Sample records for identity management solutions

  1. Claims and Identity: On-Premise and Cloud Solutions

    NASA Astrophysics Data System (ADS)

    Bertocci, Vittorio

    Today's identity-management practices are often a patchwork of partial solutions, which somehow accommodate but never really integrate applications and entities separated by technology and organizational boundaries. The rise of Software as a Service (SaaS) and cloud computing, however, will force organizations to cross such boundaries so often that ad hoc solutions will simply be untenable. A new approach that tears down identity silos and supports a de-perimiterized IT by design is in order.This article will walk you through the principles of claims-based identity management, a model which addresses both traditional and cloud scenarios with the same efficacy. We will explore the most common token exchange patterns, highlighting the advantages and opportunities they offer when applied on cloud computing solutions and generic distributed systems.

  2. Playing It Safe: Identity Management and Single Sign-On

    ERIC Educational Resources Information Center

    Alawneh, John

    2012-01-01

    Whenever thousands of users need to connect seamlessly to a vast number of online resources, identity management (IDM) becomes a critical capability. Although several products on the market can deliver a robust identity management solution, there is no one-size-fits-all. Identity management requires business processes and a supporting…

  3. A Federated Digital Identity Management Approach for Business Processes

    NASA Astrophysics Data System (ADS)

    Bertino, Elisa; Ferrini, Rodolfo; Musci, Andrea; Paci, Federica; Steuer, Kevin J.

    Business processes have gained a lot of attention because of the pressing need for integrating existing resources and services to better fulfill customer needs. A key feature of business processes is that they are built from composable services, referred to as component services, that may belong to different domains. In such a context, flexible multi-domain identity management solutions are crucial for increased security and user-convenience. In particular, it is important that during the execution of a business process the component services be able to verify the identity of the client to check that it has the required permissions for accessing the services. To address the problem of multi-domain identity management, we propose a multi-factor identity attribute verification protocol for business processes that assures clients privacy and handles naming heterogeneity.

  4. Biometric identity management for standard mobile medical networks.

    PubMed

    Egner, Alexandru; Soceanu, Alexandru; Moldoveanu, Florica

    2012-01-01

    The explosion of healthcare costs over the last decade has prompted the ICT industry to respond with solutions for reducing costs while improving healthcare quality. The ISO/IEEE 11073 family of standards recently released is the first step towards interoperability of mobile medical devices used in patient environments. The standards do not, however, tackle security problems, such as identity management, or the secure exchange of medical data. This paper proposes an enhancement of the ISO/IEEE 11073-20601 protocol with an identity management system based on biometry. The paper describes a novel biometric-based authentication process, together with the biometric key generation algorithm. The proposed extension of the ISO/IEEE 11073-20601 is also presented.

  5. Identity management and privacy languages technologies: Improving user control of data privacy

    NASA Astrophysics Data System (ADS)

    García, José Enrique López; García, Carlos Alberto Gil; Pacheco, Álvaro Armenteros; Organero, Pedro Luis Muñoz

    The identity management solutions have the capability to bring confidence to internet services, but this confidence could be improved if user has more control over the privacy policy of its attributes. Privacy languages could help to this task due to its capability to define privacy policies for data in a very flexible way. So, an integration problem arises: making work together both identity management and privacy languages. Despite several proposals for accomplishing this have already been defined, this paper suggests some topics and improvements that could be considered.

  6. 76 FR 13666 - Pitney Bowes, Inc., Mailing Solutions Management, Global Engineering Group, Including On-Site...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-14

    ...., Mailing Solutions Management, Global Engineering Group, Including On-Site Leased Workers From Guidant... workers and former workers of Pitney Bowes, Inc., Mailing Solutions Management Division, Engineering... reviewed the certification to clarify the subject worker group's identity. Additional information revealed...

  7. Responses to professional identity threat: Identity management strategies in incident narratives of health care professionals.

    PubMed

    van Os, Annemiek; de Gilder, Dick; van Dyck, Cathy; Groenewegen, Peter

    2015-01-01

    The purpose of this paper is to explore sensemaking of incidents by health care professionals through an analysis of the role of professional identity in narratives of incidents. Using insights from social identity theory, the authors argue that incidents may create a threat of professional identity, and that professionals make use of identity management strategies in response to this identity threat. The paper draws on a qualitative analysis of incident narratives in 14 semi-structured interviews with physicians, nurses, and residents at a Dutch specialist hospital. The authors used an existing framework of identity management strategies to categorize the narratives. The analysis yielded two main results. First, nurses and residents employed multiple types of identity management strategies simultaneously, which points to the possible benefit of combining different strategies. Second, physicians used the strategy of patronization of other professional groups, a specific form of downward comparison. The authors discuss the implications of the findings in terms of the impact of identity management strategies on the perpetuation of hierarchical differences in health care. The authors argue that efforts to manage incident handling may profit from considering social identity processes in sensemaking of incidents. This is the first study that systematically explores how health care professionals use identity management strategies to maintain a positive professional identity in the face of incidents. This study contributes to research on interdisciplinary cooperation in health care.

  8. 76 FR 2710 - Pitney Bowes, Inc., Mailing Solutions Management Division Including On-Site Leased Workers of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-01-14

    ...., Mailing Solutions Management Division Including On-Site Leased Workers of Guidant Group, and Teleworkers... Bowes, Inc., Mailing Solutions Management Division, Engineering Quality Assurance, Shelton, Connecticut... identity of the subject worker group. The worker group consists of workers of Pitney Bowes, Inc., the...

  9. Achieving Privacy in a Federated Identity Management System

    NASA Astrophysics Data System (ADS)

    Landau, Susan; Le van Gong, Hubert; Wilton, Robin

    Federated identity management allows a user to efficiently authenticate and use identity information from data distributed across multiple domains. The sharing of data across domains blurs security boundaries and potentially creates privacy risks. We examine privacy risks and fundamental privacy protections of federated identity- management systems. The protections include minimal disclosure and providing PII only on a “need-to-know” basis. We then look at the Liberty Alliance system and analyze previous privacy critiques of that system. We show how law and policy provide privacy protections in federated identity-management systems, and that privacy threats are best handled using a combination of technology and law/policy tools.

  10. Improving Measurement of Workplace Sexual Identity Management

    ERIC Educational Resources Information Center

    Lance, Teresa S.; Anderson, Mary Z.; Croteau, James M.

    2010-01-01

    The purpose of this study was to advance measurement of sexual identity management for lesbian, gay, and bisexual workers. Psychometric properties of a revised version of the Workplace Sexual Identity Management Measure (WSIMM; Anderson, Croteau, Chung, & DiStefano, 2001) were examined on a sample of 64 predominantly White K-12 teachers.…

  11. Solving Identity Management and Interoperability Problems at Pan-European Level

    NASA Astrophysics Data System (ADS)

    Sánchez García, Sergio; Gómez Oliva, Ana

    In a globalized digital world, it is essential for persons and entities to have a recognized and unambiguous electronic identity that allows them to communicate with one another. The management of this identity by public administrations is an important challenge that becomes even more crucial when interoperability among public administrations of different countries becomes necessary, as persons and entities have different credentials depending on their own national legal frameworks. More specifically, different credentials and legal frameworks cause interoperability problems that prevent reliable access to public services in a cross-border scenarios like today's European Union. Work in this doctoral thesis try to analyze the problem in a carefully detailed manner by studying existing proposals (basically in Europe), proposing improvements in defined architectures and performing practical work to test the viability of solutions. Moreover, this thesis will also address the long-standing security problem of identity delegation, which is especially important in complex and heterogeneous service delivery environments like those mentioned above. This is a position paper.

  12. Exploring medical identity theft.

    PubMed

    Mancilla, Desla; Moczygemba, Jackie

    2009-09-16

    The crime of medical identity theft is a growing concern in healthcare institutions. A mixed-method study design including a two-stage electronic survey, telephone survey follow-up, and on-site observations was used to evaluate current practices in admitting and registration departments to reduce the occurrence of medical identity theft. Survey participants were chief compliance officers in acute healthcare organizations and members of the Health Care Compliance Association. Study results indicate variance in whether or how patient identity is confirmed in healthcare settings. The findings of this study suggest that information systems need to be designed for more efficient identity management. Admitting and registration staff must be trained, and compliance with medical identity theft policies and procedures must be monitored. Finally, biometric identity management solutions should be considered for stronger patient identification verification.

  13. Exploring Medical Identity Theft

    PubMed Central

    Mancilla, Desla; Moczygemba, Jackie

    2009-01-01

    The crime of medical identity theft is a growing concern in healthcare institutions. A mixed-method study design including a two-stage electronic survey, telephone survey follow-up, and on-site observations was used to evaluate current practices in admitting and registration departments to reduce the occurrence of medical identity theft. Survey participants were chief compliance officers in acute healthcare organizations and members of the Health Care Compliance Association. Study results indicate variance in whether or how patient identity is confirmed in healthcare settings. The findings of this study suggest that information systems need to be designed for more efficient identity management. Admitting and registration staff must be trained, and compliance with medical identity theft policies and procedures must be monitored. Finally, biometric identity management solutions should be considered for stronger patient identification verification. PMID:20169017

  14. Intergroup conflict management strategies as related to perceptions of dual identity and separate groups.

    PubMed

    Bizman, Aharon; Yinon, Yoel

    2004-04-01

    The authors examined the relations between (a) the perceptions of dual identity and separate groups and (b) intergroup conflict management strategies, in two contexts: the conflict between the secular and religious sectors in Israel and the allocation of resources among organizational subunits. In both contexts, contention (i.e., forcing one's will on the other party) was associated with the perception of separate groups. Only in the organizational context, avoidance (i.e., doing nothing or discontinuing participation in the conflict) was associated with the perception of dual identity. Problem solving (i.e., finding a solution that is acceptable to both parties) was related to the perception of dual identity in the secular-religious context. In the organizational context, this relation appeared only under a low perception of separate groups. Yielding (i.e., satisfying the other party's needs at the expense of one's own) was related to the perception of dual identity in the organizational context. In the secular-religious context, this relation appeared only under a high perception of separate groups. The authors discussed the varying pattern of the associations between (a) the perceptions of dual identity and separate groups and (b) the conflict management strategies in the two contexts in terms of the Dual Concern Model and the perceived feasibility of the strategies.

  15. Building an Identity Management Governance Process

    ERIC Educational Resources Information Center

    Berg, Joanne E.; Kraemer, Ron; Raatz, Carla; Devoti, Steve

    2009-01-01

    A particular challenge in any campus environment is determining how requests for access to services and resources are managed. Who decides the technology, infrastructure, policy, business process and procedure? The involvement of key institutional leaders and stakeholders in identity management governance is the driving force behind the way the…

  16. Exploiting OAuth 2.0: from User Delegation for OGC Services to a Generic Federation-as-a-Service Solution for Federated Identity Management

    NASA Astrophysics Data System (ADS)

    Kershaw, Philip; Jensen, Jens; Stephens, Ag; van Engen, Willem

    2013-04-01

    We explore an application of OAuth to enable user delegation for OGC-based services and the evolution of this solution to form part of a wider Federation-as-a-Service offering for federated identity management. OAuth has established itself in the commercial sector as a means for users to delegate access to secured resources under their control to third parties. It has also found its way into the academic and research domains as a solution for user delegation. Notable examples including the CILogon project for Teragrid in the US, and also, closer to the Earth Sciences, as part of the OGC Web Services, Phase 6 Testbed. Both are examples of OAuth 1.0 implementations. Version 2.0 has seen significant changes to this original specification which have not been without controversy but it has arguably provided a greater degree of flexibility in how it can be applied and the use cases that it can address. At CEDA (Centre for Environmental Data Archival, STFC), a Python implementation of OAuth 2.0 was made to explore these capabilities with a focus on providing a solution for user delegation for data access, processing and visualisation services for the Earth Observation and Climate sciences domains. The initial goal was to provide a means of delegating short-lived user credentials to trusted services along the same lines as the established approach of Proxy certificates widely used in Grid computing. For the OGC and other HTTP-based services employed by CEDA, OAuth makes a natural fit for this role, integrating with minimal impact on existing interfaces. Working implementations have been made for CEDA's COWS Web Processing Service and Web Map Service. Packaging the software and making it available in Open Source repositories together with the generic nature of the solution have made it readily exploitable in other application domains. At the Max Planck Institute for Psycholinguistics (Nijmegen, The Netherlands), the software will be used to integrate some tools in the

  17. Working to reduce the effects of discrimination: Identity management strategies in organizations.

    PubMed

    Shih, Margaret; Young, Maia J; Bucher, Amy

    2013-04-01

    Despite efforts to dispel discrimination, workplace discrimination still occurs. We introduce two classes of identity management strategies individuals use to mitigate the negative consequences of discrimination: identity switching (i.e., deemphasizing target identities and recategorizing to a more positively valued identity) and identity redefinition (i.e., stereotype reassociation and regeneration). Organizations adopting a color-blind approach may make it more difficult for individuals to use identity switching because the policies deemphasize differences in social identities. In contrast, organizations adopting a multicultural approach may make it more difficult for individuals to use identity redefinition. Multicultural approaches, applied superficially, may celebrate group differences that might actually reinforce culturally dominant stereotypes. We explore the likelihood that individuals will adopt each strategy given these organizational approaches to diversity. We outline steps organizations can take to reduce the need for identity management strategies and to facilitate identity management when necessary.

  18. 6 Keys to Identity Management

    ERIC Educational Resources Information Center

    Shoham, Idan

    2011-01-01

    An Identity and Access Management (IAM) project on campus can feel like a Sisyphean task: Just when access rights have finally been sorted out, the semester ends--and users change roles, leave campus, or require new processes. IT departments face a constantly changing technical landscape: (1) integrating new applications and retiring old ones; (2)…

  19. Social identity management strategies used by workers with acquired hearing loss.

    PubMed

    Jennings, Mary Beth; Southall, Kenneth; Gagné, Jean-Pierre

    2013-01-01

    There is a paucity of knowledge about social identity-management by persons with hearing loss. The objective of the study was to gain an understanding from the perspective of the participants, the ways in which workers with acquired hearing loss manage their identity in the workplace. Twelve persons with acquired hearing loss, who were gainfully employed in a variety of settings and occupations in three Canadian cities, participated in audio-recorded semi-structured interviews. A secondary qualitative analysis was conducted on transcripts of interviews collected in a previous study on factors that influence disclosure of hearing loss in the workplace. A qualitative descriptive research paradigm was adopted and content analyses were used to extract pertinent information from verbatim transcripts. Participants described a range of identity-management strategies enacted in the workplace. Five recurrent themes emerged as important considerations in the Art of Identity Management in the workplace: 1. Managing the situation, 2. Having a buddy system, 3. Feeling comfortable, 4. Using personal resources, 5. It gets easier with time. Social identity-management is a complex process. Although persons with acquired hearing loss experience different challenges from other persons with invisible stigmas, similarities in the range of social identity-management strategies employed were evident in our findings. In addition, the social cognitive learning model of disclosure appears to be relevant to the experiences of our participants. The implications of the findings emphasize the importance of all stakeholders working collaboratively to address the issues of the growing population of workers with hearing loss.

  20. CILogon: An Integrated Identity and Access Management Platform for Science

    NASA Astrophysics Data System (ADS)

    Basney, J.

    2016-12-01

    When scientists work together, they use web sites and other software to share their ideas and data. To ensure the integrity of their work, these systems require the scientists to log in and verify that they are part of the team working on a particular science problem. Too often, the identity and access verification process is a stumbling block for the scientists. Scientific research projects are forced to invest time and effort into developing and supporting Identity and Access Management (IAM) services, distracting them from the core goals of their research collaboration. CILogon provides an IAM platform that enables scientists to work together to meet their IAM needs more effectively so they can allocate more time and effort to their core mission of scientific research. The CILogon platform enables federated identity management and collaborative organization management. Federated identity management enables researchers to use their home organization identities to access cyberinfrastructure, rather than requiring yet another username and password to log on. Collaborative organization management enables research projects to define user groups for authorization to collaboration platforms (e.g., wikis, mailing lists, and domain applications). CILogon's IAM platform serves the unique needs of research collaborations, namely the need to dynamically form collaboration groups across organizations and countries, sharing access to data, instruments, compute clusters, and other resources to enable scientific discovery. CILogon provides a software-as-a-service platform to ease integration with cyberinfrastructure, while making all software components publicly available under open source licenses to enable re-use. Figure 1 illustrates the components and interfaces of this platform. CILogon has been operational since 2010 and has been used by over 7,000 researchers from more than 170 identity providers to access cyberinfrastructure including Globus, LIGO, Open Science Grid

  1. Identity and Access Management and Security in Higher Education.

    ERIC Educational Resources Information Center

    Bruhn, Mark; Gettes, Michael; West, Ann

    2003-01-01

    Discusses the drivers for an identity management system (IdM), components of this system, and its role within a school security strategy, focusing on: basic access management; requirements for access management; middleware support for an access management system; IdM implementation considerations (e.g., access eligibilities, authentication…

  2. Integrating Identity Management With Federated Healthcare Data Models

    NASA Astrophysics Data System (ADS)

    Hu, Jun; Peyton, Liam

    In order to manage performance and provide integrated services, health care data needs to be linked and aggregated across data sources from different organizations. The Internet and secure B2B networks offer the possibility of providing near real-time integration. However, there are three major stumbling blocks. One is to standardize and agree upon a common data model across organizations. The second is to match identities between different locations in order to link and aggregate records. The third is to protect identity and ensure compliance with privacy laws. In this paper, we analyze three main approaches to the problem and use a healthcare scenario to illustrate how each one addresses different aspects of the problem while failing to address others. We then present a systematic framework in which the different approaches can be flexibly combined for a more comprehensive approach to integrate identity management with federated healthcare data models.

  3. Strategies for managing impressions of racial identity in the workplace.

    PubMed

    Roberts, Laura Morgan; Cha, Sandra E; Kim, Sung Soo

    2014-10-01

    This article deepens understanding of the workplace experiences of racial minorities by investigating racial identity-based impression management (RIM) by Asian American journalists. Racial centrality, directly or indirectly, predicted the use of 4 RIM strategies (avoidance, enhancement, affiliation, and racial humor). Professional centrality also predicted strategy use, which was related to life satisfaction and perceived career success. By shedding light on proactive strategies that individuals use to influence colleagues' impressions of their racial identity, we contribute to research on diversity in organizations, impression management, and racial identity. (PsycINFO Database Record (c) 2014 APA, all rights reserved).

  4. [Meanings attributed to management as an explanation for clinician managers' attitudes and professional identity].

    PubMed

    Cascón-Pereira, Rosalía; Valverde, Mireia

    2014-01-01

    To understand the process by which clinician managers construct their professional identities and develop their attitudes toward managing. A qualitative study was performed, based on grounded theory, through in-depth interviews with 20 clinician managers selected through theoretical sampling in two public hospitals of Catalonia (Spain), participant observation, and documentation. Clinician managers' role meanings are constructed by comparing their roles with those of senior managers and clinicians. In this process, clinician managers seek to differentiate themselves from senior managers through the meanings constructed. In particular, they use proximity with reality and clinical knowledge as the main sources of differentiation. This study sheds light on why clinician managers develop adverse attitudes to managing and why they define themselves as clinicians rather than as managers. The explanation lies in the construction of the meanings they assign to managing as the basis of their attitudes to this role and professional identity. These findings have some practical implications for healthcare management. Copyright © 2014. Published by Elsevier Espana.

  5. Developing an Assessment of Sexual Identity Management for Lesbian and Gay Workers.

    ERIC Educational Resources Information Center

    Anderson, Mary Z.; Croteau, James M.; DiStefano, Teresa M.; Chung, Y. Barry

    2001-01-01

    Psychometric properties of the Workplace Sexual Identity Management Measure were tested with 172 professionals. Results suggest it successfully assesses a continuum of lesbian and gay identity management strategies (passing, covering, implicitly out, explicitly out). (Contains 27 references.) (SK)

  6. British-Pakistani women's perspectives of diabetes self-management: the role of identity.

    PubMed

    Majeed-Ariss, Rabiya; Jackson, Cath; Knapp, Peter; Cheater, Francine M

    2015-09-01

    To explore the effects of type 2 diabetes on British-Pakistani women's identity and its relationship with self-management. Type 2 diabetes is more prevalent and has worse outcomes among some ethnic minority groups. This may be due to poorer self-management and an inadequate match of health services to patient needs. The influence that type 2 diabetes has on British-Pakistani women's identity and subsequent self-management has received limited attention. An explorative qualitative study. Face-to-face semi-structured English and Urdu language interviews were conducted with a purposively selected heterogeneous sample of 15 British-Pakistani women with type 2 diabetes. Transcripts were analysed thematically. Four themes emerged: Perceived change in self emphasised how British-Pakistani women underwent a conscious adaptation of identity following diagnosis; Familiarity with ill health reflected women's adjustment to their changed identity over time; Diagnosis improves social support enabled women to accept changes within themselves and Supporting family is a barrier to self-management demonstrated how family roles were an aspect of women's identities that was resilient to change. The over-arching theme Role re-alignment enables successful self-management encapsulated how self-management was a continuous process where achievements needed to be sustained. Inter-generational differences were also noted: first generation women talked about challenges associated with ageing and co-morbidities; second generation women talked about familial and work roles competing with self-management. The complex nature of British-Pakistani women's self-identification requires consideration when planning and delivering healthcare. Culturally competent practice should recognise how generational status influences self-identity and diabetes self-management in ethnically diverse women. Health professionals should remain mindful of effective self-management occurring alongside, and being

  7. Does identity shape leadership and management practice? Experiences of PHC facility managers in Cape Town, South Africa

    PubMed Central

    Daire, Judith; Gilson, Lucy

    2014-01-01

    In South Africa, as elsewhere, Primary Health Care (PHC) facilities are managed by professional nurses. Little is known about the dimensions and challenges of their job, or what influences their managerial practice. Drawing on leadership and organizational theory, this study explored what the job of being a PHC manager entails, and what factors influence their managerial practice. We specifically considered whether the appointment of professional nurses as facility managers leads to an identity transition, from nurse to manager. The overall intention was to generate ideas about how to support leadership development among PHC facility managers. Adopting case study methodology, the primary researcher facilitated in-depth discussions (about their personal history and managerial experiences) with eight participating facility managers from one geographical area. Other data were collected through in-depth interviews with key informants, document review and researcher field notes/journaling. Analysis involved data triangulation, respondent and peer review and cross-case analysis. The experiences show that the PHC facility manager’s job is dominated by a range of tasks and procedures focused on clinical service management, but is expected to encompass action to address the population and public health needs of the surrounding community. Managing with and through others, and in a complex system, requiring self-management, are critical aspects of the job. A range of personal, professional and contextual factors influence managerial practice, including professional identity. The current largely facility-focused management practice reflects the strong nursing identity of managers and broader organizational influences. However, three of the eight managers appear to self-identify an emerging leadership identity and demonstrate related managerial practices. Nonetheless, there is currently limited support for an identity transition towards leadership in this context. Better

  8. Working to Reduce the Effects of Discrimination: Identity Management Strategies in Organizations

    ERIC Educational Resources Information Center

    Shih, Margaret; Young, Maia J.; Bucher, Amy

    2013-01-01

    Despite efforts to dispel discrimination, workplace discrimination still occurs. We introduce two classes of identity management strategies individuals use to mitigate the negative consequences of discrimination: identity switching (i.e., deemphasizing target identities and recategorizing to a more positively valued identity) and identity…

  9. Searching for Extended Identity: The Problematised Role of Managing People Development, as Illuminated by the Frontline Management Initiative.

    ERIC Educational Resources Information Center

    Barratt-Pugh, Llandis

    Australia's Frontline Management Initiative (FMI) marks a political move toward workplace learning and provides evidence concerning development of managing identities and management of such workplace learning. The FMI was examined as a technology of identity within the discourse of enterprise and an instrument of textualization of the workplace.…

  10. The Formation of Professional Identity in French "Apprenti" Managers

    ERIC Educational Resources Information Center

    Angot, Jacques; Malloch, Hedley; Kleymann, Birgit

    2008-01-01

    Purpose: The paper aims to show how professional identity is constructed at a very early stage of initial management education. In so doing, it questions the notion of "le metier" in management. Design/methodology/approach: The paper is based on a study of the experiences of six French management apprentices (or apprentis) who…

  11. Globus Identity, Access, and Data Management: Platform Services for Collaborative Science

    NASA Astrophysics Data System (ADS)

    Ananthakrishnan, R.; Foster, I.; Wagner, R.

    2016-12-01

    Globus is software-as-a-service for research data management, developed at, and operated by, the University of Chicago. Globus, accessible at www.globus.org, provides high speed, secure file transfer; file sharing directly from existing storage systems; and data publication to institutional repositories. 40,000 registered users have used Globus to transfer tens of billions of files totaling hundreds of petabytes between more than 10,000 storage systems within campuses and national laboratories in the US and internationally. Web, command line, and REST interfaces support both interactive use and integration into applications and infrastructures. An important component of the Globus system is its foundational identity and access management (IAM) platform service, Globus Auth. Both Globus research data management and other applications use Globus Auth for brokering authentication and authorization interactions between end-users, identity providers, resource servers (services), and a range of clients, including web, mobile, and desktop applications, and other services. Compliant with important standards such as OAuth, OpenID, and SAML, Globus Auth provides mechanisms required for an extensible, integrated ecosystem of services and clients for the research and education community. It underpins projects such as the US National Science Foundation's XSEDE system, NCAR's Research Data Archive, and the DOE Systems Biology Knowledge Base. Current work is extending Globus services to be compliant with FEDRAMP standards for security assessment, authorization, and monitoring for cloud services. We will present Globus IAM solutions and give examples of Globus use in various projects for federated access to resources. We will also describe how Globus Auth and Globus research data management capabilities enable rapid development and low-cost operations of secure data sharing platforms that leverage Globus services and integrate them with local policy and security.

  12. Does identity shape leadership and management practice? Experiences of PHC facility managers in Cape Town, South Africa.

    PubMed

    Daire, Judith; Gilson, Lucy

    2014-09-01

    In South Africa, as elsewhere, Primary Health Care (PHC) facilities are managed by professional nurses. Little is known about the dimensions and challenges of their job, or what influences their managerial practice. Drawing on leadership and organizational theory, this study explored what the job of being a PHC manager entails, and what factors influence their managerial practice. We specifically considered whether the appointment of professional nurses as facility managers leads to an identity transition, from nurse to manager. The overall intention was to generate ideas about how to support leadership development among PHC facility managers. Adopting case study methodology, the primary researcher facilitated in-depth discussions (about their personal history and managerial experiences) with eight participating facility managers from one geographical area. Other data were collected through in-depth interviews with key informants, document review and researcher field notes/journaling. Analysis involved data triangulation, respondent and peer review and cross-case analysis. The experiences show that the PHC facility manager's job is dominated by a range of tasks and procedures focused on clinical service management, but is expected to encompass action to address the population and public health needs of the surrounding community. Managing with and through others, and in a complex system, requiring self-management, are critical aspects of the job. A range of personal, professional and contextual factors influence managerial practice, including professional identity. The current largely facility-focused management practice reflects the strong nursing identity of managers and broader organizational influences. However, three of the eight managers appear to self-identify an emerging leadership identity and demonstrate related managerial practices. Nonetheless, there is currently limited support for an identity transition towards leadership in this context. Better

  13. The KP hierarchy with self-consistent sources: construction, Wronskian solutions and bilinear identities

    NASA Astrophysics Data System (ADS)

    Lin, Runliang; Liu, Xiaojun; Zeng, Yunbo

    2014-10-01

    In this paper, we will present some of our results on the soliton hierarchy with self-consistent sources (SHSCSs). The Kadomtsev-Petviashvili (KP) hierarchy will be used as an illustrative example to show the method to construct the SHSCSs. Some properties of the KP hierarchy with self-consistent sources will also be given, such as the dressing approach, the Wronskian solutions (including soliton solutions), its bilinear identities and the tau function.

  14. Conversations outside the Comfort Zone: Identity Formation in SME Manager Action Learning

    ERIC Educational Resources Information Center

    Anderson, Lisa; Gold, Jeff

    2009-01-01

    In this paper we consider the construction of narrative identity and particularly how managers of small businesses may construct new narrative identities within the activity of the action learning situation. We build on recent work to suggest that the "world" of managers can be explored through a consideration of Vygotsky's socio-cultural theory…

  15. A Contextual Model for Identity Management (IdM) Interfaces

    ERIC Educational Resources Information Center

    Fuller, Nathaniel J.

    2014-01-01

    The usability of Identity Management (IdM) systems is highly dependent upon design that simplifies the processes of identification, authentication, and authorization. Recent findings reveal two critical problems that degrade IdM usability: (1) unfeasible techniques for managing various digital identifiers, and (2) ambiguous security interfaces.…

  16. Patient identity management for secondary use of biomedical research data in a distributed computing environment.

    PubMed

    Nitzlnader, Michael; Schreier, Günter

    2014-01-01

    Dealing with data from different source domains is of increasing importance in today's large scale biomedical research endeavours. Within the European Network for Cancer research in Children and Adolescents (ENCCA) a solution to share such data for secondary use will be established. In this paper the solution arising from the aims of the ENCCA project and regulatory requirements concerning data protection and privacy is presented. Since the details of secondary biomedical dataset utilisation are often not known in advance, data protection regulations are met with an identity management concept that facilitates context-specific pseudonymisation and a way of data aggregation using a hidden reference table later on. Phonetic hashing is proposed to prevent duplicated patient registration and re-identification of patients is possible via a trusted third party only. Finally, the solution architecture allows for implementation in a distributed computing environment, including cloud-based elements.

  17. Research Management in Portugal: A Quest for Professional Identity

    ERIC Educational Resources Information Center

    Trindade, Margarida; Agostinho, Marta

    2014-01-01

    Research managers at science-intensive institutions appear as a continuously evolving group of professionals whose identity is somewhat fragmented, even to themselves. In Portugal, specialized research manager roles have rapidly emerged over the last years alongside the development of a small but consolidated scientific system. In order to get an…

  18. Author identities an interoperability problem solved by a collaborative solution

    NASA Astrophysics Data System (ADS)

    Fleischer, D.; Czerniak, A.; Schirnick, C.

    2012-12-01

    The identity of authors and data providers is crucial for personalized interoperability. The marketplace of available identifiers is packed and the right choice is getting more and more complicated. Even though there are more then 15 different systems available there are still some under development and proposed to come up by the end of 2012 ('PubMed Central Author ID' and ORCID). Data Management on a scale beyond the size of a single research institute but on the scale of a scientific site including a university with student education program needs to tackle this problem and so did the Kiel Data Management an Infrastructure. The main problem with the identities of researchers is the quite high frequency changes in positions during a scientist life. The required system needed to be a system that already contained the potential of preregistered people with their scientific publications from other countries, institutions and organizations. Scanning the author ID marketplace brought up, that there us a high risk of additional workload to the researcher itself or the administration due to the fact that individuals need to register an ID for themselves or the chosen register is not yet big enough to simply find the right entry. On the other hand libraries deal with authors and their publications now for centuries and they have high quality catalogs with person identities already available. Millions of records internationally mapped are available by collaboration with libraries and can be used in exactly the same scope. The international collaboration between libraries (VIAF) provides a mapping between libraries from the US, CA, UK, FR, GER and many more. The international library author identification system made it possible to actually reach at the first matching a success of 60% of all scientists. The additional advantage is that librarians can finalize the Identity system in a kind of background process. The Kiel Data Management Infrastructure initiated a web service

  19. The Effects of Virtual Communities on Group Identity in Classroom Management

    ERIC Educational Resources Information Center

    Ho, Tu-Kuang; Lin, Yu-Tzeng

    2016-01-01

    Group identity is a critical component in developing effective classroom management. While there have been numerous studies on group identity, they have primarily focused on its effects on the physical classroom entity. Advances in information technology, however, have enabled the creation of virtual communities, which have become a vital channel…

  20. Adaptation of the Utrecht-Management of Identity Commitments Scale (U-MICS) to the measurement of the parental identity domain.

    PubMed

    Piotrowski, Konrad

    2018-04-01

    The present studies examined the psychometric properties of the Utrecht-Management of Identity Commitments Scale (U-MICS) adapted to the measurement of identity formation in the parental identity domain. As the parental identity domain has only been studied within the neo-Eriksonian approach to a very limited extent, the aim of these studies was to prepare a short, valid and reliable tool for the measurement of parental identity in order to fill this gap. The associations of commitment, in-depth exploration and reconsideration of commitment in the parental domain with well-being and with other identity constructs were analyzed. The results showed that parental identity formation is associated with mothers' satisfaction with life and trait anxiety and with identity formation in other areas as well. The initial results suggest that the adapted version of the U-MICS is a valid and reliable measure that can be used in future studies on parental identity formation. © 2017 The Author. Scandinavian Journal of Psychology published by Scandinavian Psychological Associations and John Wiley & Sons Ltd.

  1. Campus Single Sign-On und hochschulübergreifendes Identity Management

    NASA Astrophysics Data System (ADS)

    Hommel, Wolfgang

    Das im Rahmen von IntegraTUM für die TUM geschaffene Identity & Access Management System setzt das Paradigma unified login um, d. h. ein Benutzer kann alle für ihn relevanten Dienste innerhalb der Hochschule mit derselben Loginname-/Passwortkombination nutzen. Dieser Artikel zeigt, wie auf Basis der Software Shibboleth und der deutschlandweiten Hochschulföderation DFN-AAI als weitere Mehrwerte das campusweite web single sign-on und die nahtlose Nutzung zahlreicher externer Web-Anwendungen erreicht werden. Als Beispiel für die Abläufe bei der Erschließung neuer Dienste für die hochschulübergreifende Nutzung wird die Anbindung von Learning Management Systemen auf Basis des DFN-AAI E-Learning-Profils diskutiert. Den umfassenden Vorteilen werden schließlich die aktuellen technischen Grenzen bei der Umsetzung des hochschulübergreifenden Identity Management gegenübergestellt.

  2. Identity management strategies among HIV-positive Colombian gay men in London.

    PubMed

    Jaspal, Rusi; Williamson, Iain

    2017-12-01

    This study set out to explore the social-psychological aspects of living with HIV among a group of HIV-positive Colombian gay men in London, and the strategies that they deployed to manage ensuing threats to their identities. Focus group and individual interview data were collected from 14 Colombian gay men living with HIV, and were analysed using qualitative thematic analysis and identity process theory. The following themes are discussed: (1) identity struggles and conflicts in Colombia, (2), managing multiple layers of social stigma in England, and (3) changing interpersonal and intergroup dynamics, which highlight the inter-connections between sexual prejudice, sexual risk-taking and HIV stigma. Identity may be chronically threatened due to the multiple layers of stigma, which can limit the coping strategies available to individuals. Findings strongly support the need for action and programmes to highlight and tackle both racism and HIV stigma on the gay scene and to fund more specific resources for sub-communities of gay, bisexual and other men who have sex with men, which employ appropriately trained and culturally competent staff.

  3. Identity and Access Management: Technological Implementation of Policy

    ERIC Educational Resources Information Center

    von Munkwitz-Smith, Jeff; West, Ann

    2004-01-01

    Navigating the multiple processes for accessing ever-multiplying campus information systems can be a daunting task for students, faculty, and staff. This article provides a brief overview of Identity and Access Management Services. The authors review key characteristics and components of this new information architecture and address the issue of…

  4. Dialogue, Language and Identity: Critical Issues for Networked Management Learning

    ERIC Educational Resources Information Center

    Ferreday, Debra; Hodgson, Vivien; Jones, Chris

    2006-01-01

    This paper draws on the work of Mikhail Bakhtin and Norman Fairclough to show how dialogue is central to the construction of identity in networked management learning. The paper is based on a case study of a networked management learning course in higher education and attempts to illustrate how participants negotiate issues of difference,…

  5. "Managing identities" and parental disclosure of HIV sero-status in Zimbabwe.

    PubMed

    Muparamoto, Nelson; Chiweshe, Manase Kudzai

    2015-01-01

    Drawing from a small sample of HIV infected respondents, this paper examines parents' perceptions on the decision to disclose or not to disclose their HIV sero-status to their children. It explores how parents control the information in the interactional ritual with their children. The paper uses Goffman's concept of dramaturgy to analyse how parents manage and control disclosure within a context where HIV and AIDS is associated with stigma. Disclosure is a strategic encounter in which the interactants (parents) manage to create a desired identity or spoil an identity. Qualitative research incorporating focus group discussions and in-depth interviews was used to examine the perceptions of parents who are HIV positive on disclosure of their status to their children. Such a methodological approach allows for a nuanced understanding of the context in which decision to disclose status happens. The study findings show that in a social context involving parents and children as actors there are complex expectations which affect parental disclosure of HIV sero-status to their children. The desire to manage an expected identity militated or enabled disclosure in a parental relationship.

  6. Globus Nexus: A Platform-as-a-Service Provider of Research Identity, Profile, and Group Management.

    PubMed

    Chard, Kyle; Lidman, Mattias; McCollam, Brendan; Bryan, Josh; Ananthakrishnan, Rachana; Tuecke, Steven; Foster, Ian

    2016-03-01

    Globus Nexus is a professionally hosted Platform-as-a-Service that provides identity, profile and group management functionality for the research community. Many collaborative e-Science applications need to manage large numbers of user identities, profiles, and groups. However, developing and maintaining such capabilities is often challenging given the complexity of modern security protocols and requirements for scalable, robust, and highly available implementations. By outsourcing this functionality to Globus Nexus, developers can leverage best-practice implementations without incurring development and operations overhead. Users benefit from enhanced capabilities such as identity federation, flexible profile management, and user-oriented group management. In this paper we present Globus Nexus, describe its capabilities and architecture, summarize how several e-Science applications leverage these capabilities, and present results that characterize its scalability, reliability, and availability.

  7. Globus Nexus: A Platform-as-a-Service Provider of Research Identity, Profile, and Group Management

    PubMed Central

    Lidman, Mattias; McCollam, Brendan; Bryan, Josh; Ananthakrishnan, Rachana; Tuecke, Steven; Foster, Ian

    2015-01-01

    Globus Nexus is a professionally hosted Platform-as-a-Service that provides identity, profile and group management functionality for the research community. Many collaborative e-Science applications need to manage large numbers of user identities, profiles, and groups. However, developing and maintaining such capabilities is often challenging given the complexity of modern security protocols and requirements for scalable, robust, and highly available implementations. By outsourcing this functionality to Globus Nexus, developers can leverage best-practice implementations without incurring development and operations overhead. Users benefit from enhanced capabilities such as identity federation, flexible profile management, and user-oriented group management. In this paper we present Globus Nexus, describe its capabilities and architecture, summarize how several e-Science applications leverage these capabilities, and present results that characterize its scalability, reliability, and availability. PMID:26688598

  8. Identity Management and Trust Services: Foundations for Cloud Computing

    ERIC Educational Resources Information Center

    Suess, Jack; Morooney, Kevin

    2009-01-01

    Increasingly, IT organizations will move from providing IT services locally to becoming an integrator of IT services--some provided locally and others provided outside the institution. As a result, institutions must immediately begin to plan for shared services and must understand the essential role that identity management and trust services play…

  9. Managing Quality, Identity and Adversaries in Public Discourse with Machine Learning

    ERIC Educational Resources Information Center

    Brennan, Michael

    2012-01-01

    Automation can mitigate issues when scaling and managing quality and identity in public discourse on the web. Discourse needs to be curated and filtered. Anonymous speech has to be supported while handling adversaries. Reliance on human curators or analysts does not scale and content can be missed. These scaling and management issues include the…

  10. Globus Nexus: A Platform-as-a-Service provider of research identity, profile, and group management

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chard, Kyle; Lidman, Mattias; McCollam, Brendan

    Globus Nexus is a professionally hosted Platform-as-a-Service that provides identity, profile and group management functionality for the research community. Many collaborative e-Science applications need to manage large numbers of user identities, profiles, and groups. However, developing and maintaining such capabilities is often challenging given the complexity of modern security protocols and requirements for scalable, robust, and highly available implementations. By outsourcing this functionality to Globus Nexus, developers can leverage best-practice implementations without incurring development and operations overhead. Users benefit from enhanced capabilities such as identity federation, flexible profile management, and user-oriented group management. In this paper we present Globus Nexus,more » describe its capabilities and architecture, summarize how several e-Science applications leverage these capabilities, and present results that characterize its scalability, reliability, and availability.« less

  11. Professional Identities of Middle Managers: A Case Study in the Faculty of Health and Social Care

    ERIC Educational Resources Information Center

    Thomas-Gregory, Annette

    2014-01-01

    This article presents and discusses the findings of a recent study on the professional identities of middle managers in a school of healthcare in a selected Chartered (pre-1992) UK university. Attention focuses on the career backgrounds of the middle managers, perception of identity and the interactional balance between the professional, academic…

  12. Spoiled Group Identities and Backstage Work: A Theory of Stigma Management Rehearsals

    ERIC Educational Resources Information Center

    O'Brien, John

    2011-01-01

    How do persons with a stigmatized identity learn potential responses to discrimination and harassment? Drawing on three and a half years of ethnographic data, this paper demonstrates how members of a group of Muslim American youth are socialized in locally dominant stigma management strategies through stigma management rehearsals. Stigma…

  13. No Solutions: Resisting Certainty in Water Supply Management

    NASA Astrophysics Data System (ADS)

    Cockerill, K.; Armstrong, M.; Richter, J.; Okie, J. G.

    2017-12-01

    Although most scholars and water managers implicitly understand that managing water resources is an ongoing need, both popular and academic literature routinely use the words `solution' and `solve' in discussing water management concerns. The word `solution' reflects a quest for certainty, stability, permanence. A focus on `solving' creates a simplistic expectation that some person or institution is responsible for implementing a solution and that once `solved' the issue no longer requires attention. The reality, however, is water management is a wicked problem, meaning it is amorphous, involves multiple definitions, is embedded in complex systems, and hence is intractable. By definition, wicked problems defy solution. Our interdisciplinary project integrates research from across a broad spectrum of biological, physical, and social sciences. We find that framing a problem in terms of `solving' affects how people think, feel, behave toward the problem. Further, our work suggests that the prevalence of solution- based language has simultaneously generated expectations that science / scientists can predict and control biophysical systems and that science is not to be trusted because it has failed to deliver on previous promises to permanently `solve' events like floods or droughts. Hydrologic systems, are, of course highly uncertain. Hence, reiterating a simplistic insistence on `solving' water management concerns may result in decreased public attention to or support for more complex policy discussions that could provide long-term management strategies. Using the language of `solutions' with expectations of certainty sets hydrologic researchers and water managers up to fail. Managing water is a social responsibility and it will require consistent attention in the future, just as it has throughout human history. Scientists have a key role to play in explaining how various hydrologic systems function, but they should not be expected to `solve' pressing water management

  14. Wildland recreationists’ natural resource management purposes and preferences: a connection to environmental identity

    Treesearch

    Patricia L. Winter; Deborah J. Chavez

    2008-01-01

    Wilderness and day use recreationists’ preferences for natural resource management and their perceptions of purposes for management are examined in this paper. Environmental identity (EID) salience is used to help shed light on variations in recreationists’ preferences for how natural resources should be managed. Findings from two studies are reported; the first was...

  15. Group affiliation in self-management: support or threat to identity?

    PubMed

    Bossy, Dagmara; Knutsen, Ingrid Ruud; Rogers, Anne; Foss, Christina

    2017-02-01

    Self-management is considered important in chronic illness, and contemporary health policy recommends participation in support groups for individuals with chronic conditions. Although withdrawal from or non-participation in support groups is an important problem, there is limited knowledge about individuals' own motivation for participation in or withdrawal from self-management support groups. To investigate how individuals with type 2 diabetes perceive participation in group-based self-management support. This is a qualitative focus group study using a semi-structured interview guide. Sixteen participants diagnosed with type 2 diabetes were included in the study. Individuals with and without group affiliations were mixed in three focus groups to trigger discussions. In the analysis, reoccurring themes of engagement and discussions between participants were focused within a theoretical frame of institutional logic. The focus groups are seen as social spaces where participants construct identity. Both participation and non-participation in group-based self-management support are associated with dealing with the stigma of having type 2 diabetes. Negotiations contribute to constructing an illness dignity as a response to the logic of moral responsibility for the disease. Contemporary policy contributes to societal understandings of individuals with type 2 diabetes as morally inadequate. Our study shows that group-based self-management support may counteract blame and contribute in negotiations of identity for individuals with type 2 diabetes. This mechanism makes participation in groups beneficial for some but stigma inducing for others. © 2016 The Authors. Health Expectations Published by John Wiley & Sons Ltd.

  16. Managing identity impacts associated with disclosure of HIV status: a qualitative investigation

    PubMed Central

    Frye, Victoria; Fortin, Princess; MacKenzie, Sonja; Purcell, David; Edwards, Lorece V.; Mitchell, Shannon Gwin; Valverde, Eduardo; Garfein, R.; Metsch, Lisa; Latka, Mary H

    2011-01-01

    Disclosure of HIV status to potential and current sex partners by HIV-positive people (HIVPP) is a complex issue that has received a significant amount of attention. Research has found that disclosure depends upon the evaluation by HIVPP of potential benefits and risks, especially of the risks stemming from the profound social stigma of HIV and AIDS. Drawing on concepts from Goffman’s classic stigma theory and Anderson’s more recently developed cultural-identity theory of drug abuse, we analyzed data from in-depth, post-intervention qualitative interviews with 116 heterosexually active, HIV-positive injection drug users enrolled in a randomized trial of a behavioral intervention to prevent HIV transmission. We explored how disclosure experiences lead to “identity impacts” defined as: (1) identity challenges (i.e. interactions that challenge an individual’s self-concept as a “normal” or non-deviant individual); and (2) identity transformations (i.e. processes whereby an individual comes to embrace a new identity and reject behaviors and values of an old one, resulting in the conscious adoption of a social and/or public identity as an HIV-positive individual). Participants engaged in several strategies to manage the identity impacts associated with disclosure. Implications of these findings for research and prevention programming are discussed. PMID:20024764

  17. [Effects of an integrated self-management program on self-management, glycemic control, and maternal identity in women with gestational diabetes mellitus].

    PubMed

    Kim, HeeSook; Kim, Sue

    2013-02-01

    The purpose of the study was to investigate the effects of an integrated self-management program on self-management, glycemic control, and maternal identity in women with gestational diabetes mellitus (GDM). A non-equivalent control group non-synchronized quasi-experimental design was used. A total of 55 women with GDM were recruited from Cheil General Hospital, Seoul, Korea and were assigned to an experimental (n=28) or control group (n=27). The participants were 24-30 weeks pregnant women who had been diagnosed with GDM as of July 30, 2010. The program was conducted as a 1 hour small group meeting 3 out of 5 times and by telephone-counseling 2 out of 5 times. The integrated self-management program was verified by an expert panel. Although there was no significant reduction in HbA1c (U= -1.17, p=.238), there were statistically significant increases in self-management (U= -3.80, p<.001) and maternal identity (U= -4.48, p<.001), and decreased 2-h postprandial glucose levels (U= -2.43, p<.015) in the experimental group compared to the control group. These findings suggest that an integrated self-management program for women with GDM improves self-management, maternal identity, and glycemic control. Further studies are needed to identify the effects of an integrated self-management program on pregnancy and neonatal outcomes.

  18. Diversifying Academic and Professional Identities in Higher Education: Some Management Challenges

    ERIC Educational Resources Information Center

    Whitchurch, Celia; Gordon, George

    2010-01-01

    This paper draws on an international study of the management challenges arising from diversifying academic and professional identities in higher education. These challenges include, for instance, the introduction of practice-based disciplines with different traditions such as health and social care, the changing aspirations and expectations of…

  19. Adequate Security Protocols Adopt in a Conceptual Model in Identity Management for the Civil Registry of Ecuador

    NASA Astrophysics Data System (ADS)

    Toapanta, Moisés; Mafla, Enrique; Orizaga, Antonio

    2017-08-01

    We analyzed the problems of security of the information of the civil registries and identification at world level that are considered strategic. The objective is to adopt the appropriate security protocols in a conceptual model in the identity management for the Civil Registry of Ecuador. In this phase, the appropriate security protocols were determined in a Conceptual Model in Identity Management with Authentication, Authorization and Auditing (AAA). We used the deductive method and exploratory research to define the appropriate security protocols to be adopted in the identity model: IPSec, DNSsec, Radius, SSL, TLS, IEEE 802.1X EAP, Set. It was a prototype of the location of the security protocols adopted in the logical design of the technological infrastructure considering the conceptual model for Identity, Authentication, Authorization, and Audit management. It was concluded that the adopted protocols are appropriate for a distributed database and should have a direct relationship with the algorithms, which allows vulnerability and risk mitigation taking into account confidentiality, integrity and availability (CIA).

  20. "I'm Scared of the Disappointment": Young Adult Smokers' Relational Identity Gaps and Management Strategies as Sites of Communication Intervention.

    PubMed

    Stanley, Samantha J; Pitts, Margaret Jane

    2018-02-22

    While cigarette smoking is decreasing among young adults, rates of nicotine consumption through other devices, most notably electronic cigarettes, are on the rise. Framed by communication theory of identity, this study examines young adult smokers' experiences with relational others in regard to their smoking. Focus group discussions and individual interviews convened with 20 young adult cigarette and electronic cigarette smokers revealed identity gaps implicating the relational layer of identity, including personal-relational, enacted-relational, and personal-enacted-relational identity gaps. Participants used communicative and behavioral strategies to manage relational discrepancies. The documented identity gaps and management strategies present opportunities for targeted smoking cessation interventions that amplify dissonance created through identity gaps as a motivational tactic.

  1. The Role of Individual Differences and Situational Variables in the Use of Workplace Sexual Identity Management Strategies.

    PubMed

    Reed, Louren; Leuty, Melanie E

    2016-07-01

    Examination of individual difference variables have been largely ignored within research on the use of workplace sexual identity management strategies. The current study examined personality traits (extraversion, openness, and neuroticism), facets of sexual identity development (identity confusion, internalized heterosexism), and situational variables (e.g., perceptions of workplace climate and heterosexism) in explaining the use of management strategies, as well as possible interactions between individual and situational factors. Perceptions of the workplace climate toward lesbian and gay individuals significantly related to the use each of the management strategies, and Internalized Heterosexism was found to significantly predict the use of the Explicitly Out strategy. Most interactions between individual difference and situational variables were not supported, with the exception of an interaction between workplace heterosexism and internalized homophobia in explaining the use of the Explicitly Out strategy.

  2. 'Even though it's a small checkbox, it's a big deal': stresses and strains of managing sexual identity(s) on Facebook.

    PubMed

    Rubin, Jennifer D; McClelland, Sara I

    2015-01-01

    Facebook offers a socialisation context in which young people from ethnic, gender and sexual minorities must continually manage the potential for prejudice and discrimination in the form of homophobia and racism. In-depth interviews were conducted with eight young women, aged 16-19 years, who self-identified as queer and as women of colour. A detailed analysis of these interviews--focusing in particular on how young people described navigating expectations of rejection from family and friends--offered insight into the psychological and health consequences associated with managing sexual identity(s) while online. The 'closet' ultimately takes on new meaning in this virtual space: participants described trying to develop social relationships within Facebook, which demands sharing one's thoughts, behaviours and ideas, while also hiding and silencing their emerging sexuality. In this 'virtual closet', tempering self-presentation to offset social exclusion has become a continuous, yet personally treacherous, activity during the daily practice of using Facebook.

  3. The NSF Cybersecurity Center of Excellence: Translating Identity Management and Cybersecurity into Scientific Collaboration

    NASA Astrophysics Data System (ADS)

    Welch, V.

    2016-12-01

    Scientists care deeply about their collaborations: who is a member, who can access, produce, and correct data, and manager instruments critical to their science missions. The communities of cybersecurity and identity management professionals develop tools to support collaborations and the undertaking of trustworthy science, but there are large cultural and linguistic gaps between these communities and the scientists they service. The National Science Foundation has recently funded a NSF Cybersecurity Center of Excellence to help its community of projects by providing leadership and addressing the challenges of trustworthy science. A key goal of this NSF Center has been translating between the goals of the science community into requirements and risks understood by identity management and cybersecurity communities. This talk will give an update on the Center's efforts and other services it provides to the NSF community to bridge these cultures.

  4. The Construction of Early Career Teachers' Identities: Coping or Managing?

    ERIC Educational Resources Information Center

    Hong, Ji; Day, Christopher; Greene, Barbara

    2018-01-01

    This paper examines how early career teachers cope with or manage the challenges that they experience during the transition from pre-service to the first and then the second year of teaching as they seek to establish stable, positive, professional identities and teach effectively in various school and policy contexts. Findings from three waves of…

  5. Solutions in radiology services management: a literature review.

    PubMed

    Pereira, Aline Garcia; Vergara, Lizandra Garcia Lupi; Merino, Eugenio Andrés Díaz; Wagner, Adriano

    2015-01-01

    The present study was aimed at reviewing the literature to identify solutions for problems observed in radiology services. Basic, qualitative, exploratory literature review at Scopus and SciELO databases, utilizing the Mendeley and Illustrator CC Adobe softwares. In the databases, 565 papers - 120 out of them, pdf free - were identified. Problems observed in the radiology sector are related to procedures scheduling, humanization, lack of training, poor knowledge and use of management techniques, and interaction with users. The design management provides the services with interesting solutions such as Benchmarking, CRM, Lean Approach, ServiceBlueprinting, continued education, among others. Literature review is an important tool to identify problems and respective solutions. However, considering the small number of studies approaching management of radiology services, this is a great field of research for the development of deeper studies.

  6. Data management for the internet of things: design primitives and solution.

    PubMed

    Abu-Elkheir, Mervat; Hayajneh, Mohammad; Ali, Najah Abu

    2013-11-14

    The Internet of Things (IoT) is a networking paradigm where interconnected, smart objects continuously generate data and transmit it over the Internet. Much of the IoT initiatives are geared towards manufacturing low-cost and energy-efficient hardware for these objects, as well as the communication technologies that provide objects interconnectivity. However, the solutions to manage and utilize the massive volume of data produced by these objects are yet to mature. Traditional database management solutions fall short in satisfying the sophisticated application needs of an IoT network that has a truly global-scale. Current solutions for IoT data management address partial aspects of the IoT environment with special focus on sensor networks. In this paper, we survey the data management solutions that are proposed for IoT or subsystems of the IoT. We highlight the distinctive design primitives that we believe should be addressed in an IoT data management solution, and discuss how they are approached by the proposed solutions. We finally propose a data management framework for IoT that takes into consideration the discussed design elements and acts as a seed to a comprehensive IoT data management solution. The framework we propose adapts a federated, data- and sources-centric approach to link the diverse Things with their abundance of data to the potential applications and services that are envisioned for IoT.

  7. Enterprise Risk Management Solutions: A Case Study

    DTIC Science & Technology

    2008-06-01

    help manage risk in only AFC’s credit and retail departments. However, after the crisis that occurred in financial markets at the turn of the...my research of the company. After conducting independent research, I was able to determine that Open Pages and Methodware are almost identical in...the software they offer, much like a pair of basketball shoes provided by Nike vice Adidas . What allows them to operate successfully as independent

  8. When Social Identities Collide: Commentary on "Gender in the Management Education Classroom"

    ERIC Educational Resources Information Center

    Patton, Eric

    2010-01-01

    This commentary to "Gender in the Management Education Classroom" (Bilimoria, O'Neil, Hopkins, & Murphy, 2010) employs social identity and self-categorization theory to analyze the incident described in the article. In any MBA classroom, students are dealing with multiple group memberships. Similar to workplace settings, when the focus is on…

  9. Solutions in radiology services management: a literature review*

    PubMed Central

    Pereira, Aline Garcia; Vergara, Lizandra Garcia Lupi; Merino, Eugenio Andrés Díaz; Wagner, Adriano

    2015-01-01

    Objective The present study was aimed at reviewing the literature to identify solutions for problems observed in radiology services. Materials and Methods Basic, qualitative, exploratory literature review at Scopus and SciELO databases, utilizing the Mendeley and Illustrator CC Adobe softwares. Results In the databases, 565 papers – 120 out of them, pdf free – were identified. Problems observed in the radiology sector are related to procedures scheduling, humanization, lack of training, poor knowledge and use of management techniques, and interaction with users. The design management provides the services with interesting solutions such as Benchmarking, CRM, Lean Approach, ServiceBlueprinting, continued education, among others. Conclusion Literature review is an important tool to identify problems and respective solutions. However, considering the small number of studies approaching management of radiology services, this is a great field of research for the development of deeper studies. PMID:26543281

  10. Data Management for the Internet of Things: Design Primitives and Solution

    PubMed Central

    Abu-Elkheir, Mervat; Hayajneh, Mohammad; Ali, Najah Abu

    2013-01-01

    The Internet of Things (IoT) is a networking paradigm where interconnected, smart objects continuously generate data and transmit it over the Internet. Much of the IoT initiatives are geared towards manufacturing low-cost and energy-efficient hardware for these objects, as well as the communication technologies that provide objects interconnectivity. However, the solutions to manage and utilize the massive volume of data produced by these objects are yet to mature. Traditional database management solutions fall short in satisfying the sophisticated application needs of an IoT network that has a truly global-scale. Current solutions for IoT data management address partial aspects of the IoT environment with special focus on sensor networks. In this paper, we survey the data management solutions that are proposed for IoT or subsystems of the IoT. We highlight the distinctive design primitives that we believe should be addressed in an IoT data management solution, and discuss how they are approached by the proposed solutions. We finally propose a data management framework for IoT that takes into consideration the discussed design elements and acts as a seed to a comprehensive IoT data management solution. The framework we propose adapts a federated, data- and sources-centric approach to link the diverse Things with their abundance of data to the potential applications and services that are envisioned for IoT. PMID:24240599

  11. Dissociative identity disorder (DID) in clinical practice - what you don't see may hurt you.

    PubMed

    Leonard, David; Tiller, John

    2016-02-01

    To identify problems that interfere with the recognition, diagnosis and management of people with dissociative identity disorder (DID) presenting to psychiatric outpatient and inpatient services and suggest solutions. Problems and suggested solutions associated with clinical presentations and management of people with DID are outlined with references to relevant literature. Problems in the recognition and management of DID are described. These lead to delays in diagnosis and costly, inappropriate management, destructive to services, staff and patients alike. Problems include lack of understanding and experience and scepticism about the disorder, resulting in failure to provide appropriate treatment.Some suggestions to improve recognition and management are included. Better recognition, diagnosis and management of DID will lead to better and more cost effective outcomes. © The Royal Australian and New Zealand College of Psychiatrists 2015.

  12. An exploration of mothers' and fathers' views of their identities in chronic-kidney-disease management: parents as students?

    PubMed

    Swallow, Veronica

    2008-12-01

    To explore parents' views of their identities as they learn to manage their child's chronic kidney disease. Parents are expected to participate in management and usually learn necessary skills from the multidisciplinary team. Research highlights the importance of professionals defining parents' management roles in chronic disease; but little is known about parents' views on their own identities as the complex and dynamic process of teaching and learning unfolds around their child's condition. According to positioning theory, identity development is a dynamic and fluid process that occurs during interaction, with each person positioning themselves while simultaneously positioning the other person, yet this concept has not been considered in relation to parents' contributions to disease management. A longitudinal, grounded theory study conducted in a UK Children's Kidney Unit. This paper focuses on one aspect of a larger study exploring family learning in disease management. Six mothers and two fathers of six children with a recently diagnosed chronic kidney disease participated in a total of 21 semi-structured interviews during the 18 months after referral to the unit. Interviews included discussion about the parts they played in relation to professionals during the management process. Findings were interpreted within a framework of positioning theory. Parents participated in teaching/learning/assessment that was both planned (involving allocated clinical lessons and tasks) and spontaneous (in response to current situations), to facilitate their participation. They positioned multidisciplinary team members as teachers as well as professionals, simultaneously positioning themselves as students as well as parents. Parents' clinical duties and obligations are not an automatic part of parenting but become part of the broader process of sharing disease management, this can lead to them assuming the additional identity of a 'student'. Involving parents in ongoing

  13. Use of standardized multidimensional evaluation tools and the emergence of the case manager's professional identity in France.

    PubMed

    Nugue, Mathilde; De Stampa, Matthieu; Couturier, Yves; Somme, Dominique

    2012-01-01

    In France, the national public health plan proposes a group of innovations including the initiation of case management for older adults in complex situations, particularly those with cognitive disorders. In this context, public authorities asked case managers to use a standardized multidimensional evaluation tool. The results of a qualitative study on the pertinence of such a tool relative to the emergence of this new professional field are described. Early use of an evaluation tool seems to be linked to the emergence of a new professional identity for recently recruited case managers. Factors determining the strength of this link are training tool standardization, computerization, and local structure's involvement. Our results contribute to identifying one of the ways by which professional identity can be changed to become a case manager.

  14. Rewriting Dominant Narratives of the Academy: Women Faculty of Color and Identity Management

    ERIC Educational Resources Information Center

    Motha, Suhanthie; Varghese, Manka M.

    2018-01-01

    Drawing on Delgado and Yosso's "counterstory," Yosso's "community cultural wealth," and Alsup's "borderland discourses," the authors, who are women of color academics, use narratives from their lives to discuss the ways in which they draw on resources in managing and reconfiguring their multiple identities within the…

  15. Dual Management of Commercially Available Items - Information and Imaging Solutions.

    DTIC Science & Technology

    1998-06-03

    Pentagon, Washington, D.C. 20301-1900. The identity of each writer and caller is fully protected. Acronyms DISC Defense Industrial Supply Center DLA...Defense Logistics Agency GSA General Services Administration JWOD Javits-Wagner-O’Day NIB National Industries for the Blind f INSPECTOR GENERAL...Defense Industrial Supply Center issued a solicitation to establish a prime vendor for its office solutions initiative. An amendment to the solicitation

  16. Leadership, New Public Management and the Re-Modelling and Regulation of Teacher Identities

    ERIC Educational Resources Information Center

    Hall, David; Gunter, Helen; Bragg, Joanna

    2013-01-01

    This article examines the rapidly shifting relationship between teachers and the state and efforts to re-model teacher identities within the wider context of public sector modernization and the New Public Management. The construction and development of officially authorized and normative discursive practices relating to leadership and the…

  17. We're Decent People: Constructing and Managing Family Identity in Rural Workingclass Communities

    ERIC Educational Resources Information Center

    Kiter Edwards, Margie L.

    2004-01-01

    Using grounded theory methodology, I establish family identity management as an important type of invisible work that connects women's household-based domestic activities with community members perceptions and treatment of them and their family members. Detailed observations of household routines and family interactions, as well as in-depth…

  18. Managing wilderness recreation use: common problems and potential solutions

    Treesearch

    David N. Cole; Margaret E. Petersen; Robert C. Lucas

    1987-01-01

    Describes pros and cons of potential solutions to common wilderness recreation problems. Covers the purpose of each potential solution, costs to visitors and management, effectiveness, other considerations, and sources of additional information.

  19. Implementing Proactive Network Management Solutions in the Residence Halls

    ERIC Educational Resources Information Center

    Bedi, Param

    2005-01-01

    This paper discusses how to implement networking solutions in residence halls at Arcadia University in Philadelphia. Sections of the paper include: (1) About Arcadia University; (2) Residence Halls Network; (3) How Campus Manager Helped Arcadia University; (4) What Is Campus Manager; (5) How Campus Manager Works; (6) Campus Manager Remediation…

  20. Brief Report: The Identity Style Inventory (ISI-3) and the Utrecht-Management of Identity Commitments Scale (U-MICS)--Factor Structure, Reliability, and Convergent Validity in French-Speaking University Students

    ERIC Educational Resources Information Center

    Zimmermann, Gregoire; Mahaim, Elodie Biermann; Mantzouranis, Gregory; Genoud, Philippe A.; Crocetti, Elisabetta

    2012-01-01

    The purpose of this study was to evaluate the factor structure and the reliability of the French versions of the Identity Style Inventory (ISI-3) and the Utrecht-Management of Identity Commitments Scale (U-MICS) in a sample of college students (N = 457, 18-25 years old). Confirmatory factor analyses confirmed the hypothesized three-factor solution…

  1. Report: Improvements Needed in CSB’s Identity and Access Management and Incident Response Security Functions

    EPA Pesticide Factsheets

    Report #18-P-0030, October 30, 2017. Weaknesses in the Identity and Access Management and Incident Response metric domains leave the CSB vulnerable to attacks occurring and not being detected in a timely manner.

  2. Standardized Solution for Management Controller for MTCA.4

    NASA Astrophysics Data System (ADS)

    Makowski, D.; Fenner, M.; Ludwig, F.; Mavrič, U.; Mielczarek, A.; Napieralski, A.; Perek, P.; Schlarb, H.

    2015-06-01

    The Micro Telecommunications Computing Architecture (MTCA) standard is a modern platform that is gaining popularity in the area of High Energy Physics (HEP) experiments. The standard provides extensive management, monitoring and diagnostics functionalities. The hardware control and monitoring is based on the Intelligent Platform Management Interface (IPMI), that was initially developed for supervision of complex computers operation. The original IPMI specification was extended to support functions required by the MTCA specification. The Module Management Controller (MMC) is required on each Advanced Mezzanine Card (AMC) installed in MTCA chassis. The Rear Transition Modules (RTMs) have to be equipped with RTM Management Controllers (RMCs) which is required by the MTCA.4 subsidiary specification. The commercially available implementations of MMC and RMC are expensive and do not provide the complete functionality that is required by specific HEP applications. Therefore, many research centers and commercial companies work on their own implementation of AMC and RTM controllers. The available implementations suffer because of lack of common approach and interoperability problems. Since both Lodz University of Technology (TUL) and Deutsches Elektronen-Synchrotron (DESY) have long-term experience in developing ATCA and MTCA hardware, the authors decided to develop a unified solution of management controller fully compliant with AMC and MTCA.4 standards. The MMC v1.00 solution is dedicated for management of AMC and RTM modules. The MMC v1.00 is based on Atmel ATxmega MCUs and can be fully customized by the user or used as a drop-in-module without any modifications. The paper discusses the functionality of the MMC v1.00 solution. The implementation was verified with developed evaluation kits for AMC and RTM cards.

  3. The medical leadership challenge in healthcare is an identity challenge.

    PubMed

    Andersson, Thomas

    2015-01-01

    The purpose of this article is to describe and analyse the identity challenges that physicians with medical leadership positions face. Four qualitative case studies were performed to address the fact that identity is processual, relational and situational. Physicians with managerial roles were interviewed, as well as their peers, supervisors and subordinates. Furthermore, observations were made to understand how different identities are displayed in action. This study illustrates that medical leadership implies identity struggles when physicians have manager positions, because of the different characteristics of the social identities of managers and physicians. Major differences are related between physicians as autonomous individuals in a system and managers as subordinates to the organizational system. There are psychological mechanisms that evoke the physician identity more often than the managerial identity among physicians who are managers, which explains why physicians who are managers tend to remain foremost physicians. The implications of the findings, that there are major identity challenges by being both a physician and manager, suggest that managerial physicians might not be the best prerequisite for medical leadership, but instead, cooperative relationships between physicians and non-physician managers might be a less difficult way to support medical leadership. Acknowledging and addressing identity challenges can be important both in creating structures in organizations and designing the training for managers in healthcare (both physicians and non-physicians) to support medical leadership. Medical leadership is most often related to organizational structure and/or leadership skills, but this paper discusses identity requirements and challenges related to medical leadership.

  4. The importance of social identities in the management of and recovery from 'Diabulimia': A qualitative exploration.

    PubMed

    Hastings, Amy; McNamara, Niamh; Allan, Jacqueline; Marriott, Mike

    2016-12-01

    A significant barrier to recovery for individuals with co-morbid eating disorders and type 1 diabetes is the way in which group members self-categorise. Nonetheless, identity issues are neglected during the recovery process. The aim of this paper is to explore how group memberships (and the associated identities) both contribute to and hinder recovery in this cohort. Transcripts from five online focus groups with 13 members of an online support group for individuals with 'Diabulimia' were thematically analysed. Findings suggested that those with whom one shares a recovery identity can be well placed to provide psychological resources necessary for successful recovery although such connections can be damaging if group norms are not managed. Members recognised that other important relationships (including family and friends and health professionals) are also key to recovery; these other group memberships (and the associated identities) can be facilitated through the recovery identity group membership, which allows for external validation of the recovery identity, provides encouragement to disclose the illness to supportive others, and provides information to facilitate positive service interactions. While clinical interventions typically focus on eliminating disordered behaviours, we suggest that these should also include strengthening important group memberships that promote recovery.

  5. Management Architecture and Solutions for French Tactical Systems

    DTIC Science & Technology

    2006-10-01

    RTO-MP-IST-062 3 - 1 UNCLASSIFIED/UNLIMITED UNCLASSIFIED/UNLIMITED Management Architecture and Solutions for French Tactical Systems Vincent...COTTIGNIES THALES Land & Joint Systems – Battlespace Transformation Center 160 Boulevard de Valmy - BP 82 92704 Colombes Cedex FRANCE ...planning, configuration and monitoring of Systems. Then, given the limitations of existing Management System Architecture, an innovative design based on

  6. Family support in the transition to adulthood in Portugal--its effects on identity capital development, uncertainty management and psychological well-being.

    PubMed

    Oliveira, José Egídio; Mendonça, Marina; Coimbra, Susana; Fontaine, Anne Marie

    2014-12-01

    In a familistic southern European society such as the Portuguese, the family has historically played a prominent role in supporting the negotiation of transition pathways into adulthood. The present study aimed at capturing (1) the relative weight of parental financial support and autonomy support in contributing to the youngsters' psychological well-being (PWB), and (2) the mediating role of identity capital and uncertainty management in this relationship. A total of 620 participants completed measures of parental support, identity capital, uncertainty management and PWB. Autonomy support was found to be the strongest predictor of PWB, both directly and indirectly through its effects on identity capital and the use of target focused uncertainty management strategies. Conversely, financial support evidenced only a minor indirect impact through the mediation of tangible identity capital. Autonomy stimulation may constitute one of the most developmentally determinant family challenges in assisting the process of coming of age in Portugal. Copyright © 2014 The Foundation for Professionals in Services for Adolescents. Published by Elsevier Ltd. All rights reserved.

  7. Identity management, negotiation and resistance among women in the sex trade in London, Ontario.

    PubMed

    Orchard, Treena; Farr, Sara; Macphail, Susan; Wender, Cass; Young, Dawn

    2013-01-01

    Sex work, and ideas about women in the trade, have long been represented as tragic and/or threatening. However, such portrayals tell us very little about how women think about themselves and the kinds of work they do. The data for this paper come from an ethnographic, community-based study in London, Ontario, that involves women in street-based, indoor and transactional sex work. This discussion focuses on how women develop different individual identities, including the management of multiple selves, their sexual identities and what we have termed the 'good junkie' identity. We also examine how these women employ aspects of dominant representation of sex workers, namely the low status accorded to those in street-based work and the defamatory term 'whore' or 'ho', when negotiating the moral hierarchies that exist within various kinds of sex work (i.e., stripping, massage parlours) and making sense of their professional and personal lives. The work that goes into the creation and maintenance of the women's divergent identities sheds important light on this complicated and tremendously demanding, yet inadequately understood, aspect of life as women in the sex trade.

  8. Systemic solutions for multi-benefit water and environmental management.

    PubMed

    Everard, Mark; McInnes, Robert

    2013-09-01

    The environmental and financial costs of inputs to, and unintended consequences arising from narrow consideration of outputs from, water and environmental management technologies highlight the need for low-input solutions that optimise outcomes across multiple ecosystem services. Case studies examining the inputs and outputs associated with several ecosystem-based water and environmental management technologies reveal a range from those that differ little from conventional electro-mechanical engineering techniques through methods, such as integrated constructed wetlands (ICWs), designed explicitly as low-input systems optimising ecosystem service outcomes. All techniques present opportunities for further optimisation of outputs, and hence for greater cumulative public value. We define 'systemic solutions' as "…low-input technologies using natural processes to optimise benefits across the spectrum of ecosystem services and their beneficiaries". They contribute to sustainable development by averting unintended negative impacts and optimising benefits to all ecosystem service beneficiaries, increasing net economic value. Legacy legislation addressing issues in a fragmented way, associated 'ring-fenced' budgets and established management assumptions represent obstacles to implementing 'systemic solutions'. However, flexible implementation of legacy regulations recognising their primary purpose, rather than slavish adherence to detailed sub-clauses, may achieve greater overall public benefit through optimisation of outcomes across ecosystem services. Systemic solutions are not a panacea if applied merely as 'downstream' fixes, but are part of, and a means to accelerate, broader culture change towards more sustainable practice. This necessarily entails connecting a wider network of interests in the formulation and design of mutually-beneficial systemic solutions, including for example spatial planners, engineers, regulators, managers, farming and other businesses, and

  9. "Everybody Puts Their Whole Life on Facebook": Identity Management and the Online Social Networks of LGBTQ Youth.

    PubMed

    McConnell, Elizabeth; Néray, Bálint; Hogan, Bernie; Korpak, Aaron; Clifford, Antonia; Birkett, Michelle

    2018-05-26

    Lesbian, gay, bisexual, transgender, and queer (LGBTQ) youth and young adults almost inevitably "come out", or self-disclose their identity to others. Some LGBTQ youth are more uniformly "out", while others may disclose to some groups but not others. This selective disclosure is complicated on real name social media sites, which tend to encourage a unified presentation of self across social contexts. We explore these complications with a cohort of LBGTQ youth on Facebook ( N = 199, M age = 24.13). Herein we ask: How do LBGTQ youth manage the disclosure of their sexual orientation and/or gender identity to different people in their lives? Further, are there identifiable differences in the online social network structure for LGBTQ youth who manage outness in different ways? Finally, how do LGBTQ young people describe their experiences on Facebook? We answer these questions using a mixed methods approach, combining statistical cluster analysis, network visualization, and qualitative data. Our findings illustrate patterns in network structure by outness cluster type, highlighting both the work involved in managing one's online identity as well as the costs to (semi-) closeted individuals including a considerably lower overall network connectivity. In particular, outness to family characterized LGBTQ young people's experiences on Facebook.

  10. Academic Manager or Managed Academic? Academic Identity Schisms in Higher Education

    ERIC Educational Resources Information Center

    Winter, Richard

    2009-01-01

    The relationship between values and academic identity has received scant attention in the higher education literature with some notable exceptions (Churchman, 2006; Harley, 2002; Henkel, 2005). This paper contends that the perceived need to align all academics around corporate values and goals has given rise to academic identity schisms in higher…

  11. Application of Harmony Search algorithm to the solution of groundwater management models

    NASA Astrophysics Data System (ADS)

    Tamer Ayvaz, M.

    2009-06-01

    This study proposes a groundwater resources management model in which the solution is performed through a combined simulation-optimization model. A modular three-dimensional finite difference groundwater flow model, MODFLOW is used as the simulation model. This model is then combined with a Harmony Search (HS) optimization algorithm which is based on the musical process of searching for a perfect state of harmony. The performance of the proposed HS based management model is tested on three separate groundwater management problems: (i) maximization of total pumping from an aquifer (steady-state); (ii) minimization of the total pumping cost to satisfy the given demand (steady-state); and (iii) minimization of the pumping cost to satisfy the given demand for multiple management periods (transient). The sensitivity of HS algorithm is evaluated by performing a sensitivity analysis which aims to determine the impact of related solution parameters on convergence behavior. The results show that HS yields nearly same or better solutions than the previous solution methods and may be used to solve management problems in groundwater modeling.

  12. SuperIdentity: Fusion of Identity across Real and Cyber Domains

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Black, Sue; Creese, Sadie; Guest, Richard

    Under both benign and malign circumstances, people now manage a spectrum of identities across both real-world and cyber domains. Our belief, however, is that all these instances ultimately track back for an individual to reflect a single 'SuperIdentity'. This paper outlines the assumptions underpinning the SuperIdentity Project, describing the innovative use of data fusion to incorporate novel real-world and cyber cues into a rich framework appropriate for modern identity. The proposed combinatorial model will support a robust identification or authentication decision, with confidence indexed both by the level of trust in data provenance, and the diagnosticity of the identity factorsmore » being used. Additionally, the exploration of correlations between factors may underpin the more intelligent use of identity information so that known information may be used to predict previously hidden information. With modern living supporting the 'distribution of identity' across real and cyber domains, and with criminal elements operating in increasingly sophisticated ways in the hinterland between the two, this approach is suggested as a way forwards, and is discussed in terms of its impact on privacy, security, and the detection of threat.« less

  13. Common Workflow Service: Standards Based Solution for Managing Operational Processes

    NASA Astrophysics Data System (ADS)

    Tinio, A. W.; Hollins, G. A.

    2017-06-01

    The Common Workflow Service is a collaborative and standards-based solution for managing mission operations processes using techniques from the Business Process Management (BPM) discipline. This presentation describes the CWS and its benefits.

  14. Chronically ill rural women: self-identified management problems and solutions.

    PubMed

    Cudney, Shirley; Sullivan, Therese; Winters, Charlene A; Paul, Lynn; Oriet, Pat

    2005-03-01

    To add to the knowledge base of illness management of chronically ill, rural women by describing the self-identified problems and solutions reported by women participants in the online health-education segment of the Women to Women (WTW) computer outreach project. WTW is a research-based computer intervention providing health education and online peer support for rural women with chronic diseases. Messages posted to the online chat room were examined to determine the women's self-management problems and solutions. The self-identified problems were: (1) difficulties in carrying through on self-management programmes; (2) negative fears and feelings; (3) poor communication with care providers; and (4) disturbed relationships with family and friends. The self-identified solutions to these problems included problem-solving techniques that were tailored to the rural lifestyle. Although not all problems were 'solvable', they could be 'lived with' if the women's prescriptions for self-management were used. Glimpses into the women's day-to-day experiences of living with chronic illness gleaned from the interactive health-education discussions will give health professionals insights into the women's efforts to manage their illnesses. The data provide health professionals with information to heighten their sensitivity to their clients' day-to-day care and educational needs.

  15. Curricular Management of the Internet: Beyond the Blocking Solution.

    ERIC Educational Resources Information Center

    Lynch, Paul J.

    2000-01-01

    Focuses on managed Internet use as a curricular challenge and alternate solution to blocking software. Suggests that by making curricular choices for students and directing the medium towards curricular goals, teachers can manage students' time and provide a safe environment where students can communicate and collaborate on projects. (AEF)

  16. RFID identity theft and countermeasures

    NASA Astrophysics Data System (ADS)

    Herrigel, Alexander; Zhao, Jian

    2006-02-01

    This paper reviews the ICAO security architecture for biometric passports. An attack enabling RFID identity theft for a later misuse is presented. Specific countermeasures against this attack are described. Furthermore, it is shown that robust high capacity digital watermarking for the embedding and retrieving of binary digital signature data can be applied as an effective mean against RFID identity theft. This approach requires only minimal modifications of the passport manufacturing process and is an enhancement of already proposed solutions. The approach may also be applied in combination with a RFID as a backup solution (damaged RFID chip) to verify with asymmetric cryptographic techniques the authenticity and the integrity of the passport data.

  17. Issues of E-Learning Standards and Identity Management for Mobility and Collaboration in Higher Education

    ERIC Educational Resources Information Center

    Alves, Paulo; Uhomoibhi, James

    2010-01-01

    Purpose: This paper seeks to investigate and report on the status of identity management systems and e-learning standards across Europe for promoting mobility, collaboration and the sharing of contents and services in higher education institutions. Design/methodology/approach: The present research work examines existing e-learning standards and…

  18. Patient Privacy, Consent, and Identity Management in Health Information Exchange

    PubMed Central

    Hosek, Susan D.; Straus, Susan G.

    2013-01-01

    Abstract The Military Health System (MHS) and the Veterans Health Administration (VHA) have been among the nation's leaders in health information technology (IT), including the development of health IT systems and electronic health records that summarize patients' care from multiple providers. Health IT interoperability within MHS and across MHS partners, including VHA, is one of ten goals in the current MHS Strategic Plan. As a step toward achieving improved interoperability, the MHS is seeking to develop a research roadmap to better coordinate health IT research efforts, address IT capability gaps, and reduce programmatic risk for its enterprise projects. This article contributes to that effort by identifying gaps in research, policy, and practice involving patient privacy, consent, and identity management that need to be addressed to bring about improved quality and efficiency of care through health information exchange. Major challenges include (1) designing a meaningful patient consent procedure, (2) recording patients' consent preferences and designing procedures to implement restrictions on disclosures of protected health information, and (3) advancing knowledge regarding the best technical approaches to performing patient identity matches and how best to monitor results over time. Using a sociotechnical framework, this article suggests steps for overcoming these challenges and topics for future research. PMID:28083296

  19. Waste management outlook for mountain regions: Sources and solutions.

    PubMed

    Semernya, Larisa; Ramola, Aditi; Alfthan, Björn; Giacovelli, Claudia

    2017-09-01

    Following the release of the global waste management outlook in 2015, the United Nations Environment Programme (UN Environment), through its International Environmental Technology Centre, is elaborating a series of region-specific and thematic waste management outlooks that provide policy recommendations and solutions based on current practices in developing and developed countries. The Waste Management Outlook for Mountain Regions is the first report in this series. Mountain regions present unique challenges to waste management; while remoteness is often associated with costly and difficult transport of waste, the potential impact of waste pollutants is higher owing to the steep terrain and rivers transporting waste downstream. The Outlook shows that waste management in mountain regions is a cross-sectoral issue of global concern that deserves immediate attention. Noting that there is no 'one solution fits all', there is a need for a more landscape-type specific and regional research on waste management, the enhancement of policy and regulatory frameworks, and increased stakeholder engagement and awareness to achieve sustainable waste management in mountain areas. This short communication provides an overview of the key findings of the Outlook and highlights aspects that need further research. These are grouped per source of waste: Mountain communities, tourism, and mining. Issues such as waste crime, plastic pollution, and the linkages between exposure to natural disasters and waste are also presented.

  20. E-Learning Barriers and Solutions to Knowledge Management and Transfer

    ERIC Educational Resources Information Center

    Oye, Nathaniel David; Salleh, Mazleena

    2013-01-01

    This paper present a systematic overview of barriers and solutions of e-learning in knowledge management (KM) and knowledge transfer (KT) with more focus on organizations. The paper also discusses KT in organizational settings and KT in the field of e-learning. Here, an e-learning initiative shows adaptive solutions to overcome knowledge transfer…

  1. Balancing Fairness and Efficiency: The Impact of Identity-Blind and Identity-Conscious Accountability on Applicant Screening

    PubMed Central

    Self, William T.; Mitchell, Gregory; Mellers, Barbara A.; Tetlock, Philip E.; Hildreth, J. Angus D.

    2015-01-01

    This study compared two forms of accountability that can be used to promote diversity and fairness in personnel selections: identity-conscious accountability (holding decision makers accountable for which groups are selected) versus identity-blind accountability (holding decision makers accountable for making fair selections). In a simulated application screening process, undergraduate participants (majority female) sorted applicants under conditions of identity-conscious accountability, identity-blind accountability, or no accountability for an applicant pool in which white males either did or did not have a human capital advantage. Under identity-conscious accountability, participants exhibited pro-female and pro-minority bias, particularly in the white-male-advantage applicant pool. Under identity-blind accountability, participants exhibited no biases and candidate qualifications dominated interview recommendations. Participants exhibited greater resentment toward management under identity-conscious accountability. PMID:26660723

  2. Online Identities and Social Networking

    NASA Astrophysics Data System (ADS)

    Maheswaran, Muthucumaru; Ali, Bader; Ozguven, Hatice; Lord, Julien

    Online identities play a critical role in the social web that is taking shape on the Internet. Despite many technical proposals for creating and managing online identities, none has received widespread acceptance. Design and implementation of online identities that are socially acceptable on the Internet remains an open problem. This chapter discusses the interplay between online identities and social networking. Online social networks (OSNs) are growing at a rapid pace and has millions of members in them. While the recent trend is to create explicit OSNs such as Facebook and MySpace, we also have implicit OSNs such as interaction graphs created by email and instant messaging services. Explicit OSNs allow users to create profiles and use them to project their identities on the web. There are many interesting identity related issues in the context of social networking including how OSNs help and hinder the definition of online identities.

  3. Solute Response To Arid-Climate Managed-River Flow During Storm Events

    NASA Astrophysics Data System (ADS)

    McLean, B.; Shock, E.

    2006-12-01

    Storm pulses are widely used in unmanaged, temperate and subtropical river systems to resolve in-stream surface and subsurface flow components. Resulting catchment-scale hydrochemical mixing models yield insight into mechanisms of solute transport. Managed systems are far more complicated due to the human need for high quality water resources, which drives processes that are superimposed on most, if not all, of the unmanaged components. As an example, an increasingly large portion of the water supply for the Phoenix metropolitan area is derived from multiple surface water sources that are impounded, diverted and otherwise managed upstream from the urban core that consumes the water and produces anthropogenic impacts. During large storm events this managed system is perturbed towards natural behavior as it receives inputs from natural hydrologic pathways in addition to impervious surfaces and storm water drainage channels. Our goals in studying managed river systems during this critical transition state are to determine how the well- characterized behavior of natural systems break down as the system responds then returns to its managed state. Using storm events as perturbations we can contrast an arid managed system with the unmanaged system it approaches during the storm event. In the process, we can extract geochemical consequences specifically related to unknown urban components in the form of chemical fingerprints. The effects of river management on solute behavior were assessed by taking advantage of several anomalously heavy winter storm events in late 2004 and early 2005 using a rigorous sampling routine. Several hundred samples collected between January and October 2005 were analyzed for major ion, isotopic, and trace metal concentrations with 78 individual measurements for each sample. The data are used to resolve managed watershed processes, mechanisms of solute transport and river mixing from anthropogenic inputs. Our results show that concentrations of

  4. Towards Interconnecting the Nordic Identity Federations

    ERIC Educational Resources Information Center

    Tveter, Walter M.; Melve, Ingrid; Linden, Mikael

    2007-01-01

    Purpose: This paper aims to outline considerations for trust management between established national identity federations in education and research. It also aims to discuss policy issues related to cross-federation and to compare existing academic identity federations. The paper seeks to investigate Nordic national federations and to introduce the…

  5. Social and psychological creativity in gay male midlife identity management.

    PubMed

    Hajek, Christopher

    2016-06-01

    This study utilizes a qualitative thematic analysis methodology and a social identity theory framework to explore ways in which early midlife gay men report enhancing their social identities through social and psychological creativity. Face-to-face, semi-structured interviews were conducted with forty early midlife gay men (aged 40-53) in four US cities. Men discussed the collective and individual essences of their age and gay identities, including attitudes, beliefs, and behaviours that they embraced to self-enhance at midlife. These discussions emphasized differences from the younger gay outgroup, often in the context of intergenerational interaction. Identified were three strategies (and seven substrategies) that summarized the ways that interviewees constructed their identities in the interest of self-enhancement, specifically in the context of intergenerational comparisons with younger gay men. These strategies may be considered as extensions to social creativity strategies presented in Tajfel and Turner's (Psychology of intergroup relations. Chicago, IL: Nelson, 1986: 7) social identity theory. © 2015 The British Psychological Society.

  6. Levee Setbacks: An Innovative, Cost Effective, and Sustainable Solution for Improved Flood Risk management

    DTIC Science & Technology

    2017-06-30

    ER D C/ EL S R- 17 -3 Levee Setbacks: An Innovative, Cost-Effective, and Sustainable Solution for Improved Flood Risk Management En vi...EL SR-17-3 June 2017 Levee Setbacks: An Innovative, Cost-Effective, and Sustainable Solution for Improved Flood Risk Management David L. Smith...describes levee setbacks as alternatives to traditional levees for flood risk management and environmental benefits. It is organized into five sections

  7. Fermionic solution of the Andrews-Baxter-Forrester model. II. Proof of Melzer`s polynomial identities

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Warnaar, S.O.

    1996-07-01

    We compute the one-dimensional configuration sums of the AFB model using the fermionic techniques introduced in part I of this paper. Combined with the results of Andrews, Baxter, and Forrester, we prove polynominal identities for finitizations of the Virasoro characters {sub {chi}b, a}{sup (r-1, r)}(q) as conjectured by Melzer. In the thermodynamic limit these identities reproduce Rogers-Ramanujan-type identities for the unitary minimal Virasoro characters conjectured by the Stony Brook group. We also present a list of additional Virasoro character identities which follow from our proof of Melzer`s identities and application of Bailey`s lemma.

  8. Social identity and worldview validation: the effects of ingroup identity primes and mortality salience on value endorsement.

    PubMed

    Halloran, Michael J; Kashima, Emiko S

    2004-07-01

    In this article, the authors report an investigation of the relationship between terror management and social identity processes by testing for the effects of social identity salience on worldview validation. Two studies, with distinct populations, were conducted to test the hypothesis that mortality salience would lead to worldview validation of values related to a salient social identity. In Study 1, reasonable support for this hypothesis was found with bicultural Aboriginal Australian participants (N = 97). It was found that thoughts of death led participants to validate ingroup and reject outgroup values depending on the social identity that had been made salient. In Study 2, when their student and Australian identities were primed, respectively, Anglo-Australian students (N = 119) validated values related to those identities, exclusively. The implications of the findings for identity-based worldview validation are discussed.

  9. Linking User Identities Across the DataONE Federation of Data Repositories

    NASA Astrophysics Data System (ADS)

    Jones, M. B.; Mecum, B.; Leinfelder, B.; Jones, C. S.; Walker, L.

    2016-12-01

    DataONE provides services for identifying, authenticating, and authorizing researchers to access and contribute data to repositories within the DataONE federation. In the earth sciences, thousands of institutional and disciplinary repositories have created their own user identity and authentication systems with their own user directory based on a database or web content management systems. Thus, researchers have many identities that are neither linked nor interoperable, making it difficult to reference the identity of these users across systems. Key user information is hidden, and only a non-disambiguated name is often available. From a sample of 160,000 data sets within DataONE, a super-majority of references to the data creators lack even an email address. In an attempt to disambiguate these people via the GeoLink project, we conservatively estimate they represent at least 57,000 unique identities, but without a clear user identifier, there could be as many as 223,000. Interoperability among repositories is critical to improving the scope of scientific synthesis and capabilities for research collaboration. While many have focused on the convenience of Single Sign-On (SSO), we have found that sharing user identifiers is far more useful for interoperability. With an unambiguous user identity in incoming metadata, DataONE has built user-profiles that present that user's data across repositories, that link users and their organizational affiliations, and that allow users to work collaboratively in private groups that span repository systems. DataONE's user identity solution leverages existing systems such as InCommon, CILogon, Google, and ORCID to not further proliferate user identities. DataONE provides a core service allowing users to link their multiple identities so that authenticating with one identity (e.g., ORCID) can authorize access to data protected via another identity (e.g., InCommon). Currently, DataONE is using ORCID identities to link and identify

  10. XSIM Final Report: Modelling the Past and Future of Identity Management for Scientific Collaborations

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Cowles, Robert; Jackson, Craig; Welch, Von

    The eXtreme Science Identity Management (XSIM1) research project: collected and analyzed real world data on virtual organization (VO) identity management (IdM) representing the last 15+ years of collaborative DOE science; constructed a descriptive VO IdM model based on that data; used the model and existing trends to project the direction for IdM in the 2020 timeframe; and provided guidance to scientific collaborations and resource providers that are implementing or seeking to improve IdM functionality. XSIM conducted over 20 semi­structured interviews of representatives from scientific collaborations and resource providers, both in the US and Europe; the interviewees supported diverse set ofmore » scientific collaborations and disciplines. We developed a definition of “trust,” a key concept in IdM, to understand how varying trust models affect where IdM functions are performed. The model identifies how key IdM data elements are utilized in collaborative scientific workflows, and it has the flexibility to describe past, present and future trust relationships and IdM implementations. During the funding period, we gave more than two dozen presentations to socialize our work, encourage feedback, and improve the model; we also published four refereed papers. Additionally, we developed, presented, and received favorable feedback on three white papers providing practical advice to collaborations and/or resource providers.« less

  11. dCache, towards Federated Identities & Anonymized Delegation

    NASA Astrophysics Data System (ADS)

    Ashish, A.; Millar, AP; Mkrtchyan, T.; Fuhrmann, P.; Behrmann, G.; Sahakyan, M.; Adeyemi, O. S.; Starek, J.; Litvintsev, D.; Rossi, A.

    2017-10-01

    For over a decade, dCache has relied on the authentication and authorization infrastructure (AAI) offered by VOMS, Kerberos, Xrootd etc. Although the established infrastructure has worked well and provided sufficient security, the implementation of procedures and the underlying software is often seen as a burden, especially by smaller communities trying to adopt existing HEP software stacks [1]. Moreover, scientists are increasingly dependent on service portals for data access [2]. In this paper, we describe how federated identity management systems can facilitate the transition from traditional AAI infrastructure to novel solutions like OpenID Connect. We investigate the advantages offered by OpenID Connect in regards to ‘delegation of authentication’ and ‘credential delegation for offline access’. Additionally, we demonstrate how macaroons can provide a more fine-granular authorization mechanism that supports anonymized delegation.

  12. A Distributed Dynamic Programming-Based Solution for Load Management in Smart Grids

    NASA Astrophysics Data System (ADS)

    Zhang, Wei; Xu, Yinliang; Li, Sisi; Zhou, MengChu; Liu, Wenxin; Xu, Ying

    2018-03-01

    Load management is being recognized as an important option for active user participation in the energy market. Traditional load management methods usually require a centralized powerful control center and a two-way communication network between the system operators and energy end-users. The increasing user participation in smart grids may limit their applications. In this paper, a distributed solution for load management in emerging smart grids is proposed. The load management problem is formulated as a constrained optimization problem aiming at maximizing the overall utility of users while meeting the requirement for load reduction requested by the system operator, and is solved by using a distributed dynamic programming algorithm. The algorithm is implemented via a distributed framework and thus can deliver a highly desired distributed solution. It avoids the required use of a centralized coordinator or control center, and can achieve satisfactory outcomes for load management. Simulation results with various test systems demonstrate its effectiveness.

  13. "Managing by Not Managing": How Gay Engineering Students Manage Sexual Orientation Identity

    ERIC Educational Resources Information Center

    Hughes, Bryce E.

    2017-01-01

    From a social constructivist paradigm I explored the experiences of 7 openly gay engineering students to understand how, if at all, they made sense of the intersections between their engineering and sexual orientation identities. By eliciting stories through individual and focus group interviews, a narrative approach allowed me to capture the…

  14. Adolescents at School: Perspectives on Youth, Identity, and Education.

    ERIC Educational Resources Information Center

    Sadowski, Michael, Ed.

    This collection of papers suggests ways to foster the success of all students in schools and classrooms, focusing on the complex, changing identities young people manage while confronting the challenges of school. The papers are: "Introduction: Why Identity Matters at School" (Michael Sadowski); (1) "Identity and Possibility:…

  15. Automated lettuce nutrient solution management using an array of ion-selective electrodes

    USDA-ARS?s Scientific Manuscript database

    Automated sensing and control of macronutrients in hydroponic solutions would allow more efficient management of nutrients for crop growth in closed systems. This paper describes the development and evaluation of a computer-controlled nutrient management system with an array of ion-selective electro...

  16. Patients' Data Management System Protected by Identity-Based Authentication and Key Exchange.

    PubMed

    Rivero-García, Alexandra; Santos-González, Iván; Hernández-Goya, Candelaria; Caballero-Gil, Pino; Yung, Moti

    2017-03-31

    A secure and distributed framework for the management of patients' information in emergency and hospitalization services is proposed here in order to seek improvements in efficiency and security in this important area. In particular, confidentiality protection, mutual authentication, and automatic identification of patients are provided. The proposed system is based on two types of devices: Near Field Communication (NFC) wristbands assigned to patients, and mobile devices assigned to medical staff. Two other main elements of the system are an intermediate server to manage the involved data, and a second server with a private key generator to define the information required to protect communications. An identity-based authentication and key exchange scheme is essential to provide confidential communication and mutual authentication between the medical staff and the private key generator through an intermediate server. The identification of patients is carried out through a keyed-hash message authentication code. Thanks to the combination of the aforementioned tools, a secure alternative mobile health (mHealth) scheme for managing patients' data is defined for emergency and hospitalization services. Different parts of the proposed system have been implemented, including mobile application, intermediate server, private key generator and communication channels. Apart from that, several simulations have been performed, and, compared with the current system, significant improvements in efficiency have been observed.

  17. Identity Formation in Career Development for Gifted Women.

    ERIC Educational Resources Information Center

    Phelps, Christine E.

    1991-01-01

    Necessary developmental tasks concerned with identity development of gifted college women include developing competence, managing emotions, developing autonomy, establishing identity, freeing interpersonal relationships, developing purpose, and developing integrity. These issues may be used as counseling interventions to raise career aspirations.…

  18. Staying in the Hood: Black Lesbian and Transgender Women and Identity Management in North Philadelphia.

    PubMed

    Brooks, Siobhan

    2016-12-01

    The concept Don't Ask, Don't Tell regarding Black LGBT sexuality in Black communities has been an acceptable form of identity management for Black LGBT people. In other words, Black LGBT people are accepted as long as they are not vocal about their sexuality. However, this is changing with the issue of gay marriage, which is creating a space where Black LGBT people are more open about their gender identity and sexuality in heterosexual Black spaces. This new form of openness allows Black LGBT people to "stay in" their communities, as opposed to coming out. In this article I examine how Black LGBT women in North Philadelphia stay in their communities: being politically active regarding LGBT issues, disengaging from LGBT issues, passing, and educating straight Black people about issues affecting the Black LGBT community. I conclude with implications of staying in and intersectionality among Black heterosexual and LGBT women fighting for social change.

  19. Developing Designer Identity through Reflection

    ERIC Educational Resources Information Center

    Tracey, Monica W.; Hutchinson, Alisa

    2013-01-01

    As designers utilize design thinking while moving through a design space between problem and solution, they must rely on design intelligence, precedents, and intuition in order to arrive at meaningful and inventive outcomes. Thus, instructional designers must constantly re-conceptualize their own identities and what it means to be a designer.…

  20. Identity Management and Mental Health Discourse in Social Media

    PubMed Central

    Pavalanathan, Umashanthi; De Choudhury, Munmun

    2015-01-01

    Social media is increasingly being adopted in health discourse. We examine the role played by identity in supporting discourse on socially stigmatized conditions. Specifically, we focus on mental health communities on reddit. We investigate the characteristics of mental health discourse manifested through reddit's characteristic ‘throwaway’ accounts, which are used as proxies of anonymity. For the purpose, we propose affective, cognitive, social, and linguistic style measures, drawing from literature in psychology. We observe that mental health discourse from throwaways is considerably disinhibiting and exhibits increased negativity, cognitive bias and self-attentional focus, and lowered self-esteem. Throwaways also seem to be six times more prevalent as an identity choice on mental health forums, compared to other reddit communities. We discuss the implications of our work in guiding mental health interventions, and in the design of online communities that can better cater to the needs of vulnerable populations. We conclude with thoughts on the role of identity manifestation on social media in behavioral therapy. PMID:27376158

  1. Identity Management and Mental Health Discourse in Social Media.

    PubMed

    Pavalanathan, Umashanthi; De Choudhury, Munmun

    2015-05-01

    Social media is increasingly being adopted in health discourse. We examine the role played by identity in supporting discourse on socially stigmatized conditions. Specifically, we focus on mental health communities on reddit. We investigate the characteristics of mental health discourse manifested through reddit's characteristic 'throwaway' accounts, which are used as proxies of anonymity. For the purpose, we propose affective, cognitive, social, and linguistic style measures, drawing from literature in psychology. We observe that mental health discourse from throwaways is considerably disinhibiting and exhibits increased negativity, cognitive bias and self-attentional focus, and lowered self-esteem. Throwaways also seem to be six times more prevalent as an identity choice on mental health forums, compared to other reddit communities. We discuss the implications of our work in guiding mental health interventions, and in the design of online communities that can better cater to the needs of vulnerable populations. We conclude with thoughts on the role of identity manifestation on social media in behavioral therapy.

  2. The superior effect of nature based solutions in land management for enhancing ecosystem services.

    PubMed

    Keesstra, Saskia; Nunes, Joao; Novara, Agata; Finger, David; Avelar, David; Kalantari, Zahra; Cerdà, Artemi

    2018-01-01

    The rehabilitation and restoration of land is a key strategy to recover services -goods and resources- ecosystems offer to the humankind. This paper reviews key examples to understand the superior effect of nature based solutions to enhance the sustainability of catchment systems by promoting desirable soil and landscape functions. The use of concepts such as connectivity and the theory of system thinking framework allowed to review coastal and river management as a guide to evaluate other strategies to achieve sustainability. In land management NBSs are not mainstream management. Through a set of case studies: organic farming in Spain; rewilding in Slovenia; land restoration in Iceland, sediment trapping in Ethiopia and wetland construction in Sweden, we show the potential of Nature based solutions (NBSs) as a cost-effective long term solution for hydrological risks and land degradation. NBSs can be divided into two main groups of strategies: soil solutions and landscape solutions. Soil solutions aim to enhance the soil health and soil functions through which local eco-system services will be maintained or restored. Landscape solutions mainly focus on the concept of connectivity. Making the landscape less connected, facilitating less rainfall to be transformed into runoff and therefore reducing flood risk, increasing soil moisture and reducing droughts and soil erosion we can achieve the sustainability. The enhanced eco-system services directly feed into the realization of the Sustainable Development Goals of the United Nations. Copyright © 2017 Elsevier B.V. All rights reserved.

  3. A qualitative investigation of masculine identity after traumatic brain injury.

    PubMed

    MacQueen, Ruth; Fisher, Paul; Williams, Deirdre

    2018-04-30

    Men are twice as likely as women to experience a traumatic brain injury (TBI), suggesting that aspects of masculine identity contribute to how people acquire their brain injuries. Research also suggests that masculine identity impacts on how people manage their health experiences. The current study aimed to explore the experience of masculine identity following TBI. Individual interviews were conducted with 10 men aged 21-67 years who had experienced a TBI. All were living in the community. Interpretative phenomenological analysis was used to consider lived experiences and to explore the meaning of the TBI experience in relation to masculine identity. Three superordinate themes emerged from the analysis: doing life and relationships differently, self-perceptions and the perceived view of others, and managing the impact of TBI as a man. These themes are considered in relation to how participants' experiences interacted with dominant social ideals of masculine identity. The findings highlighted how masculine identity may be a valuable aspect of self in considering threats to and reconstruction of self-identity after TBI. Aspects of gender identity should be considered in order to promote engagement, support adjustment and achieve meaningful outcomes in rehabilitation.

  4. Relationship between self-confidence and sex role identity among managerial women and men.

    PubMed

    Chusmir, L H; Koberg, C S

    1991-12-01

    The self-confidence and sex role identities of 437 American female and male managers were examined by using three subscales of the Adjective Check List. Results showed that, contrary to stereotypes and older research, female and male managers were strikingly similar. Women and men with cross-sex role identities showed lower levels of self-confidence than those did with androgynous orientations; high self-confidence was linked with masculine and androgynous orientations. The managers were not significantly different in self-confidence when demographic variables and sex role identity were held constant. Sex role identity (but not gender) was a major factor in the level of self-confidence.

  5. Is Identical Really Identical? An Investigation of Equivalency Theory and Online Learning

    ERIC Educational Resources Information Center

    Lapsley, Ruth; Kulik, Brian; Moody, Rex; Arbaugh, J. B.

    2008-01-01

    This study investigates the validity of equivalency theory among 63 students by comparing two introductory upper-division human resource management courses: one taught online, the other in a traditional classroom. Commonalities included same term, same professor, and identical assignments/tests in the same order, thus allowing a direct comparison…

  6. Patients’ Data Management System Protected by Identity-Based Authentication and Key Exchange

    PubMed Central

    Rivero-García, Alexandra; Santos-González, Iván; Hernández-Goya, Candelaria; Caballero-Gil, Pino; Yung, Moti

    2017-01-01

    A secure and distributed framework for the management of patients’ information in emergency and hospitalization services is proposed here in order to seek improvements in efficiency and security in this important area. In particular, confidentiality protection, mutual authentication, and automatic identification of patients are provided. The proposed system is based on two types of devices: Near Field Communication (NFC) wristbands assigned to patients, and mobile devices assigned to medical staff. Two other main elements of the system are an intermediate server to manage the involved data, and a second server with a private key generator to define the information required to protect communications. An identity-based authentication and key exchange scheme is essential to provide confidential communication and mutual authentication between the medical staff and the private key generator through an intermediate server. The identification of patients is carried out through a keyed-hash message authentication code. Thanks to the combination of the aforementioned tools, a secure alternative mobile health (mHealth) scheme for managing patients’ data is defined for emergency and hospitalization services. Different parts of the proposed system have been implemented, including mobile application, intermediate server, private key generator and communication channels. Apart from that, several simulations have been performed, and, compared with the current system, significant improvements in efficiency have been observed. PMID:28362328

  7. Identity Formation in Adolescents from Italian, Mixed, and Migrant Families

    ERIC Educational Resources Information Center

    Crocetti, Elisabetta; Fermani, Alessandra; Pojaghi, Barbara; Meeus, Wim

    2011-01-01

    The purpose of this study was to compare identity formation in adolescents from Italian (n = 261), mixed (n = 100), and migrant families (n =148). Participants completed the Italian version of the Utrecht-Management of Identity Commitments Scale that assesses identity processes in educational and relational domains. Within a variable-centered…

  8. Innovative Approaches in Chronic Disease Management: Health Literacy Solutions and Opportunities for Research Validation.

    PubMed

    Villaire, Michael; Gonzalez, Diana Peña; Johnson, Kirby L

    2017-01-01

    This chapter discusses the need for innovative health literacy solutions to combat extensive chronic disease prevalence and costs. The authors explore the intersection of chronic disease management and health literacy. They provide specific examples of successful health literacy interventions for managing several highly prevalent chronic diseases. This is followed by suggestions on pairing research and practice to support effective disease management programs. In addition, the authors discuss strategies for collection and dissemination of knowledge gained from collaborations between researchers and practitioners. They identify current challenges specific to disseminating information from the health literacy field and offer potential solutions. The chapter concludes with a brief look at future directions and organizational opportunities to integrate health literacy practices to address the need for effective chronic disease management.

  9. Spanning Professional and Academic: The Changing Identity of Professional Administrators and Managers in Hong Kong's Higher Education Context

    ERIC Educational Resources Information Center

    Cheng, Tak-Iak

    2017-01-01

    This paper builds on Whitchurch's notion of the "blended professional" which aims to examine how mixed professional activity affects professional administrators and managers' identity disposition in universities in Hong Kong. In response to complex missions and demands of contemporary higher education globally, diverse projected-oriented…

  10. 21 CFR 178.1005 - Hydrogen peroxide solution.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 21 Food and Drugs 3 2014-04-01 2014-04-01 false Hydrogen peroxide solution. 178.1005 Section 178... Growth of Microorganisms § 178.1005 Hydrogen peroxide solution. Hydrogen peroxide solution identified in...)(1) of this section. (a) Identity. For the purpose of this section, hydrogen peroxide solution is an...

  11. Current management of male-to-female gender identity disorder in the UK.

    PubMed

    Tugnet, Nicola; Goddard, Jonathan Charles; Vickery, Richard M; Khoosal, Deenesh; Terry, Tim R

    2007-10-01

    Gender identity disorder (GID), or transsexualism as it is more commonly known, is a highly complex clinical entity. Although the exact aetiology of GID is unknown, several environmental, genetic and anatomical theories have been described. The diagnosis of GID can be a difficult process but is established currently using standards of care as defined by the Harry Benjamin International Gender Dysphoria Association. Patients go through extensive psychiatric assessment, including the Real Life Experience, which entails living in the desired gender role 24 h a day for a minimum period of 12 months. The majority of GID patients will eventually go on to have gender realignment surgery, which includes feminising genitoplasty. The clinical features, diagnostic approach and management of male-to-female GID in the UK are reviewed, including the behavioural, psychological and surgical aspects.

  12. An Efficient Identity-Based Key Management Scheme for Wireless Sensor Networks Using the Bloom Filter

    PubMed Central

    Qin, Zhongyuan; Zhang, Xinshuai; Feng, Kerong; Zhang, Qunfang; Huang, Jie

    2014-01-01

    With the rapid development and widespread adoption of wireless sensor networks (WSNs), security has become an increasingly prominent problem. How to establish a session key in node communication is a challenging task for WSNs. Considering the limitations in WSNs, such as low computing capacity, small memory, power supply limitations and price, we propose an efficient identity-based key management (IBKM) scheme, which exploits the Bloom filter to authenticate the communication sensor node with storage efficiency. The security analysis shows that IBKM can prevent several attacks effectively with acceptable computation and communication overhead. PMID:25264955

  13. Identity Management Systems in Healthcare: The Issue of Patient Identifiers

    NASA Astrophysics Data System (ADS)

    Soenens, Els

    According to a recent recommendation of the European Commission, now is the time for Europe to enhance interoperability in eHealth. Although interoperability of patient identifiers seems promising for matters of patient mobility, patient empowerment and effective access to care, we see that today there is indeed a considerable lack of interoperability in the field of patient identification. Looking from a socio-technical rather than a merely technical point of view, one can understand the fact that the development and implementation of an identity management system in a specific healthcare context is influenced by particular social practices, affected by socio-economical history and the political climate and regulated by specific data protection legislations. Consequently, the process of making patient identification in Europe more interoperable is a development beyond semantic and syntactic levels. In this paper, we gives some examples of today’s patient identifier systems in Europe, discuss the issue of interoperability of (unique) patient identifiers from a socio-technical point of view and try not to ignore the ‘privacy side’ of the story.

  14. Sustainable solutions for solid waste management in Southeast Asian countries.

    PubMed

    Ngoc, Uyen Nguyen; Schnitzer, Hans

    2009-06-01

    Human activities generate waste and the amounts tend to increase as the demand for quality of life increases. Today's rate in the Southeast Asian Nations (ASEANs) is alarming, posing a challenge to governments regarding environmental pollution in the recent years. The expectation is that eventually waste treatment and waste prevention approaches will develop towards sustainable waste management solutions. This expectation is for instance reflected in the term 'zero emission systems'. The concept of zero emissions can be applied successfully with today's technical possibilities in the agro-based processing industry. First, the state-of-the-art of waste management in Southeast Asian countries will be outlined in this paper, followed by waste generation rates, sources, and composition, as well as future trends of waste. Further on, solutions for solid waste management will be reviewed in the discussions of sustainable waste management. The paper emphasizes the concept of waste prevention through utilization of all wastes as process inputs, leading to the possibility of creating an ecosystem in a loop of materials. Also, a case study, focusing on the citrus processing industry, is displayed to illustrate the application of the aggregated material input-output model in a widespread processing industry in ASEAN. The model can be shown as a closed cluster, which permits an identification of opportunities for reducing environmental impacts at the process level in the food processing industry. Throughout the discussion in this paper, the utilization of renewable energy and economic aspects are considered to adapt to environmental and economic issues and the aim of eco-efficiency. Additionally, the opportunities and constraints of waste management will be discussed.

  15. Sustainable solutions for solid waste management in Southeast Asian countries

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Uyen Nguyen Ngoc; Schnitzer, Hans

    2009-06-15

    Human activities generate waste and the amounts tend to increase as the demand for quality of life increases. Today's rate in the Southeast Asian Nations (ASEANs) is alarming, posing a challenge to governments regarding environmental pollution in the recent years. The expectation is that eventually waste treatment and waste prevention approaches will develop towards sustainable waste management solutions. This expectation is for instance reflected in the term 'zero emission systems'. The concept of zero emissions can be applied successfully with today's technical possibilities in the agro-based processing industry. First, the state-of-the-art of waste management in Southeast Asian countries will bemore » outlined in this paper, followed by waste generation rates, sources, and composition, as well as future trends of waste. Further on, solutions for solid waste management will be reviewed in the discussions of sustainable waste management. The paper emphasizes the concept of waste prevention through utilization of all wastes as process inputs, leading to the possibility of creating an ecosystem in a loop of materials. Also, a case study, focusing on the citrus processing industry, is displayed to illustrate the application of the aggregated material input-output model in a widespread processing industry in ASEAN. The model can be shown as a closed cluster, which permits an identification of opportunities for reducing environmental impacts at the process level in the food processing industry. Throughout the discussion in this paper, the utilization of renewable energy and economic aspects are considered to adapt to environmental and economic issues and the aim of eco-efficiency. Additionally, the opportunities and constraints of waste management will be discussed.« less

  16. Identity threat at work: how social identity threat and situational cues contribute to racial and ethnic disparities in the workplace.

    PubMed

    Emerson, Katherine T U; Murphy, Mary C

    2014-10-01

    Significant disparities remain between racial and ethnic minorities' and Whites' experiences of American workplaces. Traditional prejudice and discrimination approaches explain these gaps in hiring, promotion, satisfaction, and well-being by pointing to the prejudice of people within organizations such as peers, managers, and executives. Grounded in social identity threat theory, this theoretical review instead argues that particular situational cues-often communicated by well-meaning, largely unprejudiced employees and managers-signal to stigmatized groups whether their identity is threatened and devalued or respected and affirmed. First, we provide an overview of how identity threat shapes the psychological processes of racial and ethnic minorities by heightening vigilance to certain situational cues in the workplace. Next, we outline several of these cues and their role in creating and sustaining perceptions of identity threat (or safety). Finally, we provide empirically grounded suggestions that organizations may use to increase identity safety among their employees of color. Taken together, the research demonstrates how situational cues contribute to disparate psychological experiences for racial and ethnic minorities at work, and suggests that by altering threatening cues, organizations may create more equitable, respectful, and inclusive environments where all people may thrive. (PsycINFO Database Record (c) 2014 APA, all rights reserved).

  17. CACREP Accreditation: A Solution to License Portability and Counselor Identity Problems

    ERIC Educational Resources Information Center

    Mascari, J. Barry; Webber, Jane

    2013-01-01

    A confluence of forces addressing counselor identity occurred with the 20/20: A Vision for the Future of Counseling initiative, the 2009 Standards of the Council for Accreditation of Counseling and Related Education Programs (CACREP), and the quest by the American Association of State Counseling Boards to establish license portability. This…

  18. Managing Written Directives: A Software Solution to Streamline Workflow.

    PubMed

    Wagner, Robert H; Savir-Baruch, Bital; Gabriel, Medhat S; Halama, James R; Bova, Davide

    2017-06-01

    A written directive is required by the U.S. Nuclear Regulatory Commission for any use of 131 I above 1.11 MBq (30 μCi) and for patients receiving radiopharmaceutical therapy. This requirement has also been adopted and must be enforced by the agreement states. As the introduction of new radiopharmaceuticals increases therapeutic options in nuclear medicine, time spent on regulatory paperwork also increases. The pressure of managing these time-consuming regulatory requirements may heighten the potential for inaccurate or incomplete directive data and subsequent regulatory violations. To improve on the paper-trail method of directive management, we created a software tool using a Health Insurance Portability and Accountability Act (HIPAA)-compliant database. This software allows for secure data-sharing among physicians, technologists, and managers while saving time, reducing errors, and eliminating the possibility of loss and duplication. Methods: The software tool was developed using Visual Basic, which is part of the Visual Studio development environment for the Windows platform. Patient data are deposited in an Access database on a local HIPAA-compliant secure server or hard disk. Once a working version had been developed, it was installed at our institution and used to manage directives. Updates and modifications of the software were released regularly until no more significant problems were found with its operation. Results: The software has been used at our institution for over 2 y and has reliably kept track of all directives. All physicians and technologists use the software daily and find it superior to paper directives. They can retrieve active directives at any stage of completion, as well as completed directives. Conclusion: We have developed a software solution for the management of written directives that streamlines and structures the departmental workflow. This solution saves time, centralizes the information for all staff to share, and decreases

  19. Drowning in PC Management: Could a Linux Solution Save Us?

    ERIC Educational Resources Information Center

    Peters, Kathleen A.

    2004-01-01

    Short on funding and IT staff, a Western Canada library struggled to provide adequate public computing resources. Staff turned to a Linux-based solution that supports up to 10 users from a single computer, and blends Web browsing and productivity applications with session management, Internet filtering, and user authentication. In this article,…

  20. Algorithms for synthesizing management solutions based on OLAP-technologies

    NASA Astrophysics Data System (ADS)

    Pishchukhin, A. M.; Akhmedyanova, G. F.

    2018-05-01

    OLAP technologies are a convenient means of analyzing large amounts of information. An attempt was made in their work to improve the synthesis of optimal management decisions. The developed algorithms allow forecasting the needs and accepted management decisions on the main types of the enterprise resources. Their advantage is the efficiency, based on the simplicity of quadratic functions and differential equations of only the first order. At the same time, the optimal redistribution of resources between different types of products from the assortment of the enterprise is carried out, and the optimal allocation of allocated resources in time. The proposed solutions can be placed on additional specially entered coordinates of the hypercube representing the data warehouse.

  1. The physical properties of generic latanoprost ophthalmic solutions are not identical.

    PubMed

    Kolko, Miriam; Koch Jensen, Peter

    2017-06-01

    To compare various characteristics of Xalatan ® and five generic latanoprost ophthalmic solutions. Drop size, volume, pH values, buffer capacity, viscosity, hardness of bottles and costs were determined. Drop sizes were measured in triplicates by micropipettes, and the number of drops counted in three separate bottles of each generic product was determined. pH values were measured in triplicates by a calibrated pH meter. Buffer capacity was exploited by titrating known quantities of strong base into 2.5 ml of each brand and interpolated to neutral pH. Kinematic viscosity was determined by linear regression of timed gravity flow from a vertical syringe through a 21-G cannula. The hardness of the bottles was evaluated by gradually increasing tension on a hook placed around each bottle until a drop was expelled reading the tension on an attached spring scale. Drop sizes and the number of drops in the bottles varied significantly between the generic drugs. The control value of pH in the brand version (Xalatan ® ) was markedly lower compared to the generic latanoprost products. Titration of Xalatan ® to neutrality required substantially more NaOH compared to the generic latanoprost products. Finally, the viscosity revealed a significant variability between brands. Remarkable differences were found in bottle shapes, bottle hardness and costs of the latanoprost generics. Generic latanoprost eye drops should not be considered identical to the original brand version as regards to drop size, volumes, pH values, buffer capacity, viscosity, hardness of bottles and costs. It is likely that these issues affect compliance and intraocular pressure (IOP)-lowering effect. Therefore, re-evaluation of the requirements for introducing generic eye drops seems reasonable. © 2017 Acta Ophthalmologica Scandinavica Foundation. Published by John Wiley & Sons Ltd.

  2. The Dynamics of Networks of Identical Theta Neurons.

    PubMed

    Laing, Carlo R

    2018-02-05

    We consider finite and infinite all-to-all coupled networks of identical theta neurons. Two types of synaptic interactions are investigated: instantaneous and delayed (via first-order synaptic processing). Extensive use is made of the Watanabe/Strogatz (WS) ansatz for reducing the dimension of networks of identical sinusoidally-coupled oscillators. As well as the degeneracy associated with the constants of motion of the WS ansatz, we also find continuous families of solutions for instantaneously coupled neurons, resulting from the reversibility of the reduced model and the form of the synaptic input. We also investigate a number of similar related models. We conclude that the dynamics of networks of all-to-all coupled identical neurons can be surprisingly complicated.

  3. Decision exploration lab: a visual analytics solution for decision management.

    PubMed

    Broeksema, Bertjan; Baudel, Thomas; Telea, Arthur G; Crisafulli, Paolo

    2013-12-01

    We present a visual analytics solution designed to address prevalent issues in the area of Operational Decision Management (ODM). In ODM, which has its roots in Artificial Intelligence (Expert Systems) and Management Science, it is increasingly important to align business decisions with business goals. In our work, we consider decision models (executable models of the business domain) as ontologies that describe the business domain, and production rules that describe the business logic of decisions to be made over this ontology. Executing a decision model produces an accumulation of decisions made over time for individual cases. We are interested, first, to get insight in the decision logic and the accumulated facts by themselves. Secondly and more importantly, we want to see how the accumulated facts reveal potential divergences between the reality as captured by the decision model, and the reality as captured by the executed decisions. We illustrate the motivation, added value for visual analytics, and our proposed solution and tooling through a business case from the car insurance industry.

  4. Are drug treatment services only for 'thieving junkie scumbags'? Drug users and the management of stigmatised identities.

    PubMed

    Radcliffe, Polly; Stevens, Alex

    2008-10-01

    This article uses qualitative interviews with 53 problematic drug users who had dropped out of treatment in England, UK to explore how they describe the stigmatisation of drug users and drug services. It discusses the construction of the category of the junkie through its association with un-controlled heroin use and criminality. It shows how some drug users carefully manage information about their discreditable identities by excluding themselves from this category, while acknowledging its validity for other drug users. The junkie identity was generally seen as shameful and therefore to be avoided, although it holds attractions for some drug users. For many of the interviewees, entry to treatment risked exposing their own activities as shaming, as they saw treatment as being a place that was populated by junkies and where it becomes more difficult to manage discreditable information. The treatment regime, e.g. the routine of supervised consumption of methadone, was itself seen by some as stigmatising and was also seen as hindering progress to the desired 'normal' life of conventional employment. Participation in the community of users of both drugs and drug services was perceived as potentially damaging to the prospects of recovery. This emphasises the importance of social capital, including links to people and opportunities outside the drug market. It also highlights the danger that using the criminal justice system to concentrate prolific offenders in treatment may have the perverse effects of excluding other people who have drug problems and of prolonging the performance of the junkie identity within treatment services. It is concluded that treatment agencies should address these issues, including through the provision of more drug services in mainstream settings, in order to ensure that drug services are not seen to be suitable only for one particularly stigmatised category of drug user.

  5. Why do I dread looking old?: A test of social identity theory, terror management theory, and the double standard of aging.

    PubMed

    Chonody, Jill M; Teater, Barbra

    2016-01-01

    Outward appearance is one of the means by which age is determined, and fear of looking old may stem from fears about social identity and death. This study explored how social identity theory and terror management theory may help to explain the dread of looking old. University students from the United States, England, and Australia (N = 1,042) completed a questionnaire regarding their attitudes about aging and older adults. Results indicated that sex, age, beliefs about personal aging, and death anxiety explained 30.4% of the variance for participants' dread of looking old. Theoretical hypotheses were supported by our findings.

  6. Current management of male‐to‐female gender identity disorder in the UK

    PubMed Central

    Tugnet, Nicola; Goddard, Jonathan Charles; Vickery, Richard M; Khoosal, Deenesh; Terry, Tim R

    2007-01-01

    Gender identity disorder (GID), or transsexualism as it is more commonly known, is a highly complex clinical entity. Although the exact aetiology of GID is unknown, several environmental, genetic and anatomical theories have been described. The diagnosis of GID can be a difficult process but is established currently using standards of care as defined by the Harry Benjamin International Gender Dysphoria Association. Patients go through extensive psychiatric assessment, including the Real Life Experience, which entails living in the desired gender role 24 h a day for a minimum period of 12 months. The majority of GID patients will eventually go on to have gender realignment surgery, which includes feminising genitoplasty. The clinical features, diagnostic approach and management of male‐to‐female GID in the UK are reviewed, including the behavioural, psychological and surgical aspects. PMID:17916872

  7. The Need for a Strategic Foundation for Digital Learning and Knowledge Management Solutions

    ERIC Educational Resources Information Center

    Asgarkhani, Mehdi

    2004-01-01

    This paper elaborates on the importance of a strategic foundation when digital learning or knowledge management (KM) solutions are planned and developed. It looks at some key issues of e-Learning and knowledge management (KM) through discussing the various stages (technologies) and potential benefits of e-Learning; the state of the e-Learning…

  8. 21 CFR 58.83 - Reagents and solutions.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 21 Food and Drugs 1 2011-04-01 2011-04-01 false Reagents and solutions. 58.83 Section 58.83 Food and Drugs FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL GOOD... solutions. All reagents and solutions in the laboratory areas shall be labeled to indicate identity, titer...

  9. Nonautonomous discrete bright soliton solutions and interaction management for the Ablowitz-Ladik equation.

    PubMed

    Yu, Fajun

    2015-03-01

    We present the nonautonomous discrete bright soliton solutions and their interactions in the discrete Ablowitz-Ladik (DAL) equation with variable coefficients, which possesses complicated wave propagation in time and differs from the usual bright soliton waves. The differential-difference similarity transformation allows us to relate the discrete bright soliton solutions of the inhomogeneous DAL equation to the solutions of the homogeneous DAL equation. Propagation and interaction behaviors of the nonautonomous discrete solitons are analyzed through the one- and two-soliton solutions. We study the discrete snaking behaviors, parabolic behaviors, and interaction behaviors of the discrete solitons. In addition, the interaction management with free functions and dynamic behaviors of these solutions is investigated analytically, which have certain applications in electrical and optical systems.

  10. Does the non-identity problem block a class of arguments against cloning?

    PubMed

    Green, Richard

    2004-01-01

    One class of argument against cloning human beings in the contemporary literature focuses on the bad consequences that will befall the clone or "later-twin." In this paper I consider whether this line of argumentation can be blocked by invoking Parfit's non-identity problem. I canvass two general strategies for solving the non-identity problem: a consequentialist strategy and non-consequentialist, rights based strategy. I argue that while each general strategy offers a plausible solution to the non-identity problem as applied to the cases most frequently discussed in the non-identity problem literature, neither provides a reason for putting aside the non-identity problem when applied to cloning. I conclude (roughly) that the non-identity problem does serve to block this class of argument against cloning.

  11. Does the Department of Defense Possess Solutions for the Department of Homeland Security’s Personnel Management Issues?

    DTIC Science & Technology

    2015-12-01

    DEPARTMENT OF DEFENSE POSSESS SOLUTIONS FOR THE DEPARTMENT OF HOMELAND SECURITY’S PERSONNEL MANAGEMENT ISSUES? by Joshua D. Frizzell December 2015...22202-4302, and to the Office of Management and Budget, Paperwork Reduction Project (0704-0188) Washington, DC 20503. 1. AGENCY USE ONLY (Leave blank...SOLUTIONS FOR THE DEPARTMENT OF HOMELAND SECURITY’S PERSONNEL MANAGEMENT ISSUES? 5. FUNDING NUMBERS 6. AUTHOR(S) Joshua D. Frizzell 7

  12. A cryptographic key management solution for HIPAA privacy/security regulations.

    PubMed

    Lee, W-B; Lee, C-D

    2008-01-01

    The Health Insurance Portability and Accountability Act (HIPAA) privacy and security regulations are two crucial provisions in the protection of healthcare privacy. Privacy regulations create a principle to assure that patients have more control over their health information and set limits on the use and disclosure of health information. The security regulations stipulate the provisions implemented to guard data integrity, confidentiality, and availability. Undoubtedly, the cryptographic mechanisms are well defined to provide suitable solutions. In this paper, to comply with the HIPAA regulations, a flexible cryptographic key management solution is proposed to facilitate interoperations among the applied cryptographic mechanisms. In addition, case of consent exceptions intended to facilitate emergency applications and other possible exceptions can also be handled easily.

  13. Action recognition is sensitive to the identity of the actor.

    PubMed

    Ferstl, Ylva; Bülthoff, Heinrich; de la Rosa, Stephan

    2017-09-01

    Recognizing who is carrying out an action is essential for successful human interaction. The cognitive mechanisms underlying this ability are little understood and have been subject of discussions in embodied approaches to action recognition. Here we examine one solution, that visual action recognition processes are at least partly sensitive to the actor's identity. We investigated the dependency between identity information and action related processes by testing the sensitivity of neural action recognition processes to clothing and facial identity information with a behavioral adaptation paradigm. Our results show that action adaptation effects are in fact modulated by both clothing information and the actor's facial identity. The finding demonstrates that neural processes underlying action recognition are sensitive to identity information (including facial identity) and thereby not exclusively tuned to actions. We suggest that such response properties are useful to help humans in knowing who carried out an action. Copyright © 2017 The Author(s). Published by Elsevier B.V. All rights reserved.

  14. Dissolution of spent nuclear fuel in carbonate-peroxide solution

    NASA Astrophysics Data System (ADS)

    Soderquist, Chuck; Hanson, Brady

    2010-01-01

    This study shows that spent UO2 fuel can be completely dissolved in a room temperature carbonate-peroxide solution apparently without attacking the metallic Mo-Tc-Ru-Rh-Pd fission product phase. In parallel tests, identical samples of spent nuclear fuel were dissolved in nitric acid and in an ammonium carbonate, hydrogen peroxide solution. The resulting solutions were analyzed for strontium-90, technetium-99, cesium-137, europium-154, plutonium, and americium-241. The results were identical for all analytes except technetium, where the carbonate-peroxide dissolution had only about 25% of the technetium that the nitric acid dissolution had.

  15. Expanding the disaster risk management framework: Measuring the constructed level of national identity as a factor of political risk

    PubMed Central

    2016-01-01

    Political risk is identified as a dominant risk category of disaster risk management (DRM) which could negatively affect the success of those measures implemented to reduce disaster risk. Key to political risk is the construct of national identity which, if poorly constructed, could greatly contribute to political risk. This article proposed a tool to measure the construct of national identity and to provide recommendations to strengthen the construct in order to mitigate the exacerbating influence it may have on political risk and ultimately on DRM. The design of the measurement tool consisted of a mixed methodological approach employing both quantitative and qualitative data. The data collection instruments included a literature review (which is shortly provided in the previous sections) and an empirical study that utilised data obtained through structured questionnaires. Although the results of the proposed measuring instrument did not include a representative sample of all the cultures in South Africa, the results alluded to different levels for the construction of national identity among black and white respondents, possibly because of different ideological expectations among these groups. The results of the study should be considered as a validation of the measuring tool and not necessarily of the construct of national identity in South Africa. The measuring tool is thus promising for future studies to reduce political risk and ultimately disaster risk.

  16. Bringing Federated Identity to Grid Computing

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Teheran, Jeny

    The Fermi National Accelerator Laboratory (FNAL) is facing the challenge of providing scientific data access and grid submission to scientific collaborations that span the globe but are hosted at FNAL. Users in these collaborations are currently required to register as an FNAL user and obtain FNAL credentials to access grid resources to perform their scientific computations. These requirements burden researchers with managing additional authentication credentials, and put additional load on FNAL for managing user identities. Our design integrates the existing InCommon federated identity infrastructure, CILogon Basic CA, and MyProxy with the FNAL grid submission system to provide secure access formore » users from diverse experiments and collab orations without requiring each user to have authentication credentials from FNAL. The design automates the handling of certificates so users do not need to manage them manually. Although the initial implementation is for FNAL's grid submission system, the design and the core of the implementation are general and could be applied to other distributed computing systems.« less

  17. Developing a workable teacher identity: Building and negotiating identity within a professional network

    NASA Astrophysics Data System (ADS)

    Rostock, Roseanne

    The challenge of attracting and retaining the next generation of teachers who are skilled and committed to meeting the growing demands of the profession is of increasing concern to researchers and policy makers, particularly since 45--50% of beginning teachers leave the profession within five years (Ingersoll & Smith, 2003). Reasons for such attrition include compensation, status and working conditions; however, there is growing evidence that a critical factor in new teacher retention hinges on teachers' ability to accomplish the difficult task of forming a workable professional identity in the midst of competing discourses about teaching (Alsup, 2006; Britzman, 2003). There is little research on professional identity development among those beginning teachers at highest risk for attrition (secondary math and science teachers, and those with strong academic backgrounds). This study explores the professional identity development of early-career math and science teachers who are part of the Knowles Science Teaching Foundation's (KSTF) teaching fellowship program, an external support network that aims to address many of the issues leading to high attrition among this particular population of teachers. Using narrative research methods, I examine three case studies of beginning teachers, exploring how they construct professional identity in relation to various discourse communities and negotiate tensions across multiple discourses. The cases identify both dominant discourses and counter-discourses that the teachers draw upon for important identity development resources. They also demonstrate that the way a teacher manages tensions across competing discourses is important to how well one can negotiate a workable professional identity. In particular, they emphasize the importance of engaging in borderland discourses (Gee, 1996) as a way of taking agency in one's own identity development as well as in transforming one's discourse communities. These cases shed light on how

  18. 5 CFR 736.103 - Protecting the identity of a source.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 5 Administrative Personnel 2 2012-01-01 2012-01-01 false Protecting the identity of a source. 736.103 Section 736.103 Administrative Personnel OFFICE OF PERSONNEL MANAGEMENT (CONTINUED) CIVIL SERVICE REGULATIONS (CONTINUED) PERSONNEL INVESTIGATIONS Scope § 736.103 Protecting the identity of a source. When a...

  19. 5 CFR 736.103 - Protecting the identity of a source.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 5 Administrative Personnel 2 2013-01-01 2013-01-01 false Protecting the identity of a source. 736.103 Section 736.103 Administrative Personnel OFFICE OF PERSONNEL MANAGEMENT (CONTINUED) CIVIL SERVICE REGULATIONS (CONTINUED) PERSONNEL INVESTIGATIONS Scope § 736.103 Protecting the identity of a source. When a...

  20. 5 CFR 736.103 - Protecting the identity of a source.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 5 Administrative Personnel 2 2011-01-01 2011-01-01 false Protecting the identity of a source. 736.103 Section 736.103 Administrative Personnel OFFICE OF PERSONNEL MANAGEMENT (CONTINUED) CIVIL SERVICE REGULATIONS (CONTINUED) PERSONNEL INVESTIGATIONS Scope § 736.103 Protecting the identity of a source. When a...

  1. 5 CFR 736.103 - Protecting the identity of a source.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 5 Administrative Personnel 2 2014-01-01 2014-01-01 false Protecting the identity of a source. 736.103 Section 736.103 Administrative Personnel OFFICE OF PERSONNEL MANAGEMENT (CONTINUED) CIVIL SERVICE REGULATIONS (CONTINUED) PERSONNEL INVESTIGATIONS Scope § 736.103 Protecting the identity of a source. When a...

  2. 5 CFR 736.103 - Protecting the identity of a source.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 5 Administrative Personnel 2 2010-01-01 2010-01-01 false Protecting the identity of a source. 736.103 Section 736.103 Administrative Personnel OFFICE OF PERSONNEL MANAGEMENT (CONTINUED) CIVIL SERVICE REGULATIONS (CONTINUED) PERSONNEL INVESTIGATIONS Scope § 736.103 Protecting the identity of a source. When a...

  3. Solutions Network Formulation Report. The Potential Contributions of the Global Precipitation Measurement Mission to Estuary Management in Acadia National Park

    NASA Technical Reports Server (NTRS)

    Anderson, Daniel; Hilbert, Kent; Lewis, David

    2007-01-01

    This candidate solution suggests the use of GPM precipitation observations to enhance the Acadia National Park NLERDSS. Simulated GPM data should provide measurements that would enable analysis of how precipitation affects runoff and nutrient load in the park?s wetlands. This solution benefits society by aiding park and resource managers in making predictions based on hypothetical changes and in identifying effective mitigation scenarios. This solution supports the Coastal Management, Water Management, and Ecological Forecasting National Applications.

  4. [Identity and dissociation in cyberspace. A case of dissociative identity disorder associated with internet role playing].

    PubMed

    Te Wildt, B T; Kowalewski, E; Meibeyer, F; Huber, T

    2006-01-01

    By mediating dissociative experiences, the Internet can challenge the boundaries of people's sense of identity. To illustrate this hypothesis, a case of dissociative identity disorder (DID) is presented. A young unemployed woman created and frequently played several characters in an online game. For more than 2 years she spent up to 12 h a day in the Internet, assuming various personalities, which in return intruded upon her neglected real life. During the course of an inpatient psychotherapeutic treatment, the clinical diagnosis of DID was confirmed by psychometric testing. After 12 weeks of psychotherapy, the patient had managed to identify her fragmented identities as character traits and integrated them into her core personality. She rearranged her real everyday life, found a new job, and reduced her online activities. Even though the patient's psychopathology stems from a disposition in terms of a personality disorder with histrionic and narcissistic features, excessive internet role play obviously functioned as a trigger to develop DIS. Conclusively, cyberspace's anonymous interactivity may offer the possibility to explore one's identity while also putting at risk its coherence.

  5. 21 CFR 58.83 - Reagents and solutions.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... and Drugs FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL GOOD LABORATORY PRACTICE FOR NONCLINICAL LABORATORY STUDIES Testing Facilities Operation § 58.83 Reagents and solutions. All reagents and solutions in the laboratory areas shall be labeled to indicate identity, titer...

  6. Topical Clonazepam Solution for the Management of Burning Mouth Syndrome: A Retrospective Study.

    PubMed

    Kuten-Shorrer, Michal; Treister, Nathaniel S; Stock, Shannon; Kelley, John M; Ji, Yisi D; Woo, Sook-Bin; Lerman, Mark A; Palmason, Stefan; Sonis, Stephen T; Villa, Alessandro

    2017-01-01

    To evaluate and compare the effectiveness of two concentrations of topical clonazepam solution in improving symptoms of burning mouth syndrome (BMS). A retrospective chart review was conducted of patients diagnosed with BMS and managed with topical clonazepam solution between 2008 and 2015. A 0.5-mg/mL solution was prescribed until 2012, when this was changed to a 0.1 mg/mL solution. Patients were instructed to swish with 5 mL for 5 minutes and spit two to four times daily. The efficacies of the two concentrations were compared using patient-reported outcome measures at the first follow-up, including the reported percentage of improvement in burning symptoms and the change in burning severity from baseline ranked on an 11-point numeric rating scale (NRS). Response to treatment was compared between the two concentrations using Wilcoxon rank sum test. A total of 57 subjects were included, 32 in the 0.1-mg/mL cohort and 25 in the 0.5-mg/mL cohort, and evaluated at a median follow-up of 7 weeks. The median overall percentage improvement was 32.5% in the 0.1-mg/mL cohort and 75% in the 0.5-mg/mL cohort. The median reduction in NRS score was 0.5 points in the 0.1-mg/mL cohort and 6 points in the 0.5-mg/mL cohort. The use of either outcome measure revealed that the response to treatment with the 0.5-mg/mL solution was superior to that of the 0.1 mg/mL solution (P < .01). These findings suggest that a 0.5-mg/mL topical clonazepam solution is effective in the management of BMS. Future randomized clinical trials are warranted.

  7. Juggling identities of rheumatoid arthritis, motherhood and paid work - a grounded theory study.

    PubMed

    Feddersen, Helle; Mechlenborg Kristiansen, Tine; Tanggaard Andersen, Pernille; Hørslev-Petersen, Kim; Primdahl, Jette

    2018-02-01

    To explore how women with rheumatoid arthritis manage their illness, motherhood, and work life. A constructivist, grounded theory approach based on individual interviews and participant observations with 20 women with rheumatoid arthritis who participated in work life and had children living at home or were pregnant. After initial and focused coding Goffman's concepts of social identity were applied. A core category: "Juggling meaningful identities" and three conceptual categories were developed: (1) Work life as the strongest identity marker; (2) Motherhood: a two-sided act; (3) Living with rheumatoid arthritis as an identity? Paid work, motherhood, and illness are linked to the women's social identities. The women construct and change their identities in interactions with children, partners, other parents, colleagues, and employers. The women attribute the highest priority to their professional identity, spending the majority of their time and energy in an effort to appear as "good stable workers". The disease is seen as a hindrance in this regard, and the illness identity is almost completely rejected. In motherhood, the women prioritize close interaction with their children, and deprioritize external activities. Extended outbreaks of the disease and issues regarding the children force the women to deprioritize working life. Implications for rehabilitation Juggling meaningful identities of rheumatoid arthritis, motherhood, and paid work challenge women in managing their everyday lives. Therefore, rehabilitation professionals should support individuals to develop new strategies to manage the challenges they experience regarding juggling motherhood and work ability. Work is a dominant identity marker for women with rheumatoid arthritis therefore, rehabilitation professionals have an important role to play in investigating possible ways for the individual to maintain employment or return to work. Living with rheumatoid arthritis and being a paid worker challenge

  8. The Library Manager's Deskbook: 102 Expert Solutions to 101 Common Dilemmas.

    ERIC Educational Resources Information Center

    Carson, Paula Phillips; And Others

    This is a handbook of advice for handling the everyday problems encountered in all types and sizes of libraries. It is designed to assist managers before, during, and after crises develop. Organized in an question-and-answer format, it tackles many dilemmas that can occur in the library, then offers solutions drawn from actual experience. The…

  9. Online benefits solutions--a new trend in managing employee benefits programs.

    PubMed

    Ala, Mohammad; Brunaczki, Bernadette

    2003-01-01

    This article focuses on the array of online benefits solutions offered by technology companies and reports the benefits to both employers and employees. Some of the benefits include reduced paperwork, reduced errors, and reduced administration costs. Companies that can deliver these benefits will be in great demand to help manage benefits programs and streamline the administrative processes.

  10. An integrative solution for managing, tracing and citing sensor-related information

    NASA Astrophysics Data System (ADS)

    Koppe, Roland; Gerchow, Peter; Macario, Ana; Schewe, Ingo; Rehmcke, Steven; Düde, Tobias

    2017-04-01

    In a data-driven scientific world, the need to capture information on sensors used in the data acquisition process has become increasingly important. Following the recommendations of the Open Geospatial Consortium (OGC), we started by adopting the SensorML standard for describing platforms, devices and sensors. However, it soon became obvious to us that understanding, implementing and filling such standards costs significant effort and cannot be expected from every scientist individually. So we developed a web-based sensor management solution (https://sensor.awi.de) for describing platforms, devices and sensors as hierarchy of systems which supports tracing changes to a system whereas hiding complexity. Each platform contains devices where each device can have sensors associated with specific identifiers, contacts, events, related online resources (e.g. manufacturer factsheets, calibration documentation, data processing documentation), sensor output parameters and geo-location. In order to better understand and address real world requirements, we have closely interacted with field-going scientists in the context of the key national infrastructure project "FRontiers in Arctic marine Monitoring ocean observatory" (FRAM) during the software development. We learned that not only the lineage of observations is crucial for scientists but also alert services using value ranges, flexible output formats and information on data providers (e.g. FTP sources) for example. Mostly important, persistent and citable versions of sensor descriptions are required for traceability and reproducibility allowing seamless integration with existing information systems, e.g. PANGAEA. Within the context of the EU-funded Ocean Data Interoperability Platform project (ODIP II) and in cooperation with 52north we are proving near real-time data via Sensor Observation Services (SOS) along with sensor descriptions based on our sensor management solution. ODIP II also aims to develop a harmonized

  11. Managing risk and marginalizing identities: on the society-of-captives thesis and the harm of social dis-ease.

    PubMed

    Arrigo, Bruce A

    2013-06-01

    This article develops the constitutive features of the society-of-captives thesis as suggested by Arrigo and Milovanovic, and Arrigo, Bersot, and Sellers. The relevance of this thesis is briefly explored in relation to the institutional and community-based treatment philosophies that currently inform the mental health and criminal justice systems. This exploration specifies how risk (being human and doing humanness differently) is managed symbolically, linguistically, materially, and culturally. The management of this risk extends to the kept as well as to their keepers, regulators, and watchers (i.e., the society of captives). This article calls for a new clinical praxis (being/doing a critical mindfulness) designed to overcome the totalizing madness (the harm of social dis-ease) that follows from managing risk fearfully and marginalizing identities desperately as reified recursively through society's captivity. The ethical underpinnings of this clinical praxis represent an emergent direction for undertaking correctional policy reform.

  12. The gender identity/gender dysphoria questionnaire for adolescents and adults.

    PubMed

    Deogracias, Joseph J; Johnson, Laurel L; Meyer-Bahlburg, Heino F L; Kessler, Suzanne J; Schober, Justine M; Zucker, Kenneth J

    2007-11-01

    The present study reports on the construction of a dimensional measure of gender identity (gender dysphoria) for adolescents and adults. The 27-item gender identity/gender dysphoria questionnaire for adolescents and adults (GIDYQ-AA) was administered to 389 university students (heterosexual and nonheterosexual) and 73 clinic-referred patients with gender identity disorder. Principal axis factor analysis indicated that a one-factor solution, accounting for 61.3% of the total variance, best fits the data. Factor loadings were all >or= .30 (median, .82; range, .34-.96). A mean total score (Cronbach's alpha, .97) was computed, which showed strong evidence for discriminant validity in that the gender identity patients had significantly more gender dysphoria than both the heterosexual and nonheterosexual university students. Using a cut-point of 3.00, we found the sensitivity was 90.4% for the gender identity patients and specificity was 99.7% for the controls. The utility of the GIDYQ-AA is discussed.

  13. Thermally conductive tough flexible elastomers as composite of slide-ring materials and surface modified boron nitride particles via plasma in solution

    NASA Astrophysics Data System (ADS)

    Goto, Taku; Iida, Masaki; Tan, Helen; Liu, Chang; Mayumi, Koichi; Maeda, Rina; Kitahara, Koichi; Hatakeyama, Kazuto; Ito, Tsuyohito; Shimizu, Yoshiki; Yokoyama, Hideaki; Kimura, Kaoru; Ito, Kohzo; Hakuta, Yukiya; Terashima, Kazuo

    2018-03-01

    We have developed a thermally conductive flexible elastomer as a composite material with slide-ring (SR) materials and boron nitride (BN) particles surface-modified via plasma in solution. This composite shows excellent properties as a flexible insulator for thermal management. Surface modification of BN particles using plasma in solution increases the tensile strength, extension ratio at break, toughness, and rubber characteristics of the composites, compared to SR and non-modified BN, while the Young's modulus values are identical. Furthermore, the thermal conductivity also improved as a result of plasma surface modification.

  14. Community-based telemonitoring for hypertension management: practical challenges and potential solutions.

    PubMed

    Hovey, Lauren; Kaylor, Mary Beth; Alwan, Majd; Resnick, Helaine E

    2011-10-01

    Older adults residing in rural areas often lack convenient, patient-centered, community-based approaches to facilitate receipt of routine care to manage common chronic conditions. Without adequate access to appropriate disease management resources, the risk of seniors' experiencing acute events related to these common conditions increases substantially. Further, poorly managed chronic conditions are costly and place seniors at increased risk of institutionalization and permanent loss of independence. Novel, telehealth-based approaches to management of common chronic conditions like hypertension may not only improve the health of older adults, but may also lead to substantial cost savings associated with acute care episodes and institutionalization. The aim of this report is to summarize practical considerations related to operations and logistics of a unique community-based telemonitoring pilot study targeting rural seniors who utilize community-based senior centers. This article reviews the technological challenges encountered during the study and proposes solutions relevant to future research and implementation of telehealth in community-based, congregate settings.

  15. Constructing nurses' professional identity through social identity theory.

    PubMed

    Willetts, Georgina; Clarke, David

    2014-04-01

    The profession of nursing continues to struggle with defining and clarifying its professional identity. The definitive recognition of nursing as a profession was the moving of training from the hospital apprentice model to the tertiary sector. However, this is only part of the story of professional identity in nursing. Once training finishes and enculturation into the workplace commences, professional identity becomes a complicated social activity. This paper proposes social identity theory as a valuable research framework to assist with clarifying and describing the professional identity of nurses. The paper outlines the key elements of a profession and then goes on to describe the main concepts of social identity theory. Lastly, a connection is made between the usefulness of using social identity theory in researching professional identity in nursing, recognizing the contextual nature of the social activity of the profession within its workplace environment. © 2013 Wiley Publishing Asia Pty Ltd.

  16. CRC Clinical Trials Management System (CTMS): An Integrated Information Management Solution for Collaborative Clinical Research

    PubMed Central

    Payne, Philip R.O.; Greaves, Andrew W.; Kipps, Thomas J.

    2003-01-01

    The Chronic Lymphocytic Leukemia (CLL) Research Consortium (CRC) consists of 9 geographically distributed sites conducting a program of research including both basic science and clinical components. To enable the CRC’s clinical research efforts, a system providing for real-time collaboration was required. CTMS provides such functionality, and demonstrates that the use of novel data modeling, web-application platforms, and management strategies provides for the deployment of an extensible, cost effective solution in such an environment. PMID:14728471

  17. Utilising integrated urban water management to assess the viability of decentralised water solutions.

    PubMed

    Burn, Stewart; Maheepala, Shiroma; Sharma, Ashok

    2012-01-01

    Cities worldwide are challenged by a number of urban water issues associated with climate change, population growth and the associated water scarcity, wastewater flows and stormwater run-off. To address these problems decentralised solutions are increasingly being considered by water authorities, and integrated urban water management (IUWM) has emerged as a potential solution to most of these urban water challenges, and as the key to providing solutions incorporating decentralised concepts at a city wide scale. To incorporate decentralised options, there is a need to understand their performance and their impact on a city's total water cycle under alternative water and land management options. This includes changes to flow, nutrient and sediment regimes, energy use, greenhouse gas emissions, and the impacts on rivers, aquifers and estuaries. Application of the IUWM approach to large cities demands revisiting the fundamental role of water system design in sustainable city development. This paper uses the extended urban metabolism model (EUMM) to expand a logical definition for the aims of IUWM, and discusses the role of decentralised systems in IUWM and how IUWM principles can be incorporated into urban water planning.

  18. Ocean acidification: Linking science to management solutions using the Great Barrier Reef as a case study.

    PubMed

    Albright, Rebecca; Anthony, Kenneth R N; Baird, Mark; Beeden, Roger; Byrne, Maria; Collier, Catherine; Dove, Sophie; Fabricius, Katharina; Hoegh-Guldberg, Ove; Kelly, Ryan P; Lough, Janice; Mongin, Mathieu; Munday, Philip L; Pears, Rachel J; Russell, Bayden D; Tilbrook, Bronte; Abal, Eva

    2016-11-01

    Coral reefs are one of the most vulnerable ecosystems to ocean acidification. While our understanding of the potential impacts of ocean acidification on coral reef ecosystems is growing, gaps remain that limit our ability to translate scientific knowledge into management action. To guide solution-based research, we review the current knowledge of ocean acidification impacts on coral reefs alongside management needs and priorities. We use the world's largest continuous reef system, Australia's Great Barrier Reef (GBR), as a case study. We integrate scientific knowledge gained from a variety of approaches (e.g., laboratory studies, field observations, and ecosystem modelling) and scales (e.g., cell, organism, ecosystem) that underpin a systems-level understanding of how ocean acidification is likely to impact the GBR and associated goods and services. We then discuss local and regional management options that may be effective to help mitigate the effects of ocean acidification on the GBR, with likely application to other coral reef systems. We develop a research framework for linking solution-based ocean acidification research to practical management options. The framework assists in identifying effective and cost-efficient options for supporting ecosystem resilience. The framework enables on-the-ground OA management to be the focus, while not losing sight of CO2 mitigation as the ultimate solution. Copyright © 2016 Elsevier Ltd. All rights reserved.

  19. Current management of gender identity disorder in childhood and adolescence: guidelines, barriers and areas of controversy.

    PubMed

    Shumer, Daniel E; Spack, Norman P

    2013-02-01

    The approach to gender identity disorder (GID) in childhood and adolescence has been rapidly evolving and is in a state of flux. In an effort to form management recommendations on the basis of the available literature, The Endocrine Society published clinical practice guidelines in 2009. The guidelines recommend against sex role change in prepubertal children, but they recommend the use of gonadotropin-releasing hormone (GnRH) agonists to suppress puberty in adolescence, and the use of cross-sex hormones starting around age 16 for eligible patients. In actual practice, the approach to GID is quite variable due to continued lack of consensus and specific barriers to treatment that are unique to GID. Recent literature has focused on the mental health approach to prepubertal children with GID and short-term outcomes using pubertal suppression and cross-sex steroids in adolescents with GID. This review will describe the literature published since the release of The Endocrine Society guidelines regarding the management of GID in both children and adolescents.

  20. Co-Leadership - A Management Solution for Integrated Health and Social Care.

    PubMed

    Klinga, Charlotte; Hansson, Johan; Hasson, Henna; Sachs, Magna Andreen

    2016-05-23

    Co-leadership has been identified as one approach to meet the managerial challenges of integrated services, but research on the topic is limited. In the present study, co-leadership, practised by pairs of managers - each manager representing one of the two principal organizations in integrated health and social care services - was explored. To investigate co-leadership in integrated health and social care, identify essential preconditions in fulfilling the management assignment, its operationalization and impact on provision of sustainable integration of health and social care. Interviews with eight managers exercising co-leadership were analysed using directed content analysis. Respondent validation was conducted through additional interviews with the same managers. Key contextual preconditions were an organization-wide model supporting co-leadership and co-location of services. Perception of the management role as a collective activity, continuous communication and lack of prestige were essential personal and interpersonal preconditions. In daily practice, office sharing, being able to give and take and support each other contributed to provision of sustainable integration of health and social care. Co-leadership promoted robust management by providing broader competence, continuous learning and joint responsibility for services. Integrated health and social care services should consider employing co-leadership as a managerial solution to achieve sustainability.

  1. Special solutions to Chazy equation

    NASA Astrophysics Data System (ADS)

    Varin, V. P.

    2017-02-01

    We consider the classical Chazy equation, which is known to be integrable in hypergeometric functions. But this solution has remained purely existential and was never used numerically. We give explicit formulas for hypergeometric solutions in terms of initial data. A special solution was found in the upper half plane H with the same tessellation of H as that of the modular group. This allowed us to derive some new identities for the Eisenstein series. We constructed a special solution in the unit disk and gave an explicit description of singularities on its natural boundary. A global solution to Chazy equation in elliptic and theta functions was found that allows parametrization of an arbitrary solution to Chazy equation. The results have applications to analytic number theory.

  2. Resolving an identity crisis: Implicit drinking identity and implicit alcohol identity are related but not the same.

    PubMed

    Ramirez, Jason J; Olin, Cecilia C; Lindgren, Kristen P

    2017-09-01

    Two variations of the Implicit Association Test (IAT), the Drinking Identity IAT and the Alcohol Identity IAT, assess implicit associations held in memory between one's identity and alcohol-related constructs. Both have been shown to predict numerous drinking outcomes, but these IATs have never been directly compared to one another. The purpose of this study was to compare these IATs and evaluate their incremental predictive validity. US undergraduate students (N=64, 50% female, mean age=21.98years) completed the Drinking Identity IAT, the Alcohol Identity IAT, an explicit measure of drinking identity, as well as measures of typical alcohol consumption and hazardous drinking. When evaluated in separate regression models that controlled for explicit drinking identity, results indicated that the Drinking Identity IAT and the Alcohol Identity IAT were significant, positive predictors of typical alcohol consumption, and that the Drinking Identity IAT, but not the Alcohol Identity IAT, was a significant predictor of hazardous drinking. When evaluated in the same regression models, the Drinking Identity IAT, but not the Alcohol Identity IAT, was significantly associated with typical and hazardous drinking. These results suggest that the Drinking Identity IAT and Alcohol Identity IAT are related but not redundant. Moreover, given that the Drinking Identity IAT, but not the Alcohol Identity IAT, incrementally predicted variance in drinking outcomes, identification with drinking behavior and social groups, as opposed to identification with alcohol itself, may be an especially strong predictor of drinking outcomes. Copyright © 2017 Elsevier Ltd. All rights reserved.

  3. Identity-Based Verifiably Encrypted Signatures without Random Oracles

    NASA Astrophysics Data System (ADS)

    Zhang, Lei; Wu, Qianhong; Qin, Bo

    Fair exchange protocol plays an important role in electronic commerce in the case of exchanging digital contracts. Verifiably encrypted signatures provide an optimistic solution to these scenarios with an off-line trusted third party. In this paper, we propose an identity-based verifiably encrypted signature scheme. The scheme is non-interactive to generate verifiably encrypted signatures and the resulting encrypted signature consists of only four group elements. Based on the computational Diffie-Hellman assumption, our scheme is proven secure without using random oracles. To the best of our knowledge, this is the first identity-based verifiably encrypted signature scheme provably secure in the standard model.

  4. Revisiting the two formulations of Bianchi identities and their implications on moduli stabilization

    NASA Astrophysics Data System (ADS)

    Shukla, Pramod

    2016-08-01

    In the context of non-geometric type II orientifold compactifications, there have been two formulations for representing the various NS-NS Bianchi-identities. In the first formulation, the standard three-form flux ( H 3), the geometric flux ( ω) and the non-geometric fluxes ( Q and R) are expressed by using the real six-dimensional indices (e.g. {H}_{ijk}, {ω_{ij}}^k, {Q_i}{_{jk}} and R ijk ), and this formulation has been heavily utilized for simplifying the scalar potentials in toroidal-orientifolds. On the other hand, relevant for the studies beyond toroidal backgrounds, a second formulation is utilized in which all flux components are written in terms of various involutively even/odd (2 , 1)- and (1 , 1)-cohomologies of the complex threefold. In the lights of recent model building interests and some observations made in [1, 2], in this article, we revisit two most commonly studied toroidal examples in detail to illustrate that the present forms of these two formulations are not completely equivalent. To demonstrate the same, we translate all the identities of the first formulation into cohomology ingredients, and after a tedious reshuffling of the subsequent constraints, interestingly we find that all the identities of the second formulation are embedded into the first formulation which has some additional constraints. In addition, we look for the possible solutions of these Bianchi identities in a detailed analysis, and we find that some solutions can reduce the size of scalar potential very significantly, and in some cases are too strong to break the no-scale structure completely. Finally, we also comment on the influence of imposing some of the solutions of Bianchi identities in studying moduli stabilization.

  5. New nurse transition: success through aligning multiple identities.

    PubMed

    Leong, Yee Mun Jessica; Crossman, Joanna

    2015-01-01

    The purpose of this paper is to explore the perceptions of new nurses in Singapore of their experiences of role transition and to examine the implications for managers in terms of employee training, development and retention. This qualitative study was conducted using a constructivist grounded theory approach. In total 26 novice nurses and five preceptors (n=31) from five different hospitals participated in the study. Data were collected from semi-structured interviews and reflective journal entries and analysed using the constant comparative method. The findings revealed that novice nurses remained emotionally and physically challenged when experiencing role transition. Two major constructs appear to play an important part in the transition process; learning how to Fit in and aligning personal with professional and organisational identities. The findings highlight factors that facilitate or impede Fitting in and aligning these identities. Although the concept of Fitting in and its relation to the attrition of novice nurses has been explored in global studies, that relationship has not yet been theorised as the dynamic alignment of multiple identities. Also, whilst most research around Fitting in, identity and retention has been conducted in western countries, little is known about these issues and their interrelationship in the context of Singapore. The study should inform decision making by healthcare organisations, nurse managers and nursing training institutions with respect to improving the transition experience of novice nurses.

  6. [Womanhood today--identity experiences and identity crises].

    PubMed

    Kast, V

    1985-01-01

    Modern women's identity crises and the various possibilities of identification along the way towards a new identity can be seen as her attempts to develop out of the depressive situation that her once normal role identity had, to a large extent, placed her in. Under this aspect, even concepts of living that are seen by many to be problematic can be justified as leading along the way towards identity, which is so essential for human relationships and interpersonal empathy.

  7. An SNMP-based solution to enable remote ISO/IEEE 11073 technical management.

    PubMed

    Lasierra, Nelia; Alesanco, Alvaro; García, José

    2012-07-01

    This paper presents the design and implementation of an architecture based on the integration of simple network management protocol version 3 (SNMPv3) and the standard ISO/IEEE 11073 (X73) to manage technical information in home-based telemonitoring scenarios. This architecture includes the development of an SNMPv3-proxyX73 agent which comprises a management information base (MIB) module adapted to X73. In the proposed scenario, medical devices (MDs) send information to a concentrator device [designated as compute engine (CE)] using the X73 standard. This information together with extra information collected in the CE is stored in the developed MIB. Finally, the information collected is available for remote access via SNMP connection. Moreover, alarms and events can be configured by an external manager in order to provide warnings of irregularities in the MDs' technical performance evaluation. This proposed SNMPv3 agent provides a solution to integrate and unify technical device management in home-based telemonitoring scenarios fully adapted to X73.

  8. Product Lifecycle Management and the Quest for Sustainable Space Exploration Solutions

    NASA Technical Reports Server (NTRS)

    Caruso, Pamela W.; Dumbacher, Daniel L.; Grieves, Michael

    2011-01-01

    Product Lifecycle Management (PLM) is an outcome of lean thinking to eliminate waste and increase productivity. PLM is inextricably tied to the systems engineering business philosophy, coupled with a methodology by which personnel, processes and practices, and information technology combine to form an architecture platform for product design, development, manufacturing, operations, and decommissioning. In this model, which is being implemented by the Marshall Space Flight Center (MSFC) Engineering Directorate, total lifecycle costs are important variables for critical decision-making. With the ultimate goal to deliver quality products that meet or exceed requirements on time and within budget, PLM is a powerful concept to shape everything from engineering trade studies and testing goals, to integrated vehicle operations and retirement scenarios. This briefing will demonstrate how the MSFC Engineering Directorate is implementing PLM as part of an overall strategy to deliver safe, reliable, and affordable space exploration solutions and how that strategy aligns with the Agency and Center systems engineering policies and processes. Sustainable space exploration solutions demand that all lifecycle phases be optimized, and engineering the next generation space transportation system requires a paradigm shift such that digital tools and knowledge management, which are central elements of PLM, are used consistently to maximum effect. Adopting PLM, which has been used by the aerospace and automotive industry for many years, for spacecraft applications provides a foundation for strong, disciplined systems engineering and accountable return on investment. PLM enables better solutions using fewer resources by making lifecycle considerations in an integrative decision-making process.

  9. Development of Professional Identity in SMEs.

    ERIC Educational Resources Information Center

    Puurula, Arja; Lofstrom, Erika

    This paper describes a study of the development of professional identity among employees in small and medium sized enterprises (SMEs) participating in large-scale company-wide training programs. Managers and employees in 175 SMEs in Finland participated. These two research questions were posed: (1) are there differences in the perceptions of…

  10. An expanded conceptual framework for solution-focused management of chemical pollution in European waters.

    PubMed

    Munthe, John; Brorström-Lundén, Eva; Rahmberg, Magnus; Posthuma, Leo; Altenburger, Rolf; Brack, Werner; Bunke, Dirk; Engelen, Guy; Gawlik, Bernd Manfred; van Gils, Jos; Herráez, David López; Rydberg, Tomas; Slobodnik, Jaroslav; van Wezel, Annemarie

    2017-01-01

    This paper describes a conceptual framework for solutions-focused management of chemical contaminants built on novel and systematic approaches for identifying, quantifying and reducing risks of these substances. The conceptual framework was developed in interaction with stakeholders representing relevant authorities and organisations responsible for managing environmental quality of water bodies. Stakeholder needs were compiled via a survey and dialogue. The content of the conceptual framework was thereafter developed with inputs from relevant scientific disciplines. The conceptual framework consists of four access points: Chemicals, Environment, Abatement and Society, representing different aspects and approaches to engaging in the issue of chemical contamination of surface waters. It widens the scope for assessment and management of chemicals in comparison to a traditional (mostly) perchemical risk assessment approaches by including abatement- and societal approaches as optional solutions. The solution-focused approach implies an identification of abatement- and policy options upfront in the risk assessment process. The conceptual framework was designed for use in current and future chemical pollution assessments for the aquatic environment, including the specific challenges encountered in prioritising individual chemicals and mixtures, and is applicable for the development of approaches for safe chemical management in a broader sense. The four access points of the conceptual framework are interlinked by four key topics representing the main scientific challenges that need to be addressed, i.e.: identifying and prioritising hazardous chemicals at different scales; selecting relevant and efficient abatement options; providing regulatory support for chemicals management; predicting and prioritising future chemical risks. The conceptual framework aligns current challenges in the safe production and use of chemicals. The current state of knowledge and implementation

  11. New Century, New Identities: Building on a Typology of Nonheterosexual College Men

    ERIC Educational Resources Information Center

    Dilley, Patrick

    2010-01-01

    Drawing on recent ethnographic studies of nonheterosexual youth, nonheterosexual identity development, and online collegiate identity management, this article outlines an extension of prior typological work concerning nonheterosexual male college students proposed by the author. Two new types ("Twitter Twinks" and "Lads Without Labels") are…

  12. Patient Privacy, Consent, and Identity Management in Health Information Exchange: Issues for the Military Health System.

    PubMed

    Hosek, Susan D; Straus, Susan G

    2013-01-01

    The Military Health System (MHS) and the Veterans Health Administration (VHA) have been among the nation's leaders in health information technology (IT), including the development of health IT systems and electronic health records that summarize patients' care from multiple providers. Health IT interoperability within MHS and across MHS partners, including VHA, is one of ten goals in the current MHS Strategic Plan. As a step toward achieving improved interoperability, the MHS is seeking to develop a research roadmap to better coordinate health IT research efforts, address IT capability gaps, and reduce programmatic risk for its enterprise projects. This article contributes to that effort by identifying gaps in research, policy, and practice involving patient privacy, consent, and identity management that need to be addressed to bring about improved quality and efficiency of care through health information exchange. Major challenges include (1) designing a meaningful patient consent procedure, (2) recording patients' consent preferences and designing procedures to implement restrictions on disclosures of protected health information, and (3) advancing knowledge regarding the best technical approaches to performing patient identity matches and how best to monitor results over time. Using a sociotechnical framework, this article suggests steps for overcoming these challenges and topics for future research.

  13. Brief report: the Utrecht-Management of Identity Commitments Scale (U-MICS): gender and age measurement invariance and convergent validity of the Turkish version.

    PubMed

    Morsunbul, Umit; Crocetti, Elisabetta; Cok, Figen; Meeus, Wim

    2014-08-01

    The purpose of this study was to evaluate the factor structure and convergent validity of the Turkish version of the Utrecht-Management of Identity Commitments Scale (U-MICS). Participants were 1201 (59.6% females) youth aged between 12 and 24 years (M(age) = 17.53 years, SD(age) = 3.25). Results indicated that the three-factor model consisting of commitment, in-depth exploration, and reconsideration of commitment provided a very good fit to the data and applied equally well to boys and girls as well as to three age groups (early adolescents, middle adolescents, and emerging adults). Significant relations between identity processes and self-concept clarity, personality, internalizing and externalizing problem behaviors, and parental relationships supported convergent validity. Thus, the Turkish version of U-MICS is a reliable tool for assessing identity in Turkish-speaking respondents. Copyright © 2014 The Foundation for Professionals in Services for Adolescents. Published by Elsevier Ltd. All rights reserved.

  14. Exercisers' identities and exercise dependence: the mediating effect of exercise commitment.

    PubMed

    Lu, Frank Jing-Horng; Hsu, Eva Ya-Wen; Wang, Junn-Ming; Huang, Mei-Yao; Chang, Jo-Ning; Wang, Chien-Hsin

    2012-10-01

    The purpose of this study was to examine the associations of exercise identity, exercise commitment, exercise dependence, and, particularly, the mediating effects of exercise commitment on the relationship between exercise identity and exercise dependence. 253 Taiwanese regular exercisers completed measures, including the Exercise Dependence Scale-Revised, the Exercise Identity Scale, the Exercise Commitment Scale, and the Godin Leisure Time Exercise Questionnaire. Results showed that exercise identity, exercise dependence, and two types of exercise commitment were moderately to highly correlated. Furthermore, structural equation modelling indicated that a "have to" commitment partially mediated the relationship between exercise identity and exercise dependence. Based on the mediating role of a "have to" commitment, the findings are particularly informative to exercise instructors and for exercise program managers.

  15. Gender identity disorder and its medico-legal considerations.

    PubMed

    Sharma, B R

    2007-01-01

    The general belief among behavioural scientists and physicians is that gender identity disorder or transsexualism is an identifiable and incapacitating disease which can be diagnosed and successfully treated by reassignment surgery in carefully selected patients. Although many advances have been made in the reassignment surgery techniques, phalloplasty still remains a major challenge; to date, no ideal technique has been developed. The new gender created by the reassignment surgery has, in turn, led to many legal complications for post-operative transsexuals because, in many developed and the developing countries, transsexuals are not given a legal identity, thereby adding to their agonies and miseries. This article examines the historical perspective, genesis and management of gender identity disorder, or transsexualism, and draws attention to the medico-legal considerations.

  16. Transformation of Professional Identity in an Experienced Primary School Principal: A New Zealand Case Study

    ERIC Educational Resources Information Center

    Robertson, Sylvia

    2017-01-01

    School principals have unique identities that influence capacity to manage change. This New Zealand study explores professional identity in educational leadership and addresses a lesser researched area of identity transformation in longer-serving principals. Principals were asked how they perceived themselves as changing or changed as they led…

  17. National and Gender Measurement Invariance of the Utrecht-Management of Identity Commitments Scale (U-MICS): A 10-Nation Study With University Students.

    PubMed

    Crocetti, Elisabetta; Cieciuch, Jan; Gao, Cheng-Hai; Klimstra, Theo; Lin, Ching-Ling; Matos, Paula Mena; Morsünbül, Ümit; Negru, Oana; Sugimura, Kazumi; Zimmermann, Grégoire; Meeus, Wim

    2015-12-01

    The purpose of this study was to examine the psychometric properties of the Utrecht-Management of Identity Commitments Scale (U-MICS), a self-report measure aimed at assessing identity processes of commitment, in-depth exploration, and reconsideration of commitment. We tested its factor structure in university students from a large array of cultural contexts, including 10 nations located in Europe (i.e., Italy, the Netherlands, Poland, Portugal, Romania, and Switzerland), Middle East (i.e., Turkey), and Asia (i.e., China, Japan, and Taiwan). Furthermore, we tested national and gender measurement invariance. Participants were 6,118 (63.2% females) university students aged from 18 to 25 years (Mage = 20.91 years). Results indicated that the three-factor structure of the U-MICS fitted well in the total sample, in each national group, and in gender groups. Furthermore, national and gender measurement invariance were established. Thus, the U-MICS can be fruitfully applied to study identity in university students from various Western and non-Western contexts. © The Author(s) 2015.

  18. Gender identity and the management of the transgender patient: a guide for non-specialists.

    PubMed

    Joseph, Albert; Cliffe, Charlotte; Hillyard, Miriam; Majeed, Azeem

    2017-04-01

    In this review, we introduce the topic of transgender medicine, aimed at the non-specialist clinician working in the UK. Appropriate terminology is provided alongside practical advice on how to appropriately care for transgender people. We offer a brief theoretical discussion on transgenderism and consider how it relates to broader understandings of both gender and disease. In respect to epidemiology, while it is difficult to assess the exact size of the transgender population in the UK, population surveys suggest a prevalence of between 0.2 and 0.6% in adults, with rates of referrals to gender identity clinics in the UK increasing yearly. We outline the legal framework that protects the rights of transgender people, showing that is not legal for physicians to deny transgender people access to services based on their personal beliefs. Being transgender is often, although not always, associated with gender dysphoria, a potentially disabling condition in which the discordance between a person's natal sex (that assigned to them at birth) and gender identity results in distress, with high associated rates of self-harm, suicidality and functional impairment. We show that gender reassignment can be a safe and effective treatment for gender dysphoria with counselling, exogenous hormones and surgery being the mainstay of treatment. The role of the general practitioner in the management of transgender patients is discussed and we consider whether hormone therapy should be initiated in primary care in the absence of specialist advice, as is suggested by recent General Medical Council guidance.

  19. "It Was Not Me That Was Sick, It Was the Building": Rhetorical Identity Management Strategies in the Context of Observed or Suspected Indoor Air Problems in Workplaces.

    PubMed

    Finell, Eerika; Seppälä, Tuija; Suoninen, Eero

    2018-07-01

    Suffering from a contested illness poses a serious threat to one's identity. We analyzed the rhetorical identity management strategies respondents used when depicting their health problems and lives in the context of observed or suspected indoor air (IA) problems in the workplace. The data consisted of essays collected by the Finnish Literature Society. We used discourse-oriented methods to interpret a variety of language uses in the construction of identity strategies. Six strategies were identified: respondents described themselves as normal and good citizens with strong characters, and as IA sufferers who received acknowledge from others, offered positive meanings to their in-group, and demanded recognition. These identity strategies located on two continua: (a) individual- and collective-level strategies and (b) dissolved and emphasized (sub)category boundaries. The practical conclusion is that professionals should be aware of these complex coping strategies when aiming to interact effectively with people suffering from contested illnesses.

  20. E-dating, identity and HIV prevention: theorising sexualities, risk and network society.

    PubMed

    Davis, Mark; Hart, Graham; Bolding, Graham; Sherr, Lorraine; Elford, Jonathan

    2006-05-01

    This paper addresses how London gay men use the internet to meet sexual partners, or for e-dating. Based on qualitative interviews conducted face-to-face or via the internet, this research develops an account of how information technologies mediate the negotiation of identity and risk in connection with sexual practice. E-dating itself is a bricolage, or heterogeneous DIY practice of internet-based-communication (IBC). A central aspect of IBC is "filtering" in and out prospective e-dates based on the images and texts used to depict sexual identities. Interpretations and depictions of personal HIV risk management approaches in IBC are framed by the meanings of different identities, such as the stigma associated with being HIV positive. This paper argues for a sexualities perspective in a theory of network society. Further, HIV prevention in e-dating can potentially be addressed by considering the interplay of the HIV prevention imperatives associated with different HIV serostatus identities. There is a case for encouraging more explicit IBC about risk in e-dating and incorporating the expertise of e-daters in prevention activity. There is also a need to rethink traditional conceptions of risk management in HIV prevention to make space for the risk management bricolage of network society.

  1. A Social Identity Analysis of Climate Change and Environmental Attitudes and Behaviors: Insights and Opportunities

    PubMed Central

    Fielding, Kelly S.; Hornsey, Matthew J.

    2016-01-01

    Environmental challenges are often marked by an intergroup dimension. Political conservatives and progressives are divided on their beliefs about climate change, farmers come into conflict with scientists and environmentalists over water allocation or species protection, and communities oppose big business and mining companies that threaten their local environment. These intergroup tensions are reminders of the powerful influence social contexts and group memberships can have on attitudes, beliefs, and actions relating to climate change and the environment more broadly. In this paper, we use social identity theory to help describe and explain these processes. We review literature showing, how conceiving of oneself in terms of a particular social identity influences our environmental attitudes and behaviors, how relations between groups can impact on environmental outcomes, and how the content of social identities can direct group members to act in more or less pro-environmental ways. We discuss the similarities and differences between the social identity approach to these phenomena and related theories, such as cultural cognition theory, the theory of planned behavior, and value-belief-norm theory. Importantly, we also advance social-identity based strategies to foster more sustainable environmental attitudes and behaviors. Although this theoretical approach can provide important insights and potential solutions, more research is needed to build the empirical base, especially in relation to testing social identity solutions. PMID:26903924

  2. A Social Identity Analysis of Climate Change and Environmental Attitudes and Behaviors: Insights and Opportunities.

    PubMed

    Fielding, Kelly S; Hornsey, Matthew J

    2016-01-01

    Environmental challenges are often marked by an intergroup dimension. Political conservatives and progressives are divided on their beliefs about climate change, farmers come into conflict with scientists and environmentalists over water allocation or species protection, and communities oppose big business and mining companies that threaten their local environment. These intergroup tensions are reminders of the powerful influence social contexts and group memberships can have on attitudes, beliefs, and actions relating to climate change and the environment more broadly. In this paper, we use social identity theory to help describe and explain these processes. We review literature showing, how conceiving of oneself in terms of a particular social identity influences our environmental attitudes and behaviors, how relations between groups can impact on environmental outcomes, and how the content of social identities can direct group members to act in more or less pro-environmental ways. We discuss the similarities and differences between the social identity approach to these phenomena and related theories, such as cultural cognition theory, the theory of planned behavior, and value-belief-norm theory. Importantly, we also advance social-identity based strategies to foster more sustainable environmental attitudes and behaviors. Although this theoretical approach can provide important insights and potential solutions, more research is needed to build the empirical base, especially in relation to testing social identity solutions.

  3. Identity and stammering: negotiating hesitation, side-stepping repetition, and sometimes avoiding deviation.

    PubMed

    Butler, Clare

    2013-09-01

    Individuals who experience speech dysfluency are often stigmatised because their speech acts differ from the communicative norm. This article is located in and seeks to further the identity debates in exploring how individuals who are subject to the intermittent emergence of a stigmatised characteristic manage this randomised personal discrediting in their identity work. Through a series of focus groups and semi-structured interviews participants grudgingly report their management approaches which include concealing, drafting in unwitting others, role-playing and segregating self from their stammer. In describing how they manage their stammer they detail their use of the social space in a number of ways, including as a hiding place; a site for 'it' (the stammer); a gap in which to switch words; and a different area in which to perform. This study offers important insights, increasing our understanding of the often hidden negotiations of identity work and the sometime ingenious use of space in the management of a social stigma. © 2013 The Author. Sociology of Health & Illness © 2013 Foundation for the Sociology of Health & Illness/John Wiley © Sons Ltd. Published by John Wiley © Sons Ltd.

  4. Job satisfaction and gender identity of women managers and non-managers.

    PubMed

    Lipińska-Grobelny, Agnieszka; Wasiak, Katarzyna

    2010-01-01

    This work investigates different cognitive aspects of job satisfaction (co-workers, supervisor, job content, working facilities, organization and management, opportunities for development, income), positive and negative affect at work and their relations to gender role orientation of women occupying managerial and non-managerial positions. The sample of 122 women (60 managers and 62 non-managers) completed a battery of instruments such as: the Bem Sex Role Inventory, the Job Description Inventory by Neuberger and Allerbeck and the Job Affect Scale by Brief et al. Most women managers represented androgynous and masculine types, while women non-managers belonged to androgynous and feminine types. Moreover, women with various degrees of sex-typing showed positive and negative affect at work. The most satisfied with income were masculine women managers, the least--feminine women non-managers. These results may be applied in designing of motivational instruments to enhance job effectiveness and to eliminate unproductive behaviours such as absenteeism, high staff turnover.

  5. Governance and Corporate Identity in Network Universities.

    ERIC Educational Resources Information Center

    Smith, Robert

    1992-01-01

    A discussion of university autonomy and institutional image is presented with reference to politics at the newly established University of New England (Australia). Elements of institutional image or identity are examined, including (1) symbolic issues such as logo and location of administration; (2) leadership and management structures; (3)…

  6. A Conditions Data Management System for HEP Experiments

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Laycock, P. J.; Dykstra, D.; Formica, A.

    Conditions data infrastructure for both ATLAS and CMS have to deal with the management of several Terabytes of data. Distributed computing access to this data requires particular care and attention to manage request-rates of up to several tens of kHz. Thanks to the large overlap in use cases and requirements, ATLAS and CMS have worked towards a common solution for conditions data management with the aim of using this design for data-taking in Run 3. In the meantime other experiments, including NA62, have expressed an interest in this cross- experiment initiative. For experiments with a smaller payload volume and complexity,more » there is particular interest in simplifying the payload storage. The conditions data management model is implemented in a small set of relational database tables. A prototype access toolkit consisting of an intermediate web server has been implemented, using standard technologies available in the Java community. Access is provided through a set of REST services for which the API has been described in a generic way using standard Open API specications, implemented in Swagger. Such a solution allows the automatic generation of client code and server stubs and further allows changes in the backend technology transparently. An important advantage of using a REST API for conditions access is the possibility of caching identical URLs, addressing one of the biggest challenges that large distributed computing solutions impose on conditions data access, avoiding direct DB access by means of standard web proxy solutions.« less

  7. Verifying Parentage and Confirming Identity in Blackberry with a Fingerprinting Set

    USDA-ARS?s Scientific Manuscript database

    Parentage and identity confirmation is an important aspect of clonally propagated crops outcrossing. Potential errors resulting misidentification include off-type pollination events, labeling errors, or sports of clones. DNA fingerprinting sets are an excellent solution to quickly identify off-type ...

  8. Bringing social identity to work: the influence of manifestation and suppression on perceived discrimination, job satisfaction, and turnover intentions.

    PubMed

    Madera, Juan M; King, Eden B; Hebl, Michelle R

    2012-04-01

    In the current article, we explored whether manifesting or suppressing an identity (race/ethnicity, gender, age, religion, sexual orientation, or disability) at work is related to perceived discrimination, job satisfaction, and turnover intentions. Participants included 211 working adults who completed an online survey. The results showed that efforts to suppress a group identity were positively (and behavioral manifestations of group identity negatively) related to perceived discrimination, which predicted job satisfaction and turnover intentions. These results suggest that diverse employees actively manage their nonwork identities while at work and that these identity management strategies have important consequences. PsycINFO Database Record (c) 2012 APA, all rights reserved.

  9. Social identity change: shifts in social identity during adolescence.

    PubMed

    Tanti, Chris; Stukas, Arthur A; Halloran, Michael J; Foddy, Margaret

    2011-06-01

    This study investigated the proposition that adolescence involves significant shifts in social identity as a function of changes in social context and cognitive style. Using an experimental design, we primed either peer or gender identity with a sample of 380 early- (12-13 years), mid- (15-16 years), and late-adolescents (18-20 years) and then measured the effect of the prime on self-stereotyping and ingroup favouritism. The findings showed significant differences in social identity across adolescent groups, in that social identity effects were relatively strong in early- and late-adolescents, particularly when peer group identity rather than gender identity was salient. While these effects were consistent with the experience of change in educational social context, differences in cognitive style were only weakly related to ingroup favouritism. The implications of the findings for theory and future research on social identity during adolescence are discussed. Crown Copyright © 2010. Published by Elsevier Ltd. All rights reserved.

  10. Comparative Associations Between Achieved Bicultural Identity, Achieved Ego Identity, and Achieved Religious Identity and Adaptation Among Australian Adolescent Muslims.

    PubMed

    Abu-Rayya, Hisham M; Abu-Rayya, Maram H; White, Fiona A; Walker, Richard

    2018-04-01

    This study examined the comparative roles of biculturalism, ego identity, and religious identity in the adaptation of Australian adolescent Muslims. A total of 504 high school Muslim students studying at high schools in metropolitan Sydney and Melbourne, Australia, took part in this study which required them to complete a self-report questionnaire. Analyses indicated that adolescent Muslims' achieved religious identity seems to play a more important role in shaping their psychological and socio-cultural adaptation compared to adolescents' achieved bicultural identity. Adolescents' achieved ego identity tended also to play a greater role in their psychological and socio-cultural adaptation than achieved bicultural identity. The relationships between the three identities and negative indicators of psychological adaptation were consistently indifferent. Based on these findings, we propose that the three identity-based forces-bicultural identity development, religious identity attainment, and ego identity formation-be amalgamated into one framework in order for researchers to more accurately examine the adaptation of Australian adolescent Muslims.

  11. Swiss identity smells like chocolate: Social identity shapes olfactory judgments

    PubMed Central

    Coppin, Géraldine; Pool, Eva; Delplanque, Sylvain; Oud, Bastiaan; Margot, Christian; Sander, David; Van Bavel, Jay J.

    2016-01-01

    There is extensive evidence that social identities can shape people’s attitudes and behavior, but what about sensory judgments? We examined the possibility that social identity concerns may also shape the judgment of non-social properties—namely, olfactory judgment. In two experiments, we presented Swiss and non-Swiss participants with the odor of chocolate, for which Switzerland is world-famous, and a control odor (popcorn). Swiss participants primed with Swiss identity reported the odor of chocolate (but not popcorn) as more intense than non-Swiss participants (Experiments 1 and 2) and than Swiss participants primed with individual identity or not primed (Experiment 2). The self-reported intensity of chocolate smell tended to increase as identity accessibility increased—but only among Swiss participants (Experiment 1). These results suggest that identity priming can counter-act classic sensory habituation effects, allowing identity-relevant smells to maintain their intensity after repeated presentations. This suggests that social identity dynamically influences sensory judgment. We discuss the potential implications for models of social identity and chemosensory perception. PMID:27725715

  12. Swiss identity smells like chocolate: Social identity shapes olfactory judgments.

    PubMed

    Coppin, Géraldine; Pool, Eva; Delplanque, Sylvain; Oud, Bastiaan; Margot, Christian; Sander, David; Van Bavel, Jay J

    2016-10-11

    There is extensive evidence that social identities can shape people's attitudes and behavior, but what about sensory judgments? We examined the possibility that social identity concerns may also shape the judgment of non-social properties-namely, olfactory judgment. In two experiments, we presented Swiss and non-Swiss participants with the odor of chocolate, for which Switzerland is world-famous, and a control odor (popcorn). Swiss participants primed with Swiss identity reported the odor of chocolate (but not popcorn) as more intense than non-Swiss participants (Experiments 1 and 2) and than Swiss participants primed with individual identity or not primed (Experiment 2). The self-reported intensity of chocolate smell tended to increase as identity accessibility increased-but only among Swiss participants (Experiment 1). These results suggest that identity priming can counter-act classic sensory habituation effects, allowing identity-relevant smells to maintain their intensity after repeated presentations. This suggests that social identity dynamically influences sensory judgment. We discuss the potential implications for models of social identity and chemosensory perception.

  13. Three-dimensional analytical solution for the instability of a parallel array of mutually attracting identical simply supported piezoelectric microplates

    NASA Astrophysics Data System (ADS)

    Liu, Lei; Wang, Xu

    2017-12-01

    Three-dimensional analytical solutions are derived for the structural instability of a parallel array of mutually attracting identical simply supported orthotropic piezoelectric rectangular microplates by means of a linear perturbation analysis. The two surfaces of each plate can be either insulating or conducting. By considering the fact that the shear stresses and the normal electric displacement (or electric potential) are zero on the two surfaces of each plate, a 2 × 2 transfer matrix for a plate can be obtained directly from the 8 × 8 fundamental piezoelectricity matrix without resolving the original Stroh eigenrelation. The critical interaction coefficient can be determined by solving the resulting generalized eigenvalue problem for the piezoelectric plate array. Also considered in our analysis is the in-plane uniform edge compression acting on the four sides of each piezoelectric plate. Our results indicate that the stabilizing influence of the piezoelectric effect on the structural instability is unignorable; the edge compression always plays a destabilizing role in the structural instability of the plate array with interactions.

  14. Exploiting Identical Generators in Unit Commitment

    DOE PAGES

    Knueven, Ben; Ostrowski, Jim; Watson, Jean -Paul

    2017-12-14

    Here, we present sufficient conditions under which thermal generators can be aggregated in mixed-integer linear programming (MILP) formulations of the unit commitment (UC) problem, while maintaining feasibility and optimality for the original disaggregated problem. Aggregating thermal generators with identical characteristics (e.g., minimum/maximum power output, minimum up/down-time, and cost curves) into a single unit reduces redundancy in the search space induced by both exact symmetry (permutations of generator schedules) and certain classes of mutually non-dominated solutions. We study the impact of aggregation on two large-scale UC instances, one from the academic literature and another based on real-world operator data. Our computationalmore » tests demonstrate that when present, identical generators can negatively affect the performance of modern MILP solvers on UC formulations. Further, we show that our reformation of the UC MILP through aggregation is an effective method for mitigating this source of computational difficulty.« less

  15. Exploiting Identical Generators in Unit Commitment

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Knueven, Ben; Ostrowski, Jim; Watson, Jean -Paul

    Here, we present sufficient conditions under which thermal generators can be aggregated in mixed-integer linear programming (MILP) formulations of the unit commitment (UC) problem, while maintaining feasibility and optimality for the original disaggregated problem. Aggregating thermal generators with identical characteristics (e.g., minimum/maximum power output, minimum up/down-time, and cost curves) into a single unit reduces redundancy in the search space induced by both exact symmetry (permutations of generator schedules) and certain classes of mutually non-dominated solutions. We study the impact of aggregation on two large-scale UC instances, one from the academic literature and another based on real-world operator data. Our computationalmore » tests demonstrate that when present, identical generators can negatively affect the performance of modern MILP solvers on UC formulations. Further, we show that our reformation of the UC MILP through aggregation is an effective method for mitigating this source of computational difficulty.« less

  16. Nanobiotechnology for the Environment: Innovative Solutions for the Management of Harmful Algal Blooms.

    PubMed

    Gellert, Matthew R; Kim, Beum Jun; Reffsin, Samuel E; Jusuf, Sebastian E; Wagner, Nicole D; Winans, Stephen C; Wu, Mingming

    2017-12-04

    Nanobiotechnology has played important roles in solving contemporary health problems, including cancer and diabetes, but has not yet been widely exploited for problems in food security and environmental protection. Water scarcity is an emerging worldwide problem as a result of climate change and population increase. Current methods of managing water resources are not efficient or sustainable. In this perspective, we focus on harmful algal blooms to demonstrate how nanobiotechnology can be explored to understand microbe-environment interactions and allow for toxin/pollutant detection with significantly improved sensitivity. These capabilities hold potential for future development of sustainable solutions for drinking water management.

  17. Co-Leadership – A Management Solution for Integrated Health and Social Care

    PubMed Central

    Hansson, Johan; Hasson, Henna; Sachs, Magna Andreen

    2016-01-01

    Introduction: Co-leadership has been identified as one approach to meet the managerial challenges of integrated services, but research on the topic is limited. In the present study, co-leadership, practised by pairs of managers – each manager representing one of the two principal organizations in integrated health and social care services – was explored. Aim: To investigate co-leadership in integrated health and social care, identify essential preconditions in fulfilling the management assignment, its operationalization and impact on provision of sustainable integration of health and social care. Method: Interviews with eight managers exercising co-leadership were analysed using directed content analysis. Respondent validation was conducted through additional interviews with the same managers. Results: Key contextual preconditions were an organization-wide model supporting co-leadership and co-location of services. Perception of the management role as a collective activity, continuous communication and lack of prestige were essential personal and interpersonal preconditions. In daily practice, office sharing, being able to give and take and support each other contributed to provision of sustainable integration of health and social care. Conclusion and discussion: Co-leadership promoted robust management by providing broader competence, continuous learning and joint responsibility for services. Integrated health and social care services should consider employing co-leadership as a managerial solution to achieve sustainability. PMID:27616963

  18. Contemplation and the "Performative Absolute": Submission and Identity in Managerial Modernity

    ERIC Educational Resources Information Center

    Roberts, Richard H.

    2013-01-01

    Practices derived from the "vita contemplativa" and other spiritual sources are drawn upon by management, but as the power of human resources management (HRM) is extended so the relationship between "contemplation" and the surrender of self-identity required by HRM demands critical examination. The conscious construction of the…

  19. Managing Digital Identity on Twitter: The Case of School Administrators

    ERIC Educational Resources Information Center

    Cho, Vincent; Jimerson, Jo Beth

    2017-01-01

    What does it mean to be and to act like a school leader online? Although many school leaders might be comfortable navigating issues of identity in face-to-face environments, online environments may present new and unprecedented challenges. These challenges may range from concerns about privacy and surveillance to questions about how best to…

  20. Viewing equitable practices through the lens of intersecting identities

    NASA Astrophysics Data System (ADS)

    Lyons, Renée; Dsouza, Nikeetha; Quigley, Cassie

    2016-12-01

    This review explores Archer, Dawson, Seakins, and Wong's "Disorienting, fun or meaningful? Disadvantaged families' experiences of a science museum visit" by examining the analytic frameworks guiding this study. To expand on Archer et al.'s use of feminist post-structuralist theories of identity we draw from the theory of intersectionality to provide a more robust framework for analyzing barriers to engagement within an informal learning space. Our response to this work ends by exploring the types of solutions generated from an intersectionality framework—solutions aimed at transforming institutional programs and practices to create more equitable spaces for learning.

  1. "Unhomely" Academic Developer Identities: More Post-Colonial Explorations

    ERIC Educational Resources Information Center

    Manathunga, Catherine

    2007-01-01

    Academic developers are very often disciplinary migrants, performing hybrid, liminal roles at the "fault lines" between teachers and learners, between academics and managers, and between teaching and research. As a result, their identities as scholars can be described as "unhomely." While this in-between space is uncomfortable…

  2. Review on Malaysian Rail Transit Operation and Management System: Issues and Solution in Integration

    NASA Astrophysics Data System (ADS)

    Masirin, Mohd Idrus Mohd; Salin, Aminah Mohd; Zainorabidin, Adnan; Martin, David; Samsuddin, Norshakina

    2017-08-01

    In any context, operation and management of transportation systems are key issues which may affect both life quality and economic development. In large urban agglomerations, an efficient public transportation system may help abate the negative externalities of private car use such as congestion, air and noise pollution, accident and fuel consumption, without excessively penalizing user travel times or zone accessibility. Thus, this study is conducted to appraise the Malaysian rural rail transit operation and management system, which are considered important as there are many issues and solution in integration of the services that need to be tackled more conscientiously. The purpose of this paper is to describe some of the most important issues on integration of services and rail transit system in Malaysian and how to solve or reduce these problems and conflicts. In this paper, it consists of the historical development of rail transit construction in Malaysia. This paper also attempts to identify the important issues related to rail transit services and integration in Malaysian rural rail operation and management system. Comparison is also conducted with other countries such as UK, France, and Japan. Finally, a critical analysis is presented in this paper by looking at the possible application for future Malaysian rail transit operation system and management, especially focusing on enhancing the quality of Malaysian rural rail transit. In conclusion, this paper is expected to successfully review and appraise the existing Malaysian rural rail transit operation and management system pertaining to issues & solution in integration. It is also hoped that reformation or transformation of present service delivery quality of the rail transit operation and management will enable Malaysia to succeed in transforming Malaysian transportation system to greater heights.

  3. Ambiguous genitalia, gender-identity problems, and sex reassignment.

    PubMed

    Dittmann, R W

    1998-01-01

    This article discusses general issues with regard to gender-identity problems, sex reassignment, and clinical management in patients with ambiguous genitalia, based on a detailed case history of a patient with penile agenesis who has been followed more than 20 years. After initial uncertainty, the patient began to grow up as a boy, lived from the fourth year of life as a girl and young woman, and lived from late puberty on as a man. Over his lifetime he experienced extensive corrective surgery plus hormonal substitution therapy. Pre- and perinatal hormonal conditions, phenomenology of the genitalia, sex of rearing, timing of sex reassignment and corrective surgery, for example, appear to be important components for the development of gender-role behavior, gender identity, and sexual orientation of intersex patients. Findings and retrospective considerations for this patient suggest the need for careful differential activities in diagnostic workup, approaches to sex assignment and possible reassignment, and the clinical management of patients and families.

  4. IdentityMap Visualization of the Super Identity Model

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    None

    The Super Identity Model is a collaboration with six United Kingdom universities to develop use cases used to piece together a person's identity across biological, cyber, psychological, and biographical domains. PNNL visualized the model in a web-based application called IdentityMap. This is the first step in a promising new field of research. Interested future collaborators are welcome to find out more by emailing superid@pnnl.gov.

  5. IdentityMap Visualization of the Super Identity Model

    ScienceCinema

    None

    2018-06-08

    The Super Identity Model is a collaboration with six United Kingdom universities to develop use cases used to piece together a person's identity across biological, cyber, psychological, and biographical domains. PNNL visualized the model in a web-based application called IdentityMap. This is the first step in a promising new field of research. Interested future collaborators are welcome to find out more by emailing superid@pnnl.gov.

  6. Mistaken identity: activating conservative political identities induces "conservative" financial decisions.

    PubMed

    Morris, Michael W; Carranza, Erica; Fox, Craig R

    2008-11-01

    Four studies investigated whether activating a social identity can lead group members to choose options that are labeled in words associated with that identity. When political identities were made salient, Republicans (but not Democrats) became more likely to choose the gamble or investment option labeled "conservative." This shift did not occur in a condition in which the same options were unlabeled. Thus, the mechanism underlying the effect appears to be not activated identity-related values prioritizing low risk, but rather activated identity-related language (the group label "conservative"). Indeed, when political identities were salient, Republicans favored options labeled "conservative" regardless of whether the options were low or high risk. Finally, requiring participants to explain the label "conservative" before making their choice did not diminish the effect, which suggests that it does not merely reflect inattention to content or construct accessibility. We discuss the implications of these results for the literatures on identity, priming, choice, politics, and marketing.

  7. Medical management of epileptic seizures: challenges and solutions.

    PubMed

    Sarma, Anand K; Khandker, Nabil; Kurczewski, Lisa; Brophy, Gretchen M

    2016-01-01

    Epilepsy is one of the most common neurologic illnesses. This condition afflicts 2.9 million adults and children in the US, leading to an economic impact amounting to $15.5 billion. Despite the significant burden epilepsy places on the population, it is not very well understood. As this understanding continues to evolve, it is important for clinicians to stay up to date with the latest advances to provide the best care for patients. In the last 20 years, the US Food and Drug Administration has approved 15 new antiepileptic drugs (AEDs), with many more currently in development. Other advances have been achieved in terms of diagnostic modalities like electroencephalography technology, treatment devices like vagal nerve and deep-brain stimulators, novel alternate routes of drug administration, and improvement in surgical techniques. Specific patient populations, such as the pregnant, elderly, those with HIV/AIDS, and those with psychiatric illness, present their own unique challenges, with AED side effects, drug interactions, and medical-psychiatric comorbidities adding to the conundrum. The purpose of this article is to review the latest literature guiding the management of acute epileptic seizures, focusing on the current challenges across different practice settings, and it discusses studies in various patient populations, including the pregnant, geriatric, those with HIV/AIDS, comatose, psychiatric, and "pseudoseizure" patients, and offers possible evidence-based solutions or the expert opinion of the authors. Also included is information on newer AEDs, routes of administration, and significant AED-related drug-interaction tables. This review has tried to address only some of these issues that any practitioner who deals with the acute management of seizures may encounter. The document also highlights the numerous avenues for new research that would help practitioners optimize epilepsy management.

  8. Navigating Identities: Subtle and Public Agency of Bicultural Gay Youth.

    PubMed

    Cense, Marianne; Ganzevoort, R Ruard

    2017-01-01

    Young people who discover their sexual attraction to people of the same sex often go through a period of ambivalence or distress, especially when they grow up in an environment that condemns homosexuality. The Dutch sociopolitical context makes the expression of same-sex desires among those with non-Dutch roots even more complicated and risky, as prevailing schemes of interpretation render the two identities incompatible. This study explores the expressions of same-sex desires and identities as well as the different forms of agency of bicultural gay youth. In-depth interviews with 14 young adults reveal how young people negotiate bicultural identities in Dutch society that brings to the fore complexities in managing diverse sexual identities and strong religious and cultural affiliations in tandem. Their strategies have the effect of questioning dominant discourses and transcend the oppositional dichotomy between sexual and ethnic forms of sociocultural otherness.

  9. Alternative Framings, Countervailing Visions: Locating the "P" in Professional Identity Formation.

    PubMed

    Hafferty, Frederic W; Michalec, Barret; Martimianakis, Maria Athina Tina; Tilburt, Jon C

    2016-02-01

    Professional identity formation in medical education is referenced increasingly as an object for educational reform. The authors introduce core concepts from two largely untapped literatures on identity and formation, contrasting framings on occupational preparation from within the organizational socialization literature with issues of socialization and professional acculturation from a military sciences perspective.The organizational sciences literature emphasizes socializing a workforce to "fit in," raising questions about how organization values might clash with core professional values concerning patient primary and social justice. The military literature, in turn, advances the notions of professional identity as a collective property, and that a particular social other (the public) must participate in shaping the group's identity as a profession.The authors extrapolate from these reviews that the training of physicians-as-professionals, and thus issues of socialization and identity formation, require intentionality and specificity around these contrasting issues. In turn, they argue that medical educators must attend to socializing trainees to a professional group identity while at the same time producing health care professionals who retain the capacity to resist the bureaucratic application of standardized solutions to contemporary problems. Educators must thus strive to identify the skills, knowledge, and attitudes necessary that will allow physicians-qua-professionals to function as a quasi-subversive work force and to disrupt the very system that helped to shape their identity, so that they may fulfill their mission to their patients.

  10. Developmental endocrine influences on gender identity: implications for management of disorders of sex development.

    PubMed

    Byne, William

    2006-11-01

    When a baby is born, the first medical pronouncement is usually, "It's a boy," or "It's a girl." In most cases, this pronouncement is based simply upon the appearance of the child's external genitalia. Due to variations in the process of sexual differentiation, sometimes the gender that should be assigned is not apparent from inspection of the external genitalia, either because they are "ambiguous" or because their appearance is not congruent with the internal anatomy. Decisions must be made not only about the most appropriate gender to assign the infant but also about the medical and rearing practices that will facilitate optimal psychological development and quality of life for the affected individual. This article will review the approach to managing gender disorders that has evolved since the 1950s. Three issues are identified as central to current shifts that are occurring in the management of these disorders: (a) increased understanding of the biological substrates of gender identity; (b) questions regarding the indications for irreversible cosmetic genital surgeries as a means of reinforcing gender assignments in infancy, and (c) ethical issues pertaining to informed consent and who is entitled to give it, particularly with regard to surgical gender reassignments in infancy. In keeping with the neuropsychiatry theme of this issue, the focus of this article is on prenatal sexual differentiation of the brain as it pertains to the question of psychosexual neutrality at birth.

  11. Collaborative eHealth Meets Security: Privacy-Enhancing Patient Profile Management.

    PubMed

    Sanchez-Guerrero, Rosa; Mendoza, Florina Almenarez; Diaz-Sanchez, Daniel; Cabarcos, Patricia Arias; Lopez, Andres Marin

    2017-11-01

    Collaborative healthcare environments offer potential benefits, including enhancing the healthcare quality delivered to patients and reducing costs. As a direct consequence, sharing of electronic health records (EHRs) among healthcare providers has experienced a noteworthy growth in the last years, since it enables physicians to remotely monitor patients' health and enables individuals to manage their own health data more easily. However, these scenarios face significant challenges regarding security and privacy of the extremely sensitive information contained in EHRs. Thus, a flexible, efficient, and standards-based solution is indispensable to guarantee selective identity information disclosure and preserve patient's privacy. We propose a privacy-aware profile management approach that empowers the patient role, enabling him to bring together various healthcare providers as well as user-generated claims into an unique credential. User profiles are represented through an adaptive Merkle Tree, for which we formalize the underlying mathematical model. Furthermore, performance of the proposed solution is empirically validated through simulation experiments.

  12. Best packing of identical helices

    NASA Astrophysics Data System (ADS)

    Huh, Youngsik; Hong, Kyungpyo; Kim, Hyoungjun; No, Sungjong; Oh, Seungsang

    2016-10-01

    In this paper we prove the unique existence of a ropelength-minimizing conformation of the θ-spun double helix in a mathematically rigorous way, and find the minimal ropelength {{{Rop}}}* (θ )=-\\tfrac{8π }{t} where t is the unique solution in [-θ ,0] of the equation 2-2\\cos (t+θ )={t}2. Using this result, the pitch angles of the standard, triple and quadruple helices are around 39.3771^\\circ , 42.8354^\\circ and 43.8351^\\circ , respectively, which are almost identical with the approximated pitch angles of the zero-twist structures previously known by Olsen and Bohr. We also find the ropelength of the standard N-helix.

  13. Ethnic Identity in Everyday Life: The Influence of Identity Development Status

    PubMed Central

    Yip, Tiffany

    2013-01-01

    The current study explores the intersection of ethnic identity development and significance in a sample of 354 diverse adolescents (mean age 14). Adolescents completed surveys 5 times a day for 1 week. Cluster analyses revealed 4 identity clusters: diffused, foreclosed, moratorium, achieved. Achieved adolescents reported the highest levels of identity salience across situations, followed by moratorium adolescents. Achieved and moratorium adolescents also reported a positive association between identity salience and private regard. For foreclosed and achieved adolescents reporting low levels of centrality, identity salience was associated with lower private regard. For foreclosed and achieved adolescents reporting high levels of centrality, identity salience was associated with higher private regard. PMID:23581701

  14. Teacher Educators: Their Identities, Sub-Identities and Implications for Professional Development

    ERIC Educational Resources Information Center

    Swennen, Anja; Jones, Ken; Volman, Monique

    2010-01-01

    In this article we address the question: "What sub-identities of teacher educators emerge from the research literature about teacher educators and what are the implications of the sub-identities for the professional development of teacher educators?" Like other professional identities, the identity of teacher educators is a construction of various…

  15. Bridging Identities and Disciplines: Advances and Challenges in Understanding Multiple Identities

    ERIC Educational Resources Information Center

    Phinney, Jean S.

    2008-01-01

    The chapters in this volume address the need for a better understanding of the development of intersecting identities over age and context. The chapters provide valuable insights into the development of identities, particularly group identities. They highlight common processes across identities, such as the role of contrast and comparison and the…

  16. Phase-space quantum mechanics study of two identical particles in an external oscillatory potential

    NASA Technical Reports Server (NTRS)

    Nieto, Luis M.; Gadella, Manuel

    1993-01-01

    This simple example is used to show how the formalism of Moyal works when it is applied to systems of identical particles. The symmetric and antisymmetric Moyal propagators are evaluated for this case; from them, the correct energy levels of energy are obtained, as well as the Wigner functions for the symmetric and antisymmetric states of the two identical particle system. Finally, the solution of the Bloch equation is straightforwardly obtained from the expressions of the Moyal propagators.

  17. STAR: an integrated solution to management and visualization of sequencing data

    PubMed Central

    Wang, Tao; Liu, Jie; Shen, Li; Tonti-Filippini, Julian; Zhu, Yun; Jia, Haiyang; Lister, Ryan; Whitaker, John W.; Ecker, Joseph R.; Millar, A. Harvey; Ren, Bing; Wang, Wei

    2013-01-01

    Motivation: Easily visualization of complex data features is a necessary step to conduct studies on next-generation sequencing (NGS) data. We developed STAR, an integrated web application that enables online management, visualization and track-based analysis of NGS data. Results: STAR is a multilayer web service system. On the client side, STAR leverages JavaScript, HTML5 Canvas and asynchronous communications to deliver a smoothly scrolling desktop-like graphical user interface with a suite of in-browser analysis tools that range from providing simple track configuration controls to sophisticated feature detection within datasets. On the server side, STAR supports private session state retention via an account management system and provides data management modules that enable collection, visualization and analysis of third-party sequencing data from the public domain with over thousands of tracks hosted to date. Overall, STAR represents a next-generation data exploration solution to match the requirements of NGS data, enabling both intuitive visualization and dynamic analysis of data. Availability and implementation: STAR browser system is freely available on the web at http://wanglab.ucsd.edu/star/browser and https://github.com/angell1117/STAR-genome-browser. Contact: wei-wang@ucsd.edu PMID:24078702

  18. STAR: an integrated solution to management and visualization of sequencing data.

    PubMed

    Wang, Tao; Liu, Jie; Shen, Li; Tonti-Filippini, Julian; Zhu, Yun; Jia, Haiyang; Lister, Ryan; Whitaker, John W; Ecker, Joseph R; Millar, A Harvey; Ren, Bing; Wang, Wei

    2013-12-15

    Easily visualization of complex data features is a necessary step to conduct studies on next-generation sequencing (NGS) data. We developed STAR, an integrated web application that enables online management, visualization and track-based analysis of NGS data. STAR is a multilayer web service system. On the client side, STAR leverages JavaScript, HTML5 Canvas and asynchronous communications to deliver a smoothly scrolling desktop-like graphical user interface with a suite of in-browser analysis tools that range from providing simple track configuration controls to sophisticated feature detection within datasets. On the server side, STAR supports private session state retention via an account management system and provides data management modules that enable collection, visualization and analysis of third-party sequencing data from the public domain with over thousands of tracks hosted to date. Overall, STAR represents a next-generation data exploration solution to match the requirements of NGS data, enabling both intuitive visualization and dynamic analysis of data. STAR browser system is freely available on the web at http://wanglab.ucsd.edu/star/browser and https://github.com/angell1117/STAR-genome-browser.

  19. Modern Corneal Eye-Banking Using a Software-Based IT Management Solution.

    PubMed

    Kern, C; Kortuem, K; Wertheimer, C; Nilmayer, O; Dirisamer, M; Priglinger, S; Mayer, W J

    2018-01-01

    Increasing government legislation and regulations in manufacturing have led to additional documentation regarding the pharmaceutical product requirements of corneal grafts in the European Union. The aim of this project was to develop a software within a hospital information system (HIS) to support the documentation process, to improve the management of the patient waiting list and to increase informational flow between the clinic and eye bank. After an analysis of the current documentation process, a new workflow and software were implemented in our electronic health record (EHR) system. The software takes over most of the documentation and reduces the time required for record keeping. It guarantees real-time tracing of all steps during human corneal tissue processing from the start of production until allocation during surgery and includes follow-up within the HIS. Moreover, listing of the patient for surgery as well as waiting list management takes place in the same system. The new software for corneal eye banking supports the whole process chain by taking over both most of the required documentation and the management of the transplant waiting list. It may provide a standardized IT-based solution for German eye banks working within the same HIS.

  20. A Dual Identity Approach for Conceptualizing and Measuring Children's Gender Identity.

    PubMed

    Martin, Carol Lynn; Andrews, Naomi C Z; England, Dawn E; Zosuls, Kristina; Ruble, Diane N

    2017-01-01

    The goal was to test a new dual identity perspective on gender identity by asking children (n = 467) in three grades (M age  = 5.7, 7.6, 9.5) to consider the relation of the self to both boys and girls. This change shifted the conceptualization of gender identity from one to two dimensions, provided insights into the meaning and measurement of gender identity, and allowed for revisiting ideas about the roles of gender identity in adjustment. Using a graphical measure to allow assessment of identity in young children and cluster analyses to determine types of identity, it was found that individual and developmental differences in how similar children feel to both genders, and these variations matter for many important personal and social outcomes. © 2016 The Authors. Child Development © 2016 Society for Research in Child Development, Inc.

  1. Critical incidents in nursing academics: discovering a new identity.

    PubMed

    Aguayo-González, Mariela; Castelló-Badía, Montserrat; Monereo-Font, Carles

    2015-01-01

    a qualitative study that followed the principles of the grounded theory in order to analyze the professional identity of nursing academics through the analysis of the most disturbing critical incidents. semi-structured interviews were conducted with seven nurses who worked as professors and researchers in a private university in Barcelona. the resulting empirical material was organized into two categories: characterization of critical incidents and responsiveness to the incident. the professional identity of nurses regarding the academic area is still under construction and inexperience is the major obstacle in the management of critical incidents in the teaching career.

  2. The Identity Mapping Project: Demographic differences in patterns of distributed identity.

    PubMed

    Gilbert, Richard L; Dionisio, John David N; Forney, Andrew; Dorin, Philip

    2015-01-01

    The advent of cloud computing and a multi-platform digital environment is giving rise to a new phase of human identity called "The Distributed Self." In this conception, aspects of the self are distributed into a variety of 2D and 3D digital personas with the capacity to reflect any number of combinations of now malleable personality traits. In this way, the source of human identity remains internal and embodied, but the expression or enactment of the self becomes increasingly external, disembodied, and distributed on demand. The Identity Mapping Project (IMP) is an interdisciplinary collaboration between psychology and computer Science designed to empirically investigate the development of distributed forms of identity. Methodologically, it collects a large database of "identity maps" - computerized graphical representations of how active someone is online and how their identity is expressed and distributed across 7 core digital domains: email, blogs/personal websites, social networks, online forums, online dating sites, character based digital games, and virtual worlds. The current paper reports on gender and age differences in online identity based on an initial database of distributed identity profiles.

  3. Neurodegeneration and Identity.

    PubMed

    Strohminger, Nina; Nichols, Shaun

    2015-09-01

    There is a widespread notion, both within the sciences and among the general public, that mental deterioration can rob individuals of their identity. Yet there have been no systematic investigations of what types of cognitive damage lead people to appear to no longer be themselves. We measured perceived identity change in patients with three kinds of neurodegenerative disease: frontotemporal dementia, Alzheimer's disease, and amyotrophic lateral sclerosis. Structural equation models revealed that injury to the moral faculty plays the primary role in identity discontinuity. Other cognitive deficits, including amnesia, have no measurable impact on identity persistence. Accordingly, frontotemporal dementia has the greatest effect on perceived identity, and amyotrophic lateral sclerosis has the least. We further demonstrated that perceived identity change fully mediates the impact of neurodegenerative disease on relationship deterioration between patient and caregiver. Our results mark a departure from theories that ground personal identity in memory, distinctiveness, dispositional emotion, or global mental function. © The Author(s) 2015.

  4. The Identity and Identity Identification of Teachers

    ERIC Educational Resources Information Center

    Qu, Zhengwei

    2008-01-01

    When we tend to analyze the living conditions of teachers, system arrangement and identity identification can be considered a significant method for analysis. In reality, there appears a phenomenon of overlapping identification in the identity identification of teachers in China, which leads to plural selections in the identification manners of…

  5. Black Plane Solutions and Localized Gravitational Energy

    PubMed Central

    Roberts, Jennifer

    2015-01-01

    We explore the issue of gravitational energy localization for static plane-symmetric solutions of the Einstein-Maxwell equations in 3+1 dimensions with asymptotic anti-de Sitter behavior. We apply three different energy-momentum complexes, the Einstein, Landau-Lifshitz, and Møller prescriptions, to the metric representing this category of solutions and determine the energy distribution for each. We find that the three prescriptions offer identical energy distributions, suggesting their utility for this type of model. PMID:27347499

  6. Does Everyone Have a Musical Identity?: Reflections on "Musical Identities"

    ERIC Educational Resources Information Center

    Gracyk, Theodore

    2004-01-01

    The book, "Musical Identities" (Raymond MacDonald, David Hargreaves, Dorothy Miell, eds.; Oxford and New York: Oxford University Press, 2002) consists of 11 essays on the psychology of music. The editors divided the essays into two groups: those on developing musical identities ("identities in music" involving recognizable…

  7. Korean Adoptee Identity: Adoptive and Ethnic Identity Profiles of Adopted Korean Americans.

    PubMed

    Beaupre, Adam J; Reichwald, Reed; Zhou, Xiang; Raleigh, Elizabeth; Lee, Richard M

    2015-12-01

    Adopted Korean adolescents face the task of grappling with their identity as Koreans and coming to terms with their adoptive status. In order to explore these dual identities, the authors conducted a person-centered study of the identity profiles of 189 adopted Korean American adolescents. Using cluster analytic procedures, the study examined patterns of commitment to ethnic and adoptive identities, revealing six conceptually unique identity clusters. Analyzing the association between these identity profiles and psychological adjustment, the study found that the identity profiles were undifferentiated with respect to behavioral development and risk behaviors. However, group differences were found on life satisfaction, school adjustment, and family functioning. Results confirm the importance of considering the collective impact of multiple social identities on a variety of outcomes. The social implications of the results are discussed. © 2015 Wiley Periodicals, Inc.

  8. Perspectives on Sexual Identity Formation, Identity Practices, and Identity Transitions Among Men Who Have Sex With Men in India.

    PubMed

    Tomori, Cecilia; Srikrishnan, Aylur K; Ridgeway, Kathleen; Solomon, Sunil S; Mehta, Shruti H; Solomon, Suniti; Celentano, David D

    2018-01-01

    Men who have sex with men (MSM) remain at high risk for HIV infection. Culturally specific sexual identities, encompassing sexual roles, behavior, and appearance, may shape MSM's experiences of stigmatization and discrimination, and affect their vulnerability to HIV. This multi-site qualitative study (n = 363) encompassing 31 focus group discussions (FGDs) and 121 in-depth interviews (IDIs) across 15 sites in India investigated sexual identity formation, identity practices, and transitions and their implications for HIV prevention. IDIs and FGDs were transcribed, translated, and underwent thematic analysis. Our findings document heterogeneous sexual identity formation, with MSM who have more gender nonconforming behaviors or appearance reporting greater family- and community-level disapproval, harassment, violence, and exclusion. Concealing feminine aspects of sexual identities was important in daily life, especially for married MSM. Some participants negotiated their identity practices in accordance with socioeconomic and cultural pressures, including taking on identity characteristics to suit consumer demand in sex work and on extended periods of joining communities of hijras (sometimes called TG or transgender women). Participants also reported that some MSM transition toward more feminine and hijra or transgender women identities, motivated by intersecting desires for feminine gender expression and by social exclusion and economic marginalization. Future studies should collect information on gender nonconformity stigma, and any changes in sexual identity practices or plans for transitions to other identities over time, in relation to HIV risk behaviors and outcomes.

  9. Stability of Attachment Representations during Adolescence: The Influence of Ego-Identity Status.

    ERIC Educational Resources Information Center

    Zimmermann, Peter; Becker-Stoll, Fabienne

    2002-01-01

    Examines two core assumptions of attachment theory: internal working models of attachment should increase in stability during development, and attachment is related to the adaptive solution of stage-salient issues, in adolescence, specifically to identity formation. Results show secure attachment representation was positively associated with the…

  10. The Family as a Site for Gendered Ethnic Identity Work among Asian Indian Immigrants

    ERIC Educational Resources Information Center

    Mehrotra, Meeta; Calasanti, Toni M.

    2010-01-01

    Research on immigrants often points to the family as a source of support and a location for oppression. Using in-depth interviews with 38 first-generation immigrant Indians, this study adds to this literature by exploring families as sites of identity work where first-generation immigrants manage their gendered ethnic identities. Relocation into a…

  11. A longitudinal integration of identity styles and educational identity processes in adolescence.

    PubMed

    Negru-Subtirica, Oana; Pop, Eleonora Ioana; Crocetti, Elisabetta

    2017-11-01

    Identity formation is a main adolescent psychosocial developmental task. The complex interconnection between different processes that are at the basis of one's identity is a research and applied intervention priority. In this context, the identity style model focuses on social-cognitive strategies (i.e., informational, normative, and diffuse-avoidant) that individuals can use to deal with identity formation. The 3-factor identity dimensional model examines the interplay between identity processes of commitment, in-depth exploration, and reconsideration of commitment in different life domains. Theoretical integrations between these models have been proposed, but there is a dearth of studies unraveling their longitudinal links in specific identity domains. We addressed this gap by testing in a 3-wave longitudinal study the bidirectional associations between identity styles and educational identity processes measured during 1 academic year. Participants were 1,151 adolescents (58.7% female). Results highlighted that the informational style was related over time to higher levels of educational commitment and in-depth exploration, whereas the diffuse-avoidant style was related to lower levels of commitment and higher levels of reconsideration of commitment. Educational commitment was positively related to the informational and normative styles; in-depth exploration was positively related to the informational style; and reconsideration of commitment was positively related to the diffuse-avoidant style. These relations were not moderated by adolescents' gender and age. Hence, identity styles and educational identity processes reinforce each other during 1 academic year. Theoretical integrations between these models, suggestions for integration with other identity approaches (e.g., narrative identity models), and practical implications are discussed. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  12. Identity Styles and Religiosity: Examining the Role of Identity Commitment

    ERIC Educational Resources Information Center

    Grajales, Tevni E.; Sommers, Brittany

    2016-01-01

    This study observed the role of identity styles, identity commitment, and identity statuses in predicting religiosity in a sample of undergraduate students attending a Seventh-day Adventist university (N = 138). Two structural models were evaluated via path analysis. Results revealed two strong models for the prediction of religiosity. Identity…

  13. Political, religious and occupational identities in context: placing identity status paradigm in context.

    PubMed

    Solomontos-Kountouri, Olga; Hurry, Jane

    2008-04-01

    This study critically contrasts global identity with domain-specific identities (political, religious and occupational) and considers context and gender as integral parts of identity. In a cross-sectional survey, 1038 Greek Cypriot adolescents (449 boys and 589 girls, mean age 16.8) from the three different types of secondary schools (state, state technical and private) and from different SES completed part of the Extended Objective Measure of Ego Identity Status-2 (EOMEIS-2). The macro-context of Greek Cypriot society is used to understand the role of context in adolescents' identities. Results showed that Greek Cypriot young people were not in the same statuses across their global, political, religious and occupational identities. This heterogeneity in the status of global identity and of each identity domain is partially explained by differences in gender, type of school and SES (socio-economic status). The fact that identity status is found to be reactive to context suggests that developmental stage models of identity status should place greater emphasis on context.

  14. Identities of Finitely Generated Algebras Over AN Infinite Field

    NASA Astrophysics Data System (ADS)

    Kemer, A. R.

    1991-02-01

    It is proved that for each finitely generated associative PI-algebra U over an infinite field F, there is a finite-dimensional F-algebra C such that the ideals of identities of the algebras U and C coincide. This yields a positive solution to the local problem of Specht for algebras over an infinite field: A finitely generated free associative algebra satisfies the maximum condition for T-ideals.

  15. Management Development in the NHS: Nurses and Managers, Discourses and Identities

    ERIC Educational Resources Information Center

    Sambrook, Sally

    2006-01-01

    Purpose: Aims to provide a brief discussion of discourses of HRD, then a brief review of HRD within the NHS, including stakeholders in HRD, and particularly management development. To explore some of the different discourses used by different managers, particularly those with a nursing background and those without, and the possible reasons for the…

  16. Using a generalised identity reference model with archetypes to support interoperability of demographics information in electronic health record systems.

    PubMed

    Xu Chen; Berry, Damon; Stephens, Gaye

    2015-01-01

    Computerised identity management is in general encountered as a low-level mechanism that enables users in a particular system or region to securely access resources. In the Electronic Health Record (EHR), the identifying information of both the healthcare professionals who access the EHR and the patients whose EHR is accessed, are subject to change. Demographics services have been developed to manage federated patient and healthcare professional identities and to support challenging healthcare-specific use cases in the presence of diverse and sometimes conflicting demographic identities. Demographics services are not the only use for identities in healthcare. Nevertheless, contemporary EHR specifications limit the types of entities that can be the actor or subject of a record to health professionals and patients, thus limiting the use of two level models in other healthcare information systems. Demographics are ubiquitous in healthcare, so for a general identity model to be usable, it should be capable of managing demographic information. In this paper, we introduce a generalised identity reference model (GIRM) based on key characteristics of five surveyed demographic models. We evaluate the GIRM by using it to express the EN13606 demographics model in an extensible way at the metadata level and show how two-level modelling can support the exchange of instances of demographic identities. This use of the GIRM to express demographics information shows its application for standards-compliant two-level modelling alongside heterogeneous demographics models. We advocate this approach to facilitate the interoperability of identities between two-level model-based EHR systems and show the validity and the extensibility of using GIRM for the expression of other health-related identities.

  17. Identity and Intimacy during Adolescence: Connections among Identity Styles, Romantic Attachment and Identity Commitment

    ERIC Educational Resources Information Center

    Kerpelman, Jennifer L.; Pittman, Joe F.; Cadely, Hans Saint-Eloi; Tuggle, Felicia J.; Harrell-Levy, Marinda K.; Adler-Baeder, Francesca M.

    2012-01-01

    Integration of adult attachment and psychosocial development theories suggests that adolescence is a time when capacities for romantic intimacy and identity formation are co-evolving. The current study addressed direct, indirect and moderated associations among identity and romantic attachment constructs with a diverse sample of 2178 middle…

  18. Environmental and socio-economic methodologies and solutions towards integrated water resources management.

    PubMed

    Friesen, Jan; Rodriguez Sinobas, Leonor; Foglia, Laura; Ludwig, Ralf

    2017-03-01

    Semi-arid regions are facing the challenge of managing water resources under conditions of increasing scarcity and drought. These are recently pressured by the impact of climate change favoring the shifting from using surface water to groundwater without taking sustainability issues into account. Likewise, water scarcity raises the competition for water among users, increasing the risk of social conflicts, as the availability of fresh water in sufficient quality and quantity is already one of the major factors limiting socio-economic development. In terms of hydrology, semi-arid regions are characterized by very complex hydro- and hydrogeological systems. The complexity of the water cycle contrasts strongly with the poor data availability, (1) which limits the number of analysis techniques and methods available to researchers, (2) limits the accuracy of models and predictions, and (3) consequently challenges the capabilities to develop appropriate management measures to mitigate or adapt the environment to scarcity and drought conditions. Integrated water resources management is a holistic approach to focus on both environmental as well as on socio-economic factors influencing water availability and supply. The management approaches and solutions adopted, e.g. in form of decision support for specific water resources systems, are often highly specific for individual case studies. Copyright © 2016 Elsevier B.V. All rights reserved.

  19. Shades of American Identity: Implicit Relations between Ethnic and National Identities

    PubMed Central

    Devos, Thierry; Mohamed, Hafsa

    2015-01-01

    The issue of ethnic diversity and national identity in an immigrant nation such as the USA is a recurrent topic of debate. We review and integrate research examining the extent to which the American identity is implicitly granted or denied to members of different ethnic groups. Consistently, European Americans are implicitly conceived of as being more American than African, Asian, Latino, and even Native Americans. This implicit American = White effect emerges when explicit knowledge or perceptions point in the opposite direction. The propensity to deny the American identity to members of ethnic minorities is particularly pronounced when targets (individuals or groups) are construed through the lenses of ethnic identities. Implicit ethnic–national associations fluctuate as a function of perceivers’ ethnic identity and political orientation, but also contextual or situational factors. The tendency to equate being American with being White accounts for the strength of national identification (among European Americans) and behavioral responses including hiring recommendations and voting intentions. The robust propensity to deny the American identity to ethnic minority groups reflects an exclusionary national identity. PMID:27011765

  20. Identity configurations: a new perspective on identity formation in contemporary society.

    PubMed

    Schachter, Elli P

    2004-02-01

    This paper deals with the theoretical construct of "identity configuration." It portrays the different possible ways in which individuals configure the relationship among potentially conflicting identifications in the process of identity formation. In order to explicate these configurations, I analyzed narratives of identity development retold by individuals describing personal identity conflicts that arise within a larger context of sociocultural conflict. Thirty Jewish modern orthodox young adults were interviewed regarding a potentially conflictual identity issue (i.e. their religious and sexual development). Their deliberations, as described in the interviews, were examined, and four different configurations were identified: a configuration based on choice and suppression; an assimilative and synthesizing configuration; a confederacy of identifications; and a configuration based on the thrill of dissonance. The different configurations are illustrated through exemplars, and the possible implications of the concept of "configuration" for identity theory are discussed.

  1. An Analysis of Information Technology Managers' and Executives' Security Concerns on Willingness to Adopt Cloud Computing Solutions

    ERIC Educational Resources Information Center

    Tanque, Marcus M.

    2012-01-01

    The research conducted in this study inquires about Information Technology (IT) managers' and executives' attitudes, beliefs, and knowledge on Cloud Computing (CC) security. The study evaluated how these factors affect IT managers' and executives' willingness to adopt CC solutions in their organizations. Confidentiality,…

  2. Identity Federation and Its Importance for NASA's Future: The SharePoint Extranet Pilot

    NASA Technical Reports Server (NTRS)

    Baturin, Rebecca R.

    2013-01-01

    My project at Kennedy Space Center (KSC) during the spring 2013 Project Management and Systems Engineering Internship was to functionalJy test and deploy the SharePoint Extranet system and ensure successful completion of the project's various lifecycle milestones as described by NASA Procedural Requirement (NPR) 7 120.7. I worked alongside NASA Project Managers, Systems Integration Engineers, and Information Technology (IT) Professionals to pilot this collaboration capability between NASA and its External Partners. The use of identity federation allows NASA to leverage externally-issued credentials of other federal agencies and private aerospace and defense companies, versus the traditional process of granting and maintaining full NASA identities for these individuals. This is the first system of its kind at NASA and it will serve as a pilot for the Federal Government. Recognizing the novelty of this service, NASA's initial approach for deployment included a pilot period where nearby employees of Patrick Air Force Base would assist in testing and deployment. By utilizing a credential registration process, Air Force users mapped their Air Force-issued Common Access Cards (CAC) to a NASA identity for access to the External SharePoint. Once the Air Force stands up an Active Directory Federation Services (ADFS) instance within their Data Center and establishes a direct trust with NASA, true identity federation can be established. The next partner NASA is targeting for collaboration is Lockheed Martin (LMCO), since they collaborate frequently for the ORION Program. Through the use of Exostar as an identity hub, LMCO employees will be able to access NASA data on a need to know basis, with NASA ultimately managing access. In a time when every dollar and resource is being scrutinized, this capability is an exciting new way for NASA to continue its collaboration efforts in a cost and resource effective manner.

  3. "I'm Not an Immigrant!": Resistance, Redefinition, and the Role of Resources in Identity Work

    ERIC Educational Resources Information Center

    Killian, Caitlin; Johnson, Cathryn

    2006-01-01

    In this paper we examine the identity negotiation processes of North African immigrant women in France. Participants engaged in various forms of identity work, including selective association and management of appearance, as well as resisting others' attempts to categorize them as immigrants. Given that these women have chosen to move to France…

  4. ICT Solutions for Highly-Customized Water Demand Management Strategies

    NASA Astrophysics Data System (ADS)

    Giuliani, M.; Cominola, A.; Castelletti, A.; Fraternali, P.; Guardiola, J.; Barba, J.; Pulido-Velazquez, M.; Rizzoli, A. E.

    2016-12-01

    The recent deployment of smart metering networks is opening new opportunities for advancing the design of residential water demand management strategies (WDMS) relying on improved understanding of water consumers' behaviors. Recent applications showed that retrieving information on users' consumption behaviors, along with their explanatory and/or causal factors, is key to spot potential areas where targeting water saving efforts, and to design user-tailored WDMS. In this study, we explore the potential of ICT-based solutions in supporting the design and implementation of highly customized WDMS. On one side, the collection of consumption data at high spatial and temporal resolutions requires big data analytics and machine learning techniques to extract typical consumption features from the metered population of water users. On the other side, ICT solutions and gamifications can be used as effective means for facilitating both users' engagement and the collection of socio-psychographic users' information. This latter allows interpreting and improving the extracted profiles, ultimately supporting the customization of WDMS, such as awareness campaigns or personalized recommendations. Our approach is implemented in the SmartH2O platform and demonstrated in a pilot application in Valencia, Spain. Results show how the analysis of the smart metered consumption data, combined with the information retrieved from an ICT gamified web user portal, successfully identify the typical consumption profiles of the metered users and supports the design of alternative WDMS targeting the different users' profiles.

  5. SAVAH: Source Address Validation with Host Identity Protocol

    NASA Astrophysics Data System (ADS)

    Kuptsov, Dmitriy; Gurtov, Andrei

    Explosive growth of the Internet and lack of mechanisms that validate the authenticity of a packet source produced serious security and accounting issues. In this paper, we propose validating source addresses in LAN using Host Identity Protocol (HIP) deployed in a first-hop router. Compared to alternative solutions such as CGA, our approach is suitable both for IPv4 and IPv6. We have implemented SAVAH in Wi-Fi access points and evaluated its overhead for clients and the first-hop router.

  6. Lesbian Teachers' Identity, Power and the Public/Private Boundary

    ERIC Educational Resources Information Center

    Rudoe, Naomi

    2010-01-01

    This article examines lesbian teachers' negotiation of the public/private boundary in the school, focusing on identity management in the context of the heterosexualised space of this public institution. The study is based on interviews conducted with six lesbian teachers working in London secondary schools. I examine the teachers' responses, and…

  7. Blocked urinary catheters: solutions are not the only solution.

    PubMed

    Williams, Cath; Tonkin, Sharon

    2003-07-01

    The use of catheter maintenance solutions to manage clients whose catheters block has long been a subject for debate. An understanding of the causes of blockage, and awareness of appropriate management may reduce frequency of blockage and reduce unnecessary interruptions to a closed urinary drainage system.

  8. Acidities of Water and Methanol in Aqueous Solution and DMSO

    ERIC Educational Resources Information Center

    Gao, Daqing

    2009-01-01

    The relative acidities of water and methanol have been a nagging issue. In gas phase, methanol is more acidic than water by 36.0 kJ/mol; however, in aqueous solution, the acidities of methanol and water are almost identical. The acidity of an acid in solution is determined by both the intrinsic gas-phase ionization Gibbs energy and the solvent…

  9. The Influence of Field Teaching Practice on Pre-service Teachers’ Professional Identity: A Mixed Methods Study

    PubMed Central

    Zhao, Hongyu; Zhang, Xiaohui

    2017-01-01

    The current study used mixed methods to research pre-service teachers’ professional identity. Ninety-eight pre-service teachers were investigated and twelve teachers were interviewed in China. The results were as follows: (1) The results of quantitative data showed that compared with before the field teaching practice, pre-service teachers’ professional identity increased after the field teaching practice—specifically, intrinsic value identity increased, and extrinsic value identity did not significantly change; (2) The results of qualitative data validated and elaborated the results of quantitative data in more detail with regard to changes in professional identity. Specifically, compared with before the field teaching practice, intrinsic value identity including work content, work pattern, etc., increased and extrinsic value identity including work environment, income, and social status, etc., did not significantly change after experiencing teaching practice; (3) The results of qualitative data also showed that mentor support at field school promoted the development of pre-service teachers’ professional identity. Moreover, the development of pre-service teachers’ professional identity during field teaching practice further promoted their professional commitment; that is, it promoted their emotional evaluation and belief in the teaching profession. The study discussed these results and proposed solutions and suggestions for future studies. PMID:28790956

  10. The Influence of Field Teaching Practice on Pre-service Teachers' Professional Identity: A Mixed Methods Study.

    PubMed

    Zhao, Hongyu; Zhang, Xiaohui

    2017-01-01

    The current study used mixed methods to research pre-service teachers' professional identity. Ninety-eight pre-service teachers were investigated and twelve teachers were interviewed in China. The results were as follows: (1) The results of quantitative data showed that compared with before the field teaching practice, pre-service teachers' professional identity increased after the field teaching practice-specifically, intrinsic value identity increased, and extrinsic value identity did not significantly change; (2) The results of qualitative data validated and elaborated the results of quantitative data in more detail with regard to changes in professional identity. Specifically, compared with before the field teaching practice, intrinsic value identity including work content, work pattern, etc., increased and extrinsic value identity including work environment, income, and social status, etc., did not significantly change after experiencing teaching practice; (3) The results of qualitative data also showed that mentor support at field school promoted the development of pre-service teachers' professional identity. Moreover, the development of pre-service teachers' professional identity during field teaching practice further promoted their professional commitment; that is, it promoted their emotional evaluation and belief in the teaching profession. The study discussed these results and proposed solutions and suggestions for future studies.

  11. Personal Identity in Italy

    ERIC Educational Resources Information Center

    Crocetti, Elisabetta; Rabaglietti, Emanuela; Sica, Luigia Simona

    2012-01-01

    This chapter discusses specifics of identity formation in Italian adolescents and emerging adults. We review consistent evidence illustrating that, in Italy, a progressive deferral of transition to adulthood strongly impacts youth identity development by stimulating identity exploration and postponement of identity commitments. We also consider…

  12. ‘Stealing me from myself’: identity and recovery in personal accounts of mental illness

    PubMed Central

    Bruce, Kevin; Saedi, Goal Auzeen; Weis, Teresa; Green, Carla A.

    2013-01-01

    Objectives To understand and promote recovery from serious mental illnesses, it is important to study the perspectives of individuals who are coping with mental health problems. The aim of the present study was to examine identity-related themes in published self-narratives of family members and individuals with serious mental illness. It adds to the body of research addressing how identity affects the process of recovery and identifies potential opportunities for using published narratives to support individuals as they move toward positive identities that facilitate recovery. Method Forty-five personal accounts from individuals with severe mental illness, which were published in two prominent research journals between 1998 and 2003, were qualitatively analysed. Results Individuals with mental illness and their family members described a loss of self and identity that had to be overcome, or at least managed, for recovery to become possible. Writers described (i) a loss of self, (ii) the duality of (ill/well) selves, (iii) perceptions of normality, (iv) specific concerns about parenting and identity, and (v) hope and reconciliation. Conclusions Individuals’ stories of their experiences of severe mental illness describe severe challenges managing identity. Efforts to publish personal accounts that focus on strengths-based patient-centred stories, rather than on deficits, could be helpful to provide hope for patients. These published narratives highlight the importance of moving recovery and hope to the forefront among patient, family, and clinician groups. Increasing such information and role models can provide important resources to individuals working to redefine themselves and create a sense of self-worth and stable identity that will support productive, happy lives. PMID:18465375

  13. Talkin' Musical Identities Blues

    ERIC Educational Resources Information Center

    Lamb, Roberta

    2004-01-01

    After reading the book "Musical Identities" (Raymond MacDonald, David Hargreaves, Dorothy Miell, eds.; Oxford and New York: Oxford University Press, 2002), this author states she finds it difficult to separate "identities in music" from "music in identities." In fact, she cannot conceive of music apart from identity.…

  14. Human identity versus gender identity: The perception of sexual addiction among Iranian women.

    PubMed

    Moshtagh, Mozhgan; Mirlashari, Jila; Rafiey, Hassan; Azin, Ali; Farnam, Robert

    2017-07-01

    This qualitative study was conducted to explore the images of personal identity from the perspective of women with sexual addiction. The data required for the study were collected through 31 in-depth interviews. Sensing a threat to personal identity, dissatisfaction with gender identity, dissociation with the continuum of identity, and identity reconstruction in response to threat were four of the experiences that were common among women with sexual addiction. Painful emotional experiences appear to have created a sense of gender and sexual conflict or weakness in these women and thus threatened their personal identity and led to their sexual addiction.

  15. Who do we think we are? Analysing the content and form of identity work in the English National Health Service.

    PubMed

    McDermott, Imelda; Checkland, Kath; Harrison, Stephen; Snow, Stephanie; Coleman, Anna

    2013-01-01

    The language used by National Health Service (NHS) "commissioning" managers when discussing their roles and responsibilities can be seen as a manifestation of "identity work", defined as a process of identifying. This paper aims to offer a novel approach to analysing "identity work" by triangulation of multiple analytical methods, combining analysis of the content of text with analysis of its form. Fairclough's discourse analytic methodology is used as a framework. Following Fairclough, the authors use analytical methods associated with Halliday's systemic functional linguistics. While analysis of the content of interviews provides some information about NHS Commissioners' perceptions of their roles and responsibilities, analysis of the form of discourse that they use provides a more detailed and nuanced view. Overall, the authors found that commissioning managers have a higher level of certainty about what commissioning is not rather than what commissioning is; GP managers have a high level of certainty of their identity as a GP rather than as a manager; and both GP managers and non-GP managers oscillate between multiple identities depending on the different situations they are in. This paper offers a novel approach to triangulation, based not on the usual comparison of multiple data sources, but rather based on the application of multiple analytical methods to a single source of data. This paper also shows the latent uncertainty about the nature of commissioning enterprise in the English NHS.

  16. The Gibbs paradox and the physical criteria for indistinguishability of identical particles

    NASA Astrophysics Data System (ADS)

    Unnikrishnan, C. S.

    2016-08-01

    Gibbs paradox in the context of statistical mechanics addresses the issue of additivity of entropy of mixing gases. The usual discussion attributes the paradoxical situation to classical distinguishability of identical particles and credits quantum theory for enabling indistinguishability of identical particles to solve the problem. We argue that indistinguishability of identical particles is already a feature in classical mechanics and this is clearly brought out when the problem is treated in the language of information and associated entropy. We pinpoint the physical criteria for indistinguishability that is crucial for the treatment of the Gibbs’ problem and the consistency of its solution with conventional thermodynamics. Quantum mechanics provides a quantitative criterion, not possible in the classical picture, for the degree of indistinguishability in terms of visibility of quantum interference, or overlap of the states as pointed out by von Neumann, thereby endowing the entropy expression with mathematical continuity and physical reasonableness.

  17. Identities in Harmony: Gender-Work Identity Integration Moderates Frame Switching in Cognitive Processing

    ERIC Educational Resources Information Center

    Sacharin, Vera; Lee, Fiona; Gonzalez, Richard

    2009-01-01

    Professional women's identity integration--the perceived compatibility between work and gender identities--plays a role in how task or relationship information is processed. Seventy female business school students were primed with either their professional or their gender identity. Business women with higher identity integration showed an…

  18. Solid Waste Management Solutions for a Rapidly Urbanizing Area in Thailand: Recommendations Based on Stakeholder Input.

    PubMed

    Yukalang, Nachalida; Clarke, Beverley; Ross, Kirstin

    2018-06-21

    Municipal solid waste is a significant problem, particularly in developing countries that lack sufficient infrastructure and useable land mass to process it in an appropriate manner. Some developing nations are experiencing a combination of issues that prevent proper management of solid waste. This paper reviews the management of municipal solid waste in northeast Thailand, using the Tha Khon Yang Sub-district Municipality (TKYSM) in Maha Sarakham Province as a case study. The combination of rapid population and economic growth and its associated affluence has led to an increase in the use of consumer items and a concomitant increase in the production of municipal solid waste. In the TKYSM there is pressure on local government to establish a suitable waste management program to resolve the escalating waste crisis. The aim of this study is to provide viable solutions to waste management challenges in the TKYSM, and potentially to offer guidance to other similar localities also facing the same challenges. It is well established that successful changes to waste management require an understanding of local context and consideration of specific issues within a region. Therefore, extensive community consultation and engagement with local experts was undertaken to develop an understanding of the particular waste management challenges of the TKYSM. Research methods included observations, one-on-one interviews and focus groups with a range of different stakeholders. The outcomes of this research highlight a number of opportunities to improve local infrastructure and operational capacity around solid waste management. Waste management in rural and urban areas needs to be approached differently. Solutions include: development of appropriate policy and implementation plans (based around the recommendations of this paper); reduction of the volume of waste going to landfill by establishing a waste separation system; initiation of a collection service that supports waste

  19. Factors influencing the adoption of self-management solutions: an interpretive synthesis of the literature on stakeholder experiences.

    PubMed

    Harvey, J; Dopson, S; McManus, R J; Powell, J

    2015-11-13

    In a research context, self-management solutions, which may range from simple book diaries to complex telehealth packages, designed to facilitate patients in managing their long-term conditions, have often shown cost-effectiveness, but their implementation in practice has frequently been challenging. We conducted an interpretive qualitative synthesis of relevant articles identified through systematic searches of bibliographic databases in July 2014. We searched PubMed (Medline/NLM), Web of Science, LISTA (EBSCO), CINAHL, Embase and PsycINFO. Coding and analysis was inductive, using the framework method to code and to categorise themes. We took a sensemaking approach to the interpretation of findings. Fifty-eight articles were selected for synthesis. Results showed that during adoption, factors identified as facilitators by some were experienced as barriers by others, and facilitators could change to barriers for the same adopter, depending on how adopters rationalise the solutions within their context when making decisions about (retaining) adoption. Sometimes, when adopters saw and experienced benefits of a solution, they continued using the solution but changed their minds when they could no longer see the benefits. Thus, adopters placed a positive value on the solution if they could constructively rationalise it (which increased adoption) and attached a negative rationale (decreasing adoption) if the solution did not meet their expectations. Key factors that influenced the way adopters rationalised the solutions consisted of costs and the added value of the solution to them and moral, social, motivational and cultural factors. Considering 'barriers' and 'facilitators' for implementation may be too simplistic. Implementers could instead iteratively re-evaluate how potential facilitators and barriers are being experienced by adopters throughout the implementation process, to help adopters to retain constructive evaluations of the solution. Implementers need to pay

  20. Negotiating Contexts to Construct an Identity as a Mathematics Teacher

    ERIC Educational Resources Information Center

    Hodges, Thomas E.; Cady, Jo Ann

    2012-01-01

    The authors focused on 1 middle-grades mathematics teacher's identity and her efforts to implement standards-based instructional practices. As professionals, teachers participate in multiple professional communities and must negotiate and manage conflicting agendas. The authors analyze how the contexts of these communities influence the teacher's…

  1. Gregory the Great's metaphor of the physician of the heart as a model for pastoral identity.

    PubMed

    McGrath-Merkle, Clare

    2011-06-01

    The identity of the Roman Catholic priesthood remains in serious crisis. Scholars have called for a return to traditional sources to find possible solutions, including the Early Church Fathers and the Hebrew Bible. Following Oden, this article further explores Pope Gregory the Great's The Book of Pastoral Rule and his ideals regarding pastoral identity. Of unique importance is his notion of the pastor as a "physician of the heart," unrecognized previously as central to his project.

  2. Efficient Fair Exchange from Identity-Based Signature

    NASA Astrophysics Data System (ADS)

    Yum, Dae Hyun; Lee, Pil Joong

    A fair exchange scheme is a protocol by which two parties Alice and Bob exchange items or services without allowing either party to gain advantages by quitting prematurely or otherwise misbehaving. To this end, modern cryptographic solutions use a semi-trusted arbitrator who involves only in cases where one party attempts to cheat or simply crashes. We call such a fair exchange scheme optimistic. When no registration is required between the signer and the arbitrator, we say that the fair exchange scheme is setup free. To date, the setup-free optimist fair exchange scheme under the standard RSA assumption was only possible from the generic construction of [12], which uses ring signatures. In this paper, we introduce a new setup-free optimistic fair exchange scheme under the standard RSA assumption. Our scheme uses the GQ identity-based signature and is more efficient than [12]. The construction can also be generalized by using various identity-based signature schemes. Our main technique is to allow each user to choose his (or her) own “random” public key in the identitybased signature scheme.

  3. Thinking identity differently: dynamics of identity in self and institutional boundary

    NASA Astrophysics Data System (ADS)

    Albrecht, Nancy J.; Fortney, Brian S.

    2011-03-01

    In research oriented universities, research and teaching are often viewed as separate. Aydeniz and Hodge present one professor's struggles to synthesize an identity from three different spaces, each with competing values and core beliefs. As Mr. G's story unfolds, and he reflects upon his negotiation between teaching and research responsibilities, we seek to expand the discussion by presenting a caution to identity researchers. The caution pertains to construction of understanding on how identities are created, and the role that individual stories take in how identities are created and enacted. In this forum contribution, we present several questions in the hopes of furthering the discussion on identity research, and our understanding of the conceptualization of institutional boundaries and objectivity, as well as questions on participant involvement in the process of research.

  4. Social Identity in People with Multiple Sclerosis: An Examination of Family Identity and Mood.

    PubMed

    Barker, Alex B; Lincoln, Nadina B; Hunt, Nigel; dasNair, Roshan

    2018-01-01

    Mood disorders are highly prevalent in people with multiple sclerosis (MS). MS causes changes to a person's sense of self. The Social Identity Model of Identity Change posits that group membership can have a positive effect on mood during identity change. The family is a social group implicated in adjustment to MS. The objectives of this study were to investigate whether family identity can predict mood in people with MS and to test whether this prediction was mediated by social support and connectedness to others. This cross-sectional survey of 195 participants comprised measures of family identity, family social support, connectedness to others, and mood. Family identity predicted mood both directly and indirectly through parallel mediators of family social support and connectedness to others. Family identity predicted mood as posited by the Social Identity Model of Identity Change. Involving the family in adjustment to MS could reduce low mood.

  5. Narrating and Performing Identity: Literacy Specialists' Writing Identities

    ERIC Educational Resources Information Center

    McKinney, Marilyn; Giorgis, Cyndi

    2009-01-01

    In this study, we explored ways that four literacy specialists who worked in three schools that were part of one state's Reading Excellence Act (REA) grant constructed their identities as writers and as teachers of writing. We also explored how they negotiated the performance of those identities in different contexts over a two-year period.…

  6. Identity-specific motivation: How distinct identities direct self-regulation across distinct situations.

    PubMed

    Browman, Alexander S; Destin, Mesmin; Molden, Daniel C

    2017-12-01

    Research on self-regulation has traditionally emphasized that people's thoughts and actions are guided by either (a) domain-general motivations that emerge from a cumulative history of life experiences, or (b) situation-specific motivations that emerge in immediate response to the incentives present in a particular context. However, more recent studies have illustrated the importance of understanding the interplay between such domain-general and situation-specific motivations across the types of contexts people regularly encounter. The present research, therefore, expands existing perspectives on self-regulation by investigating how people's identities -the internalized roles, relationships, and social group memberships that define who they are-systemically guide when and how different domain-general motivations are activated within specific types of situations. Using the motivational framework described by regulatory focus theory (Higgins, 1997), Studies 1 and 2 demonstrate that people indeed have distinct, identity-specific motivations that uniquely influence their current self-regulation when such identities are active. Studies 3-5 then begin to explore how identity-specific motivations are situated within people's larger self-concept. Studies 3a and 3b demonstrate that the less compatible people's specific identities, the more distinct are the motivations connected to those identities. Studies 4-5 then provide some initial, suggestive evidence that identity-specific motivations are not a separate, superordinate feature of people's identities that then alter how they pursue any subordinate, identity-relevant traits, but instead that such motivations emerge from the cumulative motivational significance of the subordinate traits to which the identities themselves become attached. Implications for understanding the role of the self-concept in self-regulation are discussed. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  7. Social Identity and Preferences*

    PubMed Central

    Benjamin, Daniel J.; Choi, James J.; Strickland, A. Joshua

    2009-01-01

    Social identities prescribe behaviors for people. We identify the marginal behavioral effect of these norms on discount rates and risk aversion by measuring how laboratory subjects’ choices change when an aspect of social identity is made salient. When we make ethnic identity salient to Asian-American subjects, they make more patient choices. When we make racial identity salient to black subjects, non-immigrant blacks (but not immigrant blacks) make more patient choices. Making gender identity salient has no effect on intertemporal or risk choices. PMID:20871741

  8. Professional Identity, Adaptation and the Self: Cases of New Zealand School Principals during a Time of Change

    ERIC Educational Resources Information Center

    Notman, Ross

    2017-01-01

    There is developing interest in how professional identity can support educational leaders' management of change. This article explores the conceptualisation and interplay of identity formation with adaptive and contingent forms of educational leadership. The article draws on qualitative data obtained from two New Zealand school principals and…

  9. Memory transfer for emotionally valenced words between identities in dissociative identity disorder.

    PubMed

    Huntjens, Rafaële J C; Peters, Madelon L; Woertman, Liesbeth; van der Hart, Onno; Postma, Albert

    2007-04-01

    The present study aimed to determine interidentity retrieval of emotionally valenced words in dissociative identity disorder (DID). Twenty-two DID patients participated together with 25 normal controls and 25 controls instructed to simulate DID. Two wordlists A and B were constructed including neutral, positive and negative material. List A was shown to one identity, while list B was shown to another identity claiming total amnesia for the words learned by the first identity. The identity claiming amnesia was tested for intrusions from list A words into the recall of words from list B and recognition of the words learned by both identities. Test results indicated no evidence of total interidentity amnesia for emotionally valenced material in DID. It is argued that dissociative amnesia in DID may more adequately be described as a disturbance in meta-memory functioning instead of an actual retrieval inability.

  10. Family physicians' professional identity formation: a study protocol to explore impression management processes in institutional academic contexts.

    PubMed

    Rodríguez, Charo; Pawlikowska, Teresa; Schweyer, Francois-Xavier; López-Roig, Sofia; Bélanger, Emmanuelle; Burns, Jane; Hugé, Sandrine; Pastor-Mira, Maria Ángeles; Tellier, Pierre-Paul; Spencer, Sarah; Fiquet, Laure; Pereiró-Berenguer, Inmaculada

    2014-09-06

    Despite significant differences in terms of medical training and health care context, the phenomenon of medical students' declining interest in family medicine has been well documented in North America and in many other developed countries as well. As part of a research program on family physicians' professional identity formation initiated in 2007, the purpose of the present investigation is to examine in-depth how family physicians construct their professional image in academic contexts; in other words, this study will allow us to identify and understand the processes whereby family physicians with an academic appointment seek to control the ideas others form about them as a professional group, i.e. impression management. The methodology consists of a multiple case study embedded in the perspective of institutional theory. Four international cases from Canada, France, Ireland and Spain will be conducted; the "case" is the medical school. Four levels of analysis will be considered: individual family physicians, interpersonal relationships, family physician professional group, and organization (medical school). Individual interviews and focus groups with academic family physicians will constitute the main technique for data generation, which will be complemented with a variety of documentary sources. Discourse techniques, more particularly rhetorical analysis, will be used to analyze the data gathered. Within- and cross-case analysis will then be performed. This empirical study is strongly grounded in theory and will contribute to the scant body of literature on family physicians' professional identity formation processes in medical schools. Findings will potentially have important implications for the practice of family medicine, medical education and health and educational policies.

  11. Gender Identity and Career Aspiration to Top Management of Malaysian Graduate Students

    ERIC Educational Resources Information Center

    Karami, Roya; Ismail, Maimunah; Sail, Rahim Md.

    2011-01-01

    This article examines the relationship between gender identity and career aspirations of a group of Iranian international postgraduate students studying at a Malaysian public university. This study uses the Farmer's Achievement Motivation Theory and Astin's Sociopsychological Model of Career Choice as theoretical framework. The data were collected…

  12. Data management in automated external defibrillators: a call for a standardised solution.

    PubMed

    Nielsen, A M; Rasmussen, L S

    2011-07-01

    The ECG data stored in automated external defibrillators (AEDs) may be valuable for establishing a final diagnosis and deciding further diagnostics and treatment. Different data management systems are used and this may create significant problems for data storage and access for physicians treating victims in whom an AED has been used. In this descriptive study, we collected information (number, manufacturer and model) on 17 December 2010 from a web page used for the voluntary registration of AEDs in Denmark. The manufacturers were contacted and asked to provide information about data downloading. There were 12 different manufactures and 20 different AED models. Five models were registered in a quantity <5. We report data from the remaining 15 models (3603 AEDs). Several models stored only one case or 15 min of ECG data. All models had a data transfer option, but most had outdated 'hardware': Seven had infrared transfer; one had a cable with a serial port. Four had a removable memory device, but only one was a USB. The software was available as freeware only in a few cases. Otherwise, a CD ROM was needed, some even with a licence. The software for the second most common AED could not be installed. The development of data management solutions is not a high priority. We encourage the manufacturers to collaborate with researchers to develop a simple data transfer solution in order to improve patient care and facilitate research. © 2011 The Authors. Acta Anaesthesiologica Scandinavica © 2011 The Acta Anaesthesiologica Scandinavica Foundation.

  13. Brand Identity.

    ERIC Educational Resources Information Center

    Lawlor, John

    1998-01-01

    Instead of differentiating themselves by building "brand identities," colleges and universities often focus on competing with price. As a result, fewer and fewer institutions base their identities on value, the combination of quality and price. Methods of building two concepts to influence customers' brand image and brand loyalty are…

  14. Integrated Practice Improvement Solutions-Practical Steps to Operating Room Management.

    PubMed

    Chernov, Mikhail; Pullockaran, Janet; Vick, Angela; Leyvi, Galina; Delphin, Ellise

    2016-10-01

    Perioperative productivity is a vital concern for surgeons, anesthesiologists, and administrators as the OR is a major source of hospital elective admissions and revenue. Based on elements of existing Practice Improvement Methodologies (PIMs), "Integrated Practice Improvement Solutions" (IPIS) is a practical and simple solution incorporating aspects of multiple management approaches into a single open source framework to increase OR efficiency and productivity by better utilization of existing resources. OR efficiency was measured both before and after IPIS implementation using the total number of cases versus room utilization, OR/anesthesia revenue and staff overtime (OT) costs. Other parameters of efficiency, such as the first case on-time start and the turnover time (TOT) were measured in parallel. IPIS implementation resulted in increased numbers of surgical procedures performed by an average of 10.7%, and OR and anesthesia revenue increases of 18.5% and 6.9%, respectively, with a simultaneous decrease in TOT (15%) and OT for anesthesia staff (26%). The number of perioperative adverse events was stable during the two-year study period which involved a total of 20,378 patients. IPIS, an effective and flexible practice improvement model, was designed to quickly, significantly, and sustainably improve OR efficiency by better utilization of existing resources. Success of its implementation directly correlates with the involvement of and acceptance by the entire OR team and hospital administration.

  15. Adolescence: Search for an Identity

    ERIC Educational Resources Information Center

    Kasinath, H. M.

    2013-01-01

    James Marcia (1991, 1994, 1999, 2002) expanded on Erikson's theory of identity formation. Specifically, he focused on two essential processes in achieving a mature identity: exploration and commitment. Erikson's observations about identity were extended by Marcia, who described four identity statuses: identity diffusion, foreclosure, moratorium…

  16. VET Manager Identities: Culture, Philosophy and Professional Practice

    ERIC Educational Resources Information Center

    Foley, Annette

    2011-01-01

    Using a post-structural approach this article investigates the working lives of frontline managers in VET and how they negotiate change in their day to day practices and decision making. The article is organised around accounts made by managers from different types of Vocational Education and Training (VET) organisations, namely: Technical and…

  17. Relational identity theory: a systematic approach for transforming the emotional dimension of conflict.

    PubMed

    Shapiro, Daniel L

    2010-10-01

    Emotions are a vital dimension in conflicts among nation-states and communities affiliated by common ethnic, economic, or political interests. Yet the individuals most responsible for managing such conflicts--heads of state, CEOs, intellectual or religious leaders--are often blind to the psychological forces affecting their interests. During 20 years of international research, consulting, and teaching, I have developed a program for teaching thought leaders how to apply psychological principles to achieve their aims while also reducing negative outcomes such as violence, social upheaval, and economic displacement. In this article, I present relational identity theory (RIT), a theoretical and intellectual framework I have originated to help people understand and deal with key emotional dimensions of conflict management. I argue that national and communal bonds are essentially tribal in nature, and I describe how a tribe's unaddressed relational identity concerns make it susceptible to what I term the tribes effect, a rigidification of its relational identity. I provide strategies based on RIT for mitigating the tribes effect and thus enhancing global security. (c) 2010 APA, all rights reserved

  18. Identity and Professional Networking.

    PubMed

    Raj, Medha; Fast, Nathanael J; Fisher, Oliver

    2017-06-01

    Despite evidence that large professional networks afford a host of financial and professional benefits, people vary in how motivated they are to build such networks. To help explain this variance, the present article moves beyond a rational self-interest account to examine the possibility that identity shapes individuals' intentions to network. Study 1 established a positive association between viewing professional networking as identity-congruent and the tendency to prioritize strengthening and expanding one's professional network. Study 2 revealed that manipulating the salience of the self affects networking intentions, but only among those high in networking identity-congruence. Study 3 further established causality by experimentally manipulating identity-congruence to increase networking intentions. Study 4 examined whether identity or self-interest is a better predictor of networking intentions, providing support for the former. These findings indicate that identity influences the networks people develop. Implications for research on the self, identity-based motivation, and professional networking are discussed.

  19. Men as victims: "victim" identities, gay identities, and masculinities.

    PubMed

    Dunn, Peter

    2012-11-01

    The impact and meanings of homophobic violence on gay men's identities are explored with a particular focus on their identities as men and as gay men. Homosexuality can pose a challenge to conventional masculinities, and for some gay men, being victimized on account of sexual orientation reawakens conflicts about their masculinity that they thought they had resolved. Being victimized can reinvoke shame that is rooted in failure or unwillingness to uphold masculine norms. For some gay men, victimization therefore has connotations of nonmasculinity that make being a victim an undesirable status, yet that status must be claimed to obtain a response from criminal justice or victim services. Men who experience homophobic abuse are helped by accepting a victim identity, but only if they can quickly move on from it by reconstructing a masculine gay (nonvictim) identity. This process can be facilitated by agencies such as the police and victim services, provided they help men exercise agency in "fighting back," that is, resisting further victimization and recovering.

  20. Negotiation of identity in group therapy for aphasia: the Aphasia Café.

    PubMed

    Simmons-Mackie, Nina; Elman, Roberta J

    2011-01-01

    There has been increasing interest in ensuring that aphasia intervention includes attention to the negotiation of a robust identity after the life-altering changes that often accompany the onset of aphasia. But how does one go about simultaneously improving communication and positive identity development within aphasia therapy? Socially oriented group therapy for aphasia has been touted as one means of addressing both psychosocial and communicative goals in aphasia. This article describes the results of a sociolinguistic analysis of group therapy for aphasia in which positive personal and group identity are skilfully negotiated. Sociolinguistic microanalysis of discourse in a group therapy session was undertaken. The session, described as group conversation therapy, included eight adults with aphasia, a speech-language pathologist and an assistant. The session was videotaped and transcribed, and the data were analysed to identify 'indices of identity' within the discourse. This included discourse that exposed members' roles, values or beliefs about themselves or others. The data were further analysed to identify 'patterns' of discourse associated with identity. The result is a detailed description of identity-enhancing discourse within group therapy for aphasia. The findings included several categories associated with the negotiation of identity in therapy including: (1) discourse demonstrating that group members were 'being heard', (2) that the competence of group members was assumed, (3) that 'solidarity' existed in the group, (4) that saving face and promoting positive personal identity was important, and (5) that markers of group identity were made visible via discourse that referenced both member inclusion as well as non-member exclusion. The results suggest that it is possible to create identity-enhancing interactions as part of therapy for aphasia; the analysis demonstrates the potential role of the group leader/clinician in managing identity negotiation in

  1. Collision of Identical Solitary Waves in Hertzian Chains

    NASA Astrophysics Data System (ADS)

    Sen, Surajit; Manciu, Marian; Hurd, Alan J.

    2000-03-01

    We consider a chain of elastic beads, which repel upon contact according to the non-linear Hertz potential. We further assume that the chain is under zero loading, i.e., the grains have zero initial overlap. We show via careful numerical solution of the equations of motion that an impulse propagates as a solitary wave and that the collision of identical solitary waves propagating in opposite directions along the chain spawns a hierarchy of multiple weak solitary waves [1]. [1] M. Manciu, S. Sen and A.J. Hurd, Phys Lett A (submitted).

  2. When and how experienced incivility dissuades proactive performance: An integration of sociometer and self-identity orientation perspectives.

    PubMed

    Schilpzand, Pauline; Huang, Lei

    2018-04-16

    In this article we build on relational Sociometer Theory (Leary, 2005; Leary & Baumeister, 2000) to posit the impact of the belongingness threat of experienced incivility in one's work team on employee feelings of ostracism and subsequent engagement in proactive performance. Integrating the social-relational framework of Self-Identity Orientation Theory (Brewer & Gardner, 1996; Cooper & Thatcher, 2010), we nuance our predictions by hypothesizing that chronic self-identification orientations influence both the effect that experiencing incivility in one's work team exerts on feeling ostracized, and the impact that feeling ostracized has on subsequent employee proactive performance. Using a sample of 212 employees and their 51 supervising managers employed in an Internet service and solution company in China, we found support for our hypothesized model. Implications for theory and practice are discussed. (PsycINFO Database Record (c) 2018 APA, all rights reserved).

  3. A Longitudinal Integration of Identity Styles and Educational Identity Processes in Adolescence

    ERIC Educational Resources Information Center

    Negru-Subtirica, Oana; Pop, Eleonora Ioana; Crocetti, Elisabetta

    2017-01-01

    Identity formation is a main adolescent psychosocial developmental task. The complex interconnection between different processes that are at the basis of one's identity is a research and applied intervention priority. In this context, the identity style model focuses on social-cognitive strategies (i.e., informational, normative, and…

  4. Personal Genomic Information Management and Personalized Medicine: Challenges, Current Solutions, and Roles of HIM Professionals

    PubMed Central

    Alzu'bi, Amal; Zhou, Leming; Watzlaf, Valerie

    2014-01-01

    In recent years, the term personalized medicine has received more and more attention in the field of healthcare. The increasing use of this term is closely related to the astonishing advancement in DNA sequencing technologies and other high-throughput biotechnologies. A large amount of personal genomic data can be generated by these technologies in a short time. Consequently, the needs for managing, analyzing, and interpreting these personal genomic data to facilitate personalized care are escalated. In this article, we discuss the challenges for implementing genomics-based personalized medicine in healthcare, current solutions to these challenges, and the roles of health information management (HIM) professionals in genomics-based personalized medicine. PMID:24808804

  5. A solvent replenishment solution for managing evaporation of biochemical reactions in air-matrix digital microfluidics devices.

    PubMed

    Jebrail, Mais J; Renzi, Ronald F; Sinha, Anupama; Van De Vreugde, Jim; Gondhalekar, Carmen; Ambriz, Cesar; Meagher, Robert J; Branda, Steven S

    2015-01-07

    Digital microfluidics (DMF) is a powerful technique for sample preparation and analysis for a broad range of biological and chemical applications. In many cases, it is desirable to carry out DMF on an open surface, such that the matrix surrounding the droplets is ambient air. However, the utility of the air-matrix DMF format has been severely limited by problems with droplet evaporation, especially when the droplet-based biochemical reactions require high temperatures for long periods of time. We present a simple solution for managing evaporation in air-matrix DMF: just-in-time replenishment of the reaction volume using droplets of solvent. We demonstrate that this solution enables DMF-mediated execution of several different biochemical reactions (RNA fragmentation, first-strand cDNA synthesis, and PCR) over a range of temperatures (4-95 °C) and incubation times (up to 1 h or more) without use of oil, humidifying chambers, or off-chip heating modules. Reaction volumes and temperatures were maintained roughly constant over the course of each experiment, such that the reaction kinetics and products generated by the air-matrix DMF device were comparable to those of conventional benchscale reactions. This simple yet effective solution for evaporation management is an important advance in developing air-matrix DMF for a wide variety of new, high-impact applications, particularly in the biomedical sciences.

  6. A solvent replenishment solution for managing evaporation of biochemical reactions in air-matrix digital microfluidics devices

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Jebrail, Mais J.; Renzi, Ronald F.; Sinha, Anupama

    Digital microfluidics (DMF) is a powerful technique for sample preparation and analysis for a broad range of biological and chemical applications. In many cases, it is desirable to carry out DMF on an open surface, such that the matrix surrounding the droplets is ambient air. However, the utility of the air-matrix DMF format has been severely limited by problems with droplet evaporation, especially when the droplet-based biochemical reactions require high temperatures for long periods of time. We present a simple solution for managing evaporation in air-matrix DMF: just-in-time replenishment of the reaction volume using droplets of solvent. We demonstrate thatmore » this solution enables DMF-mediated execution of several different biochemical reactions (RNA fragmentation, first-strand cDNA synthesis, and PCR) over a range of temperatures (4–95 °C) and incubation times (up to 1 h or more) without use of oil, humidifying chambers, or off-chip heating modules. Reaction volumes and temperatures were maintained roughly constant over the course of each experiment, such that the reaction kinetics and products generated by the air-matrix DMF device were comparable to those of conventional benchscale reactions. As a result, this simple yet effective solution for evaporation management is an important advance in developing air-matrix DMF for a wide variety of new, high-impact applications, particularly in the biomedical sciences.« less

  7. A solvent replenishment solution for managing evaporation of biochemical reactions in air-matrix digital microfluidics devices

    DOE PAGES

    Jebrail, Mais J.; Renzi, Ronald F.; Sinha, Anupama; ...

    2014-10-01

    Digital microfluidics (DMF) is a powerful technique for sample preparation and analysis for a broad range of biological and chemical applications. In many cases, it is desirable to carry out DMF on an open surface, such that the matrix surrounding the droplets is ambient air. However, the utility of the air-matrix DMF format has been severely limited by problems with droplet evaporation, especially when the droplet-based biochemical reactions require high temperatures for long periods of time. We present a simple solution for managing evaporation in air-matrix DMF: just-in-time replenishment of the reaction volume using droplets of solvent. We demonstrate thatmore » this solution enables DMF-mediated execution of several different biochemical reactions (RNA fragmentation, first-strand cDNA synthesis, and PCR) over a range of temperatures (4–95 °C) and incubation times (up to 1 h or more) without use of oil, humidifying chambers, or off-chip heating modules. Reaction volumes and temperatures were maintained roughly constant over the course of each experiment, such that the reaction kinetics and products generated by the air-matrix DMF device were comparable to those of conventional benchscale reactions. As a result, this simple yet effective solution for evaporation management is an important advance in developing air-matrix DMF for a wide variety of new, high-impact applications, particularly in the biomedical sciences.« less

  8. Identity as a 'patchwork': aspects of identity among low-income Brazilian travestis.

    PubMed

    Garcia, Marcos Roberto Vieira

    2009-08-01

    This paper is based on findings from a qualitative study that took place within the context of a four-year healthcare programme directed towards low-income travestis in the central area of Sao Paulo, Brazil. Throughout the study the formation of social identity among travestis was investigated through a focus on four axes: gender, body, work and violence. This paper subjects the identity of the travestis to a critical analysis and proposes a view of their sense of self as a 'patchwork' assembled through the assimilation of various fragments of identity common in Brazilian society. The primary identities assimilated by the travestis under study were, in the area of femininity, the submissive woman, the puta ['whore'] and the super-seductive woman and, in the area of masculinity, the viado ['queer'], the malandro ['rascal'] and the bandido ['bandit']. The resulting travesti identity exhibited not only gender ambiguity, but also contradictions among the feminine identities described, as well as among the masculine ones.

  9. Broken identity: the impact of the Holocaust on identity in Romanian and Polish Jews.

    PubMed

    Prot, Katarzyna

    2008-01-01

    The paper is based on interviews conducted with Holocaust survivors in Poland (30 interviews) and Romania (55 interviews). It describes how the Holocaust affected survivor identity. Two aspects of identity are analyzed the sense of personal identity and social identity. Each affects the other but they are largely independent and the trauma of the Holocaust impacted each of them differently. Personal identity seems to be unrelated to either the type of trauma or the survivor's social situation. There are no significant differences in that aspect between Polish and Romanian survivors. Social identity is more related to the survivors' social situation prior to and after the trauma. The sense of identity, both personal and social, is dynamic and changes over time.

  10. "They're Different from Who I Am": Making Relevant Identities in the Middle through Talk-in-Interaction

    ERIC Educational Resources Information Center

    Mossman, Tim

    2012-01-01

    This qualitative study builds on earlier research on language and identity by focusing on how Canadian Generation 1.5 university students enact their identities through talk-in-interaction. Drawing on (applied) Conversational Analysis (CA) to analyze critically the production and management of social institutions in talk-in-interaction in tandem…

  11. Perspectives of Urban Corner Store Owners and Managers on Community Health Problems and Solutions

    PubMed Central

    Young, Candace R.; Cannuscio, Carolyn C.; Karpyn, Allison; Kounaves, Sarah; Strupp, Emily; McDonough, Kevin; Shea, Judy A.

    2016-01-01

    Introduction Urban corner store interventions have been implemented to improve access to and promote purchase of healthy foods. However, the perspectives of store owners and managers, who deliver and shape these interventions in collaboration with nonprofit, government, and academic partners, have been largely overlooked. We sought to explore the views of store owners and managers on the role of their stores in the community and their beliefs about health problems and solutions in the community. Methods During 2013 and 2014, we conducted semistructured, in-depth interviews in Philadelphia, Pennsylvania, and Camden, New Jersey, with 23 corner store owners/managers who participated in the Healthy Corner Store Initiative spearheaded by The Food Trust, a nonprofit organization focused on food access in low-income communities. We oversampled high-performing store owners. Results Store owners/managers reported that their stores served multiple roles, including providing a convenient source of goods, acting as a community hub, supporting community members, working with neighborhood schools, and improving health. Owners/managers described many challenging aspects of running a small store, including obtaining high-quality produce at a good price and in small quantities. Store owners/managers believed that obesity, diabetes, high cholesterol, and poor diet are major problems in their communities. Some owners/managers engaged with customers to discuss healthy behaviors. Conclusion Our findings suggest that store owners and managers are crucial partners for healthy eating interventions. Corner store owners/managers interact with community members daily, are aware of community health issues, and are community providers of access to food. Corner store initiatives can be used to implement innovative programs to further develop the untapped potential of store owners/managers. PMID:27736054

  12. Perspectives of Urban Corner Store Owners and Managers on Community Health Problems and Solutions.

    PubMed

    Mayer, Victoria L; Young, Candace R; Cannuscio, Carolyn C; Karpyn, Allison; Kounaves, Sarah; Strupp, Emily; McDonough, Kevin; Shea, Judy A

    2016-10-13

    Urban corner store interventions have been implemented to improve access to and promote purchase of healthy foods. However, the perspectives of store owners and managers, who deliver and shape these interventions in collaboration with nonprofit, government, and academic partners, have been largely overlooked. We sought to explore the views of store owners and managers on the role of their stores in the community and their beliefs about health problems and solutions in the community. During 2013 and 2014, we conducted semistructured, in-depth interviews in Philadelphia, Pennsylvania, and Camden, New Jersey, with 23 corner store owners/managers who participated in the Healthy Corner Store Initiative spearheaded by The Food Trust, a nonprofit organization focused on food access in low-income communities. We oversampled high-performing store owners. Store owners/managers reported that their stores served multiple roles, including providing a convenient source of goods, acting as a community hub, supporting community members, working with neighborhood schools, and improving health. Owners/managers described many challenging aspects of running a small store, including obtaining high-quality produce at a good price and in small quantities. Store owners/managers believed that obesity, diabetes, high cholesterol, and poor diet are major problems in their communities. Some owners/managers engaged with customers to discuss healthy behaviors. Our findings suggest that store owners and managers are crucial partners for healthy eating interventions. Corner store owners/managers interact with community members daily, are aware of community health issues, and are community providers of access to food. Corner store initiatives can be used to implement innovative programs to further develop the untapped potential of store owners/managers.

  13. Coming to an Asexual Identity: Negotiating Identity, Negotiating Desire.

    PubMed

    Scherrer, Kristin S

    2008-10-01

    Sexuality is generally considered an important aspect of self-hood. Therefore, individuals who do not experience sexual attraction, and embrace an asexual identity are in a unique position to inform the social construction of sexuality. This study explores the experiences of asexual individuals utilizing open ended Internet survey data from 102 self-identified asexual people. In this paper I describe several distinct aspects of asexual identities: the meanings of sexual, and therefore, asexual behaviors, essentialist characterizations of asexuality, and lastly, interest in romance as a distinct dimension of sexuality. These findings have implications not only for asexual identities, but also for the connections of asexuality with other marginalized sexualities.

  14. Governing the ethical consumer: identity, choice and the primary care medical encounter.

    PubMed

    McDonald, Ruth; Mead, Nicola; Cheraghi-Sohi, Sudeh; Bower, Peter; Whalley, Diane; Roland, Martin

    2007-04-01

    Government policy promoting consumerism in healthcare can be seen as offering up certain preferred identities to which its citizens are encouraged to aspire. Whilst many commentators reject the notion that health services users should be conceived of as consumers, this paper outlines the relevance of the concept to our understanding of the ways in which individuals manage their health and service use. The paper examines the identity work undertaken by individuals in relation to decisions about healthcare preferences and assesses the extent to which this is compatible with the identities promoted in Government policy. We suggest that in circumstances where individuals feel both a sense of personal entitlement and a desire to be supportive of the needs of other members of the community, 'doing' ethical consumer can be fraught with discomfort and anxiety. These anxieties are exacerbated in a context where citizenship is increasingly being defined in terms of consumer identities, and making good (health) choices might be seen as distinguishing the civilised from the marginalised.

  15. Apotemnophilia or body integrity identity disorder: a case report review.

    PubMed

    Bou Khalil, Rami; Richa, Sami

    2012-12-01

    Apotemnophilia or body integrity identity disorder (BIID) denotes a syndrome in which a person is preoccupied with the desire to amputate a healthy limb. In this report, we review the available case reports in the literature in order to enhance psychiatrists' and physicians' comprehension of this disorder. A search for the case reports available via MEDLINE was done since the first case report published by Money et al in 1977 till May 2011, using the following terms: apotemnophilia, self-demand amputation, body integrity identity disorder, and BIID. In all, 14 case reports were found relevant to our search. The desire to amputate one's healthy limb seems to be related to a major disturbance in the person's perception of one's own identity, where limb amputation can relieve temporarily the patient's feeling of distress without necessarily and uniformly adjusting the patient's own identity misperception. More investigations are needed in this domain in order to develop noninvasive treatment strategies that approach this aspect of the patient's distress within a globalist perspective. In addition, the health professionals' awareness regarding this disorder is required to ensure professional management of patients' suffering.

  16. Teacher Educator Identity Emerging from Identity as a Person

    ERIC Educational Resources Information Center

    Murphy, M. Shaun; Pinnegar, Stefinee

    2011-01-01

    Experience is fundamental in identity development. In research, concepts and issues around identity are shaped and confronted in moments of reflection. The act of reflection requires a backward attention to engender a present understanding and create future possibilities. Kim and Greene, and Young and Erickson capture this temporal aspect of…

  17. Contorting Identities: Figuring Literacy and Identity in Adolescent Worlds

    ERIC Educational Resources Information Center

    Quinlan, A.; Curtin, A.

    2017-01-01

    This paper explores connections and disconnects between identity and literacy for a group of adolescents in a second level classroom setting. We build on Mead and Vygotsky's conceptualisations of identity formation as an intricate emergent happening constantly formed/reformed by people, in their interactions with others [Mead, G. H. 1999.…

  18. Determining the disease management process for epileptic patients: A qualitative study.

    PubMed

    Hosseini, Nazafarin; Sharif, Farkhondeh; Ahmadi, Fazlollah; Zare, Mohammad

    2016-01-01

    Epilepsy exposes patients to many physical, social, and emotional challenges. Thus, it seems to portray a complex picture and needs holistic care. Medical treatment and psychosocial part of epilepsy remain central to managing and improving the patient's qualify of life through team efforts. Some studies have shown the dimensions of self-management, but its management process of epilepsy patients, especially in Iran, is not clear. This study aimed to determine the disease management process in patients with epilepsy in Iran. This qualitative approach and grounded theory study was conducted from January 2009 to February 2012 in Isfahan city (Iran). Thirty-two participants were recruited by the goal-oriented, and snowball sample selection and theoretical sampling methods. After conducting a total of 43 in-depth interviews with the participants, the researchers reached data saturation. Data were analyzed using Strauss and Corbin method. With a focus on disease management process, researchers found three main themes and seven sub-themes as a psychosocial process (PSP). The main themes were: perception of threat to self-identity, effort to preserve self-identity, and burn out. The psychosocial aspect of the disease generated one main variable "the perception of identity loss" and one central variable "searching for self-identity." Participants attributed threat to self-identity and burn out to the way their disease was managed requiring efforts to preserve their identity. Recommendations consist of support programs and strategies to improve the public perception of epilepsy in Iran, help patients accept their condition and preserve self-identity, and most importantly, enhance medical management of epilepsy.

  19. A parent-report gender identity questionnaire for children.

    PubMed

    Johnson, Laurel L; Bradley, Susan J; Birkenfeld-Adams, Andrea S; Kuksis, Myra A Radzins; Maing, Dianne M; Mitchell, Janet N; Zucker, Kenneth J

    2004-04-01

    This paper reports on the psychometric properties of a 16-item parent-report Gender Identity Questionnaire, originally developed by P. H. Elizabeth and R. Green (1984), to aid in the assessment of children with potential problems in their gender identity development. The questionnaire, which covered aspects of the core phenomenology of gender identity disorder (GID), was completed by parents of gender-referred children (N = 325) and controls (siblings, clinic-referred, and nonreferred; N = 504), who ranged in age from 2.5-12 years (mean age, 7.6 years). Factor-analysis indicated that a one-factor solution, containing 14 of the 16 items with factor loadings > or =.30, best fit the data, accounting for 43.7% of the variance. The gender-referred children had a significantly more deviant total score than did the controls, with a large effect size of 3.70. The GIQ total score had negligible age effects, indicating that the questionnaire has utility for assessing change over time. The gender-referred children who met the complete DSM criteria for GID had a significantly more deviant total score than did the children who were subthreshold for GID, although the latter group had a mean score that was closer to the threshold cases than to the controls. With a specificity rate set at 95% for the controls, the sensitivity rate for the probands was 86.8%. It is concluded that this parent-report gender identity questionnaire has excellent psychometric properties and can serve as a useful screening device for front-line clinicians, for whom more extensive, expensive, and time-consuming assessment procedures may be precluded.

  20. Men as Victims: "Victim" Identities, Gay Identities, and Masculinities

    ERIC Educational Resources Information Center

    Dunn, Peter

    2012-01-01

    The impact and meanings of homophobic violence on gay men's identities are explored with a particular focus on their identities as men and as gay men. Homosexuality can pose a challenge to conventional masculinities, and for some gay men, being victimized on account of sexual orientation reawakens conflicts about their masculinity that they…

  1. Racial Identity Attitudes and Ego Identity Statuses in Dominican and Puerto Rican College Students

    ERIC Educational Resources Information Center

    Sanchez, Delida

    2013-01-01

    This study explored the relation between racial identity attitudes and ego identity statuses in 94 Dominican and Puerto Rican Latino college students in an urban public college setting. Simultaneous regression analyses were conducted to test the relation between racial identity attitudes and ego identity statuses, and findings indicated that…

  2. Bridging Identities

    ERIC Educational Resources Information Center

    Deaux, Kay; Burke, Peter

    2010-01-01

    Sociology and psychology are no strangers in the theoretical world of self and identity. Early works by William James (1890), a psychologist, and George Herbert Mead (1934), a sociologist, are often taken as a starting point by investigators in both fields. In more recent years, with the development of a number of identity theories in both fields,…

  3. Components of Sexual Identity

    ERIC Educational Resources Information Center

    Shively, Michael G.; DeCecco, John P.

    1977-01-01

    This paper examines the four components of sexual identity: biological sex, gender identity, social sex-role, and sexual orientation. Theories about the development of each component and how they combine and conflict to form the individual's sexual identity are discussed. (Author)

  4. Unmasking identity dissonance: exploring medical students' professional identity formation through mask making.

    PubMed

    Joseph, Kimera; Bader, Karlen; Wilson, Sara; Walker, Melissa; Stephens, Mark; Varpio, Lara

    2017-04-01

    Professional identity formation is an on-going, integrative process underlying trainees' experiences of medical education. Since each medical student's professional identity formation process is an individual, internal, and often times emotionally charged unconscious experience, it can be difficult for educators to understand each student's unique experience. We investigate if mask making can provide learners and educators the opportunity to explore medical students' professional identity formation experiences. In 2014 and 2015, 30 third year medical students created masks, with a brief accompanying written narrative, to creatively express their medical education experiences. Using a paradigmatic case selection approach, four masks were analyzed using techniques from visual rhetoric and the Listening Guide. The research team clearly detected identity dissonance in each case. Each case provided insights into the unique personal experiences of the dissonance process for each trainee at a particular point in their medical school training. We propose that mask making accompanied by a brief narrative reflection can help educators identify students experiencing identity dissonance, and explore each student's unique experience of that dissonance. The process of making these artistic expressions may also provide a form of intervention that can enable educators to help students navigate professional identity formation and identity dissonance experiences.

  5. Dealing with resistance in temporary agency nurses. The role of fear in identity-building processes.

    PubMed

    Cicellin, Mariavittoria; Pezzillo Iacono, Mario; Berni, Alessia; Esposito, Vincenza

    2015-01-01

    The purpose of this paper is to interpret employees' resistance using the perspective of a Foucaultian/post-structuralist approach in critical management studies. The authors examine the relationship between management of diversity, based on employment contract, emotional construction of identity and processes of resistance. The authors explore the ways in which temporary agency nurses understand and experience their contract, respond to tensions regarding temporary employment, develop collective emotions and show processes of resistance. The study adopted an interpretive and qualitative approach. The authors analysed empirical material collected in the Haematology Department of a hospital in Naples, Italy, to illustrate actual experiences in the workplace. Fear turns out to be the discursive resource through which resistance is actually exerted. Through emotions, temporary nurses build a community of coping and enhance their collective identity. They use fear to develop solidarity and to mobilize collective resistance in the workplace. Although no traditional resistance behaviours are reported, they aim to undermine the reputation of top managers and challenge and re-write the prevailing discourses of the organization. The paper contributes to the critical literature because the authors analysed a relationship that is rarely theoretically and empirically examined in literature, that between employment contract, collective identity-building dynamics and processes of resistance. We showed that the creation of a community of coping enabled minorities to voice their distance from and opposition to management.

  6. Korean Adoptee Identity: Adoptive and Ethnic Identity Profiles of Adopted Korean Americans

    ERIC Educational Resources Information Center

    Beaupre, Adam J.; Reichwald, Reed; Zhou, Xiang; Raleigh, Elizabeth; Lee, Richard M.

    2015-01-01

    Adopted Korean adolescents face the task of grappling with their identity as Koreans and coming to terms with their adoptive status. In order to explore these dual identities, the authors conducted a person-centered study of the identity profiles of 189 adopted Korean American adolescents. Using cluster analytic procedures, the study examined…

  7. Inter-layer synchronization in non-identical multi-layer networks

    NASA Astrophysics Data System (ADS)

    Leyva, I.; Sevilla-Escoboza, R.; Sendiña-Nadal, I.; Gutiérrez, R.; Buldú, J. M.; Boccaletti, S.

    2017-04-01

    Inter-layer synchronization is a dynamical process occurring in multi-layer networks composed of identical nodes. This process emerges when all layers are synchronized, while nodes in each layer do not necessarily evolve in unison. So far, the study of such inter-layer synchronization has been restricted to the case in which all layers have an identical connectivity structure. When layers are not identical, the inter-layer synchronous state is no longer a stable solution of the system. Nevertheless, when layers differ in just a few links, an approximate treatment is still feasible, and allows one to gather information on whether and how the system may wander around an inter-layer synchronous configuration. We report the details of an approximate analytical treatment for a two-layer multiplex, which results in the introduction of an extra inertial term accounting for structural differences. Numerical validation of the predictions highlights the usefulness of our approach, especially for small or moderate topological differences in the intra-layer coupling. Moreover, we identify a non-trivial relationship connecting the betweenness centrality of the missing links and the intra-layer coupling strength. Finally, by the use of multiplexed layers of electronic circuits, we study the inter-layer synchronization as a function of the removed links.

  8. A hierarchical scheduling and management solution for dynamic reconfiguration in FPGA-based embedded systems

    NASA Astrophysics Data System (ADS)

    Cervero, T.; Gómez, A.; López, S.; Sarmiento, R.; Dondo, J.; Rincón, F.; López, J. C.

    2013-05-01

    One of the limiting factors that have prevented a widely dissemination of the reconfigurable technology is the absence of an appropriate model for certain target applications capable of offering a reliable control. Moreover, the lack of flexible and easy-to-use scheduling and management systems are also relevant drawbacks to be considered. Under static scenarios, it is relatively easy to schedule and manage the reconfiguration process since all the variations corresponding to predetermined and well-known tasks. However, the difficulty increases when the adaptation needs of the overall system change semi-randomly according to the environmental fluctuations. In this context, this work proposes a change in the paradigm of dynamically reconfigurable systems, by attending to the dynamically reconfigurable control problematic as a whole, in which the scheduling and the placement issues are packed together as a hierarchical management structure, interacting together as one entity from the system point of view, but performing their tasks with certain degree of independence each other. In this sense, the top hierarchical level corresponds with a dynamic scheduler in charge of planning and adjusting all the reconfigurable modules according to the variations of the external stimulus. The lower level interacts with the physical layer of the device by means of instantiating, relocating, removing a reconfigurable module following the scheduler's instructions. In regards to how fast is the proposed solution, the total partial reconfiguration time achieved with this proposal has been measured and compared with other two approaches: 1) using traditional Xilinx's tools; 2) using an optimized version of the Xilinx's drivers. The collected numbers demonstrate that our solution reaches a gain up to 10 times faster than the other approaches.

  9. 'Everyone here wants everyone else to get better': The role of social identity in eating disorder recovery.

    PubMed

    McNamara, Niamh; Parsons, Harriet

    2016-12-01

    Retention of a positively valued illness identity contributes to poor outcomes for individuals with eating disorders (EDs). Consequently, dis-identification from the illness identity and the adoption of a recovery identity are vital for successful recovery. While social identity processes have been shown to influence ED maintenance, their role in recovery is rarely considered. This study explores how a sense of shared identity helps individuals with EDs manage their condition and promotes recovery. Transcripts from 18 online support sessions involving 75 participants were thematically analysed. Our findings suggest that the illness identity initially operates as a social identity that forms the basis for connections with similar others. For those wishing to recover, identity-based support is then perceived to be more effective than that found outside the group. Online interactions also facilitate construction of a new shared recovery identity which promotes a shift from the illness identity as a primary source of definition and endorses group norms of illness disclosure and treatment engagement. While in the clinical literature, ED identity is seen as problematic and interventions are targeted at challenging an individual's self-concept, we suggest that interventions could instead harness identity resources to support a transition to a recovery identity. © 2016 The British Psychological Society.

  10. Wetlands as large-scale nature-based solutions: status and future challenges for research and management

    NASA Astrophysics Data System (ADS)

    Thorslund, Josefin; Jarsjö, Jerker; Destouni, Georgia

    2017-04-01

    Wetlands are often considered as nature-based solutions that can provide a multitude of services of great social, economic and environmental value to humankind. The services may include recreation, greenhouse gas sequestration, contaminant retention, coastal protection, groundwater level and soil moisture regulation, flood regulation and biodiversity support. Changes in land-use, water use and climate can all impact wetland functions and occur at scales extending well beyond the local scale of an individual wetland. However, in practical applications, management decisions usually regard and focus on individual wetland sites and local conditions. To understand the potential usefulness and services of wetlands as larger-scale nature-based solutions, e.g. for mitigating negative impacts from large-scale change pressures, one needs to understand the combined function multiple wetlands at the relevant large scales. We here systematically investigate if and to what extent research so far has addressed the large-scale dynamics of landscape systems with multiple wetlands, which are likely to be relevant for understanding impacts of regional to global change. Our investigation regards key changes and impacts of relevance for nature-based solutions, such as large-scale nutrient and pollution retention, flow regulation and coastal protection. Although such large-scale knowledge is still limited, evidence suggests that the aggregated functions and effects of multiple wetlands in the landscape can differ considerably from those observed at individual wetlands. Such scale differences may have important implications for wetland function-effect predictability and management under large-scale change pressures and impacts, such as those of climate change.

  11. Teachers' Interpersonal Role Identity

    ERIC Educational Resources Information Center

    van der Want, Anna C.; den Brok, Perry; Beijaard, Douwe; Brekelmans, Mieke; Claessens, Luce C. A.; Pennings, Helena J. M.

    2015-01-01

    This article investigates the link between teachers' appraisal of specific interpersonal situations in classrooms and their more general interpersonal identity standard, which together form their interpersonal role identity. Using semi-structured and video-stimulated interviews, data on teachers' appraisals and interpersonal identity standards…

  12. On generalized Melvin solution for the Lie algebra E_6

    NASA Astrophysics Data System (ADS)

    Bolokhov, S. V.; Ivashchuk, V. D.

    2017-10-01

    A multidimensional generalization of Melvin's solution for an arbitrary simple Lie algebra G is considered. The gravitational model in D dimensions, D ≥ 4, contains n 2-forms and l ≥ n scalar fields, where n is the rank of G. The solution is governed by a set of n functions H_s(z) obeying n ordinary differential equations with certain boundary conditions imposed. It was conjectured earlier that these functions should be polynomials (the so-called fluxbrane polynomials). The polynomials H_s(z), s = 1,\\ldots ,6, for the Lie algebra E_6 are obtained and a corresponding solution for l = n = 6 is presented. The polynomials depend upon integration constants Q_s, s = 1,\\ldots ,6. They obey symmetry and duality identities. The latter ones are used in deriving asymptotic relations for solutions at large distances. The power-law asymptotic relations for E_6-polynomials at large z are governed by the integer-valued matrix ν = A^{-1} (I + P), where A^{-1} is the inverse Cartan matrix, I is the identity matrix and P is a permutation matrix, corresponding to a generator of the Z_2-group of symmetry of the Dynkin diagram. The 2-form fluxes Φ ^s, s = 1,\\ldots ,6, are calculated.

  13. Identity-driven differences in stakeholder concerns about hunting wolves.

    PubMed

    Lute, Michelle L; Bump, Adam; Gore, Meredith L

    2014-01-01

    Whereas past wolf management in the United States was restricted to recovery, managers must now contend with publicly contentious post-recovery issues including regulated hunting seasons. Understanding stakeholder concerns associated with hunting can inform stakeholder engagement, communication, and policy development and evaluation. Social identity theory (SIT) has been used to understand how groups interact, why they conflict, and how collaboration may be achieved. Applying SIT to stakeholder conflicts about wolf hunting may help delineate groups according to their concern about, support for or opposition to the policy choice of hunting wolves. Our objective was to assess concerns about hunting as a tool to resolve conflict in Michigan, using SIT as a framework. We used a mixed-modal sampling approach (e.g., paper, Internet) with wolf hunting-related public meeting participants in March 2013. Survey questions focused on 12 concerns previously identified as associated with hunting as a management tool to resolve conflict. Respondents (n  =  666) cared greatly about wolves but were divided over hunting wolves. Wolf conflicts, use of science in policy decisions, and maintaining a wolf population were the highest ranked concerns. Principle components analysis reduced concerns into three factors that explained 50.7% of total variance; concerns crystallized over justifications for hunting. General linear models revealed a lack of geographic influence on care, fear and support for hunting related to wolves. These findings challenge assumptions about regional differences and suggest a strong role for social identity in driving dichotomized public perceptions in wildlife management.

  14. Critical look at physics identity: An operationalized framework for examining race and physics identity

    NASA Astrophysics Data System (ADS)

    Hyater-Adams, Simone; Fracchiolla, Claudia; Finkelstein, Noah; Hinko, Kathleen

    2018-06-01

    Studies on physics identity are appearing more frequently and often responding to increased awareness of the underrepresentation of students of color in physics. In our broader research, we focus our efforts on understanding how racial identity and physics identity are negotiated throughout the experiences of Black physicists. In this paper, we present a Critical Physics Identity framework that can be used to examine racialized physics identity and demonstrate the utility of this framework by analyzing interviews with four physicists. Our framework draws from prior constructs of physics identity and racialized identity and provides operational definitions of six interacting dimensions. In this paper, we present the operationalized constructs, demonstrate how we use these constructs to code narrative data, as well as outline three methods of analysis that may be applied to study systems and structures and their influences on the experiences of Black students.

  15. Social Identity Change: Shifts in Social Identity during Adolescence

    ERIC Educational Resources Information Center

    Tanti, Chris; Stukas, Arthur A.; Halloran, Michael J.; Foddy, Margaret

    2011-01-01

    This study investigated the proposition that adolescence involves significant shifts in social identity as a function of changes in social context and cognitive style. Using an experimental design, we primed either peer or gender identity with a sample of 380 early- (12-13 years), mid- (15-16 years), and late-adolescents (18-20 years) and then…

  16. Establishing Remote Student Identity: Results of an AACRAO/InCommon Federation Survey

    ERIC Educational Resources Information Center

    McConahay, Mark; West, Ann

    2012-01-01

    Successful administration of remote programs and services requires that information technology (IT) professionals and university administrators address two critical identity management factors: (1) linking the institutional electronic record representing an individual with the "real" person; and (2) establishing a mechanism/protocol…

  17. RESTORATION PLUS: A COLLABORATIVE RESEARCH PROGRAM TO DEVELOP AND EVALUATE ECOSYSTEM RESTORATION AND MANAGEMENT OPTIONS TO ACHIEVE ECOLOGICALLY AND ECONOMICALLY SUSTAINABLE SOLUTIONS

    EPA Science Inventory

    EPA is evaluating ecosystem restoration and management techniques to ensure they create sustainable solutions for degraded watersheds. ORD NRMRL initiated the Restoration Plus (RePlus) program in 2002 to a) evaluate ecosystem restoration and management options, b) assess the non-...

  18. Inter-identity autobiographical amnesia in patients with dissociative identity disorder.

    PubMed

    Huntjens, Rafaële J C; Verschuere, Bruno; McNally, Richard J

    2012-01-01

    A major symptom of Dissociative Identity Disorder (DID; formerly Multiple Personality Disorder) is dissociative amnesia, the inability to recall important personal information. Only two case studies have directly addressed autobiographical memory in DID. Both provided evidence suggestive of dissociative amnesia. The aim of the current study was to objectively assess transfer of autobiographical information between identities in a larger sample of DID patients. Using a concealed information task, we assessed recognition of autobiographical details in an amnesic identity. Eleven DID patients, 27 normal controls, and 23 controls simulating DID participated. Controls and simulators were matched to patients on age, education level, and type of autobiographical memory tested. Although patients subjectively reported amnesia for the autobiographical details included in the task, the results indicated transfer of information between identities. The results call for a revision of the DID definition. The amnesia criterion should be modified to emphasize its subjective nature.

  19. A Generalization of the Doubling Construction for Sums of Squares Identities

    NASA Astrophysics Data System (ADS)

    Zhang, Chi; Huang, Hua-Lin

    2017-08-01

    The doubling construction is a fast and important way to generate new solutions to the Hurwitz problem on sums of squares identities from any known ones. In this short note, we generalize the doubling construction and obtain from any given admissible triple [r,s,n] a series of new ones [r+ρ(2^{m-1}),2^ms,2^mn] for all positive integer m, where ρ is the Hurwitz-Radon function.

  20. Design Ideas, Reflection, and Professional Identity: How Graduate Students Explore the Idea Generation Process

    ERIC Educational Resources Information Center

    Hutchinson, Alisa; Tracey, Monica W.

    2015-01-01

    Within design thinking, designers are responsible for generating, testing, and refining design ideas as a means to refine the design problem and arrive at an effective solution. Thus, understanding one's individual idea generation experiences and processes can be seen as a component of professional identity for designers, which involves the…

  1. Analytic solution to variance optimization with no short positions

    NASA Astrophysics Data System (ADS)

    Kondor, Imre; Papp, Gábor; Caccioli, Fabio

    2017-12-01

    We consider the variance portfolio optimization problem with a ban on short selling. We provide an analytical solution by means of the replica method for the case of a portfolio of independent, but not identically distributed, assets. We study the behavior of the solution as a function of the ratio r between the number N of assets and the length T of the time series of returns used to estimate risk. The no-short-selling constraint acts as an asymmetric \

  2. Factorial Invariance and Convergent Validity of the Group-Based Medical Mistrust Scale across Gender and Ethnoracial Identity.

    PubMed

    Wheldon, Christopher W; Kolar, Stephanie K; Hernandez, Natalie D; Daley, Ellen M

    2017-01-01

    The objective of this study was to assess the factorial invariance and convergent validity of the Group-Based Medical Mistrust Scale (GBMMS) across gender (male and female) and ethnoracial identity (Latino and Black). Minority students (N = 686) attending a southeastern university were surveyed in the fall of 2011. Psychometric analysis of the GBMMS was performed. A three-factor solution fit the data after the omission of two problematic items. This revised version of the GBMMS exhibited sufficient configural, metric, and scalar invariance. Convergence of the GBMMS with conceptually related measures provided further evidence of validity; however, there was variation across ethnoracial identity. The GBMMS has viable psychometric properties across gender and ethnoracial identity in Black and Latino populations.

  3. Tomboy as protective identity.

    PubMed

    Craig, Traci; Lacroix, Jessica

    2011-01-01

    The tomboy in contemporary U.S. culture is a complex identity, providing meaning to many girls and women. In this article, we argue tomboy as a gendered social identity also provides temporary "protections" to girls and women in three main ways. First, tomboy identity can excuse masculine-typed behavior in girls and women and, in doing so, protect women from presumptions about sexual reputation and sexual orientation. Second, tomboy identities can provide some protection for lesbian girls and women who prefer to not divulge their sexual orientation. And, third, tomboy identity can gain women limited privilege to spaces for which masculinity is an unspoken requirement. The temporary nature of the protections provided to tomboys undermines the ability of tomboys to truly transcend the binary gender system.

  4. Determining the disease management process for epileptic patients: A qualitative study

    PubMed Central

    Hosseini, Nazafarin; Sharif, Farkhondeh; Ahmadi, Fazlollah; Zare, Mohammad

    2016-01-01

    Background: Epilepsy exposes patients to many physical, social, and emotional challenges. Thus, it seems to portray a complex picture and needs holistic care. Medical treatment and psychosocial part of epilepsy remain central to managing and improving the patient's qualify of life through team efforts. Some studies have shown the dimensions of self-management, but its management process of epilepsy patients, especially in Iran, is not clear. This study aimed to determine the disease management process in patients with epilepsy in Iran. Materials and Methods: This qualitative approach and grounded theory study was conducted from January 2009 to February 2012 in Isfahan city (Iran). Thirty-two participants were recruited by the goal-oriented, and snowball sample selection and theoretical sampling methods. After conducting a total of 43 in-depth interviews with the participants, the researchers reached data saturation. Data were analyzed using Strauss and Corbin method. Results: With a focus on disease management process, researchers found three main themes and seven sub-themes as a psychosocial process (PSP). The main themes were: perception of threat to self-identity, effort to preserve self-identity, and burn out. The psychosocial aspect of the disease generated one main variable “the perception of identity loss” and one central variable “searching for self-identity.” Conclusions: Participants attributed threat to self-identity and burn out to the way their disease was managed requiring efforts to preserve their identity. Recommendations consist of support programs and strategies to improve the public perception of epilepsy in Iran, help patients accept their condition and preserve self-identity, and most importantly, enhance medical management of epilepsy. PMID:26985223

  5. Identity Uncertainty and Commitment Making across Adolescence: Five-Year Within-Person Associations Using Daily Identity Reports

    ERIC Educational Resources Information Center

    Becht, Andrik I.; Nelemans, Stefanie A.; Branje, Susan J. T.; Vollebergh, Wilma A. M.; Koot, Hans M.; Meeus, Wim H. J.

    2017-01-01

    A central assumption of identity theory is that adolescents reconsider current identity commitments and explore identity alternatives before they make new commitments in various identity domains (Erikson, 1968; Marcia, 1966). Yet, little empirical evidence is available on how commitment and exploration dynamics of identity formation affect each…

  6. Threading "Stitches" to Approach Gender Identity, Sexual Identity, and Difference

    ERIC Educational Resources Information Center

    North, Connie E.

    2010-01-01

    As LGBTQI (lesbian, gay, bisexual, transgender, queer/questioning, and intersex) issues become increasingly integrated into multicultural education discourses, we as educators need to examine the implications of our pedagogies for teaching about gender and sexual identities. This article explores my teaching of non-conforming gender identities in…

  7. Inter-Identity Autobiographical Amnesia in Patients with Dissociative Identity Disorder

    PubMed Central

    Huntjens, Rafaële J. C.; Verschuere, Bruno; McNally, Richard J.

    2012-01-01

    Background A major symptom of Dissociative Identity Disorder (DID; formerly Multiple Personality Disorder) is dissociative amnesia, the inability to recall important personal information. Only two case studies have directly addressed autobiographical memory in DID. Both provided evidence suggestive of dissociative amnesia. The aim of the current study was to objectively assess transfer of autobiographical information between identities in a larger sample of DID patients. Methods Using a concealed information task, we assessed recognition of autobiographical details in an amnesic identity. Eleven DID patients, 27 normal controls, and 23 controls simulating DID participated. Controls and simulators were matched to patients on age, education level, and type of autobiographical memory tested. Findings Although patients subjectively reported amnesia for the autobiographical details included in the task, the results indicated transfer of information between identities. Conclusion The results call for a revision of the DID definition. The amnesia criterion should be modified to emphasize its subjective nature. PMID:22815769

  8. Nature versus nurture: identical twins and bariatric surgery.

    PubMed

    Hagedorn, Judith C; Morton, John M

    2007-06-01

    Genetics and environment both play a role in weight maintenance. Twin studies may help clarify the influence of nature vs nurture in weight loss. We present the largest U.S. experience with monozygotic (MZ) twins undergoing bariatric surgery. We retrospectively reviewed the charts of four sets of MZ twins who underwent Roux-en-Y gastric bypass (RYGBP) surgery and laparoscopic adjustable gastric band (LAGB) placement at three different institutions. BMI and co-morbidities were examined pre- and postoperatively, and laboratory values were recorded. All four sets of twins are female, live together, and have similar professions. Twin cohort 1 had near identical weight loss patterns after open RYGBP surgery in 1996 (preop 146/142 kg; 2 years 82/82; and 10 years 108/107). Twin cohort 1 also both underwent cholecystectomies within the first year postoperatively. Twin cohort 2 underwent laparoscopic RYGBP surgery and also required cholecystectomies in the first postoperative year. Cohort 2 also experienced nearly identical weight loss at 1 year (36.7% vs 37.0% BMI loss). Twin cohort 3 underwent LAGB placement with two different surgeons with differing amounts of weight loss at 6 months (6.5% vs 15.7% BMI loss). Finally, twin cohort 4 underwent laparoscopic RYGBP with 2-year BMI loss of 39% vs 34%. In twin cohort 4, the twin who lost less weight lived apart from her twin and extended family, and her weight loss was less than the twin living with her family. Two sets of MZ twins had identical responses to bariatric surgery. The other two sets of identical twins had differential weight loss results, possibly due to differences in surgical approach and social support. While genetics do exert a strong influence on weight loss and maintenance, this case series demonstrates the potential effect of social support and postoperative management upon postoperative weight loss in the presence of identical genetics.

  9. Language, Power and Identity

    ERIC Educational Resources Information Center

    Wodak, Ruth

    2012-01-01

    How are identities constructed in discourse? How are national and European identities tied to language and communication? And what role does power have--power in discourse, over discourse and of discourse? This paper seeks to identify and analyse processes of identity construction within Europe and at its boundaries, particularly the diversity of…

  10. Identity: empirical contribution. Changes in the identity integration of adolescents in treatment for personality disorders.

    PubMed

    Feenstra, Dine J; Hutsebaut, Joost; Verheul, Roel; van Limbeek, Jacques

    2014-02-01

    A renewed interest in identity as one of the core markers of personality disorders has been introduced by the DSM-5 Level of Personality Functioning Scale. However, little is known about the utility of the construct of identity in children and adolescents. This study aimed to broaden the knowledge of identity integration as a core component of personality functioning in adolescents. The authors investigated levels of identity integration, as measured by the Severity Indices of Personality Problems (SIPP-118; Verheul et al., 2008), in adolescents in both normal (n = 406) and clinical populations (n = 285). Furthermore, changes in levels of identity integration during treatment were investigated in a clinical subsample (n = 76). Levels of identity integration were not associated with age. They were, however, associated with the absence or presence of personality pathology. Most adolescents receiving inpatient psychotherapy gradually changed toward more healthy levels of identity integration; a significant number, however, remained at maladaptive levels of identity functioning after intensive psychotherapy.

  11. Assessment of identity during adolescence using daily diary methods: Measurement invariance across time and sex.

    PubMed

    Becht, Andrik I; Branje, Susan J T; Vollebergh, Wilma A M; Maciejewski, Dominique F; van Lier, Pol A C; Koot, Hans M; Denissen, Jaap J A; Meeus, Wim H J

    2016-06-01

    The aim of this study was to assess measurement invariance of adolescents' daily reports on identity across time and sex. Adolescents (N = 497; mean age = 13.32 years at Time 1, 56.7% boys) from the general population reported on their identity commitments, exploration in depth and reconsideration on a daily basis for 3 weeks within 1 year across 5 years. We used the single-item version of the Utrecht Management of Identity Commitments Scale (UMICS; Klimstra et al., 2010), a broad measure of identity-formation processes covering both interpersonal and educational identity domains. This study tested configural, metric, scalar, and strict measurement invariance across days within weeks, across sex, across weeks within years, and across years. Results indicated that daily diary reports show strict measurement invariance across days, across weeks within years, across years, and across boys and girls. These results support the use of daily diary methods to assess identity at various time intervals ranging from days to years and across sex. Results are discussed with regard to future implications to study identity processes, both on smaller and larger time intervals. (PsycINFO Database Record (c) 2016 APA, all rights reserved).

  12. Patient empowerment by the means of citizen-managed Electronic Health Records: web 2.0 health digital identity scenarios.

    PubMed

    Falcão-Reis, Filipa; Correia, Manuel E

    2010-01-01

    With the advent of more sophisticated and comprehensive healthcare information systems, system builders are becoming more interested in patient interaction and what he can do to help to improve his own health care. Information systems play nowadays a crucial and fundamental role in hospital work-flows, thus providing great opportunities to introduce and improve upon "patient empowerment" processes for the personalization and management of Electronic Health Records (EHRs). In this paper, we present a patient's privacy generic control mechanisms scenarios based on the Extended OpenID (eOID), a user centric digital identity provider previously developed by our group, which leverages a secured OpenID 2.0 infrastructure with the recently released Portuguese Citizen Card (CC) for secure authentication in a distributed health information environment. eOID also takes advantage of Oauth assertion based mechanisms to implement patient controlled secure qualified role based access to his EHR, by third parties.

  13. 7 CFR 52.771 - Identity.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 7 Agriculture 2 2012-01-01 2012-01-01 false Identity. 52.771 Section 52.771 Agriculture... United States Standards for Grades of Canned Red Tart Pitted Cherries 1 Identity and Grades § 52.771 Identity. Canned red tart pitted cherries is the product represented as defined in the standard of identity...

  14. 7 CFR 52.771 - Identity.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 7 Agriculture 2 2014-01-01 2014-01-01 false Identity. 52.771 Section 52.771 Agriculture... Cherries 1 Identity and Grades § 52.771 Identity. Canned red tart pitted cherries is the product represented as defined in the standard of identity for canned cherries (21 CFR 145.125(a)), issued pursuant to...

  15. 7 CFR 52.771 - Identity.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 7 Agriculture 2 2013-01-01 2013-01-01 false Identity. 52.771 Section 52.771 Agriculture... Cherries 1 Identity and Grades § 52.771 Identity. Canned red tart pitted cherries is the product represented as defined in the standard of identity for canned cherries (21 CFR 145.125(a)), issued pursuant to...

  16. Identity Agents: Parents as Active and Reflective Participants in their Children's Identity Formation

    ERIC Educational Resources Information Center

    Schachter, Elli P.; Ventura, Jonathan J.

    2008-01-01

    The paper introduces the concept of identity agents. This concept refers to those individuals who actively interact with children and youth with the intention of participating in their identity formation, and who reflectively mediate larger social influences on identity formation. This contrasts with the focus of mainstream research in the…

  17. Tools for Understanding Identity

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Creese, Sadie; Gibson-Robinson, Thomas; Goldsmith, Michael

    Identity attribution and enrichment is critical to many aspects of law-enforcement and intelligence gathering; this identity typically spans a number of domains in the natural-world such as biographic information (factual information – e.g. names, addresses), biometric information (e.g. fingerprints) and psychological information. In addition to these natural-world projections of identity, identity elements are projected in the cyber-world. Conversely, undesirable elements may use similar techniques to target individuals for spear-phishing attacks (or worse), and potential targets or their organizations may want to determine how to minimize the attack surface exposed. Our research has been exploring the construction of a mathematical modelmore » for identity that supports such holistic identities. The model captures the ways in which an identity is constructed through a combination of data elements (e.g. a username on a forum, an address, a telephone number). Some of these elements may allow new characteristics to be inferred, hence enriching the holistic view of the identity. An example use-case would be the inference of real names from usernames, the ‘path’ created by inferring new elements of identity is highlighted in the ‘critical information’ panel. Individual attribution exercises can be understood as paths through a number of elements. Intuitively the entire realizable ‘capability’ can be modeled as a directed graph, where the elements are nodes and the inferences are represented by links connecting one or more antecedents with a conclusion. The model can be operationalized with two levels of tool support described in this paper, the first is a working prototype, the second is expected to reach prototype by July 2013: Understanding the Model The tool allows a user to easily determine, given a particular set of inferences and attributes, which elements or inferences are of most value to an investigator (or an attacker). The tool is also able

  18. Revocable identity-based proxy re-signature against signing key exposure.

    PubMed

    Yang, Xiaodong; Chen, Chunlin; Ma, Tingchun; Wang, Jinli; Wang, Caifen

    2018-01-01

    Identity-based proxy re-signature (IDPRS) is a novel cryptographic primitive that allows a semi-trusted proxy to convert a signature under one identity into another signature under another identity on the same message by using a re-signature key. Due to this transformation function, IDPRS is very useful in constructing privacy-preserving schemes for various information systems. Key revocation functionality is important in practical IDPRS for managing users dynamically; however, the existing IDPRS schemes do not provide revocation mechanisms that allow the removal of misbehaving or compromised users from the system. In this paper, we first introduce a notion called revocable identity-based proxy re-signature (RIDPRS) to achieve the revocation functionality. We provide a formal definition of RIDPRS as well as its security model. Then, we present a concrete RIDPRS scheme that can resist signing key exposure and prove that the proposed scheme is existentially unforgeable against adaptive chosen identity and message attacks in the standard model. To further improve the performance of signature verification in RIDPRS, we introduce a notion called server-aided revocable identity-based proxy re-signature (SA-RIDPRS). Moreover, we extend the proposed RIDPRS scheme to the SA-RIDPRS scheme and prove that this extended scheme is secure against adaptive chosen message and collusion attacks. The analysis results show that our two schemes remain efficient in terms of computational complexity when implementing user revocation procedures. In particular, in the SA-RIDPRS scheme, the verifier needs to perform only a bilinear pairing and four exponentiation operations to verify the validity of the signature. Compared with other IDPRS schemes in the standard model, our SA-RIDPRS scheme greatly reduces the computation overhead of verification.

  19. Perceived consequences of hypothetical identity-inconsistent sexual experiences: effects of perceiver's sex and sexual identity.

    PubMed

    Preciado, Mariana A; Johnson, Kerri L

    2014-04-01

    Most people organize their sexual orientation under a single sexual identity label. However, people may have sexual experiences that are inconsistent with their categorical sexual identity label. A man might identify as heterosexual but still experience some attraction to men; a woman might identify as lesbian yet enter into a romantic relationship with a man. Identity-inconsistent experiences are likely to have consequences. In the present study, we examined lay perceptions of the consequences of identity-inconsistent sexual experiences for self-perceived sexuality and for social relationships among a sexually diverse sample (N = 283). We found that the perceived consequences of identity-inconsistent experiences for self-perception, for social stigmatization, and for social relationships varied as a function of participant sex, participant sexual identity (heterosexual, gay, lesbian), and experience type (fantasy, attraction, behavior, love). We conclude that not all identity-inconsistent sexual experiences are perceived as equally consequential and that the perceived consequences of such experiences vary predictably as a function of perceiver sex and sexual identity. We discuss the role lay perceptions of the consequences of identity-inconsistent sexual experiences may play in guiding attitudes and behavior.

  20. Crossing Borders: New Teachers Co-Constructing Professional Identity in Performative Times

    ERIC Educational Resources Information Center

    Wilkins, Chris; Busher, Hugh; Kakos, Michalis; Mohamed, Carmen; Smith, Joan

    2012-01-01

    This paper draws on a range of theoretical perspectives on the construction of new teachers' professional identity. It focuses particularly on the impact of the development in many national education systems of a performative culture of the management and regulation of teachers' work. Whilst the role of interactions with professional colleagues…

  1. How the past weighs on the present: social representations of history and their role in identity politics.

    PubMed

    Liu, James H; Hilton, Denis J

    2005-12-01

    Socially shared representations of history have been important in creating, maintaining and changing a people's identity. Their management and negotiation are central to interethnic and international relations. We present a narrative framework to represent how collectively significant events become (selectively) incorporated in social representations that enable positioning of ethnic, national and supranational identities. This perspective creates diachronic (temporal) links between the functional (e.g. realistic conflict theory), social identity, and cognitive perspectives on intergroup relations. The charters embedded in these representations condition nations with similar interests to adopt different political stances in dealing with current events, and can influence the perceived stability and legitimacy of social orders. They are also instrumental in determining social identity strategies for reacting to negative social comparisons, and can influence the relationships between national and ethnic identities.

  2. Thoughts on the nature of identity: disorders of sex development and gender identity.

    PubMed

    Reiner, William G; Reiner, D Townsend

    2011-10-01

    Children with disorders of sex development have similarities to, but also marked contrasts with, children with normal anatomy but who have gender dysphoria. Understanding gender identity development in children with sex disorders will probably help us understand typical gender identity development more than in understanding gender development in children with gender identity disorder.

  3. Teacher Identity and Numeracy: Developing an Analytic Lens for Understanding Numeracy Teacher Identity

    ERIC Educational Resources Information Center

    Bennison, Anne; Goos, Merrilyn

    2013-01-01

    This paper reviews recent literature on teacher identity in order to propose an operational framework that can be used to investigate the formation and development of numeracy teacher identities. The proposed framework is based on Van Zoest and Bohl's (2005) framework for mathematics teacher identity with a focus on those characteristics thought…

  4. Between normality and deviance: the breakdown of batterers' identity following police intervention.

    PubMed

    Buchbinder, Eli; Eisikovits, Zvi

    2004-04-01

    With the transformation of intimate violence from private trouble to social problem, police intervention in domestic violence cases became more prevalent. Research has focused mainly on battered women's perception of police intervention, their evaluations, and their level of satisfaction with the intervention. However, there is little research examining the perpetrators' subjective perceptions of such interventions. The purpose of this study is to describe and analyze battering men's perceptions of police intervention. The study is based on semistructured, in-depth interviews with 20 batterers who had repeated encounters with police. Findings show a continuum of self-management, ranging from attempts to preserve a normative identity in the first encounter to struggling against criminalization in the second encounter and adopting a victim identity in the third encounter. The findings are discussed in the context of gender identity and power relations.

  5. Perceptions of parents' ethnic identities and the personal ethnic-identity and racial attitudes of biracial adults.

    PubMed

    Stepney, Cesalie T; Sanchez, Diana T; Handy, Phillip E

    2015-01-01

    The present study examined the relationship of perceived parental closeness and parental ethnic identity on personal ethnic identity and colorblindness beliefs in 275 part-White biracial Americans (M age = 23.88). Respondents completed online measures of their personal ethnic identity (minority, White, and multiracial), perceived parental ethnic identity, parental closeness, and attitudes about the state of race relations and the need for social action in the United States. Using path modeling, results show that part-White biracial individuals perceive their ethnic identity to be strongly linked to their parental racial identities, especially when they had closer parental relationships. Moreover, stronger minority identity was linked to less colorblind attitudes, and greater White identity was linked to greater colorblind attitudes suggesting that patterns of identity may influence how biracial individuals view race-relations and the need for social action. Implications for biracial well-being and their understanding of prejudice and discrimination are discussed. (PsycINFO Database Record (c) 2015 APA, all rights reserved).

  6. Professional role identity in shaping community nurses' reactions to nursing policy.

    PubMed

    Elliott, Lawrie; Kennedy, Catriona; Raeside, Robert

    2015-05-01

    To establish the extent to which professional role identity shapes community nurses' reactions before the implementation of a policy that sought to introduce a generic role. Many countries seek to alter community nurse roles to address changes in population health and health workforce. We know little about the influences that might shape nurses' reaction to these policies before their implementation and our theoretical understanding is poorly developed at this point in the policy-making cycle. Self completed cross-sectional survey of 703 community nurses before the introduction of a generic Community Health Nurse role in Scotland. The minority (33%) supported the new role. The professional role identity of those who were supportive differed significantly from those who did not support the policy or were uncertain of it. It is possible that the new policy acted to increase the value of the professional role identity of those who were supportive and conversely devalued the professional role identity of those who were unsupportive or uncertain of it. Professional role identity should be considered by policy makers in any country seeking to introduce policies that aim to radically change the role of community nurses and that this is acknowledged at an early stage in the policy-making cycle. © 2013 The Authors. Journal of Nursing Management published by John Wiley & Sons Ltd.

  7. Key exchange using biometric identity based encryption for sharing encrypted data in cloud environment

    NASA Astrophysics Data System (ADS)

    Hassan, Waleed K.; Al-Assam, Hisham

    2017-05-01

    The main problem associated with using symmetric/ asymmetric keys is how to securely store and exchange the keys between the parties over open networks particularly in the open environment such as cloud computing. Public Key Infrastructure (PKI) have been providing a practical solution for session key exchange for loads of web services. The key limitation of PKI solution is not only the need for a trusted third partly (e.g. certificate authority) but also the absent link between data owner and the encryption keys. The latter is arguably more important where accessing data needs to be linked with identify of the owner. Currently available key exchange protocols depend on using trusted couriers or secure channels, which can be subject to man-in-the-middle attack and various other attacks. This paper proposes a new protocol for Key Exchange using Biometric Identity Based Encryption (KE-BIBE) that enables parties to securely exchange cryptographic keys even an adversary is monitoring the communication channel between the parties. The proposed protocol combines biometrics with IBE in order to provide a secure way to access symmetric keys based on the identity of the users in unsecure environment. In the KE-BIOBE protocol, the message is first encrypted by the data owner using a traditional symmetric key before migrating it to a cloud storage. The symmetric key is then encrypted using public biometrics of the users selected by data owner to decrypt the message based on Fuzzy Identity-Based Encryption. Only the selected users will be able to decrypt the message by providing a fresh sample of their biometric data. The paper argues that the proposed solution eliminates the needs for a key distribution centre in traditional cryptography. It will also give data owner the power of finegrained sharing of encrypted data by control who can access their data.

  8. Predictive validity of the Macleod Clark Professional Identity Scale for undergraduate nursing students.

    PubMed

    Worthington, Melissa; Salamonson, Yenna; Weaver, Roslyn; Cleary, Michelle

    2013-03-01

    The self-identification of nursing students with the profession has been linked with a successful transition, from being a student to being a professional nurse. Although there is no empirical evidence, there are suggestions that students with high professional identity are more likely to persist and complete their studies in their chosen profession. The purpose of this study was to evaluate the psychometric properties of a professional identity scale and to determine the relationship between professional identity and student retention in a large group of first year nursing students. A survey design was used to examine the professional identity of first year nursing students, as measured by the Macleod Clark Professional Identity Scale (MCPIS-9). Baseline data obtained from the initial surveys were then compared with student drop-out rates 12 months later. Exploratory factor analysis of the MCPIS-9 yielded a one-component solution, accounting for 43.3% of the variance. All 9 items loaded highly on one component, ranging from 0.50 to 0.79. Cronbach's alpha coefficient of the MCPIS-9 was 0.83 and corrected item-total correlation values all scored well above the 0.3 cut-off. Students who: were females, had previous nursing-related vocational training, reported nursing as their first choice, or engaged in nursing-related paid work, had statistically significant higher professional identity scores. Using logistic regression analysis, students with high professional identity scores at baseline were more likely to be still enrolled in the nursing program at 12 months, controlling for gender, language spoken at home and engagement in nursing-related employment. These results support the psychometric properties of the MCPIS-9. Professional identity has a direct relationship with student retention in the nursing program. It is important to adequately measure professional identity in nursing students for the purpose of monitoring and identifying students who are at risk of

  9. Similarly Torn, Differentially Shorn? The Experience and Management of Conflict between Multiple Roles, Relationships, and Social Categories

    PubMed Central

    Jones, Janelle M.; Hynie, Michaela

    2017-01-01

    In three studies we examined the experience and management of conflict between different types of multiple identities. Participants described a conflict between pairs of role, relational, or social identities before rating the experience (i.e., magnitude, stress, and growth) and management of conflict on a newly developed scale assessing four strategies: reconciliation, where identities are integrated, realignment, where one identity is chosen over another, retreat, where both identities are avoided, and reflection, where fit (with others, situation) determines identity selection. In general, the types of identities mattered for conflict management but not its experience: Magnitude and growth did not differ, however, stress was greater for role identity conflicts (Study 3 only) and participants endorsed the use of more realignment for role conflicts (Study 2) and more retreat for relational conflicts (Study 3) relative to other types of identity conflicts. Furthermore, findings suggested that the perceived flexibility of identities, not their importance or valence, were associated with realignment and retreat for roles and with retreat for relationships. Experiencing conflicts between multiple identities leaves people similarly torn, but multiple roles and relationships may be differentially shorn to manage conflict. PMID:29051744

  10. Similarly Torn, Differentially Shorn? The Experience and Management of Conflict between Multiple Roles, Relationships, and Social Categories.

    PubMed

    Jones, Janelle M; Hynie, Michaela

    2017-01-01

    In three studies we examined the experience and management of conflict between different types of multiple identities. Participants described a conflict between pairs of role, relational, or social identities before rating the experience (i.e., magnitude, stress, and growth) and management of conflict on a newly developed scale assessing four strategies: reconciliation , where identities are integrated, realignment , where one identity is chosen over another, retreat , where both identities are avoided, and reflection , where fit (with others, situation) determines identity selection. In general, the types of identities mattered for conflict management but not its experience: Magnitude and growth did not differ, however, stress was greater for role identity conflicts ( Study 3 only ) and participants endorsed the use of more realignment for role conflicts ( Study 2 ) and more retreat for relational conflicts ( Study 3 ) relative to other types of identity conflicts. Furthermore, findings suggested that the perceived flexibility of identities, not their importance or valence, were associated with realignment and retreat for roles and with retreat for relationships. Experiencing conflicts between multiple identities leaves people similarly torn, but multiple roles and relationships may be differentially shorn to manage conflict.

  11. Dissociative Identity Disorder

    PubMed Central

    2009-01-01

    A brief description of the controversies surrounding the diagnosis of dissociative identity disorder is presented, followed by a discussion of the proposed similarities and differences between dissociative identity disorder and borderline personality disorder. The phenomenon of autohypnosis in the context of early childhood sexual trauma and disordered attachment is discussed, as is the meaning of alters or alternate personalities. The author describes recent neurosciences research that may relate the symptoms of dissociative identity disorder to demonstrable disordered attention and memory processes. A clinical description of a typical patient presentation is included, plus some recommendations for approaches to treatment. PMID:19724751

  12. [Diagnosing gender identity].

    PubMed

    Kaltiala-Heino, Riittakerttu; Mattila, Aino; Kärnä, Teemu; Joutsenneimi, Kaisla

    2015-01-01

    Transsexualism and other variations of gender identity are based on a stable sense of identity. The aetiology of this phenomenon is not fully known. Suffering caused by gender dysphoria is alleviated with sex reassignment. The psychiatric assessment of both adolescents and adults has been centralized in Finland to two university hospitals, the Helsinki University Hospital and Tampere University Hospital. In both hospitals, multidisciplinary teams aim at differential diagnosis by using well-known psychiatric and psychological instruments. Wishes for sex reassignment that are caused by a mental health disorder are excluded. Assessment in adolescence is challenging because the identity in youth is still forming.

  13. Structural characterization of metal complexes in aqueous solutions: a XAS study of stannous fluoride

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Alsina, Marco A.; Gaillard, Jean-François

    The identity and structure of tin(ii)-fluoride complexes formed in aqueous solutions are determined by combining X-ray absorption spectroscopy, thermodynamic modeling and quantum mechanical calculations.

  14. Silence, Words that Wound and Sexual Identity: A Conversation with Applebaum

    ERIC Educational Resources Information Center

    Jackson, Liz

    2008-01-01

    In this paper, I continue a conversation initiated by Barbara Applebaum on how to manage irreconcilable difference, harmful language or "words that wound" and various implications of power in the classroom. Referencing emerging works on the nature of speech and silence, classroom power and queer identity, I pose three questions to Applebaum in…

  15. On a New Trigonometric Identity

    ERIC Educational Resources Information Center

    Chen, Hongwei

    2002-01-01

    A new trigonometric identity derived from factorizations and partial fractions is given. This identity is used to evaluate the Poisson integral via Riemann sum and to establish some trigonometric summation identities.

  16. [Identity construction in adolescents of migrant parents. Crosswise analysis of the identity process].

    PubMed

    Bouche-Florin, Laëtitia; Skandrani, Sara Marie; Moro, Marie Rose

    2007-01-01

    Adolescence is the specific stage during which psychological changes and identity searching are at the forefront of preoccupations. The identity construction proves to be particularly complex in a transcultural context. Starting from their clinical questioning, the authors propose a literature review of the process of identity construction in a population of adolescent children of migrant parents. This theoretical reflection is based on conceptualisations of this process in intercultural psychology, transcultural psychology and in the theory of dialogical self. Putting into perspective these different approaches and their interconnections will help better understand the reality of hybrid or half-breed identity during adolescence.

  17. Characteristics of place identity as part of professional identity development among pre-service teachers

    NASA Astrophysics Data System (ADS)

    Gross, Michal; Hochberg, Nurit

    2016-12-01

    How do pre-service teachers perceive place identity, and is there a connection between their formative place identity and the development of their professional teaching identity? These questions are probed among pre-service teachers who participated in a course titled "Integrating Nature into Preschool." The design of the course was based on a multidimensional teaching model that yields a matrix of students' perceptions and the practical aspects derived from them as the students undergo a range of experiences in the course of an academic year. The profile of perceptions uses a mixed-methods analysis that presents statements attesting to four indicators of place identity: familiarity, belonging, involvement, and meaningfulness. These indicators point to a broad spectrum of perceptions arrayed on a continual time axes as well as differences in perception and its complexity. A connection between the development of place identity and that of professional teaching identity is found.

  18. Transfer Function of Multi-Stage Active Filters: A Solution Based on Pascal's Triangle and a General Expression

    ERIC Educational Resources Information Center

    Levesque, Luc

    2012-01-01

    A method is proposed to simplify analytical computations of the transfer function for electrical circuit filters, which are made from repetitive identical stages. A method based on the construction of Pascal's triangle is introduced and then a general solution from two initial conditions is provided for the repetitive identical stage. The present…

  19. "It's an Acceptable Identity": Constructing "Girl" at the Intersections of Health, Media, and Meaning-Making

    ERIC Educational Resources Information Center

    Little, J. Nicole; Hoskins, Marie L.

    2004-01-01

    This article explores the authors' critical reflections that arose while engaging in research with girls recovering from an eating disorder. The authors address issues related to media, consumerism, and identity construction. They emphasize that while there are no clear solutions to dilemmas facing girls in North American culture, researchers and…

  20. Children's Social Identities

    ERIC Educational Resources Information Center

    Bennett, Mark

    2011-01-01

    This paper provides a brief overview of recent developmental research on themes related to children's social identities. Initially, consideration is given to the capacity for social categorization, following which attention is given to children's developing conceptions of social identities, their identification with social groups, and the…

  1. A human-dimensions review of human-wildlife disturbance: A literature review of impacts, frameworks, and management solutions

    USGS Publications Warehouse

    Cline, Robert; Sexton, Natalie; Stewart, Susan C.

    2007-01-01

    The following report was prepared for the U.S. Fish and Wildlife Service National Refuge System in support of their Comprehensive Conservation Planning (CCP) efforts by the Policy Analysis and Science Assistance Branch (PASA), Fort Collins Science Center, U.S. Geological Survey. While this document provides a summary of contemporary recreation management literature and methodologies, relevant to the subject of managing wildlife disturbances on national wildlife refuges, this document should be viewed as a starting point for management administrators. This document identifies general issues relating to wildlife disturbance and visitor impacts including a description of disturbance, recreational impacts, related human dimensions applications, management frameworks, and a general summary of management solutions. The section on descriptions of wildlife disturbance and impacts draws heavily from the report entitled 'Managing the Impacts of Visitor Use on Waterbirds -- A Literature Review of Impacts and Mitigation' (DeLong, 2002; Delong and Adamcik, in press) and is referenced in the text. This document is more comprehensive in its review of wildlife response to disturbance. This document is intended to discuss the human-dimensions aspect of wildlife disturbance, summarizing human dimensions and recreation management literature as it applies to this topic.

  2. When moral identity symbolization motivates prosocial behavior: the role of recognition and moral identity internalization.

    PubMed

    Winterich, Karen Page; Aquino, Karl; Mittal, Vikas; Swartz, Richard

    2013-09-01

    This article examines the role of moral identity symbolization in motivating prosocial behaviors. We propose a 3-way interaction of moral identity symbolization, internalization, and recognition to predict prosocial behavior. When moral identity internalization is low, we hypothesize that high moral identity symbolization motivates recognized prosocial behavior due to the opportunity to present one's moral characteristics to others. In contrast, when moral identity internalization is high, prosocial behavior is motivated irrespective of the level of symbolization and recognition. Two studies provide support for this pattern examining volunteering of time. Our results provide a framework for predicting prosocial behavior by combining the 2 dimensions of moral identity with the situational factor of recognition. PsycINFO Database Record (c) 2013 APA, all rights reserved

  3. Identity Work of a Prospective Teacher: An Argumentation Perspective on Identity

    ERIC Educational Resources Information Center

    Gomez, Carlos Nicolas

    2018-01-01

    An investigation on the identity work of a prospective teacher is conducted to better understand how the participant argued for recognition of her projective mathematics teacher identity. Characteristics of the claims, evidence, and anticipatory statements used are explored. Using an argumentation framework, the participant's discourse…

  4. The moral dimension of politicized identity: Exploring identity content during the 2012 Presidential Elections in the USA.

    PubMed

    Turner-Zwinkels, Felicity M; van Zomeren, Martijn; Postmes, Tom

    2017-06-01

    It is well known that politicized identities are especially good predictors of collective action, but very little is known about what these identities are. We propose that moral identity content plays a central role in politicized identities. We examined this among (un)politicized Americans in the 2012 US Presidential Elections. In a longitudinal community sample of US citizens (N = 760), we tracked personal (i.e., unique) and politicized (i.e., party activist) identity content: before, during, and after the election. We compared identity content of individuals who self-labelled as politicized (i.e., active party promoters) or unpoliticized (i.e., passive party supporters): (1) Democrats (n = 69) longitudinally and (2) Republicans (n = 69) cross-sectionally to examine three hypotheses: Moral identity content (e.g., trustworthy) would be more prominent in politicized (vs. unpoliticized) identities (H1); moral identity content overlapping politicized and personal identities predict seeing the self as politicized (H2) and engaging in party activism (H3). Results largely supported H1 and H2, but only weakly supported H3. We conclude that politicized identities are moralized identities that have a self-evaluative, but not strongly action-motivation, function. We discuss the implications of our findings and method for politicization research. © 2016 The British Psychological Society.

  5. Capturing the multiple benefits associated with nature-based solutions: lessons from natural flood management project in the Cotswolds, UK

    NASA Astrophysics Data System (ADS)

    Short, Chrisopher; Clarke, Lucy; Uttley, Chris; Smith, Brian

    2017-04-01

    Following severe flooding in 2007, and subsequent smaller flood events, a decision was taken in 2012 to explore nature-based solutions in 250km2 river catchment in the southern Cotswolds in the UK. A major tributary within the catchment has been designated as rapid response; with a primarily limestone geology limestone and a mixture of spring and surface drained sources along a number of tributaries feeding in the river, with one main population centre where the water bodies converge. The project involves landscape and land management interventions aimed at attenuating high flows to reduce flood risk through changes in land management practices in both agriculture and forestry and slowing peak flows in surface flows through increased infiltration and attenuation areas. After three years of the project it is clear that the threshold for effectiveness requires the majority of the upstream catchment area to be implementing these measures. However, the cost effectiveness of the approach seems to be substantial compared to traditional hard-engineering approaches. The level of community involvement, including local flood forums, is high and the social, and natural, capital has been enhanced through the project. Early results suggest that there have been localized improvements in water quality and biodiversity as well as a reduction in peak flow but such changes are difficult to directly associate to the project. What is clear is the role of communities, landowners and partners to implement natural flood management on a catchment wide scale. In this sense the project has adopted a co-management or adaptive management approach which brings together the knowledges of hydrologists, ecologists, farmers, woodland owners and the local community to implement locally be-spoke solutions within a broader project framework. This paper will outline the initial findings and the governance structure that has assisted in the early success of the project within a theoretical framework of

  6. Urban gray vs. urban green vs. soil protection — Development of a systemic solution to soil sealing management on the example of Germany

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Artmann, Martina, E-mail: m.artmann@ioer.de

    Managing urban soil sealing is a difficult venture due to its spatial heterogeneity and embedding in a socio-ecological system. A systemic solution is needed to tackle its spatial, ecological and social sub-systems. This study develops a guideline for urban actors to find a systemic solution to soil sealing management based on two case studies in Germany: Munich and Leipzig. Legal-planning, informal-planning, economic-fiscal, co-operative and informational responses were evaluated by indicators to proof which strategy considers the spatial complexity of urban soil sealing (systemic spatial efficiency) and, while considering spatial complexity, to assess what the key management areas for action aremore » to reduce the ecological impacts by urban soil sealing (ecological impact efficiency) and to support an efficient implementation by urban actors (social implementation efficiency). Results suggest framing the systemic solution to soil sealing management through a cross-scale, legal-planning development strategy embedded in higher European policies. Within the socio-ecological system, the key management area for action should focus on the protection of green infrastructure being of high value for actors from the European to local scales. Further efforts are necessary to establish a systemic monitoring concept to optimize socio-ecological benefits and avoid trade-offs such as between urban infill development and urban green protection. This place-based study can be regarded as a stepping stone on how to develop systemic strategies by considering different spatial sub-targets and socio-ecological systems. - Highlights: • Urban soil sealing management is spatially complex. • The legal-planning strategy supports a systemic sealing management. • Urban green infrastructure protection should be in the management focus. • Soil protection requires policies from higher levels of government. • A systemic urban soil sealing monitoring concept is needed.« less

  7. Reciprocal Associations between Educational Identity and Vocational Identity in Adolescence: A Three-wave Longitudinal Investigation.

    PubMed

    Negru-Subtirica, Oana; Pop, Eleonora Ioana

    2018-04-01

    Education and vocation are core identity domains in adolescence. School is a normative social context in this developmental time frame and the formation of an educational identity is embedded in the goals that youth pursue in school. One of the main goals of education is to prepare young people for their future careers. Hence, educational identity should support the formation of vocational identity during adolescence. Considering the limited evidence on the longitudinal links between these two domain-specific identities, we conducted a three-wave investigation, testing the moderating role of age group, gender, and type of school. Participants (N = 1030; 59.3% female) were adolescents (M age  = 16.72 years, SD age  = 1.23, age range 14-19 years) who completed self-report measures of educational and vocational identity three times during an academic year. We underscored reciprocal associations between educational identity and vocational identity. The results indicate that strong educational commitments supported the formation of strong vocational commitments across time. Adolescents who were involved in the in-depth exploration of their educational choices also reported more vocational exploration during the school year. In turn, vocational identity processes also supported educational identity formation, especially the reconsideration of educational commitments. In terms of moderators, we underscored that vocational commitment making and vocational flexibility bolstered educational commitment only in early-to-middle adolescents. Educational in-depth exploration fostered the identification with vocational commitments only in girls. Educational reconsideration of commitment promoted vocational self-doubt only in adolescents attending work-bound high-schools. Implications for research and practice are discussed.

  8. Revocable identity-based proxy re-signature against signing key exposure

    PubMed Central

    Ma, Tingchun; Wang, Jinli; Wang, Caifen

    2018-01-01

    Identity-based proxy re-signature (IDPRS) is a novel cryptographic primitive that allows a semi-trusted proxy to convert a signature under one identity into another signature under another identity on the same message by using a re-signature key. Due to this transformation function, IDPRS is very useful in constructing privacy-preserving schemes for various information systems. Key revocation functionality is important in practical IDPRS for managing users dynamically; however, the existing IDPRS schemes do not provide revocation mechanisms that allow the removal of misbehaving or compromised users from the system. In this paper, we first introduce a notion called revocable identity-based proxy re-signature (RIDPRS) to achieve the revocation functionality. We provide a formal definition of RIDPRS as well as its security model. Then, we present a concrete RIDPRS scheme that can resist signing key exposure and prove that the proposed scheme is existentially unforgeable against adaptive chosen identity and message attacks in the standard model. To further improve the performance of signature verification in RIDPRS, we introduce a notion called server-aided revocable identity-based proxy re-signature (SA-RIDPRS). Moreover, we extend the proposed RIDPRS scheme to the SA-RIDPRS scheme and prove that this extended scheme is secure against adaptive chosen message and collusion attacks. The analysis results show that our two schemes remain efficient in terms of computational complexity when implementing user revocation procedures. In particular, in the SA-RIDPRS scheme, the verifier needs to perform only a bilinear pairing and four exponentiation operations to verify the validity of the signature. Compared with other IDPRS schemes in the standard model, our SA-RIDPRS scheme greatly reduces the computation overhead of verification. PMID:29579125

  9. Gender identity development in adolescence.

    PubMed

    Steensma, Thomas D; Kreukels, Baudewijntje P C; de Vries, Annelou L C; Cohen-Kettenis, Peggy T

    2013-07-01

    This article is part of a Special Issue "Puberty and Adolescence".This article aims to provide an outline of what is currently known on trajectories, and contributing factors to gender identity development in adolescence. We give a historical overview of the concept of gender identity, and describe general identity development in adolescence, gender identity development in the general population and in gender variant youth. Possible psychosocial (such as child and parental characteristics) and biological factors (such as the effects of prenatal exposure to gonadal hormones and the role of genetics) contributing to a gender variant identity are discussed. Studies focusing on a number of psychosocial and biological factors separately, indicate that each of these factors influence gender identity formation, but little is known about the complex interplay between the factors, nor about the way individuals themselves contribute to the process. Research into normative and gender variant identity development of adolescents is clearly lagging behind. However, studies on persons with gender dysphoria and disorders of sex development, show that the period of adolescence, with its changing social environment and the onset of physical puberty, seems to be crucial for the development of a non-normative gender identity. Copyright © 2013 Elsevier Inc. All rights reserved.

  10. Individual identity and organisational control: empowerment and modernisation in a primary care trust.

    PubMed

    McDonald, Ruth

    2004-11-01

    The notion of empowerment has been increasingly used within management discourses in recent years. Enthusiastic supporters conceive it as an acknowledgement of the individual employee as a talented, creative being, and hence a productive resource for contributing to organisational goals. Alternatively, more critical commentators have interpreted it as another means of exercising control over employees and their identities. Although various commentators have speculated on the management of identity as a means of organizational control, there is very little empirical work from which to draw conclusions. This paper, using participant observation and interview data, represents a contribution to the small body of empirical research in the area. It focuses on an initiative aimed ostensibly at 'empowering' staff in an English Primary Care Trust, which may be seen as an attempt at increasing organisational control by shaping employee identities. As such, these processes can be understood more readily in terms of ethics rather than empowerment. The term ethics is used here in a Foucauldian sense and is linked to the processes of self-definition and self-constraint by which individuals train themselves to become ethical persons. The paper suggests that the outcome of attempts to manufacture particular forms of subjectivity by such methods as 'empowerment' programmes may be very different from those intended.

  11. Piloting the European Unified Patient Identity Management (EUPID) Concept to Facilitate Secondary Use of Neuroblastoma Data from Clinical Trials and Biobanking.

    PubMed

    Ebner, Hubert; Hayn, Dieter; Falgenhauer, Markus; Nitzlnader, Michael; Schleiermacher, Gudrun; Haupt, Riccardo; Erminio, Giovanni; Defferrari, Raffaella; Mazzocco, Katia; Kohler, Jan; Tonini, Gian Paolo; Ladenstein, Ruth; Schreier, Guenter

    2016-01-01

    Data from two contexts, i.e. the European Unresectable Neuroblastoma (EUNB) clinical trial and results from comparative genomic hybridisation (CGH) analyses from corresponding tumour samples shall be provided to existing repositories for secondary use. Utilizing the European Unified Patient IDentity Management (EUPID) as developed in the course of the ENCCA project, the following processes were applied to the data: standardization (providing interoperability), pseudonymization (generating distinct but linkable pseudonyms for both contexts), and linking both data sources. The applied procedures resulted in a joined dataset that did not contain any identifiers that would allow to backtrack the records to either data sources. This provided a high degree of privacy to the involved patients as required by data protection regulations, without preventing proper analysis.

  12. Characteristics of Place Identity as Part of Professional Identity Development among Pre-Service Teachers

    ERIC Educational Resources Information Center

    Gross, Michal; Hochberg, Nurit

    2016-01-01

    How do pre-service teachers perceive place identity, and is there a connection between their formative place identity and the development of their professional teaching identity? These questions are probed among pre-service teachers who participated in a course titled "Integrating Nature into Preschool." The design of the course was…

  13. Critical Look at Physics Identity: An Operationalized Framework for Examining Race and Physics Identity

    ERIC Educational Resources Information Center

    Hyater-Adams, Simone; Fracchiolla, Claudia; Finkelstein, Noah; Hinko, Kathleen

    2018-01-01

    Studies on physics identity are appearing more frequently and often responding to increased awareness of the underrepresentation of students of color in physics. In our broader research, we focus our efforts on understanding how racial identity and physics identity are negotiated throughout the experiences of Black physicists. In this paper, we…

  14. Reproductive autonomy, the non-identity problem, and the non-person problem.

    PubMed

    DiSilvestro, Russell

    2009-01-01

    The Non-Identity Problem is the problem of explaining the apparent wrongness of a decision that does not harm people, especially since some of the people affected by the decision would not exist at all were it not for the decision. One approach to this problem, in the context of reproductive decisions, is to focus on wronging, rather than harming, one's offspring. But a Non-Person Problem emerges for any view that claims (1) that only persons can be wronged and (2) that the person-making properties allow for there to be human non-persons. Consider an individual human organism that is prevented from ever possessing the person-making properties. On person-only accounts of the victims of wronging, this organism cannot be wronged by anyone. Hence even individuals whose decisions prevent it from ever possessing the person-making properties cannot wrong it. But this is counter-intuitive. We can think of examples where a human organism is wronged by precisely those decisions that prevent it from possessing the person-making properties. The best solution to this problem, in the case where the person-making property is rational self-governance in pursuit of a meaningful life, is to adjust the concept of a person so that it refers, not merely to those with the immediate capacity for rational self-governance in pursuit of a meaningful life, but also to those with a higher-order capacity for such self-governance. Any solution to the Non-Identity Problem that focuses on wronging rather than harming should incorporate this sort of solution to the Non-Person Problem.

  15. Religiosity as identity: toward an understanding of religion from a social identity perspective.

    PubMed

    Ysseldyk, Renate; Matheson, Kimberly; Anisman, Hymie

    2010-02-01

    As a social identity anchored in a system of guiding beliefs and symbols, religion ought to serve a uniquely powerful function in shaping psychological and social processes. Religious identification offers a distinctive "sacred" worldview and "eternal" group membership, unmatched by identification with other social groups. Thus, religiosity might be explained, at least partially, by the marked cognitive and emotional value that religious group membership provides. The uniqueness of a positive social group, grounded in a belief system that offers epistemological and ontological certainty, lends religious identity a twofold advantage for the promotion of well-being. However, that uniqueness may have equally negative impacts when religious identity itself is threatened through intergroup conflict. Such consequences are illustrated by an examination of identities ranging from religious fundamentalism to atheism. Consideration of religion's dual function as a social identity and a belief system may facilitate greater understanding of the variability in its importance across individuals and groups.

  16. A System for Managing Replenishment of a Nutrient Solution Using an Electrical Conductivity Controller

    NASA Technical Reports Server (NTRS)

    Davis, D.; Dogan, N.; Aglan, H.; Mortley, D.; Loretan, P.

    1998-01-01

    Control of nutrient solution parameters is very important for the growth and development of plants grown hydroponically. Protocols involving different nutrient solution replenishment times (e.g. one-week, two-week, or two-day replenishment) provide manual periodic control of the nutrient solution's electrical conductivity (EC). Since plants take-up nutrients as they grow, manual control has a drawback in that EC is not held constant between replenishments. In an effort to correct this problem the Center for Food and Environmental Systems for Human Exploration of Space at Tuskegee University has developed a system for managing and controlling levels of EC over a plant's entire growing cycle. A prototype system is being tested on sweetpotato production using the nutrient film technique (NFT), and it is being compared to a system in which sweetpotatoes are grown using NFT with manual control. NASA has played an important role in the development of environmental control systems. They have become a forerunner in growing plants hydroponically with some control systems through the use of networked data acquisition and control using environmental growth chambers. Data acquisition systems which involve the use of real-time, calibration, set points, user panel, and graphical representation programming provide a good method of controlling nutrient solution parameters such as EC and pH [Bledsoe, 19931]. In NASA's Biomass Production Chamber (BPC) at Kennedy Space Center, control is provided by a programmable logic controller (PLC). This is an industrial controller which combines ladder computer logic which has the ability to handle various levels of electrical power. The controller controls temperature, light and other parameters that affect the plant's environment, in the BPC, the Nutrient Delivery System (NIX), a sub-system of the PLC, controls nutrient solution parameters such as EC, pH, and solution levels. When the nutrient EC measurement goes outside a preset range (120

  17. Achieving Harmony among Different Social Identities within the Self-Concept: The Consequences of Internalising a Group-Based Philosophy of Life

    PubMed Central

    Turner-Zwinkels, Felicity M.; Postmes, Tom; van Zomeren, Martijn

    2015-01-01

    It can be hard for individuals to manage multiple group identities within their self-concept (e.g., being a Christian and a woman). We examine how the inter-identity fit between potentially conflicting identities can become more harmonious through a self-defining group philosophy for life. Specifically, we test the hypothesis that holistic group identities (based in group philosophies for life that prescribe the behavior of their members in any situation, such as religion) become more strongly related to other identities in the self-concept (e.g., gender) when they are strongly self-defining (i.e., devotedly applied to daily life). In three studies we investigated the inter-identity fit between individuals’ (highly holistic) religious identity and (less holistic) gender identity. Results provided converging support for our hypothesis across diverging methods (explicit questionnaires, more implicit associations, and a novel network analysis of group traits). We discuss the importance of understanding how some (i.e., holistic and self-defining) group identities may harmonize otherwise less harmonious group identities within one’s self-concept. PMID:26618917

  18. Achieving Harmony among Different Social Identities within the Self-Concept: The Consequences of Internalising a Group-Based Philosophy of Life.

    PubMed

    Turner-Zwinkels, Felicity M; Postmes, Tom; van Zomeren, Martijn

    2015-01-01

    It can be hard for individuals to manage multiple group identities within their self-concept (e.g., being a Christian and a woman). We examine how the inter-identity fit between potentially conflicting identities can become more harmonious through a self-defining group philosophy for life. Specifically, we test the hypothesis that holistic group identities (based in group philosophies for life that prescribe the behavior of their members in any situation, such as religion) become more strongly related to other identities in the self-concept (e.g., gender) when they are strongly self-defining (i.e., devotedly applied to daily life). In three studies we investigated the inter-identity fit between individuals' (highly holistic) religious identity and (less holistic) gender identity. Results provided converging support for our hypothesis across diverging methods (explicit questionnaires, more implicit associations, and a novel network analysis of group traits). We discuss the importance of understanding how some (i.e., holistic and self-defining) group identities may harmonize otherwise less harmonious group identities within one's self-concept.

  19. Gender identity, gender assignment and reassignment in individuals with disorders of sex development: a major of dilemma.

    PubMed

    Fisher, A D; Ristori, J; Fanni, E; Castellini, G; Forti, G; Maggi, M

    2016-11-01

    Disorders of Sex Development (DSD) are a wide range of congenital conditions characterized by an incongruence of components involved in sexual differentiation, including gender psychosexual development. The management of such disorders is complex, and one of the most crucial decision is represented by gender assignment. In fact, the primary goal in DSD is to have a gender assignment consistent with the underlying gender identity in order to prevent the distress related to a forthcoming Gender Dysphoria. Historically, gender assignment was based essentially on surgical outcomes, assuming the neutrality of gender identity at birth. This policy has been challenged in the past decade refocusing on the importance of prenatal and postnatal hormonal and genetic influences on psychosexual development. (1) to update the main psychological and medical issues that surround DSD, in particular regarding gender identity and gender assignment; (2) to report specific clinical recommendations according to the different diagnosis. A systematic search of published evidence was performed using Medline (from 1972 to March 2016). Review of the relevant literature and recommendations was based on authors' expertise. A review of gender identity and assignment in DSD is provided as well as clinical recommendations for the management of individuals with DSD. Given the complexity of this management, DSD individuals and their families need to be supported by a specialized multidisciplinary team, which has been universally recognized as the best practice for intersexual conditions. In case of juvenile GD in DSD, the prescription of gonadotropin-releasing hormone analogues, following the World Professional Association for Transgender Health and the Endocrine Society guidelines, should be considered. It should always be taken into account that every DSD person is unique and has to be treated with individualized care. In this perspective, international registries are crucial to improve the

  20. John locke on personal identity.

    PubMed

    Nimbalkar, Namita

    2011-01-01

    John Locke speaks of personal identity and survival of consciousness after death. A criterion of personal identity through time is given. Such a criterion specifies, insofar as that is possible, the necessary and sufficient conditions for the survival of persons. John Locke holds that personal identity is a matter of psychological continuity. He considered personal identity (or the self) to be founded on consciousness (viz. memory), and not on the substance of either the soul or the body.

  1. When identities collide: Conflicts in allegiances among LGB people of color.

    PubMed

    Sarno, Elissa L; Mohr, Jonathan J; Jackson, Skyler D; Fassinger, Ruth E

    2015-10-01

    Little research has examined the management of multiple minority identities among lesbian, gay, and bisexual (LGB) people of color, despite a growing theoretical literature on such identity intersections. The present study focused on the intersectional construct of conflicts in allegiances (CIA), defined as perceived incompatibility between one's racial/ethnic and sexual orientation identities. CIA was investigated in relation to experiences of parental heterosexism, racism in LGB communities, outness, and racial/ethnic and sexual orientation group identity. Participants were 124 LGB people of color (main sample) and 124 LGB White people (comparison sample) who completed self-report measures of the main variables as part of a larger survey of same-sex couples. CIA was positively correlated with experiences of racism within LGB communities and perceived heterosexism in one's mother (but not one's father), and negatively correlated with outness to family (but not outness to others in one's everyday life). An interaction was found between racial/ethnic and LGB group identity with respect to behavioral engagement: CIA levels were highest among participants with high racial/ethnic behavioral engagement and low sexual orientation behavioral engagement. Results highlight the role of minority and family contexts in CIA among LGB people of color, and, more broadly, the potential value of studying intersectional variables using quantitative methods. Longitudinal and experimental studies are needed to address questions about direction of influence raised by findings. (c) 2015 APA, all rights reserved).

  2. The theory of planned behaviour: self-identity, social identity and group norms.

    PubMed

    Terry, D J; Hogg, M A; White, K M

    1999-09-01

    The aim of the present study was to examine further the role that self-identity plays in the theory of planned behaviour and, more specifically, to: (1) examine the combined effects of self-identity and social identity constructs on intention and behaviour, and (2) examine the effects of self-identity as a function of past experience of performing the behaviour. The study was concerned with the prediction of intention to engage in household recycling and reported recycling behaviour. A sample of 143 community residents participated in the study. It was prospective in design: measures of the predictors and intention were obtained at the first wave of data collection, whereas behaviour was assessed two weeks later. Self-identity significantly predicted behavioural intention, a relationship that was not dependent on the extent to which the behaviour had been performed in the past. As expected, there was also evidence that the perceived norm of a behaviourally relevant reference group was related to behavioural intention, but only for participants who identified strongly with the group, whereas the relationship between perceived behavioural control (a personal factor) and intention was strongest for low identifiers.

  3. Gender identity disorder and autism spectrum disorder in a 23-year-old female.

    PubMed

    Lemaire, Mathieu; Thomazeau, Barbara; Bonnet-Brilhault, Frédérique

    2014-02-01

    We describe the case of a 23-year-old woman with Gender Identity Disorder (GID) asking for a cross-sex hormonal treatment with sex reassignment surgery and who was recently diagnosed with Autism Spectrum Disorder (ASD). Gender identity clinics are now reporting an overrepresentation of individuals with ASD among GID patients. The prevalence of ASD is 10-fold higher among GID patients than in general population. However, few case reports or studies have explored the co-occurrence of ASD and GID. This co-occurrence is relevant for diagnostic and clinical management and also raises important theoretical issues.

  4. Spacetime-bridge solutions in vacuum gravity

    NASA Astrophysics Data System (ADS)

    Sengupta, Sandipan

    2017-11-01

    Vacuum spacetime solutions, which are representations of a bridgelike geometry, are constructed as purely geometric sources of curvature in gravity theory. These configurations satisfy the first-order equations of motion everywhere. Each of them consists of two identical sheets of asymptotically flat geometry, connected by a region of finite extension where the tetrad is noninvertible. The solutions can be classified into nonstatic and static spacetimes. The first class represents a single causal universe equipped (locally) with a timelike coordinate everywhere. The latter, on the other hand, could be interpreted as a sum of two self-contained universes which are causally disconnected. These geometries, even though they have different metrical dimensions in the regions within and away from the bridge, are regular. This is reflected through the associated gauge-covariant fields, which are continuous across the hypersurfaces connecting the invertible and noninvertible phases of the tetrad and are finite everywhere. These vacuum bridge solutions have no analogue in the Einsteinian theory of gravity.

  5. Relations of Work Identity, Family Identity, Situational Demands, and Sex with Employee Work Hours

    ERIC Educational Resources Information Center

    Greenhaus, Jeffrey H.; Peng, Ann C.; Allen, Tammy D.

    2012-01-01

    This study examined relations of multiple indicators of work identity and family identity with the number of weekly hours worked by 193 married business professionals. We found that men generally worked long hours regardless of the situational demands to work long hours and the strength of their work and family identities. Women's work hours, on…

  6. When dual identity becomes a liability: identity and political radicalism among migrants.

    PubMed

    Simon, Bernd; Reichert, Frank; Grabow, Olga

    2013-03-01

    This article examines the role of dual identity in political radicalism among migrants. Dual identity is defined as identification with both one's ethnocultural minority in-group and one's society of residence. We employed a longitudinal research design using members of the two largest migrant groups in Germany (Turkish migrants and Russian migrants) as participants. We reasoned that when dual identity is burdened with incompatibility between component identifications, it may foster controversial or even destructive forms of political mobilization, such as radicalism. Multiple regression analysis controlling for other influences confirmed the hypothesized moderated relationship between dual identification and sympathy for radical action. When accompanied by high, as opposed to low, perceived identity incompatibility, dual identification predicted increases in sympathy for radical action among both Turkish migrants and Russian migrants. The implications for public life in ethnically and culturally heterogeneous societies are discussed.

  7. Black Managers in White Corporations.

    ERIC Educational Resources Information Center

    Fernandez, John P.

    The study examines the major determinants of the career patterns of black managers in white businesses and the effects of corporations on their black managers' identities and relationships to the black community. Analyzed were occupational mobility theories; white and black managers' career patterns, goals, and related factors; company employment…

  8. Anthropology, HIV and contingent identities.

    PubMed

    Gatter, P N

    1995-12-01

    The paper explores the relationship between social identity and HIV/AIDS, with special reference to gay men in Britain. This relationship was first seen as significant since it might have a bearing on the spread of HIV in the population. Three major forms of commentary have emerged on the issue: (i) basic research into the relationship between sexual identities and behaviours; (ii) applied research on how to convert the findings from (i) into health promotional materials, and (iii) discourse from within the politically gay community on what HIV/AIDS means for gay people. These different forms of commentary arise from a diverse range of voices, within and outside academia. The paper draws comparison between different disciplinary approaches to questions of identity and HIV/AIDS, in terms of their relative strengths and weaknesses (for example, contrasting psychology with anthropology). An ethnography of a day centre for people living with HIV/AIDS is used to illustrate the need to understand identity from a processual perspective, so that both individual and collective identities are seen as emerging from specific historical circumstances and struggles. A dialogic approach to understanding identity, tied to qualitative empirical research, is suggested as necessary to understanding how different forms of identity engage with HIV/AIDS (gender, ethnicity, age, sexual orientation), and how the identities of individuals and groups are always complex, shifting mosaics.

  9. Reconceptualising "Identity Slippage": Additional Language Learning and (L2) Identity Development

    ERIC Educational Resources Information Center

    Armour, William

    2009-01-01

    This paper reconsiders the theoretical concept of "identity slippage" by considering a detailed exegesis of three model conversations taught to learners of Japanese as an additional language. To inform my analysis of these conversations and how they contribute to identity slippage, I have used the work of the systemic-functional linguist Jay Lemke…

  10. Willy Loman's Lesson: Teaching Identity Management with "Death of a Salesman" (Teaching Aid Reviews).

    ERIC Educational Resources Information Center

    Zorn, Theodore E.

    1991-01-01

    Discusses how the movie "Death of a Salesman" (a 1986 movie starring Dustin Hoffman in the role of Willy Loman) is useful for teaching communication concepts. Examines how the movie provides a rich case study for illustrating the negotiation of identities. (KEH)

  11. The importance of values in shaping how health systems governance and management can support universal health coverage.

    PubMed

    Fattore, Giovanni; Tediosi, Fabrizio

    2013-01-01

    In this article, we use cultural theory to investigate the nature of health systems governance and management, showing that it may be helpful in identifying key aspects of the debate about how to promote universal health coverage. Cultural theory argues that "how" we govern and manage health services depends on what we think about the nature of government organizations and the legitimacy of their scope of action. The values that are implied by universal health coverage underlie choices about "how" health systems are governed and their organizations are managed. We draw two main conclusions. First, the translation of principles and goals into practice requires exceptional efforts to design adequate decision-making arrangements (the essence of governance) and management practices. Management and governance, or "how" policies are decided and conducted, are not secondary to the selection of the best policy solutions (the "what"). Second, governance and management solutions are not independent of the values that they are expected to serve. Instead, they should be designed to be consonant with these values. Cultural theory suggests-and experience supports-the idea that "group identity" is favorable for shaping different forms of social life and public administrations. This approach should thus be a starting point for those who strive to obtain universal health coverage. Copyright © 2013 International Society for Pharmacoeconomics and Outcomes Research (ISPOR). Published by Elsevier Inc. All rights reserved.

  12. Intersections of Organizational Justice and Identity under the New Policy Direction: Important Understandings for Educational Leaders

    ERIC Educational Resources Information Center

    Poole, Wendy L.

    2008-01-01

    The application of market-based principles to school management and the onset of heavy-handed accountability represent a new policy direction in education. The new policy direction has led to a reconceptualization of the purpose of education, the redesign of teaching work and attempts to manage teacher identities to align them with the new…

  13. Serostatus Disclosure, Stigma Resistance, and Identity Management Among HIV-Positive Gay Men in Ireland.

    PubMed

    Murphy, Patrick J; Hevey, David; O'Dea, Siobhán; Ní Rathaille, Neans; Mulcahy, Fiona

    2016-09-01

    In this study, we examined how non-infectiousness due to antiretroviral therapy has affected HIV-positive gay men's experience of serostatus disclosure to casual sex partners. Interviews were conducted with 15 seropositive gay men living in Ireland. Using grounded theory, three constructions of non-disclosure were proposed-as self-protection, as a morally permissible act, and as a rejection of the HIV-positive identity. Each construction entailed an aspect related to the sexual exclusion of those living with HIV, and an aspect related to their social exclusion. The extent to which the lives of those interviewed were affected by stigma was starkly revealed, as was the extent to which they stigmatized others living with HIV and rejected the HIV-positive identity. The research highlights the failure to socially normalize HIV and that interventions are needed to reduce the distress associated with seropositivity. © The Author(s) 2015.

  14. Challenges and solutions in medically managed ACS in the Asia-Pacific region: expert recommendations from the Asia-Pacific ACS Medical Management Working Group.

    PubMed

    Huo, Yong; Thompson, Peter; Buddhari, Wacin; Ge, Junbo; Harding, Scott; Ramanathan, Letchuman; Reyes, Eugenio; Santoso, Anwar; Tam, Li-Wah; Vijayaraghavan, Govindan; Yeh, Hung-I

    2015-03-15

    Acute coronary syndromes (ACS) remain a leading cause of mortality and morbidity in the Asia-Pacific (APAC) region. International guidelines advocate invasive procedures in all but low-risk ACS patients; however, a high proportion of ACS patients in the APAC region receive solely medical management due to a combination of unique geographical, socioeconomic, and population-specific barriers. The APAC ACS Medical Management Working Group recently convened to discuss the ACS medical management landscape in the APAC region. Local and international ACS guidelines and the global and APAC clinical evidence-base for medical management of ACS were reviewed. Challenges in the provision of optimal care for these patients were identified and broadly categorized into issues related to (1) accessibility/systems of care, (2) risk stratification, (3) education, (4) optimization of pharmacotherapy, and (5) cost/affordability. While ACS guidelines clearly represent a valuable standard of care, the group concluded that these challenges can be best met by establishing cardiac networks and individual hospital models/clinical pathways taking into account local risk factors (including socioeconomic status), affordability and availability of pharmacotherapies/invasive facilities, and the nature of local healthcare systems. Potential solutions central to the optimization of ACS medical management in the APAC region are outlined with specific recommendations. Copyright © 2014 Elsevier Ireland Ltd. All rights reserved.

  15. Catholic identity: realized in conversation.

    PubMed

    Neale, A

    1997-01-01

    Catholic literature leaders must constantly engage the Catholic tradition, because it provides the framework for everything we do. The way they can do this is through conversation--discussion about the profound values and philosophical and theological assumptions that are at the heart of our ministry. Yet many healthcare boards and senior managers do not engage in such conversations. This is a serious omission, with potentially serious consequences. Too often mission and pastoral care values are regarded as separate from the business aspects of a healthcare organization. If we are to understand and integrate our mission into our healthcare work, this must change. The entire organization must make a commitment to foster an understanding of Catholic identity through conversation. As important as the dialogue is, some Catholic healthcare leaders let obstacles prevent them from delving into Catholic identity. They may not understand it, or they may be deterred by our cultural tendency to regard religion as personal, not part of the business realm. Some may be embarrassed, uncomfortable with abstraction, or reluctant to spend the time required. To encourage the conversation among Catholic healthcare leaders, we may take a lesson from our counterparts in Catholic education, who struggle with the same questions. A model Catholic university, where Catholic values are incorporated at all levels, may be a model for Catholic healthcare.

  16. Generalized recursive solutions to Ornstein-Zernike integral equations

    NASA Astrophysics Data System (ADS)

    Rossky, Peter J.; Dale, William D. T.

    1980-09-01

    Recursive procedures for the solution of a class of integral equations based on the Ornstein-Zernike equation are developed; the hypernetted chain and Percus-Yevick equations are two special cases of the class considered. It is shown that certain variants of the new procedures developed here are formally equivalent to those recently developed by Dale and Friedman, if the new recursive expressions are initialized in the same way as theirs. However, the computational solution of the new equations is significantly more efficient. Further, the present analysis leads to the identification of various graphical quantities arising in the earlier study with more familiar quantities related to pair correlation functions. The analysis is greatly facilitated by the use of several identities relating simple chain sums whose graphical elements can be written as a sum of two or more parts. In particular, the use of these identities permits renormalization of the equivalent series solution to the integral equation to be directly incorporated into the recursive solution in a straightforward manner. Formulas appropriate to renormalization with respect to long and short range parts of the pair potential, as well as more general components of the direct correlation function, are obtained. To further illustrate the utility of this approach, we show that a simple generalization of the hypernetted chain closure relation for the direct correlation function leads directly to the reference hypernetted chain (RHNC) equation due to Lado. The form of the correlation function used in the exponential approximation of Andersen and Chandler is then seen to be equivalent to the first estimate obtained from a renormalized RHNC equation.

  17. Human Rights and the Excess of Identity

    PubMed Central

    Al Tamimi, Yussef

    2017-01-01

    Identity is a central theme in contemporary politics, but legal academia lacks a rigorous analysis of this concept. The aim of this article is twofold: (i) firstly, it aims to reveal presumptions on identity in human rights law by mapping how the European Court of Human Rights approaches identity and (ii) secondly, it seeks to analyse these presumptions using theoretical insights on identity. By merging legal and theoretical analysis, this article contributes a reading of the Court’s case law which suggests that the tension between the political and apolitical is visible as a common thread in the Court’s use of identity. In case law concerning paternity, the Court appears to hold a specific view of what is presented as an unquestionable part of identity. This ostensibly pre-political notion of identity becomes untenable in cases where the nature of an identity feature, such as the headscarf, is contended or a minority has adopted a national identity that conflicts with the majoritarian national identity. The Court’s approach to identity in such cases reflects a paradox that is inherent to identity; identity is personal while simultaneously constituted and shaped by overarching power mechanisms. PMID:29881144

  18. Multicultural identity integration and well-being: a qualitative exploration of variations in narrative coherence and multicultural identification

    PubMed Central

    Yampolsky, Maya A.; Amiot, Catherine E.; de la Sablonnière, Roxane

    2013-01-01

    Understanding the experiences of multicultural individuals is vital in our diverse populations. Multicultural people often need to navigate the different norms and values associated with their multiple cultural identities. Recent research on multicultural identification has focused on how individuals with multiple cultural groups manage these different identities within the self, and how this process predicts well-being. The current study built on this research by using a qualitative method to examine the process of configuring one's identities within the self. The present study employed three of the four different multiple identity configurations in Amiot et al. (2007) cognitive-developmental model of social identity integration: categorization, where people identify with one of their cultural groups over others; compartmentalization, where individuals maintain multiple, separate identities within themselves; and integration, where people link their multiple cultural identities. Life narratives were used to investigate the relationship between each of these configurations and well-being, as indicated by narrative coherence. It was expected that individuals with integrated cultural identities would report greater narrative coherence than individuals who compartmentalized and categorized their cultural identities. For all twenty-two participants, identity integration was significantly and positively related to narrative coherence, while compartmentalization was significantly and negatively related to narrative coherence. ANOVAs revealed that integrated and categorized participants reported significantly greater narrative coherence than compartmentalized participants. These findings are discussed in light of previous research on multicultural identity integration. PMID:23504407

  19. Measuring STEM Students' Mathematical Identities

    ERIC Educational Resources Information Center

    Kaspersen, Eivind; Pepin, Birgit; Sikko, Svein Arne

    2017-01-01

    Studies on identity in general and mathematical identity in particular have gained much interest over the last decades. However, although measurements have been proven to be potent tools in many scientific fields, a lack of consensus on ontological, epistemological, and methodological issues has complicated measurements of mathematical identities.…

  20. Queering Black Racial Identity Development

    ERIC Educational Resources Information Center

    Johnson, Alandis A.; Quaye, Stephen John

    2017-01-01

    We used queer theory to encourage readers to think differently about previous theories about Black racial identity development. Queer theory facilitates new and deeper understandings of how Black people develop their racial identities, prompting more fluidity and nuance. Specifically, we present a queered model of Black racial identity development…

  1. The Relationship between Environmental Turbulence, Management Support, Organizational Collaboration, Information Technology Solution Realization, and Process Performance, in Healthcare Provider Organizations

    ERIC Educational Resources Information Center

    Muglia, Victor O.

    2010-01-01

    The Problem: The purpose of this study was to investigate relationships between environmental turbulence, management support, organizational collaboration, information technology solution realization, and process performance in healthcare provider organizations. Method: A descriptive/correlational study of Hospital medical services process…

  2. Physics career intentions: The effect of physics identity, math identity, and gender

    NASA Astrophysics Data System (ADS)

    Lock, Robynne M.; Hazari, Zahra; Potvin, Geoff

    2013-01-01

    Although nearly half of high school physics students are female, only 21% of physics bachelor's degrees are earned by women. Using data from a national survey of college students in introductory English courses (on science-related experiences, particularly in high school), we examine the influence of students' physics and math identities on their choice to pursue a physics career. Males have higher math and physics identities than females in all three dimensions of our identity framework. These dimensions include: performance/competence (perceptions of ability to perform/understand), recognition (perception of recognition by others), and interest (desire to learn more). A regression model predicting students' intentions to pursue physics careers shows, as expected, that males are significantly more likely to choose physics than females. Surprisingly, however, when physics and math identity are included in the model, females are shown to be equally likely to choose physics careers as compared to males.

  3. The effects of moral judgment and moral identity on moral behavior: an empirical examination of the moral individual.

    PubMed

    Reynolds, Scott J; Ceranic, Tara L

    2007-11-01

    Recognizing limitations in classic cognitive moral development theory, several scholars have drawn from theories of identity to suggest that moral behavior results from both moral judgments and moral identity. The authors conducted 2 survey-based studies with more than 500 students and managers to test this argument. Results demonstrated that moral identity and moral judgments both independently influenced moral behavior. In addition, in situations in which social consensus regarding the moral behavior was not high, moral judgments and moral identity interacted to shape moral behavior. This interaction effect indicated that those who viewed themselves as moral individuals pursued the most extreme alternatives (e.g., never cheating, regularly cheating)--a finding that affirms the motivational power of a moral identity. The authors conclude by considering the implications of this research for both theory and practice. (c) 2007 APA

  4. Activating patients with chronic disease for self-management: comparison of self-managing patients with those managing by frequent readmissions to hospital.

    PubMed

    Kirby, Sue E; Dennis, Sarah M; Bazeley, Pat; Harris, Mark F

    2013-01-01

    Understanding the factors that activate people to self-manage chronic disease is important in improving uptake levels. If the many frequent hospital users who present with acute exacerbations of chronic disease were to self-manage at home, some hospital admissions would be avoided. Patient interview and demographic, psychological, clinical and service utilisation data were compared for two groups of patients with chronic disease: those attending self-management services and those who managed by using hospital services. Data were analysed to see whether there were differences that might explain the two different approaches to managing their conditions. The two groups were similar in terms of comorbidity, age, sex, home services, home support and educational level. Self-managing patients were activated by their clinician, accepted their disease, changed their identity, confronted emotions and learnt the skills to self-manage and avoid hospital. Patients who frequently used hospital services to manage their chronic disease were often in denial about their chronic disease, hung on to their identity and expressed little emotional response. However, they reported a stronger sense of coherence and rated their health more highly than self-managing patients. This study shed light on the process of patient activation for self-management. A better understanding of the process of patient activation would encourage clinicians who come into contact with frequently readmitted chronic disease patients to be more proactive in supporting self-management.

  5. Noncredit and Credit Divisions in Community Colleges: The Dilemma of Multiple Organizational Identities

    ERIC Educational Resources Information Center

    Palter Gill, Dianne

    2012-01-01

    Despite the importance of effective linkages between credit and noncredit divisions, significant barriers interfere with and detract from these units working well together. Community college leaders are challenged to manage these multiple and sometimes competing organizational identities in a complex and rapidly-changing educational landscape.…

  6. Professional Development in Japanese Non-Native English Speaking Teachers' Identity and Efficacy

    ERIC Educational Resources Information Center

    Takayama, Hiromi

    2015-01-01

    This mixed methods study investigates how Japanese non-native English speaking teachers' (NNESTs) efficacy and identity are developed and differentiated from those of native English speaking teachers (NESTs). To explore NNESTs' efficacy, this study focuses on the contributing factors, such as student engagement, classroom management, instructional…

  7. The Moral Self: Applying Identity Theory

    ERIC Educational Resources Information Center

    Stets, Jan E.; Carter, Michael J.

    2011-01-01

    This research applies identity theory to understand the moral self. In identity theory, individuals act on the basis of their identity meanings, and they regulate the meanings of their behavior so that those meanings are consistent with their identity meanings. An inconsistency produces negative emotions and motivates individuals to behave…

  8. The Quest for Identity in Adolescence: Heterogeneity in Daily Identity Formation and Psychosocial Adjustment across 5 Years

    ERIC Educational Resources Information Center

    Becht, Andrik I.; Nelemans, Stefanie A.; Branje, Susan J. T.; Vollebergh, Wilma A. M.; Koot, Hans M.; Denissen, Jaap J. A.; Meeus, Wim H. J.

    2016-01-01

    Identity formation is one of the key developmental tasks in adolescence. According to Erikson (1968) experiencing identity uncertainty is normative in adolescence. However, empirical studies investigating identity uncertainty on a daily basis are lacking. Hence, studying individual differences in daily certainty (i.e., identity commitment levels)…

  9. Pilipino American Identity Development Model

    ERIC Educational Resources Information Center

    Nadal, Kevin L.

    2004-01-01

    This article examines the identity development of F/Pilipino Americans. Because of a distinct history and culture that differentiates them from other Asian groups, F/Pilipino Americans may experience a different ethnic identity development than other Asian Americans. A nonlinear 6-stage ethnic identity development model is proposed to promote…

  10. Identity Development in Deaf Adolescents

    ERIC Educational Resources Information Center

    Kunnen, E. Saskia

    2014-01-01

    We studied identity development during 5 years in seven deaf adolescents who attended a school for deaf children in the highest level of regular secondary education (age between 14 and 18 years), administering identity interviews every year. Identity development is conceptualized as the processes of exploration and commitment formation (Bosma,…

  11. Automatically high accurate and efficient photomask defects management solution for advanced lithography manufacture

    NASA Astrophysics Data System (ADS)

    Zhu, Jun; Chen, Lijun; Ma, Lantao; Li, Dejian; Jiang, Wei; Pan, Lihong; Shen, Huiting; Jia, Hongmin; Hsiang, Chingyun; Cheng, Guojie; Ling, Li; Chen, Shijie; Wang, Jun; Liao, Wenkui; Zhang, Gary

    2014-04-01

    Defect review is a time consuming job. Human error makes result inconsistent. The defects located on don't care area would not hurt the yield and no need to review them such as defects on dark area. However, critical area defects can impact yield dramatically and need more attention to review them such as defects on clear area. With decrease in integrated circuit dimensions, mask defects are always thousands detected during inspection even more. Traditional manual or simple classification approaches are unable to meet efficient and accuracy requirement. This paper focuses on automatic defect management and classification solution using image output of Lasertec inspection equipment and Anchor pattern centric image process technology. The number of mask defect found during an inspection is always in the range of thousands or even more. This system can handle large number defects with quick and accurate defect classification result. Our experiment includes Die to Die and Single Die modes. The classification accuracy can reach 87.4% and 93.3%. No critical or printable defects are missing in our test cases. The missing classification defects are 0.25% and 0.24% in Die to Die mode and Single Die mode. This kind of missing rate is encouraging and acceptable to apply on production line. The result can be output and reloaded back to inspection machine to have further review. This step helps users to validate some unsure defects with clear and magnification images when captured images can't provide enough information to make judgment. This system effectively reduces expensive inline defect review time. As a fully inline automated defect management solution, the system could be compatible with current inspection approach and integrated with optical simulation even scoring function and guide wafer level defect inspection.

  12. Science Identity in Informal Education

    NASA Astrophysics Data System (ADS)

    Schon, Jennifer A.

    The national drive to increase the number of students pursuing Science Technology, Engineering, and Math (STEM) careers has brought science identity into focus for educators, with the need to determine what encourages students to pursue and persist in STEM careers. Science identity, the degree to which students think someone like them could be a scientist is a potential indicator of students pursuing and persisting in STEM related fields. Science identity, as defined by Carlone and Johnson (2007) consists of three constructs: competence, performance, and recognition. Students need to feel like they are good at science, can perform it well, and that others recognize them for these achievements in order to develop a science identity. These constructs can be bolstered by student visitation to informal education centers. Informal education centers, such as outdoor science schools, museums, and various learning centers can have a positive impact on how students view themselves as scientists by exposing them to novel and unique learning opportunities unavailable in their school. Specifically, the University of Idaho's McCall Outdoor Science School (MOSS) focuses on providing K-12 students with the opportunity to learn about science with a place-based, hands-on, inquiry-based curriculum that hopes to foster science identity development. To understand the constructs that lead to science identity formation and the impact the MOSS program has on science identity development, several questions were explored examining how students define the constructs and if the MOSS program impacted how they rate themselves within each construct. A mixed-method research approach was used consisting of focus group interviews with students and pre, post, one-month posttests for visiting students to look at change in science identity over time. Results from confirmatory factor analysis indicate that the instrument created is a good fit for examining science identity and the associated

  13. Identity and Diversity in Today's World

    ERIC Educational Resources Information Center

    Gee, James Paul

    2017-01-01

    This paper develops a thesis about identity and diversity. I first look at activity-based identities, identities like being a gardener, birder, citizen scientist or fan-fiction writer. These are freely chosen identities and they are proliferating at a great rate today thanks to participatory culture, the Maker Movement and digital and social…

  14. Identities, social representations and critical thinking

    NASA Astrophysics Data System (ADS)

    López-Facal, Ramón; Jiménez-Aleixandre, María Pilar

    2009-09-01

    This comment on L. Simonneaux and J. Simonneaux paper focuses on the role of identities in dealing with socio-scientific issues. We argue that there are two types of identities (social representations) influencing the students' positions: On the one hand their social representations of the bears' and wolves' identities as belonging to particular countries (Slovenia versus France for bears, France and Italy for wolves), in other words, as having national identities; on the other hand representations of their own identities as belonging to the field of agricultural practitioners, and so sharing this socio-professional identity with shepherds and breeders, as opposed to ecologists. We discuss how these representations of identities influenced students' reasoning and argumentation, blocking in some cases the evaluation of evidence. Implications for developing critical thinking and for dealing with SSI in the classrooms are outlined.

  15. Professional identity of Korean nurse practitioners in the United States.

    PubMed

    Seo, Kumsook; Kim, Miyoung

    2017-04-01

    Despite nurse practitioners' (NPs) professional identity having important implications for the confirmation of nursing practice characteristics, few studies have examined the professional identity of NPs overlaid with the immigrant experience. The aim of this study was to explore the career characteristics of Korean nurse immigrants who became NPs in the United States. Seven Korean NPs in the United States underwent in-depth interviews from August 2013 to May 2015. Content analysis was employed for data analysis. Five themes were identified regarding their professional identity as NPs: patient-centered thinking, responsibility for patient care, dedicated life, diligence, and feelings of achievement. Of these, patient-centered thinking appeared to be the overriding theme. The findings add to nursing knowledge about immigrant nurses and their abilities and striving to develop into new roles in nursing. The participants focused on listening, interpersonal relationships, and education in patient care, which helped differentiate their roles from those of other healthcare professionals. Nurse managers should consider the study findings when making policies to assist immigrant nurses to acculturate into practice, and there is a need for the development of educational materials to guide and promote the NPs' professional role. ©2017 American Association of Nurse Practitioners.

  16. Discourse, Power Interplays and "Disordered Identities": An Intersectional Framework for Analysis and Policy Development

    ERIC Educational Resources Information Center

    Liasidou, Anastasia

    2016-01-01

    While acknowledging the discursive constitution of student identities through the interplay of unequal power relations and discriminatory processes, the article discusses the ways in which social, emotional and behaviour difficulties (SEBD) are "produced" and "managed" within current schooling. SEBD are routinely framed in…

  17. 21 CFR 610.14 - Identity.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 21 Food and Drugs 7 2014-04-01 2014-04-01 false Identity. 610.14 Section 610.14 Food and Drugs... BIOLOGICAL PRODUCTS STANDARDS General Provisions § 610.14 Identity. The contents of a final container of each filling of each lot shall be tested for identity after all labeling operations shall have been completed...

  18. 21 CFR 610.14 - Identity.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 21 Food and Drugs 7 2013-04-01 2013-04-01 false Identity. 610.14 Section 610.14 Food and Drugs... BIOLOGICAL PRODUCTS STANDARDS General Provisions § 610.14 Identity. The contents of a final container of each filling of each lot shall be tested for identity after all labeling operations shall have been completed...

  19. 21 CFR 610.14 - Identity.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 21 Food and Drugs 7 2012-04-01 2012-04-01 false Identity. 610.14 Section 610.14 Food and Drugs... BIOLOGICAL PRODUCTS STANDARDS General Provisions § 610.14 Identity. The contents of a final container of each filling of each lot shall be tested for identity after all labeling operations shall have been completed...

  20. A theoretical and computational study of lithium-ion battery thermal management for electric vehicles using heat pipes

    NASA Astrophysics Data System (ADS)

    Greco, Angelo; Cao, Dongpu; Jiang, Xi; Yang, Hong

    2014-07-01

    A simplified one-dimensional transient computational model of a prismatic lithium-ion battery cell is developed using thermal circuit approach in conjunction with the thermal model of the heat pipe. The proposed model is compared to an analytical solution based on variable separation as well as three-dimensional (3D) computational fluid dynamics (CFD) simulations. The three approaches, i.e. the 1D computational model, analytical solution, and 3D CFD simulations, yielded nearly identical results for the thermal behaviours. Therefore the 1D model is considered to be sufficient to predict the temperature distribution of lithium-ion battery thermal management using heat pipes. Moreover, a maximum temperature of 27.6 °C was predicted for the design of the heat pipe setup in a distributed configuration, while a maximum temperature of 51.5 °C was predicted when forced convection was applied to the same configuration. The higher surface contact of the heat pipes allows a better cooling management compared to forced convection cooling. Accordingly, heat pipes can be used to achieve effective thermal management of a battery pack with confined surface areas.

  1. Intersections and Translocations: New Paradigms for Thinking about Cultural Diversity and Social Identities

    ERIC Educational Resources Information Center

    Anthias, Floya

    2011-01-01

    This article reflects on the concepts of cultural diversity, belonging and identity which inform important debates for managing "difference" in contemporary European societies. These address issues relating to transnational migration, ethnic diversity and racialisation in a range of social contexts. The article also reflects on the concept of…

  2. Definition and use of Solution-focused Sustainability Assessment: A novel approach to generate, explore and decide on sustainable solutions for wicked problems.

    PubMed

    Zijp, Michiel C; Posthuma, Leo; Wintersen, Arjen; Devilee, Jeroen; Swartjes, Frank A

    2016-05-01

    This paper introduces Solution-focused Sustainability Assessment (SfSA), provides practical guidance formatted as a versatile process framework, and illustrates its utility for solving a wicked environmental management problem. Society faces complex and increasingly wicked environmental problems for which sustainable solutions are sought. Wicked problems are multi-faceted, and deriving of a management solution requires an approach that is participative, iterative, innovative, and transparent in its definition of sustainability and translation to sustainability metrics. We suggest to add the use of a solution-focused approach. The SfSA framework is collated from elements from risk assessment, risk governance, adaptive management and sustainability assessment frameworks, expanded with the 'solution-focused' paradigm as recently proposed in the context of risk assessment. The main innovation of this approach is the broad exploration of solutions upfront in assessment projects. The case study concerns the sustainable management of slightly contaminated sediments continuously formed in ditches in rural, agricultural areas. This problem is wicked, as disposal of contaminated sediment on adjacent land is potentially hazardous to humans, ecosystems and agricultural products. Non-removal would however reduce drainage capacity followed by increased risks of flooding, while contaminated sediment removal followed by offsite treatment implies high budget costs and soil subsidence. Application of the steps in the SfSA-framework served in solving this problem. Important elements were early exploration of a wide 'solution-space', stakeholder involvement from the onset of the assessment, clear agreements on the risk and sustainability metrics of the problem and on the interpretation and decision procedures, and adaptive management. Application of the key elements of the SfSA approach eventually resulted in adoption of a novel sediment management policy. The stakeholder

  3. The Paperless Solution

    NASA Technical Reports Server (NTRS)

    2001-01-01

    REI Systems, Inc. developed a software solution that uses the Internet to eliminate the paperwork typically required to document and manage complex business processes. The data management solution, called Electronic Handbooks (EHBs), is presently used for the entire SBIR program processes at NASA. The EHB-based system is ideal for programs and projects whose users are geographically distributed and are involved in complex management processes and procedures. EHBs provide flexible access control and increased communications while maintaining security for systems of all sizes. Through Internet Protocol- based access, user authentication and user-based access restrictions, role-based access control, and encryption/decryption, EHBs provide the level of security required for confidential data transfer. EHBs contain electronic forms and menus, which can be used in real time to execute the described processes. EHBs use standard word processors that generate ASCII HTML code to set up electronic forms that are viewed within a web browser. EHBs require no end-user software distribution, significantly reducing operating costs. Each interactive handbook simulates a hard-copy version containing chapters with descriptions of participants' roles in the online process.

  4. Ethnic Identity, Bicultural Identity Integration, and Psychological Well-Being among Transracial Adoptees: A Longitudinal Study

    ERIC Educational Resources Information Center

    Ferrari, Laura; Rosnati, Rosa; Manzi, Claudia; Benet-Martínez, Verònica

    2015-01-01

    The ethnic identity development plays a crucial role in adolescence and emerging adulthood and may be more complex for adoptees who do not share their ethnic identity with their adoptive families. Evidence from the studies was mixed, with strong ethnic identity not always found to be indicative of improved psychological adjustment. Recently…

  5. Identities, Education and Reentry (Part One of Two): Identities and Performative Spaces

    ERIC Educational Resources Information Center

    Wright, Randall

    2014-01-01

    This is part one of a two-part interdisciplinary paper that examines the various forces (discourses and institutional processes) that shape prisoner-student identities. Discourses of officers from a correctional website serve as a limited, single case study of discourses that ascribe dehumanized, stigmatized identities to "the prisoner."…

  6. Biography, Identity, Improvisation, Sound: Intersections of Personal and Social Identity through Improvisation

    ERIC Educational Resources Information Center

    Smilde, Rineke

    2016-01-01

    This essay addresses the relationship of improvisation and identity. Biographical research that was conducted by the author into professional musicians' lifelong learning showed the huge importance of improvisation for personal expression. Musically, the concept of "sound" appeared to serve as a strong metaphor for identity. In addition,…

  7. Optimal Experience and Optimal Identity: A Multinational Study of the Associations Between Flow and Social Identity

    PubMed Central

    Mao, Yanhui; Roberts, Scott; Pagliaro, Stefano; Csikszentmihalyi, Mihaly; Bonaiuto, Marino

    2016-01-01

    Eudaimonistic identity theory posits a link between activity and identity, where a self-defining activity promotes the strength of a person’s identity. An activity engaged in with high enjoyment, full involvement, and high concentration can facilitate the subjective experience of flow. In the present paper, we hypothesized in accordance with the theory of psychological selection that beyond the promotion of individual development and complexity at the personal level, the relationship between flow and identity at the social level is also positive through participation in self-defining activities. Three different samples (i.e., American, Chinese, and Spanish) filled in measures for flow and social identity, with reference to four previously self-reported activities, characterized by four different combinations of skills (low vs. high) and challenges (low vs. high). Findings indicated that flow was positively associated with social identity across each of the above samples, regardless of participants’ gender and age. The results have implications for increasing social identity via participation in self-defining group activities that could facilitate flow. PMID:26924995

  8. Optimal Experience and Optimal Identity: A Multinational Study of the Associations Between Flow and Social Identity.

    PubMed

    Mao, Yanhui; Roberts, Scott; Pagliaro, Stefano; Csikszentmihalyi, Mihaly; Bonaiuto, Marino

    2016-01-01

    Eudaimonistic identity theory posits a link between activity and identity, where a self-defining activity promotes the strength of a person's identity. An activity engaged in with high enjoyment, full involvement, and high concentration can facilitate the subjective experience of flow. In the present paper, we hypothesized in accordance with the theory of psychological selection that beyond the promotion of individual development and complexity at the personal level, the relationship between flow and identity at the social level is also positive through participation in self-defining activities. Three different samples (i.e., American, Chinese, and Spanish) filled in measures for flow and social identity, with reference to four previously self-reported activities, characterized by four different combinations of skills (low vs. high) and challenges (low vs. high). Findings indicated that flow was positively associated with social identity across each of the above samples, regardless of participants' gender and age. The results have implications for increasing social identity via participation in self-defining group activities that could facilitate flow.

  9. Identity theft and your practice.

    PubMed

    Asbell, Lisa

    2010-01-01

    Medical identity theft is a growing problem in America. The federal government has passed laws to help "prevent" identity theft. However, several powerful medical associations are fighting the legislation. Americans need to know what is happening with these laws and why these laws are important to protect providers from lawsuits and consumers of healthcare from medical identity theft.

  10. Social Identity Simulation System (SISTEM)

    DTIC Science & Technology

    2014-03-31

    Report Individuation Individuation refers to when an individual attempts to preserve self-esteem by psychologically separating oneself from a...its expected costs. The following subsections describe various strategies of social identity entrepreneurship in more detail. Calling for...Haslam, S. A., & Reicher, S. (2007). Identity Entrepreneurship and the consequences of identity failure: the dynamics of leadership in the BBC prison

  11. 21 CFR 610.14 - Identity.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 21 Food and Drugs 7 2011-04-01 2010-04-01 true Identity. 610.14 Section 610.14 Food and Drugs FOOD... BIOLOGICAL PRODUCTS STANDARDS General Provisions § 610.14 Identity. The contents of a final container of each filling of each lot shall be tested for identity after all labeling operations shall have been completed...

  12. Stories we live, identities we build: how are elementary teachers' science identities shaped by their lived experiences?

    NASA Astrophysics Data System (ADS)

    Avraamidou, Lucy

    2018-02-01

    The aim of this multiple case study was to uncover a series of critical events and experiences related to the formation of the science identities of four beginning elementary female teachers, through a life-history approach and a conceptualization of teacher identity as lived experience. Grounded within the theoretical framework of Figured Worlds, the study used qualitative, interpretive methods for data collection (interviews, biographies, teaching philosophies) and analysis. The analysis shed light on the ways in which various experiences situated within different Figured Worlds (science, family and childhood, schooling, out-of-school, university, professional) impacted the participants' identity trajectories. The findings provided three main insights that contribute to science identity research and have implications for elementary teacher preparation: (a) science teacher identity is multidimensional and extends beyond cognitive domains of becoming to include affective dimensions; (b) science teacher identity is relational, linked and shaped by various other constructs or sub-identities; (c) place and time, defined as a space with meaning created by experiences, and science teacher identity are inextricably bound to one another.

  13. Procedural memory in dissociative identity disorder: when can inter-identity amnesia be truly established?

    PubMed

    Huntjens, Rafaële J C; Postma, Albert; Woertman, Liesbeth; van der Hart, Onno; Peters, Madelon L

    2005-06-01

    In a serial reaction time task, procedural memory was examined in Dissociative Identity Disorder (DID). Thirty-one DID patients were tested for inter-identity transfer of procedural learning and their memory performance was compared with 25 normal controls and 25 controls instructed to simulate DID. Results of patients seemed to indicate a pattern of inter-identity amnesia. Simulators, however, were able to mimic a pattern of inter-identity amnesia, rendering the results of patients impossible to interpret as either a pattern of amnesia or a pattern of simulation. It is argued that studies not including DID-simulators or simulation-free memory tasks, should not be taken as evidence for (or against) amnesia in DID.

  14. A Qualitative Study on Classroom Management and Classroom Discipline Problems, Reasons, and Solutions: A Case of Information Technologies Class

    ERIC Educational Resources Information Center

    Erdogan, Mehmet; Kursun, Engin; Sisman, Gulcin Tan; Saltan, Fatih; Gok, Ali; Yildiz, Ismail

    2010-01-01

    The purpose of this study was to investigate classroom management and discipline problems that Information Technology teachers have faced, and to reveal underlying reasons and possible solutions of these problems by considering the views of parents, teachers, and administrator. This study was designed as qualitative study. Subjects of this study…

  15. Uncovering Visitor Identity: A Citywide Utilization of the Falk Visitor-Identity Model

    ERIC Educational Resources Information Center

    Trainer, Laureen; Steele-Inama, Marley; Christopher, Amber

    2012-01-01

    In his book, "Identity and the Museum Visitor Experience," John Falk makes the case that by understanding the underlying motivations that drive a visitor, a museum can create an experience that reflects a person's identity and therefore satisfy their motivation for visiting. According to Falk, this level of personal connection increases…

  16. Identity-based motivation: Implications for intervention

    PubMed Central

    Oyserman, Daphna; Destin, Mesmin

    2010-01-01

    Children want to succeed academically and attend college, but their actual attainment often lags behind; some groups (e.g., boys, low-income children) are particularly likely to experience this gap. Social structural factors matter, influencing this gap in part by affecting children's perceptions of what is possible for them and people like them in the future. Interventions that focus on this macro-micro interface can boost children's attainment. We articulate the processes underlying these effects using an integrative culturally sensitive framework entitled identity-based motivation (IBM, Oyserman, 2007, 2009a, 2009b). The IBM model assumes that identities are dynamically constructed in context. People interpret situations and difficulties in ways that are congruent with currently active identities and prefer identity-congruent to identity-incongruent actions. When action feels identity-congruent, experienced difficulty highlights that the behavior is important and meaningful. When action feels identity-incongruent, the same difficulty suggests that the behavior is pointless and “not for people like me.” PMID:21516204

  17. Rapid structural analysis of nanomaterials in aqueous solutions

    NASA Astrophysics Data System (ADS)

    Ryuzaki, Sou; Tsutsui, Makusu; He, Yuhui; Yokota, Kazumichi; Arima, Akihide; Morikawa, Takanori; Taniguchi, Masateru; Kawai, Tomoji

    2017-04-01

    Rapid structural analysis of nanoscale matter in a liquid environment represents innovative technologies that reveal the identities and functions of biologically important molecules. However, there is currently no method with high spatio-temporal resolution that can scan individual particles in solutions to gain structural information. Here we report the development of a nanopore platform realizing quantitative structural analysis for suspended nanomaterials in solutions with a high z-axis and xy-plane spatial resolution of 35.8 ± 1.1 and 12 nm, respectively. We used a low thickness-to-diameter aspect ratio pore architecture for achieving cross sectional areas of analyte (i.e. tomograms). Combining this with multiphysics simulation methods to translate ionic current data into tomograms, we demonstrated rapid structural analysis of single polystyrene (Pst) beads and single dumbbell-like Pst beads in aqueous solutions.

  18. Moral identity and emotion in athletes.

    PubMed

    Kavussanu, Maria; Willoughby, Adrian; Ring, Christopher

    2012-12-01

    The purpose of this study was to investigate the effects of moral identity on physiological responses to affective pictures, namely, the startle blink reflex and pain-related evoked potential. Male (n = 48) and female (n = 46) athletes participating in contact team sports were randomly assigned to either a moral identity group or a non-moral identity group and viewed a series of unpleasant, neutral, and pleasant sport-specific pictures. During picture viewing, a noxious electrocutaneous stimulus was delivered as the startle probe and the startle blink and pain-related evoked potential were measured. Upon completion of physiological measures, participants reviewed the pictures and rated them for valence and arousal. ANOVAs revealed that participants in the moral identity group displayed larger startle blinks and smaller pain-related potentials than did those in the non-moral identity group across all picture valence categories. However, the difference in the magnitude of startle blinks between the moral and non-moral identity groups was larger in response to unpleasant than pleasant and neutral pictures. Our findings suggest that moral identity affects physiological responses to sport-specific affective pictures, thereby providing objective evidence for the link between moral identity and emotion in athletes.

  19. The emergence, structure and development of ethnic identity during childhood: the case of Roma identity.

    PubMed

    Pnevmatikos, Dimitris; Geka, Maria; Divane, Maria

    2010-12-01

    This study investigates the emergence, development and structure of ethnic identity during childhood. Forty Roma children living in Greece aged between 2.8 and 11.9 years answered questions about their awareness/recognition of four aspects of their ethnic identity-namely place of habitation, traditional costumes, the Roma language, and early betrothal of children-their identity and their sense of stability and constancy. The study also investigates how the children feel about the abandonment of those four aspects. The evidence from the current data supports the hypothesis that awareness of ethnic identity emerges before the age of 4. Moreover, this study offers direct empirical evidence of the multidimensionality of ethnic identity. A model of three concentric rings is proposed, extending from a core containing the most highly valued aspects of ethnic identity to the outer annulus that comprises the nonpermanent and nonstable aspects of ethnic identity. The aspects in each annulus differ in terms of the development of the sense of stability and constancy and the feelings associated with loss of the aspects in question. Even the youngest participants considered the aspects in the core to be stable and constant as well as emotionally charged; and even the 11-year-olds did not consider the aspects contained in the outer, more fluid annulus as stable and constant aspects of their ethnic identity. The development of an aspect is determined by what the majority of adults in a society, at a particular time in history, consider to be most important.

  20. Intergroup Leadership Across Distinct Subgroups and Identities.

    PubMed

    Rast, David E; Hogg, Michael A; van Knippenberg, Daan

    2018-03-01

    Resolving intergroup conflict is a significant and often arduous leadership challenge, yet existing theory and research rarely, if ever, discuss or examine this situation. Leaders confront a significant challenge when they provide leadership across deep divisions between distinct subgroups defined by self-contained identities-The challenge is to avoid provoking subgroup identity distinctiveness threat. Drawing on intergroup leadership theory, three studies were conducted to test the core hypothesis that, where identity threat exists, leaders promoting an intergroup relational identity will be better evaluated and are more effective than leaders promoting a collective identity; in the absence of threat, leaders promoting a collective identity will prevail. Studies 1 and 2 ( N = 170; N = 120) supported this general proposition. Study 3 ( N = 136) extended these findings, showing that leaders promoting an intergroup relational identity, but not a collective identity, improved intergroup attitudes when participants experienced an identity distinctiveness threat.

  1. Management Communication for the New Millennium: An Australian Perspective.

    ERIC Educational Resources Information Center

    More, Elizabeth A.; Irwin, Harry T.

    2000-01-01

    Discusses management communications in the general area of identity, and the Australian situation involving management communication scholarship, management communication education, and the future of the field in Australia. (NH)

  2. Rewilding as nature based solution in land management

    NASA Astrophysics Data System (ADS)

    Novara, Agata; Gristina, Luciano; Keesstra, Saskia; Pereira, Paulo; Cerda, Artemio

    2017-04-01

    Rewilding is an effective tool of ecological restoration and a nature based solution for hydro-meteorological risk control. Rewilding contributes to reduce flood risk, resist droughts, helps to restore soil organic matter content, increases soil and plant biodiversity, improves the overall ecosystem and human health. The key element of rewilding is not the nature control, but following the natural processes to restore the key soil ecological factors and their connectivity. Rewilding can be applicable at different ecosystem stages, from natural reserve to more anthropogenic system such as agricultural land through the restoration of wild soil function trough permaculture or forest farming. The proposed nature based solution not only avoid the investment in traditional engineering but it also an opportunities for creating new economics model based on wild nature (ecoturism, education, wild edible plants). This work is a review of applied rewilding actions and considerations on future nature based solutions applications will be discussed .

  3. Fingerprint Recognition with Identical Twin Fingerprints

    PubMed Central

    Yang, Xin; Tian, Jie

    2012-01-01

    Fingerprint recognition with identical twins is a challenging task due to the closest genetics-based relationship existing in the identical twins. Several pioneers have analyzed the similarity between twins' fingerprints. In this work we continue to investigate the topic of the similarity of identical twin fingerprints. Our study was tested based on a large identical twin fingerprint database that contains 83 twin pairs, 4 fingers per individual and six impressions per finger: 3984 (83*2*4*6) images. Compared to the previous work, our contributions are summarized as follows: (1) Two state-of-the-art fingerprint identification methods: P071 and VeriFinger 6.1 were used, rather than one fingerprint identification method in previous studies. (2) Six impressions per finger were captured, rather than just one impression, which makes the genuine distribution of matching scores more realistic. (3) A larger sample (83 pairs) was collected. (4) A novel statistical analysis, which aims at showing the probability distribution of the fingerprint types for the corresponding fingers of identical twins which have same fingerprint type, has been conducted. (5) A novel analysis, which aims at showing which finger from identical twins has higher probability of having same fingerprint type, has been conducted. Our results showed that: (a) A state-of-the-art automatic fingerprint verification system can distinguish identical twins without drastic degradation in performance. (b) The chance that the fingerprints have the same type from identical twins is 0.7440, comparing to 0.3215 from non-identical twins. (c) For the corresponding fingers of identical twins which have same fingerprint type, the probability distribution of five major fingerprint types is similar to the probability distribution for all the fingers' fingerprint type. (d) For each of four fingers of identical twins, the probability of having same fingerprint type is similar. PMID:22558204

  4. Fingerprint recognition with identical twin fingerprints.

    PubMed

    Tao, Xunqiang; Chen, Xinjian; Yang, Xin; Tian, Jie

    2012-01-01

    Fingerprint recognition with identical twins is a challenging task due to the closest genetics-based relationship existing in the identical twins. Several pioneers have analyzed the similarity between twins' fingerprints. In this work we continue to investigate the topic of the similarity of identical twin fingerprints. Our study was tested based on a large identical twin fingerprint database that contains 83 twin pairs, 4 fingers per individual and six impressions per finger: 3984 (83*2*4*6) images. Compared to the previous work, our contributions are summarized as follows: (1) Two state-of-the-art fingerprint identification methods: P071 and VeriFinger 6.1 were used, rather than one fingerprint identification method in previous studies. (2) Six impressions per finger were captured, rather than just one impression, which makes the genuine distribution of matching scores more realistic. (3) A larger sample (83 pairs) was collected. (4) A novel statistical analysis, which aims at showing the probability distribution of the fingerprint types for the corresponding fingers of identical twins which have same fingerprint type, has been conducted. (5) A novel analysis, which aims at showing which finger from identical twins has higher probability of having same fingerprint type, has been conducted. Our results showed that: (a) A state-of-the-art automatic fingerprint verification system can distinguish identical twins without drastic degradation in performance. (b) The chance that the fingerprints have the same type from identical twins is 0.7440, comparing to 0.3215 from non-identical twins. (c) For the corresponding fingers of identical twins which have same fingerprint type, the probability distribution of five major fingerprint types is similar to the probability distribution for all the fingers' fingerprint type. (d) For each of four fingers of identical twins, the probability of having same fingerprint type is similar.

  5. Identities in Motion: Rethinking Teacher-Student Identity Negotiation in Multilingual School Contexts

    ERIC Educational Resources Information Center

    Cummins, Jim

    2015-01-01

    Recent scholarship within the field of applied linguistics highlights the fact that identities are not static but are fluid, multiple, changeable across time and space, and always constructed in relationship to interactions with others. In other words, identities are constantly in motion. This paper presents a framework for examining the notion of…

  6. The system-stabilizing role of identity management strategies: social creativity can undermine collective action for social change.

    PubMed

    Becker, Julia C

    2012-10-01

    Three studies were conducted to examine whether, in an event of negative distinctiveness, engaging in 1 of the 3 identity management strategies of social creativity can undermine group member's intentions to engage in collective action. Study 1a (N = 55) and Study 1b (N = 58) illustrated that selecting a new (complementary) comparison dimension undermined middle-class people's and women's intention to participate in collective action. Study 1c (N = 74) and Study 1d (N = 126) revealed that a downward comparison undermined collective action intentions among unemployed people and women. Study 1e (N = 69) and Study 1f (N = 110) showed that a positive redefinition of an externally imposed negative group attribute did not diminish collective action intentions among immigrants and women. Study 2 (N = 99) illustrated that an alternative operationalization of revaluation of the attribute, namely, downplaying the status-defining attribute, undermined collective action among students. Study 2 and Study 3 (N = 95) consistently illustrated that reduced levels of group-relative deprivation mediated the negative relation between the social creativity strategies and collective action intentions. Implications for social change are discussed.

  7. Educational gaps and solutions for early-career nurse managers' education and participation in quality improvement.

    PubMed

    Djukic, Maja; Kovner, Christine T; Brewer, Carol S; Fatehi, Farida; Jun, Jin

    2015-04-01

    The objective of this study was to examine early-career frontline nurse managers' (FLNMs') reported educational preparedness and participation in quality improvement (QI). Frontline nurse managers are vitally important for leading QI. However, it is not well known if they have adequate knowledge and skills to lead this important function. We examined cross-sectional survey data from 42 FLNMs using descriptive statistics. About 30% of FLNMs reported being very prepared across 12 measured QI skills by schools or employers and 35% reported participating in a specific clinical effort to improve patient care on their unit more than once a month. More than 50% reported having good organizational support for QI, but only about 30% reported being rewarded for their contributions to QI. Our study highlights opportunities for development in QI for FLNMs and offers some solutions for nurse executives that can bridge the educational gaps.

  8. Māori identity signatures: A latent profile analysis of the types of Māori identity.

    PubMed

    Greaves, Lara M; Houkamau, Carla; Sibley, Chris G

    2015-10-01

    Māori are the indigenous peoples of New Zealand. However, the term 'Māori' can refer to a wide range of people of varying ethnic compositions and cultural identity. We present a statistical model identifying 6 distinct types, or 'Māori Identity Signatures,' and estimate their proportion in the Māori population. The model is tested using a Latent Profile Analysis of a national probability sample of 686 Māori drawn from the New Zealand Attitudes and Values Study. We identify 6 distinct signatures: Traditional Essentialists (22.6%), Traditional Inclusives (16%), High Moderates (31.7%), Low Moderates (18.7%), Spiritually Orientated (4.1%), and Disassociated (6.9%). These distinct Identity Signatures predicted variation in deprivation, age, mixed-ethnic affiliation, and religion. This research presents the first formal statistical model assessing how people's identity as Māori is psychologically structured, documents the relative proportion of these different patterns of structures, and shows that these patterns reliably predict differences in core demographics. We identify a range of patterns of Māori identity far more diverse than has been previously proposed based on qualitative data, and also show that the majority of Māori fit a moderate or traditional identity pattern. The application of our model for studying Māori health and identity development is discussed. (c) 2015 APA, all rights reserved).

  9. Corporate identity. Brand designs.

    PubMed

    Mathieson, Steve

    2004-02-19

    The past two years have seen a steadily more consistent brand identity for the NHS. Branding will become more important as foundation status and PCT commissioning makes acute hospitals more competitive. This has put pressure on some trusts that have their own strong identities.

  10. Identity change and informed consent

    PubMed Central

    Witt, Karsten

    2017-01-01

    In this paper, I focus on a kind of medical intervention that is at the same time fascinating and disturbing: identity-changing interventions. My guiding question is how such interventions can be ethically justified within the bounds of contemporary bioethical mainstream that places great weight on the patient's informed consent. The answer that is standardly given today is that patients should be informed about the identity effects, thus suggesting that changes in identity can be treated like ‘normal’ side effects. In the paper, I argue that this approach is seriously lacking because it misses important complexities going along with decisions involving identity changes and consequently runs into mistakes. As a remedy I propose a new approach, the ‘perspective-sensitive account’, which avoids these mistakes and thus provides the conceptual resources to systematically reflect on and give a valid consent to identity-changing interventions. PMID:28320773

  11. Interaction and dynamics of (alkylamide + electrolyte) deep eutectics: Dependence on alkyl chain-length, temperature, and anion identity

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Guchhait, Biswajit; Das, Suman; Daschakraborty, Snehasis

    Here we investigate the solute-medium interaction and solute-centered dynamics in (RCONH{sub 2} + LiX) deep eutectics (DEs) via carrying out time-resolved fluorescence measurements and all-atom molecular dynamics simulations at various temperatures. Alkylamides (RCONH{sub 2}) considered are acetamide (CH{sub 3}CONH{sub 2}), propionamide (CH{sub 3}CH{sub 2}CONH{sub 2}), and butyramide (CH{sub 3}CH{sub 2}CH{sub 2}CONH{sub 2}); the electrolytes (LiX) are lithium perchlorate (LiClO{sub 4}), lithium bromide (LiBr), and lithium nitrate (LiNO{sub 3}). Differential scanning calorimetric measurements reveal glass transition temperatures (T{sub g}) of these DEs are ∼195 K and show a very weak dependence on alkyl chain-length and electrolyte identity. Time-resolved and steady statemore » fluorescence measurements with these DEs have been carried out at six-to-nine different temperatures that are ∼100–150 K above their individual T{sub g}s. Four different solute probes providing a good spread of fluorescence lifetimes have been employed in steady state measurements, revealing strong excitation wavelength dependence of probe fluorescence emission peak frequencies. Extent of this dependence, which shows sensitivity to anion identity, has been found to increase with increase of amide chain-length and decrease of probe lifetime. Time-resolved measurements reveal strong fractional power dependence of average rates for solute solvation and rotation with fraction power being relatively smaller (stronger viscosity decoupling) for DEs containing longer amide and larger (weaker decoupling) for DEs containing perchlorate anion. Representative all-atom molecular dynamics simulations of (CH{sub 3}CONH{sub 2} + LiX) DEs at different temperatures reveal strongly stretched exponential relaxation of wavevector dependent acetamide self dynamic structure factor with time constants dependent both on ion identity and temperature, providing justification for explaining the fluorescence

  12. Development and Validation of a Q-Sort Measure of Identity Processing Style: The Identity Processing Style Q-Sort

    ERIC Educational Resources Information Center

    Pittman, Joe F.; Kerpelman, Jennifer L.; Lamke, Leanne K.; Sollie, Donna L.

    2009-01-01

    Identity styles represent strategies individuals use to explore identity-related issues. Berzonsky (Berzonsky, M. D. (1992). Identity style and coping strategies. "Journal of Personality, 60", 771-788) identified three styles: informational, normative, and diffuse. In three studies, this paper presents (a) the identity processing style Q-sort…

  13. Strengthening quitter self-identity: An experimental study.

    PubMed

    Meijer, Eline; Gebhardt, Winifred A; van Laar, Colette; van den Putte, Bas; Evers, Andrea W M

    2018-06-10

    Smoking-related self-identity processes are important for smoking cessation. We examined whether quitter self-identity (i.e. identification with quitting smoking) could be strengthened through a writing exercise, and whether expected social support for quitting, manipulated through vignettes, could facilitate identification with quitting. Participants (N = 339 daily smokers) were randomly assigned to a 2 (identity: strengthened quitter self-identity vs. control) × 3 (social support: present vs. absent vs. neutral control) between-participants design. The main outcome was post-test quitter self-identity. Post-test quitter self-identity was not strengthened successfully. Only a small and marginally significant intervention effect was found on quitter self-identity, which did not generalise to positively influence quit-intention or behaviour. The social support manipulation did not facilitate quitter self-identity. Secondary content analyses showed that quitter self-identity was strengthened among participants who linked quitting smoking to their lifestyle, wanted to become quitters for health reasons, and whose reasons for becoming quitters included approach of positive aspects of quitting, but not among participants who linked quitter self-identity to their self-perceptions. Results provide insight into the content of smokers' self-conceptualizations as quitters. Writing exercises should be improved and tested to eventually successfully strengthen quitter identities.

  14. Perceived parenting dimensions and identity styles: exploring the socialization of adolescents' processing of identity-relevant information.

    PubMed

    Smits, Ilse; Soenens, Bart; Luyckx, Koen; Duriez, Bart; Berzonsky, Michael; Goossens, Luc

    2008-04-01

    This study examined the relationships between crucial dimensions of perceived parenting (support, behavioral control, and psychological control) and the three identity styles defined by Berzonsky [Berzonsky, M. D. (1990). Self-construction over the life span: A process perspective on identity formation. Advances in Personal Construct Psychology, 1, 155-186.]. Each identity style was hypothesized to relate to a specific pattern of perceived parenting dimensions. Hypotheses were examined in a sample of middle and late adolescents (n=674). An information-oriented style was positively predicted by parental support. Contrary to expectations, however, an information-oriented style was also positively predicted by psychological control. A normative identity style was positively predicted by support and behavioral control. In line with expectations, a diffuse-avoidant identity style was positively predicted by psychological control and negatively by maternal (but not paternal) behavioral control. Findings are discussed in light of the literature on the socialization of identity formation and directions for future research are outlined.

  15. On the global well-posedness of BV weak solutions to the Kuramoto-Sakaguchi equation

    NASA Astrophysics Data System (ADS)

    Amadori, Debora; Ha, Seung-Yeal; Park, Jinyeong

    2017-01-01

    The Kuramoto model is a prototype phase model describing the synchronous behavior of weakly coupled limit-cycle oscillators. When the number of oscillators is sufficiently large, the dynamics of Kuramoto ensemble can be effectively approximated by the corresponding mean-field equation, namely "the Kuramoto-Sakaguchi (KS) equation". This KS equation is a kind of scalar conservation law with a nonlocal flux function due to the mean-field interactions among oscillators. In this paper, we provide a unique global solvability of bounded variation (BV) weak solutions to the kinetic KS equation for identical oscillators using the method of front-tracking in hyperbolic conservation laws. Moreover, we also show that our BV weak solutions satisfy local-in-time L1-stability with respect to BV-initial data. For the ensemble of identical Kuramoto oscillators, we explicitly construct an exponentially growing BV weak solution generated from BV perturbation of incoherent state for any positive coupling strength. This implies the nonlinear instability of incoherent state in a positive coupling strength regime. We provide several numerical examples and compare them with our analytical results.

  16. Social Media Social Comparison of Ability (but not Opinion) Predicts Lower Identity Clarity: Identity Processing Style as a Mediator.

    PubMed

    Yang, Chia-Chen; Holden, Sean M; Carter, Mollie D K

    2018-01-11

    Social comparison on social media has received increasing attention, but most research has focused on one type of social comparison and its psycho-emotional implications. Little is known about how different types of social comparison influence youth's identity development. Drawing on the theories of identity processing styles and social comparison, we examined how two different forms of social comparison on social media related to three identity processing styles, which in turn predicted youth's global self-esteem and identity clarity. We surveyed 219 college freshmen (M age  = 18.29; 74% female) once in the Fall and once in the Spring. Social comparison of ability on social media was related to concurrent diffuse-avoidant identity processing style, which predicted lower identity clarity months later. In contrast, social comparison of opinion on social media did not influence college freshmen's global self-esteem and identity clarity through identity processing styles. The findings clarified the implications of online social comparison for youth's identity development.

  17. Identity Development Process and Content: Toward an Integrated and Contextualized Science of Identity

    ERIC Educational Resources Information Center

    Galliher, Renee V.; Rivas-Drake, Deborah; Dubow, Eric F.

    2017-01-01

    This introductory summary provides an overview of the content of the special issue entitled "Identity Development Process and Content: Toward an Integrated and Contextualized Science of Identity." The 16 theoretical and empirical articles that comprise this special issue were selected to highlight innovative methodologies, theoretical…

  18. The importance of social identity content in a setting of chronic social conflict: understanding intergroup relations in Northern Ireland.

    PubMed

    Livingstone, Andrew; Haslam, S Alexander

    2008-03-01

    Two studies (N=117, 112) were conducted with school students in Northern Ireland to investigate the neglected relationship between social identity content and intergroup relations. Study 1 tested and found support for two hypotheses. The first was that the association between in-group identification and negative behavioural intentions would be moderated by antagonistic identity content. The second was that the antagonistic identity content mediates the relationship between the experience of intergroup antagonism and negative behavioural intentions. Study 2 replicated these findings at a time of reduced intergroup violence, and supplemented them with a qualitative-quantitative analysis of participants' written responses. In addition, findings demonstrate the importance of appreciating the content and meaning of social identities when theorizing about intergroup relations and developing conflict management interventions.

  19. Personal Identity in Japan

    ERIC Educational Resources Information Center

    Sugimura, Kazumi; Mizokami, Shinichi

    2012-01-01

    This chapter explores characteristics of identity formation among Japanese adolescents and young adults living in a cultural context where individualism has been increasingly emphasized even while maintaining collectivism. We argue that, to develop a sense of identity in Japanese culture, adolescents and young adults carefully consider others'…

  20. "I am a trained nurse": the nursing identity of anarchist and radical Emma Goldman.

    PubMed

    Connolly, Cynthia Anne

    2010-01-01

    For more than a century, scholars have analyzed the many dimensions of Emma Goldman. Remembered as an agent of revolution, feminism, sexual freedom, anarchy, and atheism, Goldman's motives, personality, and actions have generated an entire subgenre of historical scholarship. But although Goldman practiced nursing in New York City for ten years, one facet of her life that has been neglected is her nursing identity. Goldman's autobiography, Living My Life, reveals the way her nursing experiences informed her evolving anarchist political philosophy and international activism. She valued nursing for many reasons--for the economic independence it offered, identity it provided, and sense of community and connectivity she believed it encouraged. Finally, for Goldman, nursing represented was a vehicle to understand people's struggles and as a way of translating political philosophy into meaningful, practical solutions.

  1. Short Message Service (SMS) Security Solution for Mobile Devices

    DTIC Science & Technology

    2006-12-01

    correspondences, all reside on the mobile device . Once the data is compromised, the owner, family members, and friends may be subjected to identity theft ...SERVICE (SMS) SECURITY SOLUTION FOR MOBILE DEVICES by Yu Loon Ng December 2006 Thesis Advisor: Gurminder Singh Co-Advisor: John Gibson...in military settings are also discussed. 15. NUMBER OF PAGES 113 14. SUBJECT TERMS GSM security, SMS security, mobile device security

  2. Foreign Language Teaching and Cultural Identity.

    ERIC Educational Resources Information Center

    Nasr, Raja T., Ed.; And Others

    A collection of works on the role of cultural identity in second language learning and teaching includes: "Linguas estrangeiras e ideologia" (Roberto Ballalai); "Cultural Identity and Bilinguality" (Josiane F. Hamers, Michel Blanc); "Foreign Language Teaching and Cultural Identity" (Lakshmie K. Cumaranatunge);…

  3. Statistical t Analysis for the Solution of Prediction Trash Management in Dusun Tanjung Sari Kec. Ngaglik Kab Sleman, Yogyakarta

    NASA Astrophysics Data System (ADS)

    Salmahaminati; Husnaqilati, Atina; Yahya, Amri

    2017-01-01

    Trash management is one of the society participation to have a good hygiene for each area or nationally. Trash is known as the remainder of regular consumption that should be disposed to do waste processing which will be beneficial and improve the hygiene. The way to do is by sorting plastic which is processed into goods in accordance with the waste. In this study, we will know what are the factors that affect the desire of citizens to process the waste. The factors would have the identity and the state of being of each resident, having known of these factors will be the education about waste management, so it can be compared how the results of the extension by using preliminary data prior to the extension and the final data after extension. The analysis uses multiple logistic regression is the identify factors that influence people’s to desire the waste while the comparison results using t analysis. Data is derived from statistical instrument in the form of a questionnaire.

  4. Room-temperature NaI/H2O compression icing: solute-solute interactions.

    PubMed

    Zeng, Qingxin; Yao, Chuang; Wang, Kai; Sun, Chang Q; Zou, Bo

    2017-10-11

    In situ Raman spectroscopy revealed that transiting the concentrated NaI/H 2 O solutions to an ice VI phase and then into an ice VII phase at 298 K proceeds in a way different from that activated by the solute type. Unlike the solute type that raises both the critical pressures P C1 and P C2 , for the liquid-VI, the VI-VII transition simultaneously occurs in the Hofmeister series order: I > Br > Cl > F ∼ 0; concentration increase raises the P C1 faster than the P C2 that remains almost constant at higher NaI/H 2 O molecular number ratios. Concentration increase moves the P C1 along the liquid-VI phase boundary and it finally merges with P C2 at the triple-phase junction featured at 350 K and 3.05 GPa. The highly-deformed H-O bond is less sensitive to the concentration because of the involvement of anion-anion repulsion that weakens the electric field in the hydration shells. Observations confirm that the salt solvation lengthens the O:H nonbond and softens its phonon but relaxes the H-O bond contrastingly. Compression, however, has the opposite effect from that of salt solvation. Therefore, compression recovers the polarization-deformed O:H-O bond first and then proceeds to the phase transitions. The anion-anion interaction discriminates the effect of NaI/H 2 O concentration from that of the solute type at an identical concentration on the phase transitions.

  5. Change management in health care.

    PubMed

    Campbell, Robert James

    2008-01-01

    This article introduces health care managers to the theories and philosophies of John Kotter and William Bridges, 2 leaders in the evolving field of change management. For Kotter, change has both an emotional and situational component, and methods for managing each are expressed in his 8-step model (developing urgency, building a guiding team, creating a vision, communicating for buy-in, enabling action, creating short-term wins, don't let up, and making it stick). Bridges deals with change at a more granular, individual level, suggesting that change within a health care organization means that individuals must transition from one identity to a new identity when they are involved in a process of change. According to Bridges, transitions occur in 3 steps: endings, the neutral zone, and beginnings. The major steps and important concepts within the models of each are addressed, and examples are provided to demonstrate how health care managers can actualize the models within their health care organizations.

  6. Medical identity theft: an emerging problem for informatics.

    PubMed

    Gillette, William; Patrick, Timothy B

    2007-10-11

    This poster reports a preliminary review of medical identity theft. Financial identity theft has received a great deal of media attention. Medical identity theft is a particular kind of identity theft that has received little attention. There are two main subtypes of medical identity theft. In the first type the stolen medical identity is used to receive medical services, and in the second type the stolen medical identity is used to commit healthcare fraud.

  7. Authoring the identity of learner before doctor in the figured world of medical school.

    PubMed

    Stubbing, Evangeline; Helmich, Esther; Cleland, Jennifer

    2018-02-01

    Students enter the 'figured world' of medical school with preconceptions of what it means to be a doctor. The meeting of these early preconceptions and their newly developing identities can create emotional tensions. The aim of this study was to advance our understanding of how such tensions were experienced and managed. Using figured worlds as a theoretical framework we explored students' interactions of preconceptions with their newly developing professional identities in their first year at medical school. Advancing our understanding of this phenomena provided new insights into the complex process of identity formation. This was a qualitative study underpinned by a constructivist epistemology. We ran biannual focus groups with 23 first year students in one UK medical school. Data were recorded, transcribed and then template analysis used to undertake an inductive, iterative process of analysis until it was considered the template provided a detailed representation of the data. Significant preconceptions associated with the identity of a doctor were 'to help' and 'to be a leader'. These early preconceptions were in conflict with realities of the figured world of medical school creating the emotional tensions of 'being unable to help' and 'lacking power', with implications for interactions with patients. By the end of year one students' negotiated tensions and 'self-authored' their identity as a learner as opposed to an imagined 'as if' identity of a doctor. We revealed how preconceptions associated with becoming a doctor can conflict with a newly developing professional identity highlighting the importance of supporting students to embrace the formation of a 'learner' identity, a necessary part of the process of becoming a doctor.

  8. Full-Time, Part-Time Full-Time, and Part-Time Fathers: Father Identities Following Divorce

    ERIC Educational Resources Information Center

    Troilo, Jessica; Coleman, Marilyn

    2012-01-01

    This grounded theory study examined how 20 newly divorced, nonresidential fathers manage their fatherhood identities. The theory created from this study proposes that fathers' perceptions of (a) father-child relationships, (b) how their children's fiscal needs are met, and (c) barriers to their physical interactions with their children influence…

  9. Knowledge Retrieval Solutions.

    ERIC Educational Resources Information Center

    Khan, Kamran

    1998-01-01

    Excalibur RetrievalWare offers true knowledge retrieval solutions. Its fundamental technologies, Adaptive Pattern Recognition Processing and Semantic Networks, have capabilities for knowledge discovery and knowledge management of full-text, structured and visual information. The software delivers a combination of accuracy, extensibility,…

  10. RELATIONSHIPS BETWEEN IDENTITY AND ACADEMIC MOTIVATION.

    PubMed

    Matsushima, Rumi; Ozaki, Hitomi

    2015-08-01

    This study examined university students' academic motivation, focusing on individual differences in their sense of identity. The participants were 109 female Japanese students from two private universities (age range = 19-22 yr., M = 19.3, SD = 0.6). They completed four scales: the Multidimensional Ego Identity Scale, the Scale of Students' Attitude Toward Their Classes, the Academic Motivation Inventory, and the Scale of Lecture Self-Evaluation. Correlational analyses assessed the relationships between subscales. Then, path analysis was conducted to evaluate whether sense of identity affected attitude toward classes, academic motivation, and lecture self-evaluation. Differences particularly in psychosocial identity and self-identity accounted for significant variance in the students' attitudes toward classes, academic motivation, and lecture self-evaluation.

  11. Constructing Identities at the Intersections: An Autoethnographic Exploration of Multiple Dimensions of Identity

    ERIC Educational Resources Information Center

    Jones, Susan R.

    2009-01-01

    The purpose of this article is to present the results of an autoethnographic study designed to investigate the complexities of identity development among a diverse group of eight participants and to use results to explore potential relationships between self-authorship and intersecting identities. Data was collected via personal autoethnographic…

  12. Tracking Identity: Academic Performance and Ethnic Identity among Ecuadorian Immigrant Teenagers in Madrid

    ERIC Educational Resources Information Center

    Lucko, Jennifer

    2011-01-01

    This article examines Ecuadorian students' attempts to contest immigrant stereotypes and redefine their social identities in Madrid, Spain. I argue that academic tracking plays a pivotal role in the trajectory of students' emergent ethnic identity. To illustrate this process, I focus on students who abandon their academic and professional…

  13. The Presentation of Self in Scholarly Life: Identity and Marginalization in Academic Homepages

    ERIC Educational Resources Information Center

    Hyland, Ken

    2011-01-01

    The academic homepage is now a ubiquitous genre of scholarly life, but despite considerable interest in issues of identity and the ways individuals self-consciously manage the impression they give of themselves, it has been slow to attract the attention of ESP researchers. This may be because of the institutional control exercised by employing…

  14. Analysis of Air Force Secondary Power Logistics Solution Contract

    DTIC Science & Technology

    2010-05-21

    IL 62225 SUBJECT: Audit. Analysis of Air Force Secondary Power Logistics Solution Contract, 748th Supply Chain Management Group, Hill Air Fon:r... Power Logis.tics Solution Contnict. 748111 Supply Ch.,in Management Group. !-lill Air FOfC! BII.SI!, UT (Project 02009· DOOOCH·0213.000) I. AUlIctlcd...00-00-2010 to 00-00-2010 4. TITLE AND SUBTITLE Analysis of Air Force Secondary Power Logistics Solution Contract 5a. CONTRACT NUMBER 5b. GRANT

  15. An integrated solution for remote data access

    NASA Astrophysics Data System (ADS)

    Sapunenko, Vladimir; D'Urso, Domenico; dell'Agnello, Luca; Vagnoni, Vincenzo; Duranti, Matteo

    2015-12-01

    Data management constitutes one of the major challenges that a geographically- distributed e-Infrastructure has to face, especially when remote data access is involved. We discuss an integrated solution which enables transparent and efficient access to on-line and near-line data through high latency networks. The solution is based on the joint use of the General Parallel File System (GPFS) and of the Tivoli Storage Manager (TSM). Both products, developed by IBM, are well known and extensively used in the HEP computing community. Owing to a new feature introduced in GPFS 3.5, so-called Active File Management (AFM), the definition of a single, geographically-distributed namespace, characterised by automated data flow management between different locations, becomes possible. As a practical example, we present the implementation of AFM-based remote data access between two data centres located in Bologna and Rome, demonstrating the validity of the solution for the use case of the AMS experiment, an astro-particle experiment supported by the INFN CNAF data centre with the large disk space requirements (more than 1.5 PB).

  16. A two-mass expanding exact space-time solution

    NASA Astrophysics Data System (ADS)

    Uzan, Jean-Philippe; Ellis, George F. R.; Larena, Julien

    2011-01-01

    In order to understand how locally static configurations around gravitationally bound bodies can be embedded in an expanding universe, we investigate the solutions of general relativity describing a space-time whose spatial sections have the topology of a 3-sphere with two identical masses at the poles. We show that Israel junction conditions imply that two spherically symmetric static regions around the masses cannot be glued together. If one is interested in an exterior solution, this prevents the geometry around the masses to be of the Schwarzschild type and leads to the introduction of a cosmological constant. The study of the extension of the Kottler space-time shows that there exists a non-static solution consisting of two static regions surrounding the masses that match a Kantowski-Sachs expanding region on the cosmological horizon. The comparison with a Swiss-Cheese construction is also discussed.

  17. A Dialogical Approach to Conceptualizing Teacher Identity

    ERIC Educational Resources Information Center

    Akkerman, Sanne F.; Meijer, Paulien C.

    2011-01-01

    In recent attempts to address the notion of teacher identity, scholars have stressed how identity is dynamically evolving, intrinsically related to others, and consists of multiple identities. Though these postmodern characterizations represent radically new perceptions of identity, they are not extensively discussed in relation to previous…

  18. Sport-Related Identities and the "Toxic Jock"

    PubMed

    Miller, Kathleen E

    2009-01-01

    Little attention has been paid to the multidimensional nature of athletic involvement, which includes identity formation as well as participation in sports activities. Five hundred eighty-one sport-involved undergraduate students completed a questionnaire assessing their sport-related identities, goal orientations, primary sport ratings, and conformity to masculine norms. F-tested mean comparisons and hierarchical linear regressions were used to explore the characteristics associated with two distinct sport-related identities ("athletes" and "jocks"). Jock identity was associated with an ego-oriented approach to sports (men only), whereas athlete identity was associated with a task-oriented approach (both genders). Jock identity was positively associated with conformity to masculine norms, particularly for men, whereas athlete identity was positively associated with some masculine norms (i.e., Winning) and negatively associated with others (i.e., Playboy). These findings help to identify the correlates of a "toxic Jock" identity that may signal elevated risk for health-compromising behavior.

  19. Community owned solutions for fire management in tropical ecosystems: case studies from Indigenous communities of South America

    PubMed Central

    2016-01-01

    Fire plays an increasingly significant role in tropical forest and savanna ecosystems, contributing to greenhouse gas emissions and impacting on biodiversity. Emerging research shows the potential role of Indigenous land-use practices for controlling deforestation and reducing CO2 emissions. Analysis of satellite imagery suggests that Indigenous lands have the lowest incidence of wildfires, significantly contributing to maintaining carbon stocks and enhancing biodiversity. Yet acknowledgement of Indigenous peoples' role in fire management and control is limited, and in many cases dismissed, especially in policy-making circles. In this paper, we review existing data on Indigenous fire management and impact, focusing on examples from tropical forest and savanna ecosystems in Venezuela, Brazil and Guyana. We highlight how the complexities of community owned solutions for fire management are being lost as well as undermined by continued efforts on fire suppression and firefighting, and emerging approaches to incorporate Indigenous fire management into market- and incentive-based mechanisms for climate change mitigation. Our aim is to build a case for supporting Indigenous fire practices within all scales of decision-making by strengthening Indigenous knowledge systems to ensure more effective and sustainable fire management. This article is part of the themed issue ‘The interaction of fire and mankind’. PMID:27216507

  20. Community owned solutions for fire management in tropical ecosystems: case studies from Indigenous communities of South America.

    PubMed

    Mistry, Jayalaxshmi; Bilbao, Bibiana A; Berardi, Andrea

    2016-06-05

    Fire plays an increasingly significant role in tropical forest and savanna ecosystems, contributing to greenhouse gas emissions and impacting on biodiversity. Emerging research shows the potential role of Indigenous land-use practices for controlling deforestation and reducing CO2 emissions. Analysis of satellite imagery suggests that Indigenous lands have the lowest incidence of wildfires, significantly contributing to maintaining carbon stocks and enhancing biodiversity. Yet acknowledgement of Indigenous peoples' role in fire management and control is limited, and in many cases dismissed, especially in policy-making circles. In this paper, we review existing data on Indigenous fire management and impact, focusing on examples from tropical forest and savanna ecosystems in Venezuela, Brazil and Guyana. We highlight how the complexities of community owned solutions for fire management are being lost as well as undermined by continued efforts on fire suppression and firefighting, and emerging approaches to incorporate Indigenous fire management into market- and incentive-based mechanisms for climate change mitigation. Our aim is to build a case for supporting Indigenous fire practices within all scales of decision-making by strengthening Indigenous knowledge systems to ensure more effective and sustainable fire management.This article is part of the themed issue 'The interaction of fire and mankind'. © 2016 The Author(s).