and psychological creativity. Face-to-face, semi-structured interviews were conducted with forty early midlife gay men (aged 40-53) in four US cities. Men discussed the collective and individual essences of their age and gay identities, including attitudes, beliefs, and behaviours that they embraced to self-enhance at midlife. These discussions emphasized differences from the younger gay outgroup, often in the context of intergenerational interaction. Identified were three strategies (and seven substrategies) that summarized the ways that interviewees constructed their identities in the interest of self-enhancement, specifically in the context of intergenerational comparisons with younger gay men. These strategies may be considered as extensions to social creativity strategies presented in Tajfel and Turner's (Psychology of intergroup relations. Chicago, IL: Nelson, 1986: 7) social identity theory. © 2015 The British Psychological Society.

  19. Multicultural identity integration and well-being: a qualitative exploration of variations in narrative coherence and multicultural identification

    PubMed Central

    Yampolsky, Maya A.; Amiot, Catherine E.; de la Sablonnière, Roxane

    2013-01-01

    Understanding the experiences of multicultural individuals is vital in our diverse populations. Multicultural people often need to navigate the different norms and values associated with their multiple cultural identities. Recent research on multicultural identification has focused on how individuals with multiple cultural groups manage these different identities within the self, and how this process predicts well-being. The current study built on this research by using a qualitative method to examine the process of configuring one's identities within the self. The present study employed three of the four different multiple identity configurations in Amiot et al. (2007) cognitive-developmental model of social identity integration: categorization, where people identify with one of their cultural groups over others; compartmentalization, where individuals maintain multiple, separate identities within themselves; and integration, where people link their multiple cultural identities. Life narratives were used to investigate the relationship between each of these configurations and well-being, as indicated by narrative coherence. It was expected that individuals with integrated cultural identities would report greater narrative coherence than individuals who compartmentalized and categorized their cultural identities. For all twenty-two participants, identity integration was significantly and positively related to narrative coherence, while compartmentalization was significantly and negatively related to narrative coherence. ANOVAs revealed that integrated and categorized participants reported significantly greater narrative coherence than compartmentalized participants. These findings are discussed in light of previous research on multicultural identity integration. PMID:23504407

  20. Assessment of identity during adolescence using daily diary methods: Measurement invariance across time and sex.

    PubMed

    Becht, Andrik I; Branje, Susan J T; Vollebergh, Wilma A M; Maciejewski, Dominique F; van Lier, Pol A C; Koot, Hans M; Denissen, Jaap J A; Meeus, Wim H J

    2016-06-01

    The aim of this study was to assess measurement invariance of adolescents' daily reports on identity across time and sex. Adolescents (N = 497; mean age = 13.32 years at Time 1, 56.7% boys) from the general population reported on their identity commitments, exploration in depth and reconsideration on a daily basis for 3 weeks within 1 year across 5 years. We used the single-item version of the Utrecht Management of Identity Commitments Scale (UMICS; Klimstra et al., 2010), a broad measure of identity-formation processes covering both interpersonal and educational identity domains. This study tested configural, metric, scalar, and strict measurement invariance across days within weeks, across sex, across weeks within years, and across years. Results indicated that daily diary reports show strict measurement invariance across days, across weeks within years, across years, and across boys and girls. These results support the use of daily diary methods to assess identity at various time intervals ranging from days to years and across sex. Results are discussed with regard to future implications to study identity processes, both on smaller and larger time intervals. (PsycINFO Database Record (c) 2016 APA, all rights reserved).

  1. Gender identity disorder and its medico-legal considerations.

    PubMed

    Sharma, B R

    2007-01-01

    The general belief among behavioural scientists and physicians is that gender identity disorder or transsexualism is an identifiable and incapacitating disease which can be diagnosed and successfully treated by reassignment surgery in carefully selected patients. Although many advances have been made in the reassignment surgery techniques, phalloplasty still remains a major challenge; to date, no ideal technique has been developed. The new gender created by the reassignment surgery has, in turn, led to many legal complications for post-operative transsexuals because, in many developed and the developing countries, transsexuals are not given a legal identity, thereby adding to their agonies and miseries. This article examines the historical perspective, genesis and management of gender identity disorder, or transsexualism, and draws attention to the medico-legal considerations.

  2. Design and Development of an Identity Management System: The Minnesota State College-Southeast Technical Case Study

    ERIC Educational Resources Information Center

    Elhindi, Mohamed A.

    2010-01-01

    Historically, managing access to information systems (ISs) required direct interaction with a limited number of users. Increasingly, managing access involves handling an increased numbers of internal and external students, faculty, and staff as well as partners such as workforce development centers, the U.S. Department of Education, and the…

  3. Vocational Education and Training Manager Discursive Practices at the Frontline: Alternative Possibilities in a Victorian Setting

    ERIC Educational Resources Information Center

    Foley, Annette

    2011-01-01

    This article looks at how the neoliberal reform process is affecting the professional identity of frontline managers in the Australian vocational education and training sector. The article examines how frontline managers are required to negotiate their working practices between their understandings and experiences as educators and the new…

  4. Generalized recursive solutions to Ornstein-Zernike integral equations

    NASA Astrophysics Data System (ADS)

    Rossky, Peter J.; Dale, William D. T.

    1980-09-01

    Recursive procedures for the solution of a class of integral equations based on the Ornstein-Zernike equation are developed; the hypernetted chain and Percus-Yevick equations are two special cases of the class considered. It is shown that certain variants of the new procedures developed here are formally equivalent to those recently developed by Dale and Friedman, if the new recursive expressions are initialized in the same way as theirs. However, the computational solution of the new equations is significantly more efficient. Further, the present analysis leads to the identification of various graphical quantities arising in the earlier study with more familiar quantities related to pair correlation functions. The analysis is greatly facilitated by the use of several identities relating simple chain sums whose graphical elements can be written as a sum of two or more parts. In particular, the use of these identities permits renormalization of the equivalent series solution to the integral equation to be directly incorporated into the recursive solution in a straightforward manner. Formulas appropriate to renormalization with respect to long and short range parts of the pair potential, as well as more general components of the direct correlation function, are obtained. To further illustrate the utility of this approach, we show that a simple generalization of the hypernetted chain closure relation for the direct correlation function leads directly to the reference hypernetted chain (RHNC) equation due to Lado. The form of the correlation function used in the exponential approximation of Andersen and Chandler is then seen to be equivalent to the first estimate obtained from a renormalized RHNC equation.

  5. No Solutions: Resisting Certainty in Water Supply Management

    NASA Astrophysics Data System (ADS)

    Cockerill, K.; Armstrong, M.; Richter, J.; Okie, J. G.

    2017-12-01

    Although most scholars and water managers implicitly understand that managing water resources is an ongoing need, both popular and academic literature routinely use the words `solution' and `solve' in discussing water management concerns. The word `solution' reflects a quest for certainty, stability, permanence. A focus on `solving' creates a simplistic expectation that some person or institution is responsible for implementing a solution and that once `solved' the issue no longer requires attention. The reality, however, is water management is a wicked problem, meaning it is amorphous, involves multiple definitions, is embedded in complex systems, and hence is intractable. By definition, wicked problems defy solution. Our interdisciplinary project integrates research from across a broad spectrum of biological, physical, and social sciences. We find that framing a problem in terms of `solving' affects how people think, feel, behave toward the problem. Further, our work suggests that the prevalence of solution- based language has simultaneously generated expectations that science / scientists can predict and control biophysical systems and that science is not to be trusted because it has failed to deliver on previous promises to permanently `solve' events like floods or droughts. Hydrologic systems, are, of course highly uncertain. Hence, reiterating a simplistic insistence on `solving' water management concerns may result in decreased public attention to or support for more complex policy discussions that could provide long-term management strategies. Using the language of `solutions' with expectations of certainty sets hydrologic researchers and water managers up to fail. Managing water is a social responsibility and it will require consistent attention in the future, just as it has throughout human history. Scientists have a key role to play in explaining how various hydrologic systems function, but they should not be expected to `solve' pressing water management needs. Rather, reconsidering the language used to frame water management concerns can help us recognize our own culpability in creating water problems and our responsibility in continuously managing this most essential resource.

  6. Calibration-free optical chemical sensors

    DOEpatents

    DeGrandpre, Michael D.

    2006-04-11

    An apparatus and method for taking absorbance-based chemical measurements are described. In a specific embodiment, an indicator-based pCO2 (partial pressure of CO2) sensor displays sensor-to-sensor reproducibility and measurement stability. These qualities are achieved by: 1) renewing the sensing solution, 2) allowing the sensing solution to reach equilibrium with the analyte, and 3) calculating the response from a ratio of the indicator solution absorbances which are determined relative to a blank solution. Careful solution preparation, wavelength calibration, and stray light rejection also contribute to this calibration-free system. Three pCO2 sensors were calibrated and each had response curves which were essentially identical within the uncertainty of the calibration. Long-term laboratory and field studies showed the response had no drift over extended periods (months). The theoretical response, determined from thermodynamic characterization of the indicator solution, also predicted the observed calibration-free performance.

  7. Comparative rates of freeze-drying for lactose and sucrose solutions as measured by photographic recording, product temperature, and heat flux transducer.

    PubMed

    Chen, Rongjun; Slater, Nigel K H; Gatlin, Larry A; Kramer, Tony; Shalaev, Evgenyi Y

    2008-01-01

    Sublimation from lactose and sucrose solutions has been monitored by temperature measurement, visual observation, heat flux sensing and manometric measurements. Estimates of energy transfer rates to the subliming mass made from visual observations and heat flux measurements are in broad agreement, demonstrating for the first time that heat flux sensors can be used to monitor the progress of lyophilization in individual vials with low sample volumes. Furthermore, it is shown that under identical lyophilization conditions the initial rate of drying for lactose solutions is low with little water sublimation for up to 150 minutes, which contrasts markedly with the much faster initial rate of drying for sucrose solutions. Measurement of the initial heat flux between shelf and vial indicated a lower flux to a 10% lactose solution than to a 10% sucrose solution.

  8. The effects of ion identity and ionic strength on the dissolution rate of a gibbsitic bauxite

    NASA Astrophysics Data System (ADS)

    Mogollón, José Luis; Pérez-Diaz, Alberto; Lo Monaco, Salvador

    2000-03-01

    The influence of cation and anion identity and concentration, on the far from equilibrium dissolution rate of gibbsite, was studied at 298°K. Input solutions, with initial pH = 3.5 and variable salt type and concentration, were flowed at different rates, through columns packed with a unconsolidated gibbsitic bauxite from Los Pijigüaos-Venezuela ore deposit. It was observed cations Na +, K +, Mg 2+ and Ca2+ have no influence on the far from equilibrium dissolution rate. Anions have two different effects: concentration increases of monovalent anions (Cl -, NO 3- and ClO 4-) causes a decrease in the rate, as a function of [anion] (-0.11 ± 0.01); and increases of sulfate concentration causes an increase in the rate as a function of [SO 4=] (0.4 ± 0.1). According to our calculations, these two effects have a remarkable influence upon the lifetime of gibbsite under weathering conditions. Based on Transition State Theory, it is proposed the experimental observations are due to an electrostatic effect on the activated complex (AC ♯) of the gibbsite dissolution reaction. For this AC ♯ the product of the charge of the involved chemical entities is negative. When SO 4= participates in the AC ♯ the product of the charges switches to positive and therefore, the electrostatic interaction increase the dissolution rate. The dissolution rates are independent of the solution saturation degree below ΔGr = - 0.74 kcal/mol. It is inferred that the critical ΔGr is a constant of the solid, not affected by the solution characteristics, e.g., pH, ionic strength, cation and anion identities.

  9. Navigating Identities: Subtle and Public Agency of Bicultural Gay Youth.

    PubMed

    Cense, Marianne; Ganzevoort, R Ruard

    2017-01-01

    Young people who discover their sexual attraction to people of the same sex often go through a period of ambivalence or distress, especially when they grow up in an environment that condemns homosexuality. The Dutch sociopolitical context makes the expression of same-sex desires among those with non-Dutch roots even more complicated and risky, as prevailing schemes of interpretation render the two identities incompatible. This study explores the expressions of same-sex desires and identities as well as the different forms of agency of bicultural gay youth. In-depth interviews with 14 young adults reveal how young people negotiate bicultural identities in Dutch society that brings to the fore complexities in managing diverse sexual identities and strong religious and cultural affiliations in tandem. Their strategies have the effect of questioning dominant discourses and transcend the oppositional dichotomy between sexual and ethnic forms of sociocultural otherness.

  10. Solutions Network Formulation Report. The Potential Contributions of the Global Precipitation Measurement Mission to Phosphorus Reduction Efforts in the Florida Everglades

    NASA Technical Reports Server (NTRS)

    Anderson, Daniel; Hilbert, Kent; Lewis, David

    2009-01-01

    This candidate solution suggests the use of GPM precipitation observations to enhance the CERP. Specifically, GPM measurements could augment in situ precipitation data that are used to model agricultural phosphorus discharged into the Everglades. This solution benefits society by aiding water resource managers in identifying effective phosphorus reduction scenarios and thereby returning the Everglades to a more natural state. This solution supports the Water Management, Coastal Management, and Ecological Forecasting National Applications.

  11. Tracking quintessence and k-essence in a general cosmological background

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Das, Rupam; Kephart, Thomas W.; Scherrer, Robert J.

    We derive conditions for stable tracker solutions for both quintessence and k-essence in a general cosmological background, H{sup 2}{proportional_to}f({rho}). We find that tracker solutions are possible only when {eta}{identical_to}dlnf/dln{rho}{approx_equal}constant, aside from a few special cases, which are enumerated. Expressions for the quintessence or k-essence equation of state are derived as a function of {eta} and the equation of state of the dominant background component.

  12. Antibody-Functionalized Carbon Nanotube Transistors as Biosensors for the Detection of Prostate Cancer

    DTIC Science & Technology

    2013-09-01

    nearly identical responses to the chemically similar odorants 2-heptanone and n-amyl acetate. The molecules differ only by a single oxygen atom in...briefly bathed in activation buffer and placed in a solution of 11.3 mM NR,NR-bis(carboxymethyl)-L-lysine hydrate (NTA- NH2) prepared with PBS (0.1 M...purity nitrogen or argon gas. A solution containing mORs in digitonin micelles or nanodiscs, prepared as described above, was de- posited on the

  13. Mobile Virtual Private Networking

    NASA Astrophysics Data System (ADS)

    Pulkkis, Göran; Grahn, Kaj; Mårtens, Mathias; Mattsson, Jonny

    Mobile Virtual Private Networking (VPN) solutions based on the Internet Security Protocol (IPSec), Transport Layer Security/Secure Socket Layer (SSL/TLS), Secure Shell (SSH), 3G/GPRS cellular networks, Mobile IP, and the presently experimental Host Identity Protocol (HIP) are described, compared and evaluated. Mobile VPN solutions based on HIP are recommended for future networking because of superior processing efficiency and network capacity demand features. Mobile VPN implementation issues associated with the IP protocol versions IPv4 and IPv6 are also evaluated. Mobile VPN implementation experiences are presented and discussed.

  14. Effect of spatial restriction on the photoluminescent properties of carbon nanomaterials

    NASA Astrophysics Data System (ADS)

    Vostrikova, A. M.; Nikolaeva, A. N.; Bakal, A. A.; Shpuntova, D. V.; Mordovina, E. A.; Sukhorukov, G. B.; Sapelkin, A. V.; Goryacheva, I. Yu.

    2018-04-01

    Photoluminescent (PL) properties of carbon-based nanomaterials obtained on the base of sodium dextran sulfate (DS) were compared. DS water solution, dry powder and co-precipitated inside pores of CaCO3 microparticles solution were thermally treated and clear difference between these materials was found. Effect of spatial restriction of CaCO3 pores showed itself in the identity of PL properties for material, obtained by thermal and hydrothermal treatment; in the absence of CaCO3 microparticles the PL spectra were quite different.

  15. Gender identity disorder and autism spectrum disorder in a 23-year-old female.

    PubMed

    Lemaire, Mathieu; Thomazeau, Barbara; Bonnet-Brilhault, Frédérique

    2014-02-01

    We describe the case of a 23-year-old woman with Gender Identity Disorder (GID) asking for a cross-sex hormonal treatment with sex reassignment surgery and who was recently diagnosed with Autism Spectrum Disorder (ASD). Gender identity clinics are now reporting an overrepresentation of individuals with ASD among GID patients. The prevalence of ASD is 10-fold higher among GID patients than in general population. However, few case reports or studies have explored the co-occurrence of ASD and GID. This co-occurrence is relevant for diagnostic and clinical management and also raises important theoretical issues.

  16. Critical incidents in nursing academics: discovering a new identity.

    PubMed

    Aguayo-González, Mariela; Castelló-Badía, Montserrat; Monereo-Font, Carles

    2015-01-01

    a qualitative study that followed the principles of the grounded theory in order to analyze the professional identity of nursing academics through the analysis of the most disturbing critical incidents. semi-structured interviews were conducted with seven nurses who worked as professors and researchers in a private university in Barcelona. the resulting empirical material was organized into two categories: characterization of critical incidents and responsiveness to the incident. the professional identity of nurses regarding the academic area is still under construction and inexperience is the major obstacle in the management of critical incidents in the teaching career.

  17. Does the Department of Defense Possess Solutions for the Department of Homeland Security’s Personnel Management Issues?

    DTIC Science & Technology

    2015-12-01

    DEPARTMENT OF DEFENSE POSSESS SOLUTIONS FOR THE DEPARTMENT OF HOMELAND SECURITY’S PERSONNEL MANAGEMENT ISSUES? by Joshua D. Frizzell December 2015...22202-4302, and to the Office of Management and Budget, Paperwork Reduction Project (0704-0188) Washington, DC 20503. 1. AGENCY USE ONLY (Leave blank...SOLUTIONS FOR THE DEPARTMENT OF HOMELAND SECURITY’S PERSONNEL MANAGEMENT ISSUES? 5. FUNDING NUMBERS 6. AUTHOR(S) Joshua D. Frizzell 7

  18. Evaluating the impact of a disease management program for chronic complex conditions at two large northeast health plans using a control group methodology.

    PubMed

    Schwerner, Henry; Mellody, Timothy; Goldstein, Allan B; Wansink, Daryl; Sullivan, Virginia; Yelenik, Stephan N; Charlton, Warwick; Lloyd, Kelley; Courtemanche, Ted

    2006-02-01

    The objective of this study was to observe trends in payer expenditures for plan members with one of 14 chronic, complex conditions comparing one group with a disease management program specific to their condition (the intervention group) and the other with no specific disease management program (the control group) for these conditions. The authors used payer claims and membership data to identify members eligible for the program in a 12-month baseline year (October 2001 to September 2002) and a subsequent 12-month program year (October 2002 to September 2003). Two payers were analyzed: one health plan with members primarily in New Jersey (AmeriHealth New Jersey [AHNJ]), where the disease management program was offered, and one affiliated large plan with members primarily in the metro Philadelphia area, where the program was not offered. The claims payment policy for both plans is identical. Intervention and control groups were analyzed for equivalence. The analysis was conducted in both groups over identical time periods. The intervention group showed statistically significant (p < 0.01) differences in total paid claims trend and expenditures when compared to the control group. Intervention group members showed a reduction in expenditures of -8%, while control group members showed an increase of +10% over identical time periods. Subsequent analyses controlling for outliers and product lines served to confirm the overall results. The disease management program is likely responsible for the observed difference between the intervention and control group results. A well-designed, targeted disease management program offered by a motivated, supportive health plan can play an important role in cost improvement strategies for members with complex, chronic conditions.

  19. Activating patients with chronic disease for self-management: comparison of self-managing patients with those managing by frequent readmissions to hospital.

    PubMed

    Kirby, Sue E; Dennis, Sarah M; Bazeley, Pat; Harris, Mark F

    2013-01-01

    Understanding the factors that activate people to self-manage chronic disease is important in improving uptake levels. If the many frequent hospital users who present with acute exacerbations of chronic disease were to self-manage at home, some hospital admissions would be avoided. Patient interview and demographic, psychological, clinical and service utilisation data were compared for two groups of patients with chronic disease: those attending self-management services and those who managed by using hospital services. Data were analysed to see whether there were differences that might explain the two different approaches to managing their conditions. The two groups were similar in terms of comorbidity, age, sex, home services, home support and educational level. Self-managing patients were activated by their clinician, accepted their disease, changed their identity, confronted emotions and learnt the skills to self-manage and avoid hospital. Patients who frequently used hospital services to manage their chronic disease were often in denial about their chronic disease, hung on to their identity and expressed little emotional response. However, they reported a stronger sense of coherence and rated their health more highly than self-managing patients. This study shed light on the process of patient activation for self-management. A better understanding of the process of patient activation would encourage clinicians who come into contact with frequently readmitted chronic disease patients to be more proactive in supporting self-management.

  20. Application of the Group Foliation Method to the Complex Monge-Ampère Equation

    NASA Astrophysics Data System (ADS)

    Nutku, Y.; Sheftel, M. B.

    2001-04-01

    We apply the method of group foliation to the complex Monge-Ampère equation ( CMA 2) to establish a regular framework for finding its non-invariant solutions. We employ an infinite symmetry subgroup of CMA 2 to produce a foliation of the solution space into orbits of solutions with respect to this group and a corresponding splitting of CMA 2 into an automorphic system and a resolvent system. We propose a new approach to group foliation which is based on the commutator algebra of operators of invariant differentiation. This algebra together with its Jacobi identities provides the commutator representation of the resolvent system.

  1. Laboring in Silence: Young Lesbian, Gay, Bisexual, and Queer-Identifying Workers' Negotiations of the Workplace Closet in Australian Organizations

    ERIC Educational Resources Information Center

    Willis, Paul

    2011-01-01

    The workplace closet is a fundamental fixture in the working lives of many lesbian, gay, bisexual, and queer (LGBQ)-identifying employees who do not feel safe for their sexual identity to be known in their place of employment. Previous research draws attention to the processes of identity management that some workers adhere to for ensuring that…

  2. Quality Control in Clinical Laboratory Samples

    DTIC Science & Technology

    2015-01-01

    is able to find and correct flaws in the analytical processes of a lab before potentially incorrect patient resu lts are released. According to...verifi es that the results produced are accurate and precise . Clinical labs use management of documentation as well as inco rporation of a continuous...improvement process to streamline the overall quality control process . QC samples are expected to be identical and tested identically to patient

  3. Black Feminist Thought and Cultural Contracts: Understanding the Intersection and Negotiation of Racial, Gendered, and Professional Identities in the Academy

    ERIC Educational Resources Information Center

    Harris, Tina M.

    2007-01-01

    This chapter explores identity negotiation by women of color in academe at a predominantly white institution. The author discusses use of the title "doctor" as a form of address to manage interactions with graduate students in the college classroom, and the difficulties associated with negotiating and balancing these diverse and complex identities…

  4. Corporate Takeover of U.S. Catholic Education and the Effect on Catholic Identity: Models from the Church's 19th-Century Schools and 21st-Century Hospitals

    ERIC Educational Resources Information Center

    O'Gorman, Robert T.

    2015-01-01

    There is a movement toward "corporatization" evident in Catholic hospitals, Catholic schools, and Catholic social service agencies taking up management structures and other features and behaviors employed by corporations. Many see these practices as threatening the identity and influence of religion as the profit concerns begin to take…

  5. Changelings and Shape Shifters? Identity Play and Pedagogical Positioning of Staff in Immersive Virtual Worlds

    ERIC Educational Resources Information Center

    Savin-Baden, Maggi

    2010-01-01

    This paper presents a study that used narrative inquiry to explore staff experiences of learning and teaching in immersive worlds. The findings introduced issues relating to identity play, the relationship between pedagogy and play and the ways in which learning, play and fun were managed (or not). At the same time there was a sense of imposed or…

  6. Flow to a well in a water-table aquifer: An improved laplace transform solution

    USGS Publications Warehouse

    Moench, A.F.

    1996-01-01

    An alternative Laplace transform solution for the problem, originally solved by Neuman, of constant discharge from a partially penetrating well in a water-table aquifer was obtained. The solution differs from existing solutions in that it is simpler in form and can be numerically inverted without the need for time-consuming numerical integration. The derivation invloves the use of the Laplace transform and a finite Fourier cosine series and avoids the Hankel transform used in prior derivations. The solution allows for water in the overlying unsaturated zone to be released either instantaneously in response to a declining water table as assumed by Neuman, or gradually as approximated by Boulton's convolution integral. Numerical evaluation yields results identical with results obtained by previously published methods with the advantage, under most well-aquifer configurations, of much reduced computation time.

  7. Structuring the Chief Information Security Officer Organization

    DTIC Science & Technology

    2015-09-07

    GP9 Objectively Evaluate Adherence CERT-RMM HRM Human Resource Management CERT-RMM ID Identity Management CERT-RMM IMC Incident Management and...Detect, triage, analyze, respond to, and recover from suspicious events and security incidents Security incident management IMC IR IR-1, IR- 2, IR-3...2015-TN-007 | SOFTWARE ENGINEERING INSTITUTE | CARNEGIE MELLON UNIVERSITY 6 Table 2: Source Acronyms3 CERT-RMM NIST 800-53 C2M2 IMC Incident

  8. The New Totalitarians: Social Identities and Radical Islamist Political Grand Strategy

    DTIC Science & Technology

    2007-01-01

    ends of their political grand strategy. According to a book entitled The Management of Barbarism, posted on the internet by an al-Qa’ida...Islamists are in control, the Second Phase, “The Management of Barbarism” will ensue. This second plan apparently was formulated in reaction to the...establishment of alliances with neighboring elements that are yet to give total conformity to the Management , and improve management structures

  9. "I am a trained nurse": the nursing identity of anarchist and radical Emma Goldman.

    PubMed

    Connolly, Cynthia Anne

    2010-01-01

    For more than a century, scholars have analyzed the many dimensions of Emma Goldman. Remembered as an agent of revolution, feminism, sexual freedom, anarchy, and atheism, Goldman's motives, personality, and actions have generated an entire subgenre of historical scholarship. But although Goldman practiced nursing in New York City for ten years, one facet of her life that has been neglected is her nursing identity. Goldman's autobiography, Living My Life, reveals the way her nursing experiences informed her evolving anarchist political philosophy and international activism. She valued nursing for many reasons--for the economic independence it offered, identity it provided, and sense of community and connectivity she believed it encouraged. Finally, for Goldman, nursing represented was a vehicle to understand people's struggles and as a way of translating political philosophy into meaningful, practical solutions.

  10. Staying in the Hood: Black Lesbian and Transgender Women and Identity Management in North Philadelphia.

    PubMed

    Brooks, Siobhan

    2016-12-01

    The concept Don't Ask, Don't Tell regarding Black LGBT sexuality in Black communities has been an acceptable form of identity management for Black LGBT people. In other words, Black LGBT people are accepted as long as they are not vocal about their sexuality. However, this is changing with the issue of gay marriage, which is creating a space where Black LGBT people are more open about their gender identity and sexuality in heterosexual Black spaces. This new form of openness allows Black LGBT people to "stay in" their communities, as opposed to coming out. In this article I examine how Black LGBT women in North Philadelphia stay in their communities: being politically active regarding LGBT issues, disengaging from LGBT issues, passing, and educating straight Black people about issues affecting the Black LGBT community. I conclude with implications of staying in and intersectionality among Black heterosexual and LGBT women fighting for social change.

  11. Ambiguous genitalia, gender-identity problems, and sex reassignment.

    PubMed

    Dittmann, R W

    1998-01-01

    This article discusses general issues with regard to gender-identity problems, sex reassignment, and clinical management in patients with ambiguous genitalia, based on a detailed case history of a patient with penile agenesis who has been followed more than 20 years. After initial uncertainty, the patient began to grow up as a boy, lived from the fourth year of life as a girl and young woman, and lived from late puberty on as a man. Over his lifetime he experienced extensive corrective surgery plus hormonal substitution therapy. Pre- and perinatal hormonal conditions, phenomenology of the genitalia, sex of rearing, timing of sex reassignment and corrective surgery, for example, appear to be important components for the development of gender-role behavior, gender identity, and sexual orientation of intersex patients. Findings and retrospective considerations for this patient suggest the need for careful differential activities in diagnostic workup, approaches to sex assignment and possible reassignment, and the clinical management of patients and families.

  12. Metabolic profiling of human plasma and urine in chronic kidney disease by hydrophilic interaction liquid chromatography coupled with time-of-flight mass spectrometry: a pilot study.

    PubMed

    Boelaert, Jente; Lynen, Frédéric; Glorieux, Griet; Schepers, Eva; Neirynck, Nathalie; Vanholder, Raymond

    2017-03-01

    A typical characteristic of chronic kidney disease (CKD) is the progressive loss in renal function over a period of months or years with the concomitant accumulation of uremic retention solutes in the body. Known biomarkers for the kidney deterioration, such as serum creatinine or urinary albumin, do not allow effective early detection of CKD, which is essential towards disease management. In this work, a hydrophilic interaction liquid chromatography time-of-flight mass spectrometric (HILIC-TOF MS) platform was optimized allowing the search for novel uremic retention solutes and/or biomarkers of CKD. The HILIC-ESI-MS approach was used for the comparison of urine and plasma samples from CKD patients at stage 3 (n = 20), at stage 5 not yet receiving dialysis (n = 20) and from healthy controls (n = 20). Quality control samples were used to control and ensure the validity of the metabolomics approach. Subsequently the data were treated with the XCMS software for multivariate statistical analysis. In this way, differentiation could be achieved between the measured metabolite profile of the CKD patients versus the healthy controls. The approach allowed the elucidation of a number of metabolites that showed a significant up- and downregulation throughout the different stages of CKD. These compounds are cinnamoylglycine, glycoursodeoxycholic acid, 2-hydroxyethane sulfonate, and pregnenolone sulfate of which the identity was unambiguously confirmed via the use of authentic standards. The latter three are newly identified uremic retention solutes.

  13. 50 CFR 229.11 - Confidential fisheries data.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... identity or business of any person; (3) When required by court order; or (4) In the case of scientific information involving fisheries, to employees of Regional Fishery Management Councils who are responsible for fishery management plan development and monitoring. (5) To other individuals or organizations authorized...

  14. Sport Management Career Decision-Making Self-Efficacy

    ERIC Educational Resources Information Center

    Lumpkin, Angela; Franco, Dan; Multon, Karen; Achen, Rebecca M.

    2017-01-01

    Grounded in a social cognitive theoretical perspective, this study explores the career decision-making self-efficacy (CDSE) and vocational identity development process for college students interested or majoring in sport management. While a popular undergraduate major, little research has investigated the specific factors that influence different…

  15. 29 CFR 1471.905 - Affiliate.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... limited to— (a) Interlocking management or ownership; (b) Identity of interests among family members; (c) Shared facilities and equipment; (d) Common use of employees; or (e) A business entity which has been organized following the exclusion of a person which has the same or similar management, ownership, or...

  16. NASA Integrated Services Environment

    NASA Technical Reports Server (NTRS)

    Ing, Sharon

    2005-01-01

    This slide presentation will begin with a discussion on NASA's current distributed environment for directories, identity management and account management. We will follow with information concerning the drivers, design, reviews and implementation of the NISE Project. The final component of the presentation discusses processes used, status and conclusions.

  17. [Risk and crisis management by anesthesiologists regarding 'Guidelines for Actions Against Intraoperative Critical Hemorrhage' published by the Japanese Society of Anesthesiologists and the Japan Society of Transfusion Medicine and Cell Therapy].

    PubMed

    Irita, Kazuo; Yoshimura, Hayashi; Sakaguchi, Yoshiro; Takamatsu, Chihiro; Tokuda, Kentaro

    2008-09-01

    According to a survey of anesthesia-related critical incidents by the Japanese Society of Anesthesiologists, hemorrhage was the major cause of cardiac arrest developing in the operating room. To deal with critical hemorrhage swiftly, not only cooperation between anesthesiologists and surgeons but also the linkage of operating rooms with transfusion management divisions and the blood center is important. It is desirable for the hospital transfusion committee to prepare hospital regulations on 'actions to be taken to manage critical hemorrhage', and practice the implementation of these guidelines by simulated drills. When critical hemorrhage occurs, a person in charge is appointed, and an emergency is declared (call for manpower and notification of the emergency to the transfusion management divisions). A person in charge comprehensively assesses the hemostatic condition, hemodynamics, laboratory data, and blood product supply system, and consults the operator regarding the continuation of surgery or changing surgical procedures. When time is short, the cross-matching test is omitted, and the ABO-identical blood is used. When a supply of the identical ABO-type blood is not available, compatible blood type is used. The evolving concept of hemostatic resuscitation seems to be important to prevent coagulopathy, which easily develops during massive hemorrhage. Anesthesiologists should be aware of the risk of such an emergency transfusion and procedures to be taken to switch to transfusion of the ABO-identical blood. Establishment of a hospital emergency transfusion system depends on the overall capability of the critical and crisis management systems of the hospital.

  18. Managing risk and marginalizing identities: on the society-of-captives thesis and the harm of social dis-ease.

    PubMed

    Arrigo, Bruce A

    2013-06-01

    This article develops the constitutive features of the society-of-captives thesis as suggested by Arrigo and Milovanovic, and Arrigo, Bersot, and Sellers. The relevance of this thesis is briefly explored in relation to the institutional and community-based treatment philosophies that currently inform the mental health and criminal justice systems. This exploration specifies how risk (being human and doing humanness differently) is managed symbolically, linguistically, materially, and culturally. The management of this risk extends to the kept as well as to their keepers, regulators, and watchers (i.e., the society of captives). This article calls for a new clinical praxis (being/doing a critical mindfulness) designed to overcome the totalizing madness (the harm of social dis-ease) that follows from managing risk fearfully and marginalizing identities desperately as reified recursively through society's captivity. The ethical underpinnings of this clinical praxis represent an emergent direction for undertaking correctional policy reform.

  19. Two barriers to realizing the benefits of biometrics: a chain perspective on biometrics and identity fraud as biometrics' real challenge

    NASA Astrophysics Data System (ADS)

    Grijpink, Jan

    2004-06-01

    Along at least twelve dimensions biometric systems might vary. We need to exploit this variety to manoeuvre biometrics into place to be able to realise its social potential. Subsequently, two perspectives on biometrics are proposed revealing that biometrics will probably be ineffective in combating identity fraud, organised crime and terrorism: (1) the value chain perspective explains the first barrier: our strong preference for large scale biometric systems for general compulsory use. These biometric systems cause successful infringements to spread unnoticed. A biometric system will only function adequately if biometrics is indispensable for solving the dominant chain problem. Multi-chain use of biometrics takes it beyond the boundaries of good manageability. (2) the identity fraud perspective exposes the second barrier: our traditional approach to identity verification. We focus on identity documents, neglecting the person and the situation involved. Moreover, western legal cultures have made identity verification procedures known, transparent, uniform and predictable. Thus, we have developed a blind spot to identity fraud. Biometrics provides good potential to better checking persons, but will probably be used to enhance identity documents. Biometrics will only pay off if it confronts the identity fraudster with less predictable verification processes and more risks of his identity fraud being spotted. Standardised large scale applications of biometrics for general compulsory use without countervailing measures will probably produce the reverse. This contribution tentatively presents a few headlines for an overall biometrics strategy that could better resist identity fraud.

  20. Common Workflow Service: Standards Based Solution for Managing Operational Processes

    NASA Astrophysics Data System (ADS)

    Tinio, A. W.; Hollins, G. A.

    2017-06-01

    The Common Workflow Service is a collaborative and standards-based solution for managing mission operations processes using techniques from the Business Process Management (BPM) discipline. This presentation describes the CWS and its benefits.

  1. The Cascading Effects of Marginalization and Pathways of Resilience in Attaining Good Health Among LGBT Older Adults

    PubMed Central

    Fredriksen-Goldsen, Karen I.; Kim, Hyun-Jun; Bryan, Amanda E. B.; Shiu, Chengshi; Emlet, Charles A.

    2017-01-01

    Purpose of the Study: Lesbian, gay, bisexual, and transgender (LGBT) older adults comprise a diverse and growing health disparate population. In the present study, using the Health Equity Promotion Model, we investigated pathways by which LGBT older adults experience resilience, risk, and marginalization and their relationship to attaining positive health outcomes. Design and Methods: Aging with Pride: National Health, Aging, and Sexuality/Gender Study (NHAS) is the first longitudinal research project designed to examine the health, aging, and well-being of LGBT adults aged 50 and older. Using data from 2014 (N = 2,415), we tested a structural equation model linking lifetime marginalization, identity affirmation and management, social and psychological resources, and health behaviors to positive health outcomes. Results: Identity affirmation positively predicted social resources and mental health, and social resources positively predicted mental health. Marginalization was associated with fewer social resources for LGBT older adults with an open identity management style, lower identity affirmation for LGBT older adults who strategically concealed their sexual identity, and poorer mental health. Mental health was associated with better health behaviors, which in turn predicted positive physical health outcomes. Implications: Although a health disparate population, good health among LGBT older adults appears to be attained via multiple resilience and risk pathways. Providers must remain aware of the historical contexts in which LGBT older adults lived and the strengths they developed in order to understand their health and to develop tailored and targeted prevention and intervention services. PMID:28087797

  2. How manageable a person feels the place to be: self-efficacy in supporting tourism

    NASA Astrophysics Data System (ADS)

    Ginting, N.; Rahman, N. V.; Nasution, A. D.; Widya, A. T.

    2018-02-01

    How manageable a person feels the place exceedingly influences people’s satisfaction toward supporting tourism development with the respect of self-efficacy. Individuals with self-efficacious can perform or complete a task as a measure of personal agency. This research aims to investigate the influences of self-efficacy principle in defining place identity on tourism environment in Karo Regency, North Sumatera, Indonesia. A mixed-method was employed to obtain local people’ and tourists’ perception of comfort, safety, accessibility, and confidence. The result shows that confidence contributes in maintaining self-efficacy in Karo Regency. Meanwhile, the absence of public facilities constitutes the feeling of self-efficacy and threatens the place identity.

  3. Use and Users of the Cranberry Backcountry in West Virginia: insights for eastern backcountry management

    Treesearch

    Herbert E. Echelberger; George H. Moeller

    1977-01-01

    Management of backcountry recreation areas in the eastern United States should be based in part on information about the identity of backcountry users and what they seek in their backcountry experiences. Because little of this kind of information is now available, managers may be adopting some strategies with inadequate knowledge of the consequences of their decisions...

  4. Solution of the classical Yang-Baxter equation with an exotic symmetry, and integrability of a multi-species boson tunnelling model

    NASA Astrophysics Data System (ADS)

    Links, Jon

    2017-03-01

    Solutions of the classical Yang-Baxter equation provide a systematic method to construct integrable quantum systems in an algebraic manner. A Lie algebra can be associated with any solution of the classical Yang-Baxter equation, from which commuting transfer matrices may be constructed. This procedure is reviewed, specifically for solutions without skew-symmetry. A particular solution with an exotic symmetry is identified, which is not obtained as a limiting expansion of the usual Yang-Baxter equation. This solution facilitates the construction of commuting transfer matrices which will be used to establish the integrability of a multi-species boson tunnelling model. The model generalises the well-known two-site Bose-Hubbard model, to which it reduces in the one-species limit. Due to the lack of an apparent reference state, application of the algebraic Bethe Ansatz to solve the model is prohibitive. Instead, the Bethe Ansatz solution is obtained by the use of operator identities and tensor product decompositions.

  5. A duality theorem-based algorithm for inexact quadratic programming problems: Application to waste management under uncertainty

    NASA Astrophysics Data System (ADS)

    Kong, X. M.; Huang, G. H.; Fan, Y. R.; Li, Y. P.

    2016-04-01

    In this study, a duality theorem-based algorithm (DTA) for inexact quadratic programming (IQP) is developed for municipal solid waste (MSW) management under uncertainty. It improves upon the existing numerical solution method for IQP problems. The comparison between DTA and derivative algorithm (DAM) shows that the DTA method provides better solutions than DAM with lower computational complexity. It is not necessary to identify the uncertain relationship between the objective function and decision variables, which is required for the solution process of DAM. The developed method is applied to a case study of MSW management and planning. The results indicate that reasonable solutions have been generated for supporting long-term MSW management and planning. They could provide more information as well as enable managers to make better decisions to identify desired MSW management policies in association with minimized cost under uncertainty.

  6. Evaluation of anion exchange resins Tulsion A-30 and Indion-930A by application of radioanalytical technique

    NASA Astrophysics Data System (ADS)

    Singare, P. U.

    2014-07-01

    Radioanalytical technique using 131I and 82Br was employed to evaluate organic based anion exchange resins Tulsion A-30 and Indion-930A. The evaluation was based on performance of these resins during iodide and bromide ion-isotopic exchange reactions. It was observed that for iodide ion-isotopic exchange reaction by using Tulsion A-30 resin, the values of specific reaction rate (min-1), amount of iodide ion exchanged (mmol), initial rate of iodide ion exchange (mmol/min) and log K d were 0.238, 0.477, 0.114, and 11.0, respectively, which was higher than 0.155, 0.360, 0.056, and 7.3, respectively as that obtained by using Indion-930A resins under identical experimental conditions of 40.0°C, 1.000 g of ion exchange resins and 0.003 M labeled iodide ion solution. Also at a constant temperature of 40.0°C, as the concentration of labeled iodide ion solution increases 0.001 to 0.004 M, for Tulsion A-30 resins the percentage of iodide ions exchanged increases from 59.0 to 65.1%, and from 46.4 to 48.8% for Indion-930A resins under identical experimental conditions. The identical trend was observed for both the resins during bromide ion-isotopic exchange reactions. The overall results indicate that under identical experimental conditions, Tulsion A-30 show superior performance over Indion-930A resins. The results of present experimental work have demonstrated that the radioanalytical technique used here can be successfully applied for characterization of different ion exchange resins so as to evaluate their performance under various process parameters.

  7. Accounting for Teamwork: A Critical Study of Group-Based Systems of Organizational Control.

    ERIC Educational Resources Information Center

    Ezzamel, Mahmoud; Willmott, Hugh

    1998-01-01

    Examines the role of accounting calculations in reorganizing manufacturing capabilities of a vertically integrated global retailing company. Introducing teamwork to replace line work extended traditional, hierarchical management control systems. Teamwork's self-managing demands contravened workers' established sense of self-identity as…

  8. 78 FR 14297 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-05

    ... name, address, phone number, birth date, and Social Security Number (SSN).'' Authority for maintenance... storage media.'' * * * * * System manager(s) and address: Delete entry and replace with ``Chief of... signature as a means of proving the identity of the individual requesting access to the records.'' Record...

  9. Application of Harmony Search algorithm to the solution of groundwater management models

    NASA Astrophysics Data System (ADS)

    Tamer Ayvaz, M.

    2009-06-01

    This study proposes a groundwater resources management model in which the solution is performed through a combined simulation-optimization model. A modular three-dimensional finite difference groundwater flow model, MODFLOW is used as the simulation model. This model is then combined with a Harmony Search (HS) optimization algorithm which is based on the musical process of searching for a perfect state of harmony. The performance of the proposed HS based management model is tested on three separate groundwater management problems: (i) maximization of total pumping from an aquifer (steady-state); (ii) minimization of the total pumping cost to satisfy the given demand (steady-state); and (iii) minimization of the pumping cost to satisfy the given demand for multiple management periods (transient). The sensitivity of HS algorithm is evaluated by performing a sensitivity analysis which aims to determine the impact of related solution parameters on convergence behavior. The results show that HS yields nearly same or better solutions than the previous solution methods and may be used to solve management problems in groundwater modeling.

  10. Ammonium removal from aqueous solutions by using natural Chinese (Chende) zeolite as adsorbent.

    PubMed

    Huang, Haiming; Xiao, Xianming; Yan, Bo; Yang, Liping

    2010-03-15

    This paper presents a study of the removal of ammonium ion from aqueous solutions using natural Chinese (Chende) zeolite. A series of experiments was conducted to examine the effects of solution pH, particle size, contact time, adsorbent dosage, and the presence of other cation- and anion species on ammonium removal. The findings indicated that these parameters named had a significant effect on the removal of ammonium by the zeolite. The effect of other cations on the removal of ammonium followed the order of preference Na(+)>K(+)>Ca(2+)>Mg(2+) at identical mass concentrations, and the effect of the presence of individual anions followed the order of preference carbonate>chloride>sulfate>phosphate at identical mass concentrations of ammonium ions. Kinetic analysis showed that the adsorption of ammonium on zeolite at different ranges of particle size well followed the pseudo-second-order model and followed the intra-particle diffusion model only during the initial 60 min of the adsorption process. Equilibrium isotherm data was fitted to the linear Langmuir- and Freundlich models with the latter model providing the better description of the process (R(2)=0.991-0.997) compared to the former (R(2)=0.902-0.989). (c) 2009 Elsevier B.V. All rights reserved.

  11. China’s Muslims: Separatism and Prospects for Ethnic Peace

    DTIC Science & Technology

    2006-09-01

    Management and Budget, Paperwork Reduction Project (0704-0188) Washington DC 20503. 1. AGENCY USE ONLY (Leave blank) 2. REPORT DATE September...unlike Uighur ethnic identity, Hui identity stems from and is compatible with the PRC and Chinese society. This study uses primary sources including...and is compatible with the PRC and Chinese society. This study uses primary sources including interviews with Uighurs, Hui and Han Chinese conducted

  12. Identity Management: Social Control of Identity by Children of Gay Fathers When They Know Their Father Is a Homosexual.

    ERIC Educational Resources Information Center

    Bozett, Frederick W.

    A study was conducted to examine how children cope with having a homosexual father so that helping professionals, and particularly nurses, might have a knowledge base upon which to base interventions. Data were obtained from indepth interviews with 19 individuals ranging in age from 14 to 35 who had a homosexual father. Two of the six male…

  13. Individual identity and organisational control: empowerment and modernisation in a primary care trust.

    PubMed

    McDonald, Ruth

    2004-11-01

    The notion of empowerment has been increasingly used within management discourses in recent years. Enthusiastic supporters conceive it as an acknowledgement of the individual employee as a talented, creative being, and hence a productive resource for contributing to organisational goals. Alternatively, more critical commentators have interpreted it as another means of exercising control over employees and their identities. Although various commentators have speculated on the management of identity as a means of organizational control, there is very little empirical work from which to draw conclusions. This paper, using participant observation and interview data, represents a contribution to the small body of empirical research in the area. It focuses on an initiative aimed ostensibly at 'empowering' staff in an English Primary Care Trust, which may be seen as an attempt at increasing organisational control by shaping employee identities. As such, these processes can be understood more readily in terms of ethics rather than empowerment. The term ethics is used here in a Foucauldian sense and is linked to the processes of self-definition and self-constraint by which individuals train themselves to become ethical persons. The paper suggests that the outcome of attempts to manufacture particular forms of subjectivity by such methods as 'empowerment' programmes may be very different from those intended.

  14. Testing the tenets of minority stress theory in workplace contexts.

    PubMed

    Velez, Brandon L; Moradi, Bonnie; Brewster, Melanie E

    2013-10-01

    The links of minority stressors (workplace discrimination, expectations of stigma, internalized heterosexism, and identity management strategies) with psychological distress and job satisfaction were examined in a sample of 326 sexual minority employees. Drawing from minority stress theory and the literature on the vocational experiences of sexual minority people, patterns of mediation and moderation were tested. Minority stressors were associated with greater distress and lower job satisfaction. A mediation model was supported in which the links of discrimination and internalized heterosexism with psychological distress were mediated by a concealment-focused identity management strategy (i.e., avoiding), and the links of discrimination, expectations of stigma, and internalized heterosexism with job satisfaction were mediated by a disclosure-focused identity management strategy (i.e., integrating). Tests of moderation indicated that for sexual minority women (but not men), the positive association of discrimination with distress was stronger at higher levels of internalized heterosexism than at lower levels. In addition, lower levels of internalized heterosexism and concealment strategies (i.e., counterfeiting and avoiding) and higher levels of a disclosure strategy (i.e., integrating) were associated with higher job satisfaction in the context of low discrimination, but this buffering effect disappeared as level of discrimination increased. The implications of these findings for minority stress research are discussed, and clinical recommendations are made.

  15. Active traffic management case study: phase 1 : final report.

    DOT National Transportation Integrated Search

    2016-03-01

    This study developed a systematic approach for using data from multiple sources to provide active traffic management : solutions. The feasibility of two active traffic management solutions is analyzed in this report: ramp-metering and real-time : cra...

  16. Identity-driven differences in stakeholder concerns about hunting wolves.

    PubMed

    Lute, Michelle L; Bump, Adam; Gore, Meredith L

    2014-01-01

    Whereas past wolf management in the United States was restricted to recovery, managers must now contend with publicly contentious post-recovery issues including regulated hunting seasons. Understanding stakeholder concerns associated with hunting can inform stakeholder engagement, communication, and policy development and evaluation. Social identity theory (SIT) has been used to understand how groups interact, why they conflict, and how collaboration may be achieved. Applying SIT to stakeholder conflicts about wolf hunting may help delineate groups according to their concern about, support for or opposition to the policy choice of hunting wolves. Our objective was to assess concerns about hunting as a tool to resolve conflict in Michigan, using SIT as a framework. We used a mixed-modal sampling approach (e.g., paper, Internet) with wolf hunting-related public meeting participants in March 2013. Survey questions focused on 12 concerns previously identified as associated with hunting as a management tool to resolve conflict. Respondents (n  =  666) cared greatly about wolves but were divided over hunting wolves. Wolf conflicts, use of science in policy decisions, and maintaining a wolf population were the highest ranked concerns. Principle components analysis reduced concerns into three factors that explained 50.7% of total variance; concerns crystallized over justifications for hunting. General linear models revealed a lack of geographic influence on care, fear and support for hunting related to wolves. These findings challenge assumptions about regional differences and suggest a strong role for social identity in driving dichotomized public perceptions in wildlife management.

  17. [Identity and dissociation in cyberspace. A case of dissociative identity disorder associated with internet role playing].

    PubMed

    Te Wildt, B T; Kowalewski, E; Meibeyer, F; Huber, T

    2006-01-01

    By mediating dissociative experiences, the Internet can challenge the boundaries of people's sense of identity. To illustrate this hypothesis, a case of dissociative identity disorder (DID) is presented. A young unemployed woman created and frequently played several characters in an online game. For more than 2 years she spent up to 12 h a day in the Internet, assuming various personalities, which in return intruded upon her neglected real life. During the course of an inpatient psychotherapeutic treatment, the clinical diagnosis of DID was confirmed by psychometric testing. After 12 weeks of psychotherapy, the patient had managed to identify her fragmented identities as character traits and integrated them into her core personality. She rearranged her real everyday life, found a new job, and reduced her online activities. Even though the patient's psychopathology stems from a disposition in terms of a personality disorder with histrionic and narcissistic features, excessive internet role play obviously functioned as a trigger to develop DIS. Conclusively, cyberspace's anonymous interactivity may offer the possibility to explore one's identity while also putting at risk its coherence.

  18. Teleworking: Benefits and Pitfalls as Perceived by Professionals and Managers.

    ERIC Educational Resources Information Center

    Baruch, Yehuda

    2000-01-01

    Interviews with 60 British teleworkers showed that working at home did not change their employee identity; time management skills were crucial; reduction of distractions was a prime benefit; and the home environment provided better relationships and support. Telecommuting resulted in changed attitudes, satisfaction, less stress, and better…

  19. Undocumented and Unafraid: Understanding the Disclosure Management Process for Undocumented College Students and Graduates

    ERIC Educational Resources Information Center

    Muñoz, Susana M.

    2016-01-01

    Previous qualitative studies on undocumented college students have primarily focused on their lived experiences; however, little research has been done to consider the disclosure process or identity management for undocumented students, particularly students who self-identify as "undocumented and unafraid." Using research on legal…

  20. The Education of Records and Information Management Professionals: A Pathway to Professional Identity

    ERIC Educational Resources Information Center

    Force, Donald C.

    2017-01-01

    Records and information management (RIM) professionals ensure that information flows seamlessly through organizations, thereby increasing worker productivity and facilitating the growth of the business. Yet, these professionals are often overlooked or confused with IT, archivists, secretaries, or mailroom workers. This article contends that the…

  1. Ready the Pipes

    ERIC Educational Resources Information Center

    Grayson, Katherine

    2010-01-01

    If there's anyone in the academic IT arena taking seriously the possibility that campus identity management (IdM) may one day meld with consumer apps, it's Nate Klingenstein, one of the founding members of the Shibboleth Project (the open source project providing architecture and policy structures for managing single sign-on access to resources).…

  2. Managing pets with behavior problems: realistic expectations.

    PubMed

    Horwitz, Debra F

    2008-09-01

    Management solutions offer a useful tool for owners faced with behavior issues in their pets. In some cases management will improve the behavior and allow control. In other situations it may be only the first step in treatment. By offering management solutions, veterinarians can help owners with problem pets and begin the road to recovery.

  3. Predictive validity of the Macleod Clark Professional Identity Scale for undergraduate nursing students.

    PubMed

    Worthington, Melissa; Salamonson, Yenna; Weaver, Roslyn; Cleary, Michelle

    2013-03-01

    The self-identification of nursing students with the profession has been linked with a successful transition, from being a student to being a professional nurse. Although there is no empirical evidence, there are suggestions that students with high professional identity are more likely to persist and complete their studies in their chosen profession. The purpose of this study was to evaluate the psychometric properties of a professional identity scale and to determine the relationship between professional identity and student retention in a large group of first year nursing students. A survey design was used to examine the professional identity of first year nursing students, as measured by the Macleod Clark Professional Identity Scale (MCPIS-9). Baseline data obtained from the initial surveys were then compared with student drop-out rates 12 months later. Exploratory factor analysis of the MCPIS-9 yielded a one-component solution, accounting for 43.3% of the variance. All 9 items loaded highly on one component, ranging from 0.50 to 0.79. Cronbach's alpha coefficient of the MCPIS-9 was 0.83 and corrected item-total correlation values all scored well above the 0.3 cut-off. Students who: were females, had previous nursing-related vocational training, reported nursing as their first choice, or engaged in nursing-related paid work, had statistically significant higher professional identity scores. Using logistic regression analysis, students with high professional identity scores at baseline were more likely to be still enrolled in the nursing program at 12 months, controlling for gender, language spoken at home and engagement in nursing-related employment. These results support the psychometric properties of the MCPIS-9. Professional identity has a direct relationship with student retention in the nursing program. It is important to adequately measure professional identity in nursing students for the purpose of monitoring and identifying students who are at risk of leaving nursing programs. Crown Copyright © 2012. Published by Elsevier Ltd. All rights reserved.

  4. The nucleobase cation symporter 1 of Chlamydomonas reinhardtii and that of the evolutionarily distant Arabidopsis thaliana display parallel function and establish a plant-specific solute transport profile.

    PubMed

    Schein, Jessica R; Hunt, Kevin A; Minton, Janet A; Schultes, Neil P; Mourad, George S

    2013-09-01

    The single cell alga Chlamydomonas reinhardtii is capable of importing purines as nitrogen sources. An analysis of the annotated C. reinhardtii genome reveals at least three distinct gene families encoding for known nucleobase transporters. In this study the solute transport and binding properties for the lone C. reinhardtii nucleobase cation symporter 1 (CrNCS1) are determined through heterologous expression in Saccharomyces cerevisiae. CrNCS1 acts as a transporter of adenine, guanine, uracil and allantoin, sharing similar - but not identical - solute recognition specificity with the evolutionary distant NCS1 from Arabidopsis thaliana. The results suggest that the solute specificity for plant NCS1 occurred early in plant evolution and are distinct from solute transport specificities of single cell fungal NCS1 proteins. Copyright © 2013 Elsevier Masson SAS. All rights reserved.

  5. Comparison of titanium soaked in 5 M NaOH or 5 M KOH solutions

    PubMed Central

    Kim, Christina; Kendall, Matthew R.; Miller, Matthew A.; Long, Courtney L.; Larson, Preston R.; Humphrey, Mary Beth; Madden, Andrew S.; Tas, A. Cuneyt

    2012-01-01

    Commercially pure titanium plates/coupons and pure titanium powders were soaked for 24 h in 5 M NaOH and 5 M KOH solutions, under identical conditions, over the temperature range of 37° to 90°C. Wettability of the surfaces of alkali-treated cpTi coupons were studied by using contact angle goniometry. cpTi coupons soaked in 5 M NaOH or 5 M KOH solutions were found to have hydrophilic surfaces. Hydrous alkali titanate nanofibers and nanotubes were identified with SEM/EDXS and grazing incidence XRD. Surface areas of Ti powders increased >50–220 times, depending on the treatment, when soaked in the above solutions. A solution was developed to coat amorphous calcium phosphate, instead of hydroxyapatite, on Ti coupon surfaces. In vitro cell culture tests were performed with osteoblast-like cells on the alkali-treated samples. PMID:23565038

  6. Comparison of nanoparticle diffusion using fluorescence correlation spectroscopy and differential dynamic microscopy within concentrated polymer solutions

    NASA Astrophysics Data System (ADS)

    Shokeen, Namita; Issa, Christopher; Mukhopadhyay, Ashis

    2017-12-01

    We studied the diffusion of nanoparticles (NPs) within aqueous entangled solutions of polyethylene oxide (PEO) by using two different optical techniques. Fluorescence correlation spectroscopy, a method widely used to investigate nanoparticle dynamics in polymer solution, was used to measure the long-time diffusion coefficient (D) of 25 nm radius particles within high molecular weight, Mw = 600 kg/mol PEO in water solutions. Differential dynamic microscopy (DDM) was used to determine the wave-vector dependent dynamics of NPs within the same polymer solutions. Our results showed good agreement between the two methods, including demonstration of normal diffusion and almost identical diffusion coefficients obtained by both techniques. The research extends the scope of DDM to study the dynamics and rheological properties of soft matter at a nanoscale. The measured diffusion coefficients followed a scaling theory, which can be explained by the coupling between polymer dynamics and NP motion.

  7. Technology for Anonymity: Names By Other Nyms.

    ERIC Educational Resources Information Center

    Wayner, Peter

    1999-01-01

    Provides a summary of some of the technical solutions for producing anonymous communication on the Internet and presents an argument that anonymity is as much a part of crime prevention as requiring people to provide their names. Discusses identity theft; the three major techniques that make anonymous cash possible; and anonymizing Internet…

  8. Exploiting Identical Generators in Unit Commitment

    DOE PAGES

    Knueven, Ben; Ostrowski, Jim; Watson, Jean -Paul

    2017-12-14

    Here, we present sufficient conditions under which thermal generators can be aggregated in mixed-integer linear programming (MILP) formulations of the unit commitment (UC) problem, while maintaining feasibility and optimality for the original disaggregated problem. Aggregating thermal generators with identical characteristics (e.g., minimum/maximum power output, minimum up/down-time, and cost curves) into a single unit reduces redundancy in the search space induced by both exact symmetry (permutations of generator schedules) and certain classes of mutually non-dominated solutions. We study the impact of aggregation on two large-scale UC instances, one from the academic literature and another based on real-world operator data. Our computationalmore » tests demonstrate that when present, identical generators can negatively affect the performance of modern MILP solvers on UC formulations. Further, we show that our reformation of the UC MILP through aggregation is an effective method for mitigating this source of computational difficulty.« less

  9. Exploiting Identical Generators in Unit Commitment

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Knueven, Ben; Ostrowski, Jim; Watson, Jean -Paul

    Here, we present sufficient conditions under which thermal generators can be aggregated in mixed-integer linear programming (MILP) formulations of the unit commitment (UC) problem, while maintaining feasibility and optimality for the original disaggregated problem. Aggregating thermal generators with identical characteristics (e.g., minimum/maximum power output, minimum up/down-time, and cost curves) into a single unit reduces redundancy in the search space induced by both exact symmetry (permutations of generator schedules) and certain classes of mutually non-dominated solutions. We study the impact of aggregation on two large-scale UC instances, one from the academic literature and another based on real-world operator data. Our computationalmore » tests demonstrate that when present, identical generators can negatively affect the performance of modern MILP solvers on UC formulations. Further, we show that our reformation of the UC MILP through aggregation is an effective method for mitigating this source of computational difficulty.« less

  10. Reciprocal Benefits, Legacy and Risk: Applying Ellinger and Bostrom's Model of Line Manager Role Identity as Facilitators of Learning

    ERIC Educational Resources Information Center

    Campbell, Paul; Evans, Peter

    2016-01-01

    Purpose: The purpose of this paper is to explore the beliefs held by managers about their roles as facilitators of learning with their employees in a public utilities organisation. Design/methodology/approach: The research was based on Ellinger and Bostrom's (2002) study on managers' beliefs on their role as facilitators of learning in…

  11. On the existence, uniqueness, and asymptotic normality of a consistent solution of the likelihood equations for nonidentically distributed observations: Applications to missing data problems

    NASA Technical Reports Server (NTRS)

    Peters, C. (Principal Investigator)

    1980-01-01

    A general theorem is given which establishes the existence and uniqueness of a consistent solution of the likelihood equations given a sequence of independent random vectors whose distributions are not identical but have the same parameter set. In addition, it is shown that the consistent solution is a MLE and that it is asymptotically normal and efficient. Two applications are discussed: one in which independent observations of a normal random vector have missing components, and the other in which the parameters in a mixture from an exponential family are estimated using independent homogeneous sample blocks of different sizes.

  12. On improvement of the series convergence in the problem of the vibrations of orhotropic rectangular prism

    NASA Astrophysics Data System (ADS)

    Lyashko, A. D.

    2017-11-01

    A new analytical presentation of the solution for steady-state oscillations of orthotopic rectangular prism is found. The corresponding infinite system of linear algebraic equations has been deduced by the superposition method. A countable set of precise eigenfrequencies and elementary eigenforms is found. The identities are found which make it possible to improve the convergence of all the infinite series in the solution of the problem. All the infinite series in presentation of solution are analytically summed up. Numerical calculations of stresses in the rectangular orthotropic prism with a uniform along the border and harmonic in time load on two opposite faces have been performed.

  13. Resolvent approach for two-dimensional scattering problems. Application to the nonstationary Schrödinger problem and the KPI equation

    NASA Astrophysics Data System (ADS)

    Boiti, M.; Pempinelli, F.; Pogrebkov, A. K.; Polivanov, M. C.

    1992-11-01

    The resolvent operator of the linear problem is determined as the full Green function continued in the complex domain in two variables. An analog of the known Hilbert identity is derived. We demonstrate the role of this identity in the study of two-dimensional scattering. Considering the nonstationary Schrödinger equation as an example, we show that all types of solutions of the linear problems, as well as spectral data known in the literature, are given as specific values of this unique function — the resolvent function. A new form of the inverse problem is formulated.

  14. Best packing of identical helices

    NASA Astrophysics Data System (ADS)

    Huh, Youngsik; Hong, Kyungpyo; Kim, Hyoungjun; No, Sungjong; Oh, Seungsang

    2016-10-01

    In this paper we prove the unique existence of a ropelength-minimizing conformation of the θ-spun double helix in a mathematically rigorous way, and find the minimal ropelength {{{Rop}}}* (θ )=-\\tfrac{8π }{t} where t is the unique solution in [-θ ,0] of the equation 2-2\\cos (t+θ )={t}2. Using this result, the pitch angles of the standard, triple and quadruple helices are around 39.3771^\\circ , 42.8354^\\circ and 43.8351^\\circ , respectively, which are almost identical with the approximated pitch angles of the zero-twist structures previously known by Olsen and Bohr. We also find the ropelength of the standard N-helix.

  15. Biometrics, identification and surveillance.

    PubMed

    Lyon, David

    2008-11-01

    Governing by identity describes the emerging regime of a globalizing, mobile world. Governance depends on identification but identification increasingly depends on biometrics. This 'solution' to difficulties of verification is described and some technical weaknesses are discussed. The role of biometrics in classification systems is also considered and is shown to contain possible prejudice in relation to racialized criteria of identity. Lastly, the culture of biometric identification is shown to be limited to abstract data, artificially separated from the lived experience of the body including the orientation to others. It is proposed that creators of national ID systems in particular address these crucial deficiencies in their attempt to provide new modes of verification.

  16. Blocked urinary catheters: solutions are not the only solution.

    PubMed

    Williams, Cath; Tonkin, Sharon

    2003-07-01

    The use of catheter maintenance solutions to manage clients whose catheters block has long been a subject for debate. An understanding of the causes of blockage, and awareness of appropriate management may reduce frequency of blockage and reduce unnecessary interruptions to a closed urinary drainage system.

  17. Navigating the self in maternity care: how Chinese midwives work on their professional identity in hospital setting.

    PubMed

    Zhang, Jing; Haycock-Stuart, Elaine; Mander, Rosemary; Hamilton, Lorna

    2015-03-01

    to explore the strategies Chinese midwives employed to work on their professional identity in hospital setting and the consequence of such identity work. this paper draws upon findings from a Constructivist Grounded Theory study that explored the professional identity construction of 15 Chinese midwives with a mixture of midwifery experiences, practising in three different types of hospital settings in a capital city in Southeast China. The accounts from participants in the form of in-depth individual interviews were collected. Work journals voluntarily provided by three participants were also included. in everyday practice, hospital midwives in China were working on their professional identity in relation to two definitions of the midwife: the external definition ('obstetric nurse'), bound up in the idea of risk management under the medical model of their work organisations; and the internal definition ('professional midwife'), associated with the philosophy of normal birth advocacy in the professional discourse. Six strategies for identity work were identified and grouped into two principle categories: 'compromise' and 'engagement'. The adoption of each strategy involved a constant negotiation between the external and internal definitions of the midwife, being influenced by midwifery experiences, relationships with women, opportunities for professional development and the definition of the situation. A 'hybrid identity', which demonstrated the dynamic nature of midwifery professional identity, was constructed as a result. this paper explored the dynamic nature of midwifery professional identity. This exploration contributes to the body of knowledge regarding understanding the professional identity of hospital midwives in China, while also extending the current theoretical knowledge of identity work by elaborating on the various strategies individuals use to work on their professional identity in the workplace. Copyright © 2014 Elsevier Ltd. All rights reserved.

  18. Make-to-order manufacturing - new approach to management of manufacturing processes

    NASA Astrophysics Data System (ADS)

    Saniuk, A.; Waszkowski, R.

    2016-08-01

    Strategic management must now be closely linked to the management at the operational level, because only in such a situation the company can be flexible and can quickly respond to emerging opportunities and pursue ever-changing strategic objectives. In these conditions industrial enterprises seek constantly new methods, tools and solutions which help to achieve competitive advantage. They are beginning to pay more attention to cost management, economic effectiveness and performance of business processes. In the article characteristics of make-to-order systems (MTO) and needs associated with managing such systems is identified based on the literature analysis. The main aim of this article is to present the results of research related to the development of a new solution dedicated to small and medium enterprises manufacture products solely on the basis of production orders (make-to- order systems). A set of indicators to enable continuous monitoring and control of key strategic areas this type of company is proposed. A presented solution includes the main assumptions of the following concepts: the Performance Management (PM), the Balanced Scorecard (BSC) and a combination of strategic management with the implementation of operational management. The main benefits of proposed solution are to increase effectiveness of MTO manufacturing company management.

  19. Managing flood risks in the Mekong Delta: How to address emerging challenges under climate change and socioeconomic developments.

    PubMed

    Hoang, Long Phi; Biesbroek, Robbert; Tri, Van Pham Dang; Kummu, Matti; van Vliet, Michelle T H; Leemans, Rik; Kabat, Pavel; Ludwig, Fulco

    2018-02-24

    Climate change and accelerating socioeconomic developments increasingly challenge flood-risk management in the Vietnamese Mekong River Delta-a typical large, economically dynamic and highly vulnerable delta. This study identifies and addresses the emerging challenges for flood-risk management. Furthermore, we identify and analyse response solutions, focusing on meaningful configurations of the individual solutions and how they can be tailored to specific challenges using expert surveys, content analysis techniques and statistical inferences. Our findings show that the challenges for flood-risk management are diverse, but critical challenges predominantly arise from the current governance and institutional settings. The top-three challenges include weak collaboration, conflicting management objectives and low responsiveness to new issues. We identified 114 reported solutions and developed six flood management strategies that are tailored to specific challenges. We conclude that the current technology-centric flood management approach is insufficient given the rapid socioecological changes. This approach therefore should be adapted towards a more balanced management configuration where technical and infrastructural measures are combined with institutional and governance resolutions. Insights from this study contribute to the emerging repertoire of contemporary flood management solutions, especially through their configurations and tailoring to specific challenges.

  20. Quantum mechanical probability current as electromagnetic 4-current from topological EM fields

    NASA Astrophysics Data System (ADS)

    van der Mark, Martin B.

    2015-09-01

    Starting from a complex 4-potential A = αdβ we show that the 4-current density in electromagnetism and the probability current density in relativistic quantum mechanics are of identical form. With the Dirac-Clifford algebra Cl1,3 as mathematical basis, the given 4-potential allows topological solutions of the fields, quite similar to Bateman's construction, but with a double field solution that was overlooked previously. A more general nullvector condition is found and wave-functions of charged and neutral particles appear as topological configurations of the electromagnetic fields.

  1. Varieties of operator manipulation. [for solving differential equations and calculating finite differences

    NASA Technical Reports Server (NTRS)

    Doohovskoy, A.

    1977-01-01

    A change in MACSYMA syntax is proposed to accommodate the operator manipulators necessary to implement direct and indirect methods for the solution of differential equations, calculus of finite differences, and the fractional calculus, as well as their modern counterparts. To illustrate the benefits and convenience of this syntax extension, an example is given to show how MACSYMA's pattern-matching capability can be used to implement a particular set of operator identities which can then be used to obtain exact solutions to nonlinear differential equations.

  2. Techniques for Accelerating Iterative Methods for the Solution of Mathematical Problems

    DTIC Science & Technology

    1989-07-01

    m, we can find a solu ion to the problem by using generalized inverses. Hence, ;= Ih.i = GAi = G - where G is of the form (18). A simple choice for V...have understood why I was not available for many of their activities and not home many of the nights. Their love is forever. I have saved the best for...Xk) Extrapolation applied to terms xP through Xk F Operator on x G Iteration function Ik Identity matrix of rank k Solution of the problem or the limit

  3. Governing the ethical consumer: identity, choice and the primary care medical encounter.

    PubMed

    McDonald, Ruth; Mead, Nicola; Cheraghi-Sohi, Sudeh; Bower, Peter; Whalley, Diane; Roland, Martin

    2007-04-01

    Government policy promoting consumerism in healthcare can be seen as offering up certain preferred identities to which its citizens are encouraged to aspire. Whilst many commentators reject the notion that health services users should be conceived of as consumers, this paper outlines the relevance of the concept to our understanding of the ways in which individuals manage their health and service use. The paper examines the identity work undertaken by individuals in relation to decisions about healthcare preferences and assesses the extent to which this is compatible with the identities promoted in Government policy. We suggest that in circumstances where individuals feel both a sense of personal entitlement and a desire to be supportive of the needs of other members of the community, 'doing' ethical consumer can be fraught with discomfort and anxiety. These anxieties are exacerbated in a context where citizenship is increasingly being defined in terms of consumer identities, and making good (health) choices might be seen as distinguishing the civilised from the marginalised.

  4. COLLABORATE©: A Universal Competency-Based Paradigm for Professional Case Management, Part II: Competency Clarification.

    PubMed

    Treiger, Teresa M; Fink-Samnick, Ellen

    2013-01-01

    The purpose of this second article of a 3-article series is to clarify the competencies for a new paradigm of case management built upon a value-driven foundation that : Applicable to all health care sectors where case management is practiced. In moving forward, the one fact that rings true is that there will be a constant change in our industry. As the health care terrain shifts and new influences continually surface, there will be consequences for case management practice. These impacts require nimble clinical professionals in possession of recognized and firmly established competencies. They must be agile to frame (and reframe) their professional practice to facilitate the best possible outcomes for their patients. Case managers can choose to be Gumby™ or Pokey™. This is exactly the time to define a competency-based case management model, highlighting one sufficiently fluid to fit into any setting of care. The practice of case management transcends the vast array of representative professional disciplines and educational levels. A majority of current models are driven by business priorities rather than the competencies critical to successful practice and quality patient outcomes. This results in a fragmented professional case management identity. Although there is an inherent value in what each discipline brings to the table, this advanced model unifies behind case management's unique, strengths-based identity instead of continuing to align within traditional divisions (e.g., discipline, work setting, population served). This model fosters case management's expanding career advancement opportunities, including a reflective clinical ladder.

  5. Individualism/collectivism and organizational citizenship behavior.

    PubMed

    Dávila de León, María Celeste; Finkelstein, Marcia A

    2011-08-01

    Organizational citizenship behaviors (OCB) are workplace activities that exceed an employee's formal job requirements and contribute to the effective functioning of the organization. We explored the roles of the dispositional traits of individualism and collectivism in the prediction of OCB. The relationship was examined in the context of other constructs known to influence OCB, specifically, motives and identity as an organizational citizen. A total of 367 employees in 24 organizations completed surveys measuring individualism/collectivism, OCB motives, strength of organizational citizen role identity, and amount of OCB. The results showed collectivism to be a significant predictor of Organizational Concern and Prosocial Values motives, role identity, and OCB. Individualism predicted Impression Management motives and was a significant negative predictor of a role identity as one who helps others. The findings are discussed with regard to previous research in OCB.

  6. Between normality and deviance: the breakdown of batterers' identity following police intervention.

    PubMed

    Buchbinder, Eli; Eisikovits, Zvi

    2004-04-01

    With the transformation of intimate violence from private trouble to social problem, police intervention in domestic violence cases became more prevalent. Research has focused mainly on battered women's perception of police intervention, their evaluations, and their level of satisfaction with the intervention. However, there is little research examining the perpetrators' subjective perceptions of such interventions. The purpose of this study is to describe and analyze battering men's perceptions of police intervention. The study is based on semistructured, in-depth interviews with 20 batterers who had repeated encounters with police. Findings show a continuum of self-management, ranging from attempts to preserve a normative identity in the first encounter to struggling against criminalization in the second encounter and adopting a victim identity in the third encounter. The findings are discussed in the context of gender identity and power relations.

  7. A network identity authentication protocol of bank account system based on fingerprint identification and mixed encryption

    NASA Astrophysics Data System (ADS)

    Zhu, Lijuan; Liu, Jingao

    2013-07-01

    This paper describes a network identity authentication protocol of bank account system based on fingerprint identification and mixed encryption. This protocol can provide every bank user a safe and effective way to manage his own bank account, and also can effectively prevent the hacker attacks and bank clerk crime, so that it is absolute to guarantee the legitimate rights and interests of bank users.

  8. Parkinson’s disease managing reversible neurodegeneration

    PubMed Central

    Hinz, Marty; Stein, Alvin; Cole, Ted; McDougall, Beth; Westaway, Mark

    2016-01-01

    Traditionally, the Parkinson’s disease (PD) symptom course has been classified as an irreversible progressive neurodegenerative disease. This paper documents 29 PD and treatment-induced systemic depletion etiologies which cause and/or exacerbate the seven novel primary relative nutritional deficiencies associated with PD. These reversible relative nutritional deficiencies (RNDs) may facilitate and accelerate irreversible progressive neurodegeneration, while other reversible RNDs may induce previously undocumented reversible pseudo-neurodegeneration that is hiding in plain sight since the symptoms are identical to the symptoms being experienced by the PD patient. Documented herein is a novel nutritional approach for reversible processes management which may slow or halt irreversible progressive neurodegenerative disease and correct reversible RNDs whose symptoms are identical to the patient’s PD symptoms. PMID:27103805

  9. Social support in the workplace for physicians in specialization training

    PubMed Central

    Mikkola, Leena; Suutala, Elina; Parviainen, Heli

    2018-01-01

    ABSTRACT When becoming a specialist, learning-through-service plays a significant role. The workplace affords good opportunities for learning, but the service-learning period may also impose stress on phycisians in specialization training. In medical work, social support has proved to be a very important factor in managing stress. Social support may afford advantages also for learning and professional identity building. However, little was known about how social support is perceived by doctors in specialization training. This study aimed to understand the perceptions of physicians in specialization training regarding social support communication in their workplace during their learning-through-service period. The study was conducted qualitatively by inductively analyzing the physicians’ descriptions of workplace communication. The dataset included 120 essays, 60 each from hospitals and primary healthcare centres. Physicians in specialization training explained the need of social support with the responsibilities and demands of their clinical work and the inability to control and manage their workloads. They perceived that social support works well for managing stress, but also for strengthening relational ties and one’s professional identity. A leader’s support was perceived as being effective, and both senior and junior colleagues were described as an important source of social support. Also co-workers, such as the individual nurse partner with whom one works, was mentioned as an important source of social support. The results of this study indicate that social support works at the relational and identity levels, which is due to the multi-functional nature of workplace communication. For example, consultation functions as situational problem-solving, but also the tone of social interaction is meaningful. Thus, strengthening one’s professional identity or collegial relationships requires further attention to workplace communication. Abbreviations PiST: Physician in specialization training PMID:29464988

  10. Social support in the workplace for physicians in specialization training.

    PubMed

    Mikkola, Leena; Suutala, Elina; Parviainen, Heli

    2018-12-01

    When becoming a specialist, learning-through-service plays a significant role. The workplace affords good opportunities for learning, but the service-learning period may also impose stress on phycisians in specialization training. In medical work, social support has proved to be a very important factor in managing stress. Social support may afford advantages also for learning and professional identity building. However, little was known about how social support is perceived by doctors in specialization training. This study aimed to understand the perceptions of physicians in specialization training regarding social support communication in their workplace during their learning-through-service period. The study was conducted qualitatively by inductively analyzing the physicians' descriptions of workplace communication. The dataset included 120 essays, 60 each from hospitals and primary healthcare centres. Physicians in specialization training explained the need of social support with the responsibilities and demands of their clinical work and the inability to control and manage their workloads. They perceived that social support works well for managing stress, but also for strengthening relational ties and one's professional identity. A leader's support was perceived as being effective, and both senior and junior colleagues were described as an important source of social support. Also co-workers, such as the individual nurse partner with whom one works, was mentioned as an important source of social support. The results of this study indicate that social support works at the relational and identity levels, which is due to the multi-functional nature of workplace communication. For example, consultation functions as situational problem-solving, but also the tone of social interaction is meaningful. Thus, strengthening one's professional identity or collegial relationships requires further attention to workplace communication. Abbreviations PiST: Physician in specialization training.

  11. Development of a change management system

    NASA Technical Reports Server (NTRS)

    Parks, Cathy Bonifas

    1993-01-01

    The complexity and interdependence of software on a computer system can create a situation where a solution to one problem causes failures in dependent software. In the computer industry, software problems arise and are often solved with 'quick and dirty' solutions. But in implementing these solutions, documentation about the solution or user notification of changes is often overlooked, and new problems are frequently introduced because of insufficient review or testing. These problems increase when numerous heterogeneous systems are involved. Because of this situation, a change management system plays an integral part in the maintenance of any multisystem computing environment. At the NASA Ames Advanced Computational Facility (ACF), the Online Change Management System (OCMS) was designed and developed to manage the changes being applied to its multivendor computing environment. This paper documents the research, design, and modifications that went into the development of this change management system (CMS).

  12. The Cascading Effects of Marginalization and Pathways of Resilience in Attaining Good Health Among LGBT Older Adults.

    PubMed

    Fredriksen-Goldsen, Karen I; Kim, Hyun-Jun; Bryan, Amanda E B; Shiu, Chengshi; Emlet, Charles A

    2017-02-01

    Lesbian, gay, bisexual, and transgender (LGBT) older adults comprise a diverse and growing health disparate population. In the present study, using the Health Equity Promotion Model, we investigated pathways by which LGBT older adults experience resilience, risk, and marginalization and their relationship to attaining positive health outcomes. Aging with Pride: National Health, Aging, and Sexuality/Gender Study (NHAS) is the first longitudinal research project designed to examine the health, aging, and well-being of LGBT adults aged 50 and older. Using data from 2014 (N = 2,415), we tested a structural equation model linking lifetime marginalization, identity affirmation and management, social and psychological resources, and health behaviors to positive health outcomes. Identity affirmation positively predicted social resources and mental health, and social resources positively predicted mental health. Marginalization was associated with fewer social resources for LGBT older adults with an open identity management style, lower identity affirmation for LGBT older adults who strategically concealed their sexual identity, and poorer mental health. Mental health was associated with better health behaviors, which in turn predicted positive physical health outcomes. Although a health disparate population, good health among LGBT older adults appears to be attained via multiple resilience and risk pathways. Providers must remain aware of the historical contexts in which LGBT older adults lived and the strengths they developed in order to understand their health and to develop tailored and targeted prevention and intervention services. © The Author 2017. Published by Oxford University Press on behalf of The Gerontological Society of America. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  13. Becoming an effective clinical engineering or biomedical technology manager.

    PubMed

    Brush, L C

    1992-01-01

    The BMET or CE Supervisor is a technical manager who is close to the actual work of a biomedical or clinical engineering department. The MPTI is a management training tool that has identified differences between the effective and less-effective technical managers. These behaviors or styles can be considered and applied to the clinical engineering and BMET work environments. Effective BMET or CE Supervisors have a management identity. They are both people-oriented and task-oriented. They are good problem-solvers, and will plan and structure the work tasks and environment. When the situation requires a change in plans, however, they can adapt to the new situation easily. If a decision needs to be made that affects the organization, they will check with higher management or peer managers. Less-effective BMET or CE Supervisors will make important decisions alone, without checking with others. They plan and structure tasks and the work environment, but they are less willing to change when faced with a new situation. They are not people-oriented, and their ability to assess social situations is low. Their need for achievement recognition is often too high. The work environment has an effect on how the competence of a manager is perceived. A "one-desk manager" in a small, one-person biomedical engineering department has more autonomy than a CE Supervisor in a large department. Working for a medical device manufacturing firm often requires a greater management identity. An engineering consultant is often a managing specialist, rather than a traditional manager.(ABSTRACT TRUNCATED AT 250 WORDS)

  14. South African managers in public service: On being authentic

    PubMed Central

    Simbhoo, Nirvana

    2014-01-01

    South African managers in public service consistently face challenges related to managing a well-adjusted and productive diverse workforce. Following the notion that leadership authenticity fosters positive psychological employee capacity, the aim of this study was to explore the meaning essence of authenticity as lived in the work–life experiences of senior managers in public service. Five senior managers in public service were purposefully selected based on their articulated challenges with being authentic at work, whilst attending a diversity sensitivity workshop. From a hermeneutic phenomenological perspective, in-depth interviews were used, and an interpretative phenomenological analysis yielded two predominant themes offering a description of what it means to be authentic. Authenticity is experienced as an affective state that results from a continuous self-appraisal of the extent to which expression of self is congruent with a subjective and socially constructed expectation of self in relation to others. Authenticity seems to develop through a continuous process of internal and external adaptation, and it leads to ultimately building a differentiated yet integrated identity of self. A reciprocal dynamic between feeling authentic and self-confidence alludes to the potential importance of authenticity dynamics in identity work. PMID:24434054

  15. South African managers in public service: on being authentic.

    PubMed

    Barnard, Antoni; Simbhoo, Nirvana

    2014-01-01

    South African managers in public service consistently face challenges related to managing a well-adjusted and productive diverse workforce. Following the notion that leadership authenticity fosters positive psychological employee capacity, the aim of this study was to explore the meaning essence of authenticity as lived in the work-life experiences of senior managers in public service. Five senior managers in public service were purposefully selected based on their articulated challenges with being authentic at work, whilst attending a diversity sensitivity workshop. From a hermeneutic phenomenological perspective, in-depth interviews were used, and an interpretative phenomenological analysis yielded two predominant themes offering a description of what it means to be authentic. Authenticity is experienced as an affective state that results from a continuous self-appraisal of the extent to which expression of self is congruent with a subjective and socially constructed expectation of self in relation to others. Authenticity seems to develop through a continuous process of internal and external adaptation, and it leads to ultimately building a differentiated yet integrated identity of self. A reciprocal dynamic between feeling authentic and self-confidence alludes to the potential importance of authenticity dynamics in identity work.

  16. A model for managing sources of groundwater pollution

    USGS Publications Warehouse

    Gorelick, Steven M.

    1982-01-01

    The waste disposal capacity of a groundwater system can be maximized while maintaining water quality at specified locations by using a groundwater pollutant source management model that is based upon linear programing and numerical simulation. The decision variables of the management model are solute waste disposal rates at various facilities distributed over space. A concentration response matrix is used in the management model to describe transient solute transport and is developed using the U.S. Geological Survey solute transport simulation model. The management model was applied to a complex hypothetical groundwater system. Large-scale management models were formulated as dual linear programing problems to reduce numerical difficulties and computation time. Linear programing problems were solved using a numerically stable, available code. Optimal solutions to problems with successively longer management time horizons indicated that disposal schedules at some sites are relatively independent of the number of disposal periods. Optimal waste disposal schedules exhibited pulsing rather than constant disposal rates. Sensitivity analysis using parametric linear programing showed that a sharp reduction in total waste disposal potential occurs if disposal rates at any site are increased beyond their optimal values.

  17. Using an electronic self-management tool to support patients with chronic kidney disease (CKD): a CKD clinic self-care model.

    PubMed

    Ong, Stephanie W; Jassal, Sarbjit V; Porter, Eveline; Logan, Alexander G; Miller, Judith A

    2013-01-01

    New healthcare delivery models are needed to enhance the patient experience and improve quality of care for individuals with chronic conditions such as kidney disease. One potential avenue is to implement self-management strategies. There is growing evidence that self-management interventions help optimize various aspects of chronic disease management. With the increasing use of information technology (IT) in health care, chronic disease management programs are incorporating IT solutions to support patient self-management practices. IT solutions have the ability to promote key principles of self-management, namely education, empowerment, and collaboration. Positive clinical outcomes have been demonstrated for a number of chronic conditions when IT solutions were incorporated into self-management programs. There is a paucity of evidence for self-management in chronic kidney disease (CKD) patients. Furthermore, IT strategies have not been tested in this patient population to the same extent as other chronic conditions (e.g., diabetes, hypertension). Therefore, it is currently unknown if IT strategies will promote self-management behaviors and lead to improvements in overall patient care. We designed and developed an IT solution called My KidneyCare Centre to support self-management strategies for patients with CKD. In this review, we discuss the rationale and vision of incorporating an electronic self-management tool to support the care of patients with CKD. © 2013 Wiley Periodicals, Inc.

  18. Sluggish gallbladder emptying and gastrointestinal transit after intake of common alcoholic beverages.

    PubMed

    Kasicka-Jonderko, A; Jonderko, K; Gajek, E; Piekielniak, A; Zawislan, R

    2014-02-01

    To study the movement along the gut and the effect upon the gallbladder volume of alcoholic beverages taken in the interdigestive state. The study comprised three research blocks attended by 12 healthy subjects each. Within a given research block volunteers underwent three examination sessions held on separate days, being offered an alcoholic beverage, or an aqueous ethanol solution of an identical proof, or a corresponding volume of isotonic glucose solution; the order of administration of the drinks was randomized. The beverages tested were: beer (4.7% vol, 400 ml), red wine (13.7% vol, 200 ml), whisky (43.5% vol, 100 ml) within the "Beer", "Wine", and "Whisky" research block, respectively. Gastric myoelectrical activity was examined electrogastrographically, gastric emptying with ¹³C-sodium acetate breath test, orocaecal transit with lactulose H₂ breath test, gallbladder emptying with ultrasonography, breath ethanol with alcotest. The study showed that alcoholic beverages were emptied from the stomach significantly slower than isotonic glucose. Alcoholic beverages produced by fermentation only (beer, red wine) were emptied from the stomach more slowly than ethanol solutions of identical proof, while gastric evacuation of whisky (distillation product) and matching alcohol solution was similar. The slower gastric evacuation of alcoholic beverages and ethanol solutions could not be ascribed to a disorganization of the gastric myoelectrical activity. The orocaecal transit of beer and red wine did not differ from that of isotonic glucose, whereas the orocaecal transit of whisky and high proof ethanol was markedly prolonged. Red wine and whisky, and to a similar extent control ethanol solutions caused an inhibition and delay of gallbladder emptying. We concluded that alcoholic beverages taken on an empty stomach exert a suppressive effect upon the transport function of the digestive tract and gallbladder emptying. The extent of this action depends on the type of a beverage (whether it is obtained from fermentation only, or fermentation followed by distillation) and ethanol concentration therein.

  19. On Becoming Batman: An Ethnographic Examination of Hero Imagery in Early-Career Residential Life Emergency Management

    ERIC Educational Resources Information Center

    Molina, Danielle K.

    2016-01-01

    Emergency response is an essential function of all residential life staff, but particularly for resident assistants serving on the front line. This organizational ethnography examined the role that professional identity played for early-career residential life practitioners engaged in emergency management. The data elucidated heroism as a…

  20. 41 CFR 51-9.302 - Times, places and requirements for access requests.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 1 2010-07-01 2010-07-01 true Times, places and requirements for access requests. 51-9.302 Section 51-9.302 Public Contracts and Property Management Other... Director may require a notarized statement of identity. The Executive Director shall ensure that such times...

Top