971 resultados para common identity
Resumo:
Community development is centrally concerned with people in communities working together to achieve a common goal, that is, to collaborate, whether within local geographical communities, in communities of shared interests or among groups sharing a common identity. Its overarching goal is one of progressive transformational social change. As Belfast transitions from a conflict to a post-conflict society, there is a need for greater, more effective work at local community level in order to address a range of ongoing social and economic issues facing communities, including high levels of disadvantage and division. Given the significance of leadership in building effective collaboration and the centrality of collaboration for community development, it is important to understand how leadership is currently enacted and what kinds of leadership are required to support communities to collaborate effectively to bring about social change. This thesis thus centers on the kind of leadership practised and required to support collaboration for social change within the community sector in Belfast, a city that contains an estimated 28% of the total number of community and voluntary sector (CVS) organisations in Northern Ireland (Northern Ireland Council for Voluntary Action, 2012). Through a series of qualitative, in-depth interviews with people playing leadership roles in local communities, the study critically explores and analyses their experiences and perceptions in relation to leadership and collaboration. Community development in Belfast today is practised within a wider context of neoliberal policies, characterised by austerity and public spending cuts. Whilst not the only influencing factor, this context has had a particular and profound impact on the nature and role of community development practised, and on the kind of leadership enacted within it. The space for reflection and transformative action appears to be shrinking as the contraction of resources to support community development in local communities continues unabated. Those playing leadership roles increasingly find themselves compelled to spend time seeking resources and managing complex funding arrangements rather than focusing on the social change dimensions of their work. Collaboration as promoted by the state seems to have become an instrumental tactic used to implement its austerity measures and curtail the potential of the community sector. Despite this, local leaders are driving initiatives that attempt to push back, helping the sector refocus on its transformational goals of social change. To do this requires support. Those playing leadership roles require resources, including time, to encourage and enable communities to reconnect with the purpose and underpinning values of community development. Leaders also need support to develop and promote new, progressive narratives and visions and pursue these through building collaboration and solidarity.
Resumo:
Whilst most of the literature focusing on the Korean peninsula has concentrated on how to achieve unification through confidence-building measures, dialogues, negotiation and diplomacy, little attention has been paid to how a unified Korean identity, a core component of any potential reunification scheme could develop and be sustained. The paper addresses this gap by: (1) defining what national identity is, and how Korean identities have been formed, (2) outlining how both South and North Korea have understood and used the concept of national identity, (3) suggesting possible grounds on which the two Koreas could build a new, common national identity. © 2014 The Regents of the University of California.
Resumo:
We conducted two studies involving two different age groups (elementary school children and adults) aimed at integrating imagined contact and common ingroup identity models. In the first study, Italian elementary school children were asked to imagine interacting with an unknown immigrant peer as members of a common group. Results revealed that common ingroup imagined contact, relative to a control condition, improved outgroup helping intentions assessed 1 week and 2 weeks after the intervention. In the second study, common ingroup imagined contact led Italian university students to display higher intentions to have contact with immigrants compared to control conditions. In conclusion, results from both studies demonstrate that imagining an intergroup interaction as members of the same group strengthens the effects of imagined contact. These findings point to the importance of combining the common ingroup identity model and the imagined contact theory in order to increase the potentiality of prejudice reduction interventions.
Can a Common Currency Foster a Shared Social Identity across Different Nations? The Case of the Euro
Resumo:
Fostering the emergence of a "European identity" was one of the declared goals of the euro adoption. Now, years after the physical introduction of the common currency, we assess whether there has been an effect on a shared European identity. We use two different datasets in order to assess the impact of the euro adoption on the fostering of a self-declared "European Identity". We find that the effect of the euro is statistically insignificant although it is precisely estimated. This result holds important implications for European policy makers. It also sheds new light on the formation of social identities.
Resumo:
Heteronormative discourses provide the most common lens through which sexuality is understood within university curricula. This means that sexuality is discussed in terms of categories of identity, with heterosexuality accorded primacy while all 'others' are indeed 'othered'. This article draws on research carried out by the authors in a core first year university ethics class, in which a fictional text was introduced with the intention of unpacking these discourses. An ethnographic study was undertaken where both students and teachers engaged in discussions over, and personal written reflections on, the textual content. In reporting the results of that study this article uses a post-structural framework to identify how classroom and textual discourses might be used to break down socially constructed categories of sexuality and students' conceptualisations of non-heterosexual behaviour. It was found that engaging in discussion in the context of the fictional text allowed some students to begin to recognise their own heteronormative views and engage in an informed critique of them.
Resumo:
This paper will describe a research project that examines the implications of multidisciplinary student cohorts on teaching and learning within undergraduate and postgraduate units in higher education. Whist students generally specialise in one discipline, it is also common that, at some point during their degree, they will choose to undertake subjects that are outside their specialist area. Students may choose a multidisciplinary learning experience either out of interest or because the subject is seen as complementary to their core discipline. When the lens of identity is applied to the multi-disciplinary cohorts in undergraduate and postgraduate units, it assists in identifying learning needs. The nature of disciplinarity, and the impact it has on students’ academic identity, presents challenges to both students and teachers when they engage in teaching and learning, impacting on curriculum design, assessment practices and teaching delivery strategies (Winberg, 2008). This project aims to identify the barriers that exist to effective teaching and learning in units that have multidisciplinary student cohorts. It will identify the particular needs of students in multidisciplinary student cohorts and determine a teaching and learning model that meets the needs of such cohorts. References Becher, T. & Trowler, P.R. (2001). Academic tribes and territories: Intellectual enquiry and the culture of the discipline. Buckingham, UK: Open University Press. Light, G. & Cox, R. (2001). Learning and teaching in higher education: A reflective professional. Thousand Oaks, CA: Sage. Neumann, R. (2001). Disciplinary differences and university teaching. Studies in Higher Education, 26 (2), 135-46. Neumann, R., Parry, S. & Becher, T. (2002). Teaching and Learning in their disciplinary contexts: A conceptual analysis. Studies in Higher Education, 27(4), 405-417. Taylor, P.G. (1999) Making Sense of Academic Life: Academics, Universities and Change. Buckingham, UK: Open University Press. Winberg, C. (2008). Teaching engineering/engineering teaching: interdisciplinary collaboration and the construction of academic identities. Teaching in Higher Education, 13(3), 353 - 367.
Resumo:
Heteronormative discourses provide the most common lens through which sexuality is understood within university curricula. This means that sexuality is discussed in terms of categories of identity, with heterosexuality accorded primacy and all ‘others’ indeed ‘othered.’ This paper reports on research carried out by the authors in a core first year university justice class, in which students of law and/or justice were required to engage with, discuss, and reflect on discourses on sexuality. It uses a poststructural framework to identify how students understand non-heterosexualities and how they personally relate to queer identities, in the sense that it asks questions about gender and sexual identity, and the discourses surrounding them. It was found that strongly negative attitudes to non-heterosexualities are quite resistant to challenge, and that some students express being confronted with queerness as a deep-seated fear of being drawn into otherness against their will. The result was that, while many students were able to unpack their attitudes towards queerness and engage in critical reflection and re-evaluation of their attitudes, students with strongly negative views towards non-heterosexualities conversely refused to engage at all, typically perceiving even the engagement itself as a threat to their core heterosexual identity. However, the authors caution against relying on the idea that students are simply “homophobic” to explain this reluctance, as this term does not necessarily account for the complexity of the discourses that inform students’ reactions in this context. This “homophobia” may simply be related to a way of performing gender and sexual identity as opposed to overt discrimination and fear.
Resumo:
Mainstream representations of trans people typically run the gamut from victim to mentally ill and are almost always articulated by non-trans voices. The era of user-generated digital content and participatory culture has heralded unprecedented opportunities for trans people who wish to speak their own stories in public spaces. Digital Storytelling, as an easy accessible autobiographic audio-visual form, offers scope to play with multi-dimensional and ambiguous representations of identity that contest mainstream assumptions of what it is to be ‘male’ or ‘female’. Also, unlike mainstream media forms, online and viral distribution of Digital Stories offer potential to reach a wide range of audiences, which is appealing to activist oriented storytellers who wish to confront social prejudices. However, with these newfound possibilities come concerns regarding visibility and privacy, especially for storytellers who are all too aware of the risks of being ‘out’ as trans. This paper explores these issues from the perspective of three trans storytellers, with reference to the Digital Stories they have created and shared online and on DVD. These examplars are contextualised with some popular and scholarly perspectives on trans representation, in particular embodied and performed identity. It is contended that trans Digital Stories, while appearing in some ways to be quite conventional, actually challenge common notions of gender identity in ways that are both radical and transformative.
Resumo:
Usability in HCI (Human-Computer Interaction) is normally understood as the simplicity and clarity with which the interaction with a computer program or a web site is designed. Identity management systems need to provide adequate usability and should have a simple and intuitive interface. The system should not only be designed to satisfy service provider requirements but it has to consider user requirements, otherwise it will lead to inconvenience and poor usability for users when managing their identities. With poor usability and a poor user interface with regard to security, it is highly likely that the system will have poor security. The rapid growth in the number of online services leads to an increasing number of different digital identities each user needs to manage. As a result, many people feel overloaded with credentials, which in turn negatively impacts their ability to manage them securely. Passwords are perhaps the most common type of credential used today. To avoid the tedious task of remembering difficult passwords, users often behave less securely by using low entropy and weak passwords. Weak passwords and bad password habits represent security threats to online services. Some solutions have been developed to eliminate the need for users to create and manage passwords. A typical solution is based on generating one-time passwords, i.e. passwords for single session or transaction usage. Unfortunately, most of these solutions do not satisfy scalability and/or usability requirements, or they are simply insecure. In this thesis, the security and usability aspects of contemporary methods for authentication based on one-time passwords (OTP) are examined and analyzed. In addition, more scalable solutions that provide a good user experience while at the same time preserving strong security are proposed.
Resumo:
This paper explores how the effective use of performance management systems (PMS) essentialises collective identities through the use of textual performances. The discursive effect of PMS operates to simplify members’ logic to allow them to understand and negotiate the complex nature of collective performance. Two case studies, drawing on a qualitative study of the implementation of PMS in two public sector organisations, point to the unique contribution of symbolic effects of one popular PMS, the balanced scorecard (BSC). Findings suggest that the BSC visualising the trajectory of achieving organisational vision through multiple perspectives, measures and linkages is a valuable identity product to achieve organisational success. The case studies also provide an analysis that contrasts aspects of the diffusion and promotion of collective identities through the use of the BSC. This demonstrates that clear direction in the identity management process is an important factor in the design and implementation of successful PMS programs. The value of this paper is to heighten recognition of the symbolic agency of PMS, as it serves as a subtle mechanism for identity management, and also to foster the collaboration of communication specialists and management accountants to achieve common organisational goals.
Resumo:
Identity is unique, multiple and dynamic. This paper explores common attributes of organisational identities, and examines the role of performance management systems (PMSs) on revealing identity attributes. One of the influential PMSs, the balanced scorecard, is used to illustrate the arguments. A case study of a public-sector organisation suggests that PMSs now place a value on the intangible aspects of organisational life as well as the financial, periodically revealing distinctiveness, relativity, visibility, fluidity and manageability of public-sector identities that sustain their viability. This paper contributes to a multi-disciplinary approach and its practical application, demonstrating an alternative pathway to identity-making using PMSs.
Resumo:
Background: Although class attendance is linked to academic performance, questions remain about what determines students’ decisions to attend or miss class. Aims: In addition to the constructs of a common decision-making model, the theory of planned behaviour, the present study examined the influence of student role identity and university student (in-group) identification for predicting both the initiation and maintenance of students’ attendance at voluntary peer-assisted study sessions in a statistics subject. Sample: University students enrolled in a statistics subject were invited to complete a questionnaire at two time points across the academic semester. A total of 79 university students completed questionnaires at the first data collection point, with 46 students completing the questionnaire at the second data collection point. Method: Twice during the semester, students’ attitudes, subjective norm, perceived behavioural control, student role identity, in-group identification, and intention to attend study sessions were assessed via on-line questionnaires. Objective measures of class attendance records for each half-semester (or ‘term’) were obtained. Results: Across both terms, students’ attitudes predicted their attendance intentions, with intentions predicting class attendance. Earlier in the semester, in addition to perceived behavioural control, both student role identity and in-group identification predicted students’ attendance intentions, with only role identity influencing intentions later in the semester. Conclusions: These findings highlight the possible chronology that different identity influences have in determining students’ initial and maintained attendance at voluntary sessions designed to facilitate their learning.
Resumo:
Digital Stories are short autobiographical documentaries, often illustrated with personal photographs and narrated in the first person, and typically produced in group workshops. As a media form they offer ‘ordinary people’ the opportunity to represent themselves to audiences of their choosing; and this amplification of hitherto unheard voices has significant repercussions for their social participation. Many of the storytellers involved in the ‘Rainbow Family Tree’ case study that is the subject of this paper can be characterised as ‘everyday’ activists for their common desire to use their personal stories to increase social acceptance of marginalised identity categories. However, in conflict with their willingness to share their personal stories, many fear the risks and ramifications of distributing them in public spaces (especially online) to audiences both intimate and unknown. Additionally, while technologies for production and distribution of rich media products have become more accessible and user-friendly, many obstacles remain. For many people there are difficulties with technological access and aptitude, personal agency, cultural capital, and social isolation, not to mention availability of the time and energy requisite to Digital Storytelling. Additionally, workshop context, facilitation and distribution processes all influence the content of stories. This paper explores the many factors that make ‘authentic’ self-representation far from straight forward. I use qualitative data drawn from interviews, Digital Story texts and ethnographic observation of GLBTQIS participants in a Digital Storytelling initiative that combined face-to-face and online modes of participation. I consider mediating influences in practice and theory and draw on strategies put forth in cultural anthropology and narrative therapy to propose some practical tools for nuanced and sensitive facilitation of Digital Storytelling workshops and webspaces. Finally, I consider the implications of these facilitation strategies for voice, identity and social participation.
Resumo:
Identity-Based (IB) cryptography is a rapidly emerging approach to public-key cryptography that does not require principals to pre-compute key pairs and obtain certificates for their public keys— instead, public keys can be arbitrary identifiers such as email addresses, while private keys are derived at any time by a trusted private key generator upon request by the designated principals. Despite the flurry of recent results on IB encryption and signature, some questions regarding the security and efficiency of practicing IB encryption (IBE) and signature (IBS) as a joint IB signature/encryption (IBSE) scheme with a common set of parameters and keys, remain unanswered. We first propose a stringent security model for IBSE schemes. We require the usual strong security properties of: (for confidentiality) indistinguishability against adaptive chosen-ciphertext attacks, and (for nonrepudiation) existential unforgeability against chosen-message insider attacks. In addition, to ensure as strong as possible ciphertext armoring, we also ask (for anonymity) that authorship not be transmitted in the clear, and (for unlinkability) that it remain unverifiable by anyone except (for authentication) by the legitimate recipient alone. We then present an efficient IBSE construction, based on bilinear pairings, that satisfies all these security requirements, and yet is as compact as pairing-based IBE and IBS in isolation. Our scheme is secure, compact, fast and practical, offers detachable signatures, and supports multirecipient encryption with signature sharing for maximum scalability.
Developing transactive memory systems : theoretical contributions from a social identity perspective
Resumo:
Transactive memory system (TMS) theory explains how expertise is recognized and coordinated in teams. Extending current TMS research from a group information-processing perspective, our article presents a theoretical model that considers TMS development from a social identity perspective. We discuss how two features of communication (quantity and quality) important to TMS development are linked to TMS through the group identification mechanism of a shared common team identity. Informed by social identity theory, we also differentiate between intragroup and intergroup contexts and outline how, in multidisciplinary teams, professional identification and perceived equality of status among professional subgroups have a role to play in TMS development. We provide a theoretical discussion of future research directions aimed at testing and extending our model.