269 resultados para identity entrepreneurship


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Presentation by Prof Richard Harrison given at Trickle Out Master Class, held at the British Institute of East Africa in Nairobi, Kenya

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Since the signing of the Northern Ireland peace agreement a plethora of community based prisoner self-help organisations have been established wherein former prisoners staff, manage and deliver services to colleagues. By forging and maintaining their collective identities through community based mutual aid, members of these self-help organisations have progressed to create not only individual change/assistance but have also developed and evolved to tackle serious wider social issues which impact on the members of their organisations. This article critically analyses how the conditions of a post conflict society can influence both the development and evolution of these organisations and also how members situate their claims about the self in the organisation and beyond. Using the social movement framework it is argued that the work of these self-help organisations have given rise to a new politics of identity … that is the ‘politically motivated’ ex-prisoner. ©2013 Taylor & Francis

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In consumer research, we frequently focus on the phenomenon of transformation, whether the transformatory effects of a particular consumption community or the great body of work being carried out under the banner of transformative consumer research. However, there is a particular transformation which occurs in the field of interpretivist consumer research that, we would argue, is overlooked—that of researcher transformation. We present as data our reflexive considerations on the ways in which our own research with vulnerable consumers has affected and changed us. We consider short-term transformations in the field, reflecting on the various ways that researcher identity is carefully managed and negotiated to fit with the social–cultural setting. We also consider longer term transformations and discuss the enduring impact of the research process—the people we have met, the homes we have visited, and the stories we have heard. By reflecting on the shaping of identities ‘in the field’, we aim to deepen our appreciation of the interpretive consumer research process and contribute to theoretical understanding of transformative identity research. Copyright © 2012 John Wiley & Sons, Ltd.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Community identities enhance well-being through the provision of social support and feelings of collective efficacy as well as by acting as a basis for collective action and social change. However, the precise mechanisms through which community identity acts to enhance well-being are complicated by stigmatisation which potentially undermines solidarity and collective action. The present research examines a real-world stigmatised community group in order to investigate: (1) the community identity factors that act to enhance well-being, and (2) the consequences of community identity for community action. Study 1 consisted of a household survey conducted in disadvantaged areas of Limerick city in Ireland. Participants (n=322) completed measures of community identification, social support, collective efficacy, community action, and psychological well-being. Mediation analysis indicated that perceptions of collective efficacy mediated the relationship between identification and well-being. However, levels of self-reported community action were low and unrelated to community identification. In Study 2, twelve follow–up multiple-participant interviews with residents and community group workers were thematically analysed, revealing high levels of stigmatisation and opposition to identity-related collective action. These findings suggest the potential for stigma to reduce collective action through undermining solidarity and social support.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The goal of the current study was to examine the moderating role of in-group social identity on relations between youth exposure to sectarian antisocial behavior in the community and aggressive behaviors. Participants included 770 mother-child dyads living in interfaced neighborhoods of Belfast. Youth answered questions about aggressive and delinquent behaviors as well as the extent to which they targeted their behaviors toward members of the other group. Structural equation modeling results show that youth exposure to sectarian antisocial behavior is linked with increases in both general and sectarian aggression and delinquency over one year. Reflecting the positive and negative effects of social identity, in-group social identity moderated this link, strengthening the relationship between exposure to sectarian antisocial behavior in the community and aggression and delinquency towards the out-group. However, social identity weakened the effect for exposure to sectarian antisocial behavior in the community on general aggressive behaviors. Gender differences also emerged; the relation between exposure to sectarian antisocial behavior and sectarian aggression was stronger for boys. The results have implications for understanding the complex role of social identity in intergroup relations for youth in post-accord societies.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The susceptibility of WiFi networks to Rogue Access Point attacks derives from the lack of identity for 802.11 devices. The most common means of detecting these attacks in current research is through tracking the credentials or the location of unauthorised and possibly malicious APs. In this paper, the authors outline a method of distinguishing WiFi Access Points using 802.11 MAC layer management frame traffic profiles. This system does not require location estimation or credential tracking techniques as used in current research techniques, which are known to be inaccurate. These characteristic management traffic profiles are shown to be unique for each device, tantamount to a MAC identity. The application of this technique to solving Rogue AP attacks under the constraints of an open access, public WiFi environment is discussed with the conclusion that the identity is practically very difficult to forge